US Pat. No. 10,693,865

WEB-BASED INTERFACE INTEGRATION FOR SINGLE SIGN-ON

Oracle International Corp...

1. A method for web-based access management through a single sign-on service system, the method comprising:receiving, by a first tunnel proxy of a single sign-on service system, from a second tunnel proxy of a single sign-on gateway, a management operation request, wherein:
the single sign-on service system includes a data manager that transparently manages data access to a plurality of data repositories that store a plurality of single sign-on data,
the second tunnel proxy converts a first request, received from a client device via a web interface associated with the single sign-on service system, from a first protocol to an access protocol to generate the management operation request, and
the management operation request identifies a management operation that is one of a credential management operation or a policy management operation;
in response to receiving the management operation request, converting, by the first tunnel proxy, the management operation request from the access protocol to the first protocol to obtain the first request;
in response to obtaining the first request, providing the first request to a first single sign-on service of the single sign-on service system;
in response to receiving the first request, performing, by the first single sign-on service, the management operation, wherein performing the management operation comprises:
generating an operation request to perform the management operation,
determining, by the data manager, that single sign-on data associated with the management operation request is associated with a first data repository of the plurality of data repositories, and
generating, by the data manager, a first response to the first request based on querying the first data repository using the operation request, wherein the first response is defined according to the first protocol;
converting, by the first tunnel proxy, the first response from the first protocol to the access protocol to generate a second response; and
transmitting the second response from the first tunnel proxy to the second tunnel proxy that facilitates providing the first response to the client device via the web interface.

US Pat. No. 10,693,864

SINGLE SIGN-ON BETWEEN MULTIPLE DATA CENTERS

Oracle International Corp...

1. A method for managing access among data centers, the method comprising:receiving, at a first computer system managing access for a first data center, first authentication data for a computing device associated with a user;
determining, by the first computer system and based on the first authentication data, that a second data center stores session information associated with the user;
determining, by the first computer system, that the second data center cannot transmit, in response to a request for the session information communicated from the first data center to the second data center, the session information to the first computer system;
upon determining that the second data center cannot transmit the session information to the first computer system:
identifying, by the first computer system, session data stored by the first data center, wherein the session data was previously received from the second data center;
determining, by the first computer system, that the identified session data is insufficient to establish a session associated with the user at the first data center;
receiving, by the first computer system from the computing device, second authentication data; and
establishing, by the first computer system, the session associated with the user at the first data center based on the second authentication data.

US Pat. No. 10,693,863

METHODS AND SYSTEMS FOR SINGLE SIGN-ON WHILE PROTECTING USER PRIVACY

Apple Inc., Cupertino, C...

1. A method for enabling an application executing on a computing device to identify a user of the application, the method comprising, at a server computing device:receiving, from the computing device, a request for a first user identifier that is known to the application, wherein the request includes:
(1) a second user identifier that references the user, and
(2) an application identifier associated with the application;
retrieving the first user identifier based on the second user identifier and the application identifier; and
providing a package to the computing device, wherein:
the package includes the first user identifier and an authentication token, and
the package causes the computing device to provide the first user identifier to the application in response to verifying the authentication token.

US Pat. No. 10,693,862

DETERMINING, BY A REMOTE SYSTEM, APPLICATIONS PROVIDED ON A DEVICE BASED ON ASSOCIATION WITH A COMMON IDENTIFIER

Google LLC, Mountain Vie...

1. A system comprising:a memory; and
a processor, coupled to the memory, to:
receive a notification about an activity pertaining to a user, the notification being directed to a first application and a second application, and identity of the user being associated with a token;
identify a first instance of the first application and a first instance of the second application at a user device of the user;
determine whether the first instance of the first application and the first instance of the second application are associated with the token;
responsive to determining that the first instance of the first application and the first instance of the second application are both associated with the token, select one of the first instance of the first application or the first instance of the second application to provide the notification at the user device based on the token and a fingerprint of the token; and
provide the notification to the selected one of the first instance of the first application or the first instance of the second application at the user device, while preventing duplicate notification to the non-selected application at the user device; and select either the first instance of the first application or the first instance of the second application based on a predetermined priority order associated with the respective applications.

US Pat. No. 10,693,861

TASK SEGREGATION IN A MULTI-TENANT IDENTITY AND DATA SECURITY MANAGEMENT CLOUD SERVICE

Oracle International Corp...

1. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to provide cloud-based identity management, the provide comprising:receiving a request to perform an identity management service for a user that comprises a plurality of tasks;
separating the plurality of tasks into real-time tasks and near-real-time tasks, the real-time tasks comprising operations needed for the user to proceed in accessing a resource;
synchronously executing the real-time tasks by accessing at least one service, wherein synchronously executing comprises completing an execution of a first real-time task before starting an execution of a second task; and
asynchronously executing the near-real-time tasks by offloading the near-real-time tasks to one or more message queues, wherein asynchronously executing comprises allowing an execution of a third task to start before finishing an execution of a fourth near-real-time task.

US Pat. No. 10,693,860

RDP PROXY SUPPORT IN PRESENCE OF RDP SERVER FARM WITH SESSION DIRECTORY OR BROKER

Citrix Systems, Inc., Fo...

1. A system for connecting to a server of a plurality of servers, the system comprising:a device intermediary between at least one client and a plurality of servers, the device comprising memory and at least one processor configured to:
receive a remote desktop protocol (RDP) request from a first client of the at least one client to connect to one of the plurality of servers, the RDP request including a token;
cause a load-balancer of the plurality of servers to modify or remove the token of the RDP request, responsive to presence of a session directory;
receive a server redirect packet generated by a first server of the plurality of servers that is selected by the load-balancer responsive to the RDP request, the server redirect packet indicating a target server identified from the plurality of servers by the session directory, to which the first client is to connect; and
cause the server redirect packet to be modified to cause the first client to send a redirected connection request packet for connecting with the target server.

US Pat. No. 10,693,859

RESTRICTING ACCESS FOR A SINGLE SIGN-ON (SSO) SESSION

Oracle International Corp...

1. A method comprising:receiving, by a computer system from a client device operated by a first user, a request to access a first resource;
requesting, by the computer system, credential data from the first user to access the first resource;
in response to the request for the credential data, receiving, by the computer system from the client device operated by the first user, the credential data and scope information for establishing a session, wherein the scope information is provided by the first user and defines a first group of resources that are accessible by the client device during the session and/or a second group of resources that are restricted from access by the client device during the session, and wherein the first group of resources include the first resource that the first user is requesting to access;
determining, by the computer system, the credential data for the first user is valid;
in response to determining the credential data is valid, establishing, by the computer system, the session with the client device;
determining, by the computer system, a scope of authentication for the session based on the scope information provided by the first user;
configuring, by the computer system, the session for the client device based on the scope of authentication, wherein the session is configured to allow the client device to access the first group of resources during the session and/or restrict the client device from accessing the second group of resources during the session;
determining, by the computer system, the first user operating the client device is authorized to access the first resource based on the configuration of the session; and
in response to determining the first user operating the client device is authorized to access the first resource, sending, by the computer system, an authorization message to the client device to allow the first user to access the first resource.

US Pat. No. 10,693,858

CDN-BASED ACCESS CONTROL METHOD AND RELATED DEVICE

HUAWEI TECHNOLOGIES CO., ...

8. A content delivery network (CDN) based access control method, comprising:receiving, by a service server from a CDN server, a hypertext transfer protocol (HTTP) request and identification information of a user terminal, wherein the HTTP request comprises an access ticket identifying a user access permission;
performing, by the service server, an authentication on the access ticket using the identification information; and
returning, by the service server to the CDN server, an HTTP response comprising a content fingerprint when an authentication result indicates that the access ticket is valid.

US Pat. No. 10,693,857

SINGLE KEY AUTHENTICATION METHOD

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for authenticating access to a service provider system, the method comprising:sending, by a user application executing on a user device, an authentication image to the service provider system, the authentication image comprising first data generated in response to user input, second data generated by the user application, and third data generated by the service provider system; receiving, by the user application, an indication from the service provider system that access to a user account has been authenticated based at least in part on the authentication image,
wherein the first data is generated by:
presenting a grid having a plurality of user-selectable cells to the user;
receiving a user selection of one or more of the plurality of the user-selectable cells; and
generating a matrix object based at least in part on the user selection of the at least a portion of the user-selectable cells.

US Pat. No. 10,693,856

AUTOMATIC AUTHENTICATION SWITCHING IN ONLINE LIVE CHAT APPLICATIONS

FMR LLC, Boston, MA (US)...

1. A computerized method of automatic authentication switching in online chat sessions, the method comprising:receiving, by a server computing device, a request to establish an online chat session from a first client computing device, the request including authentication credentials associated with the first client computing device;
establishing, by a server computing device, an online chat session between the first client computing device and a second client computing device via a first authenticated text communications channel after validating the authentication credentials, the first authenticated text communications channel comprising a first URL that, when activated, connects the first client computing device to the second client computing device via an authentication module at the server computing device, a portion of the first URL denoting an association with the first authenticated text communications channel, the server computing device passing the online chat session through the authentication module upon detecting the portion of the first URL denoting an association with the first authenticated text communications channel;
transmitting, by the server computing device, one or more chat messages between the first client computing device and the second client computing device using the first authenticated text communications channel;
determining, by the first client computing device, that the online chat session has lost authentication;
automatically switching, by the first client computing device, the online chat session to a second unauthenticated text communications channel, the second authenticated text communications channel comprising a second URL that, when activated, connects the first client computing device to the second client computing device without using the authentication module at the server computing device, a portion of the second URL denoting an association with the second unauthenticated text communications channel, the server computing device passing the online chat session to the second client computing device without using the authentication module upon detecting the portion of the second URL denoting an association with the second unauthenticated text communications channel; and
maintaining, by the server computing device, the established online chat session between the first client computing device and the second client computing device via the second unauthenticated text communications channel.

US Pat. No. 10,693,855

FRAUD DETECTION

EMC IP Holding Company LL...

1. A computer-implemented method, comprising:receiving, by processing circuitry, an electronic transaction in connection with a computerized resource, the electronic transaction being described by a particular value of an authentication factor;
in response to receiving the electronic transaction, determining, by processing circuitry, two separate risk measurements describing the riskiness of the electronic transaction, wherein the two risk measurements comprise a first risk measurement relating to a first time window and a second risk measurement relating to a second time window, the first time window being greater than the second time window, and wherein the determining comprises performing an analysis of transaction data relating to one or more prior electronic transactions in the second time window;
comparing, by processing circuitry, the two risk measurements in order to determine which of the two risk measurements indicates a lower risk;
selecting, by processing circuitry, and from the two risk measurements, the risk measurement with the lower risk;
generating, by processing circuitry, an authentication result based on the selected risk measurement, the authentication result indicating whether the electronic transaction is authentic; and
validating, by processing circuitry, the electronic transaction when the authentication result indicates that the electronic transaction is authentic.

US Pat. No. 10,693,854

METHOD FOR AUTHENTICATING A USER, CORRESPONDING SERVER, COMMUNICATIONS TERMINAL AND PROGRAMS

INGENICO GROUP, Paris (F...

1. A method comprising:authenticating a communications terminal belonging to a user with an authentication server connected to a gateway terminal by using a communications network, wherein the method comprises the following acts performed by the authentication server:
obtaining a piece of data representing an identity of the user from said gateway terminal;
carrying out a checking operation, directly or through a gateway application installed on said gateway terminal, to determine whether or not said gateway terminal comprises a Bluetooth physical interface;
and in response to determining that said gateway terminal comprises a Bluetooth physical interface:
configuring, by said authentication server, a data transmission link between said authentication server and said user's communications terminal, by using said Bluetooth physical interface of said gateway terminal and as a function of said piece of data representing an identity of the user, said data transmission link being a virtual Bluetooth link set up by transmitting a Bluetooth pairing code of the authentication server to the user's communications terminal, enabling pairing the user's communications terminal directly with the authentication server;
transmitting, by the authentication server, to the user's communications terminal, a piece of encrypted data for checking authentication, by using the data transmission link;
receiving, by the authentication server, coming from the user's communications terminal, a piece of encrypted data for counter-checking of authentication; and
issuing an assertion of authentication of the user in response to the piece of encrypted data for counter-checking of authentication corresponding to said piece of encrypted data for checking authentication.

US Pat. No. 10,693,853

METHOD AND SYSTEM FOR POLICY ENFORCEMENT IN TRUSTED AD HOC NETWORKS

New Jersey Institute of T...

1. A non-transitory computer readable storage medium storing a set of instructions executable by a processor, the set of instructions performing a method comprising:receiving, by a first node, a request from a second node to join a trusted ad hoc network;
authenticating the second node to join the trusted ad hoc network, the authentication performed based on a verification that the second node will comply with a security policy of the trusted ad hoc network, wherein the verification comprises verifying a system commitment of the second node to the security policy, verifying an enforcer commitment of the second node to the security policy, and verifying a boot status of the second node;
sending, to the second node, a first report indicating that the first node complies with the security policy;
adding the second node to the trusted ad hoc network;
sending, to the second node, a key corresponding to the trusted ad hoc network;
receiving a module from the second node;
upon detection of an attempt to disable the security policy from the module, clearing the key corresponding to the trusted ad hoc network and removing the module.

US Pat. No. 10,693,852

SYSTEM FOR A SECURE ENCRYPTION PROXY IN A CONTENT CENTRIC NETWORK

Cisco Technology, Inc., ...

1. A method comprising:obtaining, at a router between a content consuming device and a content storage device, a first interest corresponding to a first content object, the first interest comprising a first name identifying the content storage device, signaling information, an authentication token, and an inner interest identifying an actual content object stored at the content storage device, wherein the inner interest is encrypted with an encryption key shared between the content storage device and the content consuming device and not shared with the router;
authenticating the first interest by verifying the authentication token using an authentication key shared with the content consuming device;
providing the first interest to the content storage device;
obtaining the first content object from the content storage device, wherein the first content object includes at least a portion of the actual content object encrypted with the encryption key; and
providing the first content object to the content consuming device.

US Pat. No. 10,693,851

DATA PROTECTION KEYS

Intel Corporation, Santa...

1. A server system comprising:verifier circuitry to:
verify authenticity of a client device using a Trusted Platform Module (TPM) quote received from the client device;
wherein the TPM quote includes at least a first public attestation identity key signed using a second private attestation identity key;
verify a secure hash digest associated with the TPM quote;
verify a signature of the TPM quote; and
verify the content of the TPM quote using at least the first public attestation identity key and one or more attributes associated with the first public attestation identity key, wherein the first public attestation identity key and the one or more attributes associated with the first public attestation identity key are signed using the second private attestation identity key; and
wherein the authenticity of the client device is verified by the verifier circuitry based, at least in part, on the first public attestation identity key and the second private attestation identity key being associated with the TPM associated with the respective client device.

US Pat. No. 10,693,850

MANAGING NIC-ENCRYPTED FLOWS FOR MIGRATING GUESTS OR TASKS

Google LLC, Mountain Vie...

1. A method of migrating a guest of a virtual machine from a host computing device to a target computing device, the method comprising:at the host computing device:
preparing, using one or more processors, to send information to a target computing device, the information including at least a flow key and a first data packet of a plurality of data packets of the guest;
generating, using the one or more processors, a receive token by encrypting the flow key using a receive master key;
encrypting the first data packet using the flow key;
generating a send token by encrypting the receive master key, flow key, and first data packet using a send master key, wherein the send token encapsulates the receive master key, the flow key, and the first data packet;
sending the send token to a network adapter; and
decrypting, on the network adapter, the send token to identify the receive master key, flow key, and the first data packet;
encrypting, on the network adapter, the first data packet using the flow key, and
sending, by the network adapter, the encrypted first data packet and the receive token to the target computing device;
at the target computing device:
receiving the encrypted first data packet and the receive token;
decrypting the receive token using the receive master key;
identifying the flow key in response to decrypting the receive token; and
decrypting the first data packet using the identified flow key; and
completing migration of the guest to the target computing device by repeating the preceding steps for remaining data packets of the plurality of data packets of the guest.

US Pat. No. 10,693,849

SENDING MESSAGE IN MULTILAYER SYSTEM

International Business Ma...

1. A computer-implemented data transmission method executed at a second node, wherein the second node is communicatively connected to a first node, the method comprising:acquiring a first transformed password (PWD) from the first node, wherein the first transformed PWD is derived from an original PWD;
acquiring an encrypted message from the first node, the encrypted message being encrypted with a public key of the first node;
recovering a private key of the first node according to the first transformed PWD, the private key having been encrypted with the first transformed PWD and stored in the second node in advance of recovering the private key;
decrypting the encrypted message with the recovered private key to obtain a decrypted message for processing; and
dumping the private key from the first node and the first transformed PWD.

US Pat. No. 10,693,848

INSTALLATION OF A TERMINAL IN A SECURE SYSTEM

KELISEC AB, Bromma (SE)

1. A system comprising a terminal and a server, wherein the terminal is installed in the system by the server, the server being configured to:identify the terminal,
generate key generation data, comprising at least one data seed,
distribute the at least one data seed to the terminal,
generate key data, to be used for generating a symmetric encryption key, and meta data, to be used for generating an authentication token, based on said at least one data seed and a function for generating numbers, and
store an identifier for the terminal along with the key data and the meta data for the terminal,
wherein the terminal is arranged to:
receive the at least one data seed from the server;
generate key data and meta data based on said at least one data seed and the same function for generating numbers,
store the key data and the meta data, wherein the key data and the meta data stored in the terminal are the same as the key data and the meta data stored in the server, and
mutate any one of (i) the key data, (ii) the meta data, (iii) the symmetric encryption key or (iv) any combination of (i), (ii) and (iii).

US Pat. No. 10,693,847

SECURE MESSAGE SEARCH

Symphony Communication Se...

1. A computer-implemented method performed by a client device, the method comprising:receiving search text from a user;
tokenizing the search text into a set of tokens;
identifying, by a salt selection module of the client device, a plurality of possible salt values for the set of tokens, the plurality of possible salt values comprising at least one of: a plurality of salt values corresponding to different time periods, or a plurality of salt values derived from user identities, message identities, or conversation identities;
generating, by a token transformation module of the client device, a plurality of possible token sets by, for each possible salt value of the plurality of possible salt values, transforming the set of tokens using the possible salt value; and
sending the plurality of possible token sets to a communication server for identification of matching messages from a plurality of messages stored in encrypted form by the communication server,
wherein the communication server comprises a search index comprising at least one transformed token corresponding to each message from the plurality of messages, and
wherein the at least one transformed token was derived by transforming at least one token from the corresponding message using a selected salt value from the plurality of possible salt values.

US Pat. No. 10,693,846

PUBLISHED INFORMATION PROCESSING METHOD AND DEVICE, AND INFORMATION PUBLISHING SYSTEM

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:obtaining a first data item to be published in a published information record from a network site, the first data item associated with a service item of the network site;
determining that the published information record does not include any prior published data item associated with the service item;
in response to determining that the published information record does not include any prior published data item associated with the service item, generating a first encryption value based on predetermined initial information; and
storing the first data item and the generated first encryption value in the published information record, wherein the first encryption value is configured to enable a user to detect whether the first data item has been modified on the network site;
obtaining a second data item different then the first data item to be published in the published information record from the network site, the second data item associated with the service item;
determining that the published information record includes a prior published data item associated with the service item;
in response to determining that the published information record includes the prior published data item associated with the service item;
determining an interval amount of prior published data associated with the service item, wherein the interval amount of the prior published data comprises a number of data items in the prior published data, or a number of data items in a predetermined time range preceding the second data item;
obtaining a most recent interval amount of the prior published data associated with the service item; and
generating a second encryption value based on the most recent interval amount of the prior published data associated with the service item; and
storing the second data item and the second encryption value in the published information record.

US Pat. No. 10,693,845

ENHANCING SECURITY OF APPLICATION DOWNLOADS

Alibaba Group Holding Lim...

1. A computer-implemented method comprising:receiving download description information for a particular application from a network using an encrypted communications channel, wherein the download description information includes download address information specifying a network address from which application packages associated with the particular application can be retrieved;
based on the download description information, opening an unencrypted and unencoded communications channel to the specified network address; and
downloading an application package associated with the particular application from the network address specified in the download address information, wherein the application package is downloaded using the unencrypted and unencoded communications channel.

US Pat. No. 10,693,844

EFFICIENT MIGRATION FOR ENCRYPTED VIRTUAL MACHINES BY ACTIVE PAGE COPYING

Red Hat, Inc., Raleigh, ...

1. A method comprising:receiving, by a source host machine hosting a virtual machine (VM), a request to migrate the VM to a destination host machine;
identifying a first page of memory of the VM on the source host machine for migration, the first page of memory encrypted with a guest-specific encryption key;
preventing the VM from accessing the first page;
executing, by the source host machine, a send command to modify the first page from encrypted with the guest-specific encryption key to encrypted with a migration key while the first page remains in place in the memory of the source host machine;
allocating a second page in a buffer maintained in hypervisor memory of a hypervisor managing the VM;
copying contents of the first page to the second page;
executing, by the source host machine, a receive command to modify the first page from encrypted with the migration key to encrypted with the guest-specific encryption key while the first page remains in place in the memory of the source host machine and to restore the access by the VM to the first page;
restoring, subsequent to executing the receive command, access by the VM to the first page so that the first page is accessible by the VM at the source host machine during migration of the VM; and
transmitting contents of the second page to the destination host machine.

US Pat. No. 10,693,843

SECURITY FOR SCENE-BASED SENSOR NETWORKS

Scenera, Inc., Palo Alto...

1. A computer-implemented method for securing a variety of sensor data and processed sensor data related to a Scene, the method comprising, at a sensor-side technology stack comprising a group of one or more sensor devices with at least one camera:receiving a SceneMode from an application via an application programming interface (API) between the application and the sensor-side technology stack, the SceneMode defining SceneData to be provided by the sensor-side technology stack;
producing the SceneData based on an artificial intelligence or machine learning analysis applied to sensor data captured by the sensor group, the sensor data including image data captured by the camera;
wherein the SceneMode does not specify all of the sensor data used to produce the SceneData; but the sensor-side technology stack determines, based on the received SceneMode, the unspecified sensor data to be captured and used to produce the SceneData; and
wherein the SceneMode also does not specify all of the analysis applied by the sensor-side technology stack to produce the SceneData; but the sensor-side technology stack determines, based on the SceneMode, the unspecified analysis to be applied to produce the SceneData;
securing at least some of the SceneData; and
returning the secured SceneData to the application via the API.

US Pat. No. 10,693,842

DEVICE FOR MANAGING MULTIPLE ACCESSES TO A SECURE MODULE OF A SYSTEM ON CHIP OF AN APPARATUS

Thales Dis France SA, Me...

1. A device for managing multiple accesses to a secure module of a system on chip of an apparatus providing data-transfer interfacing between the secure module and at least one non-secure module thereby allowing said secure module to be able of acting as several virtual secure elements respectively for several image owners, comprising:a) a stream ciphering means having a connection to said secure module
and said at least one non-secure module storing a group of images belonging to said several image owners, the stream ciphering means arranged for computing on the fly and in a single pass an integrity check for data to be transferred between said secure module and a non-secure module of said system on chip with a seed and an encryption key, and for encrypting/decrypting on the fly and in said single pass said data with said encryption key, and
h) a control means for providing said encryption key and said seed to said
stream ciphering means and for requesting data transfer and retrieving status to said secure and non-secure modules for allowing said transfer of encrypted/decrypted data between said secure and non-secure modules;
wherein the secure module comprises a primary boot loader operable to receive a START command directing the secure module to load and initiate an indicated mace selected from the stored group of images, and a STOP command from the non-secure module via the device for managing multiple accesses to the secure module, wherein upon receiving the START command the secure module loads and initiates the indicated image and upon receiving the STOP command the secure module backs up all loaded phsical pages to an encrypted chunk of data to a non-volatile memory managed by the non-secure module.

US Pat. No. 10,693,841

SYSTEM AND METHOD FOR TRANSMITTING DATA RELATING TO AN OBJECT

1. A system for transmitting data relating to a plurality of objects, comprising:a local computing unit assigned to and integrated within each of the plurality of objects connected via a local communications network so that each of the plurality of objects has a dedicated computing unit, said local computing unit comprising data memory, an evaluation unit, and multiple applications, wherein requests from the applications are processed through the evaluation unit, and wherein each of the applications causes the evaluation unit to process the data relating to each of the plurality of objects of the data memory according to an instruction stored in each of the applications with the applications configured to cause the evaluation unit to store the data relating to each of the plurality of objects in the data memory; and
a software agent configured to collect the data relating to each of the plurality of objects stored in the data memory and transmits it to an external computing unit via a data connection, said software agent including a classification module, wherein the classification module is configured to classify the data into classes of different encryption levels according to a sensitivity of the data, thereby transmitting the sensitive data to the external computing unit in encrypted form, wherein each of the plurality of objects is an automation component in a control level or field level and the object supplies both internal and external object data, wherein the internal object data is calculated within each of the plurality of objects and the external object data is status data from a process level.

US Pat. No. 10,693,840

METHOD FOR DISTRIBUTING CONTACT INFORMATION BETWEEN APPLICATIONS

Neustar, Inc., Sterling,...

1. A method for sharing contact information of a first user between a first application and a second application associated with a second user, the method comprising using a server on a computer network to perform steps of:identifying a first identifier relating to the first user;
provisioning contact information associated with the first identifier, wherein the contact information includes a set of different identifiers, each of which is different from the first identifier;
storing the contact information and the first identifier together in a first database;
receiving a request for the contact information from the second user, wherein a second identifier is associated with the second user;
determining whether the second user is authorized to obtain the contact information, based on the second identifier being in a set of authorized identifiers authorized to access the contact information;
when a determination is made that the second user is authorized to obtain the contact information, retrieving the contact information from the first database; and
transmitting the contact information to the second application associated with the second user without receiving an authorization signal from the first user in response to the request.

US Pat. No. 10,693,839

DIGITAL MEDIA CONTENT DISTRIBUTION BLOCKING

International Business Ma...

1. An Internet based digital media content transfer blocking improvement method comprising:detecting, by a processor of a detection hardware device, a user request, from a user device for access to digital media content from a digital media provider system;
detecting, by said processor, said digital media content being transmitted from said digital media provider system to a network;
detecting, by said processor, a duration and volume of said digital media content being transmitted from said digital media provider system to a network;
identifying, by said processor executing a network hardware probe of said detection hardware device, network traffic across said network;
verifying, by said processor executing an analytical software engine of said detection hardware device, that said digital media content is comprised by said network traffic;
executing, by said processor in response to results of said verifying and said detecting said duration and volume, investigation platform software code;
querying, by said processor, a database system associated with said digital media provider system;
determining, by said processor based on results of said querying, if a legitimate connection based relationship exists between said user and said digital media provider system;
additionally determining, by said processor based on results of monitoring said digital media content, that said digital media content is not authorized for use by said user;
disabling, by said processor based on said determining that said digital media content is not authorized for use by said user, said digital media content from executing functions with respect to said user device of said user; and
disabling, by said processor based on said determining that said digital media content is not authorized for use by said user, access to a block chain enabled secure database storing said digital media content.

US Pat. No. 10,693,838

TRANSPORT LAYER SIGNALING SECURITY WITH NEXT GENERATION FIREWALL

Palo Alto Networks, Inc.,...

1. A system, comprising:a processor configured to:
monitor transport layer signaling traffic on a service provider network at a security platform; and
filter the transport layer signaling traffic at the security platform based on a security policy, wherein a transport layer signaling protocol is a signaling transport (SIGTRAN) protocol, and perform state and packet validation of a Stream Control Transport Protocol (SCTP) protocol per payload protocol identifier (PPID) and source/destination IP addresses while filtering SIGTRAN protocol messages; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,693,837

SYSTEM FOR AND METHOD OF RANKING DOMAIN NAMES BASED ON USER PROPERTIES

VERISIGN, INC., Reston, ...

1. A method of ranking a plurality of domain names for presentation to a user, the method comprising:obtaining, over a computer network, domain name data comprising, for each of a plurality of training domain names, respective user information representing a respective user;
generating, by at least one electronic processor, a model relating at least features of each of the plurality of training domain names to respective user features derived from the respective user information, wherein the generating the model comprises representing each respective user information as a training vector in a hyperspace, whereby a plurality of training vectors are produced;
obtaining novel user information representing a novel user;
obtaining the plurality of domain names, wherein the obtaining the plurality of domain names comprises:
representing a novel user feature derived from the novel user information as a novel user vector in the hyperspace;
determining a plurality of proximate vectors of the plurality of training vectors that are within a threshold distance in the hyperspace to the novel user vector; and
determining the plurality of domain names as domain names that have been registered to users represented by the plurality of proximate vectors;
ranking the plurality of domain names, using the model and novel input data comprising the novel user feature according to predicted domain name suitability for the novel user, wherein the ranking the plurality of domain names comprises:
determining a plurality of distances, each of the plurality of distances comprising a distance, in the hyperspace, from a vector representing the novel user feature to a respective proximate vector; and
ranking the plurality of domain names according to an inverse of the plurality of distances; and
providing a ranked list of the plurality of domain names to the user.

US Pat. No. 10,693,836

DATA LOSS PREVENTION SYSTEM IMPLEMENTED ON CLOUD AND OPERATING METHOD THEREOF

SOMANSA CO., LTD., Seoul...

1. A data loss prevention system implemented on a cloud, the system comprising:an address converting module for converting a private IP address of a received traffic into an IPv6 address, which is unique in the data loss prevention system;
a first communication module for decoding the received traffic and transmitting the decoded traffic to a data loss analyzing module when the received traffic is encoded, and intactly transmitting the received traffic to the data loss analyzing module when the received traffic is not encoded, by including information in the converted IPv6 address of the traffic to be transmitted to the data loss analyzing module representing whether the traffic to be transmitted is the decoded traffic or the received intact traffic;
the data loss analyzing module for analyzing the traffic transmitted from the first communication module according to a predetermined policy, examining whether personal information or confidential information is included and transmitting the examined traffic to a second communication module; and
the second communication module for transmitting the traffic transmitted from the data loss analyzing module to the address converting module wherein the second communication module identifies the information included in the converted IPv6 address, the second communication module encodes the traffic transmitted from the data loss analyzing module and transmits the encoded traffic to the address converting module when the information in the converted IPv6 address represents that the traffic is the decoded traffic from the received encoded traffic, and the second communication module transmits intactly the traffic transmitted from the data loss analyzing module to the address converting module when the information in the converted IPv6 address represents that the traffic is the received intact traffic,
wherein the address converting module restores the IPv6 address of the traffic transmitted from the second communication module to the private IP address, and
wherein the unique IPv6 address comprises a unique identifier of a private network in which the private IP address is included, and the unique identifier and the information representing whether the traffic is encoded are included in a prefix of an IPv6 address space.

US Pat. No. 10,693,835

METHOD OF FORWARDING DATA BETWEEN IP DEVICES

ORANGE, Paris (FR)

1. A method of routing data between a home gateway and a local network equipment adapted to communicate between one another via a home network managed by said home gateway, the home gateway suitable for communicating with a sensor network through a management node in which sensors have respective IP addresses in the sensor network that are generated by said management node, the management node also having a function of routing data in the sensor network, the method comprising, in a router:receiving from the management node a first message, the first message including a prefix and a first lifetime of the prefix;
generating an address for the local network equipment;
verifying the availability of the address in the sensor network from the management node; and
upon verification that the address is available, transmitting to the management node a second message, the second message including the address of the local network equipment and a second lifetime of the address, in order to add the local network equipment in the sensor network to allow the home gateway to communicate with the local network equipment either via the home network or the sensor network.

US Pat. No. 10,693,834

CLIENT SUBNET EFFICIENCY BY EQUIVALENCE CLASS AGGREGATION

Akamai Technologies Inc, ...

1. A method operable at a domain name system (DNS) resolver, the method comprising:receiving class criteria from an Internet Service Provider (ISP), the class criteria comprising at least one of the following: Classless Inter-Domain Routing (CIDR) blocks, a geographical area, a network topology, and an organization;
receiving a DNS query from a client;
determining, based on the class criteria provided by the ISP and data in the DNS query, that the client is associated with an equivalency class amongst a plurality of equivalency classes; and
resolving the DNS query based at least in part on the determined equivalency class.

US Pat. No. 10,693,833

ADDRESS RESOLUTION SUPPRESSION IN A LOGICAL NETWORK

NICIRA, INC., Palo Alto,...

1. A method for a first host to perform address resolution suppression in a logical network, wherein the first host supports a first virtualized computing instance located on the logical network and a first hypervisor, and the method comprises:in response to a failure of performing address resolution suppression associated with a network management entity:
broadcasting, by the first hypervisor, a notification message within the logical network to trigger one or more control messages that originate from one or more respective second hypervisors supported by one or more respective second hosts;
learning, by the first hypervisor based on the one or more control messages, protocol-to-hardware address mapping information associated with multiple second virtualized computing instances located on the logical network;
in response to the first hypervisor detecting an address resolution request message that includes a protocol address associated with one of the multiple second virtualized computing instances from the first virtualized computing instance;
generating, by the first hypervisor, an address resolution response message that includes a hardware address associated with the protocol address based on the protocol-to-hardware address mapping information; and
sending, by the first hypervisor, the address resolution response message to the first virtualized computing instance without broadcasting the address resolution request message on the logical network.

US Pat. No. 10,693,832

ADDRESS RESOLUTION PROTOCOL OPERATION IN A FIBRE CHANNEL FABRIC

AVAGO TECHNOLOGIES INTERN...

1. A network comprising:a plurality of switches which interconnect via Fibre Channel links to form a Fibre Channel fabric for internal communications, with at least some of the plurality of switches being edge switches which have external facing ports which provide Ethernet connections for Ethernet packets, each edge switch encapsulating received Ethernet packets in Fibre Channel packets for internal communication,
wherein each edge switch maintains a database of all locally connected Ethernet Internet Protocol (IP) devices and at least some remotely connected Ethernet IP devices,
wherein each edge switch maintains said database based on received Address Resolution Protocol (ARP) requests and responses and registered state change notification (RSCNs) provided by other edge switches,
wherein each edge switch provides a Fibre Channel (FC) ARP switch fabric internal link service (SW_ILS) to each other edge switch upon receipt of an ARP request that cannot be responded to based on device information maintained on the receiving edge switch,
wherein the ARP SW_ILS includes sufficient information to allow the ARP request to be reconstructed, and
wherein each edge switch receiving an ARP SW_ILS provides an ARP request equivalent to the received ARP request based on the ARP SW_ILS to all locally connected Ethernet IP devices.

US Pat. No. 10,693,831

METHOD, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM COMPRISING INSTRUCTIONS FOR VEHICLE-TO-VEHICLE COMMUNICATION

Volkswagen AG, (DE)

1. A method for Vehicle-to-Vehicle communication implemented in a first transportation vehicle, the method comprising:exchanging a plurality of messages between the first transportation vehicle and a second transportation vehicle, each of the plurality of messages being signed using a signature of the respective transportation vehicle, each of the plurality of messages comprising a hash pointer to a respective last previous message, and each hash pointer comprising a link to the respective last previous message and a hash of the respective last previous message, wherein the plurality of messages exchanged between the first and second transportation vehicles pertain to at least one cooperative maneuver for the first and second transportation vehicles in which the first and second transportation vehicles are to perform, after completion of the exchange of the plurality of messages, one or more maneuvers specified in the exchange of the plurality of messages between the first and second transportation vehicles; and
publishing, after the completion of the exchange of the plurality of messages, a hash pointer to the last message of the exchange of messages, the hash pointer comprising a link to the last message of the exchange of the plurality of messages and a hash of the last message of the exchange of the plurality of messages,
whereby the exchange of the plurality of messages between the first and second transportation vehicles create a contract indicating maneuvers to be performed by the first and second transportation vehicles in a contracted cooperative maneuver, whereby the contracted cooperative maneuver is modifiable based on exchange of further messages between the first and second transportation vehicles, wherein the further messages each comprise a hash pointer comprising a link to the respective last previous message and a hash of the respective last previous message.

US Pat. No. 10,693,830

METHODS, SYSTEMS, APPARATUSES AND DEVICES FOR FACILITATING LIVE STREAMING OF CONTENT ON MULTIPLE SOCIAL MEDIA PLATFORMS

HALO INNOVATIVE SOLUTIONS...

1. A method of facilitating live streaming of content on multiple social media platforms, the method comprising:sending, using a communication device, a digital content from a source user device, wherein the source user device comprises at least one content capturing device configured for generating the digital content;
sending, using the communication device, a supplemental content identifier from the source user device;
sending, using the communication device, a plurality of target identifiers from the source user device, wherein the plurality of target identifiers correspond to a plurality of target user devices;
identifying, using a processing device, a plurality of social media servers associated with the plurality of target identifiers;
identifying, using the processing device, a supplemental content based on the supplemental content identifier, wherein the supplemental content is a background audio content;
processing, using the processing device, the digital content based on a plurality of platform characteristics corresponding to the plurality of social media servers;
embedding, using the processing device, the supplemental content in the digital content;
generating, using the processing device, a plurality of digital content based on the processing;
transmitting, using the communication device, the plurality of digital content to the plurality of social media servers;
sending, using the communication device, a source indication associated with the digital content;
identifying, using the processing device, a source server based on the source indication;
transmitting, using the communication device, a content request to the source server; and
sending, using the communication device, the digital content from the source server.

US Pat. No. 10,693,829

PROVIDING TRANSLATIONS OF ELECTRONIC MESSAGES VIA A SOCIAL NETWORKING SYSTEM

FACEBOOK, INC., Menlo Pa...

1. A method comprising:receiving, from a sender, a first version of an electronic message, wherein the first version of the electronic message is in a first language;
identifying, by at least one processor, social networking information associated with the sender;
transmitting, to a computing device associated with the sender, a prompt to provide a second version of the electronic message in a second language based on the social networking information associated with the sender;
receiving, from the sender in response to the prompt, the second version of the electronic message the second language;
identifying, by the at least one processor, social networking information associated with a recipient; and
determining, by the at least one processor and based on the social networking information associated with the recipient, whether to provide the first version of the electronic message or the second version of the electronic message to the recipient.

US Pat. No. 10,693,828

PRESENTING CONTACTS TO A SOCIAL NETWORKING SYSTEM USER BASED ON USER INTERACTIONS WITH ADDITIONAL USERS AND WITH GROUPS

Facebook, Inc., Menlo Pa...

1. A method comprising:storing, for a viewing user of an online system, first interactions and second interactions, each first interaction being between the viewing user and a plurality of individual user contacts of the viewing user, each second interaction being between the viewing user and a group contact of a plurality of group contacts, each individual user contact being a user of the online system and each group contact including a plurality of users of the online system;
determining a plurality of first scores based on the first interactions and a plurality of second scores based on the second interactions, each of the plurality of first scores corresponding to a score for an individual user contact and each of the plurality of second scores corresponding to a score for a contact group;
ranking the plurality of individual user contacts and the plurality of group contacts in a single ranking based at least in part on the determined first scores and the determined second scores, the single ranking including at least one individual user contact and at least one group contact ranked relative to each other based on the first interactions and the second interactions;
selecting a threshold number of the plurality of ranked individual user contacts and the plurality of ranked group contacts from the single ranking as suggested contacts for presentation to the viewing user, wherein the suggested contacts include at least one individual user contact and at least one group contact; and
providing information describing an order of the suggested contacts in the single ranking to a client device of the viewing user, the client device displaying the suggested contacts to the viewing user in an interface of a messaging application.

US Pat. No. 10,693,827

DETERMINING INTENDED ELECTRONIC MESSAGE RECIPIENTS VIA LINGUISTIC PROFILES

INTERNATIONAL BUSINESS MA...

1. A method for checking against transmitting a message to an unintended recipient, said method comprising: developing, using a processor on a computer, a training model of a linguistic profile of messages previously transmitted electronically by a user to a recipient, by iteratively computing a composite feature vector over a set of all messages previously transmitted electronically to the recipient, the iterations for developing the training model continuing until summed proportional changes across all features falls below a first preset threshold value; storing the training model in a database accessible by the processor; developing a linguistic profile of a new message being prepared by the user to be transmitted to the recipient as an intended recipient of the message, as the new message is being composed by the user, the linguistic profile comprising feature vectors including one or more of word-level features, dictionary features, and topic features; retrieving the training model from the database; comparing the linguistic profile of the new message with the training model; calculating a confidence level as to whether the new message being composed is actually intended to be transmitted to the intended recipient, based on the comparing of linguistic profile with the linguistic profile of the training model and using a classifier associated with the developed training model; and displaying a message if the calculated confidence level is below a second preset threshold value.

US Pat. No. 10,693,826

MESSAGE SERVICE

BlackBerry Limited, Wate...

1. A system for monitoring a plurality of mailboxes by a plurality of computer nodes, the plurality of computer nodes comprising a first computer node comprising at least one first processor and at least one first memory comprising first computer program instructions, and a second computer node comprising at least one second processor and at least one second memory comprising second computer program instructions,wherein the at least one first memory and the first computer program instructions are configured to, with the first processor, cause the first computer node to:
monitor a plurality of mailboxes hosted by a first server remote from the first computer node, wherein the monitoring the plurality of mailboxes comprising monitoring attribute changes associated with the plurality of mailboxes;
receive a change of an attribute associated with a mailbox in the plurality of mailboxes, the change of the attribute associated with the mailbox indicating a change of a server hosting the mailbox; and
update, by the first computer node, a database record associated with the mailbox to store data indicative of the change of the attribute, wherein the change of the attribute of the database record associated with the mailbox indicates that the mailbox is not monitored by any of the computer nodes in the plurality of computer nodes; and
wherein the at least one second memory and the second computer program instructions are configured to, with the second processor, cause the second computer node to:
detect the update, made by the first computer node, to the database record;
determine, in response to detecting the update to the database record, a third computer node in the plurality of computer nodes to monitor the mailbox, based at least in part on the data indicative of the change of the attribute stored in the database record; and
update the database record to store an identifier corresponding to the third computer node, wherein the second computer node provides assignment of the mailbox to the third computer node in response to the second computer node determining that the database record associated with the mailbox is not monitored by any of the computer nodes in the plurality of the computer nodes.

US Pat. No. 10,693,825

SYSTEMS AND METHODS FOR EDITING, RECALLING, AND DELETING MESSAGES

T-Mobile USA, Inc., Bell...

1. A user equipment (UE) comprising:one or more inputs;
a display;
one or more transceivers to send and receive one or more wired or wireless transmissions;
memory storing at least a messaging application and a message history, the message history including one or more stored messages and one or more message identifications (ID), wherein a message ID of the one or more message IDs is associated with and identifies a stored message of the one or more stored messages; and
one or more processors in communication with at least the one or more transceivers and the memory, the memory including computer-executable instructions to cause the one or more processors to:
receive, at the one or more transceivers, an incoming message from a sender UE including incoming content and an incoming message header;
compare, with the one or more processors, the incoming message header to the one or more message IDs associated with the one or more stored messages stored in the message history;
determine, based on the incoming message header and the one or more message IDs, that the incoming message header includes a repeated message ID that matches the message ID associated with the stored message, wherein the repeated message ID identifies the incoming message and the message ID identifies the stored message for the UE; and
modify, with the one or more processors and based at least on the incoming message header including the repeated message ID, the stored message of the one or more stored messages associated with the message ID.

US Pat. No. 10,693,824

ELECTRONIC MEETING MANAGEMENT

International Business Ma...

1. A computer-implemented method of electronic meeting management, the method comprising:detecting, by a meeting management engine with respect to an electronic meeting, a first attentiveness factor for a first user at a first time;
detecting, by the meeting management engine with respect to the electronic meeting, a second attentiveness factor for the first user at a second time, wherein the second time is subsequent to the first time, and wherein the second attentiveness factor differs from the first attentiveness factor;
capturing, by the meeting management engine between the first time and the second time, a set of meeting data for the electronic meeting;
composing, by the meeting management engine in an automated fashion based on the set of meeting data, a set of content summary data for the electronic meeting, wherein the set of content summary data comprises a summary of the set of meeting data captured between the first time and the second time; and
displaying, by the meeting management engine to the first user, the set of content summary data in response to detecting the first user is attentive, wherein the set of content summary data is unobtrusively displayed to the first user during a break in the electronic meeting without interrupting the electronic meeting.

US Pat. No. 10,693,823

DYNAMIC MESSAGE CONTENT FILTER

International Business Ma...

1. A computer-implemented method, comprising executing on a computer processor:in response to receipt of an electronic message, determining whether a physical proximity distance of a recipient of the electronic message to another, identified person is within a minimum specified threshold distance;
determining a reception device limit value that is applicable to a device currently used by the recipient to receive the electronic message as a function of an attribute of the device;
determining an activity limit value as a function of an activity context of the recipient;
determining a cognitive state message limit value as a function of a cognitive state of the recipient;
setting a threshold maximum content value as a function of the reception device limit value, the activity limit value and the cognitive state message limit value;
in response to determining that the physical proximity distance to the identified person is within the minimum specified threshold distance, comparing a total amount of text content of the message to a threshold maximum content value;
in response to determining that the total amount of the message text content exceeds the threshold maximum content value, automatically revising the text content of the message by reducing the total text content to a reduced amount of the text content that does not exceed the threshold maximum content value; and
delivering the message with the reduced amount of the text content to the recipient.

US Pat. No. 10,693,822

MESSAGE PROVIDING METHODS AND APPARATUSES, DISPLAY CONTROL METHODS AND APPARATUSES, AND COMPUTER-READABLE MEDIUMS STORING COMPUTER PROGRAMS FOR EXECUTING METHODS

LINE Corporation, Tokyo ...

1. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by processing circuitry, cause the processing circuitry to perform a message providing method comprising:receiving, from a user terminal through a graphical user interface associated with a chatroom, identification information of a plurality of messages from among a list of messages;
summarizing the plurality of messages based on the identification information to generate a summary message;
extracting a keyword from the summary message;
searching the list of messages to extract a related message associated with the keyword, the messages in the list of messages communicated between a user and a conversational partner or between the user or the conversational partner and a third party;
linking the related message to the keyword by a hyperlink; and
presenting the summary message with the hyperlink through an input window for the chatroom.

US Pat. No. 10,693,821

SYSTEM AND METHOD FOR DELIVERING INLINE INTERACTIVE OBJECTS ENCAPSULATED IN A MESSAGE

1. A system for delivery of text, media and inline interactive objects encapsulated in a message, the system comprising:a message server stored in a memory of and operating on a processor of a computing device;
an inline interaction object repository stored in a memory of and operating on a processor of a computing device; and
a plurality of message delivery devices each stored in a memory of and operating on a processor of a computing device;
wherein the message server:
receives a first message which comprises content requiring the use of an inline interactive object to display or manipulate;
determines from a target message delivery device whether that target device has all inline interactive objects needed to render and manipulate the inline interactive objects included in the first message; and
provides a method to procure any inline interactive objects needed to render or manipulate inline data encapsulated within the first message;
wherein the inline interaction object repository:
maintains copies of inline interactive objects available for download; and
wherein the message delivery devices:
accept a second message comprising encapsulated interactive data;
run inline interactive object resources needed to render and manipulate encapsulated content within the second message; and
allow a first user to initiate a third message to a second user using an identification for the second user.

US Pat. No. 10,693,820

ADDING IMAGES TO A TEXT BASED ELECTRONIC MESSAGE

INTERNATIONAL BUSINESS MA...

1. A method comprising:receiving, via a user interface, criteria from a user, the criteria specifying image types or desired image attributes and the criteria specifying a minimum number of images to present per electronic message or a maximum number of images to present per electronic message;
identifying in a first electronic message a plurality of word groups that each satisfy a respective criterion, each word group comprising at least one word;
for each word group that satisfies the respective criterion, automatically selecting, using a processor, from a plurality of images at least one image that satisfies an image type specified by the respective criterion or that has at least one image attribute specified by the respective criterion, wherein the selected image corresponds to a meaning of the word group that satisfies the respective criterion;
presenting with the first electronic message each image selected for each respective word group that satisfies the respective criterion, a total number of the plurality of the selected images presented with the first electronic message satisfying the minimum number of images to present per electronic message or the maximum number of images to present per electronic message; and
presenting, proximate to the plurality of images selected for at least one of the plurality of word groups, at least one consolidated image into which at least two images are combined, the at least two images selected from the plurality of images selected for the at least one of the plurality of word groups.

US Pat. No. 10,693,819

GENERATION OF ELECTRONIC MEDIA CONTENT COLLECTIONS

Snap Inc., Santa Monica,...

1. A system comprising:a processor; and
memory coupled to the processor and storing instructions that, when executed by the processor, cause the system to perform operations comprising:
selecting a plurality of narrative group criteria stored in a database in communication with the system;
identifying at least one media content item associated with each narrative group criterion in the plurality of narrative group criteria and associated with a user;
generating a media content collection comprising the identified at least one media content item, wherein the system selects at least a portion of the identified media content items identified across the plurality of narrative group criteria for inclusion in the generated media content collection, wherein selecting the at least a portion of the identified media content items identified across the plurality of narrative group criteria for inclusion in the generated media content collection further includes selecting media content items associated with at least a portion of the plurality of narrative group criteria based on a respective ranking for each narrative group criterion, wherein the ranking each respective narrative group criterion is based on a pre-seeded value for the respective narrative group criterion, and a total engagement score for the respective narrative group criterion; and
displaying, on a display screen of a computing device of the user, the media content collection.

US Pat. No. 10,693,818

PACKET TRACKING TECHNIQUES FOR COMMUNICATION NETWORKS

INTEL CORPORATION, Santa...

1. An apparatus, comprising:a processor; and
a memory storing instructions which when executed by the processor cause the processor to:
in response to a request of an initiator device to establish a packet transfer session, determine whether a limit of tracking information that can be locally maintained has been reached;
identify one or more tracking parameters for retention at the initiator device responsive to a determination that the limit of tracking information that can be locally maintained has been reached; and
send an acceptance message to grant the request of the initiator device to establish the packet transfer session, the acceptance message to indicate a request for retention of the one or more tracking parameters.

US Pat. No. 10,693,817

VNFM RESOLUTION OF SPLIT-BRAIN VIRTUAL NETWORK FUNCTION COMPONENTS

OPEN INVENTION NETWORK LL...

8. A method, comprising:receiving a VNFCI status notification resumption with an active state;
retrieving a timestamp of the VNFCI state change to active;
retrieving a timestamp of a peer VNFCI state change to active;
checking with a VIM to determine if the VNFCI network isolated while active;
checking with the VIM to determine if the peer VNFCI network isolated while active;
sending a first state change request message with standby to the peer VNFCI when one or more of: the peer VNFCI was network isolated, and the VNFCI was not network isolated;
sending a second state change request message with standby to the peer VNFCI when one or more of: the VNFCI is not the preferred standby instance, and the peer VNFCI was not network isolated, and the VNFCI was not network isolated;
starting a first retry timer for the peer VNFCI when one or more of: the first state change request message is sent, and the second state change request message is sent;
sending a third state change request message with standby to the VNFCI when one or more of: the VNFCI is the preferred standby instance, and the peer VNFCI was network isolated, and the VNFCI was network isolated;
sending a fourth state change request message with standby to the VNFCI when one or more of: the peer VNFCI was not network isolated, and the VNFCI was network isolated; and
starting a second retry timer for the VNFCI when one or more of: the third state change request message is sent, and the fourth state change request message is sent.

US Pat. No. 10,693,816

COMMUNICATION METHODS AND SYSTEMS, ELECTRONIC DEVICES, AND COMPUTER CLUSTERS

Beijing SenseTime Technol...

1. A communication method, comprising:creating a corresponding thread for at least one of a plurality of target devices, wherein the created thread corresponding to the target device comprises a communication thread and a message processing thread, and the message processing thread comprises at least one of a message sending thread or a message receiving thread; and
communicating with a corresponding target device based on the corresponding created thread, wherein a communication process with a first target device comprises at least one of: sending, by a first message sending thread, an information sending message to a first communication thread, and sending, by the first communication thread, information to the first target device on the basis of the information sending message by calling an Infiniband (IB) interface; or receiving, by the first communication thread by calling the IB interface, information sent by the first target device, generating an information receiving message corresponding to the received information, and sending the information receiving message to a first message receiving thread;
the first target device is one of the plurality of target devices, and the first communication thread, the first message sending thread, and the first message receiving thread are a communication thread, a message sending thread, and a message receiving thread corresponding to the first target device, respectively.

US Pat. No. 10,693,815

SYSTEM AND METHOD TO USE ALL INCOMING MULTICAST PACKETS AS A BASIS FOR GUID TO LID CACHE CONTENTS IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT

ORACLE INTERNATIONAL CORP...

1. A method to use all incoming multicast (MC) packets as a basis for global unique identifier (GUID) to local identifier (LID) cache contents in a high performance computing environment comprising:providing, at one or more microprocessors, a first subnet, the first subnet comprising
a plurality of switches, the plurality of switches comprising at least a leaf switch, wherein each of the plurality of switches comprise at least one switch port of a plurality of switch ports
a plurality of host channel adapters, wherein each of the host channel adapters comprise at least one host channel adapter port of a plurality of host channel adapter ports, and wherein the plurality of host channel adapters are interconnected via the plurality of switches, and
a subnet manager, the subnet manager running on one of the plurality of switches and the plurality of host channel adapters;
defining a plurality of multicast groups within the first subnet;
receiving, at a receive function of a first host channel adapter of the plurality of host channel adapters within the first subnet, a multicast packet, the multicast packet comprising a global route header (GRH) that defines a source global identifier (GID) and a source local identifier (LID);
building, by the subnet manager, a dynamic cache at the first host channel adapter of the plurality of host channel adapters, the dynamic cache comprising at least a mapping table, the mapping table comprising a plurality of entries, wherein each entry comprises a mapping between a source global identifier of a plurality of source global identifiers and a corresponding source local identifier of a plurality of source local identifiers; and
adding, by the subnet manager, an entry to the plurality of entries in the mapping table, the added entry comprising a mapping between the source global identifier of the received multicast packet and a corresponding source local identifier;
wherein the receive function of the first host channel adapter is unaware of the dynamic cache.

US Pat. No. 10,693,814

ULTRA-SCALABLE, DISAGGREGATED INTERNET PROTOCOL (IP) AND ETHERNET SWITCHING SYSTEM FOR A WIDE AREA NETWORK

Fujitsu Limited, Kawasak...

1. A wide area common carrier (WACC) disaggregated networking switching system comprising:an Ethernet fabric including a set of M Ethernet switches each comprising a set of N switch ports, each Ethernet switch to establish switch queues, wherein a variable i having a value ranging from 1 to M to denote the ith Ethernet switch of the set of M Ethernet switches, wherein a variable j having a value ranging from 1 to N to denote the jth switch port of the set of N switch ports; and
a set of N input/output (IO) devices each comprising:
a set of W IO ports, wherein a variable x having a value ranging from 1 to W to denote the xth IO port of the W IO ports;
a set of M Ethernet ports, wherein the ith Ethernet port of the jth IO device is connected to the jth switch port of the ith Ethernet switch;
an IO side packet processor (IOSP) configured to:
establish a set of M hierarchical virtual output queues (H-VOQs) each comprising a set of N ingress-IOSP queues (I-IOSPQs) and I-VOQs, wherein the ith H-VOQ corresponds to the ith Ethernet port of the jth IO device, and wherein the jth I-IOSPQ of the ith H-VOQ corresponds to the jth IO device; and
establish a set of W egress-IOSP queues (E-IOSPQs), wherein the xth E-IOSPQ corresponds to the xth IO port; and
a fabric side packet processor (FSP) configured to:
establish a set of M ingress-FSP queues (I-FSPQs), wherein the ith I-FSPQ corresponds to the ith Ethernet switch; and
establish a set of N hierarchical virtual input queues (H-VIQs) each comprising a set of N egress-FSP queues (E-FSPQs) and E-VIQs, wherein the jth H-VIQ corresponds to the jth IO device, and wherein the jth E-FSPQ of the jth H-VIQ corresponds to the jth IO device.

US Pat. No. 10,693,813

ENABLING AND DISABLING LINKS OF A NETWORKING SWITCH RESPONSIVE TO COMPUTE NODE FITNESS

LENOVO ENTERPRISE SOLUTIO...

1. A computer program product comprising a non-volatile computer readable medium and non-transitory program instructions embodied therein, the program instructions being configured to be executable by a processor to cause a first networking switch to perform operations comprising:determining whether the first networking switch is currently able to establish bi-directional communication with a first local compute node through a first direct local link;
receiving a first message from an additional networking switch through an inter-switch link, the additional networking switch comprising an additional access link to a gateway device and an additional uplink to a cloud, the received first message indicating whether the additional networking switch has the additional access link and additional uplink enabled;
enabling a first access link to the gateway device and a first uplink to the cloud on the first networking switch in response to determining that the first networking switch is currently able to establish bi-directional communication with the local compute node through the first direct local link and that the received first message indicates that the additional networking switch does not have its additional access link and additional uplink enabled; and
disabling the first access link and first uplink on the first networking switch in response to determining that the first networking switch is currently unable to establish bi-directional communication with the first local compute node through the first direct local link and/or that a further received first message indicates that the additional networking switch has its additional access link and additional uplink enabled.

US Pat. No. 10,693,812

COMPUTING LONG-TERM SCHEDULES FOR DATA TRANSFERS OVER A WIDE AREA NETWORK

Microsoft Technology Lice...

1. A method comprising:receiving a request to transfer data of an amount from a first computing device in a network to a second computing device in the network, the request comprising:
an identifier of the second computing device;
an identifier of the amount of the data to be transferred from the first computing device to the second computing device; and
a time in the future, wherein the transfer of the data of the amount from the first computing device to the second computing device is to be completed prior to the time in the future;
based upon the request, computing a schedule for transferring the data of the amount from the first computing device to the second computing device, wherein:
the schedule identifies a first sub-amount of the data that is to be transmitted over a link in the network during a first window of time; and
the schedule identifies a second sub-amount of the data that is to be transmitted over the link in the network during a second window of time, wherein the first sub-amount of the data is different from the second sub-amount of the data, and further wherein the schedule is computed such that the amount of the data will be transferred from the first computing device to the second computing device prior to the time in the future specified in the request when the schedule is adhered to;
computing a second schedule based upon the schedule, wherein the second schedule covers a third window of time that is prior to the first window of time and the second window of time, and further wherein the second schedule comprises a routing table that is to be transmitted to a network infrastructure device in the network, wherein the second schedule is computed such that the amount of the data will be transferred from the first computing device to the second computing device prior to the time in the future specified in the request when the network infrastructure device forwards data according to the routing table;
transmitting the routing table to the network infrastructure device in the network; and
transferring the data from the first computing device to the second computing device based upon the schedule and the second schedule.

US Pat. No. 10,693,811

AGE CLASS BASED ARBITRATION

Hewlett Packard Enterpris...

1. A system, comprising:a plurality of sub-queues, each sub-queue assigned to an age class of a sequence of age classes;
a set of age thresholds dividing the sub-queues;
queue manager to place a received transaction into a sub-queue based on a comparison of an age of the received transaction to the set of age thresholds;
wherein the queue manager is to, when the sub-queue assigned to an oldest age class is empty, assign the sub-queue currently assigned to the oldest age class to a youngest age class and to assign each other sub-queue with a next older age class in the sequence;
wherein there are two sub-queues in the plurality of sub-queues, a first sub-queue assigned to the youngest age class and a second sub-queue assigned to the oldest age class;
the queue manager switches the age class assignment of the first and second sub-queues when the sub-queue assigned to the oldest age class is empty; and
the set of age thresholds is a single age threshold; and
wherein the single age threshold is equal to the age of the youngest transaction in the sub-queue assigned to the youngest age class immediately prior to the queue manager switching the age class assignment plus an offset age.

US Pat. No. 10,693,810

METHOD AND SYSTEM FOR MANAGING INPUT OUTPUT PER SECOND (IOPS) IN FIBER CHANNEL NETWORK TOPOLOGY

Wipro Limited, Bangalore...

1. A method of managing Input Output per Second (TOPS) in Fiber Channel (FC) network topology comprising a plurality of switches, the method comprising:initializing, by an IOPS managing device, a plurality of network parameters associated with the plurality of switches into a plurality of dependent variables and a plurality of independent variables for each of the plurality of switches;
performing for each of the plurality of switches, by the IOPS managing device, a multilinear regression analysis on at least one of the plurality of dependent variables and at least one of the plurality of independent variables to predict a value of the at least one dependent variable;
clustering, by the IOPS managing device, the plurality of switches into a plurality of categories based on the value of the at least one of the plurality of dependent variables associated with each of the plurality of switches;
determining, by the IOPS managing device, a plurality of routes between a source switch and a destination switch associated with an IOPS request;
establishing, by the IOPS managing device, a connection between the source switch and the destination switch through a shortest route from the plurality of routes, wherein the shortest route comprises a subset of switches from the plurality of switches; and
for each switch in the subset, modulating, by the IOPS managing device, a bandwidth according to an IOPS associated with the IOPS request and a category of the plurality of categories associated with each switch in the subset.

US Pat. No. 10,693,809

SYSTEM AND METHOD FOR REPRESENTING PMA ATTRIBUTES AS SMA ATTRIBUTES IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT

ORACLE INTERNATIONAL CORP...

1. A system for representing performance management agent (PMA) attributes as subnet management agent (SMA) attributes in a high performance computing environment, comprising:one or more microprocessors;
at least one subnet, the at least one subnet comprising:
one or more switches, the one or more switches comprising at least a leaf switch,
wherein each of the one or more switches comprise a plurality of ports, and
a subnet manager;
wherein each of the one or more switches comprise a single subnet management attribute;
wherein a subnet management agent of a plurality of subnet management agents is provided at a switch of the one or more switches;
wherein a performance management agent is provided at the switch of the one or more switches;
wherein the performance management agent of the switch of the one or more switches monitors and collects performance metrics of each of the plurality of ports of the switch of the one or more switches;
wherein the collected performance metrics of each of the plurality of ports of the switch of the one or more switches are populated, by the performance management agent, to the single subnet management attribute of the switch, the performance metrics comprising error counts;
wherein the switch receives a query via one subnet management packet, from the subnet manager, the query requesting the collected performance metrics of each of the plurality of ports of the switch of the one or more switches; and
wherein the subnet management agent provides the requested collected performance metrics of each of the plurality of ports of the switch of the one or more switches from the single subnet management attribute to the subnet manager.

US Pat. No. 10,693,808

REQUEST ARBITRATION BY AGE AND TRAFFIC CLASSES

Hewlett Packard Enterpris...

1. A hybrid arbitration device comprising:turn-based arbitration logic logical circuitry to receive a first set of requests derived from a plurality of different traffic classes and select a traffic class from the plurality of different traffic classes, wherein the traffic class is selected according to a turn-based arbitration scheme, and wherein the turn-based arbitration logical circuitry demotes the selected traffic class to a lowest priority after selecting the traffic class; and
age-based arbitration logical circuitry to receive a second set of requests derived from at least one of the plurality of different traffic classes, and from the received requests select a request from each of the plurality of different traffic classes, wherein the request is selected according to an age-based arbitration scheme, and
wherein a request selected by the age-based arbitration logical circuitry and of the traffic class selected by the turn-based arbitration logical circuitry is granted access to a shared pool of resources.

US Pat. No. 10,693,807

METHOD AND SYSTEM FOR MEDIATED RESOURCE ALLOCATION

Cable Television Laborato...

1. A method for mediating resource allocation within a virtualized network of a computer network, the method comprising the steps of:receiving from at least one first computation module configured for virtual network functions in a network function virtualization infrastructure of the virtualized network, a first proposed resource allocation for completing a computational task;
comparing the received first proposed resource allocation to at least one of a predetermined resource allocation criteria and at least one second proposed resource allocation received from at least one second computation module;
determining a resource allocation instruction based, at least in part, on a result of the step of comparing;
identifying that the at least one first computation module is compromised; and
allocating one or more network resources in accordance with the resource allocation instruction,
wherein the step of identifying comprises a substep of analyzing data stored in an activity and decision log indicating at least one of a temporal anomaly, a security compromise, and an unexpected change in latency,
wherein the step of comparing comprises comparing the received first proposed resource allocation to at least one second received proposed resource allocation to ascertain whether the received first proposed resource allocation is substantially equal to a majority of a proposed resource allocation set including the received first proposed resource allocation and the one or more second received proposed resource allocations,
wherein the step of comparing ascertains that the received first proposed resource allocation is not substantially equal to the majority of the proposed resource allocation set, and
wherein the step of determining comprises assigning the resource allocation instruction to correspond with at least one proposed resource allocation of the proposed resource allocation set that is not the first proposed resource allocation.

US Pat. No. 10,693,806

NETWORK BANDWIDTH RESERVATIONS FOR SYSTEM TRAFFIC AND VIRTUAL COMPUTING INSTANCES

VMware, Inc., Palo Alto,...

1. A computer-implemented method for provisioning a virtual computing instance on a host computing device, comprising:receiving a request to provision the virtual computing instance not yet created on the host computing device, wherein a communication endpoint of the virtual computing instance is associated with a network bandwidth reservation specifying a minimum bandwidth guaranteed to the communication endpoint for communicating traffic to and from software executing in the virtual computing instance, the network bandwidth reservation specifying the minimum bandwidth being a hard constraint that must be met in order for the virtual computing instance to be provisioned on the host computing device;
determining whether the host computing device includes a physical network interface device having at least the minimum bandwidth available;
when it is determined the host computing device includes the physical network interface device having at least the minimum bandwidth available, assigning the communication endpoint to the physical network interface device and creating the virtual computing instance in the host computing device; and
when it is determined the host computing device includes no physical network interface device having at least the minimum bandwidth available, not creating the virtual computing instance in the host computing device.

US Pat. No. 10,693,805

TRACKING COSTS FOR A DEPLOYABLE INSTANCE

Red Hat, Inc., Raleigh, ...

1. A method comprising:receiving a request to launch a deployable instance and a resource requirement profile for the deployable instance, wherein the deployable instance specifies an application and a number of virtual machines that are to be used to provide the application, and wherein the resource requirement profile specifies ranking criteria;
receiving cost model information for each cloud in a pool of clouds, wherein different cost information is received for different clouds, and wherein a respective cost model information for a respective cloud in the pool of clouds is in view of whether the respective cloud includes a first additional cost for a network address assignment for the deployable instance, whether the respective cloud includes a second additional cost for a backup associated with the deployable instance, and an identification of a peak usage period of each respective cloud;
receiving capability information for each cloud in the pool of clouds, wherein different capability information is received for the different clouds; and
responsive to identifying selectable clouds in the pool of clouds that meet the resource requirement profile of the deployable instance:
calculating a deployment cost for the deployable instance for each of the selectable clouds in the pool of clouds by using the resource requirement profile for the deployable instance, the cost model information, and a hosting capacity for each cloud in the pool of clouds, the cost model information being associated with a combination of an available period of time to provide the deployable instance and resources of the respective cloud in the pool of clouds to provide the deployable instance for the available period of time;
ranking the selectable clouds based on the ranking criteria and the deployment cost for each of the selectable clouds to determine a priority ranking for each of the selectable clouds;
determining, by a processing device, a lowest cost cloud that corresponds to the resource requirement profile for launching the deployable instance from the selectable clouds in view of the priority ranking for each of the selectable clouds; and
upon determining the lowest cost cloud that meets the resource requirement profile, launching the deployable instance on the lowest cost cloud that corresponds to the resource requirement profile.

US Pat. No. 10,693,804

USING CAPTURED CONFIGURATION CHANGES TO ENABLE ON-DEMAND PRODUCTION OF GRAPH-BASED RELATIONSHIPS IN A CLOUD COMPUTING ENVIRONMENT

Capital One Services, LLC...

1. A method for automatically capturing configuration changes in a cloud computing environment, the method comprising:detecting, by a listener continuously monitoring a cloud computing account of a plurality of cloud computing accounts, a change to a configuration of a cloud computing resource of a plurality of cloud computing resources utilized by the plurality of cloud computing accounts;
emitting, by the listener, an event indicating the change to the configuration of the cloud computing resource;
forwarding, by a monitoring service, the event from the listener to a central cloud computing account in communication with each of the plurality of cloud computing accounts;
storing, by a data storage device instantiated by the central cloud computing account, the change based on instructions received by a first computing service instantiated by the central cloud computing account;
receiving, via an Application Program Interface (API) gateway, a query to retrieve data associated with the cloud computing resource, from a user device, wherein the query includes information regarding a different cloud computing resource than the cloud computing resource;
determining, by a second computing service instantiated by the central cloud computing account, a relationship between the cloud computing resource and the different cloud computing resource; and
generating, by the second computing service, a relationship graph indicating the relationship between the cloud computing resource and the different cloud computing resource, wherein the relationship graph is able to identify the configuration of the cloud computing resource without authenticating against the cloud computing account,
wherein the listener, monitoring service, and first and second computing services are each implemented on a computing device comprising a processor and memory.

US Pat. No. 10,693,803

HIERARCHICAL FAIRSHARE OF MULTI-DIMENSIONAL RESOURCES

International Business Ma...

1. A method to implement a fair share of hardware resources among a plurality of competing peers, the method comprising:determining, by one or more processors, respective amounts of usage of a hardware resource that is allocated to a first competing peer and a second competing peer;
determining, by one or more processors, respective differences between the respective amounts of usage of the hardware resource and a ratio that dictates, at least in part, an initial distribution of the hardware resource to the first competing peer and the second competing peer; and
adjusting, by one or more processors, an allocation of the hardware resource such that a portion of the hardware resource that is allocated to the first competing peer is transferred to the second competing peer based, at least in part, on the ratio and a determination that the first competing peer is served more than the second competing peer, wherein the adjustment is made based on one or both of (i) a greatest fairness difference, and (ii) whether a greatest accumulated fairness difference exceeds at least one threshold.

US Pat. No. 10,693,802

SYSTEMS AND METHODS FOR PROVISIONING AND MANAGING AN ELASTIC COMPUTING INFRASTRUCTURE

SEA STREET TECHNOLOGIES, ...

1. A provisioning and management system comprising:a memory;
at least one processor coupled to the memory; and
a management component executable by the at least one processor and configured to instantiate a plurality of objects, each object of the plurality of objects having an inherited set of properties and methods in common, the plurality of objects comprising
a plurality of resource objects each configured to control at least one capacity of at least one resource, the at least one resource being one or more of a physical resource and virtual resource of at least one computer system, and
a high availability object configured to
request that an active set of resources controlled by an active set of resource objects of the plurality of resource objects be physically distinct from one or more other sets of resources controlled by one or more other sets of resource objects of the plurality of resource objects,
detect an outage within the active set of resources controlled by the active set of resource objects of the plurality of resource objects, and
failover to the one or more other sets of resources controlled by the one or more other sets of resource objects of the plurality of resource objects, the one or more other sets of resources being one or more of active resources, passive resources, and standby resources.

US Pat. No. 10,693,801

PACKET DROP REDUCTION IN VIRTUAL MACHINE MIGRATION

Red Hat, Inc., Raleigh, ...

1. A method comprising:receiving, by a processing device, a first data packet directed to a virtual machine (VM) that has migrated from a first host to a second host, wherein the first data packet comprises a first network address of the VM, wherein the first network address of the VM is associated with the first host;
queuing, by the processing device, the first data packet in a memory buffer at the first host, wherein the memory buffer is to store one or more incoming data packets directed to the VM;
receiving, by the processing device via a first network interface card (NIC) of the first host, an indication of a second network address of the VM, wherein the second network address of the VM is associated with the second host; and
causing the first NIC of the first host to transmit the first data packet from the memory buffer at the first host to a second NIC of the second host, wherein the first data packet is transmitted over a network associated with the VM at the second host.

US Pat. No. 10,693,800

TCP PROXY DEVICE-ASSISTED COMMUNICATION METHOD AND APPARATUS IN WIRELESS COMMUNICATION

Samsung Electronics Co., ...

1. A method of a proxy device in a communication system, the method comprising:identifying a system load value;
in case the system load value is smaller than a first predetermined threshold value, identifying whether a connection type between a terminal and the proxy device is a wireless connection;
in case that the connection type is the wireless connection, proxying a connection between the terminal and a server; and
in case that the connection type is not the wireless connection, forwarding the connection between the terminal and the server.

US Pat. No. 10,693,799

CALLING METHOD AND DEVICE, COMPUTER STORAGE MEDIUM, AND TERMINAL

TENCENT TECHNOLOGY (SHENZ...

1. A method for making a call, comprising:detecting, by processing circuitry of a first terminal device that conducts a media call with a second terminal device via a network and in response to a success reception of a first data packet of first media that is send by the second terminal device during the media call, whether a packet loss occurs in the first media;
obtaining, by the processing circuitry, network status information of the network when a packet loss of a second data packet of the first media is detected;
determining, by the processing circuitry, a probability threshold in association with a retransmission request to the second terminal device for retransmitting the second data packet;
determining, by the processing circuitry, based on the probability threshold, a network requirement condition for the retransmission request;
sending, via interface circuitry of the first terminal device, the retransmission request to the second terminal device when the network status information satisfies the network requirement condition; and
canceling the retransmission request to the second terminal device when the network status information fails to satisfy the network requirement condition.

US Pat. No. 10,693,798

SYSTEM ARCHITECTURE FOR VARYING RATE TRANSMISSION

AVAGO TECHNOLOGIES INTERN...

1. A device, comprising:network interface circuitry; and
adjustment processing circuitry configured to:
determine a signaling condition, of a wireline medium, based on external environmental conditions surrounding the wireline medium;
control, responsive to the signaling condition, the network interface circuitry to establish a communication link over the wireline medium at a first data rate with a network device;
subsequent to establishing the communication link, detect a change in the signaling condition of the wireline medium;
control, responsive to the change in the signaling condition, the network interface circuitry to re-establish the communication link at a second data rate different than the first data rate with the network device;
determine, based on the signaling condition and responsive to the network interface circuitry receiving an indicator of a third data rate from the network device, whether the third data rate is supported by the external environmental conditions;
control, in a case that the third data rate is supported by the external environmental conditions, the network interface circuitry to establish the communication link at the third data rate with the network device; and
control, in a case that the third data rate is not supported by the external environmental conditions, the network interface circuitry to transmit an error message via the wireline medium to the network device, wherein
the second data rate is greater than the first data rate in a case that the change in the signaling condition exceeds an improvement threshold level,
the second data rate is less than the first data rate in a case that the change in the signaling condition is lower than a staggered threshold level that is lower than the improvement threshold level, and
the network interface circuitry is configured to:
determine a setup protocol for establishing the communication link with the network device;
in a case that the network interface circuitry determines that the setup protocol is to auto-negotiate,
establish a negotiation link with the network device,
exchange setup information with the network device via the negotiation link,
determine whether a data rate is specified in the setup information,
setup the communication link at the specified data rate in a case that the data rate is specified, and
setup the communication link at a selected data rate in a case that the data rate is not specified; and
in a case that the network interface circuitry determines that the setup protocol is to retrain,
send a retrain indicator to the network device, and
apply a multiplier to a clock signal for the first data rate to generate a clock signal for the second data rate.

US Pat. No. 10,693,797

BLOCKING APPLICATION TRAFFIC FOR RESOURCE CONSERVATION IN A MOBILE DEVICE

Seven Networks, LLC, Mar...

1. A mobile device comprising:a memory;
a processor configured to control the mobile device for:
communicating over a shared channel and an application specific channel, wherein the application specific channel is a channel for an application on the mobile device to communicate with an application server;
blocking the application specific channel to offload traffic therefrom to the shared channel, wherein the blocking occurs in response to a screen of the mobile device being off and the blocking includes blocking the application from accessing the application server over the application specific channel;
wherein blocking the application from accessing the application server includes suspending the application;
receiving a message directed to the application over the shared channel from a messaging server;
allowing the application to access the application server over the application specific channel in response to receipt of the message;
wherein allowing the application to access the application server includes resuming the application for a period of time; and
re-blocking the application specific channel after allowing the application to access the application server over the application specific channel for the period of time.

US Pat. No. 10,693,796

PERSISTENT FLOW IDENTIFIERS ENABLING DISPARATE APPLICATIONS

International Business Ma...

1. A computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a network tracking system, the method comprising:receiving, by a first capture application connected to a network tap, one or more packet flows comprising one or more packets, transmitted through a network;
identifying, by the first capture application, one or more beginning packets of the one or more packet flows;
tagging, by the first capture application, each packet of the one or more packet flows with a flow identifier, wherein the flow identifier includes a unique identifier and an increasing value;
associating, by the first capture application, the unique identifier with an identifier of the network tap, wherein the unique identifier is a MAC address of a network interface card of the network tap;
tagging, by the first capture application, each packet of the one or more packet flows with a timestamp; and
forwarding, by the first capture application, one or more tagged packets to a second capture application connected to the network tap.

US Pat. No. 10,693,795

PROVIDING ACCESS TO APPLICATION PROGRAM INTERFACES AND INTERNET OF THING DEVICES

FUJITSU LIMITED, Kawasak...

1. A system for providing access to at least one of an application programming interface (API) and an Internet of Thing (IoT) device, comprising:one or more processors configured to:
establish a connection between at least one user device and the at least one of the API and the IoT device;
allocate resources for one or more services associated with the at least one of the API and the IoT device to the at least one user device;
provide the one or more services associated with the at least one of the API and the IoT device to the at least one user device;
monitor at least one parameter associated with the one or more services provided to the at least one user device;
obtain a mashup between the at least one of the API and the IoT device and at least one of a second API and a second IoT device;
obtain a virtual smart environment, the virtual smart environment including the at least one of the API and the IoT device, the at least one of the second API and the second IoT device, and the mashup;
emulate the virtual smart environment using the at least one of the API and the IoT device, the at least one of the second API and the second IoT device, and the mashup to test a possibility of the mashup to determine a compatibility of the mashup by determining an interaction between the at least one of the API and the IoT device and the at least one of the second API and the second IoT device; and
present a result of the test on the at least one user device.

US Pat. No. 10,693,794

SERVICE PROCESSING METHOD, APPARATUS, AND SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A method of service processing, comprising:controlling, by a controller, a first node to send a received packet to a processing network comprising at least one processing function entity, wherein the controlling, by the controller, the first node to send the received packet to the processing network further comprises sending by the controller, a first forwarding policy to the first node, wherein the first forwarding policy is used to control the first node to send the received packet to a first processing function entity, the first processing function entity is a processing function entity in the processing network, the first forwarding policy is generated according to an identifier of the first processing function entity and a traffic flow identifier, and the received packet carries the traffic flow identifier; and
controlling, by the controller, the processing network to process the received packet and then send a processed packet to a second node; wherein
the first node is a base station or a network element connected to the base station, and the second node is a routing function entity; or
the first node is the routing function entity, and the second node is the base station or a network element connected to the base station; and
the routing function entity is an anchor point of an Internet Protocol (IP) address of a user.

US Pat. No. 10,693,793

MITIGATING NETWORK SATURATION FOLLOWING PERIODS OF DEVICE DISCONNECTION AND SUBSEQUENT RECONNECTION

INTERNATIONAL BUSINESS MA...

1. A method comprising:detecting, by one or more processors, reconnection of device to a network after a period of disconnection;
querying, by one or more processors, a set of applications residing on the device for estimated data associated with the application awaiting transfer;
determining, by one or more processors, that a response has been received from a first application of the set of applications, the response including a first estimated data awaiting transfer from the first application;
determining, by one or more processors, that a response has not been received from a second application of the set of applications;
determining, by one or more processors, responsive to determining that the response has not been received from the second application, a second estimated data awaiting transfer from the second application based upon a learned data usage model for the application, wherein the learned data usage model uses data usage pattern statistics to determine estimated data to be transferred from the second application using machine learning;
determining, by one or more processors, a total expected data transfer amount based upon the first estimated data and the second estimated data;
determining, by one or more processors, that the total expected data transfer amount is not less than a threshold value; and
determining, by one or more processors, responsive to the determining that the total expected data transfer amount is not less than the threshold value, a priority of the data transfer for the first application and the second application.

US Pat. No. 10,693,792

METHOD FOR ROUTING INCOMING COMMUNICATION

International Business Ma...

1. A method for transferring an incoming communication from a mobile device to another mobile device, the method comprising the steps of:determining, by one or more computer processors, whether a communication of a plurality of communications is received by a first mobile device;
responsive to determining that the communication of the plurality of communications has been received by the first mobile device, transferring, by one or more computer processors, the communication of the plurality of communications to at least one mobile device of a plurality of other mobile devices based on a routing configuration table;
determining, by one or more processors, whether a pairing between the first mobile device and one or more mobile devices of the plurality of mobile devices is severed;
responsive to determining that the pairing between the first mobile device and one or more mobile devices of the plurality of mobile devices is severed, identifying, by one or more computer processors, the one or more mobile devices of the plurality of mobile devices associated with the severed pairing;
identifying, by one or more computer processors, the transferred communication associated with the identified one or more mobile devices of the plurality of mobile devices associated with the severed pairing;
storing, by one or more computer processors, the identified transferred communication to the first mobile device; and
deleting, by one or more computer processors, the identified transferred communication from the one or more mobile devices of the plurality of other mobile devices paired to the first mobile device.

US Pat. No. 10,693,791

SOFTWARE-DEFINED NETWORK-BASED METHOD AND SYSTEM FOR IMPLEMENTING CONTENT DISTRIBUTION NETWORK

ZTE CORPORATION, Shenzhe...

1. A method for implementing a Content Distribution Network (CDN) based on a Software Defined Network (SDN), wherein a CDN application function is added on a SDN application layer; a CDN control function is added on a SDN control layer; a CDN network entity resource is added on a SDN data forwarding layer; and the method comprises:when receiving a request of a CDN application, the SDN application layer generating resource demand and service orchestration information according to the request of the CDN application, and sending a reservation request for a resource required by the CDN application to the SDN control layer according to the resource demand and service orchestration information;
the SDN control layer allocating the resource required by the CDN application according to the reservation request, generating a content routing table for data transmission by combining network load balancing and a path policy, generating a data link layer (L2) and network layer (L3) forwarding table according to the content routing table and sending the L2 and L3 forwarding table to the SDN data forwarding layer; and
when receiving a content distribution request and a content delivery request, the SDN data forwarding layer calling related contents from the CDN network entity resource to execute related operations of a CDN service according to the L2 and L3 forwarding table;
wherein the SDN data forwarding layer calling related contents from the CDN network entity resource to execute related operations of a CDN service comprises:
the SDN data forwarding layer calling related contents from the CDN network entity resource to execute operations of content distribution, content cache and content delivery of the CDN service;wherein:said executing the operation of content distribution of the CDN service comprises:
when receiving the content distribution request, according to the content distribution request and a preset distribution policy, extracting a content stored in a content storage node and then filling the content into a content distribution node of a CDN network;
said executing the operation of content cache of the CDN service comprises: receiving and caching the content of the content distribution node; and pre-caching a content accessed by a user terminal in a content cache node of the CDN network according to a cache policy to rapidly provide hotspot content for neighbor content delivery node and user terminal for use; and
said executing the operation of content delivery of the CDN service comprises: according to the content delivery request, extracting the content in the content cache node to provide for a content delivery node of the CDN network for content streaming and transmitting the streamed content to a user terminal.

US Pat. No. 10,693,790

LOAD BALANCING FOR MULTIPATH GROUP ROUTED FLOWS BY RE-ROUTING THE CONGESTED ROUTE

Amazon Technologies, Inc....

1. A device, comprising:a plurality of interfaces, each configured to output network packets;
a memory configured to store a routing table comprising a first route associated with a first multipath group, the first multipath group also being associated with a first mapping of the network packets to the plurality of interfaces; and
processing logic configured to, upon determining that a first interface of the plurality of interfaces is congested:
create a second route associated with a second multipath group, the second multipath group being associated with a second mapping of the network packets to the plurality of interfaces, the second mapping being different from the first mapping; and
store the second route with the first route in the routing table to enable forwarding of the network packets to the plurality of interfaces based on whether each network packet is associated with the first route or the second route.

US Pat. No. 10,693,789

ADAPTIVE INTELLIGENT ROUTING IN A COMMUNICATION SYSTEM

Cisco Technology, Inc., ...

1. A computer-implemented method of adaptive routing in a communication system, the computer-implemented method comprising:determining, by a controller, a device policy to implement on a client executing on a mobile device, wherein operation of the client on the mobile device is transparent to one or more other applications executing on the mobile device, wherein the client is configured to communicate with a router residing within a radio access network, the radio access network coupled between a core network and a base station configured to communicate wirelessly with the client, the device policy pertaining to communication between the mobile device and the one or more packet data networks;
transmitting the device policy to the client, whereupon the client implements the device policy in order to regulate communication between the mobile device and the one or more packet data networks, wherein the mobile device is configured to initiate a plurality of connections according to the device policy, the plurality of connections including a first connection anchored at the controller and a second connection anchored at the router, wherein the router is configured to maintain a session for the second connection; and
determining, by operation of one or more computer processors, a router policy to implement on the router, after which the router policy is transmitted to the router, whereupon the router implements the router policy by monitoring the mobile device according to the router policy in order to determine whether the mobile device is communicating with the one or more packet data networks in compliance with the device policy, wherein the router is configured to notify the controller of any non-compliant communication between the mobile device and the one or more packet data networks.

US Pat. No. 10,693,788

NETWORK VALIDATION WITH DYNAMIC TUNNELING

Comcast Cable Communicati...

1. A system comprising:one or more computing devices, wherein at least one computing device of the one or more computing devices comprises:
one or more processors; and
a memory storing processor executable instructions that, when executed by the one or more processors, cause the at least one computing device to:
dynamically generate a first communication tunnel to a first tunnel endpoint;
determine availability of the first tunnel endpoint based on whether a response is received to a transmission, wherein the transmission is configured to dynamically generate and traverse within the first communication tunnel;
if the first tunnel endpoint is determined to be available, route network traffic to the first tunnel endpoint; and
if the first tunnel endpoint is determined to be unavailable, provide a second communication tunnel to a second tunnel endpoint.

US Pat. No. 10,693,787

THROTTLING FOR BANDWIDTH IMBALANCED DATA TRANSFERS

Intel Corporation, Santa...

1. A system to throttle bandwidth imbalanced data transfers between a sender node and a receiver node coupled via a network fabric, the system comprising:one or more non-transitory machine readable mediums configured to store executable computer program instructions; and
one or more processors configured to execute the computer program instructions stored on the one or more non-transitory machine readable mediums, execution of the computer program instructions being configured to cause the one or more processors to:
choose a number of chunk get operations based on a write bandwidth of non-volatile memory of the receiver node, the write bandwidth of the non-volatile memory being less than a network bandwidth of the network fabric;
split a payload data transfer operation over the network fabric into a plurality of chunk get operations, wherein a chunk get operation of the plurality of chunk get operations transfers a chunk of a payload over the network fabric via a remote direct memory access (RDMA) read operation executed by the receiver node;
execute a threshold number, c, of chunk get operations from the plurality of chunk get operations;
schedule remaining chunk get operations from the plurality of chunk get operations as scheduled chunk get operations for subsequent execution; and
in response to a determination of a completion of an executing chunk get operation and a determination of at least one scheduled chunk get operation, execute a chunk get operation from the scheduled chunk get operations.

US Pat. No. 10,693,786

EFFICIENT SIZE REDUCTION OF A BLOOM FILTER

International Business Ma...

1. A computer-implemented method performed by a processor, the method comprising:obtaining a Bloom filter comprising a total number of bits to represent a number of cells, wherein the Bloom filter represents a set of elements;
creating an interleaved Bloom filter, wherein the interleaved Bloom filter is defined to have non-sequential cells of the Bloom filter be positioned sequentially, wherein the interleaved Bloom filter interleaves segments of the Bloom filter, wherein a size of the segments is based on an interleaving factor; and
computing a reduced size Bloom filter comprising a reduced total number of bits to represent a reduced number of cells, wherein the reduced number of cells is below the number of cells of the Bloom filter, wherein the reduced total number of bits is smaller than the total number of bits, wherein the reduced size Bloom filter represents the set of elements and wherein the reduced size Bloom filter is reduced by a determined folding factor, wherein said folding factor is smaller than or equal to the interleaving factor, wherein said computing comprises computing a value of a cell in the reduced size Bloom filter based on two or more values of cells in the interleaved Bloom filter, wherein the values of cells are of cells which are comprised by a set of consecutive cells in the interleaved Bloom filter, each of which cells is associated with a different segment of the segments of the Bloom filter, wherein all elements represented by the Bloom filter are represented by the reduced size Bloom filter; and
outputting the reduced size Bloom filter.

US Pat. No. 10,693,785

METHOD AND SYSTEM FOR FORWARDING DATA, VIRTUAL LOAD BALANCER, AND READABLE STORAGE MEDIUM

PING AN TECHNOLOGY (SHENZ...

1. A method for forwarding data, comprising:when a virtual load balancer VLB receiving a pending response data packet sent by a Linux virtual server LVS from a front terminal sub interface, sending the pending response data packet to a real server RS through a rear terminal sub interface, wherein the forward network port of the VLB corresponds to at least one front terminal sub interface, and one of the front terminal sub interface corresponds to a carrier's data interface; and
the RS receiving and responding to the pending response data packet, getting a response data packet and sending the response data packet to the VLB from the rear terminal sub interface; and
the VLB receiving the response data packet, transmitting the response data packet to the LVS from the front terminal sub interface that receives the pending response data packet;
wherein the block of when a VLB receiving a pending response data packet sent by a LVS from a front terminal sub interface, sending the pending response data packet to a RS through a rear terminal sub interface comprises:
when the protocol layer of the VLB receives the pending response data packet sent by the LVS from the front terminal sub interface, adding a first identification information to the pending response data packet; and
transmitting the pending response data packet that comprises the first identification information to the application layer of the VLB, for the application layer to receive the pending response data packet and delete the first identification information from the pending response data packet, and send the pending response data packet to the RS through the rear terminal sub interface according to a default route;
the block of the VLB receiving the response data packet, transmitting the response data packet to the LVS from the front terminal sub interface that receives the pending response data packet comprises:
the application layer of the VLB receiving the response data packet, and setting a second identification information corresponding to the first identification information according to a preset parameter; and
selecting a routing table according to the second identification information, and sending the response data packet to the LVS from the front terminal sub interface that receives the pending response data packet according to the routing table.

US Pat. No. 10,693,784

FIBRE CHANNEL OVER ETHERNET (FCOE) LINK AGGREGATION GROUP (LAG) SUPPORT IN DATA CENTER NETWORKS

Juniper Networks, Inc., ...

1. A method comprising:establishing, by an access switch of a data center, a plurality of virtual links that emulate point-to-point physical links between a first Fibre Channel over Ethernet (FCoE) device on a network and a plurality of virtual node (VN) ports on a second FCoE device of a server, wherein the access switch emulates native Fibre Channel by sending packets between the first FCoE device and one of the plurality of VN ports on the second FCoE device over one of the plurality of virtual links;
receiving, by the access switch and from the first FCoE device, a packet destined for the one of the plurality of VN ports on the second FCoE device;
determining, by the access switch and based on a destination address of the one of the plurality of VN ports on the second FCoE device, a FCoE link aggregation group (LAG) interface for a plurality of member links included in a FCoE LAG bundle established between the access switch and the second FCoE device and an identifier that identifies a single member link of the plurality of member links of the FCoE LAG interface, wherein the single member link of the FCoE LAG interface identified by the identifier is associated with the one of the plurality of virtual links established between the first FCoE device and the one of the plurality of VN ports on the second FCoE device; and
forwarding, by the access switch and based on the identifier, the packet to the one of the plurality of VN ports on the second FCoE device over the single member link of the FCoE LAG interface identified by the identifier.

US Pat. No. 10,693,783

INTERMEDIATE LOGICAL INTERFACES IN A VIRTUAL DISTRIBUTED ROUTER ENVIRONMENT

NICIRA, INC., Palo Alto,...

1. A system comprising:a plurality of host machines that are configured to operate a logical network based on a logical routing element (LRE) for routing packets between different segments of the logical network, wherein each host machine operates a local instance of the LRE as a managed physical routing element (MPRE), the LRE comprising a plurality of logical interfaces (LIFs), each LIF for interfacing with a different segment of the logical network, wherein a particular network segment interfacing a particular LIF is associated with a plurality of identifiers, each identifier for identifying a different host machine in the plurality of host machines,
wherein routing a packet into the particular network segment comprises (i) identifying an inbound LIF and an outbound LIF at a MPRE operated by a first host machine and (ii) selecting one of the plurality of identifiers and forwarding the packet to a second host machine identified by the selected identifier when the identified outbound LIF is the particular LIF, wherein the MPRE of the second host machine identifies a destination address of the packet in the particular network segment.

US Pat. No. 10,693,782

METHOD AND SYSTEM FOR SERVICE SWITCHING USING SERVICE TAGS

NICIRA, INC., Palo Alto,...

1. A non-transitory machine readable medium storing a program for specifying a service to perform on a received packet, the program for execution by at least one hardware processing unit, the program comprising sets of instructions for:identifying a source client and a requested service associated with the received packet;
generating a service tag that identifies the source client and the requested service;
storing the service tag in an encapsulation header, and using the encapsulation header with the stored service tag to encapsulate the packet; and
forwarding the encapsulated packet to a service switching gateway that extracts the service tag from the encapsulation header and directs the packet to a service machine by using the extracted service tag to identify the service machine from a mapping structure that maps different service tags to different service machines.

US Pat. No. 10,693,781

IN NIC FLOW SWITCHING

Intel Corporation, Santa...

1. An apparatus, comprising:an interconnect interface;
memory, having an address space; and
a plurality of network ports coupled in communication via an internal interconnect, each network port having a network interface;
wherein the apparatus further includes means for allocating portions of the address space to sets of queues for each of the plurality of network ports, wherein each set of queues includes a plurality of receive (Rx) queues and a plurality of transmit (Tx) queues, wherein a portion of the Tx queues are Tx forwarding queues mapped to at least one of Rx and Tx queues in other network ports on the apparatus, and
wherein each network port further includes means for,
comparing header data in a Media Access Control (MAC) frame against MAC frame header filter data to determine if the MAC frame is to be forwarded to another network port in the apparatus; and in response to a determination that the MAC frame is to be forwarded to another network port,
moving or copying the MAC frame from a first queue allocated to the network port to a second queue allocated to the other network port.

US Pat. No. 10,693,780

CREATING ENDPOINTS

Capital One Services, LLC...

1. A method, comprising:receiving, by a processor, a configuration file,
wherein the configuration file includes:
data concerning a Hypertext Transfer Protocol (HTTP) route, wherein the data includes:
a parameter related to the HTTP route, and
an attribute related to an HTTP action;
creating, by the processor, the HTTP route based on the parameter,
wherein the HTTP route includes information concerning the parameter and the attribute related to the HTTP action; and
sending, by the processor, the HTTP route to a server,
wherein sending the HTTP route to the server causes the server to perform an operation based on the HTTP route.

US Pat. No. 10,693,779

METHOD AND SYSTEM FOR TRANSFERRING A MESSAGE

Telefonaktiebolaget LM Er...

1. A method of transferring a message from a sender network to a recipient network that is different than the sender network, the method comprising:generating a token, by a first node in the sender network, for content of a stored message stored in a repository to replace information in a Session Initiation Protocol (SIP) message to be sent to an intended recipient;
transmitting, via one or more intermediate SIP nodes, from the first node to a second node in the recipient network, the SIP message with the generated token replacing the information;
retrieving, by the second node, the information from the repository;
replacing, by the second node, in the SIP message, the token with the information; and
transferring the SIP message comprising the information toward the intended recipient via the recipient network.

US Pat. No. 10,693,778

NETWORK COMMUNICATION SYSTEM WITH NODE ENERGY REDUCTION PACKET PROTOCOL

TEXAS INSTRUMENTS INCORPO...

1. A method for transmitting information, the method comprising:determining channel quality of a communication channel onto which the information is to be transmitted;
based on the channel quality, selecting a packet format for transmitting the information from one of a first packet format having a preamble, a header having a first length, and a data payload and a second packet format having the preamble, a header having a second length, and the data payload, wherein the first length is greater than the second length;
encoding the information into a packet based on the selected packet format; and
transmitting the packet onto the communication channel.

US Pat. No. 10,693,777

IN-SITU OPERATIONS, ADMINISTRATION, AND MAINTENANCE (IOAM) FOR SOFTWARE DEFINED ARCHITECTURES (SDAS)

Cisco Technology, Inc., ...

1. A method, comprising:receiving, at a router, a packet from a network device in a software defined architecture (SDA) network;
obtaining, by the router, in-situ operations, administration, and management (iOAM) data from an outer header of the packet, the iOAM data inserted into the outer header by one or more network devices that previously processed the packet;
copying, by the router, the iOAM data into a locally pertinent header;
determining, by the router, local iOAM data of the router;
appending, by the router, the local iOAM data to the iOAM data copied into the locally pertinent header; and
processing, by the router, the packet wherein processing comprises:
checking, based on compressed policy data, for policy compliance by previous network devices handling the packet.

US Pat. No. 10,693,776

PERIODICAL GENERATION OF NETWORK MEASUREMENT DATA

NICIRA, INC., Palo Alto,...

1. A non-transitory machine readable medium storing a program that when executed by at least one processing unit identifies a network topology between first and second endpoints of a network, the program comprising sets of instructions for:forwarding a first plurality of probing packets from the first endpoint to the second endpoint through a plurality of routing paths that are between the two endpoints;
forwarding a second plurality of probing packets from the second endpoint to the first endpoint through the plurality of routing paths;
identifying a plurality of intermediate nodes between the first and second endpoints using a plurality of reply packets received in response to the first and second pluralities of forwarded probing packets, wherein each intermediate node is (i) identified by a set of receiving interfaces and a set of forwarding interfaces associated with the intermediate node and (ii) at one of a plurality of different time to live (TTL) distances between the first and second endpoints; and
identifying the network topology by specifying links between different pairs of intermediate nodes using the sets of receiving and forwarding interfaces associated with each intermediate node.

US Pat. No. 10,693,775

METHOD AND SYSTEM FOR PROVIDING AUTOMATIC ROUTER ASSIGNMENT IN A VIRTUAL ENVIRONMENT

Versa Networks, Inc., Sa...

1. A method for providing automatic virtual router assignment in a virtual environment managed by a hypervisor, the method comprising:a plurality of virtual hosts and a plurality of virtual routers are configured to run on one or more virtual machines,
wherein the plurality of virtual routers comprises a master virtual router and at least one backup virtual router, each of the plurality of virtual routers has a MAC address assigned by the hypervisor, and wherein one of the plurality of virtual routers is elected as the master virtual router, and the master virtual router is a default gateway to receive traffic from the plurality of virtual hosts, and each virtual host includes a default gateway MAC address in an ARP cache;
receiving, by the plurality of virtual hosts, a gratuitous ARP packet from the master virtual router, wherein a sender hardware address of the received gratuitous ARP packet is the MAC address of the master virtual router;
setting the default gateway MAC address to the sender hardware address of the received gratuitous ARP packet in the ARP cache;
wherein each of the plurality of virtual routers receives an advertisement comprising a priority value,
wherein the at least one backup virtual router is configured to receive a priority value advertised by the master virtual router and to transition to a master virtual router state if the priority value advertised by the master virtual router is not greater than a priority value local to the at least one backup virtual router, and
wherein the master virtual router is configured to receive a priority value advertised by the at least one backup virtual router and to transition to a backup virtual router state if the priority value advertised by the at least one backup virtual router is greater than a priority value local to the master virtual router.

US Pat. No. 10,693,773

METHOD FOR ROUTING IN A CENTRAL CONFERENCING ROUTING SERVER

Level 3 Communications, L...

1. A system for designating a master conferencing routing server from a plurality of collaboration routing servers in a telecommunications system, the system comprising:at least one processor;
memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the system to perform a method, the method comprising:
receiving a first total number of conference bridges to which a first collaboration conferencing routing server of the plurality of collaboration conferencing routing servers is locally connected;
receiving a second total number of conference bridges to which a second collaboration conferencing routing server of the plurality of collaboration conferencing routing servers is locally connected;
designating the master conferencing routing server from the plurality of collaboration routing servers based on the highest of the first total and the second total; and
receiving a collaboration conference access request from a requester's communication; and
selecting a hosting conference bridge from a plurality of conference bridges connected to the designated master conferencing routing server, wherein the hosting conference bridge is configured to host a collaboration conference.

US Pat. No. 10,693,772

PACKET SENDING METHOD, ROUTER, AND SERVICE SWITCHING ENTITY

HUAWEI TECHNOLOGIES CO., ...

1. A packet sending method implemented by a service switching entity, the packet sending method comprising:receiving a service packet comprising a flow group identifier and a source service instance identifier of a source service instance, wherein the flow group identifier identifies a service path;
determining a destination service instance identifier that is of a destination service instance and that corresponds to the flow group identifier and the source service instance identifier; and
sending, to the destination service instance according to the destination service instance identifier, the service packet to perform corresponding service processing.

US Pat. No. 10,693,771

OPTIMIZED MESSAGE FLOODING ACROSS NODES OF A DISTRIBUTED PLATFORM

Verizon Digital Media Ser...

1. A method comprising:maintaining a first set of existing network connections between a first server and second and third servers, wherein the first, second, and third servers are part of a distributed platform with a plurality of servers distributed across different geographic locations;
distributing a flood message with a trigger condition from the first server to said second server and said third server over the first set of existing network connections, wherein the flood message is directed to the plurality of servers;
compiling at the second server before satisfying said trigger condition at the second server, one or more responses to said flood message from a first set of the plurality of servers over a second set of existing network connections maintained between the second server and the first set of servers; and
submitting said one or more responses from the second server to the first server over an existing connection of the first set of existing network connections in response to satisfying said trigger condition at the second server.

US Pat. No. 10,693,770

SERVICE CHAINING WITHIN COMPUTER NETWORKS

Juniper Networks, Inc., ...

1. A method comprising:forming a tunnel packet by encapsulating a packet within a payload of the tunnel packet and constructing a header of the tunnel packet for transport by a tunnel associated with a particular service chain,
wherein the service chain comprises an ordered set of one or more stateful services for application, by a set of service nodes, to a plurality of packet flows,
wherein forming the tunnel packet comprises embedding a cookie within the tunnel packet, and
wherein the cookie includes a value that uniquely identifies a specific subset of packet flows of the plurality of packet flows transported by the service tunnel for the service chain; and
forwarding the tunnel packet toward the service nodes.

US Pat. No. 10,693,769

METHODS AND APPARATUS TO PERFORM NETWORK FABRIC MIGRATION IN VIRTUALIZED SERVER SYSTEMS

VMWARE, INC., Palo Alto,...

8. A method comprising:in response to a first network resource transmitting a first probe packet to a second network resource via a communication link, determining, by executing an instruction with a processor, a type of a first network fabric layer of a communication network and whether to migrate the first network fabric layer to a second network fabric layer based on whether the first network resource receives a reply probe packet from the second network resource;
in response to a remediation path being configured, migrating, by executing an instruction with the processor, the first network fabric layer to the second network fabric layer; and
subsequent to migrating the first network fabric layer to the second network fabric layer, migrating, by executing an instruction with the processor, the remediation path from the first network fabric layer to the second network fabric layer.

US Pat. No. 10,693,768

METHOD, APPARATUS AND SYSTEM FOR CONTROLLING ROUTING INFORMATION ADVERTISING

Huawei Technologies Co., ...

1. An apparatus comprising:a non-transitory memory storing instructions; and
a processor communicably coupled to the non-transitory memory; wherein the instructions, when executed by the processor, cause the apparatus to perform:
receiving first routing information, wherein the first routing information comprises an identifier of a first forwarding device;
determining a first routing path according to the identifier of the first forwarding device and an identifier of a second forwarding device; and
determining an advertising range of second routing information for the second forwarding device according to the first routing path;
sending the second routing information to the second forwarding device;
wherein the second routing information is generated according to the first routing information, the second forwarding device receives the second routing information, and the advertising range of the second routing information comprises an identifier of an external neighbor of the second forwarding device and the advertising range of the second routing information is used to enable the second forwarding device to advertise the second routing information according to the advertising range of the second routing information.

US Pat. No. 10,693,767

METHOD TO ROUTE PACKETS IN A DISTRIBUTED DIRECT INTERCONNECT NETWORK

ROCKPORT NETWORKS INC., ...

1. A computer-implemented method of routing packets in a direct interconnect network from a source node to a destination node comprising the steps of:discovering all nodes and all output ports on each node in the direct interconnect network topology;
including the discovered nodes and output ports in the direct interconnect network topology in a topology database that is stored in all nodes in order to allow said nodes and ports to be included in path routing computations;
calculating a path from every output port on each node to every other node in the direct interconnect network topology based on those nodes and output ports contained in the topology database, wherein each such path is disjoint from one another, and wherein said calculating the disjoint paths is performed independently by each node without the need for any centralized controller within the direct interconnect network topology to assist with same;
generating a source routing database on each node containing said disjoint paths from every output port on each node to all other nodes in the direct interconnect network topology;
receiving a packet at the source node;
sending the received packet to one of the output ports of the source node as chosen in a round robin or weighted round robin manner, whereby the received packet is then distributed along the disjoint path from the chosen output port on the source node to the destination node.

US Pat. No. 10,693,766

ENGINES TO PRUNE OVERLAY NETWORK TRAFFIC

Hewlett Packard Enterpris...

1. A network device comprising:a mapping table, to contain a mapping between an underlay network multicast group address and at least one virtual network identifier (VNI) corresponding to an overlay network;
an inspection engine to identify whether a tunneled network packet received at the network device is associated with the multicast group address and a VNI that is contained in the mapping table; and
a forwarding engine to forward the packet according to the multicast group address in response to the VNI being contained in the mapping table, and to discard the packet in response to the VNI not being contained in the mapping table.

US Pat. No. 10,693,765

FAILURE PROTECTION FOR TRAFFIC-ENGINEERED BIT INDEXED EXPLICIT REPLICATION

Cisco Technology, Inc., ...

1. A method comprising:determining a protected link or node in a network, wherein
the protected link or node is to be protected by a fast reroute procedure,
the protected link or node is included in a designated path to be taken by a message through the network to a destination node,
the designated path is encoded in a message bit array carried by the message, and
assigned bit positions in the message bit array represent respective network links along the designated path;
determining a backup path to the destination node from a feeder node adapted to forward a message carrying the message bit array into the protected link or node, wherein
the backup path bypasses the protected link or node,
the backup path can be encoded by a modified message bit array carried by the message in place of the message bit array, and
assigned bit positions in the modified message bit array represent the same respective network links as the corresponding bit positions in the message bit array; and
populating an entry in a path update table stored at the feeder node, wherein
the entry comprises information for use, in the event of a failure of the protected link or node, in modifying two or more bit values within the message bit array to form the modified message bit array, and
the two or more bit values comprise
a bit value at a first bit position, in the message bit array, representing the protected link or a link to the protected node, and
a bit value at a second bit position, in the message bit array, representing a link within the backup path but not within the designated path.

US Pat. No. 10,693,764

VIRTUAL DISPERSIVE NETWORKING SYSTEMS AND METHODS

DISPERSIVE NETWORKS, INC....

1. A method of communicating data using virtualization, the method comprising:(a) spawning, at a first device, a first plurality of virtual machines that each virtualizes network capabilities of the first device such that a first plurality of virtual network connections are provided;
(b) splitting, at endpoint software running on the first device, first data for communication to a destination device into a first plurality of data streams;
(c) selecting, at the first device by the endpoint software, a first plurality of deflects for use in communicating the first plurality of data streams;
(d) communicating each of the first plurality of data streams using a different one of the first plurality of virtual network connections over a different one of the selected first plurality of deflects;
(e) spawning, at a first deflect of the selected first plurality of deflects, a second plurality of virtual machines that each virtualizes network capabilities of the first deflect such that a second plurality of virtual network connections are provided;
(f) receiving, at the first deflect, a first data stream of the first plurality of data streams;
(g) splitting, at the first deflect, the first data stream into a second plurality of data streams;
(h) selecting, at the first deflect, a second plurality of deflects for use in communicating the second plurality of data streams;
(i) communicating each of the second plurality of data streams using a different one of the second plurality of virtual network connections over a different one of the selected second plurality of deflects;
(j) receiving, at a second deflect from a first set of deflects, the second plurality of data streams;
(k) reassembling, at the second deflect, the second plurality of data streams into the first data stream, and communicating the first data stream onward to another device;
(l) receiving, at a second device from a second set of deflects, the first plurality of data streams including the first data stream;
(m) reassembling, at the second device, the first plurality of data streams into the first data.

US Pat. No. 10,693,763

ASYMMETRIC CONNECTION WITH EXTERNAL NETWORKS

NICIRA, INC., Palo Alto,...

1. A method of processing packets associated with a logical network comprising a logical forwarding element (LFE) implemented by a plurality of managed forwarding elements (MFEs) in a physical network, the method comprising:at a particular MFE:
receiving a first packet encapsulated with a logical context header, destined to a first machine of the logical network and originating from a second machine not in the logical network;
decapsulating the first packet and providing the decapsulated packet to the first machine;
receiving a second packet from the first machine that is addressed to the second machine; and
transmitting the second packet to the physical network without any logical context header in order for the physical network to forward the second packet to the second machine.

US Pat. No. 10,693,762

DATA DRIVEN ORCHESTRATED NETWORK USING A LIGHT WEIGHT DISTRIBUTED SDN CONTROLLER

DCB SOLUTIONS LIMITED, (...

1. A computer implemented method for controlling a software defined network (SDN); the method comprising:providing one or more client portals which are configured for facilitating users controlling networked devices;
generating configuration data based on input received from users via the client portals;
providing a master SDN controller for managing data flow control on the SDN network; wherein the master SDN controller resides on a control layer and is operable to generate routing data for the networked devices and is configured to manage data flow control on the SDN network;
generating by the master SDN controller a plurality of discrete co-controllers each associated with a particular end user, wherein each discrete co-controller facilitates individual granularity of setting specific network configuration policies for each particular end user for each of the networked devices that are associated with each particular end user, each SDN co-controller including configuration data and routing data for an associated networked device;
dispatching the SDN co-controller by the master SDN controller from the control layer to the networked devices associated with the respective end users for controlling thereof;
installing the SDN co-controllers on the networked devices such that the SDN co-controllers reside on the networked devices in an infrastructure layer; and
registering the installed SDN co-controllers residing on the networked devices in the infrastructure layer with the master SDN controller residing on the control layer for controlling the routing of data from the networked devices and for controlling the configuration of the networked devices.

US Pat. No. 10,693,761

COMPUTER SYSTEM INCLUDING MULTILAYER SWITCHES

Hewlett Packard Enterpris...

1. A computer system comprising:a core layer comprising a pair of core switches communicatively coupled with one another;
an access layer comprising a plurality of access switches;
an aggregation layer comprising a pair of aggregation switches communicatively coupled with one another, each aggregation switch further communicatively coupled to each core switch and each access switch;
a processor; and
a non-transitory computer-readable storage medium comprising instructions executable by the processor to:
select a first target switch from the pair of core switches or the pair of aggregation switches to temporarily remove from the computer system;
transmit a respective first notification to (i) each core switch and aggregation switch not selected as the first target switch, and (ii) the plurality of access switches if an aggregation switch is selected as the first target switch, the first notification indicative of an impending shut down of the first target switch and including instructions to each recipient switch to cease directing packets to the first target switch;
process any packets directed to the first target switch prior to the receipt of the first notification and compliance thereto by each recipient switch;
confirm all of the packets directed to the first target switch from each recipient switch have been received and processed; and
restart the first target switch.

US Pat. No. 10,693,760

FABRIC NETWORK

Google LLC, Mountain Vie...

1. An electronic device configured to communicate on a fabric network comprising multiple devices in a home environment, the fabric network comprising multiple logical networks, the electronic device configured to:generate a message for transmission to another device of the multiple devices in the fabric network, the message including an address of the other device; and
transmit the generated message to a cloud service over a platform layer in the fabric network, the transmission being effective to cause the cloud service to use the address to forward the message to the other device, the electronic device being configured to communicate in a first network of the fabric network using a first communication protocol and the other device being configured to communicate in a second network of the fabric network using a second communication protocol.

US Pat. No. 10,693,759

DYNAMIC NETWORK MONITORING

INTERNATIONAL BUSINESS MA...

1. A system for monitoring performance in a networked environment, comprising:a hardware CPU, a hardware computer readable memory and a hardware computer readable storage medium;
program instructions to multiply a monitoring threshold associated with a first host by a multiplier, wherein the multiplier is determined based on a comparison of a length of a first edge and a second edge of a traffic triangle;
program instructions to determine a monitoring threshold for a second host when a virtual machine is moved between the first host and the second host, wherein the monitoring threshold for the second host is based on both the monitoring threshold associated with the first host and a comparison between the quantified performance characteristics of the first host and the second host;
program instructions to receive notice of the movement of the virtual machine from the first host to the second host, wherein the virtual machine comprises a website server, and the first host and the second host are separate cloud computing nodes in a cloud computing environment; and
program instructions to determine whether the move is acceptable based on comparing an angle of the traffic triangle to at least one threshold, wherein the at least one threshold comprises a lower limit and an upper limit,
wherein the program instructions are stored on the hardware computer readable storage medium for execution by the hardware CPU via the hardware computer readable memory.

US Pat. No. 10,693,758

COLLABORATIVE INCIDENT MANAGEMENT FOR NETWORKED COMPUTING SYSTEMS

SPLUNK INC., San Francis...

1. A computer-implemented method, comprising:receiving one or more parameters associated with an incident occurring within a networked computing environment, wherein the one or more parameters specify (i) a first type of communications channel for establishing communications associated with the incident, and (ii) one or more members of an incident response team associated with the incident;
establishing, based on the one or more parameters, communications over a network with at least one member included in the incident response team via a communications channel, wherein the communications channel is of the first type;
identifying at least one service affected by the incident, wherein the at least one service is represented by a stored service definition referencing a key performance indicator (KPI), and wherein the KPI is defined by a search query that produces a value indicating a measure of the at least one service from machine data;
and
causing display of:
a first interactive element associated with the communications channel, and
a visualization indicating a status of the at least one service.

US Pat. No. 10,693,757

INTERFACE LAYER FOR DIAGNOSTIC SUPPORT OF NETWORK-ACCESSIBLE DEVICES

salesforce.com, inc., Sa...

1. A non-transitory, computer readable medium having program instructions stored thereon that are executable to cause an interface layer computer system to perform operations comprising:storing, at a database of the interface layer computer system, authorization information that identifies a plurality of network-accessible computing devices associated with a user, wherein the authorization information grants the interface layer computer system permission to request diagnostic operations for the plurality of network-accessible computing devices that are associated with the user;
implementing an interface layer to facilitate communication between separate computer systems that include:
the plurality of network-accessible computing devices associated with a user;
a multi-tenant diagnostic computer system that hosts a plurality of tenants operable to provide diagnostic support for the plurality of network-accessible computing devices; and
a diagnostic-requesting computer system that is remote from the interface layer computer system and is operable to receive user input to initiate diagnostic operations for the plurality of network-accessible computing devices,
wherein the implementing of the interface layer by the interface layer computer system includes:
receiving, from the diagnostic-requesting computer system, a request to perform a diagnostic operation that involves communication between the multi-tenant diagnostic computer system and a particular one of the plurality of network-accessible computing devices, wherein the request includes a device identifier for the particular network-accessible computing device;
accessing, based on the device identifier, a portion of the authorization information that is associated with the particular network-accessible computing device;
selecting, based on the portion of the authorization information, a tenant from the plurality of tenants that corresponds to the particular network-accessible computing device;
requesting, based on the portion of the authorization information, that the tenant retrieve diagnostic information from the particular network-accessible computing device and perform the diagnostic operation;
receiving, from the tenant via the multi-tenant diagnostic computer system, result information relating to the diagnostic operation;
providing the result information to the user via a user device that is associated with the user; and
wherein the interface layer computer system permits the user to request the diagnostic operation without the diagnostic-requesting computer system communicating with the multi-tenant diagnostic computer system.

US Pat. No. 10,693,756

DYNAMIC QUALITY OF SERVICE OVER COMMUNICATION CIRCUITS

BIGLEAF NETWORKS, INC., ...

1. A method for packet data communications comprising the steps of:accessing a tunnel connection over a communication circuit, the communication circuit providing packet data communications over a network between first and second nodes;
transmitting and receiving monitoring packets between the first and second nodes in both directions, the monitoring packets traveling over the tunnel connection;
based on the monitoring packets, calculating performance metrics for the tunnel connection, separately for each direction and storing values of at least one of the performance metrics for the circuit, wherein the performance metrics comprise at least one metric selected from a set of metrics that includes packet loss, jitter, and latency;
after receipt of a data packet from a remote peer on the circuit:
comparing the stored values of at least one performance metric for the circuit against corresponding severity breakpoints, and based on the comparison, assigning a current alarm value for each of the at least one performance metrics for the circuit;
responsive to the current alarm value assigned to one of the performance metrics exceeding a corresponding alarm limit, decreasing a QOS policy packet data throughput rate limit for the circuit to a predetermined minimum value thereby limiting throughput of packet data traffic on the circuit to the predetermined minimum value;
waiting for an evaluation period;
upon conclusion of the evaluation period, checking whether the assigned current alarm value has receded below the corresponding alarm limit, indicating that the alarm condition was due to circuit saturation;
based on the assigned current alarm value having receded below the corresponding alarm limit, establishing a maximum new QOS policy packet data throughput rate at which the assigned current alarm value no longer exceeds the corresponding alarm limit; and
updating the QOS policy packet data throughput rate limit to the maximum new QOS policy rate thereby permitting throughput of packet data traffic on the circuit up to the maximum new QOS policy rate.

US Pat. No. 10,693,755

BROADBAND ACCESS MANAGEMENT SYSTEMS AND METHODS

ASSIA SPE, LLC, Wilmingt...

1. A method for operating broadband access lines, the method comprising:receiving, at an interface of a Device Abstraction Proxy (DAP), a request for operational data relating to broadband access services provided to broadband access terminals (BATs) in a broadband access network by two or more providers;
receiving, at the interface of the DAP, the operational data, comprising operational data for broadband access lines (BALs) coupled to the BATs;
identifying, at the DAP, at least two of the BALs as belonging to a geographic area of BALs, each of the at least two BALs respectively associated with at least two of the BATs being provided the broadband access services by different providers of the two or more providers, the geographic area associated with a plurality of physical devices that terminate or cross-connect BALs from one or more cables; and
correlating a condition and/or a performance of one of the at least two BALs identified as belonging to the geographic area with a condition and/or performance of another one of the at least two BALs identified as belonging to the geographic area.

US Pat. No. 10,693,754

METHOD AND APPARATUS FOR DETERMINING RESOURCE INDICATOR

HUAWEI TECHNOLOGIES CO., ...

1. A method for determining a resource indicator, comprising:obtaining, by a server, an association relationship tree information, wherein the association relationship tree information is used to indicate association relationships between multiple resources, the multiple resources comprise resources located at at least three resource layers, the association relationships comprise a direct association relationship and an indirect association relationship, two resources having the direct association relationship are separately located at two adjacent resource layers, and two resources having the indirect association relationship are separately located at resource layers spaced by at least one resource layer;
determining, by the server according to the association relationship tree information, a second resource having the indirect association relationship with a first resource, wherein the second resource is used to determine an indicator of the first resource; and
determining, by the server, the indicator of the first resource according to the second resource that is spaced apart from the first resource by the at least one resource layer, wherein the indicator is a performance indicator.

US Pat. No. 10,693,753

NETWORK DEVICE SNAPSHOTS

Hewlett Packard Enterpris...

1. A computer-implemented method comprising:receiving an indication to quiesce a first network device;
pausing new communication processing on the first network device for a first period of time sufficient to complete processing of at least a portion of any in-progress communications on the first network device;
creating a first snapshot copy of a first state of the first network device, the first state including information from the first network device describing software application run-time execution parameters, software application configuration parameters, hardware run-time execution parameters, and hardware configuration parameters;
resuming communication processing on the first network device;
storing the first snapshot copy of the first state of the first network device to a first memory communicatively coupled to a first processor of the first network device;
receiving an indication to quiesce a second network device concurrently with quiescing the first network device;
pausing new communication processing on the second network device for a second period of time sufficient to complete processing of at least a portion of any in-progress communications on the second network device;
creating a second snapshot copy of a second state of the second network device, the second state including information from the second network device describing software application run-time execution parameters, software application configuration parameters, hardware run-time execution parameters, and hardware configuration parameters;
resuming communication processing on the second network device; and
storing the second snapshot copy of the second state of the second network device to a second memory communicatively coupled to a second processor of the second network device.

US Pat. No. 10,693,752

DYNAMICALLY REQUESTING MOBILE DEVICES TO REPORT NETWORK INFORMATION

1. A method comprising:receiving, from a plurality of radio access nodes, information indicating availability of the radio access nodes;
based on the availability information received from the radio access nodes, determining that a current operating condition of a mobile network corresponds to normal operations;
requesting information regarding mobile network operating conditions from a plurality of mobile devices in communication with the radio access nodes by:
setting a reporting parameter to a first value, and
instructing each of the radio access nodes to transmit a respective broadcast message that includes the first value for the reporting parameter;
receiving a first plurality of messages from a first subset of mobile devices, each message in the first plurality of messages including location information for a respective mobile device in the first subset; and
using the location information received from the first subset of mobile devices and the availability information received from the radio access nodes to define at least one coverage area;
receiving, from a subset of the radio access nodes, information indicating availability of the subset of the radio access nodes;
based on the information received from the subset of the radio access nodes, determining that the current operating condition of the mobile network corresponds to impaired operations;
requesting updated information regarding mobile network operating conditions by:
setting the reporting parameter to a second value, and
instructing each radio access node in the subset of the radio access nodes to transmit a second broadcast message that includes the second value for the reporting parameter, wherein the second value differs from the first value;
receiving a second plurality of messages from a second subset of mobile devices, each message in the second plurality of messages including location information for a respective mobile device in the second subset; and
using the location information for the second subset of mobile devices and the availability information received from the subset of the radio access nodes to define at least one revised coverage area.

US Pat. No. 10,693,751

END-TO-END IT SERVICE PERFORMANCE MONITORING

Saudi Arabian Oil Company...

1. A computer-implemented method, comprising:generating a layout representative of an end-to-end information technology (IT) service, the generating based on physical components of the end-to-end IT service, the layout identifying and representing all interactions among components of the end-to-end IT service, the layout identifying all components of the end-to-end IT service and including a physical layout and a logical layout, the generating including:
identifying the interactions by accessing application programming interfaces (APIs), remote function calls (RPCs), and universal resource locators (URLs) used by the components of the end-to-end IT service;
dividing the layout into smaller blocks, each smaller block representing a function or a set of functions, wherein dividing the layout into the smaller blocks includes sub-dividing block-to-block interactions into the smaller blocks based on business groups; and
identifying interactions for aggregation points between two or more smaller blocks;
measuring, using probes placed at aggregation points in the end-to-end IT service, performance of each interaction at each aggregation point, wherein placement of the probes is optimized based on the interactions; and
providing output that identifies all of the components and interactions within the end-to-end IT service and includes information indicating measured performance of the interactions, including prioritized information for measured performance of anomalies.

US Pat. No. 10,693,750

HIERARCHICAL SERVICE ORIENTED APPLICATION TOPOLOGY GENERATION FOR A NETWORK

Lightbend, Inc., San Fra...

1. A system for generating hierarchical service oriented application topology of a network with a multitude of processes running on numerous hosts, the system comprising:a machine learning-based classifier trained to cluster the hosts into service profiles by:
evaluating command parameters of respective processes running on the hosts by applying logistic regression to string vectors of the command parameters to calculate a probability of classifying a host into a particular service profile, and
based on the evaluation, classifying hosts that run similar processes as having a same service profile; and
a graphic generator that generates a graphic of the topology of the network based on the service profiles produced by the machine learning-based classifier.

US Pat. No. 10,693,749

SYNTHETIC DATA FOR DETERMINING HEALTH OF A NETWORK SECURITY SYSTEM

CISCO TECHNOLOGY, INC., ...

1. A computer-implemented method comprising:capturing network traffic data and associated data using at least a first sensor of a first virtual machine of a network, a second sensor of a first server hosting the first virtual machine, and a third sensor of a first networking device connected to the first server;
determining a pattern in the network traffic data and the associated data, the pattern associated with respective expected behavior for at least the first sensor, the second sensor, and the third sensor;
determining a plurality of selected nodes of the network for generating data corresponding to the pattern, the plurality of selected nodes including at least a second virtual machine of the network, a second server hosting the second virtual machine, and a second networking device connected to the second server, the second virtual machine executing a fourth sensor, the second server executing a fifth sensor, and the second networking device executing a sixth sensor;
causing each of the plurality of selected nodes to generate a respective portion of the data corresponding to the pattern; and
comparing respective actual behavior of the fourth sensor, the fifth sensor, and the sixth sensor to the respective expected behavior of the first sensor, the second sensor, and the third sensor.

US Pat. No. 10,693,748

ACTIVITY FEED SERVICE

Microsoft Technology Lice...

1. A method comprising:receiving a first activity stream associated with a particular user, the first activity stream including records of activities the particular user has engaged in within different applications executing on a first platform;
receiving a second activity stream associated with the particular user, the second activity stream including records of activities the particular user has engaged in within different applications executing on a second platform;
merging the first activity stream and the second activity stream to generate a merged activity stream associated with the particular user, the merged activity stream including records of the activities the particular user has engaged in within the different applications executing on the first platform and the different applications executing on the second platform; and
transmitting the merged activity stream associated with the particular user to the first platform,
wherein a record selection from among the records of the merged activity stream returns an application associated with the record to a state corresponding to the record.

US Pat. No. 10,693,747

CREATE AND PUBLISH A WEBSITE USING A HOSTING CUSTOMER VARIABLE

Go Daddy Operating Compan...

1. A method comprising the steps of:receiving by a website hosting provider a plurality of customer service voice communications from a corresponding plurality of hosting customers, wherein the website hosting provider comprises:
i) a communication center configured to receive the plurality of customer service voice communications from the plurality of hosting customers,
ii) a database configured to store the plurality of customer service voice communications,
iii) a website hosting server configured to host a plurality of websites for the plurality of hosting customers, and
iv) a machine learning algorithm,
wherein each hosting customer in the plurality of hosting customers is hosting a website in the plurality of websites with the website hosting provider and has a customer account with the website hosting provider;
storing by the website hosting provider the plurality of customer service voice communications in the database;
converting by the website hosting provider the plurality of customer service voice communications into a corresponding plurality of customer service text communications;
storing by the website hosting provider the plurality of customer service text communications in the database;
deriving by the website hosting provider a score for each customer service text communication in the plurality of customer service text communications based on an analysis of the customer service text communication;
deriving by the website hosting provider a topic for each customer service text communication in the plurality of customer service text communications based on an analysis of the customer service text communication;
deriving by the website hosting provider a plurality of hosting customer variables of the hosting customer for each customer service text communication in the plurality of customer service text communications, wherein at least one hosting customer variable in the plurality of hosting customer variables is entered by each of the corresponding plurality of hosting customers;
storing by the website hosting provider the score, the topic, the plurality of hosting customer variables for each customer service text communication in the plurality of customer service text communications in the database;
aggregating by the website hosting provider all of the customer service text communications in the plurality of customer service text communications that have a first derived topic into a first cluster;
aggregating by the website hosting provider all of the customer service text communications in the plurality of customer service text communications that have a second derived topic into a second cluster, wherein the first derived topic is different from the second derived topic;
determining by the website hosting provider a first plurality of hosting customer variables for a current hosting customer;
applying by the website hosting provider the machine learning algorithm to the first cluster of customer service text communications to determine an optimal set of questions based on the first plurality of hosting customer variables for the current hosting customer and the score for each customer service text communication in the first cluster of customer service text communications;
receiving by the website hosting provider a plurality of responses to the optimal set of questions from the current hosting customer;
transmitting by the website hosting provider a recommendation to the current hosting customer based on the plurality of responses from the current hosting customer;
creating by the website hosting provider a website of the current hosting customer on the website hosting server, wherein the website is created, at least in part, based on the recommendation to the current hosting customer using the at least one hosting customer variable entered by each hosting customer in the plurality of hosting customers; and
publishing by the website hosting provider the website of the current hosting customer on the website hosting server.

US Pat. No. 10,693,746

INSTRUMENTATION AND MONITORING OF SERVICE LEVEL AGREEMENT (SLA) AND SERVICE POLICY ENFORCEMENT

International Business Ma...

1. A method, comprising:correlating, within a runtime policy correlation data structure using a source policy reference key, source policy identification information that comprises at least a source policy identifier (ID) of a registry service policy with configured runtime policy enforcement processing rules and processing actions established during policy binding at a policy enforcement point (PEP) that cause the PEP to enforce runtime provisions of the registry service policy, wherein correlating within the runtime policy correlation data structure comprises:
compiling an abstract syntax tree (AST) representation of the registry service policy;
recursively traversing the AST representation to identify policy assertions within the AST representation of the registry service policy while adding PEP monitoring instrumentation that facilitates the per-transaction capture of the service policy enforcement information; and
mapping the identified policy assertions within the AST representation of the registry service policy to the source policy identification information within the runtime policy correlation data structure to facilitate the correlation of the captured per-transaction service policy enforcement information with the source policy identification information using the source policy reference key, wherein mapping the identified policy assertions within the AST representation of the registry service policy comprises:
creating the configured runtime policy enforcement processing rules and processing actions from the AST representation of the registry service policy; and
storing, during policy normalization to correlate the configured runtime policy enforcement processing rules and processing actions with the registry service policy, identifiers of the configured runtime policy enforcement processing rules and processing actions with the source policy identification information as an entry within the runtime policy correlation data structure, where the entry is indexed using the source policy reference key;
correlating, within a per-transaction service data table, captured per-transaction service policy enforcement information that documents which configured runtime policy enforcement activities are performed by the PEP on individual transactions with the source policy identification information using the source policy reference key; and
providing the correlated per-transaction service policy enforcement information of at least one transaction from the per-transaction service data table in response to a query from a policy monitoring point (PMP) for the correlated per-transaction service policy enforcement information of the at least one transaction.

US Pat. No. 10,693,745

DEFINING AND ENFORCING OPERATIONAL ASSOCIATIONS BETWEEN CONFIGURATION ITEM CLASSES IN MANAGED NETWORKS

ServiceNow, Inc., Santa ...

1. A method comprising:generating a graphical user interface (GUI) configured to display a plurality of configuration items, each of the plurality of configuration items having a respective configuration item class, wherein the plurality of configuration items comprises a first configuration item having a first configuration item class and a second configuration item having a second configuration item class, wherein the first configuration item class comprises a server class, a database class, or an email application class, wherein each of the first and second configuration item classes comprises a respective plurality of configuration items that perform similar functions;
receiving an input associating the first configuration item and the second configuration item;
retrieving, from a memory, in response to receiving the input, a valid relationship between the first configuration item and the second configuration item, wherein the valid relationship defines an operational association between the first configuration item class and the second configuration item class;
updating the graphical user interface to list the valid relationship as part of a selectable list in response to receiving the input, wherein the selectable list is configured to exclude invalid relationships between the first configuration item and the second configuration item;
receiving a selection of the valid relationship from the selectable list; and
updating the operational association between the first configuration item and the second configuration item to include the selected valid relationship in response to receiving the selection of the valid relationship from the selectable list.

US Pat. No. 10,693,744

NETWORK PROPERTY VERIFICATION

FUJITSU LIMITED, Kawasak...

1. A method, comprising:obtaining a plurality of packet handling rules from at least one firewall in a network and at least one routing table in the network;
translating the packet handling rules to one or more canonical data structures based on priority of rules at a given routing table or a given firewall, each canonical data structure representing a subset of packets affected by one or more corresponding packet handling rules such that each packet handling rule is covered by at least one canonical data structure;
generating a graph representation of the at least one firewall and at least one node corresponding to the at least one routing table in the network;
labeling a vertex in the graph representation with a first canonical data structure based on the first canonical data structure being associated with a first packet handling rule of the given firewall, the vertex in the graph representation corresponding to the given firewall;
labeling an edge in the graph representation with a second canonical data structure based on the second canonical data structure being associated with a second packet handling rule of the given routing table, the edge in the graph representation corresponding to the given routing table; and
using the graph representation, verifying one or more network properties to identify any network issues.

US Pat. No. 10,693,743

DISPLAYING INTERACTIVE TOPOLOGY MAPS OF CLOUD COMPUTING RESOURCES

Splunk Inc., San Francis...

1. A method, comprising:receiving performance data related to performance of a plurality of computing resources and relationship data related to relationships among the plurality of computing resources, wherein the plurality of computing resources are hosted by one or more cloud computing services, wherein the one or more cloud computing services enable access to the plurality of computing resources to users who subscribe to services provided by the one or more cloud computing services, wherein the users access the plurality of computing resources over a network,
wherein the performance data and relationship data are derivable from event data associated with the plurality of computing resources, and wherein each event of the event data includes raw machine data generated by a respective cloud computing resource;
generating, using the performance data and the relationship data, topology map data, the topology map data providing instructions for displaying the performance data and the relationship data; and
outputting the topology map data for display in a graphical user interface, wherein, upon receiving the topology map data, the graphical user interface uses the topology map data to display a topology map, the topology map including a plurality of nodes representing the plurality of computing resources and one or more edges between the plurality of nodes, the one or more edges representing the relationships among the plurality of computing resources, and wherein respective information from the performance data is displayed with each of the plurality of nodes.

US Pat. No. 10,693,742

INLINE VISUALIZATIONS OF METRICS RELATED TO CAPTURED NETWORK DATA

Splunk Inc., San Francis...

1. A method performed by a computer-implemented component of an event-processing system, the method comprising:obtaining, over one or more networks, a plurality of event streams generated by one or more remote capture agents, each event stream of the plurality of event streams including time-series event data generated by the one or more remote capture agents from network packets captured by the one or more remote capture agents;
executing at least one correlation search used to identify notable events in each event stream of the plurality of event streams;
for each event stream of the plurality of event streams, generating a respective time-series for a metric corresponding to a number of notable events identified in the event stream over time based on execution of the at least one correlation search; and
causing display of a graphical user interface (GUI) including, for each event stream of the plurality of event streams:
at least one first interface element displaying event stream information related to the event stream of the plurality of event streams, and
at least one second interface element displaying an event stream-specific graph of the respective time-series for the metric associated with the event stream.

US Pat. No. 10,693,741

NETWORK MONITORING SYSTEM, NETWORK MONITORING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM

KDDI CORPORATION, Tokyo ...

5. A network monitoring system in which at least one abnormality detection agent and an abnormality detection control apparatus monitor a virtual network function, whereinthe abnormality detection control apparatus includes:
a performance information database configured to accumulate performance information during normal operation for each virtual network function;
a calculation unit configured to acquire information needed for detecting an abnormality in a virtual network function, and predict performance information of a virtual network function that is to be newly provided and monitored; and
a control unit configured to generate, reconfigure, or delete an abnormality detection agent on any virtualization infrastructure on a network, and
the abnormality detection agent includes:
a collection unit configured to collect actual performance information on a virtual network function being monitored and on a virtualization infrastructure;
an abnormality determination rule designing unit configured to generate an abnormality determination rule that is to serve as a reference for determining whether or not actual performance information of a virtual network function on a virtualization infrastructure falls within an allowed range that is set based on the predicted performance information;
an analyzing unit configured to perform abnormality determination using the collected actual performance information and the generated abnormality determination rule; and
a notification unit configured to output an abnormality notification if the result of the determination is that there is an abnormality.

US Pat. No. 10,693,740

DATA TRANSFORMATION OF PERFORMANCE STATISTICS AND TICKET INFORMATION FOR NETWORK DEVICES FOR USE IN MACHINE LEARNING MODELS

Accenture Global Solution...

1. A device, comprising:one or more memories; and
one or more processors communicatively coupled to the one or more memories to:
obtain historical network data associated with a set of network devices,
the historical network data being associated with a first set of values that are in a format capable of being processed by one or more data models, and
the historical network data including at least one of:
historical network ticket information, or
historical performance statistics relating to the set of network devices;
determine a set of historical network performance indicators for one or more groups of network devices, of the set of network devices, by analyzing the historical network data;
train the one or more data models based on the set of historical network performance indicators;
receive, after training the one or more data models, new network data for one or more network devices of the set of network devices,
the new network data being received periodically over an interval and including at least one of:
network ticket information, or
performance statistics relating to the one or more network devices;
determine a set of other network performance indicators that are associated with the one or more network devices, of the set of network devices, by analyzing the new network data;
convert the set of other network performance indicators into a second set of values that are in the format capable of being processed by the one or more data models,
wherein the one or more processors, when converting the set of other network performance indicators into the second set of values, are to:
execute a data mining technique to identify, by analyzing information associated with a set of data sources, a set of threshold ranges of values,
 the set of threshold ranges of values being associated with a network performance indicator of the set of other network performance indicators;
compare the network performance indicator, of the set of other network performance indicators, to the set of threshold ranges of values; and
convert the network performance indicator to a value included in the second set of values based on a particular threshold range of values, of the set of threshold ranges of values, with which the network performance indicator is associated;
generate, based on the set of other network performance indicators and the one or more data models, one or more recommendations associated with improving network performance; and
perform, based on the one or more recommendations, one or more actions associated with improving network performance.

US Pat. No. 10,693,738

GENERATING DEVICE-LEVEL LOGICAL MODELS FOR A NETWORK

CISCO TECHNOLOGY, INC., ...

1. A method comprising:obtaining a logical model of a network, the logical model representing a configuration of objects and object properties defined for the network;
based on the logical model, generating a runtime logical model of the network, the runtime logical model comprising configuration data that can be interpreted or compiled by network devices in the network and used by the network devices to execute one or more network policies associated with the configuration data; and
based on the runtime logical model, generating, for each of one or more network devices in the network, a respective device-specific runtime logical model representing at least one of the logical model or the runtime logical model, the respective device-specific runtime logical model projecting the at least one of the logical model or the runtime logical model onto a respective one of the one or more network devices, the respective device-specific runtime logical model comprising configuration elements that can be interpreted or executed by a software of the respective one of the one or more network devices.

US Pat. No. 10,693,737

UNIVERSAL ALIAS AND DEPENDENCY MODELS AND NETWORK ANALYSIS

Charter Communications Op...

1. A method comprising:receiving data associated with a set of elements in a network;
assigning a unique identifier value to each respective element in the set;
receiving attribute information indicating different attributes pertinent to the set of elements; and
for each unique identifier value of multiple identifier values, via the received data, producing a corresponding set of encoded information indicating settings for the attributes indicated by the attribute information; the method further comprising:
combining the produced corresponding set of encoded information for each of the unique identifier values into an analytics data set defining the network in which the set of network elements reside; and
in response to receiving a command, deriving a network model from the analytics data set defining the network.

US Pat. No. 10,693,736

REAL TIME SIMULATION MONITORING

International Business Ma...

1. A method for monitoring from a second computer a simulation program running on a first computer, comprising:receiving, by the first computer, instructions to write simulation data describing a state of the simulation program to a user-defined socket associated with the first computer;
based on the instructions, continuously writing, by the first computer, the simulation data to the user-defined socket, wherein writing the simulation data proceeds at a high data rate of a total TO bandwidth such that it has no impact on timing and memory of the simulation program;
continuously capturing, by the second computer in a location different than a location of the first computer, the simulation data from the user-defined socket using an internet protocol, the capturing is performed in real-time while the simulation program streams the simulation data;
continuously analyzing, by the second computer, the captured simulation data using a user-defined streaming data software comprising a data management middleware operating on streaming data from different sources without interfering with the simulation program running on the first computer and without writing or reading from a disk, the second computer comprising an event controller module in communication with the first computer;
receiving, at the event controller module, a predefined criteria specified by a user of the first computer, the predefined criteria identifies events, results, and variable of interests for the user during execution of the simulation program;
based on the predefined criteria specified by the user of the first computer, identifying, by the event controller module, feedback data in the captured simulation data comprising at least one of the events, the results, or the variable of interests for the user;
sending, by the event controller module, the feedback data from the second computer to the first computer running the simulation program;
receiving, by the first computer, the feedback data;
based on the received feedback data, modifying in real-time at least one of a boundary condition, a simulation constant, or a time step size of the simulation program running on the first computer without stopping the execution of the simulation program, without changing the simulation code, and without reducing disk space;
sending, by the second computer, the analyzed simulation data to a storage device in a location different than the first computer and the second computer to maximize disk space; and
providing the analyzed simulation data from the storage device to at least one interested party or customer.

US Pat. No. 10,693,735

FABRIC MANAGEMENT DEVICES

HEWLETT PACKARD ENTERPRIS...

1. A fabric management device to manage a network fabric, the fabric management device comprising:a processing resource including at least one processor; and
a non-transitory machine-readable storage medium encoded with instructions executable by the processing resource, the non-transitory machine-readable storage medium comprising instructions to:
establish secure communication with one network device of a plurality of network devices via a fabric management device driver that is installed on the one network device;
discover a topology of the network fabric, wherein the network fabric comprises the plurality of network devices;
monitor one or more network performance metrics of the plurality of network devices;
based on the monitored one or more network performance metrics, detect a fabric fault of the network fabric; and
in response to the detected fabric fault, configure the network fabric by issuing an application program interface (API) call to the one network device, wherein the API call propagates through the network fabric to at least one of remove and replace one or more of the plurality of network devices associated with the fabric fault.

US Pat. No. 10,693,734

TRAFFIC PATTERN DETECTION AND PRESENTATION IN CONTAINER-BASED CLOUD COMPUTING ARCHITECTURE

VMWARE, INC., Palo Alto,...

1. A system, comprising:one or more processors configured to:
obtain a first set of traffic metrics pertaining to network traffic associated with a plurality of containers of a container-based cloud computing platform, wherein:
the plurality of containers support a plurality of microservices; and
a microservice has one or more corresponding microservice instances that execute in one or more of the plurality of containers;
transform the first set of traffic metrics into a second set of traffic metrics, the second set of traffic metrics comprising network traffic information pertaining to at least some of the plurality of microservices, the transformation being based at least in part on information pertaining to the plurality of containers and the plurality of microservices supported by the plurality of containers;
construct a microservice map based on the second set of traffic metrics; and
output the microservice map; and
one or more memories coupled to the one or more processors and configured to provide the one or more processors with instructions.

US Pat. No. 10,693,733

HORIZONTAL SCALING OF FABRIC NETWORKS

Cisco Technology, Inc., ...

1. A method comprising:establishing a fabric network comprising a plurality of border nodes and a plurality of edge nodes, wherein the plurality of border nodes are coupled to one or more external data networks via a first network layer, and wherein the plurality of edge nodes are coupled to one or more hosts via a second network layer, the second network layer being different than the first network layer, and wherein the plurality of border nodes are connected to the plurality of edge nodes via an underlay network;
partitioning the fabric network into a plurality of partitions, wherein each of the plurality of partitions of the fabric network comprises a border node of the plurality of border nodes, and wherein each of the plurality of partitions further comprises a network address and a control plane; and
registering each of the plurality of partitions with the border node of the plurality of border nodes and with each of the plurality of edge nodes.

US Pat. No. 10,693,732

TRANSFORMING DATA BASED ON A VIRTUAL TOPOLOGY

Oracle International Corp...

1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:receiving data to be transmitted to one or more destinations;
processing, by a first set of one or more components instantiated on a physical topology, the data to perform a set of one or more functions associated with the data;
wherein at least the first set of one or more components and a second component, not included in the first set of one or more components, are a plurality of distributed components instantiated on the physical topology that correspond to a third component of a virtual topology;
wherein the second component instantiated on the physical topology does not process the data to perform the set of one or more functions associated with the data;
subsequent to processing the data to perform the set of functions: modifying the data to emulate that the third component of the virtual topology performed the set of functions at least by:
determining an identifier of the third component of the virtual topology; and
including the identifier of the third component in the modified data as a source of the modified data; and
transmitting the modified data to the one or more destinations.

US Pat. No. 10,693,731

FLOW ENTRY MANAGEMENT METHOD AND DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. A flow entry management method implemented by a first switch in a flow entry management system, comprising:receiving, by the first switch, a management instruction from a first controller, the management instruction containing a first network protocol address of the first controller and a first match field of a first flow entry;
in response to receiving the management instruction, obtaining, by the first switch, a first management authority level of the first controller relative to the first switch by querying for the first management authority level based on the first network protocol address and according to a preset relationship, wherein the preset relationship indicates relationships between a plurality of management authority levels of controllers connected to the first switch and network protocol addresses of the controllers connected to the first switch;
in response to receiving the management instruction, obtaining, by the first switch, a first security level of the first flow entry by querying for the first security level of the first flow entry based on the first match field and according to a preset association relationship, wherein the preset association relationship indicates a security level of each flow entry and a match field of each flow entry, and wherein a plurality of security levels corresponding to different management instructions are respectively set for the first flow entry;
comparing, by the first switch, the first management authority level of the first controller relative to the first switch with the first security level of the first flow entry corresponding to the management instruction initiated by the first controller; and
performing, by the first switch, the management instruction on the first flow entry in response to determining that the first management authority level of the first controller relative to the first switch is not less than the first security level of the first flow entry corresponding to the management instruction.

US Pat. No. 10,693,730

COMMUNICATION QUALITY MANAGEMENT

International Business Ma...

1. A computer-implemented method for managing quality of a communication service for a user in a geographical space, the method comprising:obtaining a set of crowd movement information relating to the movement of individuals in a crowd within the geographical space;
obtaining a set of user activity information relating to one or more activities of interest to the user in the geographical space, the one or more activities including video streaming, social messaging, and picture uploads;
generating a bandwidth density model based on the obtained set of crowd movement information and the set of user activity information, the bandwidth model describing a variation of communication bandwidth density in the geographical space with respect to location and time;
determining, based on the bandwidth density model, quality of communication service parameters with respect to location for the geographical space, wherein quality of communication service parameters include bandwidth, connection speed, data rate, and contention ratio;
predicting, based on the bandwidth density model and the quality of communication service parameters, the user will perceive reduced quality of communication service at a current location of the user in the geographical space;
based on the quality of communication service parameters and the current location of the user in the geographical space, determining a target location in the geographical space for the user; and
instructing the user to move to the target location in the geographical space.

US Pat. No. 10,693,729

ACCELERATION OF NODE CONFIGURATION FOR TWAMP WITH A LARGE NUMBER OF TEST SESSIONS

Spirent Communications, I...

1. A method of reducing setup time of Two-Way Active Measurement Protocol (abbreviated TWAMP) control phase of the TWAMP protocol including:at a first network host, initializing an accept-port data structure for storing ports of transmitted request messages for two way (abbreviated TW) measurement sessions;
parsing a configuration file to populate the accept-port data structure, including proposed receiver ports for communication from a session-sender on the first network host to session-reflectors on other hosts;
repeatedly and in parallel, from a control client running on the first network host, communicating with receiving servers to set up pairwise test sessions between the session-sender and the session-reflectors using receiver port allocations from the accept-port data structure, for TW measurements that distinguish among the sessions, including transmitting a first message to a receiving server at the session-reflector, requesting the TW measurement session, wherein the first message includes the proposed receiver port at which to contact the session-reflector;
receiving and checking blocks of Accept-Session messages from the receiving server at the session-reflector and handling either case of acceptance of the proposed receiver port or of counter proposal of an alternate-and-available port,
wherein the counter proposal of the alternate-and-available port in a particular Accept-Session message includes an alternate-and-available port from the receiving server to be used for the TW measurement session, instead of the proposed receiver port, and
allocating the alternate-and-available port and updating the accept-port data structure by storing the alternate-and-available port received in the particular Accept-Session message; and
using the ports stored in the accept-port data structure to initiate TWAMP messages in the pairwise test sessions.

US Pat. No. 10,693,728

STORAGE ISOLATION DOMAINS FOR CONVERGED INFRASTRUCTURE INFORMATION HANDLING SYSTEMS

Dell Products L.P., Roun...

1. A storage management method, comprising:obtaining storage configuration information indicative of a configuration of a storage infrastructure of an information handling system;
determining, from the storage configuration information, one or more storage and isolation fault domains within the storage infrastructure, wherein each of the one or more storage and isolation fault domains comprises an independently available and physically isolated storage resource;
assigning storage and isolation fault domain (SIFD) values to each of the one or more storage and isolation fault domains, wherein the SIFD values identify storage and isolation fault domains associated with rack-level isolation, wherein a first storage volume associated with a first SIFD value is physically isolated, at a rack level, from a second storage volume associated with a second SIFD value; and
placing an application workload data store within the storage infrastructure in accordance with the SIFD values to comply with a physical isolation requirement applicable to the data store wherein the placing of the application workload data includes:
placing a first instance of a storage volume in a storage resource to which the first SIFD value has been assigned; and
placing a second instance of the storage volume in a storage resource to which the second SIFD value has been assigned, wherein the first instance and the second instance are physically isolated from one another at a rack level.

US Pat. No. 10,693,727

NON-INTRUSIVE DEVICE DISCOVERY AND CONFIGURATION CLONING

ZPE SYSTEMS, INC., Fremo...

1. A non-transitory tangible machine readable medium comprising instructions configured to cause at least one processor on at least one infrastructure management device to perform a process comprising:a) acquiring, by the infrastructure management device, IT device information for the at least one IT device from among a multitude of existing IT devices communicatively connected over a network;
b) determining, by the infrastructure management device, from the IT device information and additional IT device information from a device inventory stored in a Non-Volatile Memory of the infrastructure management device:
i) if there are any commonly executable commands;
ii) if there are any non-commonly executable commands; and
iii) if there are any feature gaps; and
c) creating, by the infrastructure management device, at least one IT device neutral user interface command comprising:
i) at least one of any of the determined commonly executable commands;
ii) at least one of any of the determined non-commonly executable commands; and
iii) combinations of at least one of the following configured to implement at least one of any of the determined feature gaps:
(1) at least one of any of the determined commonly executable commands;
(2) at least one of any of the determined non-commonly executable commands; and
(3) a gap filling process executable by the at least one infrastructure management device.

US Pat. No. 10,693,726

METHOD AND DEVICE FOR THE CONFIGURATION OF A TRANSMISSION LINK

Bayerische Motoren Werke ...

1. A method for data transmission at a transmitter-side data transmission unit, comprising the acts of:receiving at the transmitter-side data transmission unit a data transmission request for a data packet initiated by a real-time application operatively connected to the transmitter-side data transmission unit prior to initiating data transfer to a receiver-side data transmission unit;
transmitting from the transmitter-side data transmission unit a first portion of the data packet to the receiver-side data transmission unit via a communication channel;
receiving at the transmitter-side data transmission unit an availability indicator for the communication channel in the form of an availability code transmitted from the receiver-side data transmission unit, the availability indicator being determined by the receiver-side data transmission unit based on
parameters of the communication channel measured during the data packet first portion receiving act, and
estimated parameters of the communication channel for a portion of the data packet not yet transmitted from the transmitter-side data transmission unit to the receiver-side data transmission unit within an available remainder of a maximum permissible data transmission time; and
if the availability indicator indicates the communication channel is available,
configuring using the transmitter-side data transmission unit a portion of the data packet not yet transmitted for transmission within an available remainder of a maximum permissible data transmission time determined by the real-time application for the data packet, and
transmitting from the transmitter-side data transmission unit the portion of the data packet not yet transmitted to the receiver-side data transmission unit via the communication channel.

US Pat. No. 10,693,725

DYNAMICALLY RECONFIGURING DATA PLANE OF FORWARDING ELEMENT TO ACCOUNT FOR OPERATING TEMPERATURE

Barefoot Networks, Inc., ...

1. A data-plane forwarding system to process data tuples associated with data messages received by the data-plane forwarding system, the data-plane forwarding system for configuration by a control-plane circuit, the data-plane forwarding system comprising:a plurality of data processing stages to process the data tuples;
an idle-signal injecting circuit (i) to receive configuration data from the control-plane circuit, and (ii) based on the received configuration data, to generate idle signals for the data processing stages to put at least one stage that receives an idle signal in an idle state to reduce an operating temperature of the data-plane forwarding system, wherein an idle signal is to traverse through at least one data processing stage;
a parsing circuit to generate data tuples from the received data messages and to store the generated data tuples in a set of one or more storages; and
a data fetcher to retrieve the generated data tuples from the set of one or more storages and pass at least one retrieved data tuple through at least one of the plurality of data processing stages, wherein the data fetcher comprises the idle-signal injecting circuit and is to intersperse the idle signals among the data tuples passed through at least one of the data processing stages.

US Pat. No. 10,693,724

CONTEXT-SENSITIVE TECHNIQUES FOR OPTIMIZING NETWORK CONNECTIVITY

Amazon Technologies, Inc....

6. A system, comprising:at least one computing device that implements one or more services to at least:
in connection with a connection request by a client device to reach a destination, wherein the connection request specifies at least one network connection selection criteria, the network connection selection criteria indicating a request for a preferred network or a preferred connection type for a network configuration, generate the configuration that includes an identification, of a network among one or more networks that satisfies the-at least one network connection selection criteria for a connection associated with the connection request by processing:
a first set of information relating to the client device;
a second set of information relating to the destination, wherein the second set of information satisfies at least one connection selection criteria; and
a third set of information relating to the one or more networks capable of connecting the client device to the destination; and
cause the client device to be configured, in response to the connection request, with the generated configuration.

US Pat. No. 10,693,723

NETWORK UPGRADES

Hewlett Packard Enterpris...

1. A system comprising:a processing resource;
a computing device comprising instructions executable by the processing resource to:
determine an interval based on an amount of time to upgrade a network;
determine a series of time windows based on the interval;
analyze data traffic in the network over the series of time windows;
identify a subset of the series of time windows that are sequential and non-overlapping;
monitor the data traffic at each of a plurality of controllers making up a cluster of controllers;
record the monitored data traffic for a configurable monitoring period;
overwrite a portion of data traffic recorded at the beginning of the monitoring period with data traffic recorded immediately following the lapsing of the monitoring period;
select a particular time window from the subset of the series of time windows to perform an upgrade of the network based on the analyzed data traffic.

US Pat. No. 10,693,722

AGENTLESS METHOD TO BRING SOLUTION AND CLUSTER AWARENESS INTO INFRASTRUCTURE AND SUPPORT MANAGEMENT PORTALS

Dell Products L.P., Hopk...

1. A coordination point, comprising:a persistent storage comprising a distributed system map; and
a processor programmed to:
obtain role information associated with a plurality of computing devices from a plurality of validators without interacting with user resources of the plurality of computing devices, wherein the plurality of validators execute using computing resources separate from the user resources;
update the distributed system map using the obtain role information;
identify a portion of the plurality of computing devices as members of a functionality group using the updated distributed system map and
enforce a configuration, associated with the functionality group, on the user resources of each computing device of the portion of the plurality of computing devices.

US Pat. No. 10,693,721

METHODS FOR SERIAL PORT CLIENT SERVER MAPPING

Topaz Systems, Inc., Moo...

1. A method for a server to assign a com port to a peripheral device coupled to a client computer comprising;initiating a session in response to a request from a client;
receiving from the client information identifying the peripheral device;
calling on the server a driver for the identified peripheral device and assigning on the driver a fixed virtual port to the identified peripheral device;
assigning on the server a virtual com port in server space for the identified peripheral device;
automatically specifying on the server the virtual com port as the connection for the identified peripheral device; and
mapping on the server a variable com port to the peripheral device in server space.

US Pat. No. 10,693,720

DISTRIBUTION OF UPDATES IN AN IOT NETWORK

Cisco Technology, Inc., ...

1. A method, comprising:determining, by a computing device, a connectivity layout of a plurality of devices across an area;
grouping, by the computing device, the plurality of devices into one or more update clusters based at least on the connectivity layout;
dividing, by the computing device, update data into a plurality of update portions for a particular cluster of the one or more update clusters;
distributing, from the computing device, the plurality of update portions to a plurality of selected redistribution devices in the particular cluster, each redistribution device receiving one or more of the plurality of update portions; and
notifying, by the computing device, one or more of the plurality of devices in the particular cluster, for which the update data is applicable, of the plurality of selected redistribution devices along with which particular update portions are available from each of the plurality of selected redistribution devices, causing the one or more of the plurality of devices for which the update data is applicable to i) download needed update portions of the plurality of update portions from the redistribution devices, ii) combine all of the plurality of update portions into the update data, and iii) perform an update using the combined update data,
wherein the dividing of the update data into the plurality of update portions for the particular cluster comprises determining how to divide the update data based on one more characteristics of the plurality of devices selected from a group consisting of: bandwidth; resource usage; available memory; and available storage space.

US Pat. No. 10,693,719

CENTRALIZED CONTROLLING SYSTEM CONTROLLING INTERACTIONS AND COOPERATION BETWEEN RADIO-OPERATED DEVICES OPERATING IN A MESH NETWORK SUPPORTING MULTIPLE RADIO COMMUNICATION PROTOCOLS

VITIR AS, Drammen (NO)

1. A centrally controlled radio communication system comprising a mesh network constituted by a plurality of radio controlled bridges, wherein a respective bridge is wirelessly connected to a respective device, wherein the respective bridges comprises a first radio controlled communication port in communication with the mesh network, and a second radio controlled communication port in communication with at least one connectionless device, or at least one connection-oriented device, wherein the respective mesh network bridges is configured so as to provide distributed protocol translation of respective radio communication protocols between the respective first and second radio controlled ports of the bridges enabling communication of mesh data packets over the mesh network between different devices,wherein mesh data packets comprise a payload including a device identity of the device the payload originates from,
a central controlling unit CU, being connected in one point to the mesh network, is configured so as to receive and transmit mesh data packets to/from bridges in the mesh network, and is configured to execute a controlling software application program CSA,
wherein, when the CSA is receiving a mesh data packet via a radio controlled mesh network interface, the CSA is configured to execute a set of abstraction layers, thereby the content of the mesh data packet from the bridge is made available to the CSA,
the CSA is configured to use the device identity of the device the payload originates from to look up respective attributes stored in an interaction matrix IM, wherein at least one of the attributes is a device identity of at least one other device the device is configured to be allowed to communicate with,
and to use the device identity of the at least one other device to look up in the IM at least a bridge identity of the bridge in communication with the at least one other device,
and to look up further at least one attribute in IM defining allowed and not allowed interoperations between the devices,
wherein the CU is configured to execute allowed interoperations between respective devices,
wherein, dependent on the allowed interoperation between the devices, the CU is configured to transmit the received payload and/or commands in a mesh data packet to the bridge in communication with the at least one other device.

US Pat. No. 10,693,718

UPDATING MANAGEMENT INSTRUCTIONS FOR BOUND SERVICES IN A DISTRIBUTED NETWORK MANAGEMENT SYSTEM

Illumio, Inc., Sunnyvale...

1. A method for distributing rules that control communications between managed servers, the method comprising:obtaining service information for a managed server describing services provided by the managed server;
assigning respective label sets to the services provided by the managed server based on the obtained service information;
determining a dominant label set for the services that is assigned to a majority of the services provided by the managed server;
assigning the dominant label set to the managed server;
identifying a group of bound services of the set of services that have a differing label set from the dominant label set;
obtaining a policy comprising a plurality of rules for controlling the communications between the managed servers;
identifying a first rule of the plurality of rules for controlling communications to or from managed servers having the dominant label set;
identifying a second rule of the plurality of rules for controlling communications associated with services having the differing label set; and
distributing instructions to the managed server to enable the managed server to enforce the first rule and the second rule.

US Pat. No. 10,693,717

ASSISTED PORT IDENTIFICATION BY CONNECTION AN ACTIVATION DEVICE TO A PHYSICAL PORT AND DETECTING A STATE CHANGE FOR A PARTICULAR SOFTWARE VIRTUAL INTERFACE

1. A method to associate a set of physical ports on a device with a set of software virtual interfaces:the method comprising:
placing the set of software virtual interfaces to be associated with a set of N physical ports in an enabled state which has a first link state when no activation device is connected to a particular physical port and a second link state when an activation device is connected to the particular physical port;
connecting a first activation device to a first physical port selected by a user;
detecting a change of state from the first link state to the second link state for a first particular software virtual interface;
associating the first physical port with the first particular software virtual interface;
connecting an activation device to a second physical port selected by the user;
detecting a change of state from the first link state to the second link state for a second particular software virtual interface;
associating the second physical port with the second particular software virtual interface; and
connecting at least one piece of equipment to the first physical port for use with software to be run on the device in reliance of the previously determined association between the first physical port and the first particular software virtual interface.

US Pat. No. 10,693,716

BLOCKCHAIN BASED DEVICE MANAGEMENT

1. An apparatus, comprising:memory configured to store at least a portion of a blockchain ledger for managing a plurality of devices, wherein the blockchain ledger comprises a plurality of blocks, each block of the plurality of blocks comprises a plurality of transactions, and each transaction of the plurality of transactions is associated with one of the plurality of devices, and wherein each device of the plurality of devices is configured to exchange data over a cellular network;
a network interface configured to:
receive a first transaction from a computing server, wherein the first transaction comprises a unique identifier and configuration information for a selected device from the plurality of devices; and
receive a second transaction for the selected device, wherein the second transaction comprises a subscriber identity module number for the selected device from a Home Location Register or a Home Subscriber Server; and
a processor configured to execute instructions stored in the memory that, when executed by the processor, cause the processor to:
determine whether the computing server is authorized to issue the first transaction to update the blockchain ledger;
cause a first update to the blockchain ledger using the first transaction;
determine whether the Home Location Register or the Home Subscriber Server are authorized to issue the second transaction to update the blockchain ledger; and
cause a second update to the blockchain ledger using the second transaction.

US Pat. No. 10,693,715

DYNAMIC NETWORK ADDRESS SPACE ALLOCATION FOR VIRTUAL NETWORKS

Amazon Technologies, Inc....

1. A computer-implemented method comprising:receiving, via an application programming interface (API), a first request to configure an allocation rule to dynamically allocate a network address space for a virtual network implemented in a service provider system, wherein the allocation rule comprises a condition that is based on a current utilization of network addresses within the virtual network and further comprises an allocation factor that indicates how the network address space is to be changed when the condition is satisfied;
monitoring the current utilization of network addresses within the virtual network;
determining that the condition of the allocation rule is satisfied;
determining, based at least on the allocation factor, a new size for the network address space to be made available for the virtual network, wherein the network address space has an initial size that is smaller than the new size;
configuring the network address space of the virtual network to be of the new size, wherein prior to the configuring of the network address space to be of the new size the network address space comprises a first range of network addresses, and wherein after the configuring of the network address space to be of the new size the network address space comprises a second range of network addresses;
receiving, via the API, a second request that specifies at least one subnet for the virtual network that is to be configured within the second range of network addresses; and
configuring the at least one subnet in the virtual network.

US Pat. No. 10,693,714

COMMUNICATION METHOD FOR WI-FI INTERNET OF THINGS EQUIPMENT AND WI-FI INTERNET OF THINGS SYSTEM

ESPRESSIF SYSTEMS (SHANGH...

1. A Wi-Fi Internet of Things device communication method for a Wi-Fi Internet of Things master control device to transmit control information to Wi-Fi Internet of Things controlled devices, the method comprising steps of:performing pairing of the Wi-Fi Internet of Things master control device with the Wi-Fi Internet of Things controlled devices to obtain media access control addresses and encryption keys of each other;
encrypting the control information in a preset encryption manner, wherein the preset encryption manner includes:
application layer encryption, which includes encrypting the private information structure with an encryption key at an application layer; and
media access control layer encryption, which includes encrypting the at least one of the Wi-Fi unicast packet and the multicast packet at a media access control layer with an encryption key; and
transmitting, by the Wi-Fi Internet of Things master control device in a media access control layer non-connection mode without establishing a WiFi communication session, the encrypted control information to the Wi-Fi Internet of Things controlled devices, where the Wi-Fi Internet of Things master control device is paired with the Wi-Fi Internet of Things controlled devices, by loading a private information structure into at least one of a Wi-Fi unicast packet and a multicast packet.

US Pat. No. 10,693,713

METHOD AND APPARATUS FOR PROVIDING SERVICE COVERAGE WITH A MEASUREMENT-BASED DYNAMIC THRESHOLD ADJUSTMENT

1. A device, comprising:a processing system including a processor; and
a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising:
computing a first metric associated with a quality of an uplink between a user equipment and the device over a first network;
computing a second metric associated with the quality of the uplink subsequent to the computing of the first metric;
determining that there is a fault in the uplink; and
responsive to the determining, computing a difference between the first metric and the second metric to generate an offset that is obtained by the user equipment for reconnecting the user equipment and the device over the first network.

US Pat. No. 10,693,712

METHOD AND APPARATUS FOR CONTROL CHANNEL MONITORING BEHAVIOR IN A WIRELESS COMMUNICATION SYSTEM

ASUSTek Computer Inc., T...

1. A method for a user equipment (UE), comprising:at least one of receiving or monitoring a first control region via a first link, wherein the first control region is associated with a first configuration,
wherein the first control region is a control resource set (CORESET) configured for monitoring downlink control information,
wherein the downlink control information is indicative of at least one of one or more downlink assignments or one or more uplink grants;
determining a link failure associated with the first link;
responsive to determining the link failure, transmitting a failure recovery request;
responsive to transmitting the failure recovery request, at least one of receiving or monitoring a second control region via a second link,
wherein the second control region is associated with a second configuration;
receiving a response in the second control region; and
responsive to or after receiving the response, at least one of receiving or monitoring the second control region.

US Pat. No. 10,693,711

REAL-TIME EVENT CORRELATION IN INFORMATION NETWORKS

EMC IP Holding Company LL...

1. A method, comprising:performing, by a network management system, a network management process to provide automated event correlation analysis for an information network, wherein performing the network management process comprises:
obtaining, by the network management system, delta topology information, wherein the delta topology information specifies modifications to a previous topology of the information network;
generating, by the network management system, a modified topology of the information network based on the delta topology information;
utilizing, by the network management system, the delta topology information to generate a delta causality matrix, wherein the delta causality matrix comprises information which indicates a difference in one or more problem-symptom relationships included in a causality matrix that is associated with constituent objects in the previous topology of the information network;
utilizing, by the network management system, the delta causality matrix to modify at least one context which comprises a first set of related symptoms and problems associated with the constituent objects in the previous topology of the information network, such that the modified context comprises a second set of related symptoms and problems associated with constituent objects of the modified topology of the information network;
performing, by the network management system, an event correlation operation utilizing the modified context and a set of current symptoms detected in the modified topology of the information network, to determine at least one problem within the modified topology of the information network which has a symptom signature that corresponds to the set of current symptoms, wherein performing the event correlation operation comprises (i) distributing the event correlation operation over a plurality of nodes to perform a plurality of context analysis operations, at least in part in parallel, using separate, independent contexts, and (ii) aggregating results of the plurality of context analysis operations to determine the at least one problem which has the symptom signature that corresponds to the set of current symptoms; and
performing, by the network management system, at least one automated action to correct the at least one determined problem in the information network.

US Pat. No. 10,693,710

CORRELATION ENGINE COMPRISING ROOT CAUSE AND SERVICE IMPACT ANALYSES

Hewlett Packard Enterpris...

1. A method comprising:providing a correlation engine comprising a stack of at least two event analysis blocks, each event analysis block comprising at least:
a root cause analysis module to:
receive on input an event notification; and
supply on output a root cause analysis result; and
a service analysis module to:
receive on input the root cause analysis result from the root cause analysis module of the block; and
supply, on output, a service impact analysis result;
coupling each of the at least two event analysis blocks to a different network section of a telecommunications network to supply at least one event notification upon detection of an event relating to each respective network section coupled to a respective event analysis block;
configuring the root cause analysis module and the service analysis module of each of the at least two event analysis blocks to:
analyze an event notification received from at least one of the coupled network sections; and
provide a root cause analysis result and a service impact analysis result; and
configuring the at least two event analysis blocks such that at least one of the root cause analysis result and/or the service impact analysis result supplied by a first event analysis block is provided on input to a second event analysis block.

US Pat. No. 10,693,709

PROCESSING GAP EVENTS IN A CHANGE DETECTION MANAGEMENT SYSTEM

salesforce.com, inc., Sa...

1. A method for data change detection at a data store, comprising:identifying a change detection stream that detects changes to data stored at the data store, and transmits the changes to a downstream system;
detecting a gap event having a duration where at least a portion of the changes being transmitted to the downstream system are missing from the change detection stream;
generating a gap event identification message based at least in part on detecting the gap event, the gap event identification message indicating the gap event to the downstream system, and comprising metadata associated with the gap event; and
transmitting the gap event identification message to the downstream system.

US Pat. No. 10,693,708

DEFINING CONFIGURABLE CHARACTERISTICS OF A PRODUCT AND ASSOCIATING CONFIGURATION WITH ENTERPRISE RESOURCES

ORACLE INTERNATIONAL CORP...

1. A computer-controlled method of registering an application, comprising:an administrator indicating a type of platform;
the administrator providing information about the application;
a web services manager (WSM) Console registering at least one port hosted by the application based at least in part on the information about the application, wherein the registering includes:
providing a module name and associated web service definition language (WSDL) file if WSDL is available; and
providing a module name, a client name, and a port name if WSDL is not available;
a storage device saving the registered application;
a WSM metadata repository storing the registered application as a document;
an exportRepository mechanism migrating the registered application from a first environment to a second environment; and
modifying the registered application, wherein the modifying includes using a Common Audit Framework.

US Pat. No. 10,693,707

SYSTEM FOR DECOMPOSING EVENTS FROM MANAGED INFRASTRUCTURES WITH SEMANTIC CLUSTERING

Moogsoft Inc., San Franc...

1. A system for decomposing events from a managed infrastructure,comprising:
one or more processors:
a memory including instructions that when executed by the one or more processors executes the following:
a first engine receiving data from a managed infrastructure that includes managed infrastructure physical hardware which supports the flow and processing of information; a second engine coupled to the first engine determining common characteristics of events and produces clusters of events relating to the failure of errors in the managed infrastructure, where membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information, and producing events that relate to the managed infrastructure while converting the events into words and subsets used to group the events that relate to failures or errors in the managed infrastructure, including the managed infrastructure physical hardware; and
a semantic clustering engine coupled to the first and second engines taking text from an event source, manipulates the text to produce a feature vector for each of an event, and the feature vector is feed into a clustering engine, with semantic clustering looking at text description of events, analyses the words in the text description, and groups them with other events when there is significant overlap; and
wherein a change to a managed infrastructure physical hardware component is made on the semantic clustering.

US Pat. No. 10,693,706

METHOD AND APPARATUS OF PERFORMING SIMULTANEOUS MULTI-AGENT ACCESS FOR COMMAND EXECUTION THROUGH A SINGLE CLIENT

KASEYA LIMITED, Dublin (...

1. A method, comprising:establishing a connection to a server;
identifying at least two agent identifiers identifying at least two agents corresponding to at least two endpoint devices to manage;
establishing a session between a session client and the at least two endpoint devices; and
transmitting a single command from the session client to the at least two agents of the at least two endpoint devices.

US Pat. No. 10,693,705

SHOW COMMAND SERVICE AKA CLI RELAY

Arista Networks, Inc., S...

1. A method for processing a command request (CRQ) to obtain a consolidated command response (CMR), comprising:receiving an event notification from a notification issuer;
obtaining, in response to the received event notification, a modified command request (MCRQ) based on the CRQ from a network device state database, the MCRQ comprising a relay command and an output filter set, wherein the output filter set comprises fewer output filter expressions than the CRQ;
executing, by a network device, the relay command to obtain a command output, wherein the command output comprises state information of the network device;
making a first determination that the output filter set is not an empty set;
based on the first determination:
extracting an output filter expression and a second output filter expression from the output filter set;
applying, to the command output, the output filter expression to obtain a filter expression result (FER), wherein the FER is a subset of the command output;
applying, to the command output, the second output filter expression to obtain a second FER, wherein the second FER is a second subset of the command output, wherein the second subset of the command output is different than the subset of the command output;
generating the CMR based on the FER and the second FER;
making a second determination that the CMR includes a difference from a previously generated CMR; and
sharing, based on the second determination, the CMR with a coordination point.

US Pat. No. 10,693,704

DYNAMIC ALLOCATION OF SERVICE COMPONENTS OF INFORMATION SERVICE IN HIERARCHICAL TELECOMMUNICATION ARCHITECTURE

B.yond, Inc., Frisco, TX...

1. A method for providing an information service in a network, comprising:determining allocation of service components of the information service to resources of a first plurality of computing devices that are hierarchically structured;
sending first instructions causing the first plurality of computing devices to deploy and execute service components allocated to the first plurality of computing devices to provide the information service;
detecting, after deploying the service components to the first plurality of computing devices according to the first instructions, an update event comprising an indication of a level of resources in one or more of the first plurality of computing devices dropping below a threshold level;
automatically updating the allocation of the service components to resources of a second plurality of computing devices that are hierarchically structured, responsive to detecting the update event, wherein the second plurality of computing devices does not include the one or more of the first plurality of computing devices with the level of resources dropping below the threshold level; and
sending second instructions causing the second plurality of computing devices to deploy and execute service components allocated to each of the second plurality of computing devices to provide the information service.

US Pat. No. 10,693,703

DISPLAYING CONTENT ITEMS BASED ON DEVICE STATUS

Google LLC, Mountain Vie...

1. A computer-implemented method to present content items on user devices, comprising:by one or more computing devices:
configuring an application to present content items on a user interface of a user computing device;
identifying an opportunity to serve a particular content item;
determining that a usage status of the application indicates that a user of the application is not actively engaged with the application;
upon determining that the user of the application is not actively engaged, obtaining the particular content item;
receiving, from the user computing device, one or more statuses associated with the user computing device;
weighting the one or more received statuses associated with the user computing device;
adjusting the particular content item based on the one or more weighted statuses; and
presenting the adjusted particular content item on the user interface of the user computing device.

US Pat. No. 10,693,702

DATA TRANSMISSION METHOD AND DEVICE USING NON-UNIFORM APSK CONSTELLATIONS

1. A method for transmitting and receiving a digital data stream over a communication channel, wherein the method comprises the following steps:a) at a transmitting node, modulating the digital data stream onto a carrier wave to generate a modulated signal, the modulating including converting digital data in the digital data stream into symbols for transmission, the symbols being encoded into one of M possible symbols of an M-ary signal constellation, the symbols of said M-ary signal constellation being distributed on a plurality of concentric circles
b) at the transmitting node, transmitting the modulated signal over said communication channel;
c) at a receiving node, receiving said modulated signal;
d) at the receiving node, detecting each symbol of said received modulated signal;
characterized in that
said M-ary signal constellation is such that there exists a corresponding M-ary quadrature amplitude modulation (QAM) signal constellation having an equal plurality of concentric squares, wherein a symbol of said M-ary signal constellation, distributed on a corresponding one of the plurality of concentric circles bijectively maps to a corresponding symbol of said corresponding M-ary QAM signal constellation distributed on a corresponding one of the plurality of concentric squares, and wherein
said step of detecting each symbol comprises the step of
i) detecting each symbol in the modulated signal using the characteristics of the corresponding M-ary QAM signal constellation.

US Pat. No. 10,693,701

RECEIVER, A PLURALITY OF TRANSMITTERS, A METHOD OF RECEIVING USER DATA FROM MULTIPLE TRANSMITTERS, AND A METHOD OF TRANSMITTING USER DATA

Alcatel Lucent, Nozay (F...

1. A method of receiving user data from multiple transmitters, the user data from each transmitter having been encoded as a Low Density Lattice codeword, and multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising:(i) receiving the combined signal,
(ii) calculating coefficients of linear combinations of the Low Density Lattice codewords from the multiple transmitters,
(iii) calculating a scaling factor to be applied to the combined signal based on the coefficients,
(iv) scaling the combined signal with the scaling factor to provide a linear combination of the Low Density Lattice codewords,
(v) decoding the linear combination of the Low Density Lattice codewords based on channel state information to obtain an optimal independent linear combination of user data,
(vi) repeating the calculating coefficients, calculating a scaling factor, scaling and decoding to obtain at least as many optimal independent linear combinations as the number of transmitters, and
recovering the user data from the optimal independent linear combinations;
wherein the calculation of the scaling factor comprises applying a minimum mean square error (MMSE) criterion to minimize variance of effective noise by determining the scaling factor according to a coefficient vector determined by maximizing a virtual rate of the linear combinations of the Low Density Lattice codewords.

US Pat. No. 10,693,700

RECEIVERS INCORPORATING NON-UNIFORM MULTIDIMENSIONAL CONSTELLATIONS AND CODE RATE PAIRS

Constellation Designs, LL...

1. A communication system, comprising:a receiver capable of receiving signals via a communication channel having a channel signal-to-noise ratio (SNR), wherein the receiver comprises:
a demodulator capable of demodulating a received signal into a demodulated signal;
a demapper, coupled to the demodulator, capable of determining likelihoods using the demodulated signal and a multidimensional symbol constellation selected from a plurality of multidimensional symbol constellations; and
a decoder, coupled to the demapper, capable of using the likelihoods determined by the demapper to provide a sequence of received bits based upon a low density parity check (LDPC) code;
wherein the plurality of multidimensional symbol constellations comprises a plurality of different non-uniform multidimensional symbol constellations having the same number of constellation points, where the constellation points are non-uniformly spaced in each degree of freedom available to the multidimensional symbol constellations;
wherein the receiver is capable of selecting an LDPC code rate and multidimensional symbol constellation pair from a plurality of predetermined LDPC code rate and multidimensional symbol constellation pairs, where each of the plurality of different non-uniform multidimensional symbol constellations is only included in one of the plurality of predetermined LDPC code rate and multidimensional symbol constellation pairs.

US Pat. No. 10,693,699

METHOD AND TERMINAL FOR TRANSMITTING SYNCHRONIZATION SIGNAL IN V2X COMMUNICATION

LG ELECTRONICS INC., Seo...

1. A method of transmitting a synchronization signal by a user equipment (UE) for vehicle-to-something (V2X) communication in a wireless communication system, the method comprising:configuring one of a first UE type and a second UE type, based on a power capability of the UE;
transmitting the synchronization signal based on a first period when the UE is configured to the first UE type; and
transmitting the synchronization signal within a window on a time axis based on a number of times of message reception, when the UE is configured to the second UE type,
wherein the first UE type is for a UE contained in a vehicle,
wherein the second UE type is for a handheld UE,
wherein the synchronization signal of the UE configured to the second UE type is transmitted when the number of times of the message reception is a multiple of a predetermined value configured by higher layer signaling, and
wherein when a plurality of UEs including the UE are configured to the second UE type and to transmit a synchronization signal, each synchronization signal of the plurality of UEs is alternately transmitted.

US Pat. No. 10,693,698

TECHNIQUES FOR CARRIER SHARING BETWEEN RADIO ACCESS TECHNOLOGIES

QUALCOMM Incorporated, S...

1. A method for wireless communication, comprising:receiving a combined signal that includes signals of a first radio access technology (RAT) and signals of a second RAT that are frequency domain multiplexed in a same subframe;
identifying a first transmit (Tx) direct current (DC) location corresponding to the signals of the first RAT;
identifying a second Tx DC location corresponding to the signals of the second RAT;
selecting one of the first Tx DC location or the second Tx DC location as a common receive (Rx) DC location;
performing a common Rx fast Fourier transform (FFT) on the combined signal based on the common Rx DC location;
decoding the signals of the first RAT and the signals of the second RAT based on an output of the common Rx FFT, wherein the decoding comprises separating the output of the common Rx FFT into resource blocks (RBs) associated with the first RAT and RBs associated with the second RAT; and
processing either the RBs associated with the first RAT or the RBs associated with the second RAT by applying a respective complex phase compensation value to each tone in either the RBs associated with the first RAT or the RBs associated with the second RAT.

US Pat. No. 10,693,697

APPARATUS AND METHOD FOR REDUCING PEAK TO AVERAGE RATIO IN WIRELESS COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A method for operating a transmission device in a wireless communication system, the method comprising:detecting a first peak and a second peak of an original signal;
generating, based on a complex gain of the first peak of the original signal, a first portion of a first cancelling pulse for attenuating the first peak;
storing coefficients corresponding to the first portion of the first cancelling pulse in an order;
generating a second portion of the first cancelling pulse by outputting the stored coefficients in a reverse order with respect to the order, during a process in which coefficients corresponding to a first portion of a second cancelling pulse for attenuating the second peak are stored; and
generating a transmission signal by applying the first cancelling pulse and the second cancelling pulse to the original signal.

US Pat. No. 10,693,696

APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING SIGNALS IN WIRELESS COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A signal transmission method of a transmitting apparatus in a wireless communication system, the method comprising:determining a plurality of phases for a plurality of frequency band units in a component carrier (CC);
applying the determined plurality of phases to signals generated for the plurality of frequency band units; and
transmitting the signals,
wherein each of the determined plurality of phases is applied to a signal of a corresponding frequency band unit among the plurality of frequency band units, and
wherein each of the plurality of frequency band unit is a resource element group (REG) unit in an arbitrary CC.

US Pat. No. 10,693,695

PEAK TO AVERAGE POWER RATIO SUPPRESSION

MAXLINEAR, INC., Carlsba...

1. A system comprising:a first peak-to-average-power ratio (PAPR) suppression circuit, a second peak-to-average-power ratio (PAPR) suppression circuit, and a first carrier aggregation modulator, said first PAPR suppression circuit comprising a plurality of second modulators,
wherein:
said first PAPR suppression circuit is operable to:
receive a first sequence of time-domain symbols to be transmitted;
alter said first sequence to generate a plurality of second sequences of time-domain symbols;
measure a PAPR corresponding to each of said second sequences; and
convey information related to at least a portion of said measurement to said second PAPR suppression circuit;
said second PAPR suppression circuit is operable to:
receive said first sequence of time-domain symbols to be transmitted; and
alter said first sequence based on said conveyed information to generate a third symbol sequence;
said first carrier aggregation modulator is operable to modulate said third symbol sequence; and
said plurality of second modulators is operable to perform same operations as said first modulator using lower resolution than said first modulator.

US Pat. No. 10,693,694

METHOD AND APPARATUS FOR OBTAINING REFERENCE SIGNAL

Huawei Technologies Co., ...

1. A method, comprising:obtaining, by a terminal device, position offset information, wherein the position offset information comprises a first position and a first offset, wherein the first position is a quantity of physical resource blocks by which a smallest subcarrier within a bandwidth comprising a control channel resource set is offset from a frequency domain reference point, and wherein the first offset is a quantity of physical resource blocks by which a smallest subcarrier in the control channel resource set is offset from the smallest subcarrier within the bandwidth comprising the control channel resource set;
obtaining, by the terminal device, a demodulation reference signal sequence based on the position offset information, wherein the demodulation reference signal sequence is a subset of a reference signal sequence; and
demodulating, by the terminal device, by using the demodulation reference signal sequence, a control channel signal carried in the control channel resource set, to obtain downlink control information.

US Pat. No. 10,693,693

SCATTERED PILOT PATTERN AND CHANNEL ESTIMATION METHOD FOR MIMO-OFDM SYSTEMS

BlackBerry Limited, Wate...

1. A method of receiving symbols using Orthogonal Frequency Division Multiplexing (OFDM) frames at an OFDM receiver having a plurality of processing paths to receive OFDM signals, the OFDM frames having a time domain and a frequency domain, each of the OFDM frames comprising a plurality of OFDM symbols in the time domain and a plurality of sub-carriers in the frequency domain, the method comprising the steps of:for a first processing path of the OFDM receiver, receiving scattered pilot symbols in a scattered pattern in time-frequency by receiving a first set of pilot symbols in a first pattern in time-frequency and receiving a second set of pilot symbols in a second pattern in time-frequency at same frequencies as the first pattern, offset by one OFDM symbol in the time domain; and
for a second processing path of the OFDM receiver, receiving scattered pilot symbols using the scattered pattern.

US Pat. No. 10,693,692

RECEIVER-SIDE PROCESSING OF ORTHOGONAL TIME FREQUENCY SPACE MODULATED SIGNALS

Cohere Technologies, Inc....

1. A wireless communication method, implemented by a wireless communication receiver, comprising:processing a wireless signal comprising information bits modulated using an orthogonal time frequency and space (OTFS) modulation scheme to generate time-frequency domain digital samples;
performing linear equalization of the time-frequency domain digital samples resulting in an equalized signal; and
inputting the equalized signal to a feedback filter operated in a delay-time domain to produce a decision feedback equalizer (DFE) output signal;
extracting symbol estimates from the DFE output signal; and
recovering the information bits from the symbol estimates;
wherein the processing the wireless signal includes applying a two-dimensional transform to generate the time-frequency domain digital samples;
wherein the applying the two-dimensional transform comprises a discrete Symplectic Fourier transform or applying a two-dimensional windowing function over a grid in the time-frequency domain.

US Pat. No. 10,693,691

REFERENCE SIGNAL RESOURCE LOCATION TECHNIQUES IN WIRELESS COMMUNICATIONS

QUALCOMM Incorporated, S...

1. A method for wireless communication at a user equipment (UE), comprising:identifying, for at least a first slot of a plurality of slots, a first beamforming parameter for receiving a reference signal in the first slot, the first beamforming parameter identified from a plurality of different beamforming parameters based at least in part on a location of the first slot;
receiving a control signal that indicates a presence of the reference signal in the first slot; and
receiving the reference signal in the first slot of the plurality of slots based at least in part on the control signal and the first beamforming parameter.

US Pat. No. 10,693,690

DATA SYMBOL TRANSMISSION METHOD AND WIRELESS DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. A wireless device operating as a first wireless device, comprising:a processor configured to:
determine a location at which hardware switching needs to be performed in a current subframe and switching time of the hardware switching,
configure, according to the switching time, a first guard period for a first data symbol corresponding to the location, wherein a length of the first guard period is greater than or equal to that of the switching time, and
use, as a second data symbol, a data symbol in the subframe other than the first data symbol, and configure a second guard period for the second data symbol, and in response to determining that the length of the first guard period is shorter than a length of a second guard period, configure the length of the first guard period to be identical to the second guard period, and
a transmitter configured to send the subframe to a second wireless device;
wherein the first wireless device is a base station, and the second wireless device is a terminal; or, the first wireless device is a terminal, and the second wireless device is a base station.

US Pat. No. 10,693,689

ENHANCED CLEAR CHANNEL ASSESSMENT

Newracom, Inc., Lake For...

1. A wireless device for facilitating spatial reuse in a first wireless network, the wireless device comprising:one or more memories; and
one or more processors coupled to the one or more memories, the one or more processors configured to:
process a first frame and a second frame of a frame exchange between a first station and a second station, wherein the first frame and second frame are associated with a second wireless network, and wherein the second frame is responsive to the first frame;
determine a second frame signal measurement of the second frame; and
determine a status of a communication medium associated with the wireless device, based on a comparison of the second frame signal measurement to an overlapping basic service set (OBSS) threshold,
wherein when the second frame signal measurement exceeds the OBSS threshold, the one or more processors are configured to determine that the status of the communication medium is busy.