US Pat. No. 10,171,379

DYNAMIC SERVICE LEVEL AGREEMENT (SLA) ADJUSTMENT BASED UPON APPLICATION CAPABILITIES

International Business Ma...

8. A computer program product for dynamic adjustment of a service level agreement (SLA) for a hosted computing environment based upon application capabilities, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, the program instructions executable by a device to cause the device to perform a method comprising:specifying in a user interface to a hosted computing environment executing in memory by one or more processors of a computing device, a virtual application pattern comprising one or more application components of an applications to be hosted within the hosted computing environment, a behavioral policy, at least one database, at least one queue, at least one connection to an existing resource, a business process model, a batch job and a mediation, the policy specifying high availability, security, multi-tenancy, isolation and an SLA;
loading the SLA into memory and accessing a table specifying capabilities of the different components of the pattern including both whether or not one or more of the components support placement of corresponding instances of the components in one or more of multiple different nodes and also whether or not one or more of the components support the utilization of multiple different processors within the hosted computing environment;
determining in the table a scaling capability for at least one of the components and in particular both whether or not one or more of the application components support placement of corresponding instances of the application components in one or more of multiple different nodes in the hosted computing environment, and also whether or not one or more of the application components support utilization of multiple different processors within the hosted computing environment;
filtering a set of resource utilization options for the SLA of the pattern for the application based upon the common scaling capability of all of the components, selecting one of the filtered set of resource utilization options for the SLA and modifying the SLA for the application utilizing the selected resource utilization options so as to scale up resources utilized by the components of the application; and,
executing the application in the hosted computing environment and managing resource utilization of resources accessible to the application based upon the established SLA during the execution of the application in the hosted computing environment.

US Pat. No. 10,171,378

SYSTEM AND METHOD FOR ALLOCATING AND RESERVING SUPERVISORS IN A REAL-TIME DISTRIBUTED PROCESSING PLATFORM

IMPETUS TECHNOLOGIES, INC...

1. A system for allocating and reserving one or more supervisors, to be used by a data processing pipeline associated with a tenant, of a real-time distributed processing platform, the system comprising:a memory; and
a processor coupled to the memory, wherein the processor is configured to execute program instructions stored in the memory for:
identifying a set of supervisors corresponding to a set of computing machines of a real-time distributed processing platform;
assigning a subset of supervisors from the set of supervisors to a tenant based on inputs provided by a primary user, wherein the primary user is an administrator of the real-time distributed processing platform;
enabling a secondary user, corresponding to the tenant, to design a set of data processing pipelines in a workspace, wherein each data processing pipeline comprises one or more data processing components from a set of data processing components, and wherein each data processing pipeline is configured to process a real time data stream; and
assigning one or more supervisors from the subset of supervisors to each data processing pipeline from the set of data processing pipelines based on the inputs received from the secondary user, wherein each supervisor is configured to operate a set of workers, wherein each supervisor is configured to allocate one or more workers, from the set of workers, to execute each computing task corresponding to at least one data processing pipeline, wherein the one or more workers, identified by the supervisor, are workers available in real-time, from the set of workers, wherein the one or more workers, from the set of workers, are allocated to each computing task based on requirements associated with execution of each computing task, and wherein each worker, from the set of workers, corresponds to a portion of Central Processing Unit (CPU) and a portion of Random Access Memory available at a computing machine from the set of computing machines.

US Pat. No. 10,171,377

ORCHESTRATING COMPUTING RESOURCES BETWEEN DIFFERENT COMPUTING ENVIRONMENTS

International Business Ma...

1. A method of orchestrating computing resources between different computing environments, the method comprising the steps of:a computer monitoring data from a first computing environment and a second computing environment, the data specifying a utilization of infrastructure of the first and second computing environments, middleware running on the first and second computing environments, software testing tools running on the first and second computing environments, integrated development environments (IDEs) running on the first and second computing environments, relationships among nodes of the first and second computing environments and utilization of the nodes, and user behavior in the first and second computing environments;
based on the utilization of the infrastructure, the middleware, the software testing tools, the IDEs, the relationships among the nodes, the utilization of the nodes, and the user behavior, the computer updating a pattern decision tree;
based on the updated pattern decision tree and a user request that specifies requirements of the computing resources, the computer generating an orchestration topology that specifies a placement of the computing resources in the first and second computing environments; and
based on the orchestration topology, the computer automatically deploying one or more computing resources included in the computing resources in the first computing environment and automatically deploying one or more other computing resources included in the computing resources in the second computing environment.

US Pat. No. 10,171,376

ALLOCATION OF CLIENT DEVICE MEMORY FOR CONTENT FROM CONTENT SOURCES

1. A method, carried out by a client device, comprising:allocating portions of a memory of the client device to a plurality of content sources, each of the plurality of content sources being initially allocated with a respective portion of the memory;
receiving, via a network, content from each of the plurality of content sources in the respective portion of the memory initially allocated to each of the plurality of content sources;
determining a usability of the received content from each of the plurality of content sources, wherein the usability of the received content from each of the plurality of content sources is based on prior interactions between a user of the client device and additional content from each of the plurality of content sources;
determining a quality score for each of the plurality of content sources based at least in part on the usability of the received content from each of the plurality of content sources, wherein the quality score is determined at least by:
identifying one or more attributes of the received content from each of the plurality of content sources;
determining the prior interactions between the user of the client device and the additional content having one or more attributes matching the identified one or more attributes of the received content from each of the plurality of content sources; and
determining the quality score for each of the plurality of content sources based at least in part on the determined prior interactions between the user of the client device and the additional content having the one or more attributes matching the identified one or more attributes of the received content from each of the plurality of content sources; and
modifying a size of the respective portion of the memory initially allocated to each of the plurality of content sources based at least in part on the quality score for each of the plurality of content sources.

US Pat. No. 10,171,375

CONSTRUCTING COMPUTING SYSTEMS WITH FLEXIBLE CAPACITY OF RESOURCES USING DISAGGREGATED SYSTEMS

INTERNATIONAL BUSINESS MA...

1. A method for allocating resources in a disaggregated cloud computing environment, by a processor device, comprising:assigning respective members of a pool of hardware resources to each one of a plurality of tenants based upon a classification of the respective members of the pool of hardware resources; wherein the respective members of the pool of hardware resources are assigned to each one of the plurality of tenants independently of a hardware enclosure in which the respective members of the pool of hardware resources are physically located; and
performing a workload received from a respective one of the tenants by the respective members of the pool of hardware resources according to the classification.

US Pat. No. 10,171,374

SOFTWARE DEFINED INFRASTRUCTURES THAT ENCAPSULATE PHYSICAL SERVER RESOURCES INTO LOGICAL RESOURCE POOLS

International Business Ma...

1. An apparatus comprising:at least one processor;
a memory coupled to the at least one processor;
a software defined infrastructure mechanism (SDIM) residing in the memory and executed by the at least one processor to operate in a cloud computing environment; and
a plurality of software defined infrastructures (SDIs) created and managed by the SDIM on a single physical server that provides a logical resource pool to a workload in the cloud environment, wherein the logical resource pool comprises a plurality of virtual input/output servers (VIOSs) on the single physical server and wherein the VIOSs are divided into the plurality of SDIs.

US Pat. No. 10,171,373

VIRTUAL MACHINE DEPLOYMENT AND MANAGEMENT ENGINE

VMWARE INC., Palo Alto, ...

1. A computer-implemented method of cloning virtual machines in a plurality of host computers connected via a computer network, the host computers comprising a source host computer and a set of target host computers having at least a first target host computer and a second target host computer, the method comprising:receiving a request to clone multiple copies of a source virtual machine residing on the source host computer to the set of target host computers, the request designating one of the target host computers for each of the multiple copies to be cloned; and
in response to the request:
determining a deployment time between each pair of the plurality of host computers, the deployment time for a particular pair indicating time needed to clone the source virtual machine from one host computer to the other host computer in the pair, via a network link between the pair of host computers without any other intervening host computers:
for each copy of the source virtual machine to be cloned, determining a path from the source host computer to a target host computer associated with the copy of the source virtual machine to be cloned, the path being selected based on the determined deployment times to minimize the time taken to clone the copy of the source virtual machine from the source host computer to the target host computer associated with the copy of the source virtual machine to be cloned;
cloning a first copy of the source virtual machine from the source host computer to the first target host computer, wherein a first path determined for the first copy of the source virtual machine is a first network link between the source host computer and a first target host computer without any other intervening host computers; and
cloning a second copy of the source virtual machine by copying from the first copy of the source virtual machine on the first target host computer, wherein a second path determined for the second copy of the source virtual machine includes the first network link and a second network link between the first target host computer and the second target host computer without any other intervening host computers, and wherein the second copy of the source virtual machine is cloned on the second target host computer by copying from the first copy of the source virtual machine using the second network link, after the first copy of the source virtual machine is cloned from the source host computer to the first target host computer using the first network link.

US Pat. No. 10,171,372

METHOD AND APPARATUS FOR ADMISSION CONTROL OF VIRTUAL NETWORKS IN A BACKHAUL-LIMITED COMMUNICATION NETWORK

HUAWEI TECHNOLOGIES CO., ...

1. A method for admitting a virtual network, the method comprising:receiving a request to establish the virtual network, the request including a geographic traffic profile associated with the virtual network and expressed as a set of geographic bins corresponding to locations of all potential devices and associated traffic to be served by the virtual network;
determining that accommodating the request is feasible based on both an indication of network resources available for use by the virtual network and at least one of: data rate, packet delay, outage probability, and a key performance indicator for the virtual network, the network resources including communication capacities available on backhaul links usable by the virtual network; and
transmitting instructions to one or more network nodes to admit the virtual network.

US Pat. No. 10,171,371

SCALABLE METERING FOR CLOUD SERVICE MANAGEMENT BASED ON COST-AWARENESS

International Business Ma...

1. A method for managing a computing platform, comprising:provisioning a plurality of virtual machines across a plurality of computing nodes of a computing platform;
executing service workloads using the provisioned virtual machines to provide one or more services to clients;
dynamically configuring one or more of the provisioned virtual machines on a given computing node of the plurality of computing nodes to serve as a centralized agent that is configured to collect management data from each of the plurality of computing nodes of the computing platform to support a telemetry service of the computing platform;
wherein the management data collected by the centralized agent comprises resource usage data of resources utilized by the provisioned virtual machines executing the service workloads across the plurality of computing nodes;
providing, by the centralized agent, the collected management data to a service management system of the computing platform; and
utilizing, by the service management system, the management data provided by the centralized agent to perform service management operations for managing the computing platform;
wherein the provisioning, dynamically configuring, providing, and utilizing steps are implemented at least in part by one or more processors executing program code.

US Pat. No. 10,171,370

DISTRIBUTION OPERATING SYSTEM

Amazon Technologies, Inc....

1. A computer implemented method, comprising:executing a hardware distribution operating system as an operating system application on a host operating system on a single local computing device;
using computing resources from the single local computing device to execute a kernel of the hardware distribution operating system on the single local computing device;
loading an application using the hardware distribution operating system; and
using networked computing resources in a service provider environment to execute the application as instructed by the kernel of the hardware distribution operating system, the networked computing resources being remote and separate from the kernel and computing resources used to execute the kernel.

US Pat. No. 10,171,369

SYSTEMS AND METHODS FOR BUFFER MANAGEMENT

HUAWEI TECHNOLOGIES CO., ...

1. A method of buffering packet data units, the method comprising a buffer node:receiving a complex queue configuration from a configuration entity, the complex queue configuration associated with a queue graph configuration for buffering packet data units, the queue graph configuration including:
at least one packet classifier configured to determine a classification type for an incoming packet;
at least two queues configured to store incoming packets; and
a dequeuer configured to select a queue from the at least two queues to be dequeued and to apply a dequeueing function on that selected queue;
receiving a plurality of packet data units from at least one the packet source node; and
sending each incoming packet to one of the at least two queues based on the queue graph configuration.

US Pat. No. 10,171,368

METHODS AND APPARATUS FOR IMPLEMENTING MULTIPLE LOOPBACK LINKS

Juniper Networks, Inc., ...

1. An apparatus, comprising:a memory; and
a processor operatively coupled to the memory implementing a route module, an encapsulation module operatively coupled to the route module, and a loopback selection module operatively coupled to the route module and the encapsulation module,
the route module configured to receive a data unit having a header portion,
the encapsulation module configured to receive the data unit from the route module and to append a tunnel header to the data unit to define a tunnel data unit,
the loopback selection module configured to receive the tunnel data unit from the encapsulation module and receive a signal representing bandwidth availability of each loopback link from a plurality of loopback links of a loopback link aggregation group (LAG),
the loopback selection module configured to select a loopback link from the plurality of loopback links of the loopback LAG based on the tunnel header and the bandwidth availability such that data traffic can be load balanced across each loopback link from the plurality of loopback links of the loopback LAG,
the route module configured to receive the tunnel data unit from the loopback selection module via the loopback link and send the tunnel data unit via a tunnel based on the tunnel header.

US Pat. No. 10,171,367

APPARATUS AND METHOD TO IMPROVE COMPRESSION AND STORAGE OF DATA

1. A method comprising:receiving, by a processor, a data stream, wherein the data stream comprises multiplexed data from a plurality of different source devices, wherein the plurality of different source devices comprises different types of devices, wherein the data stream comprises blocks of data;
analyzing, by the processor, the data stream to identify a source device of the plurality of different source devices for each of the blocks of data of the data stream;
demultiplexing, by the processor, the data stream based on the source device of the each of the blocks of data of the data stream;
identifying, by the processor, a common dimension between the blocks of data of the data stream from a common source device;
estimating, by the processor, a density of the blocks of data of the data stream from the common source device that have the common dimension;
combining, by the processor, the blocks of data of the data stream from the common source device that have the common dimension when the density is greater than a predefined threshold;
applying, by the processor, a compression to the blocks of data of the data stream that are combined.

US Pat. No. 10,171,366

COMMUNICATION DEVICE AND CONTROL METHOD OF COMMUNICATION DEVICE

NEC CORPORATION, Tokyo (...

1. A communication system comprising a communication device and a receiver device,the communication device comprising:
a transmission data generator configured to output, as transmission data, communication data for which an increase in transmission delay is to be reduced;
a retransmission confirmation data generator configured to output, after the transmission data is output, retransmission confirmation data, whose size is smaller than the transmission data, a first number of times at a first transmission interval; and
a communication interface circuit configured to assign order information indicating a transmission order, to each of the transmission data and the retransmission confirmation data, and transmit, after the transmission data is transmitted, the retransmission confirmation data, and
the receiver device comprising:
a lower-layer communication protocol circuit configured
to judge that there is an error in the order information of received data, which are the transmission data received and the retransmission confirmation data received, upon receiving a certain number of the retransmission confirmation data in a state where a sequence number of the received data is missing and
to request the communication device to retransmit the transmission data corresponding to the sequence number being missed.

US Pat. No. 10,171,365

TURBOLINK: METHOD AND APPARATUS FOR CONTROLLING INPUT/OUTPUT SIGNALING SPEED

International Business Ma...

1. A method comprising:receiving at least one feed-forward signal from a local or upstream data transmitter;
receiving at least one feedback signal from at least a next or downstream first node of a network;
determining whether data is to be transmitted in a burst transmission by at least comparing the at least one feed-forward signal with at least one threshold or condition;
in response to determining that the data is to be transmitted in the burst transmission, comparing the at least one feedback signal with at least one further threshold or condition, wherein the at least one feedback signal comprises a near feedback signal and a remote feedback signal, wherein the near feedback signal is from one or more first network nodes and the remote feedback signal is from one or more second network nodes, wherein each second network node is at a network location that is a greater number of hops away from the data transmitter than each first network node;
receiving an indication of a temperature of the data transmitter;
comparing the temperature of the data transmitter to a threshold temperature;
generating a signal to indicate that the burst transmission is to be started or stopped based at least on the comparison of the at least one feedback signal with the at least one further threshold or condition and on whether the temperature of the data transmitter exceeds the threshold temperature; and
causing the burst transmission to be transmitted based at least on the generated signal.

US Pat. No. 10,171,364

METHOD AND APPARATUS FOR OPTIMIZING TRANSMISSIONS IN WIRELESS NETWORKS

Nokia Technologies Oy, E...

1. A base station, comprising:at least one processor; and
at least one memory including computer program code,
the at least one memory and the computer program code configured, with the at least one processor, to cause the base station at least to:
receive a data transmission to be forwarded to at least one first wireless device;
determine whether any of the data transmission is delay tolerant data or not;
based on determining that a first part of the data transmission is delay tolerant data:
define a role of at least one second wireless device to forward the first part of the data transmission with the delay tolerant data, and transmit the first part of the data transmission with the delay tolerant data to the at least one second wireless device to be forwarded to the at least one first wireless device; and
transmit a remainder of the delay tolerant data of the data transmission to the at least one first wireless device directly, wherein the transmitting directly comprises transmitting the remainder of the delay tolerant data of the data transmission using a direct connection from the base station to the at least one first wireless device instead of using the defined role of the at least second wireless device to forward the remainder of the delay tolerant data to the at least one first wireless device,
else, based on determining that none of the data is delay tolerant data:
transmit all of the data transmission to the at least one first wireless device directly.

US Pat. No. 10,171,363

TRAFFIC CONTROL METHOD AND APPARATUS

HUAWEI TECHNOLOGIES CO., ...

1. A traffic control method performed by a back-end network element, comprising:receiving a service message from a front-end network element;
placing the received service message into a service message buffer queue according to a type of the received service message;
determining, according to the type of the received service message, a priority of the received service message and a resource that needs to be consumed for processing the received service message;
setting a weight for each service message buffer queue according to a priority of a service message in each service message buffer queue;
scheduling, for the each service message buffer queue, the service message in the each service message buffer queue according to the weight of the each service message buffer queue when usage of a resource for the service message in the each service message buffer queue is less than a preset threshold;
obtaining, according to a preset target delay and an average delay in scheduling the service message in the each service message buffer queue in a previous period, a quantity or an adjustment quantity of service messages of a corresponding type to be received by the each service message buffer queue in the current period, the average delay being obtained by calculation according to the usage of the resource; and
sending the quantity or the adjustment quantity of the service messages of the different type to be received in the current period to a front-end network element to permit the front-end network element to perform traffic control on the service messages of the different type according to the quantity or the adjustment quantity of the service messages of the different type to be received in the current period.

US Pat. No. 10,171,362

SYSTEM AND METHOD FOR MINIMIZING DISRUPTION FROM FAILED SERVICE NODES

CISCO TECHNOLOGY, INC., ...

1. A hardware switch configured to provide native load balancing, comprising:one or more logic elements comprising a load balancing engine operable to perform operations including:
load balancing network traffic among a plurality of service nodes comprising associating traffic buckets with the plurality of service nodes via a load balancing algorithm;
providing an ordinal list of service nodes, the ordinal list including a first service node;
determining that the first service node is unavailable; and
reassigning, in response to the determining, the traffic buckets associated with the first service node to a next available service node, comprising:
first selecting a provisioned working standby node as the next available service node; and
second selecting, in response to a lack of a provisioned working standby node, node from the ordinal list that immediately follows the first service node on the list;
wherein the load balancing engine is provided on the hardware switch.

US Pat. No. 10,171,361

SERVICE-SPECIFIC PROBES IN A NATIVE LOAD BALANCER

Cisco Technology, Inc., ...

1. A network apparatus for providing native load balancing, comprising:a first network interface to communicatively couple to a first network;
a plurality of second network interfaces to communicatively couple to a second network; and
a switching engine to provide network routing between the first network and the second network, the switching engine comprising a load balancing engine configured to:
probe a service node with a first probe for a first service;
probe the service node with a second probe for a second service, the second probe different in kind from the first probe;
load balance a network traffic among a plurality of servers based on responses to the first probe and the second probe, the plurality of servers being located in the second network and configured to provide the first service and the second service wherein a plurality of traffic is classified into buckets, wherein each bucket is assigned to at least one server of the plurality of servers, wherein each of the plurality of servers is assigned a Virtual IP (VIP) tag, wherein the buckets and a corresponding VIP tag of corresponding at least one server assigned to each of the buckets are stored in a content addressable memory accessible to the network apparatus;
determine a bucket corresponding to the network traffic;
determine the corresponding VIP tag of the corresponding at least one server assigned to the bucket; and
forward the network traffic to the at least one server.

US Pat. No. 10,171,360

SYSTEM DETECTION AND FLOW CONTROL

International Business Ma...

1. A system detection method, the method comprising:acquiring a throughput and a response time of a system, wherein the throughput reflects the number of requests from outside of the system that has been processed by the system, and the response time reflects time required by the system to process requests from outside of the system;
obtaining a system performance characteristic parameter based on the throughput and the response time, the system performance characteristic parameter being used to describe congestion condition of the system, wherein the step of obtaining system performance characteristic parameter based on the throughput and the response time comprises:
obtaining system performance characteristic parameter based on the throughput and the response time; and
conducting noise filtering on the system performance characteristic parameter; and
determining whether there is a bottleneck in the system based on the system performance characteristic parameter, wherein determining whether there is a bottleneck in the system based on the system performance characteristic parameter comprises determining whether there is bottleneck in the system based on the noise filtered system performance characteristic parameter.

US Pat. No. 10,171,359

CELLULAR NETWORK WITH CONTROL PLANE DECOUPLED FROM USER PLANE

TELECOM ITALIA S.p.A., M...

1. A cellular network comprising:a plurality of control plane transceiver stations, each one configured to provide radio coverage over a corresponding first coverage area to allow user equipment within said first coverage area to exchange control-plane traffic with the control plane transceiver station, the plurality of control plane transceiver stations exchanging only control-plane traffic with the user equipment;
wherein
for each control plane transceiver station, the cellular network further comprises one or more hybrid transceiver stations located within the corresponding first coverage area, each hybrid transceiver station being configured to be switched between:
a) a user operation modality, in which said hybrid transceiver station is configured to provide radio coverage over a corresponding user coverage area to allow user equipment within said user coverage area to exchange user-plane traffic with the hybrid transceiver station, and
b) a control operation modality, in which said hybrid transceiver station is configured to provide radio coverage over a corresponding control coverage area to allow user equipment within said control coverage area to exchange at least control-plane traffic with the hybrid transceiver station.

US Pat. No. 10,171,358

PORT CONGESTION RESILIENCY IN A MULTI-CARD AND MULTI-SWITCH LINK AGGREGATION GROUP

Ciena Corporation, Hanov...

1. A method for port congestion resiliency in a Link Aggregation Group (LAG) comprising one or more of a multi-card LAG and a multi-switch LAG, the method comprising:receiving a packet for egress over the LAG;
responsive to determining no congestion over internal ports not part of the LAG, hashing with all member ports on a plurality of cards in the LAG in a distribution state, wherein the plurality of cards are part of the one or more of a multi-card LAG and a multi-switch LAG, wherein cards in the multi-card LAG communicate via backplane ports which are not part of the LAG, and wherein cards in the multi-switch LAG communicate via inter-switch connectivity ports which are not part of the LAG; and
responsive to determining congestion over the internal ports, hashing with only member ports on a same local card in which the packet was received, wherein the hashing determines which member port the packet egresses from in the LAG and, by hashing with only member ports on the same local card, the packet egresses on the same local card when there is congestion.

US Pat. No. 10,171,357

TECHNIQUES FOR MANAGING SOFTWARE DEFINED NETWORKING CONTROLLER IN-BAND COMMUNICATIONS IN A DATA CENTER NETWORK

CISCO TECHNOLOGY, INC., ...

1. A method, comprising:establishing, by a network controller device, a translation table for resolving network addresses for in-band traffic in a data center network based on one or more of a virtual network identifier (VNID), a routable tenant address, or a unique loopback address;
receiving, by the network controller device, a packet originating from an application associated with a first unique loopback address and intended for an endpoint in a first network segment associated with a first VNID, the endpoint associated with a second unique loopback address;
translating, by the network controller device using the translation table, the first unique loopback address into a first routable tenant address and the first VNID based on the first unique loopback address;
translating, by the network controller device using the translation table, the second loopback address into a second routable tenant address and the first VNID based on the second unique loopback address;
encapsulating the packet as an encapsulated packet having a header field including the first VNID, an outer address field including an address for a proxy device, an inner source address field including the first routable tenant address, and an inner destination field including the second routable tenant address;
forwarding, by the network controller device, the encapsulated packet to the proxy device to route the encapsulated packet in the data center network to the endpoint in the first network segment associated with the first VNID; and
updating a routing table based on migration of the endpoint from a first host to a second host.

US Pat. No. 10,171,356

PACKET EDIT PROCESSING METHOD AND RELATED DEVICE

Huawei Technologies Co., ...

1. A packet edit processing method, the method comprising:generating an input packet template based on N to-be-edited protocol header fields of an input packet, and a preset protocol field mapping relationship, wherein the input packet template comprises N protocol descriptors that are corresponding, in a one-to-one manner, to the N protocol header fields, and the protocol field mapping relationship is a mapping relationship between a protocol field comprised in a protocol descriptor and a protocol field comprised in a protocol header field that has a correspondence with the protocol descriptor;
performing edit processing on the input packet template to obtain an output packet template; and
converting, based on the preset protocol field mapping relationship, M protocol descriptors comprised in the obtained output packet template into M protocol header fields of an output packet, and replacing the N protocol header fields in the input packet with the M protocol header fields to obtain the output packet, wherein N and M are positive integers.

US Pat. No. 10,171,355

DATA PACKET SENDING METHOD AND APPARATUS

HUAWEI TECHNOLOGIES CO., ...

1. A method for sending data packet in a network that comprises at least two controllers and multiple switches, wherein the method comprises:sending, by a first switch to the controllers, a policy request message that carries header information of a data packet when a forwarding table of the first switch does not have a forwarding entry that matches the header information of the data packet;
receiving, by the first switch, policy response messages sent by the controllers that include respective controller-determined forwarding paths determined by the controllers;
selecting, by the first switch, a forwarding path from the received controller-determined forwarding paths;
informing a second switch of the selected forwarding path, wherein the second switch is a switch besides the first switch on the selected forwarding path; and
forwarding, by the first switch, the data packet according to the selected forwarding path.

US Pat. No. 10,171,354

COMMUNICATION PROCESSING SYSTEM, COMMUNICATION PROCESSING APPARATUS, COMMUNICATION PROCESSING METHOD, AND STORAGE MEDIUM

NEC CORPORATION, Tokyo (...

1. A communication processing system comprising:hardware, including a processor and a non-transitory computer-readable data storage medium storing code that the processor executes;
a response time measuring unit implemented at least by the hardware in that the processor executes the code stored on the medium, and that is configured to measure a response time on a communication route between a first communication apparatus and a second communication apparatus communicably connected with the first communication apparatus;
a routing unit implemented at least by the hardware in that the processor executes the code stored on the medium, and that is configured to control a route on which communication data is transmitted and received between the one or more communication apparatuses, based on a first communication route information to which a communication route between one or more communication apparatuses including the first communication apparatus and the second communication apparatus is set; and
a communication route setting unit implemented at least by the hardware in that the processor executes the code stored on the medium, and that is configured to set, based on the measured response time, one or more first communication routes on which communication data related to a certain communication between the first communication apparatus and the second communication apparatus is transmitted and received, to the first communication route information, and
to set a communication route, being different from the first communication route, on which communication data related to a communication other than the certain communication is transmitted and received, to the first communication route information,
wherein the routing unit includes a first communication route information storage unit implemented at least by the hardware in that the processor executes the code stored on the medium, and and a communication route controlling unit implemented at least by the hardware in that the processor executes the code stored on the medium, and, the first communication route information storage storing the first communication route information, and the communication route controlling unit controlling the route on which communication data is transmitted and received between the one or more communication apparatuses, based on the first communication route information,
wherein when the second communication apparatus includes: a plurality of second data-transmission-reception-unit implemented at least in second hardware, and that transmit and receive communication data with another of the communication apparatuses; and a second communication route information storage that stores therein second communication route information including information for setting a communication route between each of the second data-transmission-reception-unit and another of the communication apparatuses,
wherein when the measured response time exceeds a reference value, the communication route setting unit sets the first communication route as a communication route associated with one or more of a plurality of the second data-transmission-reception-unit, to the second communication route information, and sets a communication route different from the first communication route as a communication route associated with another of the second data-transmission-reception-unit which is different from the one or more of a plurality of the second data-transmission-reception-unit,
wherein the routing unit includes a communication port communicably connected with the second data-transmission-reception-unit, and
wherein when a communication route different from the first communication route is set to a plurality of the communication ports and a plurality of the second data-transmission-reception-unit connected to a plurality of the communication ports,
wherein when the measured response time exceeds the reference value, the communication route setting unit sets the first communication route to the second communication route information, as a communication route associated with one or more of the second data-transmission-reception-unit to which a communication route different from the first communication route is set, and sets the first communication route to the first communication route information, as a communication route associated with the communication port connected to one or more of the second data-transmission-reception-unit to which a communication route different from the first communication route is set,
wherein the second communication apparatus includes a virtual network interface transmitting and receiving communication data on a virtual network,
wherein information related to the virtual network is set to the communication port in the routing unit, and
wherein when a communication route different from the first communication route in the virtual network is set to a plurality of the communication ports and the virtual network interface associated with a plurality of the second-data-transmission-reception-unit connected to the communication ports,
wherein when the measured response time exceeds the reference value, the communication route setting unit associates one or more of the virtual network interfaces to which a second communication route different from the first communication route in the virtual network is set, with another of the second data-transmission-reception-unit to which a third communication route different from the first communication routes is set, and adds a second communication route to the first communication route information, as a communication route associated with the second data-transmission-reception-unit to which the third communication route is set.

US Pat. No. 10,171,353

SYSTEM AND METHOD FOR SUPPORTING DUAL-PORT VIRTUAL ROUTER IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT

ORACLE INTERNATIONAL CORP...

1. A system for supporting dual-port virtual router in a high performance computing environment, comprising:one or more microprocessors;
a first subnet, the first subnet comprising
a plurality of switches, the plurality of switches comprising at least a leaf switch, wherein each of the plurality of switches comprise a plurality of switch ports,
a plurality of host channel adapters, each host channel adapter comprising at least one host channel adapter port,
a plurality of end nodes, wherein each of the end nodes are associated with at least one host channel adapter of the plurality of host channel adapters, and
a subnet manager, the subnet manager running on one of the a switch of the plurality of switches and the plurality of host channel adapters; and
a second subnet, the second subnet comprising
a plurality of switches of the second subnet, the plurality of switches of the second subnet comprising at least a leaf switch of the second subnet, wherein each of the plurality of switches of the second subnet comprise a plurality of switch ports of the second subnet,
a plurality of host channel adapters of the second subnet, each host channel adapters of the second subnet comprising at least one host channel adapter port,
a plurality of end nodes of the second subnet, wherein each of the end nodes of the second subnet are associated with at least one host channel adapter of the plurality of host channel adapters, and
a subnet manager of the second subnet, the subnet manager of the second subnet running on one of the plurality of switches of the second subnet and the plurality of host channel adapters of the second subnet;
wherein a switch port of the plurality of switch ports on a switch of the plurality of switches is configured as a router port;
wherein the switch port configured as the router port is logically connected to a first virtual router port of a virtual router, the virtual router comprising at least two virtual router ports;
wherein a switch port of the second subnet of the plurality of switch ports of the second subnet on a switch of the plurality of switches of the second subnet is configured as a router port of the second subnet;
wherein the switch port of the second subnet configured as the router port of the second subnet is logically connected to a first virtual router port of a virtual router of the second subnet, the virtual router of the second subnet comprising at least two virtual router ports; and
wherein the first subnet is interconnected with the second subnet via a physical link, wherein a first end of the physical link attaches to at least a second virtual router port of the virtual router of the first subnet, and wherein a second end of the physical link attaches to at least a second virtual router port of the virtual router of the second subnet.

US Pat. No. 10,171,352

COMMUNICATION SYSTEM, NODE, CONTROL DEVICE, COMMUNICATION METHOD, AND PROGRAM

NEC CORPORATION, Tokyo (...

1. A communication system, comprising:a plurality of nodes that forwards a packet; and
a controller that receives a request for a transmission of a packet processing rule from a node of the plurality of nodes, the packet processing rule including a matching rule and a packet forwarding rule that conforms to the matching rule, the matching rule being for comparing with information included in the packet;
wherein the controller retrieves a packet processing rule which corresponds to an identifier from a database when the identifier for identifying the packet processing rule is included in the request, and transmits the packet processing rule and the identifier to the node, and
wherein the node executes the packet forwarding rule only if the identifier from the controller matches an identifier included in the packet, and if the matching rule matches the information included in the packet.

US Pat. No. 10,171,351

METHOD FOR UPDATING FLOW TABLE

KT Corporation, Seongnam...

1. A method for updating a flow table of at least one network apparatus by a controller in a software defined network (SDN), the method comprising:transmitting, to the at least one network apparatus, a flow table modification message including information on a scheduled time specifying a time at which updating of the flow table is performed; and
receiving, from the at least one network apparatus, a result message showing an update result on the flow table performed by the at least one network apparatus according to the flow table modification message,
wherein a failure message is received by the controller when the scheduled time is later than an expiration time of a target flow entry included in the flow table.

US Pat. No. 10,171,350

GENERATING PACKETS IN A REVERSE DIRECTION OF A SERVICE FUNCTION CHAIN

Cisco Technology, Inc., ...

1. A method comprising:receiving an original packet at a service function of a service function chain, the service function chain comprising a plurality of service functions forming a service function path in a forward direction;
determining, for a reverse packet, a reverse service path identifier for a return service path for the reverse packet that is in a reverse direction from the service function path;
determining, for the reverse packet, a service index for a previous hop on the service function chain from the service function, wherein the previous hop is one of the plurality of service functions of the service function chain; and
transmitting the reverse packet to the previous hop on the service function chain along the return service path.

US Pat. No. 10,171,349

PACKET FORWARDING FOR QUALITY OF SERVICE DELIVERY

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for packet forwarding, the method comprising:receiving, by a processor from a source node, a first network queue in a set of network queues, wherein the first network queue includes one or more minimum network traffic performance requirements;
analyzing, by the processor, a set of network paths to determine a performance level for each network path in the set of network paths;
identifying, by the processor, a first network path and a second network path in the set of network paths with a performance level above the one or more minimum performance requirements of the first network queue;
determining, by the processor, that the first network path has a higher performance level than the second network path; and
based at least in part on determining that the first network path has a higher performance level than the second network path, mapping the first network queue to the first network path;
monitor the set of network paths to identify a trigger associated with the first network path in the set of network paths, wherein the trigger comprises an indication of a change to a performance level of the first network path, wherein the indication comprises at least one of a user-defined periodic time for re-optimization, changes above a threshold for traffic and utilization of the first network path, a threshold number of dropped packets in the first network path, detection of a new device coming online, new flows coming online, a user input requiring re-optimization, or a transfer control protocol (TCP) re-transmissions observed in the first network path.

US Pat. No. 10,171,348

COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL SYSTEM, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM THAT SELECTS A FUNCTION TO BE USED FROM FAILURE RECOVERY FUNCTIONS SUPERPOSED BY LAYER

NEC CORPORATION, Tokyo (...

1. A communication control device that, when a communication failure occurs at a place in a first path for the communication that extends across a plurality of communication layers,selects a second path from a candidate group including one or more candidate second paths for continuing communication without going via the place where the communication failure has occurred, based on required times for switching from the first path to the one or more candidate second paths, and
sends an instruction for switching from the first path to the selected second path of the candidate second paths and continuing communication to a communication device for performing the switching,
wherein the required times are estimated for each one of the candidate second paths, and one of the candidate second paths is selected as the selected second path based on its estimated required time, and
wherein the estimated required time of the selected second path is smaller than a time at which data retransmission caused by the communication failure occurs.

US Pat. No. 10,171,347

DATA TRANSFER CONTROL METHOD, RELAY DEVICE, AND DATA TRANSFER CONTROL DEVICE

Fujitsu Limited, Kawasak...

1. A data transfer control method in a system where a plurality of relay devices that relay a data transfer between a plurality of sensors and one or more data processing servers, and a data transfer control device that controls the plurality of relay devices, are arranged, the method comprising:partitioning, by a processor of the data transfer control device, a transfer path between a first sensor and a first data processing server into at least a first transfer path, which is a transfer path between the first sensor and a first relay device that initially receives data transmitted from the first sensor, a second transfer path including one or more second relay devices, which is a transfer path from the first relay device to a third relay device that transfers the data transmitted from the first sensor to the first data processing server, and a third transfer path, which is a transfer path between the third relay device and the first data processing server;
managing, by the processor, setting information in which first data and second data are associated with each other, the first data being included in the transferred data and indicating a type of the transferred data, the second data being assigned to each of the third relay devices and identifying the second transfer path;
managing, by the processor, transfer path management information in which the second data is associated with identification information of each of the first, second, and third relay devices included in the second transfer path, wherein one value is set as the second data for identifying a plurality of second transfer paths when an exit of the plurality of second transfer paths is one third relay device;
when a sensor has been added, adding, by the processor, the first data and the second data to the setting information, the first data designating the type of the transferred data from the added sensor, the second data being data that has been assigned to the third relay device that is a destination of the transferred data from the added sensor;
transmitting, by the processor, the setting information to the first relay device;
implementing, by the processor, a data transfer between each of the sensors and the data processing server by respectively controlling a pair of the first transfer path and the second transfer path, and a pair of the second transfer path and the third transfer path;
by the first relay device, selecting the second data corresponding to the first data based on the setting information, adding the selected second data to the transferred data, and transmitting, to the second relay device, the transferred data with the selected second data added thereto;
determining, by the second relay device, a transfer destination for the transferred data based on the second data.

US Pat. No. 10,171,346

METHOD, APPARATUS AND SYSTEM FOR TRANSMITTING INFORMATION

Huawei Technologies Co., ...

1. A method for transmitting information, the method comprising:determining, by a controller, a work path and a protection path, wherein a start node of the work path and the protection path is a first apparatus, an end node of the work path and the protection path is a second apparatus, the work path corresponds to a first tag, and the protection path corresponds to a second tag;
transmitting, by the controller, first information to the first apparatus, wherein the first information comprises a first flow entry and a first group entry; the first flow entry comprises a match field and an instruction field, wherein the match field comprises a destination identifier, and the instruction field comprises a first group action, an operand of the first group action is a first group identifier, the first group action is used for instructing the first apparatus to associate the first flow entry with the first group entry, the first group entry comprises a first action bucket and a second action bucket, a group type of the first group entry is ALL; wherein the first action bucket is used for instructing the first apparatus to push the first tag into a first message matching the first flow entry to generate a second message, and to transmit the second message to the second apparatus via the work path; wherein the second action bucket is used for instructing the first apparatus to push the second tag into a third message to generate a fourth message, and to transmit the fourth message to the second apparatus via the protection path, and wherein the third message is the same as the first message;
transmitting, by the controller, second information to the second apparatus, wherein the second information comprises a second flow entry; the second flow entry comprises a work path flow entry and a protection path flow entry; wherein a match field of the work path flow entry comprises the first tag, and an instruction field of the work path flow entry is used for instructing the second apparatus to pop the first tag of the second message and to output the first message; a match field of the protection path flow entry comprises the second tag, and an instruction field of the protection path flow entry comprises a drop action, wherein the drop action is used for instructing the second apparatus to drop the fourth message.

US Pat. No. 10,171,345

ROUTING COMMUNICATION SESSIONS

Microsoft Technology Lice...

1. A system comprising:at least one processor; and
one or more computer-readable storage media including instructions stored thereon that, responsive to execution by the at least one processor, cause the system perform operations including:
receiving one or more attributes of a communication session that is initiated between a client device and an endpoint device;
searching a database to identify a set of routing paths that are available to route data between the client device and the endpoint device by comparing the one or more attributes of the communication session to indicia of path capacity and indicia of path quality for the set of routing paths to identify a particular routing path for routing the communication session, the database indicating historic data flow quality for one or more previous communication sessions across each routing path, the particular routing path being selected based on a historical data flow quality of the particular routing path;
communicating information describing the particular routing path to an entity involved in routing the communication session to cause the communication session to be routed via the particular routing path;
ascertaining, while the communication session is in progress, that performance degradation in a quality of the communication session occurs;
identifying, from the database, a different routing path from the set of routing paths to be used to reroute the communication session from the particular routing path;
communicating information describing the different routing path to the entity involved in routing the communication session to cause the communication session to be rerouted via the different routing path;
updating the database to indicate that the performance degradation in the quality of the communication session occurred on the particular routing path; and
filtering the set of routing paths from the database in response to a request for a routing path for a different communication session such that the particular routing path is not selected for the different communication session based on the database indicating the performance degradation in the quality of the communication session.

US Pat. No. 10,171,344

ISOLATION OF ENDPOINTS WITHIN AN ENDPOINT GROUP

Cisco Technology, Inc., ...

1. A method comprising:at an ingress network device of a network fabric, receiving an indication that a plurality of endpoints connected to the network fabric are associated with a first isolated endpoint group that restricts network traffic among the plurality of endpoints;
receiving a packet from a source endpoint;
detecting that the source endpoint is one of the plurality of endpoints in the first isolated endpoint group; and
incorporating source endpoint group information into a virtual network header of the packet to indicate that the source endpoint belongs to the first isolated endpoint group, wherein the source endpoint group information comprises reserved values of one or more of a Class of Service (COS) field in the virtual network header, a Drop Eligible Indicator (DEI) field in the virtual network header, or a Differentiated Service Code Point (DSCP) field in the virtual network header.

US Pat. No. 10,171,343

ROUTING MULTIPLE DATA STREAMS SIMULTANEOUSLY IN WIRELESS NETWORKS

SONY CORPORATION, Tokyo ...

1. A wireless communication apparatus, comprising:(a) a wireless communication circuit configured for wirelessly communicating with other wireless communication stations;
(b) a computer processor coupled to said wireless communication circuit; and
(c) a non-transitory computer-readable memory storing instructions executable by the computer processor;
(d) wherein said instructions, when executed by the computer processor, perform steps comprising:
(i) communicating with the other wireless communication stations utilizing a routing protocol;
(ii) performing primary path discovery for a multiple-input-multiple-output (MIMO) capable source wireless communication station by sending an extended routing request (RREQ) containing a primary route flag and multiple-input-multiple-output (MIMO) capability information, or sending a conventional (non-extended) routing request (RREQ) for a source wireless communication station which is only single-input-single-output (SISO) capable, in establishing communications from the source wireless communication station to a destination wireless communication station, through intermediate wireless communication stations;
(iii) receiving an extended routing reply (RREP), to an extended routing request (RREQ), from the destination wireless communication station if the destination wireless communication station is multiple-input-multiple-output (MIMO) capable, or receiving a conventional (non-extended) routing reply (RREP) if either a conventional (non-extended) routing request (RREQ) was sent or if the destination wireless communication station is only single-input-single-output (SISO) capable, whereby a single stream data transmission can commence;
(iv) performing secondary path discovery, in response to receiving an extended routing reply from the multiple-input-multiple-output (MIMO) capable destination wireless station, by sending an extended routing request (RREQ) containing a secondary route flag and multiple-input-multiple-output (MIMO) capability information in establishing communications along a secondary path;
(v) determining by intermediate wireless communication stations taking a localized action in recognizing that secondary path segments are not part of the primary path and adjusting a path cost metric to secure said secondary path as independent of said primary path, and adjusting the cost metric in response to determining signal processing capability, comprising determining if those stations are either single-input-single-output (SISO) or multiple-input-multiple-output (MIMO) capable; and
(vi) transmitting data from the source wireless communication station on the primary and the secondary path simultaneously, toward the destination wireless communication station, when both the source wireless communication station and the destination wireless communication station are configured for multiple-input-multiple-output (MIMO) communications.

US Pat. No. 10,171,342

RECORDING MEDIUM AND PACKET RELAY METHOD FOR RELAYING A PACKET IN A FIRST SUB-DOMAIN AMONG A PLURALITY OF SUB-DOMAINS IN A SERVICE CHAIN CONFIGURED ACROSS THE PLURALITY OF SUB-DOMAINS

FUJITSU LIMITED, Kawasak...

1. A non-transitory storage medium having stored therein a packet relay program for relaying a packet in a first sub-domain among a plurality of sub-domains in a service chain configured across the plurality of sub-domains, the packet relay program when executed by a computer in the first sub-domain to perform a process, the process comprising:controlling a receiver so as to receive the packet including identification information indicating a combination of a plurality of service functions included in the service chain and an index indicating an order for applying the service function, the index being a predetermined value;
specifying a next transmission destination corresponding to the identification information included in the packet and the index included in the packet on a basis of relay information with which identification information indicating a combination of a plurality of service functions included in the service chain, an index indicating an order for applying the service function, and the next transmission destination are associated;
when the specified next transmission destination is a service function in the first sub-domain, applying, to the packet, a service function in the first sub-domain that corresponds to the specified next transmission destination, and decrementing the index by one;
changing the index included in the packet into the predetermined value when the specified next transmission destination is a second sub-domain among the plurality of sub-domains; and
controlling a transmitter so as to transmit the packet including the identification information included in the packet and the index of the predetermined value to the specified next transmission destination.

US Pat. No. 10,171,341

SOFTWARE DEFINED STORAGE STACK PROBLEM DIAGNOSIS AND OPTIMIZATION

INTERNATIONAL BUSINESS MA...

1. A method for storage stack analysis, the method comprising:determining, by a processor, a client configuration of a client storage stack comprising a plurality of layers with configurable parameters to control storage and retrieval of data between an uppermost layer and a lowest layer along an input/output path that selects from a plurality of options at each layer between the uppermost layer and the lowest layer of the client storage stack;
initiating, by the processor, creation of a replica of the client storage stack based on the client configuration to match the input/output path between the uppermost layer and the lowest layer of the client storage stack;
collecting input/output characteristics of a workload executed on the client storage stack using the client configuration;
applying a synthesized workload to the replica of the client storage stack, the synthesized workload based on the input/output characteristics of the workload;
analyzing, by the processor, input/output performance through the layers of the replica of the client storage stack in response to applying the synthesized workload;
identifying one or more configuration issues with the client configuration of the client storage stack based on a result of the analyzing;
generating a modified version of the client configuration as a replica configuration;
repeating the applying of the synthesized workload to the replica of the client storage stack using the replica configuration and analyzing the input/output performance through the layers of the replica of the client storage stack in response to applying the synthesized workload;
determining whether the result of the analyzing has improved based on the replica configuration;
generating a plurality of synthesized workloads that map to a plurality of replica configurations having different combinations of the options selected between the uppermost layer and the lowest layer of the client storage stack as input/output path options;
iteratively examining a plurality of variations of the replica configurations on the replica of the client storage stack using the synthesized workloads to identify a best performing instance of the replica configuration having a fewest number of configuration issues on the replica of the client storage stack; and
updating the client configuration of the client storage stack to align with the best performing instance of the replica configuration.

US Pat. No. 10,171,340

INTERWORKING NETWORK ELEMENT

TEJAS NETWORKS LIMITED, ...

1. A method, comprising:comparing Ethertype of a received frame at a network element based on a service level agreement, with an Ethertype associated with a source domain;
recognizing a destination Ethertype associated with a destination domain determined via lookup of a forward database stored in the network element, wherein the recognizing includes determining if the received frame Ethertype is same as the destination Ethertype or not;
determining if the destination domain is of type 802.1Q, 802.1ad, or 802.1ah, wherein the determining includes recognizing domain types of 802.1Q, 802.1ad, and 802.1ah; and
translating the Ethertype of the received frame to include the Ethertype of the destination domain, wherein the translation includes overwriting or appending the Ethertype of the received frame with an Ethertype associated with the destination domain and/or encapsulating the received frame with an Ethertype associated with the destination domain.

US Pat. No. 10,171,339

POPULATING FORWARDING DATABASE TABLES IN A FABRIC ENVIRONMENT

Lenovo Enterprise Solutio...

1. A computer program product comprising computer readable storage media that is not a transitory signal having program instructions embodied therewith, the program instructions executable by a processor to:maintain a forwarding database table in each of a plurality of interconnected switches forming a network, wherein each forwarding database table includes one or more records, each record identifying a media access control address, a port identifier, and a source identifier, and wherein the plurality of switches includes a first switch having a first forwarding database table;
maintain a node sequence table in each of the plurality of interconnected switches, wherein the node sequence table of any one of the switches identifies, for other switches in the network, the source identifier of the other switch and a sequence number of a synchronization packet last received from the other switch;
receive a frame from a first network device at a first port of the first switch, wherein the frame includes a media access control address of the first network device;
prepare a synchronization packet including the media access control address identifying first network device, a port identifier identifying the first port, a source identifier identifying the first switch, a sequence number that the first switch increments each time the first switch sends out a synchronization packet and an instruction, and wherein the synchronization packet is prepared by the first switch in response to determining that the media access control address is not associated with the first switch in a record of the first forwarding database table;
send the synchronization packet from the first switch to each other switch of the plurality of switches;
determine, by each switch that receives the synchronization packet, whether the sequence number in the synchronization packet is in sequence with the sequence number that is stored in the node sequence table of the switch in association with the source identifier of the first switch;
modify the forwarding database table of one or more of the switches that receive the synchronization packet to implement the instruction included in the synchronization packet in response to determining that the sequence number in the synchronization packet is in sequence with the sequence number that is stored in the node sequence table of the switch in association with the source identifier of the first switch; and
send, by any one or more of the switches that receives the synchronization packet, a negative acknowledgement packet to the first switch requesting that the first switch resend one or more synchronization packets in response to determining that the sequence number in the synchronization packet is not in sequence with the sequence number that is stored in the node sequence table of the switch in association with the source identifier of the first switch.

US Pat. No. 10,171,338

ON-DEMAND NEXT-HOP RESOLUTION

Cisco Technology, Inc., ...

1. A method comprising:at a first network element in a first leaf domain among leaf domains interconnected by a core domain, the leaf domains and the core domain each configured to perform segment routing with an independent segment routing protocol based on a first block of segment prefix identifiers solely for the core domain, and a second block of segment identifiers for reuse across the leaf domains:
receiving a triggering event to prompt a request for a path to a second network element in a second domain among the leaf domains, the triggering event including provisioning the first network element with an overlay service route identifying the second network element as a next hop for a service;
determining the path based on the triggering event without performing any interdomain routing protocol operations, wherein the path includes an interdomain segment identifier list having a segment identifier from the first block and a segment identifier from the second block; and
programming an output interface of the first network element with the interdomain segment identifier list of the path.

US Pat. No. 10,171,337

METHOD FOR MANAGING A NETWORK, AND NODE FOR IMPLEMENTING SAID METHOD

SERCEL, Carquefou (FR)

1. Method for electing a master routing node of a given subnet of a network, which given subnet comprises nodes connected together by a same type of interface, wherein the nodes comprising at least two activated interfaces enabling a connection with the given subnet and another different subnet of the network are defined as router nodes, one of the nodes of the network being chosen as target node, said method comprising following steps:determining a first-type address associated with the interface of each node on the given subnet, said first-type address being the address given by a routing table of the next hop on the path leading from said node to the target node, the next hop being a router node or said target node;
determining a second-type address associated with the interface of each node on the given subnet, said second-type address being the determined first-type address if the determined first-type address is on said given subnet, or the address of the interface of said node on the given subnet if the determined first-type address is on another subnet of the network than said given subnet;
sending by each router node of the given subnet a message containing its determined second-type address;
collecting at the interface of each node on the given subnet said sent messages containing a second-type address associated with a router node of said given subnet;
selecting for the interface of each node on the given subnet a third-type address among its determined second-type address and the second-type addresses contained in the collected messages, according to a selection rule known by all nodes of said subnet;
electing as master routing node of said given subnet the node having the selected third-type address.

US Pat. No. 10,171,336

OPENFLOW CONFIGURED HORIZONTALLY SPLIT HYBRID SDN NODES

TELEFONAKTIEBOLAGET LM ER...

1. A method implemented by a network element to execute a forwarding information base (FIB) manager to manage an FIB of the network element and to program a packet forwarding function of the network element, where the FIB manager supports a hybrid control plane with software defined networking (SDN) and local control plane processes, the method comprising:receiving a request to configure a node reachability configuration element, where the node reachability configuration element describes a packet processing instruction for the packet forwarding function to forward packets toward a referred node;
selecting a flow control agent from a set of flow control agents that each manage a separate flow control logical switch instance, the flow control agent to update reachability information to the referred node for an associated flow control logical switch instance, each separate flow control logical switch instance being a data plane implementation of a logical view of the FIB and each separate flow control logical switch having a separate service controller; and
updating a logical forwarding information representation to encode a next hop identifier for the referred node.

US Pat. No. 10,171,335

ANALYSIS OF SITE SPEED PERFORMANCE ANOMALIES CAUSED BY SERVER-SIDE ISSUES

Microsoft Technology Lice...

1. A method, comprising:analyzing a plurality of time-series performance metrics related to operation of an application to identify deviations from corresponding baseline values for the time-series performance metrics, wherein each deviation represents a corresponding anomaly in performance of the application;
in response to identifying a given deviation in a time-series performance metric, obtaining a component of the time-series performance metric associated with a server-side root cause of the corresponding anomaly;
obtaining a call graph representation of the component, wherein the call graph representation comprises a parent node having a parent value of the component and a set of child nodes of the parent node, each child node having a corresponding child value of the component;
analyzing, by a computer system, the call graph representation to identify one or more of the child nodes as sources of the anomaly by:
using the call graph representation to generate a first regression model that estimates the parent value based on the set of child values;
using a historic call graph representation of the component to generate a second regression model that estimates a baseline parent value of the component for the parent node based on a set of baseline child values of the component for the set of child nodes; and
comparing a first set of coefficients from the first regression model to a second set of coefficients from the second regression model to identify the one or more of the child nodes as the sources of the anomaly; and
outputting an alert that identifies the sources of the anomaly.

US Pat. No. 10,171,334

REAL-TIME DATA ANALYTICS FOR STREAMING DATA

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method, comprising:receiving a plurality of values of a data stream, the plurality of values being generated by a monitored device and being received in real time;
updating, by a computer processing device, one or more statistical moments of the data stream based on each value of the plurality of values;
discarding each value of the plurality of values, after updating the one or more statistical moments of the data stream based on the value;
setting a threshold for the data stream based on the one or more statistical moments wherein the setting the threshold comprises:
associating a first statistical model with a first data type, the first data type being variable data;
associating a second statistical model with a second data type, the second data type being attribute data;
setting an active statistical model as one of the first statistical model and the second statistical model;
detecting a data type of the data stream;
determining that the data type of the data stream differs from the data type associated with the active statistical model;
changing the active statistical model, responsive to the data type of the data stream differing from the data type associated with the active statistical model; and
applying the changed active statistical model to the one or more statistical moments to calculate the threshold;
detecting that the threshold has been passed by the data stream; and
performing a remedial action on the monitored device, responsive to the threshold being passed, the remedial action being associated with the threshold.

US Pat. No. 10,171,333

DETERMINING CONNECTION FEASIBILITY AND SELECTION BETWEEN DIFFERENT CONNECTION TYPES

INTERNATIONAL BUSINESS MA...

1. A method, comprising:by an application (i) executed by a processor and (ii) programmed as part of the application at an application level to pre-test and selectively use a plurality of different available connection types and service interfaces to communicate application-level data over one or more computer networks to a remote computing system:
performing real-time application-level connection pre-testing of an available connection type of the plurality of different available connection types;
measuring real-time application-accessible performance characteristics of the available connection type of the plurality of different available connection types;
determining whether the measured real-time application-accessible performance characteristics of the available connection type satisfy a threshold real-time application-level connection performance criterion specified in accordance with a service-level data transmission formatting option utilized by one of the different available service interfaces;
selecting the available connection type in response to determining that the measured real-time application-accessible performance characteristics of the available connection type satisfy the threshold real-time application-level connection performance criterion specified in accordance with the service-level data transmission formatting option utilized by the one of the different available service interfaces; and
in response to determining that the measured real-time application-accessible performance characteristics of the available connection type do not satisfy the threshold real-time application-level connection performance criterion, the application:
determining that an alternative service interface with an alternative service-level data transmission formatting option selected from a group consisting of text-based serialized data transmission formatting and binary-based serialized data transmission formatting provides satisfactory real-time application-level performance over the available connection type; and
selecting the alternative service interface with the alternative data transmission formatting option.

US Pat. No. 10,171,332

PROBING TECHNIQUE FOR PREDICTIVE ROUTING IN COMPUTER NETWORKS

Cisco Technology, Inc., ...

1. A method, comprising:receiving, at a device in a network, network information associated with a plurality of nodes in the network;
selecting a node for probing from the plurality of nodes based on a determination that the selected node is an outlier among the plurality of nodes according to the received network information, wherein the selection is based on which node allows a learning algorithm to converge more quickly;
sending a probe to the selected node;
receiving, at the device, a performance metric from the selected node in response to the probe;
sending a plurality of probes to nodes selected from the plurality of nodes; and
adjusting a rate at which the plurality of probes are sent.

US Pat. No. 10,171,331

WIRELESS NETWORK POLLING

CSC Holdings, LLC, Bethp...

1. A method to collect inventory data in a wireless network, comprising:connecting to a cable modem termination system (CMTS) from among a plurality of CMTSs to collect an inventory of a cable modem of a plurality of cable modems;
connecting to the cable modem through the CMTS to collect an inventory of an access point of a plurality of access points associated with the cable modem;
connecting to the access point to determine a Media Access Control (MAC) address of the access point and an Internet Protocol (IP) address of the access point; and
creating a record having the MAC address of the access point and the IP address of the access point;
determining a current IP address for the access point by connecting to the CMTS; and
updating the IP address for the access point in the record when the current IP address for the access point is not equal to the IP address in the record.

US Pat. No. 10,171,330

INTEGRATING A COMMUNICATION BRIDGE INTO A DATA PROCESSING SYSTEM

INTERNATIONAL BUSINESS MA...

1. A method of integrating a further communication bridge into a running data processing system, the method comprising:obtaining, by a master communication bridge of the data processing system, an announcement made at an announcement time by the further communication bridge of the data processing system announcing that the further communication bridge is a slave communication bridge, the further communication bridge being a new or a recovered communication bridge, and wherein the data processing system includes a communication client running a first operating system having no own communication stack, and a first communication bridge running a second operating system having an own communication stack, wherein the first communication bridge is configured to act as the master communication bridge and wherein the further communication bridge is running a third operating system having an own communication stack, wherein master and slave are designations that are switched from one communication bridge to another communication bridge based on a failure of the one communication bridge, wherein the first communication bridge and the further communication bridge communicate by exchanging system state information on a regular basis, the system state information including at least one of information about a data packet count sent or received by the master communication bridge or information about an identifier for a last data packet sent or received;
monitoring, by the master communication bridge, data packets in a queue of its communication stack;
executing, by the master communication bridge, a quiesce process to quiesce processing on a network adapter and on an application programming interface (API) of the communication client based on there being no data packets in the queue with a sending time earlier than the announcement time;
extracting, by the master communication bridge, state of its communication stack and sending it to the further communication bridge;
obtaining, by the master communication bridge, an indication of completion by the further communication bridge of setting the received state in its own communication stack; and
resuming, by the master communication bridge, the network adapter and the API, wherein the master communication bridge and the further communication bridge are in synchronization.

US Pat. No. 10,171,329

OPTIMIZING LOG ANALYSIS IN SAAS ENVIRONMENTS

International Business Ma...

1. A method for optimizing log analysis, comprising:determining, by one or more computer processors, an optimal log analysis location based, at least in part, on an identified file size, an identified network bandwidth, current processing conditions, and a hierarchy of bandwidth thresholds and log file size thresholds, wherein determining an optimal log analysis location comprises:
determining, by the one or more computer processors, whether the identified bandwidth satisfies a first threshold bandwidth,
responsive to determining that the identified bandwidth does not satisfy the first threshold bandwidth, determining, by the one or more computer processors, whether the identified bandwidth satisfies a second threshold bandwidth,
responsive to determining that the identified bandwidth satisfies the second threshold bandwidth, determining, by the one or more computer processors, whether the identified log file size satisfies a first threshold file size, and
responsive to determining that the identified log file size satisfies the first threshold file size, identifying, by the one or more computer processors, the optimal log analysis location as being a second computer system, and
processing, by the one or more computer processors, the identified log file based, at least in part, on the identified optimal log analysis location, wherein processing the identified log file includes splitting portions of the identified log file, pushing log analysis software to a first computer system, transmitting at least a first portion of the identified log file to the first computer system for processing, and transmitting at least a second portion of the identified log file to the second computer system for processing.

US Pat. No. 10,171,328

METHODS AND DEVICES FOR BACKWARD CONGESTION NOTIFICATION

Cisco Technologies, Inc.,...

1. A congestion management method, comprising:at a reference point in a network:
sampling a frame received from a reaction point, different from the reference point, wherein the frame is associated with an existing flow that is one of one or more flows associated with the reaction point that traverse the network;
determining whether the frame includes data inserted by the reaction point in response to a previous feedback message provided by the reference point;
determining whether the data inserted by the reaction point includes information identifying the reference point, wherein the information identifying the reference point is obtained by the reaction point from the previous feedback message and inserted by the reaction point to frames in the existing flows subsequent to receiving the previous feedback message;
determining a congestion condition of the reference point;
sending a subsequent feedback message of a first type, distinct from the previous feedback message, to the reaction point according to a determination that the congestion condition does not breach a first threshold and in response to determining that the frame includes the data inserted by the reaction point in response to the previous feedback message, and also in response to determining that the data inserted by the reaction point includes information identifying the reference point, wherein the first type of feedback message instructs the reaction point to speed up the existing flow; and
sending a subsequent feedback message of a second type, distinct from the previous feedback message, to the reaction point according to a determination that the congestion condition breaches the first threshold and in response to determining that the frame includes the data inserted by the reaction point in response to the previous feedback message, and also in response to determining that the data inserted by the reaction point includes information identifying the reference point, wherein the second type of feedback message instructs the reaction point to throttle a transmission rate of the existing flow.

US Pat. No. 10,171,327

HANDLING OF NETWORK CHARACTERISTICS

TELEFONAKTIEBOLAGET L M E...

1. A network information system, NIS, for handling network characteristics, the NIS comprising:a core network node comprising at least one processor coupled to at least one memory, the memory comprising:
a first set of instructions that when executed by the at least one processor causes the at least one processor be operable to:
estimate an available bitrate for a media flow, wherein the available bitrate is estimated based on available physical resources of a user equipment node to transmit the media flow;
a second set of instructions that when executed by the at least one processor causes the at least one processor be operable to:
acquire information about a permitted share of physical resources to be used during the transmission of the media flow;
update the estimated available bitrate for the media flow by matching the information to the estimated available bitrate for the media flow;
transmit the updated estimated available bitrate to the user equipment node that transmits the media flow;
transmit an instruction to the user equipment node that transmits the media flow to adjust the bitrate for transmission of the media flow according to the updated estimated available bitrate; and
a third set of instructions that when executed by the at least one processor causes the at least one processor be operable to:
invoke handling of network characteristics by triggering execution of the first set of instructions and the second set of instructions by the at least one processor.

US Pat. No. 10,171,326

METHOD AND APPARATUS FOR ESTIMATING A MAXIMUM TIME INTERVAL ERROR IN A DATA TRANSMISSION NETWORK

ADVA Optical Networking S...

1. A method for estimating a maximum time interval error in a data transmission network, the method comprising:(a) receiving at a processing device a plurality of data samples from the data transmission network over a sampling period;
(b) with the processing device, comparing a duration of the sampling period to a sampling period time threshold;
(c) if the duration of the sampling period is less than or equal to the sampling period time threshold, processing the plurality of data samples with the processing device so as to calculate in real time a maximum time interval error for the sampling period, wherein processing the plurality of data samples so as to calculate in real time the maximum time interval error includes,
(i) comparing a quantity of the plurality of data samples received over the sampling period to a data sample quantity threshold value;
(ii) if the quantity of the plurality of data samples received over the sampling period is less than or equal to the data sample quantity threshold value, directly storing the plurality of data samples received over the sampling period and calculating the maximum time interval error from the stored plurality of data samples; and
(iii) if the quantity of the plurality of data samples received over the sampling period exceeds the data sample quantity threshold value, creating a tree data structure on the basis of the plurality of data samples received over the sampling period, storing the tree data structure, and calculating the maximum time interval error from the stored tree data structure; and
(d) if the duration of the sampling period exceeds the sampling period time threshold, dividing the sampling period into a number of sub-intervals, processing the data samples received in each respective sub-interval with the processing device to produce a respective intermediate result for each respective sub-interval, storing each respective intermediate result directly after the respective intermediate result is produced, and processing the stored intermediate results with the processing device so as to produce a maximum time interval error estimate.

US Pat. No. 10,171,325

MINIMUM DELAY VALUE CALCULATING DEVICE, INFORMATION TRANSMITTING DEVICE, MINIMUM DELAY VALUE CALCULATING METHOD, AND PROGRAM STORAGE MEDIUM

NEC CORPORATION, Tokyo (...

1. A minimum delay value calculating device comprising:a non-transitory computer-readable medium storing code;
a processor that, by executing the code, is configured to:
measure (i) a time from transmission of information, which is transmitted from the own device (the minimum delay value calculating device) or an external device which is transmitting data, to arrival at a destination of the information as a delay or (ii) a round trip time from the transmission of the information to receipt of reply information, which is received by the own device or the external device, from the destination receiving the information as the delay;
when the measured delay is smaller than a value which is already set in the own device as a minimum delay value, set the measured delay as the minimum delay value instead of the already set value;
determine a review timing of the set minimum delay value using a time period between a first timing when the measured delay is close to the minimum delay value, which is already set at the first timing as the latest review timing, and a second timing when the measured delay is close to the minimum delay value, which is set at the second timing after the latest review timing; and
update the minimum delay value, at the determined review timing, to a predetermined preset initial value, or calculate the minimum delay value using the measured delay and update the minimum delay value, at the determined review timing, to the calculated minimum delay value.

US Pat. No. 10,171,324

MEDIA STREAM MONITOR

iHeartMedia Management Se...

1. A media broadcast chain comprises:a media processing server generating a primary media stream of content for broadcast;
an encoding unit receiving the primary media stream of content from the media processing server and encoding the primary stream of content into an encoded media stream of one or more streaming formats;
a streaming server receiving the encoded media stream and outputting multiple individual encoded media streams to different end users via a network;
a stream monitor receiving a plurality of the individual encoded media streams, wherein the streaming monitor includes a computer memory operative with a host web page serving a plurality of extensible markup language (XML) pages executing program instructions, the program instructions including:
receiving, in response to a web page request, a plurality of stream records from a stream manager database, the plurality of stream records including parameters to identify a corresponding plurality of media streams, wherein the plurality of media streams each include packetized media content and associated metadata;
monitoring, based on the plurality of stream records, the plurality of media streams being served by the stream server;
asynchronously and concurrently testing each media stream of the plurality of media streams for streaming errors;
generating results of the testing for each media stream of the plurality of media streams;
discontinuing, by the host web page, the asynchronous and concurrent testing of an individual media stream of the plurality of media streams in response to one or more of: detection of an error with the individual media stream or broadcast of metadata associated with the individual media stream;
removing stream records discontinued from the asynchronous and concurrent testing from computer memory; and
receiving additional stream records associated with other media streams being served by the stream server for testing.

US Pat. No. 10,171,323

DETERMINING A STATE OF A NETWORK DEVICE

PHILIPS LIGHTING HOLDING ...

1. A processor for determining a state of a first network device in a lighting network, the processor being adapted to:ascertain a first count value associated with the first network device and a second count value associated with a second network device adapted to pass messages to the first network device;
determine the state of the first network device based on the first count value and the second count value, wherein if the first count value is within a first predetermined range relative to the second count value, the processor determines that the first network device has been inactive,
wherein the first count value is dependent on a change of an incremental property of the first network device since a last reset of the first count value and the second count value is dependent on a change of an incremental property of the second network device since a last reset of the second count value.

US Pat. No. 10,171,322

DYNAMIC AND SECURE CLOUD TO ON-PREMISE INTERACTION AND CONNECTION MANAGEMENT

INTERNATIONAL BUSINESS MA...

1. A method executed by a passport service executed by at least one processor coupled to at least one memory, comprising:creating a passport on a cloud application that comprises connectivity details for a tunnel, the connectivity details including pre-allocated transmission control protocol ports for a setup of the tunnel, the tunnel securing and directing access by the cloud application to data of an on-premise appliance;
activating the on-premise appliance of an on-premise system by delivering the passport to the on-premise appliance to build the tunnel;
generating a passport token via the passport, wherein the passport token comprises dynamically generated connectivity properties for secure communications; and
binding the cloud application and the on-premise appliance based on the dynamically generated connectivity properties of the passport token and the connectivity details of the passport.

US Pat. No. 10,171,321

ADAPTIVE PUSH-BASED MONITORING OF NETWORKED ENTITIES

Cisco Technology, Inc., ...

1. A publisher computer system for restricting indiscriminate dropping of state data comprising:one or more processors;
a non-transitory computer-readable storage medium storing which when executed by the one or more processors, cause the one or more processors to perform:
using the one or more processors, obtaining electronic digital state data for one or more routers or switches in a monitored network environment, wherein the state data for a particular router or switch comprises a timestamp value, an element identifier of an element of that particular router or switch that is monitored, and a current value of the element;
using the one or more processors, updating a record of the element wherein the record is stored in a buffer memory to create an updated record, the updated record of the element comprising the element identifier, the current value of the element, an elapsed time since a previous update of the element has been sent to a subscriber computer, and a previous value of the element;
using the one or more processors, determining a priority value for the state data by calculating an incoherence metric of the element based on a product of the elapsed time, an event weight, and a weighted absolute value of a difference between the previous value of the element and the current value of the element, wherein the event weight is a configurable weight value corresponding to a change in the existence of an element between the time when the previous value was sent and the current value of the element;
using the one or more processors, copying the state data into a priority queue that is maintained in the buffer memory according to the priority value of the element relative to the priority values of a plurality of other elements;
using the one or more processors, controlling a frequency of updates by electronically communicating first state data having a highest priority value in the priority queue to the subscriber computer only when a timing signal from a timing module indicates that the first state data is to be sent.

US Pat. No. 10,171,320

ENSURING IMPORTANT MESSAGES ARE VIEWED BY INTENDED RECIPIENT BASED ON TIME-TO-LIVE PATTERN

International Business Ma...

1. A computer program product for ensuring that important messages are viewed by the intended recipient, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for:identifying a message as being important for a target group based on identifying keywords, based on detecting a flagged attribute or based on receiving a rating of importance from a user, wherein said message is identified as being important while said message is being created or reviewed by an author of said message, wherein said target group corresponds to one or more intended recipients of said message identified as being important, wherein said target group is deduced based on context in which said message is sent;
determining a time-to-live pattern for said message for said target group, wherein said time-to-live pattern indicates a set of presentation criteria for utilization of said message in a network environment, wherein said set of presentation criteria comprises relationship details, behaviors of said message and impression analysis, wherein said set of presentation criteria is based on a number of recipients of said target group;
monitoring, in said network environment, said message with respect to said time-to-live pattern using said set of presentation criteria;
detecting said message being viewed by a recipient of said target group;
adjusting said set of presentation criteria for said time-to-live pattern for said message for said target group in response to said recipient of said target group viewing said message;
determining if said adjusted time-to-live pattern has underachieved within a threshold period of time, wherein said threshold period of time is an amount of time to accomplish requirements of said set of presentation criteria, wherein said underachievement comprises not meeting said requirements of said set of presentation criteria; and
performing an action to increase priority of said message for said target group in response to detecting said underachievement of said time-to-live pattern within said threshold period of time.

US Pat. No. 10,171,319

TECHNOLOGIES FOR ANNOTATING PROCESS AND USER INFORMATION FOR NETWORK FLOWS

CISCO TECHNOLOGY, INC., ...

9. A system comprising:a processor;
a virtual machine, the virtual machine having a first capturing agent, wherein the first capturing agent is configured to:
monitor a first network flow associated with the virtual machine:
generate a first control flow based on the first network flow, the first control flow comprising first metadata describing the first network flow;
label the first control flow with a first identifier of a first process executing on the virtual machine and being associated with the first network flow to yield a first labeled control flow; and
transmit the first labeled control flow to a collector via the network; and a hypervisor hosting the virtual machine using one or more hardware resources including a processor, the hypervisor having a second capturing agent, wherein the second capturing agent is configured to use the one or more hardware resources to:
monitor a second network flow associated with the hypervisor, the second network flow comprising the first labeled control flow;
generate a second control flow based on the second network flow, the second control flow comprising second metadata describing the second network flow;
label the second control flow with a second identifier of a second process executing on the hypervisor and being associated with the second network flow to yield a second labeled control flow; and
transmit the second labeled control flow to the collector via, the network.

US Pat. No. 10,171,318

SYSTEM AND METHOD OF IDENTIFYING INTERNET-FACING ASSETS

RiskIQ, Inc., San Franci...

1. A method comprising:receiving a seed at a computing device, wherein the seed includes an identification of a domain name system (DNS) name server, an identification of a whois contact, an autonomous system number (ASN), a domain name, a host name, an Internet Protocol (IP) address, or a combination thereof;
retrieving first data based on the seed, the first data indicating a plurality of first internet-facing assets, wherein the first data includes first DNS data retrieved from a DNS database based on the seed, first border gateway protocol (BGP) data retrieved from a BGP database based on the seed, first whois data retrieved from a whois database based on the seed, or a combination thereof;
retrieving second data based on at least one of the first plurality of internet-facing assets, the second data indicating a plurality of second internet-facing assets, wherein the second data includes second DNS data retrieved from the DNS database based on at least one of the plurality of first internet-facing assets, second BGP data retrieved from the BGP database based on the at least one first internet-facing asset, second whois data retrieved from the whois database based on the at least one first internet-facing asset, or a combination thereof;
generating a graphical user interface (GUI) that includes a list of internet-facing assets related to the seed, wherein the list identifies differences between the plurality of first internet-facing assets and the plurality of second internet-facing assets; and
accessing, by the computing device via one or more proxy servers, at least one internet-facing asset of the plurality of first internet-facing assets or the plurality of second internet-facing assets.

US Pat. No. 10,171,317

MANAGEMENT SERVER FOR REMOTE MONITORING SYSTEM

Yanmar Co., Ltd., Osaka-...

1. A remote monitoring system for monitoring a mobile work vehicle or vessel, the mobile work vehicle or vessel having a remote monitoring terminal device mounted thereon, the remote monitoring system comprising:a management server for communicating with the remote monitoring terminal device, the management server configured to have:
a control section configured to process information; the control section having a storage section configured to store the information processed by the control section; and a communication section configured to communicate with the remote monitoring terminal device, wherein, the communication section receives:
a startup date and time of the remote monitoring terminal device from the remote monitoring terminal device when the remote monitoring terminal device is started up; and
a shutdown date and time of the remote monitoring terminal device, and minimum values, maximum values, and average values of data detected by the remote monitoring terminal device during an operation of the mobile work vehicle or vessel, and occurrence counts and durations of predetermined events from the remote monitoring terminal device when the remote monitoring terminal device is shut down,
wherein the control section distinguishes, by a daily report in a unit of an operation day for at least one operation time period from a startup to shutdown, the startup date and time, the shutdown date and time, the minimum values, the maximum values, the average values, and the occurrence counts and the durations of the predetermined events, which are received by the communication section, and the control section stores the received and distinguished information in the storage section in a unit of terminal identification information of the remote monitoring terminal device,
wherein the control section causes a display screen of a display section to selectably display the at least one operation time period for which the mobile work vehicle or vessel is operated,
wherein, when one of the at least one operation time period is selected on the display screen, the control section reads, from the storage section, the minimum values, the maximum values, the average values, and the occurrence counts and the durations of the predetermined events, all of which correspond to the selected operation time period, out of the startup date and time, the shutdown date and time, the minimum values, the maximum values, the average values, and the occurrence counts and the durations of the predetermined events, which are stored in the storage section in a unit of the terminal identification information, and causes another display screen of the display section to display together with the startup date and time and the shutdown date and time, the minimum values, the maximum values, the average values, and the occurrence counts and the durations of the predetermined events, which are read from the storage section, and
the work vehicle or vessel includes at least one work section and the remote monitoring terminal device further includes a power supply control section and multiple types of connection terminals connected to output elements at which data on an operation state is supplied external to the remote monitoring terminal device to various electronic control devices to control multiple operating states of multiple work sections,
wherein the at least one work section includes a startup switch SW and a battery BT,
wherein the power supply control section has a timer function and is connected to the battery BT via a power supply connecting line Lbt to periodically start up a power supply, no matter whether the startup switch SW is being turned off or on, and
wherein the power supply control section periodically starts up the power supply while the startup switch SW of the mobile work vehicle or vessel is being turned off, such that the power supply control section in the remote monitoring terminal device is always fed with electric power from the battery BT, and that the power supply to the control section is not turned off by the power supply control section when the startup switch SW is turned off.

US Pat. No. 10,171,316

INTELLIGENTLY MANAGING PATTERN CONTENTS ACROSS MULTIPLE RACKS BASED ON WORKLOAD AND HUMAN INTERACTION USAGE PATTERNS

International Business Ma...

1. A computer program product for managing pattern contents across multiple racks, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for:monitoring workload usage of contents of a pattern in a pattern definition and in a deployed pattern, wherein said pattern is a model of a topology and application environment that encapsulates installation, configuration and management of middleware and applications that run on virtual machines in physical compute nodes in a domain of racks, wherein said pattern definition is said pattern defined by a user;
collecting workload usage characteristics of said contents of said pattern on a primary rack in said domain of racks based on said monitoring of said workload usage of said contents of said pattern in said pattern definition and in said deployed pattern;
ranking said contents of said pattern by analyzing said collected workload usage characteristics of said contents of said pattern on said primary rack in said domain of racks;
determining an order of said contents of said pattern to be updated in a batch mode operation across all racks in said domain of racks based on said ranking; and
performing said batch mode operation across all racks in said domain of racks based on said ranking.

US Pat. No. 10,171,315

ORCHESTRATION PROCESS TEMPLATE FOR GENERATION OF ORCHESTRATION PROCESS TO TOLERATE ERRORS

INTERNATIONAL BUSINESS MA...

1. A method to generate an executable orchestration process, the method comprising:querying a user to enter first computer code for activating a service;
querying the user to enter second computer code for undoing actions performed in the activating;
loading pre-defined third computer code for determining whether the activated service is a success or has an error, based on the service;
loading pre-defined fourth computer code for correcting the error;
generating an executable orchestration function from the first through fourth computer code; and
generating the orchestration process from the executable orchestration function.

US Pat. No. 10,171,314

METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS TO DERIVE QUALITY DATA FROM AN EVENTUALLY CONSISTENT SYSTEM

HERE Global B.V., Eindho...

1. A method for correcting data discrepancies in usage data for one or more communication devices, the method comprising:receiving, by an apparatus comprising a processor and a communication interface configured to communicate via at least one network, a consistency check from a network device indicating (a) a summary count and (b) a raw count, wherein (a) the summary count is obtained during a predetermined time period and specifies a number of items of data of a respective service utilized or provided, within a given time period, to the one or more communication devices of an entity and (b) the raw count is obtained during a predefined time window the expiration of which is subsequent to the predetermined time period, the raw count indicating a number of items of data of the respective service utilized or provided, within the same given time period, to the one or more communication devices;
determining, via the apparatus, whether a deviation between the summary count in relation to the raw count is less than or equal to a predetermined threshold;
responsive to determining that the deviation is less than or equal to the predetermined threshold, determining, by the apparatus, that the usage data for the one or more communication devices is of sufficient quality; and
responsive to determining that the deviation exceeds the predetermined threshold, determining, by the apparatus, that the usage data for the one or more communication devices is not of sufficient quality and generating, by the apparatus, a notification that is sent to the network device requesting recalculation of the summary count and recalculation of the raw count after the predetermined time period.

US Pat. No. 10,171,313

MANAGING WORKLOAD TO MEET EXECUTION CRITERION IN A HYBRID CLOUD ENVIRONMENT

International Business Ma...

1. A method for managing workload in a computing environment, comprising:monitoring execution behavior of a portion of a job that is executing on a second set of the computing resources, the job running on a first set of computing resources and a second set of computing resources, wherein the first set of computing resources are internal resources of an infrastructure and the second set of computing resources are external resources of the infrastructure, wherein the infrastructure running the job controls the first set of computing resources, but does not have control over the second set of computing resources, the internal resources of the infrastructure being operated solely for a first organization owning the infrastructure, and the external resources are owned by a second organization providing a service to the first organization, wherein the external resources are shared by a plurality of organizations;
comparing the execution behavior of a portion of the job that is running on the second set of the computing resources with target behavior for meeting at least one execution criterion;
responsive to determining that the portion of the job that is running on the second set of the computing resources which are the external resources provided as the service to the first organization, is performing below a level needed to meet the execution criterion, determining whether allocating a third set of computing resources of the internal resources of the infrastructure would improve overall performance of the job in meeting the execution criterion, the determining comprising at least monitoring a capacity of the first set of computing resources and determining whether the capacity of the first set of computing resources is under stress, and responsive to determining that the capacity of the first set of computing resources is under stress, determining that allocating a third set of computing resources of the internal resources of the infrastructure would improve overall performance of the job in meeting the execution criterion;
allocating at least one computing resource internal to the infrastructure in the third set of computing resources to the job responsive to determining that allocating a third set of computing resources internal to the infrastructure would improve overall performance of the job in meeting the execution criterion,
wherein historical behavior of the second set of computing resources that are external resources to the infrastructure are used to allocate internal computing resources that are internal to the infrastructure.

US Pat. No. 10,171,312

OPTIMIZING CLOUD SERVICE DELIVERY WITHIN A CLOUD COMPUTING ENVIRONMENT

International Business Ma...

1. A method for optimizing cloud service delivery within a cloud computing environment, the method comprising:receiving a cloud service request (CSR) from a cloud customer in the cloud computing environment, the cloud service request comprising at least one parameter of one or more existing cloud services accessed by the cloud customer that are provided by one or more existing cloud service providers;
monitoring the at least one parameter of the CSR in a cloud service registry, the cloud service registry comprising:
(i) a plurality of cloud services provided by a plurality of cloud service providers; and
(ii) one or more parameters corresponding to each cloud service of the plurality of cloud services;
based on said monitoring, determining a new cloud service provider having an improvement, related to the at least one monitored parameter, in comparison to the one or more existing cloud service providers, wherein the improvement includes a cost of X-n, wherein X represents the cost of the lowest-cost cloud service provider among the one or more existing cloud service providers, and wherein n represents a pre-determined minimum decrement amount;
determining (i) availability of the new cloud service provider, (ii) a cost of migrating the one or more existing cloud services to the new cloud service provider, and (iii) downtime of the cloud services accessed during said migration;
routing, to the cloud customer, (i) one or more details describing the new cloud service, (ii) the determined availability of the new cloud service provider, (iii) the determined cost of migrating the one or more existing cloud services to the new cloud service provider, (iv) the determined downtime of the cloud services accessed during said migration, and (v) a request for permission to migrate the one or more existing cloud services to the new cloud service provider; and
upon receipt of an affirmative response from the cloud customer to the request, migrating the one or more existing cloud services to the new cloud service provider within the cloud computing environment.

US Pat. No. 10,171,311

GENERATING SYNTHETIC DATA

INTERNATIONAL BUSINESS MA...

1. A method comprising:receiving a model of a dataset, wherein the received model of the dataset includes a tree structure comprising decision branches and leaf nodes;
extracting information from the received model by accessing metadata and a tree structure within the received model;
wherein the extracting information from the received model comprises extracting information on field names and types in the dataset, generating a probability of a record being assigned to each leaf in the tree in response to the number of training records assigned to each leaf and extracting constraints on predictor fields for records assigned to that leaf for each leaf node, and
wherein the extracting information from the received model comprises determining whether the tree structure is a classification tree, in response to the tree structure being a classification tree, determining conditional probabilities of each value of a target field for each leaf, and in response to the tree structure not being a classification tree, determining mean values of the target field for each leaf;
constructing a database view from the extracted information; receiving a query to the constructed database view; and
generating synthetic data from the constructed database view according to the received query, the generating includes generating a base common table expression that incorporates a number of records to be generated, generating a leaf common table expression that assigns each randomly generated record to a leaf node and generates random numbers for each field in a data dictionary; and generating a tree common table expression that assigns values to the predictor fields and target field of each synthetic record of the view, wherein all three common table expressions are generated from the accessed metadata and tree structure and are combined to define the view.

US Pat. No. 10,171,310

ENSURING REGULATORY COMPLIANCE DURING APPLICATION MIGRATION TO CLOUD-BASED CONTAINERS

International Business Ma...

1. A method of ensuring regulatory compliance during application migration to cloud-based containers, the method comprising:receiving, by one or more processors, a message directing an application to be migrated to a container cloud, wherein the container cloud is a cloud of servers and networks that support containers, wherein a container is a class of objects used to store objects following specific access rules;
in response to receiving the message directing the application to be migrated to the container cloud, matching, by one or more processors, the application to multiple containers described in a container registry, wherein each container is matched to a service that provides a server, and wherein the server hosts cloud-based containers whose logical behavior is defined by a set of values and a set of operations;
grouping, by one or more processors, lines of code from the application according to different regulations, wherein a first group of lines of code from the application is regulated by a first regulatory rule, and wherein a second group of lines of code from the application is regulated by a second regulatory rule;
identifying, by one or more processors, at least one regulatory rule as an identified at least one regulatory rule by which the server, the application, and requisite containers are governed;
detecting, by one or more processors, a change to at least one of the server, the application, and the requisite containers so that there is noncompliance with the identified at least one regulatory rule; and
in response to detecting the change, automatically recomposing a chain of compliance services using an artificial intelligence planning technology, wherein the chain of compliance services monitors compliance with the identified at least one regulatory rule by the server and the requisite containers.

US Pat. No. 10,171,309

TOPOLOGY SERVICE

EMC IP Holding Company LL...

1. A method of creating and using a topology database comprising:performing first processing that obtains first information describing a topology of resources of an infrastructure comprising racks, wherein said resources include network resources and other resources connected to the network resources, wherein the network resources include a plurality of switches, and the other resources include compute resources and storage resources connected to the network resources;
determining, using the first information, sets of the resources included in the racks, wherein each of the sets denotes a portion of the resources included in a different one of the racks, wherein each of the sets includes a pair of the plurality of switches, wherein the pair includes two switches that are leaf switches and each of the two switches of the pair is connected to the other switch of the pair;
populating the topology database with topology information including the first information and second information, wherein the second information identifies, for each of the racks, a different one of the sets denoting a portion of the resources included in said each rack; and
querying the topology database.

US Pat. No. 10,171,308

DYNAMIC CABLE-LINKAGE MANAGEMENT

International Business Ma...

1. A computer-implemented method of dynamic cable-linkage management for a shared pool of configurable computing resources having a set of cable-linkage topology data, the method comprising:sensing, by a first mapping engine which is coupled with a first service processor on a set of control nodes, a first connection between the first service processor and a plurality of compute nodes;
establishing, by the first mapping engine, a first node identifier on a first compute node;
establishing, by the first mapping engine, a second node identifier on a second compute node, wherein the set of cable-linkage topology data includes a first set of cable-link identifiers for the first compute node and a second set of cable-link identifiers for the second compute node;
determining, based on the plurality of node identifiers and the set of cable-linkage topology data, a first device path map includes:
mapping the first node identifier with the first set of cable-link identifiers, and
mapping the second node identifier with the second set of cable-link identifiers:
routing, using the first set of cable-link identifiers, a first subset of the set of data traffic between the first service processor and the first compute node;
routing, using the second set of cable-link identifiers, a second subset of the set of data traffic between the first service processor and the second compute node;
coupling, on the set of control nodes, a second service processor with a second mapping engine;
sensing, by the second mapping engine, a second connection between the second service processor and the plurality of compute nodes;
accessing, by the second mapping engine, the first node identifier on the first compute node and the second node identifier on the second compute node;
determining, based on the plurality of node identifiers and the set of cable-linkage topology data, a second device path map including:
mapping the first node identifier with the second set of cable-link identifiers, and
mapping the second node identifier with the first set of cable-link identifiers;
routing, using the second set of cable-link identifiers, the first subset of the set of data traffic between the second service processor and the first compute node; and
routing, using the first set of cable-link identifiers, the second subset of the set of data traffic between the second service processor and the second compute node.

US Pat. No. 10,171,307

NETWORK MODALITY REDUCTION

International Business Ma...

1. A method for processing a multi-modal network to reduce modality, the method comprising:determining, by one or more computer processors, a plurality of entities connected by a plurality of links within a multi-modal network;
assigning, by the one or more processors, a weighted value to each of the plurality of links connecting the plurality of entities;
converting, by the one or more computer processors, the multi-modal network into a modelled network based, at least in part, on the weighted value assigned to each of the plurality of links;
eliminating, by the one or more computer processors, one or more of the plurality of entities not designated as an entity of interest from the modelled network; and
converting, by the one or more computer processors, the modelled network into a uni-modal network, where the uni-modal network contains a plurality of nodes designated as entities of interest connected by a plurality of resistors designated as simplified weighted links between the entities of interest, where each of the plurality of resistors has an associated resistance representative of a strength of connection between each of the plurality of nodes, with a greater resistance indicating a weaker connection as a resistance between each of the plurality of nodes is an inverse of the weighted value assigned to each of the plurality of entities connected by each of the plurality of links replaced by the plurality of nodes and associated resistance.

US Pat. No. 10,171,306

AUTOMATIC DISCOVERY AND PROVISIONING OF MULTI-CHASSIS ETHERCHANNEL PEERS

Cisco Technology, Inc., ...

1. A method comprising:detecting, by a first fabric edge node, a presence of a Link Aggregation Control Protocol (LACP) system on a first fabric network, wherein the first fabric edge node and a second fabric edge node are not connected via a direct Layer-2 peering link;
registering, by the first fabric edge node in response to detecting the presence of the LACP system, a LACP system identifier comprising a key associated with the detected LACP system into a host tracking database, wherein the LACP system identifier is registered in conjunction with a unique fabric address associated with the first fabric edge node;
querying, by the first fabric edge node in response to detecting the presence of the LACP system, the host tracking database;
determining, by the first fabric edge node in response to querying the host tracking database, that the second fabric edge node is registered in the host tracking database as being associated with the detected LACP system; and
initiating, by the first fabric edge node in response to determining that the second fabric edge node is registered in the host tracking database, peering over the first fabric network via a fabric Layer-2 service using a multi-chassis ether-channel (MCEC) between the first fabric edge node and the second fabric edge node.

US Pat. No. 10,171,305

PROFILE GENERATION FOR BANDWIDTH MANAGEMENT

SONY INTERACTIVE ENTERTAI...

1. A method for profile generation for bandwidth management, the method comprising:executing instructions stored in memory, wherein execution of the instructions by a processor:
evaluates bandwidth requirements for streaming a new resource throughout a time period of usage associated with the new resource, and
constructs a profile for the new resource, wherein the profile tracks fluctuations in bandwidth consumption throughout the entire time period of usage, wherein the time period of usage is divided into predetermined chunks of time, and wherein play of the new resource at each chunk of time is associated with an amount of bandwidth consumption;
receiving a request from a user device regarding access to the new resource, wherein the user device is on a network with a plurality of other user devices that each plays a resource that respectively consumes bandwidth available on the network; and
providing the requested resource and the constructed profile to the user device, wherein the constructed profile is used to predict in real-time when a total bandwidth consumption by the user device and by the other user devices on the network exceeds the available bandwidth, and wherein the available bandwidth is allocated among the user device and the other user devices based on a prioritization scheme in which at least one of the user devices is instructed to build a buffer when the available bandwidth is predicted to be exceeded.

US Pat. No. 10,171,304

NETWORK POLICY CONFIGURATION

BlackBerry Limited, Wate...

1. A method comprising:as part of a configuration process of a wireless device by a configurator device:
receiving, by the configurator device from the wireless device, a configuration request including a configuration attribute of the wireless device;
mapping, by the configurator device using a first mapping comprising information that maps between configuration attributes and respective credential attributes, the configuration attribute in the configuration request received from the wireless device to a corresponding credential attribute, the corresponding credential attribute to be mapped to a corresponding network policy; and
sending, by the configurator device, a configuration response including the corresponding credential attribute to the wireless device, the corresponding credential attribute useable by the wireless device to access an access point (AP); and
as part of a configuration process of the AP by the configurator device:
sending, by the configurator device to the AP, a second mapping comprising a mapping table including information that maps between credential attributes and respective network policies, for use by the AP in obtaining, responsive to the corresponding credential attribute received by the AP from the wireless device, the corresponding network policy to apply to a communication of the wireless device.

US Pat. No. 10,171,303

IP-BASED INTERCONNECTION OF SWITCHES WITH A LOGICAL CHASSIS

AVAGO TECHNOLOGIES INTERN...

1. A switch, comprising:one or more ports;
chassis management circuitry configured to assign a virtual Internet Protocol (IP) address to the switch, wherein the virtual IP address is associated with a logical unit comprising the switch and a second switch in a network of interconnected switches, wherein the network of interconnected switches further includes a third switch and is identified by a fabric identifier distinct from the virtual IP address, and wherein the fabric identifier is assigned to a respective switch of the network of interconnected switches; and
tunnel circuitry configured to:
encapsulate a packet with a tunnel header associated with a tunnel between the logical unit and the third switch, wherein the tunnel header includes the virtual IP address as a source address and a second IP address of the third switch as a destination address; and
determine a port from the one or more ports as an egress port for the encapsulated packet based on the second IP address.

US Pat. No. 10,171,302

NETWORK CONFIGURATION HEALTH CHECK IN VIRTUALIZED COMPUTING ENVIRONMENT

NICIRA, INC., Palo Alto,...

1. A method for a host to perform network configuration health check in a virtualized computing environment, wherein the host includes multiple network interface controllers (NICs), the method comprising:selecting, from the multiple NICs, a source NIC and one or more destination NICs;
based on a first network configuration of the host, generating one or more unicast probe packets that are addressed from the source NIC to the respective one or more destination NICs;
sending the one or more unicast probe packets to the respective one or more destination NICs from the source NIC via a physical switch connected to the host;
determining whether there is a match between the first network configuration of the host and a second network configuration of the physical switch based on whether the respective one or more destination NICs received the one or more unicast probe packets from the physical switch; and
generating a result of the network configuration health check based on the determining whether there is a match between the first network configuration of the host and the second network configuration of the physical switch.

US Pat. No. 10,171,301

IDENTIFYING HARDCODED IP ADDRESSES

International Business Ma...

1. A computerized network-migration system component of a network-management system comprising a processor, a memory coupled to the processor, a computer-readable hardware storage device coupled to the processor, and an interface to the network-management system, wherein the network-management system identifies network-configuration information that describes at least one component of a computer network to be migrated, wherein the interface allows the network-migration system to interactively access the network-configuration information, and wherein the storage device contains program code configured to be run by the processor via the memory to implement a method for identifying hardcoded IP addresses, the method comprising:the network-migration system requesting a latest version of the network-configuration information;
the network-migration system receiving, in response to the requesting, a subset of the requested network-configuration information; and
the network-migration system choosing, as a function of a way in which an Internet Protocol address of a component of the computer network to be migrated is characterized in the received network-configuration information, where the received network-configuration information does not comprise source code of a software application, a method of identifying whether the Internet Protocol address is hardcoded,
where the method is selected from the group consisting of:
a network-view method that determines whether a received DNS list comprises a first network address identified by a received server-affinity listing
a server-based method that determines whether a received list of ARP address lookups identifies a first network address, and
a trace-log method that determines whether a received TCP trace log identifies a first network address but does not associate a hostname with the first network address.

US Pat. No. 10,171,300

AUTOMATIC REDISTRIBUTION OF VIRTUAL MACHINES AS A GROWING NEURAL GAS

International Business Ma...

1. A cloud-provisioning system comprising a processor, a memory coupled to the processor, a computer-readable hardware storage device coupled to the processor, a network monitor, and an interface to a network-administration mechanism, the storage device containing program code configured to be run by the processor via the memory to implement a method for automatic reprovisioning of virtual infrastructure components of a virtual network, the method comprising:the cloud-provisioning system selecting a set of network parameters, wherein each parameter of the set of network parameters identifies one or more performance characteristics of the virtual network;
the cloud-provisioning system representing a current topology of the virtual network as a graph, wherein the graph represents a component of the virtual network as a node and a connection between two components of the virtual network as an edge connecting two nodes that represent the two components;
the cloud-provisioning system receiving via the network monitor information that identifies a set of network-utilization figures, wherein each figure of the set of network-utilization figures identifies an amount of network resources used by one component of the set of virtual components;
the cloud-provisioning system associating a weighting with each parameter of the set of network parameters as a function of the received network-utilization figures, wherein the associating comprises:
the cloud-provisioning system launching a growing neural gas algorithm in order to generate a new topology of the virtual network, wherein the new topology identifies a new set of connections between pairs of virtual infrastructure components of the set of virtual components and wherein the new topology provides optimized bandwidth utilization; and
the cloud-provisioning system optimizing the virtual network by provisioning and reprovisioning the pairs of virtual infrastructure components of the virtual network, as a function of the weighted parameters and the current utilization information, such that the virtual infrastructure components conform to the new topology.

US Pat. No. 10,171,299

METHOD AND APPARATUS FOR CONFIGURING PROXY SERVER

TENCENT TECHNOLOGY (SHENZ...

1. A method for configuring a proxy server, the method comprising:establishing, by a computing device, a first speed performance indicator and a second speed performance indicator, the first speed performance indicator configured for indicating a minimum threshold speed of the proxy server, and the second speed performance indicator configured for determining whether the proxy server reaches a predefined standard speed; and
selecting, by the computing device, at least one proxy server from multiple candidate proxy servers according to the first speed performance indicator and/or the second speed performance indicator; and
configuring, by the computing device, the selected proxy server as a currently used proxy server;
wherein the selecting at least one proxy server from the multiple candidate proxy servers according to the first speed performance indicator and/or the second speed performance indicator comprises:
obtaining, by the computing device, performance parameters of each proxy server, and calculating access speed of each proxy server;
comparing, by the computing device, the access speed of each proxy server with the first speed performance indicator to obtain proxy servers each of which is configured with a speed equal to or higher than the minimum threshold speed;
comparing, by the computing device, the access speeds of the proxy servers equal to or higher than the minimum threshold speed with the second speed performance indicator to obtain proxy servers each of which is configured with a speed equal to or higher than the standard speed; and
comparing, by the computing device, the performance of the obtained proxy servers after comparisons, and selecting at least one proxy server with the best speed performance;
wherein before the selecting at least one proxy server from the multiple candidate proxy servers, the method further comprises:
prompting, by the computing device, a user whether to reconfigure the proxy server;
wherein the selecting at least one proxy server from the multiple candidate proxy servers comprises:
when receiving an instruction indicating that the user allows reconfiguring the proxy server, selecting, by the computing device, at least one proxy server from the multiple candidate proxy servers;
wherein:
the performance parameters of each proxy server comprises duration required for returning data of a predefined or pre-stored website by the proxy server, and the access speed of the proxy server is the duration required for returning the data of a commonly visited website by the proxy server; or
the performance parameters of each proxy server comprises duration required for returning data of a predefined or pre-stored website by the proxy server, a Time value and a Time To Live (TTL) value, and the access speed of the proxy server is a sum of the Time value, the TTL value and the duration required for returning the data of the predefined or pre-stored website by the proxy server;
wherein the comparing the performance of the proxy servers reaching the standard speed and selecting at least one proxy server with the best speed performance comprises:
comparing, by the computing device, the access speeds of the proxy servers, and selecting at least one proxy server with the lowest access speed;
wherein the comparing the performance of the proxy servers reaching the standard speed and selecting at least one proxy server with the best speed performance further comprises:
if the number of the proxy servers with the lowest access speed is greater than 1, comparing, by the computing device, the number of jump times of parsing Domain Name Service (DNS) for the predefined or pre-stored website by one proxy server with the number of jump times of parsing the DNS for the predefined or pre-stored website by another proxy server, and selecting at least one proxy server with the minimum number of jump times.

US Pat. No. 10,171,298

MANAGEMENT CENTER FOR COMMUNICATION SYSTEM CUSTOMER PREMISES EQUIPMENT

1. A Digital Subscriber Line (DSL) customer premises equipment (CPE) Management Center (CMC) coupled to a Broadband network, the CMC comprising:a data collection module, communicatively coupled to at least one DSL CPE device, to receive information from the CPE device regarding operation of the at least one DSL CPE device, wherein the information is to be received on a: periodic basis, on-demand basis, or in real-time basis;
an analysis module coupled to the data collection module to analyze the received information, wherein the CMC is to determine one or more line parameter values associated with a central office imposed (CO-imposed) line constraint, and wherein the analysis module is to determine to what extent range of the one or more parameter values can be changed within the CO-imposed line constraints; and
a command signal generation module coupled to the analysis module to receive analysis results and to generate a corresponding command signal for transmission to the at least one DSL CPE device to modify the at least one DSL CPE device operation within the CO-imposed line constraints based on the analysis, wherein the CMC is able to modify an operation of the at least one DSL CPE device independent of management on a CO side of the Broadband network, and wherein the CMC is capable to be afforded for collecting operational data without control over operation of a digital subscriber line access multiplexer (DSLAM) coupled to the at least one DSL CPE device.

US Pat. No. 10,171,297

MULTIVARIABLE CONTROLLER FOR COORDINATED CONTROL OF COMPUTING DEVICES AND BUILDING INFRASTRUCTURE IN DATA CENTERS OR OTHER LOCATIONS

Honeywell International I...

1. A method for controlling operation of computing devices comprising:obtaining first information associated with control of multiple computing devices, the first information related to possible changes to processing tasks performed by the computing devices wherein the first information includes one or more of:
information identifying which computing devices are available to enter a standby mode of operation,
information identifying how much computing power is available; and
information identifying priorities and constraints on where and when the processing tasks are to be executed by the computing devices;
obtaining second information associated with building infrastructure operations performed by one or more building systems of one or more buildings that house the computing devices wherein the second information includes one or more of:
information identifying thermal loads placed on different thermal management or cooling systems associated with the computing devices,
information identifying heating, ventilation, and air conditioning (HVAC) loads for different areas of the one or more buildings, and
information identifying power loads of the computing devices or of different groups of computing devices;
generating a control solution using economic optimization including one or more steps, the steps comprising:
solving the control solution while minimizing energy consumption, moving processing loads away from computing devices that are near, at, or over some constraint or balancing processing loads among a group of computing devices, and
limiting usage of computing devices to particular customers or data subject to export restrictions,
identifying by the coordinating controller, using the generated control solution, one or more changes to one or more of the computing devices using the first and second information; and
outputting third information to a second controller identifying the one or more changes for generating control signals for altering operation of various computing devices.

US Pat. No. 10,171,295

DISTRIBUTED REMOTE EXECUTION

Red Hat, Inc., Raleigh, ...

1. A method comprising:receiving from a client machine, by a processing device of a server, a remote execution request that specifies a first remote execution tool, a second remote execution tool, and execution data that pertains to the first remote execution tool and the second remote execution tool and that comprises a query to select two or more of the plurality of host machines;
selecting, by the processing device, a first host machine and a second host machine from a plurality of host machines in view of a result of the query, the first remote execution tool, and the second remote execution tool;
generating, by the processing device, a script in view of the execution data and first metadata describing one or more components of the plurality of host machines;
selecting by the processing device, in view of the first host machine and the second host machine, a plurality of execution proxy machines;
generating by the processing device, in view of the script, a first template associated with the first remote execution tool and a second template associated with the second remote execution tool;
transmitting the first template to a first execution proxy machine of the plurality of execution proxy machines, and the second template to a second execution proxy machine of the plurality of execution proxy machines;
receiving by the server, from the first execution proxy machine, a first output of a remote execution of the first template by the first host machine;
receiving by the server, from the second execution proxy machine, a second output of a remote execution of the second template by the second host machine; and
transmitting, by the server, the first output and the second output to the client machine.

US Pat. No. 10,171,294

INFORMATION PROCESSING DEVICE AND SYSTEM DESIGN SUPPORT METHOD

NEC CORPORATION, Tokyo (...

1. An information processing device comprising:a memory storing instructions; and
one or more processors configured to execute the instructions to:
generate a computer communication requirement, based on a software communication requirement and identifiers of computers in which software components in a system are to be deployed in an environment, the software communication requirement indicating a connection between software components to be connected among the software components in the system and characteristics conditions of the connection between the software components to be connected, the computer communication requirement indicating a connection between computers to be connected among the computers in the environment and characteristics conditions of the connection between the computers to be connected, and generate a network requirement, based on the computer communication requirement, the network requirement indicating a connection to be provided by a network in the environment and characteristics conditions of the connection to be provided by the network; and
generate a network setting, a computer communication setting, and a software communication setting, based on the network requirement, the computer communication requirement, and the software communication requirement, respectively, the network setting indicating information for configuring the connection to be provided by the network, the computer communication setting indicating information for configuring the computers to be connected with respect to the connection between the computers to be connected, and the software communication setting indicating information for configuring the software components to be connected with respect to the connection between the software components to be connected.

US Pat. No. 10,171,293

INITIALIZING, PROVISIONING, AND MANAGING DEVICES

Comcast Cable Communicati...

1. A method comprising:receiving, from a network server, and processing, by a first device, a modem configuration file specifying a network address type corresponding to a first protocol of a plurality of protocols; and
sending, from the first device to a second device, a message instructing the second device to use the network address type corresponding to the first protocol when requesting, from the network server, a network address for the second device.

US Pat. No. 10,171,292

DEPLOYING A CLOUD INFRASTRUCTURE IN A REMOTE SITE

Amazon Technologies, Inc....

1. A method for deploying a cloud infrastructure, the method comprising:obtaining a specification of one or more network resources in a new region of a service provider, wherein the specification comprises at least one of the following: a number of servers to operate within the new region or information identifying one or more services to be performed by the one or more network resources in the new region;
configuring, based on the specification, a virtual private cloud (VPC) within an existing region of the service provider with a plurality of core configuration services;
establishing a network connection between the VPC and the new region;
configuring, over the established connection, the one or more network resources in the new region as a network infrastructure, wherein the network infrastructure includes a number and type of network switches, using at least one of the plurality of core configuration services;
using the plurality of core configuration services, configuring the one or more network resources, including the network switches, in the network infrastructure to run at least one compute service;
transferring the plurality of core configuration services to the one or more network resources in the new region; and
disconnecting the new region from the VPC.

US Pat. No. 10,171,291

TENANT-SPECIFIC LOG FOR EVENTS RELATED TO A CLOUD-BASED SERVICE

International Business Ma...

1. A method to establish and utilize a tenant-specific log for events related to a cloud-based service, the method comprising:creating, by one or more processors, a metamodel for a cloud-based service running on a cloud, wherein the cloud-based service is provided to a specific tenant of the cloud, and wherein the metamodel describes types of resources, on the cloud, that are providing the cloud-based service for the specific tenant and that the specific tenant desires to monitor;
appending, by one or more processors, the metamodel to the cloud-based service;
in response to the cloud-based service being executed for the specific tenant of the cloud, applying, by one or more processors, the metamodel to identify a set of resources, on the cloud, that are providing the cloud-based service for the specific tenant;
issuing, by one or more processors, instructions to establish a tenant-specific log for events related to the cloud-based service, wherein the tenant-specific log tracks events that occur on each actual resource from the set of resources, on the cloud, that are providing the cloud-based service to the specific tenant, and wherein the tenant-specific log identifies a specific unit of hardware being used to provide the cloud-based service to the specific tenant; and
in response to the tenant-specific log recording access to the specific unit of hardware by a predefined party, transferring, by one or more processors, all operations related to the cloud-based service from the specific unit of hardware to another unit of hardware, wherein the predefined party is an authorized user of the specific unit of hardware, and wherein said another unit of hardware is a local device that is available only to the specific tenant.

US Pat. No. 10,171,290

SYSTEMS AND METHODS FOR REAL-TIME CORRECTION OF CORE APPLICATIONS

Sprint Communications Com...

1. A method for correcting connectivity failures of core applications on a user equipment (UE), the method comprising:detecting, via execution of a client on a processor of the UE, a plurality of request-reply message sequences between a core application of a plurality of core applications and a corresponding server;
learning, by execution of the client, a set of reply messages within the plurality of request-reply message sequences that are coming from the corresponding server and not producing a connection error with the corresponding server;
based on the set of reply messages, creating, by execution of a ghost client on the processor of the UE, a series of ghost replies that each mimics a reply that is one of the set of learned reply messages coming from the corresponding server;
retaining, by execution of the client within a memory of the UE, the series of ghost replies;
subsequent to retaining the series of ghost replies, detecting, by the client, that the core application has exceeded a threshold number of request messages that are unanswered by the corresponding server due to a lack of reply by the corresponding server; and
based on the detecting, feeding, by execution of the client, a ghost reply from the retained series to the core application.

US Pat. No. 10,171,289

EVENT AND ALERT ANALYSIS IN A DISTRIBUTED PROCESSING SYSTEM

International Business Ma...

1. A method of event and alert analysis in a distributed processing system, the distributed processing system including a local event analyzer embedded in an alert analyzer, the method comprising:receiving, by the local event analyzer embedded in the alert analyzer, events from an event queue;
creating, based on the received events and local event analysis rules specific to the alert analyzer, by the local event analyzer, a temporary alert for the alert analyzer, wherein the temporary alert is an alert that is visible to one or more specific alert analyzers including the alert analyzer;
receiving, by the alert analyzer, alerts created by a plurality of event analyzers, wherein each event analyzer of the plurality of event analyzers is configured to create the alerts by processing the events from the event queue according to each event analyzer's own event analysis rules; and
analyzing, by the alert analyzer, based on alert analysis rules, the temporary alert and the alerts created by the plurality of event analyzers.

US Pat. No. 10,171,288

DIAGNOSING FAULTS IN STATELESS DISTRIBUTED COMPUTING PLATFORMS

International Business Ma...

1. A computer-implemented method, comprising:processing a plurality of communication messages exchanged between two or more distributed components within a stateless distributed system, wherein the plurality of communication messages comprises (i) one or more representational state transfer messages and (ii) one or more remote procedure call messages;
determining a message context for each of the plurality of communication messages based on one or more message identifiers extracted from each of the plurality of communication messages;
grouping the plurality of communication messages into multiple clusters pertaining to message invocation, wherein said grouping is based on the determined message context for each of the plurality of communication messages;
generating a control flow graph by creating one or more connections across the multiple clusters; and
detecting a causal chain of events associated with a detected fault in the stateless distributed system by navigating the control flow graph;
wherein the steps are carried out by at least one computing device.

US Pat. No. 10,171,287

MULTI-USER ANALYTICAL SYSTEM AND CORRESPONDING DEVICE AND METHOD

INTERNATIONAL BUSINESS MA...

1. A method for isolating users on a multi-user computer system, the method comprising:intercepting a request of a user;
determining whether the request is for a core object in a group that is one of an analytical job, a scoring job, user data, an analytical stream, a predictive model, a configuration for the analytical job, and a configuration for the scoring job, the group consisting of: an analytical job, a scoring job, user data, an analytical stream, a predictive model, a configuration for the analytical job, and a configuration for the scoring job;
upon determining that the request is for the core object,
attaching a user context of the user to the request, the user context comprising a user identifier of the user and metadata of the user;
determining an isolation type of the core object using configuration information of an isolation policy in the metadata;
routing the request to a storage device identified within the metadata and invoking an Application Programming Interface (API) to process the request, if the isolation type indicates a shared database is to be used and different users are to be distinguished from one another; and
managing a first core object specific to the user, if the isolation type indicates the shared database is to be used and different users are not to be distinguished from one another; and
abandoning the request upon determining that the request is not for the core object.

US Pat. No. 10,171,286

METHOD AND APPARATUS FOR ACCESSING SERVICES AFFILIATED WITH A DISCOVERED SERVICE PROVIDER

IOT HOLDINGS, INC., Wilm...

1. A method of accessing services affiliated with a service provider, the method comprising:an issuer performing a first discovery procedure to discover at least one service provider, wherein the first discovery procedure includes the issuer sending a service provider discovery request including a machine-to-machine (M2M) service class parameter, and the issuer receiving a service provider discovery response;
the issuer performing a bootstrap procedure with the at least one discovered service provider; and
the issuer performing a second discovery procedure to determine available service capability layers (SCLs) supported by the at least one discovered service provider, wherein the second discovery procedure comprises:
transmitting a domain name system-based service discovery (DNS-SD) query from the issuer to a DNS-SD M2M service discovery function (MSDF) server, wherein the DNS-SD MSDF server is provisioned with SCL discovery records and wherein the DNS-SD MSDF server is registered with a public DNS registrar entity, and wherein the SCL discovery records include, for each SCL, a type of M2M service capabilities supported by each SCL and a class of M2M services supported by each SCL; and
the issuer receiving SCL discovery records from the DNS-SD MSDF server in response to the DNS-SD query.

US Pat. No. 10,171,285

PROACTIVE M2M FRAMEWORK USING DEVICE-LEVEL VCARD FOR INVENTORY, IDENTITY, AND NETWORK MANAGEMENT

Cisco Technology, Inc., ...

1. A method comprising:receiving, by a centralized server corresponding to a network management system, device attributes for a newly connected network device;
using, by the centralized server, the device attributes to identify the newly connected network device;
adding, by the centralized server, the newly connected network device to a device directory at the centralized server comprising a listing of network devices registered to the network management system, wherein the network management system is configured to cause an existing network device to forward, over a peer-to-peer network connection to the newly connected network device, location information for the network management system designated to receive the device attributes, and wherein the newly connected network device, after receiving the location information and additional information, is enabled to generate and send the device attributes comprising an identity and asset data; and
notifying, by the centralized server, that the newly connected network device has been added;
wherein receiving the device attributes comprises receiving, from the network device, a vCard generated by the newly connected network device, the vCard comprising the device attributes necessary for at least one of the following:
identifying the newly connected network device,
registering the newly connected network device,
adding the newly connected network device to the device directory, and
managing the newly connected network device.

US Pat. No. 10,171,284

REACHABILITY-BASED COORDINATION FOR CYCLIC DATAFLOW

Microsoft Technology Lice...

1. A computer-readable storage medium storing computer-executable instructions that, when executed by a processor, configure the processor to perform operations comprising:scheduling a plurality of threads to operate independently on a plurality of partitions of data, wherein the plurality of threads includes a first thread and a second thread, and wherein the plurality of partitions includes a first partition and a second partition;
beginning a first operation on the first partition by the first thread;
beginning the first operation on the second partition by the second thread;
tracking progress of the first operation by the first thread using a replicated data structure;
tracking progress of the first operation by the second thread using the replicated data structure;
for a record on which the first operation is to be performed, adding an entry to the replicated data structure, wherein the entry includes a timestamp, and wherein the timestamp indicates an epoch and an iteration at which the record was produced;
determining a number of yet-to-be-processed records for a selected entry of the replicated data structure, wherein the selected entry has a most recent timestamp for the first thread; and
in response to the number of yet-to-be-processed records for the selected entry being zero, terminating the first thread.

US Pat. No. 10,171,283

GLOBAL PRODUCTION RULES FOR DISTRIBUTED DATA

International Business Ma...

1. A method of running a global production rule on data distributed over a plurality of machines, comprising:receiving a local production rule that can run on each of the plurality of machines to jointly accomplish a global computation specified in a global production rule;
deploying the local production rule to each of the plurality of machines, said each of the plurality of machines storing a portion of the data and running an instance of a rules engine that can run the local rule;
allowing communicating between the plurality of machines, intermediate data produced by the instance of the rules engine running the local production rule on said each of the machines; and
allowing coordinating between the plurality of machines to synchronize one or more local computations performed locally according to the local production rule on said each machine,
wherein the global production rule is automatically translated into the local production rule,
wherein to translate the global production rule automatically translated into the local production rule, the global production rule is automatically translated into an intermediate language, the intermediate language is automatically transformed to add one or more explicit communication points, and the intermediate language is automatically translated to the local production rule.

US Pat. No. 10,171,282

DYNAMIC OPTIMIZATION OF AMPLITUDE WEIGHTS

Sprint Communications Com...

1. A method for dynamic optimization of amplitude weights, the method comprising:receiving user data from a set of user devices, wherein the user data comprises reference signal received power (RSRP) data;
identifying antenna gain data;
based on the RSRP data and the antenna gain data, generating insertion loss data;
determining the insertion loss data is above a predetermined threshold;
in response to determining that the insertion loss data is above the predetermined threshold,
receiving current radio settings, wherein the current radio settings comprise a set of current amplitude values,
based on the current radio settings, generating a new set of amplitude values,
transmitting a signal to apply the new set of amplitude values.

US Pat. No. 10,171,281

4-LEVEL PULSE AMPLITUDE MODULATION TRANSMITTER ARCHITECTURES UTILIZING QUADRATURE CLOCK PHASES

International Business Ma...

1. A four-level pulse amplitude modulation transmitter, comprising:a first processing section including:
a first set of three pairs of retiming latches and a single retiming latch, wherein each pair comprises a first retiming latch and a second retiming latch connected in series between a different one of four parallel data inputs and a first serializer, and the single retiming latch is connected between a remaining one of the four parallel data inputs and the first serializer for equally distributing a timing margin for all quarter-rates of a quarter-rate four-phase quadrature clock, wherein the one phase of the quarter-rate four-phase quadrature clock triggers all of the first retiming latches in each or the three pairs and the single retiming latch, and the remaining three phases of the quarter-rate four-phase quadrature clock triggers a respective one of the second retiming latch in each of the three pairs of retiming latches in sequence.

US Pat. No. 10,171,280

DOUBLE-SIDEBAND COFDM SIGNAL RECEIVERS THAT DEMODULATE UNFOLDED FREQUENCY SPECTRUM

1. Receiver apparatus for double-sideband coded orthogonal frequency-division modulation (COFDM) radio-frequency signals, said receiver apparatus comprising:means for selectively receiving a double-sideband coded orthogonal frequency-division modulation (DSB-COFDM) radio-frequency signal;
means for developing a first set of QAM symbols descriptive of the discrete Fourier transform of COFDM carriers from the upper sideband of the selectively received DSB-COFDM radio-frequency signal;
means for developing a second set of QAM symbols descriptive of the discrete Fourier transform of COFDM carriers from the lower sideband of the selectively received DSB-COFDM radio-frequency signal;
means for serially arranging said first set of QAM symbols in each COFDM symbol according to ascending spectral order of COFDM carriers in said upper sideband of said selectively received double-sideband coded orthogonal frequency-division modulation radio-frequency signal;
means for serially arranging said second set of QAM symbols in each COFDM symbol according to descending spectral order of COFDM carriers in said lower sideband of said selectively received DSB-COFDM radio-frequency signal;
means for demapping said first set of QAM symbols as thus serially arranged to recover a first succession of QAM symbol map labels in soft-bit format and for demapping said second set of QAM symbols as thus serially arranged to recover a second succession of QAM symbol map labels in soft-bit format; and
a diversity combiner of soft bits of corresponding QAM symbol map labels in said first and second successions thereof, thereby to reproduce soft bits of coded data.

US Pat. No. 10,171,279

TRANSMITTER AND RECEIVER

Mitsubishi Electric Corpo...

1. A transmitter comprising:processing circuitry:
to determine a null symbol arrangement pattern in a two-dimensional space by arranging one of at least two different unit patterns in each of parts of the two-dimensional space and combining the at least two different unit patterns determining positions of data symbols and null symbols, the two-dimensional space being divided into the parts each having a size of the unit pattern, the two-dimensional space being defined by a plurality of subcarriers for use in multicarrier transmission and a time series represented in units of time determined in accordance with a single symbol, wherein the unit pattern is a combination of a plurality symbols defined having a dimensional size defined by a number of rows and columns of symbols which include the data symbols and the null symbols, each unit pattern as a whole representing a different digital data value;
to assign, in the two-dimensional space, transmission data to positions of data symbols of the respective subcarriers determined in accordance with the null symbol arrangement pattern;
to generate the data symbols by modulating the transmission data assigned to the respective subcarriers, assign null symbols having a power of 0 to positions of null symbols of the respective subcarriers determined in accordance with the null symbol arrangement pattern, and generate transmission symbols of the respective subcarriers;
to output a baseband signal on a basis of the generated transmission symbols; and
to generate a pseudorandom sequence on a basis of an initial value, wherein
the processing circuitry determines the null symbol arrangement pattern by combining the unit patterns on a basis of the pseudorandom sequence.

US Pat. No. 10,171,278

METHODS AND APPARATUS FOR FREQUENCY OFFSET ESTIMATION

CAVIUM, LLC, Santa Clara...

1. A method, comprising:determining a demodulation reference signal (DMRS) frequency offset estimate from DMRS symbols in a received signal;
determining a cyclic prefix (CP) frequency offset estimate from cyclic prefix values associated with symbols received in the received signal, wherein the determining the CP frequency offset estimate includes adjusting a time offset of the received signal and separating a selected user's uplink transmission from the time adjusted received signal to generate a separated signal; and
combining the DMRS and CP frequency offset estimates to determine a final frequency offset estimate.

US Pat. No. 10,171,277

FRAME FORMAT AND DESIGN OF WAKE-UP FRAME FOR A WAKE-UP RECEIVER

HUAWEI TECHNOLOGIES CO., ...

1. A method of providing a low-rate data signal, the method comprising:receiving input data bits;
retrieving a stored multicarrier waveform for a multicarrier symbol, the multicarrier symbol including a null sub-carrier;
Manchester modulating the input data bits onto successive multicarrier symbols in time domain, each multicarrier symbol being encoded as two sub-symbols of equal length, each multicarrier symbol having one sub-symbol encoded and stored with a corresponding half of the multicarrier waveform and one sub-symbol encoded and stored with a zero energy waveform;
up-converting the successive multicarrier symbols to a carrier frequency to provide the low-rate data signal; and
transmitting the low-rate data signal over a wireless channel.

US Pat. No. 10,171,276

UPLINK OPERATION FOR LTE IN AN UNLICENSED BAND

InterDigital Patent Holdi...

8. A method comprising:receiving licensed assisted access (LAA) configuration information for a first cell from a second cell, wherein the first cell is associated with operation in an unlicensed band and the second cell is associated with operation in a licensed band;
receiving a downlink control information (DCI) comprising an uplink (UL) grant for the first cell for a transmission in a first subframe, wherein the UL grant comprises an indication that explicitly indicates that the first subframe is a sounding reference signal (SRS) subframe for the first cell;
determining one or more SRS resources for the first subframe;
determining that a wireless transmit/receive unit (WTRU) is triggered to transmit an SRS transmission in the first subframe; and
transmitting the SRS transmission on the SRS resources for the first subframe.

US Pat. No. 10,171,275

WIRELESS TRANSMITTER, WIRELESS REMOTE RECEIVER AND METHODS THEREOF

BEKEN CORPORATION, Shang...

1. A wireless transmitting and receiving system, comprising:a wireless transmitter comprising
a frame generator configured to generate a frame by including an auxiliary preamble, an auxiliary syncword, a guard, a preamble, an address, a packet control, a payload and a CRC, wherein the auxiliary preamble is precedent to the preamble;
a modulator communicatively coupled to the frame generator and configured to modulate the frame according to a variable transmission rate and include the transmission rate in the auxiliary syncword; and
a RF front end communicatively coupled to the modulator and configured to transmit the modulated signal to a receiver;
wherein the frame comprises the auxiliary preamble,
a receiver comprising a demodulator configured to use the auxiliary preamble to synchronize the demodulator to an incoming bit stream and for frequency offset calculation, and wherein the demodulator is further configured to use the preamble for synchronizing principal demodulation and another frequency offset estimation.

US Pat. No. 10,171,274

DATA TRANSMISSION APPARATUS, DATA RECEPTION APPARATUS, DATA TRANSMISSION AND RECEPTION SYSTEM

SK HYNIX INC., Icheon (K...

1. A data reception apparatus, comprising:a reception driver configured to receive N Tx signals that correspond to N binary data and are transmitted in parallel through N single-ended signal lines, and to generate decoded data having a bit number corresponding to the number of all cases in which the N Tx signals are compared to each other, wherein N is a natural number equal to or larger than 2; and
a decoder configured to restore the N binary data by combining bits of the decoded data,
wherein the reception driver receives four Tx signals, and generates 6-bit decoded data by comparing the four Tx signals to each other, and
wherein the decoder comprises:
a first multiplexer configured to select one of first and second bits of the decoded data;
a second multiplexer configured to select one of third and fourth bits of the decoded data; and
a logic circuit configured to perform an XOR operation on fifth and sixth bits of the decoded data,
wherein outputs of the first and second multiplexers are determined in response to an output of the logic circuit, and
wherein the outputs of the first and second multiplexers and the fifth and sixth bits are output as four binary data.

US Pat. No. 10,171,273

DECISION FEEDBACK EQUALIZER AND INTERCONNECT CIRCUIT

FUJITSU LIMITED, Kawasak...

1. A decision feedback equalizer comprising:a comparison circuit configured to compare a value indicated as 2n of a pulse amplitude modulated signal with a threshold value, wherein n is an integer of 2 or more;
a latch circuit configured to retain data of a comparison result of the comparison circuit;
a decoder configured to decode the retained data by the latch circuit; and
a setting circuit on/off-controlled by the retained data fed back from the latch circuit and configured to set the threshold value based on the retained data fed back from the latch circuit,
the latch circuit is disposed between the comparison circuit and the decoder.

US Pat. No. 10,171,272

COMPUTATIONALLY EFFICIENT ALGORITHM FOR MITIGATING PHASE NOISE IN OFDM RECEIVERS

Intel Corporation, Santa...

1. An inter-carrier interference (ICI) mitigation circuit associated with an orthogonal frequency division multiplexing (OFDM) receiver, comprising:an ICI cancellation circuit configured to:
receive an OFDM symbol associated with an OFDM signal;
determine an ICI associated with one or more OFDM subcarriers within the OFDM symbol, wherein the ICI associated with an OFDM subcarrier is determined based on a relation between one or more ICI coefficients and one or more ICI kernels associated with the respective OFDM subcarrier; and
cancel the ICI from the one or more OFDM subcarriers associated with the OFDM symbol, in order to generate a desired OFDM symbol, wherein the ICI is determined and cancelled in accordance with a predetermined ICI mitigation algorithm.

US Pat. No. 10,171,271

METHOD AND DEVICE FOR TRANSMITTING INTERFERENCE CANCELLATION INFORMATION FOR CANCELLING INTERFERENCE BETWEEN CELLS

LG ELECTRONICS INC., Seo...

1. A method for transmitting interference cancellation information, the method comprising:estimating a symbol error rate or a packet error rate in a cell-edge area based on feedback information received from a terminal belonging to a cell controlled by a predetermined base station;
determining a probability indicator that indicates a probability of cancelling inter-cell interference in the cell-edge area by comparing the symbol error rate or the packet error rate with a predetermined threshold;
transmitting information on the probability indicator to an adjacent cell, and
transmitting scheduling information based on the probability indicator to the terminal.

US Pat. No. 10,171,270

SYSTEMS AND METHODS FOR CORRECTING FOR PRE-CURSOR AND POST-CURSOR INTERSYMBOL INTERFERENCE IN A DATA SIGNAL

Cadence Design Systems, I...

1. A circuit comprising:a first data path comprising a first plurality of circuit components, the first data path receiving an input data signal x at time interval n and retrieving, from the input data signal x, an estimated next data bit d_aux[n?1] corresponding to a time interval n?1 wherein the first plurality of circuit components comprising:
a plurality of addition circuits to apply a plurality of voltage offsets, associated with correction for post-cursor intersymbol interference, to the input data signal x received at the time interval n to generate a plurality of input data signals corresponding to the time interval n;
a plurality of slicers to convert the plurality of input data signals to a plurality of data bits that correspond to the plurality of input data signals;
a multiplexer to receive the plurality of data bits and select a particular data bit, from the plurality of data bits, as output of the multiplexer, the particular data bit comprising a data bit d[n] corresponding to the time interval n, the particular data bit being selected by the multiplexer based on the estimated next data bit d_aux[n?1] provided by a digital flip-flop included in the first plurality of circuit components; and
the digital flip-flop to receive the particular data bit from the output of the multiplexer and delay the data bit d[n] to produce the estimated next data bit d_aux[n?1]; and
a second data path comprising a second plurality of circuit components, the second data path receiving the input data signal x at the time interval n and retrieving, from the input data signal x, a previous data bit d[n?1] corresponding to a time interval n?1 based on the estimated next data bit retrieved by the first data path.

US Pat. No. 10,171,269

EQUALIZER CIRCUIT AND INTEGRATED CIRCUIT INCLUDING THE SAME

SAMSUNG ELECTRONICS CO., ...

1. An equalizer circuit comprising:an equalizer controller configured to provide an enable signal, a delay control signal, and a voltage control signal based on a control signal; and
at least one equalizer configured to provide an equalizer signal based on the enable signal, the delay control signal and the voltage control signal, the at least one equalizer configured to provide the equalizer signal to a corresponding connection node, the corresponding connection node being connected to a corresponding logic circuit,
wherein the at least one equalizer includes,
a delay control circuit configured to delay a transfer signal from the corresponding logic circuit to provide a delayed transfer signal, the delay control circuit configured to delay the transfer signal based on the delay control signal, and
a voltage control circuit configured to provide the equalizer signal based on the delayed transfer signal and the voltage control signal,
wherein the voltage control circuit includes,
a voltage control inverter configured to provide the equalizer signal based on the delayed transfer signal.

US Pat. No. 10,171,268

ASYMMETRIC ON-STATE RESISTANCE DRIVER OPTIMIZED FOR MULTI-DROP DDR4

INTEGRATED DEVICE TECHNOL...

1. An apparatus comprising:a plurality of driver circuits configured to drive a read line in response to a memory signal and a reference voltage; and
a control registers block configuring said plurality of driver circuits to implement an asymmetric voltage swing of said read line about a voltage level that is half of said reference voltage.

US Pat. No. 10,171,267

UPLINK PILOT SEQUENCE ALLOCATION METHOD IN MASSIVE MIMO SYSTEM AND BASE STATION THEREOF

SHANGHAI RESEARCH CENTER ...

1. An uplink pilot sequence allocation method in a massive MIMO system, the system comprising a master base station in a master cell and a neighboring base station in a neighboring cell, comprising:the neighboring base station comparing a primary eigen-space between a user group of the neighboring cell and the neighboring base station with an interference eigen-space between a user group of the master cell and the neighboring base station, the user group of the master cell being close to the neighboring base station,
the neighboring base station determining whether the user group of the neighboring cell can reuse uplink pilot sequence resources used by the user group of the master cell.

US Pat. No. 10,171,266

SWITCH-EXTENDER AND A METHOD FOR CALIBRATING

1. A method for calibrating a system comprising a measurement system, a switch-extender, signal connects, attenuators and one calibration system comprising a first measurement unit, a second measurement unit, and a signal splitter, wherein the method comprises the steps of:connecting a first output of the signal splitter to the first measurement unit;
connecting a second output of the signal splitter to the second measurement unit;
connecting the first and the second measurement unit;
connecting the switch extender to the measurement system;
connecting each one end of the several signal connectors to the switch extender;
connecting the other end of one of the several signal connectors with an attenuator to an input of the signal splitter;
generating a signal with a specific signal level and/or a specific signal frequency with the measurement system;
measuring a signal level and/or a signal frequency with the calibration system at the first output of the signal splitter, measuring a signal power at the second output of the signal splitter and transmitting measured values to the first measurement unit;
determining a difference between the measured signal level and/or the measured signal frequency and the generated signal with the specific signal level and/or the specific signal frequency; and
calculating calibration data by using the determined difference between the measured signal level and/or the measured signal frequency and the generated signal with the specific signal level and/or the specific signal frequency.

US Pat. No. 10,171,265

UPLINK CHANNEL INFORMATION

QUALCOMM Incorporated, S...

1. A method of beamforming data, the method comprising:receiving, at a first station of a plurality of stations, a trigger frame from an access point of a wireless network;
performing, at the first station, a downlink channel estimation based on the trigger frame;
determining, at the first station, uplink beamforming parameters based at least in part on the downlink channel estimation, wherein determining the uplink beamforming parameters comprises:
determining a reverse of the downlink channel estimation to generate an uplink channel estimate; and
determining the uplink beamforming parameters based on the uplink channel estimate; and
sending data from the first station to the access point based on the uplink beamforming parameters.

US Pat. No. 10,171,264

DATA CENTER NETWORKS

Tigera, Inc., San Franci...

1. A method, comprising:advertising an external IP address of a packet forwarding function as a next hop IP address for one or more servers external to a data center network to reach a first virtual system, wherein the packet forwarding function includes an internal IP address that is different than the external IP address;
receiving, at the packet forwarding function comprised within a server in the data center network, a data packet being routed to or from the first virtual system having a first IP address and hosted on the server;
determining, by the packet forwarding function, a destination of the received data packet by querying a packet forwarding data store to determine a next hop IP address associated with a destination IP address of the received data packet; and
forwarding, by the packet forwarding function, the data packet based at least in part on the next hop IP address associated with the destination IP address of the received data packet, wherein the next hop IP address includes at least one of the internal IP address, the external IP address, an IP address associated with a border gateway, or an IP address associated with a device within the data center network.

US Pat. No. 10,171,263

CAPABILITY AWARE ROUTING

CISCO TECHNOLOGY, INC., ...

1. A method comprising:detecting a plurality of equal cost nodes, wherein
the plurality of equal cost nodes are equal cost with respect to a source node, and
the source node is capable by virtue of implementing a data plane capability;
determining whether one or more nodes of the plurality of equal cost nodes are capable, wherein
a capable node of the one or more nodes is capable by virtue of implementing the data plane capability, and
a non-capable node of the one or more nodes is non-capable by virtue of not implementing the data plane capability;
in response to at least one of the plurality of equal cost nodes being capable, selecting a capable node of the at least one of the plurality of equal cost nodes as a next-hop destination for network traffic; and
in response to none of the plurality of equal cost nodes being capable,
selecting a non-capable node of the plurality of equal cost nodes as the next-hop destination, and
implementing a network path from the source node to a capable downstream node, wherein
the capable downstream node is downstream of the non-capable node, and
the capable downstream node is capable by virtue of implementing the data plane capability.

US Pat. No. 10,171,262

METHOD FOR PROVISIONING OF ROOM AUTOMATION COMPONENTS OF A BUILDING AUTOMATION

Siemens Schweiz AG, Zuri...

1. A method for provisioning and configuring room automation components of a building automation system with a configuration unit, the method comprising:assigning a unique, temporary address by the configuration unit to each room automation component during an installation of the room automation components;
defining a unique recognition code for each room automation component of the room automation components and a respective associated temporary address based on the respective associated temporary address, which is transferred to a respective room automation component;
instructing installed room automation components by the configuration unit in a configuration mode to send out their unique recognition code, respectively;
sending each respective recognition code of the respective room automation component established aided by a mobile unit to the configuration unit for identification; and
indicating optically on the mobile unit each identified room automation component which is selectable for further configuration, after successful identification and association with the associated temporary address.

US Pat. No. 10,171,261

REMOTE TALK DOWN TO PANEL, CAMERA AND SPEAKER

Vivint, Inc., Provo, UT ...

1. An apparatus, comprising:a computing device in communication with a building automation system, the computing device comprising a processor and a memory in electronic communication with the processor, the computing device configured to:
receive, from the building automation system, a notification indicating an identification of an entity within a viewable area of the building automation system, the viewable area of the building automation system being defined by one or more sensors associated with the building automation system;
initiate a real-time, two-way communication with a user of the building automation system based at least in part on receiving the notification;
receive a communication stream from the building automation system, wherein the communication stream comprises a first video stream received from the building automation system;
transmit a first audio stream to the building automation system, wherein the first audio stream is tested and confirmed prior to being transmitted to the building automation system;
transmit a second communication stream to the building automation system; and
record the communication stream from the building automation system based at least in part on the identification of the entity within the viewable area of the building automation system.

US Pat. No. 10,171,260

MANAGING ROUTER ADVERTISEMENT MESSAGES TO SUPPORT ROAMING OF WIRELESS MOBILE CLIENT DEVICES

Cisco Technology, Inc., ...

1. A method comprising:at a controller configured to control one or more wireless access point devices that serve wireless mobile client devices that are part of a first virtual local area network, storing information identifying any other controllers that control other wireless access point devices to which at least one wireless mobile client device that is part of the first virtual local area network has roamed;
storing a list of one or more wireless mobile client devices from which router solicitation messages have been received;
at the controller, receiving a router advertisement message sent by a network router device;
determining whether the router advertisement message is a multicast message and if so determining for which virtual local area network the router advertisement message is intended;
determining whether the router advertisement responds to a router solicitation message received from a particular wireless mobile client device on the stored list;
generating a unicast router advertisement message by changing a header field of the router advertisement message to replace a multicast destination address in the router advertisement message with a media access control address for a wireless mobile client device that is part of the first virtual local area network for which the router advertisement message was intended;
sending the unicast router advertisement message to one or more wireless access point devices for wireless transmission to the particular wireless mobile client device when it is determined that the router advertisement message is intended for the first virtual local area network, wherein the unicast router advertisement message is sent without waiting for a next permitted router advertisement message according to a stored router advertisement frequency parameter; and
forwarding a copy of the multicast router advertisement message to the other controllers that control wireless access point devices to which at least one wireless mobile client device that is part of the first virtual local area network has roamed.

US Pat. No. 10,171,259

NETWORK SYSTEM AND RELAY DEVICE

APRESIA Systems, Ltd., T...

1. A network system comprising:a second network that is connected to a first network, at least part of which is constituted of a virtual machine on a virtual network, and that transfers first encapsulated data obtained by first encapsulation using a data link layer (L2) over network layer (L3) encapsulation method;
a third network that is connected to the second network and transfers second encapsulated data obtained by second encapsulation using an L2 over L2 encapsulation method;
a first relay device that belongs to the second network, is connected to the third network, and performs a process concerning the first encapsulation; and
a second relay device that belongs to the third network, is connected to the second network, and performs a process concerning the second encapsulation,
wherein the first relay device performs conversion between a first identifier of data encapsulated by the first encapsulation in the second network and a third identifier of decapsulated data exchanged with the second relay device,
the second relay device performs conversion between a second identifier of data encapsulated by the second encapsulation in the third network and the third identifier of the decapsulated data exchanged with the first relay device,
the first encapsulation is encapsulation by VXLAN (Virtual eXtensible Local Area Network) and the second encapsulation is encapsulation by PBB (Provider Backbone Bridging),
the first identifier is a VNID (VXLAN Network Identifier) and the second identifier is an ISID (Service Instance ID),
the first network is a vEPC (Evolved Packet Core) virtual network in a mobile network system, and
an eNB (evolved Node B: base station) network in the mobile network system is connected to the third network.

US Pat. No. 10,171,258

DATA COLLECTION METHOD AND SYSTEM

International Business Ma...

1. A method of collecting data into a server from a plurality of client computers each having a storage unit, the method comprising the steps of:reconstructing, by the server, a collection network in a tree structure at predetermined time intervals, the collection network comprising a highest node embodied by the server and a plurality of child nodes embodied by respective ones of the plurality of client computers;
broadcasting, by the server, a parent-child declaration to the client computers through the collection network, the parent-child declaration assigning different ones of the client computers to different levels of the collection network;
receiving, by the server, data accumulated by at least one client computer of the client computers disposed in a level one below the server in the collection network;
transmitting, by the server, an ACK for the data accumulated by the server to the at least one client computer disposed in the level one below the server in the collection network, wherein the ACK causes the at least one client computer disposed in the level one below the server to delete an entry in an identifier association table associated with the data accumulated by the server and maintain at least one entry in the identifier association table including data yet to be acknowledged by the server for transmission in a next reconstructed collection network;
generating, by each of the client computers, an identifier association table upon receipt of the parent-child declaration, the identifier association table recording therein association of transmitted and received data; and
recording, by each of the client computers, the association of transmitted and received data to the identifier association table when transferring the data to a parent node thereof through of the collection network,
wherein the identifier association table of each of the client computers includes a transmission-source child-node name representing a transmission source, a reception-complex-data identifier which is an identifier of data received from a child node of a respective client computer, a generation-data identifier which is an identifier of data generated by the respective client computer, and a transmission-complex-data identifier which is an identifier of data to be transmitted to the parent node of the respective client computer.

US Pat. No. 10,171,257

UPDATING DATA OBJECTS ON A SYSTEM

International Business Ma...

1. A computer system for updating data objects across a storage area network, the computer system comprising:one or more computer processors;
one or more computer readable storage media;
computer program instructions;
the computer program instructions being stored on the one or more computer readable storage media; and
the computer program instructions comprising instructions to:
identify a request directed to a first server to perform a first core storage function for a first data object stored on a first storage device, the first core storage function being at least one of (i) real-time replication or (ii) real-time mirroring;
generate, in response to identifying the request to perform the first core storage function, a multicast group, wherein the multicast group includes at least: (i) the first server, (ii) a first storage controller located on the first storage device, (iii) a second server, and (iv) a second storage controller located on a second storage device;
multicast, via a reliable multicast, a first set of data write operations associated with the first core storage function to: (i) the first storage controller, (ii) the second server, and (iii) the second storage controller included in the multicast group; and
update, based on the first set of write operations multicasted to the multicast group: (i) the first data object stored on the first storage device, and (ii) a second data object stored on the second storage device, wherein the second data object is a replica of the first data object.

US Pat. No. 10,171,256

INTERACTIVE TIMELINE FOR A TELECONFERENCE SESSION

Microsoft Technology Lice...

1. A system comprising:one or more processing units; and
a computer-readable medium having encoded thereon computer-executable instructions to cause the one or more processing units to:
cause content of a teleconference session to be displayed;
cause an interactive timeline associated with the teleconference session to be displayed, wherein the interactive timeline includes a plurality of representations that correspond to a plurality of notable events associated with the teleconference session and wherein the plurality of representations are of one or more different types;
receive a first request associated with a representation of the plurality of representations while the content of the teleconference session continues to be displayed in association with a current view;
based at least in part on receiving the first request, cause first information to be displayed while the content of the teleconference session continues to be displayed in association with the current view, the first information describing a notable event that corresponds to the representation;
receive a second request associated with the representation; and
based at least in part on receiving the second request, switch from the current view to a different view to display second information associated with the notable event.

US Pat. No. 10,171,254

DISTRIBUTED LIVE MULTIMEDIA SWITCHING MECHANISM AND NETWORK

Oath Inc., New York, NY ...

1. A method for sharing multimedia content, comprising:receiving an entry for a map location from an interface provided at a receiving device;
returning a portion of a map for the selected map location for rendering on the receiving device, the portion identifying one or more events occurring at the map location;
receiving a selection of an event of the one or more events, the selection generating a request for receiving live multimedia content for an event that is currently occurring;
tracking capturing devices available at the map location to identify select ones of the capturing devices that are available for capturing the live multimedia content for the event;
obtaining streams of live multimedia content for the event captured by select ones of the capturing devices at the map location for rendering on a user interface at the receiving device, in response to the selection of the event, each of the select ones of the capturing devices and the receiving device being operated by a distinct operator, the streams of live multimedia content are configured to be rendered at the user interface as thumbnails that are each updated and provide a view of content that is being captured by the different capturing devices, wherein a subset of the streams of live multimedia content for the event provided by the select ones of the capturing devices are automatically selected for rendering and are organized in accordance to filtering criteria defined for the event; and
receiving selection of a stream from the subset of streams of live multimedia content rendered on the user interface at the receiving device, the selection resulting in use of a peer-to-peer interactive communication connection established between the receiving device and a specific one of the capturing devices that is producing the selected stream to enable interactive communication, the interactive communication used to influence the specific capturing device to change at least one aspect of the specific capturing device so as to adjust the multimedia content captured in the selected stream, the selection causing the selected stream to be rendered at the receiving device, wherein the selected stream that is rendered at the receiving device includes the adjustment to the multimedia content caused by the change to at least one aspect of the specific capturing device,
wherein operations of the method are performed by a processor of a server computing device.

US Pat. No. 10,171,253

NODE DIRECTED MULTICAST TRAFFIC MANAGEMENT SYSTEMS AND METHODS FOR MESH NETWORKS

Vivint, Inc., Provo, UT ...

10. An apparatus for multicast traffic management, comprising:a processor;
memory in electronic communication with the processor; and
instructions stored in the memory and operable, when executed by the processor, to cause the apparatus to:
sense traffic within a wireless mesh network, the wireless mesh network comprising a first mesh node associated with a first multicast flow and a second mesh node associated with a second multicast flow;
generate a first rule for the first mesh node and a second rule for the second mesh node based at least in part on the sensed traffic, the at least one rule based at least in part on channel state information, the channel state information being a state of a channel shared by the first multicast flow and the second multicast flow;
transmit the first rule to the first mesh node and the second rule to the second mesh node, the transmission sent in a routing path based at least in part on the first rule and the second rule; and
instruct the first mesh node and the second mesh node to change a pre-routing parameter during packet processing.

US Pat. No. 10,171,252

DATA DETERMINATION APPARATUS, DATA DETERMINATION METHOD, AND COMPUTER READABLE MEDIUM

Mitsubishi Electric Corpo...

1. A data determination apparatus comprising:processing circuitry configured to
measure a period of time during which an operating state of the data determination apparatus continues;
store a state transition model representing a state transition between respective operating states of a plurality of operating states according to obtained information obtained by the data determination apparatus;
store a history of the obtained information as an obtained information history;
hold an operating state of the data determination apparatus based on the state transition model;
store, as a communication permission list, communication permitted data whose communications are permitted in the respective operating states of the plurality of operating states;
obtain communication data as communication determination data; and
obtain the communication determination data obtained, obtain the operating state of the data determination apparatus held as a current operating state, and determine whether or not the communication determination data is communication permitted data whose communication has been permitted in the current operating state, using the current operating state and the communication permission list, wherein
the obtained information includes the communication data obtained by the communication, an operation signal indicating receipt of an operation on the data determination apparatus, and a timer signal output from the timer,
the processing circuitry generates the state transition model and the communication permission list, based on the obtained information history,
the processing circuitry generates the state transition model by setting a wait state when a period of time elapsed between successive communication data included in the Obtained information history is a first period or more, setting, as a first change point, a point of time of having obtained information other than the communication data and setting each of states before and after the first change point as a first operating state, and setting, as a second change point, a point of time of having obtained transition communication data whereby an operating state transition has been determined to be made in each first operating state and setting each of states before and after the second change point as a second operating state.

US Pat. No. 10,171,251

TAMPER-PROTECTED HARDWARE AND METHOD FOR USING SAME

Emsycon GmbH, (DE)

1. A tamper-protected hardware module, comprising:a hardware structure providing a Physical Unclonable Function (PUF), the hardware structure being adapted to provide a response to challenges input to the PUF implemented in the hardware structure,
storage memory to store a set of challenges and a set of correct PUF responses for each of said challenges,
processor circuitry to provide at least one challenge from said set of challenges to the hardware structure implementing the PUF, and to receive a PUF response for each challenge provided to the hardware structure implementing the PUF,
the processor circuitry to verify integrity of the tamper-protected hardware module by checking, for each PUF response received for a challenge provided to the hardware structure implementing the PUF, whether the respective PUF response received from the hardware structure implementing the PUF matches the correct PUF response of said challenge stored in the storage memory, and
wherein the processor circuitry makes the tamper-protected hardware module temporarily or permanently unusable if integrity of the tamper-protected hardware module is not verified by the processor circuitry, and wherein the tamper-protected hardware module is a chip or a die, and wherein the tamper-protected hardware module further comprises an on-chip trusted time source for providing the current date and time, wherein the current date and time is used by the tamper-protected hardware module to verify validity of certificates.

US Pat. No. 10,171,250

DETECTING AND PREVENTING MAN-IN-THE-MIDDLE ATTACKS ON AN ENCRYPTED CONNECTION

Juniper Networks, Inc., ...

1. A method comprising:determining, by a device, one or more verification domains to be used to verify a public key certificate,
the one or more verification domains being different from a host domain associated with the device;
determining, by the device, one or more resources to be requested to verify the public key certificate;
determining, by the device, one or more actions to perform when the public key certificate is not valid;
generating, by the device, executable verification code, for performing the one or more actions without prompting a user to accept or reject the public key certificate, based on determining the one or more verification domains, based on determining the one or more resources, and based on determining the one or more actions;
embedding, by the device, the executable verification code in other code; and
providing, by the device, the other code, with the executable verification code, for execution by a client device.

US Pat. No. 10,171,249

PRIVACY FRIENDLY LOCATION BASED SERVICES

INTERNATIONAL BUSINESS MA...

1. A cryptographic method for enabling access to services provided by a server in a set of reference areas; the method comprising:obtaining, by a user device, a set of reference credentials of the server that certifies data indicating the set of reference areas, wherein the set of reference areas are defined using Military Grid Reference System (MGRS), wherein at least one reference credential of the set of reference credentials is an attribute-based credential, wherein attributes in the reference credential indicate respective MGRS precision levels of a reference area of the set of reference areas, wherein the set of reference credentials are signed by the server using a predefined signature scheme, wherein the set of reference credentials are obtained from the server by the user device, wherein the user device is connected to a mobile network controller and the server, wherein the mobile network controller is of a network to which the user device is connected, wherein the mobile network controller comprises a mobile network operator server;
obtaining, by the user device, a location credential that certifies location data indicating a current location of the user device, wherein the location credential is an attribute-based credential, wherein attributes in the location credential indicate respective MGRS precision levels of the current location of the user device, wherein the location credential is obtained from the mobile network operator server by the user device, wherein the location credential is signed by the mobile network operator server using the predefined signature scheme;
generating, by the user device, an authentication token comprising a cryptographic proof for proving that the current location of the user device certified by the location credential matches at least one reference area certified by the set of reference credentials, the cryptographic proof proving that the respective MGRS precision levels of the at least one reference area match at least a part of the respective MGRS precision levels of the current location of the user device; and
sending, by the user device, the authentication token to the server for accessing the services in the at least one reference area, wherein the server is configured to determine from the cryptographic proof that the location of the user device matches at least one area of the set of reference areas, wherein the server performs the determining without receiving the current location of the user device.

US Pat. No. 10,171,248

METHOD AND SYSTEM BLOCKCHAIN VARIANT USING DIGITAL SIGNATURES

MASTERCARD INTERNATIONAL ...

1. A method for using digital signatures for signing blockchain transactions, comprising:generating, by a generation module of a processing server, a domain key pair comprising a domain private key and a domain public key, wherein the domain public key is signed after generation;
receiving, by a receiving device of the processing server, a plurality of member public keys, wherein each member public key is a public key in a key pair comprising the member public key and a member private key corresponding to an associated member;
signing, by a signing module of the processing server, each member public key of the plurality of member public keys using the domain private key;
receiving, by the receiving device of the processing server, a transaction block from a specific member of the blockchain network, wherein the transaction block includes a hash signed using the member private key corresponding to the specific member;
electronically transmitting, by the transmitting device of the processing server, each signed member public key to one or more members of the blockchain network;
receiving, by the receiving device of the processing server, a new transaction block and a signed second hash value from the specific member of the blockchain network;
signing, by the signing module of the processing server, the received new transaction block using the domain private key; and
electronically transmitting, by the transmitting device of the processing server, the signed new transaction block for validation of the blockchain transactions by a member of the blockchain network.

US Pat. No. 10,171,246

MULTI-USER STRONG AUTHENTICATION TOKEN

ONESPAN NORTH AMERICA INC...

1. A method to secure a user's interaction with a remotely accessible computer-based application, the method comprising performing at a personal computing device the steps of:obtaining transaction data;
displaying the obtained transaction data on a display of the personal computing device for review by the user, wherein an authentication application that is running on the personal computing device displays the obtained transaction data in a transaction data presentation area of the display of the personal computing device;
obtaining a dynamic credential associated with the transaction data;
making the dynamic credential available for verification; and
ensuring at the personal computing device that no window of another application that is running on the personal computing device can partially or entirely hide or obscure the authentication application's transaction data presentation area,
wherein the transaction data presentation area comprises the entirety or a part of a transaction data displaying window of the authentication application on the display of the personal computing device,
the method further comprising the step of ensuring at the personal computing device that no other window of another application that is running on the personal computing device can partially or entirely hide or obscure the authentication application's transaction data displaying window, including the authentication application calling one or more operating system functions of an operating system of the personal computing device to ensure or enforce that the transaction data displaying window remains on top.

US Pat. No. 10,171,245

CRYPTO INTEGRATION PLATFORM

t0.com, Inc., Midvale, U...

1. A computerized method comprising:creating, by a computer, a first account and a second account for a first customer, the first account having a first address and at least a first private key corresponding with the first account, the second account having a second address and at least a second private key corresponding with the second account, each of the first account and the second account having a common customer identifier associated with the first customer;
receiving, from a remote computing device, an order for exchanging one or more digital transactional items associated with the first account, wherein the order is associated with the common customer identifier;
electronically signing, with the at least the first private key corresponding with the first account, a first transaction to transfer the one or more digital transactional items from the first account to the second account, wherein the one or more digital transactional items are transferred from the first account to the second account once the first transaction is electronically signed by the at least the first private key, wherein the one or more digital transactional items in the second account are committed for use in the order for exchanging the one or more digital transaction items;
electronically signing, with the at least the first private key corresponding with the first account, a second transaction to use the one or more digital transaction items in the order for exchanging the one or more digital transactional items;
verifying that both the first transaction and the second transaction were signed with the at least the first private key to verify that the one or more digital transaction items are committed and available for the order exchanging the one or more digital transactional items; and
authorizing placement of the order on a cryptographic exchange upon verifying that both the first transaction and the second transaction were signed with the at least the first private key.

US Pat. No. 10,171,244

INCREASED COMMUNICATION SECURITY

Idaax Technologies Privat...

1. A method of increasing communication security, said method comprising:communicating, from a first computer system, a unique identifier associated with a second computer system, wherein said communicating further comprises communicating said unique identifier for delivery to a third computer system;
receiving, at said first computer system from said third computer system, a first message including a first data portion and a second data portion, wherein said first data portion is associated with a security token, wherein said first data portion includes a first instance of a session key, and wherein said second data portion includes a second instance of said session key;
performing, at said first computer system, message validation associated with said first message;
if said first message is valid, generating a second message including said first data portion; and
if said first message is valid, communicating said second message from said first computer system for delivery to said second computer system.

US Pat. No. 10,171,243

SELF-VALIDATING REQUEST MESSAGE STRUCTURE AND OPERATION

INTERNATIONAL BUSINESS MA...

14. A method for execution by a storage unit (SU), the method comprising:receiving, via an interface of the SU configured to interface and communicate with a dispersed or distributed storage network (DSN) and from a computing device, a self-validating request message, wherein the self-validating request message is generated by the computing device to include a first message authentication code of the computing device, and the self-validating request message is generated by the computing device based on the computing device creating a master key of the computing device, creating a message encryption key based on the master key of the computing device and a secret function, encrypting a message using the message encryption key to generate an encrypted message, encrypting the master key of the computing device using a public key of the SU to generate an encrypted master key;
processing the self-validating request message to verify the first message authentication code of the computing device that is included within the self-validating request message, and when the first message authentication code of the computing device is verified:
decrypting the encrypted master key that is included within the self-validating request message using a private key of the SU to recover the master key of the computing device;
generating the message encryption key based on the master key of the computing device and the secret function; and
decrypting the encrypted message that is included within the self-validating request message to recover the message; and
generating, in response to the self-validating request message, a self-validating response message that includes a second message authentication code and an encrypted response including to:
generating a responder encryption key based on the master key and another secret function; and
encrypting a response to the message based on the responder encryption key to generate the encrypted response; and
transmitting, via the interface of the SU and to the computing device, the self-validating response message.

US Pat. No. 10,171,242

MAKING CRYPTOGRAPHIC CLAIMS ABOUT STORED DATA USING AN ANCHORING SYSTEM

PeerNova, Inc., San Jose...

1. A computer implemented method comprising:receiving, by a first computer system, second data to store;
generating, by the first computer system, a second hash based on the second data and a first hash that was generated based on first data stored in the first computer system;
storing, by the first computer system, the second hash;
transmitting, by the first computer system to a second computer system, a copy of the second hash;
receiving, by the first computer system from the second computer system, an import anchor generated based on the copy of the second hash and a time stamp generated by a time stamping authority; and
storing, by the first computer system, the import anchor in association with the second hash, such that the import anchor provides a cryptographic proof for verifying whether the second data stored at the first computer system was not modified.

US Pat. No. 10,171,241

STEP-UP AUTHENTICATION FOR SINGLE SIGN-ON

VMWare, Inc., Palo Alto,...

1. A method for providing step-up authentication in a system providing single-sign on to a plurality of applications on a computing device, comprising:receiving a request to authenticate a user of the computing device for a first application using a primary token associated with a single-sign on capability;
determining that the primary token is insufficient to authenticate the user for the first application;
requesting a token agent executing on the computing device to perform a step-up authentication of the user;
updating the primary token to reflect the step-up authentication of the user after receiving an indication of a successful step-up authentication of the user from the token agent;
providing the updated primary token to the computing device;
receiving, from the computing device, a resubmission of the request to authenticate the user for the first application, the resubmitted request including the updated primary token reflecting the step-up authentication; and
transmitting a secondary token to the token agent executing on the computing device based on granting access to the first application, wherein the secondary token authenticates the user for the first application, and wherein granting access to the first application is based on receiving the resubmitted requesting including the updated primary token.

US Pat. No. 10,171,240

ACCESSING RESOURCES IN PRIVATE NETWORKS

SUCCESSFACTORS, INC., So...

1. A non-transitory machine-readable medium storing a program executable by at least one processing unit of a device, the program comprising sets of instructions for:receiving, through a first firewall, a queue message from a queue client, the queue client generating the queue message in response to receiving, from a first computing device, a request to perform a set of actions on an application hosted on a second computing device belonging in a first network of a private network and a security signature generated from an authentication operation performed by the first computing device, the queue message comprising the request and the security signature, the second computing device configured with and accessible through a private Internet Protocol (IP) address;
storing the queue message in a message queue of the device for later retrieval when the queue message is determined to be valid based on the security signature, the message queue belonging in a second, different network of the private network;
sending, through a second firewall, the queue message from the message queue to a queue monitor belonging to the first network of the private network for the queue monitor to instruct the application to perform the set of actions; and
upon receiving, through the second firewall, a response associated with the queue message from the queue monitor, forwarding, through the first firewall, the response associated with the queue message to the queue client in order for the queue client to forward the response associated with the queue message to the first computing device.

US Pat. No. 10,171,239

SINGLE USE RECOVERY KEY

Microsoft Technology Lice...

1. A computing device comprising: at least one processor and a memory, the at least one processor configured to:receive a message to add a first recovery key for an encrypted volume to a database;
add the first recovery key to the database;
receive a request for a recovery key for the encrypted volume;
find, in response to the request, a most recent recovery key for the encrypted volume;
subsequently provide the first recovery key if the first recovery key is the most recent recovery key;
indicate, in the database, in response to the provision of the first recovery key, that the first recovery key has been disclosed; and
mark each recovery key in the database as disclosed due to the database being restored from a backup thereof irrespective of whether any recovery key in the database was actually provided to a requestor.

US Pat. No. 10,171,238

SECURE DATA TRANSMISSION USING QUANTUM COMMUNICATION

THE BOEING COMPANY, Chic...

1. A method for transmitting data comprising:transmitting first data comprising a random data stream; and
transmitting second data comprising indicators as to which data of the random data stream is valid data to be communicated, the first data transmitted using quantum entanglement;
wherein the random data stream is a random bit stream and the second data comprises a bit stream that corresponds to the random bit stream with a pause inserted to indicate that a previous bit is a valid bit.

US Pat. No. 10,171,237

HIGH-SPEED AUTOCOMPENSATION SCHEME OF QUANTUM KEY DISTRIBUTION

1. A communication system for transmitting a cryptographic key across a channel, comprising:a transmission node (“Alice”) including a beam splitter, an electro-optical attenuator, an amplitude modulator, an electro-optical phase modulator, a storage line, a Faraday mirror, and a synchronization detector, wherein the storage line directly connects the Faraday mirror and the electro-optical phase modulator;
a receiver node (“Bob”) including a laser, avalanche photodiodes, a beam splitter, a circulator, a delay line, an electro-optical phase modulator, a polarizing beam splitter, and a Mach-Zehnder interferometer connected between the beam splitter and the polarizing beam splitter; and
a quantum channel connecting the transmission and receiver nodes,
wherein the storage line is placed between the electro-optical phase modulator of the transmission node and the Faraday mirror.

US Pat. No. 10,171,236

METHOD FOR OPERATING A PRIMARY UNIT

ROBERT BOSCH GMBH, Stutt...

1. A method for operating a primary unit, the primary unit exchanging pieces of information with a secondary unit, the method comprising:receiving first pieces of information from the secondary unit, the first pieces of information being formed as a function of at least one first measured value of a physical variable in an area of the secondary unit and as a function of a first random number;
measuring the at least one physical variable in an area of the primary unit to obtain a second measured value;
ascertaining a first estimated value for the first random number as a function of the first pieces of information and of the second measured value;
measuring the at least one physical variable in the area of the primary unit to obtain a third measured value;
forming second pieces of information as a function of the first estimated value and of the third measured value; and
transmitting the second pieces of information to the secondary unit.

US Pat. No. 10,171,235

USER-INITIATED MIGRATION OF ENCRYPTION KEYS

NXP B.V., Eindhoven (NL)...

1. A method, comprising:storing a master key in a non-volatile memory;
using a communication circuit of a computing server,
authenticating a first network communication device in a data network using a first key, wherein the first key is derived from the master key and a first set of key derivation data stored on the first network communication device, and
receiving a data migration request from a second network communication device in the data network, the data migration request specifying the first set of key derivation data and specifying a second set of key derivation data stored at the second network communication device;
in response to receiving the data migration request, using a processing circuit of the computing server to
determine a temporary key used by the second network communication device based on the first and second sets of key derivation data and the master key, and
generate a second key based on the master key and the second set of key derivation data; and
using the communication circuit,
providing the second key to the second network communication device via a secure communication channel established using the temporary key, and
authenticating the second network communication device using the second key.

US Pat. No. 10,171,234

WIDE ENCODING OF INTERMEDIATE VALUES WITHIN A WHITE-BOX IMPLEMENTATION

NXP B.V., Eindhoven (NL)...

1. A method for mapping an input message to an output message by a keyed cryptographic operation in a white-box cryptographic system to resist differential attacks, the keyed cryptographic operation including a plurality of substitution layers and state data, comprising:mapping the input message to first state data in a first substitution layer of the keyed cryptographic operation including a substitution box (S-box), wherein the first substitution layer includes N basic blocks that implement the first substitution layer and wherein a non-linear encoding having a first size is placed on inputs and outputs of the N basic blocks of the first substitution layer, where N is an integer;
mapping the first state data to second state data in a plurality of intermediate substitution layers of the keyed cryptographic operation each intermediate layer including an S-box, wherein the intermediate substitution layers include M blocks that implement the intermediate substitution layers and wherein a plurality of non-linear encodings having a second size are placed on the inputs and outputs of the M basic blocks of the intermediate substitution layers, where M is an integer; and
mapping the second state data to the output message in a final substitution layer of the keyed cryptographic operation including an S-box, wherein the final substitution layer includes K basic blocks that implement the final substitution layer and wherein a non-linear encoding having a third size is placed on the inputs and outputs of the K basic blocks of the final substitution layer, where K is an integer,
wherein the first size and the third size are greater than the second size,
wherein N wherein K

US Pat. No. 10,171,233

SYSTEM AND METHOD FOR EFFICIENT SUPPORT FOR SHORT CRYPTOPERIODS IN TEMPLATE MODE

11. A method for communicating encryption information in template mode in dynamic adaptive streaming over hypertext transfer protocol (DASH), the method comprising:receiving, by a client, a media presentation description (MPD), from a server, wherein the MPD includes a template associated with a universal resource locator (URL);
configuring, by the client, a URL for an IV using the template;
sending, by the client, the URL to the server; and
receiving, by the client, an initialization vector (IV) associated with the URL, wherein the received IV is for decrypting a segment at the client.

US Pat. No. 10,171,232

FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES)

Intel Corporation, Santa...

1. A system comprising:a processor comprising:
a plurality of cores;
a level 1 (L1) instruction cache to store a plurality of instructions, the plurality of instructions to include a plurality of Advanced Encryption Standard (AES) instructions of an instruction set of the processor that includes a Single Instruction Multiple Data (SIMD) instruction set, wherein the plurality of AES instructions include more than four but less than ten AES instructions including a first AES instruction for a final round of an AES encryption operation, a second AES instruction for a round of the AES encryption operation, a third AES instruction for a round of an AES decryption operation, and a fourth AES instruction for a final round of the AES decryption operation, and wherein the plurality of AES instructions each comprise a different opcode;
an L1 data cache;
instruction fetch logic to fetch instructions from the L1 instruction cache;
decode logic to decode instructions including the first AES instruction;
a microcode memory to store microcode;
a first 128-bit source register to store a round key to be used for the final round of the AES encryption operation;
a second 128-bit source register to store input data to be encrypted by the final round of the AES encryption operation;
a plurality of ports each associated with one or more corresponding execution resources to support parallel execution of integer and floating point operations;
an execution unit including AES execution logic to execute the first AES instruction to perform the final round of the AES encryption operation using microcode determined from the decode of the first AES instruction and obtained from the microcode memory, the final round of the AES encryption operation to use the round key from the first 128-bit source register to encrypt the input data from the second 128-bit source register, and to store a final encrypted result of the final round of the AES encryption operation in a 128-bit destination register,
wherein the final round of the AES encryption operation is to include:
a substitution operation to be performed on the input data, the substitution operation to use a substitution box (S-box) lookup to result in a first array of substituted data;
a Shift Rows transform to shift row data in the first array by a specified amount to generate a shift rows result; and
an Add Round Key transform in which an exclusive OR function is to use data from the round key and the shift rows result; and
a retirement unit
a memory controller to couple the processor to a dynamic random access memory (DRAM); and
an input/output (I/O) controller to couple the processor to one or more devices, the one or more devices to include one or more storage devices, wherein at least one of the one or more storage devices is to be coupled to the processor over at least one Serial Attached Small Computer System Interface (SAS).

US Pat. No. 10,171,231

FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES)

Intel Corporation, Santa...

1. A system comprising:a processor comprising:
a plurality of cores;
a level 1 (L1) instruction cache to store a plurality of instructions, the plurality of instructions to include a plurality of Advanced Encryption Standard (AES) instructions of an instruction set of the processor that includes a Single Instruction Multiple Data (SIMD) instruction set, wherein the plurality of AES instructions include more than four but less than ten AES instructions including a first AES instruction for a round of an AES encryption operation, a second AES instruction for a final round of the AES encryption operation, a third AES instruction for a round of an AES decryption operation, and a fourth AES instruction for a final round of the AES decryption operation, and wherein the plurality of AES instructions each comprise a different opcode;
an L1 data cache;
instruction fetch logic to fetch instructions from the L1 instruction cache;
decode logic to decode instructions including the first AES instruction;
a microcode memory to store microcode;
a first 128-bit source register to store a round key to be used for the round of the AES encryption operation;
a second 128-bit source register to store input data to be encrypted by the round of the AES encryption operation;
a plurality of ports each associated with one or more corresponding execution resources to support parallel execution of integer and floating point operations; and
an execution unit including AES execution logic to execute the first AES instruction of the instruction set of the processor to perform the round of the AES encryption operation using microcode determined from the decode of the first AES instruction and obtained from the microcode memory, the AES encryption operation to use the round key from the first 128-bit source register to encrypt the input data from the second 128-bit source register, and to store a result of the round of the AES encryption operation in a 128-bit destination register,
wherein the round of the AES encryption operation is to include:
a Sub Bytes transform to perform a byte substitution on the input data, the Sub Bytes transform to use a substitution box (S-box) lookup to result in a first array of substituted data;
a Shift Rows transform to shift row data in the first array by a specified amount to result in a second array;
a Mix Columns transform in which columns of the second array are to be treated as polynomials over a Galois Field GF(28) and multiplied modulo x4+1 with a fixed polynomial to generate a mix columns result; and
an Add Round Key transform in which an exclusive OR function is to use data from the round key and the mix columns result;
a memory controller to couple the processor to a dynamic random access memory (DRAM); and
an input/output (I/O) controller to couple the processor to one or more devices, wherein the one or more devices are to include one or more storage devices, and wherein the one or more storage devices are to be arranged as a Redundant Array of Independent Disks (RAID).

US Pat. No. 10,171,230

HOMOMORPHIC ENCRYPTION SCHEME

Empire Technology Develop...

1. A method performed under control of a first device, the method comprising:determining an enciphering function, based at least in part on a secret key of the first device and a system parameter;
enciphering a plaintext into a first ciphertext, based at least in part on the enciphering function;
transmitting, to a server, the first ciphertext and the system parameter;
transmitting, to a second device, a request to process the plaintext, wherein the first ciphertext, which corresponds to the plaintext, is processed to a second ciphertext by the second device, based at least in part on the request, and wherein the request includes a type of calculations to be performed on particular plaintext elements among multiple plaintext elements of the plaintext;
receiving, from the second device, the second ciphertext to which the first ciphertext has been processed by the second device without deciphering the first ciphertext wherein the transmission of the request to process the first ciphertext to the second ciphertext without deciphering the first ciphertext facilitates the plaintext to be hidden from the second device, to enable protection against attacks on the plaintext; and
deciphering the second ciphertext, based at least in part on the system parameter and a deciphering function.

US Pat. No. 10,171,229

PSEUDO-RANDOM BIT GENERATOR BASED ON MULTIM-MODAL MAPS

Instituto Potosino de Inv...

1. A method for generating binary sequences through a pseudo-random bit generator based on chaos, comprising the following steps:providing a generator block and a validation block;
defining a k-modal map on the generator block; the k-modal map is defined by:
ƒ?=?(dr+1?x)(x?dr),x??r,
generating a set of k independent sequences represented as {x1, x2, x3, x4, . . . xk}, wherein each independent sequence is produced using a dynamic system by a logic unit processing;
combining the k independent sequences to obtain a single sequence (Z);
using the single sequence (Z) as a generator block output;
wherein the set of k independent sequences defines maximal numbers of modals in a family and an interval ?=[a, b] is divided between k subintervals ?0=[d1, d2), . . . , ?k?1=[dk?1, dk], then a system ƒ?is a piecewise function by k; the parameterized family is defined by the following piecewise function
wherein: dr=r/k,(r=0,1,2, . . . , k?1), k is the number of modals, ?=?(k,?) is the bifurcation parameter, ?=1/k is the carrying on capacity; to obtain the maximum value of ? with k modals there is a direct relationship, ?max=4k/?;
entering the generator block output as input on the validation block, the validation block including an encryption algorithm by a stream-cipher;
validating a combined sequence by evaluating the output of the generator to be sure that the sequence is cryptographically secure.

US Pat. No. 10,171,228

RECEIVING CIRCUIT, ELECTRONIC DEVICE, TRANSMISSION/RECEPTION SYSTEM, AND RECEIVING CIRCUIT CONTROL METHOD

Sony Corporation, Tokyo ...

1. A receiving circuit comprising:a timing signal generating unit that generates a plurality of timing signals indicating different timings in synchronization with a timing at which a status of a reception signal transitions;
a first data signal generating unit that generates, each time a predetermined first timing signal among the plurality of timing signals becomes a specific value, a first data signal from statuses of the reception signal before and after a timing at which the predetermined first timing signal becomes the specific value, and outputs the first data signal in synchronization with a second timing signal different from the first timing signal among the plurality of timing signals; and
a second data signal generating unit that generates, each time the second timing signal becomes the specific value, a second data signal from statuses of the reception signal before and after timing at which the second timing signal becomes the specific value, and outputs the second data signal in synchronization with a timing signal different from the first timing signal among the plurality of timing signals.

US Pat. No. 10,171,227

METHOD AND APPARATUS FOR CONFIGURING ONU AS IEEE 1588 MASTER CLOCK IN PON

ALCATEL LUCENT, Boulogne...

1. A method for making Institute of Electrical and Electronics Engineers (IEEE) 1588 protocol master clock configuration for an optical network unit (ONU) in a passive optical network (PON), said method comprising:creating a precision time protocol (PIP) port on a user network interface (UNI) of the ONU, and generating a corresponding PTP port management entity (ME) for the PTP port to indicate that the UNI is operating in a master clock mode;
generating an IEEE 1588 protocol master clock configuration data ME, based on PTP port MEs of all PTP ports in the ONU, to store profiles of all PTP ports used as master clock devices;
generating a clock data set ME, according to the IEEE 1588 protocol master clock configuration data ME, to indicate clock source information of all the PTP ports used as the master clock devices; and
transmitting the IEEE 1588 protocol master clock configuration data ME and the clock data set ME from a PTP port used as a master clock device to corresponding slave clock devices using IEEE 1588 protocol messages.

US Pat. No. 10,171,226

SYSTEMS AND METHODS FOR FREQUENCY DIVISION DUPLEX COMMUNICATION

TCL COMMUNICATION LIMITED...

1. A method of wireless communication using half duplex frequency division duplex, HD-FDD, comprising at a wireless communications device:receiving downlink data during a plurality of downlink subframes; and
transmitting a hybrid automatic repeat request acknowledgement, HARQ-ACK, on an uplink;
wherein the HARQ-ACK relates to downlink data received during at least two of the plurality of downlink subframes and the HARQ-ACK is transmitted during one uplink subframe,
wherein the wireless communications device receives timing data on a downlink channel which indicates a timing association between a downlink data subframe and an uplink transmission subframe for transmitting the HARQ-ACK,
wherein the timing data is received as part of a downlink control indicator in a DCI message which is in DCI format 6-1A.

US Pat. No. 10,171,224

METHOD AND ARRANGEMENT FOR RELAYING IN CASE OF EXTENSION AREAS HAVING UPLINK/DOWNLINK IMBALANCE

Telefonaktiebolaget LM Er...

1. A method in a network node associated with a cell area A and a cell extension area B having an uplink/downlink imbalance in relation to a neighboring base station and the network node, the method comprising:signaling a set of event measurement conditions to a User Equipment (UE), causing the UE to indicate to the network node when an event measurement condition in the set of event measurement conditions is fulfilled, wherein the set of event measurement conditions comprises:
an event measurement condition related to the UE entering or leaving the cell area A, the UE being served in both uplink and downlink in the cell area A; and
an event measurement condition related to the UE entering or leaving the cell extension area B, the UE being served in uplink in the cell extension area B;
based on the indication, determining whether the UE is located in the cell area A or the cell extension area B, wherein the fulfilled event measurement condition defines circumstances, based on measurement values, that trigger the UE to indicate to the network node when any event measurement condition in the set of event measurement conditions is fulfilled;
in response to a determination that the UE is located in the cell area A, serving the UE in both uplink and downlink; and
in response to a determination that the UE is located in the cell extension area B, serving the UE in uplink.

US Pat. No. 10,171,223

METHOD AND APPARATUS FOR DYNAMICALLY ASSIGNING MASTER/SLAVE ROLES WITHIN A DISTRIBUTED ANTENNA DIVERSITY RECEIVER APPARATUS

NXP B.V., Eindhoven (NL)...

15. A method of dynamically assigning master/slave roles within a distributed antenna diversity receiver apparatus; the method comprising:receiving intra-packet channel reliability parameters for a master wireless receiver and for at least one slave wireless receiver, wherein the at least one slave wireless receiver is independent of the master wireless receiver and coupled to the master wireless receiver via a bi-directional communication link,
determining whether to assign a new master receiver for the distributed antenna diversity receiver apparatus based on the received intra-packet reliability parameters, and
if it is determined to assign a new master receiver, dynamically re-assigning the master receiver within the distributed antenna diversity receiver apparatus.

US Pat. No. 10,171,222

METHOD FOR CONFIGURING CQI MEASUREMENT SUBFRAME, BASE STATION, AND USER EQUIPMENT

Huawei Technologies Co., ...

1. A base station, comprising:a transceiver configured to receive an interference neighboring cell identifier of a user equipment (UE) sent by the UE; and
a processor configured to:
obtain almost blank subframe (ABS) configuration information according to the interference neighboring cell identifier of the UE, wherein the ABS configuration information is an ABS configuration of an interference neighboring cell corresponding to the interference neighboring cell identifier; and
configure an ABS measurement subframe and a non-almost blank subframe (NonABS) measurement subframe for the UE according to the ABS configuration information; and
wherein the transceiver is configured to send the ABS measurement subframe and the NonABS measurement subframe to the UE, wherein the ABS measurement subframe is used by the UE to perform first channel quality indicator (CQI) measurement and the NonABS measurement subframe is used by the UE to perform second CQI measurement.

US Pat. No. 10,171,221

SCHEDULING METHOD AND APPARATUS OF MULTI-ANTENNA COMMUNICATION SYSTEM, AND METHOD AND APPARATUS FOR FEEDING-BACK CHANNEL QUALITY INDICATOR

Electronics and Telecommu...

1. A method for feeding back a channel quality indicator (CQI) by a terminal, the method comprising:receiving, from a base station, at least one reference signal through at least one of multiple beams of the base station;
measuring a signal-to-interference plus noise ratio (SINR) for the at least one reference signal;
receiving CQI feed-back mode information from the base station;
deciding the number of bits of a first CQI and an SINR increase range depending on a level of the first CQI based on the CQI feed-back mode information;
determining a first level corresponding to the measured SINR among levels of the first CQI having the decided number of bits and the decided SINR increase range; and
feeding back the first CQ having the first level to the base station,
wherein the first CQ is capable of representing an SINR larger than an SINR which a second CQI is capable of maximally representing, the second CQI being used for data transmission.

US Pat. No. 10,171,220

TERMINAL, BASE STATION, AND COMMUNICATION METHOD

SHARP KABUSHIKI KAISHA, ...

1. A user equipment comprising:a receiver that receives a physical downlink shared channel (PDSCH) or a control channel indicating semi-persistent scheduling (SPS) release on a serving cell;
a processor that generates hybrid automatic repeat request-acknowledgement (HARQ-ACK) feedback bits for the PDSCH or the control channel; and
a transmitter that transmits the HARQ-ACK feedback bits, wherein
the processor determines the HARQ-ACK feedback bits based on a time division duplex (TDD) HARD-ACK reporting procedure for different UL/DL configurations, in a case that (a) the user equipment is configured with more than one serving cell, (b) a frame structure type of each serving cell of the more than one serving cell is a frame structure type 2, and (c) at least two configured serving cells of the more than one serving cell have respective UL/DL configurations which are different from each other,
the processor determines the HARQ-ACK feedback bits based on UL-reference UL/DL configuration belonging to {1, 2, 3, 4, 6} and the TDD HARQ-ACK reporting procedure, in a case that (a) the user equipment is configured with more than one serving cell, (b) frame structure types of any two configured serving cells are different, (c) a primary cell is a frame structure type 2, (d) the serving cell is a frame structure type 1, (e) downlink(DL)-reference uplink(UL)/DL configuration of the two configured serving cells belongs to {0,1,2,3,4,6}, and (f) a physical uplink control channel (PUCCH) format 1b with channel selection is configured for a transmission of the HARQ-ACK feedback bits for the serving cell and the primary cell.

US Pat. No. 10,171,219

METHOD AND APPARATUS FOR ENCODING AND PROCESSING ACKNOWLEDGEMENT INFORMATION

HUAWEI TECHNOLOGIES CO., ...

1. A method for encoding acknowledgement information, comprising:receiving at least one component carrier, wherein each component carrier in the at least one component carrier comprises at least one downlink subframe;
generating acknowledgement information bits corresponding to the each component carrier according to the each component carrier;
ordering the acknowledgement information bits corresponding to the each component carrier according to a maximum value DAI_max of a downlink assignment index (DAI) field in downlink control information (DCI) which is received on the each component carrier and used for controlling physical downlink shared channel (PDSCH) transmission or indicating downlink semi-persistent scheduling (SPS) release and the number N_sps of physical downlink shared channels (PDSCHs) scheduled by the SPS in the at least one downlink subframe;
alternately assigning the ordered acknowledgement information bits corresponding to the each component carrier to two groups, and obtaining two groups of acknowledgement information bits; and
encoding the two divided groups of acknowledgement information bits to obtain two groups of codeword bits, respectively, and generating a total codeword bits to be transmitted, from the two groups of codeword bits obtained by the encoding;
wherein the ordering the acknowledgement information bits corresponding to the each component carrier according to the DAI_max and the N_sps comprises:
placing acknowledgement information bits into last N_sps×a bit positions, with the acknowledgement information bits corresponding to N_sps PDSCHs scheduled by semi-persistent scheduling;
placing acknowledgement information bits into first DAI_max×a bit positions, with the acknowledgement information bits corresponding to downlink subframes corresponding to DCI of DAI=1 to DAI=DAI_max; and
setting the remaining (D×a?(DAI_max+N_sps)×a) acknowledgement information bits to ‘0’;
wherein the a is a bit number of acknowledgement information bits corresponding to each of the downlink subframes and the D is a number of downlink subframes for which the acknowledgement information bits need to be generated.

US Pat. No. 10,171,218

METHOD FOR ESTIMATING SIGNAL QUALITY OF TRANSMISSION TO A USER EQUIPMENT FROM A TRANSMISSION POINT

Telefonaktiebolaget LM Er...

1. A method performed by a network node for enabling transmissions to a user equipment (UE) from transmission points (TPs) in a coordination cell area in a radio communications network, the method comprising:configuring two or more TPs in the coordination cell area not currently serving the UE to transmit signals on interference measurement (IM) resources of two or more Channel State Information (CSI) processes of the UE according to three or more different interference states;
receiving, from the UE, CSI reports based on the transmitted signals on the IM resources of the two or more CSI processes of the UE;
estimating one signal quality value for each of the three or more different interference states of the transmitted signals and at least one further signal quality value corresponding to at least one interference state that is not part of the three or more different interference states of the transmitted signals, based on the received CSI reports of the two or more CSI processes;
one or more of scheduling coordinated transmissions to the UE from TPs in the coordination cell area and selecting transmission configuration settings for TPs in the coordination cell area, using the estimated signal quality values; and
performing coordinated transmissions to the UE from one or more TPs of the coordination cell area.

US Pat. No. 10,171,217

ENHANCED SRS FOR MASSIVE MIMO CHANNEL ESTIMATION

RF DSP INC., Irvine, CA ...

1. A method for multiplexing a plural of UEs on the same resource element, comprising:using SRS transmission to estimate the uplink channel coefficients of each UE and to implement Time Offset and Frequency Offset (TO and FO) compensation in a MU-MIMO wireless communication system; wherein NSRS (NSRS?1) symbols (SRS symbols) are reserved specially for SRS transmission in an uplink subframe; and
the method further comprising dividing the Nuse useable subcarriers of a SRS symbol into MComb (MComb?1) non-overlap sets or combs, where KUE1 (KUE1?1) are multiplexed on a comb through code division multiplexing (CDM), frequency division multiplexing (FDM), or a combination of these two multiplexing methods.

US Pat. No. 10,171,216

DOWNLINK CONTROL FOR DEMODULATION REFERENCE SIGNAL TRANSMISSIONS

Qualcomm Incorporated, S...

1. A method of wireless communication, comprising:receiving, by a first user equipment (UE), a first content during a first transmission time interval (TTI), the first content including at least a control region which includes a demodulation reference signal (DMRS), a location of the DMRS being defined by either a closed-loop precoding structure or an open-loop precoding structure, a duration of the first TTI being shorter than 1 ms, the control region further including a downlink (DL) grant for a second TTI, and the DL grant allocating both control and data regions associated with the second TTI for DL data reception;
demodulating the control region based at least on the DMRS;
receiving DL data during the second TTI; and
demodulating the DL data using the DMRS received in the first TTI.

US Pat. No. 10,171,215

SEGREGATING UES AMONG CARRIERS TO HELP FACILITATE OPERATION IN LEAN-CARRIER MODE

Sprint Spectrum L.P., Ov...

1. A method operable in a base station (BS) that provides service at least on a particular carrier, wherein the BS is configured to operate in a legacy mode in which the BS engages in a particular extent of reference signaling on the particular carrier, wherein the BS is also configured to operate in a lean-carrier mode in which the BS engages in a reduced extent of reference signaling on the particular carrier, wherein the reduced extent is less than the particular extent, and wherein the BS operates in the lean-carrier mode when bearer data is not being communicated on the particular carrier, the method comprising:of a plurality of user equipment devices (UEs) served by the BS, identifying, by the BS, one or more UEs based on each of the one or more UEs communicating bearer data less frequently than a threshold frequency of bearer data communication; and
serving, by the BS, just the identified one or more UEs on the particular carrier, thereby increasing a probability of the BS operating in the lean-carrier mode.

US Pat. No. 10,171,214

CHANNEL STATE INFORMATION FRAMEWORK DESIGN FOR 5G MULTIPLE INPUT MULTIPLE OUTPUT TRANSMISSIONS

1. A network node device, comprising:a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising:
based on a signal received from a user equipment indicating that the user equipment has decomposed a multiple input multiple output channel into multiple domains comprising at least an H domain and a V domain related to a co-variance between correlated antenna elements, and a U domain related to a co-phasing between multiple antenna sub-groups, configuring channel state information reference signal resources for the user equipment to measure the multiple domains;
transmitting a message to the user equipment indicating the channel state information reference signal resources for the user equipment to facilitate measurement of the multiple domains, wherein the message comprises a group of feedback formats;
transmitting a channel state information reference signal using the channel state information reference signal resources configured for the multiple domains;
receiving feedback from the user equipment, wherein the feedback comprises a feedback format selected from the group of feedback formats; and
based on a decoding of the feedback, determining a transmission parameter comprising a transmission protocol for transmissions between the network node device and the user equipment.

US Pat. No. 10,171,213

COMMUNICATION DEVICE AND METHOD FOR PERFORMING RADIO COMMUNICATION

Intel IP Corporation, Sa...

1. A communication device, comprising:a radio frequency circuit configured to receive and transmit radio frequency signals;
a processing circuit configured to process network information;
a memory circuit configured to transmit a first network information to the processing circuit; and
a subscriber identity module configured to transmit a second network information to the processing circuit,
wherein the processing circuit is configured to select a first network based on the first network information and to register information associated with the communication device at a second network based on comparing the second network information to the first network information.

US Pat. No. 10,171,212

METHOD AND DEVICE FOR PERFORMING CHANNEL ESTIMATION

LG Electronics Inc., Seo...

1. A method for performing channel state reporting on a downlink channel transmitted through M two-dimensionally arranged antenna ports, the method implemented by a user equipment (UE) and comprising:receiving a channel state information-reference signal (CSI-RS) configuration for N virtual antenna ports formed by applying beamforming to each vertical antenna group of the M two-dimensionally arranged physical antenna ports matrix;
calculating channel state information (CSI) about the downlink channel using the received CSI-RS configuration; and
reporting the CSI to a serving cell associated with the UE,
wherein the reported CSI comprises information about rotational transformation of a first codeword in a codebook for a combination of Q unit vectors orthogonal to each other in an N-dimensional space,
wherein the reported CSI further comprises an indicator indicating whether the rotational transformation to be applied overlaps with a previous rotational transformation, and
wherein N and Q are integers satisfying 2?Q?N, and M is an integer satisfying 2?M.

US Pat. No. 10,171,211

WIRELESS COMMUNICATION SYSTEM AND METHOD, AND WIRELESS COMMUNICATION APPARATUS

PIONEER CORPORATION, Kan...

1. A wireless communication system comprising:a first apparatus and a second apparatus that perform wireless communication with each other,
wherein the first apparatus sends a first reference signal, and starts signal transmission to the second apparatus with a first period from a time point at which a first offset time passes from sending the first reference signal,
the second apparatus starts signal transmission to the first apparatus with the first period from a time point at which a second offset time, which is different from the first offset time, passes from sending the first reference signal, and
the first apparatus transmits a signal indicating a time obtained by adding the first offset time and a fixed time, which is shorter than one period of the first period, as the second offset time to the second apparatus before starting the signal transmission.

US Pat. No. 10,171,210

METHOD AND DEVICE FOR SPECTRUM COMB SIGNALING NOTIFICATION AND FOR SOUNDING REFERENCE SIGNAL TRANSMISSION

1. A spectrum comb signaling notification method, comprising:a network side configuring and notifying a receiving side of a two-layer spectrum comb signaling, including a first spectrum comb signaling and a second spectrum comb signaling, and the two-layer spectrum comb signaling indicating subcarrier positions of transmitting sounding reference signals to the receiving side;
wherein the method further comprises: performing joint encoding on a repetition factor and a spectrum comb value to generating the second spectrum comb signaling;
wherein the first spectrum comb signaling is used to instruct a first user at the receiving side to determine the subcarrier positions of transmitting the sounding reference signals, and the second spectrum comb signaling is used to instruct a second user at the receiving side to determine the subcarrier positions of transmitting the sounding reference signals;
wherein the second spectrum comb signaling is a 3-bit high layer signaling, and an attribute of the 3-bit high layer signaling is UE-specific;
wherein the second spectrum comb signaling instructs the second user to occupy subcarrier positions whose subcarrier indexes are a multiple of 2, a multiple of 2 plus 1, a multiple of 4, a multiple of 4 plus 1, a multiple of 4 plus 2, or a multiple of 4 plus 3 within a sounding signal bandwidth.

US Pat. No. 10,171,209

METHOD FOR COMMUNICATING MEDIA DATA BETWEEN TWO DEVICES INCORPORATING EFFECTIVENESS OF ERROR CORRECTION STRATEGIES AND ASSOCIATED COMPUTER PROGRAM, COMMUNICATION QUALITY MODULE AND DEVICE

1. A method for communicating multimedia data betweena first device and a second device over a network, the method comprising:
repeatedly generating multimedia data via a first device, the multimedia data comprising audio data and/or video data;
sending said multimedia data to a second device;
repeatedly receiving from the second device quality data representative of the quality of the communication between the first and second devices;
applying, via the first device, at least one current error correction strategy selected from a group of error correction strategies in order to increase the quality of the communication between the first and second devices; and
evaluating the effectiveness of each current error correction strategy on the quality of the communication between the two devices as a function of newly received quality data, wherein the first device keeps track of a strategy counter for each of the current error correction strategies, the strategy counter of a given error correction strategy being incremented at least when a packet loss for the multimedia data sent by the first device is above a chosen threshold.

US Pat. No. 10,171,208

DYNAMIC ERROR CORRECTION PROCEDURES

Verizon Patent and Licens...

1. A base station, comprising:a non-transitory computer-readable medium storing a set of processor-executable instructions; and
one or more processors configured to execute the set of processor-executable instructions, wherein executing the set of processor-executable instructions causes the one or more processors to:
monitor network conditions corresponding to a Radio Access Network (RAN), of a wireless telecommunications network, to which the base station corresponds, wherein the monitored network conditions include at least one of:
a quantity of user equipment (UEs) connected to the base station, or
a quantity of connections between the UEs and the base station;
transmit information to a particular UE connected to the base station;
receive a notification, from the particular UE, that the particular UE failed to receive the information,
wherein the notification from the particular UE includes a request to retransmit the information that the particular UE failed to receive,
wherein the request from the particular UE corresponds to at least one of:
a Hybrid Automatic Repeat Request (HARQ) procedure,
a Forward Error Correction (FEC) procedure, or
a channel coding procedure;
determine an appropriate error correction policy, from a plurality of error correction policies, based on whether the network conditions exceed a threshold representing a level of network activity associated with the RAN;
when the network conditions exceed the threshold, implement a first error correction policy that includes instructions to retransmit information, corresponding to failed transmissions, in accordance with:
a service requirement associated with each failed transmission, and
an availability of network resources to retransmit information corresponding to the failed transmissions;
when the network conditions does not exceed the threshold, implement a second error correction policy that includes instructions to enhance the efficiency with which the information, corresponding to the failed transmissions, is retransmitted by allocating additional network resources to the retransmission of the information corresponding to the failed transmissions, wherein the second error correction policy is selected without regard to the service requirement associated with the failed transmissions; and
retransmit the information, corresponding to the notification, in accordance with the first error correction policy or the second error correction policy.

US Pat. No. 10,171,207

METHODS AND APPARATUS FOR CONTROL BIT DETECTION

Cavium, LLC, Santa Clara...

1. A method of detecting control bit information from a user equipment (UE) via a communication network which includes at least one radio tower, switching network, and a control bit detector (CBD), wherein the CBD includes a threshold generator, a control bit log-likelihood ratio (LLR) input interface, a processor, and an output register, the method comprising:receiving, at the control bit LLR input interface, an LLR sequence (l) that includes P control bits;
calculating, at the processor, a sum of LLR squares parameter (L) associated with the LLR sequence;
generating a (Vp) value for each of 2P combinations of the control bits, wherein each Vp value is computed based on a new sequence and the LLR sequence;
determining, by the processor, a smallest value of Vp; and
outputting, by the CBD, a determination that a control bit combination was received if the smallest value of Vp is less than a threshold value (THD) multiplied by the parameter L.

US Pat. No. 10,171,206

METHODS AND APPARATUSES FOR REFRAMING AND RETRANSMISSION OF DATAGRAM SEGMENTS

1. A source device for sending datagrams contained in an aggregated packet structure comprising transport containers each containing a segment of a respective datagram, the source device comprising:a transmitter, the transmitter comprising:
a detector circuit configured to obtain information if a transmission of a transport container by the transmitter has failed;
a disassembler circuit configured to disassemble the transport container in which transmission has failed; and
a container creator circuit configured to create a plurality of new transport containers, the new transport containers to include at least one of fragments or portions of the datagram segment contained in the transport container in which transmission has failed,
wherein the transmitter is configured to send sequence information indicating a conversion between a sequence of the transport containers of the aggregated packet structure comprising the transport container in which transmission has failed and a sequence of the transport containers of the aggregated packet structure comprising the new transport containers,
wherein the source device is configured to reformat and retransmit datagrams in which transmission has failed, wherein the reformatting is performed without splitting datagrams, and
wherein the source device is further configured to:
notify a destination device that the reformatted datagram segments have been reformatted and are ready to be transmitted using the transmitter,
receive notification from the destination device that the destination device can accept the reformatted datagram segments, and
thereafter transmit the reformatted datagram segments to the destination device using the transmitter.

US Pat. No. 10,171,205

SPACE TIME LABELLING TECHNIQUE FOR WIRELESS COMMUNICATION SYSTEMS

University of Kwazulu-Nat...

1. A transmitter for a wireless communications system for implementing space-time labelling diversity for uncoded conventional modulation, the transmitter including:a first bit mapper;
a second bit mapper which is different to the first bit mapper;
a first transmitter;
a second transmitter; and
a processor connected to the first and second mappers and the first and second transmitters, the processor controlling these to:
receive two bit streams and simultaneously feed these into the first mapper and the second mapper, wherein the first mapper maps these into first and second mapped bit streams and the second mapper maps these into third and fourth mapped bit streams which are different from the first and second mapper bit streams;
transmit the first mapped bit stream in a first time slot via the first transmitter;
transmit the second mapped bit stream in the first time slot via the second transmitter;
transmit the third mapped bit stream in a second time slot via the second transmitter; and
transmit the fourth mapped bit stream in a second time slot via the first transmitter.

US Pat. No. 10,171,204

CODED BIT PUNCTURING FOR POLAR CODES

MEDIATEK INC., Hsinchu (...

1. A method for polar code puncturing in a wireless communication system, comprising:receiving information bits;
encoding the information bits to generate a first polar code including a sequence of N coded bits, the sequence of N coded bits having indices {0, . . . , N?1} and including at least a first block of coded bits having indices {0, . . . , i?1}, a second block of coded bits having indices {i, . . . , i+k?1}, a third block of coded bits having indices {i+k, . . . , i+k+k?1};
interleaving the second block of coded bits with the third block of coded bits to form a rearranged sequence of coded bits including the N coded bits;
extracting the last M coded bits from the rearranged sequence of coded bits to generate a punctured code having a length of M, wherein M is a code length determined according to allocated transmission resources; and
generating a signal modulated by the punctured code.

US Pat. No. 10,171,203

APPARATUS AND METHOD FOR RECEIVING SIGNAL IN COMMUNICATION SYSTEM SUPPORTING LOW DENSITY PARITY CHECK CODE

Samsung Electronics Co., ...

1. A method for reducing memory access when receiving a signal by a physical electronic signal receiving apparatus in a communication system supporting a low density parity check (LDPC) code, the physical electronic signal receiving apparatus including a receiver, a processor, a low power LDPC decoder, and a plurality of non-transitory computer readable recordable memories, the processor being configured to control the receiver, the low power LDPC decoder and the plurality of non-transitory computer readable recordable memories, the method comprising:receiving, via the receiver, a signal; and
performing, via the low power LDPC decoder, an LDPC decoding operation for the received signal,
wherein performing, via the low power LDPC decoder, the LDPC decoding operation comprises:
detecting, via the low power LDPC decoder, non-zero matrices among M x N sub-matrices included in a first parity check matrix;
generating, via the low power LDPC decoder, a second parity check matrix including the non-zero matrices;
grouping, via the low power LDPC decoder, the non-zero matrices into a plurality of groups, each of the plurality of groups including a preset number of non-zero matrices included in each block column of the first parity check matrix;
storing, via the low power LDPC decoder, the plurality of groups to the plurality of non-transitory computer readable recordable memories in the physical electronic signal receiving apparatus, respectively, a number of regions included in each of the plurality of non-transitory computer readable recordable memories being equal to a number of non-zero matrices included in a corresponding group of the plurality of groups;
updating, via the low power LDPC decoder, check node to variable node messages (check-to-variable messages) corresponding to at least one nonzero matrix having a same block column stored in each of the plurality of non-transitory computer readable recordable memories; and
simultaneously updating, via the low power LDPC decoder, variable node to check node messages (variable-to-check messages) using the updated check-to-variable messages.

US Pat. No. 10,171,202

DIVERSITY REPETITION IN MIXED-RATE WIRELESS COMMUNICATION NETWORKS

QUALCOMM Incorporated, S...

1. A method of wireless communication, comprising:generating, at a wireless device, a packet comprising a plurality of symbols;
segmenting an input bit vector into a plurality of symbol vectors according to one of a sequential or distributed segmentation procedure;
splitting each of the plurality of symbol vectors into two or more split vectors according to one of:
allocating sequential groups of N/R input bits to each split vector in turn, where N is a number of bits per symbol, R is a repetition factor, and the N/R input bits in each split vector are ordered based at least in part on the symbol vector; and
allocating each bit of each symbol vector to an I modulo Rth split vector, where R is the repetition factor, I is an index number of each bit, and each I modulo Rth split vector comprises bits associated with a matching I modulo R value;
mapping each of the split vectors into the plurality of symbols according to one of a block-level repetition or a symbol-level repetition; and
transmitting the packet.

US Pat. No. 10,171,201

METHOD AND APPARATUS FOR TRANSMITTING DATA

ELECTRONICS AND TELECOMMU...

1. A computer implemented method of transmitting data, the method comprising:initializing an index of a modulation and coding scheme (MCS) for transmitting data to a terminal;
adjusting, by a processor, the index of the MCS based on at least one of a hybrid automatic repeat request (HARQ) feedback of the terminal and a channel quality of the terminal; and
transmitting the data to the terminal based on the adjusted index of the MCS, wherein adjusting the index of the MCS is performed by
determining an index of a first MCS based on the HARQ feedback;
determining an index of a second MCS based on the channel quality of the terminal; and
determining the index of the MCS based on the index of the first MCS and the index of the second MCS, and wherein
determining the index of the MCS based on the index of the first MCS and the index of the second MCS comprises determining the index of the MCS based on sum of a first weight predetermined for the index of the first MCS and a second weight predetermined for the index of the second MCS.