US Pat. No. 10,341,319

UTILIZING A CUSTOMIZED DIGITAL FONT TO IDENTIFY A COMPUTING DEVICE

ADOBE INC., San Jose, CA...

1. In a digital medium environment for managing digital assets, a method of utilizing electronic fonts to securely identify and authenticate computing devices seeking to access digital assets, comprising:generating, by at least one server device storing client information corresponding to a computing device, a customized digital font unique to the computing device for authenticating the computing device by changing a first character order of a base digital font to a second character order specific to the computing device;
sending the customized digital font from the at least one server device to the computing device;
upon receiving, by the at least one server device, a request for the client information from the computing device, authenticating the computing device based on the computing device utilizing the customized digital font by:
sending a second request to the computing device to render a textual element utilizing the customized digital font;
identifying the textual element by capturing an image of the textual element rendered by the computing device via a web browser; and
determining that the textual element rendered by the computing device via the web browser uses the customized digital font by applying an optical character recognition algorithm to the image of the textual element rendered by the computing device and comparing the textual element with a reference text generated utilizing the customized digital font; and
in response to authenticating the computing device based on the customized digital font, providing the client information corresponding to the computing device from the server device to the computing device.

US Pat. No. 10,341,318

SKILL-BASED SECURE DYNAMIC CONTACT CENTER AGENT ACCESS

Avaya Inc., Santa Clara,...

1. A method comprising:providing a virtualized network infrastructure, wherein the virtualized network infrastructure comprises a plurality of virtual service networks;
assigning a service instance identifier (ISID) to each of a plurality of skills, wherein each of the ISIDs corresponds to a respective one or more of the plurality of virtual service networks and effective to identify VLAN/VRF traffic across the virtualized network infrastructure;
obtaining, at a processor, configuration information of a call center, wherein the configuration information includes one or more service instance identifiers (ISIDs) each associated with a respective skill, wherein each ISID corresponds to a secure virtual service network associated with the respective skill;
detecting, at the processor, an authenticated agent logon of an agent from an agent device, wherein the authenticated agent logon is a logon to the call center;
retrieving, at the processor, agent skill information from skill group information, wherein the agent skill information corresponds to the agent;
determining, at the processor, based on the agent skill information, one or more secure virtual service networks to permit the agent device to access, wherein the one or more secure virtual service networks are associated with a respective customer identifier and one or more of the ISIDs, wherein the ISID associated with each of the one or more secure virtual service networks that the agent device is permitted to access corresponds to a skill that matches the agent skill information; and
connecting, at the processor, the agent device to access the one or more secure virtual service networks associated with the respective customer identifier using one or more of the ISIDs corresponding to one or more skills matching the agent skill information.

US Pat. No. 10,341,317

SYSTEMS AND METHODS FOR IMPLEMENTING A PERSONALIZED PROVIDER RECOMMENDATION ENGINE

1. A system for making personalized provider recommendations in related categories, the system comprising:a network attached hardware storage configured to store:
a plurality of entity categories, each entity category indicating at least one of a type of good and a type of service offered by a provider, and providers from different entity categories offer different types of goods or different types of services;
a plurality of provider specific profiles, each provider specific profile including an associated provider and at least one associated entity category from the plurality of entity categories;
a plurality of category relationships, each category relationship indicating that two or more entity categories from the plurality of entity categories are related; and
a plurality of user accounts, each user account including associated authentication data and associated user profile data;
a user interface configured to:
receive authentication information from a user;
transmit the authentication information to a computer server system;
receive context information indicating at least one of a current condition or an attribute of an environment of the user;
transmit the context information to the computer server system;
receive a plurality of providers from the computer server system; wherein the plurality of providers is personalized to the user; and
display the plurality of providers; and
the computer server system being communicatively coupled to the network attached storage and the user interface, the computer server system being configured to:
receive the authentication information from the user interface;
identify a first user account from the plurality of user accounts based on the authentication information;
compare the authentication information with a first authentication data that is associated with the first user account;
authenticate the user based on the comparison of the authentication information with the first authentication data;
receive the context information from the user interface, the context information comprises a determined geographic location, of the user, determined by a mobile device of the user;
identify a first entity category from the plurality of entity categories based on the context information;
identify a first category relationship from the plurality of category relationships based on the first entity category, the first category relationship indicating that the first entity category and a second entity category are related, wherein the second entity category is different from the first entity category;
select a first provider specific profile from the plurality of provider specific profiles based on first user profile data that is associated with the first user account, wherein the first provider specific profile is associated with the first entity category;
select a second provider specific profile from the plurality of provider specific profiles based on the first user profile data, wherein the second provider specific profile is associated with the second entity category;
transmit to the user interface, a first provider associated with the first provider specific profile and a second provider associated with the second provider specific profile, wherein the first provider and the second provider are different providers;
process a content provisioning management layer engine to provide an intermediary content interface for the first provider and the second provider to manage intermediary content transmitted by an intermediary system to the user interface on behalf of the first provider and the second provider where the content provisioning management layer engine analyzes the intermediary content transmitted and based on the analysis assigns the intermediary system to one or more of a specific category and a general category, to thereby provide a central management for intermediary content information transmitted between the first and second providers, the intermediary system and the user interface; and
in response to transmitting the first and second providers to the user interface, adjust the user interface to lower resolution of the user interface and computational resources required to display the transmitted providers on the mobile device of the user.

US Pat. No. 10,341,316

INJECTING CREDENTIALS INTO WEB BROWSER REQUESTS

AVAST SOFTWARE S.R.O., P...

1. A method comprising:determining that a form includes a password field for a server application, wherein the form is displayed within a tab or a window of a browser executing on a device;
requesting a password for the server application from a password manager, wherein the password manager is executed on the device and includes a request interceptor;
receiving data from the password manager responsive to the request, wherein the data is not the actual password for the server application, and wherein the password manager maintains an internal reference associating the data with the actual password for the server application;
creating a password proxy from the data;
filling in the password field with the password proxy;
issuing, by the browser, a login request containing the password proxy, wherein an intended address of the login request is a server hosting the server application;
intercepting, by the request interceptor on the device, the login request containing the password proxy that is intended for the server application;
determining, by the request interceptor on the device, the actual password for the server application by reversing the password proxy to obtain the data from which the password proxy was created and obtaining the actual password from the internal reference associating the data with the actual password;
replacing, by the request interceptor on the device, the password proxy with the actual password in the login request;
forwarding, by the request interceptor on the device, the login request including the actual password to the server application; and
deleting the data received from the password manager and the password proxy in response to determining that the tab or the window of the browser within which the form is displayed has closed.

US Pat. No. 10,341,315

MANAGEMENT OF ACCESS SESSIONS

AIRWATCH LLC, Atlanta, G...

1. A computer-implemented method for providing an access session for at least one application, the computer-implemented method comprising:generating a key for the access session based on a code obtained through a user interface, wherein the key decrypts data stored in a data store of a client device;
encrypting the key based on a boot time that represents a latest time the client device was booted, wherein the boot time and the key are applied as inputs to an encryption algorithm;
storing the key in secured storage of the client device, wherein the secured storage is accessible by the at least one application based on a developer certificate; and
accessing the data based on the key.

US Pat. No. 10,341,314

METHOD OF SECURITY AND VERIFIABILITY OF AN ELECTRONIC VOTE

ELECTION-EUROPE, Boulogn...

1. A method of securing and verifying an electronic vote, the method being implemented by at least one processing device, the method comprising the steps of:receiving a temporary voting ballot from a voting entity, the temporary voting ballot being encrypted by a public voting encryption key;
receiving one or more validation voting ballots from the voting entity for the temporary voting ballot, the one or more validation voting ballots each being encrypted by a public validation encryption key, of one or more public validation encryption keys, the one or more public validation encryption keys each being different from the public voting encryption key;
decrypting the one or more validation voting ballots using one or more respective private validation encryption keys corresponding to the one or more public validation encryption keys used to encrypt the one or more respective validation voting ballots; and
sending a validation request generated based on the one or more decrypted validation voting ballots to the voting entity,
wherein upon receiving, from the voting entity, a validation of the validation request, the encrypted temporary voting ballot is registered as a definitive voting ballot to be counted without having been decrypted and the one or more validation voting ballots are eliminated.

US Pat. No. 10,341,313

PERIPHERAL DEVICE, WIRELESS COMMUNICATION CHIP, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM HAVING APPLICATION PROGRAM STORED THEREIN, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD

Nintendo Co., Ltd., Kyot...

1. A peripheral device capable of performing data communication with an authentication service via a predetermined intermediary communication device, the peripheral device comprising a processor and a communications interface connected to the processor, the processor and communications interface configured to:transmit, to the authentication server, an encryption key for encrypted communication, identification information which is information capable of uniquely identifying the peripheral device, and signature information which is a digital signature of the identification information;
receive, from the authentication server, first data which is data based on a result of an authentication process executed in the authentication server on the basis of the identification information and the signature information transmitted by the first communication section, then, encrypt, with the encryption key, request information indicating a transmission request for second data, and transmit the encrypted request information to the authentication server;
receive the second data encrypted and transmitted from the authentication server in response to the request information transmitted by the second communication section, then, decrypt the encrypted second data by use of the encryption key, and transmit the decrypted second data to the authentication server; and
receive, from the authentication server, third data which is data based on a result indicating that authenticity of the second data transmitted by the third communication section has been confirmed in the authentication server, and then execute a communication process using fourth data encrypted with the encryption key, between the peripheral device and the predetermined communication device,
wherein the processor and communications interface are configured to use the same encryption key to (a) encrypt the request information indicating a transmission request for second data, (b) decrypt the encrypted second data and (c) use the encrypted fourth data.

US Pat. No. 10,341,312

CONTENT MANAGEMENT

Nokia Technologies Oy, E...

1. An apparatus comprising:at least one secure integrated component configured to store at least two credentials, each of the at least two credentials comprising a cryptographic key which enables decryption of content, and
at least one processing core configured to cause a first one of the at least two credentials to be employed to decrypt a first encrypted media stream to produce a first decrypted media stream, to cause a second one of the at least two credentials to be employed to decrypt a second encrypted media stream to produce a second decrypted media stream, and to cause the first decrypted media stream be provided to a first rendering device over a first secured tunnel connection, wherein an endpoint of the first secured tunnel connection resides in the apparatus, and to cause the second decrypted media stream to be provided to a rendering device over a second secured tunnel connection.

US Pat. No. 10,341,311

COMMUNICATION DEVICE FOR IMPLEMENTING SELECTIVE ENCRYPTION IN A SOFTWARE DEFINED NETWORK

Schweitzer Engineering La...

1. A communication device configured to selectively encrypt data in a software defined network (SDN), the communication device comprising:a data bus;
a communication interface in communication with the data bus, the communication interface configured to receive a plurality of unencrypted data packets originating from a data producing device in an electric power system;
an SDN controller communication subsystem in communication with the data bus and configured to:
receive from an SDN controller a first criterion used to identify a subset of the plurality of unencrypted data packets to be encrypted;
an encryption subsystem configured to generate an encrypted data payload from an unencrypted data payload based on an encryption key;
a packet processing subsystem configured to:
identify unencrypted data packets to be encrypted based on the first criterion and comprising unencrypted routing information and an unencrypted payload;
selectively parse each identified data packet to extract the unencrypted routing information and the unencrypted data payload;
pass the unencrypted data payload to the encryption subsystem;
generate an encrypted data payload using the encryption key;
receive the encrypted data payload from the encryption subsystem;
generate a substitute packet comprising the unencrypted routing information and the encrypted data payload; and
transmit the substitute packet to a data consuming device in the electric power system using the unencrypted routing information via the communication interface;
wherein the first criterion comprises a determination that a first physical location at which the data consuming device identified by the routing information is separated from a second physical location at which the communication device is located;
wherein the encryption subsystem is further configured to generate a hash message authentication code (HMAC) and to append the HMAC code to the substitute packet; and
wherein the communication device is configured for use in a network that provides end-to-end encryption between the data producing device and the data consuming device that each lack encryption capabilities.

US Pat. No. 10,341,310

SYSTEM FOR AUTHENTICATING USERS USING MULTIPLE FACTORS

OROCK TECHNOLOGIES, INC.,...

1. A system for authenticating a user comprising:an encryption key management system configured to store a plurality of encryption keys; and
a monitoring server coupled to the encryption key management system, the monitoring server configured with specific computer-executable instructions to at least:
receive a first vein ID and a first key ID from a user device, wherein the first key ID references a first encryption key stored in the encryption key management system,
receive a username and password combination from a second user device,
receive behavioral data captured by the second user device as the user enters the username and password combination,
transmit the first key ID to the encryption key management system,
receive the first encryption key from the encryption key management system,
retrieve an encrypted second vein ID,
decrypt the encrypted second vein ID using the first encryption key to generate a decrypted second vein ID,
authenticate a user associated with the user device at least partly by determining that the decrypted second vein ID matches the first vein ID, that the received username and password combination matches a stored username and password combination, and that the received behavioral data matches stored behavioral data,
transmit an indication to the encryption key management system that the user is authenticated,
receive a second key ID and a second encryption key from the encryption key management system, wherein the second key ID references the second encryption key,
re-encrypt the decrypted second vein ID using the second encryption key, and
transmit the re-encrypted second key ID to the user device for storage on a storage device.

US Pat. No. 10,341,309

CRYPTOGRAPHICALLY PROTECTING DATA TRANSFERRED BETWEEN SPATIALLY DISTRIBUTED COMPUTING DEVICES USING AN INTERMEDIARY DATABASE

Allstate Insurance Compan...

1. A method comprising:receiving, at a first computing device and from a plurality of sensors, sensor data;
processing, by the first computing device, the sensor data to generate processed data;
encrypting, by the first computing device and using a first encryption key associated with the first computing device, the processed data to generate first encrypted data;
transmitting, by the first computing device and to an intermediary database, the first encrypted data encrypted using the first encryption key;
after receiving a selection, by a second computing device, of the first encrypted data, receiving, by the first computing device and from the second computing device, a second encryption key associated with the second computing device, wherein the receiving the selection of the first encrypted data comprises:
transmitting, by the first computing device and to the second computing device, a third encryption key, wherein the third encryption key comprises a public key associated with the first computing device, and
receiving, by the first computing device, an encrypted incentive encrypted using the third encryption key, wherein the incentive comprises data exchanging for the sensor data;
responsive to the selection of the first encrypted data, receiving, at the first computing device and from the intermediary database, the first encrypted data;
decrypting, by the first computing device and using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data;
decrypting, by the first computing device and using a private key corresponding to the public key associated with the first computing device, the encrypted incentive;
encrypting, by the first computing device and using the second encryption key, the decrypted data to generate second encrypted data, wherein the incentive is associated with the second encrypted data encrypted using the second encryption key; and
transmitting, by the first computing device, via the intermediary database, and to the second computing device, the second encrypted data for the second computing device to decrypt and use.

US Pat. No. 10,341,308

METHOD FOR TRANSMITTING INFORMATION FROM A FIRST INFORMATION PROVIDER TO A SECOND INFORMATION PROVIDER VIA AN INFORMATION INTERMEDIARY

Proximic, LLC., Reston, ...

1. A method for transmitting information from a first information provider to a second information provider via an information intermediary, the method comprising:receiving, at a first point in time and at the information intermediary, first information from the first information provider;
generating a plurality of different types of data regarding the first information, wherein the plurality of different types of data regarding the first information are two or more of an extract of the first information, a summary of the first information, one or more keywords, one or more categories, other meta data about or from the first information, and a compression of the first information;
associating and storing the plurality of different types of data regarding the first information with a unique identifier of the first information;
receiving, at a second point in time that is after the first point in time and at the information intermediary, a token comprising the unique identifier of the first information and an identifier of the type of data regarding the first information;
retrieving, based on the unique identifier of the first information and the identifier of the type of data regarding the first information, the data regarding the first information of the type indicated in the token; and
transmitting, from the information intermediary, at least part of the data regarding the first information of the type indicated in the token to the second information provider.

US Pat. No. 10,341,307

METHOD AND SYSTEM FOR SECURE DOCUMENT EXCHANGE

International Business Ma...

1. A method of protecting a document at a first computing machine, comprising:instrumenting an application of the first computing machine by hooking a document protection mechanism directly to the application independent of an operating system layer, the document protection mechanism having a document protection mechanism interface, wherein the application has at least one native function to which the document protection mechanism interface is coupled to instrument the application, thereby transforming the application to provide a secure document exchange function between the first computing machine and a second computing machine located remote from the first computing machine; and
upon a given occurrence that executes the native function and, using the document protection mechanism interface, invoking an encryption utility to encrypt the document prior to its transfer to and receipt at the second computing machine, the encryption utility located in a processing environment distinct from the first computing machine and configured to encrypt the document according to a policy;
wherein the application is a document management application.

US Pat. No. 10,341,305

ENCRYPTED COMMUNICATIONS METHOD AND COMMUNICATIONS TERMINAL, AND COMPUTER STORAGE MEDIUM

Sanechips Technology Co.,...

1. An encrypted communication method, comprising:reading, by a source communication terminal, an encryption algorithm and an index of the encryption algorithm from a first Near Field Communication (NFC) security label card;
encrypting, by the source communication terminal, a data packet to be transmitted with the encryption algorithm to generate an encrypted data packet;
sending, by the source communication terminal the encrypted data packet to a target communication terminal; and
sending, by the source communication terminal, the index to the target communication terminal;
wherein the index is used by the target communication terminal to obtain the encryption algorithm, to retrieve a decryption algorithm from a second NFC security label card according to the index, and to decrypt the encrypted data packet according to the decryption algorithm to obtain a decrypted data packet;
the encrypted data packet comprises an encrypted part and an unencrypted part;
the method further comprises:
adding an encryption label to the unencrypted part;
wherein the encryption label is arranged to indicate that the data packet where the label locates is the encrypted data packet, when the encrypted data packet comprises the encryption label, the encryption label indicates that the data packet is the encrypted data packet.

US Pat. No. 10,341,304

DEVICE INDEPENDENT ENCRYPTED CONTENT ACCESS SYSTEM

Snap Inc., Santa Monica,...

1. A method, comprising:receiving a first authentication credential at a user device, the first authentication credential being associated with a user;
based on the first authentication credential, accessing, by one or more processors of the user device, a second authentication credential stored on a key server;
generating, by the one or more processors, an authentication token and an encryption token;
based on the authentication token, accessing, by the one or more processors, a plurality of encrypted content elements, an encrypted master key, and a plurality of encrypted content keys, each content element of the plurality of content elements associated with a separate encrypted content key of the plurality of encrypted content keys;
in response to accessing the encrypted master key, decrypting the master key to generate a master key using the encryption token;
in response to generating the master key, decrypting the plurality of encrypted content keys to generate a plurality of content keys using the master key;
decrypting one or more encrypted content elements of the plurality of encrypted content elements using one or more content keys of the plurality of content keys associated with the one or more encrypted content elements to generate a plurality of content elements;
causing presentation of at least a portion of the plurality of content elements on a display device of the user device.

US Pat. No. 10,341,303

AUTOMATING THE CREATION AND MAINTENANCE OF POLICY COMPLIANT ENVIRONMENTS

STEELCLOUD, LLC, Ashburn...

1. A method for creating a policy compliant computing environment for a target computing device, comprising:receiving, from an electronic device, a customized file incorporating a published policy standard modified for a set of operational requirements defined for the target computing device;
loading the customized file into a memory of the target computing device;
validating the customized file subsequent to loading the customized file into the memory of the target computing device;
parsing the customized file to determine one or more requirements for the target computing device dictated by the published policy standard and the one or more modifications for the set of operational requirements, wherein the one or more requirements include an operating system security policy and a local security policy;
comparing current settings of the target computing device to the one or more requirements defined in the customized file, where a difference between the current settings and the one or more requirements indicates the target computing device is out of compliance;
updating the current settings of the target computing device to satisfy the one or more requirements dictated by the published policy standard and the one or more modifications for the set of operational requirements defined in the customized file, thereby ensuring the target computing device maintains compliance; and
creating a log that records details of the updating the current settings of the target computing device.

US Pat. No. 10,341,302

OPTIMIZED TRANSPORT LAYER SECURITY

Massachusetts Institute o...

3. A method for establishing a secure communication session over a communication path between a client device and a server device according to a communication protocol, the method comprising:storing session initiation information associated with the server device at a second communication interface located on the communication path between the client device and the server device;
sending, in a session initiation phase, a first message from the server device for establishing the secure communication session between the client device and the server device, the first message including session initiation information;
receiving and processing, in the session initiation phase, the first message at a first communication interface implemented on an intermediate device located on the communication path, the processing including forming a second message for establishing the secure communication session including replacing the session initiation information with a reference to the session initiation information;
sending, in the session initiation phase, the second message from the first communication interface over the communication path;
receiving and processing, in the session initiation phase, the second message at a second communication interface on the communication path between the client device and the server device, the processing including forming a third message for establishing the secure communication session including replacing the reference to the session initiation information with the session initiation information stored at the second communication interface such that the third message conforms to the communication protocol;
sending, in the session initiation phase, the third message from the second communication interface to the client device over the communication path;
establishing, in the session initiation phase, the secure communication session using the third message received at the client device; and
passing, in a data communication phase following the session initiation phase, data messages between the client device and the server device in the secure communication session, wherein the intermediate device and the second communication interface do not have access to the content of the data messages,
wherein a first portion of the communication path between the intermediate device and the client device is associated with a high latency and/or a low bandwidth relative to a second portion of the communication path between the intermediate device and the server device.

US Pat. No. 10,341,301

METHOD FOR TRANSMITTING ENCRYPTED DATA, METHOD FOR RECEIVING, CORRESPONDING DEVICES AND COMPUTER PROGRAMS

Ingenico Group, Paris (F...

1. A method of transmitting data from a first terminal, called a sender terminal, to a second terminal, called a receiver terminal, wherein the method comprises:obtaining a piece of current time data;
determining a piece of transmission time data as a function of the piece of current time data and at least one predetermined parameter comprising a duration to be added to the piece of current time data to obtain the piece of transmission time data;
obtaining a piece of data to be encrypted from a concatenation of at least one piece of data to be transmitted and at least one piece of transmission time data;
encrypting, by means of an encryption key, said preliminarily obtained piece of data to be encrypted to generate a piece of encrypted data;
transmitting said piece of encrypted data at a point in time defined by said piece of transmission time data.

US Pat. No. 10,341,300

SYSTEM, METHOD, APPARATUS AND MACHINE-READABLE MEDIA FOR ENTERPRISE WIRELESS CALLING

Cisco Technology, Inc., ...

1. A method, comprising:receiving one or more packets via a secure tunnel from a user device, wherein the user device is connected to a source network via a Wi-Fi access point;
identifying control plane data associated with an ongoing Wi-Fi calling session;
determining that a first packet of the one or more packets is associated with the Wi-Fi calling session by comparing information in the first packet with the control plane data, and in response to determining that the first packet is associated with the Wi-Fi calling session, analyzing the first packet to identify an anomaly in the first packet;
determining that the established Wi-Fi calling session is a threat based, at least in part, on the identified anomaly of the first packet;
taking a mitigating action in response to determining that the Wi-Fi calling session is a threat;
receiving a second one or more packets via a second secure tunnel from a second user device, wherein the second user device is connected to the source network via a second Wi-Fi access point;
identifying second control plane data associated with a second ongoing Wi-Fi calling session;
determining that a second packet of the second one or more packets is associated with the second Wi-Fi calling session by comparing information in the second packet with the second control plane data, and in response analyzing the second packet to identify a potential anomaly in the second packet;
determining that the second Wi-Fi calling session is not a threat based, at least in part, on the analyzing of the second packet;
establishing a signaling link to the source network in response to determining that the second Wi-Fi calling session is not a threat; and
sending a message to the source network over the signaling link to instruct the source network to prioritize network traffic associated with the second Wi-Fi calling session.

US Pat. No. 10,341,299

COLLECTING FIREWALL FLOW RECORDS OF A VIRTUAL INFRASTRUCTURE

Nicira, Inc., Palo Alto,...

1. A computer-implemented method for collecting firewall flow records, the method comprising:receiving firewall flow records from a plurality of data end nodes of a virtualized infrastructure comprising a distributed firewall according to a collection schedule, wherein the collection schedule defines which data end nodes of the plurality of data end nodes from which firewall flow records are collected, a frequency of collection of firewall flow records from the data end nodes, and an amount of firewall flow records collected from the data end nodes;
processing received firewall flow records received at a firewall flow record collection queue, such that the received firewall flow records are prepared for storage at a flow record data store; and
dynamically adapting the collection schedule based at least in part on the processing of the received firewall flow records to control data loss based on available system resources, such that the firewall flow record collection queue is available for processing firewall flow records prior to receiving additional firewall flow records from the data end nodes.

US Pat. No. 10,341,298

SECURITY RULES FOR APPLICATION FIREWALLS

Amazon Technologies, Inc....

1. A system for applying an encrypted customer security rule set to an application firewall, comprising:at least one processor;
a memory device including instructions that, when executed by the at least one processor, cause the system to:
receive an automated notification from a shared data store that an encrypted customer security rule set is available for use by the application firewall operating on a server at an entry point to a computing service environment, wherein the application firewall is a managed service provided by a computing service provider for use with an application hosted in the computing service environment and the application firewall utilizes customer security rules to monitor, filter, and manipulate network traffic associated with the application;
obtain the encrypted customer security rule set from the shared data store accessible to a computing service customer and the computing service environment, wherein the encrypted customer security rule set is owned by the computing service customer and the encrypted customer security rule set is encrypted using a customer encryption key owned by the computing service customer;
obtain the customer encryption key from a key management system using a cross-account security role that provides access to the customer encryption key, wherein the computing service customer creates the cross-account security role granting access to the customer encryption key;
decrypt the encrypted customer security rule set in volatile computer memory of the application firewall forming a corresponding unencrypted customer security rule set in the volatile computer memory; and
register the unencrypted customer security rule set located in the volatile computer memory with the application firewall, wherein the application firewall is configured to apply the unencrypted customer security rule set to network traffic received at the application firewall.

US Pat. No. 10,341,297

DATAPATH PROCESSING OF SERVICE RULES WITH QUALIFIERS DEFINED IN TERMS OF TEMPLATE IDENTIFIERS AND/OR TEMPLATE MATCHING CRITERIA

NICIRA, INC., Palo Alto,...

1. A method of performing a service on a data message having a set of attributes, the method comprising:selecting a service rule comprising (i) a rule identifier for matching against the set of attributes of the data message, the rule identifier defined by reference to a first template identifier that identifies a template for instantiating a multi-tier application deployment in a network, and (ii) a service parameter for performing a service on data messages, wherein an instantiation of the template comprises instantiating multiple data compute nodes (DCNs) with different DCNs implementing different applications in the multi-tier application deployment;
determining that the selected service rule is applicable to the data message, said determining comprising determining that (i) at least a second template identifier associated with the data message is associated with a particular DCN, (ii) the first template identifier and second template identifiers match, and (iii) the particular DCN was deployed by using the template; and
in response to the determination, performing the service on the data message based on the service parameter.

US Pat. No. 10,341,296

FIREWALL CONFIGURED WITH DYNAMIC COLLABORATION FROM NETWORK SERVICES IN A VIRTUAL NETWORK ENVIRONMENT

VMWARE, INC., Palo Alto,...

1. A method for automatic firewall configuration in a virtual computing network environment, the method comprising:mapping virtual machine (VM) inventory objects to Internet protocol (IP) addresses of VMs running on a plurality of host computing systems on one or more computing networks, wherein the VM inventory objects are VMs and associated virtual network interface cards (vNICs);
configuring firewall rules using VM inventory objects based on the mapping, wherein the VM inventory objects are specified in a source and/or destination of the configured firewall rules;
transforming the firewall rules by replacing the VM inventory objects that are specified in the source and/or destination of the configured firewall rules with network interface card (NIC) assigned IP addresses using an IP address management table (IPAM) table and network address translation (NAT) IP addresses using a NAT table;
sending the transformed firewall rules to a firewall engine for filtering communication from and to VMs running on a first host computing system on the one or more computing networks and communication from and to VMs running on a second host computing system on the one or more computing networks at a firewall according to the transformed firewall rules;
determining whether there are any updates made to the configured firewall rules, the IPAM table, the NAT table and/or the VM inventory objects; and
automatically updating the transformed firewall rules sent to the firewall engine by repeating the steps of configuring, transforming and/or sending when there are updates made to the configured firewall rules, the IPAM table, the NAT table and/or the VM inventory objects.

US Pat. No. 10,341,295

SECURITY AND ACCESS CONTROL

Trend Micro Incorporated,...

1. A non-transitory computer readable medium having stored thereon machine readable instructions to provide security and access control, the machine readable instructions, when executed by at least one processor of a computer, cause the computer to: receive traffic that is related to a first application tier of an application, the application comprising a plurality of application tiers that includes the first application tier and a second application tier, the traffic to be routed to the second application tier;analyze attributes of the traffic;
determine the application based on the attribute analysis;
determine a policy related to the application from a plurality of policies respectively directed to each application tier of the plurality of application tiers of the application;
determine a type of the traffic based on the attribute analysis, the type of the traffic indicating whether the traffic is writing data to or reading data from the second application tier;
compare the type of the traffic to the policy to determine whether the traffic is valid traffic or invalid traffic;
based on a determination that the traffic is valid traffic, forward the valid traffic to an intended destination of the valid traffic;
based on a determination that the traffic is invalid traffic, one of forward the invalid traffic to a predetermined destination and block the invalid traffic; and
implement the plurality of application tiers using components implemented in a virtual environment.

US Pat. No. 10,341,294

UNAUTHORIZED COMMUNICATION DETECTION SYSTEM AND UNAUTHORIZED COMMUNICATION DETECTION METHOD

HITACHI, LTD., Tokyo (JP...

1. An unauthorized communication detection system that improves security and performance of a communication network, the system comprising:a communication interface that is communicatively coupled to a plurality of sensors via the communication network;
a memory that stores a determination list for determining whether there is unauthorized communication, wherein the determination list includes a packet pattern and determination pattern that specifies a variation amount and a frequency for each of the plurality of sensors; and
a processor that is communicatively coupled to the communication interface and the memory, wherein the processor:
receives, using the communication interface, a communication packet that from a particular sensor from the plurality of sensors,
extracts a measurement from the communication packet based on the packet pattern of the particular sensor,
retrieves, from the memory, a particular determination pattern for the particular sensor,
determines whether the frequency of the measurement is higher than the frequency of the particular determination pattern, and
on a condition that the frequency of the measurement is higher than the frequency of the particular determination pattern, deletes the communication packet from the communication network.

US Pat. No. 10,341,293

TRANSPARENT FIREWALL FOR PROTECTING FIELD DEVICES

HONEYWELL INTERNATIONAL I...

1. A method of cyber protecting a field device in a process control system including a process controller for controlling said field device which utilizes a communications network using a process communication protocol, comprising:positioning a field device firewall in said communications network between a field network communication interface and said process controller, wherein said field device firewall has a stored list of known device types, types of requests and types of commands, does not support any native communications with said field device, and lacks an IP address on said communications network, said field device firewall including a processor that runs a cyber-protection algorithm implementing:
comparing information including a device type and a type of request or a type of command in a received packet to said known device types, said types of requests or said types of commands in said stored list;
allowing transmission of said received packet to said field device if said comparing determines said information is all on said stored list, and
blocking transmission of said received packet to said field device if said comparing determines said information is not all on said stored list.

US Pat. No. 10,341,292

INCREASED PORT ADDRESS SPACE

Avi Networks, Santa Clar...

1. A method for managing network ports, comprising:receiving network session identification information associated with a destination IP address and a destination network port; and
using a processor to determine for a new session to be established for a source IP address, an available source network port based on the destination IP address and the destination network port, wherein the available source network port is identified as available to be assigned to the new session for the source IP address including by determining that for at least a combination of the destination IP address and the destination network port, the available source network port has not been already assigned for the source IP address;
wherein a same port number of the determined to be available source network port for the new session to be established for the source IP address is concurrently assigned to a different network session for the same source IP address but for a different destination IP address or a different destination network port.

US Pat. No. 10,341,291

METHOD, EQUIPMENT, SYSTEM AND COMPUTER STORAGE MEDIUM FOR IMPLEMENTING NUMBER PORTABILITY ANNOUNCEMENT

ZTE CORPORATION, Guangdo...

1. Method for implementing Number Portability Announcement NPA, comprising:receiving a calling request;
triggering Telephone Number Mapping ENUM to execute an ENUM query and acquiring a query result;
judging whether a callee number generates Number Portability NP according to the query result and acquiring a judgment result; and
sending an announcement instruction to an Media Resource Function Processor MRFP when the judgment result is that the callee number generates the NP, so as to enable the MRFP to announce an NP prompt tone to a caller according to the announcement instruction.

US Pat. No. 10,341,290

METHOD AND SYSTEM FOR PRESENTING RECOMMENDATION INFORMATION

Tencent Technology (Shenz...

1. A method for presenting recommendation information, comprising:receiving, by an information issue server, a data obtaining request from a client terminal, recording an address of the client terminal at this time as a first address, and presenting recommendation information corresponding to a region where the first address belongs for the client terminal;
receiving, by a data collection server, a response message sent from the client terminal after the client terminal has played the recommendation information, recording an address of the client terminal at this time as a second address, and storing a corresponding relationship between the first address and the second address into an address data file, wherein after the client terminal has played the recommendation information, the client terminal sends a feedback message containing a recommendation information identifier to a third-party monitoring system, and the third-party monitoring system calculates a number of times of presenting the recommendation information corresponding to the recommendation information identifier according to the feedback message;
reading, by an address analysis server, a specified address from a region address database which is corresponding to a specified region, and obtaining corresponding relationships each with the first address being the specified address from the address data file; wherein each region corresponds to its own region address database which contains all addresses assigned to the corresponding region; and
when determining, by the address analysis server, via the obtained corresponding relationships that the specified address has been converted by intelligent routing, not presenting, by the information issue server, recommendation information corresponding to the specified region to the specified address when requesting data.

US Pat. No. 10,341,289

SYSTEMS AND METHODS OF CALCULATING COMMUNICATIONS STRENGTHS

FACEBOOK, INC., Menlo Pa...

1. A method comprising:providing, within a graphical user interface on a client device associated with a user, a list of co-users associated with the user within a communications system;
determining a number of a first type of electronic messages exchanged between a user and a first co-user of the communications system;
determining a number of a second type of electronic messages exchanged between the user and the first co-user;
determining a frequency of electronic messages exchanged between the user and the first co-user;
calculating, using at least one processor, a communications strength between the user and the first co-user using:
the number of the first type of electronic messages exchanged between the user and the first co-user,
the number of the second type of electronic messages exchanged between the user and the first co-user, and
the frequency of electronic messages exchanged between the user and the first co-user;
determining the communications strength between the user and the first co-user is greater than a communications strength between the user and a second co-user included on the list of co-users within the graphical user interface;
based on the communications strength between the user and the first co-user being greater than the communications strength between the user and the second co-user, updating the list of co-users within the graphical user interface by automatically adding a first identifier corresponding to the first co-user to the list of co-users and automatically removing a second identifier corresponding to the second co-user from the list of co-users; and
in response to detecting a selection of the first identifier of the first co-user from the list of co-users within the graphical user interface, automatically generating an electronic message to send to the first co-user.

US Pat. No. 10,341,288

METHODS CIRCUITS DEVICES SYSTEMS AND ASSOCIATED COMPUTER EXECUTABLE CODE FOR PROVIDING CONDITIONAL DOMAIN NAME RESOLUTION

SAGUNA NETWORKS LTD., Yo...

1. A conditional domain name system (CDNS) associated with an access point of a data communication network, said system comprising:a DNS query detector to detect a DNS query generated by a data client device communicatively coupled to the access point, wherein the DNS query is addressed to an external DNS and requests a network address of a given networked data resource and continues towards the external DNS;
control logic circuitry to search a functionally associated data repository or cache for a conditional DNS record relating to the given networked data resource, wherein the conditional DNS record includes or links with: (a) an identifier or designator of the given networked data resource, (b) a given network address for the given networked data resource, and (c) a definition of a condition under which said CDNS will provide the given network address as a response to the DNS query for the given networked data resource.

US Pat. No. 10,341,287

DIRECT TRANSMISSION OF DATA BETWEEN APPLICATIONS IN A MULTI-TENANT ENVIRONMENT

International Business Ma...

1. A method for direct transmission of data between applications in a multi-tenant environment, the method comprising:responsive to determining a first tenant and a second tenant exist within a same runtime and a transmission method having a high overhead, establishing a mechanism for transmitting data between the first tenant and the second tenant, wherein the mechanism for transmitting data between the first tenant and the second tenant has a low overhead for transmitting data; and
responsive to a connection being made between the first tenant and the second tenant and a opening of the server socket of the first tenant, establishing the mechanism for transmitting data between the first tenant and the second tenant.

US Pat. No. 10,341,286

METHODS AND SYSTEMS FOR UPDATING DOMAIN NAME SERVICE (DNS) RESOURCE RECORDS

PISMO LABS TECHNOLOGY LIM...

1. A method for updating domain name service (DNS) resource records at a first system, comprising:(a) receiving an update message from a network node periodically and upon occurrence of a first predefined event;
(b) updating a corresponding DNS resource record substantially based on the update message;
wherein the update message comprises an Internet Protocol (IP) address field, a unique identifier field and a network interface identifier field;
wherein the network node comprises a plurality of network interfaces; and
wherein the first predefined event is selected from a group consisting of change of IP address of at least one of the plurality of network interfaces, assignment of IP address of at least one of the plurality of network interfaces, change of DNS resource recorded in at least one of the plurality of network interfaces, change of performance observed in at least one of the plurality of network interfaces connected to the Internet, detection of new Dynamic Host Configuration Protocol (DHCP) server, expiration of DHCP IP address lease, status check, and health check.

US Pat. No. 10,341,285

SYSTEMS, METHODS AND DEVICES FOR INTEGRATING END-HOST AND NETWORK RESOURCES IN DISTRIBUTED MEMORY

OPEN INVENTION NETWORK LL...

23. A method for storing data across distributed digital data storage devices over a digital network, the method comprising:generating for a portion of data a data address from a range of addresses associated with the distributed digital memory resources, the data address comprising therein embedded information that identifies one or more characteristics of said portion;
sending data requests relating to the portion of data over the digital network to a digital network switching interface using said data address, said digital network switching interface comprising a physical mapping database and plurality of network interface ports, said physical mapping database comprising access to a forwarding table stored on accessible physical memory, wherein the digital network switching interface employs congestion monitoring methodology, by having the switching interface monitor latency statistics of the network interface ports, and invalidates forwarding table entries that point to congested ports and adds new forwarding table entries further associating of the data address with the digital data storage device;
receiving the data request at the digital network switching interface and checking to see if the data address has been associated in the forwarding table with information relating to a storage location in the distributed digital data storage devices communicatively coupled to the digital network switching interface;
forwarding the data request to the storage location associated with the data address in the forwarding table, if the data address is associated with information relating to a storage location in the forwarding table, else forwarding the data request to the distributed digital data storage devices in accordance with a data routing methodology; and
remapping the association between a given data address and the corresponding information relating to a given storage location in the forwarding table based on said one or more characteristics.

US Pat. No. 10,341,284

METHODS AND SYSTEMS FOR RECIPIENT MANAGEMENT WITH ELECTRONIC MESSAGES

Pecan Technologies Inc, ...

1. A method of recipient management with electronic messages having time defined actions comprising:using a processor of a message server for:
receiving data inputted by a user, and an electronic address of the recipient at a user client terminal;
creating an electronic message and defining for the electronic message at least one non-message action for the recipient associated with the electronic address inputted by the user, to perform at a location within a defined time frame, said at least one non-message action and said time frame are defined in a metadata included in said electronic message;
sending the electronic message to the electronic address of the recipient for access by a recipient client terminal of the recipient;
triggering an external data source to monitor performance of the at least one non-message action by the recipient associated with the electronic address inputted by the user during the defined time frame according to said metadata, said monitoring detects the recipient being at the location at the defined time frame and performing the at least one non-message action at the location and at the defined time frame; wherein the external data source is in electrical communication with said message server and is independent of actions performed on the electronic message by the recipient client terminal;
receiving via a network an indication of the performance of the at least one non-message action based on the monitoring from the external data source; and
sending instructions to present on the user client terminal a notification in response to the indication.

US Pat. No. 10,341,283

SYSTEMS AND METHODS FOR PROVIDING DATA ANALYTICS FOR VIDEOS BASED ON A TIERED ARCHITECTURE

Facebook, Inc., Menlo Pa...

1. A computer-implemented method comprising:acquiring, by a computing system, a video resource at a first level of a tiered architecture;
generating, by the computing system, based on the video resource, a first video representation at a second level of the tiered architecture, the first video representation being associated with a first publisher;
detecting, by the computing system, that at least a first post posted to a social networking system by a first user and a second post posted to the social networking system by a second user are utilizing the first video representation, the first post and the second post being representable at a third level of the tiered architecture; and
aggregating, by the computing system, data analytics for the first video representation based on the detecting that the first post posted by the first user and the second post posted by the second user are utilizing the first video representation, wherein
the data analytics are associated with social engagement information,
the social engagement information includes at least a first quantity of social engagement with the first post and a second quantity of social engagement with the second post, and
the aggregating the data analytics for the first video representation includes aggregating the first quantity of social engagement and the second quantity of social engagement.

US Pat. No. 10,341,282

IDENTIFYING DIGITAL MAGAZINE SERVER USERS BASED ON ACTIONS BY THE USERS WITH CONTENT ITEMS PRESENTED BY THE DIGITAL MAGAZINE SERVER

Flipboard, Inc., Palo Al...

1. A computer-implemented method comprising:presenting a content item to a plurality of users of a digital magazine server;
receiving information identifying actions performed by a set of users involving the content item, each of the set of users presented with the content item;
storing information identifying each user in the set of users in association with the content item;
receiving a request from a user to provide a comment in association with the content item including data that identifies an additional user, the request including data comprising the comment;
retrieving the information identifying each user in the set of users presented with the content item;
identifying candidate users of the set of users presented with the content item based on the information identifying each user in the set of users presented with the content item and information included in the comment, each candidate user associated with information identifying the candidate user that at least partially matches the data included in the comment identifying the additional user;
determining an order of information identifying each candidate user based on a frequency with which each candidate user performed actions involving the content item presented to each of the candidate users by the digital magazine server; and
presenting information identifying the one or more candidate users to the user in the determined order.

US Pat. No. 10,341,281

ACCESS CONTROL POLICIES ASSOCIATED WITH FREEFORM METADATA

AMAZON TECHNOLOGIES, INC....

1. A computer implemented method for using tags to control access to resources, comprising:associating both a first access control policy and a second access control policy with a single metadata tag, the metadata tag including a freeform character string specifying a key and a key value,
wherein the first access control policy identifies principals that are allowed to assign the metadata tag to the at least one computing resource and
wherein the second access control policy identifies operations that are allowed or not allowed to be performed on resources associated with the key and the key value of the metadata tag;
receiving, from a user using an application programming interface (API), a request to assign the metadata tag to the at least one computing resource;
evaluating the first access control policy based at least in part on a combination of the key and the key value of the metadata tag;
assigning the metadata tag to the at least one computing resource in response to determining that the first access control policy allows the user to assign the metadata tag;
receiving a request to perform an operation on the at least one computing resource;
evaluating, based at least in part on both of the key and the key value of the metadata tag, the second access control policy associated with the metadata tag via an identity management service that retrieves the second access control policy in addition to one or more other access control policies that are related to the request to perform the operation on the computing resource; and
authorizing the request to perform the operation on the at least one computing resource based at least in part on the evaluation of the second access control policy.

US Pat. No. 10,341,280

METHOD, SYSTEM, AND RECORDING MEDIUM FOR PROVIDING MESSAGE BASED ON GROUP UNIT

NAVER Corporation, Seong...

1. A method implemented in a computer for providing text messages in a text message box of a user terminal for receiving the text messages sent through a communication network, the method comprising:classifying, by a processor, a plurality of text messages received at the user terminal into a predefined group based on message content parsed from the received text messages without the received text messages being indicated to be classified into the predefined group by senders of the plurality of text messages, the plurality of text messages including at least two text messages sent to the user terminal from at least two separate senders;
creating, by the processor, a representative item of the predefined group using a select text message included in the predefined group; and
providing, by a processor, message items through a message list displayed in the text message box that includes the representative item as an item associated with the predefined group and a plurality of individual text messages received at the user terminal and not included in the predefined group,
wherein the plurality of text messages classified into the predefined group are provided in the message list as a bundle item, the bundle item being ranked in the message list, and
wherein the representative item of the group is displayed in the bundle item.

US Pat. No. 10,341,279

ACTION LINKS

salesforce.com, inc., Sa...

1. A method of delivering customized action options that integrate a feed system with a non-feed system, the method including:storing an action-link-group, the action-link-group including a plurality of action links, an executions-allowed parameter, and a category parameter indicating a display attribute of the plurality of action links within the feed system, wherein an action link of the plurality of action links is stored with information including:
a label for the action link,
an action-link-URL referencing an API entry of the non-feed system,
an action type indicating a type of action to be taken with respect to the action-link-URL in response to invoking the action link, and
authorization data to be passed during invocation of the action link;
integrating the action-link group as a feed item of the feed system based on the category parameter, wherein an execution status of the action link is maintained with the feed item for comparison with the executions-allowed parameter;
receiving an invocation request, from a user authenticated with a host-user ID, the invocation request including the action link of the plurality of action links;
invoking the action-link-URL with the authorization data;
receiving third-party data from the non-feed system generated responsive to invoking the action-link-URL; and
causing display of the third-party data from the non-feed system as a feed item of the feed system.

US Pat. No. 10,341,278

ADAPTIVE PRESENTATION OF COMMENTS BASED ON SENTIMENT

Flipboard, Inc., Palo Al...

1. A method for ranking comments associated with a content item in a digital magazine, the method comprising:determining, by a processor, a topic of the content item selected by a user of the digital magazine maintained by a digital magazine server;
obtaining emotion scores of comments associated with the content item by the processor, an emotion score of a comment representative of sentiments of a plurality of users toward the comment and determined from emoticons attached to response comments to the comment;
obtaining, by the processor, prior response comments received from the user for comments for content items having the topic;
determining, by the processor, a user propensity of responding to previous comments for content items having the topic by applying a model to the prior response comments received from the user for comments for content items having the topic and emotion scores for previous comments for content items having the topic for which the user provided one or more response comments;
determining, by the processor, response likelihood scores of the comments associated with the content item, a response likelihood score of the comment representing a likelihood of the user responding to the comment and determined based on an emotion score for the comment and the user propensity of responding to previous comments for content items having the topic;
determining a ranking of the comments associated with the content item based on the determined response likelihood scores by the processor; and
displaying the comments associated with the content item in locations of a display area of a client device of the user based on the ranking.

US Pat. No. 10,341,277

PROVIDING VIDEO TO SUBSCRIBERS OF A MESSAGING SYSTEM

1. A method, comprising:obtaining a first live video stream generated by a video source; and
publishing, by one or more computer processors, one or more messages comprising one or more frames of the first live video stream to a first channel of a plurality of channels of a publish-subscribe system, wherein the video source is associated with the first channel.

US Pat. No. 10,341,276

SYSTEMS AND METHODS FOR PROVIDING COMMUNICATIONS WITH OBSCURED MEDIA CONTENT BACKGROUNDS

Facebook, Inc., Menlo Pa...

1. A computer-implemented method comprising:receiving, by a computing system, a communication thread comprising a plurality of responses wherein at least one of the plurality of responses comprises a media content item;
obscuring, by the computing system, the media content item to produce an obscured media content item;
presenting, by the computing system, the communication thread wherein the plurality of responses and the obscured media content item are overlaid in an order based on time data associated with each response and the obscured media content item;
removing, by the computing system, while a first touch gesture is detected, each response and the obscured media content item from presentation of the communication thread in reverse of the order based on time data, wherein removing the obscured media content item comprises:
presenting the media content item while the first touch gesture is detected, wherein the presenting the media content item comprises presenting an unobscure animation to show the media content item; and
ending, by the computing system, the communication thread when a second touch gesture is detected.

US Pat. No. 10,341,275

SHARED CONTENT ITEM COMMENTING

Dropbox, Inc., San Franc...

1. A computer-implemented method, comprising:under the control of one or more computer systems configured with executable instructions,
receiving a scrollable content item uploaded to a first account with an online content management provider;
providing for display, on an interface of a first computing device, the scrollable content item and a comment section associated with the scrollable content item, wherein the scrollable content item is provided using a native application associated with the scrollable content item and wherein the online content management provider provides the comment section through an application associated with the online content management provider on the first computing device and the comment section associated with the scrollable content item is a layer on top of the native application associated with the scrollable content item;
adding, in response to an acceptance of a first share invitation, a copy of the scrollable content item and access to the comment section to a second account;
receiving a first modification to the scrollable content item that includes data associated with at least one first comment to the comment section;
synchronizing the first modification to the scrollable content item with the copy of the scrollable content item in the second account, wherein the synchronization of the first modification provides the at least one first comment to the comment section to the second account;
providing for display, on an interface of a second computing device, the scrollable content item, the comment section associated with the scrollable content item, and the at least one first comment, wherein the scrollable content item is displayed in the native application and the online content management provider provides the comment section and the at least one first comment through an application associated with the online content management provider on the second computing device;
receiving at least one second modification to the scrollable content item, including data associated with a second comment to the comment section, from the application associated with the online content management provider on the second computing device; and
receiving at least one of revisions or additions to the scrollable content item from the application associated with the online content management provider on the first computing device; and
synchronizing the at least one second modification and the at least one of revisions or additions to the copy of the scrollable content item with the scrollable content item in the first account, wherein the synchronization of the at least one second modification provides the second comment to the comment section of the first account.

US Pat. No. 10,341,274

SYSTEMS METHODS AND COMPUTER-READABLE STORAGE MEDIA FOR MESSAGING AND PRESENCE MODIFICATION

PECAN TECHNOLOGIES INC., ...

1. A method of modifying electronic messages, said method comprises:(a) composing at least one electronic message by at least one member selected from the group consisting of: a sending terminal and message generator;
(b) pre-modifying said at least one message by a pre-modification agent, said pre-modifying comprises prescribing at least one pre-modification parameter to said at least one message, wherein said pre-modification parameter defines a conditional action performed in respect to at least one constituent of said message, performed upon meeting a predefined criterion;
(c) providing access to at least one modification parameters database, said database comprising a plurality of modification parameters;
(d) retrieving an updated set of said modifications parameters from said database;
(e) modifying at least one constituent of said message, by a message modification agent, in accordance with at least one parameter selected from the group consisting of:
[i] said modification parameters retrieved from said database;
[ii] said at least one pre-modification parameter prescribed by said pre-modification agent, and
[iii] a combination of said modification parameters and said at least one pre-modification parameter;
(f) receiving said message, as modified by said message modification agent, by a message user agent and presenting said modified message to a recipient;
(g) dynamically updating said modification parameters in said database upon at least one event selected from the group consisting of:
[i] a process actively initiated by a machine associated with said message user agent of said recipient;
[ii] a process actively initiated by a provider of communication services for a machine associated with said message user agent of said recipient;
[iii] a process actively initiated by the database management system of said database;
wherein said method is not implementable for defense against spam or unsolicited messages;
wherein said modification parameters in said database are not updated by the recipient himself/herself, and
wherein said modification parameters are unrelated to the characteristics of said message;
wherein said modification parameters in said database are dynamically updated prior to said modifying of said at least one constituent of said message;
wherein a datum/file necessary for said modification is selected from the group consisting of: a datum/file contained within attachments of said message, datum/file obtainable from an IP address, datum/file obtainable via a URI and/or datum/file obtainable from a URL.

US Pat. No. 10,341,272

PERSONALITY REPLY FOR DIGITAL CONTENT

Google LLC, Mountain Vie...

1. A computer-implemented method, comprising:receiving, by an automated conversational assistant system that is configured to conduct an automated conversation with a user and from a user device, an image;
generating, by the automated conversational assistant system, one or more image labels and a corresponding score for each image label, wherein each image label is descriptive of a feature depicted in the image and each score indicates a prominence of the feature relative to other features depicted in the image;
selecting, by the automated conversational assistant system and from the one or more image labels, a particular image label that corresponds to a prominent feature depicted in the image based on the score for the particular image label exceeding a threshold score;
based on the particular image label that corresponds to the prominent feature of the image, generating, by the automated conversational assistant system, one or more conversational replies to the image using past conversations between multiple users, predetermined conversational replies, and quotations from media content;
selecting, by the automated conversational assistant system and from among the one or more conversational replies, a conversational reply based on a relationship between content of each of the one or more conversational replies and the particular image label; and
providing, for output by the automated conversational assistant system and to the user device, the conversational reply.

US Pat. No. 10,341,271

METHOD, SYSTEM AND RECORDING MEDIUM FOR COMMUNICATING AND DISPLAYING CONTENT IN A MESSENGER APPLICATION

Line Corporation, Tokyo ...

1. An online communication method performed by a computer, the method comprising:receiving, by at least one processor, a selection instruction from at least one user terminal associated with a user, the selection instruction including information related to content provided by a content provider on a website;
determining, by the at least one processor, a business operator relevant to the content based on the received selection instruction from a plurality of business operators;
establishing, by the at least one processor, an online communication link between a first account of the user associated with a messenger service via the at least one user terminal, the first account being previously registered with the messenger service, and a second account associated with the determined business operator;
generating, by the al least one processor, a talk window associated with the messenger service, the talk window configured to permit message transmission and reception between the first account and the second account based on the selection instruction, without a relationship being established between the first and second accounts, and messenger service settings associated with the user, the generating including,
anonymously processing personal information of the user associated with the first account by replacing the personal information of the user with arbitrary information to be displayed at a terminal associated with the second account when no relationship has been established between the first and second accounts and the messenger service settings indicate that the personal information of the user associated with the first account is set to private;
monitoring, by the at least one processor, a reply rate of the business operator to a message sent via the first account in the talk window;
determining, by the at least one processor, the reply rate based on an average reply time taken by the business operator to reply to messages sent via the first account and a total reply rate of the business operator for replying to messages sent by all users;
determining, by the al least one processor, whether to display a user interface along with the content on a service screen provided by the content provider to enable a messenger call based on the reply rate; and
displaying, by the at least one processor, the user interface based on results of the determining whether to display the user interface.

US Pat. No. 10,341,270

PROVIDING ENHANCED APPLICATION INTEROPERABILITY

Citrix Systems, Inc., Fo...

1. A method, comprising:presenting, by a computing device, and on a display screen of the computing device, a first user interface that is associated with a first application;
detecting a physical rotation of the computing device from a first orientation to a second orientation;
switching, by the computing device and in response to the detected physical rotation of the computing device, from the first application to a second application different from the first application, wherein switching from the first application to the second application comprises:
launching, based on the detected physical rotation of the computing device and before receiving additional user inputs to the computing device, the second application;
passing, from the first application to the second application, contextual information comprising at least some information included in the first user interface of the first application;
replacing, by the computing device, and on the display screen, the first user interface associated with the first application with a second user interface that is associated with the second application to present the second user interface that is associated with the second application, the second user interface of the second application comprising at least some of the contextual information passed from the first application to the second application; and
suspending the first application, wherein an operating state of the first application prior to the suspension is preserved during the suspension when the second user interface that is associated with the second application is presented, the preserved operating state of the first application allowing the computing device to resume operation of the first application at the preserved operating state after switching from the first application to the second application;
after presenting the second user interface that is associated with the second application, determining, by the computing device, that the computing device has been rotated from the second orientation to the first orientation; and
based on determining that the computing device has been rotated from the second orientation to the first orientation, switching, by the computing device, from the second application back to the first application,
wherein switching from the second application back to the first application comprises presenting, on the display screen, the first user interface that is associated with the first application, and
wherein switching from the second application back to the first application comprises updating the first application based on second contextual information comprising at least some information included in the second user interface of the second application.

US Pat. No. 10,341,269

THREADED CONVERSATION CHANNEL WITH A TEMPORARILY EXCLUSIVE CONVERSATION

Microsoft Technology Lice...

1. A data processing system implementing a threaded conversation channel, the data processing system comprising:a network interface coupled to a network;
a memory for storing instructions; and
an electronic processor coupled to the network interface and the memory, the electronic processor configured to execute the instructions stored in the memory to
generate the threaded conversation channel, the threaded conversation channel associated with a plurality of users,
receive conversation parameters including an at least one recipient, a delivery time, and initial message content,
post, to the threaded conversation channel, a temporarily exclusive conversation based on the conversation parameters, wherein the temporarily exclusive conversation is hidden from at least a first user of the plurality of users and viewable by at least a second user of the plurality of users on the threaded conversation channel, the conversation parameters indicating to hide the temporarily exclusive conversation from the first user or make viewable the temporarily exclusive conversation to the second user, and
reveal, to the first user at the delivery time, the temporarily exclusive conversation on the threaded conversation channel.

US Pat. No. 10,341,268

METHOD AND DEVICE FOR IMPLEMENTING INSTANT MESSAGING

BEIJING QIHOO TECHNOLOGY ...

1. A method for implementing instant messaging through a browser, wherein a plug-in interface of an instant messaging tool is preset on the browser, the method comprises:a master process of a browser creating a plug-in process corresponding to the instant messaging tool;
triggering the plug-in interface to inform the master process of the browser to reload a browser window;
the master process of the browser dividing page presentation ranges of a plug-in page of the instant messaging tool and a page presentation range of a current tab of the browser window in the browser window, and informing the plug-in process;
the plug-in process generating the plug-in page according to the divided page presentation ranges, and loading the plug-in page and the re-rendered current tab side by side in the browser window.

US Pat. No. 10,341,267

ANONYMIZED IDENTIFIERS FOR SECURE COMMUNICATION SYSTEMS

Microsoft Technology Lice...

1. A relay system comprising:at least one processor; and
one or more computer-readable storage media having instructions stored thereon that are executable by the at least one processor to perform operations comprising:
receiving, at the relay system, a message including an identifier of a sending user and an identifier of an intended recipient;
determining an encryption process for the intended recipient based on the identifier of the intended recipient, wherein an encryption function applied by the encryption process is unique to the intended recipient;
generating an anonymized identifier of the sending user by applying the determined encryption process to generate an encrypted version of the identifier of the sending user to provide to the intended recipient;
generating a version of the message that includes the anonymized identifier of the sending user and does not include an unencrypted version of the identifier of the sending user; and
sending, for receipt by the intended recipient, the version of the message that includes the anonymized identifier of the sending user and does not include the unencrypted version of the identifier of the sending user;
wherein the identifier of the sending user is obtainable, from the version of the message including the anonymized identifier, with a decryption process that corresponds to the determined encryption process.

US Pat. No. 10,341,266

E-MAIL RELAY DEVICE, E-MAIL RELAY METHOD, AND NON-TRANSITORY STORAGE MEDIUM

NEC CORPORATION, Tokyo (...

1. An e-mail relay device comprising:a memory configured to store program instructions; and
a processor configured to execute the program instructions including:
an e-mail receiving unit that acquires an e-mail to be delivered before the e-mail reaches a transmission destination, the e-mail being transmitted from a transmission source mailer through simple mail transfer protocol (SMTP);
a request notification unit that transmits, after the e-mail receiving unit acquires the e-mail to be delivered, a notification e-mail to a transmission source e-mail address of the e-mail to be delivered, the notification e-mail including an authentication URL to allow communication with a predetermined authentication server through Internet protocol (IP);
a transmission source IP address acquisition unit that acquires, in a case a transmission source terminal communicates with the predetermined authentication server after the notification e-mail is transmitted, an IP address of the transmission source terminal contained in an IP header of an IP packet transmitted and received during the communication; and
a determination unit that determines the reliability of the e-mail to be delivered based on the IP address of the transmission source terminal.

US Pat. No. 10,341,265

DRAG AND DROP INVITATION CREATION

FACEBOOK, INC., Menlo Pa...

1. A method comprising:providing, for display on a client device associated with a user, a user interface comprising:
an electronic calendar interface that comprises one or more user-generated calendar events and a plurality of areas that each correspond to a time parameter defining a date and a time, and
an electronic contact list interface adjacent to the electronic calendar interface that comprises one or more user-identified contacts;
receiving an indication of a drag and drop action from the client device;
determining from the indication of the drag and drop action, using at least one processor, that an identifier associated with a contact displayed in the electronic contact list interface has been dragged and dropped from the electronic contact list interface onto an area from the plurality of areas of the electronic calendar interface; and
in response to determining that the identifier has been dragged and dropped from the electronic contact list interface onto the area from the plurality of areas of the electronic calendar interface:
identifying, using the least one processor, a time parameter that corresponds to the area from the plurality of areas of the electronic calendar interface; and
automatically creating, using the at least one processor, a new calendar event associated with the contact and the identified time parameter and adding an indication of the new calendar event to the electronic calendar interface.

US Pat. No. 10,341,264

TECHNOLOGIES FOR SCALABLE PACKET RECEPTION AND TRANSMISSION

Intel Corporation, Santa...

1. A network device to process packets, the network device comprising:one or more processors that include a plurality of cores;
a network interface controller (NIC) coupled to the one or more processors; and
one or more memory devices having stored therein a plurality of instructions that, when executed by the one or more processors, cause the network device to:
establish a ring in a memory of the one or more memory devices, wherein the ring is defined as a circular buffer to store entries representative of packets;
generate and assign, at a rate that is independent of a rate at which packets are received from a network by the NIC, receive descriptors to the slots in the ring, wherein each receive descriptor corresponds with a memory buffer to store packet data;
determine whether the NIC has received one or more packets;
copy, with direct memory access (DMA) and in response to a determination that the NIC has received one or more packets, packet data of the received one or more packets from the NIC to the memory buffers associated with the receive descriptors assigned to the slots in the ring; and
copy the receive descriptors from the ring to a NIC receive queue before the determination of whether the NIC has received one or more packets, wherein the ring comprises one or more of receive descriptors, metadata, and transmit descriptors interleaved with each other and the NIC receive queue comprises contiguous receive descriptors.

US Pat. No. 10,341,263

SYSTEM AND METHOD FOR ROUTING NETWORK FRAMES BETWEEN VIRTUAL MACHINES

University of Central Flo...

14. A virtual machine-to-virtual machine (VM-to-VM) switch embedded in a network interface card (NIC), the switch comprising:initialization circuitry configured for associating the virtual machine-to-virtual machine (VM-to-VM) switch with a physical port of the NIC, for establishing two or more virtual ports of the VM-to-VM switch and for associating at least one virtual machine (VM) of a first CPU with a first one of the virtual ports of the VM-to-VM switch and associating at least one virtual machine (VM) of a second CPU with a second one of the virtual ports of the VM-to-VM switch, wherein the first CPU and the second CPU are on a common physical server;
receiving circuitry configured for receiving network frames from the physical port of the NIC and from the virtual ports of the VM-to-VM switch, wherein the network frames comprise a Quality of Service (QoS) written into an Internet Protocol (IP) header of the network frames, wherein the QoS identifies a routing path for the network frames;
circuitry configured for reading the QoS written in the IP packet header of the network frames to determine if the QoS of the network frames is consistent with a QoS assigned to the network frames by a user configuration module;
circuitry configured for modifying the QoS of the network frames by rewriting the QoS in the IP packet header of the network frames, using hardware in the VM-to-VM switch, to be consistent with the QoS assigned to the network frames by the user configuration module if it is determined that the QoS of the network frames is not consistent with the QoS assigned to the network frames by the user configuration module; and
routing circuitry configured for routing network frames between the VMs associated with the virtual ports through the VM-to-VM switch based upon the QoS modified by the circuitry of the VM-to-VM switch.

US Pat. No. 10,341,262

PACKET OR PASSIVE OPTICAL NETWORK SYSTEM WITH PROTECTION SWITCHING CAPABILITIES

ELECTRONICS AND TELECOMMU...

1. A packet or passive optical network system with a packet-based protection switching capability, comprising:a transmitter terminal;
a plurality of packet paths; and
a receiver terminal,
wherein the receiver terminal receives a packet that arrives first among identical packets transferred through the plurality of packet paths and discards packets that arrive after the first packet,
wherein the receiver terminal comprises: a duplicate reception prevention filter configured to normally receive the packet that arrives first among the identical packets transferred through the plurality of packet paths and discard packets that arrive after the first packet; and a normal received packet record configured to store a packet that has been previously normally received or a packet identifier of the normally received packet, thereby enabling the duplicate reception prevention filter to determine whether the same packet as the stored packet arrives at the receiver terminal.

US Pat. No. 10,341,261

BONDING DEVICE AND METHOD

TQ DELTA, LLC, Austin, T...

1. A communications device comprising:a plurality of transceivers configurable to simultaneously operate with a combination of bonded and unbonded transceivers, wherein a first DSL transceiver of the plurality of transceivers is operable at a first data rate, and a second DSL transceiver of the plurality of transceivers is simultaneously operable at a second data rate that is different than the first data rate, wherein the first and second transceivers are operable as bonded transceivers and wherein the first and second bonded DSL transceivers are connected to a multi-pair multiplexer and are operable to transmit a single stream of ATM cells or packets on two substreams over two twisted wire pairs from a service provider to a first DSL subscriber,
and wherein a third DSL transceiver, of the plurality of transceivers, is simultaneously operable at a third data rate, wherein the third transceiver is not bonded with any other transceiver and wherein the third DSL transceiver is not connected to the multi-pair multiplexer and is operable to transmit a single stream of ATM cells or packets over one twisted wire pair from the service provider to a second DSL subscriber.

US Pat. No. 10,341,259

PACKET FORWARDING USING PROGRAMMABLE FEATURE PRIORITIZATION

Amazon Technologies, Inc....

1. A network device, comprising:an input interface configured to receive an incoming packet via a network, the incoming packet comprising a packet header;
a virtual routing and forwarding (VRF) classification logic configured to classify the incoming packet for processing;
a plurality of VRF subsystems, each VRF subsystem comprising a plurality of packet processors comprising one or more routing tables, wherein each packet processor for a given VRF subsystem is configured to process the incoming packet and generate a respective action code based on certain functionalities supported by the given VRF subsystem and the packet header;
a plurality of priority arbiters, each priority arbiter logically connected to each of the VRF subsystems, wherein each priority arbiter is configured to generate a respective forwarding decision for the incoming packet based on a mapping of action codes representing different types of system event to a set of priorities associated with a respective priority arbiter; and
an arbiter selector configured to provide an output decision for the incoming packet from a plurality of forwarding decisions generated by the priority arbiters based on a mapping of the given VRF subsystem to one of the priority arbiters,
wherein the classifying the incoming packet comprises assigning the incoming packet to one of the plurality of VRF subsystems.

US Pat. No. 10,341,258

DYNAMIC ADJUSTMENT OF CONNECTION PRIORITY IN NETWORKS

Ciena Corporation, Hanov...

1. An apparatus adapted to dynamically adjust a connection's priority in a network, the apparatus comprising:circuitry adapted to configure the connection with a dynamic priority and setting a current priority based on one or more factors, wherein the connection is a Layer 0 connection, a Layer 1 connection, and a combination thereof;
circuitry adapted to detect an event in the network requiring a change to the current priority, wherein the event changes the one or more factors; and
circuitry adapted to cause a change in the current priority of the connection based on the event,
wherein the connection is a backup path for another connection, and wherein the event is the connection becoming active for the another connection.

US Pat. No. 10,341,257

DATAPATH FOR MULTIPLE TENANTS

NICIRA, INC., Palo Alto,...

1. A method for operating a gateway machine at the edge of a provider network interfacing an external physical network, the method comprising:from the provider network, receiving a packet having a logical network identifier;
executing, on a processor of the gateway machine, a plurality of pipeline stages for determining a next destination of the packet,
wherein executing the plurality of pipeline stages comprises (i) executing a first logical router stage when the logical network identifier is for a first logical network that uses the first logical router, and (ii) executing a second logical router stage when the logical network identifier is for a second logical network that uses the second logical router; and
forwarding the packet to the external physical network based on the determination of the next destination of the received packet.

US Pat. No. 10,341,256

EXCHANGE SWITCH PROTOCOL VERSION IN A DISTRIBUTED SWITCH ENVIRONMENT

International Business Ma...

1. A method for managing a distributed Fibre Channel (FC) fabric, the method comprising:establishing a switch link between a first switching element and a second switching element of the distributed FC fabric;
transmitting, to the second switching element, a control-plane request frame that specifies at least one version of a protocol supported by the first switching element, wherein the control-plane request frame includes a capability descriptor comprising a code identifying the protocol, a lowest supported version value for the protocol, and a highest supported version value for the protocol, and wherein the lowest supported version value and the highest supported version value are specified in distinct fields in the capability descriptor;
receiving, from the second switching element, a control-plane response frame that specifies an accepted version of the protocol mutually supported by the first switching element and the second switching element; and
operating the switch link established between the first switching element and the second switching element using the accepted version of the protocol.

US Pat. No. 10,341,255

SWITCH RESOURCE MANAGER

Hewlett Packard Enterpris...

1. A network switching device, comprising:ports;
a packet switching device associated with the ports;
a central processing unit (CPU) and memory;
an operating system kernel to mediate access to the CPU, memory, and packet switching device, the operating system kernel including a driver for the packet switching device;
a first network operating system (NOS) instance;
a second NOS instance;
a switch resource manager to:
(1) allocate a first plurality of the ports to the first NOS instance and a second plurality of the ports to the second NOS instance,
(2) enforce the allocation such that the first NOS instance can control the packet switching device for only the first plurality of the ports and the second NOS instance can control the packet switching device for only the second plurality of the ports, the switch resource manager including a software development kit (SDK) for the packet switching device in order to interface with the driver for the packet switching device,
(3) maintain a resource map to track the allocation of the ports to the first and second NOS instances,
(4) enforce the allocation by verifying that calls from the first and second NOS instances to the SDK for the packet switching device do not violate the allocation contained in the resource map, and
(5) deny a call from the first or second NOS instance if the call violates the allocation.

US Pat. No. 10,341,254

LINKING INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT

International Business Ma...

1. A method for linking instances within a cloud computing environment, comprising:receiving, from a user, a request to link a second cloud instance with a first cloud instance, the request comprising information for generating a set of rules, the information comprising a reaction to be performed with respect to the second cloud instance when an action is performed with respect to the first cloud instance, wherein the set of rules is configurable by a user from options including:
restart the second cloud instance when the first cloud instance is restarted,
delete the second cloud instance when the first cloud instance is deleted,
start the second cloud instance when the first cloud instance is started,
start the second cloud instance when the first cloud instance is stopped, and
create the second cloud instance when the first cloud instance is active;
generating, based on the information included in the request, the set of rules, wherein the set of rules define the reaction to be performed with respect to the second cloud instance when the action is performed with respect to the first cloud instance;
performing the action on the first cloud instance; and
causing the reaction of the second cloud instance, according to the set of rules, in response to the action;
wherein the first cloud instance performs a first function and the second cloud instance performs a second function, and wherein the first function and the second function are different from one another.

US Pat. No. 10,341,253

AUTOMATIC CONSOLIDATION OF NETWORK RESOURCES

Accenture Global Solution...

1. A device, comprising:one or more processors to:
receive data associated with network resources,
the data being received from another device and from a system,
the data including first data that identifies one or more physical dimensions of the network resources;
process the data to align the data received from the other device and from the system;
determine a manner in which the network resources are to be consolidated based on the one or more physical dimensions of the network resources;
determine an order in which to consolidate the network resources based on the one or more physical dimensions; and
perform an action based on determining the manner in which the network resources are to be consolidated,
the action being associated with consolidating the network resources.

US Pat. No. 10,341,252

PARTITION ARBITRATION OPTIMIZATION

Veritas Technologies LLC,...

1. A computer-implemented method comprising:in response to a cluster being partitioned into a plurality of network partitions,
determining, using a first node in a first network partition of the plurality of network partitions, whether
the first node wins a race between the first node and another node, for one or more coordination points of a plurality of coordination points, wherein the first node, in response to winning the race, can configure the one or more coordination points to fence off the other node in the cluster in order to preclude access by the other node to one or more storage devices, and
the plurality of coordination points comprise an odd number of coordination points,
transmitting the determination of the first node to a second node in the first network partition, and
determining, using the second node, whether the second node wins one or more additional coordination points of the plurality of coordination points, other than the one or more coordination points.

US Pat. No. 10,341,251

METHOD AND SYSTEM FOR SECURELY TRANSMITTING VOLUMES INTO CLOUD

Citrix Systems, Inc., Fo...

1. A method comprising:(a) receiving, by a device of a cloud computing service, a first instruction to generate a virtual machine, the generated virtual machine receiving via a first connection a number uniquely associated with a volume service;
(b) receiving, by the device of the cloud computing service, a second instruction to generate one or more target volumes to associate with the generated virtual machine, and generating the one or more target volumes;
(c) receiving, by the generated virtual machine, one or more messages via a second secured connection, the one or more messages comprising an identification of one or more volumes of data and an identification of the number uniquely associated with the volume service received via the first connection;
(d) authenticating, by the generated virtual machine, the one or more messages based at least on the number uniquely associated with the volume service by matching the number uniquely associated with the volume service received via the first connection with the identification of the one or more volumes of data and the identification of the number uniquely associated with the volume service received via the second secured connection;
(e) receiving, by the generated virtual machine, the one or more volumes of data to be stored to the generated one or more target volumes; and
(f) storing the one or more volumes of data to the generated one or more target volumes.

US Pat. No. 10,341,250

DEVICE BASED AUTOMATIC NETWORK PROVISIONING

Accenture Global Solution...

1. A device, comprising:one or more processors to:
receive, from a first party, a user identifier identifying the first party;
provide, to the first party, a user interface including information identifying one or more types of network functionalities for implementation, by a second party, in a network implementation,
the user interface being associated with a configuration automatically identified based on the user identifier identifying the first party, and
the user interface being associated with receiving a selection of the configuration for the network implementation;
detect an interaction with the user interface associated with selecting the configuration for the network implementation,
the configuration for the network implementation indicating integration of a set of third party network functionalities associated with a set of third parties;
automatically provision a set of computing resources for the network implementation based on the configuration for the network implementation,
the set of computing resources providing the set of third party network functionalities; and
provide, to the first party, access to the network implementation based on automatically provisioning the set of computing resources.

US Pat. No. 10,341,249

METHOD FOR UPDATING MESSAGE FILTER RULES OF A NETWORK ACCESS CONTROL UNIT OF AN INDUSTRIAL COMMUNICATION NETWORK ADDRESS MANAGEMENT UNIT, AND CONVERTER UNIT

Siemens Aktiengesellschaf...

1. A method of updating message filter rules of a network access control unit within a firewall system of an industrial communication network including a first communication device, a second communication device, the firewall system further including an address management unit and a converter unit, the method comprising:assigning at least one address-based message filter rule defined symbolically based on device descriptions to the first communication device;
registering the at least one address-based message filter rule defined symbolically based on device descriptions with a corresponding communication network address and a communication device description in the address management unit of the firewall system further including the network access control unit and the converter unit upon identifying an activation, the communication device description comprising at least one of a function indication and a topology indication;
replacing the first communication device with the second communication device, and registering the second communication device in the address management unit of the firewall system further including the network access control unit and the converter unit in response to the replacement of the first communication device with the second communication device such that a communication network address and a communication device description of the second communication device are acquired;
checking, by the address management unit of the firewall system further including the network access control unit and the converter unit, during the registration of the second communication device, whether a communication device with an identical communication device description is already registered;
upon determining that there is a positive check result by the address management unit of the firewall system further including the network access control unit and the converter unit, the address management unit of the firewall system transmitting a change message relating to the registration of the second communication device with a communication device description that is identical to that of the first communication device to the network access control unit or to the converter unit, the change message comprising at least the communication network address and the communication device description of the second communication device; and
upon receiving the change message, replacing the communication network address of the first communication device with the communication network address of the second communication device based on the at least one address-based message filter rule defined symbolically based on device descriptions to update the message filter rules of the firewall system including the address management unit, the network access control unit and the converter unit of the industrial communication network.

US Pat. No. 10,341,248

EVALUATION DEVICE, EVALUATION METHOD AND RECORDING MEDIUM

NIPPON TELEGRAPH AND TELE...

1. An evaluation device, comprising: a communication interface configured to communicate with a control device which is connected to a network that includes at least one transfer device and to receive, from the control device, records used for transmission control of data currently circulating in the network: andprocessing circuitry configured to implement
a first evaluator configured, for each of the records, to evaluate extent of variation of an amount of the data, based on a history of the amounts of the data matching a condition of the record;
a second evaluator configured, for each of the records, to evaluate a size of a space represented by the record, based on the condition of the record; and
a calculator configured, for each of the records, to calculate an index value representing a possibility that the respective record corresponds to a future spike flow at a future time when a predetermined or a greater amount of the data matches the condition of the record within a fixed period of time, based on an evaluation result by the first evaluator, and an evaluation result by the second evaluator,
wherein the processing circuitry is configured to control an output of an indication of a possibility that one of the records corresponds to a future spike flow based on the calculated index values for each of the records.

US Pat. No. 10,341,247

HANDLING PATH ISSUES FOR STORAGE COPY SERVICES

International Business Ma...

1. A method for determining path health to conduct a plurality of Input-Output (IO) operations along a healthy path in a network, the method comprising:receiving an original IO request from a user;
sending the received original IO request on a first path from a primary site to a secondary site;
determining a first IO response associated with the sent original IO request has exceeded a threshold time on the first path between the primary site and the secondary site;
generating a duplicate IO request based on the exceeded threshold time for a response on the first path between the primary site and the secondary site;
sending the generated duplicate IO request on a second path;
receiving a second IO response associated with the sent duplicate IO request on the second path;
receiving the first IO response associated with the original IO request on the first path;
determining that the first IO response was received on the first path after the second IO response was received on the second path;
determining a health state associated with the first path based on determining that the first IO response was received on the first path after the second IO response was received on the second path; and
refreshing a path state machine based on the determined health state associated with the first path.

US Pat. No. 10,341,246

UPDATE PACKET SEQUENCE NUMBER PACKET READY COMMAND

Netronome Systems, Inc., ...

1. A method involving a network flow processor integrated circuit, wherein the network flow processor integrated circuit comprises a first network interface circuit, a second network interface circuit, a bus, and at least a part of a memory system, the method comprising:(a) storing a multicast packet in the memory system;
(b) receiving an egress packet descriptor from the memory system via the bus and onto the first network interface circuit, wherein the egress packet descriptor includes a packet sequence number and a packet ready command, wherein the packet ready command includes a multicast value, an updated sequence number, and an indicator of a network interface circuit, wherein the multicast value indicates whether a packet described by the egress packet descriptor is a multicast packet or a unicast packet, and wherein the first network interface circuit uses and maintains sequence numbers in a first sequence of sequence numbers;
(c) determining a communication mode as a function of the multicast value, wherein the indicator of the network interface circuit of the packet ready command indicates the second network interface circuit, and wherein the second network interface circuit uses and maintains sequence numbers in a second sequence of sequence numbers; and
(d) as a result of the determining of (c) replacing the packet sequence number of the egress packet descriptor with the updated sequence number of the packet ready command thereby generating a modified egress packet descriptor, wherein the receiving of (b), the determining of (c), and the replacing of (d) are performed by the first network interface circuit, wherein at least one copy of the multicast packet is transmitted out of the network flow processor integrated circuit via at least one of the first network interface circuit and the second network interface circuit.

US Pat. No. 10,341,245

BURSTY DATA TRANSMISSION IN A CONGESTION CONTROLLED NETWORK

VMWare, Inc., Palo Alto,...

1. A computer-implemented method comprising:receiving low-latency data, the low-latency data is configured to be transmitted over a network link employing a transport layer congestion control protocol;
determining a window threshold period based on the transport layer congestion control protocol, the window threshold period representing a length of time before a congestion window of the transport layer congestion control protocol begins to decrease in size based on a lack of data transmissions during the length of time;
detecting an idle period between transmissions of bursts of low-latency data; and
transmitting priming data only when the idle period between the transmissions of the bursts of the low-latency data is to exceed the window threshold period, the priming data being transmitted such that the congestion window progressively increases in size or is prevented from decreasing in size.

US Pat. No. 10,341,244

APPARATUS AND METHOD FOR SELECTION OF ENHANCED DISTRIBUTED CHANNEL ACCESS PARAMETERS FOR OFDMA

Nokia Technologies Oy, E...

1. A method, comprising:by an apparatus,
selecting a group of packets for at least one access category;
determining a set of contention parameters based on the at least one access category;
transmitting the selected group of packets by using the determined set of contention parameters;
obtaining information about collision of the transmitted group of packets; and
determining an updated set of contention parameters based on the obtained collision information and a predefined condition;
wherein the set of contention parameters includes a contention window size, and the determining an updated set of contention parameters comprises increasing the contention window size, determining a new access category, and using the minimum of the increased contention window size and the maximum allowed contention window size of the new access category as the updated contention window size.

US Pat. No. 10,341,243

SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM

NOMADIX, INC., Agoura Hi...

1. A method of managing network access using a network management system, the method comprising:receiving a domain name system (DNS) request for a DNS server to resolve a first internet protocol (IP) address associated with a destination site from a user device, wherein the destination site is located external to a network of the network management system;
in response to the DNS request, sending a second IP address to the user device, wherein the second IP address is different than the first IP address and wherein the second IP address corresponds to a network system that is a part of the network of the network management system;
completing a transmission control protocol handshake between the second IP address and a source IP address of the user device;
receiving an HTTP request for the destination site from the user device;
in response to receiving the HTTP request, generating response data, the response data including alternate content that is different from content of the destination site;
sending to the user device the generated response data including alternate content; and
replacing an address of the requested DNS server with an address of a local DNS server.

US Pat. No. 10,341,242

SYSTEM AND METHOD FOR PROVIDING A PROGRAMMABLE PACKET CLASSIFICATION FRAMEWORK FOR USE IN A NETWORK DEVICE

ORACLE INTERNATIONAL CORP...

1. A network device providing a programmable packet classification framework in a network device in a high performance network, comprising:a memory, and a microprocessor;
a plurality of ingress ports for receiving data packets based on a plurality of protocols;
a plurality of hardware-based classification primitives including a key composition primitive, a key composition rule primitive, and a next action primitive;
one or more lookup tables, and a match action table;a state machine configured to track states of the processing of each data packet;wherein the key composition primitive is configured to construct a current lookup key for said each data packet based on the key composition rule primitive, and to present the current lookup key to a lookup table;
wherein a match with the lookup key in the lookup table results in an action match in the match action table for said each data packet;
wherein the action match is associated with information for use in constructing a next lookup key for said each data packet;
wherein each of the current lookup key and the next lookup is associated with a value in the state machine, wherein the value indicates a particular protocol layer being processed in said each data packet;
wherein the plurality of classification primitives are logically connected, with a result from one classification primitive fed into the next classification primitive;
whereby the network device is configured to,
parse each of said data packets recursively using the plurality of classification primitives until classification of said each data packet based on a particular protocol of the plurality of protocols is completed,
categorize said data packets into a plurality of flows based on said classification of each of said data packets,
and process said data packets categorized into each of said plurality of flows according to a predefined rule associated with said each of said plurality of flows.

US Pat. No. 10,341,241

HISTORY-BASED CLASSIFICATION OF TRAFFIC INTO QOS CLASS WITH SELF-UPDATE

HUGHES NETWORK SYSTEMS, L...

1. A method of traffic classification, comprising:receiving, at a traffic classifier, a first flow packet of a current traffic flow;
identifying, by the traffic classifier, a target destination of the current traffic flow based on the first flow packet;
checking a history, by the traffic classifier, wherein the history associates a plurality of target destinations with an associated classification type, wherein the history comprises a lookup table mapping one or more IP addresses to one or more FQDNs, and a lookup table mapping each FQDN of the one or more FQDNs to a quality of service (“QoS”) class, wherein the lookup table mapping each FQDN of the one or more FQDNs to a QoS class is updated over time using received traffic flows; and
using at least the check of the history, tagging, by the traffic classifier, the current traffic flow as belonging to the classification type associated with the target destination;
wherein the classification type comprises one of a plurality of QoS classes having one or more QoS requirements.

US Pat. No. 10,341,240

EQUATION-BASED RATE CONTROL USING NETWORK DELAY FOR VARIABLE BITRATE SCENARIOS

Microsoft Technology Lice...

1. A computing device comprising:a processing unit;
memory; and
a network interface;
the processing unit executing computer instructions performing equation-based rate control using delay for network communications, the operations comprising:
obtaining an observed network data rate for a network communication occurring between computing devices based on a current target network data rate, wherein the observed network data rate is an actual bitrate observed for the network communication;
obtaining a queueing delay for the network communication;
calculating an updated target network data rate based on the observed network data rate and the queueing delay, wherein the updated target network data rate:
increases as the observed network data rate increases; and
decreases as the queueing delay increases; and
setting the current target network data rate for the network communication to the calculated updated target network data rate.

US Pat. No. 10,341,239

EFFICIENT POLICY ENFORCEMENT FOR DOWNLINK TRAFFIC USING NETWORK ACCESS TOKENS—CONTROL-PLANE APPROACH

QUALCOMM Incorporated, S...

1. A method, operational at a gateway device, comprising:detecting, at the gateway device, a trigger associated with a device;
identifying an application service, associated with an application server hosting the application service and including an application function, and associated with the device, responsive to detecting the trigger;
obtaining a traffic network policy associated with the application service;
obtaining a network access token based on the traffic network policy, wherein the network access token is sent from the gateway device to the application function of the application server in control-plane signaling and returned, from the application server to the gateway device with a downlink data packet that includes the network access token in user-plane traffic that is destined for the device, and the network access token facilitates validating and/or mapping the downlink data packet that includes the network access token.

US Pat. No. 10,341,238

TRANSMISSION CONTROL METHOD, APPARATUS AND SYSTEM

Huawei Technologies Co., ...

1. A transmission control method, comprising:acquiring link status information of a network;
determining recommended values of parameters for Transmission Control Protocol (TCP) transmission according to the link status information; and
sending the recommended values of the parameters to a TCP agent, to instruct the TCP agent to perform TCP transmission control according to the recommended values of the parameters;
wherein determining the recommended values of the parameters for TCP transmission according to the link status information comprises: determining a recommended size of an initial congestion window and recommended congestion avoidance thresholds corresponding to different subscribed bandwidths according to the link status information;
wherein performing TCP transmission control according to the recommended values of the parameters comprises:
in a slow start phase, adjusting an initial sending window according to the recommended size of the initial congestion window and transmitting segmented packets based on the adjusted initial sending window until a congestion avoidance phase is entered; and
in the congestion avoidance phase, if a recommended congestion avoidance threshold is less than a size of a receiver window and is less than a congestion avoidance threshold in actual transmission, adjusting attenuation of the congestion avoidance threshold and controlling the attenuated congestion avoidance threshold to be greater than or equal to the recommended congestion avoidance threshold when a packet loss or a retransmission timeout occurs; or, in the congestion avoidance phase, if the recommended congestion avoidance threshold is greater than or equal to a size of a receiver window, adjusting a congestion avoidance threshold to or approximately to the size of the receiver window and varying the congestion avoidance threshold with variation of the receiver window.

US Pat. No. 10,341,237

FLOW-BASED ADAPTIVE PRIVATE NETWORK WITH MULTIPLE WAN-PATHS

TALARI NETWORKS, INC., S...

1. A method for adapting a network configuration to changing communication patterns between nodes in a network, the method comprising:calibrating a network time at each node of a first network configuration having a plurality of nodes to a master clock time in a network control point (NCP) that is separate from and coupled to the nodes in the first network configuration;
after operating the first network configuration for a pre-specified time, determining path characteristics of the first network configuration, including round trip time and jitter, for each path in a group of paths available to connect a first node with a second node using the calibrated network time in the first node and in the second node;
selecting a first path from the group of paths that has the best round trip time with lowest jitter and is available for connecting the first node with the second node, wherein the first network configuration is adapted to a second network configuration that includes the selected first path which is different from a prior path between the first node and the second node that was used in the first network configuration; and
tracking a traffic flow between the first node and the second node including information pertaining to the last path selected, time of last packet received, and time of last packet transmitted.

US Pat. No. 10,341,236

ANYCAST EDGE SERVICE GATEWAYS

NICIRA, INC., Palo Alto,...

1. A method for managing network traffic in a virtualized environment comprising:configuring a plurality of edge gateways connected to a logical switching element to use a same anycast internet protocol (IP) address and a same anycast media access control (MAC) address, the edge gateways for facilitating communication between sources on a logical network and destinations on an external network, said logical network comprising the logical switching element;
configuring a set of virtual extensible local area network tunnel end points (VTEPs) to use a same anycast VTEP IP address, each VTEP in the set of VTEPs connected to at least one edge gateway in the plurality of edge gateways, wherein each VTEP in the set of VTEPs advertises the availability of the anycast VTEP IP address to a set of one or more forwarding elements connecting the VTEP to an underlay network; and
configuring a distributed router to send data packets with destinations outside the logical network from sources belonging to the logical network to the set of forwarding elements by using the anycast VTEP IP address,
wherein, for each packet flow that a particular forwarding element receives with an anycast VTEP IP address, the particular forwarding element selects a VTEP from a plurality of the VTEPs associated with a set of the edge gateways that are closest to the particular forwarding element according to a best route calculation, and forwards the packet flow to the selected VTEP to forward the packet flow to an edge gateway associated with the selected VTEP for forwarding outside the logical network.

US Pat. No. 10,341,235

LOAD BALANCING IMPLEMENTATION METHOD, DEVICE, AND SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A load balancing method comprising:determining, by a switch according to a second flow entry and a meter entry of each output port, a write value corresponding to a real-time flow rate of each output port when a first flow entry used to forward traffic received by the switch does not exist, wherein the meter entry of each output port comprises at least one preset rate value and a write value corresponding to each preset rate value, wherein the second flow entry is corresponding to a service to which the traffic belongs, and wherein the second flow entry comprises a command for executing the meter entry of each output port and a command for reporting the traffic to a controller;
sending, by the switch, report information of the traffic to the controller, wherein the report information comprises the write value corresponding to the real-time flow rate of each output port;
receiving, by the switch, a forwarding flow entry sent by the controller, wherein the forwarding flow entry comprises an identifier of a target output port used to forward the traffic and is created by the controller according to the write value corresponding to the real-time flow rate of each output port; and
forwarding, by the switch, the traffic through the target output port.

US Pat. No. 10,341,234

METHOD, COMPUTING DEVICE AND SYSTEM FOR INVOKING SOFTWARE APPLICATION METHODS OF REMOTE JAVA OBJECTS

HUAWEI TECHNOLOGIES CO., ...

1. A method for invoking a software application of remote JAVA objects comprising:receiving, by a software defined network (SDN) application located in a network path between a client and a plurality of JAVA application server instances, at least one remote JAVA application object request from the client;
forwarding, by the SDN application, the at least one remote JAVA application object request to the plurality of JAVA application server instances;
generating, by the SDN application, at least one remote JAVA application object pool based on object references received from the plurality of JAVA application server instances in response to the at least one forwarded remote JAVA application object request;
returning the at least one remote JAVA application object pool to the client;
receiving, by the SDN application, at least one remote JAVA application method invocation request from the client associated with the at least one remote JAVA application object request;
delegating the at least one remote JAVA application method invocation request on stateless remote JAVA application object instances to one or more arbitrary JAVA application server instances in a load-balanced manner by:
weighting the at least one remote JAVA application method invocation request; and
delegating the at least one remote JAVA application method invocation request based on a measured load of the plurality of JAVA application server instances;
sending the at least one remote JAVA application method invocation request on stateful remote JAVA application object instances to request JAVA application server instances; and
retaining, by the SDN application, at least one remote JAVA application object pool to accommodate the at least one remote JAVA application object request.

US Pat. No. 10,341,233

DYNAMICALLY ADJUSTING A DATA COMPUTE NODE GROUP

NICIRA, INC., Palo Alto,...

1. A non-transitory machine readable medium storing a program for managing a set of middlebox service destination compute nodes (DCNs) that process data messages from a set of source compute nodes (SCNs), the program comprising sets of instructions for:collecting, from a plurality of load balancers executing on a plurality of host computers along with the set of SCNs and implementing a distributed load balancer for the set of middlebox service DCNs, message traffic load statistics relating to data messages from the SCNs that the plurality of load balancers distribute to the DCNs of the DCN set, the data messages from the SCNs being addressed to data compute end nodes (DCENs) other than the middlebox service DCN set before being redirected to the middlebox service DCN set, each middlebox service DCN in the middlebox service DCN set performing a middlebox service operation on SCN data messages distributed to the particular middlebox service DCN from the distributed load balancer;
analyzing the message traffic load statistics; and
based on the analyzed message traffic load statistics, directing a set of one or more controllers to modify the middlebox service DCN set's membership.

US Pat. No. 10,341,232

PACKET PREDICTION IN A MULTI-PROTOCOL LABEL SWITCHING NETWORK USING OPENFLOW MESSAGING

Netronome Systems, Inc., ...

1. A method comprising:(a) receiving a plurality of packets on a first switch;
(b) performing a packet prediction learning algorithm on the first switch using the first plurality of packets and thereby generating a packet prediction information;
(c) communicating the packet prediction information from the first switch to a Network Operating Center (NOC);
(d) in response to (c) the NOC communicates the packet prediction information to a second switch;
(e) in response to (d) the NOC communicates a packet prediction control signal to the second switch; and
(f) in response to (e) the second switch utilizes the packet prediction control signal to determine if a packet prediction operation algorithm utilizing the packet prediction information is to be performed, wherein the communications of (c) and (d) are accomplished using at least one OpenFlow message, and wherein the packet prediction information includes Inter-Packet Interval (IPI) information for a specific application protocol.

US Pat. No. 10,341,231

METHOD FOR HANDLING A RECEIVED VEHICLE-TO-X MESSAGE IN A VEHICLE, VEHICLE-TO-X COMMUNICATIONS MODULE AND STORAGE MEDIUM

1. A method for handling a received vehicle-to-X message in a vehicle comprising:establishing whether the message having at least a header and a body is suitable for simplified processing;
forwarding of the header without the body to a self-learning map, when the message is suitable for simplified processing; and
forwarding of the header with the body to the self-learning map, when the message is not suitable for simplified processing.

US Pat. No. 10,341,230

TECHNIQUES FOR FORWARDING OR RECEIVING DATA SEGMENTS ASSOCIATED WITH A LARGE DATA PACKET

INTEL CORPORATION, Santa...

1. A method comprising:generating a large data packet, the large data packet including an amount of data that is larger than a maximum transmission unit (MTU) associated with individual data frames to be forwarded via a communication channel;
notifying a network input output (I/O) device that the large data packet is ready to be forwarded to a destination via the communication channel, the network I/O device communicatively coupled to the communication channel, the notification including an instruction to the network I/O device to segment the large data packet into a plurality of data segments, each data segment to include an amount of data no greater than the MTU, generate separate headers for each of the plurality of data segments, and send the plurality of data segments with separate headers to the destination via the communication channel; and
receiving an indication that the large data packet has been received, the indication comprising one or more memory addresses associated with the large data packet.

US Pat. No. 10,341,229

METHOD AND APPARATUS FOR CONFIGURING OPTICAL NETWORK NODES

Telefonaktiebolaget LM Er...

1. A method of configuring optical network nodes between a plurality of Remote Radio Units and at least one Baseband Unit, comprising:monitoring a bandwidth demand of each Remote Radio Unit,
calculating a routing configuration of the nodes to connect at least one Remote Radio Unit on a tree arrangement to a said Baseband Unit,
wherein the calculating the routing configuration is based on at least one connection requirement between the Remote Radio Units and the Baseband Units and the bandwidth demand of each Remote Radio Unit, and
dynamically configuring one or more optical network nodes to adapt the routing configuration from a said Remote Radio Unit to a said Baseband Unit, according to the calculated routing configuration;
wherein calculating the routing configuration comprises initially calculating a connection of a said Remote Radio Unit in a tree arrangement, and if the tree arrangement is not determined to meet at least the traffic demand and connection requirement, then calculating the routing configuration as a point-to-point connection to a said Baseband Unit.

US Pat. No. 10,341,228

RSVP MAKE-BEFORE-BREAK LABEL REUSE

Juniper Networks, Inc., ...

1. A method comprising:receiving, by a router and from an upstream router, a first message requesting establishment of a label switched path (LSP), wherein the first message includes a tunnel identifier pair comprising a tunnel identifier and an extended tunnel identifier used to uniquely identify the requested LSP;
comparing, by the router, the tunnel identifier pair for the requested LSP to existing LSP information stored at the router, the existing LSP information including tunnel identifier pairs for one or more existing LSPs; and
based on a determination that the tunnel identifier pair for the requested LSP is the same as one of the tunnel identifier pairs for one of the existing LSPs, assigning, by the router, a label used by the router to identify incoming traffic associated with the requested LSP that is the same as a previously allocated label for the one of the existing LSPs having the same tunnel identifier pair as the requested LSP.

US Pat. No. 10,341,227

METHOD AND SYSTEM FOR ASYMMETRIC REDUNDANCY MECHANISMS IN MULTI-HOMED NETWORK ACCESS TOPOLOGIES

Cisco Technology, Inc., ...

1. A method comprising:receiving a network communication at a first network device coupled to a first network and a second network, wherein
the network communication comprises a first network address in the second network that is associated with a second network device coupled to the second network;
determining whether to forward the network communication into the first network over a logical connection, wherein
the logical connection is associated with a second network address in the second network, and
the determining is based, at least in part, on a determination, as to whether the first network device and the second network device are coupled to the logical connection, that uses the first network address and the second network address; and
if the network communication is to be forwarded into the first network over the logical connection, forwarding the network communication into the first network over the logical connection.

US Pat. No. 10,341,225

BONDING OF SATELLITE TERMINALS

Hughes Network Systems, L...

1. A satellite terminal comprising:a radio configured to provide a first satellite communication link;
one or more processors; and
one or more data storage devices storing instructions that, when executed by the one or more processors, cause the satellite terminal to perform operations comprising:
determining, by the satellite terminal, that the satellite terminal is in communication with a second satellite terminal that has a second satellite communication link;
in response to determining that the satellite terminal is in communication with the second satellite terminal that has the second satellite communication link:
bonding at least an uplink portion of the first satellite communication link with an uplink portion of the second satellite communication link; and
indicating, to a data source device in communication with the satellite terminal, an available uplink bandwidth that exceeds a transmission bandwidth of the first satellite communication link, wherein the data source device is separate from the satellite terminal and the second satellite terminal;
receiving, by the satellite terminal, packet data from the data source device;
in response to determining that the satellite terminal is in communication with the second satellite terminal, selecting, by the satellite terminal and from among the packet data, (i) first packet data for transmission over the first satellite communication link and (ii) second packet data for transmission over the second satellite communication link;
transmitting, by the satellite terminal, the first packet data over the first satellite communication link; and
providing, by the satellite terminal, the second packet data to the second satellite terminal for transmission over the second satellite communication link.

US Pat. No. 10,341,224

LAYER-3 FLOW CONTROL INFORMATION ROUTING SYSTEM

Dell Products L.P., Roun...

1. A flow control information routing system, comprising:a receiver node device;
a plurality of intermediate node devices that are coupled to the receiver node device and that are configured to:
receive at least one traffic flow that is directed downstream;
transmit the at least one traffic flow downstream; and
provide flow control information upstream that is based on the at least one traffic flow transmitted downstream; and
a sender node device that includes a plurality of egress ports that are coupled to the receiver node device through the plurality of intermediate node devices, wherein the sender node device is configured to:
perform a first layer 3 routing decision to direct a first traffic flow to the receiver node device through a first egress port of the plurality of egress ports and along a first traffic flow path that includes at least one first intermediate node device of the plurality of intermediate node devices;
receive first flow control information that is provided by the at least one first intermediate node device;
receive second flow control information that is provided by at least one second intermediate node device of the plurality of intermediate node devices that is coupled to a second egress port of the plurality of egress ports; and
perform a second layer 3 routing decision, in response to the first flow control information from the at least one first intermediate node device and the second flow control information from the at least one second intermediate node device indicating that a second traffic flow path through the second egress port has a lower down time during a first time period than the first traffic flow path during the first time period, in order to direct the first traffic flow to the receiver node device through the second egress port along the second traffic flow path that includes the at least one second intermediate node device and that does not include the at least one first intermediate node device.

US Pat. No. 10,341,223

MULTICAST DATA PACKET FORWARDING

New H3C Technologies Co.,...

1. A method for forwarding a multicast data packet comprising:receiving, by an I/O board of an Virtual extensible Local Area Network (VXLAN) switch, a multicast data packet having a first VXLAN encapsulation;
removing, by the I/O board of the VXLAN switch, the first VXLAN encapsulation from the multicast data packet having the first VXLAN encapsulation;
determining, by the I/O board of the VXLAN switch, that layer 3 multicast forwarding is to be performed for the multicast data packet;
sending, by the I/O board of the VXLAN switch, the multicast data packet to a fabric board of the VXLAN switch;
receiving, by the fabric board of the VXLAN switch, the multicast data packet sent by the I/O board;
determining, by the fabric board of the VXLAN switch, that layer 3 multicast forwarding is to be performed by the fabric board for the multicast data packet;
modifying, by the fabric board of the VXLAN switch, a source Media Access Control (MAC) address of the multicast data packet as a gateway MAC address of the VXLAN switch when a multicast group member port corresponding to the multicast data packet is a VXLAN tunnel port;
sending, by the fabric board of the VXLAN switch, the modified multicast data packet to an I/O board corresponding to the multicast group member port on the VXLAN switch;
receiving, by the I/O board corresponding to the multicast group member port on the VXLAN switch, the multicast data packet sent by the fabric board;
adding, by the I/O board corresponding to the multicast group member port on the VXLAN switch, a second VXLAN encapsulation to the multicast data packet; and
forwarding, by the I/O board corresponding to the multicast group member port on the VXLAN switch, the multicast data packet having the second VXLAN encapsulation to a VXLAN;
wherein sending the modified multicast data packet to the I/O board corresponding to the multicast group member port on the VXLAN switch comprises:
determining, by the fabric board of the VXLAN switch, a target egress port according to the multicast group member port;
selecting, by the fabric board of the VXLAN switch, an I/O board including the target egress port as the I/O board corresponding to the multicast group member port;
adding, by the fabric board of the VXLAN switch, a second internal encapsulation to the modified multicast data packet to a multicast data packet having the second internal encapsulation; and
sending, by the fabric board of the VXLAN switch, the multicast data packet having the second internal encapsulation to the I/O board including the target egress port;
wherein the second internal encapsulation comprising an VXLAN tunnel encapsulation entry index corresponding to the multicast group member port and a VFI corresponding to the multicast group member port;
wherein adding the second VXLAN encapsulation to the multicast data packet and forwarding the multicast data packet having the second VXLAN encapsulation to the VXLAN comprises:
determining, by the I/O board corresponding to the multicast group member port on the VXLAN switch, the VXLAN tunnel encapsulation entry index and the VFI from a header of the second internal encapsulation;
removing, by the I/O board corresponding to the multicast group member port on the VXLAN switch, the second internal encapsulation from the multicast data packet having the second internal encapsulation;
finding, by the I/O board corresponding to the multicast group member port on the VXLAN switch, a locally stored VXLAN tunnel encapsulation entry corresponding to the VXLAN tunnel encapsulation entry index;
searching, by the I/O board corresponding to the multicast group member port on the VXLAN switch, a preconfigured mapping relation between VFIs and VNIDs for a VNID corresponding to the determined VFI;
adding, by the I/O board corresponding to the multicast group member port on the VXLAN switch, the second VXLAN encapsulation to the multicast data packet according to the VXLAN tunnel encapsulation entry and the searched-out VNID; and
sending, by the I/O board corresponding to the multicast group member port on the VXLAN switch, the multicast data packet having the second VXLAN encapsulation via an egress port in the found VXLAN tunnel encapsulation entry.

US Pat. No. 10,341,222

TRAFFIC ENGINEERING FOR BIT INDEXED EXPLICIT REPLICATION

Cisco Technology, Inc., ...

1. A method, comprising:determining a path to be taken by a message through multiple nodes of a network configured for bit indexed forwarding, wherein the message is configured to carry a message bit array from node to node along the path;
assigning a first bit position within the message bit array to a first path segment within the path, wherein the first path segment is not directly connected to an egress node of the network;
storing, in a data structure accessible by a network controller, a mapping of the first path segment to the first bit position, wherein
the data structure is configured for storing bit position assignments for path segments, throughout the network, having assigned bit positions,
the data structure is configured for use in generating the message bit array and in generating additional message bit arrays incorporating the mapping of the first path segment to the first bit position, and
the additional message bit arrays encode additional paths through the network, including one or more paths not comprising the first path segment;
communicating, to a first network node along the path, the mapping of the first path segment to the first bit position, wherein the first network node is directly connected to the first path segment;
generating the message bit array, wherein bit values at bit positions in the message bit array indicate whether respective path segments having the assigned bit positions are included in the path to be taken by the message; and
communicating, to an ingress node to the network, the message bit array and information associated with a corresponding message flow comprising the message, wherein the message bit array encodes the path for messages in the message flow.

US Pat. No. 10,341,221

TRAFFIC ENGINEERING FOR BIT INDEXED EXPLICIT REPLICATION

Cisco Technology, Inc., ...

1. A method comprising:receiving, at a first node in a network configured for traffic-engineered bit indexed forwarding, a message comprising a message bit array;
comparing bit values at one or more bit positions in the message bit array to one or more entries in a forwarding table stored at the first node, wherein the one or more bit positions are assigned to separate segments of a path or tree in the network; and
forwarding the message over a segment represented in the forwarding table if a result of the comparing indicates that the segment is included in a path to be taken by the message, wherein
the segment represented in the forwarding table is assigned one of the bit positions in the message bit array,
the one of the bit positions in the message bit array does not represent an egress node, of the network configured for traffic-engineered bit indexed forwarding, reachable via the segment,
the path to be taken by the message is defined as an end to end connection of multiple segments assigned bit positions having a first bit value in the message bit array, and
the forwarding comprises changing the bit value of the bit position, in the message bit array, assigned to the segment represented in the forwarding table.

US Pat. No. 10,341,220

VIRTUAL SHORTEST PATH TREE ESTABLISHMENT AND PROCESSING METHODS AND PATH COMPUTATION ELEMENT

Huawei Technologies Co., ...

1. A path computation element (PCE), comprising:a processor; and
a computer readable medium having a plurality of computer executable instructions that, when executed by the processor, cause the processor to perform operations comprising:
determining whether a cost of a path from a root node to a leaf node in a virtual shortest path tree (VSPT) obtained by a PCE of a downstream neighboring domain in a domain sequence is less than a cost threshold, wherein the root node is a destination node, the leaf node is a boundary node that is in the downstream neighboring domain and that has an inter-domain link with a domain in which a source node is located, the domain sequence is a sequence of domains passed from the source node to the destination node, the downstream refers to a direction from the source node to the destination node, and the PCE is a PCE of the domain in which the source node is located;
adding a path branch from the leaf node to the source node to the VSPT when the cost of the path from the root node to the leaf node is less than the cost threshold, so as to obtain a new VSPT; and
receiving a message that is sent by the PCE of the downstream neighboring domain and that carries the VSPT and the cost of the path from the root node to the leaf node in the VSPT, and obtaining the VSPT and the cost of the path from the root node to the leaf node in the VSPT.

US Pat. No. 10,341,219

DETERMINING CONNECTIONS BETWEEN NODES IN A NETWORK

International Business Ma...

1. A computer-implemented method of determining valid connections between a source node and a target node in a communication network comprising:determining groups of nodes within the communication network with each group forming a bi-connected component;
traversing the groups of nodes in a depth first search beginning with the source node;
storing, for each traversed node, a respective depth in a search tree and a respective lowpoint;
identifying cut nodes from the groups of nodes other than the source node, each respective identified cut node having a respective child node with a lowpoint that is greater than or equal to the depth of the respective identified cut node;
determining nodes from the groups of nodes that can be isolated from the source node and the target node by removal of any one of the identified cut nodes;
after determining all of the determined nodes that can be isolated from the source node and the target node by removal of the any one of the identified cut nodes, removing all of the determined nodes that can be isolated from the source node and the target node by removal of the any one of the identified cut nodes to produce a resulting set of nodes;
determining the valid connections in the communication network between the source node and the target node that include only nodes in the resulting set of nodes; and
providing information from the source node to the target node via one or more of the determined valid connections, wherein
a running time for performing the step of determining the groups of nodes within the communication network through the step of removing all of the determined nodes that can be isolated from the source node and the target node by removal of the any of the identified cut nodes is linear with respect to a size of a graph of the communication network.

US Pat. No. 10,341,217

LOCAL PERFORMANCE TEST DEVICE

Centurylink Intellectual ...

1. A method for testing a data connection, the method comprising:providing, a local performance test device with a first test measurement function and a second test measurement function, wherein the first test measurement function is located between cabling for a service provider network and cabling for a gateway device and terminates a physical layer of the service provider network, and wherein the second test measurement function is located between cabling for a local area network and cabling for the gateway device and terminates a physical layer of the local area network;
receiving, with a processor of the local performance test device and from a requesting device, a request to perform a test to determine a source of a data connection issue, wherein the local performance test device is in communication with the service provider network and the local area network of a user premises;
analyzing, with a processor of the first test measurement function of the of the local performance test device, a service provider network connection of the service provider network;
analyzing, with a processor of the second test measurement function of the of the local performance test device, a local area network connection of the local area network;
determining, with the processor of the local performance test device, whether the data connection issue is associated with the service provider network connection or with the local area network connection; and
sending, with the local performance test device, a result of the determination to the requesting device.

US Pat. No. 10,341,216

COMPLIANCE TEST APPARATUS AND METHOD FOR A COMMUNICATION NODE

Hyundai Motor Company, S...

1. An apparatus for a compliance test on a communication node constituting a communication network, the apparatus comprising:a monitoring port connected to a compliance test apparatus;
a first communication port connected to a first communication node in the communication network;
a first switch turning on or off a first connection between the monitoring port and the first communication port;
a second communication port connected to a second communication node in the communication network;
a second switch turning on or off a second connection between the monitoring port and the second communication port; and
a processor controlling the first and second switches to turn on or off the first and second connections,
wherein the processor receives, from the compliance test apparatus, a test request signal including identification information which identifies the first communication node or the second communication node as performing the compliance test, and controls the first switch to turn on the first connection when the identification information identifies the first communication node as performing the compliance test.

US Pat. No. 10,341,215

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR EMULATING NETWORK TRAFFIC PATTERNS ON A VIRTUAL MACHINE

KEYSIGHT TECHNOLOGIES SIN...

1. A method comprising:generating a user specification based on a plurality of network traffic patterns including a plurality of network traffic activities and computer processing usage patterns including a plurality of computer processing usage activities:
tagging each of the network traffic activities and the computer processing usage activities with an activity pairing identifier and a related time line data value:
receiving, at a virtual machine hosted by a device under test (DUT), the user specification containing the plurality of network traffic patterns and computer processing usage patterns;
generating a plurality of network traffic sequences based on the plurality of network traffic patterns and a plurality of computer processing usage pattern instruction sequences based on the plurality of computer processing usage patterns;
distributing each of the plurality of network traffic sequences among a plurality of virtual network interface cards (VNICs) and distributing each of the plurality of computer processing usage pattern instruction sequences among a plurality of virtual processing cores in the virtual machine;
emulating an operation of one or more applications on the virtual machine by executing the plurality of network traffic sequences and the computer processing usage pattern instruction sequences; and
synchronizing the execution of the plurality of network traffic sequences by the plurality VNICs with the execution of the computer processing usage pattern instruction sequences by the plurality of virtual processing cores in the virtual machine by exchanging synchronization messages containing the activity pairing identifiers and the related time line data values over a communication channel existing within the virtual machine.

US Pat. No. 10,341,214

SCENARIO COVERAGE IN TEST GENERATION

CA, Inc., Islandia, NY (...

1. A method comprising:accessing, from computer memory, transaction data generated during monitoring of a plurality of transactions involving a plurality of software components in a system;
determining, from the transaction data using at least one data processing apparatus, a respective flow of each of the plurality of transactions, wherein the determined flows of the plurality of transactions comprise a plurality of transaction flows, each transaction flow in the plurality of transaction flows involves participation of a respective subset of the software components in the plurality of software components, and each transaction flow in the plurality of transaction flows comprises a respective plurality of transaction fragments;
determining, using at least one data processing apparatus, one or more overlapping flows between the determined flows, wherein determining an overlapping flow comprises identifying one or more common transaction fragments shared between two or more different transaction flows in the plurality of transaction flows;
detecting, using at least one data processing apparatus, a number of instances of a particular one of the one or more overlapping flows;
determining that the particular overlapping flow corresponds to a particular one of a plurality of use scenarios of the system based on the number of instances of the particular of overlapping flow; and
generating an artifact executable by a computer to simulate operation of a particular software component involved in the particular use scenario based on transaction data describing transactions involved the particular overlapping flow.

US Pat. No. 10,341,213

RECEPTION DEVICE AND CLOCK GENERATING METHOD

RENESAS ELECTRONICS CORPO...

1. A reception device comprising:a storage unit storing a true time-stamp included in a packet received including audio data and the true time-stamp expressing reproduction time of the audio data;
a timer counting time;
a dummy time-stamp generation unit generating a dummy time-stamp as a false time-stamp;
a first comparator comparing time based on the true time-stamp stored in the storage unit or the dummy time-stamp and time indicated by the timer; and
a clock generation unit generating a clock in accordance with a result of the comparison of the first comparator,
wherein the first comparator performs a comparison using the dummy time-stamp until a predetermined condition is satisfied and, after the predetermined condition is satisfied, performs a comparison using the true time-stamp.

US Pat. No. 10,341,212

TELEMETRY MONITORING APPARATUS

DRAEGER SAFETY UK LIMITED...

1. A method of logging a portable device, associated with breathing apparatus worn by a user, onto a central monitoring station arranged to monitor logged-on portable devices, the method comprising:transmitting a logon message including an identifier identifying either the user or the portable device to the central monitoring station, the logon message requesting access to the central monitoring station;
storing priority data in the central monitoring station, said priority data indicating the users or portable device(s) which should be granted access to the central monitoring station;
receiving the logon message;
determining whether the identifier included in the received logon message is contained within the priority data;
immediately commencing a logon procedure to register the portable device onto the central monitoring station if it is determined that the identifier is contained within the priority data; and
waiting before commencing a logon procedure if it is determined that the identifier is not contained within the priority data, then commencing the logon procedure to register the portable device with the central monitoring station even though the identifier is not contained within the priority data.

US Pat. No. 10,341,210

DATA REGISTRATION SYSTEM, DATA REGISTRATION METHOD, PROGRAM AND NON-TRANSITORY RECORDING MEDIUM

Rakuten, Inc., Setagaya-...

1. A data registration system comprising:a terminal;
a storage; and
a server, wherein the terminal the storage and the server are configured to communicate with one another via a computer communication network, and wherein the storage is accessible from the terminal and the server through an online storage service, a network storage service, or a file hosting service and wherein:
(a) the terminal, upon an execution of a program stored in a first area of the storage, is configured to:
receive data,
check whether or not a format of the data is correct,
store, when the format of the data is correct, the data with the correct format in a file that has a file name based on a predetermined regulation in a second area of the storage, and
alert when the format of the data is incorrect, and
(b) the server is configured to:
read data, from the file which has the file name based on the predetermined regulation and which is stored in the second area of the storage, and
execute a process based on the read data.

US Pat. No. 10,341,209

TUNABLE LOW COST NETWORK

1. A method comprising:providing, by a processing system including a processor, communications services over a network to a user device;
obtaining, by the processing system, information regarding capabilities of the user device;
obtaining, by the processing system, information regarding a usage profile of the user device, wherein the usage profile includes a periodic time interval during which the user device is in an active state, the user device being in an inactive state at other times;
adjusting, by the processing system, a level of service quality provided to the user device, in accordance with at least one of the capabilities and the usage profile, by performing at least one of:
adjusting a latency criterion regarding connection of the user device to the network,
adjusting a speed of transmissions over the network to or from the user device, and
altering a routing of the transmissions to or from the user device;
determining, by the processing system, a level of excess capacity of the network for accommodating the transmissions over the network to or from the user device; and
enabling, by the processing system, the transmissions only when the level of excess capacity exceeds a predetermined level,
wherein the network is partitioned so that the adjusted level of service quality is provided by a first portion of the network having a predetermined level of network resources, the adjusted level of service quality comprising a first level while the user device is in the active state and a second level while the user device is in the inactive state, the first level being higher than the second level, and
wherein the first level and the second level are lower than a level of service quality provided by a second portion of the network.

US Pat. No. 10,341,208

FILE BLOCK PLACEMENT IN A DISTRIBUTED NETWORK

Taiwan Semiconductor Manu...

1. A method for a file block placement by predicting available bandwidth for a candidate flow on a link in a distributed network, the method comprising:obtaining information about a plurality of flows carried by the link, the information about the plurality of flows carried by the link including a current bandwidth consumption for each flow of the plurality of flows carried by the link;
identifying whether each flow of the plurality of flows has a local constraint or a remote constraint, wherein the local constraint is a throughput constraint of the each flow of the link and the remote constraint is a throughput constraint of each flow of another physical link other than the link; and
computing the available bandwidth for the candidate flow based at least in part on the information about the plurality of flows carried by the link and the identification of whether each flow of the plurality of flows has a local constraint or a remote constraint to generate a predicted available bandwidth for the candidate flow;
selecting one of a plurality of file block placement options based at least in part on the predicted available bandwidth which meets a particular quality of service (QoS) requirement;
determining a set of storage nodes which correspond to the one of the plurality of file block placement options as selected; and
performing the file block placement to the set of storage nodes, wherein computing the available bandwidth for the candidate flow comprises:
subtracting a sum of the current bandwidth consumption of the flows carried by the link having a remote constraint from a capacity of the link; and
dividing the difference by the number of flows carried by the link plus one minus the number of flows carried by the link having a remote constraint.

US Pat. No. 10,341,207

DATA MONITORING FOR NETWORK SWITCH RESOURCE

Hewlett Packard Enterpris...

17. A non-transitory machine readable storage medium for a network switch having stored thereon machine readable instructions to cause a computer processor of the network switch to:extract information from a script that indicates a switch resource to monitor, a criteria for the switch resource, and an operation to perform when the criteria is satisfied;
monitor time-series data for traffic received and transmitted by the switch;
compare the monitored time-series data for the switch resource with data provided during a training phase to determine whether the monitored time-series data satisfies the criteria; and
perform the operation when it is determined that the criteria is satisfied.

US Pat. No. 10,341,205

SYSTEM AND METHOD FOR RECORDING WEB SESSIONS

GlassBox Ltd., Petach Ti...

1. A web session recording system comprising at least one web-server, the web-server comprising one or more network cards and at least one processing unit configured to:(a) monitor one or more ports of the network cards, the ports being used for conducting a plurality of web sessions comprised of one or more packets having a destination address designating the web-server; and
(b) send web session recording enabling data based on the packets to a web session recording server for storing the data in a data repository thereby enabling recording the web sessions;
wherein (a) and (b) enable recording the web sessions without manipulating hardware resources external to the web-server.

US Pat. No. 10,341,204

METHODS AND APPARATUS FOR DEVICE MANAGEMENT

Under Armour, Inc., Balt...

1. A method of managing a plurality of health devices, each of said plurality of health devices being associated to a single user, said method comprising:causing said plurality of health devices to be connected to a management entity;
said management entity assigning a unique identifier to each of said plurality of health devices;
sending a request to each of said plurality of health devices, said request comprising a request for information relating to a status of each of said plurality of health devices;
receiving from each of said plurality of health devices said information relating to said status, said information comprising at least a first data segment configured to indicate said status and a second data segment comprising said unique identifier;
processing said first data, said act of processing comprising performing a comparison to determine a deviation of said first data segment from stored data relating to an individual one of said plurality of health devices identified by said second data segment; and
causing a display apparatus to display to said user information relating to said determined deviation.

US Pat. No. 10,341,203

POLICY TRACKING IN A NETWORK THAT INCLUDES VIRTUAL DEVICES

Gigamon Inc., Santa Clar...

1. A method performed by a network device, the method comprising:receiving, by the network device, an input signal from a device other than the network device, the input signal including an indication that the device other than the network device detected a change in a configuration of a first node or a second node of an auxiliary network from a first configuration to a second configuration, wherein the first node of the auxiliary network is configured to obtain copies of traffic production packets from a traffic production network, the first node is at a boundary between the auxiliary network and the traffic production network, the auxiliary network is not a part of the traffic production network, the second node of the auxiliary network is configured to obtain at least some of the copies of traffic production packets from the first node, and each of the first node and the second node is configured to provide at least one of a packet filtering service, a packet manipulation service, or a packet forwarding service for the copies of traffic production packets;
determining, by the network device, a first network policy including at least one of a rule or criterion that prescribes a first type of packet of the traffic production packets for processing in accordance with a first network objective and precludes from processing another type of packet of the traffic production packets, wherein the first network policy is for application on the copies of traffic production packets in the first node or the second node of the auxiliary network when the first node or the second node of the auxiliary network is in the first configuration;
determining, by the network device, a second network policy that is independent of and distinct from the first network policy and prescribes a second type of packet of the traffic production packets for processing in accordance with a second network objective and precludes from processing another type of packet of the traffic production packets, wherein the second network objective is distinct from the first network objective, is based on the change in the configuration of the first node or the second node of the auxiliary network as indicated in the input signal received from the device other than the network device, and is for application on the copies of traffic production packets in the first node or the second node of the auxiliary network when the first node or the second node of the auxiliary network is in the second configuration; and
deploying, by the network device, the second network policy for application on the copies of traffic production packets in the first node or the second node of the auxiliary network such that the network device automatically adjusts the at least one of a rule or a criterion for processing the copies of traffic production packets by the auxiliary network in accordance with the second network objective as a result of the change in the configuration of the first node or the second node of the auxiliary network as detected by the device other than the network device, wherein the second network policy is for replacing the first network policy, and the second network policy is configured to achieve an objective previously desired to be achieved by the first network policy.

US Pat. No. 10,341,202

SMARTPHONE-ASSISTED MAINTENANCE OF A SELF-SERVICE TERMINAL

Wincor Nixdorf Internatio...

1. A method for maintaining a self-service terminal, the method comprising the steps of:positioning a mobile device near a first self-service terminal to be maintained, the first self-service terminal selected from a plurality of self-service terminals;
initiating a mobile application on the mobile device;
utilizing the mobile device to optically capture a first image of a first identifier associated with the first self-service terminal;
setting up a communication link between the mobile device and a server via a mobile radio network;
transmitting information related to the first identifier from the mobile device to the server via the mobile radio network communication link;
utilizing a service application on the server to identify the first self-service terminal based on the information related to the first identifier;
setting up a direct network connection between the server and the first self-service terminal that is separate from the mobile radio network communication link;
transmitting a signal from the server to the first self-service terminal via the direct network connection to initiate a terminal application on the first self-service terminal;
determining schedule information regarding a first component of the first self-service terminal to be maintained, the first component being selected from a plurality of components of the first self-service terminal based on the information related to the first identifier;
graphically indicating the first component to a user of the mobile device;
utilizing the mobile device to optically capture a second image of a second identifier associated with the first component to be maintained;
utilizing the server to determine update information based on the second image; and
transmitting the update information to the first self-service terminal from the server via the direct network connection.

US Pat. No. 10,341,201

CROSS-DOMAIN ORCHESTRATION OF SWITCH AND SERVICE FUNCTIONS

FUJITSU LIMITED, Kawasak...

1. A method of determining a service function chain across a plurality of network domains, the method comprising:determining one or more auxiliary edges that bypass at least one vertex of a plurality of vertices that represent a plurality of physical nodes of a first network domain of the plurality of network domains;
evaluating at least one edge, that includes the one or more auxiliary edges and that interconnect the plurality of vertices, to evaluate a portion of the plurality of vertices that excludes the at least one vertex that was bypassed to identify at least one vertex that is associated with at least one service function of a service function chain request that specifies multiple service functions to be performed via at least a portion of a plurality of physical nodes of a plurality of network domains, wherein the portion of the plurality of vertices includes at least one vertex of a second network domain;
configuring a first physical node of the plurality of physical nodes of the first network domain and associated with the at least one vertex that is associated with the at least one service function to process data via the at least one service function of the service function chain request, the first physical node processing the data via the at least one service function of the service function chain request; and
providing processed data to at least one of a second physical node of the second network domain.

US Pat. No. 10,341,200

NETWORK MANAGEMENT LAYER—CONFIGURATION MANAGEMENT

CenturyLink Intellectual ...

1. A method, comprising:receiving, with a first network device in a network, a service request, the service request originating from a first client device over the network;
determining, with the first network device, one or more second network devices for implementing a service arising from the service request;
determining, with the first network device, network technology utilized by each of the one or more second network devices;
generating, with the first network device, flow domain information, using flow domain analysis, based at least in part on the determined one or more second network devices and based at least in part on the determined network technology utilized by each of the one or more second network devices; and
automatically configuring, with a third network device in the network, at least one of the one or more second network devices to enable performance of the service arising from the service request, based at least in part on the generated flow domain information.

US Pat. No. 10,341,199

STATE SYNCHRONIZATION IN A SERVICE ENVIRONMENT

Adobe Inc., San Jose, CA...

1. A system comprising:one or more processors; and
one or more computer-readable storage media storing computer-executable instructions that, responsive to execution by the one or more processors, cause the system to implement functionalities including:
a configuration manager configured to maintain resource models that each correspond to a different respective role in a service environment and that represent state descriptions for nodes in the service environment that correspond to different respective roles such that a different respective resource model exists for each different respective role, the resource models not including code for synchronizing individual nodes to their respective state description;
a deployment orchestrator configured to ascertain that nodes associated with different roles in the service environment are to synchronize their state in an order specified based on their respective roles, and notify the nodes in the specified order based on their respective roles;
a resource repository that is implemented independently of the configuration manager and the deployment orchestrator and that is configured to:
store configuration packages for updating states of the nodes in the service environment, the configuration packages including code for implementing the resource models; and
respond to a query from a respective agent that resides on a respective node with a configuration package that includes code for synchronizing the respective node with the respective resource model; and
an agent associated with a particular role and that resides on a particular node in the service environment, the agent configured to:
query the configuration manager to determine a particular resource model associated with the particular role; and
query the resource repository for a particular configuration package for synchronizing the particular node with the particular resource model.

US Pat. No. 10,341,198

CONFIGURING A BACK-END CONTAINER AND A CORRESPONDING FRONT-END PROXY CONTAINER ON A NETWORK DEVICE

Verizon Patent and Licens...

1. A device, comprising:one or more hardware processors to:
receive, from a client device, a request to deploy a container to provide service,
the request including information identifying a set of parameters associated with the container,
the container including a self-contained execution environment,
validate the request using the information identifying the set of parameters based on receiving the request;
deploy the container on a back-end host based on validating the request,
the back-end host lacking connectivity to au external network;
receive a first indication that the container was successfully deployed on the back-end host after deploying the container;
deploy a proxy container on a front-end host based on receiving the first indication,
the front-end host having connectivity to the external network;
receive a second indication that the proxy container was successfully deployed on the front-end host after deploying the proxy container; and
provide a third indication to the client device based on receiving the second indication,
the third indication indicating that the container was successfully deployed.

US Pat. No. 10,341,197

VIRTUAL SERVICE CONTROL POINT IN A NETWORK

Level 3 Communications, L...

1. A telecommunications network comprising:at least one application server with instructions stored thereon that, when executed by the at least one application server, cause the at least one application server to perform the operations of:
receiving an incoming communication from a user of the telecommunications network, the communication comprising an identifier associated with a client of the telecommunications network;
obtaining a list of at least one routing feature associated with the client of the telecommunications network, wherein the at least one routing feature is a maximum concurrent calling feature configured to restrict a number of concurrent communications to the client of the telecommunications network to a limit;
applying the at least one routing feature to the incoming communication;
translating the incoming communication to a destination address associated with the client of the telecommunications network, the destination address associated with the dialed telephone number and the at least one routing feature associated with the client; and
upon determining that the incoming communication would not cause the concurrent communications to the client of the telecommunications network to exceed the limit, transmitting one or more redirect messages to the telecommunications network through a network interface to redirect the communication to the destination address associated with a client of the telecommunications network.

US Pat. No. 10,341,196

RELIABLY UPDATING A MESSAGING SYSTEM

BlackRock Financial Manag...

1. A method of routing messages within a messaging system comprising component programs including a message router and a plurality of connection managers, the message router connected to each of the plurality of connection managers via a queue associated with the connection manager, the method comprising:sending, from a first connection manager of the plurality of connection managers to its associated first queue, at least one message, wherein one of the at least one message either includes or is followed by a first round complete flag indicative of a last message of the at least one message to be read in order by the message router;
sending, from a second connection manager of the plurality of connection managers to its associated second queue, at least one message, one of the at least one message either including or followed by a second round complete flag;
reading, at the message router, messages from the first queue until the first round complete flag is read; and
responsive to reading the first round complete flag from the first queue,
reading, at the message router, messages from the second queue associated with the second connection manager until the second round complete flag is read; and
responsive to reading the second round complete flag from the second queue,
reading, at the message router, messages from a third queue associated with a third connection manager of the plurality of connection managers.

US Pat. No. 10,341,195

VIRTUAL NETWORK FUNCTION (VNF) RESOURCE MANAGEMENT IN A SOFTWARE DEFINED NETWORK (SDN)

Sprint Communications Com...

1. A method of operating a Network Function Virtualization (NFV) Software Defined Network (SDN) to control NFV resources consumed by Virtual Network Functions (VNFs) that support a data service, the method comprising:an NFV Infrastructure (NFVI) executing SDN application VNFs, SDN controller VNFs, and NFVI virtual Switches (vSWs) to support the data service,
the SDN application VNFs, the SDN controller VNFs, and the NFVI vSWs responsively transferring SDN Key Performance Indicators (KPIs) to an NFV Management and Orchestration (MANO) Virtual Infrastructure Manager (VIM) and to a MANO VNF Manager (VNFM);
the MANO VIM receiving the SDN KPIs and transferring the SDN KPIs to a MANO KPI server;
the MANO VNFM receiving the SDN KPIs and transferring the SDN KPIs to the MANO KPI server;
the MANO KPI server processing the SDN KPIs to generate VNF control data to darken one of the SDN VNFs and processing the VNF control data to generate and transfer NFV control data to darken the one SDN VNF; and
the NFVI darkening the one SDN VNFs responsive to the NFV control data by restricting access to NFVI hardware for the one SDN VNF.

US Pat. No. 10,341,194

SYSTEM AND METHOD FOR BUILDING, OPTIMIZING, AND ENFORCING INFRASTRUCTURE ON A CLOUD BASED COMPUTING ENVIRONMENT

FUGUE, INC., Frederick, ...

1. A method for building infrastructure on a cloud computing system, the method comprising:receiving a high level declaration of a computing infrastructure to be built on the cloud computing system, wherein the high level declaration comprises a domain-specific programming language configured to allow a user to express infrastructure elements and relationships between the expressed infrastructure elements;
generating a resource table, wherein the resource table is based on the received high level declaration;
generating a low level declaration of the computing infrastructure, wherein generating the low level declaration includes adding information to the resource table, and wherein the added information is based on the received declaration and the cloud computing system on which the infrastructure is to be built;
converting the low level declaration to one or more instructions readable by the cloud computing system; and
executing the one or more instructions on the cloud computing system to build the computing infrastructure.

US Pat. No. 10,341,193

OPTIMIZATION ON MULTIPLE TIMESCALES IN A DISTRIBUTED WI-FI SYSTEM

Plume Design, Inc., Palo...

1. A method for optimizing a distributed Wi-Fi network via a cloud based system using a plurality of control loops over multiple timescales, the method comprising:receiving and storing data measurements associated with operation of the distributed Wi-Fi network;
performing one or more of:
a fast loop optimization of operating parameters associated with the distributed Wi-Fi network based on one or more first metrics and associated first thresholds; and
a slow loop optimization of the operating parameters associated with the distributed Wi-Fi network based on one or more second metrics and associated second thresholds, wherein a timescale of the fast loop optimization is finer than a timescale of the slow loop optimization; and
providing the operating parameters to the distributed Wi-Fi network for configuration thereof;
wherein the slow loop optimization is performed with clustering the distributed Wi-Fi network with one or more Wi-Fi networks proximate thereto and the fast loop optimization is localized to one of the distributed Wi-Fi network or a cluster that is smaller than used for the slow loop optimization.

US Pat. No. 10,341,192

CLOUD MIGRATION AND MAINTENANCE CONTROLS

Capital One Services, LLC...

1. A non-transitory computer-readable medium storing instructions that, when executed on one or more processors, cause the one or more processors to:generate a plurality of rows, each row being associated with one of a plurality of software technology assets;
generate a plurality of columns intersecting the plurality of rows, one column indicating a name of the software technology asset of the intersecting row, and at least one other column indicating a compliance measure of the software technology asset, wherein the compliance measure comprises an indicator of compliance with one or more architectural guidelines related to a cloud migration of the software technology asset;
transmit an interface comprising the generated rows and the generated columns to a display;
enable a user to interact with the transmitted interface, wherein the interaction is related to one of the plurality of rows; and
in response to the interaction, expand the related row such that a plurality of sub-rows are generated between the related row and an adjacent row, each of the plurality of sub-rows being associated with an application instance of the software technology asset associated with the related row.

US Pat. No. 10,341,191

DISCOVERING A COMPUTER NETWORK TOPOLOGY FOR AN EXECUTING APPLICATION

LogicMonitor, Inc., Sant...

1. A system for continual automated discovering of topology information of a computer network over a period of time comprising:a first network object of a plurality of network objects of the network for:
A) selecting a first portion of a first set of data messages being sent over the period of time by a first application executing on a selected network object of the plurality of network objects;
B) collecting first network configuration and time dimension (CTD) information from the first portion of data messages;
C) sending to a second network object, all or a portion of the collected first network CTD information; and
the second network object of the plurality of network objects for:
D) determining topology information of the network objects over the period of time based on the collected first network CTD information; the topology information including unique keys of the network objects, types of objects of the network objects, and types of relationships between pairs of the network objects for the period of time based on the collected first network CTD information; and
E) storing the first topology information in a memory.

US Pat. No. 10,341,190

CENTRALITY MEASURE RANKING FOR A MULTIPLEX NETWORK

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:obtaining a digital graphical representation of a multiplex network comprising a plurality of layers and a plurality of nodes representing communicating entities of the multiplex network, wherein each layer of the plurality of layers comprises a respective node for each communicating entity of the plurality of communicating entities and a respective set of edges, of a plurality of edges of the multiplex network, connecting pairs of nodes of the layer;
determining a node centrality measure for each node of the plurality of nodes, comprising, for each node of the plurality of nodes:
determining an intra-layer centrality measure for the node based on presence of the node along one or more shortest paths between pairs of nodes within a same layer of the plurality of layers of the multiplex network;
determining an inter-layer centrality measure for the node based on presence of the node along one or more shortest paths between pairs of nodes within different layers of the plurality of layers of the multiplex network; and
determining the node centrality measure for the node as a function of the intra-layer centrality measure for the node and the inter-layer centrality measure for the node;
determining a respective centrality measure for each communicating entity, of the communicating entities, as a function of node centrality measures for nodes, of the plurality of nodes, representing the communicating entity across the plurality of layers of the multiplex network; and
ranking the communicating entities by their centrality measures.

US Pat. No. 10,341,189

OPERATOR FUSION MANAGEMENT IN A STREAM COMPUTING ENVIRONMENT

International Business Ma...

1. A computer-implemented method for operator fusion management in a stream computing environment, the method comprising:establishing a topology model which indicates:
a set of stream operators,
a set of connections between the set of stream operators, and
a set of stream operator attributes for the set of stream operators;
determining, based on the topology model, a set of operator fusion management operations to combine the set of stream operators into a set of processing elements, wherein determining the set of operator fusion management operations includes:
identifying a set of inflexible parameters with respect to the set of operator fusion management operations;
identifying a set of flexible parameters with respect to the set of operator fusion management operations;
configuring a set of inflexible parameter values for the set of inflexible parameters to disallow a first modification which exceeds a first threshold; and
configuring a set of flexible parameter values for the set of flexible parameters to allow a second modification within a second threshold; and
constructing, by performing the set of operator fusion management operations, the set of processing elements.

US Pat. No. 10,341,188

NETWORK VIRTUALIZATION FOR NETWORK INFRASTRUCTURE

HUAWEI TECHNOLOGIES CO., ...

1. A method for network configuration in a multi-tenant network environment executed by a processor, the method comprising:receiving a service profile defining network application requirements for a tenant of the network environment, the service profile comprising at least two end point groups (EPGs) and at least one policy contract defining traffic flow constraints between the at least two EPGs, the service profile being based on a group based policy (GBP) model of a network application, the GBP defining network resource requirements of the network application independently from physical network implementation details;
mapping the received service profile to an intermediate logical network implementation associating a plurality of logical routers, logical switches and logical appliances, the plurality of logical routers, logical switches and logical appliances and associations therebetween being defined based on the service profile and satisfying the network application requirements;
mapping the logical network implementation to a physical network implementation on available network hardware in the network environment;
generating component configuration information to configure the available network hardware to provide the physical network implementation of the service profile defining the network application requirements; and
sending the generated component configuration information to the available network hardware for implementing the physical network implementation.

US Pat. No. 10,341,187

DISCOVERING, DEFINING, AND IMPLEMENTING COMPUTER APPLICATION TOPOLOGIES

Microsoft Technology Lice...

1. A method, performed by a computing device, comprising:providing a current application topology of a network, the current application topology specifying which computers are connected to which network and which of the computers are associated with which applications;
displaying graphical representations of the computers and the applications of the network represented by the current application topology using shapes and display names of a user interface store, the graphical representations being obtained from the user interface store storing descriptions of application shapes and display names according to a user interface schema;
receiving from a user selection of graphical representations of computers and applications to be associated with selected computers to define a desired application topology of the network;
automatically creating installation packages for the computers, based on the desired application topology of the network received from the user selection of graphical representations of the computers and applications, specifying the applications to be associated with the computers, the installation packages indicating that different applications are to be associated with different computers;
distributing the installation packages to the computers for configuration of the computers in accordance with the installation packages; and
after the computers are configured based on the distributed installation packages,
discovering an actual application topology of the network, wherein the discovering of the actual application topology includes: requesting, over a network, an identification of a domain controller of a domain of computers; receiving the identification of the domain controller; retrieving information of each computer of the domain on the network; adding an indication of each computer to an application topology store; and adding an indication of entities of each computer to the application topology store, wherein the entities comprise one or more applications; and
comparing the actual application topology of the network to the desired application topology of the network to determine whether the desired application topology of the network was implemented correctly.

US Pat. No. 10,341,186

ADDING A NETWORK UNIT TO A MANAGEMENT GROUP

HEWLETT PACKARD ENTERPRIS...

1. A method for automatically adding a network unit to a management group, comprising:receiving, by a processor of a first network unit, a first numeric code on the first network unit entered through a panel button of the first network unit;
monitoring, by the processor of the first network unit, a network attached to the first network unit for one or more same state messages, the one or more same state messages comprising an invitation to join a management group and an associated numeric code;
detecting, by the processor of the first network unit, a same state message broadcast from a second network unit;
comparing, by the processor of the first network unit, the first numeric code and a second numeric code included in the same state message from the second network unit;
in response to identifying a match between the first numeric code and the second numeric code, establishing, by the processor of the first network unit, a communication connection with the second network unit based on the invitation to join a management group of the same state message from the second network unit;
sending, by the processor of the first network unit, management group information to the second network unit, the management group information comprising one or more identifications and passwords for one or more network devices in a management group having the first network unit as a peer; and
updating, by the processor of the first network unit, a peer list to include the second network unit as a peer of the management group having the first network unit as a peer.

US Pat. No. 10,341,184

VALIDATION OF LAYER 3 BRIDGE DOMAIN SUBNETS IN IN A NETWORK

CISCO TECHNOLOGY, INC., ...

1. A system for performing a network assurance check of proper deployment of a configuration in a fabric, comprising:at least one memory configured to store data; and
at least one processor operable to execute instructions associated with the data, which when executed by the at least one processor, causes the processor to:
receive, from a controller, a global logical model in a first format, the global logical model containing instructions on how endpoints connected to a network fabric communicate within the fabric, the global logical model including at least one virtual routing and forwarding instance (VRF);
receive, from one or more network devices within the fabric, a software model being at least a subset of instructions from the global logical model in a second format executable on the one or more network devices, the subset of instructions being instructions from the global logical model that are specific to operability of the one or more network devices;
convert, for each network device, the global logical model into a local logical model in the first format, the local logical model being at least a portion of the received global logical model that is specific to operability of the corresponding each network device;
create a container for each VRF of the at least one VRF in the received global logical model;
populate each of the created containers with the local logical model and the software model for each of the network devices associated with the VRF; and
confirm bridge domain (BD) subnets in the populated containers match.

US Pat. No. 10,341,183

COMPOSITE NAVIGATION METHOD AND SYSTEM FOR AUTOMATIC CONFIGURATION MANAGEMENT OF APPLICATION SOFTWARE

CONDUENT BUSINESS SERVICE...

1. A composite navigational method for configuration management of application software by a computing server, said method comprising:receiving a request, from a user-computing device, for automatic configuration of said application software;
extracting, by a data extraction processor at said computing server, a plurality of previous configuration values corresponding to a plurality of configuration parameters from a storage device, wherein a previous configuration value in said plurality of extracted previous configuration values corresponds to a logic fragment of said application software at said user-computing device communicatively coupled to said computing server over a communication network;
generating, by a tree generating processor at said computing server, a plurality of abstract syntax trees (ASTs) based on parsing of said plurality of previous configuration values;
performing, by a processor at said computing server, one or more pre-specified operations on said generated plurality of ASTs;
determining, by said processor, a configuration value of a current configuration parameter based on a navigation pattern, wherein said navigation pattern is determined using said performed one or more pre-specified operations based on at least user preferences and said extracted plurality of previous configuration values; and
controlling, by said processor, configuration of said application software at said user-computing device over said communication network, based on said determined configuration value of said current configuration parameter.

US Pat. No. 10,341,182

METHOD AND SYSTEM FOR DETECTING NETWORK UPGRADES

1. A method, comprising:receiving a plurality of input data;
identifying configuration changes from the input data;
generating a plurality of configuration sessions; and
identifying one of the configuration sessions as a network upgrade session, the identifying based on one of A) a rareness of the configuration session, and B) a skewness of the configuration session.

US Pat. No. 10,341,181

METHOD AND APPARATUS TO ALLOW DYNAMIC CHANGES OF A REPLICA NETWORK CONFIGURATION IN DISTRIBUTED SYSTEMS

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for implementing a replica network configuration in a distributed system, the method comprising:generating a first time initialized replica cloud computing node that is assigned a computer readable storage medium and a processor;
receiving, at the computer readable storage medium of the first time initialized replica cloud computing node, a network configuration of the first time initialized replica cloud computing node from a system administrator;
in response to generating the first time initialized replica cloud computing node, automatically generating, using the processor of the first time initialized replica cloud computing node, a unique identifier (UUID) for the first time initialized replica cloud computing node; and
changing at least one of a hostname and a port of the replica cloud computing node based on the network configuration and generating configuration data indicating the at least one changed hostname and changed port; and
implementing a quorum based system in the replica network using the replica cloud computing node and the UUID comprising, wherein implementing the quorum based system comprises:
generating a vote at the replica cloud computing node;
transmitting the vote and the UUID of the replica cloud computing node to the system administrator; and
authenticating, at the system administrator, the vote and confirming the vote is from the replica cloud computing node using the received UUID.

US Pat. No. 10,341,180

DISK DISTRIBUTION SYSTEM

CO-CONV, CORP., Kyoto (J...

1. A disk distribution system comprising at least one master server that is connected with a plurality of terminals through a network,the disk distribution system including
an OS image data as master data, the master data being managed by the master server, and
a copy of the master data as a boot image for the terminals,
the terminals receiving differential data reflecting an update to the master data through the network from the master server while the terminals are operating, and each boot image of each terminal being updated based on the received differential data by rebooting each terminal,
each terminal provided with a difference management mechanism that stores, as data relative to the boot image, at least any of
unique data including a host name and an IP address of the terminal,
write data to the terminal, and
configuration information of a device driver,
wherein the OS image data is in Out-Of-Box Experience (OOBE) state as a boot image for the terminals, and the differential data includes
setup data relative to the boot image, the setup data providing a customization from the OOBE state for the terminal and
restoration data for, after the customization provided by the setup data, restoring the boot image for the terminal into OS image data in the OOBE state again, and
wherein each terminal stores a separate copy of the master data as a boot image for the terminal, the differential data reflecting an update to the master data, and the data relative to the boot image, even after the boot image is updated by rebooting the terminal.

US Pat. No. 10,341,179

MANAGEMENT COMPUTER AND COMPUTER SYSTEM MANAGEMENT METHOD

Hitachi, Ltd., Tokyo (JP...

1. A management computer, comprising:an interface device coupled to a computer system; and
a processor configured to manage a plurality of XaaS (X as a Service) which are based on the computer system and which include first XaaS including first node configurations and second XaaS including second node configurations that are dependent on resources provided by the first XaaS, wherein
the processor is configured to,
when a required resource amount which is required for the first XaaS in order to change the second node configurations is larger than a resource amount which can be provided by the first XaaS, determine a changed first node configuration which enables providing a resource amount equal to or larger than the required resource amount and,
after changing the first XaaS to the determined changed first node configuration, change the second node configurations of the second XaaS.

US Pat. No. 10,341,178

CONFIGURING CLIENT DEVICES

Amazon Technologies, Inc....

1. A system for managing the configuration of client devices utilizing social networks comprising:one or more social network services configured to receive and publish content based on associated social network accounts; and
one or more computing devices associated with a specified user, wherein the specified user is associated with at least one account on the one or more social network services;
at least one client device having a data connectivity application that can access the one or more social network services,
wherein the client device is configured to:
receive social network information associated with the specified user;
establish a communication link with the one or more social networks based on the social network information;
associate a social network account corresponding to the client device with a social network account corresponding to the specified user, wherein associating the social network comprises, based at least in part on the received social network information, automatically initiating or accepting a request to associate the social network account corresponding to the client device with the social network account corresponding to the specified user;
obtain configuration information provided through the one or more social network services, wherein obtaining the configuration information comprises parsing a natural language message sent from the social network account corresponding to the specified user to the social network account corresponding to the client device; and
cause implementation of a change in a configuration of the client device based on the configuration information provided through the one or more social networks.

US Pat. No. 10,341,177

PARALLEL COMPUTING SYSTEM AND MIGRATION METHOD

FUJITSU LIMITED, Kawasak...

1. A parallel computing system that migrates, to a second node, a target process that is being executed in a first node, the first node and the second node being one of the nodes that are an execution unit for processing of executing a process,the first node comprises:
a storage configured to store therein accessed-area information that indicates a first area included in a storage area assigned to the target process, the first area having been accessed by the target process for a latest predetermined period of time;
a processor in the first node configured to stop the target process when an instruction to migrate the target process is received; and
a transmitter configured to transmit state information that indicates a state of the target process when the target process is stopped, to transmit first data stored in the first area based on the accessed-area information, and to transmit, after the transmission of the first data has been completed, second data stored in a second area other than the first area in the storage area, and
the second node comprises:
a receiver configured to receive the state information and the first data; and
a processor in the second node configured to generate the target process based on the state information and to restart the target process using the first data,
the receiver receives the second data after the restart of the target process,
when an access has been made to a certain area which is included in the second area and from which data has not been received, the processor in the second node causes the target process to sleep in response to the access, and
when the data in the certain area from which the data has not been received is received, the processor in the second node causes the sleeping target process to wake up.

US Pat. No. 10,341,176

SYSTEM AND METHOD FOR NETWORK PROVISIONING

Level 3 Communications, L...

1. A system for network provisioning using a network provisioning abstraction layer comprising a computing device including a processor coupled to a memory, the memory storing instructions for execution on the processor, the instructions configured to cause the processor to:receive a first request for provisioning a first network resource, the first request having a first priority, and a second request for provisioning a second network resource, the second resource having a second priority, the first and second requests received at an application interface configured for communications over a network, the application interface comprising:
a first application adapter configured to receive the first request from a first application;
a second application adapter configured to receive the second request from a second application;
search, based on the first request and the second request, for at least one provisioning instruction for executing the first request and at least one provisioning instruction for executing the second request;
prioritize and store the at least one provisioning instruction for executing the first request and the at least one provisioning instruction for executing the second request according to the first priority level and the second priority level, wherein the first priority level is a higher priority than the second priority level;
send the at least one provisioning instruction for executing the first request to at least one network resource to fulfill the first request using a resource interface configured for network communications; and
send the at least one provisioning instruction for executing the second request to at least one network resource to fulfill the second request after sending the at least one provisioning instruction for executing the first request to at least one network resource using the resource interface.

US Pat. No. 10,341,175

OPERATIONS, ADMINISTRATION, AND MANAGEMENT (OAM) FUNCTIONS IN A SOFTWARE DEFINED NETWORK

Telefonaktiebolaget L M E...

1. A method for obtaining an operations, administration, and management (OAM) tool module, comprising:communicating, by a datapath node to a controller node, connection information that identifies the datapath node and OAM information including an OAM action set that identifies one or more OAM actions the datapath node is capable of implementing at the datapath node; and
receiving an OAM tool module from the controller node for execution on the datapath node that is operative to perform at least one of the one or more OAM actions identified in the OAM action set to implement a first OAM tool function.

US Pat. No. 10,341,174

NETWORK PERCEPTION BASED SERVICE POLICY CONFIGURATION METHOD AND NETWORK DEVICE

CHINA ACADEMY OF TELECOMM...

1. A method for configuring a service policy through network perception, the method comprises:obtaining network perceived information of a first node, wherein the network perceived information of the first node comprises measurement information measured by the first node, information obtained by the first node from broadcast messages of adjacent nodes, or a combination thereof;
creating an environmental information map of the first node according to the network perceived information, wherein the environmental information map of the first node represents: relative positions between the first node and adjacent nodes of the first node, a neighbor relation of the first node, spectrum use conditions of the adjacent nodes of the first node, or a combination thereof;
obtaining characteristic information of the first node, wherein the characteristic information of the first node comprises information of the first node comprising: capability information, a supported frequency, a supported bandwidth, a type of a backhaul link, a characteristic of the backhaul link, or a combination thereof; and
configuring the first node with a service policy according to the environmental information map, and the characteristic information of the first node, wherein configuring, by the network device, the first node with the service policy comprises: configuring the first node with an operating frequency, configuring the first node with an operating bandwidth, configuring the first node with a cell identifier, configuring the first node with a role in a network, configuring the first node with a coordinative or cooperative relationship between the first node and another node, or a combination thereof.

US Pat. No. 10,341,173

METHOD FOR CONFIGURING A COMMUNICATION DEVICE WITHIN AN INDUSTRIAL AUTOMATION SYSTEM AND DISTRIBUTION UNIT FOR A CONFIGURATION SERVER OF THE INDUSTRIAL COMMUNICATION NETWORK

Siemens Aktiengesellschaf...

1. A method for configuring a communication device within an industrial automation system, comprising:communicating from a configuration unit of the communication device a datagram with a configuration request to a configuration server upon start-up of the communication device;
forwarding the datagram with the configuration request to the configuration server when communicated via at least one subnetwork-specific distribution unit;
allocating to the communication device at least one first topological device name component assigned to a spatial or hierarchical arrangement of the configuration server by the configuration server in response to the configuration request, each forwarding distribution unit adding a further topological device name component assigned to a spatial or hierarchical arrangement of a respective forwarding distribution unit;
creating, by the configuration server, configuration information comprising at least a first topological device name component and communicating a datagram with the configuration information to the communication device;
forwarding the datagram with the configuration information to the communication device when communicated via the at least one subnetwork specific distribution unit;
generating, by the configuration unit of the communication device, a device name thereof from the topological device name components and a name component that is unique within the subnetwork of said device.

US Pat. No. 10,341,172

SYSTEM AND METHOD FOR CONFIGURING NETWORKS

CSG Media, LLC, Chicago,...

1. A system for configuring electronic elements in an electronic communication network, the system comprising:a query handler device, the query handler device being coupled to a first electronic communication network, the query handler device being disposed at a central processing location;
a plurality of update circuits, each of the plurality of update circuits being arranged to operate electronically in parallel with the others, the plurality of update circuits being coupled to the query handler device;
a database, the database storing data entries that include subscriber information;
at least one writer device, the at least one writer device being coupled to the database;
wherein the query handler device is configured to:
receive a query from a network service provider;
copy the query to form a set of queries, wherein each member of the set of queries is a copy of the query;
transmit each query in the set of queries to an individual one of the update circuits;
wherein each of the update circuits is configured to:
receive one query from the set of queries;
determine an answer to the received query, the answer being determined potentially in parallel time relation with respect to answers being determined at other update circuits;
transmit the answer to the query handler;
wherein one of the answers is a first answer, the first answer being received by the query handler device first-in-time compared to the other answers, wherein the first answer is transmitted to the at least one writer device;
wherein the at least one writer device is configured to:
receive the first answer;
adjust an entry in the database according to the first answer using a write operation such that no other adjustment to the entry can occur until the write operation is completed;
wherein the query handler device is configured to transmit the first answer to the network service provider via the first electronic communication network;
wherein the network service provider responsively adjusts and configures electronic network elements in a second electronic communication network in conformance with the first answer.

US Pat. No. 10,341,171

ROLE-DRIVEN NOTIFICATION SYSTEM INCLUDING SUPPORT FOR COLLAPSING COMBINATIONS

Oracle International Corp...

1. A non-transitory computer-readable medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform processing comprising:determining, based upon multiple roles associated with a user, a first location within a hierarchy of roles, the first location corresponding to a particular level within the hierarchy of roles, wherein the hierarchy of roles comprises multiple levels;
determining, based on the first location within the hierarchy of roles, a second location within a hierarchy of notification templates, the hierarchy of notification templates comprising multiple levels, wherein each notification template in the hierarchy of notification templates includes information for providing a notification;
identifying, based upon the second location, from the hierarchy of notification templates, a plurality of notification templates;
generating a collapsed notification template based upon the plurality of notification templates;
generating a notification based upon blending notifications corresponding to the plurality of notification templates of the collapsed notification template; and
sending the notification to the user instead of sending a single notification for each of the plurality of notification templates.

US Pat. No. 10,341,170

METHOD FOR DIAGNOSING LINK STATUS IN NETWORK

Hyundai Motor Company, S...

1. A method for diagnosing a link status, performed in a first communication node of an Ethernet-based vehicle network, the method comprising:identifying, by the first communication node, a type of a fault occurring in a link connected to the first communication node by monitoring a frame or a pulse signal transmitted from a second communication node connected to the link, wherein the type of the fault is one of a port fault in a local communication node, a port fault in a remote communication node, and a link disconnection fault;
generating, by the first communication node, a first pulse signal including capability information which indicates at least one of transmission speeds and supported duplex modes of the first communication node and further including a link fault type indicator indicating the type of the fault; and
transmitting, by the first communication node, the first pulse signal,
wherein the first pulse signal is generated and transmitted according to an auto negotiation protocol.

US Pat. No. 10,341,169

METHOD AND A SYSTEM FOR GENERATING A NOTIFICATION FOR AN EVENT

Wipro Limited, Bangalore...

1. A method for generating a notification for an event, the method comprising:receiving, by a notification generation system, a recovery notification indicating recovery from the event, from a service provider;
receiving, by the notification generation system, contextual data, from the service provider, comprising state of the event in a first electronic device associated with a user, one or more predefined rules associated with the event and availability of at least one of the first electronic device and one or more second electronic devices associated with the user; and
generating, by the notification generation system, a notification upon analysis of the recovery notification, the contextual data and predefined profile settings of the users;
wherein the one or more predefined rules are related to at least one of time elapsed since occurrence of the event, priority of the event or re-occurrence of the event, and
wherein the predefined profile settings of the user comprise at least one of “notification enabling status”, “notification level” or “preferred electronic device” to receive the notification.

US Pat. No. 10,341,168

TOPOLOGY MANAGER FOR FAILURE DETECTION IN A DISTRIBUTED COMPUTING SYSTEM

SAP SE, Walldorf (DE)

1. A computer-implemented method comprising:receiving, by a topology manager of a distributed computing system, notification that a destination computing node in the distributed computing system is not responding to a communication request, the topology manager being implemented on a data partition of the distributed computing system, the distributed computing system comprising a plurality of computing nodes, the plurality of nodes comprising the destination computing node;
determining, by the topology manager, that the destination computing node is dead and/or has a loss of communication with one or more other computing nodes in the plurality of computing nodes by querying at least a subset of other computing nodes of the plurality of computing nodes regarding liveness of the destination computing node and receiving confirmation from a quorum of the queried computing nodes;
retiring, by the topology manager in response to the determining, the destination computing node, the retiring causing the destination computing node to become a retired computing node; and
causing, by the topology manager, a load balancing of replicas of data partitions in the distributed computing system to compensate for loss of the retired computing node, the load balancing comprising re-assigning one or more of the replicas of data partitions among one or more surviving computing nodes in the plurality of computing nodes.

US Pat. No. 10,341,167

ELECTRONIC VOLUME CORRECTOR WITH CLOUD ENABLED HEALTH MONITORING OF ASSOCIATED GAS DISTRIBUTION EQUIPMENT

HONEYWELL INTERNATIONAL I...

1. A system comprising:at least one sensor coupled to at least one device associated with a gas distribution network, said at least one sensor being configured to collect sensor information indicative of an operation of said at least one device associated with a gas distribution network;
an electronic volume corrector associated with said at least one device associated with a gas distribution network wherein said electronic volume corrector receives said sensor information indicative of an operation of said at least one device associated with a gas distribution network; and
a computer system comprising at least one processor and a storage device communicatively coupled to the at least one processor, the storage device storing instructions which, when executed by the at least one processor, cause the at least one processor to perform operations comprising:
receiving said sensor information indicative of an operation of said at least one device associated with a gas distribution network provided by electronic volume corrector;
identifying at least one parameter indicative of a deviation from an intended operation of said at least one device associated with a gas distribution network;
performing a pattern comparison of said sensor information with reference information; and
providing a performance indication of said at least one device associated with a gas distribution network according to said at least one parameter indicative of a deviation from an intended operation of said at least one device associated with a gas distribution network and said pattern comparison for presentation through a user interface.

US Pat. No. 10,341,166

METHOD FOR ADMINISTERING A PLURALITY OF LOCAL DEVICES

Orange, Paris (FR)

1. A method for administering a plurality of local devices connected to a local communication network wherein the method is carried out by a local configuration device LACS configured to be connected to the local communications network and to remote configuration device ACS, the method comprising:receiving from the remote configuration device ACS a command for administering an administration act, wherein the administration act comprises a service which may be executed on the local communications network;
following reception from the remote configuration device of the said command, determining for the command a list of local devices involved in the execution of the administration act, the said administration act being included in a model of the local communication network;
transmitting to each of the local devices of the determined list at least one administration command for executing the administration act on the local communications network;
said local configuration device LACS making available to the remote configuration device ACS, the model of the local communications network giving the possibility to the remote configuration device ACS of determining administration acts for services which may be executed on the local communications network, and associated parameters; and
wherein said model shows to the remote configuration device ACS the whole of the local devices of the local network and of the services provided as a single local device.

US Pat. No. 10,341,165

CAN TRANSMITTER WITH FAST CANL CONTROL LOOP

MICROCHIP TECHNOLOGY INCO...

1. A controller area network (CAN) transmitter, comprising:an output stage circuit;
a replica circuit of the output stage circuit configured to produce a replica signal; and
a control amplifier configured:
to control a CANL output signal of the CAN transmitter in order to maintain the replica signal at a desired level;
control a low side of the output stage circuit to generate the CANL output signal; and
provide no control over a CANH output signal of the CAN transmitter.

US Pat. No. 10,341,164

MODIFYING COMPUTER CONFIGURATION TO IMPROVE PERFORMANCE

International Business Ma...

1. A method comprising:issuing, by a processor, an action to a first client and a second client;
generating a first optimization factor list (OFL) for the first client and a second OFL for the second client;
comparing the first OFL to the second OFL;
generating a correlation factor (CF) between the first client and second client based on the OFL comparison, wherein the CF indicates a level of similarity between the first client and the second client, wherein generating the CF includes generating a partial CF value for each factor in the OFL, weighting each factor in the OFL, adjusting each partial CF value using a weight of the factor associated with the partial CF, and accumulating the adjusted partial CF values;
determining that there is a bottleneck causing performance issues in the first client;
adjusting, in response to determining that there is a bottleneck causing performance issues in the first client, a client computer configuration of the first client based on the bottleneck;
generating, by the processor, a relevance factor (RF) based on an adjustment made to a factor of the client computer configuration; and
altering, based on the RF of the adjustment made to the factor of the client computer configuration, the OFL and CF.

US Pat. No. 10,341,163

METHOD AND DEVICE TO ASSIST WITH DECISION-MAKING

IMMERSION, (FR)

12. A device for aiding decision-making comprising a digital processing system, a database of information containers and of information sources, display means and interface means, to allow an operator to act on the operation of the device, these being functionally interconnected, said digital processing system comprising one or more processors, comprising data memories and program memories, and comprising means of connection to the database, to the display means and to the interface means, said processors, memories and means of connection being connected to one or more internal communications buses so as to exchange instructions and/or data, characterized in that the data processing system is architectured and comprises program instruction memories so as to constitute functionally: at least one administration unit connected to the database and in charge of the management of the information sources and of the information containers of said database and of the management of the relationships between said information sources and said information containers; at least one displays management unit connected to the display means so as to display information containers and the results of operator interactions on said information containers; at least one interactions interpretation unit connected to the interface means so as to interpret the interactions carried out by operators with said interface means as actions on the information containers and as operations on the information sources; at least one operations processing unit organized so as to identify the information sources, of the database, having formed the subject of at least one operation and to identify the information sources, of said database, not having formed the subject of any significant operation over a predefined period; at least one summarizing unit generating information containers corresponding to the information sources not having formed the subject of any significant operation over a predefined period and/or being associated with an interest index below a threshold.

US Pat. No. 10,341,162

AUGMENTED REALITY GAMING SYSTEM

Pacific Import Manufactur...

1. An augmented reality gaming system, comprising:a gameplay device comprising:
a mount;
a first wireless transceiver; and
a plurality of triggers, each corresponding to a virtual weapon,
wherein the gameplay device does not include an infrared transmitter and does not include an infrared receiver; and
a mobile device removably secured to the mount, the mobile device comprising:
a processor;
a screen;
an image sensor;
a location sensor;
an orientation sensor;
a second wireless transceiver; and
a memory, the memory storing an augmented reality gaming app comprising instructions for execution by the processor that, when executed by the processor, cause the processor to:
display, on the screen, a live image received from the image sensor;
receive location information from the location sensor;
generate target information about at least one target;
display, on the screen and based on the location information, a graphical depiction of the at least one target as an overlay on the live image;
receive, via the second wireless transceiver and from the first wireless transceiver, an indication of activation of one of the plurality of triggers, wherein activation of the one of the plurality of triggers corresponds to firing the virtual weapon corresponding to the one of the plurality of triggers;
display an animation on the screen in response to the indication;
receive orientation information from the orientation sensor; and
calculate, based on the location information, the orientation information, and the target information, whether the firing of the virtual weapon caused virtual damage to the target.

US Pat. No. 10,341,161

MULTI-DIMENSIONAL SIGNAL ENCODING

TM IP Holdings, LLC, Tuc...

1. A transmitter comprising:at least one processor; and
a data store coupled to the at least one processor having instructions stored thereon which, when executed by the at least one processor, causes the at least one processor to perform operations comprising:
mapping data to symbols of a multi-dimensional symbol constellation comprising at least three dimensions, each dimension of the constellation represented by a respective modulation signal, the dimensions including:
first and second dimensions each of which are represented by respective in-phase modulation values and quadrature phase modulation values of a quadrature amplitude modulation (QAM) signal, and
a third dimension represented by phase values of a transpositional modulation (TM) signal; and
modulating a carrier signal with the TM signal and the QAM signal.

US Pat. No. 10,341,160

RADIO RECEIVER WITH SMART LISTENING MODE

ALi Corporation, Hsinchu...

1. A receiver, receiving a radio frequency (RF) quadrature signal, comprising:a mixer, mixing the RF quadrature signal to generate an in-phase signal and a quadrature-phase signal based on a local frequency;
a first path circuit, processing and transmitting the in-phase signal, wherein the first path circuit comprises:
a first low pass filter, receiving the in-phase signal from the mixer;
a first amplifier, coupled to the output of the first low pass filter; and
a first analog-to-digital converter, coupled to the first amplifier, and converting the in-phase signal to a first digital signal;
a second path circuit, processing and transmitting the quadrature-phase signal, wherein the second path circuit comprises:
a second low pass filter, receiving the quadrature-phase signal from the mixer;
a second amplifier, coupled to the output of the second low pass filter; and
a second analog-to-digital converter, coupled to the second amplifier, and converting the quadrature-phase signal to a second digital signal;
a signal processor, coupled to the first and second path circuits to receive both the first and second digital signals for signal processing;
an automatic gain control, coupled to the first and second amplifiers, and dynamically adjusting the gain of the first and second amplifiers; and
a data packet detection circuit, coupled to the first and second path circuits, continuously monitoring the first path circuit for an incoming data packet via an in-channel energy detection, and outputting a control signal to enable or disable the second path circuit based at least in part on an energy level detected on the first path circuit,
wherein the data packet detection circuit is coupled to the first path circuit to receive the first digital signal directly from the first analog-to-digital converter and is coupled to the second path circuit to receive the second digital signal directly from the second analog to digital converter, and
wherein the control signal is provided directly to each of the second low pass filter, the second amplifier and the second analog-to-digital converter to enable or disable the second signal path,
wherein the second path circuit is configured to be disabled by the data packet detection circuit prior to a detection of the incoming data packet being carried by the RF quadrature signal on the first path circuit,
wherein the gain is set to maximum when the second path circuit is disabled.

US Pat. No. 10,341,159

HEAD-END DEVICE AND METHOD OF RECOVERING SYNCHRONIZATION DETECTION ERROR USING THE SAME

SOLiD, INC., Seongnam-si...

1. A method of recovering synchronization detection error, the method comprising:determining whether a base station signal input to a head-end device is detected;
determining whether a head-end signal output from the head-end device, which is obtained by processing the base station signal by the head-end device, is detected by a lower device of the head-end device;
determining whether synchronization of the head-end signal is detected based on the head-end signal input to the lower device; and
changing a set frequency band or performing automatic gain control of the head-end device based on whether the base station signal is detected, whether the head-end signal is detected, and whether the synchronization of the head-end signal is detected.

US Pat. No. 10,341,158

SEGMENT-BASED TRANSFORMS IN DIGITAL SIGNAL PROCESSING

Futurewei Technologies, I...

1. A device, comprising:an antenna configured to receive a plurality of samples corresponding to a symbol of an input signal for baseband signal generation using a fast fourier transform (FFT); and
a signal processing circuit coupled to the antenna and configured to
generate an intermediate FFT result for each of a plurality of segments formed by partitioning the plurality of samples, comprising
generate from a first segment of samples a first subset of radio elements for the baseband signal,
interpolate the first subset of radio elements to generate a first set of radio elements having a number of radio elements that is greater than a number of samples in the first segment,
determine a final FFT result for the input signal symbol based on an accumulation of the intermediate FFT results for each of the plurality of segments, and
generate the baseband signal based on the final FFT result.

US Pat. No. 10,341,157

METHOD FOR SYMBOL COMPENSATION AND RECEIVER

Telefonaktiebolaget LM Er...

1. A method for symbol compensation, comprising, for a symbol consisting of a first portion and a second portion, wherein the symbol is an Orthogonal Frequency Division Multiplexing (OFDM) symbol containing a set of constellation symbols in a modulation constellation:estimating a length of the first portion, wherein estimating comprises:
creating a sequence of amplitude values comprising amplitude values of constellation symbols in the set that are mapped onto constellation points with highest amplitude values in the modulation constellation;
deriving a threshold based on the sequence; and
estimating the length of the first portion based on the number of amplitude values preceding a first amplitude value in the sequence that is larger than the threshold;
calculating an average power of the first portion and an average power of the second portion based on the length of the first portion;
determining a relative scaling factor by which the average power of the first portion is scaled relative to that of the second portion; and
compensating for the first portion based on the relative scaling factor.

US Pat. No. 10,341,156

PHASE PATTERN-BASED SYNCHRONIZATION SIGNAL TRANSMITTING/RECEIVING METHOD IN WIRELESS COMMUNICATION SYSTEM

LG Electronics Inc., Seo...

1. A method of receiving a plurality of synchronization signals by a user equipment in a wireless communication system, the method comprising:receiving the plurality of synchronization signals generated using a predetermined repetition count, a sequence and a phase pattern vector from a plurality of base stations (BSs), respectively;
measuring a start timing of a frame, a sequence index and an index of a phase pattern vector using the plurality of synchronization signals;
selecting a BS having a highest correlation value calculated from the measurements from the plurality of BSs; and
establishing a connection to the selected BS,
wherein the phase pattern vector is used for the BS to change a phase of the sequence by the repetition count.

US Pat. No. 10,341,155

MODULATION AND EQUALIZATION IN AN ORTHONORMAL TIME-FREQUENCY SHIFTING COMMUNICATIONS SYSTEM

Cohere Technologies, Inc....

5. A method, comprising:receiving, on one or more carrier waveforms, a modulated signal transmitted by a wireless device configured to:
transform an original data frame including a plurality of data elements into a transformed data matrix having a plurality of transformed data elements wherein ones of the plurality of transformed data elements are based upon multiple ones of the plurality of data elements and wherein the transformed data matrix has a first dimension of N transformed data elements and a second dimension of M transformed data elements, wherein N and M are integers greater than one;
generate the modulated signal in accordance with the transformed data elements of the transformed data matrix;
wherein the original data frame comprises a time-frequency plane of information, the data frame including a pilot element at a position within the time-frequency plane of information associated with the wireless device wherein other positions within the time-frequency plane are associated with other wireless devices;
demodulating the received modulated signal transmitted by the wireless device to form an estimate of the transformed data matrix; and
generating, based upon the estimate of the transformed data matrix, a recovered data frame comprising an estimate of the original data frame.

US Pat. No. 10,341,154

METHOD FOR MULTIPLE ACCESS TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM, AND A TRANSMITTER APPARATUS AND A BASE STATION THEREFOR

Alcatel Lucent, Nozay (F...

1. A method for conditioning a multicarrier transmit signal using a transmitter apparatus which comprises a composer module, a first filter module, a second filter module, and a transmitter module (TRANS), the method comprising:the composer module composing a multicarrier transmit signal using a first or a second set of subgroups of time-frequency resource elements, with at least one subgroup of the first set of subgroups and at least one subgroup of the second set of subgroups having common time or frequency resources and being neighboured in time or frequency,
the first filter module filtering the first set of subgroups of time-frequency resource elements using a first filter characteristic defined by a first set of filter coefficients in case the multicarrier transmit signal is composed of the first set of subgroups of time-frequency resource elements,
the second filter module filtering the second set of subgroups of time-frequency resource elements using a second filter characteristic defined by a second set of filter coefficients different from the first set of filter coefficients, in case the multicarrier transmit signal is composed of the second set of subgroups of time-frequency resource elements, and
the transmitter module transmitting the multicarrier transmit signal,whereinif a wireless device comprising the transmitter apparatus for conditioning the multicarrier transmit signal experiences a link quality being lower than a threshold, then the transmitter apparatus uses the first set of subgroups of time-frequency resource elements,
and if the wireless device comprising the transmitter apparatus for conditioning the multicarrier transmit signal experiences the link quality being higher than the threshold, then the transmitter apparatus uses the second set of subgroups of time-frequency resource elements.

US Pat. No. 10,341,153

PEAK POWER REDUCTION DEVICE IN COMMUNICATION SYSTEM

HITACHI KOKUSAI ELECTRIC ...

1. A peak power reduction device, comprising:a unit for dividing digital information to be transmitted into a plurality of streams;
a unit for selecting a modulation multi-value number of the plurality of streams and distribution of transmission power according to a transmission state;
a unit for singular-value-decomposing transmission path characteristics of the streams and precoding the transmission path characteristics of the streams by a right singular value matrix;
a unit for complex-mapping subcarriers of the streams according to the modulation multi-value number;
a unit for converting a complex mapping signal into a time domain signal;
a first unit for storing a conversion result as the time domain signal;
a second unit for, when a peak value exceeding a predetermined threshold exists with respect to an amplitude of the time domain signal, calculating a peak time signal exceeding a predetermined threshold value from the peak value;
a third unit for converting the peak time signal into a frequency domain signal and calculating a converted frequency domain peak signal;
a fourth unit for calculating a peak stream signal by multiplying the frequency domain peak signal by a complex conjugate transpose matrix of a right singular value matrix; and
a fifth unit for limiting an SN ratio of a peak stream signal level corresponding to the modulation multi-value number of the streams with respect to the peak stream signal obtained by the fourth unit to a predetermined deterioration amount or less.

US Pat. No. 10,341,152

INTERFERENCE PARAMETER SIGNALING FOR EFFICIENT INTERFERENCE CANCELLATION AND SUPPRESSION

Panasonic Intellectual Pr...

1. An integrated circuit, comprising:circuitry which, in operation, controls a process of an apparatus for receiving data from a serving base station in a cellular communication system, the circuitry controls the process by:
blind decoding downlink control information transmitted by the serving base station,
extracting from a first field of the downlink control information scheduling control information and from a second field of the downlink control information interference information, and
receiving or transmitting data on resources specified by the scheduling control information while taking into account the interference information to reduce interference caused by transmitters other than the serving base station.

US Pat. No. 10,341,151

METHODS AND DEVICES FOR REDUCTION OF CUBIC METRIC IN A CONCATENATED BLOCK REFERENCE SIGNAL DESIGN

TELEFONAKTIEBOLAGET LM ER...

1. A method performed by a network device in a wireless network, the method comprising:determining parameters for generating first segments of a first reference signal, RS, each of the first segments covering a distinct set of frequencies, the parameters including at least a base sequence root index for one of the first segments, and being determined using information about at least a second RS which is to be received substantially simultaneously with the first RS at a transmission point of the wireless network, so as to limit correlation between the first RS and the second RS; and
providing the parameters to generate the first RS including the first segments to an RS-generating part of a wireless device or the network device.

US Pat. No. 10,341,150

METHOD AND DEVICE FOR PHASE MODULATION OF A CARRIER WAVE AND APPLICATION TO THE DETECTION OF MULTI-LEVEL PHASE-ENCODED DIGITAL SIGNALS

1. A method of phase, modulation comprising:creating a set of signals sh(t) constituted by a carrier wave of carrier frequency fC and of phase ?(t)=h?0(t) that is modulated in time t in such a manner that sh(t)=cos(2?fCt+h?0(t)), where h is an integer and where ?0(t)=2 arctan((t?t0)/w0), wherein the modulation of the carrier wave corresponds to a single phase pulse centered on a time t0 and having a positive characteristic duration w0;
incrementing the phase of the set of signals sh(t) by the quantity h2?; and
generating a single sideband frequency spectrum directly from the phase-incremented set of signals.

US Pat. No. 10,341,149

APPARATUS, SYSTEM AND METHOD OF COMMUNICATING A WAKEUP PACKET

INTEL CORPORATION, Santa...

1. An apparatus comprising one or more processors comprising circuitry configured to cause a first wireless device to:generate a wakeup packet comprising a payload comprising at least one payload field modulated according to an On-Off keying (OOK) modulation, the payload field comprising a sequence of a plurality of codes to encode binary bit values of the payload field according to an encoding scheme having a code rate less than one, a first code of the encoding scheme representing a binary bit value of “0” comprising a first sequence of two or more bits comprising at least one bit having a value of “1”, and a second code of the encoding scheme representing a binary bit value of “1” comprising a second sequence of two or more bits comprising at least one bit having a value of “1”, the wakeup packet comprising a field prior to the payload field to indicate the code rate of the encoding scheme; and
transmit the wakeup packet to a second wireless device.

US Pat. No. 10,341,148

SIGMA-DELTA MODULATOR AND ASSOCIATED SYSTEM IMPROVING SPECTRUM EFFICIENCY OF WIRED INTERCONNECTION

MEDIATEK INC., Hsin-Chu ...

1. A sigma-delta modulator (SDM) improving spectrum efficiency of wired interconnection, comprising:a main circuit for transferring an aggregated signal by a signal transfer function; and
a noise shaping circuit coupled to the main circuit, for shaping noise away from a low-pass band by a modified noise transfer function;
wherein a frequency response of the modified noise transfer function has a notch at a passband, and the passband does not overlap with the low-pass band; and
wherein the SDM modulates the aggregated signal to a modulated signal, and a ratio dividing a sampling frequency of the modulated signal by a frequency of the passband substantially equals a multiplication of four.

US Pat. No. 10,341,147

HIGH PERFORMANCE EQUALIZER ACHIEVING LOW DETERMINISTIC JITTER ACROSS PVT FOR VARIOUS CHANNEL LENGTHS AND DATA RATES

MegaChips Corporation, O...

1. An equalization method for a receiver comprising:receiving input signal at front end of the receiver upon passing through a channel;
generating, with an eye-opening monitor circuit, a control code based on channel conditions; and
equalizing, with a continuous-time linear equalization equalizer (CTLE) circuit, the input signal based on the control code, wherein
the eye-opening monitor circuit and the CTLE circuit are biased based on their corresponding replica circuits, and
the control code is generated in a feedforward configuration.

US Pat. No. 10,341,146

WIRELESS RECEIVER FOR MULTIUSER DETECTION INCORPORATING RESIDUAL ESTIMATION ERRORS

Collision Communications,...

1. A method of modeling a plurality of data streams from a plurality of signal sources included in a received transmission, the method comprising:receiving a transmission including a plurality of data streams from a plurality of signal sources, each data stream including unknown data symbols;
estimating data symbols for a data stream to provide an estimated data stream;
calculating a residual error for the estimated data stream;
modeling a residual data stream by removing any decoded data streams from the received transmission; and
equalizing the modeled residual data stream based on the residual error.

US Pat. No. 10,341,145

LOW POWER HIGH SPEED RECEIVER WITH REDUCED DECISION FEEDBACK EQUALIZER SAMPLERS

Intel Corporation, Santa...

1. An apparatus comprising:an analog to digital converter (ADC) to operate as a Variable Gain Amplifier (VGA) and as a set of samplers to sample data output from the ADC according to a clock signal, wherein the ADC is to operate as a VGA when threshold levels to the ADC are adjusted,
wherein the set of samples have programmable threshold, and wherein the set of samplers comprise clocked comparators; and
a Clock Data Recovery (CDR) circuit coupled to the ADC, wherein the CDR comprises a phase detector which is to instruct an oscillator to adjust a phase of the clock signal such that magnitude of a first post-cursor signal associated with the sampled data is substantially half of a magnitude of a primary cursor tap associated with the sampled data, wherein the clock signal with adjusted phase is provided to the ADC.

US Pat. No. 10,341,144

METHOD FOR TRANSMITTING SRS, AND MOBILE TERMINAL FOR THE SAME

LG Electronics Inc., Seo...

1. A method of transmitting a sounding reference signal (SRS) by a user equipment (UE), the method comprising:receiving (i) first information regarding a number of symbols L that are consecutive in time and that are configured for transmission of the SRS, and (ii) second information regarding a symbol-level repetition factor R for the transmission of the SRS, wherein L is equal to 4 and R is equal to 2; and
transmitting the SRS within a slot based on the first information and the second information, using a first frequency resource and a second frequency resource,
wherein a first R consecutive symbols, among L consecutive symbols within the slot, are used to transmit the SRS in the first frequency resource, and
wherein a second R consecutive symbols, among the L consecutive symbols within the slot, are used to transmit the SRS in the second frequency resource.

US Pat. No. 10,341,143

CHANNEL ESTIMATION BY CONTINUOUS TIME-DOMAIN PARAMETER EXTRACTION

1. A method for channel estimation, comprising:(a) generating a set of channel observations from a pilot signal in a received signal,
(b) modeling the channel, through which said received signal is received, with a continuous time-domain multipath model, having a set of time-domain parameters comprising:
(i) number of multipaths,
(ii) delays of said multipaths, and
(iii) complex amplitudes of said multipaths,
(c) extracting said set of time-domain parameters to obtain time-domain parameter estimates by minimizing a matching error between said set of channel observations and said continuous time-domain multipath model. said time-domain parameter estimates being solution to minimization of said matching error, and
(d) reconstructing said channel with said time-domain parameter estimates,whereby the reconstructed channel provides channel estimates that are more accurate than said channel observations.

US Pat. No. 10,341,142

APPARATUS AND METHODS FOR GENERATING NON-INTERFERING ELECTROMAGNETIC WAVES ON AN UNINSULATED CONDUCTOR

1. A method, comprising:receiving a plurality of communication signals; and
generating, by a transmitting device according to the plurality of communication signals, a plurality of wireless signals that induces a plurality of electromagnetic waves bound at least in part to a dielectric layer that is environmentally formed on an uninsulated conductor,
wherein the plurality of electromagnetic waves propagates along the dielectric layer of the uninsulated conductor without an electrical return path,
wherein each electromagnetic wave of the plurality of electromagnetic waves conveys at least a portion of the plurality of communication signals,
wherein the plurality of electromagnetic waves has a plurality of wave modes that at least reduces interference between the plurality of electromagnetic waves and enables a receiving device to retrieve from each electromagnetic wave of the plurality of electromagnetic waves at least the portion of the plurality of communication signals.

US Pat. No. 10,341,141

FLOW ENTRY GENERATING METHOD AND APPARATUS

Huawei Technologies Co., ...

1. A flow entry generating method, comprising:receiving a service path establishment request comprising: a constraint, a source device, and a target device;
finding, in a data transmission network according to a cross-layer information model, a service path that meets the constraint and is from the source device to the target device, wherein the cross-layer information model describes a topology relationship between an IP layer and an optical layer, wherein the topology relationship between the IP layer and the optical layer comprises:
multiple nodes, a link between the multiple nodes, and an attribute of the link, wherein the multiple nodes comprise an IP layer port node and an access stratum node, and the multiple nodes further comprise at least one of an optical path layer node, a timeslot layer node, and a wavelength layer node, wherein the IP layer port node is a node abstracted from a port of an IP layer device in the data transmission network, the access stratum node is a node abstracted from a tributary side port of an optical layer device in the data transmission network, the optical path layer node is a node abstracted from an optical path layer of the optical layer device in the data transmission network, the timeslot layer node is a node abstracted from a timeslot layer of the optical layer device in the data transmission network, and the wavelength layer node is a node abstracted from a wavelength layer of the optical layer device in the data transmission network; and
generating a respective corresponding flow entry for each forwarding device in the service path according to the cross-layer information model, and sending the flow entry to a corresponding forwarding device.

US Pat. No. 10,341,140

DYNAMIC NETWORK SERVICE OVERLAY ESTABLISHMENT IN HUB-AND-SPOKE PACKET SWITCHING NETWORKS

Cisco Technology, Inc., ...

1. A method comprising:establishing a particular tunnel between a spoke and a hub of a Dynamic Multipoint Virtual Private Network (DMVPN), wherein said established particular tunnel is a secure protocol channel;
communicating, between the spoke and the hub over said established particular tunnel, Next Hop Resolution Protocol (NHRP) messages resulting in an identification of one or more negotiated service overlay capabilities including service encapsulation to use in communicating service overlay data packets between the spoke and the hub over said established particular tunnel;
communicating a plurality of packets including data packets between the spoke and the hub over said established particular tunnel using said negotiated service overlay capabilities;
subsequent to said communicating the plurality of packets including data packets, communicating, between the spoke and the hub over said established particular tunnel, additional Next Hop Resolution Protocol (NHRP) messages resulting in an identification of one or more updated negotiated service overlay capabilities including updated service encapsulation to subsequently use in communicating service overlay data packets between the spoke and the hub; and
subsequent to said communicating additional Next Hop Resolution Protocol (NHRP) messages, communicating a plurality of additional packets including data packets between the spoke and the hub over said established tunnel using said updated negotiated service overlay capabilities;
wherein said established particular tunnel is not dropped between said operations of establishing the particular tunnel and said communicating the plurality of additional packets using said updated negotiated service overlay capabilities.

US Pat. No. 10,341,138

SPANNING TREE PROTOCOL ENABLED N-NODE LINK AGGREGATION SYSTEM

Dell Products L.P., Roun...

1. A spanning tree enabled n-node link aggregation system, comprising:a plurality of link aggregation node devices that include:
a first link aggregation node device that includes a first virtual port and that has the highest priority of the plurality of link aggregation node devices; and
a second link aggregation node device that includes a Link Aggregation Group (LAG) port, a non-LAG port, and a second virtual port that is coupled to the first virtual port included on the first link aggregation node device; and
a spanning tree protocol engine running on the each of the plurality of link aggregation node devices, wherein the spanning tree protocol engine is configured to:
designate the first link aggregation node device as a root bridge based on the first link aggregation node device having the highest priority of the plurality of link aggregation node devices and, in response, designate the first virtual port as a designated port and the second virtual port as a root port;
determine that a networking device that is coupled to the LAG port on the second link aggregation node device has a higher priority than the first link aggregation node device and, in response, designate the networking device as the root bridge; and
determine that a non-LAG link provided between the networking device and the second link aggregation node device has caused the second virtual port to be redesignated as an alternate port and the non-LAG port to be designated as a root port and, in response, redesignate the second virtual port as a root port and redesignate the non-LAG port as an alternate port.

US Pat. No. 10,341,137

COMPUTER CLUSTER SYSTEM

Mitac Computing Technolog...

1. A computer cluster system, comprising a plurality of computer groups each having a plurality of computer nodes;wherein, for each of said computer groups, said computer nodes cooperatively form a first ring topology, and, for each of said computer groups, one of said computer nodes serves as a first-ring master node of said first ring topology; and
wherein said first-ring master nodes of said first ring topologies cooperatively form a second ring topology, and one of said first-ring master nodes serves as a second-ring master node of said second ring topology;
wherein, for each of said first ring topologies, each of said computer nodes has respective node data, and said first-ring master node receives the node data of each of the other ones of said computer nodes of said first ring topology through two of said computer nodes that are directly coupled to said first-ring master node; and
wherein said second-ring master node receives, through two of said first-ring master nodes that are directly coupled to said second-ring master node, the node data of each of said computer nodes of each of said first ring topologies other than one of said first ring topologies that has said second-ring master node.

US Pat. No. 10,341,136

METHOD FOR MANAGING CONFIGURATION OF INDUSTRIAL INTERNET FIELD BROADBAND BUS

KYLAND TECHNOLOGY CO., LT...

1. A method for managing configuration of an industrial internet field broadband bus, the method being applicable to a two-wire data transfer network in which a bus controller and respective bus terminals are synchronized in clock, all bus terminals are linked to the bus controller through a two-wire line, and the bus controller allocates time slices for the respective bus terminals and the bus controller, wherein the method comprises:allocating, by the bus controller, time slices for the bus controller and the respective bus terminals;
acquiring, by the bus controller, configuration information, and determining a bus terminal corresponding to the configuration information; and
transmitting, by the bus controller, the configuration information to the bus terminal in the time slice occupied by the bus controller so that the bus terminal performs corresponding configuration operations according to the configuration information;
wherein determining, by the bus controller, the bus terminal corresponding to the configuration information comprises:
determining, by the bus controller, a type identifier corresponding to the configuration information according to a preset correspondence relationship between the configuration information and the type identifier, wherein the type identifier identifies a device type of a bus terminal; and
determining, by the bus controller, the bus terminal corresponding to the determined type identifier as the bus terminal corresponding to the configuration information;
wherein transmitting, by the bus controller, the configuration information to the bus terminal in the time slice occupied by the bus controller comprises:
searching, by the bus controller, a preset three-dimension correspondence relationship for an IP address and an MAC address corresponding to the determined type identifier; and
generating, by the bus controller, a message carrying the configuration information, wherein the message comprises a destination MAC address which is the found MAC address, and a destination IP address which is the found IP address, and transmitting the message to the bus terminal in the time slice occupied by the bus controller;
wherein the preset three-dimension correspondence relationship is created by the bus controller through:
receiving, by the bus controller, an IP address obtainment request carrying an MAC address and a type identifier of the bus terminal transmitted by the bus terminal; and
allocating, by the bus controller, an IP address for the bus terminal, and creating the three-dimension correspondence relationship between the type identifier, the MAC address, and the allocated IP address.