52nd week of 2020 patent applcation highlights part 70 |
Patent application number | Title | Published |
20200403802 | BIT MIXER BASED PARALLEL MAC AND HASH FUNCTIONS - A device for, and method of, generating coded data from input data are disclosed. The device includes: an input for receiving input data, where the input data includes a plurality of data blocks; a plurality of bit mixers coupled in parallel to the input, where each bit mixer is configured to receive at least one data block of the plurality of data blocks, where no bit mixer of the plurality of bit mixers is configured to receive a same data block of the plurality of data blocks as another of the bit mixers of the plurality of bit mixers, and where no two bit mixers of the plurality of bit mixers are configured to produce same output values for same input values; a combiner communicatively coupled in parallel to the plurality of bit mixers; and an output communicatively coupled to the combiner, the output configured to provide coded data. | 2020-12-24 |
20200403803 | AUDITABLY PROVING A USAGE HISTORY OF AN ASSET - Auditably proving a usage history of an asset, in which the asset includes a hardware security module with at least a public key and a private key. A client application logs hash values of a pair of request data and response data. Usage history of the asset is proved. The proving includes verifying, using the public key, a signature of other hash values of the pair of request data and response data. The other hash values are signed with the private key. The proving further includes comparing the hash values logged by the client application with the other hash values. | 2020-12-24 |
20200403804 | METHODS AND ARRANGEMENTS FOR VEHICLE-TO-VEHICLE COMMUNICATIONS - Logic may implement protocols and procedures for vehicle-to-vehicle communications for platooning. Logic may implement a communications topology to distinguish time-critical communications from non-time-critical communications. Logic may sign time-critical communications with a message authentication code (MAC) algorithm with a hash function such as Keccak MAC or a Cipher-based MAC. Logic may generate a MAC based on pairwise, symmetric keys to sign the time-critical communications. Logic may sign non-time-critical communications with a digital signature. Logic may encrypt non-time-critical communications. Logic may append a certificate to non-time-critical communications. Logic may append a header to messages to create data packets and may include a packet type to identify time-critical communications. Logic may decode and verify the time-critical messages with a pairwise symmetric key. And logic may prioritize time-critical communications to meet a specified latency. | 2020-12-24 |
20200403805 | Systems and Methods for a Decentralized Data Authentication Platform - A computer-implemented method for creating authenticable data may include receiving, at a computer server, a credential; storing, in a first data storage, the credential; and generating a credential decentralized identifier (DID) document. The credential DID document may correspond to the credential. The method may further include obtaining a first digital signature, which may be verifiable via a first public cryptographic key. A first attesting DID document may include the first public cryptographic key. The method may further include storing, in the first data storage, the first digital signature; and modifying the first attesting DID document to include a link configured to provide data access to data stored at first location in the first data storage. The data stored at the first location in the first data storage may include the credential or the first digital signature. The method may include obtaining a verifiable credential. | 2020-12-24 |
20200403806 | Method And System For Signing And Authenticating Electronic Documents Via A Signature Authority Which May Act In Concert With Software Controlled By The Signer - A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated in a trustworthy manner, which may act in cooperation with trusted components controlled and operated by the signer. The system employs a presentation authority for presenting an unsigned copy of an electronic document to a signing party and a signature authority for controlling a process for affixing an electronic signature to the unsigned document to create a signed electronic document. The system provides an applet for a signing party's computer that communicates with the signature authority. | 2020-12-24 |
20200403807 | Authentication and Binding of Multiple Devices - Systems and methods are described that relate to authentication and/or binding of multiple devices with varying security profiles. In one aspect, a first device with a higher security profile may vouch for the authenticity of a second device with a lower security profile when the second device requests access for content from a content provider. The vouching process may be implemented by allowing the first device to overlay its digital signature on a registration request that has been signed and transmitted by the second device. The second device with the lower security profile may access content from the content provider or source for a predetermined time period, even when the second device does not access content through the first device. | 2020-12-24 |
20200403808 | SYSTEM AND METHOD FOR AUTHENTICATING AND AUTHORIZING DEVICES - A system and method for a distributed security model that may be used to achieve one or more of the following: authenticate system components; securely transport messages between system components; establish a secure communications channel over a constrained link; authenticate message content; authorize actions; and distribute authorizations and configuration data amongst users' system components in a device-as-a-key system. | 2020-12-24 |
20200403809 | SERVICE REQUEST AUTHENTICATION UTILIZING PERMISSIONS ASSOCIATED WITH DIGITAL CERTIFICATES - Technologies are shown for authenticating service requests on a communication link established using a digital certificate owned by an entity, where permissions data is associated with the digital certificate. A service request is received from the entity through the communication link. Responsive to the service request, the permissions data associated with the digital certificate is obtained and the service request checked against the permissions data associated with the digital certificate. If the service request is permitted based on the permissions data, the service request is processed. If the service request is not permitted based on the permissions data, the service request is rejected. The permissions data can be stored on a blockchain with a blockchain address in the certificate, in a certificate authority for the certificate, or locally on a server receiving the service request. | 2020-12-24 |
20200403810 | VALIDATION DATA STRUCTURE FOR DECENTRALIZED IDENTITY CLAIM - Use of a validation data structure in order to securely communicate an encrypted claim that has a decentralized identifier as a subject. The sending system generates the validation data structure and presents the validation data structure to a user that owns the decentralized identifier. The sending system encrypts the claim using at least the validation data structure, and constructs a message that includes the encrypted claim, but which does not include the validation data structure. The relying party receives the message. However, without separately receiving the validation data structure from the user, the relying party computing system cannot decrypt the encrypted claim. If the user wishes the relying party computing system to have access to the claim, the user may communicate the validation data structure to the relying party computing system. | 2020-12-24 |
20200403811 | DYNAMIC CERTIFICATE PINNING SYSTEMS AND METHODS - A computer system including a memory, a network interface, and at least one processor is provided. The at least one processor can transmit, via the network interface, a first message to a server application to initiate a handshake process; receive, via the network interface, a first copy of a security certificate from the server application; determine whether the first copy is valid; store, in response to a determination that the first copy is valid, the first copy in the memory; establish an initial secure connection to the server application; transmit, via the network interface, a second message to the server application to request a subsequent secure connection to the server application; receive, via the network interface, a second copy of the security certificate from the server application; determine whether the second copy matches the first copy; and establish the subsequent secure connection to the server application. | 2020-12-24 |
20200403812 | CERTIFICATE ISSUING APPARATUS, VERIFICATION APPARATUS, COMMUNICATION DEVICE, CERTIFICATE ISSUING SYSTEM, CERTIFICATE ISSUING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An embodiment of the present invention provides a new scheme for issuing a server certificate to a Web server on a private network. A certificate issuing apparatus as one embodiment of the present invention includes a first communicator, a detector, a second communicator, and an electronic signer. The first communicator communicates with a first communication device regarding issuance of a certificate. The detector detects a verification apparatus possessing a second key identical with or corresponding to a first key possessed by the first communication device. The second communicator instructs the detected verification apparatus to verify whether the first communication device is authentic. When the authenticity of the first communication device is proved by the verification which uses the second key, the electronic signer generates the certificate for the first communication device by electronically signing a certificate signing request from the first communication device by using a third key. | 2020-12-24 |
20200403813 | METHOD AND APPARATUS TO PROVIDE MEMORY BASED PHYSICALLY UNCLONABLE FUNCTIONS - Physically unclonable functions response in memory cells is improved by transistor sizing, transistor threshold voltage (V | 2020-12-24 |
20200403814 | SIMPLE POWER OVER ETHERNET DATA TRANSMISSION PROTOCOL - The present invention relates to a simple data transmission protocol and a data receiving device ( | 2020-12-24 |
20200403815 | METHOD, SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIUM FOR GENERATING CHATROOM ACCORDING TO CONDITION - Disclosed is a method, system, and non-transitory computer-readable record medium for creating a chatroom according to a condition. The chatroom creation method may include providing an instant messaging service; registering a chatroom creation condition related to a specific account of the instant messaging service; retrieving at least one account of accounts of the instant messaging service that meets the chatroom creation condition; and automatically creating a chatroom of the specific account joined by the retrieved accounts. | 2020-12-24 |
20200403816 | UTILIZING VOLUME-BASED SPEAKER ATTRIBUTION TO ASSOCIATE MEETING ATTENDEES WITH DIGITAL MEETING CONTENT - The present disclosure relates to associating digital meeting content with meeting attendees based on volume-based speaker attribution. In particular, the disclosed systems can attribute segments of audio associated with a meeting to meeting attendees (i.e., identify a meeting attendee as the speaker of one or more audio segments) based on speaking volumes captured by the audio. For example, the audio of a meeting can include speech from a plurality of meeting attendees, where the speech associated with each meeting attendee corresponds to a particular speaking volume. The disclosed systems can use the speaking volumes to map speakers to meeting attendees, therefore associating the meeting attendees with particular segments of speech. The disclosed systems can then associate digital meeting content with those meeting attendees. | 2020-12-24 |
20200403817 | GENERATING CUSTOMIZED MEETING INSIGHTS BASED ON USER INTERACTIONS AND MEETING MEDIA - Methods, systems, and non-transitory computer readable storage media are disclosed for generating meeting insights based on media data and device input data. For example, in one or more embodiments, the disclosed system utilizes analyzes media data including audio data or video data and inputs to client devices associated with a meeting to determine a portion of the meeting (e.g., a portion of the media data) that is relevant for a user. In response to determining a relevant portion of the meeting, the system generates an electronic message including content related to the relevant portion of the meeting. The system then provides the electronic message to a client device of the user. For instance, in one or more embodiments, the system generates a meeting summary, meeting highlights, or action items related to the media data to provide to the client device of the user. In one or more embodiments, the system also uses the summary, highlights, or action items to train a machine-learning model for use with future meetings. | 2020-12-24 |
20200403818 | GENERATING IMPROVED DIGITAL TRANSCRIPTS UTILIZING DIGITAL TRANSCRIPTION MODELS THAT ANALYZE DYNAMIC MEETING CONTEXTS - The present disclosure relates to systems, non-transitory computer-readable media, and methods for improving digital transcripts of a meeting based on user information. For example, a digital transcription system creates a digital transcription model to automatically transcribe audio from a meeting based on documents associated with meeting participants, event details, user features, and other meeting context data. In one or more embodiments, the digital transcription model creates a digital lexicon based on the user information, which the digital transcription system uses to generate the digital transcript. In some embodiments, the digital transcription model trains and utilizes a digital transcription neural network to generate the digital transcript. | 2020-12-24 |
20200403819 | TRAFFIC REPLICATION IN OVERLAY NETWORKS SPANNING MULTIPLE SITES - Some embodiments provide a method of replicating messages for a logical network. At a particular tunnel endpoint in a particular datacenter, the method receives a message to be replicated to members of a replication group. The method replicates the message to a set of tunnel endpoints of the replication group located in a same segment of the particular datacenter as the particular tunnel endpoint. The method replicates the message to a first set of proxy endpoints of the replication group, each of which is located in a different segment of the particular datacenter and for replicating the message to tunnel endpoints located in its respective segment of the particular datacenter. The method replicates the message to a second set of proxy endpoints of the replication group, each of which is located in a different datacenter and for replicating the message to tunnel endpoints located in its respective datacenter. | 2020-12-24 |
20200403820 | MOBILE ROBOT PROVIDING ENVIRONMENTAL MAPPING FOR HOUSEHOLD ENVIRONMENTAL CONTROL - A mobile robot includes a processor connected to a memory and a wireless network circuit, for executing routines stored in the memory and commands generated by the routines and received via the wireless network circuit. The processor drives the mobile robot to a multiplicity of accessible two dimensional locations within a household, and commands an end effector, including at least one motorized actuator, to perform mechanical work in the household. A plurality of routines include a first routine which monitors a wireless local network and detects a presence of a network entity on the wireless local network, a second routine which receives a signal from a sensor detecting an action state of one of the network entities, the action state changeable between waiting and active, and a third routine which commands the end effector to change state of performing mechanical work based on the presence and on the action state. | 2020-12-24 |
20200403821 | Plug and Play at Sites Using Tloc-Extension - According to some embodiments, a method performed by a first software defined wide area network (SD-WAN) edge router communicably coupled to a public network comprises: receiving a transport location (TLOC)-extension configuration for a known interface of the first edge router; detecting a second edge router attempting to connect to the known interface of the first edge router; and transmitting, to the second edge router, configuration information for the second edge router so that the second edge router is able to communicate with the public network through a TLOC-extension with the first edge router. In some embodiments, the second edge router receives device configuration information (e.g., PnP, ZTP, etc.) from the public network via the TLOC-extension. | 2020-12-24 |
20200403822 | METHODS FOR OPERATOR CONTROL UNIT AND PAYLOAD COMMUNICATION - A method of communication between a payload and a platform, including providing power to at least one payload via a platform, periodically sending an identification message from the at least one payload to the platform, decoding the identification message with the platform and sending a response message to the at least one payload, requesting access to one or more ethernet busses supplied by the platform, and enabling the one or more ethernet busses. | 2020-12-24 |
20200403823 | FUNCTIONAL SAFETY TRANSCEIVER - A Controller Area Network (CAN) transceiver is disclosed. The CAN transceiver includes a CAN bus interface including CANH and CANL inputs, a TXDC interface, RXDC interface and a CAN bus diagnostics module coupled with the CAN bus interface. The CAN bus diagnostics module is configured to analyze the CAN bus interface to detect and error on the CANH and CANL inputs and send a diagnostics code predefined for the detected error to one of the TXDC interface and the RXDC interface. | 2020-12-24 |
20200403824 | ASYMMETRIC ENERGY EFFICIENT ETHERNET - An Ethernet transceiver is disclosed. The Ethernet transceiver includes transceiver circuitry to couple to one end of an Ethernet link. The transceiver circuitry includes transmit circuitry to transmit high-speed Ethernet data along the Ethernet link at a first data rate and receiver circuitry. The receiver circuitry includes adaptive filter circuitry and correlator circuitry. The receiver circuitry is responsive to an inline signal to operate in a low-power alert mode with the adaptive filter circuitry disabled and to receive alert signals from the Ethernet link simultaneous with transmission of the Ethernet data by the transmit circuitry. The alert signals are detected by the correlator circuitry and include a sequence of alert intervals exhibiting encoded data at a second data rate less than the first data rate. | 2020-12-24 |
20200403825 | MESSAGE AUTHENTICATION BASED ON A PHYSICAL LOCATION ON A BUS - A system for authenticating messages transmitted on a bus based on physical location of transmitting units, comprising a reflector adapted to inject a plurality of reflection signals at a first point of a line topology bus, each in response to each of a plurality of messages transmitted by a plurality of bus connected units and a probe adapted to intercept the messages and the reflection signals at a second point of the bus. The probe calculates propagation timing between a reception time of the message and a reception time of an associated reflection signal transmitted in response to the message and determines validity of the message according to a match between the calculated propagation timing and a predefined propagation timings associated with the bus connected units. Wherein the bus connected units are statically connected to the bus between the first point and the second point. | 2020-12-24 |
20200403826 | MONITORING NETWORK TRAFFIC USING TRAFFIC MIRRORING - Technologies are disclosed for monitoring network traffic using traffic mirroring. According to some examples, traffic mirroring allows customers to monitor traffic at different sources within a VPC. For example, a source may be any Elastic Network Interface (ENI) in their VPC, including elastic network interfaces (ENIs) on virtual machine instances, Network Address Translation (NAT) Gateways, Load Balancers, VPC endpoints, Internal Gateways, Transit Gateways, and more. Filters can be utilized to determine the network traffic to mirror. A customer may also configure to monitor real-time traffic with a monitoring appliance of their choice. With traffic mirroring, data traffic may be identified and sent to one or more target devices. Customers may monitor traffic within a VPC for content inspection, forensic analysis, troubleshooting, record keeping, and the like. Using traffic mirroring, customers can replicate VPC traffic, along with full payload data, without installing and managing agents on virtual machine instances. | 2020-12-24 |
20200403827 | PACKET PROCESSING METHOD AND NETWORK DEVICE IN HYBRID ACCESS NETWORK - A packet processing method and a network device in a hybrid access network. The method comprises sending, by a first network device, a first data packet in a first sending window to a second network device by using a first tunnel. In response to receiving a first acknowledgement response sent by the second network device, increasing, by the first network device, a size of the first sending window based on a first proportion. In response to not receiving, within a first predetermined time, the first acknowledgement response, decreasing the size of the first sending window based on a second proportion; and in response to determining that the size of the first sending window is greater than or equal to a first threshold, sending a second data packet to a second receiving window of the second network device by using a second sending window. | 2020-12-24 |
20200403828 | RECEIVER SYSTEMS AND METHODS FOR AC AND DC COUPLING OF RECEIVER - An Alternating Current (AC) and Direct Current (DC) coupled electronic receiver system including a receiver, an AC-coupling capacitor between an input of the receiver system and the receiver, a bypass switch configured to selectively bypass the AC-coupling capacitor to DC-couple the input to the receiver, a bypass switch driving circuit configured to cause the bypass switch to switch ‘ON’ and thereby DC-couple the input to the receiver, and cause the bypass switch to switch ‘OFF’ and thereby AC-couple the input to the receiver, and a voltage-following transistor between a source and a gate of the bypass switch configured to maintain an ‘OFF’ state of the bypass switch while the input is AC-coupled. | 2020-12-24 |
20200403829 | LATTICE REDUCTION IN ORTHOGONAL TIME FREQUENCY SPACE MODULATION - Methods, systems and devices for lattice reduction in decision feedback equalizers for orthogonal time frequency space (OTFS) modulation are described. An exemplary wireless communication method, implementable by a wireless communication receiver apparatus, includes receiving a signal comprising information bits modulated using OTFS modulation scheme. Each delay-Doppler bin in the signal is modulated using a quadrature amplitude modulation (QAM) mapping. The method also includes estimating the information bits based on an inverse of a single error covariance matrix of the signal, with the single error covariance matrix being representative of an estimation error for all delay-Doppler bins in the signal. | 2020-12-24 |
20200403830 | BALANCING CIRCUIT CAPABLE OF COMPENSATING BANDWIDTH ATTENUATION INTRODUCED BY INTERFERENCE BETWEEN SIGNALS - A balancing circuit which may compensate for bandwidth attenuation introduced by interference between signals includes an amplifying circuit, a rising edge detection circuit and/or a falling edge detection circuit. By means of detecting the rising/falling edge of an original signal, the resulting pulse signal contains the phase information of a single “0” bit and a single “1” bit in the original signal, thus the phase of a rising edge or the phase of a falling edge of the original signal may be compensated respectively, so as to compensate for the high-frequency attenuation caused by interference between signals. | 2020-12-24 |
20200403831 | Data Packet Position Modulation System - A packet position modulation system includes a node configured to transmit a plurality of packets at corresponding time intervals. The node is configured to adjust, for at least one packet of the plurality of packets, the corresponding time interval to transmit the at least one packet. The system includes a base station configured to receive the plurality of packets from the node at corresponding time intervals, determine a difference between a previous time that a previous packet of the plurality of packets was received and a present time that a present packet of the plurality of packets was received, and recover coded data from the present packet based on the difference. | 2020-12-24 |
20200403832 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING TIME DIVISION DUPLEX FRAME CONFIGURATION INFORMATION IN WIRELESS COMMUNICATION SYSTEM - A method and an apparatus for transmitting and receiving Time Division Duplex (TDD) frame configuration information are disclosed. The base station transmits TDD frame configuration information as system information to a user equipment through a common control channel so as to dynamically change the TDD frame configuration according to uplink and downlink traffic conditions. The base station may deliver the same system information to all user equipments in the cell, removing ambiguity in User Equipment (UE) operations and avoiding interference. In comparison to an existing method of delivering TDD frame configuration information through system information update, the disclosed method enables user equipments to rapidly cope with traffic changes. In addition, user equipments may receive and apply TDD frame configuration information at the same time. | 2020-12-24 |
20200403833 | APPARATUS AND METHOD FOR SENDING AND RECEIVING BROADCAST SIGNALS - Disclosed herein is a broadcast signal receiver. The broadcast signal receiver according to an embodiment of the present invention includes a synchronization and demodulation module configured to perform detection and OFDM demodulation on a received broadcast signal, a frame parsing and deinterleaving module configured to parse and deinterleave the signal frame of the broadcast signal, a demapping and decoding module configured to convert the data of at least one Physical Layer Pipe (PLP) of the broadcast signal into a bit domain and to FEC-decode the PLP data, and an output processing module configured to receive the data of the at least one PLP and to output the received data in a data stream form. | 2020-12-24 |
20200403834 | METHOD FOR GENERATING A MULTICARRIER SIGNAL, DEMODULATION METHOD, COMPUTER PROGRAM PRODUCT AND CORRESPONDING DEVICES - A method for generating a multicarrier signal formed by multicarrier symbols. the method includes: obtaining N first modulating symbols and N second modulating symbols from a sequence of source symbols, the obtaining including, for at least one of the source symbols indexed k, a sub-step of: linearly combining a real part and an imaginary part respectively, of the symbol indexed k with a real part and an imaginary part respectively, of one of the source symbols indexed k+/−R, with R being a non-zero integer, delivering at least one first and one second combined symbol respectively; performing a frequency-time transformation of the N first and N second modulating symbols respectively, delivering a first block and a second block of N carriers respectively; and generating the multicarrier symbol from the first and second blocks of N carriers. | 2020-12-24 |
20200403835 | TERMINAL, RADIO COMMUNICATION METHOD, AND BASE STATION - A terminal is disclosed including a receiver that receives a downlink control information; and a processor that determines a first parameter based on a control channel element (CCE) index and a field value in the downlink control information; determines, based on the CCE index, whether a second parameter is the first parameter or a sum of the first parameter and an offset; and determines an initial cyclic shift index for a physical uplink control channel (PUCCH) transmission based on the second parameter. In other aspects, a communication method for a terminal and a base station are disclosed. | 2020-12-24 |
20200403836 | Method and Apparatus for Generating OFDM Signals - A method in a transmitter circuit of generating a signal comprising a first sequence of OFDM symbols, which are to be transmitted within a frequency sub band of a second sequence of OFDM symbols is disclosed. A first cyclic prefix (CP) of the second sequence of OFDM symbols has a first duration, and a second CP of the second sequence of OFDM symbols has a second duration. In order to generate both the first and the second cyclic prefix with an integer number of equidistant samples, a first sampling rate is required. The method comprises generating the signal comprising the first sequence of OFDM symbols at a second sampling rate, lower than the first sampling rate, and adjusting a sampling phase during CPs. | 2020-12-24 |
20200403837 | Systems and Methods for Communicating by Modulating Data on Zeros - Systems and methods for transmitting data using various Modulation on Zeros schemes are described. In many embodiments, a communication system is utilized that includes a transmitter having a modulator that modulates a plurality of information bits to encode the bits in the zeros of the z-transform of a discrete-time baseband signal. In addition, the communication system includes a receiver having a decoder configured to decode a plurality of bits of information from the samples of a received signal by: determining a plurality of zeros of a z-transform of a received discrete-time baseband signal based upon samples from a received continuous-time signal, identifying zeros that encode the plurality of information bits, and outputting a plurality of decoded information bits based upon the identified zeros. | 2020-12-24 |
20200403838 | METHOD AND APPARATUS USING CELL-SPECIFIC AND COMMON PILOT SUBCARRIERS IN MULTI-CARRIER, MULTI-CELL WIRELESS COMMUNICATION NETWORKS - A multi-carrier cellular wireless network ( | 2020-12-24 |
20200403839 | Method and apparatus for the decomposition of signals with varying envelope into offset components - A method and apparatus for decomposition of signals with varying envelope into offset components are disclosed here, that sample the time variant envelope of a single carrier (SC) or a multi-carrier (MC) band limited signal, quantizes the sampled value using N | 2020-12-24 |
20200403840 | SYSTEM AND METHOD FOR ENHANCING RECEPTION IN WIRELESS COMMUNICATION SYSTEMS - A method, an apparatus and a computer program product for enhancing reception of signals in a wireless communication system. A signal containing a frame including a plurality of symbols is received on an uplink communication channel. An angular position of at least one symbol in the plurality of symbols in a constellation of symbols is detected. The plurality of symbols include equalized symbols. An angular difference corresponding a phase error between the detected angular position of the symbol and an expected reference angular position in the constellation of symbols corresponding to an expected reference symbol corresponding to the received frame is determined. Using the determined phase error, a phase of the symbol is compensated. | 2020-12-24 |
20200403841 | WIRELESS TRANSMITTER, WIRELESS RECEIVER, WIRELESS COMMUNICATION SYSTEM, CONTROL CIRCUIT, AND STORAGE MEDIUM - A transmitter includes: a phase rotation sequence generation unit that generates, on the basis of transmit bits being input, a phase rotation sequence in which a frequency response has a bandwidth; an up-sampling unit that changes a sample rate of the phase rotation sequence and further replicates the phase rotation sequence; and a frequency shift unit that shifts, by a specified amount of shift on a frequency axis, a frequency component of the phase rotation sequence acquired from the up-sampling unit. | 2020-12-24 |
20200403842 | Device and Method of Performing Signal Compensation - A signal compensation device comprises a first filter circuit, for processing a broadband signal, to generate a first analog time-domain signal; a second filter circuit, for processing the broadband signal, to generate a second analog time-domain signal; a first transform circuit, for transforming the first analog time-domain signal to a first digital time-domain signal; a second transform circuit, for transforming the second analog time-domain signal to a second digital time-domain signal; a third transform circuit, for transforming the first digital time-domain signal to a first frequency-domain signal; a fourth transform circuit, for transforming the second digital time-domain signal to a second frequency-domain signal; and a processing circuit, for generating a time-domain compensation response according to the first frequency-domain signal and the second frequency-domain signal. | 2020-12-24 |
20200403843 | METHOD AND SYSTEM FOR INTER-DEVICE SERVICE ACCESS - Inter-device service access is disclosed including issuing, by a source device running a first program, an access request by the first program for a specific service, and transmitting, by the source device running the first program, the access request through an inter-device link to a target device that provides the specific service, the target device being configured to receive the access request, forward the received access request to a second program running on the target device, the second program executing a corresponding service function. | 2020-12-24 |
20200403844 | TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS - Systems and methods for associating sessions of encrypted identifiers are provided. A collection of data packets received during one or more sessions within a time period may be retrieved. Each packet in the collection may be associated with a unique identifier of a respective session. An epoch time may be calculated for each of the retrieved data packets based on the determined skew and respective timestamp information of the data packet. It may be identified as to whether each of the calculated epoch times matches a previously calculated epoch time for a packet associated with a previous session or a session that has previously been associated with a selected session. The timestamp information may be associated with a browser identifier and subject to encryption/decryption by an identifier server or authorized parties. | 2020-12-24 |
20200403845 | TECHNIQUES FOR WIRELESS ACCESS AND WIRELINE NETWORK INTEGRATION - One embodiment is a method and includes receiving at a termination element of a first network a bandwidth report (“BWR”), in which the BWR includes information regarding a data transmission opportunity over a second network for at least one endpoint data; scheduling a first network transmission opportunity for the at least one endpoint data using information derived from the received BWR; and receiving from a first network forwarding device the at least one endpoint data in accordance with the scheduled first network transmission opportunity. | 2020-12-24 |
20200403846 | METHODS AND APPARATUSES FOR FACILITATING P-CSCF RESTORATION WHEN A P-CSCF FAILURE HAS OCCURED - A method of facilitating P-CSCF restoration when a P-CSCF failure has occurred is disclosed. The method comprises a Proxy Call Session Control Function, P-CSCF receiving a Session Initiation Protocol, SIP, message when said P-CSCF has been selected as an alternative P-CSCF to a failed P-CSCF and providing, to an associated Policy and Charging Rules Function, PCRF, a message comprising an indication that P-CSCF restoration is required. | 2020-12-24 |
20200403847 | REMOTE CONTROL PLANES WITH AUTOMATED FAILOVER - Techniques for automated failover of remote control planes are described. A method of automated failover of remote control planes include determining failover event associated with a first control plane has occurred, the first control plane associated with a first area of a provider network, identifying a second control plane associated with a second area of the provider network, and failing over the first area of the provider network from the first control plane to the second control plane, wherein the child area updates one or more references to endpoints of the first control plane to be references to endpoints of the second control plane. | 2020-12-24 |
20200403848 | DYNAMIC DISTRIBUTION OF BIDIRECTIONAL FORWARDING DETECTION ECHO SESSIONS ACROSS A MULTI-PROCESSOR SYSTEM - A method and system of failure detection in a computer network, including pre-programming a number of processors of a multi-processor networked system coupled with remote systems via a network, each of the processors configured to run a BFD module. One processor may be assigned to be an active BFD server to establish sessions between the multi-processor networked system and the remote systems to detect link faults between the multi-processor networked system and the remote systems. Other processors may be assigned as dormant BFD clients. If a link or a processor running the active BFD server fails, one of the dormant BFD clients is selected to become an active BFD server. The BFD server may be dynamically replaced with a dormant client based on predetermined criteria without failure of the BFD server. | 2020-12-24 |
20200403849 | SERVICE FAULT LOCATING METHOD AND APPARATUS - A service fault locating method and apparatus for precisely locating a network fault problem in a multi-layer OAM architecture network. The method includes: receiving a service fault locating request message; determining, an IPs, and an IN, that a service fault is between a first layer-3 device and a second layer-3 device; obtaining a first network topology between the first layer-3 device and the second layer-3 device; determining a first forwarding path of the service packet between the first layer-3 device and the second layer-3 device according to the first network topology; configuring a forwarding entry of a forwarding device in the first forwarding path, and triggering the first layer-3 device to generate an extended layer-2 OAM packet; and obtaining a first path parameter of the first forwarding path, and determining a specific location of the service fault according to the first path parameter. | 2020-12-24 |
20200403850 | FACILITATING RESILIENT AND FAULT TOLERANT ASYNCHRONOUS MESSAGING - A device may receive a message from a first different device that includes an identifier and may determine whether the device has previously received the message. The device may generate, based on determining that the device has not previously received the message, an additional identifier and a message status indicator and may cause the additional identifier, the message, and the message status indicator to be stored in a data structure associated with the device. The device may send an acknowledgment status to the first different device and may cause processing of the message to generate an additional message that includes the additional identifier. The device may send the additional message to a second different device and may cause, after sending the additional message to the second different device, the message status indicator in the data structure to be updated. | 2020-12-24 |
20200403851 | NETWORK ALARM METHOD, DEVICE, SYSTEM AND TERMINAL - Provided are a network alarm method, apparatus, system and terminal. The method includes: receiving, by a network slicing management function (NSMF), reported alarm information, where the alarm information includes at least one of an identifier of a network slice or an identifier of a network slice subnet; the alarm information received by the NSMF is reported by a network function (NF), a network function management function (NFMF) or a network slice subnet management function (NSSMF). | 2020-12-24 |
20200403852 | INTELLIGENT EXPORT AND IMPORT OF SERVICE REPRESENTATIONS - A computational instance may includes a set of computing devices and a configuration management database (CMDB), wherein the CMDB contains a representation of a service deployed on a managed network, wherein the representation of the service includes metadata, service group membership, and an entry point, and wherein the computational instance is configured to: receive an instruction to export the representation of the service to a file; copy, to a metadata object in the file, the metadata; determine a hierarchical subset of the service groups that are related to the service; write, to one or more service group objects in the file, the hierarchical subset of the service groups; determine, from a list of entry points of the managed network, that the entry point is of the service; and write, to an entry point object in the file, the entry point. | 2020-12-24 |
20200403853 | SYSTEMS AND METHOD UPDATING ADC CONFIGURATION WITH INTENDED STATE USING DESIRED STATE API - Described herein are systems and methods for updating configuration of a device based on changes to microservices. A device may receive a request via a desired state application programming interface (API) to update a configuration of the device to manage a desired set of instances of microservices. The device may identify from the request, a first set of endpoint information for each instance of a microservice in the desired set of instances of microservices. The first set of endpoint information may include an internet protocol (IP) address and port of an endpoint of a respective instance of the microservice. The first set or second set of endpoint information may include a weight for each instance of the microservice. | 2020-12-24 |
20200403854 | SYSTEMS AND METHODS FOR PROFILING AND CLUSTERING NETWORK-CONNECTED DEVICES - A network device determines when multiple users each connect to a network using one or more devices. The network device obtains device or network-related parameters associated with the one or more devices and generates profiling vectors for each of the multiple users, that connects to the network using the one or more devices, to produce multiple profiling vectors. The network device clusters the multiple profiling vectors to identify cluster centers associated with a plurality of user groups, and determines first users of the multiple users for, or with, whom to perform certain actions or activities based on the first users' affinity with one or more of the plurality of user groups. The network device performs the certain actions or activities with respect to the determined first users. | 2020-12-24 |
20200403855 | RULES DRIVEN SOFTWARE DEPLOYMENT AGENT - The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances. | 2020-12-24 |
20200403856 | SYSTEMS AND METHODS FOR CONTINUOUS CONFIGURATION DEPLOYMENT - Systems and methods are provided for providing continuous configuration deployment. A configuration definition object may be obtained from a remote datastore. The obtained configuration definition object may be stored in a local datastore. The configuration definition object may be obtained and stored in advance of a scheduled maintenance. The configuration definition object may be obtained in response to the configuration definition object being committed to the remote datastore. The configuration definition object may be used to generate different configuration objects. A configuration object may be generated from the configuration definition object and one or more system characteristics. A service request may be received, and the configuration object may be executed to perform a configuration of a computing system. | 2020-12-24 |
20200403857 | HYPER-CONVERGED INFRASTRUCTURE COMPONENT EXPANSION/REPLACEMENT SYSTEM - A networked system may include an HCI component expansion/replacement system that is coupled to an HCI system and that periodically updates an HCI system solution database to identify a validated components for an HCI system platform that includes the HCI system, and validated software for each of the validated components. When the HCI component expansion/replacement system receives a request for a new component type to be provided in the HCI system, existing component information about a plurality of existing components that are included in the HCI system is retrieved and used to identify a first validated component that is identified in the HCI system solution database for the HCI system platform that includes the HCI system. The HCI component expansion/replacement system then provides the first validated software that is identified in the HCI system solution database for the first validated component to the HCI system. | 2020-12-24 |
20200403858 | PROVIDING AND MANAGING AN ADAPTER AS A SERVICE (AaaS) BROKERING SERVICE - Various embodiments are provided for managing an adapter as a service (AaaS) in a computing environment by a processor. Accesses to one or more of a plurality of identity and access management (IAM) systems may be provided via an adapter as a service (AaaS) functioning as an exchange service between one or more users and one or more providers of a plurality of types of adapters, wherein the plurality of types of adapters in the AaaS enable provisioning and de-provisioning to one or more of the plurality of IAM systems. | 2020-12-24 |
20200403859 | DETERMINE VALID DROP TARGETS FOR NODES FROM MAPPING - A method, system, and computer program product for determining valid drop targets for nodes within an integration flow using mapping that includes: identifying a first node, identifying one or more input nodes, where the one or more input nodes are nodes within an integration flow of the first node, analyzing a mapping of the first node, where the analyzing includes determining whether the mapping contains one or more inputs from the one or more input nodes, and in response to determining that the mapping contains one or more inputs from an input node of the one or more input nodes, identifying valid drop points for the first node using the input node. | 2020-12-24 |
20200403860 | Edge Database Management of The Network Data Plane - Novel tools and techniques for network data plane management are provided. A system includes a host machine that includes a database, processor, and non-transitory computer readable media comprising instructions executable by the processor to obtain, via the database, a network configuration, spawn a container according to the network configuration, wherein the container is configured, based on the network configuration, to be coupled to a network overlay via a network interface, receive, via the network interface, incoming data associated with the container, the incoming data having attached one or more attached network data attributes, and identify, via the database, the attached one or more network data attributes attached to the incoming data as one or more network data attributes of the network data model. | 2020-12-24 |
20200403861 | SIGNALING IP PATH TUNNELS FOR TRAFFIC ENGINEERING - In general, techniques are described for signaling IP path tunnels for traffic engineering using constraints in an IP network. For example, network devices, e.g., routers, of an IP network may compute an IP path using constraint information and establish the IP path using, for example, Resource Reservation Protocol, to signal the IP path without using MPLS. As one example, the egress router generates a path reservation signaling message that includes an egress IP address that is assigned for use by the routers on the IP path to send traffic of the data flow by encapsulating the traffic with the egress IP address and forwarding toward the egress router. As each router in the IP path receives the path reservation signaling message, the router configures a forwarding state to forward traffic encapsulated with the egress IP address to a next hop along the IP path toward the egress router. | 2020-12-24 |
20200403862 | SYSTEMS AND METHODS FOR CLOUD RESOURCE SYNCHRONIZATION - The present disclosure relates generally to a system and method for synchronizing updates. A first cloud-based system may be embodied in a multi-instance or multi-tenant framework, and may provide for certain computing systems and configuration items. The first cloud-based system may include a probe system configured to retrieve a list of events from a second cloud computing system, wherein the list of events is representative of updates to resources provided by the second cloud computing system. The first cloud-based system may additionally include a sensor system configured to process the list of events to retrieve a payload for each event in the list of events. An update system may then update an updatable system included in the first cloud computing system based on the payload. | 2020-12-24 |
20200403863 | PROGRAMMABLE CONFIGLETS THROUGH OPAQUE INTENTS IN GRAPH BASED INTENT CONTROLLERS - A controller device manages a plurality of network devices. The controller device is configured to receive, for a data structure, a configlet specifying a set of configuration changes to be applied to a resource of a plurality of resources of the plurality of network devices. A low level configuration for each respective owned resource of a set of owned resources of the plurality of resources includes a pointer indicating an owner for the respective owned resources. The one or more processing units are further configured to determine the set of configuration changes does not conflict in response to determining the low level configuration for the resource does not include a pointer indicating the owner for the resource is not the configlet and apply the set of configuration changes to the resource in response to determining the set of configuration changes does not conflict with the set of owned resources. | 2020-12-24 |
20200403864 | ADAPTIVE VIRTUAL SERVICES - Examples of the present disclosure describe systems and methods relating to adaptive virtual services. In an example, a user specifies a device configuration for a platform device. As a result, a service provider installs selected virtual-network functions and defines network connections as specified by the device configuration. Management software may also be installed, thereby enabling the service provider to communicate with and remotely manage the platform device. The installed virtual-network functions are activated on the platform device once it is delivered to the user. In some instances, the user changes the device configuration. For example, the user may install new virtual-network functions, reconfigure or remove existing virtual-network functions, or change defined network connections. As a result, the service provider reconfigures the platform device accordingly. Thus, the user need not purchase new specialized hardware in order to change the available functions of the computer network. | 2020-12-24 |
20200403865 | MULTI-INSTANCE ARCHITECTURE SUPPORTING OUT-OF-BAND DELIVERY OF CONFIGURATION DATA - An example embodiment may include a central computational instance, as well as a plurality of computational instances that are configured to execute a software module. The central instance may be configured to deliver updates to configuration data for the software module at a plurality of release times. The embodiment may involve a computing device disposed within a particular instance of the plurality of instances transmitting a request for an out-of-band delivery of the configuration data, where the out-of-band delivery is to be made during a time other than any of the release times, receiving the configuration data from source field(s) of a central database of the central instance, and writing the configuration data to destination field(s) of a local database of the particular instance. The embodiment may also involve executing the software module according to the configuration data stored in the destination field(s). | 2020-12-24 |
20200403866 | COORDINATED STARTUP ROUTINE FOR CONTROL DEVICES OF A NETWORK - A control device may be configured to form a network at a unique coordinated startup time. The control device may identify a role assigned to the control device in a previously-formed network that the control device was attached to. The control device may determine a unique coordinated startup time for the control device based on the role assigned to the control device in the previously-formed network. The control device may initiate a network formation procedure at the unique coordinated startup time for the device. For example, the network formation procedure may cause the control device to attach to another control device in the network. The network formation procedure is configured to enable the control device to assume the role assigned to the control device in the previously-formed network in the new network. | 2020-12-24 |
20200403867 | METHODS AND SYSTEMS FOR CONFIGURING A MOBILE ROUTER - The present invention discloses a method, a system and an electronic device for configuring the electronic device. The method and system comprise steps of configuring the electronic device by a profile server. The profile server receives sensor information, determines a profile substantially based on the sensor information, retrieves a configuration based on the profile, and then configure the electronic device substantially based on the configuration. In one variant, the configuration of the electronic device may be performed by a profile management module of the electronic device. | 2020-12-24 |
20200403868 | Inter-Service Data Transportation Through Data Fragmentation And Socket Replication - Embodiments of the present invention are directed towards optimizing two or more services that exchange data over a communication network to send, receive and record data across a plurality of network connections, where each network connection is between two sockets, and modifying the communication network to, at least temporarily, assign a plurality of sockets for use by the two services to exchange data between them. | 2020-12-24 |
20200403869 | METHOD AND NETWORK DEVICE FOR ENABLING IN-PLACE POLICY UPDATES - A method and network device for enabling in-place policy updates. Specifically, the method and network device disclosed herein entail effecting the removal and/or insertion of policies on the network device while minimizing a window in which active policies may be disrupted by the policy updates. Further, in-place policy updates call upon the ordered-shifting of content stored across data structure elements. Through ordered-shifting, policy updates can utilize limited memory resources, on the network device, more efficiently over existing methodologies. Additionally, policy updates can also be committed faster, thereby allowing more policy updates to be processed with a fixed time window. | 2020-12-24 |
20200403870 | CAPACITY BURSTING USING A REMOTE CONTROL PLANE - Techniques for capacity bursting using a remote control plane are described. A method of capacity bursting using a remote control plane includes determining that a first control plane associated with a first area of a provider network has insufficient capacity to manage a plurality of resources in the first area, sending a request for a second control plane in a second area of the provider network to manage at least a first portion of the plurality of resources in the first area, the second control plane identified based at least on a backup hierarchy, and updating management of at least the first portion of the resources in the first area from the first control plane to the second control plane, wherein one or more references to endpoints of the first control plane are updated to be references to endpoints of the second control plane for at least the first portion of the resources managed by the second control plane. | 2020-12-24 |
20200403871 | INTERNET OF THINGS MANAGEMENT THROUGH SELF-DESCRIBING OBJECTS - The management of internet of things (IoT) objects through a self-describing interoperability framework is described. In one example, an IoT object can be registered with an IoT device management system. The IoT device management system can then query the IoT object for a self-describing declaration. The self-describing declaration can include a schema that defines certain operating and interface parameters for the IoT object. The IoT device management system can parse the self-describing declaration to determine, for example, both normal or expected and abnormal or pathologic data from the IoT device. The self-describing declaration can also define function call parameters to establish an interoperability framework between the IoT device management system and the IoT object. Based on such self-describing declarations from various IoT objects, a number of different IoT objects can be easily recognized, integrated with, and managed by the IoT device management system. | 2020-12-24 |
20200403872 | POD MIGRATION ACROSS NODES OF A CLUSTER - Example techniques for pod migration across nodes of a cluster are described. In an example, in response to receiving a request to migrate a pod from a first region of a cloud computing platform to a second region of the cloud computing platform, the pod may be migrated from a first node in the first region to a second node in the second region. The first node and the second node may each be a part of a cluster of nodes. | 2020-12-24 |
20200403873 | COMPUTING DEVICE AND METHODS FOR SYNCHRONIZING NETWORKING INFORMATION WITH A TOPOLOGY SERVER - Computing device and methods for performing synchronization and resynchronization of networking information with a server. During standard operations, local networking data discovered by the computing device are transmitted to the server, and server networking data (discovered by the server) are received from the server. Upon occurrence of a pre-defined event at the computing device preventing exchange of information between the computing device and the server, a resynchronization of the local networking data and server networking data is performed. The synchronization and resynchronization mechanisms are based on unique version numbers respectively generated by the computing device and the server. | 2020-12-24 |
20200403874 | SERVER AND METHODS FOR SYNCHRONIZING NETWORKING INFORMATION WITH CLIENT DEVICES - Server and methods for performing synchronization and resynchronization of networking information with client devices. During standard operations, client networking data discovered by a given client device are received by the server from the given client device, stored by the server, and forwarded by the server to other client devices. Client networking data from the other client devices received and stored by the server are forwarded to the given client device. Upon occurrence of a pre-defined event at the given client device preventing exchange of information between the given client device and the server, a resynchronization of the client networking data is performed between the given client device and the server. The synchronization and resynchronization mechanisms are based on unique version numbers respectively generated by the server and the given client device. | 2020-12-24 |
20200403875 | System and Method for Onboarding in a Wi-Fi Mesh Network - A network device is onboarded to a Wi-Fi local area network (WLAN) including a WLAN router and a mobile device. An optical symbol displayed on the network device is scanned by the mobile device and used to obtain an onboarding network credential mapped to data encoded in the optical symbol. The onboarding network credential is provided to the WLAN router, which creates an onboarding Wi-Fi network based upon the onboarding network credential. A provisioning parameter is wirelessly conveyed to the network device via the onboarding Wi-Fi network, where the network device was pre-configured to communicate via the onboarding Wi-Fi network. | 2020-12-24 |
20200403876 | Mapping Network Topology for Latency Sensitive Applications in a Mobile network - Aspects of the subject disclosure may include, for example, a device in which a processing system enables mobile devices on a communication network to perform latency tests to obtain first latency test data, determines an edge latency for each mobile device resulting in edge latencies, identifies a group of mobile device clusters according to the edge latencies, and identifies network edge server locations according to the group of mobile device clusters. The processing system also receives second latency test data from each of the network edge servers, and determines a data center latency for each of the network edge servers, resulting in a plurality of data center latencies. The processing system also identifies a data center location according to the data center latencies, and determines a network topology for the communication network; the network topology includes the data center location and the edge server locations. Other embodiments are disclosed. | 2020-12-24 |
20200403877 | NETWORK FORMATION FOR A LOAD CONTROL SYSTEM - A control device may be configured to delay an attachment procedure while attachment messages are being transmitted over the network. The control device may be configured to initiate an attachment procedure with a router device on a network at the end a back-off period of time. The attachment procedure may include transmitting attachment messages (e.g., parent request messages) that enable the control device to transmit and receive messages over the network through the router device. During the back-off period of time, the control device may determine an attachment message is received from another control device on the network. And, if an attachment message (e.g., a parent request messages and/or a link request message) is received from another control device, the control device may increase the back-off period of time (e.g., delaying when the control device initiates its attachment procedure). | 2020-12-24 |
20200403878 | DYNAMICALLY IDENTIFYING CRITICALITY OF SERVICES AND DATA SOURCES - A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. The computer-readable medium comprising instructions which, when executed, cause a programmable device to: determine, based on a plurality of service-related metrics from a network node, upstream network nodes and downstream network nodes in a network; query the upstream network nodes and the downstream network nodes with a multicast request for an additional plurality of service-related metrics; extrapolate a current network topology based on the plurality of service-related metrics and the additional plurality of service-related metrics; determine whether or not an upstream backup server is present for the network node; determine a set of critical service delivery points in the network based on the determination of the upstream backup server; and generate a network service alert responsive to a service interruption from the set of critical service delivery points. | 2020-12-24 |
20200403879 | NETWORK DESIGN DEVICE, NETWORK DESIGN METHOD, AND NETWORK DESIGN PROCESSING PROGRAM - With a network design apparatus, a network design method, and a network design processing program, a network configuration is designed for a network in which a transfer apparatus is disposed for each of a plurality of communication hubs and the communication hubs are connected via a link by a link portion apparatus in the transfer apparatus. In design of a network configuration, an optimal path candidate of each of the lines, an optimal link portion apparatus combination candidate of each link, and an optimal transfer apparatus combination candidate at each of the communication hubs minimizing a total cost value in an overall network are calculated on the basis of a path candidate set, an interface combination candidate set, and a combination candidate set of a transfer apparatus. | 2020-12-24 |
20200403880 | Closed-Loop Deployment of Virtual Functions and Cloud Infrastructure - A method includes receiving, by a processor, metadata for deploying a virtual function on a cloud network. The method may include determining, by the processor, whether deployment of the virtual function is possible without conflicting with the metadata. The method may include based on the determination that the deployment of the virtual function is possible without conflicting with the metadata, designing, by the processor, a cloud plan, or a transport plan. The method may include determining, based on the metadata, a network configuration to implement the cloud plan or the transport plan. The method may include configuring, by the processor, the cloud network using the network configuration. | 2020-12-24 |
20200403881 | DATA CENTER CARTOGRAPHY BOOTSTRAPPING FROM PROCESS TABLE DATA - One embodiment provides a method including identifying all computing nodes and connections associated with the computing nodes in a data center. For each computing node, running processes are identified using natural language processing (NLP) by: extracting known process entities according to predetermined rules; extracting unknown process entities by: grouping process logs that share process entities and identifying hints in parameters and directory paths; receiving annotations to the hints to identify an application a process is running; and creating a new rule based on the annotations and propagating the new rule to other process logs. A visual representation of the computing nodes and the processes running on the computing nodes is generated. | 2020-12-24 |
20200403882 | NETWORK HEALTH CHECKER - A method of generating a network topology map in a datacenter comprising a network manager server and a set of host machines is provided. Each host machine hosts a set of data compute nodes (DCNs). The method receives information regarding the configuration of each of a set of logical networks from the network manager server. Each logical network is connected to several DCNs. The method identifies logical connections configured between the DCNs using the configuration of the overlay networks. The method generates a network topology map based on the identified logical configuration. The network topology identifies the DCNs that are connected to each overlay network. The method displays the network topology map on a graphical user interface. | 2020-12-24 |
20200403883 | MULTI-STAGE AUTHORIZATION - A task identification, an operator key, and a supervisor key are generated. The task identification is associated with a system administration task request and can include information from the request to initiate the system administration task request such as the system name. The operator key and the supervisor key are encrypted. Via a secure network, the task identification and the operator key are sent to an operator computing device and the supervisor key is sent to a supervisor computing device. In response to determining that the task identification is valid, the operator key returned from the operator computing device is decrypted. In response to determining that the decrypted operator key is valid, the encrypted supervisor key returned from the supervisor computing device is decrypted. In response to determining that the decrypted supervisor key is valid, an indication of a successful validation of the system administration task is provided. | 2020-12-24 |
20200403884 | System and Method for Electronic Mail Escalation Paths - An information handling system includes service layer processing circuitry and server component processing circuitry. The service layer processing circuitry receives an electronic mail message. The server component processing circuitry may communicate with the service layer processing circuitry. The server component processing circuitry assigns an escalation card to the electronic mail message by a processor storing the escalation card and the electronic mail message in a computer memory, and determines whether a service level agreement (SLA) of the escalation card has been met. In response to the SLA not being met, the server component processing circuitry escalates the electronic mail message based on the escalation card. In response to the escalation of the electronic mail message, the server component processing circuitry notifies a sender of the electronic mail message that the electronic mail message has been escalated. | 2020-12-24 |
20200403885 | METHOD AND SYSTEM FOR DELIVERING WEB PAGE CONTENT USING EDGE SERVER - Methods, systems and programming for delivering web page content using edge server. In one example, a request is received from a user for a page including at least a piece of generic content and a plurality pieces of customized content. The request is forwarded from the user to a content server over the network. The piece of generic content and a first type of instruction are sent to the user. The piece of generic content and the first type of instruction are received from the content server as a response to the forwarded request. Each of the plurality pieces of customized content is sent to the user upon receiving a respective piece of customize content from the content server. The plurality pieces of customized content are to be assembled on the page in accordance with the first type of instruction. | 2020-12-24 |
20200403886 | NODE ADDITION IN CLOUD NETWORKS - Example techniques of addition of nodes in cloud networks managed by a multi-cloud management platform, are described. In an example, a node addition request is received at a multi-cloud management platform. The node addition request includes identification information of a node and a cloud network in which the node is to be added. The identification information is indicative of a functionality of the node, a network address of the node, and an identifier of the cloud network. Based on the identifier of the cloud network, cloud account details of the cloud network may be obtained from one of the multi-cloud management platform and a user input. A controller node of the cloud network may be accessed based on the cloud account details. The node may be registered at the controller node of the cloud network, based on the identification information of the node and the cloud network. | 2020-12-24 |
20200403887 | METHOD FOR MANAGING SOFTWARE SERVICE, AND SERVER - A method for managing a software service, and a server are provided in the present disclosure. The method is suitable for operating in a software service system including a service manager. The service manager manages an existing software service in the software service system. The method includes: obtaining a first service deployment descriptor of a new software service by using the service manager, where a format of the first service deployment descriptor is the same as a format of a second service deployment descriptor of the existing software service; defining a data exchange mechanism between the new software service and the existing software service according to the first service deployment descriptor of the new software service by using the service manager; and exchanging data with the new software service according to the data exchange mechanism by the existing software service. | 2020-12-24 |
20200403888 | METHODS, SYSTEMS, APPARATUSES AND DEVICES FOR FACILITATING PROVISIONING OF SERVICES TO AT LEAST ONE SERVICE-RECIPIENT BASED ON AT LEAST ONE REQUIREMENT - A system for facilitating provisioning of services to at least one service-recipient based on at least one requirement is disclosed. Accordingly, the system may include a communication device configured for receiving a service request data from at least one service-recipient device. The service request data may include budget data associated with the at least one service-recipient corresponding to the service request data. Further, the system may include a storage device configured for retrieving service records associated with the at least one service-recipient from a central database. Further, the system may include a processing device configured for analyzing the service records and the service request data to identify one or more service providers. Further, the one or more service providers may be configured to provide services satisfying the budget data. Further, the processing device may be configured for provisioning the services to the at least one service-recipient based on the analyzing. | 2020-12-24 |
20200403889 | SYSTEMS AND METHODS FOR AUTOMATED VERIFICATION AND RECONFIGURATION OF DISCONNECTED NETWORK DEVICES - Systems and methods of disconnecting a network service provided over a network service path include using a computing device that obtains a service identifier assigned to network service and identifies a port of a network device included in a network service path associated with the service. The computing device transmits a request to the network device for port configuration data of the network device and based on the received port configuration data, determines whether the port is assigned to the network service. If so, the computing devices executes a remediation operation which includes transmitting a reconfiguration command to the network device that is adapted to cause the network device to update the port configuration data to free the port. | 2020-12-24 |
20200403890 | In-line performance monitoring - One function of a communications network, or of nodes in such a network, is to gather data that is useful in assessing network performance, and quantifying metrics of node and/or network performance. Various embodiments disclosed herein improve the ability of nodes and networks to gather such data, and quantify metrics of node and/or network performance by selectively marking existing network traffic, and in preferred embodiments without having to dilute network traffic by generating and transmitting dummy data packets. | 2020-12-24 |
20200403891 | TECHNIQUES FOR MONITORING VIRTUALIZED NETWORK FUNCTIONS OR NETWORK FUNCTIONS VIRTUALIZATION INFRASTRUCTURE - Examples may include techniques for monitoring virtual network functions or network functions virtualization infrastructure. Examples include receiving performance measurement data from virtualized network functions arranged to support a network service or from network functions virtualization infrastructure composed to support the virtualized network functions. In some examples, corrective actions such as virtualized network function lifecycle management operations are initiated based on the received performance measurement data. | 2020-12-24 |
20200403892 | SYSTEMS AND METHODS FOR ANALYZING PERFORMANCE SILENCE PACKETS - In one embodiment, a method includes identifying, by a packet analyzer, one or more silence packets within a network and initiating, by the packet analyzer, a replacement of the one or more silence packets with one or more performance silence packets. The one or more performance silence packets are transmitted between a first node of the network and a second node of the network during a silence period. The method further includes receiving, by the packet analyzer, information associated with the one or more performance silence packets; and analyzing, by the packet analyzer, a connection between the first node of the network and the second node of the network using the information associated with the one or more performance silence packets. | 2020-12-24 |
20200403893 | METHOD TO DETERMINE A PROPAGATION DELAY OF A MULTIMEDIA STREAM OF A VIDEO CONFERENCE COMMUNICATION SYSTEM - A video conference method and system to determine a propagation delay of a multimedia stream of a video conference communication system, the multimedia stream having a first format, the method including: obtaining an emission time, converting the emission time into a multimedia component, inserting the multimedia component into the multimedia stream at the emission side while keeping the same first format, detecting the inserted multimedia component at the reception side, retrieving from the multimedia component the emission time, obtaining a current reception time, and calculating the propagation delay by the time difference between the emission time and the current reception time. | 2020-12-24 |
20200403894 | IN-VEHICLE SERVICES THROUGH ATTENDANT DEVICES, USER-PROVIDED DEVICES, AND/OR AN IN-VEHICLE COMPUTER SYSTEM - An approach to facilitating in-vehicle services through attendant devices, user-provided devices, and/or an in-vehicle computer system is provided. In one implementation, one or more communication sessions with the in-vehicle computer system may be facilitated by an attendant device. Passenger information relating to one or more passengers of a vehicle and service information relating to one or more services to be provided to the one or more passengers may be obtained by the attendant device from the in-vehicle computer system via the one or more communication sessions. The passenger information and the service information may be provided by the attendant device. An indication that at least one service is in progress or is complete is received by the attendant device. | 2020-12-24 |
20200403895 | SERVER, NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR SERVER AND NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE - A server may include: a processor, and a memory storing computer-readable instructions therein, wherein the computer-readable instructions, when executed by the processor, cause the server to: receive operation information of a communication device and setting information from the communication device repeatedly, the setting information indicating a setting for the communication device to communicate with the server; and in a case where the server is not capable of receiving the operation information and the setting information from the communication device, send an execution instruction for executing a specific process to a terminal device being different from the communication device, the specific process including the terminal device receiving, from the server, first setting information which the server most recently received from the communication device, and sending the first setting information to the communication device. | 2020-12-24 |
20200403896 | METHODS AND APPARATUS TO EXCLUDE NETWORK COMMUNICATION TRAFFIC FROM MEDIA MONITORING RECORDS - Methods and apparatus to exclude network communication traffic from media monitoring records are disclosed herein. An example apparatus includes a first communication radio to collect records of network traffic on a communication network and a second communication radio to transmit the records identifying a portion of the network traffic to an audience measurement entity. The example apparatus further includes a MAC address determiner to determine the MAC address of the second communication radio and a record filter to remove the network communication associated with the MAC address from the records. | 2020-12-24 |
20200403897 | DEBUGGING ARRANGEMENT FOR ACTIVE ETHERNET CABLE - A cable, a manufacturing method, and a usage method, each facilitate product development, testing, and debugging. An illustrative embodiment of a cable manufacturing method includes: connecting a first connector plug to a first data recovery and re-modulation (DRR) device and to a first controller device; and coupling electrical signal conductors to the first DRR device to convey electrical transit signals to and from a second DRR device, the second DRR device being connected to a second connector plug. The first controller device is operable in response to a host command to initiate a debug dump by the first DRR device and to store the debug dump in a nonvolatile memory. | 2020-12-24 |
20200403898 | NETWORK CONNECTED DEVICE AND TRAFFIC ESTIMATION METHOD THEREOF - Embodiments of the disclosure provide a network connected device and a traffic estimation method of the network connected device. In the method, a plurality of network packets are captured, a quantity of query times for at least one domain name in the network packets is counted, and network traffic of each network layer or each service type is determined according to the quantity of query times. In addition, according to the embodiments of the disclosure, a corresponding type feature is generated for a user based on a domain name query record. In this way, the Internet experience of the user may be improved based on the estimated result. | 2020-12-24 |
20200403899 | BLOCKCHAIN-BASED METHODS AND DEVICE FOR PROPAGATING DATA IN A NETWORK - A method of propagating data packets in a network of nodes is disclosed. The method, implemented at one of the nodes, includes: generating at least one data packet of a first type; collecting a set of data packets of the first type during a first time period, the set including the at least one generated data packet and at least one data packet of the first type received from one or more first nodes in the network; and determining a mapping of the data packets of the set to a plurality of neighbouring nodes connected to the node, the mapping indicating an expected time of relay of each data packet of the set to neighbouring nodes, wherein determining the mapping includes determining at least one of: a first sub-mapping which allocates any two data packets having a same source for relay to different subsets of the neighbouring nodes; and a second sub-mapping which assigns different expected times of relay to any two data packets that are generated at the node or received by the node from the one or more first nodes in a same time interval. | 2020-12-24 |
20200403900 | INTER-PROVIDER NETWORK ARCHITECTURE - An inter-provider network architecture system is disclosed. In particular, the system may enable a service provider network and a partner network to take advantage of each other's network cores, such that the resources of the service provider network and the partner network may be more effectively utilized to service customers of both networks. By doing so, not only can the service provider network and the partner network take advantage of each other's network resources, but they can also give each other's customers broader network reach into regions that are not typically serviced by their own networks. The service provider network may effectively accomplish this by providing a limited view of the service provider network to the partner network, or vice versa, so that traffic and data can flow between the networks without each network having to be fully aware of each other's entire network topologies. | 2020-12-24 |
20200403901 | Time Path Selection Device and Time Path Selection Method - [Problem] To select an optimal transmission path having a minimum total MTIE value of total MTIE values between a plurality of master apparatuses configured to transmit time information serving as a reference and a specific relay apparatus configured to receive the time information via a plurality of relay apparatuses to achieve time synchronization. | 2020-12-24 |