US Pat. No. 10,462,319

IMAGE READING APPARATUS TRANSMITTING DEVICE IDENTIFICATION INFORMATION AND READING INFORMATION TO PUSH NOTIFICATION SERVER, AND METHOD FOR CONTROLLING THE IMAGE READING APPARATUS

BROTHER KOGYO KABUSHIKI K...

1. An image reading apparatus comprising:an operation interface;
a scanner;
a communication interface;
a processor; and
a memory storing computer readable instructions, the computer readable instructions, when executed by the processor, causing the image reading apparatus to perform:
receiving via the operation interface an input instructing to control the scanner to read an original;
controlling the scanner to generate image data by reading the original on a basis of the input;
receiving device identification information identifying an information processing apparatus from the information processing apparatus via the communication interface; and
executing a first process including:
transmitting to a push notification server via the communication interface the received device identification information and reading information, the reading information including at least one of information specifying the controlling the scanner is started and information specifying the controlling the scanner is complete;
receiving request information from the information processing apparatus via the communication interface, wherein the request information is transmitted from the information processing apparatus when the information processing apparatus receives a push notification including the reading information from the push notification server; and
transmitting the generated image data to the information processing apparatus via the communication interface in response to receiving the request information.

US Pat. No. 10,462,311

COMMUNICATION APPARATUS, IMAGE CAPTURING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. A communication apparatus comprising a processor and a memory storing a program which, when executed by the processor, causes the communication apparatus to function as:a communication control unit configured to control a communication unit so as to connect to one of a plurality of external apparatuses;
a transfer unit configured to transfer a data item to an external apparatus to which the communication unit has connected;
a storage control unit configured to, in a case that a transfer of the data item to the external apparatus to which the communication unit has connected is failed, store transfer failure information in which the data item is associated with the external apparatus to which the communication unit has connected, in a storage unit; and
a transfer control unit configured to control, in a case that the communication unit has connected to a first external apparatus after a transfer of a data item by the transfer unit is failed, a transfer of a data item included in the transfer failure information,
wherein the transfer control unit performs control so as to, if a data item included in the transfer failure information is associated with the first external apparatus, automatically transfer the data item to the first external apparatus.

US Pat. No. 10,462,309

SYSTEM AND METHOD FOR DIAGNOSING A PRINTING DEVICE BASED ON A CORRELATION COEFFICIENT BETWEEN PRINT VOLUME AND ERROR RATE

KYOCERA DOCUMENT SOLUTION...

7. A method to determine an operating status of at least one image forming device comprising:monitoring a plurality of operating parameters of the at least one image forming device during a first time interval, wherein monitoring the plurality of operating parameters of at least one image forming device comprises:
determining a total number of pages printed by the at least one image forming device during the first time interval; and
determining a total number of errors recorded by the at least one image forming device during the first time interval;
calculating a correlation coefficient of the at least one image forming device during a second time interval based on a total number of pages printed and a total number of errors recorded for the at least one image forming device during a plurality of data sampling intervals of the second time interval;
identifying the at least one image forming device as an abnormal operating status when the correlation coefficient is a positive correlation coefficient above a threshold level associated with a model of the at least one image forming device; determining a maintenance action for the image forming device based on the abnormal operating status; andwherein calculating the correlation coefficient comprises using Pearson's correlation coefficient defined as:wherein:n—is the sample sizexi—is a single sample of the total number of pages printed indexed with iyi—is a single sample of the errors recorded indexed with ix?—is the sample mean for the total number of pages printedy?—is the sample mean for the errors recorded.

US Pat. No. 10,462,308

RIP TIME ESTIMATION METHOD

SCREEN HOLDINGS CO., LTD....

1. A method for estimating RIP time required for a RIP processing in a print data processing device configured to generate print data in a bitmap format by performing the RIP processing on submission data that is a file in a PDF format, the print data being to be sent to a printer, the file in the PDF format describing a print target by a page description language, the method comprising:specifying, as an original file in the PDF format, sample data for test printing performed before printing by the printer,
creating, by taking the original file or a duplicate of the original file as an initial file and analyzing the initial file, reuse information for allowing specification of whether a use state of each resource held in the initial file is a shared state of being used as a component in one file a plurality of times or a non-shared state of being used as a component in one file only once;
generating a page that constitutes a new file in the PDF format, by performing, based on the reuse information, duplication of a page in the initial file in such a way that the use state of each resource is same before the duplication and after the duplication, the new file having a larger number of pages than the original file; and
estimating the RIP time using the new file.

US Pat. No. 10,462,304

SERVICE CONTROL POINT FUNCTIONALITY IMPLEMENTED AT COMMUNICATION ENDPOINTS

1. A system for establishing voice communication between a communications device and a contact center, the system comprising:a processor of the communications device; and
a memory of the communications device, wherein the memory stores instructions that, when executed by the processor, cause the processor to:
identify a first number of a destination to be dialed;
determine that the first number satisfies a particular criteria;
in response to determining that the first number satisfies the particular criteria, automatically transmit a request to a server over a data link, the request including geographic location information of the communications device, wherein in response to the request, the server is configured to:
lookup the first number and identify a related second number;
determine, based on the geographic location of the communications device, whether the identified second number is within a local dialing range of the destination; and
in response to determining that the identified second number is within the local dialing range, return the identified second number;
receive the identified second number from the server; and
initiate a voice call to the second number instead of the first number.

US Pat. No. 10,462,293

PERSONALIZED AUDIO/VIDEO INVITATIONS FOR PHONE CALLS

Mobiline, Inc., Dover, D...

1. A method for providing the identity of a call initiator prior to acceptance of a call by a call recipient, comprising:prior to initiating the call, the call initiator's communication device recording a personalized audio or video invitation from the call initiator and, upon completion of the recording, the call initiator's communication device initiating the call by providing a call request message including the personalized audio or video invitation from the call initiator and call completion information needed to provide real-time communication with the call recipient's communication device prior to and after acceptance of the call;
the call initiator receiving from the call recipient an indication of the progress of the review of the personalized audio or video invitation by the call recipient;
initiating a timer on the call initiator's communication device that starts counting upon receipt of the indication that the call recipient has started reviewing the personalized audio or video invitation; and
upon receipt of a notification from the call recipient that the call is accepted pursuant to review of the personalized audio or video invitation by the call recipient, enabling a live voice connection between the call initiator and call recipient using the call completion information.

US Pat. No. 10,462,285

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT

1. A call processing platform for processing telecommunications of a controlled environment, comprising:one or more processors and/or circuits configured to:
register, by the one or more processors and/or circuits, an application running on an external device;
handshake with the application;
receive a call attempt to the external device placed by a member of the controlled environment;
receive a device identification of the external device, a telephone number associated with the external device, and personal verification information of a user of the external device via the application;
delay connection of the call attempt so as to register the external device by storing the personal verification information, the telephone number, and the device identification such that the personal verification information, the telephone number, and the device identification are associated with each other;
process a call associated with the call attempt after completion of the registering of the external device; and
communicate with the application after the external device has been registered.

US Pat. No. 10,462,283

GEO-FENCING IN A BUILDING AUTOMATION SYSTEM

ADEMCO INC., Golden Vall...

1. A non-transitory computer-readable storage medium with an executable program stored thereon, wherein the executable program instructs a mobile device having location services and a communication interface for communicating with a remote server to perform the following:save information pertaining to a geo-fence, wherein the geo-fence is associated with a user of the mobile device and defines a boundary of a fixed location of a building;
save a previous geo-fence state of the mobile device both locally on the mobile device and remotely on the remote server, wherein the previous geo-fence state is based on a previous location of the mobile device, and wherein the previous geo-fence state is selected from at least an inside geo-fence state in which the previous location of the mobile device is determined to be inside of the boundary of the fixed location of the building and an outside geo-fence state in which the previous location of the mobile device is determined to be outside of the boundary of the fixed location of the building;
identify a current location of the mobile device via the location services;
determine a current geo-fence state of the mobile device based on the current location of the mobile device, wherein the current geo-fence state is selected from at least the inside geo-fence state in which the current location of the mobile device is determined to be inside of the boundary of the fixed location of the building and the outside geo-fence state in which the mobile device is determined to be outside of the boundary of the fixed location of the building;
compare the current geo-fence state with the previous geo-fence state;
when the current geo-fence state fails to match the previous geo-fence state, communicate the current geo-fence state to the remote server to update the previous geo-fence state to reflect the current geo-fence state; and
when the current geo-fence state matches the previous geo-fence state, refrain from communicating the current geo-fence state to the remote server.

US Pat. No. 10,462,278

PORTABLE TERMINAL APPARATUS

MAXELL, LTD., Kyoto (JP)...

1. A portable terminal apparatus comprising:a display;
an operation input interface receiving an input corresponding to a user operation;
a wireless communication interface performing communication over a wireless local area network; and
a processor programmed to control state transitions of the portable terminal apparatus to and from a sleep state and further performing a plurality of display modes, the plurality of display modes including:
a first display mode during which a lock release icon is displayed on the display without display of a control icon when the portable terminal apparatus wakes up from a sleep state based on a first condition, wherein the first condition is met when a control screen for remotely and wirelessly controlling an external device via the wireless communication interface is not displayed on the display before the portable terminal apparatus enters a sleep state;
a second display mode during which a lock release icon is displayed on the display without display of a control icon when the portable terminal apparatus wakes up from a sleep state based on a second condition, wherein the second condition is met when the wireless communication interface is unable to communicate with the external device and the control screen is displayed on the display before the portable terminal apparatus enters a sleep state; and
a third display mode during which a control icon and a lock release icon are displayed on the display when the portable terminal apparatus wakes up from a sleep state based on a third condition, wherein the third condition is met when the wireless communication interface is able to communicate with the external device and the control screen is displayed on the display before the portable terminal apparatus enters a sleep state,
wherein the control screen is used to execute control operations on the external device based on the input received by the operation input interface,
wherein, when the lock release icon is selected in one of the first, second, or third display modes, the display displays a screen for performing authentication to execute an unlock operation for the portable terminal apparatus, and
wherein, when the control icon is selected in the third display mode without selection of the lock release icon, the wireless communication interface transmits a remote control signal corresponding to the selected control icon to the external device.

US Pat. No. 10,462,273

FOLDABLE COVER ASSEMBLY, METHOD OF MANUFACTURE, AND DEVICE COMPRISING THE FOLDABLE COVER ASSEMBLY

SABIC GLOBAL TECHNOLOGIES...

1. A foldable cover assembly (10), comprisinga glass layer (1) having a first surface (2), a second surface (3) opposite the first surface (2), a first thickness (T1) at a first location (4) and a second thickness (T2) at a second location (5), wherein the second thickness is less than the first thickness, and is effective to provide bendability to the glass layer; and
an optically clear polymer film (6) disposed on the first surface of the glass layer, the polymer film comprising a thermoplastic polymer, a thermoset polymer, or a combination comprising at least one of the foregoing, wherein a 100 micrometer-thick sample of the optically clear polymer film transmits greater than 85% of visible light as determined according to ASTM D1003-00;
wherein the second thickness at a center point of the second location is less than the second thickness at a periphery of the second location.

US Pat. No. 10,462,272

ELECTRONIC DEVICE INCLUDING HOUSING HAVING AT LEAST ONE THROUGH HOLE

Samsung Electronics Co., ...

1. An electronic device comprising:a housing including a first surface, a second surface, and a third surface forming an internal space of the housing;
a touch screen display interposed between the first surface and the second surface;
a sensor disposed in the internal space and including a light emitter and a light receiver;
a wireless communication circuit disposed in the internal space; and
wherein the third surface includes a plurality of through holes including a first through hole and a second through hole,
wherein a first optical structure disposed within the first through hole includes a concave surface for concentrating external light of the electronic device to the light receiver, and the concave surface is located at a portion of the first optical structure which is exposed to an exterior of the electronic device, and
wherein a second optical structure is disposed within the second through hole for concentrating emitted light from the light emitter to external of the electronic device.

US Pat. No. 10,462,269

PACKETIZING ENCODED AUDIO FRAMES INTO COMPRESSED-OVER-PULSE CODE MODULATION (PCM) (COP) PACKETS FOR TRANSMISSION OVER PCM INTERFACES

QUALCOMM Incorporated, S...

1. A method for packetizing an encoded audio frame based on a pulse code modulation (PCM) frame into a compressed-over-PCM (COP) packet, comprising:receiving the encoded audio frame generated from the PCM frame having a PCM length;
generating the COP packet having a packet length proportional to the PCM length and comprising:
a COP header comprising data used by a receiver module to depacketize the COP packet, wherein the data comprises a frame intact bit configured to be set to: a first value in response to detecting that there is no clock skew between the COP packet and the PCM frame, and a second value in response to detecting that there is clock skew between the COP packet and the PCM frame;
a subframe, comprising:
the encoded audio frame; and
a frame length field that indicates a length of the encoded audio frame; and
a zero padding block, comprising:
a zero padding length field that indicates a number of zero bytes in a zero padding field;
the zero padding field comprising the number of zero bytes; and
providing the COP packet to the receiver module over a PCM interface.

US Pat. No. 10,462,267

METHOD AND APPARATUS FOR PRE-CLASSIFYING PACKETS

Marvell World Trade Ltd.,...

1. A method for processing a packet, the method comprising:receiving the packet at a classifier from a plurality of input ports connected to the classifier;
performing a classification operation based upon data selected from within the packet and data other than the data selected from within the packet;
generating attributes for the packet based upon a result of the classification operation; and
forwarding the attributes along with the packet to facilitate subsequent packet-processing operations,
wherein the data selected from within the packet is selected from a set of locations within the packet, the data selected being associated with the input port from which the packet was received from, and
wherein the attributes include a destination, and wherein (i) a default value for the destination is a per port defined value, and (ii) the destination is a sum of (a) the result of the classification operation, (b) the default value, and (c) a channel number associated with the packet.

US Pat. No. 10,462,255

BRIDGING SKILLS GAP

Microsoft Technology Lice...

1. A system comprising:a machine-readable medium storing computer-executable instructions; and
at least one hardware processor communicatively coupled to the machine-readable medium that, when the computer-executable instructions are executed, is configured to:
define a plurality of skill nodes, where at least one skill node corresponds to a skill associated with a first member profile of a social graph stored in a social graph database, wherein:
the social graph comprises:
a plurality of member vertices, wherein a member vertex selected from the plurality of member vertices corresponds to the first member profile; and
a plurality of edges between the member vertices, wherein each edge represents a connection; and
establish a plurality of skill node pairings, where at least one skill node pairing includes a first skill node selected from the plurality of skill nodes and a second skill node selected from the plurality of skill nodes;
determine a plurality of graph edge values for the plurality of skill nodes pairings, where:
at least one graph edge value is determined based on the skill associated with the first member profile; and
the at least one graph edge value is associated with the at least one skill node pairing;
determine a path from a starting skill node selected from the first plurality of skill nodes to a target skill node selected from the first plurality of skill nodes using at least one graph edge value selected from the plurality of graph edge values, wherein:
the starting skill node corresponds to a skill associated with a second member profile;
the target skill node corresponds to a skill associated with a job profile; and
the path comprises a second plurality of skill nodes selected from the first plurality of skill nodes and minimizes a number of skill nodes traversed between the starting skill node and the target skill node; and
communicate one or more portions of the determined path to a second member corresponding to the second member profile.

US Pat. No. 10,462,254

DATA SHARING METHOD AND ELECTRONIC DEVICE THEREOF

Samsung Electronics Co., ...

1. A method for operating an electronic device, the method comprising:determining whether to share application data of an application of the electronic device, based on authentication between the electronic device and another electronic device;
in response to determination to share the application data, identifying first application data among the application data based on a privacy level corresponding to a user identifier (ID) of the another electronic device;
receiving, from another electronic device, information regarding second application data which includes at least one image file or at last one audio file and is adapted to be used in at least one application of the another electronic device when the electronic device and the another electronic device are connected to each other;
determining, by the electronic device, common criterion information on at least one of a time when the at least one image file is captured or the at least one audio file is recorded or a place where the at least one image file is captured or the at least one audio file is recorded;
selecting, by the electronic device, at least part of the first application data which is adapted to be used in the at least one application of the electronic device and is stored in the electronic device, wherein the at least part of the first application data comprises at least one of at least one image file that is captured on the time associated with the common criterion information or in the place associated with the common criterion information, or at least one audio file is recorded on the time associated with the common criterion information or in the place associated with the common criterion information; and
transmitting, by the electronic device, to the another electronic device, the at least part of the first application data.

US Pat. No. 10,462,253

SOCIAL NETWORK GROUPING METHOD AND SYSTEM, AND COMPUTER STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A method, comprising:at a server system of a social network application, the server system comprising one or more processors and memory storing one or more programs for execution by the one or more processors:
acquiring relation data between a first user of the social network application and a plurality of friends of the first user, wherein each of the friends is a user of the social network application and has a direct contact relationship with the first user;
generating and storing a plurality of friend circles using the relation data, wherein: (i) each of the friend circles includes a subset of the plurality of friends and a respective friend circle score that is determined based on connections of respective friends in the subset, (ii) each friend in the subset has a corresponding direct contact relationship with the first user and with at least one other friend in the subset, and (iii) the plurality of friends includes a friend that appears in two of the friend circles;
sending information of the generated friend circles to a client device of the first user and causing display on a user interface of the client device the sent information, including (i) an identification of a first one of the plurality of friend circles; (ii) an identification of a second one of the plurality of friend circles; (iii) identification of a first subset of friends in the first friend circle; and (iv) identification of a second subset of friends in the first friend circle;
receiving a first input via the user interface to move a first friend from the second friend circle to the first friend circle; and
responsive to the received input and in accordance with a determination that the first friend is not already in the first friend circle:
updating the stored first friend circle and the second friend circle;
causing display on the user interface an updated view including a modified first subset of friends and a modified second subset of friends, wherein the modified first subset of friends includes the first friend and the modified second subset of friends excludes the first friend; and
updating the friend circle score of the first and second friend circles.

US Pat. No. 10,462,252

HANDLING OF CONTENT IN A CONTENT DELIVERY NETWORK

Level 3 Communications, L...

1. A method of content delivery in a content delivery network comprising:receiving, at a first server of a first tier of servers of the content delivery network, a request from a requesting device for a resource available from the content delivery network;
accessing a popularity service associated with the content delivery network to determine a popularity designation associated with the requested resource, wherein the popularity designation associated with the requested resource indicates that the requested resource is not popular;
requesting, by the first server, the resource from a second server of the content delivery network;
receiving, based on the popularity designation indicating that the requested resource is not popular, a redirect instruction to redirect the requesting device to a content server of the content delivery network and an instruction to not cache the resource at the first server when the resource is obtained from the content server of the content delivery network;
processing, by the first server of the first tier of servers, the redirect instruction from the second server of the content delivery network to obtain, at the first server, the resource from the content server of the content delivery network; and
providing, from the first server of the first tier of servers, the obtained resource to the requesting device.

US Pat. No. 10,462,251

SYSTEM, METHOD AND STORAGE MEDIUM FOR MANAGING ITEMS WITHIN FILE DIRECTORY STRUCTURE

Open Text SA ULC, Halifa...

1. A method of computerized searching, comprising:in a network comprising a plurality of interconnected network sites and client computers, a first one of the network sites including one or more servers and a network site cache of network site content, the network site cache having multiple different directories with each directory containing no more items than a predetermined limit, the first network site:
receiving from a client device a request for one or more items of network site content, the network site content comprising one or more content components stored in the network site cache;
responsive to the request for content from the client device, the first network site performing:
parsing the request for content from the client device to obtain parsed elements;
generating an internally recognizable name using the parsed elements, wherein the internally recognizable name is mapped to a first, single one of the multiple different directories within the network site cache, wherein the first one of the multiple different directories contains a subset of filenames stored in the network site cache, wherein the internally recognizable name further identifies a filename for the requested network site content stored in the first one of the multiple different directories;
searching only the first, single one of the multiple different directories in the network site cache using the filename identified by the internally recognizable name;
in response to finding that the filename identified by the internally recognizable name is found in the first one of the multiple different directories of the network site cache, retrieving the requested network site content stored at a location in the first one of the multiple different directories of the network site cache corresponding to the filename; and
providing the client device with the requested network site content.

US Pat. No. 10,462,249

GLOBALLY DISTRIBUTED VIRTUAL CACHE FOR WORLDWIDE REAL-TIME DATA ACCESS

SUPER MICRO COMPUTER, INC...

1. A computer-implemented method for caching data within a globally distributed virtual cache, the method comprising:provisioning, to a first server implementing a first portion of the globally distributed virtual cache, a first storage resource associated with a first geographic region to cache first data associated with a first computing device, wherein the first computing device is associated with a first user and is coupled to the first server;
determining that second data is streaming to the first computing device from a second computing device that is associated with a second user and is coupled to a second server implementing a second portion of the globally distributed virtual cache associated with a second geographic region located farther away from the first computing device than the first geographic region; and
in response:
automatically provisioning additional cache storage space to at least one of the first server and a third server implementing a third portion of the globally distributed virtual cache associated with a region located between the first geographic region and the second geographic region, and
causing one or more processors included in at least one of the first server and the third server to execute one or more applications that cause the additional cache storage space to buffer the second data while the second data is being streamed from the second computing device to the first computing device.

US Pat. No. 10,462,248

DIGITAL CONTENT SHARING CLOUD SERVICE SYSTEM, DIGITAL CONTENT SHARING CLOUD SERVICE DEVICE, AND METHOD USING THE SAME

SK PLANET CO., LTD., Seo...

1. A computer-implemented cloud service device comprising:a conversion information collection unit configured to collect conversion information including network information and device information corresponding to at least one terminal device;
a conversion factor determination unit configured to:
determine a conversion factor that is configured to convert an original content based on the conversion information;
determine a converted content size of an original content size corresponding to a download speed of the terminal device;
set the determined converted content size as a base conversion factor;
calculate a first result by applying a first application rate to the set base conversion factor, wherein the first application rate is set corresponding to performance information of the terminal device such that the first application rate is set to 100% when the set base conversion factor is allocated to the performance information having a first maximum value; and
determine the conversion factor by applying a second application rate to the calculated first result after calculating the first result, wherein the second application rate is set corresponding to storage space information of the terminal device such that the second application rate is set to 100% when the set base conversion factor is allocated to the storage space information having a second maximum value; and
a content conversion unit configured to:
convert the original content based on the conversion factor; and
transmit the converted content to the terminal device,
wherein the device information comprises the storage space information of the terminal device and the performance information of the terminal device,
wherein the performance information comprises at least one of central processing unit (CPU) information or resolution information of the terminal device,
wherein the network information comprises at least one of network type information, bandwidth information or a data rate guaranteeing a preset bit error rate, and
wherein at least one of the conversion information collection unit, the conversion factor determination unit, or the content conversion unit is executed by a processor using programs and at least one of non-transitory storage devices.

US Pat. No. 10,462,247

WEB CONTENT CUSTOMIZATION VIA ADAPTATION WEB SERVICES

1. A method comprising:accessing, by executing an instruction with a processor of a first server, a first request for web content, the web content residing on the first server, the first request originating from a client device, the first request including an indication of identifying a characteristic of the client device, the first request including personally identifiable information of a user of the client device;
generating, by executing an instruction with the processor of the first server, a second request to transform the web content into modified web content based on the characteristic of the client device, the second request including a universal resource locator of the web content, the second request not including the personally identifiable information of the user;
obtaining, by executing an instruction with the processor of the first server, the modified web content from a second server in response to the second request;
incorporating, by executing an instruction with the processor of the first server, the personally identifiable information of the user into the modified web content; and
transmitting the modified web content incorporating the personally identifiable information of the user, from the first server to the client device.

US Pat. No. 10,462,245

METHOD, TERMINAL, AND SYSTEM FOR PUSHING INFORMATION

TENCENT TECHNOLOGY (SHENZ...

1. A method for pushing information, comprising:obtaining, by a terminal, a business message from a server;
determining a type of the business message from a real-time type, a timer-setting type, and an instruction-type;
adjusting a sending policy of a heartbeat package based on a determination result of determining the type of the business message, comprising:
when the type of the business message is determined to be the real-time type, adjusting a sending interval of the heartbeat package as a first pre-set time duration and restoring the sending interval of the heartbeat package back to a benchmark time interval after a second pre-set time duration, wherein the first pre-set time duration is greater than the benchmark time interval and less than the second pre-set time duration; and
maintaining a network link connection with the server based on the sending policy of the heartbeat package to provide a pushing operation of the business message.

US Pat. No. 10,462,235

GLOBAL PROVISIONING OF MILLIONS OF USERS WITH DEPLOYMENT UNITS

Microsoft Technology Lice...

1. A method of provisioning a service for a new client, the method comprising:periodically synching a replica global provisioning directory that is geographically proximate to a provisioning server with a global provisioning directory that is geographically distant from the provisioning server, wherein the replica global provisioning directory contains information associated with deployment units suitable for providing a service to clients, the information associated with the deployment units comprising, for each deployment unit, geographic location information for locations that the deployment unit provides the service for;
receiving, at the provisioning server, a request for services for a client; and
in response to receiving the request for service, with the provisioning server,
determining a geographic location of the client based on the received request;
performing a search, based on the determined geographic location for the client, of the replica global provisioning directory for a deployment unit associated with the determined geographic location to assign to the client for providing the service to the client;
assigning the client to the deployment unit associated with the determined geographic location, as identified in the search of the replica global provisioning directory; and
transmitting, to the client, information for receiving the service from the assigned deployment unit.

US Pat. No. 10,462,234

APPLICATION RESILIENCE SYSTEM AND METHOD THEREOF FOR APPLICATIONS DEPLOYED ON PLATFORM

HUAWEI TECHNOLOGIES CO., ...

1. An application resilience system for an application, comprising:a memory comprising instructions; and
a computer processor coupled to the memory, wherein the instructions cause the computer processor to be configured to:
analyze data captured, using a monitoring engine associated with the application, to associate an event retrieved from the data captured with an action in a pre-stored template;
store the pre-stored template in the memory, wherein the pre-stored template associates the event with the action for the application, and wherein the pre-stored template associates the event with different actions for different applications such that actions are application specific;
execute the action associated to the event, wherein the action is specified in the pre-stored template;
identify a status of the application;
fetch at least the data captured, the event retrieved from the data captured, or the action associated with the event retrieved;
store the at least the data captured, the event retrieved from the data captured, or the action associated with the event retrieved in a repository; and
notify the status of the application based on at least one notification template storing at least one value.

US Pat. No. 10,462,232

NON-TRANSITORY COMPUTER-READABLE MEDIUM FOR SERVER

Brother Kogyo Kabushiki K...

1. A non-transitory computer-readable medium storing computer-readable instructions for a server,the computer-readable instructions, when executed by a processor of the server, causing the server to execute:
receiving a first registration request from a first relay device for relaying a communication via the Internet between a communication device and the server, the first registration request including a first IP address assigned to the communication device and first identification information for identifying the communication device;
registering target information including the first IP address and the first identification information in a memory in a case where the first registration request is received;
receiving a second registration request from a second relay device for relaying a communication via the Internet between a terminal device different from the communication device and the server after the target information has been registered in the memory, the second registration request including a second IP address assigned to the terminal device and second identification information;
determining whether the second identification information included in the second registration request matches the first identification information included in the target information;
determining, by using the first IP address included in the target information and the second IP address included in the second registration request, whether the communication device and the terminal device are belonging to a same local area network; in a case where a predetermined condition is true, registering, in association with the target information in the memory, connection information for establishing a connection via the Internet between the server and the communication device, the predetermined condition including a determination that the second identification information matches the first identification information and a determination that the communication device and the terminal device are belonging to the same local area network, wherein in a case where the predetermined condition is not true, the connection information is not registered in the memory;
in the case where the predetermined condition is true, sending a sending request including the connection information and a specific IP address assigned to the communication device to the terminal device, the sending request being for causing the terminal device to send the connection information to the communication device with the specific IP address as a destination, wherein in the case where the predetermined condition is not true, the sending request is not sent to the terminal device;
receiving the connection information from the communication device after the terminal device has sent the connection information to the communication device in accordance with the sending request;
establishing the connection via the Internet between the server and the communication device by using the connection information received from the communication device; and
performing, by using the connection, a target service which is related to the communication device identified by the first identification information included in the target information.

US Pat. No. 10,462,231

CONTINUING AN APPLICATION SESSION ON A DIFFERENT DEVICE

Oath Inc., New York, NY ...

1. A method implemented on a machine having a processor, storage, and a communication platform capable of making a connection to a network to continue an application session from one device to another device, the method comprising:responsive to a successful login by a user on a first device authenticated using a certain user identity, providing the first device an instruction to collect information related to a first session of a first application and a statistic of the first application the user is engaged in;
receiving, via the communication platform, at a session information receiving unit from the first device, the information related to the first session, wherein the information indicates content and a presentation thereof on the first device;
storing, at a storage unit, the information in association with the certain user identity;
receiving, via the communication platform from a second device, an indication that the user logged on to the second device using the certain user identity; and
providing, by a session information transmission unit, the information related to the first session to the second device so that the content and the presentation thereof related to the first session and to the statistic of the first application are to be synchronized on the second device via a second application in a second session where the user is engaged in, wherein the first and second applications have at least one common function, and the statistic corresponds to an amount of webpage/document scrolled in a web browser/word processing application.

US Pat. No. 10,462,230

MIGRATING SESSIONS USING A PRIVATE CLOUD-CLOUD TECHNOLOGY

Bank of America Corporati...

1. An apparatus, comprising:a user interface operable to receive:
a request to transfer an active communication session between the apparatus and a first device such that the active communication session is between the apparatus and a second device, wherein the first device and the second device are coupled to a network, and
one or more credentials from a user;
a memory operable to store the request, the credentials from the user, an identifier of the first device, an identifier of the second device, and session information associated with the first active communication session;
a network interface operable to communicate with the network; and
a processor communicatively coupled to the user interface, the memory, and the network interface, the processor operable to;
register the first device and the second device;
detect the active communication session between the apparatus and the first device;
receive, after detecting the active communication session, a first request to transfer the active communication session between the apparatus and the first device such that the active communication session is between the apparatus and the second device;
determine, using the identifier of the first device and the identifier of the second device, whether the first device and the second device are registered and whether transfer of the active communication session is authorized;
if the first device and the second device are registered and transfer of the active communication session is authorized:
store, in the memory, the session information associated with the communication session from a header of the first request to transfer the active communication session;
receive and authenticate credentials of the user provided at the second device;
transmit the stored session information associated with the active communication session to the second device;
receive a second request associated with the active communication session that includes the transmitted session information to restore the active communication session on the second device based on the received second request and the session information; and
prohibit, after receiving the second request, access to the active communication session by the first device for a predefined period of time.

US Pat. No. 10,462,217

PIVOT INTERFACE ELEMENT FOR A MESSAGING SYSTEM

FACEBOOK, INC., Menlo Pa...

15. An apparatus comprising:a non-transitory computer-readable medium storing logic; and
a hardware processor circuit configured to execute the stored logic, the logic configured to cause the processor to:
provide a network interface component configured to receive an input, the input received based on information entered in a one-on-one message composition display;
provide an intent determination component configured to:
analyze information associated with the input to determine that the input is associated with an intent to produce content, wherein an intent to produce content comprises an intent to create a new group message or thread;
in response to determining that the input is associated with an intent to produce content, transmit an instruction to the messaging client to display a pivot interface element within the one-on-one message composition display; and
receive a selection from the messaging client of the pivot interface element, the selection indicating an intent to switch from composing a one-on-one message or thread to a group message or thread;
provide messaging logic configured to create a group message in response to a request from the intent determination component; and
provide a group selection component configured to:
analyze information associated with the input to automatically identify a plurality of suggested users to participate in the group message; and
transmit identifiers for the plurality of suggested group users to a source of the input.

US Pat. No. 10,462,212

HYBRID CLOUDS

1. A method, comprising:identifying an edge device in network communication with a cloud extension component of a managed hybrid cloud, wherein the edge device is located outside a core network supporting the managed hybrid cloud;
deploying a lightweight management container to the edge device, the lightweight management container sharing a common control plane with a standard management container used on a traditional compute node in the managed hybrid cloud;
enrolling the edge device in the managed hybrid cloud using the lightweight management container; and
satisfying a resource request directed to the managed hybrid cloud using a resource of the edge device.

US Pat. No. 10,462,211

SYSTEM AND METHOD FOR PROVIDING MORE APPROPRIATE QUESTION/ANSWER RESPONSES BASED UPON PROFILES

International Business Ma...

1. A computer-implemented method comprising:receiving, by a computing device, a question from a user;
generating, via the computing device, after the question is received, a real-time Personality/Experience/Trait (PET) Model from a profile of the user;
providing the question, via the computing device, to at least one subject matter expert;
identifying, via the computing device, a first answer in response to the question from the user, wherein the first answer is provided by a first subject matter expert;
identifying, via the computer device, a second answer in response to the question from the user, wherein the second answer is provided by a second subject matter expert;
mapping, via the computing device, after the first answer and the second answer are identified, the user to at least one trained PET Model created by the at least one subject matter expert;
determining that the profile of the user matches a first profile of the first subject matter expert more than a second profile of the second subject matter expert, wherein determining that the profile of the user matches the first profile of the first subject matter expert more than the second profile of the second subject matter expert includes:
applying a weight to one or more features of the profile of the user, the first profile of the first subject matter expert, and the second profile of the second subject matter expert, wherein applying the weight to the one or more features is based upon, at least in part, determining a correlation between the one or more features of the profile of the user and the first profile of the first subject matter expert, wherein the weight to the one or more features of the profile is determined based upon a similarity of attributes between the real-time PET Model relative to the user and the trained PET Model relative to the at least one subject matter expert; and
upon determining the correlation between the one or more features of the profile of the user and the first profile of the first subject matter expert, applying a higher weight the one or more features having the correlation between the profile of the user and the first profile of the first subject matter expert; and
sending to the user the first answer provided by the first subject matter expert with a preference over the second answer provided by the second subject matter expert based upon, at least in part, determining that the profile of the user matches the first profile of the first subject matter expert more than the second profile of the second subject matter expert first answer provided by the first subject matter expert is more appropriate than the second answer provided by the second subject matter expert based upon the correlation between the one or more features of the profile of the user and the first profile of the first subject matter expert, wherein the first answer provided by the first subject matter expert is determined to be more appropriate than the second answer provided by the second subject matter expert even when the first answer provided by a first subject matter expert is equally as accurate as the second answer provided by the second subject matter expert.

US Pat. No. 10,462,208

FILE TRANSFER SYSTEM WITH DYNAMIC FILE EXCHANGE CONTROL FUNCTIONS

Bank of America Corporati...

8. A method, comprising:at a computing platform comprising at least one processor, memory, and a communication interface:
receiving, by the at least one processor and via the communication interface, an instruction to transmit a file from a first location to a second location;
prior to transmission of the file to the second location:
evaluating, by the at least one processor, the file to determine whether one or more criteria to implement dynamic controls are met, evaluating the file including evaluating metadata of the file to determine one or more characteristics of the file and identifying content of the file;
responsive to determining, based on the characteristics determined from the metadata and the content of the file, that the one or more criteria to implement dynamic controls are met
transferring, by the at least one processor and via the communication interface, the file from the first location to a file distribution control computing device, the file distribution control computing device being different from the first location and the second location;
hold the file at the file distribution control computing device;
after transferring the file from the first location to the file distribution computing platform, identify, based on the characteristics determined from the metadata and the content of the file, one or more dynamic controls, the one or more dynamic controls including approval of the transmission of the file from at least two different individuals;
implement the identified one or more dynamic controls;
determining, by the at least one processor, whether the identified one or more dynamic controls have been fulfilled; and
responsive to determining that the identified one or more dynamic controls have been fulfilled, generating and executing, by the at least one processor, an instruction to transmit the file to the second location.

US Pat. No. 10,462,199

INTELLIGENT AND NEAR REAL-TIME MONITORING IN A STREAMING ENVIRONMENT

CERNER INNOVATION, INC., ...

1. A computer-implemented method comprising:obtaining an enriched data stream via a streaming platform;
executing at least one rule against the enriched data stream;
when an event is detected based on execution of the at least one rule against enriched streamed data of the enriched data stream, receiving a notification of the event detection;
determining, in near real time, to instantiate one or more actions based on the notification and the event detected;
using the at least one rule executed against the enriched streamed data to detect the event, identifying one or more of a middleware component, a remote user device, an application, a database storing electronic records specific to individuals, or a raw data capture device, corresponding to the one or more actions; and
instantiating the one or more actions by directing instructions for performance of the at least one of the one or more actions to the one or more of the middleware component, the remote user device, the application, the database storing electronic records specific to individuals, or the raw data capture device identified,
wherein the one or more of the middleware component, the remote user device, the application, the database storing electronic records specific to individuals, or the raw data capture device perform the at least one of the one or more actions according to the instructions.

US Pat. No. 10,462,196

TANGIBLE SOCIAL NETWORK

Massachusetts Institute o...

1. An interactive physical object communication frame, comprising:a housing, the housing being adapted to receive physical installation of, and to display, multiple ones of a plurality of interactive physical objects in such a manner that the physically installed interactive physical objects are physically connected to the frame and are located inside the perimeter of the housing when installed, the physical connection being such that the interactive physical objects are repeatably removable, rearrangeable as to their position with respect to installed ones of the plurality of interactive physical objects, and then reinstallable within the frame according to the desire of a user;
a communications subsystem, the communications subsystem being adapted for receiving and managing communications with the installed interactive physical objects, and for receiving and managing communications between each installed interactive physical object and an associated remote interactive physical object that is installed in a second physical object communication frame and is communicatively-linked to, and paired with, the installed interactive physical object in such a manner that an exclusive paired dedicated communication channel is formed between the installed interactive physical object and the associated remote interactive physical object; and
a controller, the controller being located within the housing and being adapted for:
receiving and processing commands and data received from the communications subsystem; and
generating at least one response command or data in response to the received commands and data.

US Pat. No. 10,462,195

METHODS, APPARATUS AND/OR SYSTEM FOR USING EMAIL TO SCHEDULE AND/OR LAUNCH GROUP COMMUNICATIONS SESSIONS

Intermedia.net, Inc., Mo...

1. A method of operating a communication service provider system, comprising:receiving, at an email server within the communication service provider system, a first email from a first communications device, the first email containing a sender email address, one or more recipient email addresses, and a communication service provider email address, the communication service provider email address not being assigned to an individual user;
scanning the first email to determine that the first email contains an invitation to participate in an online meeting;
determining that the sender email address is not associated with an account egistered with the communication service provider;
in response to the determination that the sender email address is not associated with a conference host account registered with the communication service provider;
automatically creating a conference host account, with the communication service provider, associated with the sender email address without further input from the sender email address;
automatically storing an email reference chain associated with the first email along with the sender email address and the one or more recipient email addresses in an email thread store, the email reference chain including one or more emails pertaining to the online meeting;
generating, using information from the first email, a sender email invitation containing conference call launch details specific to a host of an online conference call;
generating, using information from the first email, one or more invitee email invitations containing conference call join details for participants of the online conference call;
sending the sender email invitation to the sender email address; and
sending the one or more invitee email invitations to the one or more recipient email addresses.

US Pat. No. 10,462,192

RADIO RESOURCE MANAGEMENT FOR PACKET-SWITCHED VOICE COMMUNICATION

Apple Inc., Cupertino, C...

1. A method, comprising:receiving, by a base station prior to establishment of a dedicated bearer for IP multimedia subsystem (IMS) signaling for a user equipment (UE) device, first information from the UE device in a radio resource control (RRC) connection request message, wherein the first information indicates that the UE is requesting at least one of voice or video communication over a packet-switched network; and
initiating, by the base station in response to the first information, configuration of a dedicated bearer for IMS signaling for the UE device, wherein the configuration is based on the first information; and
using, by the base station, the dedicated bearer for IMS signaling and a dedicated IMS voice or video data bearer for the voice or video communication.

US Pat. No. 10,462,184

SYSTEMS AND METHODS FOR ENFORCING ACCESS-CONTROL POLICIES IN AN ARBITRARY PHYSICAL SPACE

Symantec Corporation, Mo...

1. A computer-implemented method for enforcing access-control policies in an arbitrary physical space, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:identifying a collection of devices that are located within a predetermined physical space;
determining a physical location of each device in the collection of devices;
establishing, based on the collection of devices:
a list of controlled devices, selected from the collection of devices, that are subject to an access-control policy that describes restricted functions of each controlled device in the list of controlled devices; and
a list of monitoring devices, selected from the collection of devices, that are capable of observing actions performed by users within a physical proximity;
matching, based at least on comparing the physical locations of each device in the collection of devices, each of the controlled devices with at least one of the monitoring devices that is capable of observing actions performed by users within physical proximity to the controlled device;
monitoring, for each of the controlled devices and by each of the monitoring devices matched to the controlled device, one or more actions performed by a user as part of a user attempt to access a restricted function from among the restricted functions of the controlled device; and
performing a security action based on the user attempt to access the restricted function of the controlled device that was observed by at least one monitoring device that is matched to the controlled device.

US Pat. No. 10,462,182

THIN AGENT-BASED SSL OFFLOADING

VMware, Inc., Palo Alto,...

1. A computer-implemented method, comprising:receiving, by a first virtual machine, a data packet sent by an application running on a second virtual machine, addressed for transmission to a computer, and intercepted prior to being transmitted to the computer;
storing the data packet in a cache;
sending a request message to a transmission protocol stack of the second virtual machine, the request message used to initiate an encrypted session between the second virtual machine and the computer;
receiving a response message indicating the encrypted session between the second virtual machine and the computer is established;
in response to receiving the response message indicating the encrypted session between the second virtual machine and the computer is established, encrypting the stored data packet; and
transmitting the encrypted data packet to the transmission protocol stack of the second virtual machine for transmission to the computer.

US Pat. No. 10,462,178

SECURITY COUNTERMEASURE MANAGEMENT PLATFORM

Alert Logic, Inc., Houst...

1. A method to improve an operation of a countermeasure computing system in a computing environment, comprising:configuring a set of agents to collect information security risk data from one or more sources in the computing environment;
implementing a security countermeasure workflow to address a security exposure identified by the information security risk data from one or more sources by:
receiving the information security risk data from one or more sources in each of one or more distinct risk categories, each risk category associated with a distinct type;
augmenting the received information security risk data with other data to generate an aggregate risk entity, the other data being one of: information security standards data, and risk impact attribute data;
processing the aggregate risk entity against a vulnerability-to-countermeasure knowledge base that includes countermeasure attribute data to discover, with respect to the aggregate risk entity, one or more countermeasures applicable to address a security exposure as represented in the aggregate risk entity, the vulnerability-to-countermeasure knowledge base grouping vulnerabilities to impact categories that correspond to countermeasures; and
with respect to particular security exposure represented in the aggregate risk entity, presenting information regarding the one or more countermeasures, the information identifying (i) an expected cost of implementing a countermeasure, (ii) an expected effectiveness of implementing a countermeasure, (iii) an indication of whether a countermeasure is available in the computing environment, (iv) a list of one or more recommended countermeasure configuration settings, and (v) when multiple countermeasures are identified, an ordered ranking of the multiple countermeasures according to their respective effectiveness; and
based at least in part on the security countermeasure workflow, controlling a countermeasure mechanism in the countermeasure computing system to address the security exposure by performing at least one of the one or more presented countermeasures.

US Pat. No. 10,462,177

TAKING PRIVILEGE ESCALATION INTO ACCOUNT IN PENETRATION TESTING CAMPAIGNS

XM Cyber Ltd., Hertsliya...

1. A method of carrying out a penetration testing campaign of a networked system by a simulated penetration testing system for the purpose of determining a way for an attacker to compromise the networked system, wherein the simulated penetration testing system assigns a plurality of network nodes of the networked system to classes based on current information about the compromisability of the plurality of network nodes at a current state of the penetration testing campaign, the classes consisting of (i) a red class, wherein each network node that is a member of the red class is known to be compromisable by the attacker in a way that gives the attacker full control of the red-class-member network node, (ii) a blue class, wherein each network node that is a member of the blue class is not known to be compromisable by the attacker, and (iii) a purple class, wherein each network node that is a member of the purple class is known to be compromisable by the attacker in a way that does not give the attacker full control of the purple-class-member network node, the method comprising:a. selecting a first target network node of the plurality of network nodes of the networked system;
b. handling the first target network node, the handling of the first target network node comprising:
i. based on the selected first target network node and based on the current assignment of the plurality of network nodes to the blue, red and purple classes, determining a first vulnerability that can compromise the first target network node;
ii. checking whether compromising the first target network node using the first vulnerability would result in the attacker achieving full control of the first target network node; and
iii. in response to determining that the compromising of the first target network node using the first vulnerability would result in the attacker achieving full control of the first target network node, assigning the first target network node to the red class;
c. selecting a second target network node of the plurality of network nodes of the networked system;
d. handling the second target network node, the handling of the second target network node comprising:
i. based on the selected second target network node and based on the current assignment of the plurality of network nodes to the blue, red and purple classes, determining a second vulnerability that can compromise the second target network node;
ii. checking whether compromising the second target network node using the second vulnerability would result in the attacker achieving full control of the second target network node; and
iii. in response to determining that (i) the compromising of the second target network node using the second vulnerability would not result in the attacker achieving full control of the second target network node and (ii) the attacker would be able to achieve full control of the second target network node by using (A) one or more privilege escalation techniques and (B) one or more access rights to the second target network node obtained by the compromising of the second target network node using the second vulnerability, assigning the second target network node to the red class;
e. selecting a third target network node of the plurality of network nodes of the networked system;
f. handling the third target network node, the handling of the third target network node comprising:
i. based on the selected third target network node and based on the current assignment of the plurality of network nodes to the blue, red and purple classes, determining a third vulnerability that can compromise the third target network node;
ii. checking whether compromising the third target network node using the third vulnerability would result in the attacker achieving full control of the third target network node; and
iii. in response to determining that (i) the compromising of the third target network node using the third vulnerability would not result in the attacker achieving full control of the third target network node and (ii) the attacker cannot achieve full control of the third target network node by using (A) any combination of privilege escalation techniques and (B) any combination of access rights to the third target network node obtained by the compromising of the third target network node using the third vulnerability, assigning the third target network node to the purple class;
g. based on at least one of the first vulnerability, the second vulnerability and the third vulnerability, determining the way for an attacker to compromise the networked system; and
h. reporting the determined way for an attacker to compromise the networked system, the reporting comprising at least one action selected from the actions group consisting of (i) causing a display device to display a report including information about the determined way to compromise the networked system, (ii) recording the report including the information about the determined way to compromise the networked system in a file, and (iii) electronically transmitting the report including the information about the determined way to compromise the networked system.

US Pat. No. 10,462,174

COMPUTER SYSTEM FOR DISTRIBUTED DISCOVERY OF VULNERABILITIES IN APPLICATIONS

Synack, Inc., Redwood Ci...

1. A computer vulnerability discovery system comprising:a central controller connected to one or more target systems via a computer network;
a plurality of researcher computer network connections for a plurality of researcher computers, each researcher computer network connection for sending and receiving data between a researcher computer of the plurality of researcher computers and the central controller, the central controller monitoring at least some communications between the plurality of researcher computers and at least some of the one or more target systems, wherein the each researcher computer provides a user interface to an invited researcher that is a person or organization selected to participate in one or more computer vulnerability research projects related to the one or more target systems;
storage for tracking, at the central controller, assignment and scope of a particular computer vulnerability research project of the one or more computer vulnerability research projects to an assigned researcher computer, to be operated by the invited researcher assigned to the particular computer vulnerability research project, wherein the particular computer vulnerability research project relates to a particular target system;
storage for access credentials for providing an assigned researcher computer access to the central controller and/or the particular target system;
a monitoring computer process to monitor networked data communications between the assigned researcher computer and the particular target system, wherein the networked data communications include communications that are usable to identify security vulnerabilities of the particular target system; and
an evaluation computer process to determine a candidate security vulnerability of the particular target system based on a candidate security vulnerability report received from the assigned researcher computer resulting from the invited researcher's use of the assigned researcher computer to interact with the particular target system.

US Pat. No. 10,462,171

METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING

Sentinel Labs Israel Ltd....

1. A computer-implemented method for protecting security and integrity of an elastic computer network, the method comprising:installing an autonomous software agent of a plurality of autonomous software agents on each of a plurality of endpoint devices forming an elastic computer network;
accessing, by each autonomous software agent, an operating system of an corresponding endpoint device on which the autonomous software agent is installed to obtain visibility of operating system processes and network communications of the corresponding endpoint device;
monitoring, by each autonomous software agent, the operating system processes and the network communications of the corresponding endpoint device to obtain endpoint data, the endpoint data comprising information regarding at least one of the operating system processes or network processes of the corresponding endpoint device;
transmitting, by each autonomous software agent, the endpoint data to a central server system;
identifying, by the autonomous software agent using a local security protocol stored on each of the plurality of autonomous software agents, one or more local anomalous indicators on the corresponding endpoint device based at least in part on the endpoint data;
responding, by each autonomous software agent, to the one or more local anomalous indicators on an endpoint-level based at least in part on the local security protocol, wherein each of the local security protocols comprises one or more rule sets, policies, or access rights, wherein each of the local security protocols is based on a baseline usage pattern unique to each corresponding target endpoint device and designed to ensure local security of each of the plurality of endpoint devices;
receiving, by the central server system, the endpoint data from each autonomous software agent on each of the plurality of endpoint devices;
analyzing, by the central server system, the endpoint data received from each autonomous software agent on each of the plurality of endpoint devices to identify network-wide activity patterns;
identifying, by the central server system using a network-wide security protocol, one or more network-wide anomalous indicators on a network level across the plurality of endpoint devices based at least in part on the identified network-wide activity patterns; and
responding, by the central server system, to the one or more network-wide anomalous indicators on the network level across the plurality of endpoint devices based at least in part on the network-wide security protocol,
wherein the central server system comprises a computer processor and an electronic storage medium, and
wherein each of the plurality of autonomous agents is capable of identifying and responding to the one or more local anomalous indicators of the corresponding endpoint device independently of the central server system.

US Pat. No. 10,462,168

ACCESS CLASSIFYING DEVICE, ACCESS CLASSIFYING METHOD, AND ACCESS CLASSIFYING PROGRAM

NIPPON TELEGRAPH AND TELE...

6. An access classifying device comprising processing circuitry configured to:generate multiple trees, in which at least a first server and a second server are nodes and a command for transferring an access from the first server to the second server is an edge;
calculate a degree of similarity between the trees in accordance with a degree of matching between partial trees included in each of the trees generated;
classify the trees into multiple groups that are made up of trees, between which the degree of similarity is high, in accordance with the degree of similarity calculated; and
generate a partial tree that represents a characteristic of each group as a representative tree for each group that is obtained during the classifying.

US Pat. No. 10,462,161

VEHICLE NETWORK OPERATING PROTOCOL AND METHOD

GM GLOBAL TECHNOLOGY OPER...

1. A communication network comprising:a plurality of nodes, each of the nodes being operably connected to a bus, a transmitting node of the plurality of nodes being configured to communicate in accordance with a predetermined protocol a data communication having a predetermined frame structure via the bus to a receiving node of the plurality of nodes, which is configured to receive the data communication,
wherein each data communication contains information to be communicated, and
the receiving node is configured to determine from the data communication a compromised state of the transmitting node and to initiate a response strategy, and the transmitting node being configured to disassociate from the bus in accordance with the response strategy, wherein
in accordance with the response strategy the receiving node is configured to induce the transmitting node to dissociate from the bus by being configured to engage in communication activity of a nature to be perceived by the transmitting node as if the transmitting node has generated communication errors such that the transmitting node self-determines to dissociate from the bus in accordance with the predetermined protocol.

US Pat. No. 10,462,159

BOTNET DETECTION SYSTEM AND METHOD

NTT INNOVATION INSTITUTE,...

1. A botnet detection system, comprising:a network having one or more nodes and one or more command and control devices coupled to each other;
a storage device having a plurality of pieces of data about the network including a plurality of internet protocol addresses with each internet protocol address corresponding to one of a node, a command and control devices and at least one known botnet and network traffic flow data indicating a communication between one of at least one node and at least one command and a communication and at least one known botnet and a domain name service cache; and
a botnet detection component coupled to the storage device, the botnet detection component detecting a new botnet by matching the network traffic flow data against an IP address of the at least one known botnet.

US Pat. No. 10,462,150

MULTICOMPUTER PROCESSING OF USER DATA WITH CENTRALIZED EVENT CONTROL

Bank of America Corporati...

1. A computing platform, comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
establish, via the communication interface, a first connection to a subordinate user computing device;
while the first connection is established, receive, via the communication interface, from the subordinate user computing device, a request to authorize an event;
establish, via the communication interface, a second plurality of connections to a plurality of social media service computing platforms;
while the second plurality of connections is established, receive first information from at least one of the plurality of social media service computing platforms;
determine, based on a comparison of the request to authorize the event with the first information received from the at least one of the plurality of social media service computing platforms, to authorize the request;
in response to determining to authorize the request, generate a command directing an event validation computing platform to authorize the event;
transmit, prior to transmitting the command, to a supervisory user computing device associated with a supervisory user, a request for supervisory authorization of the event;
receive, from the supervisory user computing device associated with a supervisory user, a command instructing the computing platform to authorize the event;
compare the request for supervisory authorization of the event with the command received from the supervisory user computing device instructing the computing platform to authorize the event;
determine, based on the comparing of the request for supervisory authorization of the event with the command received from the supervisory user computing device instructing the computing platform to authorize the event, at least one difference between the request for supervisory authorization of the event and the command received from the supervisory user computing device instructing the computing platform to authorize the event; and
prior to transmitting the command directing the event validation computing platform to authorize the event, modify, based on the at least one difference, the command directing the event validation computing platform to authorize the event; and
transmit, via the communication interface, to the event validation computing platform, the command directing the event validation computing platform to authorize the event, wherein transmitting the command directing the event validation computing platform to authorize the event causes the event validation computing platform to execute one or more actions enabling the subordinate user computing device to initiate the event.

US Pat. No. 10,462,147

NETWORK DEVICE ISOLATION FOR ACCESS CONTROL AND INFORMATION SECURITY

Bank of America Corporati...

1. An information security system comprising:a switch configured to provide network connectivity for one or more endpoint devices to a network;
a network authentication server operably coupled to the switch and configured to:
authenticate endpoint devices connected to the switch;
send a device identifier for a device to a threat management server in response to the endpoint device connecting to a port on the switch; and
the threat management server operably coupled to the switch and the network authentication server comprising:
a memory configured to store:
a port lease log file identifying:
endpoint devices with a lease for a port on the switch; and
port lease periods that indicates a time period an endpoint device is allowed to access the network; and
a device log file identifying:
endpoint devices that have failed authentication with the network authentication server; and
endpoint devices that have passed authentication with the network authentication server; and
a threat management engine implemented by a processor configured to:
identify the endpoint device for isolation in response to receiving the device identifier, comprising:
determining the endpoint device is present in the device log file using the device identifier;
determining the number of times the endpoint device has failed authentication exceeds a first threshold value within a first predetermined time period;
determining the number of times the endpoint device has passed authentication is less than a second threshold value within a second predetermined time period that is a greater period of time than the first predetermined time period; and
determining the endpoint device does not have a lease for the port on the switch; and
send a reroute command to the switch identifying the endpoint device in response to identifying the endpoint device for isolation, wherein:
the switch is configured to transform the destination of traffic associated with the endpoint device to a safe zone in response to the receiving the reroute command; and
traffic in the safe zone associated with the endpoint device is recorded;
wherein:
the threat management engine is configured to add the endpoint device to a blacklist identifying endpoint devices that are prohibited from accessing the network in response blocking the endpoint device from accessing the network; and
adding the endpoint device to the blacklist triggers the network authentication server to automatically fail authentication for the endpoint device when the endpoint device connects to the switch.

US Pat. No. 10,462,144

SYSTEMS AND METHODS FOR MANAGING PRIVACY SETTINGS OF SHARED CONTENT

Google LLC

1. A system for managing privacy of shared content, the system comprising:a terminal device, the terminal device comprising:
a content receiving device configured to receive content;
a storage configured to store content by the content receiving device;
a privacy setting determiner configured to determine privacy settings associated with a representation of an object contained in the received content, the representation of the object being associated with a user of an online account that is not associated with the terminal device;
a content obfuscator configured to obfuscate at least a portion of the received content based on the privacy settings of the representation of the object contained in the received content to generate obfuscated content,
wherein the content obfuscator comprises:
a content partitioner configured to partition the received content into a plurality of layers, the plurality of layers having two or more levels of fidelity;
a key generator configured to generate an encryption key;
a layer encryptor configured to encrypt at least one of the plurality of layers using the generated encryption key; and
an obfuscated content generator configured to generate the obfuscated content by combining the encrypted at least one of the plurality of layers with a remainder of the plurality of layers; and
a transmitter configured to transmit the obfuscated content; and
a server device, the server device comprising:
a receiver configured to receive the obfuscated content from the transmitter of the terminal device;
a publisher configured to publish the obfuscated content to one or more third parties, wherein the receiver is configured to receive a request to change privacy settings of the object of the received content; and
a de-obfuscator configured to, based on the received request to change privacy settings, de-obfuscate the at least a portion of the received content to generate de-obfuscated content, wherein the publisher is configured to publish the de-obfuscated content to one or more third parties based on the received request to change privacy settings.

US Pat. No. 10,462,139

SCALABLE UNIVERSAL FULL SPECTRUM CYBER CYBER DETERMINING PROCESS

1. A scalable universal full spectrum cyber determining process, said scalable universal full spectrum cyber determining process comprising:utilizing (a) at least one computing device (b) criteria selected from criteria that may be utilized by said cyber determining process, (c) selected information, (d) selected necessary programming, and (e) any other necessary resource, all of which being structured and utilized for providing at least one cyber determination;
wherein said at least one cyber determination is selected from the group consisting of a full spectrum of cyber determinations;
wherein said at least one cyber determination is utilized for at least one purpose selected from the group consisting of a full spectrum of purposes for which cyber determinations may be utilized;
wherein said information is derived from at least one member selected from the group consisting of (a) at one or more points in time, and (b) over at least one period of time;
wherein said information is selected from the group consisting of a full spectrum of useful information that may be utilized by said cyber determining process;
wherein said full spectrum of useful information that may be utilized by said cyber determining process may include information that was derived from at least one sensor observation;
wherein said at least one sensor observation provides information regarding at least one aspect of at least one subject of said at least one sensor observation;
wherein at least one cyber determination regarding said at least one subject of at least one sensor observation is selected from the group consisting of the full spectrum of cyber determinations regarding subjects of sensor observations;
wherein said at least one aspect of at least one subject of at least one sensor observation is selected from the group consisting of a full spectrum of observable aspects of subjects of sensor observations;
wherein said at least one subject of at least one sensor observation is selected from the group consisting of a full spectrum of subjects of sensor observations;
wherein said cyber determining process utilizes at least one observed characteristic regarding at least one aspect of said at least one subject of at least one sensor observation;
wherein said at least one observed characteristic is selected from the group consisting of a full spectrum of observable characteristics of subjects of sensor observations;
wherein said at least one sensor observation is at least one type of sensor observation selected from the group consisting of (a) visual sensor observations, (b) audible sensor observations, (c) thermal sensor observations, (d) olfactory sensor observations (e) tactile sensor observations, and (f) any other type of sensor observation selected from the group consisting of a full spectrum of types of sensor observations;
wherein said at least one sensor observation has at least one characteristic selected from the group consisting of a full spectrum of characteristics of sensor observations;
wherein each said scalable cyber determining process may be configured, in regard to included resources, to fall at one point in a range of from a minimum to a maximum, wherein at the minimum said cyber determining process includes only the resources that are needed for providing for a least complex, in regard to included necessary resources, of all cyber determination needs, and wherein at the maximum said cyber determining process includes all of the resources that are needed for providing every cyber determination from a full spectrum of cyber determinations;
wherein said scalable cyber determining process may determine and utilize at least one measure of adequacy of available resources;
wherein said scalable cyber determining process provides at least one determination selected from the group consisting of (a) at least one single cyber determination, (b) at least one intermittently provided cyber determination, and (c) at least one constantly provided cyber determination; and
wherein said scalable cyber determining process further comprises utilizing at least one part of at least one step selected from the group consisting of
(a) a first series observation step wherein said cyber determining process utilizes at least one sensor observation, wherein at least one subject of said at least one sensor observation has at least one previously determined aspect, said cyber determining process recognizing at least one characteristic regarding said previously determined aspect, said at least one recognized characteristic being utilizable by said cyber determining process in providing said at least one cyber determination, said cyber determining process assigning designations representing (i) said at least one observation, (ii) said at least one known aspect of said at least one observation subject, and (iii) said at least one observed characteristic, said cyber determining process including at least one of said designation in at least one first series observation record,
(b) a second series observation step wherein said cyber determining process utilizes at least one sensor observation, wherein at least one subject of said at least one sensor observation has at least one yet-to-be-determined aspect, said cyber determining process recognizing at least one characteristic regarding said at least one yet-to-be-determined aspect, said cyber determining process assigning designations representing (i) said at least one observation, (ii) said at least one yet-to-be-determined aspect of said at least one observation subject, and (iii) said at least one characteristic regarding said at least one yet-to-be-determined aspect, wherein said cyber determining process including at least one of said designations in at least one second series observation record,
(c) a matching step wherein said cyber determining process matching at least one designation from at least one second series observation record with at least one comparable designation from at least one first series observation record,
(d) a comparing step wherein said cyber determining process comparing designations from at least one second series observation record with designations from at least one comparable first series observation record and providing at least one conclusion from the comparison,
(e) a determining step wherein said cyber determining process utilizes at least one selected from the group of (i) said at least one conclusion from said at least one comparing step, and (ii) said useful information, for making said at least one cyber determination, and
(f) a reporting step wherein said cyber determining process providing at least one report regarding at least one aspect of at least one part of at least one cycle of operation of said cyber determining process.

US Pat. No. 10,462,138

APPLICATION PROGRAMMING INTERFACE ACCESS CONTROLS

Google LLC, Mountain Vie...

1. A method, comprising:receiving a request from a client for a computer authorization challenge to access an application programming interface;
determining whether a previously received response to a previously provided computer authorization challenge to access the application programming interface was generated by a proof of work proxy server instead of generated by the client;
determining a target computational cost for the application programming interface based on the determination that the previously received response to the previously provided computer authorization challenge to access the application programming interface was generated by a proof of work proxy server instead of generated by the client;
determining a computer authorization challenge with a difficulty of completion that satisfies the target computational cost for the application programming interface; and
providing the computer authorization challenge to the client for access to the application programming interface.

US Pat. No. 10,462,134

NETWORK DEVICE REMOVAL FOR ACCESS CONTROL AND INFORMATION SECURITY

Bank of America Corporati...

1. An information security system comprising:a switch configured to provide network connectivity for one or more endpoint devices to a network;
a network authentication server operably coupled to the switch and configured to:
authenticate endpoint devices connected to the switch;
send a device identifier for an endpoint device to a threat management server in response to the endpoint device connecting to a port on the switch; and
the threat management server operably coupled to the switch and the network authentication server comprising:
a memory configured to store:
a port lease log file identifying:
endpoint devices with a lease for a port on the switch;
port lease periods that indicate a time period an endpoint device is allowed to access the network; and
a device log file identifying:
endpoint devices that have failed authentication with the network authentication server; and
endpoint devices that have passed authentication with the network authentication server; and
a threat management engine implemented by a processor configured to:
identify the endpoint device for removal in response to receiving the device identifier, comprising:
determining the endpoint device is present in the device log file using the device identifier;
determining the number of times the endpoint device has failed authentication exceeds a first threshold value within a first predetermined time period;
determining the number of times the endpoint device has passed authentication is less than a second threshold value within a second predetermined time period that is a greater period of time than the first predetermined time period; and
determining the endpoint device does not have a lease for the port on the switch;
block the endpoint device from accessing the network via the port on the switch in response to identifying the endpoint device for removal; and
add the endpoint device to a black list identifying endpoint devices that are prohibited from accessing the network in response to blocking the endpoint device from accessing the network.

US Pat. No. 10,462,133

METHOD FOR PROVIDING USER INTERFACE FOR EACH USER, METHOD FOR PERFORMING SERVICE, AND DEVICE APPLYING THE SAME

Samsung Electronics Co., ...

1. A method of performing a service in an electronic apparatus, the method comprising:based on the electronic apparatus detecting an approach of an identifier, receiving identifier information from the identifier;
obtaining address information of a service provider based on the identifier information received from the identifier;
requesting service information to the service provider based on user information of the electronic apparatus and the address information of the service provider;
receiving the service information in response to the request to the service provider; and
displaying the received service information on a display of the electronic apparatus; wherein the identifier information and the address of the service provider are stored in a mapping table, and the address of the service provider is obtained from the mapping table.

US Pat. No. 10,462,131

REMOTE DOCUMENT EXECUTION AND NETWORK TRANSFER USING AUGMENTED REALITY DISPLAY DEVICES

Bank of America Corporati...

1. An augmented reality system comprising:a server comprising a memory operable to store a virtual file folder, the virtual file folder comprising a virtual file document;
a first augmented reality user device for a signor comprising:
a first display configured to overlay the virtual file document onto a tangible object in real-time;
a first physical identification verification engine operable to generate a signor identity confirmation token indicating a confirmation of the signor's identity; and
a first gesture capture engine operable to:
capture a gesture motion from the signor, the gesture motion representing a signor digital signature on the virtual file document; and
generate a signor transfer token, the signor transfer token comprising the signor digital signature and the signor identity confirmation token;
a second augmented reality user device for a notary comprising:
a second display configured to overlay the virtual file document onto a tangible object in real-time;
a second physical identification verification engine operable to generate a notary identity confirmation token indicating a confirmation of the notary's identity;
a gesture confirmation engine operable to:
receive the signor identity confirmation token; and
display, via the second display, the gesture motion from the signor, the gesture motion from the signor displayed on the virtual file document;
a second gesture capture engine operable to:
capture a gesture motion from the notary, the gesture motion from the notary representing a notary digital signature on the virtual file document; and
generate a notary transfer token, the notary transfer token comprising the notary digital signature and the notary identity confirmation token; and
the server further comprising:
an interface operable to receive the signor transfer token and the notary transfer token; and
a processor operable to:
generate an executed document using the signor transfer token, the notary transfer token, and the virtual file document; and
store the executed document in the virtual file folder.

US Pat. No. 10,462,130

AUTHENTICATION METHOD AND DEVICE

TENCENT TECHNOLOGY (SHENZ...

1. An authentication method performed at a server having one or more processors and memory storing a plurality of program modules to be executed by the one or more processors, the method comprising:receiving a login request sent by an initiating terminal, the login request comprising a first initiating terminal identifier of the initiating terminal;
searching, among binding relationships between initiating terminal identifiers, authentication terminal identifiers, and registered biological characteristic information according to the first terminal identifier, a target binding relationship matching the first initiating terminal identifier;
when the target binding relationship exists, sending an authentication request to an authentication terminal corresponding to an authentication terminal identifier comprised in the target binding relationship;
receiving biological characteristic information that is sent by the authentication terminal in response to the authentication request, and determining, through comparison, whether the biological characteristic information is consistent with registered biological characteristic information comprised in the target binding relationship, wherein the biological characteristic information that is sent by the authentication terminal is associated with a timestamp indicating when the biological characteristic information was collected by the authentication terminal and the timestamp is used for selecting a subset of the registered biological characteristic information for comparison with the biological characteristic information; and
when the biological characteristic information is consistent with the registered biological characteristic information,
authenticating the login request;
adding the biological characteristic information to the registered biological characteristic information comprised in the target binding relationship; and
deleting a subset of the registered biological characteristic information deemed obsolete according to its respective timestamp if the size of the registered biological characteristic information exceeds a predefined threshold.

US Pat. No. 10,462,126

SELF-ADJUSTING MULTIFACTOR NETWORK AUTHENTICATION

Bank of America Corporati...

1. A network authentication system, comprising:a cloud server implemented in hardware, configured to:
store information linked with one or more accounts for a user;
receive a request for user history for the user from an authentication server; and
send the requested user history information for the user to the authentication server; and
an authentication server implemented in hardware, wherein the authentication server is in signal communication with the cloud server, and configured to:
receive an authentication key request from a user device, wherein the authentication key request identifies an account linked with the user;
obtain an authentication key in response to receiving the authentication key request;
establish a first set of authentication rules for the authentication key, wherein the first set of authentication rules identifies:
a first number of authentication rules selected by the user; and
an authentication type for each authentication rule in the first set of authentication rules selected by the user;
identify one or more triggering events for the account, wherein a triggering event is an event associated with an increased threat to the account;
establish a second set of authentication rules for the authentication key, wherein:
the second set of authentication rules identifies:
a second number of authentication rules; and
an authentication type for each authentication rule in the second set of authentication rules; and
the second set of authentication rules is different from the first set of authentication rules;
configure key validation for the authentication key using the first set of authentication rules;
send the authentication key to the user device;
detect a triggering event from the one or more triggering events has occurred; and
configure the key validation for the authentication key using the second set of authentication rules in response to detecting the triggering event.

US Pat. No. 10,462,125

METHOD OF PUSHING PASSWORDS, PUSHING SYSTEM AND TERMINAL DEVICE

GUANGDONG OPPO MOBILE TEL...

1. A method of pushing passwords applicable to a first terminal device, comprising:receiving a first biological characteristic information of a user, wherein a sharing cryptographic library stores a plurality of application program identification codes, and one account name and one password correspond to each application program identification code;
determining that a push request is simultaneously received from a second terminal device, wherein the push request comprises a second biological characteristic information and a current application program identification code;
determining whether the first biological characteristic information captured at the first terminal device matches with the second biological characteristic information from the second terminal device; and
when the first biological characteristic information captured at the first terminal device is matched with the second biological characteristic information from the second terminal device, reading an account name and a password of the current application program identification code from the sharing cryptographic library, and pushing the account name and the password of the current application program identification code to the second terminal device;
establishing a biological characteristic library including a plurality of biological characteristic information of the user;
encrypting the sharing cryptographic library by the biological characteristic information of the biological characteristic library.

US Pat. No. 10,462,124

AUTHENTICATED SESSION MANAGEMENT ACROSS MULTIPLE ELECTRONIC DEVICES USING A VIRTUAL SESSION MANAGER

Google LLC, Mountain Vie...

1. A method of maintaining a web session for a user across multiple electronic devices, the method comprising:by a user agent of a first electronic device that is being used by a user:
discovering a plurality of electronic devices including a second electronic device that is in a communication range of the first electronic device;
presenting, to the user, identifiers associated with each of the discovered plurality of electronic devices, including an identifier for the second electronic device;
determining that the second electronic device includes a virtual session manager;
receiving a first authentication request, wherein the first authentication request comprises a request to access a first web resource for the user at the first web resource;
transmitting the first authentication request to an endpoint device via the virtual session manager of the second electronic device so that the virtual session manager can present a grant token to the endpoint device or receive the grant token from the endpoint device without the first electronic device having any access to the grant token;
receiving, from the virtual session manager, a first access token in response to the first authentication request, wherein the first access token has a life that is shorter than a life of the grant token such that the grant token is relatively long-lived and the first access token is relatively short-lived;
storing the first access token in a memory; and
using the first access token to access the first web resource and establish or maintain a virtual session with the first web resource, wherein one or more parameters associated with the user's use of the first web resource are automatically sent to maintain or automatically reconnect to the virtual session so that the virtual session is uninterrupted without manually entering the parameters.

US Pat. No. 10,462,116

DETECTION OF DATA EXFILTRATION

Amazon Technologies, Inc....

1. A computer-implemented method comprising:monitoring, with an exfiltration-monitoring device, a Transport Layer Security (“TLS”) connection between a client on an internal network and a remote service, the monitoring comprising:
acquiring account information from data contained in a TLS extension transmitted from the client to the remote service as part of a TLS handshake that establishes the TLS connection, the account information comprising an identity of an account associated with the TLS connection;
recording, in association with the MS connection, an amount of data transmitted over the MS connection from the client to the remote service;
determining that the TLS connection is potentially being used for an unauthorized transfer of data from the internal network to the remote service based at least in part on the amount of data transmitted, and the identity of the account associated with the TLS connection not being associated with the client; and
limiting the transfer of data over the TLS connection.

US Pat. No. 10,462,114

SYSTEM AND ASSOCIATED SOFTWARE FOR PROVIDING ADVANCED DATA PROTECTIONS IN A DEFENSE-IN-DEPTH SYSTEM BY INTEGRATING MULTI-FACTOR AUTHENTICATION WITH CRYPTOGRAPHIC OFFLOADING

DEFINITIVE DATA SECURITY,...

1. A method, implemented using hardware, comprising:a. encrypting content with an inner data container using one or more unique client-generated and client-stored cryptographic keys to generate client-encrypted content; and
b. sending the client-encrypted content to a server where the client-encrypted content is encrypted with an outer data container using one or more unique server-generated and server-stored cryptographic keys, wherein encrypting the content further comprises:
implementing a cryptographic algorithm and offloading schedule to transmit client-encrypted data blocks and additional cryptographic inputs to a server application, using secure networking components and a secure network channel negotiated as a result of server application authentication and based on configuration data returned when authentication succeeds;
using the additional cryptographic inputs, generating or retrieving one or more unique content encryption keys associated with and specific to the client-encrypted content, and encrypting the client-encrypted content in a data container in a secure server store while also storing the one or more server-generated and server-stored cryptographic keys on the secure server store;
generating a globally unique data identifier and the additional cryptographic inputs, and storing the globally unique data identifier and the additional cryptographic inputs in a protected data container stored in a protected client store using a client application;
encrypting the content a block at a time; and
returning results to the client application, using an encrypted channel, where the results are used as input to continue block encryption, until all of the content is encrypted, at which point encrypted material is added to the protected data container in the client store, replacing plaintext input material.

US Pat. No. 10,462,113

SYSTEMS AND METHODS FOR SECURING PUSH AUTHENTICATIONS

Symantec Corporation, Mo...

1. A computer-implemented method for securing push authentications, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:receiving, by a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, the push authentication including a core message that is encrypted by the security service relying party based on a correct answer to a challenge-response question;
forwarding, by the security service, the push authentication to the client device of the user;
receiving, by the security service, a response to the push authentication from the client device of the user; and
forwarding, by the security service, the response to the push authentication from the client device of the user to the security service relying party.

US Pat. No. 10,462,110

SYSTEM, APPARATUS AND METHOD FOR PROVIDING A UNIQUE IDENTIFIER IN A FUSELESS SEMICONDUCTOR DEVICE

Intel Corporation, Santa...

1. An apparatus comprising:a device having a physically unclonable function (PUF) circuit including a plurality of PUF cells to generate a PUF sample responsive to at least one control signal;
a controller coupled to the device, the controller to send the at least one control signal to the PUF circuit and to receive a plurality of PUF samples from the PUF circuit;
a buffer having a plurality of entries each to store at least one of the plurality of PUF samples; and
a filter to filter the plurality of PUF samples to output a filtered value, wherein the filter is to determine a majority vote for each of a plurality of bits of the plurality of PUF samples, the filtered value corresponding to the majority vote for each of the plurality of bits and mask a first bit of the plurality of bits when a count of first values of the first bit in the plurality of PUF samples is not within a threshold range, wherein the controller is to generate a unique identifier for the device based at least in part on the filtered value, and in response to a determination that a number of the plurality of PUF samples meets a threshold number, to cause the plurality of PUF samples to be provided to the filter.

US Pat. No. 10,462,103

HIGH ASSURANCE SECURITY GATEWAY INTERCONNECTING DIFFERENT DOMAINS

AIRBUS OPERATIONS SAS, T...

1. A gateway using a virtualization platform and adapted to interconnect different domains, comprising:one or more hardware processing units; and
a plurality of sets of one or more partitions hosted on the virtualization platform configured to authorize secure bidirectional flow of data along two different and unidirectional paths between first and second domains,
each of the one or more partitions in said plurality of sets being decomposed into and comprising a plurality of subsets of elementary components of code comprising a plurality of lines of code that are executable by said one or more hardware processing units, each of said elementary components of code having a specified function and being adapted to communicate with other predefined said elementary components of code,
wherein said plurality of sets of one or more partitions comprises:
a first set and a second set of one or more partitions configured to respectively receive data from said first and second domains along first and second paths and to analyze each received data at a network security level,
a third set and a fourth set of of one or more partitions configured to respectively transmit data to said second and first domains along said first and second paths,
a fifth set of one or more partitions configured to analyze and implement a series of security rules at an application protocol level on data flowing along at least one path to ensure that no malicious or unauthorized data is flowing along that at least one path;
wherein along the first path from the first domain to the second domain the firth set of one or more partitions is disposed for flow of data between the first set of one or more partitions and the third set of one or more partitions, and wherein along the second path from the second domain to the first domain the fifth set of one or more partitions is disposed for flow of data between the second set of one or more partitions and the fourth set of one or more partitions;
wherein the gateway further comprises:
a first network interface connected to the first set of one or more partitions and to the fourth set of one or more partitions, said first network interface being configured to communicate with the first domain, and
a second network interface connected to the second set of one or more partitions and to the third set of one or more partitions, said second network interface being configured to communicate with the second domain.

US Pat. No. 10,462,102

ELECTRONIC MESSAGE ADDRESS ALIASING

Reflexion Networks, Inc.,...

1. A method for managing communications to a true address of a user in a communication network, the method comprising:receiving an outbound communication from a communications infrastructure hosting the true address for the user, the outbound communication directed from the true address to one or more recipient addresses via a respective reply channel associated with the recipient address;
generating an alias address for each one of the recipient addresses of the outbound communication to communicate with the true address;
assigning one of a plurality of discrete security states as a security attribute to each alias address, the plurality of discrete security states including a first security state prohibiting sharing of the respective alias address and a second security state permitting sharing of the respective alias address, wherein the assigned discrete security state controls communications, via the respective reply channel, from one of the recipient addresses of the outbound communication through the communications infrastructure to the true address using a corresponding one of the alias addresses, wherein the assigned discrete security state is indicative of whether the respective recipient address of the outbound communication has permission to share the corresponding one of the alias addresses, and further wherein the security attribute is stored in a server and controllable by the user to alter the assigned discrete security state after sending the outbound communication;
forwarding the outbound communication to the one or more recipient addresses through the communication network;
receiving an inbound communication from a sender different from each one of the recipient addresses, the inbound communication addressed to one of the alias addresses for the true address;
applying one or more rules based on at least a combination of an address of the sender of the inbound communication and the assigned discrete security state, wherein if the assigned discrete security state is the first security state, then the one or more rules include checking to determine if the sender of the inbound communication is permitted to send mail to the one of the alias addresses for the true address; and
processing the inbound communication based on the one or more rules.

US Pat. No. 10,462,098

ENDPOINT DEVICE IDENTIFICATION BASED ON DETERMINED NETWORK BEHAVIOR

1. A method comprising:detecting, by a network device, an endpoint device attempting to access a data network via a data link; and
generating, by the network device, a unique device signature for identifying the endpoint device based on the network device identifying a sequence of link layer data packets transmitted by the endpoint device upon connection to the data link, the unique device signature identifying the endpoint device by device type and identifying a behavior of the endpoint device independent of any link layer address used by the endpoint device.

US Pat. No. 10,462,095

TIME AND SENTIMENT BASED MESSAGING

International Business Ma...

1. A method for time and sentiment based messaging, comprising:obtaining, by a server, information for a set of messages from online social networks related to a specified object, the information comprising at least a user identifier associated with each message, a time of each message, and content of each message;
for each unique identifier, establishing, by the server, an initial message from the set of messages related to the specified object;
analyzing, by the server, each message in the set of messages to determine a sentiment of each message toward the specified object;
building, by the server, a sentiment time line for each unique user identifier using the sentiment of each message toward the specified object;
building, by the server, a time-based sentiment model related to the specified object by overlapping the sentiment time lines for each unique user identifier according to the initial message for each unique user identifier;
identifying, by the server, a sentiment inflection point in the time-based sentiment model, the sentiment inflection point representing a change in the sentiment toward the specified object;
building, by the server, a new sentiment time line for an additional unique user identifier;
overlapping, by the server, the new sentiment time line with the time-based sentiment model according to an initial message for the additional unique user identifier;
predicting, by the server, a change in the sentiment related to the specified object by the additional unique user identifier based on the new sentiment time line, the time-based sentiment model, and the sentiment inflection point; and
generating a message targeting the predicted change in the sentiment related to the specified object by the additional unique user identifier.

US Pat. No. 10,462,093

MESSAGE DATA TRANSFER

Facebook, Inc., Menlo Pa...

1. A method comprising:by a computing device, receiving a request to send data to a user;
by the computing device, selecting a particular delivery channel from a plurality of delivery channels based at least in part on a status of a client device of the user;
by the computing device, determining a first subset of the data for sending to the client device of the user and a second subset of the data for storing at the computing device, wherein the second subset of the data correspond to a portion of the data for subsequent downloading by the user;
by the computing device, in response to the first subset of the data exceeding a message size limit of the particular delivery channel, converting the first subset of the data into a plurality of messages that are based at least in part on capabilities of the particular delivery channel, wherein:
each of the messages conform to the message size limit of the particular delivery channel, and
the messages comprise sequence data describing relationship between each of the messages; and
by the computing device, automatically sending the plurality of messages through the particular delivery channel at a time that is based at least in part on the status of the client device, wherein the sequence data and content of the messages are used to reconstruct the first subset of the data from the plurality of messages at the client device of the user, and wherein the first subset of the data when reconstructed from the plurality of messages at the client device of the user comprises a link to download the second subset of the data from the computing device, and wherein the second subset of the data when downloaded replaces a portion of the first subset of the data.

US Pat. No. 10,462,092

AUTHENTICATING NOTIFICATIONS ON ONLINE SOCIAL NETWORKS

Facebook, Inc., Menlo Pa...

1. A method comprising:by a computing device associated with a social-networking system, providing an application programming interface (API) to an application running on a client system, the API being provided based on a user of the client system being logged in to the social-networking system on the application;
by the computing device, receiving, from the application, a first request, the first request comprising a new messaging token generated by a message-distribution server and stored by the application and a request to register the new messaging token to a user profile of the user on the social-networking system, wherein the new messaging token identifies the client system to the message-distribution server;
by the computing device, sending, to the application, a verification token;
by the computing device, receiving, from the application, a second request, wherein the second request comprises the verification token and context information of the application, wherein the second request was sent by the application using the API, and wherein the context information comprises an indication that the user was logged in to the social-networking system on the application at the time the second request was sent by the application; and
by the computing device, updating, in response to the received first request and the received second request, a registration of the user profile by:
discarding a previously-registered messaging token; and
registering the new messaging token to the user profile.

US Pat. No. 10,462,086

SPLITTING POSTS IN A THREAD INTO A NEW THREAD

International Business Ma...

1. A method for improving social network users' interactions, the method comprising:analyzing content of monitored posts in an original thread of a social networking system to group said monitored posts by topic, wherein a first group of said monitored posts directed to a first topic is posted by a first set of users;
analyzing one or more of past communication patterns and liked pages of said first set of users to determine a likelihood of responding to posts; and
splitting, by a processor, posts in said original thread into a new thread containing said first group of said monitored posts directed to said first topic and having a second set of users of said first set of users to participate in said new thread, wherein each of said second set of users is selected based on said analysis of one or more of said past communication patterns and said liked pages of said first set of users, wherein each of said second set of users has a relationship with one or more users of said second set of users and has a likelihood of responding to a post that exceeds a threshold value.

US Pat. No. 10,462,081

SUBSCRIPTION-BASED MEDIA PUSH SERVICE

1. A system, comprising:a processing system including a processor; and
a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising:
identifying a media content item according to a media consumption criterion of a user;
forwarding a request from a content provider service to equipment of an independent network service provider to access equipment of the user based on the identifying of the media content item; and
obtaining a network address from the equipment of the independent network service provider, wherein the network address is identified by the equipment of the independent network service provider based on an identity of the user, wherein the equipment of the independent network service provider selects a device as a selected device from among a plurality of devices of the equipment of the user based on device capabilities responsive to the request, wherein the media content item is provided to the network address without requiring a request from the plurality of devices of the user, and wherein the selected device obtains the media content item by way of the network address, wherein the media content item comprises a live media content item, and wherein the selected device obtains the media content item by way of the network address for presentation to the user.

US Pat. No. 10,462,079

CONTEXT-AWARE BADGE DISPLAY IN ONLINE COMMUNITIES

Adobe Inc., San Jose, CA...

1. A method, performed by a computing device, for providing badges for display in online interfaces used by online communities, the method comprising:storing badges awarded to one or more users, wherein storing the badges awarded to the one or more users comprises storing badge source information identifying in which online community individual badges were awarded to the one or more users, wherein the online communities are included in a hierarchy of online communities that are related by paths from a website, and the badge source information specifies at least one path of the paths;
identifying a context of an online interface in which a representation of a user will be displayed, the context identifying an online community of the online interface;
determining a related online community that is related to the online community based on positions of the online community and the related online community within the hierarchy of online communities;
identifying a set of badges for display with the representation based on the context and the badge source information, wherein identifying the set of badges comprises identifying badges awarded to the user in the online community and the related online community; and
providing the representation and the set of badges for display in the online interface.

US Pat. No. 10,462,076

SYSTEM, APPARATUS AND METHOD FOR AUTOMATIC ENVIRONMENTAL DATA COLLECTION AND ANALYSIS

CLEARPATH ROBOTICS INC., ...

1. A system for automatic environmental data collection and analysis comprising:an unmanned vehicle associated with a geographical survey entity; and
a server in communication with the unmanned vehicle, comprising:
a processor and a communication interface, the processor configured to:
receive, using the communication interface, a geographic survey request from a first computing device;
determine whether one or more sets of existing geographic survey data stored in a memory is sufficient to satisfy the geographic survey request;
in response to determining the geographic survey request can be satisfied with the one or more sets of existing geographic survey data:
analyze the one or more of the sets of existing geographic survey data to generate a processed geographic survey data; and
transmit, using the communication interface, the processed geographic survey data to the first computing device; and
in response to determining the geographic survey request cannot be satisfied with the one or more of the sets of existing geographic survey data:
translate the geographic survey request into mission data for collecting geographic survey data, wherein the mission data comprises data for instructing the unmanned vehicle to collect the geographic survey data;
transmit, using the communication interface, the mission data to a second computing device associated with the geographic survey entity;
receive, using the communication interface, the geographic survey data collected by the geographic survey entity using the mission data and the unmanned vehicle;
analyze the geographic survey data to generate processed geographic survey data; and,
transmit, using the communication interface, the processed geographic survey data to the first computing device.

US Pat. No. 10,462,074

INLINE POWER SYSTEM AND METHOD FOR NETWORK COMMUNICATIONS

1. An adapter having a pair of ports configured as power sourcing equipment (PSE) for coupling a communications device to a communications network via the pair of ports of the adapter, the communications device for sending and receiving first data in a first communications format, the adapter comprising:a first port of the pair of ports having a device connector having both a first inline power connection and a first data connection for connecting to the communications device to facilitate the communication of the first data in the first communications format and the inline power between the adapter and the communications device, the inline power for use in operating the communications device;
a second port of the pair of ports having a network connector having both a second inline power connection and a second data connection for connecting to a network cable for coupling to the communications network, the second port to facilitate communication of second data in a second communications format and the inline power between the network connector and the network cable, the second port coupled to the first port facilitating conduction of the inline power there-between, the network connector connecting to a pair of conductors of the network cable for receiving both the inline power and the second data formatted in the second communications format, the first communications format different from the second communications format;
a translation module positioned between the first and second ports and connected thereto for processing format transformation between the first data in the first communications format and the second data in the second communications format; and
an on-board power regulator coupled to the inline power for supplying operating power to the translation module by stepping down incoming voltage of the inline power to a level of the operating power;
wherein said first inline power connection and the first data connection are configured as only a single pair of pins for sharing both the conducting of the inline power and the conducting of the first data.

US Pat. No. 10,462,068

SYSTEM AND METHOD FOR TENANT ONBOARDING IN A MULTITENANT APPLICATION SERVER ENVIRONMENT

ORACLE INTERNATIONAL CORP...

1. A system for tenant onboarding in a multitenant application server environment, comprising:one or more computers, comprising an application server environment executing thereon that enables deployment and execution of software applications, wherein the application server environment includes a domain configuration that defines an application server domain for execution of the software applications;
a plurality of resources that can be used within the application server environment;
wherein each tenant environment that is provided by the application server environment is associated with a partition, and wherein each partition is associated with a partition configuration and provides a subdivision of the domain that enables software applications to run within the partition;
wherein a tenant is associated with an identifier and one or more tenant environments that support the use of one or more tenant contexts; and
wherein during onboarding of the tenant to be associated with a particular service and partition as part of a particular tenant environment, the system determines a tenant context for execution of tasks during the onboarding of the tenant, and performs lifecycle operations, within a context of the determined tenant context, to:
configure one or more components of the application server environment, with a partition-specific configuration for use with the particular service and tenant environment, and
associate each particular component, of the one or more components, with the partition according to its partition-specific configuration.

US Pat. No. 10,462,067

PROACTIVE CHANNEL AGENT

International Business Ma...

1. A computer-implemented method for a proactive channel agent structure, comprising executing on a computer processor the steps of:sending individually, to a target queue of a receiving node of a cluster plurality of server nodes, messages of a first batch sequence plurality of messages, each message with a different sequence number indicative of a relative position of the message within the first batch sequence plurality of messages, wherein each of the first batch sequence plurality of messages is associated with a first logic unit of work identifier;
updating a message counter value in response to each receipt by the receiving node of one of the first batch sequence plurality of messages sent to the target queue;
in response to determining that the updated message counter value meets a threshold limit, generating a force commit packet comprising the sequence number of a last one of the first batch sequence plurality of messages sent to the target queue; and
in response to determining that the sequence number of the generated force commit packet data is not a last position number within the first batch sequence plurality of messages, associating a second logic unit of work identifier with a subset sequence plurality of the first batch sequence plurality of messages that comprises a plurality of the first batch sequence plurality of messages having different sequence numbers spanning from a first of the sequence numbers to the sequence number of the generated force commit packet data, and committing the subset sequence plurality of the first batch sequence plurality of messages to the target queue of the receiving node, wherein the second logic unit of work identifier is different from the first logic unit of work identifier.

US Pat. No. 10,462,059

HASH TABLE ENTRIES INSERTION METHOD AND APPARATUS USING VIRTUAL BUCKETS

Intel Corporation, Santa...

1. An apparatus for computing, comprising:one or more computer processors; a storage device coupled to the one or more computer processors; an insertion module communicatively coupled to the one or more processors, to manage insertion of entries into a hash table residing on the storage device, wherein the hash table has a plurality of buckets to hold a plurality of entries, the buckets divided into groups and the groups of buckets are correspondingly associated with a plurality of virtual buckets; and wherein the insertion module is to:
receive a data packet for insertion as an entry into the hash table; apply a hash function to the data packet to determine a virtual bucket associated with the entry; select a first bucket of the group of buckets associated with the virtual bucket; compare respective counters of the group of buckets, wherein the respective counters indicate a number of entries associated with each bucket of the group of buckets; determine, based on the comparison, a second bucket of the group of buckets having a lower counter value; move one or more entries associated with the virtual bucket from the first bucket to the second bucket to balance the number of entries across the group of buckets; and insert the entry into the second bucket.

US Pat. No. 10,462,052

METHOD AND APPARATUS FOR INCREMENTAL DEPLOYMENT OF INFORMATION CENTRIC NETWORK

Futurewei Technologies, I...

1. An electronic device comprising:interface circuitry configured to receive and transmit signals carrying packets; and
processing circuitry configured to:
detect a received packet that includes an Internet protocol (IP) header and an extension header to the IP header, the extension header carrying an information centric networking (ICN) identifier; and
after the received packet is detected,
extract the ICN identifier from the extension header, and
when an interest packet for the ICN identifier is determined to be encapsulated in the received packet and when retrieval of a matched content object with a matching name to the ICN identifier fails, update the received packet to become an updated packet by replacing a source IP address field with an IP address of the electronic device, and forward the updated packet via the interface circuitry.

US Pat. No. 10,462,049

SPANNING TREE IN FABRIC SWITCHES

AVAGO TECHNOLOGIES INTERN...

1. A switch, comprising:port management circuitry configured to:
assign a port identifier to a port of the switch; and
store, in an entry of a port identifier allocation table, the assigned port identifier;
spanning tree management circuitry configured to participate in a spanning tree using the port identifier; and
wherein the port management circuitry is further configured to reassign the port identifier to the port in response to the switch leaving and rejoining the spanning tree, and
wherein the port management circuitry is further configured to store, in the entry of the port identifier allocation table, an interface name of the port and an indicator that indicates whether the entry is an active entry, and wherein the interface name is distinct from the port identifier and the indicator is distinct from the port identifier.

US Pat. No. 10,462,046

ROUTING OF DATA IN NETWORK

International Business Ma...

1. A method for routing data by a node from a plurality of nodes connected by links to form a network, the method comprising:feeding, to a global bus, local traffic information regarding the node, the global bus being provided separately from the links and spread within the network;
obtaining, from the global bus, global traffic information regarding other nodes from the plurality of nodes; and
switching a routing path of the data based on at least the global traffic information regarding the other nodes.

US Pat. No. 10,462,043

METHOD AND APPARATUS FOR APPLYING NESTED NETWORK CORDING IN MULTIPATH PROTOCOL

Samsung Electronics Co., ...

1. A method of communication through a multipath transmission control protocol of a plurality of nodes, the method comprising:acquiring, by a first node communicating with one or more third nodes, information on packets requested by at least one second node, the packets including one or more packets which have been successfully transmitted from the first node and the one or more third nodes to the at least one second node and one or more packets to be transmitted from the first node and the one or more third nodes to the at least one second node;
determining, by the first node, packet combinations for coding at least one packet to be transmitted from the first node to the at least one second node and a transmission sequence of the packet combinations, by using the acquired information on the packets, wherein the transmission sequence of the packet combinations is determined to maximize a coding gain and a throughput; and
transmitting, by the first node to the at least one second node, the packet combinations based on the transmission sequence,
wherein each of the first node and the one or more third nodes includes a base station or an access point,
wherein the at least one second node includes a terminal, and
wherein the determining of the packet combinations comprises:
selecting a first combination of at least one packet, which meets a request of a largest number of the at least one second node;
selecting a second combination of at least one packet, which meets the request of the largest number of the at least one second node among remaining packets except for the at least one packet included in the first combination; and
determining the transmission sequence which maximizes the coding gain and the throughput by controlling transmission sequences of the first combination and the second combination.

US Pat. No. 10,462,040

NON-MINIMUM COST FORWARDING FOR PACKET-SWITCHED NETWORKS

Hewlett Packard Enterpris...

8. A network switch, comprising:a receiving module configured to receive a packet sent from an upstream node, the network switch and the upstream node being adjacent network nodes in a packet-switched network;
a cost determination module configured to determine, for a destination node of the packet, a first data structure storing information of a minimum cost forwarding node adjacent to the network switch and a second data structure storing information of a non-minimum cost forwarding node adjacent to the network switch, wherein the first and second data structures are lookup tables;
a selection module configured to determine, based on a marking on the packet and an ingress port of the packet, an upstream node category indicating whether the upstream node is a non-minimum cost node between a source node and the destination node for the packet; and
a forwarding module configured to:
determine, for the packet, a forwarding node category based on the upstream node category and a set of routing criteria, wherein the forwarding node category indicates whether a forwarding node for the packet is the minimum cost forwarding node or the non-minimum cost forwarding node;
select a data structure from the first and second data structures based on the forwarding node category; and
determine, from the selected data structure, the forwarding node for the packet.

US Pat. No. 10,462,039

DATA NEURAL NETWORK SYSTEM AND METHOD

1. A method of synthesizing a neural network from a communications network containing a plurality of interconnected nodes, where at least one node contains one or more transmitters and one or more receivers, and where each node corresponds to one or more neurons of the neural network comprising:receiving at a first node a communications request from another node of the network;
initiating a time delay, not associated with network congestion, or the processing or emulation of time varying signals, in response to the reception of the communications request, where the time delay is used as a weight function for the corresponding neural network, and is also used to contribute to the overall latency of a possible path traversing multiple nodes across the communications network, where the path would be used for the transport of signals unaltered through modulation or demodulation;
transmitting after the time delay, at least a portion of the communications request to at least a second node of the network to expose the possible path for use by the corresponding neural network; and
selecting by the neural network, a path for the transport of communications, where multiple paths exist, by combining the weights associated with each node of the network traversed by the path, where the nodes only use knowledge of their immediate neighbors and not of the network beyond.

US Pat. No. 10,462,036

LINE RATE ETHERNET TRAFFIC TESTING

Google LLC, Mountain Vie...

1. A method comprising:receiving, at data processing hardware of a network terminal, user data packets from customer premises equipment (CPE) in communication with the network terminal over a communication link, the received user data packets indicating that a CPE-side loopback mode is enabled;
in response to receiving the user data packets from the CPE, enabling, by the data processing hardware, a network terminal-side loopback mode at the network terminal to establish a closed traffic test loop across the communication link between the network terminal and the CPE;
injecting, by the data processing hardware, a number of data bits into the closed traffic test loop until a saturation threshold of the communication link is satisfied, the saturation threshold of the communication link satisfied when the number of data bits circulating in the closed traffic test loop between the CPE and the network terminal in both uplink and downlink directions causes a traffic rate across the communication link to reach a line-rate;
when the number of data bits injected into the closed traffic test loop satisfies the saturation threshold, determining, by the data processing hardware, a packet error-rate of the number of data bits circulating in the closed traffic test loop; and
after determining the packet error-rate, removing, by the data processing hardware, the closed traffic test loop across the communication link between the network terminal and the CPE.

US Pat. No. 10,462,033

IMPLEMENTING A VIRTUAL TAP IN A VIRTUAL TOPOLOGY

Oracle International Corp...

1. One or more non-transitory machine-readable media storing instructions which, when executed by one or more processors, cause:identifying a particular link between a set of virtual topology elements (VTEs) in a virtual topology mapped to one or more links between a set of instantiated elements in a physical topology;
wherein the set of instantiated elements implements the set of VTEs;
identifying, by a first instantiated element of the set of instantiated elements, a first set of data to be transmitted to a second instantiated element of the set of instantiated elements;
executing, by the first instantiated element, a first tapping function, wherein the first tapping function comprises:
replicating the first set of data;
transmitting the replicated first set of data to a first virtual endpoint;
transmitting, by the first instantiated element, the first set of data to the second instantiated element;
identifying, by the second instantiated element, a second set of data that is received from the first instantiated element;
executing, by the second instantiated element, a second tapping function, wherein the second tapping function comprises:
replicating the second set of data;
transmitting the replicated second set of data to a second virtual endpoint;
wherein the replicated first set of data and the replicated second set of data are used to analyze data transmission associated with the particular link between the set of VTEs.

US Pat. No. 10,462,031

NETWORK VISIBILITY FOR COTENANT PROCESSES

Cisco Technology, Inc., ...

1. A method, comprising:tracking, by a network agent associated with an operating system of a computing device, socket connection calls made by a plurality of cotenant processes on the computing device that share a common network transport between the computing device and a remote computing device;
extracting, by the network agent, a process identification (ID) for the socket connection calls, the process ID identifying which particular cotenant process of the plurality of cotenant processes is making each particular socket connection call;
monitoring, by the network agent, network metrics of network traffic flows over socket connections between the computing device and the remote computing device;
attributing, by the network agent, given network metrics from particular socket connections to a corresponding cotenant process based on the correlated process ID for the socket connection; and
reporting, by the network agent, the network metrics as attributed to the corresponding cotenant processes.

US Pat. No. 10,462,024

STATE GENERATION SYSTEM FOR A SEQUENTIAL STAGE APPLICATION

Chicago Mercantile Exchan...

1. A computer implemented method comprising:collecting, at a memory of a computing device having a processor, by the processor, message processing latency information about processing electronic data transaction request messages over a timeframe by an application including a plurality of sequential stages;
presenting, by the processor, in a graphical user interface (GUI) rendered on a display coupled to the computing device, a digital dashboard, the digital dashboard displaying:
for each stage, a stage box representing the stage positioned on a y-axis so as to represent a message processing latency associated with the stage over the timeframe;
an inter-arrival message rate line positioned on the y-axis so as to represent an arrival rate between the electronic data transaction request messages over the timeframe; and
an application box representing the application positioned on the y-axis so as to represent a message processing latency associated with the application over the timeframe; and
in response to detecting a re-positioning of a stage box or the inter-arrival message rate line, displaying, by the processor, on the digital dashboard, the application box at a different position associated with an expected message processing latency.

US Pat. No. 10,462,020

NETWORK DEVICE USER INTERFACE

Cisco Technology, Inc., ...

1. A system comprising:a first interface to receive a request to generate a user interface screen for a selected network device;
a memory to store configuration data of the selected network device;
a processor to generate, using the configuration data of the selected network device, a first user interface screen showing a graphical representation of an internal configuration of the selected network device in each of at least three different abstraction layers from a plurality of different abstraction layers, one of the at least three different abstraction layers including a physical layer representing the internal configuration of the selected device, the physical layer showing a plurality of ports of the selected network device, wherein the graphical representation of the internal configuration includes connection lines between one or more ports of the plurality of ports and each of the different abstraction layers associated with the one or more ports, and the at least three different abstraction layers except for the physical layer are expandable and contractible based on user selection; and
a second interface to send the first user interface screen for output to a display device.

US Pat. No. 10,462,017

NETWORK PROPERTY VERIFICATION IN HYBRID NETWORKS

FUJITSU LIMITED, Kawasak...

1. A method of network property verification in a network, the method comprising:obtaining a property of a network to be verified;
obtaining forwarding rules for a plurality of network devices in the network, the forwarding rules indicative of how the plurality of network devices handle an incoming packet, at least one of the plurality of network devices including at least a first forwarding rule configured to forward an address-based packet and a second forwarding rule configured to forward a variable-length header packet;
generating a graph representation of the forwarding rules in the network, each rule of the forwarding rules independently applicable to address-based packets or variable-length header packets;
assigning transition operations between the plurality of network devices in the graph representation based on the forwarding rules;
assigning, in the graph representation, an atom to one or more links between any of the plurality of network devices that forward packets in a format of the variable-length header packet, the atom representing a range of addresses applicable to one or more of the address-based packets; and
verifying the property of the network using the graph representation to identify any network issue.

US Pat. No. 10,462,013

IMPLEMENTING A SINGLE-ADDRESSABLE VIRTUAL TOPOLOGY ELEMENT IN A VIRTUAL TOPOLOGY

Oracle International Corp...

1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, cause performance of operations comprising:receiving a request for information associated with a virtual topology element (VTE) in a virtual topology;
identifying a plurality of instantiated elements, in a physical topology, that is configured to perform a function associated with the VTE in the virtual topology;
obtaining a set of information from each of the plurality of instantiated elements;
wherein obtaining the set of information from a particular instantiated element of the plurality of instantiated elements comprises:
identifying data received by the particular instantiated element;
determining that a first portion of the data received by the particular instantiated element corresponds to the VTE in the virtual topology, and a second portion of the data received by the particular instantiated element corresponds to another VTE in the virtual topology;
selecting the first portion of the data received by the particular instantiated element to be included in the set of information from the particular instantiated element, without selecting the second portion of the data received by the particular instantiated element to be included in the set of information from the particular instantiated element; and
aggregating the set of information from each of the plurality of instantiated elements to obtain the information associated with the VTE in the virtual topology.

US Pat. No. 10,462,004

VISUALIZATIONS OF STATISTICS ASSOCIATED WITH CAPTURED NETWORK DATA

Splunk Inc., San Francis...

1. A method performed by a configuration server coupled via a network to one or more remote capture agents, the method comprising:receiving one or more event streams from at least one remote capture agent of the one or more remote capture agents, the one or more event streams including timestamped event data generated by the at least one remote capture agent;
determining, based on configuration information associated with the one or more event streams, that the configuration server is to generate one or more statistics based on the timestamped event data received from the at least one remote capture agent without subsequently processing and storing the timestamped event data used to generate the statistics in a data store;
generating the one or more statistics based on the timestamped event data received from the at least one remote capture agent without subsequently processing and storing the timestamped event data used to generate the statistics in a data store; and
causing display of a graphical user interface (GUI) including a graph generated based on the one or more statistics.

US Pat. No. 10,462,002

AUTOMATICALLY DETERMINING REQUIREMENTS FOR PROVISIONING A HOSTED COMPUTING ENVIRONMENT

Splunk Inc., San Francis...

1. A computer-implemented method for provisioning a hosted computing environment according to user-specified input, comprising:causing a graphical interface to be generated on a computing device;
receiving, via the graphical user interface, one or more requirements relating to running a service in a hosted computing environment;
converting the received requirements into corresponding entries populating a provisioning template having a plurality of entries, wherein one or more entries of the provisioning template remain unpopulated after the converting;
automatically determining additional requirements for provisioning the hosted computing environment based on a rule and the received requirements;
populating the unpopulated entries of the provisioning template based on the determined additional requirements to complete the provisioning template, wherein the template specifies hardware or a cloud computing environment configured to meet the requirements; and
providing the provisioning template to a provisioning program to provision the hosted computing environment for the service.

US Pat. No. 10,461,997

INFORMATION PROCESSING DEVICE AND PROGRAM

OMRON Corporation, Kyoto...

1. An information processing device for supporting construction of a network, the network comprising a plurality of units, the plurality of units comprising:an electric power supply unit coupled to ones of the plurality of units connected downstream from the electric power supply unit; and
a connected unit, wherein each of at least some of the ones of the plurality of units connected downstream from the electric power supply unit comprises the connected unit, each of the connected units connected downstream from the electric power supply unit being supplied with electric power from the electric power supply unit by an upstream one of the plurality of units and each of the connected units supply remaining electric power to a connected downstream respective one of the connected units;
the information processing device comprising:
a memory portion storing an amount of electric power consumed by each of the connected units and an amount of electric power suppliable by the electric power supply unit;
a display; and
a processor configured with a program to perform operations comprising:
operation as a configuration portion that virtually configures, in response to an input operation comprising one of: addition of a unit to the plurality of units; and removal of a unit from the plurality of units, the network including the connected units and the electric power supply unit to produce a virtually configured network comprising a virtual configuration of the plurality of units in the network;
operation as a determination portion that determines, for each one of the plurality of units in the virtually configured network, an overage or a shortage of electric power to be supplied to the respective one of the plurality of units, on a basis of the amount of electric power consumed by the respective one of the plurality of units subtracted from the electric power suppliable by the connected unit immediately upstream from the respective one of the plurality of units to produce a determination result; and
operation as a display portion that displays on the display, for each one of the plurality of units in the virtually configured network, a state of the electric power supply that indicates the overage or the shortage of electric power for the respective one of the plurality of units in the virtually configured network, based on the determination result wherein,
the processor is configured with the program to perform operations such that operation as the determination portion comprises operation as the determination portion that determines the electric power suppliable by the connected unit immediately upstream from the respective one of the plurality of units in the virtually configured network based on a sum of the amount of electric power consumed by each of the connected units upstream from the respective one of the plurality of units subtracted from the amount of electric power suppliable by the electric power supply unit.

US Pat. No. 10,461,992

DETECTION OF FAILURES IN NETWORK DEVICES

Amazon Technologies, Inc....

1. A method of monitoring network devices for failures, the method comprising:transmitting packets in a network using a network monitoring agent executing on a server computer;
determining that multiple packets transmitted by the network monitoring agent did not reach respective destination addresses of the multiple packets;
transmitting traceroute packets in order to determine why the multiple packets did not reach the destination addresses;
determining a set of frequencies of last hops associated with the traceroute packets that did not reach the destination addresses;
clustering the set of frequencies into first and second groups, wherein the first group is a high-frequency group of last hops and the second group is a lower-frequency group of last hops;
comparing a most frequent last hop in the first group with another last hop in the second group within the set of frequencies; and
determining a network device associated with the most frequent last hop is defective when its frequency exceeds the other last hop frequencies by a predetermined amount; and
re-routing network traffic around the network device.

US Pat. No. 10,461,983

GUARD INTERVALS FOR WIRELESS NETWORKS

Intel Corporation, Santa...

1. A device, comprising:at least one memory that stores computer-executable instructions; and
one or more processors configured to access the at least one memory, wherein at least one processor of the one or more processors is configured to execute the computer-executable instructions to:
cause to establish, by the device, one or more communication channels between the device and a second device;
determine data to send, by the device, to the second device;
select, by the device, one or more Golay sequences;
determine, by the device, one or more guard intervals on the one or more communication channels based on the one or more Golay sequences, wherein:
each of the one or more guard intervals is based at least in part on one or more delay vectors, and
each of the one or more delay vectors is based at least in part on a length of the one or more guard intervals;
cause to send, by the device, to the second device, the guard intervals; and
cause to send, by the device, to the second device, the data, wherein the data comprises one or more modulation symbols, and the guard intervals are interspersed between the one or more modulation symbols.

US Pat. No. 10,461,977

METHOD FOR DETERMINING RESERVED TONES AND TRANSMITTER FOR PERFORMING PAPR REDUCTION USING TONE RESERVATION

SAMSUNG ELECTRONICS CO., ...


US Pat. No. 10,461,966

SYSTEM AND METHOD FOR INTERFERENCE CANCELATION FROM ONE NUMEROLOGY ON ANOTHER NUMEROLOGY IN MIXED NUMEROLOGIES

Samsung Electronics Co., ...

1. An apparatus, comprising:a memory; and
a processor configured to:
regenerate time domain samples of an interfering data numerology from frequency domain received signals;
perform pre-fast Fourier transform (FFT) processing of a desired data numerology on the regenerated time domain samples of the interfering data numerology;
perform FFT, with a size corresponding to the desired data numerology, on the regenerated time domain samples after performing pre-FFT processing to generate an interfering numerology cancelation signal; and
subtract the interfering numerology cancelation signal from a frequency domain received signal of the desired data numerology to reduce an effect of interference of the interfering data numerology on the desired data numerology.

US Pat. No. 10,461,958

PACKET TRANSMISSION METHOD AND APPARATUS

ZTE CORPORATION, Shenzhe...

1. A packet transmission method, comprising:receiving, by a classifier, a first packet;
determining, by the classifier, a first service function (SF) to which the first packet is to be transmitted;
adding, by the classifier, an address of the first SF to the first packet to obtain a second packet; and
transmitting, by the classifier, the second packet to a network virtualization edge (NVE) node,
wherein determining, by the classifier, the first SF to which the first packet is to be transmitted comprises:
classifying, by the classifier, the first packet according to header information of the first packet;
allocating, by the classifier, a service function path identifier (SFPID) to the first packet according to a classification result and a virtual network identifier (VNID) associated with a source site; and
determining, by the classifier, the first SF according to the SFPID,
wherein the method is performed by at least one processor.

US Pat. No. 10,461,957

SYSTEM AND METHOD FOR SUPPORTING BOTH BULK STORAGE AND ETHERNET COMMUNICATIONS

China Unionpay Co., Ltd.,...

1. A master Multimedia Memory Card/Secure Digital (MMC/SD) apparatus for simultaneously supporting bulk storage and Ethernet communication, the master MMC/SD apparatus comprises:a master MMC/SD interface for providing access to a slave MMC/SD apparatus;
a master MMC/SD interface drive device for controlling transfer of a MMC/SD signal over the master MMC/SD interface;
a master bulk storage device for providing file system service and data management service for bulk storage;
a master communication protocol stack device for achieving the Ethernet communication between the master MMC/SD apparatus and the slave MMC/SD apparatus; and
a master controller for controlling operations of the master MMC/SD interface drive device, the master bulk storage device and the master communication protocol stack device;
wherein the master bulk storage device and the master communication protocol stack device interact with the master MMC/SD interface drive device,
wherein the master bulk storage device and the master communication protocol stack device are arranged to access physical addresses that are independent from each other in the slave MMC/SD apparatus,
wherein the controlling operations performed on the master MMC/SD interface drive device by the master bulk storage device and the controlling operations performed on the master communication protocol stack device by the master bulk storage device are atomic operations,
wherein a concurrent processing mechanism is used to ensure that the controlling operations are atomic operations,
wherein when an Ethernet Emulation Model (EEM) packet is a data packet, a second field in the EEM packet comprises a check status field and a length field, wherein the length field is used to indicate the length of a payload field in the EEM packet, and the check status field is used to indicate whether a Cyclic Redundancy Check (CRC) check of an Ethernet data frame is on or off.

US Pat. No. 10,461,955

SYSTEMS AND METHODS FOR PREEMPTIVELY PREVENTING INTERRUPTIONS FROM NETWORK-CONNECTED DEVICES FROM OCCURRING DURING MEDIA VIEWING

Rovi Guides, Inc., San J...

1. A method for preventing media viewing interruptions, the method comprising:receiving at control circuitry, selection of a media asset for playback from a user;
responsive to the selection of the media asset, receiving, at the control circuitry, from a network-connected device in a home of the user, operation status information of an operation being performed by the network-connected device;
determining, with the control circuitry, a time period for playback of the media asset;
determining, with the control circuitry, a time period to perform the operation, a start time for performance of the operation, and an end time for performance of the operation;
determining that the end time for performance of the operation precedes completion of the time period for the playback of the media asset;
sending, using the control circuitry, a query to a database of network-connected device operation procedures, the query requesting information associated with handling completion of the operation and a condition of the network-connected device associated with the operation completion;
determining, with the control circuitry, based on the operation status information and the respective operation procedure, whether the operation can be extended to terminate after completion of the time period for the playback of the media asset without the operation triggering the condition on the network-connected device;
in response to determining that the operation can be extended, transmitting, using the control circuitry, a command to the network-connected device to extend the operation currently performed by the network-connected device; and
in response to determining that the operation cannot be extended, pausing, using the control circuitry, playback of the media asset, and presenting a notification about the operation being performed by the network-connected device.

US Pat. No. 10,461,944

CHALLENGE-RESPONSE METHOD AND ASSOCIATED COMPUTING DEVICE

IRDETO B.V., Hoofddorp (...

1. A challenge-response method for a computing device, the method being implemented by one or more processors and comprising steps of:receiving challenge data at a secured module of the computing device, the challenge data comprising image content encrypted using an encryption key, and the image content including a nonce;
the secured module recovering the image content through decryption using one or more keys associated with the encryption key;
the secured module of the computing device outputting the recovered image content; capturing the image content as output by the secured module;
processing the captured image content so as to obtain the nonce; and
providing the nonce as a response.

US Pat. No. 10,461,943

TRANSPARENTLY SCALABLE VIRTUAL HARDWARE SECURITY MODULE

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:under the control of a hardware security module (HSM):
obtaining, from a client computer system, a client identity certificate, the client identity certificate being a digital certificate that comprises a client identity public key, the client identity public key associated with a client identity private key;
generating an instance identity certificate, wherein the instance identity certificate comprises an instance identity public key and is digitally signed by a HSM service key and an HSM manufacturer key, the instance identity public key associated with an instance identity private key;
issuing a certificate signing request that includes the instance identity certificate;
establishing a cryptographically protected communication session with the client computer system;
via the cryptographically protected communication session, obtaining a client instance identity certificate (CIIC), wherein validity of the CIIC is verifiable using at least the client identity public key;
using at least the client identity public key to verify that the CIIC is valid and digitally signed using the client identity private key;
generating an instance application certificate, wherein the instance application certificate comprises an instance application public key and is digitally signed by the instance identity private key, the instance application public key associated with an instance application private key;
making the instance application certificate available via the cryptographically protected communication session;
obtaining a client application certificate, wherein the client application certificate comprises a client application public key and is digitally signed by the client identity private key; and
verifying, using at least the client identity public key, the client application certificate is valid and digitally signed using the client identity private key.

US Pat. No. 10,461,938

METHOD FOR MANIPULATION PROTECTION

Robert Bosch GmbH, Stutt...

1. A method for manipulation protection, comprising:receiving a first data packet sent from a first device by a second device, the first data packet including a first time-variant parameter;
determining a first hash value, the first hash value being a hash of program instructions stored in at least one memory device of the second device for operating the second device;
signing with the aid of a private key, assigned to the second device, of an asymmetric encryption method, a concatenation of: (i) the first hash value, (ii) the first time-variant parameter, and (iii) an identification of the second device;
generating a second data packet including the signature and the concatenation of: (i) the first hash value, (ii) the first time-variant parameter, and (iii) the identification of the second device; and
sending the second data packet from the second device to the first device.

US Pat. No. 10,461,936

DATA VERIFICATION

PQ SOLUTIONS LIMITED, Lo...

1. A method comprising:receiving, at a processor, code data defining a two-dimensional code including graphical elements representing an image of one or more visible, distinctive and measurable features of a user to identify the user;
retrieving, at the processor, verification data associated with the user, the verification data comprising a manipulated version of source data, wherein the source data is a version of the image in the two-dimensional code;
calculating, at the processor, a first cryptographic hash value from at least the graphical elements of the image from the received code data;
calculating, at the processor, a second cryptographic hash value from the verification data;
verifying, at the processor, the code data based on a comparison of the first cryptographic hash value with the second cryptographic hash value, whereby the calculated first and second cryptographic hash values satisfy a defined correspondence relationship; and
generating, at the processor, output data based on the verification to determine access to a security restricted area.

US Pat. No. 10,461,926

CRYPTOGRAPHIC EVIDENCE OF PERSISTED CAPABILITIES

HEWLETT PACKARD ENTERPRIS...

1. A system comprising:a processing resource connected to a globally shared memory and additional processing resources via a fabric; and
a non-transitory machine readable medium storing instructions that, when executed, cause the processing resource to:
in response to a request from one or more processes executing on the processing resource and invoking a persisted capability stored in the globally shared memory, determine whether to trust the persisted capability by verification of cryptographic evidence accompanying the persisted capability, wherein the persisted capability stored in the globally shared memory is a second persisted capability;
store a local capability into the globally shared memory as a first persisted capability;
extend a trust domain of the local capability to the first persisted capability via cryptographic evidence of authenticity and integrity of the first persisted capability; and
load the persisted capability upon the determination to trust the persisted capability based on successful verification,
wherein the persisted capability is a token of authority employed by the system to provide the one or more requesting processes assess to system resources.

US Pat. No. 10,461,924

FORMAT-PRESERVING CIPHER

ZETTASET, INC., Mountain...

1. A method of format-preserving ciphering, comprising the steps of:(a) providing predetermined criteria for selecting a portion of data to be ciphered;
(b) providing a forward mapping from N allowable ciphertext values to an integer set {0 . . . N?1}, and a corresponding reverse mapping from said integer set {0 . . . N?1} to corresponding said N allowable ciphertext values, said allowable ciphertext values being non-contiguous;
(c) iteratively accessing said portion in increments of size S bits, where S is set according to a downstream business process utilizing said format-preserving ciphering;
(d) generating a key-stream by utilizing a block cipher based on advanced encryption standard (AES) operating in CTR stream mode;
(e) providing said key-stream and iteratively accessing it in increments of said size S bits;
(f) determining a limiter value L as the difference of 2s and (2s modulo N);
(g) ignoring in said ciphering any said accessed key-stream value in said size S bits, if said key-stream value is greater than or equal to said limiter value L;
(h) allowing zero or more combinations of said S bits in said portion to be skipped from said ciphering;
(i) encrypting said portion in an encryption module by taking the sum of said forward mapping of said accessed portion in (c) above and modulo N of said accessed key-stream value in (e) above, taking modulo N of said sum to produce a final sum, and taking said reverse mapping of said final sum; and
(j) decrypting said portion in a decryption module by taking the difference of said forward mapping of said accessed portion in (c) above and modulo N of said accessed key-stream value in (e) above, taking modulo N of said difference, if said difference is less than 0 then adding N to said difference to produce a final difference, and taking said reverse mapping of said final difference.

US Pat. No. 10,461,923

MULTIVARIATE SIGNATURE METHOD FOR RESISTING KEY RECOVERY ATTACK

1. A multivariate signature method for resisting Key Recovery Attack, characterized in that, the method comprises the steps of:Step 1: selecting system parameters:
Taking a finite field F, positive integers n and m, a n-th extended field of F as Fn, a m-th extended field of F as Fm, taking a set of multivariable quadratic polynomial equations q1(x1, . . . , xn), . . . , qm(x1, . . . , xn) from Fn to Fm which is recorded as Q and then Q represents a center mapping of multivariate public key cryptographic system, where an input variable is n and an output variable is m, using Q?1 for the inverse polynomial of polynomial Q, where Q?1 is held by a legitimate user, taking another reversible affine transformation S and T on Fn and Fm as a secret key and their inverse polynomials are recorded as S?1 and T?1 respectively, then randomly selecting a set of n number n-quaternary multivariable polynomial equations (g1(x1, . . . , xn), . . . , gn(x1, . . . , xn)) on Fn, where its polynomial vector is recorded as G, that is G(x1, . . . , xn),=(g1(x1, . . . , xn), . . . , gn(x1, . . . , xn)), and two unidirectional irreversible polynomial equations set H and H, wherein a user secret key consists of three parts, S, T and G, wherein H and H are secret selection of a credible third party which is only used for generating public key, where the inverse polynomial of G is expressed as G?1, the corresponding public key consists of five polynomials, which are: P=T?Q?S, H?G?1?S, H?S, H?Q?G?1?S, H?T?1 respectively, where the operator ? represents a synthesis of operation, which is, processing substituting calculation from left to right in order;
Step 2: generating signature:
a coding of a known message M is vector (u1, . . . , um) which is recorded as u, a signature is generated by the following steps:
(2.1) generating a forward signature:
(2.1a) substituting u=(u1, . . . , um) which is the coding of message M into T?1 by the secret key T?1, obtaining (y1, . . . , ym), which is recorded as y;
(2.1 b) substituting the obtained result y into the inverse polynomial Q?1 of the center mapping Q, obtaining (x1, . . . , xn), which is recorded as x;
(2.1c) substituting the obtained result x into the inverse polynomial S?1 of the secret key S, obtaining (v1, . . . , vn), which is recorded as v, then v is the forward signature of the coding u of the message M;
(2.2) generating a backward signature:
(2.2a) substituting the obtained result x into the secret key G, obtaining G(x1, . . . , xn),=(g1(x1, . . . , xn), . . . , gn(x1, . . . , xn))=(g1, . . . , gn), which is recorded as g;
(2.2b) substituting the obtained result g into the inverse polynomial S?1 of the secret key S, obtaining S?1(g)=S?1?G(x)=(vg1, . . . , vgn), which is recorded as vg, then vg is the backward signature of the coding u of the message M;
(2.3) processing a cascade of the forward signature and the back signature v?vg, which is the signature of the coding u of the message M;
Step 3, verifying the signature:
(3.1) using public key P to process verification:
(3.1a) substituting the forward signature v=(v1, . . . , vn) into the public key P, obtaining P(v1, . . . , vn)=(p1(v1, . . . , vn), . . . , pm(v1, . . . , vn)), obtaining and recording results as u?=(u?1, . . . , u?n);
(3.1b) determining if u? equals to the coding u of the original message M;
(3.2) using public key H?S and H?G?1?S to process verification:
(3.2a) substituting the forward signature v=(v1, . . . , vn) into the public key H?S, obtaining H?S(v)=H?S(v1, . . . , vn)=H(S(v1, . . . , vn)), and recording obtained results as h=(h1, . . . , hn);
(3.2b) substituting the backward signature vg=(vg1, . . . , vgn) into the public key H?G?1?S, obtaining H?G?1?S(vg)=H?G?1?S(vg1, . . . , vgn)=H(G?1(S(vg1, . . . , vgn))), and recording obtained results as h?=(h?1, . . . , h?n);
(3.2c) determining if h and h? are equal;
(3.3) using public key H?Q?G?1?S and H?T?1 to process verification:
(3.3a) for the coding u of the message M, substituting u into the public key H?T?1, obtaining H?T?1(u)=H(T?1(u)), and recording obtained results as h=(h1, . . . , hn);
(3.3b) for the backward signature vg, substituting vg into the public key H?Q?G?1?S, obtaining H?Q?G?1?S(vg)=H(Q(G?1(S(vg)))), recording obtained results as h?=(h?1, . . . , h?n);
(3.3c) determining if h and h? are equal;
if (3.1b), (3.2c) and (3.3c) are true, then v?vg is a legitimate signature of the coding u of the message M, otherwise, the signature is invalid and rejected.

US Pat. No. 10,461,922

METHOD AND SYSTEM FOR PROTECTING A CRYPTOGRAPHIC OPERATION

1. A device for executing an operation of a cryptographic scheme, said operation being applied to a given current state of a data block of original data, said operation being defined in a basis ring corresponding to the quotient of a starting ring by a basis ideal generated by at least one element of the starting ring, wherein said device comprises:one or more processors configured to:
execute the operation from a state derived from said current state of the data block, in at least one reference ring, which provides a reference value for each reference ring, each reference ring being the quotient of said starting ring by a reference ideal, and
execute the operation from said state derived from said current state of the data block in at least one extended ring corresponding to one or more of said reference rings, which provides at least one extension value for each extended ring, each extension value comprises one or more bytes, each extended ring being the quotient of the starting ring by the product of the basis ideal and of the reference ideals of said one or more corresponding reference rings,
determine the result of said operation from at least one of the reference values and/or of the extension values depending on the verification of a condition between the reference value obtained for each reference ring and the extension values obtained for the extended rings corresponding to said reference ring,
map each byte of said at least one extension value to an element of the basis ring, in response to the verification of said condition, for at least one extension value, which provides a mapped value corresponding to said at least one extension value.

US Pat. No. 10,461,921

APPARATUS AND METHOD FOR CLOCK RECOVERY

PHOTONIC TECHNOLOGIES (SH...

1. An apparatus comprising:a plurality of sampling circuits configured to generate a plurality of sampled signals by sampling a data signal according to different clock signals, the different clock signals comprising a first clock signal, a second clock signal, and a third clock signal;
a first delay buffer coupled to a first one of the plurality of sampling circuits, the first delay buffer configured to provide the second clock signal based on the first clock signal, wherein the second clock signal has a first delay of 180 degrees with respect to the first clock signal;
a second delay buffer coupled to a second one of the plurality of sampling circuits, the second delay buffer configured to provide the third clock signal, wherein the third clock signal has a second delay with respect to the second clock signal, the second delay being between zero degree and 180 degrees;
a synchronization circuit coupled to the plurality of sampling circuits, wherein the synchronization circuit is configured to provide a plurality of synchronized signals based on the plurality of sampled signals and one of the different clock signals, wherein a time duration between any two transition edges corresponding to any two of the plurality of synchronized signals is equal to an integer number of a clock period, wherein the clock period is inverse of a frequency of the one of the different clock signals, and wherein one of the any two transition edges is a rising edge or a falling edge; and
a signal generator coupled to the synchronization circuit, wherein the signal generator is configured to generate a recovered clock signal based on the plurality of synchronized signals, a frequency of the recovered clock signal being within a threshold range associated with a frequency of the data signal or a division of the frequency of the data signal.

US Pat. No. 10,461,920

DIGITAL OVERSAMPLING CLOCK AND DATA RECOVERY CIRCUIT

SILICON LABORATORIES INC....

1. An apparatus comprising:an analog front end to receive a digital input, the analog front end to output a data stream from the digital input;
a first counter to count a first count value corresponding to a first duration of a sample of the data stream responsive to detection of a first edge in the data stream, wherein the first counter is to be asynchronously reset responsive to the first edge detection;
a second counter to count a second count value corresponding to a second duration of another sample of the data stream responsive to detection of a second edge in the data stream, wherein the second counter is to be asynchronously reset responsive to the second edge detection;
a filter to filter a count value obtained based at least in part on the first count value and the second count value; and
a digitally controlled oscillator to generate a recovery clock signal from the filtered count value.

US Pat. No. 10,461,917

SERIALIZER/DESERIALIZER (SERDES) LANES WITH LANE-BY-LANE DATARATE INDEPENDENCE

Cavium, LLC, Santa Clara...

1. A circuit on a chip for serial data applications, the circuit comprising:a common phase-locked loop (PLL) having a multiplying factor, the common PLL configured to produce an on-chip reference clock signal; and
a serializer/deserializer (SerDes) lane, the SerDes lane including a fractional-N (frac-N) PLL, the frac-N PLL including an out-of-band parasitic pole, the on-chip reference clock signal distributed to the frac-N PLL, the multiplying factor in combination with the out-of-band parasitic pole configured to suppress quantization noise introduced by modulating the frac-N PLL.

US Pat. No. 10,461,913

INDICATION INFORMATION TRANSMISSION METHOD AND APPARATUS

HUAWEI TECHNOLOGIES CO., ...

1. A network device, comprising:a processor; and
a non-transitory computer readable storage medium storing a program for execution by the processor, the program including instructions to:
determine a first signature sequence and a first modulation constellation for transmitting a first downlink data stream to a terminal device;
generate a first signal by performing amplitude and phase adjustment, using the first signature sequence, on a modulation symbol obtained after performing constellation mapping on the first downlink data stream using the first modulation constellation;
determine one or more second signature sequences and one or more second modulation constellations for transmitting a second downlink data stream, wherein the second downlink data stream is one or more downlink data streams other than the first downlink data stream, that are carried on a time-frequency resource used by the first downlink data stream, wherein the first signature sequence and the one or more second signature sequence are multi-dimensional complex-number vectors comprising at least one zero element and at least one non-zero element;
determine indication information indicating the first signature sequence, the first modulation constellation, the one or more second signature sequences, and the one or more second modulation constellations;
transmit the indication information to the terminal device in a second signal separate from the first signal; and
transmit the first signal to the terminal device, wherein transmitting the first signal and the second signal to the terminal device causes the terminal device to determine the first signature sequence, the first modulation constellation, the one or more second signature sequences, and the one or more second modulation constellations from the received second signal and to decode the first signal according to the according to the first signature sequence, the first modulation constellation, the one or more second signature sequences, and the one or more second modulation constellations.

US Pat. No. 10,461,909

INFRASTRUCTURE EQUIPMENT, COMMUNICATIONS DEVICE AND METHODS

SONY CORPORATION, Tokyo ...

12. A method of operating a terminal device used for communicating with a wireless communication network, the terminal device comprising a transceiver, wherein the method comprises:receiving one or more signals from the wireless communication network via terminal plurality of antenna ports, and wherein the signals comprise a plurality of physical resource blocks, and a same beamforming weight vector is applied to at least a subset of the received plurality of physical resource blocks; and
receiving mapping information from the wireless communication network, the mapping information informing the terminal device that a plurality of the antenna ports and/or physical resource blocks have a common beamforming weight vector.

US Pat. No. 10,461,907

METHOD FOR DETERMINING POWER BOOSTING LEVEL OF PTRS FOR REMOVING PHASE NOISE IN WIRELESS COMMUNICATION SYSTEM AND DEVICE THEREFOR

LG ELECTRONICS INC., Seo...

1. A method for transmitting, by a base station (BS) in a wireless communication system, a phase tracking reference signal (PTRS) to a user equipment (UE) so as to enable receiver phase tracking by the UE, the method performed by the BS and comprising:generating the PTRS; and
transmitting the PTRS to the UE based on a PTRS power boosting level, the PTRS power boosting level being determined by the BS based on a number of Physical Downlink Shared Channel (PDSCH) layers associated with the PTRS.

US Pat. No. 10,461,906

METHOD FOR SETTING REFERENCE SIGNAL IN MULTI-CELL BASED WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR

LG ELECTRONICS INC., Seo...

1. A method for reporting channel status information (CSI) to a base station (BS) by a user equipment (UE) in a wireless communication system, the method comprising:receiving, via a radio resource control (RRC) layer, information about a CSI process comprising a plurality of channel status information-reference signal (CSI-RS) configurations and a plurality of channel status information-interference measurement (CSI-IM) configurations; and
reporting, to the BS, the CSI based on one of the plurality of CSI-RS configurations and one of the plurality of CSI-IM configurations,
wherein the plurality of CSI-IM configurations have one to one linkage with the plurality of CSI-RS configurations.

US Pat. No. 10,461,904

METHOD, APPARATUS, AND DEVICE FOR DETERMINING MODULATION AND CODING ORDER

Huawei Technologies Co., ...

1. A method for determining a modulation and coding order, the method comprising:determining, by a network device, a quantity K of terminal devices that reuse a first time-frequency resource in a first time period to receive downlink data from the network device, wherein K?2;
determining, by the network device, a signal to interference plus noise ratio (SINR) of a channel, wherein the channel is a channel based on the first time-frequency resource, and the channel is used to transmit the downlink data between the network device and a first terminal device in the first time period;
determining, by the network device, a quantity of first acknowledgement messages and a quantity of first negative acknowledgement messages, wherein the first acknowledgement messages are acknowledgement messages sent by the first terminal device to the network device in a HARQ process for the downlink data, and the first negative acknowledgement messages are negative acknowledgement messages sent by the first terminal device to the network device in the HARQ process;
determining, by the network device, a channel quality indicator (CQI), wherein the CQI is determined according to the SINR of the channel, the quantity K of the terminal devices, the quantity of the first acknowledgement messages, and the quantity of the first negative acknowledgement messages; and
determining, by the network device, a Modulation and Coding scheme (MCS) of the first terminal device according to the CQI.

US Pat. No. 10,461,901

METHOD AND DEVICE FOR TRANSMITTING DATA FOR PLURALITY OF STATIONS THROUGH PLURALITY OF BANDS IN WIRELESS LAN SYSTEM

LG ELECTRONICS INC., Seo...

1. A method for transmitting a signal in a wireless LAN, comprising:allocating, by an access point (AR) including in a first basic service set (BSS), a first frequency band and a second frequency band,
wherein a non-contiguous band exits between the first and second frequency band,
wherein the non-contiguous band is overlapped with a hearable interfering source that canbe received from a second BSS, andwherein the second BSS is an overlapping basic service set (QBSS) for the first BSS: and
transmitting, by the AR, a first signal to a first station through the first frequency band and a second signal to a second station through the second frequency band,
wherein a first leftover tone is inserted in a resource unit (RU) closest to the non contiguous band in the first frequency band,
wherein a second leftover tone is inserted in a RU closest to the non-contiguous band inthe second frequency band,wherein the first and second leftover tones have 8 tones respectively,
wherein a first frequency resource through which the first signal is transmitted in the first frequency band has 234 tones, and
wherein a second frequency resource through which the second signal is transmitted in the second frequency band has 234 tones.

US Pat. No. 10,461,894

TRANSMISSION CONTROL METHOD FOR HARQ IN MOBILE COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A method by a terminal, the method comprising:receiving downlink control information on a physical downlink control channel (PDCCH) for a cell-radio network temporary identifier (C-RNTI) of the terminal;
receiving a transport block (TB) based on the downlink control information;
determining, based on a reset of a medium access control (MAC) entity being requested, whether the TB is received after the reset of the MAC; and
determining, in case that the TB is received after the reset of the MAC entity, a new data indicator (NDI) of the downlink control information to have been toggled regardless of a value of the NDI.

US Pat. No. 10,461,893

DATA AND CONTROL MULTIPLEXING IN PUSCH IN WIRELESS NETWORKS

TEXAS INSTRUMENTS INCORPO...

15. A user equipment (UE) comprising;circuitry for receiving data and control multiplexed bits g0, g1, g2, . . . , gH??1;
circuitry for receiving rank indicator bits q0RI, q1RI, q2RI, . . . , qQ?RI?1RI;
circuitry for receiving ACK/NACK bits q0ACK, q1ACK, q2ACK, . . . , qQ?ACK?1ACK;
circuitry for performing interleaving by constructing a matrix of Cmax=NsymbPUSCH columns wherein rank indicator bits are written onto the columns numbered {1, 4, 7, 10} for a normal cyclic prefix (CP) configuration and columns numbered {0, 3, 5, 8} for an extended CP configuration and ACK/NACK bits are written onto the columns numbered {2, 3, 8, 9} for a normal cyclic prefix (CP) configuration and columns numbered {1, 2, 6, 7} for an extended CP configuration;
circuitry for forming an output of the interleaver by reading off the matrix column by column;
circuitry for modulating the bit sequence and inserting reference signals; and
circuitry for transmitting the modulated bits and reference signals using one or more slots and one or more layers.

US Pat. No. 10,461,892

LOW LATENCY COMMUNICATIONS

Oracle International Corp...

1. A method, comprising:initiating a communication session with a remote device;
transmitting a plurality of message packets to the remote device;
determining whether any additional message packet is scheduled to be transmitted to the remote device;
appending, based on the determining, two or more loss detection packets to a last message packet and transmitting the last message packet and the loss detection packets to the remote device, wherein the lost detection packets comprise transmission control protocol/internet protocol (TCP/IP) layer lost detection packets;
determining whether the last message packet was successfully received by the remote device based on receiving one or more acknowledgment messages; and
executing a retransmit of the last message packet when the last message packet was not successfully received, wherein it is determined that the last message packet was not successfully received when at least three acknowledgment messages that identify a message immediately previous to the last message packet are received.

US Pat. No. 10,461,887

METHODS AND SYSTEMS FOR BLIND DETECTION WITH POLAR CODE

HUAWEI TECHNOLOGIES CO., ...

1. A method for encoding, the method comprising:generating a codeword intended for a recipient user equipment (UE) using an encoder for a polar code, an input vector to the encoder including a UE-specific frozen sequence in a selected subset of frozen bit positions and further including data for transmission in information bit positions, the UE-specific frozen sequence being associated with the recipient UE;
wherein the selected subset of frozen bit positions is selected from frozen bit positions that occur after a first information bit position; and
transmitting the codeword.

US Pat. No. 10,461,885

TRANSMISSION APPARATUS, COMMUNICATION SYSTEM, AND TRANSMISSION METHOD

Sony Corporation, Tokyo ...

1. A transmission apparatus, comprising:a communication circuitry configured to
transmit a signal to a reception apparatus via a first signal line, the reception apparatus being AC-coupled to the transmission apparatus via the first signal line, and
transmit a first control signal to the reception apparatus via a second signal line that is different than the first signal line; and
a communication control circuitry configured to
control transmission of the signal to the reception apparatus,
determine whether the transmission of the signal to the reception apparatus will be restored from a suspended state,
responsive to determining that the transmission of the signal to the reception apparatus will be restored from the suspended state, control the communication circuitry to transmit the first control signal via the second signal line, and
control the communication circuitry to transmit a charging signal that charges an AC coupling capacitance serially connected to the first signal line via the first signal line before a timing when the transmission of the first control signal is ended.

US Pat. No. 10,461,884

SERVER SELECTED VARIABLE BITRATE STREAMING

COMCAST CABLE COMMUNICATI...

1. A method comprising:receiving a request for a portion of a content item at a first bitrate, wherein the request comprises a first identifier associated with the portion of the content item at the first bitrate;
determining, based on at least one network heuristic and independently from the first bitrate, a second bitrate from a plurality of bitrates associated with the portion of the content item;
determining, based on the first identifier and the second bitrate, a second identifier associated with the portion of the content item at the second bitrate;
sending, to a user device, the portion of the content item at the second bitrate, wherein the portion of the content item at the second bitrate is associated with the first identifier; and
sending, to the user device via a server push, a subsequent portion of the content item at the second bitrate.

US Pat. No. 10,461,883

COMMUNICATION LINK ADJUSTMENTS IN WIRELESS NETWORKS BASED UPON COMPOSITE LQI MEASUREMENTS

NXP USA, Inc., Austin, T...

1. A method to adjust a communication link for a network node in a wireless network, comprising:receiving packet communications through a wireless communication link from a separate network node within a wireless network;
measuring signal strength for the received packets to produce signal strength measurements;
measuring signal quality for the received packets to produce signal quality measurements;
generating composite LQI (link quality indicator) measurements for the received packet communications based upon the signal strength measurements and the signal quality measurements, wherein each composite LQI is generated by applying a first weight to the signal strength measurement and a second weight to the signal quality measurement and combining the weighted signal strength measurement with the weighted signal quality measurement; and
adjusting the wireless communication link based upon the composite LQI measurements.

US Pat. No. 10,461,882

OPTICAL NETWORK UNIT FOR OPTICAL TRANSMISSION IN BURST MODE

ELECTRONICS AND TELECOMMU...

1. An optical network unit (ONU) comprising:an electro-absorption modulated laser (EML) transmitter comprising a laser diode (LD) and configured to transmit an uplink optical signal through the LD;
an electro-absorption modulator (EAM) driver integrated circuit (IC) (EAM driver IC) configured to amplify an uplink data signal and provide the amplified data signal to the EML transmitter;
an LD burst-mode driving circuit configured to control an operation of turning on or off the LD based on a burst-enable signal; and
a media access control (MAC) configured to transmit the data signal to the EAM driver IC and transmit the burst-enable signal to the LD burst-mode driving circuit,
wherein the LD burst-mode driving circuit comprises:
an operational amplifier (OPAMP) configured to compare an input voltage value and a set voltage value and control the voltage values to be equal;
a current monitoring IC configured to monitor a current value flowing to the EML transmitter and convert the current value to a voltage, and then input the voltage to the OPAMP as the input voltage value;
a first transistor configured to receive the set voltage value from an MCU and receive the burst-enable signal from the MAC, and then input the set voltage value to the OPAMP; and
a second transistor configured to receive a signal output from the OPAMP and allow a current to flow to the EML transmitter.

US Pat. No. 10,461,880

FLEXIBLE GRID OPTICAL SPECTRUM TRANSMITTER, RECEIVER, AND TRANSCEIVER

Ciena Corporation, Hanov...

1. A flexible grid optical transmitter communicatively coupled to an optical network, the flexible optical transmitter comprising:a coherent optical transmitter configured to generate a signal modulated with a configured modulation format at a respective center frequency on an optical spectrum and spanning n bins about the respective center frequency, wherein n is an integer greater than 1, wherein the coherent optical transmitter is configured to tune across the optical spectrum to the respective center frequency and to use the n bins based on the configured modulation format, and wherein the n bins is an amount of the optical spectrum needed based on the configured modulation format,
wherein the respective center frequency and the n bins are specified to the coherent optical transmitter by a management system for Operations, Administration, Maintenance, and Provisioning (OAM&P) functions.

US Pat. No. 10,461,879

DEVICE AND METHOD FOR TRANSMITTING WAVELENGTH DIVISION MULTIPLEXED OPTICAL SIGNAL

FUJITSU LIMITED, Kawasak...

1. An optical transmission device, comprising:a first optical amplifier configured to amplify a wavelength division multiplexed optical signal received via an optical fiber;
a wavelength selective switch configured to control optical powers of respective wavelength channels multiplexed in the wavelength division multiplexed optical signal that is amplified by the first optical amplifier;
a second optical amplifier configured to amplify the wavelength division multiplexed optical signal output from the wavelength selective switch;
an optical channel monitor configured to detect optical powers of respective wavelength channels multiplexed in the wavelength division multiplexed optical signal; and
a processor configured to:
control a gain of the first optical amplifier based on initial setting information,
calculate an average optical power of the plurality of wavelength channels multiplexed in the wavelength division multiplexed optical signal that is amplified by the first optical amplifier based on the optical powers detected by the optical channel monitor, and
correct the gain of the first optical amplifier such that the average optical power of a plurality of wavelength channels multiplexed in the wavelength division multiplexed optical signal that is amplified by the first optical amplifier approaches a target level after a specified period of time has elapsed from when the gain of the first optical amplifier is controlled based on the initial setting information.

US Pat. No. 10,461,874

OPTICAL LINE TERMINAL EFFICIENTLY UTILIZING MULTILANE AND PASSIVE OPTICAL NETWORK COMPRISING THE OPTICAL LINE TERMINAL

ELECTRONICS AND TELECOMMU...

1. A method of transmitting, by an optical line terminal (OLT) including a first queue and a second queue, a user frame, the method comprising:storing the user frame in the first queue of the OLT, the first queue corresponding to an optical network unit (ONU) that receives the user frame;
transmitting the user frame stored in the first queue to the second queue of the OLT;
storing the transmitted user frame in the second queue of the OLT, the second queue corresponding to a transmission rate supported by the ONU; and
outputting an envelope payload stored in the second queue to a lane that connects the OLT and the ONU, according to whether the lane is in use,
wherein the storing of the user frame in the first queue comprises:
generating a hash value from a destination address included in the user frame;
searching a table that stores a physical layer identifier (PLID) of the ONU based on the hash value, and acquiring the PLID of the ONU; and
storing the user frame in the first queue corresponding to the acquired PLID.

US Pat. No. 10,461,873

DISAGGREGATED HYBRID OPTICAL TRANSPORT NETWORK, INTERNET PROTOCOL, AND ETHERNET SWITCHING SYSTEM

Fujitsu Limited, Kawasak...

1. An optical transport network (OTN), Internet Protocol (IP), and Ethernet switching system comprising:an Ethernet fabric including a set of M Ethernet switches each comprising a set of N switch ports, wherein a variable i having a value ranging from 1 to M to denote the ith Ethernet switch of the set of M Ethernet switches and a variable j having a value ranging from 1 to N to denote the jth switch port of the set of N switch ports;
a set of O input/output (IO) devices each comprising:
a set of M Ethernet ports, wherein a variable u having a value ranging from 1 to O to denote the uth IO device of the set of O IO devices, and wherein the jth Ethernet port of the uth IO device is connected to the uth switch port of the ith Ethernet switch;
an IO side packet processor (IOSP) configured to:
establish a set of M hierarchical virtual output queues (H-VOQs) each comprising a set of N ingress-IOSP queues (I-IOSPQs) and I-VOQs;
create M virtual lanes (v-lanes) including a first v-lane and a second v-lane, each of the M v-lanes corresponds to a respective H-VOQ of the set of M H-VOQs;
create A equal cost multi-path (ECMP) pipes including B ECMP pipes and C ECMP pipes, each of the A ECMP pipes connects to one of the M v-lanes, each of the B ECMP pipes connects to the first v-lane, and each of the C ECMP pipes connects to the second v-lane;
generate micro-flows by 5-Tuple look-up based on packet header information of a received IP packet and an I-IOSP forwarding information base (FIB);
distribute the micro-flows into the A ECMP pipes; and
queue the IP packet including first metadata to an I-IOSPQ of an H-VOQ corresponding to an egress IO device and a switch number of a corresponding Ethernet switch based on the micro-flows and an identified micro-flow for an ECMP hash key in a ECMP pipe hash of the IOSP.

US Pat. No. 10,461,872

METHODS FOR TRANSPORTING DIGITAL MEDIA

Audinate Pty Limited, Ul...

1. A data network suitable for transporting at least one of audio and video packets, the network comprising:a master clock device to generate a system time signal for the network;
a plurality of network devices interconnected such that the network devices can send at least one of audio and video packets to other network devices, and to receive at least one of audio and video packets from other network devices;
wherein at least one network device is configured to receive at least one of audio and video signals from a media device and to transmit at least one of audio and video signals to a media device; and
wherein, the network devices are coupled to the master clock device and use the system time signal and a network time protocol to generate a local clock signal synchronised to the system time signal for both rate and offset, the local clock signal governing both the rate and offset of the received or transmitted at least one of audio and video signals.

US Pat. No. 10,461,869

METHOD FOR DOWNLINK POWER TESTS, TEST SYSTEM AS WELL AS TEST SETUP

1. A method for downlink power tests of a device under test using a test system comprising a signal generator, a control unit and a test chamber having a quiet zone, the method comprising:arranging said device under test in said quiet zone;
generating a downlink signal with a predefined downlink power level in said quiet zone by said signal generator;
measuring in a first test phase a first absolute power level received by said device under test and transmitting said measured first power level to said control unit;
determining by said control unit whether said measured first power level lies within a predefined first range around said predefined downlink power level,
if said measured first power level lies within a predefined first range, repeatedly measuring subsequent power levels received by said device under test in a second test phase and transmitting said measured subsequent power levels to said control unit; and
determining by said control unit whether said measured subsequent power levels lie within a predefined second range around the measured first power level with respect to the current downlink power level.

US Pat. No. 10,461,868

SYSTEMS AND METHODS FOR REDUCING UNDESIRABLE BEHAVIORS IN RF COMMUNICATIONS

CalAmp Wireless Networks ...

1. A vehicle telematics device, comprising:a processor;
a transceiver coupled to the processor to receive data to be transmitted;
an amplifier coupled to the transceiver to receive a transceiver output signal, the amplifier coupled to the processor to receive an amplification control signal to control the amplification of the transceiver output signal by the amplifier; and
a memory coupled to the processor, the memory storing a transmission control application;
wherein the transmission control application directs the processor to:
format the data, including prepending a buffer signal to the data before data modulation begins, to be transmitted by the transceiver;
generate the amplification control signal;
direct the amplifier to sequentially amplify the transceiver output signal based on the amplification control signal;
transmit the formatted data; and
direct the amplifier to sequentially de-amplify the transceiver output signal based on the amplification control signal;
wherein the transmission control application further directs the processor to dynamically adjust the sequential amplification and the sequential de-amplification of the amplifier based upon monitored conditions of the transceiver.

US Pat. No. 10,461,867

TRANSIMPEDANCE AMPLIFIER FOR HIGH-SPEED OPTICAL COMMUNICATIONS BASED ON LINEAR MODULATION

KNOWLEDGE DEVELOPMENT FOR...

1. An optical receiver circuit (200) comprising:at least one photo detector (207) configured to convert a received light signal to an input current signal,
a transimpedance amplifier circuit (201) with an input to receive the input current signal from the at least one photo detector (207) and being configured to convert the received input current signal to an output voltage signal to generate an output signal of the transimpedance amplifier circuit (201), wherein the transimpedance amplifier circuit comprises a plurality of gain amplifier stages (209, 210, 211),
a DC restoration component (205), wherein the DC restoration component (205) is configured to receive the output voltage signal of the transimpedance amplifier circuit (201) for restoring the DC component of the received current signal and configured for outputting a corresponding current signal,
an automatic gain control component (204) configured for controlling via at least one programmable feedback resistor (226, 227) the equivalent transimpedance of the transimpedance amplifier circuit based on the signal output by the DC restoration component (205) to provide a constant output voltage amplitude for different current ranges of the input current signal;
wherein at least some of the gain amplifier stages (209, 210, 211) comprise a gain amplifier (212, 213, 214) and at least one local programmable feedback resistor (215, 216, 217, 218, 219, 220, 224) for controlling the gain of the respective gain amplifier stage (209, 210, 211, 214), wherein some of the local programmable feedback resistors are arranged to shorten the outputs of some of the gain amplifier stages (224), and wherein the automatic gain control component (204) is further configured to control at least some of the local programmable feedback resistors (215, 216, 217, 218, 219, 220) of the gain amplifier stages based on the signal output by the DC restoration component (205), and
wherein the at least one programmable feedback resistor (227, 227) for controlling the equivalent transimpedance of the transimpedance amplifier circuit (201) is arranged between the input of transimpedance amplifier circuit and the output signal of the transimpedance amplifier circuit.

US Pat. No. 10,461,864

CHANNEL BONDING TECHNIQUES IN A NETWORK

Calix, Inc., Petaluma, C...

1. A method of virtually bonding together at least two physical channels in an optical network terminal (ONT) of a passive optical network (PON), the method comprising:receiving, via the ONT, a plurality of frames from a network device;
classifying, using a processor of the ONT, the plurality of frames into one of a plurality of services;
assigning the service to the at least two physical channels of the ONT, wherein each physical channel is associated with a corresponding laser of the ONT, and wherein each laser of the ONT is configured to transmit at a different wavelength; and
transmitting the plurality of frames of the service toward an optical line terminal (OLT) using at least two different wavelengths corresponding to the at least two physical channels during an assigned time slot.

US Pat. No. 10,461,861

PHOTOVOLTAIC RECEIVER OPTIMISED FOR COMMUNICATION BY CODED LIGHT

Garmin Switzerland GmbH, ...

1. A communication device for communication by coded light in which the communication has an initial signal-to-noise ratio, denoted SNR1, that is variable depending on the illumination conditions, the communication device comprising at least one light receiver of photoreceptor type including an anode and a cathode and having an initial shunt resistance with a value Rsh1, the receiver being liable to be exposed simultaneously to a source of coded light carrying a signal and to a source of uncoded light,wherein said anode and cathode are short-circuited by at least one short-circuit resistor Rp arranged inside the photoreceptor, with a value Rsh2 chosen such that the new value of the shunt resistance of said photoreceptor, denoted Rsh3 and resulting from the connection of the initial shunt resistance Rsh1 and of the short-circuit resistor Rp, gives the communication device a new resultant signal-to-noise ratio SNR2 that remains substantially independent of the intensity of said uncoded light,
wherein said photoreceptor is semitransparent and is formed of an array of photovoltaic cells spaced apart from one another by zones of transparency.

US Pat. No. 10,461,860

SCHEDULING METHOD FOR UPLINK AND DOWNLINK OF AN OPTICAL TRANSMISSION SYSTEM

1. A method of allocating transmission time slots in an optical wireless system including (1) a plurality of access points each having a corresponding access point identifier, connected to a wired network and controlled by a network controller, and (2) a plurality of terminals, each having a corresponding terminal identifier, the method comprising:associating an access point among said plurality of access points with each terminal of the plurality of terminals, such that an average quality of an uplink and a downlink between the associated access point and said each terminal is maximum;
determining, via each terminal of the plurality of terminals associated with each of the plurality of access points, coverage information containing access point identifiers of access points of the plurality of access points received by the each terminal; and
allocating downlink transmission time slots to each terminal of the plurality of terminals according to:
when the coverage information of the each terminal includes only the access point identifier of the associated access point associated with the each terminal, allocating via the associated access point a downlink transmission time slot to the downlink between the each terminal and its associated access point, within an available time range managed by the network controller (CFPfreedown(APn));
when the coverage information of the each terminal includes a plurality of the access point identifiers, allocating via the network controller a downlink transmission time slot to the downlink between the each terminal and its associated access point, within an available time range (CFPfreedown(APn)) and correspondingly eliminating the downlink transmission time slot thus allocated from the available time ranges of access points belonging to the coverage information of the each terminal.

US Pat. No. 10,461,856

WIRELESS TRANSMISSION OF SERVER STATUS INFORMATION

Lenovo Enterprise Solutio...

1. A system, comprising:a wireless communication device operable to establish a wireless connection and transmit server status information over the wireless connection; and
an optical sensor operable to detect optical signals from an optical source of a server,
wherein the wireless communication device and the optical sensor are coupled together by a physical or wireless connection.

US Pat. No. 10,461,850

FREQUENCY SYNTHESIS-BASED OPTICAL FREQUENCY DOMAIN REFLECTOMETRY METHOD AND SYSTEM

SHANGHAI JIAOTONG UNIVERS...

8. A frequency synthesis-based optical frequency domain reflectometry system comprising:a reference optical branch and a modulation optical branch homogenous therewith;
a coupling unit; and
a demodulation unit, wherein:
an output end of the reference optical branch and an output end of the modulation optical branch are both connected with the coupling unit, and an output end of the coupling unit is connected with the demodulation unit;
the modulation optical branch comprises an electro-optic modulator, an acousto-optic modulator, an erbium-doped optical fiber amplifier, an optical fiber circulator and a test optical fiber which are sequentially connected in series;
the electro-optic modulator performs a modulation by a single frequency signal to generate an optical comb signal;
the optical comb signal input into the acousto-optic modulator is modulated by a pulse signal to obtain a multi-frequency sweep optical pulse signal, amplified by the erbium-doped optical fiber amplifier, and then output to the optical fiber circulator and the test optical fiber in turn;
a reflecting end of the optical fiber circulator serves as an output of the modulation optical branch and is connected with the coupling unit.

US Pat. No. 10,461,849

FAST OPTICAL LINK CONTROL ADAPTATION USING A CHANNEL MONITOR

1. A method comprising:receiving, at an amplifier, an optical signal;
detecting a plurality of labeled channels of the optical signal, wherein a number of the plurality of labeled channels being received is less than a number of labeled channels previously received;
decoding each label of the plurality of labeled channels to determine a respective wavelength corresponding to each of the plurality of labeled channels;
determining a spectral distribution of the plurality of labeled channels based on the decoding;
adjusting a parameter of the amplifier based on the number of labeled channels being received and the spectral distribution of the plurality of labeled channels; and
amplifying the optical signal received based on the adjusting.

US Pat. No. 10,461,842

OPEN WIRELESS ARCHITECTURE (OWA) UNIFIED AIRBORNE AND TERRESTRIAL COMMUNICATIONS ARCHITECTURE

1. An airborne mesh network based on Open Wireless Architecture (OWA), said system comprising:a) Ground Airport as mesh gateway connecting nearby multiple aircrafts in the sky with Ground Networks through OWA connections,
b) Mesh Router Aircraft (MRA) as mesh router connecting to said airport (mesh gateway) when close to said airport before landing, after takeoff or passing-by,
c) Ground Cell, as ATG (Aircraft To Ground) gateway, either on ground or at the top of mountain, connecting nearby multiple aircrafts in the sky with Ground Networks through OWA connections,
d) Non-Router Aircraft (NRA) as mesh client or ATG client connecting to said MRA (mesh router) or said Ground Cell (ATG gateway) when far away from said airport,
e) processor and memory in said ATG client to process airborne mobile handover protocol when connecting said NRA with said Ground Cell,
f) processor and memory in said mesh client to process mesh networking protocol when connecting said NRA with said airport through said MRA, and
g) Aircraft Status and Connection Table (ASCT) of mesh network group, distributed to each member aircraft of said group, updating aircraft status (said NRA or said MRA) and connection information among group aircrafts, andwherein NRA connections comprise MRA-NRA mode, Relay+ATG mode and ATG Handover mode.

US Pat. No. 10,461,837

METHOD AND SYSTEM FOR ALLOCATING RESOURCES FOR RELAYING CHANNELS IN CELLULAR NETWORKS

SONY CORPORATION, Tokyo ...

1. A node of a cellular network, comprising:an interface configured to communicate with a plurality of communication devices attached to the cellular network via a radio link, and
at least one processor configured to allocate first reoccurring time-frequency resources to some of the plurality of communication devices that are assigned to a first set and on the radio link of the cellular network to a first relaying channel, the first relaying channel being established via a first relaying node and between an access point node of the cellular network and the some of the plurality of communication devices that are assigned to the first set,
wherein the at least one processor is further configured to allocate second reoccurring time-frequency resources to some of the plurality of communication devices that are assigned to a second set and on the radio link of the cellular network to a second relaying channel, the second relaying channel being established via a second relaying node and between the access point node of the cellular network and the some of the plurality of communication devices that are assigned to the second set,
wherein at least one of the first relaying node or the second relaying node is a user equipment (UE) selected from the plurality of communication devices,
wherein the first reoccurring time-frequency resources are shared between the communication devices assigned to the first set such that collision may occur between multiple communication devices of the first set attempting to transmit at the same time-frequency resource,
wherein the second reoccurring time-frequency resources are shared between the communication devices assigned to the second set such that collision may occur between multiple communication devices of the second set attempting to transmit at the same time-frequency resource,
wherein the at least one processor is configured to receive, via the interface, a connection message, the connection message indicating a given one of the plurality of communication devices,
wherein the at least one processor is configured to assign the given one of the plurality of communication devices to the first set or the second set in response to receiving the connection message,
wherein the connection message further indicates at least one element selected from the group comprising:
a Machine Type Communication functionality of the given one of the plurality of communication devices; and
a traffic pattern of the given one of the plurality of communication devices, wherein the traffic pattern corresponds to a periodicity or frequency of occurrence with which data to be transmitted is expected to occur, a size of individual data blocks to be transmitted, an overall size of data, or peak times for data to be transmitted; and
wherein the at least one processor is configured to assign the given one of the plurality of communication devices to the first set or the second set depending on the indicated at least one element.

US Pat. No. 10,461,836

DUAL-POLARIZATION BEAMFORMING

TELEFONAKTIEBOLAGET LM ER...

1. A wireless device for dual-polarization beamforming, the wireless device comprising:an antenna array comprising a baseband chain and at least a pair of antenna elements,
wherein each pair of antenna elements comprises a first antenna element and a second antenna element of mutually orthogonal polarizations, and
wherein each pair of antenna elements is operatively connected to the baseband chain.

US Pat. No. 10,461,824

LINEAR PRECODING IN FULL-DIMENSIONAL MIMO SYSTEMS AND DYNAMIC VERTICAL SECTORIZATION

QUALCOMM Incorporated, S...

1. A method for wireless communication by a base station, comprising:generating a port precoding matrix which compresses a larger number of antenna elements to a smaller number of antenna ports;
transmitting user equipment (UE)-specific port reference signals to a UE using the port precoding matrix, wherein each of the UE-specific port reference signals corresponds to one of the antenna ports;
receiving feedback regarding channel state information (CSI) measured by the UE based on the UE-specific port reference signals, wherein the CSI comprises quantized measurements for at least one of the antenna ports corresponding to more than one of the antenna elements;
mapping multiple data layers to UE-specific antenna ports based on the feedback regarding CSI;
mapping each of the UE-specific antenna ports to physical antenna elements, wherein mapping each of the UE-specific antenna ports to physical antenna elements occurs after mapping the multiple data layers to the UE-specific antenna ports; and
transmitting data to the UE, based on the mapping of the multiple data layers and the mapping of antenna ports to the physical antenna elements.

US Pat. No. 10,461,820

WIRELESS COMMUNICATION USING WIRELESS ACTIVE ANTENNAS

RF DSP INC., Irvine, CA ...

1. Wireless Smart Antenna apparatus comprising a Base Station Side Radio Unit (BSSRU) and one or more User Equipment Side Radio Units (UESRUs),wherein if the BSSRU is distributed in a coverage area of a Base Station (BS), the BSSRU communicates with the BS using a first frequency band F1 and simultaneously communicates with a plural of UESRUs selected from said one or more UESRUs using a second frequency band F2, OR wherein if the BSSRU is integrated into a BS, the BSSRU communicates with the BS baseband through circuits and communicates with a plural of UESRUs selected from said one or more UESRUs in the second frequency band F2 using Multi-User Multiple Input Multiple Output (MU-MIMO) spatial multiplexing,
wherein a UESRU selected from said one or more UESRUs communicates with one or more distributed OR integrated BSSRUs using the second frequency band F2 and simultaneously communicates with one or more User Equipment (UEs) using the first frequency band F1, and
wherein a UESRU selected from said one or more UESRUs with a plural of radio transmitting and receiving paths and antennas, or a plural of UESRUs selected from said one or more UESRUs collectively, simultaneously communicate in the F1 frequency band with a plural of UEs distributed over the coverage area of the UESRU or the plural of UESRUs using MU-MIMO spatial multiplexing.

US Pat. No. 10,461,817

ENHANCED MULTIPLE-INPUT MULTIPLE-OUTPUT BEAM REFINEMENT PROTOCOL TRANSMIT SECTOR SWEEP

Intel IP Corporation, Sa...

1. A device of an initiator for performing multiple-input multiple-output (MIMO) beamforming training the device comprising processing circuitry and storage, the processing circuitry coupled to the storage, and the processing circuitry configured to:establish a first communication link using a first antenna transmit chain of one or more transmit chains of the initiator, wherein the one or more antenna transmit chains further comprise a second antenna transmit chain;
initiate a MIMO beam refinement protocol (BRP) transmit sector sweep (TXSS) over the one or more antenna transmit chains;
map a single space-time stream over the one or more antenna transmit chains;
cause to send, to a responder device, an enhanced directional multi-gigabit (EDMG) frame using spatial expansion based on the mapping of the single space-time stream;
identify a feedback frame from the responder device; and
determine one or more antenna weight vectors (AWVs) to use in a MIMO phase of the MIMO beamforming training based on the feedback frame.

US Pat. No. 10,461,816

TRANSMISSION/RECEPTION APPARATUS AND METHOD FOR SUPPORTING MIMO TECHNOLOGY IN A FORWARD LINK OF A HIGH RATE PACKET DATA SYSTEM

Samsung Electronics Co., ...

1. A method of a transmitter for transmitting data in a communication system with a plurality of antennas, the method comprising the steps of:generating, by the transmitter, a first pilot signal and a second pilot signal; and
transmitting data, the first pilot signal, and the second pilot signal over a wireless network,
wherein the first pilot signal is transmitted at a first position in each slot for the data in a time domain and over each frequency that is used to transmit the data in a frequency domain, and the second pilot signal is transmitted at a second position, which is defined in the transmitter and a receiver, in the time domain and the frequency domain,
wherein each slot for the data comprises a first part of the slot for transmitting data and a second part of the slot for transmitting data,
wherein the first position is located adjacent to the first part and the second part in the time domain, and
wherein the defined second position comprises only one specific position within one slot, in the time domain.

US Pat. No. 10,461,812

NEAR-FIELD COMMUNICATION (NFC) TAGS OPTIMIZED FOR HIGH PERFORMANCE NFC AND WIRELESS POWER RECEPTION WITH SMALL ANTENNAS

NAN JING QIWEI TECHNOLOGY...

1. A device for concurrent near-field communication (NFC) and wireless power reception (WPR) using a magnetic field, comprising:a low-Q antenna resonant circuit configured to perform the NFC, and including
a first antenna for magnetic flux of the magnetic field to flow therethrough, to thereby receive a NFC signal for the NFC, and
a first antenna matching circuit that is connected to the first antenna and is so configured that a quality factor (Q-factor) of the low-Q antenna resonant circuit is no higher than 25; and
a high-Q antenna resonant circuit configured to perform the WPR, and including
a second antenna for the magnetic flux of the magnetic field to flow therethrough, to thereby receive wireless power for the WPR, and
a second antenna matching circuit that is connected to the second antenna and is so configured that the Q-factor of the high-Q antenna resonant circuit is no lower than 50, wherein
the low-Q and high-Q antenna resonant circuits are separate from each other,
the high-Q antenna resonant circuit operates to perform WPR, responsive to strength of the magnetic field being larger than a predetermined threshold, and
the high-Q antenna resonant circuit and the low-Q antenna resonant circuit operate to perform NFC, responsive to the strength of the magnetic field being no larger than the predetermined threshold.

US Pat. No. 10,461,799

INTEGRATED TRANSMITTER AND RECEIVER FRONT END MODULE, TRANSCEIVER, AND RELATED METHOD

TAIWAN SEMICONDUCTOR MANU...

1. A transceiver comprising:an antenna; and
a first package comprising:
an integrated circuit die comprising:
a die-side part of a transmitter path network, the die-side part of the transmitter path network including first and second portions, wherein the first portion of the die-side part of the transmitter path network comprises a power amplifier comprising a plurality of metal-oxide-semiconductor field effect transistors (MOSFETs);
a die-side part of a receiver path network;
a transmitter electrically connected to the first portion of the die-side part of the transmitter path network, wherein the transmitter is connected to a gate of a MOSFET of the plurality of MOSFETs; and
a receiver connected to the die-side part of the receiver path network;
the second portion of the die-side part of the transmitter path network including a selectable capacitance unit; and
a package-side part of the transmitter path network electrically connected to the die-side part of the transmitter path network and the antenna, the package-side part of the transmitter path network is directly connected to the first portion of the die-side part of the transmitter path network; and
a package-side part of the receiver path network electrically connected to the die-side part of the receiver path network and the antenna;
at least one of the package-side part of the transmitter path network or the package-side part of the receiver path network including an inductor.

US Pat. No. 10,461,795

MOBILE COMPUTING/COMMUNICATING ATTACHMENT DEVICE

1. An attachment system for holding at least one mobile computing device comprising:a. a first attachment device attached to a first mobile computing device, comprising:
i. a removable, flexible plate attached to a portion of one side the of first mobile computing device;
ii. a first elongated rail mounted on the plate, and
iii. at least two first elongated structures defining a first elongated opening between them;
b. a second attachment device attached to a second mobile computing device, comprising:
i. a second elongated rail; and
ii. at least two second elongated structures defining a second elongated opening between them such that the second elongated rail is sized and shaped to receive and hold the at least two first elongated structures and the at least two second elongated structures are sized and shaped to receive and hold the first elongated rail in order to interact with and attach the second mobile computing device to the first attachment device, wherein the first and second elongated structures have a first and second end and the first and second elongated structures narrow in width at their first end to create a widened beveled opening.

US Pat. No. 10,461,789

LOW-POWER RECEIVING USING A JAMMING DETECTION MODE

APPLE INC., Cupertino, C...

1. A receiver system, comprising:a first receiver configured to receive and decode data signals from an antenna;
a second receiver configured to receive waveforms from the antenna, wherein the second receiver consumes relatively lower power than the first receiver when both of the receivers are in operation, wherein the second receiver is configured to receive the waveforms from the antenna that indicate whether jamming signals coexist with data to be received by the first receiver; and
receiver logic configured to control the first receiver based at least in part on an indication of whether jamming signals coexist with data to be received by the first receiver.

US Pat. No. 10,461,785

APPARATUS AND METHODS FOR FRONT-END SYSTEMS WITH REACTIVE LOOPBACK

Skyworks Solutions, Inc.,...

1. A front-end system comprising:a plurality of ports including an antenna port, a transmit port, and a receive port;
an antenna switch configured to selectively provide a transmit signal from the transmit port to the antenna port;
a low noise amplifier having an input electrically connected to the antenna port and an output electrically connected to the receive port; and
a loopback circuit including a reactive loopback impedance and a back switch electrically connected in series between the antenna switch and the receive port, the reactive loopback impedance including a plurality of capacitors in series with the back switch and operable to provide a portion of the transmit signal to the receive port when the back switch is activated.

US Pat. No. 10,461,775

COMPRESSION AWARE SSD

Samsung Electronics Co., ...

1. A compression system on a storage drive comprising:one or more compressibility inputs;
a compression predictor configured to predict the compressibility of data based on the one or more compressibility inputs;
a compressor configured to compress the data;
one or more compression inputs,
wherein at least one of the compression predictor or the compressor is configured to determine how to compress the data based on the one or more compression inputs.

US Pat. No. 10,461,768

DIGITAL-TO-ANALOG CONVERTER (DAC) DESIGN WITH REDUCED SETTLING TIME

QUALCOMM Incorporated, S...

1. A digital-to-analog converter (DAC), comprising:a plurality of transistors selectively coupled to an output of the DAC; and
a biasing circuit coupled to gates of the plurality of transistors, wherein the biasing circuit comprises:
a first transistor having a gate coupled to a drain of the first transistor;
a first buffer having an input coupled to the gate of the first transistor;
a second transistor having a gate coupled to an output of the first buffer;
a first resistive-capacitive (RC) circuit having a first resistive element and a first capacitive element, the first RC circuit being coupled between the gate of the first transistor and the gate of the second transistor; and
a first switch coupled between the first resistive element and the first capacitive element.

US Pat. No. 10,461,766

SEMICONDUCTOR DEVICE, SIGNAL PROCESSING SYSTEM, AND SIGNAL PROCESSING METHOD

Renesas Electronics Corpo...

1. A semiconductor device comprising:a reference voltage generation circuit that generates a reference voltage;
an analog signal processing circuit that outputs a first processing signal according to the reference voltage;
a test signal output section that outputs, as a test signal, a second processing signal having a lower voltage than the first processing signal;
an input section that receives a regulation signal for the outputted test signal; and
a regulator circuit that regulates an output of the analog signal processing circuit in response to the regulation signal,
wherein the test signal output section outputs, as the test signal, one of the second processing signal and the reference voltage.

US Pat. No. 10,461,764

SYSTEM AND METHOD FOR INTERLEAVED DIGITAL-TO-ANALOG CONVERTER (DAC) CALIBRATION

IQ-Analog Corporation, S...

1. A system for calibrating an interleaved digital-to-analog converter (DAC), the system comprising:an interleaved DAC comprising 2N selectively enabled sub-DACs, where N is an integer greater than or equal to 1, each sub-DAC having an input to accept a digital data signal, a clock input to accept a first clock signal at a first frequency with unique phase, and an output to supply an analog signal converted from the data signal;
a data generator having 2N outputs to respectively supply 2N data signals to the 2N sub-DACs corresponding to a fundamental analog signal, and an input to accept signal generation commands;
a clock generator having an output to supply 2N unique phases of the first clock signal;
a clock calibration module having an input to accept the 2N phases of the first clock signal, an input to accept calibration signals, and 2N outputs to selectively supply unique phases of the first clock signal to the enabled sub-DACs in response to the calibration signals;
a summing device having 2N inputs to accept analog signals from enabled sub-DACs, and an output to supply a summed analog signal comprising the fundamental analog signal with spurious signals offset from a multiple of the first frequency of the first clock signal, where the spurious signals are responsive to duty cycle mismatch and first clock signal phases errors between enabled sub-DACs;
an analog-to-digital converter (ADC) having a signal input to accept the summed analog signal, a clock input to accept a second clock signal, and an output to supply a digital conversion signal converted from the summed analog signal; and,
a control module having an input to accept the conversion signal, an output to supply the signal generation commands, and an output to supply the calibration signals to the clock calibration module.

US Pat. No. 10,461,761

PIPELINED SAR WITH TDC CONVERTER

Taiwan Semiconductor Manu...

1. An analog-to-digital converter (ADC), comprising:a successive approximation register configured to receive an input signal and to generate a first digital signal and a residue voltage;
a voltage-to-time conversion element configured to convert the residue voltage to a time domain representation, the voltage-to-time conversion element comprising:
an amplifier comprising an input coupled to an output of the successive approximation register;
a zero crossing detector directly coupled to an output of the amplifier; and
a time-to-digital converter coupled to an output of the zero crossing detector and configured to generate a second digital signal.

US Pat. No. 10,461,760

ALKALI VAPOR CELL

1. An alkali vapor cell comprising a sealed chamber enclosing an alkali atomic gas therein and having at least one optically transparent window, the chamber and the transparent window defining an optical beam path through which a light beam can pass and interact with the alkali atomic gas in the chamber, wherein said alkali vapor cell comprises at least one localized condensation area of alkali atoms at a predetermined location in the sealed chamber, said at least one localized condensation area comprising a metal layer, wherein the metal of said metal layer is made of copper, tantalum, gold, platinum, nickel, or a combination thereof.

US Pat. No. 10,461,759

DLL CIRCUIT HAVING VARIABLE CLOCK DIVIDER

Micron Technology, Inc., ...

1. An apparatus, comprising:a variable clock divider configured to generate a divided clock signal based on feedback of a delay amount;
a delay circuit configured to input the divided clock signal, delay and output the divided clock signal based on the delay amount, and provide the feedback of the delay amount to the variable clock divider; and
a phase detector configured to:
compare phases of the divided clock signal and the delayed divided clock signal, and
control the delay circuit to match phases of the divided clock signal and the delayed divided clock signal.

US Pat. No. 10,461,758

RING OSCILLATOR HAVING A FLAT FREQUENCY CHARACTERISTIC CURVE

Infineon Technologies AG,...

1. A ring oscillator comprising:a feedback chain including a plurality of inverters, and
for at least one of the inverters of the feedback chain: a further inverter, which is connected in parallel with a corresponding inverter of the feedback chain by a capacitor and which comprises an input that is directly coupled with an input of the corresponding inverter of the feedback chain.

US Pat. No. 10,461,757

REFERENCE-LESS FREQUENCY DETECTOR WITH HIGH JITTER TOLERANCE

Futurewei Technologies, I...

1. An apparatus comprising:a not-and (NAND) gate comprising a first NAND gate input port, a second NAND gate input port, and a NAND gate output port;
a charge pump comprising a charge pump activation port and a charge pump output current port, the charge pump activation port is coupled to the NAND gate output port, and the charge pump output current port is configured to couple to a frequency detection loop filter;
an inverter module coupled to the NAND gate and the charge pump so that the inverter module is positioned between the NAND gate and the charge pump; and
a buffer module coupled to the NAND gate and the charge pump so that the buffer module is positioned between the NAND gate and the charge pump,
the buffer module is configured to buffer or delay a signal by a period of time.

US Pat. No. 10,461,755

DIGITALLY ASSISTED FEEDBACK LOOP FOR DUTY-CYCLE CORRECTION IN AN INJECTION-LOCKED PLL

Oracle International Corp...

1. A duty-cycle correction circuit for an injection-locked phase-locked loop (PLL), comprising a digital calibration circuit, which performs a duty-cycle correction operation by:obtaining a pattern of positive and negative error pulses at rising and falling edges of a reference clock signal for the injection-locked PLL, wherein the pattern specifies deviations of the reference clock signal from a 50% duty cycle;
multiplying the pattern of positive and negative error pulses by a duty-cycle distortion (DCD) template, which specifies a sign of a duty-cycle error for the reference clock signal, to calculate duty-cycle distortion values;
accumulating the duty-cycle distortion values to produce a duty-cycle-error amplitude;
multiplying the duty-cycle-error amplitude by the DCD template to produce a duty-cycle correction signal; and
using the duty-cycle correction signal to compensate for timing errors in the injection-locked PLL, which are caused by duty-cycle variations in the reference clock signal.

US Pat. No. 10,461,750

SEMICONDUCTOR DEVICE

Toshiba Memory Corporatio...

1. A semiconductor device comprising:an input/output (IO) signal receiver circuit; and
a latch circuit connected to the IO signal receiver circuit,
wherein the latch circuit includes
a first inverter configured to output a first signal based on an input signal received from the IO signal receiver circuit,
a plurality of N1 inverters connected in series with the first inverter,
a second inverter configured to output a first clock signal based on a first strobe signal,
a plurality of N2 inverters connected in series with the second inverter,
a third inverter configured to output a second clock signal based on a second strobe signal which is an inversion signal of the first strobe signal,
a plurality of N3 inverters connected in series with the third inverter,
a first clock generation circuit which is connected to an output terminal of the second inverter and is configured to generate a third clock signal from the first clock signal, wherein logical level transitions in the third clock signal are delayed with respect to the first clock signal and are completed in a shorter amount of time than the first clock signal,
a second clock generation circuit which is connected to an output terminal of the third inverter and is configured to generate a fourth clock signal from the second clock signal, wherein logical level transitions in the fourth clock signal are delayed with respect to the second clock signal and are completed in a shorter amount of time than the first clock signal,
a fourth inverter configured to output an inversion signal of the first signal in accordance with the third and fourth clock signals, and
a data latch circuit configured to latch an output signal of the fourth inverter in accordance with the third and fourth clock signals, and
wherein (N1+1) is an odd integer equal to 3 or more and both N2 and N3 are equal to (N1+1).

US Pat. No. 10,461,746

PROXIMITY SWITCH ASSEMBLY AND METHOD THEREFOR

Ford Global Technologies,...

1. A proximity switch assembly comprising:a proximity switch comprising a proximity sensor providing an activation field; and
control circuitry monitoring a signal responsive to the activation field and determining an activation of the switch based on detecting a first peak value above a threshold when the signal is not stable, followed by a drop and a subsequent rise to a second peak value followed by a sharp drop, wherein the control circuitry further delays recalibration of the switch assembly by a predetermined time period when the signal is detected dropping fast.

US Pat. No. 10,461,741

POWER SWITCH AND SEMICONDUCTOR DEVICE THEREOF

UPI SEMICONDUCTOR CORPORA...

1. A power switch, comprising:a first transistor cell comprising a first electrode;
a second transistor cell comprising a second electrode;
a body region disposed between the first transistor cell and the second transistor cell; and
a conductive layer electrically connected with the body region, the first electrode and the second electrode respectively,
wherein the body region has a base electrode voltage selectively maintained at a lower one of a first voltage and a second voltage, the first transistor cell is controlled by the second voltage and the second transistor cell is controlled by the first voltage.

US Pat. No. 10,461,740

CLAMP FOR A HYBRID SWITCH

Power Integrations, Inc.,...

1. A switch having a drain terminal, a source terminal and a control terminal, the switch comprising:a normally-on device including a first terminal, a second terminal, and a control terminal, wherein the first terminal of the normally-on device is the drain terminal of the switch and the control terminal of the normally-on device is coupled to the source terminal of the switch;
a normally-off device including a first terminal, a second terminal, and a control terminal, wherein the control terminal of the normally-off device is coupled to the control terminal of the switch, the second terminal of the normally off-device is the source terminal of the switch, and the first terminal of the normally-off device is coupled to the second terminal of the normally-on device; and
a clamp circuit coupled across the normally-off device, wherein the clamp circuit comprises:
a first transistor coupled to the first terminal of the normally-off device;
a resistor coupled to the first transistor and to the second terminal of the normally-off device; and
a second transistor coupled between the first terminal and the second terminal of the normally-off device.

US Pat. No. 10,461,739

TRANSISTOR DEVICE

Infineon Technologies Aus...

1. A transistor device comprising:a unipolar transistor coupled between a first terminal and a second terminal; and
a bipolar transistor coupled in parallel to the unipolar transistor between the first terminal and the second terminal,
wherein the bipolar transistor has a threshold voltage higher than a threshold voltage of the unipolar transistor,
wherein a difference between the threshold voltage of the bipolar transistor and the threshold voltage of the unipolar transistor is at least 1 V, and
wherein the bipolar transistor is configured to carry a majority of a current flowing through the transistor device, from the first terminal to the second terminal, when the current exceeds a predetermined threshold; and
gate control circuitry configured to switch the bipolar transistor on only upon detection of an overcurrent event, wherein the gate control circuitry is configured to distinguish the overcurrent event between a short circuit event and a surge current event and to switch on the bipolar transistor only if the overcurrent event is a surge current event.

US Pat. No. 10,461,737

CONFIGURABLE CLAMP CIRCUIT

Infineon Technologies Aus...

1. A circuit comprising:a clamp driver circuit comprising a pull-up circuit coupled between a first power supply terminal and an output terminal of the clamp driver circuit, and a pull-down circuit coupled between a second power supply terminal and the output terminal of the clamp driver circuit;
a voltage regulator coupled between the first power supply terminal and the pull-up circuit; and
a logic circuit coupled to the pull-up circuit and the pull-down circuit, the logic circuit comprising a clamp driver configuration input and a clamp driver input, wherein the logic circuit is configured to:
operate the pull-up circuit and the pull-down circuit according to a first polarity when the clamp driver configuration input is in a first state, and
operate the pull-up circuit and the pull-down circuit according to a second polarity opposite the first polarity and deactivate the voltage regulator when the clamp driver configuration input is in a second state different from the first state.

US Pat. No. 10,461,734

ACTIVE LOAD GENERATION CIRCUIT AND FILTER USING SAME

REALTEK SEMICONDUCTOR COR...

1. An active load generation circuit comprising:a transistor that provides an impedance and has a control terminal and an input terminal, wherein the control terminal receives a control voltage, the input terminal receives an input signal, and the impedance is related to the control voltage;
a voltage control circuit configured to generate an intermediate voltage according to a power supply voltage and a first reference voltage;
a voltage offset and tracking circuit coupled between the voltage control circuit and the transistor and configured to generate the control voltage according to the input signal and the intermediate voltage, wherein the control voltage varies with the input signal; and
a temperature sensing circuit coupled to the voltage control circuit and configured to sense an ambient temperature of the active load generation circuit and adjust the first reference voltage according to the ambient temperature.

US Pat. No. 10,461,724

RELAXATION OSCILLATOR WITH OVERSHOOT ERROR INTEGRATION

Analog Devices Global, H...

1. A method of using a relaxation oscillator to generate a clock signal, the method comprising:charging a first oscillation capacitor with a current from a first current source or sink during a first charging phase, until a first comparator determines that a first oscillation capacitor voltage meets a target voltage;
in response to the first oscillator capacitor voltage meeting the target voltage, interrupting charging of the first oscillation capacitor before a first error integration phase commences;
during the first error integration phase, adjusting the target voltage by integrating an overshoot error of a voltage on the first oscillation capacitor beyond a reference voltage, the reference voltage generated by passing a current from the first current source or sink, or a replicate thereof through an oscillation resistor to generate the reference voltage, after the charging of the first oscillation capacitor has been interrupted;
after the first error integration phase, interrupting integration of the overshoot error of the voltage on the first oscillation capacitor before a first reset phase commences; and
during the first reset phase, discharging the first oscillation capacitor.

US Pat. No. 10,461,723

FULL RANGE REALIGNMENT RING OSCILLATOR

Taiwan Semiconductor Manu...

1. A realignment ring-cell circuit, comprising:a single-to-differential unit having an input configured to receive a realignment signal, a first output for outputting a first differential output and a second output for outputting a second differential output;
an OR gate, wherein the first output for outputting is a first input to the OR gate;
an AND gate, wherein the second output for outputting is a first input to the AND gate;
a first P-type metal-oxide-semiconductor transistor, wherein a gate of the P-type metal-oxide-semiconductor transistor is electrically connected to an output of the OR gate; and
a first N-type metal-oxide-semiconductor transistor, wherein a gate of the N-type metal-oxide-semiconductor transistor is electrically connected to an output of the AND gate, wherein a drain of the P-type metal-oxide-semiconductor transistor and a drain of the N-type metal-oxide-semiconductor transistor are electrically connected to each other and are further electrically connected to a second input of the OR gate and a second input of the AND gate.

US Pat. No. 10,461,721

SEMICONDUCTOR APPARATUS, DEGRADATION VALUE DETERMINATION SYSTEM AND PROCESSING SYSTEM

RENESAS ELECTRONICS CORPO...

1. A semiconductor apparatus comprising:an operation oscillator;
a reference oscillator;
a first operation switch connected in series with the operation oscillator between a power supply potential and a ground potential;
a first reference switch connected in series with the reference oscillator between the power supply potential and the ground potential;
a second reference switch connected in parallel with the reference oscillator between the power supply potential and the ground potential;
an operation counter configured to count a number of first output pulses from the operation oscillator in a predetermined measurement period;
a reference counter configured to count a number of second output pulses from the reference oscillator in the predetermined measurement period;
a first gating component inputs the number of first output pulses; and
a second gating component inputs the number of second output pulses,
wherein the predetermined measurement period is set as a period during which the first gating component and the second gating component are in a through state.

US Pat. No. 10,461,718

ACOUSTIC WAVE RESONATOR, FILTER, AND MULTIPLEXER

TAIYO YUDEN CO., LTD., T...

1. An acoustic wave resonator comprising:a piezoelectric substrate; and
an IDT that is located on the piezoelectric substrate and includes first regions and second regions alternately arranged in an extension direction of electrode fingers, which excite an acoustic wave, in an overlap region in which the electrode fingers overlap, at least one electrode finger of the electrode fingers in the second regions having a different width from the at least one electrode finger in the first regions, a width of an outer second region of the second regions in the extension direction differing from a width of an inner second region of the second regions,
wherein a width of an outermost first region of the first regions in the overlap region in the extension direction is less than a width of an inner first region of the first regions in the extension direction.

US Pat. No. 10,461,716

LOW-PASS FILTER

TDK CORPORATION, Tokyo (...

3. A low-pass filter comprising:a first input/output port;
a second input/output port;
a first LC parallel resonator and a second LC parallel resonator connected in series and provided between the first input/output port and the second input/output port;
a first path;
a second path;
a third path;
a multilayer stack for integrating the first and second input/output ports, the first and second LC parallel resonators and the first to third paths, the multilayer stack including a plurality of dielectric lavers stacked to be aligned in a first direction, the multilayer stack having a first end face and a second end face located at opposite ends in the first direction; and
a ground terminal provided on the first end face of the multilayer stack and connected to the third path, wherein
the first LC parallel resonator has a plurality of ends including a first end, the first end being closest to the first input/output port in circuit configuration as compared to all other ones of the plurality of ends of the first LC parallel resonator,
the second LC parallel resonator has a plurality of ends including a second end, the second end being closest to the second input/output port in circuit configuration as compared to all other ones of the plurality of ends of the second LC parallel resonator,
the first path includes a first LC series resonator and connects the first end to a ground,
the second path includes a second LC series resonator and connects the second end to the ground,
the third path include, a third-path capacitor and connects a connection point between the first and second LC parallel resonators to the ground,
the third path has an inductance lower than an inductance of each of the first path and the second path, and
a physical connection corresponding to the connection point between the first and second LC parallel resonators, the third-path capacitor, and the ground terminal are arranged to intersect or contact one imaginary straight line extending in the first direction.

US Pat. No. 10,461,713

RADIO-FREQUENCY AMPLIFIER DEVICE

Nordic Semiconductor ASA,...

1. A radio-frequency (RF) amplifier device, comprising:a signal input for receiving an RF electrical signal;
a variable-gain amplifier for amplifying the received RF electrical signal;
a signal output for outputting the amplified RF electrical signal;
a serial input for receiving serialised data encoding a custom gain level;
a memory for storing data representative of the custom gain level;
a binary input for switching a gain of the amplifier between a first level and the custom gain level;
configuration logic configured to receive serialised data encoding the custom gain level at the serial input, and to store data representative of the custom gain level in the memory; and
gain-control logic configured to read the data representative of the custom gain level from the memory, and to set the gain of the amplifier to the first level or to the custom gain level in dependence on a state of the binary input.

US Pat. No. 10,461,712

AUTOMATIC VOLUME LEVELING

AMAZON TECHNOLOGIES, INC....

1. A method of automatic volume leveling, the method comprising:receiving, by an audio device, an audio signal;
receiving, by the audio device, indicator data indicating that the audio signal is of a first type;
determining a volume index value of the audio device, wherein the volume index value is a user-selected volume setting of the audio device;
determining a first gain of the audio signal, wherein the first gain is determined by using the volume index value to lookup the first gain in a volume curve table for signals of the first type;
determining an estimated root mean square (RMS) value of a first portion of the audio signal using a formula: x2rms(n)=(1?k)·x2rms (n?1)+k·[x(n)]2 where x2rms(n?1) represents a previous estimated RMS value for a previous portion of the audio signal sampled prior to the first portion, x(n) represents the first portion of the audio signal, and k=1?exp(?2.2/(fs*t/1000)), where t is a time constant in milliseconds, and fs is a sampling rate of the audio signal;
determining a second gain of the first portion of the audio signal, wherein the second gain is determined by using the estimated RMS value of the first portion to lookup the second gain on a static level curve of input level versus gain;
generating a modified first portion of the audio signal by multiplying the first portion of the audio signal by the second gain;
equalizing the modified first portion of the audio signal by reducing an audio level for a first frequency range of the modified first portion of the audio signal to reduce an output level of a loudspeaker at the first frequency range; and
outputting the modified first portion of the audio signal to the loudspeaker.

US Pat. No. 10,461,711

METHOD AND APPARATUS FOR OUTPUTTING AUDIO SIGNAL, METHOD FOR CONTROLLING VOLUME

Gaonda Corporation, Goya...

1. A method for outputting an audio signal, the method comprising:measuring, by a processor, a first hearing threshold of a user in a frequency band among a plurality of predefined frequency bands;
setting, by the processor, an output level of a modulated signal in the frequency band to a level less than or equal to a level of the first hearing threshold;
setting, by the processor, an output level of an audio signal in the frequency band to a level greater than the level of the first hearing threshold, wherein the output level of the audio signal is determined using a weight value and the level of the first hearing threshold, such that an increase of the level of the first hearing threshold causes a decrease of a rate of increase of the output level of the audio signal in the frequency band;
outputting, by the processor, the modulated signal and the audio signal simultaneously via an audio output unit, wherein the modulated signal is outputted at a level that is equal to the level of the first hearing threshold;
outputting, by the processor, an interface via a display unit, the interface including:
i) a frequency selection module for selecting one of the plurality of predefined frequency bands on a display unit,
ii) a visual information output module for outputting a visual signal which changes in synchronization with a modulation pattern of the modulated signal for each respective frequency band of the plurality of predefined frequency bands, the visual signal being output in a different visual pattern for each frequency band according to the modulation pattern, and
iii) a volume adjustment module for dynamically adjusting the first hearing threshold according to an improvement in hearing of the user by adjusting an intensity of a modulated signal of the selected frequency band such that the modulated signal of the selected frequency band is not audible,
wherein the visual information output module is outputted at a position in a central area of the volume adjustment module, the visual signal outputted by the visual information output module for each frequency band changes according to the same modulation pattern as that of the corresponding modulation signal, and the visual signal is outputted at a fixed position when the volume adjustment module is adjusted;
receiving, by the processor, response information of the user via the interface responding to the visual signals for the respective frequency bands when the user perceives one or more of the modulated signals for the respective frequency bands as a result of the improvement in hearing of the user;
adjusting, by the processor, an output level of the one or more perceived modulated signals based on the response information of the user until the modulated signal is no longer heard by the user;
measuring, by the processor, a second hearing threshold of the user in the frequency band that is lower than the first hearing threshold based on response information received from the user; and
adjusting, by the processor, the respective output levels of the modulated signal and the audio signal based on the second hearing threshold,
wherein the adjusting of the respective output levels of the modulated signal and the audio signal includes lowering the output level of the modulated signal to a level less than or equal to a level of the second hearing threshold and lowering the output level of the audio signal to a level greater than the level of the second hearing threshold.

US Pat. No. 10,461,707

AMPLIFIER CLASS AB OUTPUT STAGE

TEXAS INSTRUMENTS INCORPO...

1. An amplifier, comprising:an input stage;
a folded cascode stage coupled to the input stage; and
a class AB output stage coupled to the folded cascode stage, the class AB output stage comprising:
a high-side output transistor;
a low-side output transistor; and
a high-side feedback circuit coupled to the high-side output transistor, the high-side feedback circuit comprising:
a high-side sense transistor comprising a control terminal, wherein the control terminal of the high-side sense transistor is coupled to a control terminal of the high-side output transistor; and
a high-side feedback transistor coupled to an output of the high-side sense transistor and to the folded cascode stage;
wherein a first output of the folded cascode stage is coupled to the control terminal of the high-side sense transistor and the control terminal of the high-side output transistor;
wherein the high-side feedback transistor is configured to operate as a degeneration resistor.

US Pat. No. 10,461,700

TEMPERATURE COMPENSATED OSCILLATOR

SKYWORKS SOLUTIONS, INC.,...

1. A relaxation oscillator comprising:a proportional to absolute temperature (PTAT) biasing unit configured to output a bias signal, the PTAT biasing unit being formed in an integrated circuit;
an additional biasing unit configured to receive the bias signal from the PTAT biasing unit and generate an output signal based on the bias signal;
a voltage-controlled RC relaxation oscillator core including first and second cross-coupled MOSFETs each having a gate, a source, and a drain, and a capacitor coupled between the source of the first MOSFET and the source of the second MOSFET, the gate of the first MOSFET being coupled to the drain of the second MOSFET and the gate of the second MOSFET being coupled to the drain of the first MOSFET, the oscillator core configured to generate an oscillating signal upon receiving the output signal from the additional biasing unit, the oscillating signal having a smooth profile and a fundamental frequency of less than five megahertz (MHz); and
an enable unit coupled to the oscillator core and configured to operate the oscillator core in one of an active mode in which the oscillating signal is generated and a sleep mode in which the oscillating signal is not generated, the enable unit being formed in the integrated circuit with the PTAT biasing unit, the additional biasing unit, and the oscillator core.