US Pat. No. 11,115,324

SYSTEM AND METHOD FOR PERFORMING SEGMENT ROUTING OVER AN MPLS NETWORK

NOKIA SOLUTIONS NETWORKS ...


1. A method for controlling packet routing in a network, comprising:identifying segment identifications (IDs) for a number of switches;
arranging a first number of the segment IDs into a first field of a packet, wherein the first field is a first multi-protocol label switching (MPLS) label field that is M bits in length, each of the segment IDs being represented by N bits in length and identifying an output port of a respective one of the number of switches located along a network path between a source node and a destination node, and M is greater than a cumulative sum of respective Ns for the first quantity of segment IDs; and
padding the first MPLS label field with one or more predetermined values for bits unoccupied by the segment IDs.

US Pat. No. 11,115,323

SECURING LAYER-3 VIRTUAL PRIVATE NETWORK

Saudi Arabian Oil Company...


1. A computer-implemented method performed by an edge router, comprising:receiving, a data packet from a sub-virtual routing and forwarding (sub-VRF) in a virtual routing and forwarding (VRF), wherein the VRF represents an Layer-3 Virtual Private Network (L3VPN), the VRF includes more than one sub-VRF, the sub-VRF comprises a plurality of user devices, the VRF is included in a network that comprises multiple VRFs, and a different Border Gateway Protocol (BGP) attribute is assigned to each sub-VRF in the VRF;
detecting, a second value in a Border Gateway Protocol (BGP) attribute attached to the data packet, wherein the BGP attribute attached to the data packet comprises a first value and the second value, the first value identifies the network that includes the multiple VRFs, and the second value identifies that the data packet is a unicast data packet and a source sub-VRF of the data packet or a multicast data packet; and
determining, based on the second value in the BGP attribute, whether to route the data packet to a different sub-VRF in the VRF.

US Pat. No. 11,115,322

STATEFUL NETWORK ROUTER FOR MANAGING NETWORK APPLIANCES

Amazon Technologies, Inc....


1. A system, comprising:a first virtual private network comprising at least one gateway and at least one machine instance and operated by a first entity using one or more resources provided by a second entity under a utility computing model;
a plurality of network appliances on a second network, the plurality of network appliances being operated by the second entity as a service to the first entity under the utility computing model;
a stateful network router that routes data from the first virtual private network to and from the plurality of network appliances, wherein inbound traffic flows from the at least one gateway to the at least one machine instance are distributed by the stateful network router among individual network appliances of the plurality of network appliances, and outbound traffic flows from the at least one machine instance to the at least one gateway are distributed by the stateful network router to respective network appliances of the plurality of network appliances that processed the inbound traffic flows corresponding to the outbound traffic flows; and
a network appliance scaling service executed in at least one computing device, the network appliance scaling service configured to at least:receive network utilization metrics from the first virtual private network;
receive utilization information from the plurality of network appliances; and
dynamically scale a quantity of the plurality of network appliances allocated to process the data from the first virtual private network based at least in part on the network utilization metrics and the utilization information.


US Pat. No. 11,115,321

DYNAMIC ROUTING APPARATUS AND METHOD FOR CAN MESSAGE OF VEHICLE

HYUNDAI AUTRON CO., LTD.,...


1. A dynamic routing device for a Controller Area Network (CAN) message of a vehicle, the device comprising:a message reception unit configured to receive a message of a specific ID transmitted from a source controller and a designated specific message from at least one destination controller;
a message reception filter configured to dynamically change based on at least one piece of information included in the specific message; and
a gateway controller including the message reception unit and the message reception filter, wherein the gateway controller is configured to generate dynamic routing table information based on information about the specific message, check reception of a message with respect to only a message ID set to the message reception filter, and perform message routing on a destination controller designated in the dynamic routing table,
wherein the gateway controller is configured to dynamically change a setting for message routing according a current state of the destination controller,
wherein the designated specific message received from the destination controller comprises:
a first specific message in which the destination controller requests or does not request the gateway controller for routing with respect to the specific ID; and
a second specific message periodically transmitted to the gateway controller while the destination controller is in an operating state, and
wherein the gateway controller is configured to:when the second specific message is received, increase a destination count by 1 for each of a plurality of consecutively received second specific messages with respect to the message ID corresponding to the destination controller in the dynamic routing table, and maintain the destination count;
when the second specific message is not received and timeout occurs, decrease the destination count by 1 with respect to the message ID corresponding to the destination controller; and
when the destination count of the message ID is changed from 1 to 0 through the decrease of the destination count, not perform routing with respect to the message ID.


US Pat. No. 11,115,320

ROUTING IN COMMUNICATION NETWORKS

Telefonaktiebolaget LM Er...


1. A method performed by a node configured for use in a communication network, the method comprising:obtaining a message with a source address and a destination address;
determining whether the message is a type of message that is sent in response to a different message routed from the destination address to the source address, and whether a forward route from the destination address to the source address has been established; and
selectively transmitting the message on a backward route that is the reverse of the forward route, depending on the determining,
wherein the forward route is established by a first protocol layer of the node, and wherein a second protocol layer of the node that is lower than the first protocol layer determines whether to transmit the message on the backward route.

US Pat. No. 11,115,319

USING BFD PACKETS IN A NETWORK TUNNEL ENVIRONMENT

Hewlett Packard Enterpris...


1. A method comprising:requesting, at a first network device, a Bidirectional Forwarding Detection (BFD) session with a second network device, wherein the BFD session has a corresponding BFD session key;
determining, by the first network device, that the BFD session is for single hop data;
determining, by the first network device, that the BFD session is over a network tunnel from the first network device to the second network device;
initiating the BFD session between the first and second network devices, wherein the BFD session is shared between multiple clients requesting BFD sessions on a network tunnel, but is not shared between tunneled and non-tunneled sessions between the multiple clients;
initiating no more than one BFD session in memory for each BFD session key whenever multiple protocols are monitoring a same layer 3 network path;
transmitting, the single hop data to the second network device via the network tunnel, wherein the network tunnel traverses a multiple hop network path; and
disabling echo packets for the BFD session.

US Pat. No. 11,115,318

OPTICAL NETWORK CONTROL DEVICES AND OPTICAL PATH SETTING METHOD

NEC CORPORATION, Tokyo (...


15. An optical path setting method comprising:setting, based on topology information including a connection relationship among a plurality of nodes and a first route selection index value of routes each connecting the plurality of nodes, a first path for a route having the first route selection index value being minimum from among route candidates linking a start point node and an end point node of a requested traffic;
calculating a second route selection index value acquired by increasing the first route selection index value of the route that accommodates the first path;
selecting a second path for a route having the second route selection index value being minimum from among the route candidates; and
calculating the second route selection index value by executing any one of linear summing of a transmission line quality value being communication quality specific to the route and an optical path specific value being a numerical value previously set for each of the first path, multiplication of the transmission line quality value and the optical path specific value, and replacement of the transmission line quality value with the optical path specific value.

US Pat. No. 11,115,317

EMS ASSISTED SPLIT-BRAIN RESOLUTION IN VIRTUAL NETWORK FUNCTION COMPONENTS

OPEN INVENTION NETWORK LL...


1. A system, comprising:a server hosting an element management system (EMS) controlling a fault handling process for one or more virtual network function component instances (VNFCI); and
the one or more VNFCIs including a VNFCI and a peer VNFCI, wherein the VNFCI is in an Active operational state, and the system is configured to:
receive, from the peer VNFCI, a heartbeat message indicating that the peer VNFCI is in an Active operational state;
send, by the VNFCI, a heartbeat message to the peer VNFCI indicating that the VNFCI is in the Active operational state;
construct and send, by the VNFCI, a next state request message to the EMS, the next state request message including a parameter indicating a current operational state of the VNFCI and a parameter indicating a split-brain condition;
start, by the VNFCI, a response timer;
when the VNFCI receives a next state response message from the EMS and a VNFCI response state of the VNFCI indicated by the next state response message is an Active operational state, send, by the VNFCI, a second heartbeat message to the peer VNFCI indicating that the VNFCI is in the Active operational state and that the VNFCI has a desired operational state of Active;
when the VNFCI receives the next state response message from the EMS and the VNFCI response state indicated by the next state response message is Standby, transition the VNFCI to a Deactivating state;
when the response timer expires without receiving the next state response message from the EMS, and the VNFCI is not a preferred Standby instance, send, by the VNFCI, the second heartbeat message to the peer VNFCI indicating that the VNFCI is in the Active operational state and that the VNFCI has the desired operational state of Active; and
when the response timer expires without receiving the next state response message from the EMS, and the VNFCI is the preferred Standby instance, transition the VNFCI to the Deactivating state.

US Pat. No. 11,115,316

LEARNING ORPHAN PORTS IN A MULTI-CHASSIS LINK AGGREGATION GROUP

Arista Networks, Inc., S...


1. A method in a switching device, the method comprising:receiving incoming network data on an ingress port of the switching device, wherein the incoming network data specifies a virtual local area network identifier (VLAN ID);
generating outgoing network data for transmission to a next hop, including:obtaining forwarding information from one or more mapping tables using the VLAN ID contained in the incoming network data and the ingress port as index keys into the one or more mapping tables to identify the forwarding information, wherein the ingress port and the VLAN ID map to first forwarding information that includes a first source address associated with the switching device when the ingress port is a first kind of port is a first kind of port, wherein the ingress port and the VLAN ID map to second forwarding information that includes a second source address associated with the switching device when the ingress port is a second kind of port; and
combining the incoming network data with the forwarding information to generate the outgoing network data; and

sending the outgoing network data to the next hop on an egress port of the switching device.

US Pat. No. 11,115,315

DUPLICATION TRANSMISSION METHOD AND DEVICE

CHINA ACADEMY OF TELECOMM...


1. A duplication transmission method, comprising:determining, by a Central Unit, CU, that Packet Data Convergence Protocol, PDCP, duplication transmission needs to be performed on a radio bearer;
sending, by the CU, a PDCP data packet to be transmitted on the radio bearer to a Distribute Unit, DU, and instructing the DU to perform the PDCP duplication transmission;
wherein sending, by the CU, the PDCP data packet to be transmitted on the radio bearer to the DU, and instructing the DU to perform the PDCP duplication transmission, comprises:
if the radio bearer is a Signaling Radio Bearer, SRB, then sending, by the CU, the PDCP data packet to be transmitted on the SRB to the DU through F1 control plane, and instructing the DU to perform the PDCP duplication transmission through an Information Element, IE, in a corresponding F1 interface message; or
if the radio bearer is a Data Radio Bearer, DRB, then sending, by the CU, the PDCP data packet to be transmitted on the DRB to the DU through F1 user plane, and instructing the DU to perform the PDCP duplication transmission in a corresponding data packet header of user plane.

US Pat. No. 11,115,314

ESTABLISHING ENTRY CORRESPONDING TO EQUAL COST PATHS

New H3C Technologies Co.,...


1. A method of establishing an entry corresponding to equal cost paths, comprising:establishing, by a network device, a Forward Information DataBase (FIB) entry, wherein the FIB entry comprises the number of Unequal Cost Multipath (UCMP) entries in a UCMP table corresponding to N paths configured to be equal cost with each other between the network device and a destination network device, and an address of the destination network device, wherein the number of the UCMP entries in the UCMP table is equal to a preset fixed value, and N is an integer more than or equal to 2; and
assigning, by the network device, at least one UCMP entry for each of the N paths based on respective weights of the paths and the fixed value, wherein the at least one UCMP entry corresponding to the path respectively comprises index information corresponding to the path, a sum of the numbers of the respective UCMP entries corresponding to the N paths is equal to the fixed value,
wherein assigning the at least one UCMP entry for each of the N paths based on the respective weights of the paths and the fixed value comprises:determining, by the network device, for each of the N paths, a first numerical value T of the path by multiplying the fixed value by the weight of the path to obtain a product and rounding down the product divided by a total weight, wherein the total weight is a sum of the respective weights of the N paths;
determining, by the network device, that a second numerical value D is equal to a difference between the fixed value and a sum of the respective first numerical values T of the N paths;
when the second numerical value D is equal to zero,determining, by the network device, for each of the paths, the first numerical value T of the path to be the number of the at least one UCMP entry corresponding to the path;

when the second numerical value D is more than zero,sorting, by the network device, the N paths based on the respective weights of the N paths,
determining, by the network device, for each of first D paths in the sorted N paths, the first numerical value T of the path plus 1 to be the number of the at least one UCMP entry of the path,
determining, by the network device, for each of remaining paths in the sorted N paths, the first numerical value T of the path to be the number of the at least one UCMP entry of the path.



US Pat. No. 11,115,313

ANALYSIS OF TRANSMISSION CHARACTERISTICS IN A VOICE-OVER-IP NETWORK

8x8, Inc., Campbell, CA ...


1. A non-transitory computer-readable medium including computer-executable instructions which, in response to being executed, cause a first computer process circuitry and a second computer process circuitry to perform a method comprising:the first computer process circuitry communicating VoIP-packets between upstream and downstream computer process circuitry in a network during a VoIP communication session, and including and sending a set of metadata with at least one of the VoIP-packets downstream in the network, the set of metadata including both audio and video;
the second computer process circuitryreceiving, from the first computer process circuitry, the set of metadata with said at least one of the VoIP-packets, and
sending a response packet upstream relative to the first computer process circuitry with data indicative of a latency-transmission characteristic relative to the set of metadata sent downstream by the first computer process circuitry,

a network pathway assessment circuit, in response to the response packet, deriving the latency-transmission characteristic and a communication-quality characteristic indicating a likelihood said at least one of the VoIP packets may be dropped based on a packet loss count detected at the second computer process circuitry, responding to the VoIP-packets communicated along a pathway between the first computer process circuitry and the second computer process circuitry; and
the first computer process circuitry dynamically adjusting selection of one of a plurality of relay servers for relaying the set of metadata through the network in real time during the VoIP communication session based on a plurality of transmission characteristics, wherein each of the plurality of relay servers is to communicate at least one of the VoIP packets in response to receiving said at least one of the VoIP packets from an upstream node in the network along a path via a downstream node in the network.

US Pat. No. 11,115,312

FILE CONTROL FOR DATA PACKET ROUTERS USING CONSENSUS AND INTER-PLANETARY FILE SYSTEM (IPFS)

Sprint Communications Com...


1. A method of operating a data packet router using an Inter-Planetary File System (IPFS), the method comprising:routing circuitry of the data packet router routing initial data packets based on an initial networking file;
the routing circuitry modifying the initial networking file to modify at least one parameter impacting at least one route for routing data to generate a modified networking file and transferring the modified networking file to control circuitry of the data packet router;
the control circuitry generating a new IPFS object from the modified networking file, obtaining a current consensus on the new IPFS object from neighbor control circuitries of neighbor data packet routers by verifying the modified networking file, transmitting a consensus request to each of the neighbor control circuitries, and receiving, in response to the consensus request, a consensus approval from each of the neighbor control circuitries indicating verification of the modified networking file, and responsive to the current consensus, transferring an approval for the modified networking file to the routing circuitry; and
the routing circuitry receiving the approval and responsively routing additional data packets based on the modified networking file.

US Pat. No. 11,115,311

DATA TUNNELING FOR TESTING EQUIPMENT IN ELECTRIC POWER SYSTEM

Schweitzer Engineering La...


1. A system to communicate test data in a test configuration in an electric power system, the system comprising:a remote unit, comprising:a monitored equipment interface to receive information representative of a condition in the electric power system from a test set;
a first test data port to communicate test data through a data tunnel in the test configuration; and
a first communication subsystem to:generate a stream of data packets comprising information from the monitored equipment interface and information from the first test data port to be routed through the data tunnel; and
transmit the stream of data packets; and


a protection system, comprising:a second communication subsystem to:
receive the stream of data packets from the first communication subsystem; and
separate information from the monitored equipment interface and information from the test data routed through the data tunnel.


US Pat. No. 11,115,310

MULTI-LEVEL DATA CHANNEL AND INSPECTION ARCHITECTURES HAVING DATA PIPES IN PARALLEL CONNECTIONS

Bank of America Corporati...


1. A method for inspecting a data stream, said method comprising:conveying the data stream through a multi-level data channel and inspection architecture, said architecture comprising a multi-level data pipeline, said pipeline comprises a plurality of pipes arranged in a serial connection such that each output of one pipe of the plurality of pipes provides an input to a successive one of the plurality of pipes, the conveying further comprising:receiving the data stream at an upstream portion of the pipeline;
inspecting, data in the data stream, the inspecting data for converting the data stream into inspected data; and
outputting inspected data at a downstream portion of the pipeline:

wherein:each of the plurality of pipes is configured to inspect the data on a different level of data channel inspection than any of the other of the plurality of pipes, each level of data channel inspection having individual data attribute and/or metadata extracting capabilities; and
each of the plurality of pipes is configured to transfer data packets at greater than or equal to a threshold data transfer rate; and
wherein the plurality of pipes is formed from complementary pairs of pipes, each of a complimentary pair is configured to carry a component of the data stream which compliments the other pipe of the pair; and
each of the plurality of pipes are configured to transfer data packets at a level of data security that is different from the level of data security of a remainder of the plurality of pipes.


US Pat. No. 11,115,309

EXTERNAL NETWORK ROUTE ADVERTISEMENT VALIDATION

Amazon Technologies, Inc....


1. A method of validating Internet Protocol (IP) prefix announcements, the method comprising:establishing a Border Gateway Protocol (BGP) peering session between an edge router of a source network and a network device of a neighboring external network;
transmitting a BGP update packet from the edge router to the network device, the BGP update packet including an announcement of an IP prefix associated with a range of IP addresses in the source network;
transmitting a probe packet from the edge router to the network device, the probe packet including a source IP address field, a destination IP address field identifying a destination IP address having the announced IP prefix, and a time-to-live (TTL) field having a value that causes the probe packet to expire before reaching the destination IP address, wherein the destination IP address is within the source network where the edge router is located; and
monitoring incoming packets received at the edge router to detect whether the probe packet has returned to the edge router, including, for a given incoming packet, comparing a value of a specified field of the probe packet to a value of a corresponding field of the incoming packet and detecting that the probe packet has returned to the edge router if the values match.

US Pat. No. 11,115,308

SYSTEM AND METHOD FOR CONGESTION CONTROL USING TIME DIFFERENCE CONGESTION NOTIFICATION

ALIBABA GROUP HOLDING LIM...


1. A computer-implemented method for controlling congestion in a network, the method comprising:sending, by a source device, a first data packet to a destination device;
receiving, at the source device, a first acknowledgement packet from the destination device corresponding to the first data packet;
extracting, from the first acknowledgement packet, a first pair of timestamp values which includes a first time stamp value generated by the source device when the source device sends the first data packet and a second timestamp value generated by the destination device when the destination device receives the first data packet;
extracting, from a second acknowledgement packet corresponding to a subsequently transmitted packet to the destination device, a second pair of time stamp values which include a third time stamp value generated by the source device when the source device sends the subsequent packet and a fourth time stamp value generated by the destination device when the destination device receives the subsequent packet;
determining a degree of congestion by:calculating a first difference between the first time stamp value and the third time stamp value;
calculating a second difference between the second time stamp value and the fourth time stamp value; and
calculating, based on the first difference and the second difference, a third difference; and

controlling congestion in the network based on the degree of congestion.

US Pat. No. 11,115,307

SYSTEMS AND METHODS FOR CHANGING THE FREQUENCY OF MONITORING DATA

PISMO LABS TECHNOLOGY LIM...


1. A mobile device, comprising:at least one processing unit;
at least one main memory;
a plurality of network interfaces; and
at least one secondary non-transitory computer-readable storage medium for storing program instructions executable by the at least one processing unit for:(a) receiving a trigger; wherein the trigger is based on receiving a notification through a first tunnel from a monitoring server; wherein the notification comprises an Internet Protocol (IP) header, a request for a data field, an instruction, and an authentication information field;
(b) confirming whether an authenticity is required; and if the authenticity is required, verifying the authenticity;
(c) preparing, based on one or more measurements, the monitoring data according to the request for the data field; and
(d) sending the monitoring through a second tunnel data to the monitoring server; wherein:the mobile device is configured to be in a bandwidth-saving mode or not according to the instruction;
the first tunnel and the second tunnel are established respectively through a first network interface and a second network interface in the plurality of network interfaces; and
the first tunnel and the second tunnel are bonded together to form an aggregated connection.



US Pat. No. 11,115,306

TRANSMISSION DEVICE, AVAILABLE BANDWIDTH ESTIMATION DEVICE, AVAILABLE BANDWIDTH ESTIMATION SYSTEM, METHOD, AND RECORDING MEDIUM

NEC CORPORATION, Tokyo (...


1. A transmission device comprising one or more memories storing instructions and one or more processors configured to execute the instructions to:transmit estimation packets, a packet size of each of which successively increases, to an available bandwidth estimation device at equal intervals; and
stop the transmission of the estimation packets when receiving a signal indicating that a reception interval between the estimation packets at the available bandwidth estimation device starts to increase, wherein
the one or more processors configured to execute the instructions to determine that the response interval between the response packets starts to increase, when the response interval between the received response packet and the response packet received last is greater than the response interval between the response packet received second to last and the response packet received last.

US Pat. No. 11,115,305

MOBILE RADIO NETWORK NODE AND METHOD FOR ESTIMATING A CAPACITY OF A LINK IN A RADIO COMMUNICATIONS NETWORK


1. A mobile radio network node for estimating the capacity of a radio communications network, the mobile radio network node comprising:a radio interface configured to exchange data wirelessly via the radio communications network,
a processor,
and a memory containing instructions executable by the processor whereby the mobile radio network node is operative to:
send echo request messages via a link in the radio communications network to a defined end-point node, and
estimate the capacity of the link in the radio communications network based on return messages generated in response to the echo request messages, which return messages originate from the defined end-point node, wherein the echo request messages comprise first and second test messages, where the first test message includes a first amount of data, and the second test message includes a second amount of data exceeding the first amount of data;
perform a measuring step, wherein the capacity of the link in the radio communications network is estimated based on an amount of residue data corresponding to a difference between the second and first amounts of data, and a difference between first and second time intervals, where the first time interval is the time elapsed between sending the first test message and receiving a first return message in response thereto, and the second time interval is the time elapsed between sending the second test message and receiving a second return message response thereto;
repeat the measuring step a number of times; and
perform an averaging operation over said number of times to determine an estimated average throughput as:




and determine an estimated maximum throughput as:





where: D is the amount of residue data,MSG1RTTMIN is a shortest round-trip time for the first test message M1 and the first return message R1 over said number of times,
MSG2RTTAVG is an average round-trip time for the second test message M2 and the second return message R2 over said number of times, and
MSG2RTTMIN is a shortest round-trip time for the second test message M2 and the second return message R2 during said number of times.

US Pat. No. 11,115,304

TRANSFER DEVICE AND FRAME TRANSFER METHOD

MITSUBISHI ELECTRIC CORPO...


1. A transfer device comprising:a calculation processing circuit to calculate a first code that is a frame check sequence code of a received frame;
a first comparison processing circuit to compare the first code with a second code that is a frame check sequence code stored in the received frame, and to output a first comparison result indicating a match or no match between two codes compared with each other;
a second comparison processing circuit to compare the first code with a third code obtained by inverting each bit of the second code, and to output a second comparison result indicating a match or no match between two codes compared with each other;
an error determination processing circuit to determine an error state of the received frame on a basis of the first comparison result and the second comparison result; and
an update processing circuit to update, if the second comparison result indicates no match, the second code with a fourth code obtained by inverting each bit of the first code at a time when the received frame is transferred to a subsequent device.

US Pat. No. 11,115,303

NETWORK CONNECTABLE DEVICE AND A METHOD FOR MONITORING A SERVICE-STATE OF A NETWORK CONNECTED DEVICE

GENESYS ELECTRONICS DESIG...


1. A network connectable device configured to:generate a registration message comprising service-monitoring protocol information for use by a service-state monitor, the service-monitoring protocol information defining at least one operational parameter of a service-monitoring protocol operable to determine operability of the network connectable device, the service monitoring protocol comprising sending to the service-state monitor a plurality of service-state messages in accordance with the at least one operational parameter, each of the plurality of service-state messages and the operational parameter being capable of being used by the service-state monitor to determine whether the network connectable device is operative;
send to the service-state monitor via a network connection the registration message; and
send to the service-state monitor via the network connection the plurality of service-state messages, in accordance with the at least one operation parameter for the service-monitoring protocol.

US Pat. No. 11,115,302

SELF-SERVICE METRIC PUBLICATION IN A COMPUTER NETWORK

Amazon Technologies, Inc....


1. A computer-implemented method comprising:receiving, at a metrics publication service of a service provider network, one or more messages indicating a request to create a publication of a metric value associated with one or computer systems within the service provider network, the request indicating a query provided by a user specifying how to obtain data, a formula indicating how to generate the metric value based at least in part on a result of the query, a destination identifier that identifies a destination where the metric value is to be sent, and a publication schedule indicating when the metric value is to be published;
generating a publication definition in a first data store, the publication definition identifying a publication identifier, the query, the destination identifier, and the publication schedule;
sending, by a scheduling process to a publishing process, a first message according to the publication schedule, the first message including the publication identifier;
retrieving the query and the destination identifier from the first data store based on the publication identifier;
sending a request to perform the query on a second data store having performance data from a first computer system;
receiving a response to the query from the second data store;
generating, by the publishing process, the metric value based at least in part on the response and the formula; and
sending, by the publishing process, a second message to the destination, the second message including the metric value.

US Pat. No. 11,115,301

PRESENTING REALIZED STATE OF MULTI-SITE LOGICAL NETWORK

VMWARE, INC., Palo Alto,...


1. A method for collecting data regarding realized state associated with a logical network spanning a plurality of physical sites, the method comprising:at a global manager that manages the logical network:receiving a request to collect realized state for a set of one or more logical network elements, each of which spans a set of two or more physical sites of the plurality of physical sites spanned by the logical network, each physical site managed by a local manager;
for each logical network element of the set of one or more logical network elements, identifying the set of two or more physical sites spanned by the logical network elements;
for each logical network element of the set of one or more logical network elements, sending requests fora realized state of the logical network element to each local manager of each identified physical site spanned by the logical network element; and
providing a report for display, the report comprising the realized states received from the local managers of the identified sets of two or more physical sites spanned by the set of one or more logical network elements.


US Pat. No. 11,115,300

ANOMALY DETECTION AND REPORTING IN A NETWORK ASSURANCE APPLIANCE

Cisco Technology, Inc, S...


1. A method comprising:sorting network events based on values of parameters of a network environment defining the network events;
identifying event states of the network events;
determining a confidence score that at least one of the values is associated with at least one event state of the event states and includes at least a frequency that the associated network event has the at least one event state;
monitoring the confidence score to detect an anomaly in the network environment;
in response to detecting the anomaly, identifying a relevant network state of the network environment by gathering characteristics of a relevant portion of the network environment at a specific time frame when the anomaly occurred in the network environment; and
presenting relevant network state and the anomaly in the network environment.

US Pat. No. 11,115,299

SYNTHETIC RESOURCE RECORDS

Google LLC, Mountain Vie...


1. A computer-implemented method comprising:providing an interface for editing a synthetic resource record for a web application associated with an Internet domain, wherein the synthetic resource record corresponds to a logical group of resources records and includes domain name system (DNS) information for the Internet domain or a subdomain;
receiving, through the interface, information indicating a change to a configuration of the web application for the Internet domain;
sending a service specification defined for the web application to at least one of a configuration server or at least one web application associated with the synthetic resource record;
updating, with one or more processors, the logical group of resource records based on the received information; and
sending the updates to a DNS server.

US Pat. No. 11,115,298

DIGITAL INTELLECTUAL CAPITAL-BASED SERVICE ASSURANCE FOR INTENT-BASED NETWORKING

CISCO TECHNOLOGY, INC., ...


1. A method comprising:decomposing a service to be supported in a network into a plurality of subservices;
obtaining service pre-conditions associated with each of the plurality of subservices, the service pre-conditions specifying one or more paths of one or more nodes in the network used for the service, one or more networking functions to be used in the network, and attributes of the one or more nodes used for the service;
providing a plurality of digital intellectual capital (IC) modules, each digital IC module being configured to detect one or more specific operational issues in the network;
providing signature pre-condition logic that specifies one or more conditions that indicate relevancy of one or more digital IC modules; and
for each of the plurality of subservices:selecting, from the plurality of digital IC modules, based on the service pre-conditions and the signature pre-condition logic, one or more particular digital IC modules that are applicable to the service in the network;
determining information to be obtained from one or more nodes in the network based on the one or more particular digital IC modules;
obtaining the information from the one or more nodes in the network; and
analyzing the information obtained from the one or more nodes in the network to determine whether or not the one or more specific operational issues associated with the one or more particular digital IC modules, are present in the network for the service.


US Pat. No. 11,115,297

HIGHLY PROBABLE IDENTIFICATION OF RELATED MESSAGES USING SPARSE HASH FUNCTION SETS

LUMINOUS CYBER CORP., Sa...


1. A computer-implemented method performed by an observation point including a processor, comprising:observing, by the processor, a plurality of packets traversing a network at the observation point, wherein each packet of the plurality of packets comprises a plurality of variant fields and a plurality of invariant fields;
selecting, by the processor, a subset of the plurality of invariant fields;
computing, by the processor, a sparse hash function value over the selected subset of the plurality of invariant fields for each packet;
recording each sparse hash function value, at the observation point, for each of the plurality of packets;
associating, by the processor, metadata with the sparse hash function value for each packet; and
transmitting, by the observation point, the sparse hash function value and the associated metadata to a network analytics system.

US Pat. No. 11,115,296

CONTROL UNIT FOR DISPLAYING A LOAD OF A NETWORKING CABLE

International Business Ma...


1. A device for displaying a network load of a networking cable, the device comprising:a microcontroller operably connected to a networking cable, wherein the microcontroller is configured to perform a method comprising:requesting the network load of the networking cable from a monitoring circuit;
receiving the network load of the networking cable from the monitoring circuit; and
instructing a visual indicator to display the network load of the networking cable, wherein the visual indicator is an RGB LED that includes an optical fiber embedded beneath a transparent panel of an outer sheath that runs along a length of the networking cable.


US Pat. No. 11,115,295

METHODS AND SYSTEMS FOR ONLINE MONITORING USING A VARIABLE DATA

BAKER HUGHES, A GE COMPAN...


1. A method comprising:acquiring data characterizing a data set, the data acquired using a first sampling rate, wherein acquiring data characterizing the data set includes sampling a plurality of data sets at a plurality of sampling rates, where a sampling rate for each data set is determined using distinct prime-factorization used to schedule each data set sampling at a distinct point in time;
determining a change in a state of a physical environment based on the data set, the change determined by applying condition assessment rules to the data set; and
providing a second sampling rate, the second sampling rate provided as an update of the first sampling rate.

US Pat. No. 11,115,294

AUTOMATIC DYNAMIC DETERMINATION OF DATA TRAFFIC SAMPLING POLICY IN A NETWORK VISIBILITY APPLIANCE

Gigamon Inc., Santa Clar...


1. A method comprising:receiving, by a network appliance, a first plurality of flows communicated on a network during a first time period, each said flow including a series of packets between a source and a destination within a same transport connection, the network appliance being configured to forward packets selectively to a tool that is external to the network appliance;
ascertaining an expected value of a characteristic of data traffic associated with the network for a second time period that is after the first time period, by examining packets of the first plurality of flows;
dynamically determining, by the network appliance, a sampling policy for use in determining a forwarding of flows from the network appliance to the tool, based on the ascertained expected value of the characteristic of the data traffic, without user input specifying the sampling policy;
receiving, by the network appliance, a second plurality of flows communicated on the network during the second time period; and
using the determined sampling policy, by the network appliance, to select flows of the second plurality of flows to be forwarded to the tool.

US Pat. No. 11,115,293

NETWORKED PROGRAMMABLE LOGIC SERVICE PROVIDER

Amazon Technologies, Inc....


1. A system hosting a network service providing field programmable gate array (FPGA) services, the system comprising:a programmable logic service provider configured to:receive, via a computer network, a request to program application logic into an FPGA,
responsive to receiving the request, allocate a configurable hardware computing instance for the FPGA,
produce configuration information for programming the application logic into only a portion of reconfigurable logic of the FPGA, and
send the configuration information to the allocated configurable hardware computing instance; and

a computing host allocated by the programmable logic service provider to host the allocated configurable hardware computing instance, the computing host comprising:memory,
a processor configured to execute computer-executable instructions stored in the memory,
an FPGA service process configured to control configuration of an interface to the FPGA, and

the FPGA, wherein the portion of reconfigurable logic of the FPGA is configured to be programmed by the FPGA service process using the configuration information.

US Pat. No. 11,115,292

DYNAMIC SLICE BANDWIDTH MULTIPLEXING BASED ON SLICE PRIORITY

VMWARE, Inc., Palo Alto,...


1. A method for slice-based quality of service (“QoS”), comprising:creating a network connection between first and second slice multiplexers at different clouds;
determining that a first slice is utilizing less bandwidth across the network connection than allotted by a service level agreement (“SLA”);
based on the determination, reconfiguring a first slice multiplexer to increase an allowed bandwidth of a second slice and decrease an allowed bandwidth of the first slice, wherein the increase and decrease is based on relative slice priority levels of the first and second slices;
comparing a current bandwidth of the network connection to a total allowed bandwidth, wherein the current bandwidth accounts for the first and second slices; and
based on the comparison, changing the total allowed bandwidth of the network connection by setting limits at the first and second slice multiplexers, wherein the slice priority levels of the first and second slices is factored into determining the changed total allowed bandwidth.

US Pat. No. 11,115,291

CONFIGURING AN APPLIANCE USING INTENT-BASED INFORMATION OF A NETWORK

CISCO TECHNOLOGY, INC., ...


1. A method comprising:generating a graphical user interface comprising a graphical representation of network ports of an internetworking device and a text area prompting input of current network environment information;
receiving a first input specifying the current network environment information for a network to which the internetworking device is to be connected;
determining that the first input specifying the current network environment information specifies a dedicated internet access and a dedicated management network;
deriving, in response to determining that the first input specifying the current network environment information does not specify the dedicated internet access and the dedicated management network, a set of network configuration values to configure a first network port on the internetworking device for each of an enterprise network connection, a management network, and an internet access, the set of network configuration values being based on the first input specifying the current network environment information, wherein deriving the set of network configuration values to configure the first network port on the internetworking device comprises:determining physical link requirements for each of the enterprise network connection, the management network, and the internet access from the first input specifying the current network environment information,
selecting the first network port from a plurality of network ports on the internetworking device that satisfy the physical link requirements, and
deriving the set of network configuration values to configure the first network port for each of the enterprise network connection, the management network, and the internet access based on the first input specifying the current network environment information;

displaying, in the graphical user interface, a graphical representation of the first network port and the set of network configuration values corresponding to the first network port on the internetworking device; and
in response to input confirming the set of network configuration values for the first network port, transmitting configuration data to the internetworking device resulting in configuring the first network port of the internetworking device using the set of network configuration values.

US Pat. No. 11,115,290

NETWORK MONITORING OF TIME SYNCHRONIZATION PROTOCOLS USING CONVOLUTIONAL NEURAL NETWORKS

United States of America ...


1. A device for monitoring an integrity of a communication network comprising:a local clock for maintaining a local time;
a network interface for receiving from the communication network a plurality of data packets including a plurality of time synchronization packets, the network interface adapted to associate each of the time synchronization packets received from the communication network with the local time of receipt at the network interface; and
a processing system adapted to implement a neural network for classifying whether or not the integrity of the communication network is compromised in response to originate, receive, and transmit values determined from the time synchronization packets, which include a plurality of request packets and a plurality of reply packets, with a plurality of bidirectional message exchanges each including a respective one of the request packets and one of the reply packets replying to the respective one of the request packets,
wherein the originate value for each of the bidirectional message exchanges is a difference between the local time of the receipt of the request packet in the bidirectional message exchange and a transmission timestamp of the request packet as measured by a sending device,
wherein the receive value for each of the bidirectional message exchanges is a difference between a reception timestamp of the request packet or the reply packet in the bidirectional message exchange as measured by a receiving device and the local time of the receipt of the request packet or the reply packet,
wherein the transmit value for each of the bidirectional message exchanges is a difference between the local time of the receipt of the reply packet in the bidirectional message exchange and a transmission timestamp of the reply packet as measured by another sending device.

US Pat. No. 11,115,289

SYSTEMS AND METHODS FOR NETWORK SECURITY MODEL

Cable Television Laborato...


1. A security apparatus for a local network, the apparatus being in communication with an external electronic communication system and a first electronic device, comprising:a memory device configured to store computer-executable instructions; and
a processor in operable communication with the memory device,
wherein the processor is configured to implement the stored computer-executable instructions to cause the apparatus to:determine a complexity score for the first electronic device;
establish a behavioral pattern for the first electronic device operating within the local network;
calculate a confidence metric for the first electronic device based on the determined complexity score and the established behavioral pattern; and
control access of the first electronic device to the external electronic network according to the calculated confidence metric.


US Pat. No. 11,115,288

PARAMETER SETTING METHOD, DATA ANALYSIS DEVICE AND DATA ANALYSIS SYSTEM

HITACHI, LTD., Tokyo (JP...


1. A method of setting a parameter by a data analysis device,wherein the data analysis device includes a computer that executes one or more predetermined processes, a storage device that is connected to the computer, and a communication interface that is connected to the computer,
the storage device stores: a parameter setting configuration for each of a plurality of models corresponding to an analysis target system, and input data,
the method comprising the steps of:
acquiring time-series data including packets of network traffic as packets are transferred in the network and continuously and automatically storing a plurality of items of the acquired time-series of data in predetermined intervals as the input data in the storage device;
extracting data of at least one first item from the input data and calculating a feature of a temporal change of the data of the first item by the computer;
extracting data of at least one second item from the input data and calculating a feature of at least one of a relevance between the data of the first item and the data of the second item and a relevance between the data of a plurality of the second items by the computer;
determining a model, of a plurality of models, that corresponds to the analysis target system based on the feature of the temporal change and the feature of the calculated relevance, wherein each model is an analysis method;
setting the parameter in the analysis target system based on the parameter setting configuration of the determined model corresponding to the analysis target system by the computer; and
analyzing the network traffic of the analysis target system using the set parameter,
wherein in the step of calculating the feature of the temporal change, the computer calculates a statistical value for each predetermined time obtained by dividing the data of the first item on a time axis, and sets a normalized value of the statistical value as the feature of the temporal change of the first item.

US Pat. No. 11,115,287

SYSTEM AND METHOD FOR PREDICTING KEY PERFORMANCE INDICATOR (KPI) IN A TELECOMMUNICATION NETWORK


1. A method for predicting Key Performance Indicator (KPI) in a telecommunication network, the method comprising steps of:monitoring, by a processor, a set of counters and a Key Performance Indicator, corresponding to a telecommunication network, wherein the set of counters and the KPI are monitored for a predefined time interval to gather sample data;
analyzing, by the processor, the sample data using a data analysis technique to:
identify a subset of counters, from the set of counters, influencing the KPI, and
identify a correlation coefficient associated with each counter from the subset of counters, wherein the correlation coefficient associated with each counter is identified after normalizing the subset of counters; and
applying, by the processor regression models on the subset of counters and the KPI in order to build a correlation equation between the subset of counters and the KPI, wherein a regression model is selected based on how responsive a prediction has to be which varies depending on a KPI a user wants to model,
forecasting and predicting performance of a KPI using the correlation equation.

US Pat. No. 11,115,286

AUTOMATIC DISCOVERY OF IP-OPTICAL LINKS WITH MULTI-LAYER FILTERING AND TRAFFIC MAPPING USING NEURAL NETWORKS

NOKIA SOLUTIONS NETWORKS ...


1. A method of identifying IP-optical links in a network having a plurality of nodes, the method comprising:grouping network nodes into discovery groups;

for each discovery group:filtering ports of the nodes in the discovery group;
producing class IDs for each filtered port using a machine learning model, wherein the machine learning model matches each of a plurality of Tx ports to a respective Rx port tagged with a unique class ID;
matching IP ports to optical ports from the filtered ports using the class IDs of each port to identify IP-optical links; and
verifying the identified IP-optical links.

US Pat. No. 11,115,285

DEVICE DETECTION

New H3C Technologies Co.,...


1. A method of detecting a device, comprising:receiving, by a Software Defined Network (SDN) controller, a detecting packet which is sent by a first switch and initiated by a first device accessing the first switch, wherein the detecting packet carries an identifier of a Virtual Local Area Network (VLAN) to which the first device belongs;
sending, by the SDN controller, for each of switches having an SDN connection with the SDN controller, the detecting packet and information of all downlink ports of the switch having an SDN connection with the SDN controller to the switch having an SDN connection with the SDN controller in a way that the switch having an SDN connection with the SDN controller sends the detecting packet through the downlink port without checking whether the identifier of the VLAN carried in the detecting packet matches an identifier of Permit VLAN configured on the downlink port;
receiving, by the SDN controller, a response packet which is sent by a second switch, wherein the response packet is sent by a second device to the second switch accessing the second switch in response to receiving the detecting packet, wherein an Internet Protocol (IP) address of the second device matches a destination IP address of the detecting packet; and sending, by the SDN controller, forwarding configuration information to the second switch in a way that the second switch configures a port through which the response packet is received.

US Pat. No. 11,115,284

TECHNIQUES FOR DYNAMIC RATE-LIMITING

Atlassian PTY Ltd., Sydn...


19. A computer-implemented method for asynchronous rate-limiting at a rate-limit decision node, the computer-implemented method comprising:receiving a rate-limiting request for a service application;
extracting one or more policy-defining parameters from the rate-limiting request;
querying a local cache storage medium associated with the rate-limit decision node to identify one or more local rate-limiting policies associated with the rate-limiting request, wherein the local cache storage medium is configured to receive one or more asynchronous configuration data updates from a rate-limit synchronization server, and further wherein the rate-limit decision node is configured to update the one or more local rate-limiting policies based on the one or more asynchronous configuration data updates;
determining, based on the one or more policy-defining parameters and the one or more local rate-limiting policies, a rate-limiting decision for the rate-limiting request; and
transmitting the rate-limiting decision to the service application in response to the rate-limiting request.

US Pat. No. 11,115,283

GEOGRAPHIC SERVICE CLASSIFICATION AND ROUTING

Intel Corporation, Santa...


1. A system comprising:at least one processor; and
memory including instructions to provide a service routing agent that, when executed by the at least one processor, cause the at least one processor to:identify resources for delivering a network service to clients requesting services, the resources being classified by service area from a plurality of service areas;
determine service agents to configure the identified; resources, each service agent to manage service handler pools for delivering the network service across at least one service area, the service agents being selected to provide a configuration for the service handler pools to deliver the network service for the identified resources, wherein to determine the service agents includes instructions to:determine a number of clients accessing the network service associated with each service area; and
select a service handler instance for a respective service area based on the number of clients accessing the network service associated with the respective service area;

send respective configuration rules to each determined service agent, the configuration rules configured to establish the service handler pools for delivering the network service across the plurality of service areas;
collect service traffic information from the service agents;
adjust the resources at the service handler pools for delivering the network service based on the collected service traffic information; and
send updated respective configuration rules for the service handler pools to each determined service agent based on the adjustment.


US Pat. No. 11,115,282

APPARATUS AND MEASUREMENT METHOD FOR IDENTIFYING NETWORK DEVICES


1. An apparatus for identifying network devices in a communications network without using explicit identification information of the network devices, the apparatus comprising:a processor; and
memory comprising software, which when executed by the processor, implements:a data acquirer configured to receive data from a plurality of network devices in the communications network; and
an interpreter configured to:extract identification data from the data, the identification including information from which the identity of the network devices may be inferred;
analyse the extracted identification data by:analysing as a first criterion of a group of criteria an association of the identification data with one or more specific network devices to identify at least one of a similarity of measured data of a physical clock of the network devices to a predefined pattern and/or to previously measured data of the physical clock of the network devices, and
analysing one or more further criterion of the group of criteria to identify additional associations of the identification data with the one or more specific network devices based on traffic information;

determine, based on the results of the analyzing of the first criterion and the one or more further criterion, which of the plurality of network devices has sent the received data;evaluating the results of the analysing to provide feedback to a user by:
determining, for each network device identified on the basis of the criteria, a separate confidence value for each criterion,
determining for each identified network device an overall confidence value from the confidence values of all the analysed criteria, and
determining the overall confidence value by forming an arithmetic mean, by forming a median, by forming a geometric mean, by forming a harmonic mean, by forming a quadratic mean, or by forming a cubic mean from the confidence values of the individual criteria; and
providing the overall confidence value to the user.




US Pat. No. 11,115,281

DATA ANALYTICS ON INTERNAL STATE

Arista Networks, Inc., S...


13. A system comprising:one or more processors; and
a non-transitory machine-readable medium storing instructions which, when executed by the one or more processors, cause the one or more processors to perform operations including:
querying an interface server of a network management system to request a subscription to configuration state and operational status data associated with a set of network elements;
monitoring state and status data associated with the set of network elements via the subscription; and
predicting a future network failure based on the configuration state and operational status data associated with the set of network elements.

US Pat. No. 11,115,280

DATA-DRIVEN IDENTIFICATION OF FEATURES RELATED TO A STATE CHANGE OF A NETWORK COMPONENT

Cisco Technology, Inc., ...


1. A computer-implemented method comprising:based at least in part on a state change at a networking component, obtaining data related to values of a plurality of features of the networking component, the data being within a primary window during which the state change occurred;
evaluating the data using a delta-average based model, the delta-average based model evaluating the data within (i) a first window of the primary window, the first window including first data of the data prior to occurrence of the state change and (ii) a second window of the primary window, the second window including second data of the data after the occurrence of the state change;
based at least in part on the evaluating the data with the delta-average based model, determining a change in mean values of the values for each feature of the plurality of features between the first window and the second window;
based at least in part on the determining the change in mean values of the values for each feature of the plurality of features between the first window and the second window, determining a list of the plurality of features having largest changes in mean values between the first window and the second window, wherein the list represents most likely features contributing to the state change of the networking component; and
providing the list to a user.

US Pat. No. 11,115,279

CLIENT SERVER MODEL FOR MULTIPLE DOCUMENT EDITOR

Hewlett Packard Enterpris...


1. A computer system, comprising:a network communications interface;
a memory; and
one or more processing units, communicatively coupled to the memory and the network communications interface, wherein the memory stores instructions, that when executed by the one or more processing units, cause the one or more processing units to provide a server side component of a view and edit function to simultaneously view and edit multiple network device configurations, the server side component:parse a plurality of different network device configuration documents to create a set of slots and anchor points relative to locations of related parameter settings within each of the different network device configuration documents, the slots indicating a type of parameter setting and the anchor points indicating a relative location within each of the different network device configuration documents based on the slot indications;
transmit a condensed view of an area of interest to a remote client device along with information pertaining to at least one anchor point to map configuration settings from the condensed view back to one or more of the plurality of different network device configuration documents;
receive an indication, from the remote client device, of a change in parameter value for a network configuration setting from the condensed view, the indication including an associated anchor point for the change in parameter value;
determine a location, using the associated anchor point, to apply the change in parameter value received from the remote client device to multiple of the plurality of different network device configuration documents,
wherein information sent to the remote client device for the condensed view compresses multiple instances of information from the area of interest into a single instance to reduce transmission of information to the remote client device.


US Pat. No. 11,115,278

LEARNING BY INFERENCE FROM BROWNFIELD DEPLOYMENTS

Cisco Technology, Inc., ...


1. A method for deployment of a Greenfield device, the method comprising:generating configuration expressions from at least one configuration template of a plurality of configuration templates based on known fabric policies, the configuration expressions includes a plurality of variables and corresponding values;
receiving an existing configuration file of a Brownfield device that was previously deployed;
matching one or more variables of the existing configuration file of the Brownfield device with one or more variables of the plurality of variables of at least one of the configuration expressions from the at least one configuration template of the plurality of configuration templates;
instantiating the one or more variables of the plurality of variables of at least one of the configuration expressions from the at least one configuration template of the plurality of configuration templates with corresponding values retrieved from a matched portion of the existing configuration of the Brownfield device, to thereby create one to more template instances;
validating each of the one or more template instances against the known fabric policies to generate one or more Policy Template Instances;
storing the one or more Policy Template Instances associated with a device existing configuration as a representation of an expected device configuration; and
provisioning the expected device configuration on the Greenfield device.

US Pat. No. 11,115,277

MESH NETWORK RESILIENCY

Alarm.com Incorporated, ...


1. A system for monitoring a property, the system comprising:a first sensor that is powered by a first type of power source and that is configured to generate first sensor data that reflects a first attribute of the property;
a second sensor that is powered by a second type of power source and that is configured to generate second sensor data that reflects a second attribute of the property;
a third sensor that is powered by the second type of power source and that is configured to generate third sensor data that reflects a third attribute of the property; and
a control panel that is configured to:determine that the first type of power source and the second type of power source are active;
based on determining that the first type of power source and the second type of power source are active:receive, from the first sensor, the first sensor data and the second sensor data, wherein the second sensor transmits the second sensor data to the first sensor;
receive, from the third sensor, the third sensor data;

after receiving the first sensor data, the second sensor data, and the third sensor data, determine that the first type of power source is inactive and the second type of power source is active; and
based on determining that the first type of power source is inactive and the second type of power source is active, receive, from the third sensor, additional second sensor data and additional third sensor data, wherein the second sensor transmits the additional second sensor data to the third sensor.


US Pat. No. 11,115,276

SERVICE FUNCTION CHAIN OPTIMIZATION USING LIVE TESTING

Cisco Technology, Inc., ...


1. A computer-implemented method comprising:implementing a production service chain (SC) with a plurality of devices, the production service chain defining a sequence of functions to perform on traffic flow using the plurality of devices, the production SC having a first set of performance metrics for a first traffic flow directed over the production SC;
cloning the production SC to produce a cloned SC, wherein the cloned SC comprises a cloned plurality of devices corresponding to the plurality of devices, the cloned SC having a second set of performance metrics for a second traffic flow directed over the cloned SC, wherein at least one of the devices of the cloned plurality of devices has at least one parameter that is different from the plurality of devices; and
based on the first set of performance metrics and the second set of performance metrics and in response to a predetermined event, applying the at least one parameter that is different from the at least one of the devices of the cloned plurality of devices to a respective one of the plurality of devices.

US Pat. No. 11,115,275

SYSTEMS AND METHODS FOR AUTOMATED TECHNOLOGY RESOURCE DECOMMISSIONING

JPMORGAN CHASE BANK, N.A....


1. A method for automated hardware resource decommissioning, comprising:in an information processing apparatus comprising at least one computer processor, a computer application executed by the at least one computer processor:retrieving usage information for each of a plurality of hardware resources;
identifying one of the plurality of hardware resources for decommissioning based on the usage information;
determining one or more additional hardware resource associated with the identified hardware resource and a unique identifier that associates the identified hardware resource with the one or more additional hardware resource;
creating a decommissioning record for the identified hardware resource, the decommissioning record identifying a plurality of micro services for executing a decommissioning plan, wherein the decommissioning record includes the unique identifier for the identified hardware resource;
executing the decommissioning plan to decommission the identified hardware resource, wherein the decommissioning plan is associated with the unique identifier, the identified hardware resource, and the one or more additional hardware resource; and
removing or reusing the decommissioned identified hardware resource.


US Pat. No. 11,115,274

UPGRADING OF A MOBILE NETWORK FUNCTION

HUAWEI TECHNOLOGIES CO., ...


1. A traffic handling decision apparatus for use in a network entity of a mobile communication system, wherein the traffic handling decision apparatus comprises:a receiver configured to receive control plane traffic, wherein the control plane traffic comprises requests to a mobile network function, and wherein the traffic handling decision apparatus is provided within an instance implementing the mobile network function according to a current software version; and
a processor coupled to the receiver and configured to:create at least one first instance implementing the mobile network function according to an upgraded software version;
provide at least one second instance implementing the mobile network function according to the current software version, wherein the first instance and the second instance each comprise an application implementing the mobile network function, platform software for a service, and an operating system running on the traffic handling decision apparatus;
decide, based on one or more policies, whether each of the requests to the mobile network function is to be processed by at least one of the second instances or by at least one of the first instances, and wherein the one or more policies define a set of rules and comprise:a first policy according to which requests of the control plane traffic related to a new bearer or session are to be routed to at least one of the first instances; and
a second policy according to which requests of the control plane traffic related to an established bearer or session are to be routed to at least one of the second instances;

route one or more of the requests to either at least one of the first instances or at least one of the second instances based on a decision whether each of the requests is to be processed by at least one of the second instances or by at least one of the first instances;
add at least one additional first instance to increase a serving capacity of the upgraded software version; and
decrease at least one of the second instances to reduce a serving capacity of the current software version.


US Pat. No. 11,115,273

ANALYTICS-DRIVEN DYNAMIC NETWORK DESIGN AND CONFIGURATION

Telefonaktiebolaget LM Er...


1. A network configuration method, comprising:adaptively training a computer-implemented data analytics platform for generating situation profiles corresponding to a plurality of situations observed in a network serving a plurality of service users;
obtaining a situation profile with respect to a particular situation, wherein the situation profile comprises values of one or more service user behavior events and one or more events pertaining to a state of the network servicing the plurality of service users;
determining, in a matching operation, a similarity index between the situation profile and a characteristic situation profile applicable to the particular situation, wherein the characteristic situation profile comprises allowable values with respect to the service user behavior events and a plurality of network state events defining the particular situation;
if the similarity index is within an acceptable window, generating one or more control signals to effectuate a design change action for changing configuration of at least a plurality of inline service nodes disposed in the network operating to service user data flows of the service users; and
if the similarity index is not within the acceptable window, using the situation profile as a candidate actionable profile for generating one or more new characteristic situation profiles to be applied in subsequent matching operations against new situations.

US Pat. No. 11,115,272

DETECTING CONFIGURATION DRIFT FOR COMPUTING RESOURCE STACKS

Amazon Technologies, Inc....


1. A computer-implemented method comprising:creating, by a first service of a service provider network, a baseline snapshot of configuration settings associated with one or more computing resources of a computing resource stack implemented in the service provider network based on an infrastructure template, wherein the infrastructure template includes a descriptive representation of the one or more computing resources, and wherein the descriptive representation includes configuration information used by an infrastructure modeling service to deploy the one or more computing resources at the service provider network;
modifying, by a second service of the service provider network and outside of the infrastructure modeling service, a configuration setting of at least one of the one or more computing resources of the computing resource stack;
creating, by the first service, a current snapshot of the configuration settings associated with the one or more computing resources of the computing resource stack;
identifying, by the first service, one or more differences between the baseline snapshot of the configuration settings and the current snapshot of the configuration settings;
causing information indicating the one or more differences between the baseline snapshot of the configuration settings and the current snapshot of the configuration settings to be presented to a user;
updating the computing resource stack based on an update to the infrastructure template; and
updating the baseline snapshot based on the update to the computing resource stack.

US Pat. No. 11,115,271

NETWORK SLICE CONFIGURATION

NOKIA SOLUTIONS AND NETWO...


1. An apparatus in a radio access network, comprising:at least one processor; and
at least one memory including computer program code,
the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to:
receive a service request comprising service requirements of a service;
determine, based on the service request, a service level specification of the service, the service level specification comprising performance parameters and network functions to support the requested service;
normalize the determined service level specification by scaling the performance parameters according into a given normalization model of the network to obtain normalized service level specification;
determine, based on the network functions and the given normalization model, normalized performance capability of the network functions and a configuration of a network slice supporting the requested service;
compare the normalized service level specification to the normalized performance capability; and
determine, based on the comparison, whether the requested service can be realized with the network slice, and upon determining that the requested service can be realized with the network slice, create the slice, and upon determining that the requested service cannot be realized with the network slice, determine from the service level agreement data when requirements in the service request comprise acceptable reductions, with which the requested service could be realized.

US Pat. No. 11,115,269

SYSTEM AND METHOD FOR UPDATING AN APPLICATION FOR A POPULATION OF COMPUTERS

METACTIX LLC, Worthingto...


1. A method of updating an application for a population of devices using a centralized controller, the controller performing steps comprising:receiving, at the controller, a first notice that an update is pending for an application from a first device of a population of devices, wherein the population of devices includes devices associated with a game center;
instructing each device of the population of devices to disable the application;
permitting the update for the application to proceed on the first device, wherein the update is received by the first device from a publisher separate from the controller;
receiving, at the controller, a second notice that the update is complete for the application from the first device;
after receiving the second notice, instructing the first device to enable the application;
instructing the first device to publish the update for exchange with other devices of the population of devices, such that the other devices of the population acquire the update; and
sending an instruction to re-enable the application for each device of the population of devices after receiving notification that the update is complete for said device.

US Pat. No. 11,115,268

ASSISTANCE IN SERVICE PROVISION

International Business Ma...


1. A method comprising performing at least the following operations by one or more processor(s):receiving, by a first entity, a request initiated by a device of a first user for a first service to be provisioned by the first entity;
detecting, by a service assistance engine, the request initiation from the device by monitoring a message flow between the device and the first entity, the service assistance engine being communicatively connected to the device and communicatively connected to the first entity;
responsive to detecting the request, collecting, by the service assistance engine, historical interaction information between the first user and at least one of a second entity provisioning a second service and the first entity, the historical interaction information being analyzed by the service assistance engine to derive first user preference data, wherein the second entity is communicatively connected to the service assistance engine;
responsive to receiving the request, provisioning, by the first entity, an instantiation of the first service in a manner that is based, at least in part, on the first user preference data, the first service comprising output information selected based, at least in part, on the first user preference data;
storing, by the service assistance engine, the first user preference data as a profile for the first user in a database accessible by the service assistance engine;
receiving, by the device, an input from the first user via one or more operations performed on the output information comprised in the first service, the one or more operations including at least one of sharing, liking, commenting, collecting, adding a bookmark and capturing a screenshot;
monitoring, by the service assistance engine, a time allocated by the first user to browse different portions of the output information comprised in the first service provided by the first entity and an associated browsing speed; and
based on the monitoring and the input information provided by the first user, updating, by the service assistance engine, the historical interaction information of the first user, wherein a weight of the updated historical interaction information is larger than a weight of previously collected historical interaction information for deriving the first user preference data and provisioning the first service.

US Pat. No. 11,115,267

METHOD AND DEVICE FOR RADIO LINK MONITORING

Telefonaktiebolaget LM Er...


1. A method of a network node for providing Radio Link Monitoring, RLM, in New Radio, NR, Access Technology, comprising:providing, to a wireless device, a plurality of RLM configurations for a respective plurality of service sets or network slices, wherein:each of the plurality of service sets or network slices comprises one or more services associated with a respective set of Quality of Service, QoS, requirements; and
the plurality of RLM configurations comprises an RLM configuration corresponding to an Ultra-Reliable and Low Latency Communication (URLLC) service set;

wherein, for each service set or network slice, the respective RLM configuration comprises at least one of: a maximum counter value of out-of-sync and a value of a timer triggered by radio link failure.

US Pat. No. 11,115,266

PRIORITY BASED SELECTION OF TIME SERVICES

CISCO TECHNOLOGY, INC., ...


1. A method comprising:at a network device in an enterprise network, selecting one or more time servers, to use for establishing a timing reference for the network device, according to a predetermined priority order of selection that begins with determining whether the network device is configured with identification information indicating the one or more time servers to be used;
in response to the network device not being configured with the identification information of the one or more time servers, communicating with a network management protocol server to obtain the identification information of the one or more time servers;
in response to not obtaining the identification information from the network management protocol server, sending into the enterprise network a multicast request for a network time protocol service; and
establishing the timing reference for the network device using a time server selected according to the predetermined priority order of selection.

US Pat. No. 11,115,265

METHOD OF WIRELESS DISCOVERY AND NETWORKING OF MEDICAL DEVICES IN CARE ENVIRONMENTS

Stryker Corporation, Kal...


1. A system for automatically establishing a network comprising:a main device group including a main wireless transceiver device, a control device and a first network interface; and
a secondary device group including a secondary wireless transceiver device, a secondary device group slave device and a second network interface;
the main wireless transceiver device and the secondary wireless transceiver device being configured to wirelessly exchange networking information for networking the first network interface and the second network interface, the networking information being wirelessly exchanged via direct wireless communication between the main wireless transceiver device and the secondary wireless transceiver device,
the main device group and the secondary device group being configured to use the networking information exchanged between the main wireless transceiver device and the secondary wireless transceiver device to form a network in which the control device communicates with the secondary device group slave device via the first network interface and the second network interface, wherein the network does not include the main wireless transceiver device and the secondary wireless transceiver device such that communication between the control device and the secondary device group slave device does not pass through the main wireless transceiver device and the secondary wireless transceiver device,
wherein the control device wirelessly controls functions of the secondary device group slave device with instructions sent over the network.

US Pat. No. 11,115,264

APPARATUSES AND METHODS INVOLVING MANAGING PORT-ADDRESS ASSIGNMENTS

NXP B.V., Eindhoven (NL)...


1. An apparatus for a local area network characterized by a plurality of network modules to convey data over a physical communication channel and with at least one of the network modules including a management communications bus for communication among a plurality of logic nodes via a communications protocol, the apparatus comprising at one of the plurality of logic nodes,a plurality of ports to provide communication;
a plurality of shared registers having a port address table to provide configurable port-address assignments that identify respective ones of the plurality of ports and the port address table being associated with at least one broadcast address to identify multiple ports across one or more of the plurality of logic nodes; and
a management interface controller to communicate with the plurality of ports and to access at least one register of the plurality of shared registers, via a selected one of the plurality of ports, and in response to configure or manage the port-address assignments within the port address table.

US Pat. No. 11,115,263

INTRA-CLUSTER NODE TROUBLESHOOTING METHOD AND DEVICE

HUAWEI TECHNOLOGIES CO., ...


1. A troubleshooting method for nodes in a cluster, the method comprising:obtaining fault detection topology information of the cluster, fault detection being performed on one node in the cluster by at least one other node in the cluster, the fault detection topology information comprising a fault detection relationship between a detection node and a detected node in the cluster;
receiving a fault indication message from the detection node, the fault indication message indicating unreachability from the detection node to the detected node;
determining a sub-cluster of the cluster based on the fault detection topology information and the fault indication message, with nodes belonging to different sub-clusters of the cluster being unreachable to each other; and
determining a working cluster based on the determined sub-cluster.

US Pat. No. 11,115,262

MIGRATION OF CENTRALIZED ROUTING COMPONENTS OF LOGICAL ROUTER

NICIRA, INC., Palo Alto,...


1. For a controller that manages a physical network that implements a plurality of logical networks comprising a plurality of logical routers, a method comprising: receiving a command to migrate a particular centralized routing component of a logical router from a first host computer on which the particular centralized routing component operates to a second host computer, wherein at least one other centralized routing component of the logical router is implemented on at least one other host computer in the physical network, wherein the particular centralized routing component operates with an administrative state set to active that is shared with the other centralized routing components of the logical router; sending a message to the first host computer to cause the particular centralized routing component (i) to change to an inactive administrative state in order to facilitate migration of the particular centralized routing component and (ii) to share the change to the inactive administrative state with the other centralized routing components of the logical router, without modifying a state of any other centralized routing component operating on the first host computer, wherein the other centralized routing components of the logical router use the administrative state of the particular centralized routing component along with administrative states of the other centralized routing components to determine an active centralized routing component for the logical router.

US Pat. No. 11,115,261

SYSTEM AND METHOD OF SHARING CONTENT BY USING PLURALITY OF STORAGES

Samsung Electronics Co., ...


1. A mobile communication terminal, the mobile communication terminal comprising:a display; and
a processor configured to:based on a network communication being activated, access a plurality of storages that are connectable to the mobile communication terminal,
obtain a plurality of storage information from the plurality of storages,
determine a first group comprising a predetermined static storage connected to the mobile communication terminal prior to displaying a storage screen, from among the plurality of storages,
determine a second group comprising a dynamic storage whose connection with the mobile communication terminal is currently being scanned when the storage screen is displayed, from among the plurality of storages,
control the display to display the storage screen comprising the first group and the second group in different regions from each other based on the obtained plurality of storage information, and
control respective power of the plurality of the storages according to a user input via the storage screen,

wherein the first group includes at least one social network service (SNS).

US Pat. No. 11,115,260

SIGNAL COMPENSATION DEVICE

REALTEK SEMICONDUCTOR COR...


1. A signal compensation device, comprising:an operation circuit, configured to generate a control signal according to a first data signal and a second data signal, wherein the second data signal is generated according to the first data signal by a signal conversion circuit; and
a sigma-delta modulation circuit, configured to modulate the first data signal using a loop gain according to the control signal to compensate an attenuation of the signal conversion circuit;
wherein the signal conversion circuit comprises a transmitter conversion circuit and a receiver conversion circuit, and the transmitter conversion circuit is configured to receive the first data signal and the modulated first data signal.

US Pat. No. 11,115,259

TRANSMITTING APPARATUS AND MAPPING METHOD THEREOF

SAMSUNG ELECTRONICS CO., ...


US Pat. No. 11,115,258

METHOD TO IMPLICITLY INDICATE SYSTEM INFORMATION IN NR

Telefonaktiebolaget LM Er...


1. A method for operating a network node in a radio access network, the method comprising:transmitting synchronization signaling;
the synchronization signaling comprising:a signaling sequence, the signaling sequence being determined as a combination of a number of sub-sequences, each sub-sequence being chosen from a set of subsequences; and
an order of the sub-sequences being mapped to synchronization information; and

the synchronization signaling repeating the signaling sequence determined as a combination of a number of sub-sequences within a synchronization signaling block.

US Pat. No. 11,115,257

SYSTEM AND METHOD FOR MULTIPLEXING TRAFFIC

Huawei Technologies Co., ...


1. A method for notifying a UE of pre-emption of a portion of resources during a first interval, the method comprising:transmitting an indication of granularity of one or more resources within the first interval via higher layer signaling, the granularity in both time and frequency domains of the one or more resources within the first interval being configurable;
scrambling at least part of an indication of pre-emption of the portion of resources during the first interval using a radio network temporary identifier (RNTI), the indication of pre-emption including bits that identify the one or more resources within the first interval that are preempted; and
transmitting the indication of pre-emption, including the scrambled part, to the UE in a downlink control information (DCI) message over a physical downlink control channel (PDCCH).

US Pat. No. 11,115,256

WIRELESS DEVICES AND SYSTEMS INCLUDING EXAMPLES OF MIXING INPUT DATA WITH COEFFICIENT DATA

Micron Technology, Inc., ...


1. A system comprising:at least one processing unit; and
control instructions which, when executed by the at least one processing unit, is configured to cause the system to perform operations comprising:implementing a wireless receiver processing mode based on a processing mode selection corresponding to the wireless receiver processing mode, wherein implementing the wireless receiver processing mode comprises retrieving by respective memory look-up units of a plurality of memory look-up units, a plurality of coefficients associated with the wireless receiver processing mode from a memory database;
mixing input data at the at least one processing unit using the plurality of coefficients associated with the wireless receiver processing mode, wherein mixing the input data comprises calculating, at a multiplication/accumulation processing unit, the input data with a portion of the plurality of coefficients to generate a processing result; and
providing output data based partly on the processing result, the output data representative of a portion of the input data being processed in a wireless receiver.


US Pat. No. 11,115,255

TRANSMITTER AND RECEIVER FOR COMMUNICATION USING AT LEAST TWO DIFFERENT RF CHANNELS

SATURN LICENSING LLC, Ne...


15. A receiving method for receiving data via at least two RF channels, the receiving method comprising:receiving transmission signals from the at least two RF channels;
demodulating the transmission signals according to an orthogonal frequency-division multiplexing (OFDM) demodulation and deinterleaving a result of the OFDM demodulation to obtain sets of modulation cells;
selecting a mode among a set of modes, the set of modes including at least a Multiple Input Multiple Output (MIMO) mode and a channel bonding mode;
applying a MIMO decoding and demapping to the sets of modulation cells to obtain stream partitions of demodulated data, in case that the MIMO mode is selected;
rearranging and demapping the sets of modulation cells to obtain the stream partitions of demodulated data, in case that the channel bonding mode is selected;
generating stream partitions of decoded data from the stream partitions of demodulated data; and
combining the stream partitions into a data stream, baseband frames of physical layer pipe (PLP) included in the data stream being partitioned to the stream partitions, each one of the stream partitions including at least one baseband frame of the baseband frames of the PLP.

US Pat. No. 11,115,254

METHOD FOR DETERMINING RESERVED TONES AND TRANSMITTER FOR PERFORMING PAPR REDUCTION USING TONE RESERVATION

SAMSUNG ELECTRONICS CO., ...


US Pat. No. 11,115,253

METHOD AND DEVICE FOR PERFORMING COMMUNICATION BY USING ORTHOGONAL OR NON-ORTHOGONAL CODE MULTIPLE ACCESS SCHEME IN WIRELESS COMMUNICATION SYSTEM

LG ELECTRONICS INC., Seo...


1. A method for transmitting uplink data in a wireless communication system, the method comprising:receiving, by a terminal, control information from a base station;
selecting, by the terminal, a terminal-specific codeword or receiving allocation information of the terminal-specific codeword based on the control information; and
transmitting, by the terminal, the uplink data based on the terminal-specific codeword,
wherein the terminal-specific codeword is determined as a codeword having a value with a low peak-to-average power ratio (PAPR), when the terminal is located on the outside of a cell,
wherein the terminal-specific codeword is determined as a codeword having a value with a high PAPR, when the terminal is located in the center of the cell,
wherein the control information is received via a control channel or a broadcast channel,
wherein downlink received power is measured by the terminal based on the control channel or the broadcast channel,
wherein uplink received power is measured by the base station based on a reference signal and a synchronization signal,
wherein a geometry class is selected by the terminal based on the downlink received power,
wherein the terminal-specific codeword is selected by the terminal based on the geometry class,
wherein the geometry class is determined based on a position of the terminal in the cell, and
wherein the geometry class is mapped to an index of the terminal-specific codeword.

US Pat. No. 11,115,252

SIGNAL TRANSMISSION METHOD AND SYSTEM

ZTE Corporation, Shenzhe...


1. A signal transmission method, comprising:transmitting, by a first node, a first signal that comprises at least two sets of symbol groups,
wherein each set of symbol group includes three symbol groups,
wherein each of the three symbol groups for each set of symbol group comprises a cyclic prefix and at least one symbol,
wherein a symbol group occupies a same subcarrier,
wherein the at least two sets of symbol groups comprises a first set of symbol groups that include a first symbol group and a second symbol group, and a third symbol group,wherein a delta of subcarrier indexes occupied by the first symbol group and the second symbol group is +K1 subcarriers,
wherein a delta of subcarrier indexes occupied by the second symbol group and the third symbol group is ?K1 subcarriers,

wherein the at least two sets of symbol groups comprises a second set of symbol groups that include a fourth symbol group and a fifth symbol group, and a sixth symbol group,wherein a delta of subcarrier indexes occupied by the fourth symbol group and the fifth symbol group is +K2 subcarriers, and
wherein a delta of subcarrier indexes occupied by the fifth symbol group and the sixth symbol group is ?K2 subcarriers.


US Pat. No. 11,115,251

PAM4 EQUALIZATION DSM

Litrinium, Inc., Mission...


1. A method of automatically equalizing a PAM4 signal, comprising:generating a reference signal for the PAM4 signal by slicing the PAM4 signal into a first level and a second level;
determining a constant coefficient;
amplifying the reference signal by the constant coefficient, wherein the amplified reference signal is used to modulate the PAM4 signal;
determining a first signal amplitude measurement of the PAM4 signal;
determining a first signal boost measurement of the PAM4 signal;
determining whether the first signal boost measurement and the signal amplitude measurement are substantially consistent with each other;
responsive to determining that the signal boost and the signal amplitude are not substantially consistent with each other, determining a reference amplification modification; and
calibrating a PAM4 signal according to the determined reference amplification modification.

US Pat. No. 11,115,250

MPPM ENCODER AND DECODER

Acacia Communications, In...


1. A method comprising:calculating coefficients for inputs and corresponding output sequences for a pulse-position modulation encoder using a stored structure; wherein the structure contains a subset of Pascal's Triangle; wherein the pulse-position modulation encoder is a flex multipulse-position modulation encoder and the structure includes a portion of a row of Pascal's Triangle.

US Pat. No. 11,115,249

HIGH SPEED COMMUNICATIONS SYSTEM

KANDOU LABS, S.A., Lausa...


1. A method comprising:obtaining a set of information input bits and a previously transmitted set of information bits;
generating a set of signals of a partial response-encoded orthogonal differential vector signaling (ODVS) codeword, the set of signals of the partial response-encoded ODVS codeword generated from a superposition of a plurality of mutually orthogonal sub-channel code vectors, each sub-channel code vector associated with (i) a respective information bit of the set of information bits and (ii) a corresponding information bit of the previously transmitted set of information bits;
transmitting each signal of the partial response-encoded ODVS codeword over a respective wire of a multi-wire bus.

US Pat. No. 11,115,248

PULSE-SHAPING FOR HIGH FREQUENCY RADIO NETWORKS

Telefonaktiebolaget LM Er...


1. A method of operating a radio node in a wireless communication network, the method comprising communicating utilising signaling, the communicating utilising signaling being based on performing pulse-shaping pertaining to the signaling; andthe pulse shaping being performed based on periodically extending a frequency distribution of modulation symbols over a first number of subcarriers to a larger, second number of subcarriers, wherein a subset of the first number of subcarriers from one end of the frequency distribution is appended at the other end of the first number of subcarriers.

US Pat. No. 11,115,247

METHODS AND CIRCUITS FOR ASYMMETRIC DISTRIBUTION OF CHANNEL EQUALIZATION BETWEEN DEVICES

Rambus Inc., San Jose, C...


1. An integrated circuit comprising:a transmit equalizer having a transmit-equalizer control port, the transmit equalizer to equalize a first signal resulting in a first equalized signal, using a first range of coefficients, applied to the transmit-equalizer control port;
a receive port to receive a corrupted second signal that includes noise;
a signal monitor to provide a measure of the noise of the second signal; and
equalization control circuitry coupled between the signal monitor and the transmit-equalizer control port.

US Pat. No. 11,115,246

SAMPLER OFFSET CALIBRATION DURING OPERATION

KANDOU LABS, S.A., Lausa...


1. A method comprising:sampling a data signal using a data sampler operating in a data signal processing path having a decision threshold;
initializing the decision threshold of a spare sampler based on a measured center-of-eye value;
generating respective sets of phase-error signals for the spare sampler and the data sampler responsive to a detection of a predetermined data pattern; and
updating the decision threshold of the spare sampler in a direction responsive to an accumulation of differences in phase-error signals of the respective sets of phase-error signals; and
updating the decision threshold of the data sampler based on the direction of updates to the decision threshold of the spare sampler.

US Pat. No. 11,115,245

TRANSMISSION DEVICE AND COMMUNICATION SYSTEM

Sony Corporation, Tokyo ...


1. A transmission device comprising:a transmitter including:a controller that selects one of a plurality of operation modes including a first operation mode transmitting data by means of differential signals and a second operation mode transmitting data by means of three-phase signals and generates control signals according to the selected mode;
a plurality of output terminals, wherein the plurality of output terminals are divided into at least one group based on the selected mode, and voltages of output terminals in each group are set based on the control signals, respectively; and
wherein the controller operates so that in the first operation mode, each group includes two output terminals that are a first output terminal and a second output terminal, and
voltages of two output terminals are configured to constitute a differential signal, and
in the second operation mode, each group includes three output terminals that are the first output terminal and the second output terminal and a third output terminal, and voltages of three output terminals are configured to constitute a three-phase signal.


US Pat. No. 11,115,244

SIGNAL ISOLATOR WITH THREE STATE DATA TRANSMISSION

Allegro MicroSystems, LLC...


1. A signal isolator integrated circuit package comprising:a first circuit having a first input and a first output;
a second circuit having a second input and a second output, wherein the first circuit is disposed on a first die and the second circuit is disposed on a second die, different from the first die;
an isolation barrier layer between the first circuit and the second circuit, wherein the second output of the second circuit is coupled to the first input of the first circuit through the isolation barrier; and
a comparison circuit configured to compare the first input of the first circuit to the second output of the second circuit,
wherein the second output is configured to convey at least three states, including a first state indicative of a logical high of an input signal received at the first input, a second state indicative of a logical low of the input signal, and a third state indicative of a fault condition.

US Pat. No. 11,115,243

DOWNLINK CONTROL CHANNEL DETECTION METHOD, TERMINAL AND BASE STATION


1. A downlink control channel detection method, applied to a terminal, comprising:obtaining first auxiliary information and second auxiliary information, wherein the first auxiliary information indicates a time-domain duration of a control resource set of a downlink control channel, which is allocated by a base station, the second auxiliary information indicates a resource mapping mode from a resource element group (REG) of the control resource set to a control channel elements (CCE); and,
performing a blind detection on the downlink control channel, based on the first auxiliary information and the second auxiliary information;
wherein performing the blind detection on the downlink control channel, based on the first auxiliary information and the second auxiliary information, comprises:
determining a blind-detection priority of each control resource set of the downlink control channel, based on the first auxiliary information and the second auxiliary information; and,
performing the blind detection on the downlink control channel, based on the blind-detection priority of each control resource set;
wherein determining the blind-detection priority of each control resource set of the downlink control channel, based on the first auxiliary information and the second auxiliary information, comprises:
when N indicated by the first auxiliary information is greater than or equal to a fourth index M4, determining that the blind-detection priority of the control resource set of the downlink control channel is a high priority;
when N indicated by the first auxiliary information is less than M4, determining that the blind-detection priority of the control resource set of the downlink control channel is a low priority, wherein N is the quantity of time-domain symbols occupied by the control resource set, M4 is an index of the last OFDM symbol in a pre-allocated control resource set, which is pre-allocated by the base station, indexes of the OFDM symbols in the pre-allocated control resource set start from 1, M4 and N are both integers.

US Pat. No. 11,115,242

UPLINK MULTI-BEAM OPERATION

QUALCOMM Incorporated, S...


1. A method for wireless communication, comprising:receiving, by a user equipment (UE), a downlink control signal comprising one or more sounding reference signal (SRS) resource indicators, the SRS resource indicator comprises an index to power control parameters, the downlink control signal indicating that an uplink control signal is to be transmitted using two or more transmission beams during different transmission time intervals (TTIs);
identifying the two or more transmission beams based at least in part on the downlink control signal; and
transmitting, based at least in part on the power control parameters, a plurality of repetitions of the uplink control signal, wherein each repetition is transmitted on a different TTI using a different one of the two or more transmission beams based at least in part on the downlink control signal.

US Pat. No. 11,115,241

DM-RS GROUPING AND CSI REPORTING FOR COMP

Apple Inc., Cupertino, C...


1. An apparatus, comprising:at least one processor configured to cause a user equipment (UE) to:
decode a radio resource control (RRC) configuration message from a base station (BS) that configures the UE with a type C quasi-co-location (QCL) configuration, wherein the type C QCL configuration specifies that demodulation reference signal (DM-RS) antenna ports used to transmit a same codeword (CW) or transport block (TB) in a physical downlink shared channel (PDSCH) are considered to be a quasi-co-located group;
decode downlink control information (DCI) in a physical downlink control channel (PDCCH) that schedules transmission of the PDSCH, wherein the DCI is decoded to identify the DM-RS antenna ports, MIMO (multi-input multi-output) layers, and TBs of the PDSCH to be transmitted by the BS, and wherein the DCI is decoded to determine that the PDSCH to be transmitted by the BS is an initial transmission or retransmission; and
demodulate the PDSCH by using DM-RSs in the PDSCH to estimate wireless channels over which the PDSCH is transmitted, wherein large scale properties of the wireless channels corresponding to DM-RSs that belong to the same quasi-co-located antenna port group are assumed to be the same.

US Pat. No. 11,115,240

METHODS, APPARATUSES, AND SYSTEMS FOR PERFORMING ANALOG CSI FEEDBACK

Alcatel Lucent, Nozay (F...


1. A method for performing analog Channel State Information (CSI) feedback in a user equipment, comprising:obtaining an analog CSI matrix corresponding to the user equipment, the analog CSI matrix satisfies a condition below:X XH=D

where X denotes the analog CSI matrix, H denotes conjugate transpose of matrix, and D denotes a diagonal matrix;
obtaining dominated element information corresponding to the analog CSI matrix according to predetermined index information, and transmitting the dominated element information to a base station, wherein the predetermined index information includes any predetermined index information that can indicate respective elements which need to be transmitted to the base station,
wherein the dominated element information includes all non-zero elements in a matrix resulting from transforming the analog CSI matrix and the analog CSI matrix is obtained by:
determining a matrix resulting from transforming the analog CSI according to predetermined index information and the dominated element information, wherein other elements in the transformed matrix except the dominated element information are zero;
performing singular value decomposition to the transformed matrix to obtain singular values and right singular vectors corresponding to the transformed matrix, and obtaining the analog CSI matrix according to the singular values and the right singular vectors.

US Pat. No. 11,115,239

PREAMBLE STRUCTURE SUPPORTING FULL DUPLEX COMMUNICATIONS

HUAWEI TECHNOLOGIES CO., ...


1. A method at a network node that is configured to simultaneously transmit and receive wireless RF signals, the method comprising:transmitting, from the network node, a downlink message having a preamble that includes channel estimation information followed by a data portion;
monitoring, at the network node, a frequency channel for the channel estimation information included in the downlink message, and prior to transmitting the data portion of the downlink message, estimating and cancelling a self-interference channel in the frequency channel based on the monitored channel estimation information; and
receiving, at the network node, an uplink message in the frequency channel during a time period that overlaps with transmitting the data portion of the downlink message,
wherein auto-detection information is included in the preamble of the downlink message, and theauto-detection information in the preamble comprises information encoded using a different modulation than other information in the preamble.

US Pat. No. 11,115,238

GATEWAY DEVICE

HITACHI AUTOMOTIVE SYSTEM...


1. A gateway device that relays communication between a first network and a second network, the device comprising:a first transceiver that transmits and receives signals to and from the first network;
a second transceiver that transmits and receives signals to and from the second network;
a relay switch that relays communication;
an arithmetic device that relays communication between the first network and the second network via the first transceiver and the second transceiver; and
a power supply circuit that supplies power to the arithmetic device, wherein
both the first transceiver and the second transceiver are configured to be able to switch between a first mode for transmitting and receiving signals and a second mode having lower power consumption than the first mode,
when an instruction is output to switch the first transceiver and the second transceiver from the first mode to the second mode, the arithmetic device outputs the instruction and turns off the power supply circuit to block power supply to the arithmetic device,
the first transceiver, when operating in the second mode, is configured to be able to receive an activation instruction signal instructing to activate the gateway device from the first network and shift to the first mode,
the second transceiver, when operating in the second mode, is configured to be able to receive the activation instruction signal from the second network and shift to the first mode,
when the first transceiver and the second transceiver operate in the second mode, the gateway device turns on the relay switch to relay the activation instruction signal between the first network and the second network without interposing the arithmetic device,
the first transceiver, when receiving the activation instruction signal, is configured to output a first activation instruction detection signal indicating the reception to the second transceiver,
the second transceiver, when receiving the activation instruction signal, is configured to output a second activation instruction detection signal indicating the reception to the first transceiver,
the power supply circuit is configured to supply power to the arithmetic device according to at least one of a case where the first transceiver outputs the first activation instruction detection signal or a case where the second transceiver outputs the second activation instruction detection signal, and
a delay circuit configured to turn off the relay switch after a delay of a predetermined delay time with at least one of a time when the first transceiver outputs the first activation instruction detection signal or a time when the second transceiver outputs the second activation instruction detection signal as a starting point,
wherein the delay time is set to be equal to or longer than at least a time from when the first transceiver shifts from the second mode to the first mode to when the first transceiver finishes relaying the activation instruction signal to the second transceiver through the relay switch, and
wherein the delay time is set to be equal to or longer than at least a time from when the second transceiver shifts from the second mode to the first mode to when the second transceiver finishes relaying the activation instruction signal to the first transceiver through the relay switch.

US Pat. No. 11,115,237

METHOD FOR FAULT TOLERANT MESSAGE TRANSMISSION IN A COMPUTER NETWORK AND COMPUTER NETWORK

TTTECH INDUSTRIAL AUTOMAT...


1. A method for fault tolerant message transmission in a ring network, where said ring network comprises nodes (1, 2, 3, 4, 5) and connections (12, 23, 34, 45), wherein said nodes (1, 2, 3, 4, 5) are connected by the connections (12, 23, 34, 45) to form the ring network (100), the method comprising:forming two or more nodes (1, 2, 3, 4) in said ring network (100) as a summation group (200), wherein said summation group (200) includes one left edge node (1), one right edge node (4), and zero, one, or more nodes (2, 3) between said left and right edge nodes (1, 4),
wherein for transmitting messages (SM1, SM2, SM3, SM4) from the two or more nodes (1, 2, 3, 4) of the summation group (200) to a switch (7) in the ring network, the left edge node (1) of the summation group (200) generates a right direction summation frame (F14) and sends said right direction summation frame (F14) through its right side port (1r) towards the right edge node (4),
wherein the right edge node (4) of the summation group (200) generates a left direction summation frame (F41) and sends said left direction summation frame (F41) through its left-side port (41) towards the right side port (1r) of the left edge node (1),
wherein each of the nodes (1, 2, 3) in the summation group (200) inserts, before sending the right direction summation frame to its right-side neighbor node (2, 3, 4) or the right edge node (4) to the switch (7), its message (SM1, SM2, SM3, SM4), which is intended by the respective node (1, 2, 3, 4) for being transmitted to the switch (7), into the right direction summation frame and forwards the right direction summation frame to its right-side neighbor node (2, 3, 4) or to the switch (7),
wherein each of the nodes (4, 3, 2) in the summation group (200) inserts, before sending the left direction summation frame to its left-side neighbor node (3, 2, 1) or the left edge node (1) to the switch (7), its message (SM4, SM3, SM2, SM1), which is intended by the respective node (1, 2, 3,4) for being transmitted to the switch (7), into the left direction summation frame and forwards the left direction summation frame to its left-side neighbor node (2, 3, 4) or to the switch (7), and whereina node in the summation group (200) which detects a non-arrival of the right direction summation frame, at a defined point in time or within a period of time from after the defined point in time from its left-side neighbor node, generates a first right direction recovery frame (RF41), inserts its message (SM4) into said first right direction recovery frame (RF41), and sends the first right direction recovery frame (RF41) rightwards, and wherein only nodes which would insert their message into the right direction summation frame insert their message into the first right direction recovery frame (RF41) moving rightwards, and/or
a node participating in the summation group (200) which determines the non-arrival of the left direction summation frame, at a defined point in time or within a period of time after the defined point in time from its right-side neighbor node, generates a first left direction recovery frame (RF21), inserts its message (SM2) into said first left direction recovery frame, and sends the first left direction recovery frame (RF21) leftwards, wherein only nodes which would insert their message (SM1) into the left direction summation frame insert their message (SM1) into the first left-direction recovery frame (RF21) moving leftwards, and wherein

1) in the case that only one node of the nodes has detected the non-arrival of a summation frame, wherein the summation frame is the right direction summation frame, said one node, after sending the first right direction recovery frame and receiving and consuming the first left direction recovery frame, generates a second right direction recovery frame, inserts its messages and all messages included in the first left direction recovery frame into said second right direction recovery frame, and sends said second right direction recovery frame to the switch (7),
2) in the case that only one node of the nodes has detected the non-arrival of the summation frame, wherein the summation frame is the left direction summation frame, said one node, after sending the first left direction recovery frame and receiving and consuming the first right direction recovery frame, generates a second left direction recovery frame, inserts its messages and all messages included in the first right direction recovery frame into said second left direction recovery frame, and sends said second left direction recovery frame to the switch (7), and/or
3) in the case that a node has detected the non-arrival of the right direction summation frame and a node has detected the non-arrival of the left direction summation frame, the first right direction recovery frame (RF41) is received by the node which has determined the non-arrival of the left direction summation frame, and the first left direction recovery frame (RF21) is received by the node which has determined the non-arrival of the right direction summation frame, wherein the node (2) which has detected the non-arrival of the left direction summation frame consumes the first right direction recovery frame (RF41), generates the second left direction recovery frame (RF22), inserts its message (SM2) and all messages (SM4) included in said first right direction recovery frame (RF41) into said second left direction recovery frame (RF22), and transmits said second left direction recovery frame (RF22) to the switch (7), and wherein the node (4) which has detected the non-arrival of the right direction summation frame consumes the first left direction recovery frame (RF21), generates the second right direction recovery frame (RF42), inserts its message (SM4) and all messages included in said first left direction recovery frame (RF21) into said second right direction recovery frame (RF42), and transmits said second right direction recovery frame (RF42) to the switch (7).

US Pat. No. 11,115,236

SUBSCRIBER STATION FOR A BUS SYSTEM AND METHOD FOR TRANSMITTING DATA IN A BUS SYSTEM

Robert Bosch GmbH, Stutt...


1. A master subscriber station for a bus system, comprising:a first transceiver device for at least one of: sending a message to at least one slave subscriber station via a first sub-bus of the bus system, or receiving a message from the at least one slave subscriber station via the first sub-bus of the bus system; the at least one slave subscriber station being subordinate in terms of control to the master subscriber station;
a second transceiver device for at least one of: sending a message to at least one other subscriber station via a second sub-bus of the bus system, or receiving a message from the least one other subscriber station via the second sub-bus of the bus system;
a communication control device for creating messages to be sent via one of the first or second sub-buses of the bus system or for evaluating messages received from one of the first or second sub-buses of the bus system; and
a linking device for linking a terminal of the first transceiver device to a terminal of the communication control device, for outputting a signal that was generated from the message received from the first sub-bus, and for linking a terminal of the second transceiver device to the terminal of the communication control device, for outputting a signal that was generated from the message received from the second sub-bus, so that only one signal is forwarded as a receive signal from the first and second transceiver devices to the terminal of the communication control device.

US Pat. No. 11,115,235

SEMICONDUCTOR DEVICE, COMMUNICATION SYSTEMS AND METHOD FOR CONTROLLING THE COMMUNICATION SYSTEM

RENESAS ELECTRONICS CORPO...


1. A semiconductor device, comprising:a clock generation circuit supplying time information; and
a controller inputting the time information, and transmitting or receiving data,
wherein the semiconductor device is permitted reception or transmission of the data during an open period, and is not permitted transmission or reception of the data during a close period,
wherein the open period and the close period are determined by the time information,
wherein the controller starts the transmission of the data earlier than a start of the open period, and
wherein the controller starts the reception of the data later than the start of the open period.

US Pat. No. 11,115,234

ASSEMBLY AND METHOD FOR AN AIRPLANE FOR TRANSMITTING AN ANALOG AUDIO SIGNAL

DIEHL AEROSPACE GMBH, Ue...


1. An assembly for an airplane for transmitting an analog audio signal from an analog signal source to an analog signal sink,wherein the assembly contains a line designed with at least two wires,
with a first switching element to connect the line in a first operating mode to a first digital transceiver and in a second operating mode to the analog signal source for the analog audio signal,
with a second switching element to connect the line in the first operating mode to a second digital transceiver and in the second operating mode to the analog signal sink for the audio signal,
wherein the line is operated in the first operating mode as a digital data bus to transmit data between the two digital transceivers and in the second operating mode as an analog signal line to transmit the analog audio signal from the analog signal source to the analog signal sink.

US Pat. No. 11,115,233

VEHICLE AND METHOD OF CONTROLLING THE SAME

Hyundai Motor Company, S...


1. A vehicle comprising:an image generation controller configured to:generate a plurality of image frames;
assign a first media access control (MAC) address to a first image frame of the plurality of image frames; and
assign a second MAC address to a second image frame of the plurality of image frames;

an Ethernet switch including a plurality of Ethernet ports configured to:transmit the first image frame to a first image receiving controller and a second image receiving controller based on the first MAC address; and
transmit the second image frame to the second image receiving controller based on the second MAC address;

the first image receiving controller configured to:receive the first image frame; and
image process the first image frame; and

the second image receiving controller configured to:receive the first image frame and the second image frame; and
process the first image frame and the second image frame.


US Pat. No. 11,115,232

METHOD AND DEVICE FOR OPERATING A CONTROL UNIT

Robert Bosch GmbH, Stutt...


7. A control unit for operating a control unit for a motor vehicle, comprising:a controller configured to perform the following:executing at least intermittently, via at least one execution unit of the control unit, the at least one execution unit being configured for executing task programs, a first task program and a second task program, the first task program and the second task program each being activated cyclically for a respective plurality of cycles, the first task program and the second task program having different cycle times relative to one another, the first task program having a cycle time for each cycle of the first task that is a length of a first predefined time interval, the first task program making data available for the second task program at the end of each cycle of the first task, and wherein the second task program has a cycle time for each cycle of the second task that is a length of a second predefined time interval, the second predefined time interval being longer than the first predefined time interval, wherein the length of the second predefined time interval is an integer multiple of the length of the first time interval and multiple cycles of the first task program occur during each cycle of the second task program;
wherein, for each cycle of the second task program, a transfer of the data from the first task program to the second task program occurs only after a last execution of the first task program within the predefined second time interval for the cycle of the second task program so that the transfer of the data from the first task program to the second task program occurs only once during each cycle of the second task program, the first task program running on a first execution unit of the control unit and the second task program running on a second execution unit, different from the first execution unit, in the control unit.


US Pat. No. 11,115,231

APPLIANCE NETWORK WITH MESSAGING

Whirlpool Corporation, B...


1. An appliance for a home network comprising:an appliance interactive display coupled to an appliance communication module;
wherein the appliance communication module is configured to receive a message having an embedded interactive element configured to operate a functionality of the appliance embedded into the message; and
wherein the message further includes a non-interactive detail.

US Pat. No. 11,115,230

SYSTEM AND METHOD FOR IMPROVING CONTENT FETCHING BY SELECTING TUNNEL DEVICES

BRIGHT DATA LTD., Netany...


1. A method for fetching a content identified by a content identifier from a web server by using an appliance that serves as an HTTP Proxy client and that is operating in multiple states that includes an idle state and non-idle states, for use with a plurality of HTTP Proxy servers, that includes first and second servers, each of the plurality of servers is connectable to the Internet and is addressable in the Internet using a respective IP address, the first server stores a list of IP addresses, and the appliance that are each connected to the Internet and are each addressable in the Internet using a respective IP address, the method by the appliance comprising:storing, operating, or using an operating system, a program process, or a thread;
monitoring or metering, a resource utilization;
responsive to being in one of the non-idle states, determining, if an idling condition is met;
responsive to the determination that the idling condition is met, shifting to the idle state;
responsive to being in the idle state, determining if an idling condition is met; and
responsive to the determination that the idling condition is not met, shifting to one of the non-idle states;
receiving, from the first or second server using HTTP Proxy protocol or connection, a first message that comprises the content identifier;
in response to the receiving of the first message, initiating a communication, with the second server;
randomly selecting the first server from the plurality of servers using one or more random numbers generated by a random number generator;
sending, to the selected first server, a second message;
sending, to the web server, a content request that comprises the content identifier;
receiving, from the web server, the content, in response to the content request; and
sending, to the first or second server using HTTP Proxy protocol or connection, the content, in response to the first message,
wherein the communication over the Internet with the first or second server uses Socket Secure (SOCKS) protocol or connection,
wherein the first or second server serves as an SOCKS server and the appliance serves as an SOCKS client,
wherein the idling condition is determined to be met based on, or according to, activating or executing the process or thread by the operating system or the program,
wherein the idling condition is determined to be met based on, or according to, the monitored or metered resource utilization being under a threshold,
wherein the appliance is associated with a first value that comprises a first numeric value or a first identifier of a feature, a characteristic, or a property of a first attribute type, and
wherein the appliance is associated with a second value that comprises a second numeric value or a second identifier of a feature, a characteristic, or a property of a second attribute type.

US Pat. No. 11,115,228

METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR INDIVIDUAL PROFILE TELEMETRY DISCOVERY WITHIN A GROUP BASED COMMUNICATION SYSTEM

Slack Technologies, Inc.,...


1. An apparatus comprising at least one processor and at least one memory storing computer code that, when executed by the at least one processor, causes the apparatus to:analyze a plurality of interactions between a user account associated with a communication platform and one or more other user accounts of the communication platform to generate an attention score vector associated with the user account, the attention score vector comprising a plurality of attention scores associated with the plurality of interactions, wherein each attention score is associated with a user identifier corresponding to another user account of the one or more other user accounts;
generate, for each attention score of the plurality of attention scores, a divergence score associated with the user account based at least in part on a difference between a predicted short term attention score and an actual short term attention score, wherein the predicted short term attention score represents predicted interactions between the user account and the one or more other user accounts and the actual short term attention score represents actual interactions between the user account and the one or more other user accounts;
rank the plurality of attention scores based at least in part on the divergence score;
provide, for rendering via a client device, an interface comprising at least one of the attention score vector or a ranked list of the plurality of attention scores.

US Pat. No. 11,115,227

TERMINAL AND METHOD FOR BIDIRECTIONAL LIVE SHARING AND SMART MONITORING

AINEMO INC., Beijing (CN...


1. A terminal for bi-directional live sharing and smart monitoring, comprising: a video capture unit, an audio capture unit, a display, a speaker and a transceiver;wherein the transceiver is configured to transmit a video and an audio respectively captured by the video capture unit and the audio capture unit in real time to a specific address via a dedicated channel and receive a video and an audio from the specific address in real time through the dedicated channel, then output respectively through the display and the speaker;
the transceiver is configured to: in response to receiving the video and the audio from the specific address, identify whether a person or a specific person, a specific action, or an abnormal condition exists in the video and the audio respectively captured by the video capture unit and the audio capture unit; and in response to identifying the person or the specific person, the specific action, or the abnormal condition from the video and audio respectively captured by the video capture unit and the audio capture unit, send a first notification information to the specific address in real time;
wherein the dedicated channel is established in advance, and at each time when the transceiver sends the video and audio in real time to the specific address or receives the video and audio from the specific address, there is no need to re-establish a call, and the terminal is used for a trusted fixed place: and
wherein the transceiver is further configured to receive, from the specific address, a second notification information indicating that the person, the specific person, the specific action or the abnormal condition is identified by a terminal at the specific address.

US Pat. No. 11,115,226

DEBRIEF MODE FOR CAPTURING INFORMATION RELEVANT TO MEETINGS PROCESSED BY A VIRTUAL MEETING ASSISTANT

CISCO TECHNOLOGY, INC., ...


1. A method comprising:receiving, by a virtual meeting assistant, a meeting invite from one of a plurality of meeting participants of a meeting;
parsing, by the virtual meeting assistant, a plurality of meeting parameters from the meeting invite, the plurality of parameters enabling the virtual meeting assistant to join the meeting;
electronically connecting, by the virtual meeting assistant, to a meeting platform based on the plurality of meeting parameters parsed from the meeting invite;
determining, via a background process that operates during the meeting and independently identifies when meeting participants leave the meeting, that meeting has concluded; and
subsequent to determining that the meeting has concluded, for a first participant of the plurality of participants:determining, by the interactive virtual meeting assistant, that a debrief setting associated with the first participant is activated and applicable to the meeting, wherein determining, by the interactive virtual meeting assistant, that the debrief setting is activated and applicable to the meeting comprises accessing, by the interactive virtual meeting assistant, the debrief setting from a user profile associated with the first participant and stored in a data store, and wherein the debrief setting is activated for a meeting type associated with the meeting in which the first participant is a participant,
electronically transmitting, by the interactive virtual meeting assistant, a request to the first participant for providing a debrief associated with the meeting, wherein the request comprises a link to an application that enables the first participant to provide the debrief,
in response to the request, receiving, by the interactive virtual meeting assistant, the debrief associated with the meeting,
generating, by the interactive virtual meeting assistant, a private association between the debrief and the meeting, the private association limiting access to the debrief only to the first participant, and
generating, by the interactive virtual meeting assistant, a post meeting task from the debrief.


US Pat. No. 11,115,225

REMOTE HOME ROUTER COMMUNICATION VIA SET-TOP BOX

Verizon Patent and Licens...


1. A method, comprising:receiving, by a set-top box (STB), a router reboot or reset activation code generated by an Operations Support System (OSS) that manages a first network;
activating, at the STB, a router reboot or reset function based on the received activation code;
identifying, by the STB upon activation of the router reboot or reset function, a model of a router connected to the STB;
generating, by the STB, a router reboot or reset command based on the identified model of the router; and
sending, by the STB, the generated router reboot or reset command to the router to cause the router to perform a reboot or reset process.

US Pat. No. 11,115,224

ACCESS CONTROL SYSTEM

Amazon Technologies, Inc....


1. A computer-implemented method, comprising:receiving a digital certificate to enable authentication of a client system;
in response to authenticating the client system, sending a set of credentials to the client system wherein the set of credentials corresponds to one or more security roles associated with the digital certificate, and wherein the set of credentials are valid for an amount of time less than an amount of time for which the digital certificate is valid;
providing the set of credentials to an application to enable the application to access a service using the set of credentials; and
determining that the set of credentials is going to expire within a threshold amount of time.

US Pat. No. 11,115,223

CRYPTOGRAPHIC MATERIAL DISTRIBUTION AND MANAGEMENT

Amazon Technologies, Inc....


1. A computer-implemented method, comprising:receiving, at a control domain of a host computer system, where the control domain is associated with a first set of privileges for accessing underlying hardware of the host computer system, from a cryptographic material management service of a computing resource service provider, a request to make cryptographic material available to a computing resource executed by the host computer system, where the computing resource is associated with a second set of privileges;
as a result of the control domain authenticating the request, provisioning a secure module for the computing resource to be attached to the computer resource through an interface based at least in part on the first set of privileges; and
providing, by the control domain, the cryptographic material to be stored by the secure module, the cryptographic material being non-exportable from the secure module to the computing resource and use of the cryptographic material for performing one or more cryptographic operations being programmatically available to the computing resource via the interface.

US Pat. No. 11,115,222

METHOD FOR SECURELY REGISTERING A REMOVABLE ELECTRICAL DEVICE WHEN INSTALLING IT WITHIN AN ELECTRICAL SYSTEM

Schneider Electric Indust...


1. A method for securely registering a removable electrical device when installing it within an electrical system in order to replace a faulty removable electrical device, wherein the method comprises the steps of:a) after the installation of a new removable electrical device, which is a circuit breaker device, within an electrical system in order to replace a faulty removable electrical device of this electrical system, acquiring automatically, with an electronic control module of the electrical system, a first security certificate for the new removable electrical device, stored in a computer memory of an embedded electronic computer of the new removable electrical device, said first certificate being signed by an authority known to the system;
b) verifying the authenticity of the first acquired security certificate, said verification being carried out by the electronic control module;
c) generating a second security certificate for the new removable electrical device, said second security certificate including a key generated by the electronic computer of the new removable electrical device;
d) obtaining a signature for the second security certificate from a trusted certification authority, the new removable electrical device then being registered within the electrical system only if said signature is obtained,
wherein after step a), the method includes a step of identifying the new removable electrical device on the basis of identification data contained in the first security certificate acquired, the registration of the new removable electrical device being refused if said new removable electrical device is not identified as a same type as the faulty removable electrical device which it replaces within the electrical system.

US Pat. No. 11,115,221

VERIFYING A REBUILT ENCODED DATA SLICE USING SLICE VERIFICATION INFORMATION

Pure Storage, Inc., Moun...


1. A method for execution by one or more processing modules of a storage network, the method comprises:receiving, by a storage unit of the storage network, an encoded data slice of a set of encoded data slices for storage in the storage unit;
receiving, by the storage unit, a set of integrity values corresponding to the set of encoded data slices, the set of integrity values generated by performing a first integrity function on each of the encoded data slices of the set of encoded data slices;
performing, by the storage unit, a second integrity function on the set of integrity values to produce a calculated integrity value of the set of integrity values;
indicating that the set of integrity values are validated when the calculated integrity value matches a locally stored integrity value;
performing, by the storage unit, the first integrity function on the received encoded data slice to produce a calculated integrity value of the received encoded data slice; and
indicating that the received encoded data slice is valid when the calculated integrity value of the received encoded data slice matches a corresponding integrity value of the validated set of integrity values.

US Pat. No. 11,115,220

COMPLETE FORWARD ACCESS SESSIONS

Amazon Technologies, Inc....


1. An authentication system, comprising:one or more machine-readable mediums having stored thereon a set of instructions, which if performed by one or more processors, cause the system to at least:receive an authentication request to verify authentication information submitted to a first system in connection with a first request submitted by a client device to the first system over a network, wherein the authentication request includes an electronic signature for verification, the electronic signature being from the client device that is different from the first system;
generate a response to the authentication request that includes information usable by a second system to make, without communicating with the authentication system, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system on behalf of the client device is allowable under authority of the authentication system, the determination being based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request, wherein the second request from the first system is for access to one or more computing resources managed by the second system on behalf of the client device; and
provide the response to the first system.


US Pat. No. 11,115,219

METHOD AND SYSTEM FOR PREVENTING DISTRIBUTION OF ILLEGAL CONTENT OVER THE INTERNET

Sang Min Ha


1. A method of preventing illegal content from being distributed over the Internet, the method comprising:searching for, by a distribution prevention module, a hash value of specific content;
extracting, by the distribution prevention module, a target peer that distributes the specific content on the basis of the hash value to generate an identification value of the target peer;
establishing, by the distribution prevention module, an initial connection with the target peer; and
transmitting, by the distribution prevention module, a query to the target peer, such that a number of queues in a job queue of the target peer is increased,
wherein the establishing, by the distribution prevention module, of the initial connection with the target peer includes:
generating a virtual peer and an identification value of the virtual peer; and
generating a message for the initial connection with the target peer using the identification value of the virtual peer.

US Pat. No. 11,115,218

SYSTEM FOR SECURE METERING FROM SYSTEMS OF UNTRUSTED DATA DERIVED FROM COMMON SOURCES

FISHER-ROSEMOUNT SYSTEMS,...


1. A method for secure metering of untrusted data in process control systems using a distributed ledger maintained by a plurality of participants, the method comprising:collecting, by a field device performing a physical function to control an industrial process in a process plant, a measurement of a parameter within the process plant;
obtaining, by a computing device, the measurement of the parameter;
generating a transaction including the measurement; and
prior to expiration of a threshold time period, transmitting the transaction to at least one other participant in a local distributed ledger network of participants maintaining a local distributed ledger;
after the threshold time period has expired, transmitting a plurality of transactions generated during the threshold time period to at least one participant in a global distributed ledger network of participants maintaining a global distributed ledger, wherein the local distributed ledger is maintained by nodes in the process plant, and the global distributed ledger is maintained by nodes in a plurality of process plants.

US Pat. No. 11,115,217

SYSTEMS AND METHODS FOR DETECTING DEVICE LOCATION AND USAGE

Avaya Inc., Santa Clara,...


1. A system comprising:a memory storing executable instructions; and
a processor in communication with the memory, wherein the processor when executing the executable instructions:receives, from a device, a device certificate comprising a unique identifier;
based on an authorized deployment region for the device, generates stored data comprising at least one of an expected location for the device or an expected usage of the device;
associates the stored data with the device using the unique identifier extracted from the device certificate;
subsequently receives, from the device, a first message comprising first data, wherein the first data comprises the device certificate with the unique identifier and a first hash of device data that is indicative of at least one of a current device location or a current device usage, the device data comprising at least one of a current Session Initiation Protocol (SIP) domain of the device, a current time zone in which the device is located, data related to a current posture of the device, a configured language of the device, a dialing configuration of the device for emergency numbers, or a dial plan of the device;
using the unique identifier, retrieves the stored data associated with the device;
after receiving the first message, transmits, to the device, instructions to transmit a second message comprising second data that is different from the first data, wherein the second data comprises at least one of a hardware configuration of the device, a Domain Name System (DNS) domain name, a public Internet Protocol (IP) address of a DNS server, or a public IP address of a Network Time Protocol (NTP) server;
receives, from the device, the second message;
for the first message:generates a second hash of one or more first corresponding portions of the stored data; and
compares the first and second hashes;

for the second message:compares the second data to one or more second corresponding portions of the stored data; and

when at least one of (i) the first and second hashes do not match, or (ii) the second data and the one or more second corresponding portions of the stored data do not match, generates an alert.


US Pat. No. 11,115,216

PERTURBATION-BASED ORDER PRESERVING PSEUDONYMIZATION OF DATA

MICRO FOCUS LLC, Santa C...


1. A method comprising:accessing data representing a plurality of plaintext values; and
converting, by a processor of a computing device, the plurality of plaintext values to a plurality of pseudonym values, wherein the converting comprises:performing an encryption of the plurality of plaintext values to provide a plurality of ciphertext values;
perturbing each ciphertext value of the plurality of ciphertext values to provide a pseudonym value of the plurality of pseudonym values, wherein the perturbing of each ciphertext value of the plurality of ciphertext values comprises: generating a perturbation value of a plurality of perturbation values to be added to the ciphertext value of the plurality of ciphertext values, wherein the perturbation value is smaller than the ciphertext value to which the perturbation value is to be added, and adding the perturbation value to the ciphertext value to generate the pseudonym value; and
controlling the perturbing of each ciphertext value of the plurality of ciphertext values to cause an ordering of the plurality of plaintext values to be represented in the plurality of pseudonym values, wherein the controlling comprises, for each ciphertext value, determining whether to perform another iteration of adding the perturbation value to the ciphertext value based on the pseudonym value.


US Pat. No. 11,115,215

METHODS AND DEVICES OF ENABLING AUTHENTICATION OF A USER OF A CLIENT DEVICE OVER A SECURE COMMUNICATION CHANNEL BASED ON BIOMETRIC DATA

FINGERPRINT CARDS AB, Go...


1. A method performed by a network node of enabling authentication of a user of a client device based on biometric data captured by the client device, comprising:receiving, from the client device, a request to authenticate a user of the client device, the authentication request comprising a user identifier;
fetching, from the secure end-user repository, at least one set of enrolled transformed biometric data corresponding to the user identifier received from the client device and a secret feature transform key with which the biometric data was transformed at enrolment of the transformed biometric data at the network node; and
submitting the transformed biometric data and the secret feature transform key over a secure communication channel to the client device, wherein the submitted transformed biometric data is compared at the client device with biometric data being captured at the client device and transformed with the secret feature transform key and if there is a match, the user is authenticated.

US Pat. No. 11,115,214

BIOMETRIC SIGNATURE SYSTEM AND BIOMETRIC SIGNATURE METHOD

Hitachi, Ltd., Tokyo (JP...


1. A biometric signature system, comprising a processor and a memory,the memory being configured to hold:a first template indicating a result of transforming, by predetermined transformation, first biometric information acquired from a predetermined part of a user; and
a second template indicating a result of transforming, by predetermined one-way transformation, second biometric information acquired from the predetermined part of the user,

the processor being configured to:acquire the first biometric information and the second biometric information from a person to be authenticated;
generate a first template of the person to be authenticated from the acquired first biometric information;
identify a parameter for which a similarity between the first template of the person to be authenticated corrected by using the parameter and the first template held in the memory is larger than a predetermined condition;
correct the second biometric information on the person to be authenticated by using each parameter included in a predetermined range including the identified parameter;
generate a second template of the person to be authenticated from each piece of corrected second biometric information; and
determine whether authentication of the person to be authenticated is successful by comparing each generated second template with the second template held in the memory.


US Pat. No. 11,115,213

THWARTING ONE-TIME PASSWORD THEFT

NORTONLIFELOCK INC., Tem...


1. A computer-implemented method for thwarting one-time password (OTP) theft, at least a portion of the method being performed by a mobile device comprising at least one processor, the method comprising:receiving, at a messaging application executing on the mobile device, a text message from a website that includes an original OTP;
encrypting, by the messaging application, the original OTP included in the text message to thwart theft of the original OTP from the text message;
storing, by the messaging application, the text message including the encrypted OTP;
detecting, at an OTP plugin application, entry of the encrypted OTP into the website loaded into a browser application;
decrypting, by the OTP plugin application, the encrypted OTP to reveal the original OTP; and
replacing, by the OTP plugin application, the encrypted OTP with the original OTP prior to submission of the original OTP to the website.

US Pat. No. 11,115,212

MULTI-PROCESSING NODE CONNECTION IN A DATA STORE SYSTEM VIA ENCRYPTED PASSWORD

Teradata US, Inc., San D...


1. A system comprising:a server comprising at least one storage device and at least one processor, wherein the server is configured to execute an application and the storage device is configured to store an encrypted password;
a data store system independent from the server, wherein the data store system comprises:at least one persistent storage device configured to store a data store;
a plurality of processing nodes configured to operate on the data store, wherein the data store is configured to:
receive the encrypted password from the application with one of the plurality of processing nodes;
decrypt the encrypted password with the one of the plurality of processing nodes;
authenticate the decrypted password with the one of the processing nodes; and
provide, with the one of the processing nodes, the decrypted password to other processing nodes, wherein each processing node that has the decrypted password is accessible to the application to operate on the data store.


US Pat. No. 11,115,211

SECURE CONTAINER PLATFORM FOR RESOURCE ACCESS AND PLACEMENT ON UNMANAGED AND UNSECURED DEVICES

BA INSIGHT, LLC, Boston,...


1. A method of selectively providing a customized graphical user interface, the method comprising:at a first computing device:receiving a service access request from a client device to access one or more services provided by a virtual desktop infrastructure server, the service access request including an authentication characteristic of a user of the client device and computing device characteristics of the client device;
after receiving the service access request, forwarding the service access request to the virtual desktop infrastructure server;
after forwarding the service access request to the virtual desktop infrastructure server, receiving a user interface configuration file from the virtual desktop infrastructure server, wherein the user interface configuration file is configured to be executed by the client device to enable the client device to display a user interface that provides access to the one or more services;
after receiving the user interface configuration file from the virtual desktop infrastructure server, modifying, at the first computing device before transmitting to the client device, the user interface configuration file received from the virtual desktop infrastructure server based on the user authentication characteristics and the computing device characteristics of the client device, to provide selective access to the one or more services;
after modifying the user interface configuration file received from the virtual desktop infrastructure server, transmitting the modified user interface configuration file to client device, wherein the modified user interface configuration file is configured to be executed by the client device to enable the client device to display a modified user interface that provides selective access to the one or more services.


US Pat. No. 11,115,210

SYSTEMS AND METHODS FOR MASKING RSA OPERATIONS

Maxim Integrated Products...


1. A method for protecting confidential data, the method comprising:receiving a secret value and a random value;
at a secure device, adding the random value to the secret value to obtain a masked value;
storing the masked value in a non-secure memory, the non-secure memory being external to the secure device;
using the masked value to compute an intermediate value;
erasing the masked value from the non-secure memory, such that in the event of an attack neither one of the secret value and the random value can be recovered from the non-secure memory;
loading an exponent value into the non-secure memory; and
using the intermediate value and the exponent value to compute a final value.

US Pat. No. 11,115,209

METHODS AND SYSTEMS FOR PREPARING AND PERFORMING AN OBJECT AUTHENTICATION

Merck Patent GmbH, Darms...


1. A method of preparing a subsequent secured authentication of a physical object or group of physical objects (PO(s)) by a recipient (B, B?) thereof, the method comprising:determining location-invariant and time-invariant information relating specifically to said PO(s) and a random context data (RCD) indicating a random location and a random time;
combining, to obtain a data set, according to a time-variant first predetermined combination scheme (CS3), said location-invariant and said time-invariant information relating to said PO(s) with said RCD;
generating, an original hash value (Ho) by applying a cryptographic hash function to said obtained data set;
signing said Ho with a digital signature;
outputting initialization data (IND) representing said Ho including said digital signature;
storing or causing to be stored, said IND to a third data storage (DS3), wherein storing said IND to said DS3 involves storing said IND to a blockchain or a blockless distributed ledger; and
adding to said PO(s) a representation of a pointer indicating where said IND can be accessed in said DS3.

US Pat. No. 11,115,208

PROTECTING SENSITIVE INFORMATION FROM AN AUTHORIZED DEVICE UNLOCK


1. A computing device comprising:a first partition in which only applications authorized by a cryptographic verification performed on the computing device can execute;
a second partition in which applications can execute without the authorization required by the first partition;
an unlocking component comprising two modules for unlocking the device, a primary unlock module, and an authorized external unlock module; and
coupled to the first and second partitions, a resource protection module configured to prevent protected data of applications authorized to execute in the first partition from being accessed by applications executing in the second partition; whereinthe resource protection module is further configured to prevent protected data of applications authorized to execute in the first partition from being accessed by applications executing in the second partition conditioned upon the device having been unlocked using the authorized external unlock module; and
the authorized external unlock module comprises an unlock verification key and a verification module for verifying a digital signature using the unlock verification key, wherein the verification module is configured to verify the digital signature before issuing a valid unlock command.


US Pat. No. 11,115,207

IDENTITY SYSTEMS, METHODS, AND MEDIA FOR AUDITING AND NOTIFYING USERS CONCERNING VERIFIABLE CLAIMS

Sidewalk Labs LLC, New Y...


1. A method for identity escrow, the method comprising:prior to engaging with a verifier needing information held in escrow on behalf of a holder, receiving, using a hardware processor, a request to store the information associated with the holder in escrow;
causing, using the hardware processor, a user interface to be presented, wherein the user interface allows the holder to select an escrow provider from a plurality of escrow providers for storing the information associated with the holder in escrow;
transmitting, using the hardware processor, the information to the selected escrow provider, wherein a public-private key pair for signing with the information associated with the holder is generated, wherein the public-private key pair includes a public key and a private key, wherein the private key and the information associated with the holder is distributed to the plurality of escrow providers, and wherein the public key is transmitted to an auditable ledger system;
receiving, using the hardware processor, from each of the plurality of escrow providers, an escrow identifier corresponding to a location where the information is stored in escrow to obtain a set of escrow identifiers; and
transmitting, using the hardware processor, the set of escrow identifiers to a verifier device for verifying a claim.

US Pat. No. 11,115,206

ASSYMETRIC STRUCTURED KEY RECOVERING USING OBLIVIOUS PSEUDORANDOM FUNCTION

INTERNATIONAL BUSINESS MA...


1. A computing device configured to implement a key management system (KMS), the computing device comprising:an interface configured to interface and communicate with a communication system;
memory that stores operational instructions; and
processing circuitry operably coupled to the interface and to the memory, wherein the processing circuitry is configured to execute the operational instructions to:maintain structured key parameters associated with a structured key;
maintain a generating procedure associated with the structured key, the generating procedure configured to produce the structured key from an Oblivious Pseudorandom Function (OPRF) output, and the structured key parameters;
receive, from a requesting computing device, a blinded value associated with the structured key;
process the blinded value using an OPRF secret to generate a blinded OPRF output; and
return the blinded OPRF output, the generating procedure, and the structured key parameters to the requesting computing device, for generation of the structured key by the requesting computing device.


US Pat. No. 11,115,205

METHOD AND APPARATUS FOR TRUSTED COMPUTING

Nokia Technologies Oy, E...


1. A method at an isolated processor comprising a trusted execution environment and an isolated storage,receiving encrypted data that is encrypted with a first public key;
decrypting the encrypted data with a first private key;
performing calculation on the decrypted data by using an approved program; and
providing a calculation result,
wherein the approved program is authorized by a smart contract, a unique identifier of the smart contract is stored in the isolated processor, both the approved program and the isolated processor are verified by at least one participant of the smart contract, and the first public key and the first private key are generated by the isolated processor.

US Pat. No. 11,115,204

COOPERATIVE PLATFORM FOR GENERATING, SECURING, AND VERIFYING DEVICE GRAPHS AND CONTRIBUTIONS TO DEVICE GRAPHS

Adobe Inc., San Jose, CA...


1. A non-transitory computer-readable storage medium having instructions stored thereon for providing device graphing services to a plurality of website hosts that includes a first website host and other website hosts, the instructions when executed by a processor of a computing device cause the computing device to perform actions comprising:accessing user data that was provided by at least a portion of website hosts of the plurality of website hosts and is distributed across a plurality of ledger transactions that includes a first ledger transaction and a second ledger transaction, the second ledger transaction is subsequent to the first ledger transaction in a sequence of the plurality of ledger transactions, wherein a first portion of ledger transactions of the plurality of ledger transactions is associated with the first website host and the second ledger transaction includes a hash value of at least a portion of content of the first ledger transaction;
generating a device graph based on the accessed user data, wherein the device graph includes a set of user nodes, a set of device nodes, and a set of graph edges that connects each user node of the set of user nodes to a corresponding subset of device nodes of the set of device nodes, wherein the generation of the device graph comprising determining each graph edge of the set of graph edges based on one or more ledger transactions of the plurality of ledger transactions;
generating a first contribution metric for the first website host that indicates a contribution of the first website host to the device graph relative to the other website hosts, wherein the generation of the first contribution metric is based on a number of graph edges in the set of graph edges of the device graph, and the number of graph edges are determined based on one or more ledger transactions of the first portion of ledger transactions that is associated with the first website host; and
providing, to the first website host, the device graph and the first contribution metric.

US Pat. No. 11,115,203

SYSTEM AND METHOD FOR SECURING PERSONAL INFORMATION VIA BIOMETRIC PUBLIC KEY

Badge Inc., Lewes, DE (U...


1. A system for using biometric data to authenticate a subject as an individual whose biometric data has been previously obtained using a first transducer, without the need for non-transient storage of the biometric data, the device comprising:a second transducer; and
a computing facility that is coupled to the second transducer, the computing facility including a computing processor and a non-transitory computer readable storage medium encoded with instructions that, when executed by the computing processor, establish processes comprising:receiving by the computing facility, from the second transducer, a digital electronic signal that characterizes a biometric of the subject;
extracting by the computing facility, from the digital electronic signal, a set of biometric values of the subject;
extracting, by the computing facility, a confident subset of the set of biometric values of the subject, the confident subset being a reliable discriminant of the identity of the subject based on the biometric;
receiving by the computing facility, from a storage facility, a biometric public key that was computed based on a secret number and the biometric data of the individual that has been previously obtained using the first transducer, wherein the biometric public key verifiably characterizes both the biometric data of the individual and the secret number without the need for non-transient storage of either the biometric data of the individual or the secret number; and
calculating, by the computing facility, a candidate value for the secret number using the biometric public key and the confident subset;
wherein extracting, by the computing facility, a confident subset of the set of biometric values of the subject, includes performing a transform of the set of biometric values.


US Pat. No. 11,115,202

APPARATUS FOR GENERATING SECRET INFORMATION ON BASIS OF RING OSCILLATOR ARCHITECTURE AND METHOD OF SAME

Electronics and Telecommu...


1. An apparatus for generating secret information on the basis of a ring oscillator, the apparatus comprising:multiple hardware physically unclonable function (PUF) information generation units each including at least one ring oscillator cell configured to generate PUF information;
a phase checking unit configured to
cross-check phases for multiple pieces of the PUF information that are output from the multiple PUF information generation units, respectively, and
detect a phase of a clock signal generated through each of the at least one ring oscillator cell; and
a secret key generation unit configured to output secret key information based on a result of comparing the multiple phases received from the phase checking unit;
wherein the at least one ring oscillator cell comprises: a flip-flop element configured to receive an oscillator enable signal and a system clock signal;
an AND gate;
an odd number of inverter cells connected to an output terminal of the AND gate in series; and
a divider configured to divide a clock of a last inverter cell of the odd number of inverter cells by two,
wherein an output of the flip-flop element is connected to a first input of the AND gate, and
an output of the last inverter cell is connected to a second input of the AND gate; and
wherein the phase checking unit and the secret key generating unit are integrated in a hardware component.

US Pat. No. 11,115,201

DOWNLOADING OF DATA TO SECURE DEVICES

Combined Conditional Acce...


1. A method comprising:retrieving, by a secure device, personalized unit data stored in a memory of the secure device;
retrieving, by the secure device, a sequence number stored in the memory of the secure device, wherein the sequence number indicates a quantity of times that software has been previously executed successfully;
generating, based on the personalized unit data and based on executing at least a portion of a key generation algorithm a quantity of times based on the sequence number, a first decryption key;
decrypting, using the first decryption key, a second decryption key;
decrypting, using the second decryption key, first software code;
executing the first software code;
determining that the execution of the first software code was successful; and
based on determining that the execution of the first software code was successful, updating the sequence number stored in the memory of the secure device to an updated sequence number.

US Pat. No. 11,115,200

SYSTEM, METHOD, AND APPARATUS FOR QUANTUM KEY OUTPUT, STORAGE, AND CONSISTENCY VERIFICATION

ALIBABA GROUP HOLDING LIM...


1. A method, comprising:acquiring, by a first quantum key management device, a first quantum key from a first quantum key distribution device; and
storing, by the first quantum key management device, the acquired first quantum key in a first management device address range in a first storage media, the first management device address range having the same address range indicator as a second management device address range in a second storage media for storing a corresponding second quantum key acquired by a second quantum key management device, wherein the address range indicator is one of a pair of head address and a tail address, a head address and a range length, or a head address and a length of one of the first quantum key or the second quantum key.

US Pat. No. 11,115,199

INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT

KABUSHIKI KAISHA TOSHIBA,...


1. An information processing method, comprising:monitoring an operation state of an information processing device including a key generating unit that generates key information shared among a plurality of devices using a quantum key distribution technique;
providing the generated key information when the operation state satisfies a predetermined condition;
stopping provision of the generated key information when the operation state does not satisfy the condition; and
outputting output information by at least one of display on a display device, output by light, output by a sound, and output to an output destination via a network when the provision of the key information is stopped, the output information indicating that the provision of the key information is stopped.

US Pat. No. 11,115,198

KEY GENERATION DEVICE, KEY GENERATION METHOD, AND COMPUTER PROGRAM PRODUCT

KABUSHIKI KAISHA TOSHIBA,...


1. A key generation device comprising:a memory; and
one or more hardware processors coupled to the memory and configured to function as:
a calculating unit configured to calculate a key length;
a determining unit configured to determine a block size corresponding to a unit of processing in key generation based on at least one of a resource of the key generation device, an error rate of a channel, and statistical information on a pulse received via the channel, and an outputtable size indicating size of a key outputtable by the key generation; and
a generating unit configured to generate a key having the key length by a hash operation using an input bit string and a matrix having a size determined by the block size and the outputtable size, the input bit string having the block size.

US Pat. No. 11,115,197

SECRET SHARING INFORMATION MANAGEMENT AND SECURITY SYSTEM

Wells Fargo Bank, N.A., ...


1. A method, comprising:receiving, by a shared secret provider computing system, an original message, a share-holder list, and a threshold amount;
digitally signing, by the computing system, the original message with a private key, wherein authenticity and data integrity of the original message can be determined based on each of the digitally signed original message and a public key of a public/private key pair including the private key;
tokenizing, by the computing system, the original message resulting in a tokenized message;
generating, by the computing system, a plurality of shares from the tokenized message using a message sharing algorithm of a secret sharing scheme;
signcrypting, by the computing system, each of the plurality of shares using a public key and a private key associated with the shared secret provider computing system and a public key of a respective one of the share-holders included in the share-holders list, resulting in a plurality of signcrypted shares; and
distributing, by the computing system, the plurality of signcrypted shares to the respective ones of the share-holders according to the public key used to signcrypt the respective signcrypted share,
wherein authenticity and data integrity of each of the plurality of digitally signed shares can be determined by each of the received plurality of signcrypted shares using the shared secret provider computing system public key, and a public/private key pair associated with each share-holder in the received the received plurality of signcrypted shares.

US Pat. No. 11,115,196

METHODS AND APPARATUS FOR SECRET SHARING WITH VERIFIABLE RECONSTRUCTION TYPE

EMC IP Holding Company LL...


1. A method, comprising:receiving a plurality of shares of a secret, wherein a set of said shares comprising said plurality of shares are generated from said secret using a secret splitting scheme, wherein the secret can be reconstructed from a subset of the set of shares that satisfies a predefined reconstruction threshold;
reconstructing, using at least one processing device associated with a reconstructor entity, said secret if said plurality of shares satisfy said predefined reconstruction threshold; and
generating, using said at least one processing device associated with said reconstructor entity, a proof identifying at least one of said plurality of shares that was used in said reconstruction of said secret.

US Pat. No. 11,115,195

AUTHENTICATION SERVER OF A CELLULAR TELECOMMUNICATION NETWORK AND CORRESPONDING UICC

THALES DIS FRANCE SA, Me...


1. An authentication server device of a cellular telecommunication network comprising:a memory that stores a Key K,
wherein said authentication server generates an authentication token and transmits the authentication token to a telecommunication terminal, said authentication token comprising a message authentication code and a sequence number, wherein said message authentication code is equal to:MACx=KIdx XOR f1(AMF,SQNx,RAND,K)


with KIdx being a key index information in the form of a bias of a MAC equal to:MAC=f1(K,AMF,SQNx,RAND)

with f1 being a function, the key K, RAND a random number and SQNx a sequence counter relative to a corresponding key Kx derived from the key K and KIdx, and AMF the content of an authentication management field as defined in 3GPP TS 33.102.

US Pat. No. 11,115,194

GRAY IMAGE VISUAL ENCRYPTION METHOD

SHANDONG UNIVERSITY OF SC...


1. A gray image visual encryption method, comprising the following steps:step s11: color gamut mapping
an input secret image being a gray image J[n], wherein n=[nx,ny], nx refers to a horizontal position of a pixel, ny refers to a vertical position of the pixel, and a size of an image block is determined as B×B; and
mapping a color gamut of the gray image J[n] into a color gamut of a reconstructed image is, a target imagesuperimposed with visual cryptography;
step s12: block segmentation
performing block segmentation for the gray image subjected to the color gamut mapping to obtain a plurality of mutually non-overlapped image blocks with the size being B×B; and
sequentially accessing each image block in a grating scanning order, and processing one image block each time;
step s13: vector quantization
quantizing each image block into a binary image block by using a vector quantizer, that is, a value of each pixel after quantization being 0 or 1;
step s14: vector visual encryption
obtaining k shared image blocks s1[n], . . . , sk[n] by performing vector visual cryptography encoding for the quantized binary image block;
step s15: simulation of superimposition decoding
superimposing the k shared image blocks s1[n], . . . , sk[n], that is,
obtaining a target image block ?[n] by multiplying pixel values corresponding to different shared image blocks for visual cryptography decoding;
step s16: error calculation
calculating an error between an input image block x[n] of the vector quantizer and the target image block ?[n] as e[n]: e[n]=x[n]??[n];
step s17: vector error diffusion
diffusing an error e[n] into four image blocks around a current image block by using a vector error diffusion filter H[n]; and
the error after diffusion being ê[n], obtaining a modified image block x[n]=x[n]+ê[n] by modifying input pixel values of the above four image blocks with the error ê[n], and using the modified image block x[n] as an input of the vector quantizer at step s13; and
the steps s17 specifically comprises:
step s171: neighborhood selection
selecting four image blocks located at a right side, a left lower side, a lower side and a right lower side of the current image block as neighbors of the current image block, wherein these neighbors are destinations to which the error of the current image block is diffused; and
step s172: diffusing the error e[n] into the image blocks in a neighborhood by using the vector error diffusion filter H[n];
sequentially accessing each pixel in the current image block, calculating the error between the pixel of the reconstructed image and the input pixel of the vector quantizer, and diffusing the error onto a pixel around the current image block by using an ordinary scalar error diffusion filter; and
when the error is diffused onto one quantized pixel, not changing the pixel value, and allowing, by the pixel, the diffused error to be unchanged, and transferring the error to a plurality of surrounding pixels by a same scalar error diffusion filter;
step s18: processing each image block through the above steps s13-s17, and obtaining an output result of the visual encryption method by using k shared images s1[n], . . . , sk[n] as an output after the processing of all image blocks is completed.

US Pat. No. 11,115,193

TECHNOLOGIES FOR INTERNET OF THINGS KEY MANAGEMENT

Intel Corporation, Santa...


1. An internet-of-things (IoT) device for key management, the IoT device comprising:one or more processors; and
one or more data storage devices having stored therein a plurality of instructions that, when executed by the one or more processors, cause the IoT device to:authenticate with an authority center server via an offline communication channel;
receive a group member private key as a function of the authentication with the authority center server;
authenticate with a group management server via a secure online communication channel using the group member private key;
receive a group shared key as a function of the authentication with the group management server;
encrypt secret data with the group shared key; and
transmit the encrypted secret data to the group management server.


US Pat. No. 11,115,192

MANAGING CRYPTOGRAPHIC KEYS BASED ON IDENTITY INFORMATION

Advanced New Technologies...


1. A computer-implemented method for managing user key pairs, the method comprising:receiving biometric information associated with a user and a request to store a user key pair to a memory on an identity cryptographic chip (ICC);
comparing the biometric information associated with the user with biometric information pre-stored in the memory as pre-stored biometric information, wherein the pre-stored biometric information is stored in the memory during initialization of the ICC, and wherein the initialization of the ICC comprises:storing first cryptographic operation code executable to add a digital signature based on the user key pair; and
storing second cryptographic operation code executable to perform file encryption or file decryption based on the user key pair;

in response to determining that the biometric information associated with the user matches the pre-stored biometric information, encrypting the user key pair to provide an encrypted user key pair; and
storing the encrypted user key pair to the memory,
wherein the request to store the user key pair is a first request, the biometric information is first biometric information, and wherein the computer-implemented method further comprises:receiving second biometric information and a second request for adding a digital signature to a file;
authenticating the second request based on matching the second biometric information to the pre-stored biometric information; and
adding the digital signature to the file based on the first cryptographic operation code and a private key of the user key pair.


US Pat. No. 11,115,191

SYSTEM AND METHOD FOR MODIFYING CONTENT STORED IN A BLOCKCHAIN


1. A method of modifying content stored in a blockchain, the method comprising:identifying, by an identification module, an old block of the blockchain comprising undesired data in at least one transaction of the old block;
creating, by a creation module, an updated block by allowing a user to correct the at least one transaction of the old block;
determining, by a determination module, a new block hash for the updated block;
submitting as a new transaction, by a submitting module, corrected form of the at least one transaction, along with the new block hash and the difference between the new block hash and hash of the old block as an offset;
allowing, by an allowing module, miners to mine the corrected form of the at least one transaction, along with other new transactions; and
mining, by a mining module, based on a consensus of users of the blockchain, the other new transactions into a new block connected to a tip of the blockchain, and editing the old block to introduce the corrected form of the at least one transaction;
the method further comprising:validating a block subsequent to an edited old block if sum of a hash of the block subsequent to the edited old block is identified to be equal to a sum of the hash of the edited old block and the offset discovered from the new block; and

identifying entire blockchain to be invalid while the block subsequent to the edited old block is identified to be invalid.

US Pat. No. 11,115,190

METHOD OF HASHING VECTOR DATA BASED ON MULTI-SCALE CURVATURE FOR VECTOR CONTENT AUTHENTICATION

Tongmyong University Indu...


1. A method of protecting a digital model comprising a vector model from being tampered or copied, the method comprising:performing rectangular tiling by dividing the vector model into a plurality of rectangular tiles; and
generating a hash for a tile among the plurality of rectangular tiles by using a hash function hash(M.R)=(H.?) based on a multi-scale curvature, wherein M represents the vector model, R represents a random key, H represents a binary hash, and ? represents a parameter,
wherein the hash is generated by:re-sampling objects within the tile;
calculating a multi curvature for each scale; and
generating the binary hash H by using a Lloyd-Max quantizer and a multi-scale curvature hash coefficient based on the key.


US Pat. No. 11,115,189

VERIFYING A BLOCKCHAIN-TYPE LEDGER

Advanced New Technologies...


1. A computer-implemented method, comprising:receiving, by a server that stores data using a blockchain-type data storage ledger, a verification request for verifying data that is currently stored in the blockchain-type data storage ledger, wherein the verification request comprises a hash value of a data record of the blockchain-type data storage ledger;
obtaining, by the server, the data record of the blockchain-type data storage ledger that corresponds to the hash value to be verified;
obtaining, by the server, a value of a service attribute included in the data record, wherein the service attribute is an identification field of the data record;
determining, by the server, a set of data records of the blockchain-type data storage ledger that each include the value of the service attribute;
determining, by the server, data blocks of the blockchain-type data storage ledger that store data records included in the set of data records; and
performing, by the server, integrity verification on the data blocks that store the data records included in the set of data records, the performing comprising:writing, into a shared memory, for each data block of the data blocks that store the data records included in the set of data records, (i) a block height of the data block, and (ii) a verification status of the data block;
creating multiple verification threads for verifying the data blocks;
obtaining each data block having a verification status that indicates that the data block has not been verified, based on the block height and the verification status of the data block according to the shared memory;
using the multiple verification threads to verify, in parallel, the data blocks that have been obtained; and
updating the verification statuses of the data blocks in the shared memory to indicate their current verification statuses.


US Pat. No. 11,115,188

BLOCKCHAIN-BASED DATA PROCESSING METHOD, APPARATUS, AND BLOCKCHAIN NODE

Advanced New Technologies...


1. A computer-implemented method for blockchain-based data processing, comprising:obtaining a first piece of transaction data to be processed by a consensus blockchain node of a blockchain, wherein the first piece of transaction data comprises ciphertext data of a transaction and a plurality of pieces of proof data that are used to verify the ciphertext data of the transaction;
processing the first piece of transaction data, wherein processing the first piece of transaction data comprises:
determining that the first piece of transaction data comprise the plurality of pieces of proof data;
in response to determining that the first piece of transaction data comprises the plurality of pieces of proof data, invoking a verification program deployed in the blockchain and verifying the plurality of pieces of proof data in parallel by the consensus blockchain node; and
after successfully verifying that the plurality of pieces of proof data in parallel by the consensus blockchain node, updating a processing result of the transaction; and
after processing the first piece of transaction data is complete, generating a block of the blockchain, wherein the block comprises the first piece of transaction data.

US Pat. No. 11,115,187

APPARATUS AND METHOD FOR BLOCK CIPHERS FOR REAL-TIME DATA TRANSMISSION

KOREA UNIVERSITY RESEARCH...


1. A block cipher apparatus, comprising:a key generating unit configured to generate keys having different lengths by entering a password into a hash function and set a pattern by generating an order of the generated keys;
a block encryption unit configured to select a key, among the generated keys, in accordance with the order of the generated keys and generate a ciphertext block by encryting a plaintext block using the selected key; and
a message authentication unit configured to generate a message authentication code using a key selected at the time of encrypting a current plaintext block which is encrypted in the block encryption unit and a previous message authentication code generated by a plaintext block prior to the current plaintext block,
wherein when the generated ciphertext block has a predetermined size or larger, the block encryption unit divides the generated ciphertext block into a header corresponding to a predetermined size and a tail corresponding to the rest, generates the header as a ciphertext block, and adds the tail with a next plaintext block to be block-encrypted.

US Pat. No. 11,115,186

BLOCKCHAIN MANAGEMENT PLATFORM FOR PERFORMING ASSET ADJUSTMENT, CROSS SECTIONAL EDITING, AND BONDING

Bank of America Corporati...


1. A computing platform comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the processor, cause the computing platform to:receive a request, from a client device, to establish an account, wherein the request grants the computing platform permission to perform a first subset of event processing steps;
in response to receiving the request to establish the account, delegate permission to an external event processor to perform a second subset of event processing steps;
in response to receiving the request to establish the account, delegate permission to an external resource management platform to perform a third subset of event processing steps;
generate an element chain corresponding to the account, wherein the element chain includes at least a single parent element;
in response to receiving a request to process an event, add a sub-element to the element chain corresponding to the event, wherein the sub-element contains a fixed parameter corresponding to an expected value associated with the event and a variable parameter corresponding to an actual value associated with the event;
send one or more commands directing the external event processor to process the event;
receive a request to write the actual value to the element chain;
in response to receiving the request to write the actual value to the element chain, modify the variable parameter of the sub-element to reflect the actual value associated with the event; and
send one or more commands directing the external resource management platform to cause a change in assets associated with the account based on the variable parameter.


US Pat. No. 11,115,185

HIGHLY SECURE WAIC BASEBAND SIGNAL TRANSMISSION WITH BYTE DISPLACEMENT APPROACH

ROSEMOUNT AEROSPACE INC.,...


1. A transceiver baseband hardware comprising:a baseband hardware block comprising an encryption-decryption block configured to encrypt and jumble intended transmission data or unjumble and decrypt received encrypted data, the encryption and the decryption based on key coefficients generated based on a random key address, the encryption and the decryption implemented via a cross logical operation of the encryption-decryption block,
wherein the cross logical operation comprises lower significant bytes of the key coefficients operating on most significant bytes of the intended transmission data or the encrypted data, and
wherein the jumble and the unjumble are implemented by a byte displacement/placement block based at least in part on the random key address.

US Pat. No. 11,115,184

FORMAT PRESERVING ENCRYPTION WITH PADDING

Micro Focus LLC, Santa C...


1. A method comprising:determining if padding of a plaintext undergoing format preserving encryption is needed in response to a length of the plaintext being less than a threshold length;
in response to determining that the padding is needed, calculating a pseudo-random padding length based on a nonzero minimum padding length and a maximum allowable length of padding and adding the padding having the pseudo-random padding length to the plaintext to provide a padded plaintext, wherein the adding comprises:including in the padding, a first character having an invalid data type for the padded plaintext and corresponding to a beginning of the padding and a second character having an invalid data type for the padded plaintext and corresponding to an end of the padding,
wherein the first and second characters are provided for each padded plaintext; and
in response to determining that the padding is needed, encrypting the padded plaintext using format preserving encryption to create cipher text.


US Pat. No. 11,115,183

TERMINAL DEVICE PERFORMING HOMOMORPHIC ENCRYPTION, SERVER DEVICE PROCESSING CIPHERTEXT AND METHODS THEREOF

Crypto Lab Inc., Seoul (...


1. A decryption method, the method comprising:receiving a homomorphic ciphertext; and
obtaining a result value added an error value at a message from the received homomorphic ciphertext,
wherein the error is disposed on the least significant bit (LSB) side in the result value, and the message is disposed at a position adjacent to the error,
wherein the homomorphic ciphertext is generated by reflecting a scaling factor in a message, and
wherein the result value is obtained by multiplying an error value by a value in which the scaling factor is reflected in the message, and
wherein a modulus of the homomorphic ciphertext is a value obtained by multiplying a plurality of different scaling factors by each other, and the plurality of different scaling factors are set as values which are disjoint from each other.

US Pat. No. 11,115,182

APPARATUS FOR APPROXIMATELY PROCESSING ENCRYPTED MESSAGES AND METHODS THEREOF

Crypto Lab Inc., Seoul (...


1. A method for processing a homomorphic ciphertext performed by a computing apparatus, the method comprising:producing an approximate polynomial corresponding to an operation function to be applied to a homomorphic ciphertext;
processing an approximately operation for the homomorphic ciphertext using the approximate polynomial; and
extending a plaintext space of the processed homomorphic ciphertext when the weight of an approximate message in the processed homomorphic ciphertext exceeds a threshold value, wherein
the extending of the plaintext space comprises extending the plaintext space by applying a function defined to obtain a quotient by dividing an encrypted input value by a predetermined threshold ciphertext modulus and eliminating the quotient, to the processed homomorphic ciphertext.

US Pat. No. 11,115,181

MEMORY DEVICE, HOST DEVICE, AND MEMORY SYSTEM

MEGACHIPS CORPORATION, O...


8. A host device configured to accept a memory device, comprising:a first cryptographic module including circuitry and a second cryptographic module including circuitry, the first and second cryptographic modules each configured to perform a normal operation to encrypt and decrypt data to be transmitted and received between the host device and the memory device,
a third cryptographic module including circuitry and configured to perform a dummy operation based on dummy key information, and
a control circuit configured to control an operation of the third cryptographic module, the control circuit being configured to cause the third cryptographic module to perform a dummy operation in a period in which one of the first cryptographic module and the second cryptographic module performs a normal operation, wherein
the first cryptographic module includes a first temporary data generation circuit configured to generate temporary data based on input data,
the second cryptographic module includes a first encryption circuit configured to perform encryption based on the temporary data generated by the first temporary data generation circuit,
the third cryptographic module includes a second temporary data generation circuit configured to generate temporary data based on dummy input data and a second encryption circuit configured to perform encryption based on the temporary data generated by the second temporary data generation circuit, and
the control circuit is configured to cause the second encryption circuit to perform a dummy operation in a period in which only the first temporary data generation circuit of the first temporary data generation circuit and the first encryption circuit performs a normal operation, while causing the second temporary data generation circuit to perform a dummy operation in a period in which only the first encryption circuit of the first temporary data generation circuit and the first encryption circuit performs a normal operation.

US Pat. No. 11,115,180

SYSTEM AND METHOD FOR REMOTE CLOCK ESTIMATION FOR RELIABLE COMMUNICATIONS

SYNAPTIVE MEDICAL INC., ...


1. A medical navigation system comprising:a processor coupled to a memory, the memory storing instructions that, when executed, cause the processor to:
communicate with a tracking system to obtain tracking information about a tracked medical instrument;
register the tracked medical instrument to a reference frame using the tracking information;
communicate with the tracking system intraoperatively to obtain further tracking information about the tracked medical instrument;
track the tracked medical instrument intraoperatively in the reference frame using the further tracking information;
receive a first communications packet from a remote device, the first communications packet including information about a clock offset of the remote device relative to the navigation system;
determine an upper bound of the clock offset; and
determine a maximum age of data contained in the first communications packet, based on the determined upper bound.

US Pat. No. 11,115,179

SIGNALING SYSTEM WITH ADAPTIVE TIMING CALIBRATION

Rambus Inc., San Jose, C...


1. An integrated circuit (IC) memory controller, comprising:a strobe enable circuit to receive an external strobe signal from a memory device, the strobe enable circuit including gating circuitry to generate a gated strobe signal based on a phase relationship between a read enable signal and the external strobe signal;
a receiver circuit to receive the gated strobe signal and read data from the memory device, wherein the read data is accompanied by the external strobe signal; and
adaptive calibration circuitry to, during a live data transfer mode of operation, adaptively adjust at least one of
a first relative alignment between the read enable signal and the external strobe signal, and
a second relative alignment between the gated strobe signal and the read data.

US Pat. No. 11,115,178

CLOCK AND DATA RECOVERY DEVICE AND CLOCK AND DATA RECOVERY METHOD

REALTEK SEMICONDUCTOR COR...


1. A clock and data recovery device, comprising:a phase detector circuitry configured to detect a data signal according to a first clock signal and a second clock signal, in order to generate an up signal and a down signal;
an analog modulation circuitry configured to generate a first adjustment signal according to the up signal and the down signal;
a serial-to-parallel converter circuit configured to generate a first control signal according to the up signal, and to generate a second control signal according to the down signal;
a digital modulation circuitry configured to generate a digital code according to the first control signal and the second control signal, and to generate a second adjustment signal according to the digital code; and
an oscillator circuit configured to generate the first clock signal and the second clock signal according to the first adjustment signal and the second adjustment signal.

US Pat. No. 11,115,177

METHODS AND APPARATUS FOR PERFORMING CLOCK AND DATA DUTY CYCLE CORRECTION IN A HIGH-SPEED LINK

Intel Corporation, Santa...


1. An integrated circuit, comprising:a serializer circuit configured to receive a clock signal;
transmit data path circuitry configured to receive data signals from the serializer circuit and to generate corresponding output data; and
a duty cycle distortion calibration circuit configured to receive only the output data from the transmit data path circuitry and to generate calibrated settings, wherein the calibrated settings mitigate clock duty cycle distortion in the output data by controlling the clock signal, and wherein the calibrated settings mitigate data duty cycle distortion in the output data by controlling the transmitter data path circuitry.

US Pat. No. 11,115,176

SYSTEM AND METHOD FOR ADJUSTING CLOCK-DATA TIMING IN A MULTI-LANE DATA COMMUNICATION LINK

QUALCOMM INCORPORATED, S...


1. A method for adjusting clock-data timing in a multi-lane serial data communication link, comprising:periodically performing training to adjust clock-data timing of a reference lane, the multi-lane serial data communication link comprising a plurality of lanes including a reference lane and a first lane;
determining first information representing the clock-data timing of the reference lane in response to the first lane transitioning from an active state to an inactive state;
determining second information representing the clock-data timing of the reference lane in response to the first lane transitioning from the inactive state to the active state;
adjusting the clock-data timing of the first lane based on the first information and the second information in response to the first lane transitioning from the inactive state to the active state; and
receiving data on the first lane using the adjusted clock-data timing.

US Pat. No. 11,115,175

NARROWBAND TIME-DIVISION DUPLEX FRAME STRUCTURE FOR NARROWBAND COMMUNICATIONS

QUALCOMM Incorporated, S...


1. A method for wireless communication for a user equipment (UE), comprising:determining a time-division duplex (TDD) frame structure for narrowband communications used by a radio access network based on transmissions from a base station;
receiving, from the base station, information indicating at least one resource unit (RU) allocated to the UE, the at least one RU including one or more subcarriers in each of one or more slots of a physical uplink control channel (PUCCH);
transmitting, to the base station, a narrowband physical uplink control information transmission on the PUCCH using a physical uplink shared channel (PUSCH) format.

US Pat. No. 11,115,174

BASE STATION, USER TERMINAL, RADIO COMMUNICATION SYSTEM, AND COMMUNICATION CONTROL METHOD

NTT DOCOMO, INC., Tokyo ...


1. A user terminal that communicates with a primary cell and a secondary cell by radio, comprising:a receiver that receives a higher layer signaling; and
a controller that sets:a first communication usage of a first radio communication resource, which is divided into periods of communication usage, to be used in the primary cell and
a second communication usage, which is divided into periods of communication usage, of a second radio communication resource to be used in the secondary cell, based on the higher layer signaling,

wherein, based on the higher layer signaling, the controller uses the first radio communication resource and the second communication resource as a radio communication resource including a period of communication usage of the respective periods of communication usage that is neither a period for transmission of a downlink signal nor a period for transmission of an uplink signal.

US Pat. No. 11,115,173

METHOD AND APPARATUS FOR TRANSMITTING DEMODULATION REFERENCE SIGNAL

LG Electronics Inc., Seo...


1. A method of transmitting a demodulation reference signal (DMRS) by a transmitting device in a wireless communication system, the method comprising:mapping the DMRS to a frequency resource on a carrier; and
transmitting the DMRS in the frequency resource,
wherein the DMRS is a part of a first sequence subset in a first DMRS sequence x(n), where n=0, 1, 2, 3, . . . , in a state in which the frequency resource has a first subcarrier spacing K1*fsc, where K1 is a positive integer, and fsc is a base subcarrier spacing,
wherein the DMRS is a part of a second sequence subset in a second DMRS sequence y(n), where n=0, 1, 2, 3, . . . , in a state in which the frequency resource has a second subcarrier spacing K2*fsc, where K2 is a positive integer different from K1,
wherein the first sequence subset consists of values allocated to the frequency resource among values of the first DMRS sequence, under an assumption that the first DMRS sequence is allocated in sequence to the carrier along a frequency domain i) based on the first subcarrier spacing K1*fsc and ii) starting with x(0) at a start resource point for the carrier, and
wherein the second sequence subset consists of values allocated to the frequency resource among values of the second DMRS sequence, under an assumption that the second DMRS sequence is allocated in sequence to the carrier along the frequency domain i) based on the second subcarrier spacing K2*fsc and ii) starting with y(0) at the start resource point for the carrier.

US Pat. No. 11,115,172

METHOD FOR TRANSMITTING AND RECEIVING MULTICAST/BROADCAST DATA IN WIRELESS COMMUNICATION SYSTEM, AND APPARATUS THEREFOR

LG Electronics Inc., Seo...


1. A method for a base station to transmit a reference signal for multicast/broadcast data demodulation in a wireless communication system, the method comprising:mapping a first reference signal within a control channel region configured with one or more symbols used for control channel transmission within a subframe; and
mapping a second reference signal transmitted from multiple cells for demodulation of a multicast/broadcast channel within a data channel region other than the control channel region within one or more resource blocks allocated for transmission of the multicast/broadcast channel carrying multicast/broadcast data transmitted from multiple cells within the subframe,
wherein scheduling information for allocating one or more resource blocks to which the multicast/broadcast channel is mapped is transmitted in the control channel,
wherein resource elements to which the first reference signal and the second reference signal are mapped are determined based on at least one of a frequency shift value or a time shift value, and
wherein, based on the time shift value being applied to determine a resource element to which the second reference signal is mapped, the time shift value is applied to remaining symbols other than a first symbol to which the second reference signal is mapped within the subframe.

US Pat. No. 11,115,171

METHOD FOR DETERMINING LENGTH OF FEEDBACK RESPONSE INFORMATION AND RELATED PRODUCT

GUANGDONG OPPO MOBILE TEL...


1. A method for determining a length of feedback response information, comprising:receiving, by a terminal, configuration signaling sent by a network-side device, the configuration signaling comprising an indication about a maximum transmission timing value for feedback response information;
dynamically determining, by the terminal, a hybrid automatic repeat request (HARQ) feedback timing;
determining, by the terminal, a total number of bits of feedback response information to be transmitted according to the maximum transmission timing value, a minimum transmission timing value and Mnon-DL, wherein Mnon-DL is a value less than the maximum transmission timing value, wherein Mnon-DL is a number of all first-type time units between a transmission time unit Y?Tmax and a transmission time unit Y?Tmin, a transmission time unit Y being a time unit for transmission of the feedback response information to be transmitted, wherein the first-type time units comprise at least one of an uplink (UL) time unit, a time unit when the terminal performs no transmission of a physical shared channel, or a time unit when the terminal does not monitor downlink (DL) control signaling; and
sending, by the terminal to the network-side device, the feedback response information to be transmitted with the total number of bits.

US Pat. No. 11,115,170

TECHNIQUES FOR ADJUSTING CLEAR CHANNEL ASSESSMENT (CCA) WINDOW FOR TRANSMISSIONS IN A SHARED RADIO FREQUENCY SPECTRUM BAND

QUALCOMM Incorporated, S...


1. A method for wireless communications comprising:determining a feedback parameter associated with a first transmission;
determining a contention window adjustment value based at least in part on the feedback parameter, wherein determining the contention window adjustment value comprises weighting a non-reported acknowledgement as a reported negative acknowledgment (NACK); and
adjusting a contention window size for a second transmission based at least in part on the contention window adjustment value.

US Pat. No. 11,115,169

PARENT NODE DEVICE, TERMINAL DEVICE FOR WIRELESS NETWORK AND DATA TRANSMISSION METHOD THEREOF

Samsung Electronics Co., ...


1. A data transmission method for a wireless network, comprising:calculating an estimated arrival time of a next poll data request of a terminal device according to a receipt time of a poll data request, after the poll data request is received from the terminal device;
transmitting data for the terminal device to a cache of a Media Access Control (MAC) layer module at a time point which is a predetermined time length ahead of the estimated arrival time, responsive to a determination that the data for the terminal device is in a network layer module; and
transmitting, to the terminal device, an acknowledgement packet indicating that the data for the terminal device is in the cache of the MAC layer module, and the data for the terminal device, responsive to receiving the next poll data request.

US Pat. No. 11,115,168

VIRTUAL GATEWAY FOR A CONNECTED DEVICE

Yonomi, Inc., Boulder, C...


1. A virtual gateway software application executed on a communication device and configured to control functions of at least one connected device that is local to a particular building environment, the virtual gateway software application configured to:receive immediate command instructions for the at least one connected device from each of:a user of the communication device; and
a remote server on the Internet via a WAN or a cellular data connection;

relay the immediate command instructions once they are received by the communication device to the at least one connected device via wireless LAN or a short-range communication protocol while the communication device is within the particular building environment;
store delayed command instructions for the at least one connected device from each of:the user of the communication device and;
the remote server on the internet via the WAN or cellular data connection;

relay one or more of the delayed command instructions from the communication device to the at least one connected device via the wireless LAN or the short-range communication protocol at a predetermined time specified by the one or more delayed command instructions while the communication device is within the particular building environment;
set permission access levels to other instances of the virtual gateway software application executed on other communication devices within the particular building environment; and
allow a user to program a related set of delayed command instructions to be relayed to the at least one connected device.

US Pat. No. 11,115,167

COMMUNICATION SYSTEM

Mitsubishi Electric Corpo...


1. A communication system comprising:a base station device; and
a plurality of communication terminal devices capable of radio communication with the base station device,
wherein the base station device communicates with each of the plurality of communication terminal devices using a self-contained subframe, the self-contained subframe including a downlink signal transmitted from the base station device to the communication terminal device, and an uplink signal transmitted from the communication terminal device to the base station device in response to the downlink signal,
the self-contained subframe includes a gap duration during which neither the downlink signal nor the uplink signal is transmitted, between a downlink transmission duration during which the downlink signal is transmitted and an uplink transmission duration during which the uplink signal is transmitted, and
the gap duration is set, b the base station device, to each of the plurality of communication terminal devices such that the gap duration is different for at least two of the plurality of Communication terminal devices,
wherein the base station device measures a propagation latency for each of the plurality of communication terminal devices by receiving an uplink signal from each of the plurality of communication terminal devices,
each of the plurality of communication terminal devices measures variations in timing of a signal received from the base station device relative to the respective measured propagation latency, and notifies the base station device of the measured variations, and
the base station device corrects the respective propagation latency based on the notified variations and sets the gap duration to each of the plurality of communication terminal devices based at least in part on the corrected respective propagation latency.

US Pat. No. 11,115,166

RADIO TRANSMISSION APPARATUS AND METHODS FOR TRANSMITTING A SINGLE OR A PLURALITY OF MODULATION SIGNALS FROM ONE OR MORE ANTENNA

Wi-Fi One, LLC, Dallas, ...


1. A radio transmission apparatus comprising:a plurality of antenna and circuitry configured to:determine information indicative of an estimated communications channel condition;
generate, based on the information indicative of the estimated communications channel condition, a single modulation signal or a plurality of modulation signals; and
transmit, based on the generation of the single modulation signal or the plurality of modulation signals, the single modulation signal from a first antenna of the plurality of antenna or the plurality of modulation signals from the first antenna and at least a second antenna of the plurality of antenna,

wherein the plurality of modulation signals include different information from each other and are transmitted over an identical frequency band and at an identical temporal point, and
wherein the single modulation signal and the plurality of modulation signals contain parameter information indicating a number of modulation signals transmitted at the same time.

US Pat. No. 11,115,165

METHOD AND APPARATUS FOR MULTIPLE TRANSMIT/RECEIVE POINT (TRP) OPERATIONS

FG Innovation Company Lim...


1. A user equipment (UE) comprising:one or more non-transitory computer-readable media having computer-executable instructions embodied thereon; and
at least one processor coupled to the one or more non-transitory computer-readable media, and configured to execute the computer-executable instructions to:
receive, in a Physical Download Control Channel (PDCCH), Transmission Configuration Indicator (TCI) state data for determining a plurality of Physical Downlink Shared Channels (PDSCHs), the TCI state data being associated with a plurality of Demodulation Reference Signal (DMRS) port groups; and
obtain a plurality of Quasi Co-Location (QCL) assumptions for receiving the plurality of PDSCHs based on the plurality of DMRS port groups associated with the TCI state data, wherein:
each of the plurality of QCL assumptions corresponds to one of the plurality of DMRS port groups,
the TCI state data corresponds to a TCI state configuration that includes a plurality of QCL Reference Signal (RS) sets, and
each of the plurality of QCL RS sets corresponds to one of the plurality of DMRS port groups.

US Pat. No. 11,115,164

SOUNDING REFERENCE SIGNAL SUBFRAME POSITION IN A PLURALITY OF SCHEDULED CONSECUTIVE SUBFRAMES

HONDA MOTOR CO., LTD., T...


1. A method comprising:receiving, by a wireless device, a radio resource control message comprising an aperiodic sounding reference signal (SRS) subframe parameter;
receiving a downlink control information:indicating uplink resources in a plurality of scheduled consecutive subframes for transmission of transport blocks by the wireless device; and
triggering an SRS transmission in a subframe of the plurality of scheduled consecutive subframes; and

transmitting the SRS in the subframe, wherein a position of the subframe in the plurality of scheduled consecutive subframes is determined based on the aperiodic SRS subframe parameter.

US Pat. No. 11,115,163

ENHANCED RESOURCE UNIT ALLOCATION IN WIRELESS LOCAL AREA NETWORK

NEWRACOM INC., Lake Fore...


1. A method for encoding a bitstream for a frame in a wireless transmission, the method comprising:receiving, by an error correction unit of a wireless device, the bitstream;
performing, by the error correction unit, encoding on the bitstream to generate an encoded bit stream that includes the bitstream and parity bits;
processing, by a constellation unit of the wireless device, the encoded bitstream to generate constellation points in one or more encoded streams;
determining, by a low-density parity-check (LDPC) tone mapper of the wireless device, a distance between subcarriers in an Orthogonal Frequency Division Multiplexing (OFDM) symbol of the frame; and
performing, by the LDPC tone mapper, LDPC tone mapping based on the one or more encoded streams and on the determined distance between subcarriers to generate a permuted stream of complex numbers,
wherein the distance between subcarriers is determined to be either (1) 18 for a first resource unit size used in the frame or (2) 20 for a second resource unit size used in the frame, and
wherein the first resource unit size is 726 tones.

US Pat. No. 11,115,162

METHOD AND APPARATUS FOR IMPROVING CARRIER AGGREGATION IN NEXT-GENERATION MOBILE COMMUNICATION SYSTEM

Samsung Electronics Co., ...


1. A method performed by a user equipment (UE) in a wireless communication system, the method comprising:receiving, from a base station, a radio resource control (RRC) message including configuration information for a secondary cell (SCell), the configuration information including semi-persistent scheduling information for the SCell; and
in case that a condition for transitioning the SCell into a dormant state is satisfied, clearing resources for the SCell associated with the semi-persistent scheduling information for the SCell,
wherein the condition is satisfied in case that information indicating the dormant state of the SCell is included in the configuration information, a medium access control (MAC) control element (CE) for transitioning the SCell into the dormant state is received, or a hibernation timer associated with the SCell expires.

US Pat. No. 11,115,161

TRANSMISSION DIVERSITY FOR FBE IDLE PERIOD HANDLING

QUALCOMM Incorporated, S...


1. A method for wireless communication by a first base station (BS) to ensure full downlink scheduling, comprising:scheduling downlink transmission to at least one device, the scheduling comprising for each fixed frame period of a plurality of consecutive fixed frame periods:aligning, in a time domain, an ending boundary of an idle period of the first BS, a first component carrier (CC), or both with an ending boundary of a channel occupancy time (CoT) of at least one other BS, CC, or both, and a starting boundary of the idle period of the first BS, the first CC, or both with a starting boundary of a listen-before-talk (LBT) period adjacent to the CoT of the at least one other BS, CC or both; and
aligning, in the time domain, an ending boundary of a CoT of the first BS, the first CC, or both with an ending boundary of an idle period of the at least one other BS, CC, or both, wherein the first BS and the at least one other BS comprise frame-based equipments (FBEs); and

communicating with the at least one device based on the scheduling.

US Pat. No. 11,115,160

NON-ORTHOGONAL MULTIPLE ACCESS

Genghiscomm Holdings, LLC...


1. A method of communication by a wireless device configured for communicating in a wireless network, comprising:selecting at least one direct-sequence code corresponding to a layer or a data symbol; and
modulating a block of pulse waveforms with the at least one direct-sequence code to produce a discrete-time signal;
wherein the at least one direct-sequence code provides the discrete-time signal with a frequency-domain sparsity pattern configured for non-orthogonal multiple access (NOMA).

US Pat. No. 11,115,159

METHOD AND DEVICE FOR PROCESSING HARQ FEEDBACK IN A MOBILE COMMUNICATION SYSTEM

Samsung Electronics Co., ...


1. A method performed by a terminal in a wireless communication system, the method comprising:receiving uplink resource allocation information for a first cell;
transmitting uplink data based on the uplink resource allocation information through an uplink of the first cell;
receiving information for a retransmission of the uplink data through a downlink of a second cell in case that the uplink resource allocation information for the first cell is received through the downlink of the second cell; and
receiving the information for the retransmission of the uplink data through a downlink of the first cell in case that the uplink resource allocation information for the first cell is received through the downlink of the first cell.

US Pat. No. 11,115,158

DATA ACKNOWLEDGEMENT IN A WIRELESS COMMUNICATION SYSTEM

Lenovo Innovations Limite...


1. An apparatus comprising:a processor that determines a duration for a downlink (“DL”) burst; and
a transmitter that transmits the DL burst having the duration, and signaling indicating a duration of the DL burst in downlink control information, wherein a size of a hybrid automatic repeat request acknowledgement (“HARQ-ACK”) codebook corresponding to the DL burst;equals the duration for a one-codeword transmission mode; or
is double the duration for a two-codeword transmission mode, wherein the duration is indicated by a number of subframes within the DL burst.


US Pat. No. 11,115,157

METHOD AND DEVICE FOR SCHEDULING UPLINK CONTROL CHANNEL IN NEXT GENERATION WIRELESS NETWORK

KT CORPORATION, Seongnam...


1. An operation method of a user equipment, the method comprising:receiving, from a base station via a physical downlink control channel (PDCCH), downlink control information (DCI) including timing relationship configuration information between a downlink (DL) and an uplink (UL) for a hybrid automatic repeat request (HARQ) acknowledgement/negative acknowledgement (ACK/NACK) feedback; and
transmitting, to the base station, uplink control information via a physical uplink control channel (PUCCH) in a slot based on the timing relationship configuration information,
wherein the uplink control information includes HARQ ACK/NACK feedback information with respect to a downlink data via a physical downlink shared channel (PDSCH), and
wherein at least one, among plural subcarrier spacings (SCSs) including a first SCS for the DL and a second SCS for the UL, is selected as a reference.

US Pat. No. 11,115,156

DISCONTINUOUS RECEPTION OPERATIONS AMONG MULTIPLE BANDWIDTH PARTS

FG Innovation Company Lim...


1. A user equipment (UE) for discontinuous reception (DRX) operation having a Downlink DRX Hybrid Automatic Repeat reQuest (HARQ) Round-Trip Time Timer (drx-HARQ-RTT-TimerDL), the UE comprising:one or more non-transitory computer-readable media having computer-executable instructions embodied thereon; and
at least one processor coupled to the one or more non-transitory computer-readable media, and configured to execute the computer-executable instructions to perform the DRX operation, wherein the DRX operation comprises:receiving a downlink (DL) data on a DL bandwidth part (BWP);
performing an uplink (UL) transmission carrying a DL HARQ feedback corresponding to the DL data on a UL BWP; and
starting the drx-HARQ-RTT-TimerDL in a first symbol of a plurality of symbols of the DL BWP immediately after an end of the UL transmission, wherein:
each symbol in the plurality of symbols comprises a scalable time unit having a length that is a variable fraction of a fixed time unit, and
the drx-HARQ-RTT-TimerDL starts running from an initial value that is represented in a number of symbols of the DL BWP.


US Pat. No. 11,115,155

SYSTEMS AND METHODS FOR PRIORITIZING PACKET RETRANSMISSION

Facebook Technologies, LL...


1. A method comprising:inserting, by a transmitting device for each packet of a plurality of packets of a video frame, a sequence number indicative of an order of the corresponding packet among the plurality of packets, into a header of the corresponding packet according to an application layer protocol;
transmitting, by the transmitting device to the receiving device, at a first level of priority, the plurality of packets of the video frame including the corresponding inserted sequence numbers;
receiving, by the transmitting device, an identification of one or more packets from the plurality of packets to be retransmitted to the receiving device, the identification based on at least the inserted sequence numbers of the one or more packets;
selecting, by the transmitting device, a second level of priority for the one or more packets to be retransmitted to the receiving device, the second level being higher than the first level; and
retransmitting, by the transmitting device, the one or more packets at the second level of priority.

US Pat. No. 11,115,154

PROVIDING ACKNOWLEDGEMENT INFORMATION BY A WIRELESS DEVICE

Apple Inc., Cupertino, C...


1. An apparatus comprising:a memory; and
at least one processing unit in communication with the memory, wherein the at least one processing unit and memory are configured to:determine an occurrence of a semi-persistently scheduled transmission on an uplink traffic channel in a first uplink subframe, wherein acknowledgement information is multiplexed on the uplink traffic channel in absence of a transmission of a repetition of acknowledgement information;
receive a configuration for acknowledgment information transmission repetition, wherein the configuration includes a value for a number of transmission repetitions for acknowledgement information, and wherein acknowledgement information corresponding to downlink transmissions is to be repeated on consecutive uplink subframes according to the configuration;
receive first and second scheduled transmissions from a second wireless device on respective first and second downlink (DL) subframes;
prepare acknowledgement information for the first and second scheduled transmissions based on the configuration for acknowledgment information transmission repetition;
transmit, using an uplink (UL) control channel different from an UL uplink traffic channel, the acknowledgement information for the first scheduled transmission together with the acknowledgement information for the second scheduled transmission in a first uplink subframe in a single message, wherein the first uplink subframe is subsequent to receiving the first and second scheduled transmissions; and
skip transmission of the semi-persistently scheduled transmission on the uplink traffic channel in the first uplink subframe based determining the semi-persistently scheduled transmission would collide with ongoing repetitions of acknowledgement information for both of the first and second scheduled transmissions.


US Pat. No. 11,115,153

METHOD FOR TRANSMITTING DATA IN FLEXIBLE ETHERNET AND DEVICE

HUAWEI TECHNOLOGIES CO., ...


1. A method implemented by a first network device for transmitting data, comprising:receiving, from a second network device and according to a first client calendar, first data comprising a plurality of data blocks, wherein the first client calendar comprises a correspondence between a client and a first timeslot set, and wherein the first timeslot set comprises a first timeslot;
determining, based on an error data block in the data blocks, that the first timeslot is damaged when a quantity of error data blocks that correspond to the first timeslot meets a condition;
sending an overhead frame to the second network device, wherein the overhead frame indicates that the first timeslot is damaged;
receiving, from the second network device, a second client calendar, wherein the second client calendar comprises a correspondence between the client and a second timeslot set; and
receiving, from the second network device, second data using the second client calendar.

US Pat. No. 11,115,152

TRANSPORT BLOCK SIZE DETERMINATION FOR EQUAL SIZE CODE BLOCKS

Telefonaktiebolaget LM Er...


1. A wireless transmitter comprising processing circuitry operable to:determine a transport block size, TBS, for a transport block to be communicated between the wireless transmitter and a wireless receiver via a physical channel transmission, the TBS determination using a formula, and wherein the formula accounts for cyclic redundancy check, CRC, bits attached to the transport block; and
transmit the transport block according to the determined TBS.

US Pat. No. 11,115,151

METHOD AND APPARATUS FOR FAST RETRAINING OF ETHERNET TRANSCEIVERS BASED ON TRICKLING ERROR

Marvell Asia Pte, Ltd., ...


1. A method of operation for an Ethernet transceiver, the method comprising:operating the Ethernet transceiver in a data mode;
selecting a time interval for monitoring error information; and
triggering a fast retrain sequence bydetecting error information during the time interval,
averaging at least two non-consecutive frame errors in the detected error information over the time interval to generate trickling error information,
comparing the trickling error information to a selected threshold value, and
performing the fast retrain sequence-based on the comparing.


US Pat. No. 11,115,150

METHODS AND DEVICES FOR REPORTING CSI DURING DRX OPERATIONS

FG Innovation Company Lim...


1. A method by a user equipment (UE), the method comprising:determining when a channel state information (CSI) reporting configuration is received;
determining whether to report CSI on a resource outside a Discontinuous Reception (DRX) active time based on when the CSI reporting configuration is received; and
reporting the CSI multiplexed with other Uplink Control Information (UCI) on a Physical Uplink Shared Channel (PUSCH) on the resource outside the DRX active time when the CSI reporting configuration is received during a DRX Active Time.

US Pat. No. 11,115,149

MODULATION AND CODING FOR MULTIPLE RESOURCE UNITS IN WIRELESS NETWORK

HUAWEI TECHNOLOGIES CO., ...


11. A transmit station for transmitting data in an Orthogonal Frequency-Division Multiple Access (OFDMA) wireless local area network (WLAN), comprising:a network interface configured to send and receive signals in the WLAN;
a processing device coupled to the network interface;
a non-transitory storage coupled to the processing device and storing thereon instructions that, when executed by the processing device, configure the transmit station to:select, for a first resource unit assigned to a target station, a first modulation type;
select, for a second resource unit assigned to the target station, a second modulation type different from the first modulation type;
parse input data for the target station into a first data stream and a second data stream;
modulate, using the first modulation type, data included in the first data stream and map the modulated data onto a first set of subcarriers associated with the first resource unit;
modulate, using the second modulation type, data included in the second data stream and map the modulated data onto a second set of subcarriers associated with the second resource unit; and
transmit, in the WLAN, an orthogonal frequency division multiplexing (OFDM) symbol including the data modulated onto the first set of subcarriers and the data modulated onto the second set of subcarriers.


US Pat. No. 11,115,148

TECHNIQUE FOR SELECTING A TRANSPORT BLOCK SIZE IN A COMMUNICATION SYSTEM

TELEFONAKTIEBOLAGET LM ER...


1. A user equipment (UE) in a communication system configured to select a Transport Block Size (TBS) for a data transmission, wherein the communication system supports variable Transmission Time Interval (TTI) lengths regarding the number of Orthogonal Frequency-Division Multiplexing (OFDM) symbols to be transmitted in one TTI, the apparatus comprising:processing circuitry;
memory containing instructions executable by the processing circuitry whereby the apparatus is operative to:receive, from a network node, first information indicative of a TTI length of the TTI for the data transmission;
receive, from the network node, second information indicative of a number of reference symbols included in the TTI, wherein the reference symbols are OFDM Demodulation Reference Symbols (DMRS);
decode, from the first information, the TTI length;
decode, from the second information, the number of reference symbols included in the TTI;
calculate, based on the TTI length and based on the number of reference symbols included in the TTI, a number of data symbols included in the TTI by using the equation D=L?R, wherein D is the number of data symbols included in the TTI, L is the TTI length represented by the number of symbols to be transmitted in one TTI, and R is the number of reference symbols included in the TTI;
calculate, based on an allocation bandwidth for the data transmission and based on the number of data symbols included in the TTI, a number of data Resource Elements (REs) in the TTI;
select the TBS, from a data structure, based on the calculated number of data REs.