US Pat. No. 10,924,447

METHOD AND SYSTEM TO CONVERSE ACROSS FRAGMENTED MESSAGING SERVICES BASED ON DISCUSSION TOPICS

Medallia, Inc., San Fran...

1. A method of managing messages across a plurality of messaging services, comprising:receiving, via a first messaging channel and at a message aggregator, a first message from a first messaging service, wherein the first message is sent by a first user;
sending the first message to a second user via a second messaging channel;
receiving, via the second messaging channel and at the message aggregator, a second message, wherein the second message is sent by the second user;
in response to a request from the first user to continue a conversation via a second messaging service, opening, by the message aggregator, a third messaging channel to the second messaging service, the third messaging channel associated with an account of the first user on the second messaging service, and wherein the conversation is terminated in absence of receiving the request from the first user to continue the conversation via the second messaging service;
sending the second message via the third messaging channel to the first user;
determining that a conversation between the first user and the second user is finished; and
sending a survey, follow-on information, or both, in response to a determination that a conversation is finished.

US Pat. No. 10,924,446

DIGITAL STORY REPLY CONTAINER

Facebook, Inc., Menlo Pa...

1. A computer-implemented method comprising:displaying a shared story, comprising a collection of individual stories composed by a plurality of different contributors, within a stories interface of a story consumption channel provided via a social media application running on a viewer's computing device by ephemerally presenting the individual stories one by one, transitioning from presenting one story to the next automatically, wherein (1) rights to contribute to the shared story are limited to a first group of users invited to contribute to the shared story as contributors and (2) rights to view the shared story are limited to a second group of users indicated by a privacy setting selected by one or more contributors;
receiving user input, from the viewer of the shared story, selecting a selectable reply element associated with the shared story within the stories interface and, in response to receiving the user input selecting the selectable reply element, providing the viewer with a chat room selection prompt that provides the viewer with a choice to select to join an inclusive private chat room or a limited private chat room, wherein (1) rights to access the inclusive private chat room are limited to a third group of users comprising each viewer who has replied to the shared story and each contributor to the shared story and (2) rights to access the limited private chat room are limited to a fourth group comprising the viewer and a subset of the shared story's contributors;
receiving an additional user input to the chat room selection prompt selecting to join the inclusive private chat room in lieu of the limited private chat room;
in response to receiving the additional user input, digitally adding the viewer to the inclusive private chat room associated with the shared story;
transitioning from displaying the stories interface to displaying a chat room interface corresponding to the inclusive private chat room;
receiving user-generated text submitted to a text box within the chat room interface; and
posting, to the chat room interface, a message from the viewer comprising the user-generated text.

US Pat. No. 10,924,445

NOTIFICATION TARGETING

Facebook, Inc., Menlo Pa...

1. A method comprising:by a computing device of a social networking system, receiving a plurality of push notifications of activity on the social-networking system relevant to a user, wherein each push notification has an associated type that is based on activity on the social-networking system;
by the computing device, accessing, from a data store of the social-networking system, previous interactions of the user to notifications having a respective type that is the same as the type associated with the received push notifications;
by the computing device, calculating an interest of each of the associated types of received notifications for the user based at least in part on the previous interactions of the user with the associated type of each received push notification, times at which previous push notifications were sent to the user, and one or more communication media channels that the user used to interact with the previous push notifications;
by the computing device, ranking the received push notifications based at least in part on the calculated interest notification;
by the computing device, determining a push threshold ranking that a notification in the received push notifications requires to satisfy in order to be sent to the user at a given time period;
by the computing device, sending one or more of the push notifications to the user at the given time period, wherein each of the sent push notifications has a ranking higher than the push threshold ranking, and wherein each of the sent push notifications is sent through a particular communication media channel by which the user is likely to interact with the notification during the given time period based on the previous interactions of the user;
by the computing device, monitoring in real-time, using one or more counters, a conversion rate of a set of push notifications of each type from the sent push notifications, the conversion rate indicating number of push notifications of each type from the sent push notifications for which the user has completed a particular action on the social-networking system; and
by the computing device, automatically adjusting in real-time the push threshold ranking for the one or more of the push notifications of a particular type based on results of the one or more counters, wherein the push threshold ranking is adjusted, without explicit user input, to maintain a target conversion rate for the particular type of the push notifications based on the results of the one or more counters.

US Pat. No. 10,924,444

DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR MANAGING CUSTOMER RELATIONSHIPS USING A LIGHTWEIGHT MESSAGING PLATFORM

FACEBOOK, INC., Menlo Pa...

1. A method comprising:at a server system with a processor and memory storing instructions for execution by the processor:
receiving a first message from an electronic device of a first user to an electronic device of a second user;
generating a set of potential reply messages, for the second user, based on one or more reply factors, including content from one or more messages between the first user and the second user;
sending, to the electronic device of the second user, a data structure that includes a hierarchical interaction tree having a plurality of interaction nodes, wherein each interaction node of the plurality of interaction nodes corresponds to a respective one of the potential reply messages;
in accordance with a determination that a predefined time period has elapsed without the second user selecting a potential reply message, removing, from the hierarchical interaction tree, one or more of the interaction nodes corresponding to respective potential reply messages that are no longer selectable; and
receiving, from the electronic device of the second user, a first reply message that is selected from the set of potential reply messages and corresponds to a respective interaction node of the plurality of interaction nodes in the data structure.

US Pat. No. 10,924,443

ELECTRONIC MESSAGING SYSTEM AND COMMUNICATION DEVICE THAT MONITORS ITS POSITION

Scout Brands LLC, Dover,...

1. An electronic messaging system comprising:a memory operable to store one or more modules; and
a processor operably coupled to the memory, the processor operable to execute the one or more modules to:
receive an electronic message package from a sender, the electronic message package comprising a secret message from the sender associated with a first communication device, an indication of at least one intended recipient, at least one condition for when the secret message is to be viewable by the at least one intended recipient, the at least one condition comprising at least one location condition specified by the sender, the at least one condition specifying where the at least one intended recipient is to be for the secret message to be viewable by the at least one intended recipient, and a teaser composed by the sender that is immediately viewable by the at least one intended recipient before the secret message is viewable, the teaser comprising a hint of the secret message that does not reveal the secret;
monitor, by a sensor, a location of the at least one intended recipient;
obtain, by the sensor, a first location of the at least one intended recipient and at least a second location of the at least one intended recipient;
determine at least one of a speed or a velocity of the at least one intended recipient based on the first location of the at least one intended recipient and the at least a second location of the at least one intended recipient;
determine that the at least one location condition has been met based on the location of the at least one intended recipient;
initiate delivery of the secret message at a second communication device so that the secret message is viewable by the at least one intended recipient only when the at least one condition has been met while the teaser is immediately viewable by the at least one intended recipient; and
terminate monitoring of the location of the at least one intended recipient after the at least one location condition has been met.

US Pat. No. 10,924,442

CONVERSATION AGENT FOR COLLABORATIVE SEARCH ENGINE

CAPITAL ONE SERVICES, LLC...

1. A method comprising:receiving, from a first client device, a first message including a photo from a first user transmitted through a group messaging interface;
analyzing a content of the photo using an object recognition technique to determine if a first task is associated with the first message;
receiving, from a second client device, a second message from a second user transmitted through the group messaging interface;
analyzing a content of the second message using a natural language processing technique to determine if a second task is associated with the second message;
determining if there is a conflict between the first task and the second task, wherein:
each of the first task and the second task is a search query for retrieving results from a website; and
there is a conflict between the first task and the second task when there is no overlap between a first search result from the website based on the first task and a second search result from the website based on the second task;
determining a dominant user who is one of the first user or the second user;
resolving the conflict in favor of the dominant user by selecting a task associated with a message of the dominant user as a dominant task, wherein:
the message of the dominant user being one of the first message or the second message; and
the task being the first task or the second task;
transmitting a signal to a task server to perform the dominant task;
receiving a task result from the task server, wherein the task result is at least one search hit retrieved from the website and the search hit includes a link; and
transmitting the task result as a third message to the group messaging interface such that the third message is accessible by the first client device and the second client device, wherein the third message is configured to cause the first client device and the second client device display a preview photo retrievable from the link.

US Pat. No. 10,924,441

DYNAMICALLY GENERATING VIDEO CONTEXT

Google LLC, Mountain Vie...

1. A computer-implemented method comprising:receiving a comment of a user of a first content-sharing platform, wherein the comment has originated on the first content-sharing platform, is associated with a media item, and includes a uniform resource locator (URL);
determining a comment thread in which the comment originated on the first content-sharing platform is to be rendered on a second content-sharing platform; and
causing, by a processing device, presentation, on the second content-sharing platform, of the URL to be modified and included in the comment originated on the first content-sharing platform, wherein causing the presentation of the URL to be modified comprises:
determining whether information in the URL is redundant in view of the comment thread in which the comment originated on the first content-sharing platform is to be rendered, and responsive to determining that the information in the URL is redundant, causing the redundant information to be removed from the URL;
determining whether the URL includes a timestamp portion, and responsive to determining that the URL includes the timestamp portion, causing the timestamp portion of the URL to be converted into a time presentation format and
determining whether the URL identifies a derivative media file, and responsive to determining that the URL identifies the derivative media file, causing the URL to be replaced with an image associated with the derivative media file,
wherein instructions associated with a resulting modified presentation of the URL are provided to a client device.

US Pat. No. 10,924,440

METHOD AND APPARATUS FOR PROMPTING WORK STATUS

Alibaba Group Holding Lim...

1. A method implemented by one or more computing devices, the method comprising:obtaining a work status of a preset contact person in an instant communication application including:
obtaining corporate management events from a plurality of management subsystems of a company, the corporate management events being associated with the preset contact person; and
analyzing the corporate management events to determine the work status of the preset contact person, the work status including at least one of normal working, on a business trip, and on vacation;
detecting that a preset function page of the instant communication application is triggered related to the preset contact person;
presenting the work status of the preset contact person in the preset function page when the preset function page is related to the preset contact person; and
displaying supplementary information related to the work status in the preset function page,
wherein the supplementary information includes a proxy contact person corresponding to the preset contact person when the work status of the preset contact person includes at least one of on a business trip or on vacation.

US Pat. No. 10,924,439

HYBRID CONVERSATIONAL CHAT BOT SYSTEM

HRB Innovations, Inc., L...

1. A method of conducting an interview with a user comprising the steps of:loading an interview script including a plurality of interview questions;
determining a question for the user based on the interview script and one or more prior responses previously given by the user;
determining a prompt for the question based on the question, a level of expertise of the user, and a current context of the interview;
determining one or more response widgets of a plurality of types of response widgets for the question based at least in part on a type of information being sought by the question;
presenting a rich chat message to the user including the one or more response widgets and a free-text widget;
receiving, from the user, a free-text response to the question via the free-text widget;
maintaining context throughout the interview based on a user history data store comprising data from a past interaction with the user; and
presenting, to the user, a context-appropriate further explanation based at least in part on the free-text response and the context, wherein the context-appropriate further explanation is a clarified reformulation of the prompt.

US Pat. No. 10,924,438

TECHNIQUES FOR HANDLING MESSAGE QUEUES

salesforce.com, inc., Sa...

1. A method, comprising:accessing, by a server-based platform that includes a plurality of processing nodes, queue information that identifies a plurality of queues capable of storing messages issued by applications associated with the server-based platform, wherein a given message specifies one or more tasks to be performed by the server-based platform; and
for a given one of at least two of the plurality of processing nodes, the server-based platform assigning, based on the accessed queue information, a set of the plurality of queues to the given processing node, wherein the assigning causes the given processing node to instantiate a set of threads executable to dequeue one or more messages that are stored in the set of queues and perform tasks specified in the one or more messages.

US Pat. No. 10,924,437

INTELLIGENT NETWORK SWITCH

VIDEOTEC S.P.A., Schio (...

1. A method for controlling the transfer of data packets in an IP network, wherein the IP network includes a plurality of switches and a plurality of devices connected to the plurality of switches, wherein each switch of the plurality of switches is configured to receive on an input port data packets transmitted from a device of the plurality of devices, the method comprising the following steps performed by the switch:a) analysing the data packets received from said device and extracting information identifying the type of device connected,
b) based on said identifying information, identifying in an internal memory area, criteria to set operating parameters of a software application executed by said device,
c) providing to the device said operating parameters calculated on the basis of the criteria contained in said internal memory area,
d) communicating with other switches of said plurality of switches to receive information about devices connected to said other switches,
e) storing in a memory, topology information relating to the IP network, said topology information comprising:
connection links between all the switches of said plurality of switches,
a list of devices of said plurality of devices connected to each switch of said plurality of switches, and
bandwidth requirements for each of the plurality of devices,
f) calculating, for each of the connection links, a bandwidth request necessary to satisfy data transfer requests for each device, and
g) coordinating with said other switches of said plurality of switches to identify an output port on which to transmit the data packets received at the input port, thereby balancing the total network load between each of the connection links of the IP network;
wherein when the coordination with the other switches of said plurality of switches results in routing rules of the data packets such that a link of the IP network is a critical link with a bandwidth capacity less than that required by the devices of said plurality of devices of said IP network, each switch of said plurality of switches performs a same bitrate reduction algorithm, the bitrate reduction algorithm comprising the steps of:
calculating a reduction factor of the bitrate of one or more devices of said plurality of devices whose data packets transport said critical link, said reduction factor of the bitrate being such that by reducing the bitrate of said one or more devices by the bitrate reduction factor, the bandwidth capacity of the link is greater than the bandwidth request of all the devices whose data packets pass on said critical link,
transmitting to said one or more devices new operating parameters such that the bitrate of the data packets transmitted by said one or more devices is reduced by a factor greater than or equal to said reduction factor, and
performing, on said one or more devices, said software application using the new operating parameters provided by the switch.

US Pat. No. 10,924,436

METHOD AND SYSTEM FOR MANAGING WORKLOADS IN A CLUSTER

Arista Networks, Inc., S...

1. A method, comprising:receiving, by a NameNode server, a link down message from a switch, wherein the link down message indicates that a connection to a first DataNode server is disrupted, and wherein the first DataNode server comprises stored data; and
in response to receiving the link down message:
identifying, using global switch load information, a plurality of other DataNode servers, wherein the global switch load information specifies bandwidth utilization of a plurality of switches connected to the plurality of other DataNode servers;
initiating replication of a copy of the stored data to a second DataNode server of the plurality of other DataNode servers based on the global switch load information;
identifying that a third DataNode server of the plurality of other DataNode servers comprises a disproportionate amount of data relative to remaining DataNode servers of the plurality of other DataNode servers; and
triggering, based on the identification of the third DataNode server, a data storage rebalancing among the plurality of other DataNode servers based on a rebalancing policy.

US Pat. No. 10,924,435

SYSTEM AND METHOD FOR PORT REDUCTION USING MULTIPLE CHASSIS LINK AGGREGATION GROUP FOR STACKED DEVICES

Dell Products, L.P., Rou...

1. A server system, comprising:a plurality of servers that are connected in series; and
a top of rack (TOR) switch including a first TOR switch port and a second TOR switch port that are connected to a first end and a second end, respectively, of the series connected servers, wherein a multi chassis link aggregation group (MCLAG) is established on the first TOR switch port and the second TOR switch port to transform the series connected servers into a single logical channel, wherein a highest media access control (MAC) address is determined from the servers to represent the single logical channel, wherein the servers include respective network identification card (NIC) microcontrollers configured to exchange protocol messages to determine the server with the highest MAC address, wherein the NIC microcontroller receives a forwarded MAC address, determines a higher MAC address between the received forwarded MAC address and the MAC address of the receiving server, and forwards the determined higher MAC address to an adjacent server.

US Pat. No. 10,924,434

GRACEFUL DESIGNATED ROUTER HANDOFF

Cisco Technology, Inc., ...

1. A method comprising:receiving, by a first router from a second router, a first Hello message with a first option descriptor and a first priority, wherein the second router is a designated router in a sub-network;
in response to receiving the first Hello message, participating in a designated router election which elects the first router as a new designated router from among a plurality of other routers in the sub-network; and
initiating a staggered handoff process in response to the first option descriptor, the staggered handoff process causing the second router to continue forwarding multicast traffic from a first network to at least one receiver until the new designated router has built a multicast routing tree to receive the multicast traffic from the first network.

US Pat. No. 10,924,433

MIRROR PACKET CONTROL METHOD AND MIRROR PACKET CONTROL DEVICE

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable recording medium having stored therein a program that causes a computer to execute a process, the process comprising:detecting a notification of a completion of movement of a first virtual machine from another device to the computer;
referring, upon the detection of the notification, to first correspondence information to identify a transmission source that transmits a first mirror packet to the first virtual machine, the first correspondence information including a first item associating first identification information of the first virtual machine with second identification information of the transmission source;
transmitting a first deletion instruction to the transmission source, the first deletion instruction instructing deletion of a second item included in second correspondence information stored in the transmission source, the second item associating the first identification information with identification information of a first port of the transmission source through which the first mirror packet is transmitted to the first virtual machine;
detecting that a second virtual machine is stopped, the second virtual machine being coupled to a virtual switch of the computer, the second virtual machine outputting a mirror packet obtained by duplicating a first packet registered in a first buffer used for input/output from/to a third virtual machine coupled to the virtual switch;
storing a second packet in a second buffer different from the first buffer while the second virtual machine is stopped, the second packet being input/output from/to the third virtual machine; and
registering, when the second virtual machine is resumed, the second packet stored in the second buffer in the first buffer.

US Pat. No. 10,924,432

SYSTEM AND METHOD FOR FABRIC LEVEL VERIFICATION OF HOST DEFINED PORT GUIDS IN A HIGH PERFORMANCE COMPUTING NETWORK

ORACLE INTERNATIONAL CORP...

1. A system for fabric level verification of host defined port global unique identifiers (GUIDs) in a high performance computing network, comprising:one or more microprocessors;
a first subnet, the first subnet comprising
a plurality of switches,
a plurality of host channel adapters (HCAs), wherein each of the host channel adapters comprise at least one host channel adapter port, at least one physical function, and at least one virtual function, and wherein the plurality of host channel adapters are interconnected via the plurality of switches,
a plurality of end nodes, the plurality of end nodes comprising at least one virtual machine, and
a subnet manager, the subnet manager running on one of the plurality of switches and the plurality of host channel adapters, the subnet manager being associated with a virtual machine fabric profile;
wherein the first subnet is arranged according to an architecture model selected from the list of architecture models consisting of shared port, virtual switch, and virtual port;
wherein the at least one virtual machine is associated with a plurality of GUIDs and a partition of a plurality of partitions, wherein said association of the at least one virtual machine with the plurality of GUIDs is defined within the virtual machine fabric profile, and wherein said association of the at least one virtual machine with the partition of the plurality of partitions is defined within the virtual machine fabric profile;
wherein the subnet manger receives, in response to an assignment of the at least one virtual machine upon to a virtual host channel adapter, a request from a host channel adapter comprising the vHCA, the request comprising a validation check of the at least one virtual machine virtual host channel adapter; and
wherein the subnet manger validates the at least one virtual machine with respect to the virtual machine fabric profile, and upon such validation, a port associated with the vHCA is initialized in accordance with the virtual machine fabric profile.

US Pat. No. 10,924,431

DISTRIBUTED PROCESSING OF NORTH-SOUTH TRAFFIC FOR LOGICAL NETWORK IN PUBLIC CLOUD

NICIRA, INC., Palo Alto,...

1. A non-transitory machine readable medium storing a managed first forwarding element, which when executed by at least one processing unit of a first host machine in a public datacenter implements a logical network, the managed first forwarding element executing within a first data compute node that operates on the first host machine, the managed first forwarding element comprising sets of instructions for:receiving a data packet from an application, also executing on the first data compute node, that sends and receives data packets through the logical network;
when the data packet has a destination address associated with the logical network, encapsulating the data packet and sending the encapsulated data packet to a managed second forwarding element configured to implement the logical network, the managed second forwarding element configured to implement the logical network, the managed second forwarding element executing within a second data compute node that operates on a second host machine within the datacenter; and
wherein when the data packet has a destination address that is not associated with the logical network, performing network address translation (NAT) to convert a source address of the data packet to an address associated with an interface of the first data compute node and sending the data packet directly to a third forwarding element configured by an administrator of the public datacenter without encapsulating the data packet.

US Pat. No. 10,924,430

STREAMING PLATFORM FLOW AND ARCHITECTURE FOR AN INTEGRATED CIRCUIT

Xilinx, Inc., San Jose, ...

1. A system, comprising:a host system; and
an integrated circuit coupled to the host system through a communication interface and configured for hardware acceleration, wherein the integrated circuit includes:
a direct memory access circuit coupled to the communication interface;
a kernel circuit;
a stream traffic manager circuit coupled to the direct memory access circuit and the kernel circuit, wherein the stream traffic manager circuit is configured to control data streams exchanged between the host system and the kernel circuit;
a first stream interconnect configured to receive data streams from the stream traffic manager circuit and distribute the data streams to the kernel circuit; and
a second stream interconnect configured to receive data streams from the kernel circuit and provide the data streams to the stream traffic manager circuit.

US Pat. No. 10,924,429

USING EDGE-OPTIMIZED COMPUTE INSTANCES TO EXECUTE USER WORKLOADS AT PROVIDER SUBSTRATE EXTENSIONS

Amazon Technologies, Inc....

4. A computer-implemented method comprising:receiving a first request to create an application profile, the first request including values for parameters related to execution of a workload at provider substrate extensions of a service provider network, wherein the parameters include a latency profile for execution of the workload at provider substrate extensions;
receiving a second request to execute an instance of the workload, the second request identifying the application profile; and
sending, to a provider substrate extension, instructions to launch a compute instance based on the application profile, the compute instance to be used execute the workload at the provider substrate extension.

US Pat. No. 10,924,428

ONBOARD DEVICE AND METHOD OF TRANSMITTING PROBE DATA

Toyota Jidosha Kabushiki ...

1. An onboard device mounted in a vehicle, the onboard device comprising:a storage device storing probe data;
a processor and a memory configured to
set priorities depending on a classification of probe data, and
make a first acquisition determination whether first probe data among the probe data has been acquired by the processor and the memory,
a priority of the first probe data being higher than a priority of second probe data among the probe data; and
a communication interface configured to transmit, prior to transmitting the second probe data, the first probe data to a data center via a first communication line among a plurality of communication lines when the processor and the memory determine that the first probe data has been acquired by the processor and the memory, wherein
the processor and the memory are configured to determine whether there is an accessible access point of a second communication line among the plurality of communication lines other than the first communication line,
the communication interface is configured to
connect to the access point of the second communication line when the processor and the memory determine that there is an accessible access point of the second communication line, and
transmit the second probe data to the data center via the second communication line,
the processor and the memory are configured to
make a stop determination whether the vehicle has stopped subsequent to the communication interface transmitting the second probe data;
repeat the first acquisition determination when the processor and the memory determine that the vehicle has stopped, and
the plurality of communication lines includes a mobile phone line, a wireless local area network (LAN), and a wired LAN.

US Pat. No. 10,924,427

HARMONIZED CONTROL PLANES, SYSTEMS AND METHODS

Nant Holdings IP, LLC, C...

1. A networking switch comprising:a plurality of optical physical transport layer resources;
a non-transitory computer readable memory storing virtualized control plane software instructions; and
at least one processor configured to execute the virtualized control plane software instructions to provide a control plane management engine, wherein the control plane management engine is configured to at least:
receive at least one control plane provisioning policy that maps at least one upper layer resource to at least some of the plurality of optical physical transport layer resources;
instantiate at least one virtual control plane by provisioning the at least some of the optical physical transport layer resources for use by the at least one virtual control plane, wherein the at least one virtual control plane operates according to rules of the at least one control plane provisioning policy to configure the at least one virtual control plane to provision at least one lower layer resource based on a request for the at least one upper layer resource; and
manage network traffic among the at least some of the optical physical transport layer resources and external networking nodes according to the at least one virtual control plane.

US Pat. No. 10,924,425

VIRTUAL ELEMENT MANAGEMENT SYSTEM

Cox Communications, Inc.,...

1. A method, comprising:receiving, by an orchestration layer module executing on a computing device, a request via a first input network interface of at least one input network interface, wherein the first input network interface is a Representational State Transfer (REST) interface, wherein the first input network interface is associated with a first type of access network, wherein the at least one network interface includes a second input network interface associated with a second type of access network, and wherein the request is formatted in accordance with a device-independent language;
directing, by a computer processor of the computing device, the orchestration layer module to communicate the request to a control layer module executing on the computing device;
determining, by the computer processor and based on the first type of access network associated with the first input network interface, a first network device to receive the request and an adapter for receiving the request, wherein the adapter is configured to facilitate Internet connectivity via the first type of access network;
directing, by the computer processor, the control layer module to communicate the request to the adapter;
executing, by the computer processor, computer-executable code of the adapter to convert the request to a device-specific language capable of being interpreted by the first network device;
directing, by the computer processor, the adapter to communicate, via a first output network interface, the converted device-specific language request to the first network device, wherein the adapter communicates the device-specific request to the first network device using a communications protocol that provides the first output network interface between the adapter and a data plane comprising the first network device, wherein the data plane is decoupled from a control plane comprising the orchestration layer module and the control layer module;
receiving, by the orchestration layer module, a second request formatted in accordance with the device-independent language; and
directing, by the computer processor, the control layer module to communicate the second request to a virtual machine monitor (VMM), wherein the VMM communicates the second request to a network device proxy, wherein the network device proxy may convert the second request into a device-specific language.

US Pat. No. 10,924,424

SYSTEMS AND METHODS TO VISUALLY ALIGN SIGNALS USING DELAY

BioSig Technologies, Inc....

1. A system for visualization of signals, comprising:a memory comprising:
a first signal module comprising a first digital signal processor (DSP) configured to process a first packet associated with a first biomedical signal, wherein the processing of the first packet incurs a first processing delay;
a second signal module comprising a second DSP configured to process a second packet associated with a second biomedical signal, wherein the processing of the second packet incurs a second processing delay, and wherein signal samples in the first packet are time aligned with signal samples in the second packet;
a configuration path module configured to equalize the first processing delay of the first DSP with the second processing delay of the second DSP, wherein the equalizing causes the first DSP to complete the processing of the first packet approximately simultaneously with the second DSP completing the processing of the second packet;
a display module coupled to the first signal module and the second signal module and configured to display the processed first packet and the processed second packet, wherein the display module is configured to display the processed first packet approximately simultaneously with the processed second packet; and
at least one processor coupled to the memory and configured to execute the first signal module, the second signal module, the configuration path module, and the display module.

US Pat. No. 10,924,423

ADAPTIVE MECHANISM TO ADJUST UDT PACKET SIZE BASED ON ACTUAL NETWORK CONDITION

Citrix Systems, Inc., Fo...

1. A method for adaptive packet sizing, comprising:transmitting, by a first device to a second device, a first packet having a first size;
receiving, by the first device from the second device, a negative acknowledgement for the first packet;
determining, by the first device, that a number of received negative acknowledgements for the first packet exceeds a threshold;
adding, by the first device, a first size window corresponding to the first size to a transmission filter, the transmission filter preventing transmission of packets having a size corresponding to the first size window;
generating, by the first device, a first subpacket and a second subpacket from the first packet, responsive to determining that the number of received negative acknowledgements for the first packet exceeds the threshold; and
transmitting, by the first device to the second device, the first subpacket and the second subpacket.

US Pat. No. 10,924,422

IMPLEMENTING ENHANCED NETWORK DEVICE LABELING VIA ETHERNET

International Business Ma...

1. A network system for implementing network device identification via a connected Ethernet cable comprising:a server having a port connected by an Ethernet cable, said Ethernet cable connected to a port of a switch;
a processor;
an Ethernet runt packet transmit control tangibly embodied in a non-transitory machine readable medium used in implementing network device identification by use of the processor;wherein the processor is configured for:transmitting, by said processor using said Ethernet runt packet transmit control, a first Ethernet runt packet containing metadata identifying the server name and the port on the cable by the server to the switch;
transmitting a second Ethernet runt packet containing metadata identifying the switch name and the port on the cable by the switch to the server, wherein said processor transmitting the first ethernet runt packet and the second ethernet runt packet comprises:
transmitting intentional ethernet runt packets including 63 byes of less bytes of coded information to determine where the ethernet cable is physically connected; anddynamically identifying and labeling the Ethernet cable, the connected server and port, and the connected switch and port using the transmitted metadata of the first Ethernet runt packet and the second ethernet runt packet.

US Pat. No. 10,924,421

PACKET TRANSMISSION METHOD, TERMINAL, NETWORK DEVICE, AND COMMUNICATIONS SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A packet transmission method, comprising:receiving, by a terminal, a retransmitted packet, wherein the retransmitted packet is sent by a server in response to determining that a sent first packet has been lost, wherein a sequence number of the retransmitted packet is the same as a sequence number carried in the first packet; and
upon receiving the retransmitted packet for the first time, sending, by the terminal to the server, a first acknowledgment packet to respond to the retransmitted packet received for the first time, wherein the first acknowledgment packet comprises a repetition indication field for triggering the server to increase at least one of a congestion window size or a slow start threshold.

US Pat. No. 10,924,420

MULTI-DIMENSIONAL EVENT ENGINE FOR USE WITH HIGHLY AVAILABLE NETWORK TOPOLOGY

WALMART APOLLO, LLC, Ben...

1. A system comprising:one or more processors; and
one or more non-transitory media storing computing instructions configured to run on the one or more processors and perform:
initiating a cluster of controller instances for executing a multi-dimensional event engine;
configuring the cluster of controller instances in a topology, wherein the topology applies a distributed lock to designate an active controller instance selected from the cluster of controller instances to be utilized as the multi-dimensional event engine, wherein the active controller instance, as selected, is configured to:
detect a current level of network traffic;
receive messages from an order management system;
select a transmission rate for sending the messages to one or more fulfillment centers based on the current level of the network traffic that is detected and based on a set of base dimensions comprising (i) a time dimension indicating a time period and (ii) a batch size dimension; and
transmit the messages to the one or more fulfillment centers in accordance with the transmission rate; and
in response to detecting changes in the current level of the network traffic, dynamically adjusting the transmission rate for sending the messages to the one or more fulfillment centers to create an adjusted transmission rate by adjusting at least the batch size dimension indicating a threshold number of the messages for a batch.

US Pat. No. 10,924,419

UNDERLAY-OVERLAY CORRELATION

Juniper Networks, Inc., ...

1. A method comprising:collecting, by a network analysis system, flow data for a network having a plurality of network devices and a plurality of virtual networks established within the network, wherein the flow data includes underlay flow data comprising a plurality of underlay data flows and overlay flow data comprising a plurality of overlay data flows,
wherein the underlay flow data identifies, for each underlay data flow included within the underlay flow data, the network devices that have processed network packets associated with the underlay data flow, and
wherein the overlay flow data identifies, for each overlay data flow included within the overlay flow data, one or more of the virtual networks associated with the overlay data flow;
storing, by the network analysis system, the flow data in a data store;
receiving, by the network analysis system, a request for information about a data flow, wherein the request for information specifies a source virtual address for the data flow and further specifies a destination virtual address for the data flow;
querying, by the network analysis system, the data store with the specified source virtual address and the specified destination virtual address to identify, based on correlations between the underlay flow data and the overlay flow data, one or more network devices of the plurality of network devices that have processed at least one packet in the data flow;
determining, by the network analysis system and based on the one or more identified network devices, one or more underlay data paths from the source virtual network to the destination virtual network; and
generating, by the network analysis system, data sufficient to create a user interface illustrating the one or more underlay data paths from the source virtual network to the destination virtual network, wherein generating includes generating a heat map illustrating a traffic level associated with each of the one or more data paths.

US Pat. No. 10,924,418

SYSTEMS AND METHODS FOR FAST DETECTION OF ELEPHANT FLOWS IN NETWORK TRAFFIC

Reservoir Labs, Inc., Ne...

1. A method for sampling a stream of packets arriving at a network node at an optimized sampling rate, so as to facilitate efficient classification of network flows corresponding to the stream of packets arriving at a network node, the method comprising:(a) at a selected sampling rate, sampling a packet from the stream of packets arriving at the network node;
(b) for each candidate number of elephant flows in a set of candidate numbers computing, and storing in a cache of candidate elephant flows associated with the stream of packets, a respective detection likelihood using the sampled packet; and
(c) updating the selected sampling rate according to the one or more detection likelihoods,
wherein the computation of the respective detection likelihood for a particular candidate number of elephant flows is based on pairwise probabilities of relative flow sizes of flow pairs in the cache, and comprises, for each pair of flows in a cache of flows, updating a pairwise probability of relative flow sizes using flow-size metrics of flows in the pair and the sampled packet.

US Pat. No. 10,924,417

COGNITIVE COMMUNICATION CHANNEL-ADAPTATION BASED ON CONTEXT

INTERNATIONAL BUSINESS MA...

1. A computer implemented method comprising:predicting, by one or more processor, an upcoming communication content in a current channel based on learning input data from a plurality of sources relevant to a communication activity of a user, wherein the upcoming communication content is generated by the communication activity of the user;
assessing, by the one or more processor, a response of the user to the upcoming communication content from the predicting;
selecting, by the one or more processor, one of communication channel models based on factors including the upcoming communication content from the predicting and the response of the user from the assessing;
ascertaining, by the one or more processor, that user satisfaction level with the upcoming communication content in the current channel expressed in the response does not meet a predefined threshold for user satisfaction in the communication channel model from the selecting; and
adapting, by the one or more processor, the upcoming communication content in the current channel to another channel by performing an adaptive action corresponding to the communication channel model, wherein the user continues the communication activity by use of the another channel subsequent to the adapting, the predicting comprising:
gathering, from respective sources amongst the plurality of the sources, the input data including, a user profile describing communication capabilities of the user, parameters describing an environment of the communication activity, communication pattern history of the user, and contents being presently and previously communicated in the communication activity; and
producing the upcoming communication content by combining the input data from the gathering according to respective weights corresponding to each item of the input data.

US Pat. No. 10,924,416

METHOD FOR TRAFFIC SHAPING USING A SERIAL PACKET PROCESSING ALGORITHM AND A PARALLEL PACKET PROCESSING ALGORITHM

1. A method for traffic shaping of a packet switched network, including processing of packets to be transmitted in said packet switched network according to at least:a serial packet processing algorithm providing a synchronized utilization of a set of at least one processing unit; and
a parallel packet processing algorithm providing an at least partly unsynchronized utilization of said set of at least one processing unit; wherein
said processing of said packets corresponds to a total packet cost, which is cooperatively shared by said at least one processing unit of said set;
said method comprising the steps of:
determining when said processing according to said parallel packet processing algorithm is used for processing said packets, if shares of said total packet cost for one or more of said at least one processing units; exceed a capacity to process packets for said at least one processing units, respectively, wherein each one of the shares corresponds to one or more packet; and
switching from said processing according to said parallel packet processing algorithm to processing according to said serial packet processing algorithm if said shares of said total packet cost for one or more of said at least one processing units, respectively, is determined to exceed said capacity.

US Pat. No. 10,924,415

DEVICE SHAPING IN A COMMUNICATIONS NETWORK

VIASAT, INC., Carlsbad, ...

7. A method for device shaping traffic in a communications network, the method comprising:receiving a return-link flow at a user-side network node, the return-link flow originating at a source customer premises equipment (CPE) device;
tagging the return-link flow with a device class identifier and with a tunnel identifier that identifies one of a plurality of virtual tunnels, each providing a virtual connection between a provider-side network node and a respective one of a plurality of user-side network nodes via the communications network;
communicating the return-link flow over a provider network to the provider-side network node, the provider-side network node comprising a network address translator (NAT);
storing, at the provider-side network node, the device class identifier in association with a flow identifier of the return-link flow received by the provider-side network node over the provider network, the return-link flow previously tagged with the device class identifier by the user-side network node to indicate one of a plurality of device classes into which the source CPE device of the return-link flow was previously classified according to a predetermined rate-relevant characteristic of the source CPE device;
storing, at the provider-side network node, the tunnel identifier at the provider-side network node in association with the flow identifier;
receiving a forward-link flow at the provider-side network node subsequent to the storing, the forward-link flow indicating a public destination address;
determining, at the provider-side network node, that the forward-link flow corresponds to the return-link flow according to the stored flow identifier and the tunnel identifier by translating the public destination address to a destination tunnel identifier using the NAT and by matching the destination tunnel identifier to the stored tunnel identifier associated with the return-link flow;
identifying, by a device shaper of the provider-side network node, one of a plurality of stored device shaping policies as corresponding to the one of a plurality of device classes of the source CPE device according to the stored device class identifier; and
shaping communication of the forward-link flow over the provider network in accordance with the identified device shaping policy.

US Pat. No. 10,924,414

PROCESSING HIGH VOLUME NETWORK DATA

eBay Inc., San Jose, CA ...

1. A method comprising:receiving, at a sessionization architecture, a plurality of event messages;
detecting that an event message of the plurality event messages is marked as a particular bot type;
responsive to the event message of the plurality of event messages being marked as a particular bot type, transmitting the event message to a bot detector, the transmitting the event message to the bot detector causing a bypass of one or more sessionizers of the sessionizatin architecture, and
processing remaining event messages of the plurality of event messages through the one or more sessionizers.

US Pat. No. 10,924,413

TRANSMISSION PATH DETERMINING METHOD AND APPARATUS

Huawei Technologies Co., ...

1. A method, comprising:determining that a current path is congested, wherein the current path corresponds to a flow to which a to-be-transmitted packet belongs;
determining a target path for the to-be-transmitted packet based on a path congestion information table, wherein each entry of the path congestion information table comprises a respective transmission path and respective congestion information corresponding to the respective transmission path, the respective congestion information of each entry indicates a respective congestion degree of the respective transmission path, and the respective congestion information of each entry comprises an average quantity of explicit congestion notifications (ECNs) of the respective transmission path corresponding to the respective entry;
adding information about the target path to the to-be-transmitted packet, wherein a congestion degree of the target path is less than a congestion degree of the current path; and
sending the to-be-transmitted packet based on the target path.

US Pat. No. 10,924,411

LOAD BALANCED ACCESS TO DISTRIBUTED ENDPOINTS USING ANYCASTED GLOBAL NETWORK ADDRESSES AND NETWORK ADDRESS TRANSLATION

Amazon Technologies, Inc....

1. A system comprising:a plurality of endpoints, each endpoint being situated in a different geographic location and containing at least one server computing device configured to provide a network-accessible service associated with a network address of the network-accessible service, wherein individual endpoints are assigned respective unicast addresses and are not assigned the network address of the network-accessible service;
at least two access points to the network-accessible service, each of the at least two access points comprising a processor, being situated in a different geographic location, and configured to:
utilize anycast methodology to advertise the network address of the network-accessible service as reachable via the access point;
receive from a client device a network packet addressed to the network address of the network-accessible service;
select an endpoint, from the plurality of endpoints, to which to route the network packet based at least partly on a network performance metric between the client device and the endpoint;
transform the network packet addressed to the network address of the network-accessible service, as advertised as reachable via the access point using anycast methodology, according to network address translation (NAT) to result in a transformed packet that includes, as a destination address of the transformed packet, the unicast address of the selected endpoint; and
route the transformed packet to the selected endpoint.

US Pat. No. 10,924,410

TRAFFIC DISTRIBUTION MAPPING IN A SERVICE-ORIENTED SYSTEM

Amazon Technologies, Inc....

1. A system, comprising:a plurality of computing devices configured to implement a traffic distribution mapping system and a service-oriented system, wherein the service-oriented system comprises a plurality of services including a particular service and one or more additional services, wherein the services comprise application programming interfaces (APIs), and wherein the traffic distribution mapping system is configured to:
determine a plurality of call paths representing service interactions among the plurality of services over a period of time, wherein the plurality of call paths include the particular service, and wherein the plurality of call paths are determined based on tracing a sampling of service calls among the plurality of services;
determine numbers of traced samples over the period of time for individual ones of the call paths;
determine total call volumes at individual ones of the services over the period of time;
determine, based at least in part on the numbers of traced samples for individual ones of the call paths and the total call volumes at individual ones of the services, one or more estimated call ratios between the particular service and one or more APIs of one or more of the additional services over the period of time; and
determine, based at least in part on the one or more estimated call ratios and the total call volumes, one or more call volumes between the particular service and one or more APIs of one or more of the additional services over the period of time.

US Pat. No. 10,924,409

METHOD FOR IMPLEMENTING LOAD BALANCING, APPARATUS, AND NETWORK SYSTEM

HUAWEI TECHNOLOGIES CO, ,...

1. A method for implementing load balancing implemented by a system comprising a controller and a mesh network, wherein the mesh network comprises a plurality of switches, wherein the switches are inter-connected to each other within the mesh network, and wherein the method comprises:obtaining, by the controller, a port attribute of each port of a first switch in the mesh network, wherein the port attribute of each port indicates whether the port is a user-side port or a network-side port, wherein the user-side port is a port configured to couple to a server, and wherein the network-side port is a port configured to couple to another switch in the mesh network;
determining, by the controller according to the port attribute of each port of the first switch, a virtual routing and forwarding instance corresponding to each port of the first switch, wherein all user-side ports of the first switch correspond to a first virtual routing and forwarding instance, and wherein all network-side ports of the first switch correspond to a second virtual routing and forwarding instance that is different than the first virtual routing and forwarding instance;
generating, by the controller, a forwarding table of the first switch according to a topology of the mesh network and the virtual routing and forwarding instance corresponding to each port of the first switch, wherein a first forwarding entry of the forwarding table comprises the first virtual routing and forwarding instance corresponding to all user-side ports of the first switch, a first destination network segment corresponding to the first virtual routing and forwarding instance, and at least two forwarding paths corresponding to the first destination network segment; and
sending, by the controller, the forwarding table to the first switch, wherein the forwarding table enables the first switch to select, according to a load balancing algorithm and the first forwarding entry and from the at least two forwarding paths corresponding to the first destination network segment, a target forwarding path for a packet corresponding to the first destination network segment.

US Pat. No. 10,924,408

SYSTEM AND METHOD FOR OPTIMIZING TRAFFIC IN PACKET-SWITCHED NETWORKS WITH INTERNET EXCHANGES

Noction, Inc., Oakland, ...

1. A system for optimizing Internet traffic on a computer network, the system including one or more servers that are configured to communicate with a destination network through one or more Internet service providers and one or more routers on the computer network, the one or more servers configured to execute computer programs steps, the computer program steps comprising:retrieving configurations of the one or more Internet service providers, including one or more Internet transit providers:
identifying an Internet exchange from the configurations of the one or more Internet service providers;
retrieving a routing table from an edge router, of the one or more routers, that is configured to communicate with the Internet exchange identified:
identifying one or more peers on the Internet exchange, based on the routing table, that provide Internet service to the destination network;
identifying network prefixes carrying Internet traffic that can be routed through the one or more peers on the Internet exchange;
determining performance metrics of the one or more peers on the Internet exchange to identify at least one peer of the one or more peers on the Internet exchange to which the network prefixes may be re-routed; and
determining if the network prefixes will be re-routed through the at least one peer of the one or more peers on the Internet exchange based on the performance metrics.

US Pat. No. 10,924,407

METHOD AND DETECTOR FOR RESOLVING UNICAST FLOODING

TELEFONAKTIEBOLAGET LM ER...

1. A method for resolving unicast flooding in a layer 2 broadcast domain, the method performed in a detector having a medium access control (MAC) address and connected to a port of a switch within the layer 2 broadcast domain, the method comprising:receiving a first flooded packet having a destination MAC address that is different from the MAC address of the detector;
determining a type of a destination node for said first flooded packet based on whether a destination MAC address for said packet is a virtual router redundancy protocol (VRRP) MAC address or whether a destination Internet protocol (IP) address for said packet is an address within the layer 2 broadcast domain if the destination MAC address is not a VRRP MAC address; and,
sending a message to a node in the layer 2 broadcast domain, wherein the message is adapted based on said type to trigger the node to announce its MAC address within the layer 2 broadcast domain, thereby causing the unicast flooding to be resolved.

US Pat. No. 10,924,406

CONTROL DEVICE, CONTROL SYSTEM, CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

OMRON Corporation, Kyoto...

1. A control device comprising:a controller circuitry configured to:
control communication of first control data of which arrival in a first guarantee time is guaranteed according to a preset cyclic period and second control data of which arrival in a second guarantee time longer than the cyclic period is guaranteed and of which a sequence of information included is determined; and
manage a communication schedule of the first control data and the second control data,
wherein control communication of the second control data comprising:
storing the second control data in a buffer memory;
dividing the second control data into a plurality of communication data according to the cyclic period and starting to perform communication of the plurality of communication data;
acquiring new second control data during the communication of the plurality of communication data; and
communicating the new second control data according to the cyclic period, wherein a communication target slave device for the new second control data is the same as the communication target slave device of the second control data, and the controller circuitry is further configured to determine a communication sequence of the plurality of the communication data according to priorities of the second control data, wherein the communication target slave device is a robot device or a robot control device,
wherein, when a priority of the new second control data is higher than a priority of the second control data, the controller circuitry temporarily stops any communication of the second control data and performs a communication of the new second control data, and after the communication of the new second control data is completed, the controller circuitry is further configured to resume the communication of the second control data that has been temporarily stopped,
wherein, when a volume of the new second control data does not reach an upper limit volume for second control data secured for one cycle of the cyclic period, the controller circuitry performs communication of the communication data of the second control data that is temporarily stopped according to the same cyclic period as that of the new second control data.

US Pat. No. 10,924,405

SERVICE FUNCTION CHAINING CONGESTION FEEDBACK

Futurewei Technologies, I...

1. A method for reporting congestion to an upstream device implemented by a downstream device, comprising:receiving, by the downstream device from the upstream device, a packet including a first field containing a value notifying the downstream device of congestion on a service function path within a service function chaining architecture and a service path identifier field configured to contain one or more bits that indicate, to the downstream device, service nodes in a service function chain to which the downstream device should apply the packet;
generating, by the downstream device, a congestion report message in response to receiving, from the upstream device, the packet including the first field and the service path identifier field, wherein the congestion report message includes a modified version of the first field containing the value indicating an existence of the congestion on the service function path within the service function chaining architecture and the service path identifier field, wherein the service path identifier field in the congestion report message includes a service path identifier that specifies the service function path of the congestion within the service function chaining architecture by identifying the service nodes in the service function chain; and
transmitting, by the downstream device, the congestion report message to the upstream device without allowing for change in the value to permit the upstream device to alleviate the congestion.

US Pat. No. 10,924,404

MULTI-TENANT MIDDLEWARE CLOUD SERVICE TECHNOLOGY

MICROSOFT TECHNOLOGY LICE...

1. A computing system comprising:one or more processor(s); and
one or more computer-readable hardware storage device(s) having stored thereon computer-executable instructions that are executable by the one or more processor(s) to apply a middleware function to network traffic by at least:
identifying one or more characteristic(s) of the network traffic;
based on the one or more characteristic(s), determining an identity of a computing entity associated with the network traffic;
identifying a middleware policy associated with the computing entity; and
selecting a middleware function to apply to the network traffic based on the identified middleware policy, wherein, prior to the selected middleware function being applied to the network traffic, the selected middleware function is configured based on the middleware policy.

US Pat. No. 10,924,403

USING A SINGLE CACHE TABLE

Hewlett Packard Enterpris...

1. A method, comprising:receiving, by a processor of a switch, a packet having a tuple, wherein the tuple comprises a plurality of fields, wherein the switch operates using a protocol that compares each field of the plurality of fields to a corresponding table of a series of tables;
comparing, by the processor, the plurality of fields of the tuple to a single cache table instead of the series of tables;
responsive to determining that the plurality of fields of the tuple matches a single entry in the single cache table, accumulating, by the processor, a plurality of actions associated with the plurality of fields of the tuple based on the single entry;
responsive to determining that the plurality of fields of the tuple does not match a single entry in the single cache table:
accumulating, by the processor, the plurality of actions associated with the plurality of fields of the tuple based on a search of the series of tables; and
creating a new entry in the single cache table based on the plurality of fields of the tuple and the plurality of actions; and
applying, by the processor, the plurality of actions to the packet.

US Pat. No. 10,924,402

METHOD AND SERVER FOR DETERMINING A MAPPING ADDRESS OF A DATA STREAM

1. A method for determining a mapping address of a data stream, comprising:receiving a newly created current data stream, and recording a configuration identifier and a route identifier of the current data stream;
querying, according to source information of the current data stream, a historical data stream that matches the current data stream, wherein the source information includes at least a source transport protocol, a source address, and a source port, and the historical data stream includes a target mapping address; and
comparing the configuration identifier and the route identifier of the current data stream with a configuration identifier and a route identifier of the historical data stream, and determining, according to a comparison result, whether the current data stream continues to use the target mapping address of the historical data stream.

US Pat. No. 10,924,401

LIVE APPLICATION AND KERNEL MIGRATION USING ROUTING TABLE ENTRIES

INTERNATIONAL BUSINESS MA...

1. A method comprising:creating, by a controller application executing in a controller system, in a routing table of a first system, a routing table entry for a first application in a set of applications, the first application intended for relocation from the first system to a second system, the first application executing in the first system at a first time, a second application in the set of applications not intended for relocation;
commencing, responsive to relocating the first application from the first system to the second system, execution of the first application on the second system;
creating, by the controller application, at the second system responsive to commencing execution of the first application in the second system at a second time, a mapping entry, the mapping entry causing a forwarded packet to be delivered to the first application at the second system; and
modifying, by the controller application, responsive to a notification that the first application is executing in the second system, the routing table entry of the first system, the modified entry causing a packet addressed to the first application to be forwarded from the first system to the second system.

US Pat. No. 10,924,400

CONFIGURING A NETWORK FORWARDING ELEMENT WITH DATA PLANE PACKET SNAPSHOTTING CAPABILITIES

Barefoot Networks, Inc., ...

1. A method for configuring data plane circuitry of a network forwarding element to produce snapshots of a plurality of data messages passing through the data plane circuitry, the method comprising:at a control plane of the network forwarding element:
configuring a set of snapshot circuitry units in the data plane circuitry to produce a snapshot of contents of a data message processed by the data plane circuitry that matches a set of criteria, wherein the snapshot further comprises a state of the network forwarding element, wherein the state of the network forwarding element further comprises an internal state of the data plane circuitry, and wherein the internal state of the data plane circuitry comprises one or more of: which match tables hit or missed, which match table was accessed, a table pointer to a downstream match-action stage to indicate a next message-processing table to access for a data message, or a message-processing stage error output;
from the data plane circuitry, receiving a notification that a snapshot has been captured; and
retrieving the snapshot from the data plane circuitry, wherein the data plane circuitry comprises a set of match-action stages and the set of match-action stages are to cause storage of a set of attributes associated with a data message that match the set of criteria and based on a set of states, allow a match-action stage to trigger a snapshot capture in a match-action stage.

US Pat. No. 10,924,399

SEGMENT ROUTING PACKET POLICIES AND FUNCTIONS INCLUDING AN ENGINEERED REVERSE REPLY PATH PROVIDING EFFICIENCIES IN COMMUNICATING PACKETS IN A NETWORK

Cisco Technology, Inc., ...

1. A method, comprising:for each particular first segment routing packet of one or more first segment routing packets:
ascertaining a first segment routing policy, by a source node, that comprises a first segment list including a first plurality of segment identifiers in a first forwarding order with the last or second-to-the last segment identifier in the first segment list being a destination segment identifier identifying a destination node in the network and a dynamic return path segment routing function;
sending into the network, by the source node, said particular first segment routing packet including a segment routing source address of the source node as its Internet Protocol source address, a first segment routing header comprising the first segment list, and first data comprising source application information from an application in the source node;
forwarding said particular first segment routing packet through the network to the destination node, including segment routing forwarding according to the first segment list;
receiving said particular first segment routing packet by the destination node;
determining, by a destination application in the destination node, destination application information based on said source application information extracted from said received particular first segment routing packet; and
reacting to the dynamic return path segment routing function which defines a generation of a second segment list and is identified in the destination segment identifier in said received particular first segment routing packet, the destination node sending into the network a second segment routing packet comprising the destination segment identifier or another segment identifier of the destination node as its Internet Protocol source address, second data comprising said destination application information, and a second segment routing header comprising the second segment list generated according to the dynamic return path segment routing function;
wherein the second segment list comprises a plurality of the first plurality of segment identifiers listed in an opposite order of the first forwarding order followed by the segment routing source address acquired from said Internet Protocol source address of said received particular first segment routing packet.

US Pat. No. 10,924,398

TIME-SERIES DATA MONITORING WITH SHARDED SERVER

eBay Inc., San Jose, CA ...

1. A server comprising:one or more processors; and
memory storing:
a temporal routing map comprising routing data specifying time series of mappings between a plurality of targets and a plurality of monitoring-server instances that collect metrics data from the targets, each target corresponding to a component or a component-shard of a monitored system; and
instructions for execution by the one or more processors, the instructions, when executed, causing the one or more processors to perform operations comprising:
receiving, from a client, a routing query specifying a time and a target identifier;
determining a monitoring-server-instance identifier associated with a specified target identifier and with a timestamp corresponding to a specified time using the temporal routing map; and
sending a response to the client, the response including the monitoring-server-instance identifier associated with the specified target identifier and with the timestamp corresponding to the specified time.

US Pat. No. 10,924,397

MULTI-VRF AND MULTI-SERVICE INSERTION ON EDGE GATEWAY VIRTUAL MACHINES

VMware, Inc., Palo Alto,...

1. A method for a multi-virtual-routing-and-forwarding (“VRF”) and multi-service insertion on edge gateways, the method comprising:detecting a packet;
determining one or more attributes for the packet;
based on, at least in part, the one or more attributes, determining whether the one or more attributes match one or more rule attributes of a particular rule in a rule table;
in response to determining that the one or more attributes match the one or more rule attributes of a particular rule in the rule table:
determining, based on the particular rule, a particular redirection identifier, a particular VRF identifier, a particular next hop, a particular address pair, and a particular BFD status;
based on, at least in part, the particular BFD status, determining whether to redirect the packet; and
in response to determining to redirect the packet, resolving a particular MAC address based on, at least in part, the particular next hop, encapsulating the packet with the particular MAC address, and redirecting the packet toward a service virtual machine from an interface indicated by one of addresses in the particular address pair.

US Pat. No. 10,924,395

SEAMLESS MULTIPOINT LABEL DISTRIBUTION PROTOCOL (MLDP) TRANSPORT OVER A BIT INDEX EXPLICIT REPLICATION (BIER) CORE

CISCO TECHNOLOGY, INC., ...

1. A method comprising:determining that a first plurality of network devices comprise Bit Index Explicit Replication (BIER) edge routers;
creating, in response to determining that the first plurality of network devices comprise BIER edge routers, a Targeted Label Distribution Protocol (T-LDP) session between a first one of the first plurality of network devices and a second one of the first plurality of network devices;
advertising, by the second one of the first plurality of network devices over the T-LDP session, an address of a peer device connected to the second one of the first plurality of network devices; and
placing an entry in a proxy database, wherein the entry indicates a connection between the peer device and the second one of the first plurality of network devices.

US Pat. No. 10,924,394

COMPUTING LABEL-SWITCHED DATA COMMUNICATION PATHS

KEYSIGHT TECHNOLOGIES SIN...

1. A system for validating label-switched data communication paths, the system comprising:at least one processor; and
a multiprotocol label switching (MPLS) operations, administration, and maintenance (OAM) emulator, implemented on the at least one processor, and configured for emulating an MPLS element in a label-switched network and for:
receiving, from a path computation element (PCE) for the label-switching network, a segment routing (SR) explicit route object (ERG) for a label-switched path (LSP) determined by the PCE using synchronization status information for a plurality of routing nodes in the label-switched network;
sending an MPLS echo request to a plurality of downstream routing nodes specified by the SR ERG;
receiving a respective MPLS echo reply from each of the downstream routing nodes; and
validating the LSP using the MPLS echo replies using sent and
received timestamps and, in response to validating the LSP, transitioning the LSP state from down to up;
wherein sending an MPLS echo request to the downstream routing nodes comprises sending the MPLS echo request with a target forwarding equivalence class (FEC) stack type-length-value (TLV) for validating the LSP.

US Pat. No. 10,924,393

PER-FLOW CALL ADMISSION CONTROL USING A PREDICTIVE MODEL TO ESTIMATE TUNNEL QOS IN SD-WAN NETWORKS

Cisco Technology, Inc., ...

1. A method, comprising:identifying, by a device, a new traffic flow in a network;
identifying, by the device, a user identifier associated with the new traffic flow;
determining, by the device, a service level agreement (SLA) associated with the new traffic flow based in part on calendar information associated with the user identifier;
using, by the device, a machine learning model to predict whether a particular tunnel in the network can satisfy the determined SLA of the traffic were the traffic flow routed onto the tunnel; and
performing, by the device, call admission control to route the new traffic flow onto the particular tunnel, based on a prediction that the tunnel can satisfy the determined SLA of the traffic.

US Pat. No. 10,924,392

PLANNING AND MANAGING NETWORK PROBES USING CENTRALIZED CONTROLLER

Juniper Networks, Inc., ...

1. A method comprising:constructing, by a network device for a network that includes a plurality of node devices, a topological representation of the network, wherein the topological representation comprises an indication of each of the plurality of node devices and an indication of each link of a plurality of links, each link connecting two node devices of the plurality of node devices; and
for each of the plurality of links:
selecting, by the network device and based on the topological representation of the network, a node device of the two node devices connected by the respective link to measure one or more quality of experience (QoE) metrics for the respective link, wherein the non-selected node device does not measure the QoE metrics for the respective link;
in response to selecting the selected node device to measure the one or more QoE metrics for the respective link, receiving, by the network device and from the selected node device, a set of one or more QoE metrics for the respective link, wherein the set of one or more QoE metrics indicate QoE metrics for data flows flowing from the selected node device to the non-selected node device;
storing, by the network device, the set of QoE metrics for the respective link in a database; and
determining, by the network device and based on the set of one or more QoE metrics for the respective link, a set of one or more counter QoE metrics indicating QoE metrics for data flows flowing from the non-selected node device to the selected node device.

US Pat. No. 10,924,391

SYSTEMS AND METHODS FOR AUTOMATIC TRAFFIC RECOVERY AFTER VRRP VMAC INSTALLATION FAILURES IN A LAG FABRIC

DELL PRODUCTS L.P., Roun...

1. A method for virtual routing redundancy protocol (VRRP) virtual MAC (VMAC) routing failure recovery, the method comprising:responsive to a Link Aggregation Group (LAG) node encountering a VRRP VMAC failure, using a LAG control message to notify a LAG peer node of the VRRP VMAC failure, the LAG node and the LAG peer node being communicatively coupled via an internode link;
determining whether a database associated with the LAG node comprises an entry that indicates that the VRRP VMAC failure has occurred in the LAG peer node; and
responsive to the database not comprising the entry that indicates that the VRRP VMAC failure has occurred in the LAG peer node, generating a forwarding path entry rule for the LAG node to route traffic via the internode link to reduce data loss.

US Pat. No. 10,924,390

UPDATING ENTRIES OF A DISTRIBUTION DATA STRUCTURE

Hewlett Packard Enterpris...

11. A switch comprising:a plurality of ports to connect to a plurality of network paths; and
a controller to:
use a distribution data structure in distributing communications of data packets across the plurality of network paths, wherein the distribution data structure comprises a first data structure with entries pointing to a second data structure; and
responsive to an addition of a new network path or a removal of an existing network path for the switch:
changing entries in the second data structure;
identify selected entries of the first data structure to skip,
update the entries of the first data structure to reflect the change in the second data structure, wherein the selected entries are skipped in the updating,
for each respective network path of the plurality of network paths, compute a respective difference value representing a first number of entries of the distribution data structure mapped to the respective network path prior to the addition or the removal, and a second number of entries of the distribution data structure mapped to the respective network path after the addition or the removal; and
use the difference values in identifying the selected entries of the distribution datastructure to skip.

US Pat. No. 10,924,389

SEGMENT ROUTING BASED ON MAXIMUM SEGMENT IDENTIFIER DEPTH

Telefonaktiebolaget LM Er...

1. A method implemented in an electronic device in a software defined networking (SDN) system, wherein the electronic device serves as a SDN controller in the SDN system, the method comprising:receiving a plurality of values of maximum segment identifier (SID) depths, each from one network element of the SDN system;
identifying a path for one or more packets to transmit through a plurality of network elements, wherein a plurality of SIDs corresponding to the plurality of network elements is ordered to represent the path;
splitting the path into a plurality of sub-paths based on the plurality of values of the maximum SID depths of the plurality of network elements, wherein each network element, for the path, is allocated to process a number of ordered SIDs, and wherein the number is within the network element's maximum SID depth; and
causing packet forwarding of the one or more packets along the plurality of sub paths based on SIDs allocated to the network elements, wherein causing packet forwarding of the one or more packets along the plurality of sub-paths comprises:
sending ordered SIDs of a first sub-path to a selected network element in the first sub-path, wherein the selection is based on the ordered SIDs of the first sub-path;
sending, to a network element that is the last network element in a first sub-path and the first network element in a second sub-path, ordered SIDs of the second sub-path and the same forwarding equivalence class that was sent to the selected network element in the first sub-path.

US Pat. No. 10,924,388

MULTI-PATH ROUTING

Amazon Technologies, Inc....

1. A system comprising:a first computing device comprising one or more processors configured with processor-executable instructions to perform operations comprising establishing real time communications with a second computing device; and
a plurality of intermediate computing devices each corresponding to a physical point of presence in a wide area network implemented by a first service provider, the plurality of intermediate computing devices comprising one or more processors configured with processor-executable instructions to perform operations comprising:
obtaining, from at least one external source, historical performance information regarding a plurality of historical data flows with the first computing device, the historical performance information including a plurality of previously measured latencies of a first data flow of the plurality of historical data flows;
selecting the first data flow from a plurality of established data flows between the first computing device and the second computing device based at least in part on the historical performance information, wherein each of the plurality of established data flows corresponds to a different intermediate computing device of the plurality of intermediate computing devices;
monitoring transmission of at least one data communication along each of the plurality of established data flows;
receiving information from the first computing device or the second computing device, the information responsive to processing the at least one data communication along one or more of the plurality of established data flows; and
selecting a second data flow from the plurality of established data flows based at least in part on the historical performance information and the information received from the first computing device or the second computing device.

US Pat. No. 10,924,387

METHOD AND APPARATUS FOR PREVENTING LOOPS IN A NETWORK TOPOLOGY

Telia Company AB, Solna ...

1. A method for preventing loops in a network topology comprising a plurality of switch devices, the method comprising:assigning, to each switch device, a unique switch identification number, SW-ID;
exchanging each SW-ID between all switch devices;
building, for each switch device, a routing table based on said received SW-IDs, so that the switch devices can reach each other, each entry in the routing table associated with a switch device, and including an assigned SW-ID of the switch device, a dedicated port number, and a number of hops to reach the switch device, the number of hops corresponding to a shortest path to reach the switch device; and
receiving, at a first switch device, a data frame from a second switch device that includes a single switch identification number, namely a source switch identification number, SS-ID, assigned to the second switch device, the data frame is received at a port of the first switch device;
when, according to the routing table of the first switch device, the assigned SW-ID for the port of the first switch device is different from the SS-ID included in the data frame, discarding the data frame, and
when, according to the routing table of the first switch device, the assigned SW-ID for the port of the first switch device is not different from the SS-ID included in the data frame,
processing forwarding the data frame, wherein processing forwarding the data frame comprises:
when the data frame is a broadcast frame or an unknown-unicast frame,
flooding the data frame out from each port of the first switch device that is connected to other switch devices except from the port from which the data frame was received; and
removing the SS-ID from the data frame and flooding the data frame without the SS-ID frame out from each port of the first switch device that is directly connected to at least one host node, and
when the data frame is a known-unicast frame,
checking, using the routing table of the first switch device, if there is any SW-ID assigned to a port number that is associated with a MAC destination address in the data frame; and
when there is no SW-ID, removing the SS-ID from the data frame and forwarding the data frame out from said associated port to its destination MAC address; and
when there is a SW-ID, forwarding the data frame to the switch device having the SW-ID.

US Pat. No. 10,924,386

DATABASE PROTOCOL FOR EXCHANGING FORWARDING STATE WITH HARDWARE SWITCHES

NICIRA, INC., Palo Alto,...

1. A method for a service node to forward packets through a network, the method comprising:at the service node:
receiving an unknown unicast packet for a particular virtual network from a forwarding element that implements the virtual network with a plurality of other forwarding elements that include hardware and software forwarding elements;
replicating the unknown unicast packet; and
sending a replica of the unknown unicast packet to each hardware forwarding element in a first set of hardware forwarding elements comprising at least two hardware forwarding elements from which the service node did not receive the unknown unicast packet,
wherein a hardware forwarding element in the first set of forwarding elements outputs the unknown unicast packet to a port of the hardware forwarding element when the hardware forwarding element identifies the port as being connected to a machine with an address that is the same as a destination address of the unknown unicast packet.

US Pat. No. 10,924,385

WEIGHTED MULTIPATH ROUTING CONFIGURATION IN SOFTWARE-DEFINED NETWORK (SDN) ENVIRONMENTS

NICIRA, INC., Palo Alto,...

1. A method for a network manager to perform weighted multipath routing configuration in a software-defined networking (SDN) environment that includes the network manager, a first node, and multiple next-hop second nodes, the method comprising:obtaining, by the network manager from the multiple next-hop second nodes, state information associated with the multiple next-hop second nodes, wherein the multiple next-hop second nodes each provide a next hop from the first node in multiple respective paths for an egress packet that is destined from the first node to a destination network;
based on the state information associated with the multiple next-hop second nodes, assigning, by the network manager, the multiple next-hop second nodes with respective multiple weights, wherein:
the state information represents a plurality of performance-related parameters that respectively correspond to a plurality of sub-weights,
each particular weight of the multiple weights is computed based on the plurality of sub-weights, and
a value of at least one sub-weight of the plurality of sub-weights is configurable to provide more consideration to the at least one sub-weight in computing the particular weight, relative to other sub-weights of the plurality of sub-weights; and
generating and sending, by the network manager, control information that specifies the multiple weights to the first node to cause the first node to select, based on the multiple weights, a particular next-hop second node from amongst the multiple next-hop second nodes as the next hop to receive the egress packet from the first node.

US Pat. No. 10,924,384

TRAFFIC ENGINEERING FOR BORDER GATEWAY PROTOCOL

Ciena Corporation, Hanov...

1. A method, implemented at a first Border Gateway Protocol (BGP) speaker node of a first autonomous system, the method comprising:receiving an advertisement having information pertaining to available bandwidth on one or more links between the first autonomous system and a second autonomous system, the advertisement received from a second BGP speaker node of the second autonomous system;
performing a BGP best path calculation between the first and second autonomous systems at the first BGP speaker node, by selecting a link from the one or more links, wherein selecting the link is based on the available bandwidth and real traffic data on the one or more links;
determining updated available bandwidth on the one or more links; and
transmitting an updated advertisement to the second BGP speaker node based on the determined updated available bandwidth, wherein the updated advertisement is transmitted it the determined updated available bandwidth has changed from a previous value by more than a configurable threshold.

US Pat. No. 10,924,383

UTILIZING SEGMENT ROUTING DATA AND NETWORK DATA TO DETERMINE OPTIMIZED NETWORK PLANS AND TO IMPLEMENT AN OPTIMIZED NETWORK PLAN

Juniper Networks, Inc., ...

1. A method, comprising:receiving, by a device, network data associated with a network,
wherein the network includes a plurality of network devices interconnected by links, and
wherein the plurality of network devices utilizes segment routing;
receiving, by the device, segment routing data associated with the network,
wherein the segment routing data at least includes a list of segments associated with paths provided through the network by two or more of the plurality of network devices and corresponding links of the links;
receiving, by the device, constraints associated with determining a network plan for the network,
wherein the constraints at least include a constraint indicating a particular time period associated with determining a plurality of potential network plans for the network;
merging, by the device, the network data and the segment routing data to generate merged data;
processing, by the device, the constraints and the merged data, with an optimization model, to determine the plurality of potential network plans within the particular time period;
providing, by the device and to a client device, information identifying the plurality of potential network plans;
receiving, by the device and from the client device, information indicating a selection of a potential network plan, from the plurality of potential network plans;
identifying, by the device and based on the selection, the potential network plan; and
performing, by the device, one or more actions based on the potential network plan.

US Pat. No. 10,924,382

RAPID AND VERIFIABLE NETWORK CONFIGURATION REPAIR

Raytheon BBN Technologies...

1. A network configuration repair apparatus, the apparatus comprising:memory with policies, extended topology graphs (ETGs) including an all ETG (aETG), and destination ETGs (dETGs) for each policy destination in the policies, stored thereon; and
processing circuitry configured to:
add a routing adjacency or route redistribution edge to a router of the aETG to generate an enhanced aETG (eaETG);
add, for each dETG of the dETGs, static route edges to the destination of the dETG to generate an enhanced dETG (edETG);
determine, for each of the edETGs, all simple paths from all sources to the destination of the edETG;
determine a set of paths (pathtset) over the determined simple paths that satisfies the policies; and
translate the edge additions and/or removals in the eaETG and in the edETGs to an addition and/or removal of one or more of a routing adjacency, routing filter, or static route based on the determined pathset.

US Pat. No. 10,924,381

SYSTEM AND METHOD OF PROCESSING IN-PLACE ADJACENCY UPDATES

Arista Networks, Inc., S...

1. A non-transitory machine-readable medium having executable instructions to cause one or more processing units to perform a method to process changes to forwarding information of a network element in a network, the method comprising:receiving an indication of a change to a network topology of the network, wherein the forwarding information includes a first plurality of prefixes and a plurality of adjacencies and each of the first plurality of prefixes references one of the plurality of adjacencies;
in response to receiving the indication of the change to the network topology, identifying a change to the plurality of adjacencies; and
updating the plurality of adjacencies in-place with the change to the plurality of adjacencies;
wherein the change in the network topology is a peer up, and the in-place updating of the plurality of adjacencies comprises:
receiving a notification of a new peer;
receiving a second plurality of prefixes;
computing a second next hop list from each of the plurality of prefixes;
performing divergence detection between the second next hop list and a first next hop list computed from the first plurality of prefixes; and
if the first and second next hop lists are not diverged, updating the plurality of adjacencies in-place.

US Pat. No. 10,924,380

ADAPTIVE PRIVATE NETWORK (APN) BANDWIDTH ENHANCEMENTS

TALARI NETWORKS INCORPORA...

1. A method for automated bandwidth testing across an adaptive private network (APN) paths, the method comprising:configuring an automated bandwidth test between a user and a network control node (NCN) of the APN;
sending a sequence of N packets from a first site, each of the packets having a same length L, and comprising a timestamp of when sent on a designated path in the APN across a wide area network (WAN) link to a destination site, wherein each of the N packets are configured as control test packets;
receiving the sequence of N packets at the destination site and marking each received packet with a receive timestamp;
determining a path bandwidth according to the difference between the Nth packet and the first packet; and
determining the path bandwidth for data sent from a small bandwidth link to a bandwidth link having two or more times the bandwidth of the small bandwidth link by only accounting for the control test packets and removing client data packets that are intermingled with the control test packets.

US Pat. No. 10,924,379

METHOD AND DEVICE FOR CONTROLLING TRANSMISSION RATE OF A DEVICE UNDER TEST

1. A method for controlling transmission rate of a device under test (DUT) comprising the steps of:establishing a connection to the DUT,
transmitting an operating mode notification in order to adjust at least one of the operating bandwidth or the spatial stream capabilities of the DUT,
receiving an acknowledgement notification from the DUT regarding the correct reception of the transmitted operating mode notification,
withholding the acknowledgement notification transmission until a target modulation and coding scheme are reached, and
repeating transmitting a corrupted acknowledgement notification until the DUT lowers its modulation and coding scheme to the target modulation and coding scheme.

US Pat. No. 10,924,378

SYSTEM AND METHOD FOR LOOPBACK AND NETWORK LOOP DETECTION AND ANALYSIS

Accedian Networks Inc., ...

1. A method of determining the presence of a tunnel loopback at a port on a device in a network, the method comprising:assigning a section level to one or more section of said network;
assigning a unique domain number to one or more domains wherein one domain comprises one or more sections at the same section level;
storing a protocol data unit (PDU) that includes a Virtual Local Area Network (VLAN) signature;
sending a loopback detection beacon (LPDB) containing said PDU, a domain number and a time stamp;
determining whether a detected LPDB arriving at said port contains information corresponding to said stored PDU, to detect the presence of a loopback.

US Pat. No. 10,924,377

SYSTEMS AND METHODS FOR APPLICATION SCRIPTS FOR CROSS-DOMAIN APPLICATIONS

Citrix Systems, Inc., Fo...

1. A method for executing in an embedded browser an application script for network applications of different origins, the method comprising:(a) establishing, by a client application, a first one or more sessions with a first one or more network applications of a first entity at a first origin via an embedded browser within the client application;
(b) establishing, by the client application, a second one or more sessions with a second one or more network applications of a second entity at a second origin via the embedded browser within the client application;
(c) identifying, by a scripting engine within the client application of a client device of a user at a third origin, an application script comprising instructions to interact with each the first one or more networks applications of the first entity at the first origin and the second one or more network applications of the second entity at the second origin; and
(d) executing, by the scripting engine, the instructions of the application script to perform a first portion of a task using a first network application of the first one or more networks applications of the first entity at the first origin and to perform a second portion of the task using a second network application of the second one or more network applications of the second entity at the second origin.

US Pat. No. 10,924,376

SELECTIVE SENSOR POLLING

Google LLC, Mountain Vie...

1. A system to selectively poll sensors via a computer network, comprising:a natural language processor component executed by a data processing system to receive, via an interface of the data processing system, data packets comprising an input audio signal detected by a microphone of a client device;
the natural language processor component to parse the input audio signal to identify a request and a trigger keyword corresponding to the request;
a direct action application programming interface (“API”) of the data processing system to select, based on the trigger keyword, a template for an action data structure responsive to the request, the action data structure to package one or more parameters used by a third party provider device to perform an operation to provide a type of service or a type of product, the template comprising a first field;
a sensor management component of the data processing system to:
determine not to use a sensor of the client device responsive based on at least one of the sensor in an offline state, failure of the sensor to respond to a ping within a time period, a malfunction of the sensor, or failure by the sensor to pass a diagnostic test;
identify, responsive to the determination to not use the sensor of the client device, a plurality of available sensors not coupled to the client device that are coupled to a plurality of client devices that i) are each associated with an end user account associated with the client device, ii) are each within a threshold distance of the client device, and iii) have each successfully performed a handshaking process with the data processing system using credentials of the end user account and are currently online, the plurality of client devices comprising a second client device and a third client device;
identify a plurality of available sensors configured to obtain information for the first field of the action data structure used by the third party provider device to perform the operation to provide the type of service or the type of product, the plurality of available sensors comprising a first sensor of the second client device and a second sensor of the third client device;
determine a status of each of the plurality of available sensors;
select, based on the status and the determination to not use the sensor of the client device, the first sensor of the plurality of available sensors of the second client device of the plurality of client devices;
poll the first sensor for data corresponding to the first field of the action data structure used by the third party provider device to perform the operation to provide the type of service or the type of product;
the direct action API to populate the first field with the data received by the sensor management component responsive to the poll of the first sensor, and to generate the action data structure to provide the type of service or the type of product based on the first field of the template;
the direct action API to transmit the action data structure to the third party provider device to cause the third party provider device to invoke an operation session between the third party provider device and the client device and perform one or more actions that provide the type of service or the type of product based on the one or more parameters packaged in the action data structure generated by the direct action API; and
the data processing system to receive, from the third party provider device, an indication that the third party provider device established the operation session with the client device.

US Pat. No. 10,924,375

APPARATUS, SYSTEM, AND METHOD FOR PROBING THE STATUS OF UNREACHABLE VIRTUAL INTERFACES PARTITIONED ON REMOTE PHYSICAL INTERFACES

Juniper Networks, Inc, S...

1. A method comprising:receiving, at a proxy node within a network, an echo request from a probing node within the network;
identifying, within the echo request, a type of probe to be performed in connection with the echo request;
determining, based at least in part on the type of probe identified within the echo request, that a proxy interface included on the proxy node is to probe a status of a virtual interface partitioned on a physical interface, wherein:
the virtual interface is one of a plurality of virtual interfaces that are partitioned on the physical interface;
the physical interface is included on a physical node that implements Single Root Input/Output Virtualization (SR-IOV); and
the physical node creates the plurality of virtual interfaces via the SR-IOV;
probing, via the proxy interface, the status of the virtual interface partitioned on the physical interface by way of a virtual function index assigned to the virtual interface; and
sending, to the probing node, an echo reply that identifies the status of the virtual interface partitioned on the physical interface.

US Pat. No. 10,924,374

TELEMETRY EVENT AGGREGATION

MELLANOX TECHNOLOGIES TLV...

1. A network device, comprising:multiple interfaces including at least one egress interface, which is configured to transmit packets belonging to multiple flows to a packet data network;
control circuitry configured to generate event-reporting data-items, each including flow and event-type information about a packet-related event occurring in the network device;
a memory; and
aggregation circuitry configured to:
aggregate data of at least some of the event-reporting data-items into aggregated-event-reporting data-items aggregated according to the flow and event-type information of the at least some event-reporting data-items;
store the aggregated-event-reporting data-items in the memory; and
forward one aggregated-event-reporting data-item of the aggregated-event-reporting data-items to a collector node, and purge the one aggregated-event-reporting data-item from the memory.

US Pat. No. 10,924,373

OPTICAL LINE TERMINAL OF OPTICAL NETWORK AND UPLINK SCHEDULING METHOD

MITSUBISHI ELECTRIC CORPO...

1. An optical line terminal for an optical network, which is configured to transmit to and receive from one or a plurality of optical network units in a PON-type optical network, the optical line terminal comprising:a processing circuitry
to manage, for each of the one or plurality of optical network units, a transmission delay time in transmission to the one or plurality of optical network units;
to manage, for each of the one or plurality of optical network units, an acceptable waiting time of uplink data of the one or plurality of optical network units;
to obtain, for each of the one or plurality of optical network units, an uplink transmission start time and data amount of the optical network unit, based on uplink assignment information, which is sent from a node different from the optical line terminal and the one or plurality of optical network units; and
to generate, for each of the one or plurality of optical network units, uplink transmission grant information, which is made up of a time point and time length of uplink transmission to the one or plurality of optical network units,
wherein the processing circuitry determines, for each of the one or plurality of optical network units, the uplink transmission grant information on transmission to the one or plurality of optical network units, based on a transmission delay time of the one or plurality of optical network units, on the uplink transmission start time and data amount of the one or plurality of optical network units, and on the acceptable waiting time of uplink data of the one or plurality of optical network units.

US Pat. No. 10,924,372

COMPUTING SYSTEM PROVIDING ENHANCED POINT OF PRESENCE (POP) SERVER SELECTION BASED UPON NETWORK HEALTH METRICS AND RELATED METHODS

CITRIX SYSTEMS, INC., Fo...

1. A computing system comprising:a plurality of point of presence (PoP) servers coupled to a wide area network (WAN) and configured to receive client requests for at least one Software as a service (SaaS) application from a plurality of different network branches coupled to the WAN, and connect the network branches with a given SaaS host server from among a plurality of different SaaS host servers coupled to the WAN and providing the at least one SaaS application; and
a PoP selection controller (PSC) coupled to the WAN and comprising a processor and associated memory, the PSC cooperating with the PoP servers to
determine first network health metrics for connections between the PoP servers and the network branches,
determine second network health metrics for connections between the PoP servers and the SaaS host servers,
select a respective PoP server for each network branch to be connected with for providing the at least one SaaS application based upon the first and second network health metrics, and
update the first and second network health metrics over time and change the selected PoP servers for the network branches based upon the updated first and second network health metrics;
wherein the selected PoP server performs source network address translation (SNAT) on client requests received from the network branches by replacing a source address in the client requests with an address of the selected PoP server.

US Pat. No. 10,924,370

MONITORING CLOUD-BASED SERVICES AND/OR FEATURES

Verizon Patent and Licens...

1. A method, comprising:determining, by a microservice monitoring platform, a service health status for a microservice based on a service type associated with the microservice,
wherein the microservice is hosted in a first cloud computing environment by a first data center,
wherein the service type comprises an internal microservice type, and
wherein determining the service health status for the microservice comprises:
identifying one or more health metrics that are associated with the microservice,
determining, for each health metric of the one or more health metrics, a respective metric value,
determining whether the respective metric value, for each health metric of the one or more health metrics, satisfies a metric value threshold,
identifying one or more dependent microservices,
wherein the microservice uses the one or more dependent microservices,
determining a dependent service health status for each dependent microservice of the one or more dependent microservices, and
determining the service health status for the microservice based on determining whether the respective metric value, for each health metric of the one or more health metrics, satisfies the metric value threshold and based on the dependent service health status for each dependent microservice of the one or more dependent microservices,
wherein the microservice is determined to be unavailable if one of the one or more dependent microservices is determined to be critical and unavailable;
determining, by the microservice monitoring platform, a feature health status for a cloud-based feature based on the service health status for a plurality of microservices,
wherein the plurality of microservices are used by the cloud-based feature, and
wherein the cloud-based feature is hosted in the first cloud computing environment by the first data center;
transmitting, by the microservice monitoring platform and to a client device, information identifying service health statuses for the plurality of microservices and information identifying the feature health status for the cloud-based feature,
wherein the service health statuses for the plurality of microservices are displayable based on at least one of:
a region of a respective microservice,
a category of a respective microservice, or
a type of a respective microservice; and
transmitting, by the microservice monitoring platform and based on the feature health status, an instruction to route a service request, associated with the cloud-based feature, to one of:
the first data center, or
a second data center that hosts the cloud-based feature in a second cloud computing environment.

US Pat. No. 10,924,369

TRAFFIC AWARE OPERATIONS, ADMINISTRATION, AND MAINTENANCE (OAM) SOLUTIONS FOR INTERNET OF THINGS (IOT) NETWORKS

CISCO TECHNOLOGY, INC., ...

1. A method comprising:maintaining a list of one or more Internet of Things (IoT) devices connected to an IoT gateway in an IoT network;
classifying at least a subset of the one or more IoT devices as belonging to an active list based on receiving traffic from at least the subset of the one or more IoT devices; and
suppressing Operations, Administration, and Maintenance (OAM) probes to at least the subset of the one or more IoT devices in the active list.

US Pat. No. 10,924,368

NETWORK MONITORING TOOL FOR SUPERCOMPUTERS

Architecture Technology C...

1. A method for monitoring supercomputer nodes, the method comprising:receiving, by a monitoring device configured to monitor communications between a plurality of nodes of a supercomputer system, node data from a set of one or more nodes allocated to execute a process;
generating, by the monitoring device, a virtual topology representing a physical topology of an architecture of the supercomputer system based on the node data, at least a portion of the node data represents communications between a plurality of nodes of the supercomputer system;
generating, by the monitoring device, a global virtual topology representing one or more virtual topologies based on the node data for communications between each set of one or more nodes of the supercomputer system; and
allocating, by the monitoring device, an available node processor in a second set of one or more nodes to execute a new process according to the global virtual topology.

US Pat. No. 10,924,367

USING SERVICE GRAPHS TO COMPARE PERFORMANCE OF A PLURALITY OF VERSIONS OF A MICROSERVICE

Citrix Systems, Inc., Fo...

1. A method of using service graphs to compare performance of a plurality of versions of a microservice, the method comprising:(a) identifying, by one or more devices, metrics for a plurality of versions of a microservice of a service, the plurality of versions being executable concurrently for at least a portion of execution of the service, each of the plurality of versions receiving a respective portion of network traffic of the service;
(b) generating, by the one or more devices, a service graph for each version of the plurality of versions of the microservice, each of the service graphs comprising metrics from execution of a respective version of the microservice;
(c) identifying, by the one or more devices, one or more differences in metrics between the service graphs for different versions of the microservice; and
(d) requesting a change in the respective portion of network traffic of the service between respective versions of the microservice based at least on the one or more differences.

US Pat. No. 10,924,366

TECHNIQUES FOR PROVIDING VISUALIZATION AND ANALYSIS OF PERFORMANCE DATA

VIAVI Solutions Inc., Sa...

1. A method comprising:providing, by a first micro network access agent and to a second micro network access agent, an alert regarding a need for the second micro network access agent to ignore one or more packets;
analyzing, by the first micro network access agent, first packet traffic;
generating, by the first micro network access agent, first data based on analyzing the first packet traffic; and
providing, by the first micro network access agent, the first data to one or more devices,
the first data being different from second data that is generated based on the second micro network access agent analyzing second packet traffic.

US Pat. No. 10,924,365

METHOD AND SYSTEM FOR GENERATING DIRECTED GRAPHS

INETCO SYSTEMS LIMITED, ...

1. A method for generating a directed graph for a transaction in an application by an event processing system to improve operation thereof, the method comprising:receiving event information for events included in the transaction at a processor within the event processing system, each event having a link directed from a first endpoint to a second endpoint in the application, each event including other data required for downstream processing and display, the event information including only information required for correlation and for matching endpoints;
assigning an identification (“ID”) number to each event and including the ID number in the event information for each event;
based on matching endpoint alone, correlating the event information using the other data required for downstream processing and display to produce dyadic event information representative of dyadic events, each dyadic event including a first event and a second event associated with the endpoint, the dyadic event information for each dyadic event including a first ID number and a second ID number for the first event and the second event, respectively;
based on matching ID number alone, combining the dyadic event information to produce correlation fragments associated with the ID number, wherein only one type of ID number is used, and wherein the combining is performed without using a conditional expression for combining ID numbers;
combining the correlation fragments to produce the directed graph for the transaction, wherein the transaction is a single transaction and only the correlation fragments relating to the single transaction are combined; and,
outputting the directed graph to an application performance monitoring system to improve operation thereof;
wherein the method is low latency allowing for real-time assembly of the directed graph.

US Pat. No. 10,924,364

ELASTIC SYSTEM MONITORING

New Relic, Inc., San Fra...

1. A method for monitoring a component of a system, comprising:receiving, from an agent of the component of the system, first state information regarding the component, the first state information collected by the agent at a first intensity level;
determining a second intensity level for collecting second state information regarding the component by the agent based on the first state information, the first state information including a user event value indicating a number of user events processed by the component and a throughput value indicating a number of requests flowing in and out of the component, the second intensity level being different from the first intensity level;
sending an instruction to the agent that causes the agent to collect the second state information at the second intensity level; and
receiving the second state information collected by the agent at the second intensity level from the agent.

US Pat. No. 10,924,363

METHOD AND SYSTEM FOR SECURE RESOURCE MANAGEMENT UTILIZING BLOCKCHAIN AND SMART CONTRACTS

The Curators of the Unive...

1. A management system for electronic resources comprising:an edge server having a processor, a memory, and a network interface;
at least one device in communication with the edge server via the network interface;
a resource management system stored within the memory of the edge server; and
wherein the resource management system is executed by a plurality of instructions carried out by the processor of the edge server, the plurality of instructions including, (1) retrieval of the at least one device's attributes by the edge server for registering the at least one device within the resource management system, (2) allocation of a digital currency for a resource request operation to the at least one device by the resource management system, (3) execution of a smart contract by the at least one device within the resource management system, the smart contact detailing an authorized parameter of the resource request operation by the resource management system, (4) recordation of the resource request operation by the at least one device on a blockchain operated and maintained by the resource management system, and (5) authorization or deauthorization of the at least one device performing the resource request operation via the smart contract by the resource management system.

US Pat. No. 10,924,362

MANAGEMENT OF SOFTWARE BUGS IN A DATA PROCESSING SYSTEM

Palantir Technologies Inc...

1. A method of managing software bugs in a data processing system comprising one or more data resources, the method being performed using one or more processors and comprising:receiving an indication of one or more bugs relating to one or more data resources, and contextual information for the one or more bugs;
determining, from the received indication, one or more bug types and grouping the bugs by bug type for the same data resource to produce an aggregated list of open issues requiring fixing;
presenting the aggregated list of one or more open issues on a user interface for selection, the one or more open issues being selectable, each open issue comprising one or more bugs of a common bug type;
responsive to receiving selection of a particular open issue, presenting particular contextual information of the particular open issue, the particular contextual information comprising:
a description of any of patches, fixes, or updates associated with the particular open issue; and
a hash identifier referring to the one or more bugs of the particular open issue, that uniquely identifies the particular open issue and links the particular open issue to other issues on the user interface; and
providing an option to deploy a same fix to all data resources to which the bugs of the particular open issue are related, and wherein the presenting contextual information further comprises:
displaying a list of version numbers of the data resource affected by the particular open issue directly above a list of deployments affected by the particular open issue;
displaying the list of deployments affected by the particular open issue directly above the hash identifier of the particular open issue;
displaying the hash identifier of the particular open issue directly above a date or a time, or the description of any of patches, fixes, or updates associated with the particular open issue, and further comprising:
responsive to clicking a button or link on the user interface, presenting a description of a service, stack, type, log count, and a link to individual stack traces for each of the deployments.

US Pat. No. 10,924,361

DECENTRALIZED DATA ANALYTICS MANAGEMENT

EMC IP Holding Company LL...

1. An apparatus comprising:at least one processing device operatively coupled to a set of clouds, wherein the at least one processing device comprises a processor operatively coupled to a memory and is configured to:
generate an analytic request, wherein the analytic request specifies one or more data sets and at least one analytic algorithm to be executed on the one or more data sets, and wherein the one or more data sets and the at least one analytic algorithm are hosted on the set of clouds;
publish the analytic request to the set of clouds to initiate negotiation with at least a portion of the set of clouds to determine a set of terms for execution of the at least one analytic algorithm on the one or more data sets; and
receive a set of program code representing an agreement from at least one of the set of clouds, wherein the set of program code specifies the set of terms for execution of the at least one analytic algorithm on the one or more data sets, wherein the set of terms comprises a compensation to provide one or more of the set of clouds for execution of the at least one analytic algorithm on the one or more data sets, and further wherein the set of terms comprises a schedule for compensation associated with execution of the at least one analytic algorithm on the one or more data sets.

US Pat. No. 10,924,360

STORAGE BATTERY MANAGEMENT METHOD AND STORAGE BATTERY MANAGEMENT SYSTEM

PANASONIC INTELLECTUAL PR...

1. A storage battery management method which is performed by a communication terminal, the storage battery management method comprising:performing communication with a first storage battery, which is an object to be managed, and acquiring, from the first storage battery, storage battery information of the first storage battery;
storing, by the communication terminal, in a memory provided in the communication terminal, the acquired storage battery information when the storage battery information is acquired from the first storage battery;
receiving, by the communication terminal, a first request from a management server that manages the first storage battery, the first request requesting the communication terminal to transmit first storage battery information to the management server, the first storage battery information being the storage battery information of the first storage battery; and
performing communication with the management server and transmitting, when the communication terminal receives the first request from the management server, the first storage battery information to the management server, based on the storage battery information stored in the memory, the first storage battery information being transmitted to the management server in accordance with the first request.

US Pat. No. 10,924,359

DEVICE ABSTRACTION PROXY

ASSIA SPE, LLC, Wilmingt...

1. A network management apparatus comprising:a plurality of physical access aggregation interfaces coupled to a plurality of physical access aggregation devices, the plurality of physical access aggregation devices provides one or more broadband communication services to a plurality of remote broadband terminals; and
a management entity coupled to the plurality of physical access aggregation interfaces, the management entity creates a plurality of virtual access aggregation devices related to the plurality physical access aggregation devices, the plurality of virtual access aggregation devices performs functions that support associated logical aggregation networks with network characteristics defined by service definition rules.

US Pat. No. 10,924,358

METHOD AND SYSTEM FOR MULTIVARIATE PROFILE-BASED HOST OPERATIONAL STATE CLASSIFICATION

Dell Products L.P., Hopk...

1. A method for operational state classification of host devices, comprising:loading a feature space comprising a set of cluster-representative objects;
deriving a first state profile from host device telemetry for a first host device;
mapping the first state profile onto the feature space, to obtain a first mapped state profile;
identifying a first cluster-representative object of the set of cluster-representative objects based on a first set of proximities between the first mapped state profile and the set of cluster-representative objects;
associating, with the first state profile, a first host operational state assigned to the first cluster-representative object; and
invoking, based on the first host operational state, a first reactive action targeting the first host device.

US Pat. No. 10,924,357

METHOD AND DEVICE FOR DETERMINING RESOURCE UTILIZATION

Telefonaktiebolaget LM Er...

1. A method implemented at a Software-Defined Networking, SDN, controller, comprising:providing the raw utilization information to an application layer, the raw utilization information including at least one of utilization of a resource used by a historical operation, utilization of a resource for a historical time duration, utilization of a resource associated with a bandwidth, utilization of a resource at a temperature, and utilization of resource associated with certain humidity;
sending, to the application layer, a query as to utilization of a resource other than a bandwidth resource, wherein said resource is to be used in a network infrastructure;
receiving a prediction of said utilization of said resource from said application layer, said prediction being determined based on raw utilization information in response to said query,
wherein said prediction of said utilization of said resource is associated with information including at least one of: an identification of a target operation using said resource, a start time point of said target operation, an end time point of said target operation, a time duration of said target operation, a frequency band to be used by said target operation, a target time point when said resource is to be used, a target bandwidth, a target temperature and a target humidity;
determining operability of a target operation using a said resource based on said predication of said utilization of said resource, said operability indicating whether said target operation is suitable to be performed; and
sending an indication of said operability of said target operation to said network infrastructure.

US Pat. No. 10,924,356

NETWORK SERVICE SCHEDULING METHOD AND APPARATUS, STORAGE MEDIUM, AND PROGRAM PRODUCT

TENCENT TECHNOLOGY (SHENZ...

1. A method for network service scheduling, comprising:obtaining, by processing circuitry of an information processing apparatus, historical network traffic data of network services that are provided in a content delivery network (CDN), the historical network traffic data including actual traffic data of the network services in past time units before a present moment;
predicting, by the processing circuitry, future network traffic of the network services in a next time unit after the present moment according to the historical network traffic data of the network services, wherein the future network traffic is predicted based on a machine learning model that is trained according to multiple groups of training data of the network services, the multiple groups of training data including at least information on service operators, regions, and service types of the network services; and
scheduling, by the processing circuitry, network resources for the network services according to the predicted future network traffic.

US Pat. No. 10,924,355

HANDLING CHANGES IN A DISTRIBUTED NETWORK MANAGEMENT SYSTEM THAT USES A LOGICAL MULTI-DIMENSIONAL LABEL-BASED POLICY MODEL

Illumio, Inc., Sunnyvale...

1. A method of processing a change to a state of an administrative domain, wherein the administrative domain includes a plurality of managed servers that use management instructions to configure management modules so that the configured management modules implement an administrative domain-wide management policy that comprises a set of one or more rules, the method comprising:storing label sets for each of the plurality of managed servers, each of the label sets having one or more labels identifying a high-level characteristic of a corresponding one of the plurality of managed servers;
storing the set of one or more rules, each rule specifying a service provided over a computer network, one or more label sets in a provided-by portion indicating which of the managed servers are controlled by the rule in providing the service over the computer network, and one or more label sets in a used-by portion indicating which of the managed servers are controlled by the rule in using the service accessed over the computer network;
caching initial relevant rules for a particular managed server, each of the cached initial relevant rules specifying an initial label set associated with the particular managed server;
detecting the change to the state of administrative domain;
responsive to detecting the change, generating updated relevant rules for the particular managed server, the updated relevant rules including at least one changed relevant rule different from the cached initial relevant rules;
generating, based on the at least one changed relevant rule, an instruction to update function-level instructions stored by the particular managed server; and
sending to the particular managed server, the instruction to update the function-level instructions.

US Pat. No. 10,924,354

DETECTION OF A BOTTLENECK IN A MESSAGE FLOW BETWEEN ASSOCIATED SERVERS

International Business Ma...

1. A computer-implemented method for identifying a server from a plurality of servers causing a bottleneck in a system comprising:providing, on a display, message processing information about message processing performed by one of the plurality of servers, wherein the plurality of servers in the system relay messages in an ordered manner from a first server to a last server;
receiving an input via an input device from a user indicating an adjustment amount to a number of messages input to the one of the plurality of servers;
sending a message causing the one of the plurality of servers to adjust a number of input messages in a processing queue based on the adjustment amount of the number of messages;
receiving updated message processing information for the number of messages in the adjusted number of input messages, wherein the updated message processing information indicates a number of messages processed per unit time; and
in response to determining that the number of messages processed does not change in response to the adjustment to an amount of messages input, identifying, on the display, that the one of the plurality of servers as causing the bottleneck in the system.

US Pat. No. 10,924,353

PROGRESSIVE REFINEMENT OF DEVICE CLASSIFICATIONS USING COLORED DEVICE AND POLICY TREES

Cisco Technology, Inc., ...

1. A method comprising:obtaining, by a device classification service, telemetry data regarding traffic of a device in a network;
classifying, by the service, the device as being of a first device type using the obtained telemetry data;
applying, by the service, a first network policy to the device, based on its classification as being of the first device type, wherein the first network policy has an associated expiration timer;
determining, by the service, whether the device was reclassified as being of a different device type than that of the first device type, using additional telemetry data obtained after the classification of the device as being of the first device type, before expiration of the expiration timer associated with the first network policy; and
applying, by the service, a second network policy to the device, when the service determines that the device has not been reclassified as being of a different device type before expiration of the expiration timer associated with the first network policy.

US Pat. No. 10,924,352

DATA CENTER NETWORK TOPOLOGY DISCOVERY

NICIRA, INC., Palo Alto,...

1. A method for a first node to perform data center network topology discovery in a data center network that includes the first node, a second node configured to generate an initial probe packet and multiple intermediate network devices, wherein the method comprises:receiving multiple probe packets that include a first probe packet and a second probe packet, wherein the initial probe packet includes a replication instruction for at least one intermediate network device with multiple egress ports of the multiple intermediate network devices to replicate a received probe packet, and wherein the at least one intermediate network device generates a first modified probe packet and a second modified probe packet based on the replicated received probe packet;
prior to having received any probe packet associated with another initial probe packet generated by the second node:
extracting, from the first probe packet, first metadata that is added by a first subset of the multiple intermediate network devices based on a first instruction in the first probe packet, wherein the first metadata includes metadata of the first modified probe packet;
extracting, from the second probe packet, second metadata that is added by a second subset of the multiple intermediate network devices based on a second instruction in the second probe packet, wherein the second metadata includes metadata of the second modified probe packet; and
processing the first metadata and the second metadata to identify respective first forwarding path and second forwarding path from the second node to the first node, wherein the first forwarding path is provided by the first subset and the second forwarding path is provided by the second subset.

US Pat. No. 10,924,351

NETWORK FUNCTIONS VIRTUALIZATION

APPLE INC., Cupertino, C...

1. An apparatus of a virtualized network function manager (VNFM) in a mixed wireless network operable to facilitate instantiation of a virtualized network function (VNF), the apparatus comprising:a memory storing instructions; and
one or more processors configured to execute the instructions to:
process, at the VNFM, a first request to instantiate a VNF from a network manager (NM) configured to provide network management for a non-virtualized portion of the mixed wireless network via a network function virtualization (NFV) orchestrator (NFVO), the first request including VNF instantiation information;
generate, for sending from the VNFM to the NFVO, a second request for allocating virtual resources for the VNF based on the VNF instantiation information;
process, at the VNFM, an acknowledgement from the NFVO after successful allocation of the virtualized resources for the VNF;
instantiate, at the VNFM, the VNF;
generate, for sending from the VNFM to an NFV element manager (EM), an acknowledgement of the VNF instantiations;
generate, for sending from the VNFM via the NFVO to the NM configured to provide network management for a non-virtualized portion of the mixed wireless network, an acknowledgement of the VNF instantiation; and
generate, for sending from the VNFM via the NFVO to an NFV NM configured to provide network management for a virtualized portion of the mixed wireless network, an acknowledgement of the VNF instantiation.

US Pat. No. 10,924,350

SOFTWARE SENSOR FOR REPORTING CONTROLLER METRICS

Amazon Technologies, Inc....

1. A system comprising:a baseboard management controller (BMC) comprising a network interface, a non-network communication port, one or more processors, and memory, the memory including instructions that, when executed by the one or more processors, cause the one or more processors to:
register a first software function for the BMC, the first software function being an Intelligent Platform Management Interface (IPMI) standard function and including a second software function as a callback function;
use the first software function to determine a performance metric associated with a status of the BMC, wherein the BMC is configured to communicate the performance metric only via the non-network communication port;
use the second software function to identify the performance metric from performance data generated by the BMC during operation of the BMC;
use a function nested within the second software function to parse and provide the performance metric as sensor data of the BMC, the sensor data having a format recognized by the BMC to enable the BMC to transmit the performance metric, provided as the sensor data, to outgoing packets; and
provide the sensor data, via the network interface, to a remote requestor.

US Pat. No. 10,924,349

AUTOMATIC PLACEMENT OF CLIENTS IN A DISTRIBUTED COMPUTER SYSTEM SATISFYING CONSTRAINTS

VMWARE, INC., Palo Alto,...

1. A method of placing clients in a distributed computer system, the method comprising:identifying a constraint comprising at least one of: an affinity or an anti-affinity constraint associated with a set of clients;
aggregating compute, storage, and network resources of a plurality of hosts into a plurality of clusters;
generating a list of compatible clusters of the plurality of clusters that correspond with a plurality of placement solutions that satisfy the constraint; and
placing the set of clients according to one of the plurality of placement solutions comprising a compatible cluster on the list of compatible clusters.

US Pat. No. 10,924,348

SPLIT DECISION TREES ON CLIENT AND SERVER

Snap Inc., Santa Monica,...

9. A system comprising:a memory that stores instructions; and
a processor configured by the instructions to perform operations comprising:
receiving, by a server, configuration query from a client;
retrieving, by the server, at least one Config rule represented by a decision tree according to the configuration query, wherein the Config is a run-time decision regarding the configuration query;
retrieving, by the server, server knowledge relevant to the at least one Config rule;
evaluating, by the server, the at least one Config rule based on the server knowledge;
providing, by the server, a response to the configuration query based on the evaluating; and
receiving, by the client, the response to the configuration query;
wherein if a definitive answer is not derived by applying server knowledge to the at least one Config rule:
pruning the decision tree representing said Config rule using the server knowledge; and
providing the pruned decision tree as a part of the response to the client, and
wherein if the response is the pruned decision tree:
evaluating, by the client, the pruned decision tree by applying client knowledge; and
deriving, by the client, a decision to the configuration query.

US Pat. No. 10,924,347

NETWORKING DEVICE CONFIGURATION VALUE PERSISTENCE

Microsoft Technology Lice...

1. A networking profile configuration value persistence management system, comprising:a configuration dump store including digital storage;
a configuration change journal including additional digital storage; and
a configuration value persistence management processor in operable communication with the configuration change journal and the configuration dump store, the configuration value persistence management processor configured to perform configuration value persistence management steps which include (a) receiving a configuration change request specifying one or more configuration values of a networking profile which facilitates management of network communications, (b) journaling the received configuration change request by appending it to the configuration change journal, (c) submitting the received configuration change request for application to at least one networking device, (d) determining that a configuration dump condition is satisfied after one or more instances of said receiving, journaling, and submitting, and (e) in response to determining that the configuration dump condition is satisfied, dumping current configuration values of the at least one networking device and clearing the configuration change journal;
whereby the networking profile configuration value persistence management system persists configuration change requests associated with networking profiles, and does so with a lower computational overhead than would be incurred by dumping all of the configuration values without journaling any of them.

US Pat. No. 10,924,346

SYSTEM AND METHOD FOR MIGRATING NETWORK POLICIES OF SOFTWARE-DEFINED NETWORK COMPONENTS

VMware, Inc., Palo Alto,...

1. A computer-implemented method for migrating configurations of a software-defined network (SDN) component from a source computing environment to a destination computing environment, the method comprising:fetching configurations of the SDN component at the source computing environment;
finding dependencies of the SDN component in the configurations of the SDN component that correspond to dependency keywords in a configurable dictionary, the configurable dictionary including the dependency keywords and paths to find dependencies corresponding to the dependency keywords;
for each dependency found in the configurations of the SDN component, calculating a correlation key for the dependency, adding the correlation key for the dependency to a metadata section of a configuration export file, and adding a reframed configuration of the dependency with at least one reference to the correlation key in the metadata section to a templates section of the configuration export file;
substituting at least some correlation-key references within reframed configurations in the templates section of the configuration export file with correlation-key replacements for the destination computing environment; and
applying the reframed configurations with the correlation-key replacements to a target SDN component in the destination computing environment.

US Pat. No. 10,924,345

METHOD FOR CHANGING THE CONFIGURATION OF CONNECTED NETWORKS

SIEMENS AKTIENGESELLSCHAF...

1. A method for changing a configuration of connected networks, at least two networks consisting of components being connected via at least one connecting component, and at least one of the at least two networks being a communication network, the method comprising:creating digital models of the at least two networks based on network analyses;
creating digital component models for the at least one connecting component, in a respective digital component model, at least one respective interaction of the at least one connecting component being represented via properties of one of the at least two networks;
deriving a sequence of a configuration change based on the created digital models of the at least two networks and the created digital component models for the at least one connecting component;
disassembling the sequence of the configuration change into decentrally executable sequence units; and
distributing and executing the decentrally executable sequence units while taking into temporal and spatial dependencies on at least one decentralized sequence control unit in at least one of the at least two networks.

US Pat. No. 10,924,344

DISCOVERY AND MAPPING OF CLOUD-BASED RESOURCE MODIFICATIONS

ServiceNow, Inc., Santa ...

1. A computing system comprising:persistent storage configured to store, as one or more configuration items and on behalf of a managed network, a mapping of computing resources provided by a remote computing system to the managed network, wherein the mapping represents a service infrastructure of the remote computing system dedicated to the managed network; and
a discovery application configured to perform operations comprising:
obtaining instructions to modify a computing resource provided by the remote computing system;
based on the instructions, generating and transmitting, to the remote computing system, a request to modify the computing resource;
receiving, from the remote computing system, a response indicating a modification to the computing resource;
selecting a discovery pattern configured to verify the modification to the computing resource by obtaining attributes associated therewith by:
determining a type of the computing resource based on: (i) the instructions, (ii) the request, or (iii) the response, or any combination thereof; and
selecting the discovery pattern that is configured to obtain the attributes associated with the type of the computing resource;
obtaining, from the remote computing system, the attributes associated with the computing resource by executing the discovery pattern;
determining, based on the attributes associated with the computing resource, that the modification to the computing resource has been completed according to the instructions;
based on the modification to the computing resource having been completed according to the instructions, updating the mapping to indicate the modification; and
storing, in the persistent storage, the mapping as updated.

US Pat. No. 10,924,342

SYSTEMS AND METHODS FOR ADAPTIVE INDUSTRIAL INTERNET OF THINGS (IIOT) EDGE PLATFORM

Honeywell International I...

1. A computer-implemented method of configuring an Industrial Internet of Things (IIOT) edge node, the method comprising:receiving, by the IIOT edge node, data from at least one device;
determining, by the IIOT edge node, that the IIOT edge node lacks a capability to process the received data;
performing, by the IIOT edge node, a situation analysis of the received data to determine a characteristic of the received data;
identifying, by the IIOT edge node, based on the determined characteristic of the received data, a property of a functional module configured to process the received data, wherein the functional module is one of a plurality of available functional modules;
automatically receiving the functional module by the IIOT edge node, based on the identified property; processing the received data using the functional module; and
outputting the processed data to a bus.

US Pat. No. 10,924,341

COMMUNICATION DEVICE, COMMUNICATION METHOD AND COMMUNICATION SYSTEM

FUJITSU LIMITED, Kawasak...

1. A communication device comprising:a first port configured to be set with a first MAC address as a monitoring point, the first port being connected to one communication line belonging to a link aggregation group to which another communication line for another device also belongs; and
a processor configured to:
set the first MAC address in the first port such that the first MAC address is identical to a second MAC address which is set as a monitoring point in a second port of the other device connected to the other communication line belonging to the link aggregation group to which the one communication line belongs;
transmit and receive a monitoring frame through the first port by using the first MAC address, the monitoring frame addressed to the first MAC address being a frame controlled to arrive at both of the first port set with the first MAC address and the second port set with the second MAC address;
switch an operating state of the first port to an active state or a standby stated; and
restrict the transmission and the reception of the monitoring frame through the first port when the operating state of the first port is switched to the standby state, wherein
the switching of the operating state leads not to change of the first MAC address in the first port.

US Pat. No. 10,924,340

EXTENDING COMPUTING CAPACITY VIA CLOUD REPLICATION

VMware, Inc., Palo Alto,...

1. A computer-implemented method performed by an enterprise system, the method comprising:determining that a source system of the enterprise system is experiencing-a degree of system load beyond a threshold;
sending a first request to a cloud manager to create a clone instance of the source system by replicating the source system of the enterprise system on a cloud provider located remotely from the enterprise system;
receiving a second request destined for the source system;
determining that the clone instance of the source system has been created on the cloud provider;
responsive to determining that the clone instance of the source system has been created on the cloud provider, delegating the second request to the clone instance;
creating a first tunnel between the clone instance on the cloud provider and the source system of the enterprise system based on a private IP address associated with the cloud provider, wherein creating the first tunnel comprises:
initiating a secure connection to the clone instance on the cloud provider over a second tunnel that is established between the cloud provider and the enterprise system based on a public IP address associated with the cloud provider; and
establishing port forwarding from the source system of the enterprise system to the clone instance on the cloud provider after the secure connection is established;
requesting a copy of cloud configuration data from the cloud provider, wherein the cloud configuration data contains information regarding a port to access a service available in the enterprise system;
recording the port at the enterprise system;
receiving a third request from the clone instance for the service of the enterprise system sent via the first tunnel through the recorded port;
invoking the requested service; and
providing a result of the invocation of the requested service to the clone instance over the first tunnel.

US Pat. No. 10,924,338

CONTROLLER APPLICATION MODULE ORCHESTRATOR

Honeywell International I...

1. A method, comprising:providing a network process control system in an industrial processing facility (IPF) comprising a plant-wide network coupling at least one server to a plurality of controller platforms all coupled to one another by at least one private path redundancy network for providing a controller pool, each controller platform having at least one controller comprising computing hardware and a memory, and at least one application module (AM) pool including a plurality of AMs, wherein the plurality of controller platforms are coupled by an input/output (I/O) mesh network to I/O devices coupled to field devices that are coupled to processing equipment 160 on a field level of an industrial processing facility (IPF), the method comprising:
considering resource consumption attributes by the respective ones of the plurality controller platforms comprising at least a pool of available storage in the memory and the processing resources available for computing hardware, and
based on the resource consumption attributes, at least partially automatically deploying ones of the plurality of AMs to the plurality of controller platforms
wherein the plurality of controller platforms are configured as a first and at least a second controller pool, and wherein the at least one AM pool is configured as a first AM pool and at least a second AM pool, wherein the AM's in the first AM pool are deployable only in the first controller pool, the AM's in the second AM pool are deployable only in the second controller pool.

US Pat. No. 10,924,336

METHOD FOR DYNAMICALLY CONTROLLING THE MEMBERSHIP OF A ZONE IN A CLOUD ENVIRONMENT

International Business Ma...

1. A method comprising:receiving a request to provision storage to a virtual machine (VM) via a fibre channel (FC) fabric connecting a host machine of the VM to a storage area network (SAN);
determining a dynamic zoning methodology to use for the VM;
determining a previous zoning methodology in use by the fabric;
updating the FC fabric from the previous zoning methodology to the dynamic zoning methodology by modifying a zoning table of the FC fabric;
activating the dynamic zoning methodology on the FC fabric;
following activating the dynamic zoning methodology on the FC fabric, periodically determining if the dynamic zoning methodology complies with local zoning rules of the FC fabric;
determining the dynamic zoning methodology does not comply with the local zoning rules;
determining a second dynamic zoning methodology; andupdating the FC fabric from the dynamic zoning methodology to the second dynamic zoning methodology.

US Pat. No. 10,924,335

REDUCED CONFIGURATION FOR MULTI-STAGE NETWORK FABRICS

Juniper Networks, Inc., ...

1. A method comprising:deploying a network device within a fabric having a management network, wherein deploying includes attaching a port of the deployed network device through the management network to a port of a role allocator, wherein the role allocator includes one or more ports designated as first level port connections and one or more other ports designated as second level port connections;
determining whether the deployed network device is attached to one of the ports designated as first level port connections; and
if the deployed network device is attached to one of the ports designated as first level port connections, configuring the deployed network device as a first level device.

US Pat. No. 10,924,334

MONITORING DISTRIBUTED SYSTEMS WITH AUTO-REMEDIATION

salesforce.com, inc., Sa...

1. A monitoring system, comprising: a data collection engine to receive data items comprising events, metrics, or one or more configurations about a distributed computing system being monitored, and to store selected data items into a message queue; a data processing engine to receive the selected data items from the message queue, transform the selected data items into transformed data items based at least in part on one or more settings for a subscriber and the one or more configurations of the distributed computing system, and store the transformed data items into one or more of a database and a cache; and a feedback engine to read the transformed data items from the one or more of the database and the cache, generate feedback for the subscriber based at least in part on the transformed data items and the one or more settings for the subscriber and the configurations, and send the feedback to the subscriber; wherein the subscriber is an application program, a database, or an operating system of the distributed computing system; wherein the one or more configurations comprise information which defines behaviors and/or capabilities of the distributed computing system; and wherein sending the feedback to the subscriber causes the subscriber to automatically perform remediation operations for the distributed computing system in response to receiving the feedback.

US Pat. No. 10,924,332

NODE PROTECTION FOR BUM TRAFFIC FOR MULTI-HOMED NODE FAILURE

Juniper Networks, Inc., ...

1. A method comprising:receiving, by an ingress provider edge (PE) device of a plurality of PE devices configured with an Ethernet Virtual Private Network (EVPN) instance reachable by an Ethernet segment connecting a plurality of egress PE devices of the plurality of PE devices to a customer edge (CE) device that is multi-homed to the plurality of egress PE devices over the Ethernet segment, one or more egress node protection labels advertised by the plurality of egress PE devices, wherein the one or more egress node protection labels advertised by the plurality of egress PE devices comprises one or more egress node protections labels that identify each of the plurality of egress PE devices, including one or more egress node protection labels that identify one of the egress PE devices configured as a designated forwarder (DF);
determining, by the ingress PE device, that the one of the egress PE devices configured as a designated forwarder has failed; and
in response to determining that the designated forwarder has failed, sending, by the ingress PE device and to the plurality of egress PE devices, Broadcast, unknown Unicast and Multicast (BUM) packets including the one or more egress node protection labels that identify the one of the egress PE devices configured as the designated forwarder.

US Pat. No. 10,924,331

CONTROLLER AREA NETWORK COMMUNICATION SYSTEM

WeRide Corp., Sunnyvale,...

1. A controller area network (CAN) communication system, comprising:a CAN bus;
at least one electronic control unit (ECU) coupled to the CAN bus;
a host module coupled to the CAN bus for controlling the operation of the at least one ECU; wherein the host module comprises:
a controller;
at least two adapters coupled between the CAN bus and the controller for communication therebetween, wherein the at least two adapters include a first adapter and a second adapter, and wherein a data stream transmitted from the controller to the CAN bus through the first adapter is transmitted back to the controller through the second adapter; and
wherein the controller is configured to monitor at least one status parameter of the data stream transmitted through the first adapter to the CAN bus by monitoring the data stream transmitted from the CAN bus back to the controller through the second adapter, and to switch its communication with the CAN bus from through the first adapter to through the second adapter when a failure of the communication between the first adapter and the CAN bus is determined.

US Pat. No. 10,924,330

INTELLIGENT ANOMALY DETECTION AND ROOT CAUSE ANALYSIS IN MOBILE NETWORKS

VMware, Inc., Palo Alto,...

1. A method comprising:receiving radio access network data generated by a set of base stations;
determining a plurality of user sessions from the radio access network data;
detecting anomalies, the anomalies comprising anomalous user sessions and anomalous cells, wherein detecting the anomalies comprises:
detecting the anomalous user sessions from the plurality of user sessions; and
detecting the anomalous cells based on the radio access network data;
determining one or more root causes for each of the anomalies;
for each determined root cause, determining:
a number of anomalous user sessions associated with the root cause; and
cell identifiers for anomalous cells associated with the root cause; and
generating an alert for a root cause from the determined root causes, the alert comprising the respective cell identifiers associated with the root cause and a severity score determined based on a percentage of user sessions impacted by the root cause,
wherein determining the severity score comprises:
determining the radio access network data associated with the root cause;
determining a number of unique user sessions from the radio access network data; and
determining the percentage of user sessions impacted by the root cause based on the number of unique user sessions and the number of anomalous user sessions associated with the root cause.

US Pat. No. 10,924,329

SELF-HEALING TELCO NETWORK FUNCTION VIRTUALIZATION CLOUD

VMWARE, INC., Palo Alto,...

1. A method for network function virtualization self-healing, comprising:sending an alert from a virtual analytics engine to a physical analytics engine based on a key performance indicator (“KPI”) threshold comparison for a virtual component of a distributed network;
determining, at the physical analytics engine, that a problem with hardware exists based on comparing a virtual KPI attribute from the alert to a symptom threshold;
correlating, by the physical analytics engine, the alert to a physical hardware device by mapping the virtual component associated with the alert to the physical hardware device; and
sending a root cause analysis event used for remediating the problem, wherein the root cause analysis event includes information about the physical hardware device and virtual KPI attribute, and wherein remediating the problem includes at least one of:
presenting a notification on a graphical user interface (“GUI”); and
making a change to at least one of the virtual component and physical hardware device.

US Pat. No. 10,924,328

ROOT CAUSE ANALYSIS FOR UNIFIED COMMUNICATIONS PERFORMANCE ISSUES

Saudi Arabian Oil Company...

1. A computer-implemented method, comprising:determining a plurality of metrics of data trafficked through a session border controller (SBC), the SBC in communication with an endpoint device and positioned along a data transmission connection between a network and a IP multi-media subsystem (IMS), the data being trafficked from the endpoint device to the IMS through the SBC or from the IMS to the endpoint device through the SBC, wherein the endpoint device comprises a device that is assigned at least an internet protocol (IP) address;
detecting a jitter performance metric of the data is degraded;
in response to detecting the jitter performance, determining a first degradation status for an endpoint network response time (NRT) including network delay;
in response to determining that the first degradation status indicates that the endpoint NRT is degraded:
determining a second degradation status for an average endpoint signaling response time (ART); and
in response to determining that the second degradation status indicates that the endpoint ART is degraded, identifying the endpoint device as a root cause of the jitter performance metric of the data; and
in response to determining that the first degradation status indicates that the endpoint NRT is not degraded:
determining a third degradation status for a SBC NRT; and
in response to determining that the third degradation status indicates that the SBC NRT is degraded:
determining a fourth degradation for a SBC ART; and
in response to determining that the fourth degradation status indicates that the SBC ART is degraded, identifying the SBC and the IMS as the root cause of the jitter performance metric of data,
wherein the SBC NRT is an average time for the SBC to respond to a connection, and wherein the SBC ART is an average time for SBC to process signaling.

US Pat. No. 10,924,327

AUTONOMOUS SERVER AGENTS

JumpCloud, Inc., Louisvi...

1. A method for server management, comprising:registering, at a first server, a unique identifier of an agent running on a second server;
establishing a secure connection between the agent and the first server based at least in part on the registering;
receiving, at the agent, a server management task to manage the second server based at least in part on establishing the secure connection, the server management task comprising a command that an operating system of the second server supports, wherein the server management task is a disk space management task, a log monitoring task, a system configuration task, an email communication task, a security threat identification task, a security threat neutralization task, a user management task, or any combination thereof; and
accepting, at the agent, the server management task.

US Pat. No. 10,924,326

METHOD AND SYSTEM FOR CLUSTERED REAL-TIME CORRELATION OF TRACE DATA FRAGMENTS DESCRIBING DISTRIBUTED TRANSACTION EXECUTIONS

Dynatrace LLC, Waltham, ...

1. A computer-implemented method for monitoring transaction execution in a distributed computing environment, comprising:determining, by an agent instrumented in a method, whether execution of the method starts a new transaction executing in the distributed computing environment, where the agent is executed by a processor of a host computing device;
selecting, by the agent, an identifier for one of a plurality of correlation servers, associating the selected identifier for a given correlation server with the new transaction, selecting a transaction identifier for the new transaction and associating the selected transaction identifier with the new transaction, where the identifier for the given correlation server is selected from a listing of the correlation servers stored on the host computing device and the steps of selecting and associating are in response to a determination that the method started the new transaction;
retrieving, by the agent, the identifier for the correlation server and the transaction identifier from a currently executing transaction in response to a determination that the execution of the method does not start the execution of a new transaction;
creating, by the agent, a trace event that indicates the execution of the method, where the trace event includes the transaction identifier, the selected identifier for the given correlation server and at least one metric indicative of performance of the method; and
sending, by the agent, the trace event across a network to the given correlation server located remotely from the host computing device.

US Pat. No. 10,924,324

SCALABLE MANAGEMENT PLANE FOR A MODULAR NETWORK ELEMENT

Ciena Corporation, Hanov...

1. A method of managing a modular network element as a single entity, the modular network element comprising a plurality of line modules and zero or more switch modules in a chassis, wherein the plurality of line modules are located separate from the chassis and connected to the chassis and/or to one another via cabling, the method comprising:operating a management plane between the plurality of line modules and the zero or more switch modules via one or more dedicated links in the cabling;
managing the plurality of line modules and the zero or more switch modules as the single entity utilizing a chassis management protocol over the management plane, wherein the chassis management protocol is a two-way protocol for indicating presence, a physical position of each of the plurality of line modules based on a position sensor on each line module, and status between the plurality of line modules and the zero or more switch modules; and
designating one of a controller in the chassis and a processor in one of the plurality of line modules operating as a virtual controller as primary for the chassis management protocol.

US Pat. No. 10,924,321

TEST INSTRUMENTS AND METHODS FOR COMPENSATING IQ IMBALANCE

VIAVI SOLUTIONS INC., Sa...

1. A test instrument comprising:a transmitter configured to transmit signals to a unit under test; and
a controller configured to generate a transmitter compensation filter by:
transmitting, via the transmitter, complex multi-sine signals over a first plurality of observed frequencies within a predetermined baseband frequency range,
estimating a first plurality of frequency responses that compensate for in-phase and quadrature (IQ) imbalance at the first plurality of observed frequencies within the predetermined baseband frequency range, and
determining, using the first plurality of frequency responses, a transmitter polynomial surface.

US Pat. No. 10,924,320

IQ MISMATCH CORRECTION MODULE

TEXAS INSTRUMENTS INCORPO...

12. An in-phase and quadrature-phase (IQ) estimation method comprising,generating powerup state IQ estimates across a frequency band based on a powerup calibration of an IQ signal receiver;
generating steady state IQ estimates for at least one frequency bin of the frequency band during a steady state operation of the IQ signal receiver;
computing an actual difference between an estimate of the powerup state IQ estimates at a bin of the at least one frequency bin and an estimate of the steady state IQ estimates at the respective bin;
interpolating the actual difference across the frequency band; and
adjusting the powerup state IQ estimates across the frequency band based on the interpolated difference.

US Pat. No. 10,924,319

METHOD FOR TRANSMITTING OR RECEIVING DOWNLINK SIGNAL IN WIRELESS COMMUNICATION SYSTEM, AND APPARATUS THEREFOR

LG Electronics Inc., Seo...

1. A method of transmitting a signal to multiple User Equipments (UEs) based on Non-Orthogonal Multiple Access (NOMA) by a base station in a wireless communication system, the method comprising:mapping first information bits for a first UE and second information bits for a second UE onto a first layer for NOMA and third information bits for the first UE onto a second layer, wherein the first information bits and the third information bits are included in a first bit sequence, and the second information bits are included in a second bit sequence;
modulating the first and second information bits mapped onto the first layer and the third information bits mapped on the second layer; and
transmitting modulation symbols generated based on the modulation to the first and second UEs,
wherein the base station is configured to map the first and second information bits onto the first layer and the third information bits onto the second layer at a bit level, before generating the modulation symbols, based on whether bit indices of the first information bits and the third information bits in the first bit sequence and a bit index of the second information bits in the second bit sequence are even or odd.

US Pat. No. 10,924,318

BELIEF PROPAGATION-BASED BLIND AUTHENTICATION METHOD AND SYSTEM FOR FREQUENCY SELECTIVE FADING CHANNEL

Shenzhen University, Gua...

1. A blind authentication method for a frequency selective fading channel based on belief propagation, being a physical layer authentication method for wireless communication of a wireless communication system having a transmitter and a receiver and comprising:transmitting, by the transmitter, carrier signals to a wireless channel, wherein each of the carrier signals comprises an authentication signal, a pilot signal, and an information signal, the authentication signal is superimposed on the pilot signal, and the wireless channel is a frequency selective fading channel with a plurality of paths;
receiving, by the receiver, the carrier signals, performing a blind known interference cancellation (BKIC) processing on a carrier signal in each of the plurality of paths of the frequency selective fading channel to obtain a target signal, and performing a differential signal processing on the target signal to obtain a target authentication signal, wherein in the BKIC processing, a pilot signal in the each of the plurality of paths is eliminated through a belief propagation technique by using a prior probability density function and a Tanner graph of the target signal;
obtaining, by the receiver, a reference signal based on a key and the pilot signal in the each of the plurality of paths, performing the differential signal processing on the reference signal to obtain a reference authentication signal, and calculating a correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and
comparing the test statistic with a prescribed threshold to determine whether the carrier signal in the each of the plurality of paths is capable of passing authentication.

US Pat. No. 10,924,317

METHOD FOR TRANSMITTING OR RECEIVING DOWNLINK CONTROL INFORMATION IN WIRELESS COMMUNICATION SYSTEM, AND DEVICE THEREFOR

LG Electronics Inc., Seo...

1. A method for receiving downlink control information by a user equipment (UE) in a wireless communication system, the method comprising:receiving a reference signal for a control channel in a search space configured in a control resource set (CORESET); and
receiving the downlink control information on the control channel based on the reference signal,
wherein the search space comprises a plurality of control channel candidates each corresponding to one or more control channel elements (CCEs) based on an aggregation level,
wherein each of the one or more CCEs comprises a plurality of resource element groups (REGs), and
wherein the UE performs blind detection on each of the plurality of control channel candidates, assuming that a reference signal for a predetermined control channel candidate currently subjected to blind detection is mapped to a first REG arranged at a leading position in a time domain among REGs included in the predetermined control channel candidate.

US Pat. No. 10,924,316

NR BROADCAST CHANNEL TRANSMISSION

Telefonaktiebolaget LM Er...

1. A method performed by a wireless device, for receiving system information from a network node of a wireless communication system, the system information being received in a synchronization signal (SS) block of an SS burst set comprising at least one SS block, wherein the system information is multiplexed with information providing a time index indicating which SS block of the SS burst set is being received, the method comprising:receiving the system information, wherein receiving comprises descrambling the system information using a scrambling sequence generated based on the time index; and
determining whether the information providing the time index is accurate, based on an error-detection code related to the received system information.

US Pat. No. 10,924,315

DATA TRANSMISSION METHOD AND COMMUNICATIONS DEVICE

Huawei Technologies Co., ...

1. A method, comprising:obtaining a maximum delay deviation of a signal of a terminal device, wherein the signal of the terminal device is a wireless signal sent to the terminal device or a wireless signal sent by the terminal device, and the maximum delay deviation is a difference between an earliest time and a latest time at which the signal of the terminal device arrives at a receiving apparatus through a wireless channel after the signal of the terminal device is sent from a transmit end;
determining an interpolation parameter based on the maximum delay deviation of the signal of the terminal device;
performing an interpolation operation on a first signal sequence based on the interpolation parameter to obtain a second signal sequence, wherein a length of the second signal sequence is greater than a length of the first signal sequence;
mapping the second signal sequence onto a subcarrier to obtain a mapped second signal sequence;
performing an inverse fast Fourier transform (IFFT) on the mapped second signal sequence to obtain a time-domain signal; and
transmitting the time-domain signal.

US Pat. No. 10,924,314

BROADCAST SIGNAL TRANSMISSION APPARATUS, BROADCAST SIGNAL RECEPTION APPARATUS, BROADCAST SIGNAL TRANSMISSION METHOD, AND BROADCAST SIGNAL RECEPTION METHOD

LG ELECTRONICS INC., Seo...

5. A broadcast signal transmission apparatus comprising:a Forward Error Correction (FEC) encoder configured to encode data to generate one or more FEC blocks, wherein each FEC block is comprised of cells;
an interleaver configured to write the one or more FEC blocks of the encoded data into a memory, wherein the cells of each FEC block are written into the memory based on a memory index, and
read the one or more FEC blocks based on the memory index, wherein when the memory index corresponds to a virtual memory index, the virtual memory index is skipped during the reading of the one or more FEC blocks;
a frame builder configured to build at least one signal frame including the read one or more FEC blocks;
a frequency interleaver configured to interleave an OFDM symbol in the at least one signal frame;
a modulator configured to modulate the at least one signal frame including the frequency interleaved OFDM symbol by an Orthogonal Frequency Division Multiplexing (OFDM) scheme; and
a transmitter configured to transmit the broadcast signal including the modulated at least one signal frame.

US Pat. No. 10,924,313

CODING SCHEME AND EXTENDED SYNCHRONIZATION ACCESS BURST FOR EC-GSM-IOT ENHANCEMENT

Telefonaktiebolaget LM Er...

1. A wireless device configured to communicate with a Radio Access Network (RAN) node, the wireless device comprising:a processor; and,
a memory that stores processor-executable instructions, wherein the processor interfaces with the memory to execute the processor-executable instructions, whereby the wireless device is operable to:
attempt a system access using an Extended Coverage Random Access Channel (EC-RACH) by transmitting, to the RAN node, a system access message on the EC-RACH using repeated Extended Synchronization Access Bursts (ESABs), wherein each ESAB has 102 encrypted data bits coded according to an 11-bit Random Access Channel (RACH) coding scheme which utilizes 11 payload bits and 6 parity bits to which a rate 1/6 tail biting convolutional coding is applied resulting in the 102 encrypted data bits after channel coding.

US Pat. No. 10,924,312

SYSTEM AND METHOD OF DEMODULATING FREQUENCY SHIFT KEYING SIGNAL

ANPEC ELECTRONICS CORPORA...

1. A method of demodulating a frequency shift keying signal, comprising the following steps:(a) inputting the frequency shift keying signal;
(b) calculating a complete cycle of each of carrier waves of the frequency shift keying signal that is not modulated;
(c) subtracting a non-modulated cycle from the complete cycle of each of the carrier waves of the frequency shift keying signal to obtain a non-demodulated signal;
(d) generating a threshold according to waveform parameters of the non-demodulated signal;
(e) dividing the number of complete cycles of the frequency shift keying signal that is required for one bit by a preset value to obtain a reference cycle number;
(f) accumulating cycles of the frequency shift keying signal to the reference cycle number from a time point;
(g) determining whether or not an initial point of each of pulse waves of the frequency shift keying signal is found, in response to determining that the initial point is not found, returning to previous step (f), in response to determining that the initial point is found, performing next step (h);
(h) accumulating the cycles of the frequency shift keying signal to the reference cycle number multiple times from the initial point of each of the pulse waves of the frequency shift keying signal, and extracting data of the pulse wave from a starting point to an ending point of each accumulation;
(i) determining whether or not the number of times of extracting the data reaches the preset value, in response to determining that the number of times of extracting the data fails to reach the preset value, returning to previous step (h) in response to determining that the number of times of extracting the data reaches the preset value, performing next step (j);
(j) subtracting the data that is extracted previously from the data that is extracted next time to calculate a difference;
(k) determining whether or not the difference is larger than the threshold, in response to determining that the difference is not larger than the threshold, outputting a first bit value, in response to determining that the difference is larger than the threshold, outputting a second bit value, wherein the second bit value is not equal to the first bit value; and
(l) packing the first bit value and the second bit value into a demodulated signal.

US Pat. No. 10,924,311

MULTI-STANDARD BCPM DEMODULATOR USING VITERBI ALGORITHM

1. A method of demodulating a base band signal, the method comprising:determining a phase-modulated signal ? based on the base band signal,
determining a scaled phase signal ?S by scaling the phase-modulated signal ? using a scaling factor,
determining M discrimination signals based on the scaled phase signal ?S using a periodic discrimination function, and
applying a Viterbi algorithm to the M discrimination signals for determining an output signal.

US Pat. No. 10,924,309

PHASE ERROR REDUCTION IN A RECEIVER

TEXAS INSTRUMENTS INCORPO...

1. A circuit comprising:a notch filter;
a low pass filter coupled to the notch filter;
a quadrature signal generator coupled to the low pass filter; and
a phase corrector configured to receive, from the quadrature signal generator, in-phase (I) and quadrature (Q) signals derived from a local oscillator signal, receive a phase adjustment signal and a polarity signal, and adjust a phase difference between the I and Q signals using the phase adjustment and polarity signals to generate corrected I and Q signals.

US Pat. No. 10,924,308

SMART RECEIVER WITH COMPRESSIVE SENSING AND MACHINE LEARNING

Raytheon Applied Signal T...

15. A method for identifying a radio frequency (RF) emitter, the method comprising:channelizing a plurality of RF signals into a plurality of channels;
for each channel, compressive sensing (CS) encoding the channelized signal to produce an encoded channelized signal in each of the plurality of channels;
summing the encoded channelized signals of all of the plurality of channels to produce an I/Q data;
detecting pulses in each channel and producing encoded pulse snippets from the I/Q data;
CS decoding the encoded pulse snippets;
characterizing the decoded pulse snippets to produce pulse description words (PDWs), by a first machine learning device; and
associating the PDWs with one or more RF emitters and identify the one or more RF emitters, by a second machine learning device.

US Pat. No. 10,924,307

CONTINUOUS TIME LINEAR EQUALIZATION CIRCUIT WITH PROGRAMMABLE GAINS

NXP B.V., Eindhoven (NL)...

1. A continuous time linear equalization (CTLE) circuit, comprising:an input port;
an output port;
a first differential transistor pair coupled to the input port and the output port;
a second differential transistor pair;
a first degenerative impedance circuit coupled between the first differential transistor pair and ground, wherein the first degenerative impedance includes switchable components to vary impedance of the first degenerative impedance circuit; and
a second degenerative impedance circuit coupled between the second differential transistor pair and ground, wherein the second degenerative impedance includes switchable components to vary impedance of the second degenerative impedance circuit, wherein the resistive part of the impedance of the first degenerative impedance circuit is equal to the impedance of the second degenerative impedance circuit, wherein the switchable components of the first degenerative impedance and the switchable components of the second degenerative impedance are controlled by a same control signal.

US Pat. No. 10,924,306

COMMUNICATION DEVICE AND METHOD FOR RADIO COMMUNICATION

Intel IP Corporation, Sa...

1. A communication device, comprising:a transmitter configured to transmit a first signal, a third signal and a projected signal; and
a circuit configured to determine the projected signal based on an estimated signal state information such that an energy of a shaped projected signal is smaller than an energy of a shaped signal,
wherein a signal state information is based on the first signal and a second received signal that is received by a receiver of a second communication device,
wherein the estimated signal state information is determined based on an interpolation of a first received signal that is received by a first communication device and a third received signal that is received by a third communication device,
wherein the first received signal is received based on the first signal,
wherein the third received signal is received based on the third signal,
wherein the estimated signal state information is an estimate of the signal state information,
wherein the shaped projected signal is the projected signal received by the receiver of the second communication device and filtered by a filter of the second communication device,
wherein the shaped signal is the second received signal filtered by the filter of the second communication device.

US Pat. No. 10,924,305

HDMI SKEW COMPENSATION COMMUNICATION

Intel Corporation, Santa...

1. A method, comprising:transmitting a skew training pattern on a signal line including a differential pair;
receiving an acknowledgment, related to the skew training pattern, on a display data channel (DDC) associated with a high-definition multimedia interface (HDMI) system; and
transmitting a second skew training pattern on the signal line including the differential pair, the second skew training pattern is a modified version of the skew training pattern.

US Pat. No. 10,924,304

METHOD AND DEVICE FOR DECODING A SIGNAL, AND MEMORY DEVICE

UNIVERSITY OF SCIENCE AND...

1. A method for decoding a signal, comprising:decoding a received signal according to a predetermined decoding scheme and obtaining an estimate of a transmission signal based on the decoding result;
obtaining an estimate of channel noise by using the correlation of channel noise;
generating a modified received signal by subtracting the obtained estimate of channel noise from the received signal; and
decoding the modified received signal to obtain a decoded signal according to the predetermined decoding scheme
wherein the obtaining an estimate of channel noise by using the correlation of channel noise comprises:
obtaining a first estimate of channel noise by subtracting the estimate of the transmission signal from the received signal; and
processing the obtained first estimate of channel noise to obtain a second estimate of channel noise as the estimate of channel noise by using the correlation of channel noise.

US Pat. No. 10,924,303

SECURE TRAINING SEQUENCE SYMBOL STRUCTURE

Apple Inc., Cupertino, C...

1. A method to support channel estimation using secure training sequences, the method comprising:by a wireless device:
generating a first set of bits using a first cryptographically secure pseudo-random number generator (CSPRNG);
generating a second set of bits using a second CSPRNG;
forming, based at least in part on the first set of bits and the second set of bits, a secure training sequence (STS) comprising a plurality of STS segments, each STS segment comprising a plurality of STS symbols; and
transmitting the STS embedded in a wireless packet to a second wireless device,
wherein:
an STS symbol of the plurality of STS symbols includes a burst comprising a single pulse at one of two possible burst position intervals,
selection of a position of the burst within a burst position interval of the two possible burst position intervals is based at least in part on the second set of bits, and
a polarity of the single pulse of the burst is based at least in part on the first set of bits.

US Pat. No. 10,924,302

INTEGRATED COMMUNICATION SYSTEM AND SERVICE PROVISIONING METHOD THEREOF

Sercomm Corporation, Tai...

1. An integrated communication system with a cellular mobile network, comprising:a core network entity, residing in a core network of the cellular mobile network and used for connecting to a base station in the cellular mobile network;
a service provisioning system, conformed to a wired network other than the cellular mobile network; and
an intermediary apparatus, connecting between the core network entity and the service provisioning system, receiving a configuration data with a first format conformed to the wired network from the service provisioning system, and transforming the configuration data into a configuration command with a second format conformed to the cellular mobile network,
wherein the configuration data indicates the configuration command, the first format is related to a cable service specification, and the second format is related to a core network specification;
wherein the core network entity operates according to the configuration command,
wherein the configuration data is related to Internet service provision for at least one user equipment in the cellular mobile network,
wherein the service provisioning system comprises
a first dynamic host configuration protocol (DHCP) server,
wherein in response to an existence of the first DHCP server being recognized according to a DHCP discovery message, the intermediary apparatus obtaining the configuration data for the intermediary apparatus from the service provisioning system through trivial file transfer protocol (TFTP),
wherein the configuration data is about Internet Protocol (IP) address assignment, and
a second DHCP server,
wherein in response to an existence of the second DHCP server being recognized according to the DHCP discovery message, the intermediary apparatus obtaining another configuration data for the core network entity from the service provisioning system through TFTP.

US Pat. No. 10,924,301

NETWORK CONTROL DEVICE, COMMUNICATION SYSTEM, NETWORK CONTROL METHOD, PROGRAM, AND RECORDING MEDIUM

NTT Communications Corpor...

1. A network control device for performing control of a system including a plurality of terminals and including a plurality of gateway devices that are electrically coupled to a predetermined network, comprising:processing circuitry configured to:
select a first gateway device used by a first terminal based on a quality between the first terminal and the plurality of gateway devices;
connect between the first terminal and each of other terminals that uses the first gateway device, via a tunnel; and
perform a path control, such that, upon determining that a second gateway device used by a second terminal that is a communication destination of the first terminal is same as the first gateway device, traffic from the first terminal to the second terminal is routed, without using the predetermined network, through a tunnel established between the first terminal and the second terminal, and such that, upon determining that the second gateway device is different from the first gateway device, traffic from the first terminal to the second terminal is routed through the predetermined network.

US Pat. No. 10,924,300

VIRTUAL CONTROLLER AREA NETWORK

Marvell Asia Pte, Ltd., ...

1. A virtual controller area network system, comprising:a plurality of electronic control units (ECU) nodes, wherein each of the plurality of ECU nodes employ a shared message identification format for use by the plurality of ECU nodes to identify messages transferred among ECUs that are disposed on a same controller area network (CAN);
a plurality of physical CAN buses, wherein a respective CAN bus identifier is assigned to the plurality of physical CAN buses and wherein a first CAN bus identifier identifies two or more different physical CAN buses, among the plurality of physical CAN buses, that are designated as members of a same virtual CAN system;
two or more CAN controllers respectively coupled to subsets of the plurality of physical CAN buses, wherein a first subset of physical CAN buses is coupled to first and second CAN controllers to define a first virtual CAN and a second subset of CAN buses is coupled to at least one of the CAN controllers to define a second virtual CAN that is different from the first virtual CAN; and
an Ethernet backbone connecting at least to the two or more CAN controllers, the Ethernet backbone configured to generate an Ethernet frame containing: (i) a CAN message and (ii) a message ID for the CAN message, the Ethernet backbone being further configured to broadcast the Ethernet frame among ECU nodes coupled to the physical CAN buses in the first virtual CAN, without broadcasting the frame among ECU nodes coupled to different physical CAN buses in the second virtual CAN, based on the CAN bus identifier to identify the virtual CAN in which to broadcast the message.

US Pat. No. 10,924,299

PACKET FORWARDING

NEW H3C TECHNOLOGIES CO.,...

1. A method of forwarding a packet, a first Virtual eXtensible Local Area Network (VXLAN) tunnel is established between a gateway device and an aggregation switch, the aggregation switch corresponds to a Broadband Remote Access Server (BRAS) group including a plurality of BRAS network elements, and a second VXLAN tunnel is established between the gateway device and each of the BRAS network elements in the BRAS group, wherein the method comprises:receiving, by the gateway device, a first VXLAN packet from the aggregation switch through the first VXLAN tunnel;
acquiring, by the gateway device, a first user packet by de-encapsulating the first VXLAN packet;
performing, by the gateway device, a VXLAN encapsulation for the first user packet;
forwarding, by the gateway device, the encapsulated first user packet to the BRAS network element through the second VXLAN tunnel;
receiving, by the gateway device, a second VXLAN packet from the BRAS network element through the second VXLAN tunnel;
acquiring, by the gateway device, a second user packet by de-encapsulating the second VXLAN packet; and
performing, by the gateway device, a VXLAN encapsulation for the second user packet; and forwarding, by the gateway device, the encapsulated second user packet to the aggregation switch through the first VXLAN tunnel;
wherein the first VXLAN tunnel belongs to a first tunnel group, and the plurality of second VXLAN tunnels belong to a second tunnel group corresponding to the first tunnel group,
wherein correspondence between the first tunnel group and the second tunnel group is preconfigured before the first VXLAN packet is received, and
wherein a source Media Access Control (MAC) address of the first user packet is prohibited from being learned.

US Pat. No. 10,924,298

NETWORK SERVICE CHAIN CONSTRUCTION

Hewlett Packard Enterpris...

1. A system for constructing network service chain based on network policies, the system comprising:a processor;
a detection engine to:
detect a plurality of active network policies with overlapping applicability, wherein the plurality of active network policies comprises a portion of a first network policy directing a subset of packets to a first service and a portion of a second network policy directing the subset of packets to a second service, wherein the portion of the first network policy and a portion of a third network policy direct the subset of packets to a common service, and wherein the active network policies with overlapping applicability comprises multiple active network policies that apply to a single network packet;
specify a network policy priority that defines an order that the plurality of active network policies are applied; and
generate a set of orthogonal network policies based, in part on the first network policy and the second network policy, wherein the set of orthogonal network policies perform the functions of the overlapping active network policies in a non-overlapping manner; and
a construction engine communicatively coupled with the detection engine, the construction engine to:
construct a network service chain utilizing the set of orthogonal network policies corresponding to the subset of packets to provide the first service and the second service in a non-overlapping manner, wherein conflicts between actions within the orthogonal network policies are resolved based on a network policy priority, wherein the priority assigned to the first network policy and the priority assigned to the second network policy are associated with a corresponding application, wherein the first network policy and the second network policy are ordered according to the network policy priority, wherein the construction of the network service chain includes constructing a substitute network service chain, in response to a determination that the constructed network service chain is not executable, wherein the substitute network service chain is constructed based a network policy priority that is the lowest priority relative to the other network services and wherein the construction of the substitute network service chain includes iterative series of attempts to successfully construct the substitute network service chain until no further network service corresponding to the overlapping policy remain to be placed in the network service chain.

US Pat. No. 10,924,297

AGENT SYSTEM INCLUDING AN INFORMATION PROCESSING DEVICE FOR EXECUTING AN AGENT

OMRON Corporation, Kyoto...

1. An agent system, comprising:an information processing device configured to execute, using hardware included in at least one external device as an interface, an agent that performs processing predetermined for each external device on behalf of the external device; and
a server device, wherein:
the information processing device comprises a processor configured with a program to perform operations comprising:
operation as a device information obtaining unit configured to obtain device information about processing to be performed by the agent on behalf of the external device; and
operation as an agent generation unit configured to generate the agent using the device information;
the server device comprises a processor configured with a program to perform operations comprising:
operation as a storage unit configured to store the device information corresponding to the at least one external device; and
operation as a device information providing unit configured to transmit device information in response to a request from the information processing device;
the storage unit stores the device information in association with a user;
the device information obtaining unit transmits authentication information corresponding to the user to the server device; and
the device information providing unit transmits only device information corresponding to the user indicated by the authentication information among the device information stored in the storage unit to the information processing device an identification unit configured to identify at bast one external device.

US Pat. No. 10,924,296

TERMINAL APPARATUS, CONTROL APPARATUS, INSTALLATION-LOCATION-ASCERTAINMENT SUPPORT SYSTEM, INSTALLATION-LOCATION-SETTING SUPPORT SYSTEM, INSTALLATION-LOCATION-ASCERTAINMENT SUPPORT METHOD, INSTALLATION-LOCATION-SETTING SUPPORT METHOD, AND PROGRAM

Mitsubishi Electric Corpo...

1. A control apparatus, comprising:a receiver configured to receive from an electrical device to be controlled or monitored by a terminal apparatus via the control apparatus a registration instruction to register the electrical device in the control apparatus;
a registrar configured to register the electrical device in the control apparatus in response to receiving of the registration instruction by the receiver;
an acquirer configured to acquire installation location information indicating a location where the electrical device is installed;
a memory configured to store the installation location information acquired by the acquirer; and
a communicator configured to start monitoring of the electrical device or start control of the electrical device after the electrical device is registered in the control apparatus by the registrar and the installation location information is stored in the memory, the monitoring of the electrical device comprising a process of receiving device information from the electrical device and the control of the electrical device comprising a process of sending control commands to the electrical device, and configured to neither start the monitoring of the electrical device nor start the control of the electrical device before the installation location information is stored in the memory.

US Pat. No. 10,924,295

METHOD AND APPARATUS FOR OCCUPYING UNLICENSED BAND CHANNEL

ALCATEL LUCENT, Nozay (F...

1. A method, for occupying an unlicensed band channel; the method comprising:receiving at a user equipment a power increase rate of a reference signal transmission unit of an unlicensed band channel determined by a secondary cell (Scell) base station;
receiving at the user equipment, in the unlicensed band channel, a sub-frame of reference signal transmission unit level power distribution sent by the Scell base station;
decoding at the user equipment the power increase rate; and
using by the user equipment the power increase rate to process the sub-frame.

US Pat. No. 10,924,294

EVOLVED MULTIMEDIA BROADCAST/MULTICAST SERVICE (EMBMS) SYSTEM AND EMBMS SYSTEM MANAGEMENT METHOD

Huawei Technologies Co., ...

1. An evolved multimedia broadcast/multicast service (eMBMS) system management method, comprising:performing, by a gateway control plane (GW-C) device, core network signaling interaction with a broadcast/multicast service center and a mobility management entity;
sending, by the GW-C device, a forwarding indication message to a gateway user plane (GW-U) device, the forwarding indication message instructing the GW-U device to process a packet received by the GW-U device;
receiving, by the GW-U device, signaling from a base station, and sending, by the GW-U device, the signaling to the GW-C device according to the forwarding indication message;
receiving and processing, by the GW-C device, the signaling sent by the GW-U device; and
in a data transmission procedure, receiving, by the GW-U device, a broadcast/multicast service data packet from the broadcast/multicast service center, and sending, by the GW-U device, the broadcast/multicast service data packet to the base station according to the forwarding indication message.

US Pat. No. 10,924,292

MANAGING MEETING DATA

Capital One Services, LLC...

1. A method, comprising:obtaining, by a device, meeting data associated with a first meeting;
providing, by the device and to a meeting relevance model, the meeting data, the meeting relevance model being trained to produce, as output, data identifying a second meeting and a measure of confidence that the second meeting is relevant to the first meeting;
determining, by the device, that the second meeting is relevant to the first meeting based on the output of the meeting relevance model;
storing, by the device, at least a portion of the meeting data associated with the first meeting in association with second meeting data associated with the second meeting to allow access to the portion of the meeting data associated with the first meeting by accessing the second meeting data associated with the second meeting; and
providing, by the device and to a user device associated with the second meeting, the portion of the meeting data associated with the first meeting.

US Pat. No. 10,924,291

OVERLAY NETWORK BILLING

Oracle International Corp...

1. A non-transitory computer-readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:receiving, by an internal node in an Autonomous System (AS), a packet destined for an Internet address external to the AS;
based on the Internet address: determining, by the internal node, an egress path to transmit the packet toward the Internet address;
mapping the egress path to a billing counter of a plurality of billing counters;
incrementing the billing counter in relation to transmission of the packet on the egress path; and
transmitting the packet, by the internal node, toward an egress gateway of the AS on the egress path.

US Pat. No. 10,924,290

METHOD AND DEVICE TO TIMESTAMP A DIGITAL IMAGE

QuantifiCare S.A., Biot ...

1. A method to time stamp digital images providing a proof that a digital image has been acquired after a first date, said date being named “posteriority” date and before a second date, said date being named “anteriority” date, comprising the steps of:building with a first server, prior to or at a date of posteriority, a previously unknown code;
transmitting by the first server at the posteriority date the previously unknown code;
storing in the first server a combination of the posteriority date and the previously unknown code;
receiving with a second server at an anteriority date a first digital image of a joint representation of a subject and of the previously unknown code and computing a first electronic fingerprint of the first digital image or alternatively receiving directly with the second server at the anteriority date the first electronic fingerprint of the first digital image;
storing with the second server a combination of the first electronic fingerprint and the anteriority date;
receiving with a third server a second digital image and computing a second digital fingerprint or alternatively receiving directly with the third server the second electronic fingerprint of the second digital image;
searching in a database of the second server the first electronic fingerprint corresponding to the second electronic fingerprint; and
in case the second electronic fingerprint corresponds to the first electronic fingerprint stored in the database of the second server, transmitting with the third server the anteriority date corresponding to the stored combination of the first electronic fingerprint and the anteriority date.

US Pat. No. 10,924,288

MANAGING BLOCKCHAIN-BASED CENTRALIZED LEDGER SYSTEMS

Advanced New Technologies...

1. A computer-implemented method for managing a blockchain-based centralized ledger system, the computer-implemented method comprising:receiving a request for determining time information of a block in a blockchain of the centralized ledger system by a computing device of the centralized ledger system, the blockchain having a plurality of blocks that include timestamped blocks and non-timestamped blocks, each of the timestamped blocks storing trust timestamp information from a trust time server, each of the non-timestamped blocks storing transaction data and including no trust timestamp information from the trust time server, the trust time server being associated with a trust time authority and independent from the centralized ledger system, any adjacent two of the timestamped blocks in the blockchain being anchored with each other;
determining whether the block in the blockchain is a timestamped block or a non-timestamped block by the computing device;
in response to determining that the block is a non-timestamped block in the blockchain, identifying a first timestamped block preceding the block and a second timestamped block following the block in the blockchain by the computing device; and
determining the time information of the block based on first trust timestamp information in the first timestamped block and second trust timestamp information in the second timestamped block by the computing device.

US Pat. No. 10,924,287

DIGITAL SIGNATURE TECHNIQUE

OnBoard Security, Inc., ...

1. A method for signing and subsequently verifying a plurality of digital messages, comprising the following steps implemented using at least one processor-based subsystem:selecting parameters including an integer q, a relatively smaller integer p that is coprime with q, and a Gaussian function parameter;
generating random polynomial f relating to p and random polynomial g relating to q;
producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q;
producing a private key from which f and g can be derived;
storing the private key and publishing the public key;
producing a plurality of message digests by hashing each of the plurality of digital messages with the public key;
for each message digest, producing a digital signature using the message digest, the private key, and a Gaussian noise polynomial related to said Gaussian function parameter; and
performing a batch verification procedure utilizing the plurality of digital signatures and the public key to determine whether the digital signatures are valid,
wherein said step of performing a batch verification procedure includes implementing a verification on a modulo p summation of a component of all of said digital signatures.

US Pat. No. 10,924,286

SIGNING KEY LOG MANAGEMENT

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:generating a cryptographic key, the cryptographic key including a mutable audit log associated with a mutability property and a logging property for the cryptographic key, the logging property specifying a type of logging to be performed, and the mutability property specifying how the logging property is changeable over a lifetime of the cryptographic key;
logging and storing information for actions involving the cryptographic key to the mutable audit log;
authenticating an identity of a user associated with the cryptographic key;
obtaining, from the user, a request to modify the information logged for actions involving the cryptographic key;
determining that the logging property for the cryptographic key is set to enable modification of the information logged for actions involving the cryptographic key based at least in part on the mutability property; and
modifying the information logged for actions involving the cryptographic key.

US Pat. No. 10,924,285

METHOD AND SERVER FOR PROVIDING NOTARY SERVICE WITH RESPECT TO FILE AND VERIFYING FILE RECORDED BY THE NOTARY SERVICE

COINPLUG, INC., Seongnam...

1. A method for processing a file, comprising steps of:(a) a server providing a notary service, if a notary service request for the file is acquired, generating or supporting another device to generate a specific message digest of the file by using a hash function; and
(b) the server, if one of anchoring conditions is satisfied, registering or supporting another device to register a representative value or a processed value of the representative value in a database, wherein
the representative value is generated by using a specific hash value and its corresponding at least one neighboring value,
the specific hash value is a function value of a result acquired by encoding the specific message digest with a private key of a first user, a private key of a second user, and a private key of the server, and
at the step of (b), the server performs or supports another device to perform (i) a process of generating at least one specific tree including a specific leaf node where the specific hash value is allocated, and (ii) a process of registering, if said one of the anchoring conditions is satisfied, the representative value or the processed value, which is calculated by using the specific hash value and at least one function value allocated to at least one of other leaf nodes in the specific tree, in the database.

US Pat. No. 10,924,284

SYSTEM AND METHOD FOR DECENTRALIZED-IDENTIFIER AUTHENTICATION

ADVANCED NEW TECHNOLOGIES...

1. A computer-implemented method for blockchain-based decentralized-identifier authentication, comprising:obtaining, by a server from a computing device, a request for authenticating a decentralized identifier (DID), wherein the request comprises the DID, a plaintext associated with a challenge for authenticating the DID, and a digital signature on the plaintext;
generating, by the server, a blockchain transaction for retrieving a DID document corresponding to the DID from a blockchain, wherein the blockchain transaction invokes a blockchain contract for managing relationships between a plurality of DIDs and a plurality of corresponding DID documents;
sending, by the server, the generated blockchain transaction to one or more blockchain nodes of the blockchain for adding to the blockchain, the one or more blockchain nodes being configured to, after the generated blockchain transaction is added to the blockchain, execute the blockchain contract based on the blockchain transaction to retrieve the DID document corresponding to the DID;
receiving, by the server from at least one of the one or more blockchain nodes, the DID document corresponding to the DID, wherein the DID document comprises information associated with one or more authentication service endpoints associated with the DID, the information identifying the server as one of the one or more authentication service endpoints;
retrieving, by the server, a public key associated with the DID from the received DID document;
determining, by the server based on the obtained public key and the plaintext, that the digital signature on the plaintext is created based on a private key corresponding to the DID;
generating, by the server based on the determination, a message confirming authentication of the DID; and
sending, by the server to the computing device, the message confirming authentication of the DID.

US Pat. No. 10,924,283

DYNAMICALLY-CHANGING IDENTITY FOR IOT DEVICES WITH BLOCKCHAIN VALIDATION

Cisco Technology, Inc., ...

1. A method, comprising:at a device,
performing a procedure for registration in a communication network;
in the procedure, communicating, in a transaction with a network device of the communication network, data associated with the device to the network device, the data including an identity for addressing communications to and from the device within the communication network;
determining that the identity of the device is successfully validated in a blockchain, wherein the transaction between the device and the network device is registered in the blockchain as a signed transaction using a private key of the network device;
receiving, based on the determining that the identity of the device is successfully validated in the blockchain, a transaction number associated with the transaction from the network device, wherein the transaction number is generated in response to registration of the transaction in the blockchain and indicative of the identity for addressing communications; and
deriving, based on the determining that the identity of the device is successfully validated in the blockchain, an updated identity of the device using a combination of a) a static address of the device and b) the transaction number associated with the transaction, wherein the static address is hardware-based or network-based.

US Pat. No. 10,924,282

SYSTEM AND METHOD FOR MEASURING AND REPORTING IOT BOOT INTEGRITY

Cyber Pack Ventures, Inc....

1. A computing hardware Root of Trust module, comprising:integrated internal control logic operable only within the Root of Trust module;
an internal bus for receiving requests from on-chip computing resources and for providing responses to the requests, said internal bus in communication with the internal control logic via an internal bus interface;
a provisioned read-only Unique Device Secret (UDS) accessible only by the internal control logic within the Root of Trust module;
a one-way hash module operable only by the internal control logic, said one-way hash module producing a hash digest from a hash input message;
a cipher module accessible only by the internal control logic, said cipher module producing an encrypted ciphertext from a cipher input message;
a Platform Configuration Register (PCR) updatable only by the internal control logic, said PCR initialized to a provisioned default value only upon receiving a device reset signal;
an Extend module comprising circuitry to perform an extend operation under control of the internal control logic in response to an extend request received from any of the on-chip computing resources via the internal bus, said circuitry invoking the one-way hash module to (a) cryptographically blend the current contents of the PCR with a message digest provided in the extend request, said hash input message comprising a concatenation of the current contents of the PCR and the message digest, and (b) storing the result of the cryptographic blend operation back into the PCR;
a Quote module comprising circuitry to perform a quote operation under control of the internal control logic in response to a quote request received from any one of the on-chip computing resources via the internal bus to create a digital signature by encrypting, using the cipher module with the UDS as a key, a blend of (a) a nonce received in the quote request, and (b) the current contents of the PCR.

US Pat. No. 10,924,281

METHOD AND APPARATUS FOR INTER-BLOCKCHAIN TRANSMISSION OF AUTHENTICABLE MESSAGE

Advanced New Technologies...

1. A computer-implemented method for inter-blockchain, authenticable-message transmission, comprising:receiving, by a relay from a first blockchain, first data and first location information that indicate the relay to provide authenticable message to a second account in a second blockchain, wherein:
the relay is connected to the first blockchain and the second blockchain,
the first data is stored in the first blockchain,
a consensus is reached on the first data in the first blockchain by using a first account,
the first data comprises an authenticable message,
the authenticable message satisfies a predetermined protocol stack,
the predetermined protocol stack comprises a layer 1 protocol, a layer 2 protocol, and a layer 3 protocol,
the layer 1 protocol comprises a sending blockchain identifier field, a receiving blockchain identifier field, and the layer 2 protocol,
the layer 2 protocol comprises a sending account field, a receiving account field, and the layer 3 protocol,
the layer 3 protocol comprises a message content field,
the sending blockchain identifier field, the sending account field, the receiving blockchain identifier field, and the receiving account field respectively correspond to a first blockchain identifier identifying the first blockchain, the first account, a second blockchain identifier identifying the second blockchain, and the second account, and
the first location information indicates a location of the first data in the first blockchain; and
sending, by the relay to the second blockchain, the first data and the first location information based on the second blockchain identifier in the authenticable message.

US Pat. No. 10,924,280

DIGITAL NOTARY USE IN DISTRIBUTED LEDGER TECHNOLOGY (DLT) FOR BLOCK CONSTRUCTION AND VERIFICATION

Sprint Communications Com...

1. A method of using a digital notary in distributed ledger technology (DLT) for block construction and verification, the method comprising:creating, via a birth block creator server in a network, a birth block comprising electronic device information associated with an electronic device and an instruction set, wherein the birth block is stored in a non-transitory memory of the electronic device;
confirming, by a digital notary server in the network, that the instruction set was built in trust;
adding, by the digital notary server, a digital notary component to the birth block in response to confirming that the instruction set was built in trust;
creating a subsequent block for the electronic device, wherein the subsequent block comprises the instruction set and the digital notary component;
validating the subsequent block based on the digital notary component without consensus from a plurality of consensus servers in the network; and
storing the subsequent block in at least one of the non-transitory memory by an application executing on a processor of the electronic device or a block data store in the network in response to the validation.

US Pat. No. 10,924,279

SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR INTERFACING MULTIPLE SERVICE PROVIDER TRUSTED SERVICE MANAGERS AND SECURE ELEMENTS

Google LLC, Mountain Vie...

1. A method to interface with secure elements, comprising:receiving, by a central trusted service manager computing system, a request to delete one or more services stored on a secure element, the request including a service qualifier identifying a particular instance of the one or more services to be deleted from the secure element;
transmitting, by the central trusted service manager computing system to a central security domain of the secure element, a request to execute one or more commands to delete data associated with the service qualifier identifying the particular instance of the one or more services from the secure element; and
executing, by the secure element, the one or more commands by:
identifying, by the secure element, data corresponding to each of the one or more services, the identified data comprising one or more unique numbers each identifying a different payment account, and
deleting, by the secure element via the central security domain, the one or more unique numbers each identifying the different payment account from the secure element.

US Pat. No. 10,924,278

METHOD AND APPARATUS FOR AUTHENTICATION AND ENCRYPTION SERVICE EMPLOYING UNBREAKABLE ENCRYPTION

Qwyit, LLC, Oak Hill, VA...

1. A method for transmitting encryption keys to users who are communicating between each other in an encrypted manner using unbreakable encryption comprising:sending a verified setup request from a first client to a directory server during an https session, wherein said verified setup request includes at least an email address for the first client and a short message service (SMS) telephone number via which the first client can receive a text message;
generating, by the directory server upon receipt of the verified setup request from the first client, a first set of encryption credentials for the first client, wherein said first set of encryption credentials includes a first open identification (OpenID), a first master key (MQK), a first email offset key (EOK), and a first SMS offset key (SOK);
performing by the directory server a position digit algebraic function (PDAF) with the first EOK and the first SOK by cycling through each round of the first SOK moving a starting digit right one digit for each cycle to generate a first master offset key (MOK);
performing by the directory server the PDAF with the first MQK and the first MOK to generate a first master exchange key (MEK);
storing the first MQK and the first MEK by the directory server in relation with the first client's email address, first client's SMS telephone number, first OpenID and a first IP address via which the first client initially contacted the directory server;
encrypting by the directory server the first EOK and the first SOK using the first MQK to generate a first encrypted email offset key (EOKe) and a first encrypted SMS offset key (SOKe), respectively;
sending a verified setup reply to the first client during the https session, wherein said verified setup reply includes the first OpenID, and the first MQK;
sending an email reply to the first client to the email address provided by the first client, wherein said email reply includes the first OpenID and the first EOKe;
sending an SMS text message reply to the first client to the SMS telephone number provided by the first client, wherein said SMS text message reply includes the first OpenID and the first SOKe;
decrypting by the first client the first EOKe and the first SOKe using the first MQK to generate the first email offset key (EOK) and the first SMS offset key (SOK), respectively;
performing by the first client the PDAF with the first EOK and the first SOK by cycling through each round of the first SOK moving a starting position right one digit for each cycle to generate the first MOK;
performing by the first client the PDAF with the first MQK and the first MOK to generate the first MEK; and
concatenating the first MQK and the first MEK to form a first directory service key (DSK) for the first client.

US Pat. No. 10,924,276

SYSTEM, APPARATUS AND METHOD FOR PERFORMING A PLURALITY OF CRYPTOGRAPHIC OPERATIONS

Intel Corporation, Santa...

1. An apparatus comprising:a hardware accelerator to execute cryptography operations including a Rivest Shamir Adleman (RSA) operation and an elliptic curve cryptography (ECC) operation, the hardware accelerator comprising:
a multiplier circuit comprising a 27-bit×411-bit parallel combinatorial multiplier to multiply a first 384-bit value and a second 384-bit value in 16 clock cycles, wherein the hardware accelerator is to execute the RSA operation using the multiplier circuit; and
an ECC circuit coupled to the multiplier circuit to execute the ECC operation, the ECC circuit to compute a prime field multiplication using the multiplier circuit and to reduce a result of the prime field multiplication in a plurality of addition and subtraction operations for a first type of prime modulus, wherein the ECC circuit comprises an elliptic curve (EC) scalar multiplier.

US Pat. No. 10,924,275

CREATING MULTIPLE ENCRYPTED VOLUMES FROM A SINGLE SOURCE

Amazon Technologies, Inc....

1. A computing system comprising:a first set of servers configured to store a first encrypted block representation of a volume;
a second set of servers configured to store a second encrypted block representation of the volume; and
a control plane system including one or more processors coupled to one or more memories, the one or more memories including computer-executable instructions that, upon execution by the one or more processors, cause the control plane system to implement a transform fleet to:
receive a first request to create the first encrypted block representation of the volume from a snapshot of the volume and a second request to create the second encrypted block representation of the volume from the snapshot of the volume,
create a first transform instance for creating the first encrypted block representation and create a second transform instance for creating the second encrypted block representation,
receive a first encryption key to use for creating the first encrypted block representation and a second encryption key to use for creating the second encrypted block representation,
store the first encryption key and the second encryption key in memory of the control plane,
selectively use the first transform instance and the first encryption key to encrypt one or more blocks of the volume for transmission to the first set of servers, and
selectively use the second transform instance and the second encryption key to encrypt one or more blocks of the volume for transmission to the second set of servers.

US Pat. No. 10,924,272

METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED ON AN APPLIANCE-SPECIFIC BASIS WITH DEFINABLE PERMITTED ASSOCIATED USAGE RIGHTS FOR THE SELECTED CONTENT

OL Security Limited Liabi...

1. A method for secure content distribution, the method comprising:generating an appliance identifier based at least in part on one or more of:
a feature of a hardware element of a recipient device, or
a feature of a software element of the recipient device; sending the appliance identifier to a content provider;
receiving, from the content provider, encrypted content encrypted using a production key,
wherein the encrypted content comprises usage rights for at least a portion of the encrypted content, wherein the usage rights (1) regulate the number of times that at least the portion of the encrypted content can be viewed, and (2) store a count of the number of times that at least the portion of the encrypted content has already been viewed;
receiving, from the content provider, an encrypted version of the production key;
decrypting the encrypted content using the decrypted production key.

US Pat. No. 10,924,271

VEHICLE ACCESS SYSTEMS AND METHODS

SILVERCAR, INC., Austin,...

1. A system comprising:a server comprising:
a memory storing one or more instructions; and
a processor coupled to the memory and configured to execute the one or more instructions to cause the processor to:
receive, from a computing device of a transportation device, a check-in request message including an encrypted portion and an unencrypted portion including a reference identifier;
encrypt a command message based on the reference identifier; and
initiate transmission of the encrypted command message to the computing device in response to the received check-in request message.

US Pat. No. 10,924,270

SECRET CALCULATION SYSTEM, SECRET CALCULATION APPARATUS, AND SECRET CALCULATION METHOD

NEC CORPORATION, Tokyo (...

1. A secret calculation system comprising three secret calculation apparatuses sharing an n-bit number W and an n-bit W? (n=any natural number) in secret to each other, whereinan ith secret calculation apparatus (i=1, 2, 3) comprises:
a holder that holds (S[i], T[i]) and (S?[i], T?[i]) as distributed values of the n-bit number W and the n-bit W?, respectively; and
a hardware processor configured to implement:
a first multiplicator that derives a logical conjunction of S[i] and S?[i];
a second multiplicator that derives a logical conjunction of T[i] and T?[i]; and
a first subtractor that derives a difference between the logical conjunction derived by the first multiplicator and the logical conjunction derived by the second multiplicator.

US Pat. No. 10,924,268

KEY DISTRIBUTION METHOD, AND RELATED DEVICE AND SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A key distribution system, comprising: user equipment (UE), a mobile network operator network element (MNO), and a key management system (KMS), whereinthe UE is configured to: generate a public key and a private key, the public key and the private key being associated with each other, and send a first key request to the MNO, wherein the first key request carries the public key of the UE;
the MNO comprising a hardware processor configured to: receive the first key request, obtain the public key of the UE carried in the first key request, generate a second key request based on the public key of the UE, and send the second key request to the KMS, wherein the second key request carries the public key of the UE;
the KMS comprising a hardware processor configured to: receive the second key request; obtain the public key of the UE carried in the second key request; allocate, to the UE, at least one public validation token PVT and one secret signing key SSK used for signing that are based on identity-based cryptography IBC; encrypt the at least one PVT and the one SSK based on the public key of the UE to obtain ciphertext; sign a to-be-signed object based on a preset digital signature private key to obtain a digital signature; determine a signature validation public key associated with the digital signature private key; and send, to the MNO, a key response carrying the signature validation public key, the public key of the UE, the ciphertext, and the digital signature, wherein the to-be-signed object comprises the public key of the UE and the ciphertext;
the MNO is further configured to: receive the key response, and return the key response to the UE; and
the UE is further configured to: receive the key response; obtain the signature validation public key, the public key of the UE, the digital signature, and the ciphertext that are carried in the key response; verify the digital signature based on the signature validation public key; and after the validation succeeds, decrypt the ciphertext based on the private key associated with the public key of the UE to obtain the at least one PVT and the one SSK, and store the at least one PVT and the one SSK.

US Pat. No. 10,924,265

BLOCKCHAIN TECHNOLOGY

INTERNATIONAL BUSINESS MA...

1. A method for reducing load in a blockchain system that comprises a plurality of node apparatuses connected in a network, the blockchain system storing at least a portion of data registered in a blockchain in each of the plurality of node apparatuses, the method comprising:registering multiple pieces of data to be included in a block of the blockchain;
creating the block of the blockchain including all of the multiple pieces of data;
for each of the multiple pieces of data, making a determination of a plurality of storage node apparatuses from among the plurality of node apparatuses in the blockchain system to store each piece of data that was included in the block of the blockchain, the determination based on a characteristic of each of the node apparatuses; and
storing each of the multiple pieces of data in a selected plurality of the node apparatuses of the blockchain system according to the determination.

US Pat. No. 10,924,264

DATA VALIDATION AND STORAGE

Barclays Execution Servic...

1. A method for recording data describing a first entity, the data endorsed by a second entity, the method comprising the steps of:at the second entity:
validating data describing the first entity, wherein an identifier is associated with the data, the identifier being generated from a public key of the first entity;
cryptographically signing data corresponding with the data describing the first entity using at least a private key of the second entity; and
posting a first transaction to a block chain including the cryptographically signed data;
at a third entity:
validating the data describing the first entity;
cryptographically signing data corresponding with the data describing the first entity using a private key of the third entity;
posting a second transaction including the data cryptographically signed by the third entity; and
at a fourth entity:
determining that the data describing the first entity is sufficiently validated if one or more characteristics of each of the second entity and third entity meet validation criteria.

US Pat. No. 10,924,263

SYSTEMS AND METHODS FOR FACILITATING ITERATIVE KEY GENERATION AND DATA ENCRYPTION AND DECRYPTION

The Boeing Company, Chic...

1. A method comprising:encrypting, by an encryption logic circuit, a current data portion of plaintext data using a current encryption key to provide an encrypted current data portion;
scrambling, by performing bitwise operations, bits of at least one of the encrypted current data portion or the current data portion to obtain a scrambled at least one of the encrypted current data portion or the current data portion; and
generating, by the encryption logic circuit, a next encryption key for encryption of a next data portion of the plaintext data based on the current encryption key and at least one of the encrypted current data portion or the current data portion, wherein the generating the next encryption key comprises performing bitwise operations on the current encryption key and the scrambled at least one of the encrypted current data portion or the current data portion to obtain the next encryption key.

US Pat. No. 10,924,262

METHOD FOR PROCESSING DYNAMIC DATA BY FULLY HOMOMORPHIC ENCRYPTION METHOD

Crypto Lab Inc., Seoul (...

1. A computer-implemented method for processing dynamic data by dynamic data processing device, the device comprising a homomorphic encryption module and a plurality of computing modules running in parallel, the method comprising:carrying out, by the homomorphic encryption module, fully homomorphic encryption to dynamic data received from an object which generates the dynamic data;
updating, by a computing module which is not in a bootstrapping mode, an encrypted state variable; and
carrying out, by a computing module which completes bootstrapping, a first update to the encrypted state variable;
wherein the first update to the encrypted state variable after completion of the bootstrapping is carried out by
x(t+Nboot)?ANbootx(t)+?j=0Nboot?1ANboot?1?jB(r(t+j)?y(t+j)).

US Pat. No. 10,924,261

EFFICIENT POWER DISTRIBUTION

ARM Limited, Cambridge (...

1. An apparatus comprising;a power input comprising a first global power signal and a second global power signal;
a power output comprising a first local power signal and a second local power signal; and
securing circuitry comprising a powering unit comprising at least one charge store, wherein the powering unit is configured to operate in a plurality of modes, wherein the plurality of modes comprise:
a charge mode in which the powering unit is configured to receive power from the power input while isolating the first local power signal and the second local power signal; and
a power mode in which the powering unit is configured to output power to the power output while isolating the first global power signal and the second global power signal,
wherein the powering unit is configured to selectively operate in one of the plurality of modes at a given time.

US Pat. No. 10,924,260

SIGNAL ANALYSIS METHOD AND SIGNAL PROCESSING MODULE

1. A signal analysis method, said signal analysis method comprising:at least one of generating input samples associated with an input signal and receiving input samples associated with an input signal, said input signal comprising a symbol sequence;
determining a first difference quantity based on a first set of samples by a first polyphase filter, said first set of samples comprising at least two of said input samples;
determining a second difference quantity based on a second set of samples by a second polyphase filter, said second set of samples comprising at least two of said input samples, wherein said input samples associated with the second set of samples are time-shifted with respect to said input samples associated with the first set of samples;
comparing said first difference quantity and said second difference quantity based on a predefined criterion; and
determining at least one timing parameter of said symbol sequence based on the comparison of said first difference quantity and said second difference quantity.

US Pat. No. 10,924,259

METHOD AND APPARATUS FOR BINARY SIGNAL RECEPTION, CLOCK DATA RECOVERY, AND SOFT DECODING

MaxLinear, Inc., Carlsba...

1. An apparatus for receiving a signal, comprising:a demodulator configured to generate a binary signal from a received signal;
a clock data recovery (CDR) circuitry configured to sample the binary signal and detect a phase error of the binary signal with respect to a local oscillator signal in the apparatus and generate CDR state information for the binary signal, wherein the CDR circuitry is configured to generate the CDR state information from at least three consecutive samples of the binary signal sampled at least twice a symbol rate of the binary signal;
a soft information generation circuitry configured to map the CDR state information to soft information for the binary signal; and
a decoder configured to decode the binary signal using the soft information.

US Pat. No. 10,924,257

METHOD AND APPARATUS FOR CANCELING SELF INTERFERENCE SIGNAL IN COMMUNICATION SYSTEM

ELECTRONICS AND TELECOMMU...

1. A first communication node for performing communication based on In-band Full-Duplex (IFD), the first communication node comprising:a signal transmission unit configured to generate a first radio frequency (RF) signal;
an antenna module configured to transmit the first RF signal generated by the signal transmission unit and receive a second RF signal from a second communication node;
a signal reception unit configured to process the second RF signal and self-interference signals caused by the first RF signal;
a Self Interference (SI) signal estimator for estimating the self-interference signal;
a Digital Self Interference Cancellation (DSIC) circuit for canceling the self-interference signals in a digital domain;
an Analog Self Interference Cancellation (ASIC) circuit for canceling the self-interference signals in an analog domain;
a Hybrid Self Interference Cancellation (HSIC) circuit for canceling the self-interference signals in the analog domain;
an Analog Self Interference (ASI) canceller having an input end connected to an output end of the antenna module and to an output end of the ASIC circuit, and that cancels a self-interference signal estimated by the ASIC circuit from an output signal of the antenna module; and
a Hybrid Self Interference (HIS) canceller having an input end connected to an output end of the ASI canceller.

US Pat. No. 10,924,256

SYSTEM AND METHOD FOR FULL DUPLEX CANCELLATION

1. A method comprising:determining, via a processor, a residual interference signal based on a combination of an interference signal and a passive suppression of the interference signal, the passive suppression of the interference signal being calculated based on characteristics of a medium through which the interference signal passes and one or more of: previously transmitted signals, an antenna position, a signal frequency, or estimates from pilot signals; and
applying, via the processor, digital cancellation to the residual interference signal based on the passive suppression of the interference signal.

US Pat. No. 10,924,255

BASE STATION, USER EQUIPMENT AND WIRELESS TRANSMISSION METHOD OF NARROW BAND-INTERNET OF THINGS

Institute For Information...

1. A base station for Narrow Band-Internet of Things (NB-IoT), comprising:a processor, configured to determine a location parameter for a location of a reference subframe in a sequence of Time-Division Duplex (TDD) subframes and a parameter of scheduling delay; and
a transceiver electrically connected with the processor, configured to transmit downlink control information including the parameter of scheduling delay and the location parameter to a user equipment in a narrowband downlink control channel, so that the user equipment calculates a target subframe, designated by the base station, in the sequence of TDD subframes according to the parameter of scheduling delay and the reference subframe in the sequence of TDD subframes, and then performs a wireless transmission with the base station in the target subframe;
wherein the parameter of scheduling delay corresponds to the number of available subframes between the reference subframe and the target subframe in the sequence of TDD subframes, and categories of the available subframes are related to the direction of the wireless transmission.

US Pat. No. 10,924,254

METHOD AND SYSTEM FOR LONG-DISTANCE FULL-DUPLEX WIRELESS COMMUNICATION

KIWI TECHNOLOGY INC., Hs...

1. A method for long-distance full-duplex wireless communication, adapted to a communication system that includes one or more wireless gateway modules connecting one or more terminal nodes through multi-channel technology to receive data from every terminal node, a wireless transmission module for transmitting data, and a control circuit connecting to the one or more wireless gateway modules and the wireless transmission module via a connection line, the method comprising:receiving data from a terminal node by a wireless gateway module, wherein the data is an uplink packet transmitted from the terminal node via a channel within a preset time slot, wherein the preset time slot and the channel of the uplink packet are stored in a memory of the terminal node, and different terminal nodes transmit the uplink packets within different preset time slots or different channels;
after receiving the data, the wireless gateway module generating a response packet within a next preset time slot, wherein the data is transformed to a downlink packet; and
determining a transmission channel by the wireless transmission module to transmit the downlink packet.

US Pat. No. 10,924,253

FULL DUPLEX EXPANDER IN A FULL DUPLEX NETWORK

ARRIS Enterprises LLC, S...

1. A method for full duplex communication including simultaneous transmission of upstream and downstream signals in a same frequency band at a position in a network following a full duplex (FDX) DOCSIS node in a downstream direction, the method comprising:receiving at the position following the FDX node in the downstream direction, by a computing device, a downstream analog signal from the FDX node and an upstream analog signal in the same frequency band;
separating, by the computing device, the downstream analog signal and the upstream signal into a first path and a second path;
amplifying, by the computing device, the separated downstream analog signal using the first path and the separated upstream analog signal using the second path;
isolating, by the computing device, the amplified downstream analog signal and the amplified upstream analog signal from one another, wherein isolating the downstream signal and the upstream signal comprises canceling crosstalk from either the downstream signal or the upstream signal;
sending, by the computing device, the amplified downstream analog signal downstream towards a subscriber device; and
sending, by the computing device, the amplified upstream analog signal towards a full duplex node.

US Pat. No. 10,924,250

UE OPERATION WITH REDUCED POWER CONSUMPTION

Samsung Electronics Co., ...

1. A method for a user equipment (UE) to receive physical downlink control channels (PDCCHs) from a master node (MN) or from a secondary node (SN), the method comprising:receiving an indication for a first number of cells Ncells,MCGcap and for a second number of cells Ncells,SCGcap, wherein MCG denotes a master cell group for the MN and SCG denotes a secondary cell group for the SN;
determining a first total number of PDCCH candidates MPDCCH,MCGtotal,? for Ncells,MCGDL,? downlink (DL) cells of the MN over a time period according to Ncells,MCGcap, wherein ? is a subcarrier spacing (SCS) configuration for an active bandwidth part (BWP) for each of the Ncells,MCGDL,? DL cells; and
determining a second total number of PDCCH candidates MPDCCH,SCGtotal,? for Ncells,SCGDL,? DL cells of the SN over the time period according to Ncells,SCGcap, wherein ? is a SCS configuration for the active BWP for each of the Ncells,SCGDL,? DL cells.