US Pat. No. 10,771,380

FAST CONTROL PATH AND DATA PATH CONVERGENCE IN LAYER 2 OVERLAY NETWORKS

Telefonaktiebolaget LM Er...

1. A method for fast convergence in Layer 2 Overlay network, the method comprising:causing a forwarding of Layer 2 (L2) traffic addressed to one or more remote L2 destinations according to a remote L2 (RL2) instance, wherein the RL2 instance identifies a primary path for forwarding the traffic towards the remote L2 destinations, and a provider edge service label (PESL) instance associated with a broadcast domain including one or more network devices for forwarding the L2 traffic towards the L2 destination, and wherein the PESL instance is identified with a unique immutable PESL instance label; and
causing, in response to a network event, an update of the RL2 instance that results in an update of a data plane for forwarding the L2 traffic without necessitating an update of forwarding table entries for each one of the one or more remote L2 destinations.

US Pat. No. 10,771,379

APPARATUS, SYSTEM, AND METHOD FOR DISCOVERING NETWORK PATHS

Juniper Networks, Inc., ...

1. A method comprising:receiving, at a source node, a request to discover a plurality of network paths that each lead from the source node to a destination node; and
simultaneously discovering the plurality of network paths that lead from the source node to the destination node by:
identifying each next hop that resides between the source node and the destination node;
sending, from the source node to each next hop, a path-request probe that prompts the next hop to:
determine each next-closest hop that resides between the next hop and the destination node by directing the next hop to identify, within a routing table of the next hop, an Internet protocol address of each next-closest hop based at least in part on an Internet protocol address of the destination node; and
return, to the source node, a path-response probe that identifies the next-closest hops as residing between the next hop and the destination node by directing the next hop to list the Internet protocol address of each next-closest hop within a type-length-value field of the path-response probe;
receiving, at the source node, the path-response probes from the next hops;
determining, at the source node based at least in part on the path-response probes, that one or more of the plurality of network paths include:
the next hops that reside between the source node and the destination node; and
the next-closest hops that reside between the next hops and the destination node; and
iteratively discovering any subsequent hops that reside between the next-closest hops and the destination node by sending a subsequent path-request probe to each next-closest hop.

US Pat. No. 10,771,378

RADIO FREQUENCY (RF) ETHERNET TRUNKING

Cisco Technology, Inc., ...

1. A system comprising:a first data pathway between a headend and a first node, the first data pathway comprising a fiber optic channel using a first data transport protocol;
a second data pathway between the first node and a second node, the second data pathway comprising a first coaxial cable channel using the first data transport protocol over a first radio frequency spectrum; and
a third data pathway between the second node and a third node, the third data pathway comprising a second coaxial cable channel using the first data transport protocol over the first radio frequency spectrum, wherein the second data pathway and the third data pathway comprise a data trunk using the first data transport protocol for data to and from the first node.

US Pat. No. 10,771,377

SYSTEM AND METHOD FOR REAL-TIME LOAD BALANCING OF NETWORK PACKETS

NetScout Systems, Inc., ...

1. A method for routing data packets at a packet flow switch, comprising:determine if packets received from a monitored network is one of a control packet or one of a user plane packet utilizing a plurality of network probes each configured and operative to generate an ASI data set including key performance indicators and Adaptive Session Records;
responsive to determining the received packet is a control plane packet, causing the control plane packet to be distributed to each of the plurality of network probes;
responsive to identifying that a user plane packet is associated with a new session-instance not already monitored by a network probe, assigning the user plane packet to one of the plurality of network probes and updating a session-instance database to include an identified packet session-instance if determined a new session-instance, the assigning comprising:
selecting one of the network probes;
saving an identifier of the selected network probe and associating a packet session-instance identifier with the saved identifier of the selected network probe; and
sending the user plane packet to the selected network probe; and
purging a control packet from each of the probes it is distributed to contingent upon prescribed criteria; and
purging a packet session-instance from the session-instance database when a control plane packet associated with the packet session-instance is purged from each of the probes.

US Pat. No. 10,771,376

FINANCIAL NETWORK

CFPH, LLC, New York, NY ...

1. A method comprising:controlling, by a first processing device configured to map a local network address and port pair on a first network to a service on a remote second network:
opening a first socket to a first destination on a remote second network and opening a second socket to a second destination on the remote second network;
balancing direction of incoming traffic to the local network address and port pair between the first destination using the first socket and the second destination using the second socket; and
routing incoming traffic to the local network address and port pair to the second destination using the second socket in response to a determination that the first destination is in a fail state; and
controlling, by a second processing device:
accessing a portion of a memory space shared with the first processing device, in which the portion of the memory space includes at least one of a packet header or an entire packet; and
transmitting the at least one of the packet header or the entire packet to an analytics engine while the first processing device routes the entire packet.

US Pat. No. 10,771,375

ROUTING NETWORK TRAFFIC BASED ON DESTINATION

Cisco Technology, Inc., ...

1. A method, comprising:identifying an address within a packet of a traffic flow associated with a network device;
comparing the address within the packet with a stored address, the stored address associated with a route for an alternative traffic path, the alternative traffic path being different from a default route of traffic passing through the network device;
based on the address within the packet matching the stored address, determining that the traffic flow is to be rerouted along the alternative traffic path instead of the default route of traffic;
receiving a Domain Name Server (DNS) query associated with the traffic flow that is determined to be rerouted along the alternative traffic path;
rewriting the DNS query to be routed through the alternative traffic path and to a DNS server associated with the alternative traffic path;
receiving a DNS response from the DNS server, a resource in the DNS response being based on the DNS query; and
rewriting the DNS response to yield a modified DNS response such that the modified DNS response appears to have been one or more of: routed along the default route of traffic or received from a default DNS server associated with the default route of traffic.

US Pat. No. 10,771,374

DELAY MEASUREMENT METHOD AND DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. A delay measurement method, comprising:receiving, by a first physical layer chip of a first physical port of a network device, a packet;
sending, by the first physical layer chip, a first time stamp and the packet to a first Media Access Control (MAC) chip of the first physical port, wherein a value of the first time stamp is a time point at which the packet reaches the first physical layer chip;
adding, by the first MAC chip, the first time stamp to the packet;
sending, by the first MAC chip, the packet to a second MAC chip of a second physical port;
receiving, by the second MAC chip, the packet;
extracting, by the second MAC chip, the first time stamp of the packet;
sending, by the second MAC chip, the packet to a second physical layer chip of the second physical port;
receiving, by the second MAC chip, a second time stamp of the packet from the second physical layer chip, wherein a value of the second time stamp is a time point at which the packet reaches the second physical layer chip; and
calculating, by the network device, a processing delay for the packet by subtracting the first time stamp from the second time stamp.

US Pat. No. 10,771,373

AD HOC NETWORK ROUTE CONSTRUCTION SYSTEM, NODE, AND CENTER NODE

KYOCERA DOCUMENT SOLUTION...

1. An ad hoc network route construction system, comprising:one center node; and
a plurality of next hop nodes, wherein
the center node
generates a request packet including a data part and a header part, a MAC (Media Access Control) address of the center node and position information of the center node being described in the data part, a positive integer value being described in the header part as time to live, and
transmits the request packet to one or more next hop nodes located in an area where the one or more next hop nodes can communicate with the center node,
each of the next hop nodes
receives the request packet,
if determining that a value of the time to live described in the header part of the request packet is 0,
generates a reply packet including a data part, all of MAC addresses and all pieces of position information described in the data part of the received request packet being described in the data part of the reply packet, and
transmits the reply packet to a request source node as a source of the received request packet,
each of the next hop nodes excluding the next hop node being a source of the reply packet further
receives the reply packet from a request destination node, and
transmits the received reply packet to the request source node, and the center node further
receives one or more reply packets from one or more request destination nodes, and then
creates, at regular time intervals, a routing table based on all of MAC addresses and all pieces of position information described in data parts of the received one or more reply packets.

US Pat. No. 10,771,372

TRANSMITTING TEST TRAFFIC ON A COMMUNICATION LINK

Oracle International Corp...

1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:identifying data traffic being transmitted on a communication link from a first node to a second node;
determining a physical characteristic associated with a physical cable between the first node and the second node;
based at least on the physical characteristic associated with the physical cable, selecting a first level of test traffic to transmit on the communication link from the first node to the second node;
transmitting the first level of test traffic, concurrently with the data traffic being transmitted on the communication link, from the first node to the second node;
while testing using the first level of test traffic remains incomplete:
receiving, by the first node from the second node, a test modification message;
wherein the test modification message comprises a second level of test traffic to be transmitted on the communication link, and the second level of test traffic is determined by the second node based on a change in a characteristic associated with the data traffic transmitted between the first node and the second node;
responsive to receiving the test modification message: transmitting the second level of test traffic, rather than the first level of test traffic, concurrently with the data traffic transmitted between the first node and the second node.

US Pat. No. 10,771,371

DYNAMIC NETWORK MONITORING

INTERNATIONAL BUSINESS MA...

1. A system for monitoring performance in a networked environment, comprising:a hardware CPU, a hardware computer readable memory and a hardware computer readable storage medium;
program instructions to migrate a virtual machine from a first host to a second host having different performance characteristics than the first host;
program instructions to automatically adjust, by the hardware computer device, an initial monitoring threshold of the first host to create an adjusted monitoring threshold for the second host; and
program instructions to determine whether the migration of the virtual machine from the first host to the second host is acceptable based on determining that an angle in a traffic triangle is within an acceptable range,
wherein the traffic triangle includes the first host, the second host and a hardware node in a networked environment, and
wherein the adjusting comprises:
determining a multiplier based on a comparison of performance characteristics of the first host to performance characteristics of, the second host; and
determining the adjusted monitoring threshold for the second host by multiplying the initial monitoring threshold used with the first host by the multiplier,
wherein the program instructions are stored on the hardware computer readable storage medium.

US Pat. No. 10,771,370

DYNAMIC MONITORING AND VISUALIZATION FOR NETWORK HEALTH CHARACTERISTICS

Silver Peak Systems, Inc....

1. A computer-implemented method for dynamically monitoring and displaying network performance of a plurality of network devices in a communications network via an interactive graphical user interface, the method comprising:receiving a plurality of collected metrics regarding at least one health characteristic for a plurality of network paths over a first period of time, each network path comprising a first network device at a first terminal end and a second network device at a second terminal end from the plurality of network devices in the communications network;
applying a first rule set defining at least one threshold to assign an aggregate first classification for each first network device and second network device pair associated with the plurality of network paths over the first period of time;
applying a second rule set defining at least one threshold to assign an aggregate second classification for each network device over the first period of time, the aggregate second classification comprising an aggregate classification for each network device associated with the first network device and second network device pairs of the plurality of network paths; and
displaying to a user the aggregate second classification for each network device via a selectable object on an interactive graphical user interface, where one selectable object of the interactive graphical user interface represents an aggregate network performance for a network device based on the collected metrics for the plurality of network paths over the first period of time.

US Pat. No. 10,771,369

ANALYZING PERFORMANCE AND CAPACITY OF A COMPLEX STORAGE ENVIRONMENT FOR PREDICTING EXPECTED INCIDENT OF RESOURCE EXHAUSTION ON A DATA PATH OF INTEREST BY ANALYZING MAXIMUM VALUES OF RESOURCE USAGE OVER TIME

International Business Ma...

8. A computer system, comprising:a processor;
a memory device coupled to the processor; and
a computer readable storage device coupled to the processor, wherein the storage device contains program code executable by the processor via the memory device to implement a method for predicting a failure or performance degradation of a storage environment having a plurality of component and subcomponents, the method comprising:
monitoring, by a processor of a computing system, a current utilization of one or more resources associated with the plurality of components and subcomponents over a data path of interest, wherein the one or more resources affect one or more performance measures of the storage environment;
calculating, by the processor, a maximum utilization threshold for each resource of the one or more resources, such that exceeding the maximum utilization threshold impacts one or more performance measures, wherein the maximum utilization threshold is based on a maximum utilization of a component of the storage environment;
creating, by the processor, an expected performance threshold associated with an expected performance for each performance measure of the one or more performance measures over the data path of interest;
ascertaining, by the processor, an actual performance for each performance measure based on the monitoring of the current utilization;
analyzing, by the processor, maximum values of resource usage over time to predict when the expected performance will fall outside of an overall performance threshold for the data path of interest; and
determining, by the processor, an expected incident of resource exhaustion on the data path of interest based on the analyzing of the maximum values of resource usage over time;
wherein the computing system automatically performs a corrective action in response to the determining an expected incident of resource exhaustion on the data path of interest, the corrective action including automatically generating a purchase order to purchase a replacement component without a user reviewing the purchase order.

US Pat. No. 10,771,368

FACILITATING THE RESOLUTION OF ADDRESS CONFLICTS IN A NETWORKED MEDIA PLAYBACK SYSTEM

Sonos, Inc., Santa Barba...

1. A first playback device comprising:a network interface that is configured to provide an interconnection with at least one data network;
at least one processor;
a non-transitory computer-readable medium; and
program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the first playback device to perform functions including:
maintaining a first Internet Protocol (IP) address of the first playback device;
receiving, from a second playback device that is configured to communicate with the first playback device via a data network, a first probe message;
after receiving the first probe message, (a) making a first determination that the first probe message includes an indication that the first playback device is to renew the first IP address; (b) making a second determination that the first probe message has not previously been received by the first playback device; and (c) making a third determination that the first probe message includes an indication that the first playback device is to forward the first probe message;
in response to making both the first determination and the second determination, requesting a second IP address; in response to requesting the second IP address, receiving the second IP address,
wherein the second IP address is different from the first IP address;
operating in accordance with the second IP address; and
in response to making the third determination, sending, to a third playback device that is configured to communicate with the first playback device via the data network and has a third IP address, a second probe message comprising an indication that the third playback device is to renew the third IP address.

US Pat. No. 10,771,367

CUSTOMER PREMISES EQUIPMENT CENTRALIZED SELF-TEST AND SYSTEM CHECK

CSC Holdings, LLC, Bethp...

1. A service provider system within a point-to-multipoint communication system comprising:processor circuitry configured to:
maintain an index of unused subscriber devices, wherein the service provider system provides a service to subscriber devices, and wherein an unused subscriber device in the index of unused subscriber devices is a subscriber device not receiving the service from the service provider system;
select a target subscriber device from the index of unused subscriber devices;
maintain a set of tasks that can be performed by the subscriber devices; and
select a task from the set of tasks to send to the target subscriber device for execution; and
physical layer circuitry configured to:
send the task to the target subscriber device for execution; and
receive a task result from the target subscriber device.

US Pat. No. 10,771,366

DATA RATE MONITORING TO DETERMINE CHANNEL FAILURE

Unisys Corporation, Blue...

1. A method, comprising:measuring, by a client monitoring agent residing on a client computing device, a data rate of a set of channels on a remote server, wherein the step of measuring the data rate comprises;
initializing a communication session with the remote server;
transmitting, through the communication session, channel data rate commands for each of a plurality of channels in a set of channels to the remote server for execution, wherein the channel data rate commands are generated by a client script engine, each of the channel data rate commands specifying at least one time period for the channels in the set of channels for measuring data rate; and
receiving, through the communication session, the data rate of each of the channels in the set of channels, in response to the channel data rate commands;
storing the data rate of each channel of the set of channels in a respective string variable,
wherein the client monitoring agent executes instructions on the client computing device;
calculating, by the client monitoring agent, an average data rate for the channels in the set of channels, wherein the calculating comprises performing 32-bit unsigned arithmetic on the string variables;
determining, by the client monitoring agent, whether any channel of the set of channels is below a threshold amount below the calculated average data rate; and
generating, by the client monitoring agent, an alert for a data channel when the data channel is determined to be below the calculated average data rate by the threshold amount.

US Pat. No. 10,771,365

OPTIMIZING TIMEOUT SETTINGS FOR NODES IN A WORKFLOW

PAYPAL, INC., San Jose, ...

1. A system, comprising:a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising:
accessing a unidirectional workflow execution engine that includes a plurality of nodes that each executes an Application Programming Interface (API) in a cloud computing environment, wherein the plurality of nodes include at least a first node and a second node, the first node being executed before the second node;
retrieving a timeout setting of the first node;
determining an execution time of the first node;
calculating a difference between the retrieved timeout setting and the execution time of the first node;
retrieving a timeout setting of the second node; and
modifying the timeout setting of the second node by adding, to the retrieved timeout setting of the second node, the calculated difference between the retrieved timeout setting and the execution time of the first node.

US Pat. No. 10,771,364

NETWORK INTERFACE CONTROLLER

Shanghai Zhaoxin Semicond...

1. A network interface controller, comprising:a receiving circuit configured to receive a packet, wherein the packet comprises a segment of a first layer protocol and a segment of a second layer protocol;
a boundary determination circuit configured to perform a boundary determination operation on the packet to generate boundary information, wherein the boundary information comprises a length of the segment of the second layer protocol and a boundary indication signal;
a first checksum calculation circuit coupled to the boundary determination circuit to complete a calculation of a first checksum corresponding to the segment of the first layer protocol after receiving the length of the segment of the second layer protocol; and
a second checksum calculation circuit coupled to the boundary determination circuit to start a calculation of a second checksum corresponding to the segment of the second layer protocol after receiving the boundary indication signal.

US Pat. No. 10,771,363

DEVICES FOR ANALYZING AND MITIGATING DROPPED PACKETS

Juniper Networks, Inc., ...

1. A method, comprising:subscribing, by a control device, to receive data from a network device based on an occurrence of an event,
wherein the event includes a packet being dropped by the network device;
receiving, by the control device, the data from the network device based on subscribing to receive the data from the network device and based on the occurrence of the event,
wherein the data is associated with a plurality of packets that have been dropped by the network device,
wherein the packet is one of the plurality of packets, and
wherein the data includes:
a first descriptor based on a type of packet drop associated with the packet dropped by the network device, and
one or more second descriptors based on a packet flow associated with the plurality of packets dropped by the network device;
inputting, by the control device, the first descriptor and the one or more second descriptors into a model;
comparing, by the control device and using the model, the first descriptor and the one or more second descriptors;
determining, by the control device and based on comparing the first descriptor and the one or more second descriptors, a dropped packet profile associated with the network device;
generating, by the control device, a first notification based on the dropped packet profile associated with the network device; and
transmitting, by the control device, the first notification to cause an action to be performed based on the first notification.

US Pat. No. 10,771,362

MEDIA STREAM MONITOR

iHeartMedia Management Se...

1. A method comprising:receiving, in response to a request, a plurality of stream records including a plurality of parameters to identify a plurality of media streams being served by a stream server, wherein each media stream of the plurality of media streams includes packetized media content and associated metadata;
concurrently monitoring stream events for the plurality of stream records, through one or more program listening objects, wherein each media stream of the plurality of media streams is served by the stream server;
triggering an event handler to respond to a specific stream event detected by the one or more program listening objects during the monitoring stream events, wherein the event handler is triggered based on an event type in an event class;
testing the plurality of media streams based at least in part on the event handler; and
displaying a result of the testing the plurality of media streams to a display device.

US Pat. No. 10,771,361

APPARATUS AND METHOD FOR PROVIDING POWER TO MACHINE MEASUREMENT DEVICES VIA DATA COMMUNICATION NETWORK

epro GmbH, (DE)

1. A machine measurement system for collecting vibration data that is indicative of operational conditions of a machine in an industrial setting, the machine including a rotating shaft supported by a bearing, the system comprising:a central logic unit that receives the vibration data that is indicative of the operational conditions of the machine, the central logic unit in communication with an Ethernet network;
a Ethernet network switch in communication with the central logic unit via the Ethernet network, the Ethernet network switch comprising:
an internal power supply for supplying power to the Ethernet network switch; and
one or more Power over Ethernet (PoE) ports that are operable to communicate data and provide power to devices connected thereto; and
a dual-channel measurement unit mounted adjacent the shaft and bearing of the machine, the dual-channel measurement unit comprising:
a first sensor comprising an eddy current sensor for sensing vibration of the machine and generating a first type of vibration data that is indicative of relative shaft vibration;
a second sensor comprising a piezo electric sensor or a seismic probe sensor for sensing vibration of the machine and generating a second type of vibration data that is indicative of absolute bearing vibration; and
one or more sensor modules, each comprising:
one or more sensor interfaces for providing an electrical connection to one or both of the first and second sensors; and
a PoE port connected to one of the one or more PoE ports of the Ethernet network switch for communicating data to and receiving power from the Ethernet network switch,
wherein the central logic unit receives the first and second types of vibration data via the Ethernet network, and calculates absolute shaft vibration according to:
absolute shaft vibration=relative shaft vibration?absolute bearing vibration.

US Pat. No. 10,771,360

ENDPOINT DATA COLLECTION IN BATTERY AND DATA CONSTRAINED ENVIRONMENTS

Alarm.com Incorporated, ...

1. A computer-implemented method comprising:receiving, by a monitoring system that is configured to monitor a property, multiple sensor reports from sensors at the property, wherein each sensor report describes sensor data generated by a respective sensor monitoring the property;
analyzing, by the monitoring system, the multiple sensor reports from the sensors at the property;
aggregating, by the monitoring system, the multiple sensor reports into an aggregated sensor report message,
wherein aggregating comprises;
identifying, by the monitoring system, patterns in the multiple sensor reports from the sensors at the property; and
compressing, by the monitoring system, using one or more data compression techniques the multiple sensor reports into a report message; and
in response to determining that a reporting criteria has been satisfied, communicating the aggregated sensor report message to a monitoring server.

US Pat. No. 10,771,359

SYSTEM CAPACITY HEATMAP

Fidessa Trading UK Limite...

1. A method for collecting, processing, and visualizing data of distributed resources in a distributed environment by a monitoring system, the monitoring system comprising at least a collecting server, a processing server, and a terminal device configured to communicate over a network, and wherein the collecting server is configured to communicate with one or more distributed resources over the network, comprising:receiving, by the collecting server, data associated with a plurality of variables monitored over a period of time at the one or more distributed resources over the network, wherein the data associated with the plurality of variables is included in one or more batch files;
determining, by the one or more distributed resources, whether an error occurred during transmission of the one or more batch files;
generating, in the monitoring system, an error warning associated with the error;
retransmitting, by the one or more distributed resources, the one or more batch files based on the error; and
receiving, by the collecting server, the one or more retransmitted batch files;
storing, by the collecting server, the data associated with the plurality of variables;
calculating, by the processing server, metric values based on the stored data, wherein the metric values correspond to a plurality of time intervals during the period of time;
generating, by the processing server, a graphical representation of the metric values corresponding to the time intervals for each distributed resource, wherein the generating comprises:
determining, based on the metric values, visual indicators to represent each of the metric values at the time intervals for each distributed resource, wherein each of the visual indicators corresponds with one of a plurality of threshold values, and
mapping the visual indicators to a set of cells along a time axis within a window of the graphical representation;
displaying the graphical representation on a terminal device, wherein the graphical representation is a heatmap and wherein the graphical representation includes interactive elements to selectively display a desired metric;
rendering and displaying, on the graphical representation, the metric values corresponding to each of the visual indicators on the terminal device, wherein the metric values are displayed on a portion of the graphical representation corresponding to each metric value respectively; and
recording, by the process server, one or more data breaches of the one or more distributed resources and information corresponding to the one or more data breaches to an information request window of a problem management system, wherein the corresponding information includes at least one of an urgency rating, a status, an impact, an investigation driver, a summary, a note, and a due date, and wherein the problem management system is illustrated within the graphical representation;
monitoring, by the process server, data breaches of the one or more distributed resources recorded in the problem management system;
transferring the recorded data breach or information corresponding to the one or more data breaches between at least the problem management system and a second system or a second program, wherein the second system or the second program is distinct from the problem management system; and
rendering a breach indicator on the graphical representation corresponding to the one or more data breaches, wherein the breach indicator includes an interactive component which enables performance of a plurality of data breach management functions.

US Pat. No. 10,771,358

DATA ACQUISITION DEVICE, DATA ACQUISITION METHOD AND STORAGE MEDIUM

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable storage medium having stored therein a program for acquiring data, the program causing a computer to execute a process comprising:storing an object that is a unit obtained by sectioning received data by a certain size, the object including a plurality of sessions;
calculating a value related to an acquisition time for each of a plurality of data acquisition methods that include a first method that acquires the data in a unit of the session and a second method that acquires the data in a unit of the object;
determining the data acquisition method based on the value related to the calculated acquisition time;
performing the data acquisition with the determined data acquisition method;
periodically acquiring the data with the data acquisition method other than the determined data acquisition method;
updating the value related to the acquisition time; and
determining the data acquisition method based on the value related to the acquisition time.

US Pat. No. 10,771,357

METHOD AND SYSTEM FOR DELIVERING WEB PAGE CONTENT USING EDGE SERVER

Oath Inc., New York, NY ...

1. A method, implemented on at least one machine each of which has at least one processor, storage, and a communication platform connected to a network for content delivery, the method comprising:receiving a request from a user for a page including at least a piece of generic content and a plurality of pieces of customized content, wherein the plurality of pieces of customized content are generated by a content server;
forwarding the request from the user to the content server over the network;
obtaining the piece of generic content and a first instruction, wherein the piece of generic content is independent of the user;
transmitting the piece of generic content with the first instruction to the user prior to receiving a piece of the customized content from the content server; and
sending, prior to an additional request being sent from the user and subsequent to the piece of generic content being transmitted to the user, each of the plurality of pieces of customized content received from the content server to the user, wherein:
each of the plurality of pieces of customized content is sent to the user prior to a subsequent piece of customized content being received from the content server,
each of the plurality of pieces of customized content is sent one at a time in a sequence to be assembled in the sequence of receipt by the user at corresponding locations on the page based on the first instruction, and
at least a first piece of customized content of the plurality of pieces of customized content is associated with the piece of generic content in accordance with a second instruction received from the content server, the second instruction indicating that the piece of generic content is to be used as a fallback version when the at least first piece of customized content is unavailable, and the second instruction not being provided to the user.

US Pat. No. 10,771,355

METHOD FOR MEASURING END-TO-END INTERNET APPLICATION PERFORMANCE

Google LLC, Mountain Vie...

1. A method comprising:analyzing, by a processing device of a server computer system, client requests from a plurality of internet service providers, the client requests comprising requests to access media items and being associated with internet service provider identities, wherein the plurality of internet service providers comprise a first internet service provider and a second internet service provider;
identifying, by the processing device, a first set of the client requests that are associated with the first internet service provider and a second set of the client requests that are associated with the second internet service provider, wherein the identifying is based on the internet service provider identities associated with the client requests;
determining, by the processing device of the server computer system, for at least one client request of each of the first set and the second set: a request time, a payload data quantity, and an elapsed time, wherein the elapsed time is for completion of a data transfer of the payload data quantity;
calculating, by the processing device of the server computer system, a transfer rate for a client request of each of the plurality of internet service providers, wherein the transfer rate comprises an application level throughput for the at least one client request and is based on payload data quantity and elapsed time;
calculating, by the processing device of the server computer system, a performance measurement for each of the plurality of internet service providers, wherein a performance measurement of the first internet service provider is based on a percentage of transfer rates of the first set of client requests that meet a transfer threshold; and
providing performance results of each of the plurality of internet service providers to a user device of one of the plurality of internet service providers, wherein the performance results comprise a performance result based on the performance measurement of the first internet service provider.

US Pat. No. 10,771,354

DIGITAL PLATFORM FOR MULTIPLE NETWORK DEPLOYMENTS

LOTUSFLARE, INC., Sunnyv...

15. A method comprising:receiving, through a network management platform from a network computing device, a request to generate a plurality of cellular network deployments, each of the cellular network deployments comprising a deployment of a cellular network utilizing a particular digital communication network;
receiving, through the network management platform from the network computing device, data specifying first interface elements and first rules for a first cellular network deployment and second interface elements and second rules for a second cellular network deployment;
sending the first cellular network deployment to a first plurality of client computing devices, the first cellular network deployment including the first interface elements and first rules;
sending the second cellular network deployment to a second plurality of client computing devices, the second cellular network deployment including the second interface elements and second rules;
receiving first network usage data from the first plurality of client computing devices based upon using the first cellular network deployment and receiving second network usage data from the second plurality of client computing devices based upon using the second cellular network deployment;
providing, to the network computing device, the first network usage data with an identification of the first cellular network deployment and the second network usage data with an identification of the second cellular network deployment.

US Pat. No. 10,771,353

POLICY ENFORCEMENT AS A SERVICE FOR THIRD PARTY PLATFORMS WITH ASYNCHRONOUS USER TRACKING MECHANISMS

SALESFORCE.COM, INC., Sa...

1. One or more non-transitory computer-readable media (NTCRM) comprising instructions for providing a Policy Enforcement as a Service web service (PEaaS-WS), wherein execution of the instructions by one or more processors of a computing system is operable to cause the computing system to:generate or update, in response to each received user request to access a service provided by a third party platform (TPP) of a plurality of TPPs, usage metrics of user systems that sent each received user request;
generate or update, based on each received user request to access the service provided by the TPP, an alert database object (DBO) to store alert attribute value pairs (AVPs) for each received user request, each alert AVP comprising: a value to indicate a client identifier (client_id) associated with a user or user system that sent a user request, and an attribute including a policy identifier (policy_id), the policy_id indicating a policy defined by the TPP for the service provided by the TPP;
determine, in response to obtaining a dequeued alert AVP, whether an infraction has occurred based on the usage metrics, the infraction being a violation of the policy indicated by the policy_id of the dequeued alert AVP that is committed by a user indicated by the client_id of the dequeued alert AVP;
generate or update a suspension DBO including infraction records, each infraction record comprising: an infraction client_id field to indicate a client_id of a user that has committed one or more infractions, and a suspension period field to indicate a suspension period, the suspension period being a period that a user indicated by the infraction client_id field is to be prevented from accessing the service;
delete an individual infraction record from the suspension DBO when a suspension period indicated by the individual infraction record has expired;
control transmission, in response to a request for suspended users, of a suspension indication to indicate the suspension DBO; and
control transmission of a reinstatement message when the suspension period indicated by the individual infraction record has expired, the reinstatement message to indicate that the suspension period indicated by the individual infraction record has expired.

US Pat. No. 10,771,352

METHOD AND SYSTEM FOR PRIORITIZING NETWORK SERVICES

NETPRECEPT LTD., New Por...

1. A non-transitory computer-readable storage medium including computer program code to cause a computer system to manage access to a server, the server access including one or more associated communications traffic connections, and the computer program code configured to cause the computer system to at least:determine, based on a data structure at a computer of a source or on information derived from the data structure, whether the communications traffic connection(s) with the source should receive prioritization, wherein the data structure is separate than an Internet Protocol (IP) address of a computer of the source with which the communication traffic connection(s) is made; and
responsive to determination that the communications traffic connection(s) with the source receive prioritization, apply a mode of prioritization to communications traffic associated with that server access and originating from the source in the communications traffic connection(s), the mode of prioritization comprising denying or delaying one or more communications traffic connections in favor of the communications traffic associated with the server access.

US Pat. No. 10,771,351

FAST PROVISIONING SERVICE FOR CLOUD COMPUTING

DIGITAL RIVER, INC., Min...

1. A fast provisioning system for creating an infrastructure-as-a-service virtual computing platform, comprising:a computing machine further comprising:
a processor;
a memory associated with the processor;
a display having a graphical user interface, the display communicatively coupled to the processor and memory; and
a resource creation module including instructions that, when executed by the processor, causes the computing machine to create a virtual machine for an infrastructure-as-a-service computing platform, the instructions and processor:
displaying a prompt including a first list further including a plurality of environments for a virtual machine;
receiving an input for one of the plurality of environments from the first list;
displaying a prompt including a second list having at least one machine role associated with the one of the plurality of environments for a virtual machine;
receiving an input from the second list for at least one machine role associated with the one of the plurality of environments for a virtual machine;
presenting at least one chef role from a repository of chef roles for a virtual machine, the at least one chef role based on the input from the first list for the one of the plurality of environments, and the input from the second list for at least one machine role associated with the one of the plurality of environments for the virtual machine, the first list and the second list being independent from one another; and
receiving a chef role input and deploying a virtual machine for the infrastructure-as-a-service platform, the chef role including the machine role instructions for creating the virtual computing platform.

US Pat. No. 10,771,350

METHOD AND APPARATUS FOR CHANGEABLE CONFIGURATION OF OBJECTS USING A MIXED REALITY APPROACH WITH AUGMENTED REALITY

Siemens Aktiengesellschaf...

9. A method for displaying information in an augmented reality (AR) application comprising:in a computer processor, receiving an input from a user relating to a spatial coordinate within a field of view of the user, wherein the input received from the user is provided by the user dragging a reconfigurable component object representative of a real-world object to the spatial coordinate in the field of view the user;
in the computer processor, associating the user input with a first configuration of the real-world object; and
in the AR application, superimposing in a viewable mobile device, augmented reality data over a depiction of the real-world object
wherein the real-world object is a computer rack having the first configuration and a second configuration, the first configuration of the computer rack defining a first placement of a first plurality of computer components in the computer rack in a first specific order, and the second configuration of the computer rack defining a second placement of a second plurality of computer components in the computer rack in a second specific order that is different than the first specific order.

US Pat. No. 10,771,349

TOPOLOGY REMEDIATION

Hewlett Packard Enterpris...

1. A computing device, comprising:a processor; and
a non-transitory storage medium storing instructions to cause the processor to:
instantiate an instantiated service according to a topology comprising a plurality of nodes, wherein each node of the plurality of nodes is associated with a respective lifecycle management action (LCMA) of a number of LCMAs;
derive a plurality of remediation actions in response to an incident within the instantiated service based on a number of policies associated with the topology; and
execute a remediation action of the plurality of remediation actions to remediate the incident.

US Pat. No. 10,771,348

INFERRING COMPONENT PARAMETERS FOR COMPONENTS IN A NETWORK

Telefonaktiebolaget LM Er...

1. A method for inferring component parameter values for components in a network, wherein the components comprise at least one of network nodes or network links, the method comprising:identifying a plurality of paths through the network;
measuring by monitoring probes placed on nodes at ends of the identified paths, values of a path parameter for the identified plurality of paths;
generating a set of constraints by expressing individual measured path parameter values as a function of component parameter values associated with individual components in the identified plurality of paths associated with the measured path parameter values;
generating an estimate for each of the component parameter values by solving an optimisation problem defined by the set of generated constraints; and
for each of the individual components in the identified plurality of paths:
matching the generated estimates for each of the component parameter values associated with a corresponding individual component to a statistical distribution describing a behaviour of component parameter;
identifying a ratio of central moments of the statistical distribution that demonstrates a sensitivity to noise below a threshold value; and
calculating an inferred component parameter value from the identified ratio of central moments,
wherein measuring values of a path parameter for the identified plurality of paths, generating a set of constraints and generating an estimate of the component parameter values comprise a trial iteration; and wherein the method further comprises repeating the trial iteration until an exit condition is satisfied before conducting subsequent method steps, where the exit condition comprises a number of trial iterations corresponding to a predetermined minimum estimation accuracy.

US Pat. No. 10,771,345

NETWORK MONITORING SERVICE

Amazon Technologies, Inc....

1. One or more computer readable storage media including instructions thereon for executing a method of managing a communications network, the method comprising:generating a network topology of the network, wherein the network comprises a plurality of network devices arranged in a plurality of interconnected tiers;
receiving a request to perform an action on a logical device of the network, the logical device comprising a group of network devices from the plurality of network devices of the network;
annotate respective operation statuses of the plurality of network devices to the generated network topology to generate an annotated network topology;
using the generated annotated network topology to calculate a score for the logical device based on a combination of scores of the network devices of the logical device, the score of an individual network device calculated using a measure of network capacity through neighboring tiers, the measure of network capacity calculated by recursively analyzing properties of network devices in the neighboring tiers of the individual network device, wherein calculating the score is based on a type of the logical device including whether the logical device is a partially-meshed logical device or a fully-meshed logical device; and
performing the action on the logical device based on whether the calculated score exceeds a threshold.

US Pat. No. 10,771,344

DISCOVERY OF HYPER-CONVERGED INFRASTRUCTURE DEVICES

ServiceNow, Inc., Santa ...

1. A system comprising:a database disposed within a remote network management platform that is associated with a managed network, wherein the managed network comprises a computing cluster that provides networking, storage, and virtualization services distributed across each of a plurality of computing devices that are communicatively coupled via a local-area network, wherein each computing device is configured to execute one or more respective software applications and comprises: (i) a respective controller, and (ii) a respective storage device, and wherein the storage devices of the plurality of computing devices collectively form a storage pool for the computing cluster; and
a proxy server application disposed within the managed network and configured to perform operations of a computing cluster discovery pattern, the operations comprising:
requesting and receiving, from a first controller of one of the plurality of computing devices, computing cluster data that identifies the computing cluster;
requesting and receiving, from the first controller, storage pool data that identifies the storage pool;
requesting and receiving, from the first controller, storage container data that identifies storage containers of the storage pool, wherein a storage container includes a subset of available storage in the storage pool;
requesting and receiving, from the first controller, controller data that identifies the controllers of the plurality computing devices; and
providing, to the database, the computing cluster data, the storage pool data, the storage container data, and the controller data.

US Pat. No. 10,771,343

SYSTEM, METHOD, AND COMPUTER-IMPLEMENTED METHOD FOR STANDARDIZING ELECTRONIC IDENTIFIERS TO IMPROVE IDENTIFICATION OF PHYSICAL EQUIPMENT

Mastercard International ...

1. A computer-implemented method for improving the function of a unified computing system by standardizing equipment identifiers with service profile identifiers in a domain of the unified computing system, wherein the computer-implemented method is performed by a computer, the computer-implemented method comprising:(1) accessing a domain list of one or more domains in the unified computing system;
(2) accessing a particular domain from the one or more domains in the domain list;
(3) accessing a service profile identifier list of one or more service profile identifiers for the particular domain;
(4) determining whether a particular service profile identifier in the service profile list is assigned to a particular piece of equipment;
(5) accessing an equipment identifier list of one or more equipment identifiers for the particular domain;
(6) finding a particular equipment identifier in the equipment identifier service list assigned to the particular piece of equipment;
(7) overwriting the particular equipment identifier assigned to the particular piece of equipment to include the particular service profile identifier assigned to the particular piece of equipment;
(8) repeating steps (3) through (7) of the computer-implemented method at least once per day for each service profile identifier and each equipment identifier for the particular domain,
wherein steps (1) through (8) of the computer-implemented method are performed by a script executed by a task scheduler on a computer server which is part of a management network for managing the unified computer system; and
(9) assisting in physically finding and servicing the particular piece of equipment by receiving an electronic query message identifying the particular piece of equipment by the particular service profile identifier, looking up the particular equipment identifier based on the particular service profile identifier, and electronically transmitting an electronic response message containing the particular equipment identifier.

US Pat. No. 10,771,342

ENCODING AND VERIFYING NETWORK INTENTS FOR STATEFUL NETWORKS

Hewlett Packard Enterpris...

1. A method comprising:identifying, by a computing device, three causal precedent relationships about a network function in an intent-based stateful network,
wherein a first causal precedent relationship indicates that the network function forwarding a network packet implies that at least one previous network packet was received by the network function in the same direction prior to the network packet is forwarded,
wherein a second causal precedent relationship indicates that an established state in the network function implies that at least one previous network packet was received at the network function,
wherein a third causal precedent relationship indicates that the network function receiving the network packet as a downward network function implies the network packet was previously sent by a second network function acting as an upward network function;
encoding, by the computing device, the network function using a combination of at least one of the three identified relationships; and
verifying, by the computing device, a plurality of network intents in the intent-based stateful network based at least in part on the encoding of the network function.

US Pat. No. 10,771,341

INTELLIGENT STATE CHANGE NOTIFICATIONS IN COMPUTER NETWORKS

Dell Products L.P., Roun...

1. A method for operating a first switch in a network comprising a first set of communication entities communicating over the first switch, each communication entity being associated with a network node using the communication entity in communicating over the first switch, each communication entity having a role in said communicating, the role being one of: pure target, pure initiator, or both target and initiator,the method comprising:
obtaining, by the first switch, one or more status change indications each of which is for a respective first entity which is one of the communication entities, or for the respective first entity's node;
in response to each said status change indication:
determining the respective first entity's role, which is pure target, pure initiator, or both target and initiator;
taking into account the respective first entity's role, determining whether to send a status change notification to each of one or more second entities each of which is one of the communication entities;
wherein:
for at least one status change indication and at least one second entity, it is determined, taking into account the respective first entity's role, that the status change notification is to be sent to the second entity, and the method comprises sending the status change notification to the second entity based on said determining, taking into account the respective first entity's role, that the status change notification is to be sent to the second entity;
for at least one status change indication and at least one second entity, it is determined, taking into account the respective first entity's role, that the status change notification is not to be sent to the second entity, and the method comprises not sending the status change notification to the second entity based on said determining, taking into account the first entity's role, that the status change notification is not to be sent to the second entity.

US Pat. No. 10,771,340

AUTOMATIC ETHERNET STORAGE DISCOVERY IN HYPERSCALE DATACENTER ENVIRONMENT

Samsung Electronics Co., ...

1. A storage system comprising:a plurality of storage devices, at least one storage device of the plurality of storage devices being configured to run a dynamic host configuration protocol (DHCP) client; and
a discovery server configured to provide a discovery log page to a host computer,
wherein the at least one storage device of the plurality of storage devices runs a discovery log updater that automatically provides a discovery log entry of a corresponding storage device to the discovery server based on an update of an Internet Protocol (IP) address of the corresponding storage device that is obtained at a request of the DHCP client,
wherein the discovery log page contains discovery information of the plurality of storage devices including one or more discovery log entries, and
wherein the host computer establishes a connection with a target storage device among the plurality of storage devices using an IP address of the target storage device with reference to the discovery log entry of the target storage device that is contained in the discovery log page and provides input/output (I/O) or compute workloads to the target storage device.

US Pat. No. 10,771,339

AUTOMATED TOPOLOGY SCAN

1. A method for automatically registering a topology of a fieldbus network from a device access software, wherein the device access software is installed in a host which is in data connection with the fieldbus network, and wherein the fieldbus network includes a plurality of field devices and gateway devices, the method comprising:scanning an address space of a field access device or of a predetermined gateway device of the fieldbus network to find gateway devices and field devices present in the address space;
querying device specifications from the gateway devices and the field devices present in the address space, wherein the device specifications include a hardware version, a software version, and a protocol version of a queried device;
comparing a first device driver with the device specifications of the queried device and determining of a quality value of the first device driver based on differences between the first device driver and the device specifications of the queried device;
instantiating and integrating into the device access software the first device driver when the quality value of the first device driver is above a predetermined limit value;
scanning an additional address space provided by each found gateway device to find additional gateway devices and additional field devices present in the additional address space;
querying the device specifications from the additional gateway devices and the additional field devices present in the additional address space;
comparing a second device driver with the device specifications of a queried additional device and determining of a quality value of the second device driver based on differences between the second device driver and the device specifications of the queried additional device;
instantiating and integrating into the device access software the second device driver when the quality value of the second device driver is above the predetermined limit value;
repeating the scanning of an additional address space for each found additional gateway device until all gateway devices present in the fieldbus network in a region below the field access device or below the predetermined gateway device are found or until a break condition is fulfilled; and
comparing a result of the registering of the topology of the fieldbus network with a stored earlier version of the topology of the fieldbus network and highlighting possible changes compared with the earlier version.

US Pat. No. 10,771,338

TOPOLOGY DISCOVERY AND MANAGEMENT AND SON ORCHESTRATION

Corning Optical Communica...

1. A gateway through which a plurality of radio access networks (RANs) communicate with a packet core network, comprising:a plurality of access controller circuits to which at least one RAN is assigned, each of the plurality of access controller circuits being configured to control the at least one RAN assigned thereto;
a core network aggregator circuit configured as a single interface for all communication between the plurality of access controller circuits and the packet core network; and
a cluster manager circuit configured to:
assign radio nodes (RNs) to the plurality of access controller circuits;
transfer RN assignments from one access controller circuit to a different access controller circuit under specified circumstances;
assign a subset of clusters to groups of a first type, such that clusters within a group of the first type have minimal radio frequency (RF) connectivity; and
coordinate scanning or updating of RF parameters such that adjacent clusters do not scan or update simultaneously but clusters within the groups of the first type do have at least partially overlapping scans or updates.

US Pat. No. 10,771,337

CONTROLLING PERMISSIONS FOR REMOTE MANAGEMENT OF COMPUTING RESOURCES

Amazon Technologies, Inc....

1. A system comprising:one or more processors; and
one or more computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
receiving, from a user device and via an identity and access management (IAM) component of a network-based service platform, sign-in credentials to remotely sign-in to an account associated with the network-based service platform;
determining a cloud identity associated with the sign-in credentials received from the user device, wherein the cloud identity is associated with a network-based service that includes multiple managed instances deployed in the network-based service platform;
receiving, from the user device, a request to establish a remote user session to remotely manage a managed instance of the multiple managed instances;
determining that the cloud identity is mapped to a user group of an operating system of the managed instance, wherein the user group is defined in local memory associated with the managed instance;
identifying a first set of permissions for users in the user group, wherein the first set of permissions define commands the users are permitted to execute via the operating system of the managed instance;
launching, at least partly by a systems-manager agent operating on the managed instance, a shell on the managed instance to interact with the operating system according to the first set of permissions, wherein the systems-manager agent interacts with the operating system according to a second set of permissions that is less restrictive than the first set of permissions;
establishing the remote user session between the user device and the managed instance such that the user device provides commands to the operating system via the shell;
receiving, from the user device and via the shell during the remote user session, a command for the operating system to execute, wherein the command is permitted by the first set of permissions; and
executing, at least partly by the operating system, the command on the managed instance.

US Pat. No. 10,771,336

TOPOLOGY-AWARE CONTROLLER ASSOCIATIONS IN SOFTWARE-DEFINED NETWORKS

Futurewei Technologies, I...

1. A system, comprising:one or more networks comprising a plurality of nodes and a plurality of links between a subset of the nodes, each node is associated with at least one device;
a plurality of controllers configured to manage control plane functions for the one or more networks; and
one or more servers, coupled to the one or more networks and the plurality of controllers, including a computer-readable medium storing instructions that when executed by one or more processors, cause the one or more processors to:
determine a first parent node that is isolated from a second parent node in the one or more networks;
create from the plurality of nodes a first node cluster including the first parent node and one or more first child nodes having one or more links to the first parent node;
create from the plurality of nodes a second node cluster including the second parent node and one or more second child nodes having one or more links to the second parent node, wherein nodes of the second node cluster are isolated from nodes of the first node cluster; and
configure the first node cluster for control by a first controller of the plurality and the second node cluster for control by a second controller of the plurality.

US Pat. No. 10,771,335

GENERATING AND SHARING MODELS FOR INTERNET-OF-THINGS DATA

Verizon Patent And Licens...

1. A method, comprising:storing, by a network device, a catalog of capability designations for different types of Internet-of-Things (IoT) devices;
receiving, by the network device and from a customer device, selection from the catalog of one or more of the capability designations, associated with a first type of IoT device;
receiving, by the network device and after receiving the selection of the capability designations, event data generated by the first type of IoT device;
mapping, by the network device, the event data to the one or more of the capability designations, wherein the mapping produces normalized IoT data for the first type of IoT device;
generating, by the network device, semantic information for the normalized IoT data;
assembling, by the network device, a data model for the first type of IoT device, wherein the data model includes the one or more of the capability designations and the semantic information and wherein the data model governs how data for the first type of IoT device is at least one of collected, stored, or presented;
storing, by the network device and in a memory, the data model;
receiving, by the network device and from a service or organization, an approval indication for the data model; and
converting, by the network device and after receiving the approval indication, the data model to a public model that is accessible to other customers.

US Pat. No. 10,771,334

FORWARDING UNIT AND CONTROLLER UNIT FOR SDN

Huawei Technologies Co., ...

1. A forwarding device for a software defined networking (SDN) system, the forwarding device being configured to forward data packets and comprising:an incoming port;
a memory module configured to store at least one forwarding rule; and
a processor configured to:
receive a configuration message from a control device of the SDN system, the configuration message including: the at least one forwarding rule, and a preset time condition for activating and deactivating the at least one forwarding rule; and
activate the at least one forwarding rule according to the preset time condition, wherein:
the preset time condition comprises at least two activation times of the at least one forwarding rule; and
the processor is further configured to autonomously activate the at least one forwarding rule at any one of the at least two activation times and in the absence of receiving any control commands from the control device, wherein:
the at least one forwarding rule is activated according to the preset time condition for a predetermined period of time; and
the predetermined period of time includes a time period when data packets are expected at the incoming port which must be handled by the at least one forwarding rule.

US Pat. No. 10,771,333

SYSTEMS AND METHODS FOR CONTINUOUS CONFIGURATION DEPLOYMENT

Palantir Technologies Inc...

1. A sub-server system comprising:one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the system to perform:
providing, over a communication network, a configuration request for a configuration definition object to a first remote sub-server system, the configuration request being forwarded by the first remote sub-server system to a second remote sub-server system in response to the first remote sub-server system determining that it cannot satisfy the configuration request for the configuration definition object;
obtaining, based on the providing the configuration request to the first remote sub-server system, a configuration definition object over the communication network from a first datastore of the second remote sub-server system in response to the second remote sub-server system determining that it can satisfy the configuration request for the configuration definition object;
storing the configuration definition object in a second datastore of the sub-server system;
generating a first configuration object based on the configuration definition object and one or more system characteristics of the sub-server system;
receiving a service request; and
executing the first configuration object in response to receiving the service request.

US Pat. No. 10,771,332

DYNAMIC SCHEDULING OF NETWORK UPDATES

Microsoft Technology Lice...

1. A method comprising:determining a set of update operations to transition a state of a network from an observed network state to a target network state;
determining one or more constraints defined to ensure reliability of the network during the transition of the state of the network from the observed network state to the target network state;
generating, by one or more processors and based at least in part on the one or more constraints, an update dependency graph that includes at least a first ordering in which a first subset of the set of update operations can be scheduled and a second ordering in which a second subset of the set of update operations can be scheduled, wherein:
at least one update operation is included in both the first subset of update operations and the second subset of update operations; and
the update dependency graph indicates an amount of resources required to complete an individual update operation;
scheduling the first ordering;
receiving an indication of a failed update operation or a delayed update operation in the first ordering; and
dynamically scheduling, based at least in part on the indication, the second ordering such that the at least one update operation included in both the first subset of update operations and the second subset of update operations is scheduled to be completed via the second ordering.

US Pat. No. 10,771,331

CLOSED LOOP CONTROL FOR FIXING NETWORK CONFIGURATION ISSUES TO AID IN DEVICE CLASSIFICATION

Cisco Technology, Inc., ...

1. A method comprising:receiving, at a device, traffic telemetry data captured by a plurality of networks and used by device classification services in the networks to classify endpoints in the networks with device types;
forming, by the device, a matrix of traffic characteristics and associated endpoints from the traffic telemetry data;
determining, by the device, that one or more entries of the matrix are empty, the one or more empty entries of the matrix corresponding to one or more traffic characteristics that are missing from the traffic telemetry data for one or more endpoints of a particular network;
identifying, by the device, a networking entity in the particular network that is common to the one or more endpoints for which the one or more traffic characteristics are missing;
determining, by the device, a configuration change for the networking entity by comparing a current configuration of the networking entity to those of one or more networking entities in the other networks; and
initiating, by the device, implementation of the determined configuration change for the networking entity in the particular network.

US Pat. No. 10,771,330

TUNABLE PARAMETER SETTINGS FOR A DISTRIBUTED APPLICATION

Amazon Technologies, Inc....

1. A method, comprising:applying one or more first parameter settings to a distributed application, wherein the first parameter settings are chosen using historical data associated with similar distributed applications;
providing one or more performance metrics of the distributed application to a machine learning model in response to performing the distributed application using the one or more first parameter settings;
applying one or more second parameter settings of the distributed application based, at least in part, on output of the machine learning model resulting from the one or more performance metrics; and
performing the distributed application using the one or more second parameter settings.

US Pat. No. 10,771,329

AUTOMATED SERVICE TUNING

Amazon Technologies, Inc....

1. A system, comprising:a plurality of computing devices configured to implement an automated tuning system comprising a tuning controller and a plurality of servers, wherein the tuning controller is configured to:
determine one or more configuration parameters for respective servers of the plurality of servers and a plurality of candidate values for the one or more configuration parameters;
subsequent to the determination of the one or more configuration parameters for the respective servers and the candidate values for the one or more configuration parameters, cause execution of a test batch comprising a predetermined number of tests that use the plurality of candidate values, wherein the predetermined number of tests comprise a plurality of tests executed on at least two of the plurality of servers, wherein different tests of the predetermined number of tests use different ones of the candidate values for the one or more configuration parameters;
determine a different respective fitness value for individual ones of the predetermined number of tests executed on the at least two servers, wherein a given fitness value for a given test is determined based on a performance of the at least two servers during the given test;
subsequent to execution of the predetermined number of tests of the test batch that use the plurality of candidate values on the at least two servers, determine, based on the different respective fitness values for the predetermined number of tests of the test batch, one or more candidate values that were used for each of the at least two servers during a particular one of the predetermined number of tests as one or more optimized values for the one or more configuration parameters, wherein the one or more optimized values improve a collective performance of the at least two servers more than other ones of the one or more candidate values that were used for each of the at least two servers during remaining tests of the predetermined number of tests; and
configure the at least two servers with the one or more optimized values for the one or more configuration parameters.

US Pat. No. 10,771,328

ENFORCING DEVICE SETTINGS FOR MOBILE DEVICES

Microsoft Technology Lice...

1. At a computer system that maintains data accessible to mobile devices, a method for enforcing an appropriate mobile device configuration prior to permitting a mobile device to access the maintained data, the method comprising:receiving a request, from a mobile device, to access data maintained by the computer system;
prior to permitting access, sending device configuration settings to the mobile device, the device configuration settings comprising a device security setting for the mobile device;
receiving an indication that the mobile device is configured in accordance with the device configuration settings and a second request to access the data maintained by the server subsequent to sending the device configuration settings to the mobile device; and
permitting the mobile device to access the maintained data in response to receiving the indication that the mobile device is configured in accordance with the device configuration settings.

US Pat. No. 10,771,327

MULTI-INSTANCE ARCHITECTURE SUPPORTING OUT-OF-BAND DELIVERY OF CONFIGURATION DATA

ServiceNow, Inc., Santa ...

1. A remote network management platform comprising:a central computational instance, wherein the central computational instance is a cloud-based application platform as a service (aPaaS) system containing, in a central configuration management database (CMDB), configuration data for a software module that, when executed, enables access to a software management service provided by the remote network management platform, wherein the central computational instance is configured to deliver updates to the software module, including updates to the configuration data, at a plurality of release times; and
a plurality of customer computational instances, each of which is associated with a respective managed network and configured to execute the software module using one or more servers of the respective customer computational instance, wherein a particular customer computational instance of the plurality of customer computational instances includes a particular local CMDB, and wherein a computing device associated with the particular computational instance is configured to:
determine one or more source fields of a source table within the central CMDB of the central computational instance, the one or more source fields containing the configuration data;
transmit a request for an out-of-band delivery of the configuration data contained in the one or more source fields, wherein the out-of-band delivery is to be made during a time other than any of the plurality of release times;
determine one or more destination fields of a destination table within the particular local CMDB of the particular customer computational instance;
receive the configuration data from the one or more source fields and write the configuration data to the one or more destination fields; and
execute the software module in accordance with the configuration data stored in the one or more destination fields.

US Pat. No. 10,771,326

METHOD AND SYSTEM FOR PERFORMING OPERATIONS USING COMMUNICATIONS

ExxonMobil Upstream Resea...

1. A method of communicating data among a plurality of communication nodes, the method comprising:obtaining data for a system;
creating a communication network based on the obtained data, wherein the communication network includes a plurality of communication nodes, wherein the creation of the communication network comprises selecting one of one or more frequency bands, one or more individual tones, one or more coding methods, and any combination thereof;
profiling the communication network in a testing unit to obtain diagnostic telemetry data;
configuring the communication network at least partially based on the diagnostic telemetry data;
installing the communication network associated with the system into a wellbore;
communicating between the plurality of communication nodes in the wellbore, based on multiple frequency shift keying (MFSK) telemetry, to perform operations for the system, the MFSK telemetry using a number of tones; and
adjusting frequencies used in the MFSK telemetry by
dividing a range of possible reception frequencies into a number of sections;
combining similar reception frequencies into one of the number of sections, thereby forming a
combined frequency in each of the number of sections, wherein all frequencies within each
combined frequency is classified as a single frequency;
determining whether each combined frequency satisfies a signal strength threshold; and
selecting a number of combined frequencies that satisfy the signal strength equal to the
number of tones used by the MFSK telemetry;the method further comprising:i) monitoring the communication network for an event;
ii) modifying the communication network if the event is detected;
iii) continuing the communicating between the plurality of communication nodes if the event is not detected; and
repeating steps i) to iii) until the hydrocarbon operations are complete.

US Pat. No. 10,771,325

SYSTEM AND METHOD FOR ACCESS NETWORK CONFIGURATION

HUAWEI TECHNOLOGIES CO., ...

1. A configuration management function comprising:at least one processor;
a non-transitory computer readable storage medium including software instructions configured to control the at least one processor to implement steps of:
forwarding, to an access network function (ANF), at least one access network (AN) configuration profile, each AN configuration profile including parameters defining a respective configuration of access network resources and protocols corresponding to a network slice instance; and
forwarding, to a core network function (CNF), information identifying each AN configuration profile for use by the CNF to:
identify one or more AN configuration profiles associated with a network slice instance selected from a plurality of network slice instances; and
forward to the ANF information comprising a protocol data unit (PDU) session resource setup indication including a respective AN configuration identifier (ANCID) for each of the identified AN configuration profiles.

US Pat. No. 10,771,324

SYSTEM AND METHOD FOR USING VIRTUAL MACHINE FABRIC PROFILES TO REDUCE VIRTUAL MACHINE DOWNTIME DURING MIGRATION IN A HIGH-PERFORMANCE COMPUTING ENVIRONMENT

ORACLE INTERNATIONAL CORP...

1. A method of reducing virtual machine downtime during virtual machine migration, comprising:providing a first physical host channel adapter, the first physical host channel adapter configured to be physically connected to a network fabric;
sending, by the first physical host channel adapter and to a subnet manager connected to the network fabric, a request to preregister a virtual host channel adapter configuration with a first virtual function of the first physical host channel adapter,
wherein, when the request is received by the subnet manager, the virtual host channel adapter configuration is actively registered with a second virtual function of a second physical host channel adapter, and
wherein the active registration of the virtual host channel adapter configuration with the second virtual function of the second physical host channel adapter comprises a virtual link between the virtual host channel adapter configuration and a virtual switch of the second physical host channel adapter;
receiving, by the first physical host channel adapter and from the subnet manager, the virtual host channel adapter configuration for preregistration with the first virtual function;
receiving, by the first physical host channel adapter and from the subnet manager, a request to establish a new virtual link between the virtual host channel adapter configuration and a virtual switch of the first physical host channel adapter, wherein the request to establish the new virtual link is received after the subnet manager determines that the virtual link between the virtual host channel adapter configuration and the virtual switch of the second physical host channel adapter is disconnected;
establishing, by the first physical host channel adapter, the new virtual link; and
receiving, by the first physical host channel adapter and via a migration from the second physical host channel adapter, a virtual machine instance associated with the virtual host channel adapter configuration.

US Pat. No. 10,771,323

ALARM INFORMATION PROCESSING METHOD, RELATED DEVICE, AND SYSTEM

Huawei Technologies Co., ...

1. An alarm information processing method, comprising:receiving, by an element management system (EMS), a first alarm message reported by a virtualized network function manager (VNFM), wherein the first alarm message comprises a first alarm association information and a first alarm information set, the first alarm association information comprising a first object identity comprising a virtualized network function (VNF) identity, wherein the first alarm information set is a fault tree;
receiving, by the EMS, a second alarm message reported by a VNF, the second alarm message comprising a second alarm association information and a second alarm information set, the second alarm association information comprising a second object identity, wherein the second object identity comprises a VNF identity, wherein the second alarm information set is a fault tree;
performing, by the EMS, correlation analysis on the first alarm message and the second alarm message according to the first alarm association information and the second alarm association information, and further according to a preset time correlation rule and a preset space correlation rule for grouping the alarm information having a correlation relationship; and
dispatching, by the EMS, a work order for the alarm information having the correlation relationship.

US Pat. No. 10,771,322

TESTING AND DELIVERING VERIFICATION OF NETWORK CONFIGURATIONS

International Business Ma...

1. A method comprising:receiving an indication of a type and a target of a fault to inject in a network, wherein the network comprises a plurality of devices and a plurality of network elements, and wherein the type of the fault comprises flooding one or more of the plurality of network elements with garbage data by transmitting data that is not properly formatted;
generating at least a first predicted network map depicting a predicted configuration of the plurality of devices and the plurality of network elements subsequent to injecting the fault in the network;
injecting the fault at the target in the network, wherein injecting the fault at the target in the network comprises transmitting one or more control signals to the target in the network;
determining an amount of time that has elapsed since the garbage data was transmitted;
upon determining that the determined amount of time exceeds a predefined amount of time, generating an actual network map depicting an actual configuration of the plurality of devices and the plurality of network elements;
identifying, based on a comparison of the first predicted network map and the actual network map, at least one difference in the predicted and actual configurations; and
outputting for display an indication of the identified at least one difference.

US Pat. No. 10,771,320

AUTOMATIC SETUP OF FAILURE DETECTION SESSIONS

NICIRA, INC., Palo Alto,...

1. A system comprising:a first set of host machines, each host machine in the first set of host machines hosting a set of virtual machines;
a hardware forwarding element;
a second set of host machines for facilitating broadcast, unknown unicast, and multicast (BUM) network traffic between the hardware forwarding element and the first set of host machines; and
a set of network controllers for establishing failure-detection tunnels between the hardware forwarding element and the second set of host machines by informing the hardware forwarding element of a current state of the second set of host machines for the hardware forwarding element to use to determine whether a failure-detection tunnel should be established, wherein the set of network controllers initiates an update to a set of active failure-detection sessions over the established failure-detection tunnels due to a change to a state of the second set of host machines,
wherein in response to a message from the network controller set, the hardware forwarding element establishes a tunnel between the hardware forwarding element and a host machine in the second set of host machines.

US Pat. No. 10,771,319

ROBUSTNESS VERIFICATION METHOD AND APPARATUS FOR DISTRIBUTED CONTROL PLANE IN SOFTWARE-DEFINED NETWORK

Deke Guo, Changsha, Huna...

1. A robustness verification method of a distributed control plane in a software-defined network, comprising:at block S1, constructing a robustness verification framework, wherein the robustness verification framework accommodates a failure scenario set and a failure recovery strategy set;
at block S2, selecting a failure recovery strategy and querying a worst failure scenario under the failure recovery strategy;
at block S3, verifying a utilization rate of a biggest controller in the control plane under the combination of the worst failure scenario and the failure recovery strategy; and
at block S4, performing verification for robustness of the control plane based on the utilization rate;wherein the formula used for performing verification for the robustness of the control plane at block S4 is as follows:
wherein N is a number of switches in the control plane, M is a number of controllers in the control plane, vlij refers to a state of a secure link between the switch si and the controller cj, vfj refers to a state of the controller cj, and max ?(v) is a failure recovery strategy.

US Pat. No. 10,771,318

HIGH AVAILABILITY ON A DISTRIBUTED NETWORKING PLATFORM

VMWARE, INC, Palo Alto, ...

10. A system comprising:one or more processors configured to:
detect that an original primary service engine is unavailable, wherein:
the original primary service engine and a plurality of secondary service engines are configured to provide one or more network applications associated with a virtual Internet Protocol (VIP) address;
the original primary service engine and the plurality of secondary service engines are in active-active configuration mode; and
the original primary service engine is configured to respond to Address Resolution Protocol (ARP) requests designating the VIP address;
determine that a controller is unavailable; and
configure a selected secondary service engine as a next primary service engine; and
one or more memories coupled to the one or more processors and configured to provide the one or more processors with instructions.

US Pat. No. 10,771,317

REDUCING TRAFFIC LOSS DURING LINK FAILURE IN AN ETHERNET VIRTUAL PRIVATE NETWORK MULTIHOMING TOPOLOGY

Juniper Networks, Inc., ...

1. A method, comprising:providing, by a first network device, a first advertisement message to a second network device,
wherein the first advertisement message includes a first bidirectional forwarding detection (BFD) discriminator associated with a first link between the first network device and a third network device, the first BFD discriminator including information identifying the first link and a state of the first link,
wherein the first network device is a designated forwarder for the third network device,
wherein the second network device is a backup designated forwarder for the third network device, and
wherein the first network device, the second network device, and the third network device are included in a network;
receiving, by the first network device, a second advertisement message from the second network device,
wherein the second advertisement message includes a second BFD discriminator associated with a second link between the second network device and the third network device, the second BFD discriminator including information identifying the second link and a state of the second link;
pairing, by the first network device, the first BFD discriminator and the second BFD discriminator to form a BFD session between the first network device and the second network device;
detecting, by the first network device, a link failure associated with the first link between the first network device and the third network device; and
providing, by the first network device and via the BFD session, a BFD message to the second network device,
wherein the BFD message includes an indication of the link failure, and
wherein the BFD message is to cause the second network device to be a new designated forwarder for the third network device.

US Pat. No. 10,771,316

DEBUGGING OF A NETWORK DEVICE THROUGH EMULATION

Amazon Technologies, Inc....

1. A method of testing a network device, comprising:receiving a command to switch a neighbor network device to an emulation mode, wherein the neighbor network device is coupled to the network device being tested;
storing state information of the neighbor network device including a state of a switching protocol and current forwarding information;
monitoring for network packets, received by the neighbor network device, to be passed to the network device being tested;
detecting a received network packet to be passed to the network device being tested;
forwarding the received network packet to a network device not being tested so that the received network packet can be forwarded to its destination;
switching a state of the neighbor network device to the stored state information to enter the emulation mode; and
forwarding the received network packet to the network device being tested to emulate that the network device is in a normal mode of operation;
receiving a packet, in the neighbor network device, from the network device being tested;
if a determination is made that the packet is a data packet that would normally be forwarded, then dropping the data packet while in the emulation mode; and
if a determination is made that the packet is a control packet, then passing the packet to a control plane of the neighbor network device for processing.

US Pat. No. 10,771,315

HIGH AVAILABILITY USING MULTIPLE NETWORK ELEMENTS

Futurewei Technologies, I...

9. A standby control board comprising:a processor; and
memory and instructions for performing a method comprising:
executing a secondary copy of a primary application executing on an active control board and a transmission control protocol (TCP);
receiving data packets originating from a peer coupled via a line card;
providing acknowledgments for the received data packets; and
becoming a new active control board responsive to failure of the active control board to communicate via the line card to a peer via a network, and one or more further standby control boards not via the network, regardless of a failure of an additional control board, wherein sequence numbers for most recent acknowledged data packets are used to synchronize data packets in response to such failure, and wherein upon becoming the new active control board performs operations comprising:
receiving a sequence number for most recent acknowledged data packets from the other standby control boards;
finding a minimum sequence number from the received sequence numbers;
sending the minimum sequence number to each of the standby control boards;
receiving data corresponding to sequence numbers between the minimum sequence number and the sequence number from each of the standby control boards having a sequence number greater than the minimum sequence number; and
sending the received data to each standby control board such that all control boards are synchronized with the data packet having the highest sequence number.

US Pat. No. 10,771,313

USING RANDOM FORESTS TO GENERATE RULES FOR CAUSATION ANALYSIS OF NETWORK ANOMALIES

Cisco Technology, Inc., ...

1. A method comprising:receiving, at a network assurance service, one or more sets of network characteristics of a network, each network characteristic forming a different feature dimension in a multi-dimensional feature space;
applying, by the network assurance service, machine learning-based anomaly detection to the one or more sets of network characteristics, to label each set of network characteristics as anomalous or non-anomalous;
identifying, by the network assurance service and based on the labeled one or more sets of network characteristics, a plurality of anomaly patterns, each anomaly pattern including a plurality of unidimensional cutoffs in the feature space; and
initiating, by the network assurance service, a change to the network based on the identified plurality of anomaly patterns,
wherein the identifying of the plurality of anomaly patterns comprises:
identifying, by the network assurance service, a first anomaly pattern including a first plurality of unidimensional cutoffs in the feature space; and
identifying, by the network assurance service, one or more subsequent anomaly patterns, each of which including a subsequent plurality of unidimensional cutoffs in the feature space that satisfy the first plurality of unidimensional cutoffs of the first anomaly pattern, until a stopping criterion is met.

US Pat. No. 10,771,312

FAILURE DETECTION IN A DATA NETWORK

ZTE Corporation, Shenzhe...

1. A packet communication method, comprising:starting, by a first network node, a timer, wherein the first network node and a second network node operate in an operational session that detects a continuity of path between the first network node and a second network node;
receiving a packet by the first network node;
performing a first determination that the packet includes a first Internet Protocol (IP) address that is the same as a second IP address of the second network node configured to control a transmission interval of packets;
performing a second determination, by the first network node, that the packet includes a first identifier that is the same as a My Discriminator value of the second network node configured to control the transmission interval of the packets; and
resetting, after the first determination and the second determination, the timer by the first network node.

US Pat. No. 10,771,310

USER EQUIPMENT PROCEDURES TO CONTROL UPLINK BEAMFORMING

Telefonaktiebolaget LM Er...

1. A method, in a wireless device having a plurality of transmitter chains that can be selectively used to transmit a beam-formed signal, the method comprising:determining a targeted receive power for the beam-formed signal, with respect to a target receiving device;
selecting a number of the plurality of transmitter chains for forming the beam-formed signal, based on the targeted receive power and based on an estimated power consumption for each of the plurality of transmitter chains, wherein said selecting is performed so as to minimize a total power consumption, given the estimated power consumptions; and
transmitting a beam-formed signal, using the selected number of the plurality of transmitter chains.

US Pat. No. 10,771,309

BORDER GATEWAY PROTOCOL ROUTING CONFIGURATION

1. A system comprising:at least one processor;
a memory device including instructions that, when executed by the processor, cause the system to:
receive a request from a customer of a computing service provider to configure Border Gateway Protocol (BGP) routing on a virtual gateway for a virtual network with a customer-provided Autonomous System Number (ASN), wherein the virtual network executes on a physical network of the computing service provider; and
initiate configuration of the BGP routing on the virtual gateway to use the customer-provided ASN instead of a default ASN associated with the computing service provider, wherein the configured BGP routing on the virtual gateway allows the customer-provided ASN to appear in an Autonomous System (AS) path.

US Pat. No. 10,771,308

REQUEST PROCESSING SYSTEM USING A COMBINING ENGINE

Bank of America Corporati...

1. A system for fulfilling data requests, comprising:one or more interfaces operable to receive a plurality of data elements, the plurality of data elements comprising at least:
a first data element in response to a first sub-request, the first data element encapsulated in a first sub-wrapper; and
a second data element in response to a second sub-request, the second data element encapsulated in a second sub-wrapper;
a memory operable to store the received plurality of data elements; and
one or more processors communicatively coupled to the memory and operable to:
upon determining that the first sub-wrapper and the second sub-wrapper are associated with a first identifier, combine the encapsulated first data element and the encapsulated second data element;
remove the first sub-wrapper from the first data element and the second sub-wrapper from the second data element; and
send the combined first data element and the second data element to a first requestor in response to a first request;
wherein:
the one or more interfaces are further operable to receive a third data element in response to a third sub-request, the third data element encapsulated in a third sub-wrapper;
the third sub-wrapper is associated with a second identifier that is different from the first identifier; and
the third sub-wrapper is not combined with the first data element and the second data element because the second identifier is different from the first identifier.

US Pat. No. 10,771,307

METHOD AND SYSTEM FOR INTER-DEVICE SERVICE ACCESS

Alibaba Group Holding Lim...

1. A method, comprising:issuing, by a source device running a first program, an access request by the first program for a specific service, comprising:
encapsulating the access request based on pre-stored service configuration information, wherein the pre-stored service configuration information includes a first service configuration information of the source device and a second service configuration information of a target device, wherein the first service configuration information of the source device includes at least one remote service configuration item having the following information: a target device identifier of the target device and a service identifier of the specific service, and wherein the second service configuration information of the target device includes at least one local service configuration item comprising: a service identifier of the specific service and a program identifier of a second program providing the specific service; and
issuing the access request; and
transmitting, by the source device running the first program, the access request through an inter-device link to the target device that provides the specific service, wherein the target device is configured to receive the access request, forward the received access request to the second program running on the target device, the second program executing a corresponding service function, wherein the inter-device link comprises: links established separately by each different device with a master device through a link port provided by the master device, wherein the transmitting of the access request through the inter-device link to the target device that provides the specific service comprises:
transmitting the access request through the inter-device link based on the target device identifier included in the access request to the target device that provides the specific service, the access request including a service identifier of the specific service of the first program and the target device identifier.

US Pat. No. 10,771,306

LOG MONITORING SYSTEM

Amazon Technologies, Inc....

1. A non-transitory computer-readable medium having a plurality of computer instructions executable by at least one computing device, wherein, upon execution, the plurality of computer instructions cause the at least one computing device to:retrieve a plurality of log files generated by at least one host application;
generate a first log health signal based at least in part on whether a data size of the plurality of log files is within a defined deviation of an expected server log data size for a time period, wherein the expected server log data size is determined at least in part as a function of a network traffic prediction, the network traffic prediction being determined based at least in part on both an expected quantity of log file data generated per client multiplied by a quantity of a plurality of clients accessing a host system within the time period, the at least one host application being executed by the host system;
generate a second log health signal based at least in part on whether the plurality of log files meets an expected number of log files;
generate a third log health signal based at least in part on whether the plurality of log files meets an expected server log format, wherein the expected server log format comprises a defined file format;
receive an indication of an operational error detected by the host system and a time of origination of the operational error;
determine at least one log file of the plurality of log files associated with the operational error by matching the time of origination of the operational error to a time of creation of the at least one log file; and
determine a server log content error record based at least in part on the first log health signal, the second log health signal, the third log health signal, the at least one log file, and the operational error, the server log content error record including a server log content error associated with an interval of time, and the server log error record represents an absence or a detection of log tampering or log file corruption.

US Pat. No. 10,771,305

SYSTEMS AND METHODS FOR SPARSE CODE MULTIPLE ACCESS

Huawei Technologies Co., ...

1. A method, the method comprising:receiving, by a transmitter, a first binary or M-ary data associated with a first code domain layer of a plurality of code domain layers and a second binary or M-ary data associated with a second code domain layer of the plurality of code domain layers;
encoding, by the transmitter, the first binary or M-ary data by mapping the first binary or M-ary data to a first sparse codeword associated with a first binary or M-ary value of the first binary or M-ary data and associated with the first code domain layer, the first sparse codeword comprising a first vector, the first vector including first at least one zero element and first at least one non-zero element;
encoding, by the transmitter, the second binary or M-ary data by mapping the second binary or M-ary data to a second sparse codeword associated with a second binary or M-ary value of the second binary or M-ary data and associated with the second code domain layer, the second sparse codeword comprising a second vector, the second vector including second at least one zero element and second at least one non-zero element; and
transmitting, by the transmitter, the first sparse codeword and the second sparse codeword over shared resources of a network.

US Pat. No. 10,771,304

DEVICES AND METHODS USING THE HERMETIC TRANSFORM FOR TRANSMITTING AND RECEIVING SIGNALS USING MULTI-CHANNEL SIGNALING

VertoCOMM, Inc., Weston,...

1. A method for spectral compacting, the method comprising:generating a set of orthogonal basis signals;
modulating each of the basis signals with a complex modulation based on a constellation of complex symbols to produce modulated basis signals;
summing the modulated basis signals to produce a frame of signal data;
applying a matrix transformation to the frame of signal data to produce a reduced bandwidth frame of signal data comprising non-orthogonal basis signals; and
transmitting the reduced bandwidth frame of signal data.

US Pat. No. 10,771,303

OVERLAPPED MULTIPLEXING-BASED DECODING METHOD AND DEVICE, AND MODULATION AND DEMODULATION METHOD AND SYSTEM

SHEN ZHEN KUANG-CHI HEZHO...

1. An overlapped multiplexing-based decoding method, comprising:step 1: setting a group sequence length based on a length of a multiplexing waveform in a received signal, and grouping receive sequences in the received signal;
step 2: converting a multiplexing waveform coefficient into a matrix form based on the group sequence length;
step 3: decoding a receive sequence of a current group by using a preset algorithm, to obtain a transmit sequence of the current group in an original signal;
step 4: if there is known information in the receive sequence of the current group, removing the known information; otherwise, proceeding to step 5;
step 5: sliding the receive sequence backward, and repeating step 3 and step 4, until all groups are decoded; and
step 6: outputting a decoding result after all the groups are decoded.

US Pat. No. 10,771,302

CHANNEL PROBING SIGNAL FOR A BROADBAND COMMUNICATION SYSTEM

Neo Wireless LLC, Wayne,...

1. A communication method for a mobile device in an Orthogonal Frequency Division Multiplexing (OFDM) communication system, the method comprising:receiving a request for a probing signal from a base station in the system; and
transmitting, in response to the received request, the probing signal with a code sequence modulated in the frequency domain, wherein:
the probing signal is configured to overlap, in the time domain, with uplink signals transmitted over an uplink frequency band by other mobile devices in the system; and
the probing signal is configured to occupy a portion of spectrum in the uplink frequency band not designated for transmission of uplink control signals in the system.

US Pat. No. 10,771,301

METHOD AND APPARATUS FOR SYNCHRONIZATION SIGNAL DESIGN

1. A base station (BS) for identifying synchronization signals (SSs) in a communication system, the BS comprising:a controller configured to:
identify a primary synchronization signal (PSS), wherein a sequence of the PSS corresponds to second information, a length of the sequence of the PSS is 127, and the sequence of the PSS is mapped to subcarriers in a first orthogonal frequency division multiplexing (OFDM) symbol within one SS block,
identify a secondary synchronization signal (SSS), wherein a sequence of the SSS is defined based on a second sequence and a third sequence, the sequence of the SSS corresponds to first information and the second information, a length of the sequence of the SSS is 127, and the sequence of the SSS is mapped to subcarriers in a second OFDM symbol within the one SS block, and
identify a physical broadcast channel (PBCH) including a master information block in at least third OFDM symbol within the one SS block; and
a transceiver coupled to the controller, the transceiver configured to transmit the one SS blocks, wherein the first OFDM symbol is time division multiplexed (TDMed) with the second OFDM symbol and the at least third OFDM symbol within the one SS block, and a physical layer cell identifier (ID) is defined based on the first information and the second information.

US Pat. No. 10,771,300

INFORMATION SENDING METHOD AND APPARATUS, AND COMPUTER STORAGE MEDIUM

ZTE CORPORATION, Shenzhe...

1. A method for sending information, comprising:determining, according to information to be sent on a physical uplink channel, a sequence corresponding to a reference signal to be sent from N predefined sequences, wherein the N predefined sequences have a same non-zero value on a predetermined position, and N is an integer greater than or equal to 2; and
mapping the sequence corresponding to the reference signal and the information to a time-frequency resource, and sending the reference signal and the information on the time-frequency resource, wherein
when the N predefined sequences comprise sequences obtained by performing different time-domain cyclic shifts on a same sequence, or sequences obtained by performing different frequency-domain phase rotations on a same sequence, and the N predefined sequences comprises the following characteristic:
the N predefined sequences have a same element among the N predefined sequences at each of X positions in a frequency domain, wherein X is a number of elements in a set of values of n that satisfy an equation
? is a relative cyclic shift amount or phase rotation amount between any two of the N predefined sequences, y is an integer greater than or equal to 0, n is an integer taken from a set [0, L?1], L is the length of the predefined sequences, 0

US Pat. No. 10,771,299

REFERENCE SIGNAL CONFIGURATIONS FOR DOPPLER SUPPORT IN NEW RADIO DESIGN

QUALCOMM Incorporated, S...

1. A method of wireless communication by a base station, comprising:allocating at least a first set of resources to a first user equipment (UE), based on one or more mobility characteristics of the first UE, wherein:
the first set of resources occupies a narrowband region of wider system bandwidth within at least one time slot of a subframe,
allocating the first set of resources comprises allocating the first set of resources to at least two RS symbols in a first slot of the subframe based on a first Doppler measurement of the first UE being at or above a threshold value;
the at least two RS symbols are discontiguous in time;
allocating at least the first set of resources comprises determining whether to allocate at least a portion of the first set of resources to a half-symbol located in a guard period of the subframe or a half-symbol located in a common burst region of the subframe; and
allocating at least the first set of resources comprises allocating at least the portion of the first set of resources to the half-symbol located in the guard period of the subframe or the half-symbol located in the common burst region of the subframe based on the determination; and
allocating at least a second set of resources to a second UE, based on one or more mobility characteristics of the second UE, wherein the second set of resources occupies a narrowband region of wider system bandwidth within at least one time slot of the subframe, wherein allocating the second set of resources comprises allocating the second set of resources to fewer RS symbols than the first set of resources in a second slot of the subframe based on a second Doppler measurement being less than the first Doppler measurement;
communicating with the first UE based on reference signals (RSs) transmitted using the first set of resources; and
communicating with the second UE based on RS transmitted using the second set of resources.

US Pat. No. 10,771,298

MOBILE COMMUNICATIONS NETWORK

British Telecommunication...

1. A method comprising, at a mobile terminal:communicating with a serving base station over broadcast or multicast;
receiving a first broadcast or multicast signal from the serving base station and a second signal from a second base station;
determining an indication of a length of a first cyclic prefix of the first broadcast or multicast signal and an indication of a length of a second cyclic prefix of the second signal; and
where the mobile terminal determines that the lengths of the first and second cyclic prefixes are different, initiating a switch in communication between the mobile terminal and the serving base station to unicast.

US Pat. No. 10,771,297

METHOD AND DEVICE FOR MULTI-SERVICE TRANSMISSION WITH FC-OFDM MODULATION AND CORRESPONDING RECEIVER

ORANGE, Paris (FR)

1. A method comprising:transmitting data corresponding to a service from amongst several communications services implementing a same frequency-time transform (IFFT) of size M irrespective of the service in order to generate orthogonal multi-carrier symbols of M samples starting from data symbols including:
during a frame setup, adding a cyclic extension of L=L1+L2 samples in order to obtain a sequence of M+L samples, and
setting up the frame according to a configuration depending on the service, which allows a selection between no, one or several processing operations from amongst a padding, a discrete Fourier transform of size N and a spread for adapting the data prior to mapping at an input of the frequency-time transform, and
the method comprises time-domain filtering according to a function ƒ(n) of the samples n of the sequence, L and M being non-zero natural numbers, L with a(n) and b(n) monotonic functions and with a2 (n)+b2 (n+M)=1 for n?[0, L?1], L1?0 and L2?0.

US Pat. No. 10,771,295

HIGH SPEED SIGNALING SYSTEM WITH ADAPTIVE TRANSMIT PRE-EMPHASIS

Rambus Inc., San Jose, C...

1. An apparatus, comprising:a receiver to receive a digital sequence from a set of drivers over a serial link connecting the receiver to a transmitting device, the digital sequence equalized by a transmit equalizer in association with a plurality of taps; and
tap generation circuitry to generate tap information for setting at least one tap weight associated with at least one of the plurality of taps of the transmit equalizer, each tap weight comprising a driver strength value for a given tap, the tap information for at least one of the plurality of taps for use in transmitting across the serial link connecting the receiver to the transmitting device, the tap information configured to ensure that magnitudes of the tap weights associated with the plurality of taps of the transmit equalizer satisfy a predefined constraint; and
a transmitter to transmit the tap information to the set of drivers of the transmitting device.

US Pat. No. 10,771,294

POWER EFFICIENT METADATA TRANSPORT SIGNALING MECHANISM FOR CODEC CONTROL AND CONFIGURATION

QUALCOMM Incorporated, S...

1. A method for communications at a wireless device, comprising:transporting a first portion of a plurality of encoded data packets over an interface between a Bluetooth component of the wireless device and a digital signal processor of the wireless device;
transporting over the interface a sideband packet comprising an encoding parameter for the plurality of encoded data packets, wherein the sideband packet is transported over the interface based at least in part on a compressed over pulse-code modulation format;
modifying an encoding or decoding process associated with the plurality of encoded data packets based at least in part on the sideband packet; and
transporting a second portion of the plurality of encoded data packets over the interface, wherein the second portion of the plurality of encoded data packets is encoded according to the modified encoding or decoding process.

US Pat. No. 10,771,293

SYSTEMS AND METHODS FOR AUTOMATIC LEVEL CONTROL

CommScope Technologies LL...

1. An automatic level control (ALC) system for communications signals, the system comprising:a multi-threshold programmable ALC controller; and
at least one signal path that includes:
a digital step attenuator configured to receive an analog communications signal and attenuate the communications signal in response to an attenuation adjustment signal from the multi-threshold programmable ALC controller; and
an analog-to-digital converter configured to receive the communications signal as attenuated by the digital step attenuator, wherein the multi-threshold programmable ALC controller receives complex IQ samples of the attenuated communication signal;
wherein the multi-threshold programmable ALC controller comprises a plurality of clip detectors that function in parallel, wherein each of the plurality of clip detectors are programmed with a respective amplitude and time threshold, wherein based on which of the plurality of clip detectors determine that the complex IQ samples exceed their respective amplitude and time threshold, the multi-threshold programmable ALC controller generates the attenuation adjustment signal to the digital step attenuator.

US Pat. No. 10,771,291

COMMUNICATION CHANNEL WITH TUNING STRUCTURE

Hewlett Packard Enterpris...

1. A system, comprising:a communication channel; and
at least one tuning structure physically coupled to the communication channel, the tuning structure including:
a stub extending from the communication channel; and
a first protrusion extending from the stub or from the communication channel,
wherein the stub and the first protrusion being coupled to the communication channel in one end and is unconnected and terminates in another end and being tuned to dissipate energy from the communication channel at least at one selected wavelength.

US Pat. No. 10,771,290

SYSTEMS, METHODS AND DEVICES FOR NETWORKING OVER HIGH IMPEDANCE CABLING

AUDINATE PTY LIMITED, Ul...

1. A device for receiving digital data and electrical power to a plurality of devices over high-impedance cables comprising:a power supply configured to be coupled to a conductive path in a high-impedance cable;
a network interface configured to be coupled to the conductive path in the high-impedance cable; and
a processing system coupled to the network interface, the processing system configured to receive the digital data from the network interface, convert the digital data to an analog signal, and output the analog signal to a speaker or video monitor;
wherein the device is configured to be connected to a gateway device by the high-impedance cable, the high-impedance cable having at least two conductive paths, and wherein the device receives the electrical power and the digital data from the gateway device via the high-impedance cable over the same conductive path of the high-impedance cable;
wherein the gateway device comprises a power source and is configured to be connected to a second device by the high-impedance cable wherein the second device receives the electric power and the digital data from the gateway device via the cable over the same conductive path; and
wherein the power source provides the electric power to the device and the second devices via the high-impedance cable, and wherein the second device is connected to the gateway device through the device via a daisy-chain topology,
wherein the device and the second device are individually addressed via the gateway device; and
wherein the device comprises a local clock and a media clock and is configured to receive packets of data comprising timestamp information and utilize the timestamp information contained in the packets to coordinate the correct playout time for media signals between the device and the second device.

US Pat. No. 10,771,289

MULTI-TRANSMITTER CHANNEL ESTIMATION FOR A TIME VARYING CHANNEL

Commonwealth Scientific a...

1. A method of performing multi-transmitter channel estimation for a time-varying channel, wherein the method includes:(a) wirelessly receiving at least two frames, each frame including a block of training symbols received at different points in time for a time-varying channel;
(b) estimating, for each block at a block location, a first channel coefficient of the time-varying channel, wherein the block location is the same for each block;
(c) interpolating or extrapolating a plurality of second channel coefficients for the respective training symbols of each block based on the respective first channel coefficient;
(d) re-estimating the first channel coefficient for each block based on the plurality of second channel coefficients for each block; and
(e) re-estimating the plurality of second channel coefficients for each block by interpolation or extrapolation using the respective first channel coefficient.

US Pat. No. 10,771,288

PROCESSING MODULE FOR A COMMUNICATION DEVICE AND METHOD THEREFOR

NXP B.V., Eindhoven (NL)...

1. A processing module for a receiver device to receive a signal transmitted by a transmitter device; the processing module comprising:a channel estimate generation component to output channel estimate information for the received signal; and
a timestamping module to determine a Time-of-Arrival, ToA, measurement for a packet within the received signal based at least partly on the channel estimate information;
a validation component configured to:
generate a validation pattern for the packet within the received signal for which a ToA measurement is to be determined, wherein the validation pattern is generated using a validation pattern reference;
perform cross-correlation between at least a part of the validation sequence within the packet and at least a part of the generated validation pattern to generate channel estimate validation information.

US Pat. No. 10,771,287

PUBLIC CLOUD INTERFACE FOR TRANCEIVING CORRESPONDING REQUESTS AND RESPONSES TO MULTIPLE NETWORKS

eBay Inc., San Jose, CA ...

1. A computer-implemented method, comprising:enabling, by a public cloud provider network via an application programming interface (API), a plurality of enterprise networks to join, via a plurality of communications links, a multi-network service hosted by the public cloud provider network;
receiving, by the multi-network service, a request from a client device for information relating to a first item of a first enterprise network of the plurality of enterprise networks;
accessing, by the multi-network service, information relating to the first item and a second item of a second enterprise network of the plurality of enterprise networks, the second item corresponding to the first item;
intercepting, by the multi-network service, at least a portion of information transmitted between the public cloud provider network, the plurality of enterprise networks, and the client device; and
transmitting, by the multi-network service to the client device via the public cloud provider network, value-added information relating to the first item and a second item, the value-added information causing generation of a plurality of display regions rendering at least the information relating to the first item and a second item, the value-added information based at least in part on the intercepted information.

US Pat. No. 10,771,286

METHOD FOR SENDING VIRTUAL EXTENSIBLE LOCAL AREA NETWORK PACKET, COMPUTER DEVICE, AND COMPUTER READABLE MEDIUM

Huawei Technologies Co., ...

1. A method for sending a virtual extensible local area network (VxLAN) packet, wherein the method is applied to a computer device, the computer device comprises a central processing unit, a network adapter, and a virtual machine, the network adapter comprises a network adapter processor, and the method comprises:receiving, by the network adapter processor, a first packet sent by the virtual machine;
determining, by the network adapter processor, whether the network adapter stores encapsulation information required for performing VxLAN encapsulation on the first packet, wherein the encapsulation information comprises an encapsulation Media Access Control (MAC) address and an encapsulation Internet Protocol (IP) address, the encapsulation MAC address is a MAC address of a next-hop device passed through when the first packet is sent, and the encapsulation IP address is an IP address of a virtual extensible local area network tunnel end point (VTEP) on a destination end of the first packet; and
in response to the network adapter not storing the encapsulation information required for performing VxLAN encapsulation on the first packet;
sending an obtaining request to the central processing unit;
obtaining the encapsulation information from the central processing unit;
storing the encapsulation information; and
sending a packet obtained after VxLAN encapsulation is performed on the first packet.

US Pat. No. 10,771,285

METHOD AND APPARATUS FOR MAPPING NETWORK DATA MODELS

CISCO TECHNOLOGY, INC., ...

1. A method comprising:receiving network data models as input at a model mapping module at a network device in communication with a plurality of network components in a network, each of the network components in the network associated with one of the network data models, the model mapping module operable to access a lexical database stored in memory at the network device;
storing the network data models in said memory;
processing the stored network data models at the model mapping module using data from the lexical database, wherein processing comprises performing semantic matching automatically at the model mapping module for at least two of the network data models received at the model mapping module, said semantic matching comprising computing labels for elements of the network data models utilizing label computation algorithms configured for notational conventions used in the network data models, computing contexts for the elements based on a hierarchy of each of the network data models, removing one or more of said labels used to form said contexts to create reduced contexts, and computing a semantic relationship for said reduced contexts of the network data models at the model mapping module;
mapping the network data models at the network device based on said semantic matching performed at the model mapping module for use in a network application at the network device;
transmitting mapping information for the network data models to the network application operating at the network device; and
using said mapping information by the network application while communicating with the network components, wherein the mapping module decouples the network application from data received from the network data models.

US Pat. No. 10,771,284

TROUBLESHOOTING METHOD AND APPARATUS FOR EDGE ROUTING BRIDGE IN TRILL CAMPUS

HUAWEI TECHNOLOGIES CO., ...

1. A method for fault notification in a Transparent Interconnection of Lots of Links (TRILL) campus, comprising:receiving a fault notification message by a second edge routing bridge (RB) in a multi-homing access group, from a first edge RB in the multi-homing access group, through the TRILL campus, before a predetermined time, and when a first access link of the first edge RB is faulty, wherein the fault notification message comprises an identifier of the first edge RB and an access port identifier of the first edge RB when the multi-homing access group works in an active/standby manner, wherein the multi-homing access group comprises multiple edge RBs including the first edge RB and the second edge RB, and wherein the multi-homing access group couples a customer edge device to the TRILL campus using the first access link for the first edge RB and a second access link for the second RB; and
determining, by the second edge RB in response to receiving the fault notification message, a new appointed forwarder (AF) from the multiple RBs except the first edge RB, wherein the new AF is for a virtual local area network (VLAN) when the first edge RB is a current AF for the VLAN.

US Pat. No. 10,771,283

VIRTUAL CLOUD NODE

SAP SE, Walldorf (DE)

1. A hybrid cloud computing method comprising:receiving, by a virtual cloud node, data packets from a cloud server, the virtual cloud node being one of a plurality of computing nodes forming part of an on-premise computing environment executing on-premise processes, each of the computing nodes comprising at least one computing device and executing a plurality of servers, one of the servers being a central management server;
converting, by the virtual cloud node, the data packets from a first protocol compatible with the cloud server to a second protocol; and
routing, via the central management server, the converted data packets to another one of the computing nodes for processing or consumption;
wherein the virtual cloud node comprises components including:
an HTTP-CORBA converter that convert CORBA (Common Object Request Broker Architecture) format messages to SOAP (Simple Object Access Protocol) format messages and vice versa;
an HTTP endpoint that acts as a single endpoint for on-premise communications
an address mapper providing addressing and address mapping in the virtual cloud node; and
a cloud connector allowing trusted connections to and from the cloud server and acting as a reverse proxy to the on-premise processes.

US Pat. No. 10,771,282

METHOD FOR TRANSMITTING MESSAGES BETWEEN CONTROL UNITS OF A MOTOR VEHICLE, AND SWITCH APPARATUS, AND MOTOR VEHICLE

AUDI AG, Ingolstadt (DE)...

1. A method for transmitting messages between control units of a motor vehicle by a switch apparatus, comprising:receiving the messages from the control units at input ports of the switch apparatus, each of the messages containing an address indication of a destination address and a priority indication of a priority level from among a plurality of predetermined priority levels, each input port of the switch apparatus receiving at most a predetermined maximum data volume overall, for at least one priority level and for each predetermined unit of time;
assigning each of the messages received at the input ports to an output port based on the destination address;
outputting, at each output port, the messages assigned to the output port;
carrying out, by at least two of the control units, time synchronization of respective timers of the control units with one another;
outputting, by synchronized control units, the messages with a time delay, such that transmission of the messages by the synchronized control units is interlaced and the messages from the synchronized control units arrive at the switch apparatus alternately and without collisions, the priority levels being indicated in the messages by cryptographically encrypted priority data; and
at least one of decrypting the priority data by the switch apparatus based on a cryptographic key, and the switch apparatus having a cryptographically secure internal configuration.

US Pat. No. 10,771,281

SEMI-DIFFERENTIAL SIGNALING FOR DSI3 BUS ENHANCEMENT

SEMICONDUCTOR COMPONENTS ...

1. A master device that couples to a slave device via a bus having at least a power supply conductor, a power return conductor, and a signal conductor, the master device comprising:a power supply node and a power return node that respectively connect to the power supply conductor and the power return conductor to supply power to the slave device;
a signal node that connects to the signal conductor; and
a driver that drives the signal node relative to a reference voltage midway between voltages of the power supply node and the power return node.

US Pat. No. 10,771,279

COMMUNICATION TERMINAL DEVICE, INFORMATION COMMUNICATION SYSTEM, RECORDING MEDIUM, AND INFORMATION COMMUNICATION METHOD

MEGACHIPS CORPORATION, O...

1. A communication terminal device connected to a network and performing data communications with another communication terminal device through the network, comprising:a storage configured to store proper information used as a criterion for switching an operation mode between a master unit operation mode and a slave unit operation mode; and
circuitry configured to
switch the master unit operation mode of a self device to the slave unit operation mode based on the proper information, while the self device is operating by the master unit operation mode, wherein
the master unit operation mode is the operation mode of the communication terminal device operating as a master unit, and
the slave unit operation mode is the operation mode of the communication terminal device operating as a slave unit, wherein
the proper information includes judging criterion information used as the criterion which judges the priority as the master unit of the self device, and
the circuitry is further configured to:
monitor whether or not the other communication terminal device is the another master unit, when the self device operates by the master unit operation mode,
acquire the judging criterion information of the other communication terminal device detected as the other master unit, and
switch, while the self device is operating by the master unit operation mode and when the other master unit is detected by monitoring, the master unit operation mode of the self device to the slave unit operation mode based on the judging criterion information of the self device and the judging criterion information of the other master unit.

US Pat. No. 10,771,278

PROGRESSIVE MODULATION FOR DOWNSTREAM ACCESS

Entropic Communications, ...

1. A method in a communication network node of receiving a payload in a downstream traffic phase of a time-division duplex (TDD) cycle, the method comprising:receiving a preamble of a message comprising:
the preamble; and
a plurality of payloads following the preamble, wherein the plurality of payloads are arranged in an order of increasing modulation profile and there is no intervening preamble between adjacent ones of the plurality of payloads;
identifying a payload of the plurality of payloads;
determining, based at least in part on the preamble, how to properly receive the identified payload; and
receiving the identified payload.

US Pat. No. 10,771,277

AUTOMATIC DEVICE VOLUME ADJUSTMENT BASED ON LEARNED VOLUME PREFERENCES

Rovi Guides, Inc., San J...

1. A method for automatically adjusting device volume based on learned volume preferences, the method comprising:receiving, at a first device, a wireless signal from a second device;
determining a signal strength of the wireless signal;
determining a location of the second device based on the signal strength of the wireless signal;
retrieving historical volume level data stored in memory for the first device;
determining a target volume level for the first device based on the location of the second device and the historical volume level data; and
automatically adjusting a volume setting of the first device to the target volume level.

US Pat. No. 10,771,276

SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR AGGREGATING BUILDING PERFORMANCE DATA FROM DISSIMILAR SOURCES

Brady Trane Service, Inc....

15. A computer program product, comprising:a tangible computer readable storage medium comprising computer readable program code embodied in the medium that when executed by at least one processor causes the at least one processor to perform operations comprising:
receiving building performance data from a plurality of different building performance data sources each comprising one of a plurality of different system programming languages and configured to provide building performance data at different time intervals, wherein the receiving comprises sending, to an IoT network, a plurality of requests for sensor values from the plurality of building performance sensors by querying different ones of the plurality of building performance sensors at different rates based on predefined priorities corresponding to different ones of the plurality of building performance sensors and receiving sensor values corresponding to a plurality of building performance sensors that are communicatively coupled via an Internet of Things (IoT) network;
aggregating the received building performance data from the plurality of different building performance data sources into a single data stream that includes sensor values, error messages and updates;
sending, to an analytics and scripting server that is operable to manage a session, session information that includes schedules for running a plurality of scripts that are designated to be executed at different times and session state information corresponding to an active web session;
receiving, from the analytics and scripting server, updates corresponding to the session state information of the active web session;
providing a digital representation of the IoT network that includes the plurality of different building performance data sources, wherein the digital representation comprises an event-sourced algorithm and is based on an event stream that provides information corresponding to retrospective state conditions of the database that corresponds to a previously occurring point in time;
storing the digital representation in the database;
generating graphical data that represents data in the single data stream; and
providing the data in the single data stream and/or the graphical data to be displayed data to a user.

US Pat. No. 10,771,274

PLAYBACK QUEUE CONTROL

Sonos, Inc., Santa Barba...

17. A controller comprising:a touch-screen display;
one or more processors;
data storage storing instructions that when executed by the one or more processors cause the controller to perform functions comprising:
displaying, via the touch-screen display, a control application of a media playback system comprising multiple zones, wherein a first zone of the multiple zones includes one or more first playback devices and a second zone of the multiple zones includes one or more second playback devices;
receiving, via the control application, input data representing a command to display a first control interface from among multiple control interfaces of the control application, wherein the multiple control interfaces correspond to respective zones, and wherein the multiple control interfaces are configured to be displayed substantially full-screen within a displayable area of the touch-screen display;
in response to receiving the input data to display the first control interface, displaying, via the touch-screen display, the first control interface, wherein the first control interface comprises: (i) a graphical representation of a name of the first zone; (ii) a first region comprising (a) transport controls selectable to control playback by the first zone and (b) a volume control to control volume of the one or more first playback devices; (iii) a second region comprising graphical representations of metadata associated with a first audio track in a playback queue of the first zone; and (iv) a graphical representation of a first position in an ordered list of the multiple zones;
while displaying the first control interface, detecting, in the second region of the first control interface, touch-input data representing a first swipe input;
determining that the first swipe input is in a first direction corresponding to a subsequent position in the ordered list; and
in response to receiving the touch-input data representing the first swipe input and determining that the first swipe input is in the first direction corresponding to the subsequent position in the ordered list, changing interfaces of the control application from displaying the first control interface to displaying a second control interface of the control application, wherein the second control interface comprises: (i) a graphical representation of a name of the second zone; (ii) a first region comprising (a) transport controls selectable to control playback by the second zone and (b) a volume control to control volume of the one or more second playback devices; (iii) a second region comprising graphical representations of metadata associated with a second audio track in a playback queue of the second zone; and (iv) a graphical representation of a second position in the ordered list of the multiple zones.

US Pat. No. 10,771,273

NETWORK INFORMATION FOR ASSISTING USER EQUIPMENT

QUALCOMM Incorporated, S...

1. A method of wireless communication comprising:receiving, from a serving base station, information comprising transmission characteristics of a signal transmitted from at least one non-serving base station, the transmission characteristics comprising a transmission mode and a traffic-to-pilot ratio (TPR) variation of the at least one non-serving base station; and
performing at least one of interference cancellation, demodulation, or providing an improved channel quality indicator (CQI) using the received transmission mode and the TPR variation of the at least one non-serving base station.

US Pat. No. 10,771,272

THROTTLING AND PRIORITIZATION FOR MULTICHANNEL AUDIO AND/OR MULTIPLE DATA STREAMS FOR CONFERENCING

Microsoft Technology Lice...

1. A data processing system comprising:a processor; and
a computer-readable medium storing executable instructions for causing the processor to perform operations comprising:
receiving, from a first device and in connection with a communication session, an indication of a bandwidth limitation on transferring data associated with the communication session, the first device being configured to generate a plurality of data streams associated with the communication session and to transmit the plurality of data streams to a second device;
dynamically determining one or more operating parameters of the first device to reduce the amount of bandwidth required to transmit the plurality of data streams by eliminating one or more data streams, reducing an amount of bandwidth required by one or more data streams, or both based on bandwidth reduction criteria determined by the first device, the second device, or both; and
directing the first device to transmit the plurality of data streams to the second device according to the one or more operating parameters.

US Pat. No. 10,771,271

METHODS AND DEVICES FOR ADDING NEW MEMBER TO GROUP THROUGH BARCODE SCANNING

TENCENT TECHNOLOGY (SHENZ...

1. A method for adding new members to a chat group having a plurality of existing members, the method comprising:at a server having one or more processors and memory storing programs configured for execution by the one or more processors:
receiving a joining request to add a new member to the chat group, wherein the joining request is sent by a first mobile device associated with the new member using a barcode-scanning process, wherein the barcode-scanning process comprises:
scanning a barcode encoding chat group information corresponding to the chat group using the first mobile device;
decoding the barcode using a barcode-decoding module to obtain the chat group information corresponding to the chat group; and
generating the joining request based on the chat group information, the joining request including the chat group information and new member information corresponding to the new member;
adding the new member to the chat group using the new member information without further authorization from the existing members of the chat group; and
after adding the new member to the chat group:
determining that the new member has no direct-contact relationship with any of the existing members of the chat group and sending a notification message to the existing members of the chat group, the notification message indicating that the new member has been added to the chat group using the barcode-scanning process and that the new member has no direct-contact relationship with any of the existing members of the chat group; and
receiving a removal request to remove the new member from the chat group, wherein the removal request is sent by a second mobile device associated with a first existing member of the chat group in response to the notification message indicating that the new member has no direct-contact relationship with any of the existing members of the chat group.

US Pat. No. 10,771,270

CHANNELING MESSAGING COMMUNICATIONS IN A SELECTED GROUP-BASED COMMUNICATION INTERFACE

Slack Technologies, Inc.,...

1. An apparatus comprising at least a processor, and a memory associated with the processor having computer instructions therein, with the computer instructions configured to, when executed by the processor, update a selected group-based communication interface from a plurality of group-based communication interfaces, wherein the selected group-based communication interface comprises a plurality of group-based communication channels, by causing the apparatus to:receive a channeling association that is configured to establish a connection between a graphical identifier and a receiver channel of the plurality of group-based communication channels;
receive group-based messaging communications to one or more of the plurality of group-based communication channels other than the receiver channel based on one or more group-based communication channel identifiers that are respectively associated with the received group-based messaging communications;
receive, from a client device, a correlation indication comprising electronic instructions to associate the graphical identifier with a selected messaging communication of the group-based messaging communications to cause the selected messaging communication to be associated with both of the graphical identifier and at least one of the one or more group-based communication channel identifiers;
in response to receiving the electronic instructions to associate the graphical identifier with the selected messaging communication of the group-based messaging communications, reproduce the selected messaging communication to create a rendering of a channeled copy within the receiver channel of the plurality of group-based communication channels; and
render the channeled copy with the receiver channel via the selected group-based communication interface.

US Pat. No. 10,771,269

AUTOMATED INTELLIGENT NODE FOR HYBRID FIBER-COAXIAL (HFC) NETWORKS

Cisco Technology, Inc., ...

1. A method comprising:determining, by a computing device, a desired operating profile for a node connected in a Hybrid Fiber-Coaxial (HFC) network;
determining, by the computing device based on the desired operating profile, a setting for at least one component in the node;
adjusting remotely, by a computing device, the at least one component in the node to the determined setting, wherein adjusting remotely at least one component in the node comprises:
remotely causing power to a first port of the node to be turned off, the first port feeding a one of a plurality of node communication lines, and
remotely decreasing power to a second port of the node from a first level to a second level to match a power level of an operating spectrum of a customer premise equipment connected to the second port, the second port feeding the customer premises equipment through another of the plurality of node communication lines; and
storing the determined setting and the adjustment to the at least one component in a database located at a headend of the HFC network.

US Pat. No. 10,771,268

APPARATUS AND METHOD FOR GENERATING RANDOM DIGITAL VALUE

ICTK HOLDINGS CO., LTD, ...

1. An apparatus for generating a digital value, the apparatus comprising:a generating unit to generate a plurality of digital values, the generating unit comprising a plurality of physically unclonable functions (PUFs), wherein a portion of the PUFs is implemented by applying at least one parameter causing a semiconductor process variation; and
a processing unit to process the digital values and to provide a first digital value,
wherein at least one of the PUFs comprises a via or a contact formed between conductive layers in a semiconductor, and
wherein a parameter of the via or the contact is selected from between a minimum value and a maximum value in which the via or the contact causes a short between the conductive layers stochastically.

US Pat. No. 10,771,267

AUTHENTICATION SYSTEM AND DEVICE INCLUDING PHYSICAL UNCLONABLE FUNCTION AND THRESHOLD CRYPTOGRAPHY

Analog Devices, Inc., No...

1. An authentication device, the device comprising:at least one identity circuit constructed to generate values characteristic to physical properties of the identity circuit;
at least one processor configured to:
manage generation of a first portion of an encrypted identity in a first stage with the identity circuit wherein the first portion is a threshold share of a shared secret;
execute a first threshold cryptographic operation on the first portion of the encrypted identity obscuring the first portion;
manage generation of at least a second portion of an encrypted identity in a second stage with the identity circuit wherein the second portion is a threshold share of the shared secret;
execute a second threshold cryptographic operation on the second portion of the encrypted identity obscuring the second portion; and
execute a combination operation on at least the obscured first portion and the obscured second portion to produce an obscured value for execution of a cryptographic operation associated with the encrypted identity; and
manage execution of the first and second stage such that only one portion of the encrypted identity is in memory at one time.

US Pat. No. 10,771,266

METHOD FOR CONFIGURING A TRANSPONDER, TRANSPONDER AND BASE STATION

NXP B.V., Eindhoven (NL)...

1. A method for configuring a transponder, comprising:deriving a signature from a physical unclonable function;
verifying said signature and sending said signature to a base station; and
verifying the received signature based on a matching of the received signature with a stored reference value, and upon successful verification of the signature by the base station, the base station initiating a key training sequence between the base station and the transponder, wherein the matching is successful when a number of mismatched bits are below a predefined threshold.

US Pat. No. 10,771,265

CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATES WITH LINKAGE VALUES

LG Electronics, Inc., Se...

1. A method for managing digital certificates by entities operable to perform computing on digital values and to communicate with each other, each digital certificate comprising a corresponding linkage value linkable to linkage values of one or more other digital certificates to define one or more groups of digital certificates, the method comprising performing the following operations to generate the digital certificates:generating, by a first entity, first pre-linkage values;
receiving, by the first entity, encrypted second pre-linkage values from a second entity, wherein the second pre-linkage values have a similar format as the first pre-linkage values, wherein each encrypted second pre-linkage value is not decryptable by the first entity;
for each digital certificate:
selecting, by the first entity, a first pre-linkage value and an encrypted second pre-linkage value;
combining, by the first entity, the selected first pre-linkage value with the selected encrypted second pre-linkage value without decrypting the second pre-linkage value, to obtain an encrypted combined value, the encrypted combined value being decryptable by the second entity but not the first entity; and
sending, by the first entity to the second entity, a certificate generation request comprising the encrypted combined value.

US Pat. No. 10,771,264

SECURING FIRMWARE

Hewlett Packard Enterpris...

1. A method for securing firmware, comprising:generating a firmware digital certificate for a layer of firmware, wherein the firmware operates a hardware component of a compute node, wherein the firmware digital certificate comprises an attribute certificate, and wherein the firmware digital certificate comprises:
a cumulative hash of the layer of firmware, wherein the cumulative hash comprises a concatenation of:
a hash of the layer of firmware; and
a hash of each one or more lower layers of the firmware; and
a nonce; and
authenticating the layer of firmware using a trusted data store comprising a binary image of an expected layer of firmware, and a certificate chain comprising a hardware digital certificate and the firmware digital certificate;
generating an additional firmware digital certificate for an additional layer of firmware, wherein the additional firmware operates the hardware component of the compute node, wherein the additional firmware digital certificate is signed by a private key installed in a previous layer of firmware, and wherein the additional firmware digital certificate comprises:
an additional hash of the additional layer of firmware;
an additional cumulative hash with the additional layer of firmware added to the accumulation; and
a new key pair with a new private key installed in the additional layer of firmware; and
authenticating the additional layer of firmware using the trusted data store comprising an additional binary image of the additional layer of firmware, wherein the certificate chain comprises the additional firmware digital certificate.

US Pat. No. 10,771,263

SYSTEM AND METHOD FOR AUTHENTICATING AND AUTHORIZING DEVICES

DENSO CORPORATION, Showa...

1. A system for communicating from a first device to a vehicle device disposed on a vehicle, the system comprising:the first device configured to:
communicate wirelessly with a second device,
obtain authorization information from the second device that is at least one of encrypted by a trusted source and digitally signed by the trusted source, wherein the authorization information pertains to authorization for the first device with respect to one or more operations of the vehicle;
the first device and the vehicle device being configured to establish a communication link for exchanging communications;
the first device being configured to communicate, via the communication link, the authorization information to the vehicle device, wherein the vehicle device:
determines the first device is authorized with respect to the vehicle device based on the authorization information being at least one of encrypted by the trusted source and digitally signed by the trusted source,
authenticates the authorization information issued from the second device based at least in part on at least one of decryption and verification of data associated with the authorization information; and
whereby the vehicle device is configured to determine authorization of the first device regardless of network connectivity to an external server.

US Pat. No. 10,771,262

PROVIDING FORWARD SECRECY IN A TERMINATING SSL/TLS CONNECTION PROXY USING EPHEMERAL DIFFIE-HELLMAN KEY EXCHANGE

Akamai Technologies, Inc....

1. A method, comprising:configuring a trusted machine into a secure physical environment, the secure physical environment being managed by a service provider;
configuring an untrusted machine to selectively proxy key exchange material to the trusted machine;
during a Transport Layer Security (TLS) connection handshake request received from a client at the untrusted machine, the untrusted machine configured to:
provide to the client a public certificate for a domain, the public certificate having a public key of an asymmetric key pair, a private key of the asymmetric key pair being held in the secure physical environment of the trusted machine and therefore being inaccessible to the untrusted machine, the private key configured to digitally sign information associated with an elliptic curve-based Diffie-Hellman ephemeral key exchange;
transmit to the trusted machine data associated with the elliptic curve-based Diffie-Hellman ephemeral key exchange, the data including at least a server public Diffie-Hellman value;
receive from the trusted machine a digital signature, the digital signature having been generated at the trusted machine by applying the private key to the data;
transmit to the client the digital signature, together with the data;
receive from the client a client public Diffie-Hellman value, the client public Diffie-Hellman value having been generated by the client using a client private Diffie-Hellman value and at least some of the data; and
generate a pre-master secret based at least in part on the client public Diffie-Hellman value.

US Pat. No. 10,771,261

EXTENSIBLE UNIFIED MULTI-SERVICE CERTIFICATE AND CERTIFICATE REVOCATION LIST MANAGEMENT

EMC IP Holding Company LL...

1. A method of managing digital certificates on a computerized platform, the method comprising:installing, by processing circuitry of the computerized platform, a set of network services on the computerized platform, each one of the network services in the set of network services comprising an application program executing in the computerized platform that performs secure communications over a communication network that is connected to the computerized platform;
maintaining, by the processing circuitry, in at least one certificate store configured and arranged to store digital certificates and certificate revocation lists in the computerized platform, a set of digital certificates used by the network services, and a set of certificate revocation lists, each one of the network services requiring that at least one of the digital certificates in the set of digital certificates be maintained on the computerized platform for the network service to perform secure communications over the communication network, and each one of the certificate revocation lists comprising a list of digital certificates that have been revoked; and
managing, by the processing circuitry, and through a single access point on the computerized platform providing access to the certificate store, the set of digital certificates and the set of certificate revocation lists maintained in the certificate store, the single access point comprising an application programming interface that receives certificate commands from multiple components executing in the computerized platform, the multiple components executing in the computerized platform from which the certificate commands are received by the application programming interface including the set of network services installed on the computerized platform, certificate management graphical user interface logic that receives certificate commands from a graphical user interface displayed in a display device of the computerized platform, and certificate command-line interface logic that receives certificate commands from a command-line interface displayed in the display device of the computerized platform, the managing of the set of digital certificates and the set of certificate revocation lists through the single access point including:
assigning one or more tags to each digital certificate in the set of digital certificates, one of the tags assigned to each digital certificate comprising a service tag indicating at least one network service in the set of network services that uses the digital certificate to perform secure communications over the communication network using a communication protocol that is based on public-key cryptography,
assigning one or more tags to each certificate revocation list in the set of certificate revocation lists, one of the tags assigned to each certificate revocation list comprising a service tag indicating at least one network service in the set of network services that uses the certification revocation list,
performing a set of certificate management operations on the digital certificates, in response to receipt of corresponding commands from the multiple components through the application programming interface, at least one of the certificate management operations selecting a subset of the digital certificates from the set of digital certificates using at least one of the tags assigned to the digital certificates, and
performing a set of certificate revocation list management operations through the single access point to the certificate store, at least one of the certificate revocation list management operations selecting a subset of the certificate revocation lists from the set of certificate revocation lists using at least one of the tags assigned to the certificate revocation lists.

US Pat. No. 10,771,259

ACHIEVING CONSENSUS AMONG NETWORK NODES IN A DISTRIBUTED SYSTEM

Alibaba Group Holding Lim...

1. A computer-implemented method for achieving a consensus among a plurality of network nodes of a blockchain network comprising at least a primary node and one or more backup nodes, the method comprising:receiving, by the primary node, a transaction request;
generating, by the primary node, a plurality of erasure code (EC) blocks according to an EC code using the transaction request, wherein the generating the plurality of EC blocks according to an EC code comprises:
transforming the transaction request into an EC message using the EC code; and
dividing the EC message into the plurality of EC block;
sending, by the primary node, a plurality of first messages to the one or more backup nodes, respectively, wherein each of the plurality of first messages comprises a composite hash value associated with the plurality of EC blocks;
receiving, by the primary node, at least one second message from at least one of the backup nodes, wherein the at least one second message comprises one of the plurality of first messages and a signature of the at least one of the backup nodes associated with the one of the plurality of first messages;
in response to receiving the at least one second message from the at least one of the backup node, verifying, by the primary node, whether the at least one second message is valid;
determining, by the primary node, whether a number of valid second messages exceeds a pre-determined threshold;
in response to determining that the number of valid second messages exceeds the pre-determined threshold, reconstructing, by the primary node, the transaction request based on a subset of the number of valid second messages according to the EC code;
in response to determining that the transaction request has been successfully reconstructed, sending, by the primary node, a third message, to the other network nodes, wherein the third message comprises a set of signatures that are in the valid second messages;
receiving, by the primary node, at least one third message from at least one of the backup nodes; and
in response to receiving a pre-determined number of third messages that are identical, executing, by the primary node, the transaction request.

US Pat. No. 10,771,258

RETRIEVING PUBLIC DATA FOR BLOCKCHAIN NETWORKS USING HIGHLY AVAILABLE TRUSTED EXECUTION ENVIRONMENTS

Alibaba Group Holding Lim...

1. A computer-implemented method for retrieving data from a data source that is external to a blockchain network, the method comprising:receiving, by a relay system smart contract executing within the blockchain network and from a client within the blockchain network, a request for data from the data source;
transmitting, by the relay system smart contract, the request to a relay system that is external to the blockchain network, the relay system comprising a multi-node cluster that comprises a plurality of relay system nodes;
receiving, by the relay system smart contract, a result provided from a relay system node of the multi-node cluster, the result being digitally signed with a digital signature using a private key of the relay system node, the result including the requested data from the data source;
verifying, by the relay system smart contract, that the relay system node is registered at the relay system smart contract;
in response to verifying that the relay system node is registered at the relay system smart contract, verifying, by the relay system smart contract, an integrity of the result based on a public key of the relay system node and the digital signature,
 wherein:
the relay system smart contract verifies the integrity of the result by comparing a first hash value to a second hash value, the first hash value being determined by decrypting the digital signature using the public key and the second hash value being calculated using the result and a hash function, and
the relay system node executes a trusted execution environment (TEE), and the private key and the public key of the relay system node are provisioned during an attestation process of the TEE, the attestation process being performed by a relay system controller for each relay system node in the multi-node cluster, the relay system controller providing public keys of each relay system node to the relay system smart contract; and
 in response to verifying the integrity of the result, transmitting the result to the client.

US Pat. No. 10,771,256

METHOD FOR GENERATING AN ELECTRONIC SIGNATURE

BUNDESDRUCKEREI GMBH, Be...

1. A method for generating an electronic signature of a user for an electronic document, a telecommunication terminal of a telecommunication network being assigned to the user, said method comprising the following steps:establishing a secure Internet session between the telecommunication terminal of the user and a signature server computer system,
receiving a code from the signature server computer system via a separate and/or separately secured side channel by the telecommunication terminal,
transmitting a combination of code and authentication information of the user via the secure Internet session to the signature server computer system,
checking the validity of the combination of code and authentication information by the signature server computer system, and
generating the electronic signature of the user by a high-security module of the signature server computer system, wherein the private key of the user for generating the electronic signature is stored in the high-security module, wherein the method further comprises the following steps for an initial registration of the user by the signature server computer system:
authenticating the user to an ID token assigned to the user, wherein the ID token has a protected memory area, in which attribute values of attributes of the user are stored,
authenticating the signature server computer system to the ID token via the Internet,
establishing a connection with end-to-end encryption between the signature server computer system and the ID token via the Internet and the telecommunication terminal,
transmitting the attribute values of the user from the ID token to the signature server computer system via the connection with end-to-end encryption, and
storing a user profile of the user, which profile contains the attribute values of the user received from the ID token, in order to carry out the registration of the user by the signature server computer system.

US Pat. No. 10,771,255

AUTHENTICATED STORAGE OPERATIONS

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:receiving, from a key management system comprising one or more computing devices, a cryptographic key;
receiving, at a first server, a request to perform a database query, the request being in accordance with an application level protocol;
as a result of receipt of the request, generating, by a client application of a virtual machine instance running on the first server, an input/output command indicating a block address of a block to be operated upon to fulfill the input/output command;
generating, based at least in part on the cryptographic key and the input/output command, a digital signature of the input/output command; and
transmitting the generated input/output command and the generated digital signature to a second server operable to use the cryptographic key to verify the digital signature and, as a result of the digital signature being verified, fulfill the generated input/output command by performing the input/output command on a storage volume stored on the second server.

US Pat. No. 10,771,254

SYSTEMS AND METHODS FOR EMAIL-BASED CARD ACTIVATION

CAPITAL ONE SERVICES, LLC...

1. A card activation system comprising:a contactless card including one or more processors and memory, wherein the memory contains one or more applets;
a client application comprising instructions for execution on a client device including one or more processors and memory; and
one or more servers,
wherein the one or more applets of the contactless card are configured to transmit a first set of information to the client application after entry of the contactless card into a communication field, the first set of information comprising one or more links configured to activate the contactless card via an email program,
wherein the client application is configured to receive the first set of information from the one or more applets of the contactless card and transmit to the one or more servers for validation, wherein, upon the validation of the first set of information by the one or more servers, the contactless card is activated,.
wherein the first set of information comprises a first link including one or more information elements to activate the contactless card,
wherein a first information element comprises an email address, a second information element comprises an email field, and a third information element comprises an encrypted payload, and
wherein the email address is retrieved from a pre-configured list for authentication of the contactless card.

US Pat. No. 10,771,253

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

CAPITAL ONE SERVICES, LLC...

1. A data transmission system comprising:a contactless card including a processor and memory;
an application comprising instructions for executing on a receiving device having a processor and memory, wherein the application is in data communication with the contactless card;
wherein the contactless card is configured to transmit, after one or more entries into a communication field, one or more user credentials for authentication;
wherein the application is configured to, after authentication of the one or more user credentials, perform one or more processes, wherein at least one of the one or more processes is selected from the group of playing an audible message and playing a visual message for a predetermined time period, wherein the selection is dependent after the one or more entries into the communication field, wherein the at least one selected from the group of the audible message and the visual message are selected based on the one or more entries into the communication field and based on one or more gestures from the contactless card such that each of the one or more gestures is indicative of a different message, the one or more gestures including at least one selected from the group of tap, wave, gesture, and swipe, and wherein the at least one selected from the group of the audible message and the visual message are played by the application.

US Pat. No. 10,771,252

DATA CENTER SECURITY SERVICES

Equinix, Inc., Redwood C...

1. A data center comprising:a plurality of cloud service provider ports, each coupled over a private connection to a different one of a plurality of cloud service provider networks, wherein the plurality of cloud service provider networks includes a first cloud service provider network and a second cloud service provider network;
network infrastructure coupling the plurality of cloud service provider ports; and
a computing system including at least one hardware security module, wherein the computing system is deployed within the data center and is connected to the network infrastructure, and wherein the computing system is configured to:
authenticate, based on input received over a plurality of customer ports, each of a plurality of customers to access services provided by the at least one hardware security module, including a first customer and a second customer;
generate, by interacting with the at least one hardware security module, a plurality of cryptographic keys, including a first cryptographic key associated with the first customer and a second cryptographic key associated with the second customer, wherein each of the plurality of cryptographic keys are generated and stored securely within the at least one hardware security module without disclosure outside of the at least one hardware security module,
enforce restrictions on use of the plurality of cryptographic keys, including preventing use of the first cryptographic key by the second customer and preventing use of the second cryptographic key by the first customer,
access a first set of customer data,
generate a first set of processed data by causing the at least one hardware security module to perform a cryptographic operation on the first set of customer data using the first cryptographic key,
output the first set of processed data over at least one of the plurality of cloud service provider ports to the first cloud service provider network,
access a second set of customer data,
generate a second set of processed data by causing the at least one hardware security module to perform a cryptographic operation on the second set of customer data using the second cryptographic key, and
output the second set of processed data over at least one of the plurality of cloud service provider ports to the second cloud provider network.

US Pat. No. 10,771,251

IDENTITY MANAGEMENT SERVICE VIA VIRTUAL PASSPORT

Wells Fargo Bank, N.A., ...

1. A computer-implemented method performed by an identity verification computing system, the method comprising:creating a virtual passport for an individual, the virtual passport uniquely identifying the individual, the virtual passport comprising a first unique identifier generated for the individual and a first verification code, a copy of the first verification code being stored relationally to the first unique identifier;
providing, by the identity verification computing system, a public/private key pair for the individual;
signing the virtual passport with a private key of the public/private key pair;
entering a signed virtual passport in a public block chain, the signed virtual passport being retrievable from the public block chain;
receiving, from an entity computing system, an identity verification request comprising a second unique identifier and a second verification code retrieved from the signed virtual passport stored in the public block chain using a public key of the public/private key pair;
based on a match between the second unique identifier and the first unique identifier, retrieving the copy of the first verification code stored relationally to the first unique identifier;
determining whether the second verification code matches the copy of the first verification code;
when the second verification code matches the copy of the first verification code, transmitting an identity verification approval message to the entity computing system; and
when the second verification code does not match the copy of the first verification code, transmitting an identity verification denial message to the entity computing system;
authenticity of the signed virtual passport being determined via the public key of the public/private key pair, the second unique identifier and the first verification code by, responsive to the identity verification request inclusive of the second verification code retrieved from the signed virtual passport stored in the public block chain using the public key of the public/private key pair, comparing the second verification code to the copy of the first verification code to ensure the match.

US Pat. No. 10,771,250

DISTRIBUTED TOKEN-LESS AUTHENTICATION

1. A method comprising:by at least one hardware processor of a region-specific interface,
via at least one first network, receiving a partially-hashed personal identification number (PIN) from a terminal, wherein the partially-hashed PIN comprises an unhashed first portion that identifies a service-specific interface associated with the user account, and a hashed second portion,
via at least one second network, relaying the partially-hashed PIN to the service-specific interface identified by the first unhashed portion of the partially-hashed PIN,
via the at least one second network, receiving a first-level confirmation or rejection from the service-specific interface, and,
via the at least one first network, relaying the first-level confirmation or rejection to the terminal; and,by the at least one hardware processor of the service-specific interface, when the first-level confirmation or rejection is a first-level confirmation,via the at least one second network, receiving a request for second-level confirmation, comprising image data of the user, from the region-specific interface,
comparing the image data of the user in the request for second-level confirmation to image data of the user stored by the service-specific interface,
when the image data of the user in the request for second-level confirmation matches the image data of the user stored by the service-specific interface, sending a second-level confirmation and user information associated with the user; and,
when the image data of the user in the request for second-level confirmation does not match the image data of the user stored by the service-specific interface, sending a second-level rejection.

US Pat. No. 10,771,249

APPARATUS AND METHOD FOR PROVIDING SECURE EXECUTION ENVIRONMENT FOR MOBILE CLOUD

ELECTRONICS AND TELECOMMU...

1. An apparatus for providing a secure execution environment for a mobile cloud, the apparatus comprising:a general executor to register the apparatus with a cloud server by generating executor information, including secure executor information received from a secure executor and general executor information corresponding to the general executor, transmit registration request information including the executor information to the cloud server, and receive registration confirmation information from the cloud server, and, when a request for service execution is received, generate authentication information, transmit the authentication information to the cloud server, and receive a security key required for secure communication from the cloud server; and
the secure executor to verify the security key received from the general executor and perform the secure communication with the cloud server by running a service execution monitor when verification of the security key succeeds,
wherein the general executor generates general authentication information corresponding to the general executor, and transmits the authentication information, including the general authentication information and secure authentication information received from the secure executor, to the cloud server, thus allowing the cloud server to verify the general executor and the secure executor using the authentication information,
wherein the apparatus is installed in a user terminal,
wherein the secure executor requests the cloud server to store data, receives encrypted data from the cloud server, and decrypts the encrypted data,
wherein the secure executor receives the registration confirmation information from the general executor, decrypts a passcode included in the registration confirmation information, re-encrypts the decrypted passcode, and stores the re-encrypted passcode, and
wherein the secure authentication information includes the passcode encrypted using a public key of the cloud server.

US Pat. No. 10,771,248

CONTENT INDIVIDUALIZATION

Sony Corporation, Tokyo ...

1. A method of playing back individualized content on a playback device, comprising:reading a first part of an encrypted data set having first key information indicating a first key;
decrypting the first part of the encrypted data set using a first playback key that is stored on the playback device and that matches the first key, creating first playback data;
playing back the first playback data;
reading a second part of an encrypted data set having second key information indicating a second key;
reading a third part of an encrypted data set having third key information indicating a third key;
selecting a second playback key that matches either the second key or the third key and that is stored on the playback device;
decrypting the second part of the encrypted data using the second playback key when the second playback key matches the second key or decrypting the third part of the encrypted data using the second playback key when the second playback key matches the third key, creating second playback data; and
playing back the second playback data.

US Pat. No. 10,771,247

KEY PAIR PLATFORM AND SYSTEM TO MANAGE FEDERATED TRUST NETWORKS IN DISTRIBUTED ADVERTISING

COMMERCE SIGNALS, INC., ...

1. A key pair platform system for facilitating secure electronic exchange of anonymized data comprising:a source set of anonymized object identifiers mapped to a source set of virtual internally held object identifiers, the source set of virtual internally held object identifiers corresponding to a source set of object information for a set of objects;
a destination set of anonymized object identifiers mapped to a destination set of virtual internally held object identifiers, the destination set of virtual internally held object identifiers corresponding to a destination set of object information for the set of objects;
a virtual key pair platform server computer operable to perform an object identifier translation between the source set of anonymized object identifiers and the destination set of anonymized object identifiers upon receiving a permission file over a network authorizing the object identifier translation;
wherein the source set of anonymized object identifiers and the destination set of anonymized object identifiers are anonymized such that individual identities of objects in the set of objects are not disclosed by the source set of anonymized object identifiers or the destination set of anonymized object identifiers; and
wherein the virtual key pair platform server computer does not receive the source set of virtual internally held object identifiers nor the destination set of virtual internally held object identifiers;
wherein the source set of virtual internally held object identifiers is electronically held by at least one source computer connected to the virtual key pair platform server computer over the network, wherein the destination set of virtual internally held object identifiers is electronically held by at least one destination computer connected to the virtual key pair platform server computer over the network, wherein the source set of anonymized object identifiers and the source set of virtual internally held object identifiers are never sent to the at least one destination computer and wherein the destination set of anonymized object identifiers and the destination set of virtual internally held object identifiers are never sent to the at least one source computer; and
wherein the virtual key pair platform server computer performs the object identifier translation using a key pair table, where the virtual key pair platform server computer maintains a separate key pair table for each source set of anonymized object identifiers and each destination set of anonymized object identifiers.

US Pat. No. 10,771,245

SYSTEMS AND METHODS FOR USE IN COMPUTER NETWORK SECURITY

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method for use in managing certain data across a network based on multiple keys assigned to different participants in association with the certain data, the method comprising:identifying, by an originating party, a relying party;
identifying data relevant to at least one interaction between the originating party and the relying party, the data including identifying data specific to the originating party;
encrypting, by a computing device, the data based on a secret;
generating, by the computing device, a key set based on the secret, the key set having at least three keys and structured such that the secret is derivable from at least two of the at least three keys;
disseminating, by the computing device, a first key of the key set and the encrypted data to a control party; and
disseminating, by the computing device, a second key of the key set to the relying party, thereby enabling the relying party to submit a request including the second key to the control party and the control party to decrypt the encrypted data disseminated to the control party, using the first and second keys, in order to respond to the request from the relying party.

US Pat. No. 10,771,244

METHOD FOR COMMUNICATION BETWEEN DEVICES AND DEVICES THEREOF

SAMSUNG ELECTRONICS CO., ...

1. A method comprising:transmitting, by a first electronic device to a second electronic device, a first public key;
encrypting, by the second electronic device, a second public key based on the first public key;
obtaining, by the first electronic device from the second electronic device, the encrypted second public key that was encrypted using the transmitted first public key;
decrypting, by the first electronic device, the encrypted second public key by using the first public key;
generating, by the first electronic device, a secret key based on a first private key and the second public key;
obtaining, by the first electronic device from the second electronic device, an encrypted network key, wherein a network key is encrypted based on a secret key generated, at the second electronic device based on the first public key and a second private key;
decrypting, by the first electronic device, the encrypted network key by using the secret key;
establishing an encrypted communication channel between the first electronic device and the second electronic device by using the network key; and
performing communication, by the first electronic device, with the second electronic device by using the encrypted communication channel.

US Pat. No. 10,771,243

MULTICAST ENCRYPTION SCHEME FOR DATA-OWNERSHIP PLATFORM

Ecosteer Srl, Bolzano (I...

1. A system for periodic management of cryptographic keys, the system comprising:a plurality of computer processors, comprising a first computer processor in a first data-stream publisher device, a second computer processor in a data-stream back-end device, and a third computer processor in a first subscriber device;
a first memory communicatively coupled with the first computer processor, a second memory communicatively coupled with the second computer processor, and a third memory communicatively coupled with the third computer processor, the second memory storing computer-executable instructions that, when executed, cause at least:
the second computer processor to receive a first input associating a first set of subscribers with a first data stream published by the first data-stream publisher device;
the second computer processor to receive, via a key-proxy service, a first cryptographic key;
the second computer processor to transmit a first confirmation, indicating that the first cryptographic key is ready for use;
the second computer processor to release, via the key-proxy service, the first cryptographic key to at least the first set of subscribers comprising the first subscriber device;
the second computer processor to receive a second input, from a publishing user, associating a second set of subscribers with the first data stream published by the first data-stream publisher device, wherein the second set of subscribers excludes the first subscriber device;
the second computer processor to receive, via the key-proxy service, a second cryptographic key after a predetermined amount of time has elapsed, wherein the second cryptographic key is ineffective to decrypt data that can be decrypted using the first cryptographic key;
the second computer processor to transmit a second confirmation, indicating that the second cryptographic key is ready for use; and
the second computer processor to release the second cryptographic key to at least the second set of subscribers, whereby the first subscriber device, included in the first set of subscribers but excluded from the second set of subscribers, is unable to decrypt, using the first cryptographic key, encrypted data that requires the second cryptographic key to decrypt, irrespective of access to the first data stream by the first subscriber device.

US Pat. No. 10,771,242

BLOCKCHAIN-BASED DATA PROCESSING

Alibaba Group Holding Lim...

1. A computer-implemented method comprising:generating, by a blockchain node device of a service platform, service handling data of a target service object, wherein the service handling data comprises an identifier of the target service object;
sending, by the blockchain node device of the service platform, first transaction data, as part of a first transaction, to a blockchain, wherein the first transaction data is generated based on the service handling data, and the first transaction data comprises the identifier of the target service object;
obtaining, by the blockchain node device of the service platform, second transaction data, as part of a second transaction, from a block of the blockchain, wherein the second transaction data is generated by a blockchain node device of a service provider, the second transaction data comprising service processing data, wherein the service processing data, in turn, is generated by the blockchain node device of the service provider based on the service handling data, and wherein the service processing data comprises the identifier of the target service object and at least one piece of attribute data of the target service object;
generating a transaction record of the target service object based on the first transaction and the second transaction, wherein the transaction record comprises the identifier of the target service object and transaction identifiers of the first transaction and the second transaction;
checking, based on the transaction record, whether the blockchain node device of the service platform receives the service processing data that corresponds to the second transaction and is sent by the blockchain node device of the service provider; and
executing predetermined service processing data acquisition logic if the blockchain node device of the service platform does not receive the service processing data, or
executing application logic for the service processing data if the blockchain node device of the service platform receives the service processing data,
wherein the blockchain node device of the service platform and the blockchain node device of the service provider are part of a blockchain network system.

US Pat. No. 10,771,241

TIME AUTHENTICATION METHOD, APPARATUS AND DEVICE IN BLOCKCHAIN-TYPE LEDGER

Alibaba Group Holding Lim...

1. A computer-implemented method for server-based time authentication of blockchain-type ledgers, comprising:determining at least one ledger that needs time authentication, wherein the at least one ledger includes one or more consecutive data blocks; and
for each of the at least one ledger:
determining, ledger information corresponding to the ledger, wherein the ledger information includes a plurality of items including an identifier of the ledger, a block height of a starting block of the ledger, a block height of an ending block of the ledger, and a root hash of a Merkle tree formed by the one or more consecutive data blocks in the ledger;
sending the ledger information to a trusted time authentication agency for time authentication on each of the plurality of items; and
receiving a time certificate from the trusted time authentication agency, wherein the time certificate includes a timestamp, the ledger information, and a digital signature of the trusted time authentication agency.

US Pat. No. 10,771,240

DYNAMIC BLOCKCHAIN SYSTEM AND METHOD FOR PROVIDING EFFICIENT AND SECURE DISTRIBUTED DATA ACCESS, DATA STORAGE AND DATA TRANSPORT

Dynamic Blockchains Inc, ...

1. A dynamic blockchain system, comprising:a) at least one complete asset node server, which is configured to store complete versions of a digital asset, wherein the at least one complete asset node server further comprises:
a first processor;
a first non-transitory memory;
a first input/output component;
a complete asset manager, which manages processing of the complete versions of the digital asset; and
a complete asset storage, which stores a plurality of records comprising the complete versions of the digital asset; all connected via
a first data bus;
b) a plurality of hash asset node servers, wherein each hash asset node server stores a copy of an asset blockchain, which includes a hash of the digital asset for secure preservation and validation of the complete versions of the digital asset; and
c) a dynamic blockchain management server, which is configured to receive and process requests to add, update, and validate the complete versions of the digital asset;
wherein the dynamic blockchain management server is configured to perform an asset validation of the digital asset by lookup with a lookup asset identifier and a lookup version number to retrieve a corresponding version of the digital asset in the at least one complete asset node server, and by verification of the digital asset by a random sampling in a statistically representative number of hash asset node servers in the plurality of hash asset node servers, such that an asset block of the asset blockchain matches the lookup asset identifier, the lookup version number, and a cryptographic hash of the digital asset, for each hash asset node server in the statistically representative number of hash asset node servers;
wherein the complete asset storage comprises a plurality of asset records, which each comprise:
a first asset identifier;
an asset type;
a first version number;
a first transaction number; and
a complete asset object.

US Pat. No. 10,771,239

BIOMETRIC THREAT INTELLIGENCE PROCESSING FOR BLOCKCHAINS

International Business Ma...

1. A method, comprising:detecting a suspected biometric authentication incident;
submitting a first blockchain transaction comprising a first report to a blockchain network, the first report comprising public and private data corresponding to the suspected biometric authentication incident;
submitting a second blockchain transaction comprising a second report to the blockchain network, the second report comprising one or more of a root cause and mitigation steps for the incident; and
taking an action, by one or more blockchain nodes, in response to determining one or more of the first and second reports are relevant to the one or more blockchain nodes.

US Pat. No. 10,771,238

SECURE DATA TRANSACTIONS

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:generating, by a data exchange platform, a secure data exchange agreement between a first user and a second user based at least on (i) data information associated with first data that belongs to the first user and that is to be exchanged with the second user, and (ii) an order that is associated with the first data and that was received from the second user;
writing, by the data exchange platform, the secure data exchange agreement between the first user and the second user into a block chain, wherein the secure data exchange agreement is associated with first data;
receiving, by the data exchange platform and from a first device associated with the first user, a first key for decrypting encrypted first data that is transmitted from the first device associated with the first user to a second device associated with the second user without passing through the data exchange platform; and
in response to determining that the second user complies with the secure data exchange agreement, transmitting, by the data exchange platform and to the second device associated with the second user, the received first key for decrypting encrypted first data that is transmitted from the first device to the second device without passing through the data exchange platform;
before transmitting the received first key, receiving, by the data exchange platform and from the second device associated with the second user, a second key, wherein the second key is used for decrypting encrypted second data, and the second data is associated with the secure data exchange agreement; and
after transmitting the received first key, transmitting, by the data exchange platform and to the first device associated with the first user, the received second key, wherein the first device decrypts the encrypted second data, received from the second device, based on the second key to obtain the second data,
wherein after transmitting the received first key and before transmitting the received second key, receiving, by the data exchange platform and from the second device associated with the second user, confirmation information for the first data, wherein the confirmation information for the first data indicates that the second user determines that the obtained first data conforms to the secure data exchange agreement.

US Pat. No. 10,771,237

SECURE ANALYTICS USING AN ENCRYPTED ANALYTICS MATRIX

Enveil, Inc., Fulton, MD...

1. A method, comprising:encoding an analytic parameter set using a homomorphic encryption scheme as a homomorphic analytic matrix;
transmitting a processing set to a server system, the processing set comprising at least the homomorphic analytic matrix and a keyed hashing function; and
receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and the keyed hashing function to evaluate the homomorphic analytic matrix over a datasource.

US Pat. No. 10,771,236

DEFENDING AGAINST A SIDE-CHANNEL INFORMATION ATTACK IN A DATA STORAGE DEVICE

Seagate Technology LLC, ...

1. A method of reducing leakage of side-channel information in a communication channel of a data storage device, comprising:receiving a host command from a host device to transfer user data between the host device and a main memory of the data storage device;
using programming in a memory executed by a programmable processor of the data storage device to perform a cryptographic function involving multiple logical computations to arrive at an output value responsive to an input value over a time interval from receipt of the input value to generation of the output value, the input value forming a portion of the user data associated with the host command, the programmable processor clocked at a constant clock rate over an entirety of the time interval; and
during the time interval, repetitively interrupting the programmable processor during the multiple logical computations by a plurality of interrupt calls respectively selected responsive to a first series of random numbers and resuming operation of the programmable processor to continue the multiple logical computations by a corresponding plurality of function return calls respectively selected responsive to a different, second series of random numbers, each of the plurality of interrupt calls causing the programmable processor to temporarily suspend the multiple logical computations and perform at least one non-cryptographic function.

US Pat. No. 10,771,235

PROTECTING BLOCK CIPHER COMPUTATION OPERATIONS FROM EXTERNAL MONITORING ATTACKS

Cryptography Research Inc...

1. An apparatus for implementing a block cipher in a manner resistant to external monitoring attacks, comprising:a first register configured to store a first pre-computed mask value represented by a combination of a first random value and a second random value;
a second register configured to store an output mask value, wherein the output mask value is an inverse permutation function of the first random value;
a third register configured to store a second pre-computed mask value represented by a combination the first pre-computed mask value and a permutation function of the output mask value;
a fourth register configured to store an input mask value, wherein the input mask value is a combination of an expansion function of a key mask value and the first random value;
a permutation circuit configured to produce a round state of a cryptographic operation of the block cipher by permuting an input data block;
a masking circuit configured to produce a masked round state by masking the round state using the first pre-computed mask value;
a non-linear transformation circuit configured to apply the expansion function to a first portion of the masked round state, perform a non-linear transformation of a combination of a masked key with an output of the expansion function applied to the first portion of the masked round state, and apply the permutation function to an output of the non-linear transformation thus producing a modified first portion of the masked round state, wherein the non-linear transformation is defined using the input mask value stored in the fourth register and the output mask value stored in the second register;
two round feedback circuits configured to:
produce a swapped masked round state by swapping the modified first portion of the masked round state with a second portion of the masked round state,
produce a new masked round state by combining the swapped masked round state with the first pre-computed mask value stored in the first register and the second pre-computed mask value stored in the third register; and
an output register configured to store a result of the cryptographic operation, wherein the result of the cryptographic operation comprises the new masked round state.

US Pat. No. 10,771,234

APPARATUS AND METHOD FOR AN ALL-DIGITAL PHASE LOCK LOOP

QUALCOMM Incorporated, S...

1. A method of wireless communication of a first wireless device that includes an all-digital phase lock loop (ADPLL), comprising:receiving an oscillator tuning word (otw) signal that is associated with low-path pass information and transmission data;
applying a cost function and an update function to the otw signal prior to sending the otw signal to an oscillator; and
determining a correction factor for use in estimating a gain of the oscillator based at least in part on an output of the update function,
wherein the applying the cost function to the otw signal comprises:
removing a direct current (DC) portion of the otw signal to obtain an analog-current (AC) portion of the otw signal;
determining a peak-to-average ratio (PAR) associated with the AC portion of the otw signal and an anti-PAR ratio associated with the AC portion of the otw signal;
selecting a metric for use by the update function based at least in part on the PAR ratio and the anti-PAR ratio of the otw signal;
determining a peak value associated with the otw signal or an anti-peak value associated with the otw signal; and
sending one or more of the metric, the PAR, the anti-PAR, the peak value, or the anti-peak value associated with the otw signal to the update function.

US Pat. No. 10,771,233

CLOCK DATA RECOVERY CIRCUIT

REALTEK SEMICONDUCTOR COR...

1. A clock data recovery circuit (100), comprising:a first detecting circuit (110), arranged to operably detect phases of a data signal (DA_IN) and a sampling clock signal (SCLK) to generate a corresponding first detection signal (DEC1);
a first loop filter (120), coupled with the first detecting circuit (110), and arranged to operably process the first detection signal (DEC1) to generate a control signal (CTL);
a second detecting circuit (130), arranged to operably detect phases of a reference signal (REF) and a feedback signal (FB) to generate a corresponding second detection signal (DEC2);
a control voltage generating circuit (140), coupled with the second detecting circuit (130), and arranged to operably generate a corresponding control voltage (VC) according to the second detection signal (DEC2);
a voltage-controlled oscillator (150), coupled with the control voltage generating circuit (140), and arranged to operably generate the sampling clock signal (SCLK) according to the control voltage (VC);
a phase adjustment circuit (160), coupled with the first loop filter (120) and the voltage-controlled oscillator (150), and arranged to operably adjust a phase of the sampling clock signal (SCLK) according to the control signal (CTL), so as to generate a phase-adjusted signal (ACLK); and
a frequency divider circuit (170), coupled with the second detecting circuit (130) and the phase adjustment circuit (160), and arranged to operably conduct a frequency division operation on the phase-adjusted signal (ACLK) to generate the feedback signal (FB).

US Pat. No. 10,771,232

INFORMATION PROCESSING APPARATUS, TIME SYNCHRONIZATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM RECORDING TIME SYNCHRONIZATION PROGRAM

FUJITSU LIMITED, Kawasak...

1. An information processing apparatus comprising:a memory configured to store first system time; and
a processor coupled to the memory, the processor configured to:
receive, from an information acquisition apparatus after the first system time is written in the memory, first information acquired by the information acquisition apparatus and first time information indicating first acquisition time of the first information;
receive, from the information acquisition apparatus after receiving the first information and the first time information, second information and second time information indicating second acquisition time of the second information;
convert, based on the first system time, reception time at which the first information and the first time information are received into second system time;
convert, based on the second system time and the first time information, the second time information into third system time;
attach the second system time to the first information; and
attach the third system time to the second information.

US Pat. No. 10,771,231

SIGNALING SYSTEM WITH ADAPTIVE TIMING CALIBRATION

Rambus Inc., San Jose, C...

1. An integrated circuit (IC) memory controller, comprising:a timing signal pin to receive a timing signal;
a data pin to receive data during live data transfer operations and having sampling circuitry;
a timing controller coupled to the timing signal pin and the data pin, the timing controller operative during an initialization mode to determine whether devices generating the data support an adaptive calibration mode associated with the live data transfer operations, the initialization mode occurring outside of the live data transfer operations, the timing controller operative during the adaptive calibration mode to detect a phase difference between a phase of the timing signal and a phase of the data, and to adjust the phase of the data to a calibrated phase based on the phase difference; and
wherein the sampling circuitry samples the data based on the calibrated phase.

US Pat. No. 10,771,230

ESTIMATING APPARATUS FOR BIAS DRIFT OF TRANSMITTING END MODULATOR, COMPENSATING APPARATUS AND RECEIVER

FUJITSU LIMITED, Kawasak...

8. A method of estimating and compensating bias drift of a transmitting end modulator contained in received signals, applied in a receiver, the method comprising:recovering the received signals by removing a frequency difference and a phase difference between a transmitting end laser and a receiving end laser producing phase recovered received signals;
estimating the bias drift of the transmitting end modulator according to the phase recovered received signals; and
compensating the bias drift of the transmitting end modulator in the receiver according to the estimated bias drift of the transmitting end modulator,
the method further comprising:
modifying a reference signal used for performing equalization processing according to the estimated bias drift of the transmitting end modulator, and performing equalization processing on the received signals according to the modified reference signal.

US Pat. No. 10,771,229

SYNCHRONIZING METHOD AND SYSTEM

THALES, Courbevoie (FR)

1. A method for synchronizing a plurality of equipments EQi each comprising a clock Hi adjusted to a quartz-crystal oscillator, said equipments EQi communicating together using a communication protocol, the plurality of equipment being configured to deliver a command signal to a device, comprising at least the following steps for one synchronization cycle:in each equipment generating the command signal, computing a value of the difference ?H between a reference-clock value Hm and the local clock Hi of an equipment, by comparing the value of the clock signal at a given time for the equipment to the value of the clock signal for the reference clock,
on detecting a phase shift ?H between the reference-clock value and the value of a local clock,
when the value of the phase shift ?H between the local clock and the reference clock corresponds to one refresh cycle of the reference clock Hm, a corrected clock time Hic is defined by repeating a number of the clock signal of given parity if the value of the local clock is early and a corrected clock time is defined by skipping one number of the clock signal of opposite parity to the first parity if the local clock value is late,
when the value of the phase shift ?H is higher than one refresh cycle, resetting the reference time,
then using a corrected value of the clock in each equipment to emit the command signal.

US Pat. No. 10,771,228

METHOD AND SYSTEM FOR DISTRIBUTED COMMUNICATION

GOLBA LLC, Rancho Palos ...

1. A communication device, comprising:a master component, comprising:
modem module; and
an antenna communicatively coupled to the modem module;
a slave component, comprising:
a first antenna for wireless communication with an external device by a first carrier frequency;
a second antenna for wireless communication with the antenna of the master component by a second carrier frequency,
wherein the slave component is configured to:
transmit first signals to the external device by a beam-forming operation on the first carrier frequency via the first antenna and receive the first signals from the external device by the beam-forming operation on the same first carrier frequency via the first antenna, and
transmit second signals to the master component by the beam-forming operation on the second carrier frequency via the second antenna and receive the second signals from the master component by the beam-forming operation on the same first carrier frequency via the second antenna; and
a frequency converter to (i) convert the first signals received through the second antenna from the second carrier frequency of the master component into the first carrier frequency of the external device and (ii) convert the second signals received through the first antenna from the first carrier frequency of the external device into the second carrier frequency of the master component,
wherein the first carrier frequency is lower than the second carrier frequency,
wherein the first antenna is larger than the second antenna,
wherein the modem module (i) receives digitally modulated signals and generates analog signals in the second carrier frequency for transmission by the antenna of the master component and (ii) receives signals in the second carrier frequency from the antenna of the master component and perform analog to digital conversion on the received signals.

US Pat. No. 10,771,227

USER EQUIPMENT AND METHOD FOR MANAGING BACKOFF TIME IN THE USER EQUIPMENT

Samsung Electronics Co., ...

1. A method of a terminal in a communication system, the method comprising:receiving, from a base station associated with a cell, a message including a first information element of categories for classifying at least one terminal according to a public land mobile network (PLMN) of the at least one terminal and a second information element of a backoff value respectively corresponding to each of the categories;
identifying, in case that a PLMN for the terminal corresponds to one of the categories, a backoff time of a category corresponding to the PLMN for the terminal based on the second information element; and
transmitting, to the base station, a preamble for an initial random access based on the identified backoff time,
wherein the categories comprises a first category including all the terminals, a second category including one or more terminals except for at least one terminal corresponding to at least one home PLMN (HPLMN) or an equivalent PLMN (ePLMN), and a third category including one or more terminals except for the at least one terminal corresponding to the at least one HPLMN, the ePLMN or a visited PLMN (VPLMN), and
wherein the identifying further comprises:
identifying whether the first information element indicates the category corresponding to the PLMN for the terminal;
determining to apply the backoff time indicated by the second information element, in case that the first information element indicates the category corresponding to the PLMN for the terminal; and
determining to ignore the backoff time indicated by the second information element, in case that the first information element does not indicate the category corresponding to the PLMN for the terminal.

US Pat. No. 10,771,226

METHOD FOR LIMITING SPURIOUS EMISSION AND USER EQUIPMENT PERFORMING THE METHOD

LG Electronics Inc., Seo...

1. A method for limiting a spurious emission in a wireless communication system, the method performed by a user equipment (UE) and comprising:configuring a transceiver of the UE to use an operating band 71; and
transmitting an uplink signal on an uplink band of the operating band 71,
wherein based on an operating band 29 to be protected from the uplink signal, a maximum level of spurious emission is limited to ?38 dBm for protecting at least one other UE using the operating band 29.

US Pat. No. 10,771,224

METHOD AND DEVICE FOR TRANSMITTING FEEDBACK INFORMATION

CHINA ACADEMY OF TELECOMM...

1. A method for transmitting feedback information, the method comprising:receiving downlink transmission; and
determining an uplink time domain resource position for transmitting Acknowledgement/Non-Acknowledgment (ACK/NACK) feedback information of the downlink transmission, according to at least a length of Transmission Time Interval (TTI) of the downlink transmission and/or a second length of TTI, and transmitting the ACK/NACK feedback information of the downlink transmission at the uplink time domain resource position;
wherein the second length of TTI is a length of TTI, configured by configuration signaling or predefined, for determining an uplink time domain resource position for transmitting ACK/NACK feedback information.

US Pat. No. 10,771,221

DETERMINATION OF DEMODULATION REFERENCE SIGNAL AND PHASE TRACKING REFERENCE SIGNAL PARAMETERS

QUALCOMM Incorporated, S...

1. A method for wireless communications, comprising:identifying one or more phase tracking reference signal ports for transmission of a phase tracking reference signal in an uplink data channel;
determining that the uplink data channel is of a first type; and
determining an association between the one or more phase tracking reference signal ports and one or more demodulation reference signal ports based at least in part on a quantity of the one or more phase tracking reference signal ports identified for transmission of the phase tracking reference signal in the uplink data channel of the first type.

US Pat. No. 10,771,220

UPLINK SOUNDING SIGNAL TRIGGERING METHOD AND SYSTEM, AND APPARATUS

Huawei Technologies Co., ...

1. A communication method, carried out by a user equipment (UE), the method comprising:receiving a downlink control information (DCI) from a base station by detecting that a cyclic redundancy check (CRC) of the DCI has been scrambled using a radio network temporary identifier (RNTI) received from the base station, wherein the DCI comprises a sounding reference signal (SRS) control information intended for each UE of Y number of UEs, where Y is a positive integer greater than 1, where a bit quantity of the SRS control information intended for an ith UE in the Y number of UEs is ki, where i is an integer according to the expression 1?i?Y, and where ki is a positive integer;
obtaining an SRS control information intended for the UE from the DCI in response to the CRC of the DCI being scrambled using the RNTI received from the base station; and
triggering an SRS transmission according to the SRS control information.

US Pat. No. 10,771,219

SOUDING REFERENCE SIGNAL SENDING AND RECEIVING METHOD, APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM

Huawei Technologies Co., ...

1. A signal sending method, comprising:receiving at least one piece of resource configuration information for configuring at least one sounding reference signal (SRS) resource set, wherein each SRS resource set of the at least one SRS resource set comprises one or more SRS resources, and wherein different SRS resources comprised in a same SRS resource set occupy different symbols and correspond to different user equipment (UE) antenna ports; and
sending an SRS on at least one SRS resource of the at least one SRS resource set;
wherein a guard period between two SRS resources in a same SRS resource set is greater than or equal to Y symbols, wherein the value of Y and a subcarrier spacing satisfy at least one of:
the value of Y is 1 and the subcarrier spacing is 15 kHz;
the value of Y is 1 and the subcarrier spacing is 30 kHz;
the value of Y is 1 and the subcarrier spacing is 60 kHz; or
the value of Y is 2 and the subcarrier spacing is 120 kHz.

US Pat. No. 10,771,218

METHOD AND APPARATUS FOR USING CHANNEL STATE INFORMATION REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM

QUALCOMM Incorporated, S...

1. A method for wireless communication, comprising:selecting a cell-specific channel station information reference signal (CSI-RS) resource pattern comprising a pattern of resource elements assigned to the transmission of the CSI-RS signal within a CSI-RS subframe of a plurality of CSI-RS subframes, the cell-specific CSI-RS resource pattern being non-colocated with another resource pattern assigned to a reference signal other than the CSI-RS, the CSI-RS subframe not including a synchronization signal, a paging signal and/or a broadcast signal, and an index of the CSI-RS resource pattern being hopped for each CSI-RS subframe of the plurality of CSI-RS subframes based on a cell ID and any combination of a number of CSI-RS antenna ports, a number of CSI-RS subframes within a frame, and a system time;
allocating the cell-specific CSI-RS resource pattern to a plurality of antennas for transmitting the CSI-RS by grouping the CSI-RS resource pattern in a plurality of groups of resource elements and assigning each group of resource elements to a different antenna of the plurality of antennas; and
transmitting, using the plurality of antennas, the CSI-RS according to the cell-specific CSI-RS resource pattern.

US Pat. No. 10,771,217

WIRELESS BASE STATION APPARATUS, WIRELESS TERMINAL APPARATUS, FREQUENCY RESOURCE ALLOCATION METHOD, AND METHOD OF FORMING TRANSMISSION SIGNAL

Sun Patent Trust, New Yo...

1. A communication apparatus, comprising:circuitry, which, in operation, maps a sounding reference signal (SRS) to an SRS transmission band, wherein a frequency position of an edge of the SRS transmission band matches a frequency position of an edge of one of a plurality of resource block groups (RBGs), and each of the plurality of RBGs include consecutive resource blocks (RBs), and wherein the frequency position of the edge of the SRS transmission band is determined by control information which is transmitted from a base station; and
a transmitter, which, in operation, transmits the SRS.

US Pat. No. 10,771,215

METHOD AND APPARATUS FOR SIGNALING APERIODIC CHANNEL STATE INDICATION REFERENCE SIGNALS FOR LTE OPERATION

Motorola Mobility LLC, C...

1. A method in a user equipment, the method comprising:receiving first aperiodic zero power channel state information reference signal configuration information of a serving cell;
receiving second aperiodic zero power channel state information reference signal configuration information of the serving cell; and
receiving downlink control information on a physical control channel in a subframe of the serving cell, where the downlink control information includes an aperiodic zero power channel state information reference signal indicator bit field that indicates a selection of one out of at least
the first aperiodic zero power channel state information reference signal configuration,
the second aperiodic zero power channel state information reference signal configuration, and
no aperiodic zero power channel state information reference signal in the subframe.

US Pat. No. 10,771,214

SYSTEM AND METHOD FOR UPLINK POWER CONTRL FRAMEWORK

Apple Inc., Cupertino, C...

1. An apparatus of a user equipment (UE) operable to configure transmission power for physical uplink shared channel (PUSCH), the apparatus comprising:processing circuitry, wherein for PUSCH transmissions on frequencies greater than 6 GHz, the processing circuitry is to configure the UE to use more than one beam pair link (BPL), and
wherein for PUSCH transmissions on frequencies greater than 6 GHz, the processing circuitry is configured to:
receive, at the UE, a sounding reference signal (SRS) resource indicator that indicates two SRS resources of a set of SRS resources, the two SRS resources associated with two beam pair links (BPLs);
decode, at the UE, higher layer signaling including sets of one or more power control factors and a set of downlink reference signals, wherein each of the set of SRS resources is associated with one set of the one or more power control factors and one of the downlink reference signals;
estimate, at the UE, a path loss based on the downlink reference signal corresponding to the two SRS resources indicated by the SRS resource indicator; and
determine, at the UE, a transmission power for the PUSCH for transmission on frequencies greater than 6 GHz based on the path loss and the set of the one or more power control factors corresponding to the two SRS resources indicated by the SRS resource indicator, wherein the PUSCH is transmitted on a BPL associated with each of the two SRS resources; and
a memory interface, wherein an indicator of the transmission power is sent to a memory via the memory interface;
wherein for the frequencies greater than 6 GHz, the UE is configured for transmission of the PUSCH within one or multiple bandwidth parts (BWPs) of a component carrier, and wherein a bandwidth part (BWP) index and a component carrier (CC) index for the downlink reference signal for path loss estimation is configured by higher layer signaling and mapped to each SRS resource.

US Pat. No. 10,771,212

REFERENCE SIGNAL HAVING VARIABLE STRUCTURE

LG ELECTRONICS INC., Seo...

1. A method of transmitting a demodulation reference signal (DMRS) in a wireless communication system, the method comprising:transmitting a DMRS via a first Orthogonal Frequency Division Multiplexing (OFDM) symbol within a time domain unit; and
transmitting one or more additional DMRSs on one or more second OFDM symbols located only after the first OFDM symbol within the time domain unit,
wherein a position of the first OFDM symbol is differently determined based on mapping type of a data region, wherein the mapping type is related with a position of a starting OFDM symbol of the data region within the time domain unit, and
wherein positions of the one or more second OFDM symbols are determined based on a number of the one or more second OFDM symbols and a number of OFDM symbols within the time domain unit, and fixed regardless of the position of the first OFDM symbol which is differently determined based on the mapping type.

US Pat. No. 10,771,210

METHODS AND NODES IN A WIRELESS COMMUNICATION NETWORK

Huawei Technologies Co., ...

1. An access node (ANd) for allocating a beacon resource pattern to a user node (UNd), wherein the ANd comprises:a receiver, configured to receive an uplink beacon signal from the UNd;
a processor, configured to:
detect the UNd based on receiving the uplink beacon signal from the UNd;
allocate a beacon resource pattern, from a predetermined set of beacon resource patterns, to the detected UNd; and
signal information about the allocated beacon resource pattern to the UNd;
wherein the processor is further configured to:
determine that beacon utilization of the UNd is lower than a threshold limit, wherein the beacon utilization corresponds to a ratio between a number of used beacon resources and a number of available resources of a currently allocated beacon resource pattern; and
in response to determining that the beacon utilization of the UNd is lower than the threshold limit, allocate a beacon resource pattern with a lower beaconing rate than the currently allocated beacon resource pattern to the UNd.

US Pat. No. 10,771,209

METHOD FOR TRANSMITTING AND RECEIVING SIGNAL IN WIRELESS LAN SYSTEM AND APPARATUS THEREFOR

LG ELECTRONICS INC., Seo...

1. A method in a wireless LAN (WLAN) system, the method comprising:generating, by a first station (STA) supporting a plurality of space time streams (STSs), a first pilot sequence having a length of 36 for two 2.16 GHz channels based on a second pilot sequence having a length of 12,
wherein the second pilot sequence is repeated three times in the first pilot sequence,
wherein the first pilot sequence is generated for an enhanced directional multi-gigabit physical protocol data unit (EDMG PPDU),
wherein the second pilot sequence is set to one sequence among a plurality of candidate pilot sequences based on an index of an STS to be used for the EDMG PPDU,
wherein each of the plurality of candidate pilot sequences has a length of 12,
wherein the plurality of candidate pilot sequences are configured for the plurality of STSs, respectively,
wherein the plurality of the candidate pilot sequences are mutually orthogonal, and
wherein a maximum number of the plurality of STSs is eight; and
transmitting, by the first STA to a second STA, the EDMG PPDU including the first pilot sequence through the two 2.16 GHz channels.

US Pat. No. 10,771,208

IN-BAND BACKHAUL WITH LAYERED DIVISION MULTIPLEXING

Her Majesty the Queen in ...

1. A multicast communication system (MCS) comprising:a primary transmitter station (PTS) configured to wirelessly transmit a first transmission (Tx) signal comprising a first (L1) signal layer and a second (L2) signal layer, wherein the L2 signal layer is superimposed over the L1 signal layer using layered division multiplexing (LDM), wherein the L1 signal layer comprises L1 service signals carrying first service data to end-users, and wherein the PTS is further configured to include in-band backhaul (IBBH) signals in the first Tx signal; and,
a first relay transmitter station (RTS) configured to:
receive a relay signal comprising the first Tx signal;
extract the IBBH signals contained in the first Tx signal; and,
transmit a second Tx signal comprising backhaul service data obtained from the IBBH signals.

US Pat. No. 10,771,206

METHOD AND APPARATUS FOR PERFORMING FRACTIONAL SUBFRAME TRANSMISSION

NEC CORPORATION, Minato-...

1. A method of performing transmission, the method comprising:sending to a user equipment (UE) at one of at least one of predetermined position(s) within a subframe n, an information indicating a value of how many symbols are used for a downlink signal transmitted in a subframe n+1 in an unlicensed spectrum, wherein the value of how many symbols corresponds to less than a full subframe; and
performing transmission of the downlink signal in the subframe n+1.

US Pat. No. 10,771,205

METHOD AND DEVICE FOR PERFORMING COMMUNICATION BY USING NON-ORTHOGONAL CODE MULTIPLE ACCESS SCHEME IN WIRELESS COMMUNICATION SYSTEM

LG Electronics Inc., Seo...

1. A method for performing communication based on a non-orthogonal coded multiple access scheme in a wireless communication system, the method comprising:receiving, by a user equipment (UE), control information from a base station;
modulating or demodulating, by the UE, a UE specific non-orthogonal code cover (NCC) based on the control information;
performing, by the UE, the non-orthogonal coded multiple access scheme based on the UE specific NCC,
wherein the control information comprises information on a codeword configured in a Grassmannian sequence,
wherein the codeword is included in a codebook predefined for the non-orthogonal coded multiple access scheme,
wherein each coefficient of the Grassmannian sequence is quantized based on an M-quadrature amplitude modulation (QAM) constellation, where M is a quantization level, and
wherein, before being quantized with the M-QAM constellation, the Grassmannian sequence is scaled with a mean value of a magnitude of the M-QAM constellation and is normalized with a mean value of a magnitude of each coefficient of the codeword.

US Pat. No. 10,771,203

INCREASED CARRIER MONITORING

APPLE INC., Cupertino, C...

1. An apparatus of a user equipment (UE) operable to perform inter-frequency measurements, the apparatus comprising:one or more processors configured to:
decode, at the UE, an information element (IE) received from an eNodeB;
determine, at the UE, whether the IE received from the eNodeB includes a reduced measurement performance field;
determine, at the UE, based on the reduced measurement performance field, that a neighbouring inter-frequency is configured for a reduced measurement performance when the reduced measurement performance field is included in the IE; and
determine that the neighbouring inter-frequency is configured for a normal measurement performance when the reduced measurement performance field is not included in the IE; and
memory configured to store the IE received from the eNodeB.

US Pat. No. 10,771,201

ON-DEMAND RETRANSMISSIONS IN BROADCAST COMMUNICATION

QUALCOMM Incorporated, S...

1. A method for wireless communications comprising:broadcasting a first Bluetooth packet over a channel bandwidth during a first set of one or more master slots of a periodic broadcast window;
performing one or more received signal strength indication (RSSI) measurements during a first set of one or more slave slot of the periodic broadcast window;
receiving from one or more receiving devices, based at least in part on the one or more RSSI measurements, one or more negative acknowledgement (NACK) signals corresponding to the first Bluetooth packet; and
rebroadcasting, during a second set of one or more master slots of the periodic broadcast window, the first Bluetooth packet based at least in part on the one or more NACK signals.

US Pat. No. 10,771,199

METHODS AND APPARATUS FOR REVERSE LINK ACKNOWLEDGEMENT IN A WIRELESS LOCAL AREA NETWORK (WLAN)

QUALCOMM Incorporated, S...

1. A method for wireless communication, the method comprising:transmitting an aggregated data unit comprising a plurality of data units, each of the plurality of data units intended for a different one of a plurality of apparatuses, wherein transmitting the aggregated data unit comprises simultaneously transmitting the plurality of data units;
transmitting a first block acknowledgement request message to a first apparatus of the plurality of apparatuses to request acknowledgment of a data unit of the plurality of data units intended for the first apparatus of the plurality of apparatuses;
receiving a first block acknowledgment message for the aggregated data unit from the first apparatus of the plurality of apparatuses after transmitting the first block acknowledgment request message, wherein the first block acknowledgment message indicates reception of the data unit intended for the first apparatus of the plurality of apparatuses; and
transmitting, in response to receiving the first block acknowledgment message, a second block acknowledgment request message to a second apparatus of the plurality of apparatuses to request acknowledgment of a data unit of the plurality of data units intended for the second apparatus of the plurality of apparatuses.

US Pat. No. 10,771,198

ADAPTIVE REPETITION IN WIRELESS COMMUNICATION SYSTEMS

1. A method, comprising:configuring, by a network device comprising a processor, a user equipment with a first repetition level, wherein the first repetition level is applicable to repetition of a data block communicated between the user equipment and the network device for a transmission of the data block;
detecting, by the network device, a channel quality event corresponding to an indicator of a change in channel quality between the user equipment and the network device, wherein the detecting the channel quality event comprises determining that a counter associated with hybrid automatic repeat request feedback has reached a threshold value that is greater than one; and
in response to the detecting of the channel quality event, facilitating, by the network device, a change of the first repetition level in use by the user equipment to a second repetition level.

US Pat. No. 10,771,197

METHOD FOR TRANSMITTING HYBRID AUTOMATIC REPEAT REQUEST FEEDBACK INFORMATION, AND USER EQUIPMENT

NTT DOCOMO, INC., Tokyo ...

2. A user equipment, comprising:a processor;
a storage medium having computer program instructions stored thereon, wherein the computer program instructions, when executed by the processor, perform processing of:
determining a reception window of data on which hybrid automatic repeat request bundling is to be performed;
detecting data in the reception window; and
bundling and transmitting hybrid automatic repeat request feedback information for the data detected in the reception window, wherein the data detected in the reception window comprises a plurality of physical downlink shared channels,
determining the reception window by determining a length and a starting position of the reception window, wherein the length of the reception window is determined based on a number of repetitions of a physical downlink shared channel and a number of repetitions of a physical downlink control channel.

US Pat. No. 10,771,196

TECHNIQUES FOR SIGNALING COMPRESSED HARQ OR RETRANSMISSION INFORMATION BETWEEN A BASE STATION AND A USER EQUIPMENT

QUALCOMM Incorporated, S...

1. A method for wireless communication, comprising:receiving, at a user equipment (UE), a transport block (TB) that includes a plurality of code block groups (CBGs);
receiving an indication of punctured resources in the TB;
determining CBG failure information identifying a set of one or more CBGs in the TB that failed to decode at the UE;
determining a compressed representation of the CBG failure information, the compressed representation of the CBG failure information including fewer bits of information than the CBG failure information and wherein the compressed representation of the CBG failure information is determined based at least in part on the indication of the punctured resources; and
transmitting, in response to receiving the TB, hybrid automatic repeat request (HARQ) information including the compressed representation of the CBG failure information.

US Pat. No. 10,771,195

METHOD FOR CONTROLLING DOWNLINK HARQ IN WIRELESS COMMUNICATION SYSTEM AND DEVICE THEREFOR

KT CORPORATION, Gyeonggi...

1. A method of processing a hybrid automatic repeat request (HARQ) of a terminal in a wireless communication system, the method comprising:receiving a number of subframes for bundling a HARQ feedback of the terminal and a HARQ feedback information size through radio resource control (RRC) signaling;
receiving downlink data and downlink control information including position information of a subframe for transmitting the HARQ feedback and a HARQ feedback bundling sequence in one or more subframes;
receiving a HARQ feedback delay offset in at least one of the RRC signaling and the downlink control information;
determining, based on the received HARQ feedback delay offset, a number of subframes to wait before transmitting the HARQ feedback; and
transmitting the HARQ feedback for one or more pieces of the downlink data in one subframe determined based on the determined number of subframes.

US Pat. No. 10,771,194

INTERCONNECTION NETWORK FOR INTEGRATED CIRCUIT

ARM Limited, Cambridge (...

1. An interconnection network for providing data transfer between a plurality of nodes of an integrated circuit, comprising:a plurality of endpoints each to exchange data with a respective node of the integrated circuit;
a primary network to route a primary payload from a source endpoint to a destination endpoint;
a redundant network to route, to the destination endpoint, a redundant payload comprising a first check code calculated based on at least a portion of the primary payload, the first check code having fewer bits than said at least a portion of the primary payload;
wherein the destination endpoint comprises error checking circuitry to perform an error checking operation to calculate a second check code based on the primary payload received via the primary network, and verify integrity of the primary payload based on a comparison of the second check code with the first check code received via the redundant network,
wherein the redundant network comprises at least one intermediate component each configured to route the redundant payload from an upstream component to a downstream component;
wherein at least for a synchronous intermediate component for which both the upstream component and the downstream component are configured to operate in response to synchronous clock signals, the synchronous intermediate component is configured to route the redundant payload from the upstream component to the downstream component independent of any comparison of the redundant payload with information derived from the primary payload transmitted on the primary network.

US Pat. No. 10,771,193

CHANNEL ADAPTIVE ERROR-DETECTING CODES WITH GUARANTEED RESIDUAL ERROR PROBABILITY

Siemens Aktiengesellschaf...

1. A method for checking a signal transmission of a specified message with a number of d bits from a sender to a receiver by a control unit such that a speed at which a residual error probability is calculated and an accuracy of the calculated residual error probability utilizing a linear block code created via a coding tool, a channel model, and a linear feedback shift register are increased, the method comprising:describing the channel model via a characterizing Markov-modulated Bernoulli process;
performing an iterative first calculation of probability values for a probability distribution of states of one of the d bits relative to a current bit after transmission of a signal by a signal transmission unit, starting from a current probability distribution of states in the current bit, taking into account all possible transitions that result from a Cartesian product of a number of states in accordance with the Markov-modulated Bernoulli process and the number of states of the linear feedback shift register, the control unit adding probability values of transitions into an equal state and performing this iteration up to a probability distribution of a final bit;
performing an iterative second calculation of probability values for the probability distribution of the states of one of the d bits relative to the current bit after transmission of the signal by the signal transmission unit, starting from the current probability distribution of the states in the current bit, ignoring all transitions obtained during a specified zero state, the control unit adding the probability values of transitions into an equal state and performing this iteration up to the probability distribution of the final bit; and
forming a difference from the probability values of a specified zero state obtained during the first iterative calculation with the probability values of the specified zero state obtained during the second iterative calculation, as the residual error probability having the increased accuracy.

US Pat. No. 10,771,192

POWER SAVING IN NARROWBAND DEVICES BY EARLY TERMINATION OF DECODING OF COMMUNICATION CHANNELS

QUALCOMM Incorporated, S...

1. A method for wireless communications by a user equipment (UE), comprising:determining a first number of repetitions of at least one control channel communication from a base station to monitor based at least in part on a channel quality between the UE and the base station, wherein the first number of repetitions is less than a second number of repetitions of the at least one control channel communication configured for the UE;
monitoring for the first number of repetitions of the at least one control channel communication from the base station;
after monitoring for the first number of repetitions of the at least one control channel communication, refraining from monitoring for one or more additional repetitions of the at least one control channel communication; and
entering a low power mode during the one or more additional repetitions of the at least one control channel communication.

US Pat. No. 10,771,191

SYSTEM FOR HIGHLY RELIABLE FILE DELIVERY OF USING CONTINUOUS FEC ENCODING/DECODING

KenCast, Inc., Norwalk, ...

1. A computer-implemented method for at least encoding a source file to be transmitted to a receiver and subsequently reconstructing the encoded source file, comprising the steps of:dividing the source file into a plurality of groups of source packets, each group comprised of a plurality of source packets;
for each respective group of source packets, arranging the source packets into a matrix format;
for each respective group of source packets in the matrix format, generating braided forward error correction (FEC) packets;
selecting a polynomial and a pseudorandom generator, wherein coefficients of the polynomial are non-negative and the sum of all coefficients of the polynomial is one;
generating, using a randomly selected number selected according to the coefficients of the polynomial, a low density parity-check forward error correction (LDPC FEC) packet for the respective group of source packets and the corresponding braided FEC packets generated for the respective group;
generating a continuous FEC packet by adding corresponding header information to the LDPC FEC packet, wherein the header information comprises information regarding the components of the LDPC FEC packet from at least one of the source packets of the respective group and the braided FEC packets for the respective group;
repeating the steps of generating the LDPC FEC packet and the continuous FEC packet for at least one additional group of source packets in the matrix format;
receiving, by the receiver, the at least one of the continuous FEC packets; and
reconstructing, by the receiver, the source file based on the received continuous FEC packet, the reconstructing comprising:
(a) at least one of:
(i) performing an LDPC FEC decoding process on the at least one received continuous FEC packet; and
(ii) performing a braided FEC decoding process on the at least one received continuous FEC packet; and
(b) repeating at least one of steps (a)(i) and (a)(ii) in the case either step recovers one of a source packet or a braided FEC packet.

US Pat. No. 10,771,190

TRANSMITTER AND SIGNAL PROCESSING METHOD THEREOF

SAMSUNG ELECTRONICS CO., ...

1. A broadcast signal generating and transmitting method, the method comprising:generating a codeword comprising information bits, first parity bits and second parity bits by encoding the information bits based on a parity check matrix of a low density parity check (LDPC) code;
interleaving the codeword;
mapping bits of the interleaved codeword onto constellation points;
generating a broadcast signal based on the constellation points using an orthogonal frequency division multiplexing (OFDM) scheme; and
transmitting the broadcast signal for a receiver,
wherein the parity check matrix comprises an information matrix part and a parity matrix part,
wherein the information matrix part comprises a first information submatrix with a quasi-cyclic structure and a second information submatrix with the quasi-cyclic structure,
wherein the parity matrix part comprises a first parity submatrix with a dual diagonal matrix structure and a second parity submatrix with an identity matrix structure,
wherein the first parity bits are generated based on the first parity submatrix, and
wherein the second parity bits are generated based on the second parity submatrix.

US Pat. No. 10,771,189

FORWARD ERROR CORRECTION MECHANISM FOR DATA TRANSMISSION ACROSS MULTI-LANE LINKS

Intel Corporation, Santa...

1. An apparatus comprising:a port for transmitting data; and
a multi-lane link coupled to the port, the port, in preparation to transmit a data block across the multi-lane link, to:
determine a bit size for each lane of the data block to be transmitted based on the number of lanes of the data block;
determine error correcting code for the data block;
augment the data block with the error correcting code, the error correcting code to be distributed in each lane of the data block; and
transmitting the data block with the error correcting code across the multi-lane link;
wherein the port includes a start data stream ordered set (SDS OS) in the data block to be transmitted the SDS OS indicating a start of a data stream to replace a sync header (sync hdr), the port to by pass inclusion of the sync hdr in the data block to be transmitted.

US Pat. No. 10,771,188

REDUCTION IN LATENCY FOR CELLULAR HANDOVER IN WEARABLE DEVICES

Apple Inc., Cupertino, C...

1. An accessory device comprising:a first radio configured to communicate with a companion device using a non-cellular radio access technology (RAT);
a second radio configured to communicate with a cellular network; and
a processor coupled to the first radio and the second radio, wherein the processor is configured to operate with the first radio and the second radio to cause the accessory device to:
establish a short-range wireless link with a companion device using the first radio;
establish a first connection with the cellular network through the short-range wireless link with the companion device;
initiate a first data session using the first connection;
determine that a latency requirement associated with the first data session is shorter than a predetermined latency threshold;
transition the second radio from a powered-off mode to a low power mode based at least in part on the determination that the latency requirement is shorter than the predetermined latency threshold, wherein transitioning the second radio from the powered-off mode to the low power mode includes powering on a baseband processor of the second radio without transitioning the second radio to an online radio mode;
while the second radio is transitioned to low power mode, determine that the first connection has been lost;
transition the second radio from the low power mode to the online radio mode based at least in part on the determination that the first connection has been lost; and
reestablish the first connection with the cellular network using the second radio in the online radio mode.

US Pat. No. 10,771,187

ADAPTIVE CODING FOR WIRELESS COMMUNICATION

Arm Limited, Cambridge (...

1. A method for transferring data, the method comprising:mapping the data to a modulation code, using an encoder circuit having a configuration, including:
mapping a binary symbol of the data to a modulation code having a plurality of modulation digits;
generating a modulation signal based on the modulation code;
modulating a transmitter drive signal based on the modulation signal;
determining a performance level; and
setting the configuration of the encoder circuit based on the performance level,where said setting the configuration of the encoder circuit based on the performance level includes:setting a width, in bits, of the binary symbol;
setting a width, in digits, of the modulation code; or
a combination thereof.

US Pat. No. 10,771,186

TRANSMITTING DEVICE, RECEIVING DEVICE AND METHODS THEREOF

Huawei Technologies Co., ...

1. A transmitting device for a wireless communication system, the transmitting device comprising:a processor; and
a non-transitory computer-readable medium storing instructions, that when executed by the processor, cause the transmitting device to perform steps comprising:
obtaining a first sequence of bits comprising first control information addressed for at least one receiving device;
obtaining a second sequence of bits comprising first data information addressed for the at least one receiving device;
superposing the first sequence of bits and the second sequence of bits into a first superposed sequence of symbols;
obtaining a third sequence of bits comprising second control information;
obtaining a fourth sequence of bits comprising second data information;
superposing the third sequence of bits and the fourth sequence of bits into a second superposed sequence of symbols; and
transmitting the first superposed sequence of symbols and the second superposed sequence of symbols to the at least one receiving device in a radio resource, wherein the receiving device cancels interference in the second superposed sequence of symbols based on the third sequence of bits to obtain a second interference cancelled superposed sequence of symbols, and decodes the second interference cancelled superposed sequence of symbols based on the first control information so as to obtain the fourth sequence of bits comprising the second data information.

US Pat. No. 10,771,185

SYSTEM AND METHOD FOR SETTING LINK PARAMETERS IN A WIFI LINK

Samsung Electronics Co., ...

1. A method for operating a link, the method comprising:adjusting a respective estimated signal to interference and noise ratio for each of a plurality of combinations of spatial stream numbers and bandwidths;
determining a modulation and coding scheme for each of the plurality of combinations;
estimating a plurality of throughputs, each corresponding to a respective one of the plurality of modulation and coding schemes;
selecting a maximum throughput from the plurality of throughputs; and
transmitting data according to the modulation and coding scheme, spatial stream number, and bandwidth associated with the maximum throughput.

US Pat. No. 10,771,184

CONTROL ENTITY, ACCESS NODE, USER EQUIPMENT AND METHODS

HUAWEI TECHNOLOGIES CO., ...

1. A control entity for connecting to at least a first access node and at least a second access node, wherein the control entity comprises a processor configured to:instruct the second access node to share an interference leakage towards user equipment being scheduled by the second access node;
instruct the first access node to calculate a Signal-to-Interference-plus-Noise Ratio (SINR) value based on the interference leakage from the second access node; and
instruct the first access node to choose a modulation and coding scheme (MCS) for the user equipment being scheduled by the first access node based on the SINK; and, wherein the SINR value is a first SINR value and the interference leakage is a first interference leakage, and wherein the processor is further configured to:
instruct the first access node to share a second interference leakage towards user equipment being scheduled by the first access node,
instruct the second access node to calculate a second SINR value based on the second interference leakage from the first access node; and
instruct the second access node to choose a modulation and coding scheme (MCS) for user equipment being scheduled by the second access node based on the second SINR.

US Pat. No. 10,771,183

OPTICAL NETWORK ELEMENT FOR TRANSMITTING AND/OR RECEIVING WDM SIGNALS

XIEON NETWORKS S.a.r.l., ...

1. An optical network element for path-protected communication of wavelength division multiplexing (WDM) signals within a WDM network using a working path and a protection path that each communicatively connect to the optical network element, the optical network element comprising:a wavelength selective switch (WSS) operable to enable the optical network element to at least one of add to a WDM signal at least one channel and drop from a WDM signal at least one channel,
wherein the WSS comprises one or more input ports and a working output port communicatively connected to the working path, and a separate protecting output port communicatively connected to the protection path, the WSS being configurable to a working configuration, in which one or more channels are routed by the WSS from said one or more input ports to the working output port, and being configurable to a protecting configuration, in which at least one channel of said one or more channels is routed by the WSS from at least one of said one or more input ports to the protecting output port,
a computer readable medium including program code defining configuration information,
a control unit configured to control the WSS to adopt the working configuration or the protecting configuration based on the configuration information,
wherein the optical network element is adapted to provide path-protected communication by using the WSS in the protecting configuration to route to the protection path said at least one channel of said one or more channels, without the optical network element routing said at least one channel to the protection path through an optical splitter of the optical network element that the WSS does not comprise, and without the optical network element routing said at least one channel to the protection path through an optical switch of the optical network element that the WSS does not comprise.