US Pat. No. 10,693,936

TRANSPORTING CODED AUDIO DATA

QUALCOMM Incorporated, S...

1. A method of retrieving audio data, the method comprising:receiving availability data representative of a plurality of available adaptation sets, the available adaptation sets including one or more scene-based audio adaptation sets and one or more object-based audio adaptation sets, the object-based audio adaptation sets including audio data for audio objects and metadata representing location coordinates for the audio objects, and the one or more scene-based audio adaptation sets including audio data representing a soundfield using spherical harmonic coefficients and comprising one or more scalable audio adaptation sets, each of the one or more scalable audio adaptation sets corresponding to respective layers of scalable audio data;
receiving selection data identifying which of the scene-based audio adaptation sets and the one or more object-based audio adaptation sets are to be retrieved; and
providing instruction data to a streaming client to cause the streaming client to retrieve data for each of the adaptation sets identified by the selection data.

US Pat. No. 10,693,931

DELIVERY OF BROADCAST-RELATED CONTENT TAGGED BY OFFLINE DEVICE

iHeartMedia Management Se...

1. A method for use in a processing system including a processor and associated memory, the method comprising:providing, from the processing system, broadcast content to a broadcaster via a communications network, the broadcast content including:
a plurality of broadcast media items;
unified numbering system (UNS) identifiers associated with individual broadcast media items, the UNS identifiers associating the individual broadcast media items with at least one other media item;
subsequent to the broadcast content being broadcast, receiving at the processing system via the communications network, an information transfer initiated by an end-user device, the information transfer including tag information indicating a selected broadcast media item previously marked by a user of the end-user device during a period of time the end-user device was disconnected from the processing system, wherein the tag information includes a UNS identifier associated with the selected broadcast media item;
in response to the information transfer:
identifying, based on the tag information, content related to the selected broadcast media item, wherein the content related to the selected broadcast media item includes enhanced content associated with a UNS identifier linking the selected broadcast media item to the enhanced content;
retrieving the enhanced content from an enhancement library using the UNS identifier linking the selected broadcast media item to the enhanced content; and
uploading the content related to the selected broadcast media item from the processing system to the end-user device via the communications network.

US Pat. No. 10,693,929

MODULAR VIDEO BLADE WITH SEPARATE PHYSICAL LAYER MODULE

Avid Technology, Inc., B...

1. A video server comprising:a first digital video processing module comprising first computer program instructions executed on a first processor to perform a first set of video processing operations including video encoding and decoding, and video format conversion, and having a first interface;a second digital video processing module, comprising second computer program instructions executed on a second processor to perform a second set of video processing operations including video encoding, video decoding, and video format conversion, and having a second interface;a first physical layer module having a first internal interface and a first physical layer interface and comprising third computer program instructions executed on a third processor to transmit processed video data received over the first internal interface from one of the first and second digital video processing modules to devices external to the video server over the first physical layer interface and to receive video data from devices external to the video server over the first physical layer interface and to provide the received video data to one of the first and second digital video processing modules over the first internal interface;
a second physical layer module having a second internal interface and a second physical layer interface and comprising fourth computer program instructions executed on a fourth processor to transmit processed video data received over the second internal interface from one of the first and second digital video processing modules to devices external to the video server over the second physical layer interface and to receive video data from devices external to the video server over the second physical layer interface and to provide the received video data to one of the first and second digital video processing modules over the second internal interface; and
a configuration file;
wherein the first interface, the second interface, the first internal interface, and the second internal interface are configured using the configuration file and implement a common physical and electrical interface; andwherein:when the first interface of the first digital video processing module is configured to be directly connected to the first internal interface of the first physical layer module, the first physical layer module communicates data between the first digital video processing module and the devices external to the video server connected using the first physical layer interface;
when the first interface of the first digital video processing module is configured to be directly connected to the second internal interface of the second physical layer module, the second physical layer module communicates data between the first digital video processing module and the devices external to the video server connected using the second physical layer interface;
when the second interface of the second digital video processing module is configured to be directly connected to the first internal interface of the first physical layer module, the first physical layer module communicates data between the second digital video processing module and the devices external to the video server connected using the first physical layer interface; and
when the second interface of the second digital video processing module is configured to be directly connected to the second internal interface of the second physical layer module, the second physical layer module communicates data between the second digital video processing module and the devices external to the video server connected using the second physical layer interface.

US Pat. No. 10,693,927

PARALLEL EXECUTION OF REQUEST TRACKING AND RESOURCE DELIVERY

Google LLC, Mountain Vie...

1. A system comprising:one or more processors configured to:
provide, to a client computing device communicatively coupled to the one or more processors via a communication network, a content item for display on the client computing device, the content item comprising:
a renderable portion,
a content item identifier,
a first URL, the first URL causes the client computing device, responsive to actuation of the content item by the client computing device, to send a content item identifier of the content item and a device identifier of the client computing device, to a records server at a first network location identified by the first URL via the communication network, and
a second URL, the second URL causes the client computing device, responsive to actuation of the content item by the client computing device, to retrieve via the communication network a first resource from a second network location identified by the second URL for display by the client computing device,
the content item, when actuated by the client computing device, is configured to cause the client computing device to:
send the content item identifier of the content item and the device identifier of the client computing device, via the communication network, to a records server at the first network location identified by the first URL; and
retrieve the first resource from the second network location identified by the second URL independent of receiving a response from the records server.

US Pat. No. 10,693,925

METHODS AND SYSTEMS OF RECORDING INFORMATION RELATED TO AN ELECTRONIC CONFERENCE SYSTEM

Salesloft, Inc., Atlanta...

1. A method of recording information related to an electronic conference system meeting, comprising:enabling a virtual participant bot to join an electronic conference system meeting in order to record electronic information streams related to the meeting;
defining a comment tag related to the electronic conference system meeting; and
designating a pre-defined comment tag category for a pre-defined comment tag to assign to a recorded portion of the meeting, wherein a user of the electronic conference system meeting configures the pre-defined meaning.

US Pat. No. 10,693,923

ESTABLISHING STREAMING SESSIONS DURING REMOTE SESSIONS

VMware, Inc., Palo Alto,...

1. A method comprising:receiving, at a remote application system, a first user request from a first user device, wherein the request is to access an application that executes on the remote application system;
initiating a remote session with the first user device that allows user interfaces generated by the application executing at the remote application system to be presented on the first user device and user events associated with the presented user interfaces to be provided as input to the application;
as part of the remote session between the first user device and the remote application system:
receiving at the remote application system a request from the first user device to initiate a multimedia streaming session between the first user device and a different system comprising a peer user device using the application executing at the remote application system;
establishing the multimedia streaming session with the peer user device, wherein establishing the multimedia streaming session comprises obtaining session parameters for the multimedia streaming session for the peer user device, wherein the session parameters are obtained by the remote application system from the peer user device and include a network address for the peer user device and negotiated session credentials for the streaming session; and
providing, by the remote application system, the session parameters for the peer user device to the first user device for use by the first user device in establishing a connection between the first user device and the peer user device and using the user interface generated by the application executing at the remote application system to stream multimedia content over the connection directly between the first user device and the peer user device without passing the streaming multimedia content through the remote application system;
receiving, by the first user device, the session parameters;
contacting, by the first user device, the peer user device using the network address;
establishing, by the first user device, the connection with the peer user device using the session credentials; and
streaming, by the first user device, multimedia content over the established connection with the peer user device.

US Pat. No. 10,693,918

RADIO ACCESS TECHNOLOGY BASED SECURITY IN SERVICE PROVIDER NETWORKS

Palo Alto Networks, Inc.,...

11. A computer program product, the computer program product being embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for:monitoring network traffic on a service provider network at a security platform to identify a Radio Access Technology (RAT) type for a new session, wherein the security platform monitors wireless interfaces including a plurality of interfaces for a GPRS Tunneling Protocol (GTP) in a mobile core network for a 3G and/or 4G network, or a control protocol and user data traffic in a mobile core network for a 3G and/or 4G network, and wherein the monitoring of the network traffic comprises:
identifying a create session request message or a create PDP context request message from the network traffic; and
extracting location from the create session request message or the create PDP context request message, the location including one or more of the following: CGI (Cell Global Identifier), SAI (Service Area Identifier), RAI (Routing Area Identifier), TAI (Tracking Area Identifier), ECGI (E-UTRAN Cell Global Identifier), or LAC (Location Area Identifier);
associating the RAT type with the new session at the security platform, wherein the RAT type includes 3G, 4G, 5G, or any combination thereof;
determining an application identifier for user traffic associated with the new session at the security platform, comprising:
monitoring, via deep packet inspection, tunneled user traffic after the new session has been created to obtain the application identifier, wherein the application identifier relates to web browsing using HyperText Transfer Protocol (HTTP), a Domain Name System (DNS) request, a file transfer using File Transfer Protocol (FTP), Telnet, Dynamic Host Configuration Protocol (DHCP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Trivial File Transfer Protocol (TFTP), or any combination thereof, and wherein the tunneled user traffic includes GPRS Tunneling Protocol User Plane (GTP-U) traffic;
determining a security policy to apply at the security platform to the new session based on the application identifier, the location, and the RAT type, wherein the security policy includes allowing or passing the new session, blocking or dropping the new session, or restricting access of the new session; and
performing threat detection and/or threat prevention based on the security policy.

US Pat. No. 10,693,914

ALERTS FOR COMMUNITIES OF A SECURITY INFORMATION SHARING PLATFORM

Micro Focus LLC, Santa C...

1. A method for providing alerts for communities of a security information sharing platform, the method comprising:obtaining a first security indicator from a user of a first community of the security information sharing platform that enables sharing of security information among a plurality of communities, wherein each of the plurality of communities is a defined group of users that share a particular set of security information;
including the first security indicator in community-based security information associated with the first community, the first security indicator comprising a first observable;
sharing a first portion of the first security indicator with a second community of the security information sharing platform, wherein a second portion of the first security indicator is kept private to the first community of the security information sharing platform;
obtaining, from the security information sharing platform, information related to sightings of the first observable; and
providing a first alert to the first community based on the information related to the sightings of the first observable.

US Pat. No. 10,693,912

METHODS AND USER EQUIPMENT FOR EXCHANGING SERVICE CAPABILITIES

TELEFONAKTIEBOLAGET LM ER...

1. A method, the method comprising:a first user equipment (UE) sending via a first signaling protocol to a network node a service capabilities request that requests service capability information for a second UE and that triggers the network node to determine whether the network node is authorized to provide to the first UE the requested service capability information for the second UE;
the first UE receiving from the network node a response to the service capabilities request, the response rejecting the service capabilities request; and
as a result of the first UE receiving the response from the network node rejecting the service capabilities request, the first UE sending to the second UE, via a second signaling protocol other than the first signaling protocol, a service capabilities exchange invitation requesting an exchange of service capabilities.

US Pat. No. 10,693,907

SYSTEM AND METHOD OF TRAFFIC FILTERING UPON DETECTION OF A DDOS ATTACK

AO Kaspersky Lab, Moscow...

1. A method for filtering network traffic to protect a computing device from a distributed denial-of-service (DDoS) attack, wherein the method comprises:responsive to detecting the computing device is subject to the DDoS attack, intercepting data from a network node to the computing device;
determining one or more data transmission parameters based on the intercepted data;
assigning an initial danger rating to the network node at least based on a network address of the network node comprising at least an IP address;
changing the danger rating of the network node based on an application of a filter and on the data transmission parameters;
responsive to determining that the danger rating of the network node exceeds a threshold value, limiting a transmittal of data from the network node to the computing device by limiting channel capacity between the network node and the computing device, wherein an amount by which the channel capacity is limited is determined based on a relationship between the changed danger rating and historical values of the danger rating; and
halting the application of the filter until the danger rating of the network node becomes less than the threshold value.

US Pat. No. 10,693,905

INVALIDITY DETECTION ELECTRONIC CONTROL UNIT, IN-VEHICLE NETWORK SYSTEM, AND COMMUNICATION METHOD

PANASONIC INTELLECTUAL PR...

1. An invalidity detection electronic control unit connected to a bus used by a plurality of electronic control units to communicate with one another in accordance with controller area network (CAN) protocol,wherein each of the plurality of electronic control units includes a reception error counter, and configured to:
increment a value of the reception error counter when each of the plurality of electronic control units receives an error frame from the bus, and
decrement the value of the reception error counter when each of the plurality of electronic control units receives a normal frame from the bus,
the invalidity detection electronic control unit comprising:
a receiver that receives a frame for which transmission is started; and
a transmitter that transmits the error frame on the bus before a tail end of the frame is transmitted if the frame received by the receiver meets a predetermined condition indicating invalidity and transmits the normal frame that conforms to the CAN protocol on the bus after the error frame is transmitted.

US Pat. No. 10,693,904

SYSTEM AND METHOD FOR INFORMATION SECURITY THREAT DISRUPTION VIA A BORDER GATEWAY

CERTIS CISCO SECURITY PTE...

1. A method for disrupting an information security attack on at least one computing device of a plurality of computing devices in a managed computer network, the method comprising:receiving using an event manager system, a first alert and a second alert from at least one monitoring device of a plurality of monitoring devices in the managed computer network and connected to the plurality of computing devices, wherein the event manager system is linked to the plurality of computing devices via a communicative connection of the event manager system and the plurality of monitoring devices, wherein each of the plurality of computing devices has its network activity monitored by at least one of the plurality of monitoring devices for an information security attack and each of the plurality of computing devices is located downstream of at least one of the plurality of monitoring devices, wherein the event manager system is within the managed computer network;
the at least one monitoring device generating the first alert in response to a first detection by a first network security device within the at least one monitoring device of an information security attack and generating the second alert in response to a second detection by a second network security device within the at least one monitoring device of an information security attack, and wherein the first alert and the second alert both include an Internet Protocol address of a source that initiated the detected information security attack on the at least one computing device and an identity of an intermediate upstream gateway of the managed computer network through which the attack passed, whereby the attack on the at least one computing device passed through the intermediate upstream gateway and at least one other gateway in the managed computer network and wherein the intermediate upstream gateway comprises a network node on the managed computer network that is located upstream of each of the plurality of monitoring devices and the at least one other gateway in the managed computer network;
determining by the event manager system operating parameters of the intermediate upstream gateway based on the identity of the intermediate upstream gateway through which the attack passed included in the first alert and the second alert by comparing the identity against a gateway database;
determining if the Internet Protocol address of the source that initiated the information security attack on the at least one computing device is to be disrupted using the event manager system based on the first and second alerts received from the at least one monitoring device, wherein the event manager system compares the first alert and the second alert to determine whether the two alerts are similar, whereby determining that the two alerts are similar indicates that the information security attack of the first detection and the information security attack of the second detection are the same information security attack which is a real attack and the Internet Protocol address of the source that initiated the information security attack on the at least one computing device is therefore to be disrupted;
if the Internet Protocol address of the source that initiated the information security attack on the at least one computing device is to be disrupted, generating a first set of instructions based on the operating parameters using the event manager system and transmitting via a network outside the managed computer network, the first set of instructions from the event manager system only to the intermediate upstream gateway, wherein the first set of instructions only instruct the intermediate upstream gateway to add the IP address of the source that initiated the information security attack to an access control list of the intermediate upstream gateway;
generating a second set of instructions based on the operating parameters using the event manager system and transmitting via a network outside the managed computer network, the second set of instructions from the event manager system to only the intermediate upstream gateway after a first period of time has lapsed, wherein the second set of instructions only instruct the intermediate upstream gateway to remove the IP address of the source that initiated the information security attack from the access control list of the intermediate upstream gateway;
determining, during the first period of time, if a new mitigation action is to be created to address the first alert and the second alert based on a security alert database using the event manager system; and
if the new mitigation action is to be created to address the first alert and the second alert, transmitting the first alert and the second alert from the event manager system to a command center which resides outside the managed computer network.

US Pat. No. 10,693,903

METHOD AND APPARATUS FOR DATA SECURITY ANALYSIS OF DATA FLOWS

IOR Analytics, LLC., Hou...

1. A method comprising:establishing communication with a plurality of monitoring systems, wherein each of the monitoring systems is disparate from one another;
aggregating alerts from the plurality of monitoring systems, wherein the alerts relate to use, storage, transmission, deletion or processing of data from the plurality of monitoring systems;
determining one or more uniform data flow steps by standardizing the aggregated alerts; and
storing the one or more uniform data flow steps in a central database that is external to the plurality of monitoring systems.

US Pat. No. 10,693,902

ASSESSING SECURITY CONTROL QUALITY AND STATE IN AN INFORMATION TECHNOLOGY INFRASTRUCTURE

Tripwire, Inc., Portland...

1. One or more non-transitory computer-readable media storing computer-executable instructions which when executed by a computer cause the computer to perform a method, the method comprising:displaying a user interface that indicates a security control status of assets in an information technology (IT) infrastructure that are monitored by two or more security controls,
wherein the user interface includes at least a first portion of the user interface that displays a security control status of a first set of the assets monitored by a first security control, the first portion of the user interface displaying two or more security states monitored by the first security control and further indicating the number of assets in each of the two or more security states monitored by the first security control, and wherein the method further comprises allowing a user to select one of the two or more security states in the first portion of the user interface,
wherein the user interface further includes at least a second portion of the user interface that displays a security control status of a second set of the assets monitored by a second security control, at least some of the second set of the assets monitored by the second security control overlapping with the first set of the assets monitored by the first security control, the second portion of the user interface displaying two or more security states monitored by the second security control and further indicating the number of assets in each of the two or more security states monitored by the second security control, and
wherein the method further comprises, upon user selection of the one of the two or more security states in the first portion, automatically highlighting one or more of the security states in the second portion of the user interface monitored by the second security control and having overlapping assets with the selected one of the security states from the first portion,
wherein the first security control is a vulnerability assessment security control, and wherein the first portion of the user interface comprises a two-dimensional vulnerability risk matrix comprising multiple indicators that form the matrix, one or more of the indicators indicating the number of assets monitored by the vulnerability assessment security control having the corresponding vulnerability risk represented by the respective indicator, and
wherein the second security control is one of a policy compliance security control, a change data security control, or a log event data security control.

US Pat. No. 10,693,901

TECHNIQUES FOR APPLICATION SECURITY

JPMORGAN CHASE BANK, N.A....

1. A server system with a defense mechanism against security threats on application layer, comprising:at least one application server hosting one or more applications accessible to authorized users;
a single communication interface to which all user requests to any of the hosted applications are routed; and
a security appliance coupled to the single communication interface and configured to:
receive the user requests, and
screen each of the user requests with a selected set of discrete validation filters by sequentially applying the filters to each of the user requests, wherein one of the discrete validation filters applies one or more text-based pattern matching rules to each of the user requests and another one of the discrete validation filters applies application-specific input validation rules to each of the user requests;
wherein each of the discrete validation filters are modularly configured to handle a corresponding security threat and being individually modifiable without affecting another validation filter corresponding to another security threat, and
wherein when one of the user requests is a file upload request, the one of the discrete validation filters that applies the one or more text-based pattern matching rules checks a file type against a list of acceptable file formats and a list of disallowed formats based on both file header and extension.

US Pat. No. 10,693,896

ANOMALY AND MALWARE DETECTION USING SIDE CHANNEL ANALYSIS

Virta Laboratories, Inc.,...

1. A method for anomaly detection comprising:receiving, by one or more data processors, an input signal comprising a plurality of samples, each of the plurality of samples representing a power consumption level from an alternating current (AC) source of a target device at a given time;
storing, by the one or more data processors, the plurality of samples as a data structure in a memory element coupled to the one or more data processors;
retrieving, by the one or more data processors, a subset of the plurality of samples from the data structure;
calculating, by the one or more data processors, a feature sample comprising at least a root-mean square value for the subset of the plurality of samples;
transmitting, by the one or more data processors and to a remote server, the feature sample;
receiving, by the one or more data processors and from the remote server, a classification of the feature sample; and
generating, by the one or more data processors, an alarm signal responsive to the classification of the feature sample indicating an anomaly.

US Pat. No. 10,693,893

DETECTION OF MAN-IN-THE-MIDDLE IN HTTPS TRANSACTIONS INDEPENDENT OF CERTIFICATE TRUST CHAIN

International Business Ma...

1. A method of detecting a man-in-the-middle (MITM) during HTTPS communications, the method implemented by at least one processor comprising hardware, the method comprising:transmitting a query to a DNS for an IP address of a domain name;
receiving, from the DNS, the IP address of the domain name;
generating an alternate IP address different than the IP address of the domain name;
transmitting a TCP message to the alternate IP address;
receiving a TCP acknowledgement message from the alternate IP address;
establishing a TCP connection with the alternate IP address in response to the received TCP acknowledgment;
transmitting a TLS message using the TCP connection, a SNI of the TLS message including the domain name;
receiving a TLS reply message including a certificate for the domain name;
validating the received certificate;
establishing a TLS connection in response to validation of the received certificate;
transmitting a HTTP GET message using the TLS connection, a URL of the HTTP GET message including the domain name and a target web page associated with the domain name;
receiving a HTTP OK message including the target web page; and
determining that a man-in-the-middle is intercepting the HTTPS communications based on the receipt of the target web page.

US Pat. No. 10,693,892

NETWORK ATTACK TAINTING AND TRACKING

INTERNATIONAL BUSINESS MA...

1. A method, comprising:monitoring, by a network device, data packets destined for a target for a malicious request; and
responsive to detecting the malicious request;
creating by the network device a payload;
formatting the payload to correspond to a protocol of the request;
digitally signing the payload;
injecting the digitally signed payload into a response message; and
transmitting the response message to a source of the request as a response to the request.

US Pat. No. 10,693,891

ELECTRONIC MAIL SECURITY SYSTEM

Chicago Mercantile Exchan...

1. A computer implemented method of an email security system for processing email messages, the method comprising:intercepting, by an email server, an email message directed to a recipient prior to delivery thereto and forwarding the intercepted email message to the email security system implemented on the email server;
in response to receiving an email message, detecting, by a processor of the email security system, one or more artifacts within the email message, wherein each of the artifacts is associated with a payload;
for each artifact, generating, by the processor of the email security system:
a descriptor object representing the artifact that does not include the payload, so that the processor is prevented from accessing the payload via the descriptor object; and
at least one payload button based on the payload associated with the artifact for causing the payload to be transmitted to an external system for analysis of the payload;
generating, by the processor of the email security system, an artifact dashboard and transmitting only the artifact dashboard to an administrator computer;
presenting, by a processor of the administrator computer, the artifact dashboard in a graphical user interface (GUI) rendered on a display of the administrator computer, the artifact dashboard displaying, for each artifact, the descriptor object representing the artifact and the at least one payload button based on the payload associated with the artifact;
determining, by the processor of the administrator computer, whether each of the at least one payload button has been interacted with by a user of the administrator computer via the GUI to cause the associated payload to be transmitted to the external system for analysis;
presenting, by the processor of the administrator computer, a disposal button via the GUI which allows the user to complete a review of the email message only once it has been determined, by the processor, that the user has interacted with all of the at least one payload buttons, and further allows the user to provide a response to the email security system to one of authorize forwarding of the email message to the recipient or not authorize forwarding of the email message to the recipient;
determining, by the email security system, whether a response has been received from the user of the administrator computer, to authorize or not authorize forwarding of the email message to the recipient;
transmitting the email message to the recipient upon receiving the response authorizing forwarding of the email message to the recipient;
not transmitting the email message to the recipient upon receiving the response not authorizing forwarding of the email message to the recipient; and
wherein, if the email security system does not receive a response authorizing forwarding of the email message to the recipient with a threshold amount of time, quarantining the email message upon expiration thereof.

US Pat. No. 10,693,889

VEHICLE COMMUNICATION APPARATUS, IN-VEHICLE NETWORK SYSTEM, AND VEHICLE COMMUNICATION METHOD

PANASONIC INTELLECTUAL PR...

1. An electronic control unit connected to an in-vehicle network bus in an in-vehicle network system, the in-vehicle network system including a plurality of apparatuses that performs communication of frames via the in-vehicle network bus, the electronic control unit comprising:a first control circuit; and
a second control circuit,
wherein the first control circuit is connected to the in-vehicle network bus via the second control circuit over at least one of wired communication or wireless communication,
wherein the first control circuit performs a first determination process on a frame that is transmitted to the in-vehicle network bus, and determines conformity of the frame with a first rule,
wherein, upon determining that the frame conforms to the first rule, the first control circuit transmits the frame to the second control circuit,
wherein the second control circuit performs a second determination process on the frame, that is received from the first control circuit, and determines conformity of the frame with a second rule, and
wherein, upon determining that the frame conforms to the second rule, the second control circuit transmits the frame to the in-vehicle network bus.

US Pat. No. 10,693,888

SYSTEMS AND METHODS FOR PROXIMITY IDENTITY VERIFICATION

Capital One Services, LLC...

1. A system for authorizing a transaction, comprising:one or more memory devices storing instructions; and
one or more processors configured to execute the instructions to:
receive a request to authorize a transaction associated with an account of a user;
identify a known associate of the user based at least in part on an indicator of relative risk associated with the transaction, the indicator of relative risk determined based on at least one of the current physical location of the user, a history of physical location information of the user, or a history of transactions requested by the user;
determine a proximity between a current physical location of the user and a current physical location of the identified known associate; and
approve the authorization request when the determined proximity is within a predetermined threshold;
wherein identifying the known associate of the user comprises identifying the known associate from among a plurality of associates listed in a social network of the user, based on a geographical relationship between the current physical location of the identified known associate and the current physical location of the user, to increase confidence in determining the transaction is initiated by the user.

US Pat. No. 10,693,881

SYSTEM AND METHOD FOR EMBEDDING FIRST PARTY WIDGETS IN THIRD-PARTY APPLICATIONS

Google LLC, Mountain Vie...

1. A method for providing a third party application with access to files stored on a server, the method comprising:receiving, from a browser at a client device, a request for a file stored on the server, wherein the request is received via a web page provided by the third party application and rendered by the browser, the web page comprising a user interface (UI) component associated with the server to access the file stored on the server, wherein the request includes:
a document identifier associated with the file, and
an application identifier of the third-party application, wherein the document is identified in a pop-up window associated with the web page provided by the third party application and rendered by the browser;
authenticating the application identifier at the server, wherein authenticating the application identifier comprises determining whether the application identifier references a valid application; and
based on the document identifier, and the authenticated application identifier, granting access to the file for the third party application.

US Pat. No. 10,693,880

MULTI-STAGE AUTHENTICATION OF AN ELECTRONIC COMMUNICATION

Bank of America Corporati...

1. A method for authenticating electronic communications, the method comprising:generating a whitelist database in association with at least one account of at least one recipient, the whitelist database including at least one identifying reference to a whitelist correspondent, the generating of the whitelist database including:
receiving from the whitelist correspondent registration data comprising:
identification of a first penalty;
an authorization to impose the first penalty; and
identifying information; and
in response to the receiving the registration data, cataloging into the whitelist database, and in association with the identifying reference, identification data associated with:
a whitelist correspondent device associated with the whitelist correspondent; and
a whitelist correspondent address associated with the whitelist correspondent;
generating a blacklist database in association with the account, the blacklist database including at least one blacklist correspondent address, the generating of the blacklist database including:
identifying a property of the blacklist correspondent address, the property indicating that a communication originating from the blacklist correspondent address is unsolicited and malicious; and
in response to the identifying, cataloging identification data associated with the blacklist correspondent address into the blacklist database;
receiving an electronic communication submitted by a sender for delivery to the recipient;
analyzing the content of the electronic communication for presence of identification data;
upon determination that the electronic communication includes a minimum threshold of the identification data cataloged in the whitelist database, delivering the communication to the recipient;
upon determination that the communication includes the identification data cataloged in the blacklist database, blocking delivery of the communication; and
upon determination that the communication lacks the identification data cataloged in the blacklist database, and further lacks the minimum threshold:
prompting the sender to submit supplementary data, the supplementary data comprising:
identification of a second penalty;
an authorization to impose the second penalty; and
additional identifying information; and
delivering the communication to the recipient only after:
receipt of the second penality; and
determining correspondence of the additional identifying information to the identification data associated with a whitelist correspondent;
wherein the second penalty is selected from a plural itv of second penalties based at least in part on frequency of electronic communications from the sender to the recipient.

US Pat. No. 10,693,876

SYSTEM FOR LICENSING MOBILE APPLICATIONS, FEATURES, AND DEVICES

Kyocera Corporation, Kyo...

1. A method of operating a wireless mobile device, the method comprising:storing a local application, that is installed in the wireless mobile device, and a threshold;
activating, for the first time, the local application that has never been licensed on the wireless mobile device, in response to request from a user;
determining whether a communication link between the wireless mobile device and an application server is active or is not active;
in response to determining that the communication link is not active when activating the local application for the first time, the method further comprising:
allowing the user to use the local application without the local application being licensed;
starting, at the wireless mobile device, a counting period which elapses from when the local application is activated for the first time; and
displaying, at the wireless mobile device, a message that indicates the local application has not been licensed when activating the local application next time after the counting period exceeds the threshold.

US Pat. No. 10,693,875

AUTHENTICATION CENTER SYSTEM

1. An authentication center system, comprising an authentication center, service parties, users and terminals; wherein a service party is a provider of service on internet which provides service through internet, and the service parties are different and separate providers of service on internet; wherein the authentication center is a service provider which provides service through internet, and the authentication center is not one of the service parties; wherein the terminals are connected with the authentication center and the service parties by a network and are capable of communicating with them; wherein the terminals, the service parties and the authentication center are connected through internet; wherein a user has a user account at the authentication center, and the AUID of a user is a user account which the user has at the authentication center; wherein a user has a user account at one service party or at each of more than one service party separately, and an APID of a user is a user account which the user has at a service party; wherein a user is capable of using a terminal to establish a separate connection with the authentication center and a separate connection with a service party separately, and the user is capable of using the terminal to log in the AUID which the user has at the authentication center through the separate connection with the authentication center and to log in the APID which the user has at the service party through the separate connection with the service party separately; wherein the authentication center stores the corresponding relationships between the AUID of a user and the APIDs which the user has at different service parties; wherein an APID which a user has at a service party is capable of having the specific account information of the APID which the user has at the service party; wherein a terminal's interface which has logged in the AUID which a user has at the authentication center is capable of displaying the specific account information of the APIDs which the user has at different service parties separately, and on the terminal's interface which has logged in the AUID which the user has at the authentication center, the user is capable of setting to change the specific information of the APIDs which the user has at different service parties separately, and the authentication center is capable of sending the setting of the user to the corresponding service party; wherein the specific account information of an APID which a user has at a service party includes one or more of the following types of information, wherein the following types of information include user profile photo and user name and user contact information and user real-name authentication information; wherein if the specific account information includes user contact information, the user contact information of a user includes the mobile phone number of the user and/or the email address of the user; wherein if the specific account information includes user real-name authentication information, a user is capable of operating on a terminal's interface which has logged in the AUID which the user has at the authentication center to transfer and set the real-name authentication information of the user authenticated at the authentication center to a service party when the service party and the authentication center permit, and/or a user is capable of operating on a terminal's interface which has logged in the AUID which the user has at the authentication center to delete and/or to invalidate the real-name authentication information which the user sets for a service party when the service party and the authentication center permit.

US Pat. No. 10,693,874

AUTHENTICATION INTEGRITY PROTECTION

PEARSON EDUCATION, INC., ...

1. An adaptive authentication system to adaptively secure a set of access operations with respect to one or more electronic resources, the adaptive authentication system comprising:one or more adaptive processing devices; and
one or more non-transitory, computer-readable storage media storing instructions which, when executed by the one or more adaptive processing devices, cause the one or more adaptive processing devices to perform actions including:
detecting a request received via an endpoint device;
responsive to the request, identifying an access-right indicator configured to facilitate determination of whether particularized access for electronic resources is to be granted;
generating or retrieving one or more identifiers for the endpoint device, the one or more identifiers uniquely corresponding to the endpoint device amongst a set of endpoint devices;
detecting initiation of set of one or more access events initiated by the endpoint device;
receiving sensor-based data that is based at least in part on a first set of one or more sensors at the endpoint device capturing phenomena at the endpoint device, where the first set of one or more sensors is communicatively connected to the one or more adaptive processing devices;
receiving additional data that is one or more of based at least in part on the first set of one or more sensors, based at least in part on a second set of one or more sensors at the endpoint device, and/or based at least in part on input via an input interface of the endpoint device;
accessing a set of one or more authentication rules specified by a protocol record, the set of one or more authentication rules comprising criteria for endpoint authentication;
adaptively developing a particularized specification of one or more recognized patterns mapped to the access-right indicator based at least in part on processing the additional data;
generating an endpoint qualification that is based at least in part on the particularized specification of one or more recognized patterns and the criteria for endpoint authentication; and
selecting an activation adjustment in operation of one or more of the first set of one or more sensors, the second set of one or more sensors, a third set of one or more sensors, and/or a communication interface, and transferring a command to cause the activation adjustment.

US Pat. No. 10,693,868

EHN VENUE-SPECIFIC APPLICATION PROVISIONING

ARRIS Enterprises LLC, S...

1. A portable electronic device, comprising:an interface circuit configured to wirelessly communicate with other electronic devices in an enterprise-hosted network (EHN), wherein, the portable electronic device is configured to:
discover the EHN by receiving, at the interface circuit, a packet associated with the EHN, wherein the EHN comprises a network hosted by an entity that is other than an operator of a cellular-telephone network and is located at a venue, and wherein the discovery occurs when the portable electronic device is within wireless communication range of the EHN located at the venue;
connect to the EHN using a quarantine zone by providing and receiving second packets using the interface circuit, wherein the quarantine zone restricts access to the EHN;
provide, from the interface circuit, valid credentials for the EHN;
provide, from the interface circuit, a credential for the EHN; and
receive, at the interface circuit, provisioning information that customizes an application on the portable electronic device to the venue, wherein the provisioning information allows the portable electronic device to connect to the EHN outside of the quarantine zone.

US Pat. No. 10,693,866

SYSTEM, APPARATUS AND METHOD FOR FIRST HOP SECURITY

Intel Corporation, Santa...

1. At least one non-transitory computer readable storage medium comprising instructions that when executed enable a first host system to:use a manufacturer-supplied key of the first host system to authenticate the first host system to an authentication server of a subnet;
send a subnet join request to the authentication server of the subnet;
receive a group public key for the subnet;
after authenticating the first host system to the authentication server and sending the subnet join request to the authentication server, receive a group membership credential for the subnet from the authentication server;
generate a random value “f1” and generate a first group private key for the first host system, based at least in part on (a) the group membership credential for the subnet from the authentication server and (b) the random value “f1”, wherein the first group private key corresponds to the group public key, in that data encrypted with the first group private key can be decrypted with the group public key; and
in response to receiving an address resolution protocol (ARP) request from a second host system on the subnet, wherein the ARP request comprises a signature that was generated by the second host system using a second group private key that was generated by the second host system based at least in part on a random value “f2” that was generated by the second host system, use the group public key and the signature in the ARP request to validate that the ARP request was generated by an authenticated member of the subnet.

US Pat. No. 10,693,864

SINGLE SIGN-ON BETWEEN MULTIPLE DATA CENTERS

Oracle International Corp...

1. A method for managing access among data centers, the method comprising:receiving, at a first computer system managing access for a first data center, first authentication data for a computing device associated with a user;
determining, by the first computer system and based on the first authentication data, that a second data center stores session information associated with the user;
determining, by the first computer system, that the second data center cannot transmit, in response to a request for the session information communicated from the first data center to the second data center, the session information to the first computer system;
upon determining that the second data center cannot transmit the session information to the first computer system:
identifying, by the first computer system, session data stored by the first data center, wherein the session data was previously received from the second data center;
determining, by the first computer system, that the identified session data is insufficient to establish a session associated with the user at the first data center;
receiving, by the first computer system from the computing device, second authentication data; and
establishing, by the first computer system, the session associated with the user at the first data center based on the second authentication data.

US Pat. No. 10,693,862

DETERMINING, BY A REMOTE SYSTEM, APPLICATIONS PROVIDED ON A DEVICE BASED ON ASSOCIATION WITH A COMMON IDENTIFIER

Google LLC, Mountain Vie...

1. A system comprising:a memory; and
a processor, coupled to the memory, to:
receive a notification about an activity pertaining to a user, the notification being directed to a first application and a second application, and identity of the user being associated with a token;
identify a first instance of the first application and a first instance of the second application at a user device of the user;
determine whether the first instance of the first application and the first instance of the second application are associated with the token;
responsive to determining that the first instance of the first application and the first instance of the second application are both associated with the token, select one of the first instance of the first application or the first instance of the second application to provide the notification at the user device based on the token and a fingerprint of the token; and
provide the notification to the selected one of the first instance of the first application or the first instance of the second application at the user device, while preventing duplicate notification to the non-selected application at the user device; and select either the first instance of the first application or the first instance of the second application based on a predetermined priority order associated with the respective applications.

US Pat. No. 10,693,861

TASK SEGREGATION IN A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE

Oracle International Corp...

1. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to provide cloud-based identity management, the provide comprising:receiving a request to perform an identity management service for a user that comprises a plurality of tasks;
separating the plurality of tasks into real-time tasks and near-real-time tasks, the real-time tasks comprising operations needed for the user to proceed in accessing a resource;
synchronously executing the real-time tasks by accessing at least one service, wherein synchronously executing comprises completing an execution of a first real-time task before starting an execution of a second task; and
asynchronously executing the near-real-time tasks by offloading the near-real-time tasks to one or more message queues, wherein asynchronously executing comprises allowing an execution of a third task to start before finishing an execution of a fourth near-real-time task.

US Pat. No. 10,693,859

RESTRICTING ACCESS FOR A SINGLE SIGN-ON (SSO) SESSION

Oracle International Corp...

1. A method comprising:receiving, by a computer system from a client device operated by a first user, a request to access a first resource;
requesting, by the computer system, credential data from the first user to access the first resource;
in response to the request for the credential data, receiving, by the computer system from the client device operated by the first user, the credential data and scope information for establishing a session, wherein the scope information is provided by the first user and defines a first group of resources that are accessible by the client device during the session and/or a second group of resources that are restricted from access by the client device during the session, and wherein the first group of resources include the first resource that the first user is requesting to access;
determining, by the computer system, the credential data for the first user is valid;
in response to determining the credential data is valid, establishing, by the computer system, the session with the client device;
determining, by the computer system, a scope of authentication for the session based on the scope information provided by the first user;
configuring, by the computer system, the session for the client device based on the scope of authentication, wherein the session is configured to allow the client device to access the first group of resources during the session and/or restrict the client device from accessing the second group of resources during the session;
determining, by the computer system, the first user operating the client device is authorized to access the first resource based on the configuration of the session; and
in response to determining the first user operating the client device is authorized to access the first resource, sending, by the computer system, an authorization message to the client device to allow the first user to access the first resource.

US Pat. No. 10,693,854

METHOD FOR AUTHENTICATING A USER, CORRESPONDING SERVER, COMMUNICATIONS TERMINAL AND PROGRAMS

INGENICO GROUP, Paris (F...

1. A method comprising:authenticating a communications terminal belonging to a user with an authentication server connected to a gateway terminal by using a communications network, wherein the method comprises the following acts performed by the authentication server:
obtaining a piece of data representing an identity of the user from said gateway terminal;
carrying out a checking operation, directly or through a gateway application installed on said gateway terminal, to determine whether or not said gateway terminal comprises a Bluetooth physical interface;
and in response to determining that said gateway terminal comprises a Bluetooth physical interface:
configuring, by said authentication server, a data transmission link between said authentication server and said user's communications terminal, by using said Bluetooth physical interface of said gateway terminal and as a function of said piece of data representing an identity of the user, said data transmission link being a virtual Bluetooth link set up by transmitting a Bluetooth pairing code of the authentication server to the user's communications terminal, enabling pairing the user's communications terminal directly with the authentication server;
transmitting, by the authentication server, to the user's communications terminal, a piece of encrypted data for checking authentication, by using the data transmission link;
receiving, by the authentication server, coming from the user's communications terminal, a piece of encrypted data for counter-checking of authentication; and
issuing an assertion of authentication of the user in response to the piece of encrypted data for counter-checking of authentication corresponding to said piece of encrypted data for checking authentication.

US Pat. No. 10,693,852

SYSTEM FOR A SECURE ENCRYPTION PROXY IN A CONTENT CENTRIC NETWORK

Cisco Technology, Inc., ...

1. A method comprising:obtaining, at a router between a content consuming device and a content storage device, a first interest corresponding to a first content object, the first interest comprising a first name identifying the content storage device, signaling information, an authentication token, and an inner interest identifying an actual content object stored at the content storage device, wherein the inner interest is encrypted with an encryption key shared between the content storage device and the content consuming device and not shared with the router;
authenticating the first interest by verifying the authentication token using an authentication key shared with the content consuming device;
providing the first interest to the content storage device;
obtaining the first content object from the content storage device, wherein the first content object includes at least a portion of the actual content object encrypted with the encryption key; and
providing the first content object to the content consuming device.

US Pat. No. 10,693,851

DATA PROTECTION KEYS

Intel Corporation, Santa...

1. A server system comprising:verifier circuitry to:
verify authenticity of a client device using a Trusted Platform Module (TPM) quote received from the client device;
wherein the TPM quote includes at least a first public attestation identity key signed using a second private attestation identity key;
verify a secure hash digest associated with the TPM quote;
verify a signature of the TPM quote; and
verify the content of the TPM quote using at least the first public attestation identity key and one or more attributes associated with the first public attestation identity key, wherein the first public attestation identity key and the one or more attributes associated with the first public attestation identity key are signed using the second private attestation identity key; and
wherein the authenticity of the client device is verified by the verifier circuitry based, at least in part, on the first public attestation identity key and the second private attestation identity key being associated with the TPM associated with the respective client device.

US Pat. No. 10,693,850

MANAGING NIC-ENCRYPTED FLOWS FOR MIGRATING GUESTS OR TASKS

Google LLC, Mountain Vie...

1. A method of migrating a guest of a virtual machine from a host computing device to a target computing device, the method comprising:at the host computing device:
preparing, using one or more processors, to send information to a target computing device, the information including at least a flow key and a first data packet of a plurality of data packets of the guest;
generating, using the one or more processors, a receive token by encrypting the flow key using a receive master key;
encrypting the first data packet using the flow key;
generating a send token by encrypting the receive master key, flow key, and first data packet using a send master key, wherein the send token encapsulates the receive master key, the flow key, and the first data packet;
sending the send token to a network adapter; and
decrypting, on the network adapter, the send token to identify the receive master key, flow key, and the first data packet;
encrypting, on the network adapter, the first data packet using the flow key, and
sending, by the network adapter, the encrypted first data packet and the receive token to the target computing device;
at the target computing device:
receiving the encrypted first data packet and the receive token;
decrypting the receive token using the receive master key;
identifying the flow key in response to decrypting the receive token; and
decrypting the first data packet using the identified flow key; and
completing migration of the guest to the target computing device by repeating the preceding steps for remaining data packets of the plurality of data packets of the guest.

US Pat. No. 10,693,849

SENDING MESSAGE IN MULTILAYER SYSTEM

International Business Ma...

1. A computer-implemented data transmission method executed at a second node, wherein the second node is communicatively connected to a first node, the method comprising:acquiring a first transformed password (PWD) from the first node, wherein the first transformed PWD is derived from an original PWD;
acquiring an encrypted message from the first node, the encrypted message being encrypted with a public key of the first node;
recovering a private key of the first node according to the first transformed PWD, the private key having been encrypted with the first transformed PWD and stored in the second node in advance of recovering the private key;
decrypting the encrypted message with the recovered private key to obtain a decrypted message for processing; and
dumping the private key from the first node and the first transformed PWD.

US Pat. No. 10,693,844

EFFICIENT MIGRATION FOR ENCRYPTED VIRTUAL MACHINES BY ACTIVE PAGE COPYING

Red Hat, Inc., Raleigh, ...

1. A method comprising:receiving, by a source host machine hosting a virtual machine (VM), a request to migrate the VM to a destination host machine;
identifying a first page of memory of the VM on the source host machine for migration, the first page of memory encrypted with a guest-specific encryption key;
preventing the VM from accessing the first page;
executing, by the source host machine, a send command to modify the first page from encrypted with the guest-specific encryption key to encrypted with a migration key while the first page remains in place in the memory of the source host machine;
allocating a second page in a buffer maintained in hypervisor memory of a hypervisor managing the VM;
copying contents of the first page to the second page;
executing, by the source host machine, a receive command to modify the first page from encrypted with the migration key to encrypted with the guest-specific encryption key while the first page remains in place in the memory of the source host machine and to restore the access by the VM to the first page;
restoring, subsequent to executing the receive command, access by the VM to the first page so that the first page is accessible by the VM at the source host machine during migration of the VM; and
transmitting contents of the second page to the destination host machine.

US Pat. No. 10,693,839

DIGITAL MEDIA CONTENT DISTRIBUTION BLOCKING

International Business Ma...

1. An Internet based digital media content transfer blocking improvement method comprising:detecting, by a processor of a detection hardware device, a user request, from a user device for access to digital media content from a digital media provider system;
detecting, by said processor, said digital media content being transmitted from said digital media provider system to a network;
detecting, by said processor, a duration and volume of said digital media content being transmitted from said digital media provider system to a network;
identifying, by said processor executing a network hardware probe of said detection hardware device, network traffic across said network;
verifying, by said processor executing an analytical software engine of said detection hardware device, that said digital media content is comprised by said network traffic;
executing, by said processor in response to results of said verifying and said detecting said duration and volume, investigation platform software code;
querying, by said processor, a database system associated with said digital media provider system;
determining, by said processor based on results of said querying, if a legitimate connection based relationship exists between said user and said digital media provider system;
additionally determining, by said processor based on results of monitoring said digital media content, that said digital media content is not authorized for use by said user;
disabling, by said processor based on said determining that said digital media content is not authorized for use by said user, said digital media content from executing functions with respect to said user device of said user; and
disabling, by said processor based on said determining that said digital media content is not authorized for use by said user, access to a block chain enabled secure database storing said digital media content.

US Pat. No. 10,693,837

SYSTEM FOR AND METHOD OF RANKING DOMAIN NAMES BASED ON USER PROPERTIES

VERISIGN, INC., Reston, ...

1. A method of ranking a plurality of domain names for presentation to a user, the method comprising:obtaining, over a computer network, domain name data comprising, for each of a plurality of training domain names, respective user information representing a respective user;
generating, by at least one electronic processor, a model relating at least features of each of the plurality of training domain names to respective user features derived from the respective user information, wherein the generating the model comprises representing each respective user information as a training vector in a hyperspace, whereby a plurality of training vectors are produced;
obtaining novel user information representing a novel user;
obtaining the plurality of domain names, wherein the obtaining the plurality of domain names comprises:
representing a novel user feature derived from the novel user information as a novel user vector in the hyperspace;
determining a plurality of proximate vectors of the plurality of training vectors that are within a threshold distance in the hyperspace to the novel user vector; and
determining the plurality of domain names as domain names that have been registered to users represented by the plurality of proximate vectors;
ranking the plurality of domain names, using the model and novel input data comprising the novel user feature according to predicted domain name suitability for the novel user, wherein the ranking the plurality of domain names comprises:
determining a plurality of distances, each of the plurality of distances comprising a distance, in the hyperspace, from a vector representing the novel user feature to a respective proximate vector; and
ranking the plurality of domain names according to an inverse of the plurality of distances; and
providing a ranked list of the plurality of domain names to the user.

US Pat. No. 10,693,835

METHOD OF FORWARDING DATA BETWEEN IP DEVICES

ORANGE, Paris (FR)

1. A method of routing data between a home gateway and a local network equipment adapted to communicate between one another via a home network managed by said home gateway, the home gateway suitable for communicating with a sensor network through a management node in which sensors have respective IP addresses in the sensor network that are generated by said management node, the management node also having a function of routing data in the sensor network, the method comprising, in a router:receiving from the management node a first message, the first message including a prefix and a first lifetime of the prefix;
generating an address for the local network equipment;
verifying the availability of the address in the sensor network from the management node; and
upon verification that the address is available, transmitting to the management node a second message, the second message including the address of the local network equipment and a second lifetime of the address, in order to add the local network equipment in the sensor network to allow the home gateway to communicate with the local network equipment either via the home network or the sensor network.

US Pat. No. 10,693,833

ADDRESS RESOLUTION SUPPRESSION IN A LOGICAL NETWORK

NICIRA, INC., Palo Alto,...

1. A method for a first host to perform address resolution suppression in a logical network, wherein the first host supports a first virtualized computing instance located on the logical network and a first hypervisor, and the method comprises:in response to a failure of performing address resolution suppression associated with a network management entity:
broadcasting, by the first hypervisor, a notification message within the logical network to trigger one or more control messages that originate from one or more respective second hypervisors supported by one or more respective second hosts;
learning, by the first hypervisor based on the one or more control messages, protocol-to-hardware address mapping information associated with multiple second virtualized computing instances located on the logical network;
in response to the first hypervisor detecting an address resolution request message that includes a protocol address associated with one of the multiple second virtualized computing instances from the first virtualized computing instance;
generating, by the first hypervisor, an address resolution response message that includes a hardware address associated with the protocol address based on the protocol-to-hardware address mapping information; and
sending, by the first hypervisor, the address resolution response message to the first virtualized computing instance without broadcasting the address resolution request message on the logical network.

US Pat. No. 10,693,831

METHOD, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM COMPRISING INSTRUCTIONS FOR VEHICLE-TO-VEHICLE COMMUNICATION

Volkswagen AG, (DE)

1. A method for Vehicle-to-Vehicle communication implemented in a first transportation vehicle, the method comprising:exchanging a plurality of messages between the first transportation vehicle and a second transportation vehicle, each of the plurality of messages being signed using a signature of the respective transportation vehicle, each of the plurality of messages comprising a hash pointer to a respective last previous message, and each hash pointer comprising a link to the respective last previous message and a hash of the respective last previous message, wherein the plurality of messages exchanged between the first and second transportation vehicles pertain to at least one cooperative maneuver for the first and second transportation vehicles in which the first and second transportation vehicles are to perform, after completion of the exchange of the plurality of messages, one or more maneuvers specified in the exchange of the plurality of messages between the first and second transportation vehicles; and
publishing, after the completion of the exchange of the plurality of messages, a hash pointer to the last message of the exchange of messages, the hash pointer comprising a link to the last message of the exchange of the plurality of messages and a hash of the last message of the exchange of the plurality of messages,
whereby the exchange of the plurality of messages between the first and second transportation vehicles create a contract indicating maneuvers to be performed by the first and second transportation vehicles in a contracted cooperative maneuver, whereby the contracted cooperative maneuver is modifiable based on exchange of further messages between the first and second transportation vehicles, wherein the further messages each comprise a hash pointer comprising a link to the respective last previous message and a hash of the respective last previous message.

US Pat. No. 10,693,830

METHODS, SYSTEMS, APPARATUSES AND DEVICES FOR FACILITATING LIVE STREAMING OF CONTENT ON MULTIPLE SOCIAL MEDIA PLATFORMS

HALO INNOVATIVE SOLUTIONS...

1. A method of facilitating live streaming of content on multiple social media platforms, the method comprising:sending, using a communication device, a digital content from a source user device, wherein the source user device comprises at least one content capturing device configured for generating the digital content;
sending, using the communication device, a supplemental content identifier from the source user device;
sending, using the communication device, a plurality of target identifiers from the source user device, wherein the plurality of target identifiers correspond to a plurality of target user devices;
identifying, using a processing device, a plurality of social media servers associated with the plurality of target identifiers;
identifying, using the processing device, a supplemental content based on the supplemental content identifier, wherein the supplemental content is a background audio content;
processing, using the processing device, the digital content based on a plurality of platform characteristics corresponding to the plurality of social media servers;
embedding, using the processing device, the supplemental content in the digital content;
generating, using the processing device, a plurality of digital content based on the processing;
transmitting, using the communication device, the plurality of digital content to the plurality of social media servers;
sending, using the communication device, a source indication associated with the digital content;
identifying, using the processing device, a source server based on the source indication;
transmitting, using the communication device, a content request to the source server; and
sending, using the communication device, the digital content from the source server.

US Pat. No. 10,693,829

PROVIDING TRANSLATIONS OF ELECTRONIC MESSAGES VIA A SOCIAL NETWORKING SYSTEM

FACEBOOK, INC., Menlo Pa...

1. A method comprising:receiving, from a sender, a first version of an electronic message, wherein the first version of the electronic message is in a first language;
identifying, by at least one processor, social networking information associated with the sender;
transmitting, to a computing device associated with the sender, a prompt to provide a second version of the electronic message in a second language based on the social networking information associated with the sender;
receiving, from the sender in response to the prompt, the second version of the electronic message the second language;
identifying, by the at least one processor, social networking information associated with a recipient; and
determining, by the at least one processor and based on the social networking information associated with the recipient, whether to provide the first version of the electronic message or the second version of the electronic message to the recipient.

US Pat. No. 10,693,824

ELECTRONIC MEETING MANAGEMENT

International Business Ma...

1. A computer-implemented method of electronic meeting management, the method comprising:detecting, by a meeting management engine with respect to an electronic meeting, a first attentiveness factor for a first user at a first time;
detecting, by the meeting management engine with respect to the electronic meeting, a second attentiveness factor for the first user at a second time, wherein the second time is subsequent to the first time, and wherein the second attentiveness factor differs from the first attentiveness factor;
capturing, by the meeting management engine between the first time and the second time, a set of meeting data for the electronic meeting;
composing, by the meeting management engine in an automated fashion based on the set of meeting data, a set of content summary data for the electronic meeting, wherein the set of content summary data comprises a summary of the set of meeting data captured between the first time and the second time; and
displaying, by the meeting management engine to the first user, the set of content summary data in response to detecting the first user is attentive, wherein the set of content summary data is unobtrusively displayed to the first user during a break in the electronic meeting without interrupting the electronic meeting.

US Pat. No. 10,693,821

SYSTEM AND METHOD FOR DELIVERING INLINE INTERACTIVE OBJECTS ENCAPSULATED IN A MESSAGE

1. A system for delivery of text, media and inline interactive objects encapsulated in a message, the system comprising:a message server stored in a memory of and operating on a processor of a computing device;
an inline interaction object repository stored in a memory of and operating on a processor of a computing device; and
a plurality of message delivery devices each stored in a memory of and operating on a processor of a computing device;
wherein the message server:
receives a first message which comprises content requiring the use of an inline interactive object to display or manipulate;
determines from a target message delivery device whether that target device has all inline interactive objects needed to render and manipulate the inline interactive objects included in the first message; and
provides a method to procure any inline interactive objects needed to render or manipulate inline data encapsulated within the first message;
wherein the inline interaction object repository:
maintains copies of inline interactive objects available for download; and
wherein the message delivery devices:
accept a second message comprising encapsulated interactive data;
run inline interactive object resources needed to render and manipulate encapsulated content within the second message; and
allow a first user to initiate a third message to a second user using an identification for the second user.

US Pat. No. 10,693,817

VNFM RESOLUTION OF SPLIT-BRAIN VIRTUAL NETWORK FUNCTION COMPONENTS

OPEN INVENTION NETWORK LL...

8. A method, comprising:receiving a VNFCI status notification resumption with an active state;
retrieving a timestamp of the VNFCI state change to active;
retrieving a timestamp of a peer VNFCI state change to active;
checking with a VIM to determine if the VNFCI network isolated while active;
checking with the VIM to determine if the peer VNFCI network isolated while active;
sending a first state change request message with standby to the peer VNFCI when one or more of: the peer VNFCI was network isolated, and the VNFCI was not network isolated;
sending a second state change request message with standby to the peer VNFCI when one or more of: the VNFCI is not the preferred standby instance, and the peer VNFCI was not network isolated, and the VNFCI was not network isolated;
starting a first retry timer for the peer VNFCI when one or more of: the first state change request message is sent, and the second state change request message is sent;
sending a third state change request message with standby to the VNFCI when one or more of: the VNFCI is the preferred standby instance, and the peer VNFCI was network isolated, and the VNFCI was network isolated;
sending a fourth state change request message with standby to the VNFCI when one or more of: the peer VNFCI was not network isolated, and the VNFCI was network isolated; and
starting a second retry timer for the VNFCI when one or more of: the third state change request message is sent, and the fourth state change request message is sent.

US Pat. No. 10,693,814

ULTRA-SCALABLE, DISAGGREGATED INTERNET PROTOCOL (IP) AND ETHERNET SWITCHING SYSTEM FOR A WIDE AREA NETWORK

Fujitsu Limited, Kawasak...

1. A wide area common carrier (WACC) disaggregated networking switching system comprising:an Ethernet fabric including a set of M Ethernet switches each comprising a set of N switch ports, each Ethernet switch to establish switch queues, wherein a variable i having a value ranging from 1 to M to denote the ith Ethernet switch of the set of M Ethernet switches, wherein a variable j having a value ranging from 1 to N to denote the jth switch port of the set of N switch ports; and
a set of N input/output (IO) devices each comprising:
a set of W IO ports, wherein a variable x having a value ranging from 1 to W to denote the xth IO port of the W IO ports;
a set of M Ethernet ports, wherein the ith Ethernet port of the jth IO device is connected to the jth switch port of the ith Ethernet switch;
an IO side packet processor (IOSP) configured to:
establish a set of M hierarchical virtual output queues (H-VOQs) each comprising a set of N ingress-IOSP queues (I-IOSPQs) and I-VOQs, wherein the ith H-VOQ corresponds to the ith Ethernet port of the jth IO device, and wherein the jth I-IOSPQ of the ith H-VOQ corresponds to the jth IO device; and
establish a set of W egress-IOSP queues (E-IOSPQs), wherein the xth E-IOSPQ corresponds to the xth IO port; and
a fabric side packet processor (FSP) configured to:
establish a set of M ingress-FSP queues (I-FSPQs), wherein the ith I-FSPQ corresponds to the ith Ethernet switch; and
establish a set of N hierarchical virtual input queues (H-VIQs) each comprising a set of N egress-FSP queues (E-FSPQs) and E-VIQs, wherein the jth H-VIQ corresponds to the jth IO device, and wherein the jth E-FSPQ of the jth H-VIQ corresponds to the jth IO device.

US Pat. No. 10,693,810

METHOD AND SYSTEM FOR MANAGING INPUT OUTPUT PER SECOND (IOPS) IN FIBER CHANNEL NETWORK TOPOLOGY

Wipro Limited, Bangalore...

1. A method of managing Input Output per Second (TOPS) in Fiber Channel (FC) network topology comprising a plurality of switches, the method comprising:initializing, by an IOPS managing device, a plurality of network parameters associated with the plurality of switches into a plurality of dependent variables and a plurality of independent variables for each of the plurality of switches;
performing for each of the plurality of switches, by the IOPS managing device, a multilinear regression analysis on at least one of the plurality of dependent variables and at least one of the plurality of independent variables to predict a value of the at least one dependent variable;
clustering, by the IOPS managing device, the plurality of switches into a plurality of categories based on the value of the at least one of the plurality of dependent variables associated with each of the plurality of switches;
determining, by the IOPS managing device, a plurality of routes between a source switch and a destination switch associated with an IOPS request;
establishing, by the IOPS managing device, a connection between the source switch and the destination switch through a shortest route from the plurality of routes, wherein the shortest route comprises a subset of switches from the plurality of switches; and
for each switch in the subset, modulating, by the IOPS managing device, a bandwidth according to an IOPS associated with the IOPS request and a category of the plurality of categories associated with each switch in the subset.

US Pat. No. 10,693,807

METHOD AND SYSTEM FOR MEDIATED RESOURCE ALLOCATION

Cable Television Laborato...

1. A method for mediating resource allocation within a virtualized network of a computer network, the method comprising the steps of:receiving from at least one first computation module configured for virtual network functions in a network function virtualization infrastructure of the virtualized network, a first proposed resource allocation for completing a computational task;
comparing the received first proposed resource allocation to at least one of a predetermined resource allocation criteria and at least one second proposed resource allocation received from at least one second computation module;
determining a resource allocation instruction based, at least in part, on a result of the step of comparing;
identifying that the at least one first computation module is compromised; and
allocating one or more network resources in accordance with the resource allocation instruction,
wherein the step of identifying comprises a substep of analyzing data stored in an activity and decision log indicating at least one of a temporal anomaly, a security compromise, and an unexpected change in latency,
wherein the step of comparing comprises comparing the received first proposed resource allocation to at least one second received proposed resource allocation to ascertain whether the received first proposed resource allocation is substantially equal to a majority of a proposed resource allocation set including the received first proposed resource allocation and the one or more second received proposed resource allocations,
wherein the step of comparing ascertains that the received first proposed resource allocation is not substantially equal to the majority of the proposed resource allocation set, and
wherein the step of determining comprises assigning the resource allocation instruction to correspond with at least one proposed resource allocation of the proposed resource allocation set that is not the first proposed resource allocation.

US Pat. No. 10,693,806

NETWORK BANDWIDTH RESERVATIONS FOR SYSTEM TRAFFIC AND VIRTUAL COMPUTING INSTANCES

VMware, Inc., Palo Alto,...

1. A computer-implemented method for provisioning a virtual computing instance on a host computing device, comprising:receiving a request to provision the virtual computing instance not yet created on the host computing device, wherein a communication endpoint of the virtual computing instance is associated with a network bandwidth reservation specifying a minimum bandwidth guaranteed to the communication endpoint for communicating traffic to and from software executing in the virtual computing instance, the network bandwidth reservation specifying the minimum bandwidth being a hard constraint that must be met in order for the virtual computing instance to be provisioned on the host computing device;
determining whether the host computing device includes a physical network interface device having at least the minimum bandwidth available;
when it is determined the host computing device includes the physical network interface device having at least the minimum bandwidth available, assigning the communication endpoint to the physical network interface device and creating the virtual computing instance in the host computing device; and
when it is determined the host computing device includes no physical network interface device having at least the minimum bandwidth available, not creating the virtual computing instance in the host computing device.

US Pat. No. 10,693,803

HIERARCHICAL FAIRSHARE OF MULTI-DIMENSIONAL RESOURCES

International Business Ma...

1. A method to implement a fair share of hardware resources among a plurality of competing peers, the method comprising:determining, by one or more processors, respective amounts of usage of a hardware resource that is allocated to a first competing peer and a second competing peer;
determining, by one or more processors, respective differences between the respective amounts of usage of the hardware resource and a ratio that dictates, at least in part, an initial distribution of the hardware resource to the first competing peer and the second competing peer; and
adjusting, by one or more processors, an allocation of the hardware resource such that a portion of the hardware resource that is allocated to the first competing peer is transferred to the second competing peer based, at least in part, on the ratio and a determination that the first competing peer is served more than the second competing peer, wherein the adjustment is made based on one or both of (i) a greatest fairness difference, and (ii) whether a greatest accumulated fairness difference exceeds at least one threshold.

US Pat. No. 10,693,802

SYSTEMS AND METHODS FOR PROVISIONING AND MANAGING AN ELASTIC COMPUTING INFRASTRUCTURE

SEA STREET TECHNOLOGIES, ...

1. A provisioning and management system comprising:a memory;
at least one processor coupled to the memory; and
a management component executable by the at least one processor and configured to instantiate a plurality of objects, each object of the plurality of objects having an inherited set of properties and methods in common, the plurality of objects comprising
a plurality of resource objects each configured to control at least one capacity of at least one resource, the at least one resource being one or more of a physical resource and virtual resource of at least one computer system, and
a high availability object configured to
request that an active set of resources controlled by an active set of resource objects of the plurality of resource objects be physically distinct from one or more other sets of resources controlled by one or more other sets of resource objects of the plurality of resource objects,
detect an outage within the active set of resources controlled by the active set of resource objects of the plurality of resource objects, and
failover to the one or more other sets of resources controlled by the one or more other sets of resource objects of the plurality of resource objects, the one or more other sets of resources being one or more of active resources, passive resources, and standby resources.

US Pat. No. 10,693,801

PACKET DROP REDUCTION IN VIRTUAL MACHINE MIGRATION

Red Hat, Inc., Raleigh, ...

1. A method comprising:receiving, by a processing device, a first data packet directed to a virtual machine (VM) that has migrated from a first host to a second host, wherein the first data packet comprises a first network address of the VM, wherein the first network address of the VM is associated with the first host;
queuing, by the processing device, the first data packet in a memory buffer at the first host, wherein the memory buffer is to store one or more incoming data packets directed to the VM;
receiving, by the processing device via a first network interface card (NIC) of the first host, an indication of a second network address of the VM, wherein the second network address of the VM is associated with the second host; and
causing the first NIC of the first host to transmit the first data packet from the memory buffer at the first host to a second NIC of the second host, wherein the first data packet is transmitted over a network associated with the VM at the second host.

US Pat. No. 10,693,799

CALLING METHOD AND DEVICE, COMPUTER STORAGE MEDIUM, AND TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A method for making a call, comprising:detecting, by processing circuitry of a first terminal device that conducts a media call with a second terminal device via a network and in response to a success reception of a first data packet of first media that is send by the second terminal device during the media call, whether a packet loss occurs in the first media;
obtaining, by the processing circuitry, network status information of the network when a packet loss of a second data packet of the first media is detected;
determining, by the processing circuitry, a probability threshold in association with a retransmission request to the second terminal device for retransmitting the second data packet;
determining, by the processing circuitry, based on the probability threshold, a network requirement condition for the retransmission request;
sending, via interface circuitry of the first terminal device, the retransmission request to the second terminal device when the network status information satisfies the network requirement condition; and
canceling the retransmission request to the second terminal device when the network status information fails to satisfy the network requirement condition.

US Pat. No. 10,693,795

PROVIDING ACCESS TO APPLICATION PROGRAM INTERFACES AND INTERNET OF THING DEVICES

FUJITSU LIMITED, Kawasak...

1. A system for providing access to at least one of an application programming interface (API) and an Internet of Thing (IoT) device, comprising:one or more processors configured to:
establish a connection between at least one user device and the at least one of the API and the IoT device;
allocate resources for one or more services associated with the at least one of the API and the IoT device to the at least one user device;
provide the one or more services associated with the at least one of the API and the IoT device to the at least one user device;
monitor at least one parameter associated with the one or more services provided to the at least one user device;
obtain a mashup between the at least one of the API and the IoT device and at least one of a second API and a second IoT device;
obtain a virtual smart environment, the virtual smart environment including the at least one of the API and the IoT device, the at least one of the second API and the second IoT device, and the mashup;
emulate the virtual smart environment using the at least one of the API and the IoT device, the at least one of the second API and the second IoT device, and the mashup to test a possibility of the mashup to determine a compatibility of the mashup by determining an interaction between the at least one of the API and the IoT device and the at least one of the second API and the second IoT device; and
present a result of the test on the at least one user device.

US Pat. No. 10,693,793

MITIGATING NETWORK SATURATION FOLLOWING PERIODS OF DEVICE DISCONNECTION AND SUBSEQUENT RECONNECTION

INTERNATIONAL BUSINESS MA...

1. A method comprising:detecting, by one or more processors, reconnection of device to a network after a period of disconnection;
querying, by one or more processors, a set of applications residing on the device for estimated data associated with the application awaiting transfer;
determining, by one or more processors, that a response has been received from a first application of the set of applications, the response including a first estimated data awaiting transfer from the first application;
determining, by one or more processors, that a response has not been received from a second application of the set of applications;
determining, by one or more processors, responsive to determining that the response has not been received from the second application, a second estimated data awaiting transfer from the second application based upon a learned data usage model for the application, wherein the learned data usage model uses data usage pattern statistics to determine estimated data to be transferred from the second application using machine learning;
determining, by one or more processors, a total expected data transfer amount based upon the first estimated data and the second estimated data;
determining, by one or more processors, that the total expected data transfer amount is not less than a threshold value; and
determining, by one or more processors, responsive to the determining that the total expected data transfer amount is not less than the threshold value, a priority of the data transfer for the first application and the second application.

US Pat. No. 10,693,792

METHOD FOR ROUTING INCOMING COMMUNICATION

International Business Ma...

1. A method for transferring an incoming communication from a mobile device to another mobile device, the method comprising the steps of:determining, by one or more computer processors, whether a communication of a plurality of communications is received by a first mobile device;
responsive to determining that the communication of the plurality of communications has been received by the first mobile device, transferring, by one or more computer processors, the communication of the plurality of communications to at least one mobile device of a plurality of other mobile devices based on a routing configuration table;
determining, by one or more processors, whether a pairing between the first mobile device and one or more mobile devices of the plurality of mobile devices is severed;
responsive to determining that the pairing between the first mobile device and one or more mobile devices of the plurality of mobile devices is severed, identifying, by one or more computer processors, the one or more mobile devices of the plurality of mobile devices associated with the severed pairing;
identifying, by one or more computer processors, the transferred communication associated with the identified one or more mobile devices of the plurality of mobile devices associated with the severed pairing;
storing, by one or more computer processors, the identified transferred communication to the first mobile device; and
deleting, by one or more computer processors, the identified transferred communication from the one or more mobile devices of the plurality of other mobile devices paired to the first mobile device.

US Pat. No. 10,693,789

ADAPTIVE INTELLIGENT ROUTING IN A COMMUNICATION SYSTEM

Cisco Technology, Inc., ...

1. A computer-implemented method of adaptive routing in a communication system, the computer-implemented method comprising:determining, by a controller, a device policy to implement on a client executing on a mobile device, wherein operation of the client on the mobile device is transparent to one or more other applications executing on the mobile device, wherein the client is configured to communicate with a router residing within a radio access network, the radio access network coupled between a core network and a base station configured to communicate wirelessly with the client, the device policy pertaining to communication between the mobile device and the one or more packet data networks;
transmitting the device policy to the client, whereupon the client implements the device policy in order to regulate communication between the mobile device and the one or more packet data networks, wherein the mobile device is configured to initiate a plurality of connections according to the device policy, the plurality of connections including a first connection anchored at the controller and a second connection anchored at the router, wherein the router is configured to maintain a session for the second connection; and
determining, by operation of one or more computer processors, a router policy to implement on the router, after which the router policy is transmitted to the router, whereupon the router implements the router policy by monitoring the mobile device according to the router policy in order to determine whether the mobile device is communicating with the one or more packet data networks in compliance with the device policy, wherein the router is configured to notify the controller of any non-compliant communication between the mobile device and the one or more packet data networks.

US Pat. No. 10,693,782

METHOD AND SYSTEM FOR SERVICE SWITCHING USING SERVICE TAGS

NICIRA, INC., Palo Alto,...

1. A non-transitory machine readable medium storing a program for specifying a service to perform on a received packet, the program for execution by at least one hardware processing unit, the program comprising sets of instructions for:identifying a source client and a requested service associated with the received packet;
generating a service tag that identifies the source client and the requested service;
storing the service tag in an encapsulation header, and using the encapsulation header with the stored service tag to encapsulate the packet; and
forwarding the encapsulated packet to a service switching gateway that extracts the service tag from the encapsulation header and directs the packet to a service machine by using the extracted service tag to identify the service machine from a mapping structure that maps different service tags to different service machines.

US Pat. No. 10,693,781

IN NIC FLOW SWITCHING

Intel Corporation, Santa...

1. An apparatus, comprising:an interconnect interface;
memory, having an address space; and
a plurality of network ports coupled in communication via an internal interconnect, each network port having a network interface;
wherein the apparatus further includes means for allocating portions of the address space to sets of queues for each of the plurality of network ports, wherein each set of queues includes a plurality of receive (Rx) queues and a plurality of transmit (Tx) queues, wherein a portion of the Tx queues are Tx forwarding queues mapped to at least one of Rx and Tx queues in other network ports on the apparatus, and
wherein each network port further includes means for,
comparing header data in a Media Access Control (MAC) frame against MAC frame header filter data to determine if the MAC frame is to be forwarded to another network port in the apparatus; and in response to a determination that the MAC frame is to be forwarded to another network port,
moving or copying the MAC frame from a first queue allocated to the network port to a second queue allocated to the other network port.

US Pat. No. 10,693,780

CREATING ENDPOINTS

Capital One Services, LLC...

1. A method, comprising:receiving, by a processor, a configuration file,
wherein the configuration file includes:
data concerning a Hypertext Transfer Protocol (HTTP) route, wherein the data includes:
a parameter related to the HTTP route, and
an attribute related to an HTTP action;
creating, by the processor, the HTTP route based on the parameter,
wherein the HTTP route includes information concerning the parameter and the attribute related to the HTTP action; and
sending, by the processor, the HTTP route to a server,
wherein sending the HTTP route to the server causes the server to perform an operation based on the HTTP route.

US Pat. No. 10,693,779

METHOD AND SYSTEM FOR TRANSFERRING A MESSAGE

Telefonaktiebolaget LM Er...

1. A method of transferring a message from a sender network to a recipient network that is different than the sender network, the method comprising:generating a token, by a first node in the sender network, for content of a stored message stored in a repository to replace information in a Session Initiation Protocol (SIP) message to be sent to an intended recipient;
transmitting, via one or more intermediate SIP nodes, from the first node to a second node in the recipient network, the SIP message with the generated token replacing the information;
retrieving, by the second node, the information from the repository;
replacing, by the second node, in the SIP message, the token with the information; and
transferring the SIP message comprising the information toward the intended recipient via the recipient network.

US Pat. No. 10,693,778

NETWORK COMMUNICATION SYSTEM WITH NODE ENERGY REDUCTION PACKET PROTOCOL

TEXAS INSTRUMENTS INCORPO...

1. A method for transmitting information, the method comprising:determining channel quality of a communication channel onto which the information is to be transmitted;
based on the channel quality, selecting a packet format for transmitting the information from one of a first packet format having a preamble, a header having a first length, and a data payload and a second packet format having the preamble, a header having a second length, and the data payload, wherein the first length is greater than the second length;
encoding the information into a packet based on the selected packet format; and
transmitting the packet onto the communication channel.

US Pat. No. 10,693,775

METHOD AND SYSTEM FOR PROVIDING AUTOMATIC ROUTER ASSIGNMENT IN A VIRTUAL ENVIRONMENT

Versa Networks, Inc., Sa...

1. A method for providing automatic virtual router assignment in a virtual environment managed by a hypervisor, the method comprising:a plurality of virtual hosts and a plurality of virtual routers are configured to run on one or more virtual machines,
wherein the plurality of virtual routers comprises a master virtual router and at least one backup virtual router, each of the plurality of virtual routers has a MAC address assigned by the hypervisor, and wherein one of the plurality of virtual routers is elected as the master virtual router, and the master virtual router is a default gateway to receive traffic from the plurality of virtual hosts, and each virtual host includes a default gateway MAC address in an ARP cache;
receiving, by the plurality of virtual hosts, a gratuitous ARP packet from the master virtual router, wherein a sender hardware address of the received gratuitous ARP packet is the MAC address of the master virtual router;
setting the default gateway MAC address to the sender hardware address of the received gratuitous ARP packet in the ARP cache;
wherein each of the plurality of virtual routers receives an advertisement comprising a priority value,
wherein the at least one backup virtual router is configured to receive a priority value advertised by the master virtual router and to transition to a master virtual router state if the priority value advertised by the master virtual router is not greater than a priority value local to the at least one backup virtual router, and
wherein the master virtual router is configured to receive a priority value advertised by the at least one backup virtual router and to transition to a backup virtual router state if the priority value advertised by the at least one backup virtual router is greater than a priority value local to the master virtual router.

US Pat. No. 10,693,770

SERVICE CHAINING WITHIN COMPUTER NETWORKS

Juniper Networks, Inc., ...

1. A method comprising:forming a tunnel packet by encapsulating a packet within a payload of the tunnel packet and constructing a header of the tunnel packet for transport by a tunnel associated with a particular service chain,
wherein the service chain comprises an ordered set of one or more stateful services for application, by a set of service nodes, to a plurality of packet flows,
wherein forming the tunnel packet comprises embedding a cookie within the tunnel packet, and
wherein the cookie includes a value that uniquely identifies a specific subset of packet flows of the plurality of packet flows transported by the service tunnel for the service chain; and
forwarding the tunnel packet toward the service nodes.

US Pat. No. 10,693,769

METHODS AND APPARATUS TO PERFORM NETWORK FABRIC MIGRATION IN VIRTUALIZED SERVER SYSTEMS

VMWARE, INC., Palo Alto,...

8. A method comprising:in response to a first network resource transmitting a first probe packet to a second network resource via a communication link, determining, by executing an instruction with a processor, a type of a first network fabric layer of a communication network and whether to migrate the first network fabric layer to a second network fabric layer based on whether the first network resource receives a reply probe packet from the second network resource;
in response to a remediation path being configured, migrating, by executing an instruction with the processor, the first network fabric layer to the second network fabric layer; and
subsequent to migrating the first network fabric layer to the second network fabric layer, migrating, by executing an instruction with the processor, the remediation path from the first network fabric layer to the second network fabric layer.

US Pat. No. 10,693,765

FAILURE PROTECTION FOR TRAFFIC-ENGINEERED BIT INDEXED EXPLICIT REPLICATION

Cisco Technology, Inc., ...

1. A method comprising:determining a protected link or node in a network, wherein
the protected link or node is to be protected by a fast reroute procedure,
the protected link or node is included in a designated path to be taken by a message through the network to a destination node,
the designated path is encoded in a message bit array carried by the message, and
assigned bit positions in the message bit array represent respective network links along the designated path;
determining a backup path to the destination node from a feeder node adapted to forward a message carrying the message bit array into the protected link or node, wherein
the backup path bypasses the protected link or node,
the backup path can be encoded by a modified message bit array carried by the message in place of the message bit array, and
assigned bit positions in the modified message bit array represent the same respective network links as the corresponding bit positions in the message bit array; and
populating an entry in a path update table stored at the feeder node, wherein
the entry comprises information for use, in the event of a failure of the protected link or node, in modifying two or more bit values within the message bit array to form the modified message bit array, and
the two or more bit values comprise
a bit value at a first bit position, in the message bit array, representing the protected link or a link to the protected node, and
a bit value at a second bit position, in the message bit array, representing a link within the backup path but not within the designated path.

US Pat. No. 10,693,760

FABRIC NETWORK

Google LLC, Mountain Vie...

1. An electronic device configured to communicate on a fabric network comprising multiple devices in a home environment, the fabric network comprising multiple logical networks, the electronic device configured to:generate a message for transmission to another device of the multiple devices in the fabric network, the message including an address of the other device; and
transmit the generated message to a cloud service over a platform layer in the fabric network, the transmission being effective to cause the cloud service to use the address to forward the message to the other device, the electronic device being configured to communicate in a first network of the fabric network using a first communication protocol and the other device being configured to communicate in a second network of the fabric network using a second communication protocol.

US Pat. No. 10,693,756

DYNAMIC QUALITY OF SERVICE OVER COMMUNICATION CIRCUITS

BIGLEAF NETWORKS, INC., ...

1. A method for packet data communications comprising the steps of:accessing a tunnel connection over a communication circuit, the communication circuit providing packet data communications over a network between first and second nodes;
transmitting and receiving monitoring packets between the first and second nodes in both directions, the monitoring packets traveling over the tunnel connection;
based on the monitoring packets, calculating performance metrics for the tunnel connection, separately for each direction and storing values of at least one of the performance metrics for the circuit, wherein the performance metrics comprise at least one metric selected from a set of metrics that includes packet loss, jitter, and latency;
after receipt of a data packet from a remote peer on the circuit:
comparing the stored values of at least one performance metric for the circuit against corresponding severity breakpoints, and based on the comparison, assigning a current alarm value for each of the at least one performance metrics for the circuit;
responsive to the current alarm value assigned to one of the performance metrics exceeding a corresponding alarm limit, decreasing a QOS policy packet data throughput rate limit for the circuit to a predetermined minimum value thereby limiting throughput of packet data traffic on the circuit to the predetermined minimum value;
waiting for an evaluation period;
upon conclusion of the evaluation period, checking whether the assigned current alarm value has receded below the corresponding alarm limit, indicating that the alarm condition was due to circuit saturation;
based on the assigned current alarm value having receded below the corresponding alarm limit, establishing a maximum new QOS policy packet data throughput rate at which the assigned current alarm value no longer exceeds the corresponding alarm limit; and
updating the QOS policy packet data throughput rate limit to the maximum new QOS policy rate thereby permitting throughput of packet data traffic on the circuit up to the maximum new QOS policy rate.

US Pat. No. 10,693,753

NETWORK DEVICE SNAPSHOTS

Hewlett Packard Enterpris...

1. A computer-implemented method comprising:receiving an indication to quiesce a first network device;
pausing new communication processing on the first network device for a first period of time sufficient to complete processing of at least a portion of any in-progress communications on the first network device;
creating a first snapshot copy of a first state of the first network device, the first state including information from the first network device describing software application run-time execution parameters, software application configuration parameters, hardware run-time execution parameters, and hardware configuration parameters;
resuming communication processing on the first network device;
storing the first snapshot copy of the first state of the first network device to a first memory communicatively coupled to a first processor of the first network device;
receiving an indication to quiesce a second network device concurrently with quiescing the first network device;
pausing new communication processing on the second network device for a second period of time sufficient to complete processing of at least a portion of any in-progress communications on the second network device;
creating a second snapshot copy of a second state of the second network device, the second state including information from the second network device describing software application run-time execution parameters, software application configuration parameters, hardware run-time execution parameters, and hardware configuration parameters;
resuming communication processing on the second network device; and
storing the second snapshot copy of the second state of the second network device to a second memory communicatively coupled to a second processor of the second network device.

US Pat. No. 10,693,752

DYNAMICALLY REQUESTING MOBILE DEVICES TO REPORT NETWORK INFORMATION

1. A method comprising:receiving, from a plurality of radio access nodes, information indicating availability of the radio access nodes;
based on the availability information received from the radio access nodes, determining that a current operating condition of a mobile network corresponds to normal operations;
requesting information regarding mobile network operating conditions from a plurality of mobile devices in communication with the radio access nodes by:
setting a reporting parameter to a first value, and
instructing each of the radio access nodes to transmit a respective broadcast message that includes the first value for the reporting parameter;
receiving a first plurality of messages from a first subset of mobile devices, each message in the first plurality of messages including location information for a respective mobile device in the first subset; and
using the location information received from the first subset of mobile devices and the availability information received from the radio access nodes to define at least one coverage area;
receiving, from a subset of the radio access nodes, information indicating availability of the subset of the radio access nodes;
based on the information received from the subset of the radio access nodes, determining that the current operating condition of the mobile network corresponds to impaired operations;
requesting updated information regarding mobile network operating conditions by:
setting the reporting parameter to a second value, and
instructing each radio access node in the subset of the radio access nodes to transmit a second broadcast message that includes the second value for the reporting parameter, wherein the second value differs from the first value;
receiving a second plurality of messages from a second subset of mobile devices, each message in the second plurality of messages including location information for a respective mobile device in the second subset; and
using the location information for the second subset of mobile devices and the availability information received from the subset of the radio access nodes to define at least one revised coverage area.

US Pat. No. 10,693,751

END-TO-END IT SERVICE PERFORMANCE MONITORING

Saudi Arabian Oil Company...

1. A computer-implemented method, comprising:generating a layout representative of an end-to-end information technology (IT) service, the generating based on physical components of the end-to-end IT service, the layout identifying and representing all interactions among components of the end-to-end IT service, the layout identifying all components of the end-to-end IT service and including a physical layout and a logical layout, the generating including:
identifying the interactions by accessing application programming interfaces (APIs), remote function calls (RPCs), and universal resource locators (URLs) used by the components of the end-to-end IT service;
dividing the layout into smaller blocks, each smaller block representing a function or a set of functions, wherein dividing the layout into the smaller blocks includes sub-dividing block-to-block interactions into the smaller blocks based on business groups; and
identifying interactions for aggregation points between two or more smaller blocks;
measuring, using probes placed at aggregation points in the end-to-end IT service, performance of each interaction at each aggregation point, wherein placement of the probes is optimized based on the interactions; and
providing output that identifies all of the components and interactions within the end-to-end IT service and includes information indicating measured performance of the interactions, including prioritized information for measured performance of anomalies.

US Pat. No. 10,693,750

HIERARCHICAL SERVICE ORIENTED APPLICATION TOPOLOGY GENERATION FOR A NETWORK

Lightbend, Inc., San Fra...

1. A system for generating hierarchical service oriented application topology of a network with a multitude of processes running on numerous hosts, the system comprising:a machine learning-based classifier trained to cluster the hosts into service profiles by:
evaluating command parameters of respective processes running on the hosts by applying logistic regression to string vectors of the command parameters to calculate a probability of classifying a host into a particular service profile, and
based on the evaluation, classifying hosts that run similar processes as having a same service profile; and
a graphic generator that generates a graphic of the topology of the network based on the service profiles produced by the machine learning-based classifier.

US Pat. No. 10,693,749

SYNTHETIC DATA FOR DETERMINING HEALTH OF A NETWORK SECURITY SYSTEM

CISCO TECHNOLOGY, INC., ...

1. A computer-implemented method comprising:capturing network traffic data and associated data using at least a first sensor of a first virtual machine of a network, a second sensor of a first server hosting the first virtual machine, and a third sensor of a first networking device connected to the first server;
determining a pattern in the network traffic data and the associated data, the pattern associated with respective expected behavior for at least the first sensor, the second sensor, and the third sensor;
determining a plurality of selected nodes of the network for generating data corresponding to the pattern, the plurality of selected nodes including at least a second virtual machine of the network, a second server hosting the second virtual machine, and a second networking device connected to the second server, the second virtual machine executing a fourth sensor, the second server executing a fifth sensor, and the second networking device executing a sixth sensor;
causing each of the plurality of selected nodes to generate a respective portion of the data corresponding to the pattern; and
comparing respective actual behavior of the fourth sensor, the fifth sensor, and the sixth sensor to the respective expected behavior of the first sensor, the second sensor, and the third sensor.

US Pat. No. 10,693,746

INSTRUMENTATION AND MONITORING OF SERVICE LEVEL AGREEMENT (SLA) AND SERVICE POLICY ENFORCEMENT

International Business Ma...

1. A method, comprising:correlating, within a runtime policy correlation data structure using a source policy reference key, source policy identification information that comprises at least a source policy identifier (ID) of a registry service policy with configured runtime policy enforcement processing rules and processing actions established during policy binding at a policy enforcement point (PEP) that cause the PEP to enforce runtime provisions of the registry service policy, wherein correlating within the runtime policy correlation data structure comprises:
compiling an abstract syntax tree (AST) representation of the registry service policy;
recursively traversing the AST representation to identify policy assertions within the AST representation of the registry service policy while adding PEP monitoring instrumentation that facilitates the per-transaction capture of the service policy enforcement information; and
mapping the identified policy assertions within the AST representation of the registry service policy to the source policy identification information within the runtime policy correlation data structure to facilitate the correlation of the captured per-transaction service policy enforcement information with the source policy identification information using the source policy reference key, wherein mapping the identified policy assertions within the AST representation of the registry service policy comprises:
creating the configured runtime policy enforcement processing rules and processing actions from the AST representation of the registry service policy; and
storing, during policy normalization to correlate the configured runtime policy enforcement processing rules and processing actions with the registry service policy, identifiers of the configured runtime policy enforcement processing rules and processing actions with the source policy identification information as an entry within the runtime policy correlation data structure, where the entry is indexed using the source policy reference key;
correlating, within a per-transaction service data table, captured per-transaction service policy enforcement information that documents which configured runtime policy enforcement activities are performed by the PEP on individual transactions with the source policy identification information using the source policy reference key; and
providing the correlated per-transaction service policy enforcement information of at least one transaction from the per-transaction service data table in response to a query from a policy monitoring point (PMP) for the correlated per-transaction service policy enforcement information of the at least one transaction.

US Pat. No. 10,693,744

NETWORK PROPERTY VERIFICATION

FUJITSU LIMITED, Kawasak...

1. A method, comprising:obtaining a plurality of packet handling rules from at least one firewall in a network and at least one routing table in the network;
translating the packet handling rules to one or more canonical data structures based on priority of rules at a given routing table or a given firewall, each canonical data structure representing a subset of packets affected by one or more corresponding packet handling rules such that each packet handling rule is covered by at least one canonical data structure;
generating a graph representation of the at least one firewall and at least one node corresponding to the at least one routing table in the network;
labeling a vertex in the graph representation with a first canonical data structure based on the first canonical data structure being associated with a first packet handling rule of the given firewall, the vertex in the graph representation corresponding to the given firewall;
labeling an edge in the graph representation with a second canonical data structure based on the second canonical data structure being associated with a second packet handling rule of the given routing table, the edge in the graph representation corresponding to the given routing table; and
using the graph representation, verifying one or more network properties to identify any network issues.

US Pat. No. 10,693,743

DISPLAYING INTERACTIVE TOPOLOGY MAPS OF CLOUD COMPUTING RESOURCES

Splunk Inc., San Francis...

1. A method, comprising:receiving performance data related to performance of a plurality of computing resources and relationship data related to relationships among the plurality of computing resources, wherein the plurality of computing resources are hosted by one or more cloud computing services, wherein the one or more cloud computing services enable access to the plurality of computing resources to users who subscribe to services provided by the one or more cloud computing services, wherein the users access the plurality of computing resources over a network,
wherein the performance data and relationship data are derivable from event data associated with the plurality of computing resources, and wherein each event of the event data includes raw machine data generated by a respective cloud computing resource;
generating, using the performance data and the relationship data, topology map data, the topology map data providing instructions for displaying the performance data and the relationship data; and
outputting the topology map data for display in a graphical user interface, wherein, upon receiving the topology map data, the graphical user interface uses the topology map data to display a topology map, the topology map including a plurality of nodes representing the plurality of computing resources and one or more edges between the plurality of nodes, the one or more edges representing the relationships among the plurality of computing resources, and wherein respective information from the performance data is displayed with each of the plurality of nodes.

US Pat. No. 10,693,742

INLINE VISUALIZATIONS OF METRICS RELATED TO CAPTURED NETWORK DATA

Splunk Inc., San Francis...

1. A method performed by a computer-implemented component of an event-processing system, the method comprising:obtaining, over one or more networks, a plurality of event streams generated by one or more remote capture agents, each event stream of the plurality of event streams including time-series event data generated by the one or more remote capture agents from network packets captured by the one or more remote capture agents;
executing at least one correlation search used to identify notable events in each event stream of the plurality of event streams;
for each event stream of the plurality of event streams, generating a respective time-series for a metric corresponding to a number of notable events identified in the event stream over time based on execution of the at least one correlation search; and
causing display of a graphical user interface (GUI) including, for each event stream of the plurality of event streams:
at least one first interface element displaying event stream information related to the event stream of the plurality of event streams, and
at least one second interface element displaying an event stream-specific graph of the respective time-series for the metric associated with the event stream.

US Pat. No. 10,693,740

DATA TRANSFORMATION OF PERFORMANCE STATISTICS AND TICKET INFORMATION FOR NETWORK DEVICES FOR USE IN MACHINE LEARNING MODELS

Accenture Global Solution...

1. A device, comprising:one or more memories; and
one or more processors communicatively coupled to the one or more memories to:
obtain historical network data associated with a set of network devices,
the historical network data being associated with a first set of values that are in a format capable of being processed by one or more data models, and
the historical network data including at least one of:
historical network ticket information, or
historical performance statistics relating to the set of network devices;
determine a set of historical network performance indicators for one or more groups of network devices, of the set of network devices, by analyzing the historical network data;
train the one or more data models based on the set of historical network performance indicators;
receive, after training the one or more data models, new network data for one or more network devices of the set of network devices,
the new network data being received periodically over an interval and including at least one of:
network ticket information, or
performance statistics relating to the one or more network devices;
determine a set of other network performance indicators that are associated with the one or more network devices, of the set of network devices, by analyzing the new network data;
convert the set of other network performance indicators into a second set of values that are in the format capable of being processed by the one or more data models,
wherein the one or more processors, when converting the set of other network performance indicators into the second set of values, are to:
execute a data mining technique to identify, by analyzing information associated with a set of data sources, a set of threshold ranges of values,
 the set of threshold ranges of values being associated with a network performance indicator of the set of other network performance indicators;
compare the network performance indicator, of the set of other network performance indicators, to the set of threshold ranges of values; and
convert the network performance indicator to a value included in the second set of values based on a particular threshold range of values, of the set of threshold ranges of values, with which the network performance indicator is associated;
generate, based on the set of other network performance indicators and the one or more data models, one or more recommendations associated with improving network performance; and
perform, based on the one or more recommendations, one or more actions associated with improving network performance.

US Pat. No. 10,693,738

GENERATING DEVICE-LEVEL LOGICAL MODELS FOR A NETWORK

CISCO TECHNOLOGY, INC., ...

1. A method comprising:obtaining a logical model of a network, the logical model representing a configuration of objects and object properties defined for the network;
based on the logical model, generating a runtime logical model of the network, the runtime logical model comprising configuration data that can be interpreted or compiled by network devices in the network and used by the network devices to execute one or more network policies associated with the configuration data; and
based on the runtime logical model, generating, for each of one or more network devices in the network, a respective device-specific runtime logical model representing at least one of the logical model or the runtime logical model, the respective device-specific runtime logical model projecting the at least one of the logical model or the runtime logical model onto a respective one of the one or more network devices, the respective device-specific runtime logical model comprising configuration elements that can be interpreted or executed by a software of the respective one of the one or more network devices.

US Pat. No. 10,693,734

TRAFFIC PATTERN DETECTION AND PRESENTATION IN CONTAINER-BASED CLOUD COMPUTING ARCHITECTURE

VMWARE, INC., Palo Alto,...

1. A system, comprising:one or more processors configured to:
obtain a first set of traffic metrics pertaining to network traffic associated with a plurality of containers of a container-based cloud computing platform, wherein:
the plurality of containers support a plurality of microservices; and
a microservice has one or more corresponding microservice instances that execute in one or more of the plurality of containers;
transform the first set of traffic metrics into a second set of traffic metrics, the second set of traffic metrics comprising network traffic information pertaining to at least some of the plurality of microservices, the transformation being based at least in part on information pertaining to the plurality of containers and the plurality of microservices supported by the plurality of containers;
construct a microservice map based on the second set of traffic metrics; and
output the microservice map; and
one or more memories coupled to the one or more processors and configured to provide the one or more processors with instructions.

US Pat. No. 10,693,731

FLOW ENTRY MANAGEMENT METHOD AND DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. A flow entry management method implemented by a first switch in a flow entry management system, comprising:receiving, by the first switch, a management instruction from a first controller, the management instruction containing a first network protocol address of the first controller and a first match field of a first flow entry;
in response to receiving the management instruction, obtaining, by the first switch, a first management authority level of the first controller relative to the first switch by querying for the first management authority level based on the first network protocol address and according to a preset relationship, wherein the preset relationship indicates relationships between a plurality of management authority levels of controllers connected to the first switch and network protocol addresses of the controllers connected to the first switch;
in response to receiving the management instruction, obtaining, by the first switch, a first security level of the first flow entry by querying for the first security level of the first flow entry based on the first match field and according to a preset association relationship, wherein the preset association relationship indicates a security level of each flow entry and a match field of each flow entry, and wherein a plurality of security levels corresponding to different management instructions are respectively set for the first flow entry;
comparing, by the first switch, the first management authority level of the first controller relative to the first switch with the first security level of the first flow entry corresponding to the management instruction initiated by the first controller; and
performing, by the first switch, the management instruction on the first flow entry in response to determining that the first management authority level of the first controller relative to the first switch is not less than the first security level of the first flow entry corresponding to the management instruction.

US Pat. No. 10,693,729

ACCELERATION OF NODE CONFIGURATION FOR TWAMP WITH A LARGE NUMBER OF TEST SESSIONS

Spirent Communications, I...

1. A method of reducing setup time of Two-Way Active Measurement Protocol (abbreviated TWAMP) control phase of the TWAMP protocol including:at a first network host, initializing an accept-port data structure for storing ports of transmitted request messages for two way (abbreviated TW) measurement sessions;
parsing a configuration file to populate the accept-port data structure, including proposed receiver ports for communication from a session-sender on the first network host to session-reflectors on other hosts;
repeatedly and in parallel, from a control client running on the first network host, communicating with receiving servers to set up pairwise test sessions between the session-sender and the session-reflectors using receiver port allocations from the accept-port data structure, for TW measurements that distinguish among the sessions, including transmitting a first message to a receiving server at the session-reflector, requesting the TW measurement session, wherein the first message includes the proposed receiver port at which to contact the session-reflector;
receiving and checking blocks of Accept-Session messages from the receiving server at the session-reflector and handling either case of acceptance of the proposed receiver port or of counter proposal of an alternate-and-available port,
wherein the counter proposal of the alternate-and-available port in a particular Accept-Session message includes an alternate-and-available port from the receiving server to be used for the TW measurement session, instead of the proposed receiver port, and
allocating the alternate-and-available port and updating the accept-port data structure by storing the alternate-and-available port received in the particular Accept-Session message; and
using the ports stored in the accept-port data structure to initiate TWAMP messages in the pairwise test sessions.

US Pat. No. 10,693,727

NON-INTRUSIVE DEVICE DISCOVERY AND CONFIGURATION CLONING

ZPE SYSTEMS, INC., Fremo...

1. A non-transitory tangible machine readable medium comprising instructions configured to cause at least one processor on at least one infrastructure management device to perform a process comprising:a) acquiring, by the infrastructure management device, IT device information for the at least one IT device from among a multitude of existing IT devices communicatively connected over a network;
b) determining, by the infrastructure management device, from the IT device information and additional IT device information from a device inventory stored in a Non-Volatile Memory of the infrastructure management device:
i) if there are any commonly executable commands;
ii) if there are any non-commonly executable commands; and
iii) if there are any feature gaps; and
c) creating, by the infrastructure management device, at least one IT device neutral user interface command comprising:
i) at least one of any of the determined commonly executable commands;
ii) at least one of any of the determined non-commonly executable commands; and
iii) combinations of at least one of the following configured to implement at least one of any of the determined feature gaps:
(1) at least one of any of the determined commonly executable commands;
(2) at least one of any of the determined non-commonly executable commands; and
(3) a gap filling process executable by the at least one infrastructure management device.

US Pat. No. 10,693,726

METHOD AND DEVICE FOR THE CONFIGURATION OF A TRANSMISSION LINK

Bayerische Motoren Werke ...

1. A method for data transmission at a transmitter-side data transmission unit, comprising the acts of:receiving at the transmitter-side data transmission unit a data transmission request for a data packet initiated by a real-time application operatively connected to the transmitter-side data transmission unit prior to initiating data transfer to a receiver-side data transmission unit;
transmitting from the transmitter-side data transmission unit a first portion of the data packet to the receiver-side data transmission unit via a communication channel;
receiving at the transmitter-side data transmission unit an availability indicator for the communication channel in the form of an availability code transmitted from the receiver-side data transmission unit, the availability indicator being determined by the receiver-side data transmission unit based on
parameters of the communication channel measured during the data packet first portion receiving act, and
estimated parameters of the communication channel for a portion of the data packet not yet transmitted from the transmitter-side data transmission unit to the receiver-side data transmission unit within an available remainder of a maximum permissible data transmission time; and
if the availability indicator indicates the communication channel is available,
configuring using the transmitter-side data transmission unit a portion of the data packet not yet transmitted for transmission within an available remainder of a maximum permissible data transmission time determined by the real-time application for the data packet, and
transmitting from the transmitter-side data transmission unit the portion of the data packet not yet transmitted to the receiver-side data transmission unit via the communication channel.

US Pat. No. 10,693,724

CONTEXT-SENSITIVE TECHNIQUES FOR OPTIMIZING NETWORK CONNECTIVITY

Amazon Technologies, Inc....

6. A system, comprising:at least one computing device that implements one or more services to at least:
in connection with a connection request by a client device to reach a destination, wherein the connection request specifies at least one network connection selection criteria, the network connection selection criteria indicating a request for a preferred network or a preferred connection type for a network configuration, generate the configuration that includes an identification, of a network among one or more networks that satisfies the-at least one network connection selection criteria for a connection associated with the connection request by processing:
a first set of information relating to the client device;
a second set of information relating to the destination, wherein the second set of information satisfies at least one connection selection criteria; and
a third set of information relating to the one or more networks capable of connecting the client device to the destination; and
cause the client device to be configured, in response to the connection request, with the generated configuration.

US Pat. No. 10,693,716

BLOCKCHAIN BASED DEVICE MANAGEMENT

1. An apparatus, comprising:memory configured to store at least a portion of a blockchain ledger for managing a plurality of devices, wherein the blockchain ledger comprises a plurality of blocks, each block of the plurality of blocks comprises a plurality of transactions, and each transaction of the plurality of transactions is associated with one of the plurality of devices, and wherein each device of the plurality of devices is configured to exchange data over a cellular network;
a network interface configured to:
receive a first transaction from a computing server, wherein the first transaction comprises a unique identifier and configuration information for a selected device from the plurality of devices; and
receive a second transaction for the selected device, wherein the second transaction comprises a subscriber identity module number for the selected device from a Home Location Register or a Home Subscriber Server; and
a processor configured to execute instructions stored in the memory that, when executed by the processor, cause the processor to:
determine whether the computing server is authorized to issue the first transaction to update the blockchain ledger;
cause a first update to the blockchain ledger using the first transaction;
determine whether the Home Location Register or the Home Subscriber Server are authorized to issue the second transaction to update the blockchain ledger; and
cause a second update to the blockchain ledger using the second transaction.

US Pat. No. 10,693,715

DYNAMIC NETWORK ADDRESS SPACE ALLOCATION FOR VIRTUAL NETWORKS

Amazon Technologies, Inc....

1. A computer-implemented method comprising:receiving, via an application programming interface (API), a first request to configure an allocation rule to dynamically allocate a network address space for a virtual network implemented in a service provider system, wherein the allocation rule comprises a condition that is based on a current utilization of network addresses within the virtual network and further comprises an allocation factor that indicates how the network address space is to be changed when the condition is satisfied;
monitoring the current utilization of network addresses within the virtual network;
determining that the condition of the allocation rule is satisfied;
determining, based at least on the allocation factor, a new size for the network address space to be made available for the virtual network, wherein the network address space has an initial size that is smaller than the new size;
configuring the network address space of the virtual network to be of the new size, wherein prior to the configuring of the network address space to be of the new size the network address space comprises a first range of network addresses, and wherein after the configuring of the network address space to be of the new size the network address space comprises a second range of network addresses;
receiving, via the API, a second request that specifies at least one subnet for the virtual network that is to be configured within the second range of network addresses; and
configuring the at least one subnet in the virtual network.

US Pat. No. 10,693,714

COMMUNICATION METHOD FOR WI-FI INTERNET OF THINGS EQUIPMENT AND WI-FI INTERNET OF THINGS SYSTEM

ESPRESSIF SYSTEMS (SHANGH...

1. A Wi-Fi Internet of Things device communication method for a Wi-Fi Internet of Things master control device to transmit control information to Wi-Fi Internet of Things controlled devices, the method comprising steps of:performing pairing of the Wi-Fi Internet of Things master control device with the Wi-Fi Internet of Things controlled devices to obtain media access control addresses and encryption keys of each other;
encrypting the control information in a preset encryption manner, wherein the preset encryption manner includes:
application layer encryption, which includes encrypting the private information structure with an encryption key at an application layer; and
media access control layer encryption, which includes encrypting the at least one of the Wi-Fi unicast packet and the multicast packet at a media access control layer with an encryption key; and
transmitting, by the Wi-Fi Internet of Things master control device in a media access control layer non-connection mode without establishing a WiFi communication session, the encrypted control information to the Wi-Fi Internet of Things controlled devices, where the Wi-Fi Internet of Things master control device is paired with the Wi-Fi Internet of Things controlled devices, by loading a private information structure into at least one of a Wi-Fi unicast packet and a multicast packet.

US Pat. No. 10,693,711

REAL-TIME EVENT CORRELATION IN INFORMATION NETWORKS

EMC IP Holding Company LL...

1. A method, comprising:performing, by a network management system, a network management process to provide automated event correlation analysis for an information network, wherein performing the network management process comprises:
obtaining, by the network management system, delta topology information, wherein the delta topology information specifies modifications to a previous topology of the information network;
generating, by the network management system, a modified topology of the information network based on the delta topology information;
utilizing, by the network management system, the delta topology information to generate a delta causality matrix, wherein the delta causality matrix comprises information which indicates a difference in one or more problem-symptom relationships included in a causality matrix that is associated with constituent objects in the previous topology of the information network;
utilizing, by the network management system, the delta causality matrix to modify at least one context which comprises a first set of related symptoms and problems associated with the constituent objects in the previous topology of the information network, such that the modified context comprises a second set of related symptoms and problems associated with constituent objects of the modified topology of the information network;
performing, by the network management system, an event correlation operation utilizing the modified context and a set of current symptoms detected in the modified topology of the information network, to determine at least one problem within the modified topology of the information network which has a symptom signature that corresponds to the set of current symptoms, wherein performing the event correlation operation comprises (i) distributing the event correlation operation over a plurality of nodes to perform a plurality of context analysis operations, at least in part in parallel, using separate, independent contexts, and (ii) aggregating results of the plurality of context analysis operations to determine the at least one problem which has the symptom signature that corresponds to the set of current symptoms; and
performing, by the network management system, at least one automated action to correct the at least one determined problem in the information network.

US Pat. No. 10,693,707

SYSTEM FOR DECOMPOSING EVENTS FROM MANAGED INFRASTRUCTURES WITH SEMANTIC CLUSTERING

Moogsoft Inc., San Franc...

1. A system for decomposing events from a managed infrastructure,comprising:
one or more processors:
a memory including instructions that when executed by the one or more processors executes the following:
a first engine receiving data from a managed infrastructure that includes managed infrastructure physical hardware which supports the flow and processing of information; a second engine coupled to the first engine determining common characteristics of events and produces clusters of events relating to the failure of errors in the managed infrastructure, where membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information, and producing events that relate to the managed infrastructure while converting the events into words and subsets used to group the events that relate to failures or errors in the managed infrastructure, including the managed infrastructure physical hardware; and
a semantic clustering engine coupled to the first and second engines taking text from an event source, manipulates the text to produce a feature vector for each of an event, and the feature vector is feed into a clustering engine, with semantic clustering looking at text description of events, analyses the words in the text description, and groups them with other events when there is significant overlap; and
wherein a change to a managed infrastructure physical hardware component is made on the semantic clustering.

US Pat. No. 10,693,706

METHOD AND APPARATUS OF PERFORMING SIMULTANEOUS MULTI-AGENT ACCESS FOR COMMAND EXECUTION THROUGH A SINGLE CLIENT

KASEYA LIMITED, Dublin (...

1. A method, comprising:establishing a connection to a server;
identifying at least two agent identifiers identifying at least two agents corresponding to at least two endpoint devices to manage;
establishing a session between a session client and the at least two endpoint devices; and
transmitting a single command from the session client to the at least two agents of the at least two endpoint devices.

US Pat. No. 10,693,704

DYNAMIC ALLOCATION OF SERVICE COMPONENTS OF INFORMATION SERVICE IN HIERARCHICAL TELECOMMUNICATION ARCHITECTURE

B.yond, Inc., Frisco, TX...

1. A method for providing an information service in a network, comprising:determining allocation of service components of the information service to resources of a first plurality of computing devices that are hierarchically structured;
sending first instructions causing the first plurality of computing devices to deploy and execute service components allocated to the first plurality of computing devices to provide the information service;
detecting, after deploying the service components to the first plurality of computing devices according to the first instructions, an update event comprising an indication of a level of resources in one or more of the first plurality of computing devices dropping below a threshold level;
automatically updating the allocation of the service components to resources of a second plurality of computing devices that are hierarchically structured, responsive to detecting the update event, wherein the second plurality of computing devices does not include the one or more of the first plurality of computing devices with the level of resources dropping below the threshold level; and
sending second instructions causing the second plurality of computing devices to deploy and execute service components allocated to each of the second plurality of computing devices to provide the information service.

US Pat. No. 10,693,703

DISPLAYING CONTENT ITEMS BASED ON DEVICE STATUS

Google LLC, Mountain Vie...

1. A computer-implemented method to present content items on user devices, comprising:by one or more computing devices:
configuring an application to present content items on a user interface of a user computing device;
identifying an opportunity to serve a particular content item;
determining that a usage status of the application indicates that a user of the application is not actively engaged with the application;
upon determining that the user of the application is not actively engaged, obtaining the particular content item;
receiving, from the user computing device, one or more statuses associated with the user computing device;
weighting the one or more received statuses associated with the user computing device;
adjusting the particular content item based on the one or more weighted statuses; and
presenting the adjusted particular content item on the user interface of the user computing device.

US Pat. No. 10,693,699

METHOD AND TERMINAL FOR TRANSMITTING SYNCHRONIZATION SIGNAL IN V2X COMMUNICATION

LG ELECTRONICS INC., Seo...

1. A method of transmitting a synchronization signal by a user equipment (UE) for vehicle-to-something (V2X) communication in a wireless communication system, the method comprising:configuring one of a first UE type and a second UE type, based on a power capability of the UE;
transmitting the synchronization signal based on a first period when the UE is configured to the first UE type; and
transmitting the synchronization signal within a window on a time axis based on a number of times of message reception, when the UE is configured to the second UE type,
wherein the first UE type is for a UE contained in a vehicle,
wherein the second UE type is for a handheld UE,
wherein the synchronization signal of the UE configured to the second UE type is transmitted when the number of times of the message reception is a multiple of a predetermined value configured by higher layer signaling, and
wherein when a plurality of UEs including the UE are configured to the second UE type and to transmit a synchronization signal, each synchronization signal of the plurality of UEs is alternately transmitted.

US Pat. No. 10,693,697

APPARATUS AND METHOD FOR REDUCING PEAK TO AVERAGE RATIO IN WIRELESS COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A method for operating a transmission device in a wireless communication system, the method comprising:detecting a first peak and a second peak of an original signal;
generating, based on a complex gain of the first peak of the original signal, a first portion of a first cancelling pulse for attenuating the first peak;
storing coefficients corresponding to the first portion of the first cancelling pulse in an order;
generating a second portion of the first cancelling pulse by outputting the stored coefficients in a reverse order with respect to the order, during a process in which coefficients corresponding to a first portion of a second cancelling pulse for attenuating the second peak are stored; and
generating a transmission signal by applying the first cancelling pulse and the second cancelling pulse to the original signal.

US Pat. No. 10,693,696

APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING SIGNALS IN WIRELESS COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A signal transmission method of a transmitting apparatus in a wireless communication system, the method comprising:determining a plurality of phases for a plurality of frequency band units in a component carrier (CC);
applying the determined plurality of phases to signals generated for the plurality of frequency band units; and
transmitting the signals,
wherein each of the determined plurality of phases is applied to a signal of a corresponding frequency band unit among the plurality of frequency band units, and
wherein each of the plurality of frequency band unit is a resource element group (REG) unit in an arbitrary CC.

US Pat. No. 10,693,695

PEAK TO AVERAGE POWER RATIO SUPPRESSION

MAXLINEAR, INC., Carlsba...

1. A system comprising:a first peak-to-average-power ratio (PAPR) suppression circuit, a second peak-to-average-power ratio (PAPR) suppression circuit, and a first carrier aggregation modulator, said first PAPR suppression circuit comprising a plurality of second modulators,
wherein:
said first PAPR suppression circuit is operable to:
receive a first sequence of time-domain symbols to be transmitted;
alter said first sequence to generate a plurality of second sequences of time-domain symbols;
measure a PAPR corresponding to each of said second sequences; and
convey information related to at least a portion of said measurement to said second PAPR suppression circuit;
said second PAPR suppression circuit is operable to:
receive said first sequence of time-domain symbols to be transmitted; and
alter said first sequence based on said conveyed information to generate a third symbol sequence;
said first carrier aggregation modulator is operable to modulate said third symbol sequence; and
said plurality of second modulators is operable to perform same operations as said first modulator using lower resolution than said first modulator.

US Pat. No. 10,693,692

RECEIVER-SIDE PROCESSING OF ORTHOGONAL TIME FREQUENCY SPACE MODULATED SIGNALS

Cohere Technologies, Inc....

1. A wireless communication method, implemented by a wireless communication receiver, comprising:processing a wireless signal comprising information bits modulated using an orthogonal time frequency and space (OTFS) modulation scheme to generate time-frequency domain digital samples;
performing linear equalization of the time-frequency domain digital samples resulting in an equalized signal; and
inputting the equalized signal to a feedback filter operated in a delay-time domain to produce a decision feedback equalizer (DFE) output signal;
extracting symbol estimates from the DFE output signal; and
recovering the information bits from the symbol estimates;
wherein the processing the wireless signal includes applying a two-dimensional transform to generate the time-frequency domain digital samples;
wherein the applying the two-dimensional transform comprises a discrete Symplectic Fourier transform or applying a two-dimensional windowing function over a grid in the time-frequency domain.

US Pat. No. 10,693,690

DATA SYMBOL TRANSMISSION METHOD AND WIRELESS DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. A wireless device operating as a first wireless device, comprising:a processor configured to:
determine a location at which hardware switching needs to be performed in a current subframe and switching time of the hardware switching,
configure, according to the switching time, a first guard period for a first data symbol corresponding to the location, wherein a length of the first guard period is greater than or equal to that of the switching time, and
use, as a second data symbol, a data symbol in the subframe other than the first data symbol, and configure a second guard period for the second data symbol, and in response to determining that the length of the first guard period is shorter than a length of a second guard period, configure the length of the first guard period to be identical to the second guard period, and
a transmitter configured to send the subframe to a second wireless device;
wherein the first wireless device is a base station, and the second wireless device is a terminal; or, the first wireless device is a terminal, and the second wireless device is a base station.

US Pat. No. 10,693,683

SYSTEMS AND METHODS FOR RESILIENT HF LINKING

Rockwell Collins, Inc., ...

1. A high frequency (HF) communication device, comprising:a processor; and
a memory communicably coupled to the processor storing computer code instructions, the computer code instructions, when executed by the processor, cause the HF communication device to:
send an HF connection request to a second HF communication device;
receive, responsive to transmitting the HF connection request, a first data unit from the second HF communication device confirming receipt of the HF connection request by the second HF communication device;
transmit, responsive to receiving the first data unit, a predefined data load to the second HF communication device for use to estimate one or more parameters of a first wideband HF communication channel for transmitting data from the HF communication device to the second HF communication device, the predefined data load known to the second HF communication device;
receive, from the second HF communication device and responsive to transmitting the predefined data load, a second data unit including one or more estimates of the one or more parameters of the first wideband HF communication channel; and
transmit data to the second HF communication device over the first wideband HF communication channel according to a data rate defined based on the one or more estimates of the one or more parameters of the first wideband HF communication channel.

US Pat. No. 10,693,682

ELECTRONIC DEVICE SUPPORTING MULTI-BAND WIRELESS COMMUNICATIONS AND METHOD OF CONTROLLING SAME

Samsung Electronics Co., ...

1. An electronic device, comprising:a first communication circuit configured to support a first frequency band;
a second communication circuit configured to support a second frequency band; and
a processor operatively coupled to the first communication circuit and the second communication circuit;
wherein the processor is configured to:
receive at least one first radio signal through a communication channel from an external device using the first communication circuit,
determine a state of the communication channel based on at least part of the at least one first radio signal and further based on whether the electronic device and the external device are in a line of sight (LoS), the state of the communication channel affecting the second communication circuit, and
activate the second communication circuit based on at least part of the determined state of the communication channel.

US Pat. No. 10,693,681

OFDM TRANSMISSION/RECEPTION DEVICE FOR TRANSMITTING AND RECEIVING OFDM SYMBOLS HAVING A VARIABLE DATA TRANSMISSION RATE AND METHOD THEREOF

SAMSUNG ELECTRONICS CO., ...

1. A transmitting apparatus, the transmitting apparatus comprising:a processor configured to:
identify a first pilot insertion pattern from among a plurality of pilot insertion patterns, and
insert pilot tones into at least one of a plurality of orthogonal frequency division multiplexing (OFDM) symbols based on the first pilot insertion pattern; and
a transmitter configured to transmit a signal which is generated based on the plurality of OFDM symbols,
wherein the signal comprises information about the first pilot insertion pattern,
wherein a distance between a first insertion position of a first pilot in a first OFDM symbol and a second insertion position of the first pilot in a second OFDM symbol is six tones in the first pilot insertion pattern,
wherein a distance between the first insertion position of the first pilot and a third insertion position of the first pilot is twelve tones in the first OFDM symbol in the first pilot insertion pattern, and
wherein the first pilot is not inserted in at least one OFDM symbol between the first OFDM symbol and the second OFDM symbol in the first pilot insertion pattern.

US Pat. No. 10,693,680

METHODS AND APPARATUSES FOR ENABLING SECURE COMMUNICATION BETWEEN MOBILE DEVICES AND A NETWORK

HAND HELD PRODUCTS, INC.,...

10. An apparatus for establishing a secure communication channel between a network establishment service and a monitoring node, the apparatus comprising:a processor configured to retrieve a monitoring node identifier (MID) corresponding to the monitoring node associated with a monitoring platform, wherein the MID comprises a private token unique to the monitoring node;
node configuration circuitry configured to identify, based on location information associated with the monitoring node, a preferred gateway node from a plurality of gateway nodes for communicating with the monitoring node, and logically pair the monitoring node with the preferred gateway node, wherein logically pairing the monitoring node with the preferred gateway node includes storing, by a memory of the network establishment service, association information identifying the MID and an identifier of the preferred gateway node; and
communications circuitry configured to transmit the association information to the preferred gateway node, wherein transmission of the association information causes the preferred gateway node to generate secure messages to the monitoring node, wherein the secure messages are encrypted using the MID.

US Pat. No. 10,693,678

DATA CENTER NETWORKS

Tigera, Inc., San Franci...

1. A system, comprising:a processor;
a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to:
receive, at a packet forwarding function comprised within a server in a data center network, a data packet being routed to a first virtual system having a first IP address or from the first virtual system, wherein the first virtual system is hosted on the server, wherein the first IP address is a destination IP address in the event the data packet is being routed to the first virtual system and the first IP address is a source IP address in the event the data packet is being routed from the first virtual system;
determine, by the packet forwarding function, a destination of the received data packet at least in part by querying a packet forwarding data store, wherein a source of the received data packet has a corresponding source IP address and the destination of the received data packet has a corresponding destination IP address, wherein the packet forwarding function is configured to determine whether an entry of the packet forwarding data store includes a combination of the corresponding source IP address and the corresponding destination IP address; and
in response to determining that the packet forwarding data store does not include an entry that includes the combination of the corresponding source IP address and the corresponding destination IP address, drop, by the packet forward function, the data packet, wherein the corresponding source IP address or the corresponding destination IP address do not match the first IP address; and
a physical network interface configured to:
forward data packets between the first virtual system and one or more servers external to the data center network via the physical network interface; and
connect a first network which is reachable by the physical network interface on the server to a second network which includes at least the first virtual system,
wherein the packet forwarding function has an internal IP address in the second network and an external IP address in the first network, wherein the processor is configured to advertise in the first network the external IP address of the packet forwarding function as a default route for data packets originating in the first network, and wherein the processor is further configured to advertise in the second network the internal IP address of the packet forwarding function as a next hop IP address for data packets being routed to the first virtual system.

US Pat. No. 10,693,677

METHOD, DEVICE, AND SYSTEM FOR CONTROLLING TUNNEL IDENTIFIER ALLOCATION

HUAWEI TECHNOLOGIES CO., ...

1. A method for managing tunnel endpoint identifier (TEID) for a serving gateway (SGW) in a current procedure, wherein the method is performed by the SGW and comprises:receiving a modify bearer request from a mobility management entity (MME) in the current procedure, wherein the modify bearer request indicates to the SGW whether it is allowed to change a first TEID in the current procedure, and wherein the first TEID is assigned by the SGW;
based on the modify bearer request indicating that the SGW is allowed to change the first TEID, assigning a second TEID to replace the first TEID;
based on the modify bear request indicating that the SGW is not allowed to change the first TEID, keeping the first TEID unchanged; and
sending a modify bearer response to the MME in the current procedure;
wherein the modify bearer response carries the second TEID if the second TEID is assigned by the SGW, and the modify bearer response carries no TEID if the first TEID is not changed; and
wherein when the current procedure is a tracking area update procedure (TAU) initiated by a terminal device in an idle state, the modify bear request indicates that the SGW is allowed to change the first TEID, and when the current procedure is one of a plurality of procedures other than the TAU procedure, the modify bear request indicates that the SGW is not allowed to change the first TEID, and wherein the plurality of procedures include a handover procedure.

US Pat. No. 10,693,673

METHOD AND APPARATUS FOR ROUTING DATA TO CELLULAR NETWORK

Nokia Technologies Oy, E...

1. An apparatus, comprising:at least one processor; and
at least one memory including computer program code, where the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to at least:
route traffic between a wide area network connection and a plurality of local network devices associated with a communication network;
form the wide area network connection in any of a plurality of connection types;
control the router to identify each local network device of the plurality of the local network devices;
automatically determine based at least on a packet inspection of traffic protocols of each port defined by data of the traffic for each of the identified local network devices, a suitable connection type out of the plurality of connection types using packet inspection of a data packet of the traffic, wherein the packet inspection comprises determining a communication protocol of the data packet based on a port defined by the data packet; and
based on the determining:
arrange for each of the identified network devices to use at least one of a different network and a different gateway associated with the communication network to form a plurality of physical links different than other concurrently existing physical links for use by the different connection types,
assign a different physical link of the plurality of physical links to each identified network device of the identified network devices for the suitable connection type for communication by different ones of the identified network devices with different connection types of the plurality of connection types over the communication network,
and
tear down physical links of the other concurrently existing physical links that are no longer used for the different connection types.

US Pat. No. 10,693,672

SECURITY AND ENVIRONMENTAL CONTROL BASED ON VIRTUAL REALITY HEADSET USAGE

Crackle, Inc., Culver Ci...

1. A method of providing a notification to a user of a display in which user awareness of their environment is reduced, comprising:in a system including a hub computing environment and a display, the display being one in which user visual awareness of a surrounding environment is reduced, the display driven by a display computing environment, the hub computing environment being coupled to at least one initiator device, the at least one initiator device being selected from the group consisting of: an entry sensor, an alarm sensor, or a network device, transmitting a signal to the hub computing environment as a result of activation of the initiator device; and
in response to the received signal, determining if a notification should be delivered to the display, the determining based at least in part on the signal and on a user profile; andif the determining is such that the notification should be delivered to the display, then displaying the notification on the display.

US Pat. No. 10,693,670

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD

FUJITSU LIMITED, Kawasak...

1. An information processing apparatus comprising:a memory; and
a processor coupled to the memory and configured to:
store, in the memory, a second identifier to identify a conference with another information processing apparatus, which is coupled to the information processing apparatus for the conference, and a location identifier to identify a location of the conference in association with each other;
acquire, from one or more terminals coupled to the information processing apparatus, a first snapshot of shared information which is shared with the another information processing apparatus at a time during the conference and a first identifier to identify the conference;
determine whether or not the first identifier matches the second identifier stored in the memory by referring to the memory;
when determining that the first identifier matches the second identifier stored in the memory, determine whether or not the location identifier for the second identifier matches a location identifier for the information processing apparatus;
when determining that the location identifier for the second identifier does not match the location identifier for the information processing apparatus, perform coupling to the another information processing apparatus that is a source of the second identifier stored in the memory and acquire a second snapshot from the another information processing apparatus; and
reproduce the shared information shared with the coupled another information processing apparatus from one of the first snapshot and the second snapshot.

US Pat. No. 10,693,669

SYSTEMS AND METHODS FOR AN ADVANCED MODERATED ONLINE EVENT

SYNGRAFII INC., Toronto ...

1. A computer network implemented system for providing an interactive online event, the system comprising:a processor;
a memory in communication with the processor, the memory storing instructions that, when executed by the processors, cause the processor to:
provide an attendee interface for an attendee device operated by an attendee to participate in the interactive online event, and a user interface for a user device operated by a user to participate in the interactive online event;
receive a portion of a video stream of the attendee from the attendee interface, the video stream generated by one or more cameras connected to the attendee interface and positioned to capture the attendee;
receive a portion of a video stream of the user from the user interface, the video stream of the user generated by one or more cameras connected to the user interface and positioned to capture the user;
authenticate an identity of the attendee based at least in part on a comparison of the portion of the video stream of the attendee and an image associated with a profile of the attendee;
authenticate an identity of the user based at least in part on a comparison of the portion of the video stream of the user and an image associated with a profile of the user;
upon authentication of the identity of the attendee and the identity of the user, enable real time communications between the attendee interface and the user interface for the attendee and the user to participate in a one-on-one interaction;
receive electronic signals representative of handwriting of the user used to sign or dedicate a digital object to the attendee; and
authenticate the digital object based at least in part on a comparison of the electronic signals and biometric features associated with the profile of the user, an IP address of hardware used for the signing or dedicating, and an IP address associated with the user.

US Pat. No. 10,693,667

METHODS AND APPARATUS FOR EXCHANGING COMMUNICATION SIGNALS VIA A CABLE OF TWISTED PAIR WIRES

1. A first device, comprising:a processing system including a processor; and
a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising:
obtaining energy from at least one first twisted pair wires of a cable, wherein the at least one first twisted pair wires is selected from at least one of a plurality of binders, wherein each respective binder of the plurality of binders includes a plurality of twisted pair wires, and wherein the at least one first twisted pair wires is coupled to a power source; and
transmitting first communication signals via at least one second twisted pair wires of the plurality of binders, wherein the at least one second twisted pair wires differs from the at least one first twisted pair wires supplying the energy to the first device, wherein the at least one second twisted pair wires comprises at least a first wire and at least a second wire twisted in a pair and electrically shorted resulting in a combined wire, wherein the first communication signals are directed to a second device via the combined wire, wherein propagation of the first communication signals along the combined wire is enabled by utilizing an electrical return path provided by a metallic shield of the cable, and wherein a message wire of the cable supports placement of the first device on the cable.

US Pat. No. 10,693,666

DEVICE AND METHOD FOR PARALLEL POWERING

SIGNIFY HOLDING B.V., Ei...

1. A device for allowing parallel powering, comprising:a characteristic setting unit for setting an impedance as a characteristic, wherein the characteristic is used for signaling the presence of a compliant powered device arranged to be powered by Power-over-Ethernet and wherein the characteristic is to be detected by a power source equipment via a supply line for powering,
a sensor coupled to the supply line, wherein the sensor is arranged for checking for an application of a detection voltage and/or detection current by the power source equipment to the supply line for detection of a compliant device and for outputting a sensor signal when an unsuccessful attempt for detection of a compliant device is recognized, and
a controller coupled to the characteristic setting unit and the sensor wherein the controller is arranged, upon receipt of the sensor signal from the sensor, for controlling the characteristic setting unit so to change the characteristicwherein the device is a powered device arranged for being powered via the supply line and the characteristic setting unit is an interface for presenting the characteristic to the supply line in order to signal the presence of the powered device orwherein the device is a connecting unit arranged for coupling the power source equipment and at least one powered device andwherein the device includes at least a portion of the supply line.

US Pat. No. 10,693,663

TWO DIMENSIONAL CODE GENERATION AND RECOGNITION

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:receiving, by a first server, registration information from a second server for authenticating and registering the second server;
registering, by the first server, the second server if the registration information is authenticated;
saving, by the first server, the registration information;
receiving, by the first server, a request from the second server for generating a two-dimensional (2D) code, wherein the request includes information to be encoded to the 2D code;
in response to receiving, by the first server, the request from the second server for generating the 2D code:
determining, by the first server, that the second server has registered at the first server;
digitally signing, by the first server, the information to be encoded to the 2D code by generating a digital signature using asymmetrical encryption; and
sending, by the first server, the digitally signed information to the second server to be encoded to the 2D code by the second server;
decrypting the 2D code after the 2D code is scanned by a user computing device; and
saving a record that the 2D code is scanned, wherein the record includes identity information of the second server that encodes the 2D code.

US Pat. No. 10,693,661

DYNAMIC SIGNATURE GENERATION FROM KEYSTROKE DYNAMICS

1. A system that is configured to authenticate a user of a computing device as the user is typing on a keyboard, the system comprising:a processor; and
memory that stores instructions that, when executed by the processor, cause the processor to perform acts comprising:
constructing an observed signature for the user based upon a first amount of time taken by the user to complete a keystroke pattern, the first amount of time measured as at least one keystroke associated with the keystroke pattern is set forth by the user as the user is typing on the keyboard, wherein constructing the observed signature comprises:
constructing a bitstream that comprises a bit value that is assigned to the keystroke pattern, wherein the bit value indicates whether the first amount of time taken by the user to complete the keystroke pattern is greater than an average amount of time taken by multiple users to complete the keystroke pattern;
generating a cryptographic key based upon the bitstream; and
generating the observed signature based upon the cryptographic key;
comparing the observed signature for the user with an authentication signature for the user, the authentication signature previously constructed based upon a second amount of time previously taken by the user to complete the keystroke pattern, the second amount of time measured when the user previously typed on the keyboard; and
authenticating the user of the computing device based upon the comparing of the observed signature of the user with the authentication signature for the user such that the computing device continues to permit the user to control at least one operation of the computing device.

US Pat. No. 10,693,660

METHOD AND SYSTEM FOR SECURE DATA STORAGE EXCHANGE, PROCESSING, AND ACCESS

1. A method of controlling access to data objects, comprising:a first user creating a data object in a container in a cloud or private data center object storage that has an access control list;
the first user creating a first metadata object in the cloud or private data center object storage comprising data access information for the data object;
the first user creating a second metadata object in the cloud or private data center object storage comprising the data access information for the data object;
wherein a second user has access to the second metadata object;
wherein the second user does not have access to the first metadata object;
determining access to the data object by the data access information and the access control list,
the first user signing the first metadata object with a first signature key;
the first user signing the second metadata object with the first signature key;
the second user verifying that the second metadata object is signed by the first user; and
the second user signing the second metadata object with a second signature key.

US Pat. No. 10,693,659

GENERATING PSEUDO RANDOM NUMBERS FOR QUANTUM COMPUTING SECURE AUTHENTICATION

International Business Ma...

1. A generator device being configured for generating pseudo random numbers, the generator device comprising a processor and a memory storing instructions for:(i) calculating a first hash chain from an initial hash value (H_0), the first hash chain comprising a first sequence of M hash values (HA_1, HA_2, . . . , HA_M), with index M being a positive integer;
(ii) calculating a second hash chain comprising a second sequence of M hash values (HB_1, HB_2, . . . , HB_M) from the initial hash value (H_0) and the hash values (HA_1, HA_2, . . . , HA_M) of the first sequence, wherein calculating the second hash chain comprises:
a. calculating a first hash value (HB_1) of the second sequence from the initial hash value (H_0) and a last hash value (HA_M) of the first sequence, and
b. calculating a subsequent hash value (HB_n+1) of the second sequence from a preceding hash value (HB_n) of the second sequence and a value (HA_1?1) of the first sequence preceding the hash value (HA_1) of the first sequence that has been used to calculate the preceding hash value (HB_n) of the second sequence, with index n, 1 being a positive integer from 1 to M; and
(iii) determining the pseudo random numbers from the hash values (HB_1, HB_2, . . . , HB_M) of the second sequence; and
(iv) using a cryptographic algorithm based on the pseudo random numbers for quantum computing secure authentication.

US Pat. No. 10,693,651

SYSTEM AND METHOD FOR AUTHENTICATION USING BIOMETRIC HASH STRINGS

Sokken Corporation, Stev...

1. A biometric authorization system, comprising:one or more databases coupled via a network;
one or more processors coupled to the one or more databases; and
at least one computing device coupled to the one or more processors and the one or more databases via the network; wherein the one or more processors are configured to:
extracting one or more features of a first biometric sample corresponding to a body of a user;
encoding the features of the first biometric sample as a first biometric hash string;
verifying the first biometric hash string is equal to a previously inputted biometric hash string, wherein the previously inputted biometric hash string equates with the identity of the user;
converting the first biometric hash string into a first alpha numeric device, wherein the first alpha numeric device is configured to act as an authorization code for authenticating an identity by an institution;
comparing the first biometric hash string and the first alpha numeric device to a second biometric hash string and a second alpha numeric device created by a parallel cyclic check wherein the first alpha numeric device or the first biometric hash string are fed back through the biometric authorization system; and
generating a packet configured for transmission to at least one institution, the packet comprising the alpha numeric device.

US Pat. No. 10,693,650

BIOMETRIC IDENTITY VERIFICATION SYSTEMS, METHODS AND PROGRAMS FOR IDENTITY DOCUMENT APPLICATIONS AND RENEWALS

MASTERCARD INTERNATIONAL ...

1. An identity verification computing device for processing a digital passport application, the identity verification computing device comprising one or more processors in communication with one or more memory devices and being configured to:receive an encrypted identity document request from a user computing device including a biometric value, a digital passport object identifier, and request data;
retrieve trusted biometric data based on the digital passport object identifier from an identity database of a payment card processing system, the trusted biometric data used by the payment card processing system for authenticating payment card transactions;
determine a verification score based on the trusted biometric data and the biometric value;
generate a data package including the verification score, the digital passport object identifier, and the request data;
generate a cryptographic signature for the data package based on a hash value of the data package and a key value associated with a sponsoring authority computing device, wherein the sponsoring authority computing device is separate from the payment card processing system and is associated with a passport issuing authority;
append the cryptographic signature to the data package; and
transmit the data package to the sponsoring authority computing device.

US Pat. No. 10,693,648

SYSTEM AND METHOD FOR DYNAMIC GRID AUTHENTICATION

CA, Inc., New York, NY (...

1. A method comprising:dynamically generating an authentication grid that identifies an association between a first set of characters and a second set of characters;
based on a shared secret associated with a user, generating an encrypted version of the authentication grid;
converting the encrypted version of the authentication grid into machine-readable authentication code;
transmitting the machine-readable authentication code to a first computing device associated with the user;
generating a challenge comprising at least one character in the first set of characters identified in the authentication grid;
transmitting the challenge to a second computing device associated with the user;
receiving user input from the second computing device, the user input comprising at least one second character in the second set of characters, the at least one second character based on the machine-readable authentication code; and
authenticating the user based at least in part on the authentication grid and a mapping of the at least one character in the first set of characters in the challenge to the at least one second character as received in the user input based on the machine-readable authentication code.

US Pat. No. 10,693,646

EVENT EXECUTION USING A BLOCKCHAIN APPROACH

Bank of America Corporati...

1. A computing platform, comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive, via the communication interface and from a first computing device, a blockchain and a first token associated with authenticating data included in the blockchain;
analyze the data included in the blockchain to determine that a second token must be received from a second computing device to determine if the data can be authenticated;
generate a first request for the second token from the second computing device; transmit, via the communication interface, the first request for the second token from the second computing device;
receive, via the communication interface, an indication from the second computing device that the second token will not be sent;
based on the indication, fail to authenticate the data included in the blockchain;
analyze the data included in the blockchain to determine that a third token must be received from a third computing device to determine if the data can be authenticated;
generate and transmit a second request for the third token from the third computing device;
cause display of the second request on a display of the third computing device;
receive, via the communication interface, the third token from the third computing device;
based on the first and the third tokens, authenticate the data included in the blockchain;
based on the authenticating, determine that execution of an event associated with the data is harmful; and
based on the determining that the execution of the event is harmful, generate an alert indicating that the execution of the event is harmful.

US Pat. No. 10,693,643

METHODS AND SYSTEMS FOR DISTRIBUTED CRYPTOGRAPHICALLY SECURED DATA VALIDATION

1. A method of distributed, cryptographically secured data validation, the method comprising:receiving, at a first validator, a first instance of an immutable sequential data structure, wherein the first instance of the immutable sequential data structure includes:
at least a first digitally signed textual element containing at least a first physical asset transfer field populated with at least a first physical asset transfer datum of a physical asset transfer; and
at least a second digitally signed textual element generated by at least a second validator, the at least a second digitally signed textual element containing a reference to the at least a first digitally signed textual element and at least a first validity flag indicating a determination by the at least a second validator of the validity of the at least a first physical asset transfer field;
authenticating, at the first validator, the first instance of the immutable sequential data structure;
generating, at the first validator, at least a second validity flag indicating a determination by the first validator of the validity of the at least a first physical asset transfer field;
detecting, at the first validator, a conflict between the at least a first validity flag and the at least a second validity flag; and
transmitting, by the first validator and to the at least a second validator, an indication of the conflict.

US Pat. No. 10,693,641

SECURE CONTAINER BASED PROTECTION OF PASSWORD ACCESSIBLE MASTER ENCRYPTION KEYS

BlackBerry Limited, Wate...

1. A method for controlling access to a master key including processing within a secure container, the method comprising:determining, by processing within the secure container, an encrypted master key by encrypting a master key based on an initial user password;
discarding the master key;
storing the encrypted master key into a protected storage;
receiving a request for the master key, the request comprising a present user password;
verifying, by processing within the secure container, the present user password received in the request based on comparison to the initial user password;
incrementing, by processing within the secure container based on failure of verifying the present user password, a failed attempt counter that is maintained within the secure container; and
locking out user password based access to the master key based on the failed attempt counter exceeding a threshold value.

US Pat. No. 10,693,639

RECOVERING A KEY IN A SECURE MANNER

BlackBerry Limited, Wate...

1. A method, comprising:transmitting, from a first user device to a secure community server, a key distribution request, wherein the key distribution request identifies a second user device, and the first user device and the second user device are members of a same secure community managed by the secure community server;
transmitting, from the first user device, a first portion of a recovery key to the secure community server for forwarding to the second user device, wherein the secure community server forwards the first portion of the recovery key to the second user device;
transmitting, from the first user device, a second portion of the recovery key to the secure community server, wherein the second portion of the recovery key is stored at the secured community server without being further distributed to other user devices;
after transmitting the first portion and the second portion of the recovery key, discarding the first portion and the second portion of the recovery key at the first user device;
transmitting a key recovery request to the secure community server for recovering the recovery key; and
in response to the key recovery request:
receiving, from the secure community server, the second portion of the recovery key that has not been further distributed to other user devices, wherein the received second portion of the recovery key is encrypted using a public key of the first user device; and
receiving the first portion of the recovery key from the second user device.

US Pat. No. 10,693,637

SYSTEM AND METHOD FOR COMPOSITE-KEY BASED BLOCKCHAIN DEVICE CONTROL

1. A method of controlling a blockchain device by a controlling system comprising:creating an at least one composite-key a unique identification key, wherein at least one control code is merged with the unique identification key to create the composite-key;
processing the composite-key to create a redeem-script, and a blockchain address;
wherein the redeem-script is capable of verifying a hash of the composite-key;
receiving the at least one control code to create at least one part of a controlling-data;
sending the at least one part of the controlling-data through a communication system;
wherein the controlling-data is defined as the redeem-script, the blockchain address, the at least one control code, a metadata, and the unique identification key.

US Pat. No. 10,693,635

SYSTEM AND METHOD FOR ENCRYPTION AND DECRYPTION BASED ON QUANTUM KEY DISTRIBUTION

Alibaba Group Holding Lim...

1. A computer system for facilitating storage encryption and decryption, the system comprising:a processor; and
a memory coupled to the processor and storing instructions, which when executed by the processor cause the processor to perform a method, the method comprising:
receiving a first request to encrypt data, wherein the first request indicates the data to be encrypted;
encrypting the data based on a first key;
determining a first key label for the first key;
transmitting the encrypted data and the first key label to a remote device;
receiving a second request to decrypt the encrypted data, wherein the second request indicates the encrypted data and the first key label for the first key used to encrypt the data;
obtaining a second key from a first key pool;
generating a first synchronization request for a key-managing device, which causes the key-managing device to obtain from a second key pool of the key-managing device a third key which is the same as the second key;
encrypting, based on the second key, the first key label;
transmitting a third request for the first key, wherein the third request includes the encrypted first key label;
receiving the first key, wherein the received first key is encrypted based on the third key;
decrypting, based on the second key, the encrypted received first key to obtain a decrypted first key; and
decrypting the encrypted data based on the decrypted first key.

US Pat. No. 10,693,629

SYSTEM AND METHOD FOR BLOCKCHAIN ADDRESS MAPPING

Alibaba Group Holding Lim...

1. A computer-implemented method for blockchain address mapping, to be performed by a system for blockchain address mapping, comprising:obtaining, from a client, one or more local accounts, one or more identifications of one or more blockchains, and one or more requests for creating in the one or more blockchains a plurality of blockchain addresses in association with the one or more local accounts, wherein the client corresponds to the one or more local accounts in the system;
generating a plurality of public-private key pairs respectively for the plurality of blockchain addresses to be created;
creating the plurality of blockchain addresses respectively in the one or more blockchains, in association with the one or more local accounts and a plurality of public keys of the plurality of public-private key pairs; and
transmitting a notification to the client for the client to correspondingly store the one or more local accounts in association with the one or more identifications of the one or more blockchains, wherein:
the notification comprises the one or more local accounts for which the plurality of blockchain addresses are created and the one or more corresponding identifications of the one or more blockchains, and
the plurality of blockchain addresses and a plurality of private keys of the plurality of public-private key pairs are stored in the system and are not stored at the client.

US Pat. No. 10,693,628

ENABLING DISTANCE-BASED OPERATIONS ON DATA ENCRYPTED USING A HOMOMORPHIC ENCRYPTION SCHEME WITH INEFFICIENT DECRYPTION

International Business Ma...

1. A computer-implemented method, the method comprising steps of:generating multiple versions of a data point, wherein each of the multiple versions of the data point comprises a distinct value corresponding to a distinct Euclidean space;
encrypting each of the multiple versions of the data point;
storing the multiple encrypted versions of the data point across multiple databases; and
executing one or more distance-based algorithms on the multiple encrypted versions of the data point by using a finite decryption table across the multiple databases, wherein the finite decryption table stores a set of plaintext-ciphertext mappings between (i) multiple plaintext values and (ii) multiple encrypted ciphertext values corresponding to the multiple plaintext values;
wherein the steps are carried out by at least one computing device.

US Pat. No. 10,693,624

SIGNAL SENDING DEVICE, SIGNAL RECEIVING DEVICE, SYMBOL TIMING SYNCHRONIZATION METHOD, AND SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A receiving device, comprising:a receiving module, configured to receive a synchronization signal, wherein the synchronization signal comprises a first signal and a second signal, the first signal comprises N1 generalized Zadoff-Chu (ZC) sequences, the second signal comprises N2 generalized ZC sequences, N1 and N2 are positive integers, and the generalized ZC sequence is generated as:
ZC(n)=e?j?un(n+1+2q)/L,q?Z,L?Z+,n=0,1, . . . L?1,0<|u| different cells or different cell groups correspond to different second signals; and
there are at least two generalized ZC sequences in (N1+N2) generalized ZC sequences comprising the N1 generalized ZC sequences and the N2 generalized ZC sequences, and root indexes of the two generalized ZC sequences are different;
there are at least two generalized ZC sequences in (N1+N2) generalized ZC sequences comprising the N1 generalized ZC sequences and the N2 generalized ZC sequences, and lengths of the two generalized ZC sequences are different; and
a processing module, configured to: perform a first sliding correlation operation on the synchronization signal by using each of the N1 generalized ZC sequences locally stored by the receiving device; traverse at least two groups of N2 generalized ZC sequences that are locally stored, and perform a second sliding correlation operation on the received synchronization signal by using each generalized ZC sequence in each group of N2 generalized ZC sequences; perform symbol timing synchronization according to a result of each first sliding correlation operation and a result of each second sliding correlation operation; and if different cells correspond to different second signals, determine, according to the result of each first sliding correlation operation and the result of each second sliding correlation operation, a cell identifier of a cell in which the receiving device is located; or if different cell groups correspond to different second signals, determine, according to the result of each first sliding correlation operation and the result of each second sliding correlation operation, a cell group identifier of a cell group in which the receiving device is located.

US Pat. No. 10,693,623

REFERENCE SUBFRAMES FOR SYNCHRONIZATION AND CELL MEASUREMENTS

Apple Inc., Cupertino, C...

1. A first base station, comprising:a radio; and
a processing element;
wherein the radio and the processing element are configured to:
transmit a plurality of subframes to one or more wireless user equipment devices (UEs) during a time period when no data communications are performed by a first cell of the first base station, wherein the one or more UEs are in a coverage area corresponding to the first cell, wherein the first cell operates according to a cellular radio access technology in an unlicensed frequency band;
wherein the plurality of subframes comprise first dedicated synchronization and measurement subframes, wherein the first dedicated synchronization and measurement subframes are also comprised in a plurality of dedicated synchronization and measurement subframes, wherein each one of the plurality of dedicated synchronization and measurement subframes comprises reference signals, wherein the first dedicated synchronization and measurement subframes are transmitted periodically according to a configured periodicity with other ones of the plurality of dedicated synchronization and measurement subframes periodically transmitted by other cells according to the configured periodicity during the time period when no data communications are performed by the other cells;
wherein the first cell is entirely silent in-between transmissions of the plurality of dedicated synchronization and measurement subframes during the time period, wherein the first cell does not transmit when it is entirely silent.

US Pat. No. 10,693,621

VIRTUAL CARRIER AGGREGATION FOR WIDEBAND OPERATION OF WIRELESS COMMUNICATION SYSTEMS

1. A device, comprising:a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising:
based on a field that jointly encodes a value representing a defined quasi-colocation behavior associated with a base station device, a slot index value representing a transmission time interval, and a subband index value representing a subband of subbands, adjusting the subband to form an aggregation of multiple subbands;
determining that a mobile device is in an idle state and that the mobile device has received a control message to facilitate scheduling a first transmission and a second transmission; and
facilitating transmission of the first transmission and the second transmission via the aggregation of multiple subbands, by the mobile device, as a proxy device for the base station device.

US Pat. No. 10,693,620

BANDWIDTH PART CONFIGURATION AND OPERATION

Ofinno, LLC, Reston, VA ...

1. A method comprising:receiving, by a wireless device from a base station, one or more first radio resource control (RRC) messages comprising first configuration parameters of bandwidth parts of a cell, the first configuration parameters indicating a first default bandwidth part of the bandwidth parts;
activating a bandwidth part of the bandwidth parts;
receiving one or more second RRC messages comprising second configuration parameters of the cell, the second configuration parameters indicating a reconfiguration of the first default bandwidth part to a second default bandwidth part of the bandwidth parts;
switching, while a bandwidth part inactivity timer is running for the bandwidth part, from the bandwidth part to the second default bandwidth part as an active bandwidth part in response to the reconfiguration of the first default bandwidth part; and
transmitting, in response to the switching, one or more uplink signals for the second default bandwidth part.

US Pat. No. 10,693,615

METHOD AND APPARATUS FOR MANAGING CONTENTION WINDOW IN WIRELESS COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A method for managing a contention window in a wireless communication system, the method comprising:transmitting multiple data in a reference duration within a channel occupancy interval for a latest downlink transmission for which reception result feedback is available;
obtaining a reception result corresponding to the multiple data;
setting the contention window to an initial value based on at least one acknowledge (ACK) signal included in the reception result; and
sensing a channel based on an adjusted or a maintained contention window,
wherein the reference duration is a duration starting from a beginning of the channel occupancy interval until an end of first transmission time interval where the multiple data is transmitted over all resources allocated for the multiple data.

US Pat. No. 10,693,613

TELECOMMUNICATIONS APPARATUS AND METHODS

CONVIDA WIRELESS, LLC, W...

1. A method of operating a terminal device in a wireless telecommunications system which supports a discontinuous reception (DRX) operating mode, wherein the DRX mode comprises a repeating cycle of DRX inactive periods in which the terminal device monitors a downlink channel from a base station and DRX active periods during which the terminal device may enter a power saving mode and not monitor the downlink channel from the base station, the method comprising:transmitting uplink signalling to the base station, wherein
the uplink signalling comprises a request for transmission resources as a trigger for downlink signalling on the downlink channel to be transmitted by the base station to the terminal device,
the uplink signalling further comprises acknowledgement signalling associated with a previous transmission from the base station to the terminal device,
the downlink signalling is related to an allocation of the transmission resources for the terminal device associated with and transmitted in response to the uplink signalling,
the downlink signalling is further related to a retransmission of the previous transmission,
the base station is configured to delay transmission of the downlink signalling to the terminal device until a subsequent DRX inactive period of the terminal device, and
the terminal device is configured to delay monitoring of the downlink channel for the downlink signalling from the base station until the subsequent DRX inactive period of the terminal device;
initializing a DRX active period after transmitting the uplink signalling and prior to monitoring the downlink channel for the downlink signalling from the base station, wherein
the base station is configured to receive the uplink signalling before expiration of the DRX active period, and
the base station is configured to transmit the downlink signalling to the terminal device as a response to the request for transmission resources only after the expiration of the DRX active period and after initialization of the subsequent DRX inactive period by the terminal device;
initializing the subsequent DRX inactive period after the expiration of the DRX active period; and
monitoring the downlink channel for the downlink signalling after initializing the subsequent DRX inactive period.

US Pat. No. 10,693,611

METHOD AND APPARATUS FOR TRANSMITTING A REFERENCE SIGNAL

ZTE CORPORATION, Shenzhe...

1. A method for transmitting a reference signal, comprising:obtaining a sequence group number of the reference signal according to the following pieces of information:
a number N of time domain symbols comprised in a time unit in which the reference signal is located; index information of time domain symbols in which the reference signal is located among the N time domain symbols comprised in the time unit; and
a time unit index obtained according to a subcarrier spacing of a bandwidth part (BWP) in which the reference signal is located;
determining the reference signal according to the sequence group number; and
transmitting the reference signal;
wherein
obtaining the sequence group number of the reference signal comprises: obtaining the sequence group number of the reference signal through the following manner:
the sequence group number u=(fgh(x)+fss)mod C;
fgh(x) is a function with respect to x, x comprises at least one of the pieces of information, C is a total number of sequence groups, fss is obtained according to a parameter comprised in received signaling information, and

wherein
h(x) is a function with respect to x, and h(x) satisfies h(l2, N, ns)=l2+ns*N,
l2 is the index information of the time domain symbols in which the reference signal is located among the N time domain symbols comprised in the time unit, 0?l2 ns is the time unit index obtained according to the subcarrier spacing of the BWP in which the reference signal is located,
D is an integer equaling to 8, and
c(z) is a z-th value in a sequence generated by a random sequence function c(?), and z is a non-negative integer.

US Pat. No. 10,693,610

SYSTEM AND METHOD FOR SRS SWITCHING, TRANSMISSION, AND ENHANCEMENTS

Futurewei Technologies, I...

1. A method comprising:transmitting, by a user equipment (UE), a first uplink sounding reference signal (SRS) over a first carrier of a wireless network during a first period;
switching, by the UE, from the first carrier to a second carrier in accordance with a first radio frequency (RF) retuning time, the first RF retuning time being a duration, defined by higher layer signaling from the UE to the wireless network, for switching from the first carrier to the second carrier; and
transmitting, by the UE, a second uplink SRS over the second carrier during a second period.

US Pat. No. 10,693,609

DATA PROCESSING METHOD AND DATA PROCESSING APPARATUS

Huawei Technologies Co., ...

1. A method comprising:receiving, by a data processing apparatus, indication information;
determining, by the data processing apparatus based on the indication information, coded blocks of K1 code block groups that need to be transmitted, wherein a transport block is segmented into C code blocks, C is a positive integer, and each code block of the C code blocks comprises multiple bits from the transport block, wherein each code block of the C code blocks is encoded into a coded block, wherein each coded block comprises bits from a corresponding code block and check bits, wherein the coded blocks correspond to K code block groups, K is a positive integer, K1 is a positive integer, and K1 is less than or equal to K, wherein the indication information comprises K bits, each of the K bits is either “1” or “0”, each of the K1 code block groups that need to be transmitted is a code block group corresponding to a bit “1” in the indication information;
processing, by the data processing apparatus, the coded blocks of the K1 code block groups to obtain bit sequences corresponding to the coded blocks of the K1 code block groups; and
outputting, by the data processing apparatus, the bit sequences.

US Pat. No. 10,693,608

TRANSMISSION METHOD, RECEPTION METHOD, TRANSMITTER, AND RECEIVER

SUN PATENT TRUST, New Yo...

3. A transmission system comprising: a signal processor; a first transmitter; a second transmitter; a third transmitter; and a fourth transmitter, whereinthe signal processor, in operation, generates first data symbols and second data symbols from transmission data,
the signal processor, in operation, applies a phase rotation to the second data symbols; an angle of the phase rotation being incremented by a constant value per data symbol,
the signal processor, in operation, generates first pilot symbols and second pilot symbols,
the signal processor, in operation, generates a first orthogonal frequency-division multiplexing (OFDM) symbol including the first data symbols and the first pilot symbols,
the signal processor, in operation, generates a second OFDM symbol including the phase rotated second data symbols and the second pilot symbols,
the first transmitter, in operation, applies a first phase changing process to the first OFDM symbol,
the first transmitter, in operation, transmits the first OFDM symbol to which the first phase changing process is applied from a first antenna,
the second transmitter, in operation, applies a second phase changing process to the second OFDM symbol,
the second transmitter, in operation, transmits the second OFDM symbol to which the second phase changing process is applied from a second antenna,
the third transmitter, in operation, applies a third phase changing process to the first OFDM symbol,
the third transmitter, in operation, transmits the first OFDM symbol to which the third phase changing process is applied from a third antenna,
the fourth transmitter, in operation, applies a fourth phase changing process to the second OFDM symbol,
the fourth transmitter, in operation, transmits the second OFDM symbol to which the fourth phase changing process is applied from a fourth antenna,
a polarization of the first antenna is different from a polarization of the second antenna, and
a polarization of the third antenna is different from a polarization of the fourth antenna.

US Pat. No. 10,693,603

METHOD FOR TRANSMITTING AND RECEIVING SIGNAL IN A WIRELESS LOCAL AREA NETWORK AND DEVICE FOR SAME

LG Electronics Inc., Seo...

1. A method of transmitting, by a first station (STA), a signal to a second STA through a plurality of channels in a wireless LAN (WLAN) system, the method comprising:transmitting a beam refinement protocol (BRP) packet to the second STA, wherein the BRP packet is generated based on a lowest modulation and coding scheme (MCS) to perform a beamforming training procedure on the plurality of channels, wherein the plurality of channels is generated based on a channel bonding scheme or a channel aggregation scheme; and
transmitting the signal to the second STA through the plurality of channels based on the beamforming training procedure,
wherein the BRP packet is configured in an order of a Legacy Short Training Field (L-STF) field, a Legacy Channel Estimation (L-CE) field, a Legacy Header (L-Header) field, an Enhanced Directional Multi Gigabit Header A (EDMG Header A) field, a Beam Refinement Protocol (BRP) data frame, and a Training (TRN) field,
wherein the BRP data frame is duplicated for the plurality of channels,
wherein the TRN field is transmitted through bonded channels based on the channel bonding scheme according to information in the EDMG Header A field.

US Pat. No. 10,693,602

SYSTEM AND METHOD FOR A LONG-TERM EVOLUTION (LTE)-COMPATIBLE SUBFRAME STRUCTURE FOR WIDEBAND LTE

Futurewei Technologies, I...

1. A method for scheduling transmissions, the method comprising:selecting, by a base station, a wideband micro-frame from a plurality of wideband micro-frames in a subframe of a wideband carrier for a wideband transmission, wherein the selected wideband micro-frame having a time duration that covers a first symbol of the subframe in the time-domain; and
scheduling, by the base station, the wideband transmission in the time duration of the selected wideband micro-frame for uplink or downlink transmissions in accordance with whether narrowband signaling carried in the first symbol is uplink narrowband signaling or downlink narrowband signaling, wherein a downlink wideband transmission is scheduled in the time duration of the selected wideband micro-frame when the downlink narrowband signaling is carried in the first symbol, and wherein an uplink wideband transmission is scheduled in the time duration of the selected wideband micro-frame when the uplink narrowband signaling is carried in the first symbol; and
signaling the wideband transmission scheduling to a user equipment (UE).

US Pat. No. 10,693,601

TERMINAL, BASE STATION, TRANSMISSION METHOD, AND RECEPTION METHOD

Panasonic Intellectual Pr...

1. A terminal comprising:a receiver which, in operation, receives information indicating a first subframe at which repetition transmission of a Scheduling Request (SR) starts and a second subframe at which repetition transmission of an Acknowledgement/Negative Acknowledgement (ACK/NACK) for a downlink data signal starts; and
a transmitter which, in operation, repeatedly transmits the SR using a defined number of consecutive subframes starting at the first subframe and the ACK/NACK using at least the defined number of consecutive subframes starting at the second subframe,
wherein the first subframe is set to the same time resource as the second subframe such that start positions of the SR repetition transmission and the ACK/NACK repetition transmission are the same, and a number of repetitions of the ACK/NACK is the same as a number of repetitions of the SR.

US Pat. No. 10,693,600

METHODS AND SYSTEMS FOR TRANSMITTING ERROR CORRECTION PACKETS

PISMO LABS TECHNOLOGY LIM...

1. A method carried out at a first communications router for transmitting data packets to a second communications router through a plurality of WAN interfaces:a. receiving a first data packet from a first host through a local area network (LAN) Interface, wherein the first data packet is destined to a second host reachable through the second communications router;
b. transmitting the first data packet to the second communications router through a first WAN interface;
c. storing the first data packet in a local storage medium;
d. retransmitting the first data packet to the second communications router through a second WAN interface;
e. transmitting an error correction packet corresponding to the first data packet through a third WAN interface;wherein at least two of the first WAN interface, the second WAN interface and the third WAN interface are two different WAN interfaces.

US Pat. No. 10,693,592

METHOD OF TRANSMITTING AND RECEIVING SYSTEM INFORMATION AND DEVICE THEREFOR

LG Electronics Inc., Seo...

4. An apparatus for receiving system information in a wireless communication system, the apparatus comprising:at least one processor; and
at least one computer memory operably connectable to the at least one processor and storing instructions that, when executed by the at least one processor, performs operations comprising:
receiving a Physical Downlink Control Channel (PDCCH) including Downlink Control Information (DCI) for scheduling the system information;
obtaining the DCI based on a System Information-Radio Network Temporary Identifier (SI-RNTI);
obtaining a bit in the DCI for determining the system information type from;
determining the system information type as Remaining Minimum System Information (RMSI) based on the bit being a first value or the system information type as Other System Information (OSI) based on the bit being a second value; and
receiving the system information based on the determined system information type.

US Pat. No. 10,693,591

DATA MAPPING METHOD AND APPARATUS IN WIRELESS COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A method, performed by a base station, of transmitting and receiving data in a wireless communication system, the method comprising:determining whether a code block (CB), one of a plurality of CBs included in a transport block (TB), is scheduled for a transmission based on code block group transmission information (CBGTI);
in response to the CB being scheduled for the transmission, determining a length of a sequence for the CB based on a number of CBs of the TB or a number of scheduled CBs of the TB;
generating the sequence for the CB according to the determined length of the sequence; and
transmitting a signal including the generated sequence.

US Pat. No. 10,693,588

TRANSMISSION DEVICE, TRANSMISSION METHOD, RECEPTION DEVICE, RECEPTION METHOD, INTEGRATED CIRCUIT, AND PROGRAM

SUN PATENT TRUST, New Yo...

1. A transmission device comprising:a split circuit configured to split baseband frames into first frames and second frames;
a first processor connected to the split circuit to perform error correction coding and mapping on the first frames to generate first cells consisting of a first initial cell and first remaining cells following the first initial cell;
a second processor connected to the split circuit to perform error correction coding and mapping on the second frames to generate second cells consisting of a second initial cell and second remaining cells following the second initial cell;
an exchange circuit connected to the first processor and the second processor to exchange a first subset of the first cells with a second subset of the second cells to generate a first exchanged cell stream and a second exchanged cell stream; and
a transmission circuit connected to the exchange circuit to transmit the first exchanged cell stream and the second exchanged cell stream in a first frequency band and a second frequency band, respectively,
wherein the first subset includes the first initial cell and the second subset includes the second initial cell.

US Pat. No. 10,693,586

METHOD FOR RECEIVING REFERENCE SIGNAL RESOURCES IN A WIRELESS COMMUNICATION SYSTEM AND APPARATUS

LG Electronics Inc., Seo...

1. A method for performing a Channel State Information-Reference Signal (CSI-RS) based reporting in a wireless communication system, the method performed by a User Equipment (UE) and comprising:receiving, from a base station, a configuration for a (i) first CSI-RS resource set that is based on a time unit and (ii) a second CSI-RS resource set that is based on a sub-time unit, wherein the time unit includes a plurality of sub-time units;
receiving a plurality of CSI-RS resources included in the second CSI-RS resource set; and
based on the plurality of CSI-RS resources being configured to be transmitted via different transmission beams, reporting a CSI-RS Resource Indicator (CRI) for the plurality of CSI-RS resources to the base station,
wherein, based on the plurality of CSI-RS resources being configured to be transmitted via the same transmission beam, the UE does not report any information including the CRI to the base station.

US Pat. No. 10,693,583

APPARATUS, SYSTEM AND METHOD OF COMMUNICATING A CHANNEL ESTIMATION FIELD WITH GOLAY SEQUENCES

INTEL CORPORATION, Santa...

1. An apparatus comprising:memory circuitry; and
a processor comprising logic and circuitry configured to cause an Enhanced Directional Multi-Gigabit (EDMG) wireless communication station (STA) to:
generate an EDMG Channel Estimation Field (EDMG-CEF) based on a first sequence having a length of 1536 and a second sequence having a length of 1536, the first sequence comprising a first combination of a pair of Golay complementary sequences of length 384, the second sequence comprising a second combination, different from the first combination, of the pair of Golay complementary sequences of length 384; and
transmit an EDMG Physical Layer (PHY) Protocol Data Unit (PPDU) comprising the EDMG-CEF over a channel bandwidth of 6.48 Gigahertz (GHz).

US Pat. No. 10,693,578

PREDICTIVE RADIO TUNING SYSTEMS AND METHODS FOR AIRCRAFT

Rockwell Collins, Inc., ...

1. A predictive radio tuning system for an aircraft, the predictive radio tuning system comprising:a processor configured to:
receive flight information from avionics of the aircraft and radio frequency information from an internet-based system wide information management system (SWIM); and
provide a list of predicted frequencies in response to the flight information and the radio frequency information when the aircraft is under prior conditions using previous selections of frequencies received via a virtual radio tuning panel under the prior conditions, wherein the list of predicted frequencies is displayed on the virtual radio tuning panel for selection by a user.

US Pat. No. 10,693,574

METHOD AND APPARATUS FOR EFFICIENT DATA TRANSMISSIONS IN HALF-DUPLEX COMMUNICATION SYSTEMS WITH LARGE PROPAGATION DELAYS

QUALCOMM Incorporated, S...

1. A method of determining a time lag of a return link time reference relative to a forward link time reference in a satellite communication system, the method comprising:determining a minimum round-trip propagation delay of signals between a ground station and a satellite;
determining a transition time for a half-duplex transceiver of the ground station to switch between a transmit mode and a receive mode;
determining a system parameter based on the transition time for the half-duplex transceiver to switch between the transmit mode and the receive mode;
determining the time lag of the return link time reference relative to the forward link time reference by offsetting the system parameter from the minimum round-trip propagation delay; and
scheduling at least one of one or more transmission operations by the satellite or one or more reception operations by the satellite in accordance with the determined time lag,
wherein the scheduling schedules the one or more transmission operations by the satellite on a first of n+k frames and the scheduling schedules the one or more reception operations by the satellite on a second set of n+k frames, where n is greater than or equal to zero,
wherein a leading edge of a frame k in the second set of n+k frames is skewed by the determined time lag at the satellite from a leading edge of a frame k in the first set of n+k frames,
wherein the return link time reference is a return link receiver time reference of the satellite, and
wherein the forward link time reference is a forward link transmitter time reference of the satellite.

US Pat. No. 10,693,570

DEVICE AND METHOD OF ANALYZING A RADIO FREQUENCY SIGNAL

1. A device for analyzing a radio frequency signal, comprising:an analyzing module that is configured to analyze input data relating to a multicarrier radio frequency signal with at least two carrier frequencies, said multicarrier analyzing module being further configured to calculate at least one of an optimized intermediate frequency or an optimized local oscillator frequency based on said input data, said multicarrier analyzing module being configured to calculate at least one of said optimized intermediate frequency or said optimized local oscillator frequency automatically.

US Pat. No. 10,693,567

VEHICLE COMMUNICATION SYSTEM AND METHOD

The Boeing Company, Chic...

1. A spacecraft comprising:a frame including a joint coupling a first frame portion to a second frame portion, wherein the joint is configured to provide relative movement between the first frame portion and the second frame portion; and
an acoustic communication system configured to transfer acoustic data signals across the joint between the first frame portion and the second frame portion;
wherein the joint includes a forced coupling system configured to bias the first frame portion against the second frame portion in a zero gravity environment so as to form an acoustic data transmission conduit from the first frame portion to the second frame portion.

US Pat. No. 10,693,565

COMPENSATING FOR ENTANGLEMENT LOSS IN COMMUNICATION LINES

The United States of Amer...

1. A method for compensating for entanglement loss in communication channels in a communication system comprising at least one entangled photon source and at least a first transmission channel and a second transmission channel, the first transmission channel exhibiting a first entanglement loss, the method comprising:providing a compensating loss element in the second transmission channel; and
selecting a compensating polarization dependent loss (PDLcomp) for being provided in the second transmission channel,
wherein the PDLcomp is selected to compensate for at least a portion of the first entanglement loss.

US Pat. No. 10,693,563

COHERENT OPTICAL RECEIVER

Elenion Technologies, LLC...

1. An apparatus for coherent demodulation of quadrature-modulated (QM) light, the QM light comprising two transmitter signals optically combined in quadrature, the apparatus comprising:an optical quadrature heterodyne receiver configured to receive the QM light and to obtain therefrom two electrical signals;
a phase-sensitive filter circuit configured to detect a heterodyne frequency (HF) tone in each of the two electrical signals so as to preserve a relative phase therebetween; and,
a demodulator circuit configured to decompose the two transmitter signals from the two electrical signals based at least in part on the HF tones to obtain two decomposed transmitter signals.

US Pat. No. 10,693,557

DUAL FIDELITY CONNECTIVITY ON-BOARD A VEHICLE

GOGO LLC, Chicago, IL (U...

13. A dual fidelity access point disposed within a vehicle that includes a plurality of seats having corresponding seatback devices installed thereat, the dual fidelity access point including:one or more transceivers configured to communicate with the plurality of devices via a radio frequency (RF) communication protocol, one or more light emitting diodes (LEDs) configured to emit light in accordance with a light fidelity (LiFi) communication protocol, wherein the emitted light is detected by photo-detectors operatively connected to respective seatback devices;
a bus interface communicatively coupled to a network controller; and
a controller configured to:
obtain, via the bus interface, data packets addressed to devices within a footprint of the dual fidelity access point;
identify data streams associated with the data packets, wherein one or more of the data streams are associated with seatback devices on-board the vehicle; analyze the data streams to determine a metric associated with the one or more data streams; and
based on the metric for a particular data stream associated with a particular seatback device, communicate the data packets that form the particular data stream to the particular seatback device via one of the one or more transceivers or the one or more LEDs.

US Pat. No. 10,693,552

BEAM TRAINING OF A RADIO TRANSCEIVER DEVICE

Telefonaktiebolaget LM Er...

1. A method for beam training of a radio transceiver device, the method being performed by the radio transceiver device, the radio transceiver device comprising at least two antenna arrays, the method comprising:receiving, during the beam training, a first set of occurrences of a reference signal using all the antenna arrays and such that one respective occurrence of the reference signal is received in one single wide beam at each of all the antenna arrays; and
receiving, during the beam training, a second set of occurrences of the reference signal using less than all antenna arrays and such that one respective occurrence of the reference signal is received in each respective narrow beam at each of the less than all antenna arrays,
wherein which of the less than all antenna arrays to receive the second set of occurrences of the reference signal is determined based on evaluation of reception of the first set of occurrences of the reference signal at each of all the antenna arrays,
wherein only a single one of the antenna arrays is used when receiving the second set of occurrences of the reference signal.

US Pat. No. 10,693,548

TWO REFERENCE SIGNAL BEAM REPORTING AND IDENTIFICATION

1. A user equipment device, comprising:a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising:
generating a beam index comprising a first group of signal measurements of a first type of reference signal, and a second group of signal measurements of a second type of reference signal; and
transmitting a report associated with the beam index to a network node device based on a signal measurement of a beam of the first group of signal measurements.

US Pat. No. 10,693,545

DIFFERENT SECTOR ROTATION SPEEDS FOR POST-AMBLE PROCESSING OF A BEAM FORMING PACKET

Apple inc., Cupertino, C...

1. A system, comprising:a first and second wireless communication device, respectively comprising a broadband processor and one or more antenna arrays;
the first wireless communication device, configured to:
provide an indication of a first rotation speed between a plurality of transmission sectors of the one or more antenna arrays at the first wireless communication device of the first wireless communication device as part establishing communications with the second wireless communication device;
transmit a packet to the second wireless communication device, wherein the transmission of a post-amble portion of the packet is performed according to the first rotation speed provided to the second wireless communication device;
the second wireless communication device, configured to:
determine a second rotation speed between reception sectors of the one or more antenna arrays at the second wireless communication device according based on the provided first rotation speed to capture power measurements between individual ones of the reception sectors and the transmission sectors based on the receipt of the post-amble portion of the packet from the first wireless communication device;
rotate between the reception sectors of the one or more antenna arrays at the second wireless communication device according to the second rotation speed;
compare the power measurements to identify one of the reception sectors at one of the one or more antenna arrays at the second wireless communication device with a greatest power measurement; and
transmit a second packet to the first wireless communication device using a transmission sector at one of the one or more antenna arrays at the second antenna array selected according to the identified reception sector.

US Pat. No. 10,693,538

APPARATUS, METHOD AND COMPUTER PROGRAM FOR GENERATING BROADCAST BEAMS

Huawei Technologies Co., ...

1. A method of operating an antenna element array to generate a first broadcast beam and a second broadcast beam, the method comprising:selecting from the antenna element array a first set of dual polarized antenna elements and a third set of dual polarized antenna elements, wherein the antenna element array comprises a plurality of dual polarized antenna elements, each dual polarized antenna element having a first input for a first polarization and a second input for a second polarization, and wherein each of the first set of dual polarized antenna elements and the third set of dual polarized antenna elements is arranged in a different half of the antenna element array;
selecting from the antenna element array a second set of dual polarized antenna elements and a fourth set of dual polarized antenna elements, wherein each of the second set of dual polarized antenna elements and the fourth set of dual polarized antenna elements is arranged in a different half of the antenna element array;
generating the first broadcast beam by feeding a first broadcast beam signal to the first input of each dual polarized antenna element of the first set and to the second input of each dual polarized antenna element of the second set; and
generating the second broadcast beam by feeding a second broadcast beam signal to the first input of each dual polarized antenna element of the third set and to the second input of each dual polarized antenna element of the fourth set, wherein the second polarization is orthogonal to the first polarization.

US Pat. No. 10,693,537

CODEBOOK SUBSET RESTRICTION METHOD

Huawei Technologies Co., ...

1. A field notification method, wherein the method comprises:receiving, by a user equipment, a first field, wherein the first field comprises T1 bits, the first field indicates one or more vectors that are allowed to be used to construct a precoding matrix W in a vector set, the precoding matrix W comprises N rows and R columns, N is greater than R;
determining, by the user equipment and based on the first field, the one or more vectors that are allowed to be used to construct the precoding matrix W in the vector set; wherein
R is equal to 3 or 4, an lth column of the precoding matrix W satisfies:
andl is a non-negative integer smaller than R?1, i is an integer, mi is a non-negative integer smaller than N2O2?1, li is a non-negative integer smaller than ½N1O1?1, N1 and N2 are positive integers and separately represent numbers of antenna ports in different dimensions, O1 and O2 are positive integers separately representing Discrete Fourier Transform (DFT) vector oversampling factors in different dimensions, ?pl is an element of set ?={?0, ?1, . . . , ?S?1}, S is a predefined positive integer, ?l is a complex number of a unit amplitude, T1=N1O1N2O2, the vector set is vector set B, B={b0, b1, . . . , bT2?1}, T2=½N1O1N2O2, a length of each vector in the vector set B is N/4, bit x of the T1 bits corresponds to a vector of vector set B, bit x indicates whether the corresponding vector is allowed to be used to construct the precoding matrix W, bit y of the T1 bits is corresponding to two vectors of vector set B, used to indicate whether the corresponding two vectors can construct the precoding matrix W, x satisfies a condition:
is an even number, y satisfies a condition:is an odd number, x and y are non-negative integers smaller or equal to T1?1, K2=N2O2, bk1 is selected from the one or more vectors that are indicated by the first field.

US Pat. No. 10,693,536

APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING PHASE COMPENSATION REFERENCE SIGNAL

Samsung Electronics Co., ...

1. A method performed by a terminal in a wireless communication system, the method comprising:receiving, from a base station, downlink control information (DCI) including information indicating an association between at least one demodulation reference signal (DMRS) antenna port and at least one phase tracking reference signal (PTRS) antenna port;
identifying a number of a-PTRS antenna port associated with uplink based on the DCI;
identifying a DMRS antenna port associated with uplink based on the DCI;
identifying a PTRS antenna port associated with uplink based on the DCI and the number of PTRS antenna port; and
transmitting, to the base station, a DMRS and a PTRS based on the DMRS antenna port associated with uplink and the PTRS antenna port associated with uplink.

US Pat. No. 10,693,534

WIRELESS COMMUNICATION DEVICE, WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION METHOD, AND COMPUTER-READABLE MEDIUM FOR TRANSMISSION OF TRANSMISSION WEIGHT INFORMATION

SONY CORPORATION, Tokyo ...

1. An electronic device comprisingcircuitry configured to:
control receiving a first reference signal or a second reference signal, the second reference signal being formed by weighting the first reference signal;
determine first transmission weight information and second transmission weight information based on reception of the first reference signal and the second reference signal; and
control transmitting of the first transmission weight information according to a first period and the second transmission weight information according to a second period, the first period being different from the second period,
wherein the second transmission weight information is determined and transmitted after the first transmission weight information is transmitted.

US Pat. No. 10,693,533

GENERATING AND PROCESSING MULTI-USER DATA UNITS FOR WLAN

Huawei Technologies Co., ...

1. A method for generating a multi-user data unit for transmission via a multiple input, multiple output (MIMO) communication channel, the method comprising:generating, at a communication device, a multi-user data unit having a preamble and a data portion, wherein the preamble of the multi-user data unit includes a plurality of training sequences, a first field, and a second field, wherein the preamble of the multi-user data unit is structured such that i) the first field of the preamble precedes the plurality of training sequences, and ii) the plurality of training sequences precedes the second field of the preamble, wherein the plurality of training sequences are to be used by multiple receivers for channel estimation, wherein the first field of the preamble includes a plurality of indications of respective numbers of spatial or space-time streams for respective receivers of the multiple receivers to enable each respective receiver of the multiple receivers to determine a respective set of one or more training sequences, in the plurality of training sequences, that corresponds to the respective receiver, wherein the second field of the preamble includes respective modulation and coding scheme information for the respective receivers of the multiple receivers, and wherein the data portion of the multi-user data unit is to be transmitted using respective modulation and coding schemes for the respective receivers of the multiple receivers; and
transmitting, with the communication device, the multi-user data unit.

US Pat. No. 10,693,532

OPERATION METHOD OF STATION IN WIRELESS LOCAL AREA NETWORK

NEWRACOM, INC., Lake For...

1. An operation method performed in a first station, the method comprising:generating a high efficiency (HE) preamble including first scheduling information of a first plurality of reception stations and second scheduling information of a second plurality of reception stations different from the first plurality of reception stations;
generating a physical layer protocol data unit (PPDU) including a legacy preamble, the HE preamble, and a payload, the payload being after the HE preamble and including a plurality of time domains, the plurality of time domains including a first time domain having a first plurality of data units to be transmitted to the first plurality of reception stations and a second time domain having a second plurality of data units to be transmitted to the second plurality of reception stations; and
transmitting the PPDU using one or more frequency bands,
wherein the first scheduling information includes 1) first resource allocation information indicating a resource in the first time domain allocated to the first plurality of reception stations, and 2) a first station identifier list including identification information for each of the first plurality of reception stations,
wherein the second scheduling information includes 1) second resource allocation information indicating a resource in the second time domain allocated to the second plurality of reception stations, and 2) a second station identifier list including identification information for each of the second plurality of reception stations, and
wherein the first resource allocation information includes a first allocation pattern of the one or more frequency bands, and the second resource allocation information includes a second allocation pattern of the one or more frequency bands.

US Pat. No. 10,693,528

ANTENNA ARRAY SHARING IN A MULTI-OPERATOR RADIO NODE IN A COMMUNICATIONS SYSTEM

1. A radio node for distributing communications signals in a communications system, comprising:a first signal processing circuit, comprising:
a first downlink input port configured to receive a first downlink communications signal from a first signal source associated with a first service provider; and
a first modem coupled to the first downlink input port, the first modem configured to form a plurality of first downlink signal streams in an individual spectrum of the first service provider and distribute each of the plurality of first downlink signal streams to a respective downlink signal processing output port among a plurality of first downlink signal processing output ports;
a second signal processing circuit, comprising:
a second downlink input port configured to receive a second downlink communications signal from a second signal source associated with a second service provider having a spectrum different than the spectrum of the first service provider;
a second modem coupled to the second downlink input port, the second modem configured to form a plurality of second downlink signal streams in an individual spectrum of the second service provider and distribute each of the plurality of second downlink signal streams to a respective downlink signal processing output port among a plurality of second downlink signal processing output ports; and
a plurality of downlink combiner circuits each comprising a first downlink combiner input port coupled to a first downlink signal processing output port among the plurality of first downlink signal processing output ports, a second downlink combiner input port coupled to a second downlink signal processing output port among the plurality of second downlink signal processing output ports, and a downlink combiner output port coupled to a respective radio-frequency (RF) chain circuit among a plurality of RF chain circuits;
each downlink combiner circuit among the plurality of downlink combiner circuits configured to combine a downlink signal stream among the plurality of first downlink signal streams on the first downlink combiner input port and a downlink signal stream among the plurality of second downlink signal streams on the second downlink combiner input port to generate a combined downlink signal stream on the downlink combiner output port;
the plurality of RF chain circuits each coupled to a downlink combiner output port of a respective downlink combiner circuit among the plurality of downlink combiner circuits and a respective antenna element among a plurality of antenna elements in an antenna array;
each RF chain circuit among the plurality of RF chain circuits configured to receive a respective combined downlink signal stream on the coupled downlink combiner output port, process the combined downlink signal stream into a combined RF downlink signal stream, and distribute the processed combined RF downlink signal stream to the coupled antenna element among the plurality of antenna elements in the antenna array.

US Pat. No. 10,693,527

DISTRIBUTED ANTENNA SYSTEM INCLUDING CREST FACTOR REDUCTION MODULE DISPOSED AT OPTIMUM POSITION

SOLiD, INC., Seongnam-si...

17. A distributed antenna system, comprisingat least one head-end device configured to receive mobile communication signals from a plurality of base stations; and
at least one remote device communicatively coupled to the at least one head-end device,
wherein the at least one remote device is configured to receive the mobile communication signals from the at least one head-end device,
wherein the at least one remote device is remotely disposed and configured to transmit the mobile communication signals to a terminal in service coverage,
wherein the at least one remote device includes:
an equalizer configured to perform an equalizing process of at least one of group delay, ripple, phase and amplitude of the mobile communication signals received from the at least one head-end device, and
a crest factor reduction (CFR) processor that is disposed posterior to the equalizer and performs CFR processing on the equalized signals output from the equalizer.

US Pat. No. 10,693,526

DEVICE AND METHOD FOR WIRELESS COMMUNCATION

ORANGE, Paris (FR)

1. A communication method on a first device, called a terminal, capable of receiving a first message in a radio carrier wave by using electromagnetic wave conduction capacities of a first channel whose medium is the body of a user carrying the terminal and of communicating with a second device over a second wireless channel having a medium distinct from the body of the user, wherein the method comprises the following acts on the terminal:receiving, on the first channel, the first message including at least one first pairing datum originating from the second device when the user enters a proximity of the second device;
establishing a communication session on the second channel with said second device, using said pairing datum;
communicating with said second device only on the second radio channel, independently of reception of data on the first channel.

US Pat. No. 10,693,524

SYSTEM AND METHOD FOR MECHANICALLY-BASED MAGNETIC-FIELD TRANSMITTER

UNIVERSITY OF ILLINOIS, ...

1. A low-frequency magnetic field transmitter, comprising:at least one rotor magnet mounted on an axle, the axle configured to rotate the at least one rotor magnet, wherein the axle being connected to a restoring spring that is configured to return the axle to a default position; and
wherein in response to rotation of the axle, at least one rotor magnet rotates and undergoes angular motion, creating time-periodic oscillation of a magnetic dipole and modulation of a magnetic field.

US Pat. No. 10,693,522

METHOD AND DEVICE FOR PERFORMING PUCCH FEEDBACK ON BASIS OF BEAMFORMED CSI RS RESOURCE IN WIRELESS COMMUNICATION SYSTEM

LG ELECTRONICS INC., Seo...

1. A method performed by a wireless device in a wireless communication system, the method comprising:receiving, from a base station, a plurality of beamformed channel state information reference signals (CSI-RSs) transmitted through a plurality of beams;
transmitting, to the base station, information for a set of candidate beams which are part of the plurality of beams, on a data channel; and
transmitting, to the base station, a precoding type indicator (PTI) informing a preferred beam among the candidate beams, on a physical uplink control channel (PUCCH),
wherein the preferred beam is determined based on a result of a measurement on the plurality of beamformed CSI-RSs,
wherein a size of the PTI is determined based on a number of the candidate beams, and
wherein each possible bit value of the PTI is mapped to each element of the set of the candidate beams.

US Pat. No. 10,693,521

DEVICES AND METHODS FOR BACKSCATTER COMMUNICATION USING ONE OR MORE WIRELESS COMMUNICATION PROTOCOLS INCLUDING BLUETOOTH LOW ENERGY EXAMPLES

University of Washington,...

1. A device comprising:an antenna configured to receive an incident signal having a carrier frequency;
a modulator; and
a waveform generator, wherein the waveform generator is configured to provide a subcarrier frequency, and wherein the waveform generator is further configured to control the modulator to backscatter the incident signal having the carrier frequency using the subcarrier frequency to provide a backscattered signal to the antenna, the backscattered signal including a bandpass signal in a frequency range associated with a Bluetooth standard, wherein the backscattered signal comprises a packet formatted in accordance with a Bluetooth standard.

US Pat. No. 10,693,517

MOBILE DEVICE CONNECTION APPARATUS

Nite Ize, Inc., Boulder,...

1. A mobile device connection apparatus, comprising:a plate-like piece of material, the plate-like piece of material having electrostatic cling properties, the plate-like piece of material folded onto itself;
a connector, the connector sandwiched between the plate-like piece of material;
wherein the plate-like piece of material is shaped to fit on a back of an electronic device, such that the plate-like piece of material is sandwiched between the back of the electronic device and a case, the plate-like piece shaped and having the electrostatic cling properties, to resist lateral movement in relation to the electronic device while being held to the back of the electronic device from moving in an orthogonal direction in relation to the electronic device.

US Pat. No. 10,693,516

ELECTRONIC DEVICE HAVING ADJUSTABLE ANTENNA SETTINGS

Apple Inc., Cupertino, C...

1. An electronic device having opposing first and second faces, comprising:a housing;
a touch-sensitive display at the first face;
an image sensor at the first face;
a plurality of microphones in the housing that are configured to receive sound and to generate audio signals in response to the sound;
wireless communications circuitry configured to convey radio-frequency signals over a plurality of antennas using antenna settings; and
control circuitry configured to adjust the antenna settings based on sensor data, wherein the sensor data comprises data selected from the group consisting of:
a grip map generated by the touch-sensitive display, and
an angle of arrival of the sound received by the plurality of microphones.

US Pat. No. 10,693,514

WIRELESS AUDIO TRANSMISSION SYSTEM

SHENZHEN FZONE TECHNOLOGY...

1. A wireless audio transmission system, comprising a wireless audio transmitter matched with an audio input device in a plug-in manner and configured to transmit an audio signal, a wireless audio receiver matched with an audio output device in a plug-in manner and configured to receive the audio signal, wherein the audio output device is provided with a first plug-in hole matched with the wireless audio receiver in a plug-in manner, and the audio input device is provided with a second plug-in hole matched with the wireless audio transmitter in a plug-in manner, wherein the wireless audio receiver includes a signal receiving component configured to receive the audio signal and a first plug-in connector signally connected with the signal receiving component and configured to match with the first plug-in hole in plug-in manner so as to transmit the audio signal received by the signal receiving component to the audio input device, and a first housing connected with the first plug-in connector; wherein the first housing is encircled to form a first accommodation cavity which has an opening and is configured to accommodate the signal receiving component, wherein the first plug-in connector is connected with the opening of the first housing.

US Pat. No. 10,693,513

IQ IMBALANCE ESTIMATOR

Imagination Technologies ...

1. An apparatus comprising:an input arranged to receive a signal;
a mixer arranged to mix the received signal with a local oscillator signal and to generate both a first mixer output and a second mixer output; and
correlation logic arranged to generate an IQ amplitude imbalance metric by calculating a correlation of the first and second mixer outputs generated by the mixer;
wherein the mixer is arranged to generate four partial products from the received signal and the local oscillator signal; and
wherein the first and second mixer outputs are generated by combining the four partial products in two different ways.

US Pat. No. 10,693,512

DISTORTION CANCELLATION

Cisco Technology, Inc., ...

1. A method, comprising:receiving a collided signal that includes a first component signal carrying a first packet and a second component signal carrying a second packet;
amplifying and digitizing the collided signal according to a first gain to produce a first digital signal;
extracting a nonlinear interference component of the first packet on the second packet in the collided signal from the first digital signal;
extracting a linear interference component of the first packet on the second packet in the collided signal from the first digital signal;
amplifying the collided signal according to a second gain greater than the first gain to produce a second signal;
removing the nonlinear interference component and the linear component interference from the second signal to produce a de-interfered signal; and
decoding the second packet from the de-interfered signal.