US Pat. No. 10,715,462

FIRST AND SECOND ICN NETWORK NODES AND METHOD THEREIN FOR GENERATING DATA CONTENT

TELEFONAKTIEBOLAGET LM ER...

1. A method performed by a first Information Centric Networking (ICN) network node for generating a number of data contents to a number of respective communication devices, wherein the first ICN network node operates in an ICN network, the method comprising:aggregating a number of requests received from a second ICN network node, wherein the number of requests are aggregated based on each request, according to a common part of the request, being associated with the same theme of the data content being requested by each respective communication device out of the number of communication devices,
and wherein each aggregated request further comprises a respective customized part associated with the data content, wherein the customized part is different in at least some of the number of requests, and wherein the customized part is requesting the data content to be customized for being consumed in the respective communication device;
locating a set of components corresponding to the requested data content according to the common part; and
generating a number of transformed data contents based on the aggregated number of requests and the located set of components, wherein each respective transformed data content fulfils the requested common part and the requested customized part of each respective request, and wherein each respective transformed data content is customized for being consumed in the respective communication device.

US Pat. No. 10,715,461

NETWORK CONTROL TO IMPROVE BANDWIDTH UTILIZATION AND PARAMETERIZED QUALITY OF SERVICE

Entropic Communication, L...

1. a method for scheduling network communications in a managed, network having a Network Controller and a plurality of associated network nodes, the method comprising;a) the Network Controller discovering the plurality of network nodes;
b) the Network Controller classifying the discovered network, nodes into two more classifications of nodes for prioritization of network communications;
c) the Network Controller receiving: reservation requests from at least some of the plurality of network nodes, wherein the reservation requests request one or more time slots for their respective network nodes in an upcoming communication window; and
d) the Network Controller assigning time slots in upcoming communication window to one or more network nodes in response to reservation requests, wherein the assignments are based on a priority of the network, nodes and wherein the priority is assigned to the network nodes according to their classification.

US Pat. No. 10,715,460

OPPORTUNISTIC RESOURCE MIGRATION TO OPTIMIZE RESOURCE PLACEMENT

Amazon Technologies, Inc....

1. A distributed system, comprising:a plurality of resource hosts respectively hosting one or more of a plurality of resources, wherein the plurality of resources comprise respective computing resources, storage resources or networking resources, and wherein the plurality of resource hosts make the respective resources accessible over a network;
one or more computing devices comprising one or more hardware processors and memory to implement an opportunistic placement manager, configured to:
evaluate current placements of the plurality of resources according to one or more placement criteria, wherein the one or more placement criteria comprise an evaluation of a current placement configuration for the plurality of resources to at least improve resource placement of the plurality of resources as a whole amongst the plurality of resource hosts for the distributed system;
based, at least in part, on the evaluation, identify one or more candidate resources of the plurality of resources to migrate from the respective resource hosts currently hosting the one or more candidate resources to respective destination resource hosts of the plurality of resource hosts, wherein the respective destination resource hosts currently make one or more other resources of the plurality of resources accessible over the network, wherein the prospective migrations of the one or more candidate resources of the plurality of resources exceed an improvement threshold with respect to the one or more placement criteria; and
direct a migration operation to migrate at least one of the one or more candidate resources to the respective destination resource host, wherein the migration of the at least one candidate resource to the respective destination resource host improves resource placement of the plurality of resources in excess of the improvement threshold.

US Pat. No. 10,715,459

ORCHESTRATION IN A MULTI-LAYER NETWORK

salesforce.com, inc., Sa...

1. A method, comprising:maintaining, by a first computer system within a first layer in a multi-layer computer network, state information defining an information flow within the multi-layer computer network, wherein the information flow includes a plurality of actions;
assigning, by the first computer system, a particular one of the plurality of actions to be performed at a second, different layer of the multi-layer computer network;
generating, by the first computer system, program instructions to perform the particular action, wherein the program instructions are generated using device information accessible to the first computer system, wherein the device information indicates characteristics of a second computer system within the second layer; and
causing, by the first computer system, the program instructions to be sent to the second computer system, wherein the program instructions are executable by the second computer system to perform the particular action based on a state of a third computer system within a third, different layer of the multi-layer computer network.

US Pat. No. 10,715,458

ORGANIZATION LEVEL IDENTITY MANAGEMENT

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:receiving, on behalf of a user, a request to access a service under a specified resource account, the specified resource account having permissions for accessing resources in a resource provider environment and the user lacking permissions with the specified resource account, wherein the request includes identifying information for the user;
authenticating the request with respect to an organization account for the user;
determining that an attachment point of the organization account in a hierarchical organization structure causes the specified resource account to be a sub-account of the organization account;
enabling an organization identity for the user in the organization account to project itself as a resource identity in the specified resource account, wherein the organization account lacks permission for accessing the resources in the resource provider environment;
causing the request to be denied by the service, using the resources and the projected resource identity, according to the permissions of the specified resource account; and
logging the denial of access with the identifying information for the user and the organization account.

US Pat. No. 10,715,457

COORDINATION OF PROCESSES IN CLOUD COMPUTING ENVIRONMENTS

ORACLE INTERNATIONAL CORP...

1. A method of managing computer cloud resources, the method comprising:receiving, by an orchestration system implemented by at least one server computer of a cloud computing system, through a programming interface, from a client system, information that defines an orchestration for performing one or more functions using a plurality of objects across a plurality of cloud service systems, wherein a first object of the plurality of objects is provided by a first cloud service system of the plurality of cloud service systems, wherein a second object of the plurality of objects is provided by a second cloud service system of the plurality of cloud service systems, wherein the first cloud service system is provided by a first cloud service provider and the second cloud service system is provided by a second cloud service provider, and wherein for each of the plurality of objects, the information indicates a plurality of parameters for an instance of the object, the plurality of parameters including a first parameter indicating site information specifying a location where to instantiate an instance of the object and a second parameter indicating an image list defining a path for the instance of the object;
generating, by the at least one server computer, a first cloud resource management plan for the orchestration for performing the one or more functions using the plurality of objects, wherein the first cloud resource management plan is generated based on the received information that defines the plurality of objects for the orchestration, wherein the generating the first cloud resource management plan includes grouping objects of the plurality of objects that have a first same type or configured to perform a first same function into a first group, and wherein the first group comprises the first object provided by the first cloud service provider;
adding, by the at least one server computer, a first policy regarding the first group of objects to the first cloud resource management plan based on the received information that defines the plurality of objects for the orchestration;
generating, by the at least one server computer, a second cloud resource management plan for the orchestration for performing the one or more functions using the plurality of objects, wherein the second cloud resource management plan is generated based on the received information that defines the plurality of objects for the orchestration, wherein the generating the second cloud resource management plan includes grouping objects of the plurality of objects that have a second same type or configured to perform a second same function into a second group, and wherein the second group comprises the second object provided by the second cloud service provider;
adding, by the at least one server computer, a second policy regarding the second group of objects to the second cloud resource management plan based on the received information that defines the plurality of objects for the orchestration;
defining, by the at least one server computer, a relationship between the first cloud resource management plan and the second cloud resource management plan to generate the orchestration based on the received information that defines the orchestration;
storing, by the at least one server computer and in at least one storage, the first cloud resource management plan and the second cloud resource management plan;
receiving, by the at least one server computer, through the programming interface, a command including an input parameter to perform the one or more functions for the orchestration;
retrieving, via the at least one server computer acting as an orchestration manager, the first cloud resource management plan and the second cloud resource management plan from the at least one storage based on the orchestration and the relationship between the first cloud resource management plan and the second cloud resource management plan; and
executing, by the at least one server computer with at least one site controller of the orchestration system, the first cloud resource management plan and the second cloud resource management plan to perform, based on the input parameter, the one or more functions using the first object accessed from the first cloud service system and the second object accessed from the second cloud service system.

US Pat. No. 10,715,456

NETWORK DEVICE, CONTROLLER, QUEUE MANAGEMENT METHOD, AND TRAFFIC MANAGEMENT CHIP

HUAWEI TECHNOLOGIES CO., ...

1. A network device comprising:a traffic management (TM) chip comprising N levels of schedulers, each (i+1)th-level scheduler is configured to schedule multiple ith-level schedulers, each first-level scheduler is configured to schedule multiple queues, N is an integer greater than 1, and i is an integer greater than or equal to 1 and less than N;
a first communications interface, configured to receive a queue management instruction sent by a controller, wherein the queue management instruction comprises an identifier of a first scheduler and an identifier of a first queue, and the first scheduler is one of multiple first-level schedulers; and
the TM chip is configured to control, according to the queue management instruction, scheduling of the first queue by the first scheduler, wherein
a queue scheduled by the first scheduler belongs to a queue resource pool of the TM chip, and the queue resource pool comprises at least one to-be-allocated queue.

US Pat. No. 10,715,455

PACKET SWITCHING DEVICE MODIFYING PATHS OF FLOWS OF PACKETS TAKEN WITHIN WHILE OUTPUTTING PACKETS IN RECEIVED INTRA-FLOW ORDER BUT NOT NECESSARILY INTER-FLOW ORDER

Cisco Technology, Inc., ...

1. An apparatus, comprising:a packet switching device including: a plurality of distribution switch elements, a plurality of routing stage switch elements, and a plurality of egress stage switch elements, with each of the plurality of routing stage switch elements providing a portion of a plurality of paths between each of the plurality of distribution switch elements and each of the plurality of egress stage switch elements; wherein the packet switching device continuously progresses, after a predetermined duration and in order of a plurality of ordered distribution periods, to a next current distribution period of the plurality of ordered distribution periods;
wherein for each current distribution period of the plurality of ordered distribution periods, each particular distribution switch element of the plurality of distribution switch elements sends distribution switch element received packets of a plurality of packet flows to a corresponding routing stage switch element of the plurality of routing stage switch elements, with packets of a same packet flow of the plurality of packet flows sent in received order, and with the corresponding routing stage switch element determined based on said current distribution period and the same packet flow such that the corresponding routing stage switch element varies for different distribution periods of the plurality of ordered distribution periods for the same packet flow;
wherein each of the plurality of egress stage switch elements stores outbound packets received from elements of the plurality of routing stage switch elements, in a plurality of packet output queues, with said outbound packets associated with consecutive distribution periods of the plurality of ordered distribution periods being said stored in different queues of the plurality of packet output queues; and
wherein for each current forwarding period of the plurality of ordered distribution periods: each particular egress element of the plurality of egress stage switch elements forwards packets for an output queue of the plurality of packet output queues associated with said current forwarding period, and progresses, in order of the plurality of ordered distribution periods, to a next current forwarding period of the plurality of ordered distribution periods, resulting in packets being sent from said particular egress element in the order of the plurality of ordered distribution periods and there within, in the order of receipt, without packet reordering by said particular egress element.

US Pat. No. 10,715,454

CROSS-SESSION NETWORK COMMUNICATION CONFIGURATION

STRONG FORCE IOT PORTFOLI...

1. A method for data communication over a data channel on a data path between a first computing device and a second computing device utilizing a transport layer protocol, the method comprising:maintaining, at the first computing device, data corresponding to one or more current data communication connections between the first and second computing devices, the maintained data comprising values of one or more communication protocol parameters corresponding to the one or more current data communication connections;
initiating, at the first computing device, a new data communication connection between the first computing device and the second computing device including configuring the new data communication connection at least in part according to the maintained data by utilizing the values of the one or more communication protocol parameters as initial communication protocol parameters for the new data communication connection; and
transmitting, from the first computing device and to the second computing device, data via the new data communication connection.

US Pat. No. 10,715,452

TRAFFIC CLASS ARBITRATION BASED ON PRIORITY AND BANDWIDTH ALLOCATION

INTEL CORPORATION, Santa...

1. A network controller to communicate with one or more other network nodes, said network controller comprising:a transmitter circuit to transmit packets on a plurality of virtual lanes (VLs), said VLs associated with a defined VL priority and an allocated share of network bandwidth;
bandwidth monitor circuitry comprising a plurality of bandwidth meters, each bandwidth meter to measure bandwidth consumed by packets transmitted on one or more VLs;
wherein each VL is assigned to one of a plurality of bandwidth monitoring groups, each bandwidth monitoring group associated with one of the plurality of bandwidth meters; and
arbiter circuitry to perform a comparison of said measured bandwidth to said allocated share of network bandwidth, to adjust said VL priority responsive to said comparison indicating that said measured bandwidth exceeds said allocated share of network bandwidth, and to transmit said packets based on said adjusted VL priority.

US Pat. No. 10,715,451

EFFICIENT TRANSPORT FLOW PROCESSING ON AN ACCELERATOR

MELLANOX TECHNOLOGIES, LT...

1. Data processing apparatus, comprising:a host processor, configured with a transport layer stack which processes received packets;
a network interface controller (NIC), which is configured to couple the host processor to a packet data network;
a memory, configured to hold a flow state table containing context information with respect to computational operations to be performed on multiple packet flows conveyed between the host processor and the network; and
acceleration logic, which is coupled to the host processor through a host bus, a network switch or a network link, and is configured to perform the computational operations on payloads of packets in the multiple packet flows using the context information in the flow state table,
wherein the NIC is configured to steer incoming packets from the packet data network to the acceleration logic,
wherein the acceleration logic is configured to store payloads of the incoming packets in a temporary buffer, to forward headers of the incoming packets to the host, through the host bus, the network switch or the network link, for processing by the transport layer stack in the host processor and to perform the computational operations on the stored payloads of packets, responsively to results of the processing by the transport layer stack provided to the acceleration logic,
wherein the host processor is configured to feed the transport layer stack with packets formed of the forwarded headers and padding to the original sizes of the packets.

US Pat. No. 10,715,450

METHOD AND APPARATUS FOR ALLOCATING BANDWIDTH FOR A NETWORK

1. A method for allocating a bandwidth for a network, the method comprising:determining, by a base station, a number of subscriber stations that the base station is capable of supporting in accordance with a performance objective for data traffic and a performance objective for voice traffic, wherein the performance objective for data traffic comprises an allowable peak rate, wherein the performance objective for voice traffic comprises a load per voice line, wherein the determining is performed using an equivalent bandwidth model; and
allocating, by the base station, the bandwidth in accordance with the number of subscriber stations that the base station is capable of supporting.

US Pat. No. 10,715,449

LAYER 2 LOAD BALANCING SYSTEM

Dell Products L.P., Roun...

1. A layer 2 load balancing system, comprising:a plurality of first server devices;
a plurality of first virtual machines that are provided on the plurality of first server devices and that each share a first virtual Media Access Control (MAC) address; and
a switch device that is coupled to each of the plurality of first server devices via respective first ports on the switch device, wherein the switch device is configured to:
receive, during a first time period via each of the respective first ports connected to the plurality of first server devices, the first virtual MAC address;
identify, in response to receiving the first virtual MAC address via each of the respective first ports, a first server device cluster that shares the first virtual MAC address;
receive packets that are part of a first packet flow and that are directed to the first virtual MAC address; and
direct each of the packets that are part of the first packet flow to one of the plurality of first virtual machines that is provided on one of the plurality of first server devices in the first server device cluster.

US Pat. No. 10,715,448

SYSTEM AND/OR METHOD FOR PREDICTIVE RESOURCE MANAGEMENT IN FILE TRANSFER SERVERS

SOFTWARE AG, Darmstadt (...

1. A computer network, comprising:a load balancer;
one or more monitors;
a non-transitory storage medium configured to store a plurality of machine learned models, the plurality of models including a first model and a second model, the first model being based on prior, time dependent, usage of the computer network in connection with serving transfer requests, the second model being based on data of transferrable files that are servable in response to transfer requests;
a cluster comprising a plurality of servers, each said server including at least one processor, a memory, and a transceiver, wherein the servers are configured to:
receive, from at least one client computing device that is remote to the computer network and via the load balancer, a plurality of requests to be processed; and
a plurality of speed limiter modules, each said speed limiter module being associated with a respective one of the servers, each one of the plurality of speed limiter modules being configured to at least:
receive, from the one or more monitors, current runtime status information pertaining to the computer network and the server associated therewith;
execute, for each one of the plurality of received requests, a plurality of different predictor processes by using at least the first and second models of the plurality of models, each predictor process generating, for each one of the plurality of requests, a corresponding prediction for how a given request will impact a) the server associated therewith, and/or b) the computer network, wherein at least a first one of the predictor processes is executed by using the current runtime status information and at least a second one of the plurality of different predictor processes is executed based on data associated with a corresponding one of the plurality of received requests;
determine, based on the plurality of corresponding predictions from the plurality of predictor processes, whether an incoming request is to be accepted by the server associated therewith;
responsive to a determination that an incoming request is to be accepted, initiate processing of the incoming request via the server associated therewith;
determine, based on the plurality of corresponding predictions from the plurality of predictor processes, whether the total resource usage of the server associated therewith exceeds or is likely to exceed an initial resource threshold; and
responsive to a determination that the total resource usage of the server associated therewith exceeds or is likely to exceed the initial resource threshold:
cease acceptance of further incoming requests; and
control the speed at which requests currently being processed by the server associated therewith are being handled, such that (a) speeds of all but at least one of the requests currently being processed are throttled, (b) requests that are being throttled are neither terminated nor timeout nor handed over to another server in the cluster, (c) non-throttled requests are permitted to proceed to completion, and (d) as non-throttled requests are completed, requests that are throttled have their speeds increased in a predetermined manner,
wherein the number of the plurality of predictor processes is different from the number of the plurality of models.

US Pat. No. 10,715,447

FRAMEWORK FOR TEMPORAL LABEL SWITCHED PATH TUNNEL SERVICES

Futurewei Technologies, I...

1. A temporal software defined network (T-SDN) controller configured to manage a network containing a plurality of nodes connected by links, comprising:a temporal label switched path (T-LSP) manager configured to receive a path request, wherein the path request includes a time interval and a set of constraints;
a temporal path element operably coupled to the T-LSP manager, wherein the temporal path element is configured to:
receive the path request from the T-LSP manager;
obtain traffic engineering information;
compute a path satisfying the time interval and the set of constraints based on the traffic engineering information obtained; and
provide the path as computed to the T-LSP manager;
a temporal traffic engineering database (T-TED) operably coupled to the T-LSP manager and the temporal path element, wherein the T-TED is configured to:
provide the traffic engineering information to the temporal path element for use in computing the path upon request by the temporal path element; and
reserve bandwidth corresponding to the path during the time interval upon request by the T-LSP manager;
a temporal label database (T-LDB) operably coupled to the T-LSP manager, wherein the T-LDB is configured to reserve labels for the links along the path during the time interval upon request by the T-LSP manager;
a temporal LSP database (T-LSPDB) operably coupled to the T-LSP manager, wherein the T-LSPDB is configured to store the time interval, the set of constraints, the labels, and the bandwidth; and
a network interface operably coupled to the T-LSP manager, wherein the network interface permits the T-LSP manager to communicate with an ingress node in the network to establish a temporal LSP at a start of the time interval along the path as computed, and delete the temporal LSP at an end of the time interval.

US Pat. No. 10,715,446

METHODS AND SYSTEMS FOR DATA CENTER LOAD BALANCING

HUAWEI TECHNOLOGIES CO., ...

1. A method for collecting congestion information at a first switch of a leaf-spine network, the method comprising:obtaining a path finding packet, the path finding packet having a payload containing a first record with information about congestion at a second switch of the leaf-spine network;
obtaining congestion information about congestion at the first switch, including a metric representing a measured amount of congestion at a port of the first switch;
inserting the congestion information, including the metric representing the measured amount of congestion at the port of the first switch, as a second record into the payload of the path finding packet, the payload thereby containing the first record with the information about the congestion at the second switch and also containing the second record with the congestion information about the congestion at the first switch; and
transmitting the path finding packet.

US Pat. No. 10,715,445

COMMUNICATION DEVICE AND CONTROL METHOD FOR FRAME TRANSFER

JVC KENWOOD CORPORATION, ...

1. A communication device in which a frame received via a first interface is transmitted via a second interface, the communication device comprising:a memory storing a program that, in response to execution, causes a Central Processing Unit (CPU) to implement a configuration including:
a first detector that detects linkup of the second interface;
a second detector that detects, in response to the first detector detecting the linkup, a state closer to an overflow of a buffer that accumulates a frame to be transmitted via the second interface; and
a control unit that executes flow control via the first interface in response to the second detector detecting the state closer to the overflow and in response to a difference between a value of a reception counter in the first interface and a value of a transmission counter in the second interface being smaller than a threshold and, accordingly no transmission failure is detected in the second interface,
wherein, in response to the second detector detecting the state closer to the overflow and in response to the difference between the value of the reception counter in the first interface and the value of the transmission counter in the second interface being greater than or equal to the threshold or the difference being consecutively a threshold value or greater and, accordingly, a transmission failure being detected in the second interface, the control unit determines non-execution of flow control via the first interface, and
wherein the reception counter and the transmission counter count a number of frames received or transmitted for a same period of time.

US Pat. No. 10,715,444

TRAFFIC VOLUME DETERMINATION SYSTEM UTILIZING ROAD-TO-VEHICLE COMMUNICATION

TOYOTA JIDOSHA KABUSHIKI ...

1. A traffic volume determination system comprising:a storage device configured to store
a first table configured to store information identifying a first link and a second link among a plurality of links, the first link and the second link having a correlation degree, which exceeds a threshold, of a traffic volume, and
a second table configured to store information indicating a first reference traffic volume which is a past statistical average traffic volume of the first link, and information indicating a second reference traffic volume which is a past statistical average traffic volume of the second link; and
a computer configured to
determine that the first link is closed when a probability that an first event and a second event occurs at a same time is outside the range of a statistical error, the first event being an event in which an actual traffic volume of the first link is significantly lower than the first reference traffic volume, the second event being an event in which an actual traffic volume of the second link is significantly higher than the second reference traffic volume, and
output information that the first link is closed.

US Pat. No. 10,715,443

EFFECTIVE HANDLING OF WCCP REJECT TRAFFIC

CISCO TECHNOLOGY, INC., ...

1. A system for management of traffic in a Web Cache Communication protocol (WCCP), the system comprising:a switch receiving traffic from a client device; and
a cache engine in communication with the switch, the cache engine configured to:
receive a request from the switch to direct the traffic from the client device to the cache engine;
determine the traffic from the client device is rejected WCCP traffic from the client device;
determine the cache engine cannot process the rejected WCCP traffic from the client device; and
in response to determining the cache engine cannot process the rejected WCCP traffic from the client device, send a command to the switch to suspend routing of at least a portion of the traffic to the cache engine, the command including instructions to remove a rule regarding the routing to the cache engine and/or modify an access control list rule to exclude the cache engine.

US Pat. No. 10,715,442

CONGESTION CONTROL

Netduma Software, LTD., ...

1. A method comprising:determining, by a machine, a plurality of roundtrip times associated with a plurality of acknowledgements, the machine including a processor system having at least one processor and a memory system;
determining, by the machine, a minimum round trip time associated with the plurality of acknowledgements based on the determining of the plurality of roundtrip times;
determining, by the machine, a window within which one or more server-to-client-messages are sent based on the minimum round trip time, the one or more server-to-client-messages being messages sent from a server to a client;
automatically altering, by the machine, header information of a client-to-server-message, the client-to-server-message being a message to the server from the client, the altering alters the client-to-server-message to specify the window within which the one or more server-to-client messages are sent by the server, the window being chosen so that the one or more server-to-client messages will be sent at a rate that the client can receive messages without congestion and without exceeding a bandwidth allocated to the client;
sending the client-to-server-message, via the processor system, to the server; and
sending, by the machine, an acknowledgement of receipt of the server-to-client message after a delay time, wherein the delay time is chosen based on the window, so that the server does not send more server-to-client messages than the client can receive, without dropping messages.

US Pat. No. 10,715,441

SYSTEM AND METHOD OF A HIGH BUFFERED HIGH BANDWIDTH NETWORK ELEMENT

Arista Networks, Inc., S...

1. A non-transitory machine-readable medium having executable instructions to cause one or more processing units to perform a method to process a packet in a network element, the method comprising:receiving the packet, with a packet switch unit, wherein the packet was received by the network element on an ingress interface, each ingress interface being one of an externally queued (EQ) interface and a non-EQ interface;
determining whether the packet is to be stored in one of a plurality of external queues of a packet storage unit based on at least whether the ingress interface that received the packet is an EQ interface, wherein the packet storage unit is external to and coupled to the packet switch unit;
determining whether the packet is to be stored in one of a plurality of internal queues of the packet switch unit based on at least the ingress interface that received the packet being a non-EQ interface;
if the packet is to be stored in one of the plurality of external queues,
selecting, from among the plurality of external queues, one of the plurality of external queues for the packet based on forwarding information of the packet,
forwarding the packet to the packet storage unit, wherein the packet storage unit includes storage for the external queue,
receiving, with the packet switch unit, the packet from the packet storage unit, and
forwarding the packet to an egress interface corresponding to the selected one of the plurality of external queues, and
if the packet is to be stored in one of the plurality of internal queues, storing the packet in one of the plurality of internal queues.

US Pat. No. 10,715,440

DISTRIBUTED NEXT HOP RESOLUTION

Juniper Networks, Inc., ...

1. A computer-implemented method for use in a system including a plurality of next hop resolution subsystems, each of the plurality of next hop resolution subsystems including (1) a next hop registry, (2) a partial-view tree storing a local instance of next hop resolution information, and (3) a full-view tree storing a local instance of next hop resolution information, the computer-implemented method comprising:a) receiving with one of the plurality of next hop resolution subsystems, a request to resolve a next hop;
b) responsive to receiving the request, determining, using the next hop registry of the one next hop resolution subsystem, whether or not resolution of the next hop was previously tried;
c) responsive to a determination that resolution of the next hop was previously tried,
1) processing the next hop request using the full-view tree of the one next hop resolution subsystem to obtain a result including zero or more best match next hops, and
2) replying to the request using the result, and otherwise, responsive to a determination that resolution of the next hop was not previously tried,
1) processing the next hop request using partial-view tree of the one next hop resolution subsystem to obtain a result including zero or more best match next hops,
2) updating the full-view tree of the one next hop resolution subsystem to include the result obtained,
3) replying to the request using the result,
4) publishing the next hop resolution request to the other of the plurality of next hop resolution subsystems, and
5) publishing the result as an update to the other subsystems.

US Pat. No. 10,715,439

LONGEST PREFIX MATCHING PROVIDING PACKET PROCESSING AND/OR MEMORY EFFICIENCIES IN PROCESSING OF PACKETS

Cisco Technology, Inc., ...

1. A method, comprising:determining, by a packet processing apparatus based on a particular prefix generated based on a particular packet, a particular conforming entry of a plurality of stored conforming entries, with each specific conforming entry of the plurality of stored conforming entries representing a specific search space including one or more installed specific prefixes with each said installed specific prefix comprising a same prefix of said specific conforming entry and with one or more mask lengths identifiable based on said specific conforming entry;
determining an overall longest matching prefix from a lookup result of a hash table lookup operation performed based on said determined particular prefix for each particular mask length identifiable based on said determined particular conforming entry in a respective hash table of a plurality of hash tables, with the respective hash table including one or more entries representing one or more of said installed prefixes in said search space said represented by said determined particular conforming entry; and
processing, by the packet processing apparatus, the particular packet based on processing information associated with said determined overall longest matching prefix.

US Pat. No. 10,715,438

DYNAMIC ACCESS-POINT LINK AGGREGATION

ARRIS Enterprises LLC, S...

1. An electronic device, comprising:an interface node;
an interface circuit, coupled to the interface node, configured to wired or wirelessly communicate with a second electronic device, wherein the electronic device is configured to perform operations comprising:
receiving, at the interface node, Gratuitous Address Resolution Protocol (ARP) packets associated with the second electronic device;
when the electronic device subsequently does not receive a Gratuitous ARP packet associated with the second electronic device within a time interval, assuming a second logical address of the second electronic device, which is in addition to an existing logical address of the electronic device; and
in response to receiving an ARP request associated with a third electronic device that comprises the second logical address of the second electronic device, providing, to the interface node, an ARP response intended for the third electronic device, wherein the ARP response comprises a physical address of the electronic device, so that subsequent packets or frames associated with the third electronic device are directed to the electronic device instead of the second electronic device.

US Pat. No. 10,715,437

DEADLINE DRIVEN PACKET PRIORITIZATION FOR IP NETWORKS

Intel Corporation, Santa...

1. An apparatus comprising:a packet receiver to receive a packet, the packet including a packet header having a deadline and a destination network node;
a routing table including a current latency for a path to the destination network node for the packet;
a component coupled to the packet receiver and the routing table to get the deadline for delivery of the packet to the destination network node, to set a remaining time for the packet to the deadline minus a current time, to subtract the current latency from the remaining time when the packet is to be routed, and to assign the packet to one of a plurality of deadline bins based at least in part on the remaining time, each deadline bin associated with one of a plurality of transmit queues, the plurality of deadline bins arranged in a deadline priority order from a highest priority to a lowest priority; and
a packet transmitter to transmit packets from the plurality of transmit queues, the plurality of transmit queues being accessed in the deadline priority order.

US Pat. No. 10,715,436

DYNAMIC LOOP DETECTION AND SUPPRESSION

Comcast Cable Communicati...

1. A method comprising:receiving, from a first computing device and via a network, a communication addressed to a first destination;
determining, by a second computing device, that a number of instances the communication was routed through a node on the network satisfies a threshold; and
after the determining that the number of instances satisfies the threshold:
modifying, by the second computing device, a header of the communication to include a data field comprising a looping identifier indicating that the communication was sent by a looping customer; and
routing, to the first destination and based on the looping identifier, the communication to suppress an occurrence of a loop condition.

US Pat. No. 10,715,435

ROUTING TIER FOR HIGHLY-AVAILABLE APPLICATIONS ON A MULTI-TENANT PLATFORM-AS-A-SERVICE (PAAS) SYSTEM

RED HAT, INC., Raleigh, ...

1. A method, comprising:receiving information related to a load balancer gear of an application running on the multi-tenant Platform as a service (PaaS) system, wherein the information comprises endpoint information indicating a location of the load balancer gear, and cartridge information identifying one or more cartridges implemented on the load balancer gear;
updating, by a processing device, a routing table in view of the endpoint information and the cartridge information; and
causing traffic to be routed to the load balancer gear in view of the updated routing table regardless of whether a previously-utilized load balancer gear of the application is operational, the load balancer gear to direct the traffic to one or more other gears of the application.

US Pat. No. 10,715,434

APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING SIGNAL IN MULTIMEDIA SYSTEM

Samsung Electronics Co., ...

1. A method of operating a receiving apparatus in a broadcasting system, the method comprising:receiving at least one link layer packet which is generated by a transmitting apparatus, based on at least one network layer packet; and
processing the received at least one link layer packet,
wherein a first link layer packet of the at least one link layer packet includes a header and a payload,
wherein the header comprises a base header including payload configuration information indicating a configuration of the payload,
wherein if the payload configuration information is set as a first value, the payload configuration information indicates that the payload carries a single network layer packet and header mode information is included in the base header, the header mode information indicating whether an additional header for the single network layer packet is included in the header,
wherein the header further comprises an extension header including sub-stream identification information, if flag information included in the additional header indicates that the sub-stream identification information is included in the extension header, and
wherein the sub-stream identification information is used to filter a packet stream in a link layer level, the packet stream including one or more of the at least network layer packet.

US Pat. No. 10,715,433

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD

MITSUBISHI ELECTRIC CORPO...

1. An information processing apparatus comprising:a plurality of virtual machines including a virtual machine having a function of sending an address request, and sending communication data to a destination address received as a response to the address request; and
communication logging circuitry to log communication data transferred between the virtual machine and another virtual machine in the plurality of virtual machines,
wherein, upon receiving an address request from the virtual machine, the communication logging circuitry sends an address of the communication logging circuitry as a destination address, to the virtual machine, and logs the communication data sent from the virtual machine,
the virtual machine including
first setting circuitry to make a first setting as to whether to send a first address that is an address of the virtual machine, in response to an address request from the another virtual machine for acquiring an address, and
first response circuitry to send the first address upon receiving the address request when the first setting is set to an active setting, the first response circuitry not sending the first address even upon receiving the address request when the first setting is set to an inactive setting; and
the communication logging circuitry including
second setting circuitry to make a second setting as to whether to send a second address that is the address of the communication logging circuitry, in response to the address request, and
second response circuitry to send the second address upon receiving the address request when the second setting is set to an active setting, the second response circuitry not sending the second address even upon receiving the address request when the second setting is set to an inactive setting, and
when the first setting is set to the inactive setting, the second setting circuitry sets the second setting to the active setting and the second response circuitry sends the second address to the other virtual machine that has sent the address request.

US Pat. No. 10,715,430

DATA FLOW REDIRECTION METHOD AND SYSTEM, NETWORK DEVICE, AND CONTROL DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. A data flow redirection method, comprising:receiving, by a network device, a control message from a control device, the control message carrying redirection routing information of a data flow and a redirection routing indication, the redirection routing information of the data flow comprising destination address information of the data flow and redirection next hop information of the network device, the redirection routing indication instructing to convert the redirection routing information of the data flow into a forwarding entry in a target forwarding table, and tablespace of the target forwarding table being greater than tablespace of a flow specification forwarding table of the network device; and
converting, by the network device, the redirection routing information of the data flow into the forwarding entry in the target forwarding table according to the redirection routing indication.

US Pat. No. 10,715,429

APPARATUS, SYSTEM, AND METHOD FOR PACKET SWITCHING

Level 3 Communications, L...

1. An apparatus comprising:a network controller comprising at least one processor and at least one memory to store a routing configuration application that is executed by the at least one processor to:
analyze a plurality of interconnections between a plurality of forwarding switches of a communication network to identify a network topology of the communication network;
determine at least one label switched path (LSP) between the forwarding switches, the LSP comprising one or more next hop routes each defining a forwarding address associated with one forwarding switch to an adjacent forwarding switch;
determine at least one bypass LSP that is redundant to one or more LSPs determined by the routing configuration application, wherein each forwarding switch executes at least one of a Link Aggregation Control Protocol (LACP) and a Bidirectional Forwarding Detection (BFD) to detect a failure in the LSP and perform switchover to the bypass LSP;
receive a query from a first forwarding switch of the forwarding switches, the query associated with a packet that has been received by the first forwarding switch; and
transmit, based on the query, a next hop route of the bypass LSP to the first forwarding switch, the first forwarding switch configured to identify the next hop route of the bypass LSP, and to use the next hop route of the bypass LSP to route the packet through the network according to a multiprotocol label switching (MPLS) protocol,
wherein the network controller comprises a route reflector (RR) function that interfaces with a border gateway protocol (BGP) instance executed on an edge device to determine the LSP by resolving next hop routes for each adjacent forwarding switch.

US Pat. No. 10,715,428

RESOURCE RESERVATION TECHNIQUES FOR POINT-TO-MULTIPOINT TUNNELS ON A RING NETWORK

Juniper Networks, Inc., ...

1. A method comprising:receiving, by a network device and from an ingress network device of a ring network, a resource reservation request message to establish a point-to-multipoint (P2MP) ring label switched path (LSP), wherein the resource reservation request message includes a leaf identification object that identifies a plurality of leaf network devices of the P2MP ring LSP;
determining, by the network device and based on the leaf identification object, that the network device is one of the plurality of leaf network devices of the P2MP ring LSP;
sending, by the network device and in response to determining that the network device is one of the plurality of leaf network devices of the P2MP ring LSP and reserving resources according to the resource reservation request message, a resource reservation response message towards the ingress network device;
modifying, by the network device and based on the resource reservation request message, forwarding information of the network device to forward network traffic received on the P2MP ring LSP off of the P2MP ring LSP; and
sending, by the network device and to a next hop network device along the P2MP ring LSP, the resource reservation request message.

US Pat. No. 10,715,427

DETERMINING ROUTING DECISIONS IN A SOFTWARE-DEFINED WIDE AREA NETWORK OVERLAY

Hewlett Packard Enterpris...

1. A method comprising:receiving, by a controller in a software-defined wide area network (SD-WAN) overlay comprising a plurality of network nodes, respective routing and link information from a respective routing agent present on each network node of the plurality of network nodes;
generating, by the controller, a prefix tree based on the respective routing and link information received from the respective routing agent, wherein the prefix tree stores prefixes along with respective prefix information;
determining, by the controller, for each prefix in the prefix tree, a respective routing decision for each network node in the plurality of network nodes; and
distributing, by the controller, the respective routing decision to each network node in the plurality of network nodes in the SD-WAN overlay.

US Pat. No. 10,715,426

PROCESSING RULE MODIFICATION METHOD, APPARATUS AND DEVICE

Huawei Technologies Co., ...

1. A method for modifying a processing rule, comprising:receiving, by a forwarder, rule modification information from a controller, wherein the rule modification information includes a rule identifier and modification information of an action instruction;
identifying, by the forwarder, a first processing rule by the rule identifier, wherein the first processing rule comprises a first instruction set, and the first instruction set comprises a plurality of action instructions to be performed on a data packet; and
modifying, by the forwarder, a first action instruction of the first instruction set of the first processing rule according to the modification information of the action instruction.

US Pat. No. 10,715,425

INTELLIGENT ROUTING OF NETWORK PACKETS ON TELECOMMUNICATION DEVICES

T-Mobile USA, Inc., Bell...

1. A telecommunication device comprising:a processor;
one or more wireless communication transceivers configured to communicate with networks; and
a packet routing module configured to be operated by the processor to receive a first network packet from a first application of the telecommunication device and a second network packet from a second application of the telecommunication device, the packet routing module including:
a network selection module configured to:
determine network latencies associated with the networks based on the first network packet;
select one of the networks based at least in part on user routing criteria and the network latencies; associated with the networks based on the first network packet;
determine that the second network packet is scheduled to be transmitted within a predetermined amount of time as the first network packet;
refrain from determining network latencies associated with the networks based on the second network packet in response to determining that the second network packet is scheduled to be transmitted within the predetermined amount of time as the first network packet; and
a transmission module to route the first network packet or the second network packet for transmission to the one of the networks.

US Pat. No. 10,715,424

NETWORK TRAFFIC MANAGEMENT WITH QUEUES AFFINITIZED TO ONE OR MORE CORES

Microsoft Technology Lice...

1. A method for network traffic management in a computing device having a network interface controller operatively coupled to a main processor with multiple cores, the method comprising:receiving, at the network interface controller, a packet having a header and a payload;
assigning, at the network interface controller, the received packet to a virtual port of the network interface controller based on a destination medium access control (“MAC”) address contained in the header of the packet, wherein the virtual port includes multiple queues each affinitized with one of the cores in the main processor;
upon assigning the packet to the virtual port, further assigning, at the network interface controller, the packet to one of the queues in the virtual port based on one or more of a source IP address, a destination IP address, a source port, or a destination port included in the header of the packet; and
causing the core with which the queue is affinitized to execute network processing operations to forward the packet in the queue to a destination identified by the MAC address, the source IP address, the destination IP address, the source port, and the destination port included in the header of the packet.

US Pat. No. 10,715,423

METHOD OF TRANSMITTING DATA BASED ON PRIORITIES IN NETWORK

Hyundai Motor Company, S...

1. An operation method of a switch apparatus in an Ethernet-based vehicle network, the operation method comprising:receiving a first frame including original data from an end node;
generating a second frame including the original data;
duplicating the original data to generate duplicated data;
generating a third frame including the duplicated data;
transmitting the second frame through a main path; and
transmitting the third frame through a redundancy path,
wherein a drop eligible indicator (DEI) field included in a medium access control (MAC) header of the second frame is set to a first value which indicates that the second frame includes original data, and a DEI field included in a MAC header of the third frame is set to a second value which indicates that the third frame includes duplicated data.

US Pat. No. 10,715,422

PROACTIVE REFORM OF DIRECTED ACYCLIC GRAPH BY ACCELERATING PARENT ADVERTISEMENTS

CISCO TECHNOLOGY, INC., ...

1. A method comprising:detecting, by a parent network device operating according to a first Trickle operation relative to a first selected minimum contention interval in a data network having a tree-based topology, a loss of one or more attached child network devices in the data network based on one or more of receiving one or more outage notification messages, or detecting an absence of one or more expected data packets;
starting, by the parent network device, a second Trickle operation relative to a second selected minimum contention interval in response to detecting the loss, wherein the second selected minimum contention interval is one of equal to the first selected minimum contention interval or greater than the first selected minimum contention interval, the first Trickle operation and the second Trickle operation each requiring the parent network device to wait at least a first half of the corresponding selected minimum contention interval before attempting transmission of an advertisement message at a randomized position within a second half of the corresponding selected minimum contention interval, the second Trickle operation including maintaining the second selected minimum contention interval for subsequent iterations of the second Trickle operation; and
initiating, by the parent network device in response to receiving a message from one of the lost child network devices that indicates the one lost child network device has recovered its attachment to the parent network device as a recovered child device, an accelerated transmission rate of the advertisement message that is faster than the first and second Trickle operations, and resuming the first Trickle operation upon recovery of all the lost child network devices;
wherein the initiating the accelerated transmission rate includes starting a third operation relative to a third selected minimum contention interval having a duration of one half or less of the first selected minimum contention interval.

US Pat. No. 10,715,421

ROUTING RULE OBTAINING METHOD, DEVICE, AND SYSTEM

Huawei Technologies Co., ...

1. A routing rule obtaining method, applied to a Mobile Edge Computing (MEC) system, wherein the MEC system comprises a data bus controller and a data bus, wherein the data bus comprises a classifier and a service forwarder, and the method comprises:obtaining service information of at least one service in the MEC system by the data bus controller, wherein service information of each service comprises a service type and a service identity;
generating a routing rule according to the service information of the at least one service by the data bus controller, wherein the routing rule is used to indicate at least one path through which a data packet can pass, and wherein the routing rule comprises a path identifier list and path information about at least one path, the path identifier list comprises a correspondence between at least one filter and a path identifier, and the path information comprises a path identifier and a service identity of at least one service corresponding to the path identifier; and
sending the routing rule to the data bus, by the data bus controller, wherein the sending the routing rule to the data bus by the data bus controller comprises:
sending the at least one filter and the path identifier to the classifier; and
sending the path identifier list and the path information about the at least one path to the servicer forwarder by the data bus controller,
wherein the routing rule is received by the data bus and is used by the data bus to forward, according to the routing rule, a received data packet to a service corresponding to the data packet, wherein the receiving the routing rule by the data and forwarding a received data packet according to the routing rule comprises:
receiving the at least one filter and the path identifier list from the data bus controller by the classifier;
determining a first path identifier of the received data packet according to the at least one filter and the path identifier list by the classifier;
determining a first path identifier of the received data packet according to the at least one filter and the path identifier list by the classifier, adding the first path identifier to the data packet, and sending the data packet to which the first path identifier is added to the service forwarder;
receiving the data packet to which the first path identifier is added and that is sent by the classifier by the service forwarder; and
forwarding, by the service forwarder to the corresponding service according to the path identifier list, the path information about the at least one path, and the first path identifier, the received data packet sent by the at least one filter.

US Pat. No. 10,715,420

SYSTEM, METHOD AND APPARATUS FOR IMPLEMENTING FAST REROUTE (FRR)

HUAWEI TECHNOLOGIES CO., ...

1. A system for implementing a fast reroute (FRR) using a Path Computation Element Protocol (PCEP), the system comprising: a Path Computation Element (PCE) comprising a processor and a memory, and an ingress router,the Path Computation Element (PCE) being configured to:
communicate a path computation initiate (PCInitiate) message to the ingress router wherein the PCInitiate message triggers creations of a working label switched path (LSP) at the ingress router;
the ingress router being configured to:
communicate, upon receipt of the PCInitiate message, a first path computation report (PCRpt) message to the PCE, the first PCRpt message comprising first information associated with the created working LSP;wherein the PCE is configured to:receive the PCRpt message;
update the working LSP to be protected based on the information associated with the working label switched path (LSP) and the information associated with an FRR LSP; and
communicate, upon detection of a failure, a path computation update (PCUpd) message to the ingress router, the PCUpd message comprising a newly computed LSP path for the working LSP whose traffic is affected due to the failure.

US Pat. No. 10,715,419

SOFTWARE DEFINED NETWORKING BETWEEN VIRTUALIZED ENTITIES OF A DATA CENTER AND EXTERNAL ENTITIES

Juniper Networks, Inc., ...

1. A method comprising:configuring, by a software defined networking (SDN) controller, a first communication session with an autonomous system border router (ASBR) of a data center within a first autonomous system, wherein the data center includes a compute node having configured a virtual router;
configuring, by the SDN controller, a second communication session with the virtual router of the first autonomous system;
learning, by the SDN controller and from the ASBR via the first communication session, a Border Gateway Protocol Labeled Unicast (BGP-LU) label used to forward traffic from the ASBR of the first autonomous system to a gateway device of a second autonomous system; and
sending, by the SDN controller via the second communication session, the BGP-LU label to the virtual router of the first autonomous system such that the virtual router learns the BGP-LU label used to forward traffic to the gateway device of the second autonomous system.

US Pat. No. 10,715,418

OPTIMIZED SERVERLESS CLOUD PROCESSING BASED ON PROCESSING JOB REQUIREMENTS

1. A system for optimized selection of serverless cloud processing units for resource intensive processing operations, the system comprising:a processor and a computer readable medium operably coupled thereto, the computer readable medium comprising a plurality of instructions stored in association therewith that are accessible to, and executable by, the processor, to perform optimized selection operations which comprise:
receiving a processing operation for a data input that requires processing in a serverless computing environment, wherein the processing operation comprises at least one data specification associated with the data input;
determining at least one constraint requirement imposed on performing the processing operation for the data input in the serverless computing environment, wherein all of the at least one constraint requirement are required to be fulfilled for successful completion of the processing operation for the data input;
accessing a routing table associated with the serverless computing environment, wherein the routing table comprises a mapping of a plurality of serverless processing units to first values for the at least one data specification with successful fulfillment of second values for the at least one constraint requirement;
determining one of the plurality of serverless processing units from the routing table based on fulfilling all of the at least one constraint requirement for the at least one data specification; and
assigning the processing operation to the one of the plurality of serverless processing units.

US Pat. No. 10,715,417

METHOD FOR CONFIGURING STREAM COMMUNICATION PATH IN NETWORK

Hyundai Motor Company, S...

1. A method for configuring a communication path, wherein the method is performed in a first communication node in a vehicle network, the method comprising:receiving a first frame requesting to configure one communication path through which a stream is transmitted;
receiving a second frame requesting to configure another communication path through which the stream is transmitted;
comparing a hop count of the first frame with a hop count of the second frame, when a stream identifier of the second frame is identical to a stream identifier of the first frame;
comparing an accumulated latency of the first frame with an accumulated latency of the second frame, when the hop count of the first frame is identical to the hop count of the second frame;
determining a frame by comparing a port number of a port through which the first frame is received with a port number of a port through which the second frame is received, when the accumulated latency of the first frame is identical to the accumulated latency of the second frame;
configuring a table of the first communication node based on information included in the determined frame having a lower port number between the first frame and the second frame, when the hop count of the first frame is not identical to the hop count of the second frame; and
transmitting the determined frame,
wherein, when the stream identifier of the first frame is identical to the stream identifier of the second frame, a talker and a listener of the first frame are identical to a talker and a listener of the second frame, respectively.

US Pat. No. 10,715,415

REMOTELY AND DYNAMICALLY INJECTING ROUTES INTO AN IP NETWORK

T-Mobile USA, Inc., Bell...

1. A method performed within an Internet Protocol (IP) network, the method comprising:receiving a request at a route injection server to inject a specified IP route to one or more nodes of the IP network;
transmitting, from the route injection server to the one or more nodes of the IP network, an UPDATE message that includes information identifying the specified IP route;
wherein, in response to the UPDATE message, each node of the one or more nodes that meets a specified route injection criteria defined by an entity that transmitted the request to the route injection server:
installs the specified IP route in a routing table associated with the node; and
advertises the installed IP route to other nodes of the IP network;
receiving, at the route injection server, an indication of the advertised IP route from at least one of the one or more nodes that installed the specified IP route in an associated routing table; and
in response to receiving the indication of the advertised IP route, transmitting a notification from the route injection server to the entity that transmitted the request to the route injection server.

US Pat. No. 10,715,414

NETWORK COMMUNICATION METHODS AND APPARATUS

Ribbon Communications Ope...

1. A method of controlling communications in a network, the method comprising:storing data transfer topology information indicating at least physical topology among data transfer devices;
identifying data transfer device characteristics of the data transfer devices in the network, said data transfer device characteristics including information about which of the data transfer devices can interoperate, along with their data transfer device data rates, and latency;
storing application metadata extracted from a plurality of application components;
identifying a list of problem paths in the network based on the application metadata;
generating, in response to a request for connectivity from a first application component, a plurality of potential data transfer paths to be used for communicating data corresponding to the first application component based on the data transfer topology information, the data transfer device characteristics of the data transfer devices, and the identified list of problem paths;
making a selection based on one or more simulations as to which of the plurality of potential data transfer paths to use for communicating data corresponding to the first application component;
using the selected data transfer path to communicate data corresponding to the first application component; and
wherein at least some of the data transfer devices correspond to different technologies used in a mixed technology network.

US Pat. No. 10,715,413

TIMESTAMP-BASED SESSION ASSOCIATION

Parrable Inc., New York,...

1. A method for associating sessions based on timestamp data, the method comprising:retrieving a collection of data packets received during one or more sessions within a time period, each packet in the collection of data packets associated with a unique identifier of a respective session;
determining a skew for packets of a session selected from the sessions within the time period, the determined skew based on a rate difference between a respective receiving device clock and a respective sending device clock of at least two data packets associated with the unique identifier of the selected session, wherein the selected session is associated with a client device;
calculating an uptime for each of the retrieved data packets, wherein the calculated uptime is indicative of a last time that a respective timestamp of a respective one of the data packets was reset, the respective timestamp for each data packet including a timestamp from the client device and a timestamp from a server, the uptime calculated by multiplying the determined skew to the client device timestamp and subtracting the product from the server timestamp;
identifying whether each of the calculated uptimes matches a previously calculated uptime for a packet associated with a previously selected session; and
updating a list of sessions associated with the client device based on one or more identified matches between the respective calculated uptime and the previously calculated uptime.

US Pat. No. 10,715,411

ALTERING NETWORKING SWITCH PRIORITY RESPONSIVE TO COMPUTE NODE FITNESS

LENOVO ENTERPRISE SOLUTIO...

1. A computer program product comprising a non-volatile computer readable medium and non-transitory program instructions embodied therein, the program instructions being configured to be executable by a processor to cause a first networking switch to perform operations comprising:identifying a priority of the first networking switch and a priority of at least one additional networking switch that is in a cluster with the first networking switch;
determining whether the first networking switch is currently able to establish bi-directional communication with a local compute node through a direct local link;
reducing the priority of the first networking switch in response to determining that that the first networking switch is currently unable to establish the bi-directional communication with the local compute node through the direct local link; and
determining whether the reduced priority of the first networking switch is greater than a priority of each of the at least one additional networking switch in the cluster;
operating the first networking switch as a master networking switch in the cluster in response to determining that the reduced priority of the first networking switch is greater than the priority of each of the at least one networking switch; and
operating the first networking switch as a standby networking switch in response to determining that the reduced priority of the first networking switch is less than the priority of any of the at least one networking switch.

US Pat. No. 10,715,410

CONNECTIVITY VERIFICATION TESTING AND TOPOLOGY DISCOVERY

Google LLC, Mountain Vie...

1. A system for performing connectivity verification testing and topology discovery in a reconfigurable optical add/drop multiplexer (ROADM) comprising:a first ROADM block of a plurality of ROADM blocks, wherein each ROADM block is a ROADM degree or an add/drop block, the first ROADM block including:
a first plurality of internal ports including at least a first internal port, a second internal port, and a third internal port, each connected to another ROADM block via respective optical fibers;
a test signal transmitter configured to inject a first outgoing test signal having a first signature into the first internal port and a second outgoing test signal having a second signature different from the first signature into the second internal port, wherein the first outgoing test signal and second outgoing test signal are out-of-band of optical data signals traversing the ROADM; and
a test signal monitor configured to monitor for incoming test signals at each of the plurality of internal ports, wherein the test signal monitor is configured to:
validate, based on a signature of an incoming test signal received at the third internal port of the first ROADM block, that a first connection exists between the third internal port of the first ROADM block and a first internal port of a second plurality of internal ports of a second ROADM block.

US Pat. No. 10,715,409

HEURISTICS FOR END TO END DIGITAL COMMUNICATION PERFORMANCE MEASUREMENT

Microsoft Technology Lice...

1. An apparatus for measuring performance of a network connection, the apparatus comprising:hardware processing circuitry;
hardware memory storing instructions that when executed configure the hardware processing circuitry to perform operations comprising:
receiving a performance indication for a first portion of a network path of a network connection, the first portion between a first node and a second node in the network path;
receiving an indication of a geographic location of a third node in the network path, the indication included in a message from the second node, a path between the second node and the third node comprising a second portion of the network path, the second portion not including the first portion;
determining an adjustment to the network path of the network connection is necessary based on the performance indication; and
inhibiting the determined adjustment of the network path of the network connection based on the indicated geographic location.

US Pat. No. 10,715,408

METHODS AND APPARATUS FOR CAPTURING AND/OR USING PACKETS TO FACILITATE FAULT DETECTION

Mist Systems, Inc., Cupe...

1. A method of capturing and providing information relating to communications, the method comprising:receiving, by a first access point having multiple different interfaces, an instruction to capture packets for an identified communications device on the multiple different interfaces; and
in accordance with the received instruction, forwarding, by the first access point, captured packets corresponding to the identified communications device to a network monitoring node,
wherein the identified communications device is a multimode communications device and wherein a communications failure when using a first interface of the first access point causes said identified communications device to switch communication with the first access point to a second interface of the first access point.

US Pat. No. 10,715,406

FLOW SAMPLE

Hewlett Packard Enterpris...

1. A method, comprising:transmitting a flow rule to a network device, the flow rule including a sampling rule indicating that sampling is enabled for flows matching the flow rule and including sampling criteria indicating how packets matching the flow rule should be sampled;
obtaining, from the network device, a packet sample of a packet matching the flow rule, the packet sample complying with the sampling rule;
using the packet sample to identify the packet;
identifying a network behavior for the packet, comprising identifying a network path of the packet; and
comparing the network behavior to an expected network behavior to detect a network anomaly, comprising comparing the network path to an expected network path.

US Pat. No. 10,715,405

TENANT ISOLATED DATA IN SHARED REUSABLE SERVICES

SAP SE, Walldorf (DE)

1. A computer-implemented method, comprising:receiving, at one or more computers, a Tenant request to subscribe to a first Application;
determining, by the one or more computers, a first Service that the first Application consumes;
determining, by the one or more computers, that a Tenant is new to the first Service and in response:
creating, by the one or more computers, a persistency for the Tenant with respect to the first Service,
providing, by the one or more computers, a subscription of the Tenant to the first Service,
associating, by the one or more computers, the subscription to the persistency, and
adding, by the one or more computers, the first Application to the subscription of the Tenant to the first Service;
identifying, by the one or more computers, an already-existing subscription of the Tenant to the first Service; and,
providing, by the one or more computers, a second Application to be added to the already-existing subscription of the Tenant to the first Service;
wherein the already-existing subscription is associated with a reference counter counting number of Applications that consume the first Service and are subscribed by the Tenant;
wherein the number on the reference counter is determined by a number of Service OPEN AUTHORIZATION (OAUTH) Clients provided for each Tenant request received from the Tenant to get a respective Application subscription.

US Pat. No. 10,715,404

SLICE CHANGING METHOD AND SLICE CHANGING DEVICE

NTT DOCOMO, INC., Tokyo ...

1. A slice changing method in a communication system that changes a slice, which is a virtual network generated on a network infrastructure, the method comprising:identifying, from a slice allocation table, a condition for changing a first slice to a connection destination;
determining whether the condition for changing the first slice to the connection destination is satisfied;
in a case where the condition for changing the first slice is satisfied, acquiring address information of the connection destination of a target slice, the connection destination being a location of the target slice after change;
notifying a communication device that connects a terminal using the first slice and the connection destination of the target slice of the address information of the connection destination; and
releasing a resource relating to the first slice before changing the first slice to the connection destination and after notifying the communication device,
wherein a service used by the terminal is allocated to the target slice after changing the first slice to the connection destination.

US Pat. No. 10,715,403

SCALABLE, STANDARDIZED I.T. DEPLOYMENT PLATFORM

Nerdio, Inc., Skokie, IL...

1. A system that automatically scales the size of a virtual machine in a cloud-based IT environment comprising:a virtual machine having a plurality of incrementally scalable sizes of which one size is implemented at a time, wherein each size is defined by comprising a number of virtual CPU cores and a first amount of RAM;
a server including a controller controlling the size of the virtual machine;
a memory coupled to the controller, wherein the memory is configured to store program instructions executable by the controller;
wherein, in response to executing the program instructions, the controller is configured to:
receive a baseline implemented size of the virtual machine supporting a first number of user sessions including a first number of virtual CPU cores and a first amount of RAM;
receive a request to resize the virtual machine to a new implemented size supporting a new number of user sessions;
in response to the request to resize the virtual machine, and without user intervention, using a user sessions to core ratio, wherein the user sessions to core ratio is defined as the number of user sessions that can be supported per virtual CPU core, calculate a minimum number of virtual CPU cores needed to support the new implemented size by multiplying the user sessions to core ratio by the new number of user sessions;
in response to the request to resize the virtual machine, and without user intervention, using a RAM to core ratio, wherein the RAM to core ratio is defined as the amount of RAM that is needed per virtual CPU core, calculate an amount of RAM needed for the new implemented size by multiplying the RAM to core ratio by the number of virtual CPU cores needed to support the new number of user sessions;
in response to the calculation of virtual CPU cores and the calculation of RAM, and without user intervention, identify one of the plurality of incrementally scalable sizes for the virtual machine that comprises at least the minimum number of virtual CPU cores needed to support the new number of user sessions and at least the amount of RAM needed for the new size;
in response to identifying the one of the plurality of incrementally scalable sizes for the virtual machine, and without user intervention, resize the virtual machine to the identified one of the plurality of incrementally scalable sizes for the virtual machine.

US Pat. No. 10,715,401

USER INTERFACE FOR VIEWING ITEMS IN A SYNCHRONIZATION SYSTEM

DROPBOX, INC., San Franc...

1. A method, comprising:providing, for presentation on a client device, a graphical user interface comprising a listing of items associated with a user account of a synchronization system;
providing, within the graphical user interface, a selectable graphical element associated with an item from the listing of items;
based on detecting a user selection of the selectable graphical element associated with the item, synchronizing the item between the synchronization system and the client device by storing a synchronized copy of the item on the client device;
in response to synchronizing the item, providing a first visual indication for display within the graphical user interface that indicates the item is synchronized between the synchronization system and the client device; and
providing a second visual indication for display within the graphical user interface that indicates an additional item from the listing of items is not synchronized between the synchronization system and the client device.

US Pat. No. 10,715,400

SYSTEM AND METHODS UTILIZING DATASET MANAGEMENT USER INTERFACE

Spherica Systems Limited,...

1. A dataset management system comprising:at least one monitorable device positioned at each of a plurality of different locations;
a server remote to the said plurality of different locations which is communicatively coupled with each monitorable device, the server being configured to receive a dataset from each of the said plurality of different locations, each dataset comprising a multiple data value set having data values monitored by the at least one monitorable device;
a user device remote to the said plurality of different locations which is communicatively coupled with the server, the user device being adapted to display a user interface based on the dataset,
the user interface comprising:
a primary interface element having a plurality of matrix positions mapped to a surface of a sphere, the plurality of matrix positions being equally spaced about the surface of the primary interface element; and
a selection pane configured to select one monitorable device type of a plurality of different types of monitorable device,
each of the plurality of matrix positions being associated with one of the said plurality of different locations,
the user interface having interactive object icons which are representative of monitorable devices positioned at the respective matrix position, said monitorable devices correspond to the one selected type of monitorable device as defined in the selection pane, wherein a scale of each of the interactive object icons is indicative of a number of triggered alarm events being monitored for one monitorable device of said monitorable devices and further modified based on historical data;
a processor configured to retrieve and display, in response to receiving a user input on one interactive object icon, the data value being monitored of the at least one monitorable device of the location associated with the interactive object icon;
the user device, via the user interface, allowing a user to, based on the selected type of monitorable device in the selection pane, selectably remotely control a said monitorable device at the location so that the monitorable device performs a physical function at the location.

US Pat. No. 10,715,399

GENERATING SUGGESTIONS FOR SCENES AND TRIGGERS

Apple Inc., Cupertino, C...

1. A method comprising:presenting, by at least one computing device, a first user interface configured to enable management of a plurality of accessories;
receiving, by the at least one computing device, a selection of a user interface element of the first user interface, the selection indicating a request to add a scene;
receiving, by the at least one computing device, event data from the plurality of accessories indicating state changes occurring at the plurality of accessories;
based at least in part on the event data, identifying, by the at least one computing device, a pattern of accessory state changes for a group of accessories of the plurality of accessories that are temporally related;
generating, by the at least one computing device, a scene suggestion for the scene based at least in part on the pattern of accessory state changes, where the scene includes the group of accessories and accessory states determined based at least in part on the pattern of accessory state changes and where invocation of the scene causes each accessory in the group of accessories to transition to the determined accessory states;
presenting, by the at least one computing device, the scene suggestion in a second user interface; and
upon selection of the scene suggestion, presenting, by the at least one computing device, the scene corresponding to the scene suggestion in a third user interface.

US Pat. No. 10,715,398

CONTROLLING A USER TERMINAL TO PROVIDE CONTENT ITEMS SELECTED BY A USER

SONY CORPORATION, Tokyo ...

1. A control apparatus, comprising:a processor configured to:
generate first connection relationship information that indicates connection relationships between a plurality of providing apparatuses and a plurality of input terminals of each of a plurality of output apparatuses;
receive a plurality of content lists from the plurality of providing apparatuses,
wherein each of the plurality of content lists includes a plurality of content items,
wherein the plurality of output apparatuses is connected to a network, and
wherein the plurality of output apparatuses outputs the plurality of content items corresponding to each of the plurality of content lists;
generate an integrated content list based on integration of the plurality of content lists received from the plurality of providing apparatuses;
control a display screen to display the integrated content list, wherein the displayed integrated content list includes the plurality of content items of each of the plurality of content lists;
control the display screen to further display a first list of the plurality of output apparatuses;
receive a first user selection to select an output apparatus from the displayed first list of the plurality of output apparatuses;
control the display screen to further display a second list of the plurality of providing apparatuses;
receive a second user selection to select a providing apparatus from the displayed second list of the plurality of providing apparatuses;
control the display screen to further display a third list of the plurality of input terminals of the selected output apparatus;
receive a third user selection to select a first input terminal from the displayed third list of the plurality of input terminals of the selected output apparatus;
determine the selected providing apparatus has a connection with a second input terminal of the plurality of input terminals of the selected output apparatus, wherein the determination is based on the first connection relationship information and the third user selection of the first input terminal;
delete second connection relationship information from the first connection relationship information, wherein the second connection relationship information indicates the selected providing apparatus is connected to the second input terminal;
generate third connection relationship information corresponding to the selected providing apparatus, wherein the third connection relationship information indicates the selected providing apparatus is connected to the first input terminal of the plurality of input terminals of the selected output apparatus;
receive a fourth user selection to select a content item from the displayed integrated content list;
control the selected providing apparatus, as a first control target, to provide the selected content item, wherein the selected providing apparatus is controlled based on the fourth user selection of the content item from the displayed integrated content list;
control the selected output apparatus as a second control target based on the third connection relationship information; and
transmit a power-on request through the network to turn on the selected output apparatus to reproduce the selected content item, wherein the transmission of the power-on request is based on the fourth user selection of the content item.

US Pat. No. 10,715,397

CENTRALITY MEASURE RANKING FOR A MULTIPLEX NETWORK

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:obtaining a representation of a multiplex network, the representation comprising a plurality of layers and a plurality of nodes representing communicating entities of the multiplex network, wherein each layer of the plurality of layers comprises a respective node for each communicating entity of the plurality of communicating entities and a respective set of edges, of a plurality of edges, connecting pairs of nodes of the layer;
determining, for each node of the plurality of nodes, a respective node centrality measure, the node centrality measure for a given node of the plurality of nodes being determined based on an inter-layer centrality measure for the given node and an intra-layer centrality measure for the given node;
determining, for each communicating entity of the communicating entities, a respective entity centrality measure, the entity centrality measure for a communicating entity of the communicating entities being determined as a function of node centrality measures for nodes, of the plurality of nodes, representing that communicating entity across the plurality of layers of the multiplex network; and
ranking the communicating entities by their entity centrality measures.

US Pat. No. 10,715,396

SUPPORT APPARATUS, NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM AND SETTING METHOD

OMRON Corporation, Kyoto...

1. A support apparatus capable of communicating with a control apparatus network-connected to one or a plurality of safety devices, wherein each safety device has a memory part for keeping device identification information that specifies a device itself, and the support apparatus comprises:an obtaining part, which refers, in each network, to a connection setting list that defines a network address of a safety device belonging to the network, and obtains status information respectively from the one or a plurality of safety devices network-connected with the control apparatus;
a selecting part, which selects, based on the status information of each safety device, a safety device to which the device identification information is to be newly set among the one or a plurality of safety devices to which the status information is obtained; and
a setting part, which determines and sets corresponding device identification information for each of the selected safety devices in accordance with an instruction from a user based on network identification information set for the network to which each safety device belongs and a network address of each safety device.

US Pat. No. 10,715,395

METHODS AND APPARATUS FOR COMMUNICATION NETWORK

Massachusetts Institute o...

1. A method comprising performing a reinforcement learning algorithm on a network wherein:(a) the network includes multiple nodes, each node being a reinforcement learning agent;
(b) each agent has its own parameter set; and
(c) in each specific iteration in a set of iterations of the reinforcement learning algorithm, each specific agent in the network performs an update of the specific agent's parameter set in such a way that
(i) the update is based on information regarding only a subset of the nodes in the network, which subset consists of less than 15% of the nodes in the network, and
(ii) the update is performed separately from that for any other node in the network.

US Pat. No. 10,715,394

DATA AGGREGATION BASED ON A HEIRARCHICAL TREE

1. A computer-implemented method, comprising:generating, at each delegate device and each non-delegate device of a logical device hierarchy, a data cube, wherein the logical device hierarchy comprises more than one level, wherein each level comprises one or more groups, and wherein each group comprises one delegate device and one or more non-delegate devices;
receiving, at each delegate device, data cubes from the one or more non-delegate devices associated with the same group;
receiving, at each delegate device, data cubes from delegate devices of a different group, and wherein that delegate device is the parent of the delegate devices associated with a different group;
aggregating, at each delegate device, the received data cubes into a weighted data cube; and
sending, from each delegate device, the weighted data cube to the parent of the delegate device.

US Pat. No. 10,715,393

CAPACITY MANAGEMENT OF COMPUTING RESOURCES BASED ON TIME SERIES ANALYSIS

1. A computer-implemented method for performing capacity management of a computer network, the method comprising:receiving, from one or more devices, data representing communications in a computer network associated with the one or more devices;
determining a time series representing network utilization data based on the received data, the time series comprising a sequence of data values, each data value associated with a timestamp value and representing network utilization associated with a time represented by the timestamp value;
accessing a prediction model configured to receive an input timestamp value and predict a data value of the time series corresponding to the input timestamp value, the predicted data value representing network utilization data associated with a input timestamp;
predicting a plurality of data values of the time series using the prediction model;
for each of the plurality of predicted data values, determining an error residue value representing a measure of difference between the predicted data value and a data value of the time series;
determining a change-point based on the error residue values, the change point representing a change in an aggregate measure of level of the error residue; and
performing a corrective action for the computer network based on the change-point.

US Pat. No. 10,715,392

ADAPTIVE SCALABLE NUMEROLOGY FOR HIGH SPEED TRAIN SCENARIOS

QUALCOMM Incorporated, S...

1. A method of resource adaptation for wireless communications, comprising:transmitting, in a first time period using a first portion of bandwidth that transmits with a first numerology including a first subcarrier spacing and a first cyclic prefix ratio, a first transmission for a user equipment (UE);
scheduling, via a downlink control information, a second transmission for the UE in a subsequent time period using a second portion of bandwidth that transmits with a second numerology including a second subcarrier spacing and a second cyclic prefix ratio, wherein at least one of the second subcarrier spacing is different than the first subcarrier spacing or the second cyclic prefix ratio is different than the first cyclic prefix ratio, wherein the downlink control information indicates which portion of bandwidth the UE should receive; and
transmitting the second transmission during the subsequent time period, wherein the second transmission is a retransmission of the first transmission, wherein the second subcarrier spacing is greater than the first subcarrier spacing or the second cyclic prefix ratio is greater than the first cyclic prefix ratio, or both.

US Pat. No. 10,715,391

CLOUD ZONE NETWORK ANALYTICS PLATFORM

1. A method comprising:obtaining, by a processing system including at least one processor, first network analytics data from a plurality of zones of a telecommunication network;
generating, by the processing system, a set of policies from the first network analytics data via an apriori algorithm, wherein each policy in the set of policies comprises a pattern matching rule;
deploying, by the processing system, policies of the set of policies to a plurality of edge devices in respective zones of the plurality of zones of the telecommunication network;
receiving, by the processing system from at least one of the plurality of edge devices in one of the plurality of zones, a first alert of a first policy trigger of a first policy of the set of policies; and
transmitting, by the processing system, a notification to a software defined network controller of the first policy trigger.

US Pat. No. 10,715,390

SERVICE OPTIMIZATION METHOD, TRANSPORT CONTROLLER, CLIENT CONTROLLER, AND SYSTEM

Huawei Technologies Co., ...

1. A service optimization method, comprising:receiving, by a transport controller (TC), an optimization request from a client controller (CC), wherein the optimization request carries identification information of a service and information about a route that the service needs to pass through;
sending, by the TC, a response message to the CC when determining that an idle resource in a resource pool can meet an optimization requirement of the CC, wherein the response message carries the identification information of the service and a first optimization policy that meets the optimization requirement of the CC;
receiving, by the TC, an optimization instruction of the CC, wherein the optimization instruction carries the identification information of the service and a corresponding optimization policy that meets the optimization requirement of the CC; and
optimizing, by the TC according to the optimization policy in the optimization instruction, the service identified in the optimization instruction without service interruption,
wherein the first optimization policy that meets the optimization requirement of the CC is configured to indicate establishment-before-disconnection.

US Pat. No. 10,715,389

AUTOMATIC CONTROLLER CONFIGURATION SYSTEM

Dell Products L.P., Roun...

1. An automatic controller configuration system, comprising:a chassis;
a port that is located on the chassis;
a transceiver that is connected to the port and that is configured to utilize a number of lanes; and
a controller that is located in the chassis and that is coupled to the port, wherein the controller is configured to:
identify the number of lanes that the transceiver is configured to utilize;
configure a controller mode of the controller to cause the controller to operate at a first controller speed utilizing the number of lanes;
reconfigure, in response to detecting a signal transmitted by the transceiver and determining that a link provided via the transceiver has not been established with the controller operating at the first controller speed utilizing the number of lanes, the controller mode to cause the controller to operate at a second controller speed utilizing the number of lanes; and
provide, in response to detecting the signal transmitted by the transceiver and determining that the link provided via the transceiver has been established with the controller operating at the second controller speed utilizing the number of lanes, communications with at least one device via the transceiver and at the second controller speed utilizing the number of lanes.

US Pat. No. 10,715,387

SYSTEM FOR DYNAMIC PROVISIONING OF HOST DEVICES

AMAZON TECHNOLOGIES, INC....

1. A system comprising:one or more memories storing computer-executable instructions; and
one or more hardware processors to execute the computer-executable instructions to:
determine a first quantity of data received by a fleet of host devices during a time period;
determine a first quantity of computing resources used by the fleet of host devices to process the first quantity of data, wherein the first quantity of computing resources is indicative of a first quantity of processor utilization of individual host devices of the fleet of host devices;
determine a first count of host devices of the fleet of host devices used to process the first quantity of data during the time period;
generate host data indicative of a first relationship between the first quantity of data, the first count of host devices, and the first quantity of computing resources;
determine, based on the host data, a second quantity of data processed by an individual host device using the first quantity of processor utilization;
receive user input indicating a second quantity of processor utilization for the individual host device;
access, at a first time, traffic data indicative of a predicted count of requests to be received by the fleet of host devices at a second time subsequent to the first time;
determine, based on the traffic data, a third quantity of data associated with the predicted count of requests;
determine, based on the first relationship indicated by the host data, a predicted count of host devices for processing the third quantity of data using a second quantity of resources that is less than or equal to the second quantity of processor utilization for the individual host device received via the user input;
determine a difference between the predicted count of host devices and a current count of host devices; and
based on the difference between the predicted count and the current count, provision one or more host devices to process traffic received by the fleet of host devices.

US Pat. No. 10,715,386

METHOD AND APPARATUS FOR REGULATING COMMUNICATION PARAMETERS

GUANGDONG OPPO MOBILE TEL...

1. A method for regulating communication parameters, comprising:establishing, by first equipment, a communication with second equipment according to preset configurations of the communication parameters;
regulating, by the first equipment, the configurations of one or more of the communication parameters according to a network state and/or service state in a communication process; and
sending, by the first equipment, communication parameter regulation indication information to the second equipment, the communication parameter regulation indication information indicating a result of regulation performed by the first equipment on the configurations of the one or more of the communication parameters;
wherein the communication parameters are multiple access manners for communication and/or basic physical layer parameters corresponding to the multiple access manners, and the communication parameters comprise one of a Cyclic Prefix length, a subcarrier spacing, an Orthogonal Frequency Division Multiplexing symbol length, and a reference signal density and image;
wherein the second equipment is a terminal equipment;
the method further comprises: determining, by the first equipment, the preset configurations of the communication parameters according to communication capabilities of the first equipment and the second equipment; and
sending, by the first equipment, the preset configurations of the communication parameters to the second equipment.

US Pat. No. 10,715,385

SYSTEM AND METHOD FOR LIVE MIGRATION FOR SOFTWARE AGENTS

International Business Ma...

1. A computer-implemented method for switching between software agents comprising:identifying, via a computing device, a first software agent communicatively coupled to a host device and at least one server;
transforming a configuration file associated with the first software agent for operation with a second software agent; and
switching from the first software agent to the second software agent in response to transforming the configuration file associated with the first software agent.

US Pat. No. 10,715,384

AUTOMATICALLY MODIFYING COMPUTER PARAMETERS AS AN INCENTIVE FOR COMPLYING WITH DATA POLICIES

INTUIT INC., Mountain Vi...

1. A method for automatically modifying computer parameters as an incentive for complying with data policies, the method comprising:receiving, at a computing system, a data policy definition that includes two or more types of usage metrics and a desired vector corresponding to each of the two or more types of usage metrics;
receiving, for first data provided by a first client, a first usage metric corresponding to a first type of usage metric included in the data policy definition and a second usage metric corresponding to a second type of usage metric included in the data policy definition,
wherein the first usage metric comprises a total usage of the first data by a plurality of clients other than the first client, and the second usage metric comprises either a timeliness of the first data or a measurement of a hygiene of the first data;
receiving, for second data provided by a second client, a third usage metric corresponding to the first type of usage metric and a fourth usage metric corresponding to the second type of usage metric,
wherein the third usage metric comprises a total usage of the second data by a plurality of clients other than the second client, and the fourth usage metric comprises either a timeliness of the second data or a measurement of a hygiene of the second data;
determining a first score for the first client by comparing the first usage metric to the desired vector corresponding to the first type of usage metric and comparing the second usage metric to the desired vector corresponding to the second type of usage metric;
determining a second score for the second client by comparing the third usage metric to the desired vector corresponding to the first type of usage metric and comparing the fourth usage metric to the desired vector corresponding to the second type of usage metric;
comparing the second score to the first score; and
automatically modifying an amount of bandwidth associated with the first client based on a result of comparing the second score to the first score.

US Pat. No. 10,715,383

CONSISTENT HASHING FOR NETWORK TRAFFIC DISPATCHING

NICIRA, INC., Palo Alto,...

1. A method of adding a newly deployed node to a set of a plurality of previously deployed nodes that perform a same operation on received packet flows, the method comprising:during an observation period, sending received packet flows to the set of previously deployed nodes and not the newly deployed node, and setting an entry in a probabilistic filter for each received packet flow; and
during a re-dispatching period after the newly deployed node has been added to the plurality of previously deployed nodes, sending to a previously deployed node a particular packet that is a candidate packet for sending to the newly deployed node when the packet's flow matches an entry in the probabilistic filter and the packet is not part of a packet flow that started during the re-dispatch period.

US Pat. No. 10,715,382

METHOD FOR CONFIGURING SERVICE NODE, SERVICE NODE POOL REGISTRARS, AND SYSTEM

Huawei Technologies Co., ...

1. A method, comprising:receiving, by a service node pool registrar and from a management configuration device, a service node query request, wherein the service node query request comprises a service requirement for configuring a first service node of a plurality of service nodes, wherein the service requirement is from a user or is caused by a network change, and wherein the service node pool registrar, the management configuration device, and the plurality of service nodes are part of a virtualized network that supports a plurality of tenants;
forming, by the service node pool registrar, a service node database by receiving a first message from a second service node of the plurality of service nodes, wherein the first message comprises one or more of a registration message, an update message, and a deregistration message;
searching, by the service node pool registrar, the service node database to obtain first service node information that meets the service requirement, wherein the first service node information comprises an identifier of the first service node, location information for the first service node, status information of the first service node, a selection policy for the status information of the first service node, and a tenant identifier;
calculating, by the service node pool registrar, a service chain path according to the first service node information, wherein the service chain path indicates a forwarding path between the first service node and another service node of the plurality of service nodes;
sending, by the service node pool registrar to the management configuration device, the first service node information and the service chain path, causing the management configuration device to apply network and service configuration to the first service node according to the first service node information and the service chain path;
performing, by the service node pool registrar, keep-alive detection on the second service node, wherein the second service node is registered in the service node database;
monitoring, by the service node pool registrar, a status of the second service node; and
reporting and processing of a fault on the second service node.

US Pat. No. 10,715,381

INTELLIGENT ROLE SELECTION FOR DUAL-ROLE DEVICES

Microsoft Technology Lice...

1. A method performed by a software-implemented role manager executing on a first device that is communicatively connected to a second device, comprising:determining that a first role is to be assigned to the first device and a second role is to be assigned to the second device, the first role and the second role defining an operating relationship between the first device and second device;
causing the first role to be assigned to the first device and the second role to be assigned to the second device;
receiving information indicative of a change of capability or operational state of one or more of the first device and the second device;
determining that a role assignment swap is to be implemented based at least in part on the information; and
based at least on the determining that the role assignment swap is to be implemented, initiating the role assignment swap causing the first role to be assigned to the second device and causing the second role to be assigned to the first device, the initiating comprising causing a connector manager to:
assign the second role to the first device by selectively activating one of a first driver stack or a second driver stack of the first device; and
assign the first role to the second device by interacting with the second device.

US Pat. No. 10,715,380

SETTING A REMINDER THAT IS TRIGGERED BY A TARGET USER DEVICE

Apple Inc., Cupertino, C...

1. A method comprising:receiving, by a requesting device at a first location, a voice command from a user of the requesting device, the voice command including a request to deliver a notification to a target device, a location parameter identifying a second location where the notification is to be delivered to the target device, and a condition parameter indicating an action that needs to be performed before the notification is delivered to the target device;
creating a notification request on the requesting device in response to the voice command, wherein the notification request is created for transmission to a server and includes information identifying an account associated with the requesting device;
determining, by the target device or the server, whether the target device is at the second location and the action has been completed;
determining, by the server, via an account associated with the target device, whether a user-selectable permission setting on the target device indicates that permission is granted to share the location of the target device with the account associated with the requesting device; and
in accordance with each of the target device being at the second location, the action being completed, and the permission being granted, delivering, by the server, the notification to the target device.

US Pat. No. 10,715,379

SYSTEM FOR DECOMPOSING EVENTS FROM MANAGED INFRASTRUCTURES WITH BITWISE OPERATION

Moogsoft Inc., San Franc...

1. A system for clustering events, comprising:a first engine receiving message data from managed infrastructure that includes managed infrastructure physical hardware that supports the flow and processing of information, the first determining common characteristics of events and produce clusters of events relating to failure of errors in the managed infrastructure, where membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information, the at least one engine creating one or more situations that is a collection of one or more events or alerts representative of the actionable problem in the managed infrastructure, the first engine including a processor; a memory; and an input/output controller, a display, a storage device, a software system stored in the memory that directs operation of a relevant engine and an operating system;
a second engine coupled to the first engine determining one or more common steps from events and produces clusters relating to events, the second engine determining one or more common characteristics of events and producing clusters of events relating to the failure or errors in the managed infrastructure, the second engine including a processor; a memory; and an input/output controller, a display, a storage device, a software system stored in the memory that directs operation of a relevant engine and an operating system;
an operating system included with the first engine and operating to provide at least one of: a textual, and numeric values, and if they are similar relative to the analyzed monitored events, and it is determined that a collection of events share an attribute, one or more output of clusters is created, and in response to production of the clusters one or more physical changes in a managed infrastructure physical hardware is made, membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information;
an anomaly engine coupled to the first and second engines is performing bitwise operations that allows a greater amount of information to be processed in one operation; and
wherein the textual and numeric values indicate a state of a hardware component of the managed infrastructure to make a change to a managed infrastructure physical hardware component.

US Pat. No. 10,715,378

HASH-BASED SELECTION OF NETWORK PACKETS FOR PACKET FLOW SAMPLING IN NETWORK COMMUNICATION SYSTEMS

Keysight Technologies Sin...

1. A method to forward selected packets based upon packet flows within a network communication system, comprising:receiving input packets associated with packet flows within a network communication system;
generating hash values for the input packets based upon fields within the input packets, the fields identifying packet flows for the input packets;
selecting packets from the input packets based upon a comparison of the hash values to a mask, the mask determining a subset of the packet flows;
forwarding the selected packets from the subset of the packet flows for further processing; and
discarding non-selected packets.

US Pat. No. 10,715,377

DOMAIN NAME SERVICES SERVERS MANAGEMENT TO SHARE DATA EFFICIENTLY

Comcast Cable Communicati...

9. A method comprising:receiving, by a first domain name services (DNS) device of a plurality of DNS devices, information comprising a plurality of replies to queries for access to resource records;
caching, by the first DNS device, the information; and
transmitting, at a predetermined interval, from the first DNS device, and to a second DNS device of the plurality of DNS devices, at least a portion of the information, wherein the first DNS device is associated with a first load balancer device and the second DNS device is associated with a second load balancer device.

US Pat. No. 10,715,376

ENHANCED IQ MISMATCH CORRECTION FUNCTION GENERATOR

TEXAS INSTRUMENTS INCORPO...

1. An in-phase and quadrature-phase (IQ) signal receiver comprising;an IQ imbalance estimation circuit configured to estimate IQ mismatch corresponding to at least one frequency bin based on a signal received by the IQ signal receiver;
a correction function circuit coupled to the IQ imbalance estimation circuit and generate at least one IQ mismatch correction function based on the IQ mismatch estimates of the IQ imbalance estimation circuit; and
an IQ mismatch correction function circuit coupled to the correction function circuit and compensate the signal received by the IQ signal receiver for IQ mismatch based on the IQ mismatch correction function generated by the correction function circuit;
wherein, the at least one IQ mismatch correction function circuit comprises an initial IQ mismatch correction function generated based on the IQ mismatch estimates generated by the IQ imbalance estimation circuit, and an enhanced IQ mismatch correction function generated based on a difference between a value of the initial IQ mismatch correction function corresponding to the at least one frequency bin and the IQ mismatch estimates corresponding to a respective bin of the at least one frequency bin.

US Pat. No. 10,715,375

MODULATION METHOD, DECODING METHOD, MODULATION DEVICE, AND DEMODULATION DEVICE

NEC CORPORATION, Minato-...

1. A modulation method for mapping information bits to signal points on a plurality of concentric rings, the modification method comprising:when a signal space arrangement in which the number of signal points on all of the plurality of rings is the same is used as a basis, reducing the number of signal points on an innermost ring or a plurality of rings from inner to outer rings from among the plurality of rings;
generating a new ring outside the signal space arrangement used as the basis; and
arranging, on the generated ring, signal points which achieve the same frequency utilization efficiency as that of the signal space arrangement used as the basis.

US Pat. No. 10,715,373

METHOD AND DEVICE FOR TRANSMITTING/RECEIVING SYNCHRONIZATION SIGNAL IN WIRELESS CELLULAR COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A method of a base station in a wireless communication system, the method comprising:identifying a subcarrier spacing included in a subcarrier spacing set which is available to be supported by the base station, the subcarrier spacing set including a first subcarrier spacing and a second subcarrier spacing;
transmitting a synchronization signal using the identified subcarrier spacing;
transmitting a master information block (MIB) using the identified subcarrier spacing; and
transmitting a system information block (SIB) according to the MIB,
wherein the MIB includes information on a subcarrier spacing of the SIB.

US Pat. No. 10,715,372

METHOD FOR OBTAINING INFORMATION ABOUT CYCLIC PREFIX IN WIRELESS COMMUNICATION SYSTEM AND DEVICE FOR SAME

LG ELECTRONICS INC., Seo...

1. A method for obtaining information for a cyclic prefix (CP) in a wireless communication system by a terminal, the method comprising:detecting a specific synchronization signal received from a base station via a first symbol of a first subframe;
detecting the specific synchronization signal received from the base station via a second symbol of a second subframe; and
obtaining information for the CP applied to transmission of the specific synchronization signal, based on an offset value between an index of the first symbol and an index of the second symbol,
wherein the second subframe includes a subframe in which a symbol index is permuted based on a preconfigured pattern for the CP, and
wherein the offset value between the index of the first symbol and the index of the second symbol indicates a CP type for the CP among one or more CP types supported in the wireless communication system.

US Pat. No. 10,715,371

METHOD AND APPARATUS OF NR RMSI CORESET CONFIGURATION IN MIB

Samsung Electronics Co., ...

1. A user equipment (UE) for control information configuration in a wireless communication system, the UE comprising:a transceiver configured to receive, from a base station (BS), a master information block (MIB) over a physical broadcasting channel (PBCH); and
a processor operably connected to the transceiver, the processor configured to determine a frequency offset from the received MIB, wherein:
the frequency offset is determined based on a lowest RE of a synchronization signal/physical broadcast channel (SS/PBCH) block and a lowest RE of control resource set (CORESET) for remaining minimum system information (RMSI),
the frequency offset includes a resource block (RB) level frequency offset and a resource element (RE) level frequency offset,
the RB level frequency offset is jointly configured, for a combination of a subcarrier spacing (SCS) of the SS/PBCH block and a SCS of the CORESET, using a first field of 4 bits, with a multiplexing pattern of the SS/PBCH block and the CORESET, a bandwidth (BW) of the CORESET, and a number of symbols for the CORESET, and
the RE level frequency offset is configured using a second field of the 4 bits.

US Pat. No. 10,715,370

TEST DEVICE AND TEST METHOD FOR TESTING A COMMUNICATION

1. A test device for testing a communication between an access point and at least one station, the test device comprising:a communication recorder configured to record the communication between the access point and the at least one station, and
a communication analyzer configured to analyze the recorded communication by looking for a burst of a specific type of one specific station of the at least one station,
wherein the communication analyzer is further configured to measure a deviation of an actual communication frequency of the burst of the specific type from a predefined communication frequency,
wherein the communication analyzer is further configured to measure a frequency error between the burst of the specific type and the burst of the further specific type, and
wherein the communication analyzer is further configured to determine if the frequency error between the burst of the specific type and the burst of the further specific type remains within a predefined limit.

US Pat. No. 10,715,369

PHASE TRACKING REFERENCE SIGNAL

QUALCOMM Incorporated, S...

1. A method of wireless communication at a transmitting device, comprising:determining at least one location for inserting phase tracking reference signal (PT-RS) samples into a sequence of a plurality of samples in a time domain, wherein a first set of the plurality of samples comprises at least one of a first number of samples at a beginning of the sequence and a second number of samples at an end of the sequence, and wherein the at least one location for the PT-RS samples is within a second set of the plurality of samples;
inserting the PT-RS samples into the sequence based on the at least one location, wherein the at least one location of the PT-RS samples excludes the first set of the plurality of samples; and
transmitting a signal based on the inserted PT-RS samples.

US Pat. No. 10,715,368

GENERATING PACKETS HAVING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYMBOLS

NXP USA, INC., Austin, T...

1. A method for generating a physical layer (PHY) data unit for transmission via a wireless communication channel, method comprising:generating, at a communication device, a first portion of a PHY preamble of the PHY data unit to include a first plurality of orthogonal frequency division multiplexing (OFDM) symbols, wherein each OFDM symbol of the first plurality of OFDM symbols is modulated on at most X OFDM subcarriers, wherein X is a positive integer greater than one;
generating, at the communication device, a second portion of the PHY preamble to include a second plurality of OFDM symbols, wherein each OFDM symbol of the second plurality of OFDM symbols is modulated on at most N*X OFDM subcarriers, wherein N is a positive integer greater than one;
generating, at the communication device, a PHY data portion of the PHY data unit to include one or more third OFDM symbols, wherein each third OFDM symbol is modulated on at most N*X OFDM subcarriers; and
transmitting, by the communication device, the PHY data unit via the wireless communication channel.

US Pat. No. 10,715,367

INFORMATION TRANSMISSION METHOD AND APPARATUS

Huawei Technologies Co., ...

1. An information transmission method, comprising:generating, by a transmit end device, an orthogonal frequency division multiplexing (OFDM) symbol, wherein the OFDM symbol comprises a pi/2-binary phase shift keying (BPSK) modulated data signal and a pi/2-BPSK modulated phase tracking reference signal (PTRS); and
sending, by the transmit end device, the OFDM symbol to a receive end device;
wherein generating the OFDM symbol comprises:
obtaining the pi/2-BPSK modulated PTRS by phase-shifting one or more BPSK modulated symbols of a BPSK modulated PTRS by one or more respective phase-shift amounts, wherein a respective phase shift amount for a respective BPSK modulated symbol is based on a location of the respective BPSK modulated symbol in a sequence, wherein the sequence comprises one or more BPSK modulated data signals and the BPSK modulated PTRS.

US Pat. No. 10,715,366

SUB-BAND BASED COMPOSITE DIGITAL TIME DOMAIN SIGNAL PROCESSING

MITSUBISHI ELECTRIC CORPO...

1. A digital signal processer for processing a composite time domain signal having a plurality of parallel and independent signals that are arranged to collectively form a parallel communication, the composite time domain signal comprising at least a first time domain signal and a second time domain signal, the first time domain signal being an OFDM signal formed by at least a first OFDM symbol and a second OFDM symbol which are contiguous to each other at a first transition time boundary, the composite time domain signal corresponding to a time domain representation of a composite frequency domain signal extending over a given frequency band configured to be associated with the parallel communication and which is arranged into at least a first frequency sub-band and a second frequency sub-band which are adjacent to each other and which are respectively associated with the first time domain signal and the second time domain signal, the digital signal processer comprising:a first extractor arranged to extract a first predetermined plurality of time domain samples of the first time domain signal which are located on either side of the first transition time boundary,
a first filter operably coupled to the first extractor and arranged to filter the first extracted time domain samples, thereby creating first filtered time domain samples, and
a first replacer operably coupled to the first filter and arranged to replace, in the first time domain signal, the first extracted time domain samples with the first filtered time domain samples.

US Pat. No. 10,715,365

DETERMINING NUMBER OF MIDAMBLES IN A PACKET

NXP USA, Inc., Austin, T...

1. A method for wireless communication, the method comprising:receiving, at a communication device, a physical layer (PHY) protocol data unit (PPDU), wherein the PPDU includes i) a PHY preamble and ii) PHY data portion that includes one or more PHY midambles, and wherein the PHY preamble includes i) an indication of a length of the PPDU, and ii) an indication of a periodicity of PHY midambles in the PHY data portion;
calculating, at the communication device, a number of PHY midambles in the PPDU using i) the indication of the length of the PPDU, ii) the indication of the periodicity of PHY midambles, and iii) a parameter corresponding to a minimum number of orthogonal frequency division multiplexing (OFDM) symbols permitted after a last-occurring PHY midamble in the PPDU;
calculating, at the communication device, a reception time for the PPDU using the calculated number of PHY midambles; and
processing, at the communication device, the PPDU using the calculated reception time.

US Pat. No. 10,715,364

UNIFORMITY BETWEEN LEVELS OF A MULTI-LEVEL SIGNAL

Micron Technology, Inc., ...

1. An apparatus, comprising:a multi-leg driver that comprises a pull-up circuit and a pull-down circuit, the multi-leg driver configured to receive an input signal having a first amplitude and output an output signal having a second amplitude different than the first amplitude, wherein the multi-leg driver is configured to bias the output signal to the second amplitude, wherein the second amplitude is greater than the first amplitude;
a controller coupled with the multi-leg driver and configured to determine a level of the first amplitude and initiate an adjustment of the input signal, the multi-leg driver configured to output the output signal having the second amplitude based at least in part on the adjustment of the input signal; and
a transmitter coupled with the multi-leg driver and configured to transmit the output signal based at least in part on the adjustment of the input signal.

US Pat. No. 10,715,363

OPTICAL COMMUNICATION APPARATUS, SERVER APPARATUS, AND OPTICAL TRANSPORT SYSTEM

FUJITSU LIMITED, Kawasak...

1. An optical communication apparatus comprising:an interface circuit that acquires transfer condition information including a bit rate and a channel spacing of an optical network;
a processor that selects a modulation scheme in accordance with the transfer condition information, and operates in the modulation scheme,
wherein the processor is configured to select a first modulation scheme when the bit rate is greater than a first value in accordance with the channel spacing, and select a second modulation scheme when the bit rate is smaller than the first value, the second modulation scheme having a data transfer performance higher than the first modulation scheme,
wherein the processor selects a Quadrature Amplified Modulation (QAM) scheme when the bit rate is greater than the first value, and selects a 4-dimensional m-ary amplitude, n-ary phase shift keying (4D-mAnPSK) modulation scheme when the bit rate is smaller than the first value, and
wherein the processor selects a hybrid modulation scheme combining QAM and 4D-mAnPSK when the bit rate is equal to the first value.

US Pat. No. 10,715,362

METHOD FOR INCREASING THE SIGNAL-TO-NOISE RATIO FOR COMMON-MODE INTERFERENCE ON A TWO-WIRE DATA BUS

Elmos Semiconductor Aktie...

4. Method for transmission of data by digital voltage signals via a two-wire data bus of a vehicle from a transmitter to a receiver under influence of common-mode interferences acting on the two-wire data bus,wherein the two-wire data bus comprises a first data bus line and a second data bus line,
wherein the transmitter comprises a first connecting point connected to the first data bus line and a second connecting point connected to the second data bus line, and a first reference potential connecting point,
wherein the receiver comprises a third connecting point connected to the first data bus line and a fourth connecting point connected to the second data bus line, and a second reference potential connecting point,
comprising:
a) detection of a second common-mode voltage swing at the third and the fourth connecting point of the receiver relative to the second reference potential connecting point, and forming a second common-mode signal,
b) transmission of data by the transmitter via the two-wire data bus to the receiver by applying, between the first connecting point and the second connecting point of the transmitter, a digital voltage signal for generating voltage differences between the first connecting point and the second connecting point,
c) reception of the data by the receiver by detection of voltage differences between the third connecting point and the fourth connecting point of the receiver,
d) comparison of the voltage differences between the third connecting point and the fourth connecting point of the receiver to a lower reception threshold, wherein, in case of the voltage differences between the third connecting point and the fourth connecting point below said lower reception threshold, an output of a partial device performing the comparison assumes a first level having a first logical value assigned to it, and to an upper reception threshold, wherein, in case of the voltage differences between the third connecting point and the fourth connecting point above said upper reception threshold, the output of the partial device performing the comparison assumes a second level having a second logical level assigned to it that is complementary to the first logical value,
e) comparison of the amount of the detected second common-mode voltage swing to a second threshold value and increasing the upper reception threshold and decreasing the lower reception threshold if the amount of the second common-mode voltage swing is larger than the second threshold value.

US Pat. No. 10,715,361

DELAY COMPENSATION USING BROADBAND GAIN EQUALIZER

Analog Devices Internatio...

1. An electronic circuit include an adjustable signal delay duration, the electronic circuit comprising:a first selectable delay path defining a first delay duration;
a second selectable delay path defining a different second delay duration; and
a gain adjustment circuit to compensate for a difference in insertion loss between the first and second selectable delay paths within a specified range of frequencies, the gain adjustment circuit comprising at least one of (1) a positive-slope gain equalizer circuit located along the first selectable delay path or (2) a negative-slope gain equalizer located along the second selectable delay path, wherein a slope of the positive-slope equalizer circuit and a slope of the negative-gain equalizer circuit are defined as an insertion loss slope versus frequency within the specified range of frequencies.

US Pat. No. 10,715,360

DATA SCRAMBLING METHOD AND SCRAMBLING APPARATUS

Huawei Technologies Co., ...

1. A method, comprising:receiving, by an apparatus, a data stream, wherein an apparatus comprises multiple circuits, and the multiple circuits comprise a first circuit, a second circuit, a third circuit, and a switch;
performing, by the first circuit, data calculation on a first data block according to a first scrambling factor, to obtain a first data calculation result generated by the first circuit, wherein the first scrambling factor is determined by a scrambling polynomial, and wherein the first data block belongs to a first sub-data stream, and the first sub-data stream belongs to the data stream;
in response to a second data block of the data stream belonging to a same sub-data stream as the first data block, sending, by the switch, the first data calculation result generated by the first circuit to the second circuit, wherein the second data block is located after the first data block and is adjacent to the first data block in the data stream during serial transmission;
performing, by the second circuit according to the first scrambling factor and a first parameter, data calculation on the second data block in the data stream, to obtain a second data calculation result generated by the second circuit, wherein the second data block belongs to a second sub-data stream, wherein the second sub-data stream belongs to the data stream, wherein, when the second sub-data stream and the first sub-data stream are a same sub-data stream, the first parameter is the first data calculation result generated by the first circuit, and wherein, when the second sub-data stream and the first sub-data stream are two different sub-data streams, the first parameter is zero;
performing, by the second circuit according to a second scrambling factor, feedback calculation on feedback data provided by the third circuit, and obtaining a feedback calculation result generated by the second circuit, wherein multiple data blocks in the second sub-data stream are obtained by the multiple circuits in one clock cycle, wherein a last data block of the multiple data blocks in the second sub-data stream is obtained by the third circuit, wherein the last data block is the last data block that is transmitted during serial transmission of the multiple data blocks, wherein the second scrambling factor is determined by the scrambling polynomial according to a location of the second data block in the second sub-data stream, wherein the feedback data comprises: data obtained after scrambled data generated by the third circuit is registered for one clock cycle, or a result obtained after an exclusive OR calculation is performed on a first result and a third data calculation result that is generated by the third circuit, and wherein the first result is obtained after feedback calculation is performed on the feedback data that is provided by the third circuit and that is registered for one clock cycle;
performing, by the second circuit, an exclusive OR calculation on the second data calculation result generated by the second circuit and the feedback calculation result generated by the second circuit, to obtain scrambled data generated by the second circuit; and
outputting, by the second circuit, the scrambled data generated by the second circuit.

US Pat. No. 10,715,359

DECISION FEEDBACK EQUALIZER

Realtek Semiconductor Cor...

1. A decision feedback equalizer, comprising:a first path, comprising:
a first sampling circuit, for generating a first set signal and a first reset signal according to an input signal, a second set signal and a second reset signal; and
a first latch circuit, coupled to the first sampling circuit, for generating a first digital signal according to the first set signal and the first reset signal;
a second path, comprising:
a second sampling circuit, for generating the second set signal and the second reset signal according to the input signal, the first set signal and the first reset signal; and
a second latch circuit, coupled to the second sampling circuit, for generating a second digital signal according to the second set signal and the second reset signal;
wherein the first sampling circuit comprises:
a sense amplifier, for receiving the input signal to generate an amplified input signal at a terminal; and
an adjusting circuit, coupled to the terminal of the sense amplifier, for referring to the second set signal and the second reset signal to generate an adjusting signal to the terminal to adjust a voltage level of the amplified input signal;
wherein the first set signal and the first reset signal is generated according to the amplified input signal.

US Pat. No. 10,715,358

CIRCUIT FOR AND METHOD OF RECEIVING SIGNALS IN AN INTEGRATED CIRCUIT DEVICE

XILINX, INC., San Jose, ...

1. A circuit for receiving signals in an integrated circuit device, the circuit comprising:a first equalizer circuit having a first input for receiving a first input signal and generating a first output signal at a first output;
a second equalizer circuit having a second input for receiving the first output signal generated at the first output of the first equalizer circuit and having a second output; and
a control circuit having a control output coupled to the second output of the second equalizer circuit;
wherein the control circuit provides an offset cancellation signal and a loopback signal to the second output of the second equalizer circuit, and the loopback signal comprises an output of a transmitter of the integrated circuit device.

US Pat. No. 10,715,357

ADAPTATION OF A TRANSMIT EQUALIZER USING MANAGEMENT REGISTERS

Intel Corporation, Santa...

1. A device-to-device connection apparatus comprising:a first device comprising a receiver for a lane of a communications link;
a second device comprising a transmitter for the lane of the communications link; and
a management entity, wherein:
the receiver in the first device is to receive signals from the transmitter of the second device,
the first device includes a plurality of management registers,
the second device includes a plurality of management registers, and
in response to detection of toggling of a request identifier bit, the management entity is to communicate equalization settings from the receiver to the transmitter by a copy of content of a management register of the first device to a management register of the second device in order to select an equalizer tap coefficient of the transmitter independent of modification of another tap coefficient.

US Pat. No. 10,715,356

HIGH-SPEED INTERCONNECT SOLUTIONS WITH SUPPORT FOR SECONDARY CONTINUOUS TIME IN-BAND BACK CHANNEL COMMUNICATION FOR SIMPLEX RETIMER SOLUTIONS

AVAGO TECHNOLOGIES INTERN...

1. A network device for performing serializer-deserializer communication with a remote link partner (LP) over a transmission line, the network device comprising:a retimer receiver comprising a decoder configured to extract link training data from an in-band link training communication channel in a signal received from the remote LP over the transmission line, wherein the in-band link training communication channel is embedded among data traffic corresponding to an Open Systems Interconnect (OSI) data link layer and other higher OSI layers in the signal; and
a transmitter comprising a transmitter analog front-end (AFE), an encoder, and an adaptation parameter receiver configured to receive, through a pass through retimer transmitter and a pass through receiver located within the network device, the link training data from the retimer receiver and adjust one or more parameters of the transmitter AFE or the encoder based on the link training data,
wherein the in-band link training communication channel is formed using low-frequency signaling with a frequency that is lower than high-frequency signaling used to transmit the OSI data link layer and other higher OSI layers in the signal transmitted from the remote LP,
wherein the pass through retimer transmitter comprises a digital-to-analog converter (DAC) for converting the combination of the low-frequency signaling and the high-frequency signaling from a digital domain to an analog domain, and
wherein part of a full-scale range of the DAC is reserved for the low-frequency signaling.

US Pat. No. 10,715,355

PROCESSING MODULE FOR A COMMUNICATION DEVICE AND METHOD THEREFOR

NXP B.V., Eindhoven (NL)...

1. A baseband processor for a communication receiver arranged to receive a signal transmitted by a transmitter; the baseband processor comprising:a channel estimate generator configured to output channel estimate information for the received signal; and
a timestamping device configured to determine a Time-of-Arrival, ToA, measurement for a packet within the received signal based at least partly on the channel estimate information for the received signal generated by the channel estimate generator; wherein the channel estimate generator is configured to derive a validation pattern based at least partly on a validation pattern reference known by both the communication receiver and the transmitter for the packet within the received signal for which a ToA measurement is to be determined, identify a section of the packet containing a validation sequence, and perform cross-correlation between at least a part of the validation sequence within the packet and at least a part of the derived validation pattern to generate channel estimate validation information, and mitigate and detect ToA attacks based upon the validation sequence.

US Pat. No. 10,715,354

INTEGRATING AND CONTROLLING MULTIPLE LOAD CONTROL SYSTEMS

Lutron Technology Company...

19. A load control system comprising:a Composite Gateway, comprising a Resource Database and a Gateway Group Database, wherein the Composite Gateway is a single point of access for a user to communicate with a first Gateway and a second Gateway;
the first Gateway comprising a first Logging Database and a first Project Database, wherein the first Gateway actively manages one or more load control devices, and wherein each of the one or more load control device is associated with a respective uniform resource identifier (URI) that indicates that the first Gateway actively manages each of the one or more load control devices; and
the second Gateway comprising a second Logging Database and a second Project Database, wherein the second Gateway actively manages one or more other load control devices, and wherein each of the other one or more load control devices is associated with a respective URI that indicates that the second Gateway actively manages each of the one or more other control devices,
wherein the Composite Gateway is a single point of access for a user to communicate with a first Gateway and a second Gateway, such that in response to a user's request message, the Composite Gateway sends a first information request message to the first Gateway and a second information request message to the second Gateway, aggregates information received from the first Gateway and the second Gateway, and sends the aggregated information in response to the user's request message.

US Pat. No. 10,715,353

VIRTUAL LOCAL AREA NETWORK IDENTIFIERS FOR SERVICE FUNCTION CHAINING FAULT DETECTION AND ISOLATION

Ciena Corporation, Hanov...

1. A method of Service Function Chaining (SFC) fault detection and fault isolation, the method comprising:injecting a first frame with a first Virtual Local Area Network (VLAN) Identifier (ID) tag at an input to the SFC, wherein the first VLAN ID is dedicated to note an associated frame is utilized solely for fault detection and not for regular traffic classification, wherein a plurality of classifiers in the SFC are configured to pass the first frame with the first VLAN ID through the SFC for connectivity such that each flow point in the SFC simply passes the first frame without processing or modification due to the presence of the first VLAN ID;
one of detecting the first frame with the first VLAN ID tag at an output of the SFC and failing to detect the first frame at the output;
one of determining connectivity of the SFC based on the detecting and determining a fault in the connectivity based on the failing,
responsive to detecting the fault in the connectivity, injecting a second frame with a second VLAN ID tag through a plurality of services of the SFC;
detecting the second frame at each output of each of the plurality of services; and
determining a location of the fault based on an absence of the detecting the second frame at a specific flow point in the SFC.

US Pat. No. 10,715,352

REDUCING DATA TRANSMISSIONS IN A VIRTUAL PRIVATE NETWORK

CISCO TECHNOLOGY, INC., ...

1. A method comprising:appending a unique identifier to an outbound packet;
transmitting the outbound packet to a recipient;
creating a transmission record including at least the unique identifier;
receiving an inbound packet from the recipient, the inbound packet appended with the unique identifier and an indication of an amount of elapsed time between the recipient receiving the outbound packet and the recipient transmitting the inbound packet; and
determining a performance level of a Virtual Private Network (VPN) tunnel based on at least the indication.

US Pat. No. 10,715,351

NETWORK NODE, CONTROL MODULE FOR A COMPONENT AND ETHERNET RING

1. A network node comprising:a first computing unit within the network node;
at least one second computing unit within the network node;
an internal switch within the network node; and
an external switch within the network node,
wherein the internal switch is connected to the first computing unit, the at least one second computing unit, and the external switch,
wherein the external switch comprises at least one port for data that comes from other network nodes,
wherein at least one port on the external switch is configured such that a data rate that is forwarded to the internal switch is limited to a predefined data rate, and
wherein the predefined data rate depends on an available computing time and a buffer size such that data interchange between the first computing unit and the second computing unit is not impaired.

US Pat. No. 10,715,350

AUTOMATIC ADDRESSING OF NETWORKED NODES

Simmonds Precision Produc...

1. A method of addressing each of a plurality of nodes of a communication network, the method comprising:powering, by a power bus, a first node of the plurality of nodes;
starting, by the first node, a first timer upon a detection of power of the first node;
connecting, by the first node, the power bus to a second node of the plurality of nodes, in response to the first timer reaching a first threshold;
providing, from a host controller, a first address to the first node of the plurality of nodes over a communication bus, to which each of the plurality of nodes is directly and electrically connected, wherein the communication bus is separate from the power bus;
starting, by the host controller, a host timer upon provision of the first address;
providing, from the host controller, a second address to the second node of the plurality of nodes over the communication bus, in response to the host timer reaching a second threshold;
receiving, by the first node, the first address provided by the host controller;
providing, by the first node, a first address acknowledgement to the host controller, the first address acknowledgement indicative of successful receipt of the first address by the first node; and
connecting, by the first node, the power bus to the second node of the plurality of nodes, both in response to the first address being successfully received by the first node.

US Pat. No. 10,715,349

PPPOE EXTENSION OVER LAYER 2 SWITCH EMBEDDING PPPOE AGENT

Raytheon Company, Waltha...

1. A network system comprising:a first network device running in data link layer (L2), comprising a first switch and a first PPPoE (Point-to-Point over Ethernet) agent integrally coupled to the first switch;
a second network device running in data link layer (L2), comprising a second switch and a second PPPoE agent integrally coupled to the second switch;
a PPPoE client, running in network layer (L3), communicating to the first PPPoE agent; and
a PPPoE server, running in network layer (L3), communicating to the second PPPoE agent,
wherein the PPPeE client is configured to establish a PPPoE connection with the PPPeE server by transmitting a broadcast (Bcast) Media Access Control (MAC) address in an initial IPCP (Internet Protocol Control Protocol) negotiation message.

US Pat. No. 10,715,348

METHOD FOR PROCESSING USER INFORMATION DETECTED BY AT LEAST ONE DETECTION DEVICE OF A SYSTEM

Robert Bosch Gmbh, Stutt...

1. A method for processing user information detected by at least one detection device of a device, the method comprising:transmitting information concerning at least one user detected by the at least one detection device to a number of databases;
at least partially associating, in the number of databases, the information detected by the at least one detection device with a user profile;
retrieving, from the number of databases, all the information detected by the at least one detection device and associated with the user profile; and
outputting to the user, as a function of a result of an authenticiation of the user, the retrieved information on at least one output unit for processing;
wherein information that is associated with the user profile of the user is detected and processed with a software module that accesses all software modules of the system which manage the information associated with the user profile.

US Pat. No. 10,715,346

DYNAMICALLY ADJUSTING DOCSIS PORT UTILIZATION

Harmonic, Inc., San Jose...

1. A non-transitory computer-readable storage medium that stores one or more sequences of instructions for dynamically adjusting upstream and downstream spectrum usage by a Remote PHY node, which when executed by one or more processors, cause:dynamically determining, remotely across a network, association information that identifies which cable modems, of a set of cable modems serviced by said Remote PHY node, are associated with at least one of (a) each upstream device port of a Remote PHY device comprised within said Remote PHY node, and (b) each downstream device port of said Remote PHY device; and
remotely, across said network and based on said association information, switching to which node port of said Remote PHY node at least one of (a) a particular upstream device port, and (b) a downstream device port of said Remote PHY device is assigned.

US Pat. No. 10,715,345

COMMUNICATION CONTROL DEVICE, COMMUNICATION DEVICE, COMPUTER PROGRAM PRODUCT, INFORMATION PROCESSING APPARATUS, AND TRANSMITTING METHOD FOR MANAGING DEVICES IN A GROUP

Kabushiki Kaisha Toshiba,...

1. An information processing apparatus that manages a group including a plurality of communication devices, the apparatus comprising:a transmitter configured to send, when one or more of the communication devices participating in the group is changed so that which of the communication devices is participating in the group is changed, to communication devices including all of the communication devices participating in the group after changing, and including one or more of the communication devices not participating in the group after changing, first information containing identification information for identifying all the communication devices participating in the group after changing, and second information in which one or more device IDs is encoded,
the one or more device IDs identifying communication devices participating in the group after changing,
the second information indicating a height of a tree structure indicating one or more pieces of information corresponding to the one or more device IDs.

US Pat. No. 10,715,344

METHOD OF ESTABLISHING A VIDEO CALL USING MULTIPLE MOBILE COMMUNICATION DEVICES

Shirley Shiu Ling Cheung,...

1. A method of communicating electronically, the method comprising the steps of:establishing a video call between a first electronic communication device of a first user and a first electronic communication device of a second user;
establishing an information transmission communication connection between a second electronic communication device of the first user and a second electronic communication device of the second user for exchange of discrete media files during the course of the video call;
configuring the video call and the information transmission communication connection with a same time axis or time frame;
applying a time stamp in accordance with the time axis or time frame to any discrete media file data exchanged during the course of the video call;
wherein the step of applying a time stamp enables the first user to retrieve a global record of discrete media files exchanged by the first user and the second user during the course of the video call and to obtain a personal record of discrete media files communicated by the first user during the course of the video call, said global record and personal record being synchronized with the video call in accordance with the time axis or time frame.

US Pat. No. 10,715,343

DEVICE MONITORING FOR CONFERENCE RESERVATION CANCELLATION

Amazon Technologies, Inc....

1. A system, comprising:one or more computing devices implementing one or more services in a service provider environment; and
a voice-capturing device, wherein the voice-capturing device is associated with a conference room in a device configuration maintained by the one or more services, and wherein the voice-capturing device sends voice input to the one or more services over a network; and
wherein the one or more services are executable by the one or more computing devices to:
determine that the conference room is associated with a reservation for a scheduled conference associated with a scheduled starting time and a scheduled ending time;
monitor a presence or absence of voice input from the voice-capturing device within a period of time occurring between the scheduled starting time and the scheduled ending time;
cancel the reservation based on determining that voice input representing one or more users joining the scheduled conference is not received from the voice-capturing device within the period of time occurring between the scheduled starting time and the scheduled ending time;
associate the conference room with an additional reservation for an additional scheduled conference, wherein the additional scheduled conference is scheduled to begin prior to the scheduled ending time for the conference; and
receive, from the voice-capturing device, voice input associated with the additional scheduled conference.

US Pat. No. 10,715,342

MANAGING SERVICE USER DISCOVERY AND SERVICE LAUNCH OBJECT PLACEMENT ON A DEVICE

HEADWATER RESEARCH LLC, ...

1. For a network device management system associated with a group of wireless devices, each wireless device in the group comprising a user interface and a device-based user interface location manager, a method comprising the network device management system cooperating with each of the device-based user interface location managers to:specify, for each wireless device in the group, a plurality of first service launch objects to appear in at least a first user interface service launch partition of a plurality of user interface service launch partitions on that wireless device;
specify, for each of the first service launch objects, an association between that service launch object, an associated application, and an associated particular network destination; and
enforce one or more policies on each wireless device to cause each application, when launched from an associated service launch object appearing in the first user interface service launch partition, to communicate only with the associated particular network destination.

US Pat. No. 10,715,341

POWERED DEVICE IN POWER-OVER-ETHERNET NETWORK SYSTEM, AND METHODS THEREFORE

SIGNIFY HOLDING B.V., Ei...

1. A powered device for receiving power from a power sourcing equipment via a communication link, the powered device comprising:a jack or port arranged for transmitting, over the communication link, a power request,
wherein the powered device is arranged to be controlled in a maximum power mode during a classification phase of said powered device,
wherein the powered device is arranged for determining, after implementing said maximum power mode during said classification phase, a type information specifying whether the power sourcing equipment supports autoclass classification mechanism, and
wherein the jack or port is further arranged for selectively transmitting the power request based on the determined type information, wherein the powered device is arranged to withhold sending the power request in response to determining that the type information indicates support of the power sourcing equipment for the autoclass classification mechanism.

US Pat. No. 10,715,340

NON-VOLATILE MEMORY WITH SECURITY KEY STORAGE

MACRONIX INTERNATIONAL CO...

1. A memory circuit, comprising:a non-volatile memory array including a plurality of blocks of memory cells, and including a security key stored in a particular block in the plurality of blocks;
logic to execute a physical unclonable function in a set of memory cells in the non-volatile memory array, to produce the security key;
a port for external communication of data from the array;
security logic coupled to the memory array, which utilizes the security key in a protocol to enable access to data stored in blocks in the plurality of blocks; and
access control circuits coupled to the array which include logic to enable read-only access to the particular block by the security logic for use in the protocol, and to prevent access to the particular block via the port, wherein the output of the physical unclonable function is not applied to the set of memory cells in the non-volatile memory to produce the security key, and wherein the access control circuits have a first state in which access to the particular block via the port to write the security key is enabled, a second state in which access to the particular block is disabled for read or write via the port, and access to the particular block is enabled for read by the security logic.

US Pat. No. 10,715,339

DISTRIBUTED KEY MANAGEMENT FOR TRUSTED EXECUTION ENVIRONMENTS

Alibaba Group Holding Lim...

1. A computer-implemented method for verifying authenticity of trusted execution environments (TEEs), the method comprising:establishing, by a key management (KM) TEE of a KM node, a trust relationship with a plurality of KM TEEs in a plurality of KM nodes based on performing mutual attestations with the plurality of KM TEEs, wherein the KM node and the plurality of KM nodes are in a consortium blockchain;
initiating, by the KM TEE, a consensus process with the plurality of KM TEEs for reaching consensus on providing one or more encryption keys to a service TEE of the KM node;
in response to reaching the consensus with the plurality of KM TEEs, initiating, by the KM TEE, a local attestation process with a service TEE in the KM node, comprising:
transmitting, by the KMM TEE, a challenge to the service TEE to verify an authenticity of the service TEE in the KM node, and
receiving, by the KMM TEE, a report from the service TEE that includes cryptographic indicia that proves that the service TEE exists on the KM node, wherein the cryptographic indicia was requested from the KM node by the service TEE in response to receiving the challenge;
determining, by the KM TEE, that the local attestation process is successful based at least on the received, cryptographic indicia that proves that the service TEE exists on the KM node;
in response to determining that the local attestation process is successful, providing, by the KM TEE, one or more encryption keys to the TEE executing on a computing device; and
storing, by the KM node, the encryption keys in the consortium blockchain, wherein the encryption keys stored in the consortium blockchain represent a consensus version of the encryption keys accessible by all nodes in the consortium blockchain.

US Pat. No. 10,715,338

MANAGEMENT OF PUBLIC KEY CERTIFICATES WITHIN A DISTRIBUTED ARCHITECTURE

MICROSOFT TECHNOLOGY LICE...

1. A system comprising:a public key certificate issuance system to generate public key certificates, the public key certificate issuance system comprising:
first data files associated with first public key certificate policies; and
first processor-executable process steps stored on a non-transitory computer-readable medium and comprising a first copy of processor-executable process steps of an analyzer engine, a first copy of processor-executable process steps of a policy engine, and a first wrapper, the first processor-executable process steps executable by a processing unit of the public key certificate issuance system to:
determine the first public key certificate policies based on the first data files; and
generate a first public key certificate conforming to the first public key certificate policies; and
a secret store system to store public key certificates, the secret store system comprising:
second data files associated with second public key certificate policies; and
second processor-executable process steps stored on a non-transitory computer-readable medium and comprising a second copy of the processor-executable process steps of the analyzer engine, a second copy of the processor-executable process steps of the policy engine, and a second wrapper, the second processor-executable process steps executable by a processing unit of the secret store system to:
receive the first public key certificate;
determine the second public key certificate policies based on the second data files; and
determine whether the received first public key certificate conforms to the public key certificate policies.

US Pat. No. 10,715,337

SECURE CRYPTO MODULE INCLUDING CONDUCTOR ON GLASS SECURITY LAYER

International Business Ma...

1. An adapter card comprising:a printed circuit board (PCB) comprising a connector that interconnects with a motherboard, the PCB comprising a PCB conductor on glass security layer comprising a first security trace directly upon a first toughened glass substrate;
a secure crypto module comprising a daughter card electrically connected to the PCB, a shield comprising a metal shell that surrounds the daughter card, and a shield conductor on glass security layer directly upon an inner surface of the metal shell that faces the daughter card, the shield conductor on glass security layer comprising a second security trace directly upon a second toughened glass substrate;
the daughter card comprising: one or more wiring layers each comprising a signal trace directly upon a dielectric layer, a crypto component, and a daughter card conductor on glass security layer comprising a third security trace directly upon a third toughened glass substrate; and
a resistance monitor device, imbedded within the PCB, electrically connected to the first security trace, the second security trace, and the third security trace, wherein a destruct feature of the crypto component is programmed in response to the resistance monitor device detecting the resistance across the first security trace, the second security trace, or the third security trace exceeds a respective predetermined threshold.

US Pat. No. 10,715,336

PERSONAL DEVICE SECURITY USING ELLIPTIC CURVE CRYPTOGRAPHY FOR SECRET SHARING

nChain Holdings Limited, ...

1. A computer implemented method of encrypting data at an electronic device (S), the electronic device being associated with a key device (C), wherein the electronic device is further associated with a first asymmetric cryptography pair having a first electronic device private key (V1S) and a first electronic device public key (P1S), and the key device is associated with a second asymmetric cryptography pair having a first key device private key (V1C) and a first key device public key (P1C); the method comprising:determining, at the electronic device, a deterministic key (DK);
receiving, at the electronic device, the first key device public key (P1C) from the key device;
determining, at the electronic device, a second electronic device private key (V2S) based on at least the first electronic device private key (V1S) and the deterministic key (DK), and
determining, at the electronic device, a second key device public key (P2C) based on at least the first key device public key (P1C) and the deterministic key (DK);
determining a secret based on at least the second electronic device private key (V2S) and the second key device public key (P2C);
encrypting the data at the electronic device using the determined secret or an encryption key that is based on the determined secret; and
sending information indicative of the deterministic key (DK) to the key device where the information can be stored.

US Pat. No. 10,715,335

METHODS AND APPARATUS TO PROVIDE FOR EFFICIENT AND SECURE SOFTWARE UPDATES

Intel Corporation, Santa...

1. A data processing system, the data processing system comprising:a processor; and
a storage storing a software manager, a current version of a software component, a first current advance key (AK), and a second current AK, wherein the first and second current AKs are indicative of a key pair used to sign a new version of a software component subsequent to the current version of the software component, wherein the first current AK comprises an advance minor update key, and wherein the second current AK comprises an advance major update key;
wherein the software manager, when executed by the processor, causes the data processing system to:
extract a digital signature from an update package for the new version of a software component;
extract at least a first new AK and a second new AK from the update package, wherein the first and second new AKs are indicative of a key pair used to sign a version of the software component subsequent to the new version of the software component;
use at least one of the first or second current AKs to determine whether the digital signature is valid; and
update, in response to a determination that the digital signature is valid, the software component using the update package, wherein the data processing system is to apply a minor software update in response to a determination that the digital signature is found valid with the minor update key and wherein the data processing system is to apply a major software update in response to a determination that the digital signature is found valid with the major update key.

US Pat. No. 10,715,334

METHODS AND APPARATUS FOR VALIDATING A DIGITAL SIGNATURE

Adobe Inc., San Jose, CA...

1. A non-transitory computer storage medium storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising:retrieving first validation information from a certificate authority when connectivity thereto is available, the first validation information being retrieved based on a first digital signature having been applied to a content portion of an electronic document when connectivity to the certificate authority was unavailable, the first validation information being retrieved to validate the first digital signature;
adding a first piece of the retrieved first validation information to a dictionary separate from the content portion and included in the electronic document, the first piece being added based at least in part on a determination that a second piece of the retrieved first validation information corresponds to at least a pre-existing piece of second validation information that was already included in the dictionary before the connectivity was available; and
validating the applied first digital signature using an amalgamation of the added first piece and at least the pre-existing piece of validation information included in the dictionary when connectivity to the certificate authority is unavailable.

US Pat. No. 10,715,333

NETWORK MESSAGE AUTHENTICATION AND VERIFICATION

NXP B.V., Eindhoven (NL)...

1. A method of authenticating a message frame on a multi-master access bus with message broadcasting, said method comprising:providing a logic bus identifier, LID, out of a plurality of logic bus identifiers, wherein the logic bus identifier, LID, is associated with one logical group of nodes out of a plurality of nodes connected to the multi-master access bus;
determining a key permission of a key;
retrieving the key associated with the logic bus identifier, LID, in response to the key permission permitting message broadcasting, wherein a different key is assigned to each logical group;
generating a cryptographic hash value, MAC, using the retrieved key and based on at least the logic bus identifier, LID; and
composing a message frame comprising the logic bus identifier, LID, and the cryptographic hash value, MAC.

US Pat. No. 10,715,332

ENCRYPTION FOR TRANSACTIONS IN A MEMORY FABRIC

Hewlett Packard Enterpris...

1. A method to facilitate memory address encryption for transactions between electronic circuits in a memory fabric, comprising:obtaining, at an electronic circuit in the memory fabric, a transaction integrity key and a transaction encryption key;
encrypting a counter value from a transaction using the transaction encryption key;
truncating the encrypted counter value;
computing an exclusive-or operation on the truncated encrypted counter value and an address value from the transaction to determine an address ciphertext; and
computing a truncated message authentication code (MAC) using the transaction integrity key on a concatenation of the address ciphertext and a payload of the transaction.

US Pat. No. 10,715,331

METHOD AND SYSTEM FOR PROVIDING VALIDATED, AUDITABLE, AND IMMUTABLE INPUTS TO A SMART CONTRACT

MASTERCARD INTERNATIONAL ...

1. A method for posting of auditable, immutable data to a blockchain, comprising:receiving, by a receiving device of a processing server, a blockchain comprised of a plurality of blocks, each block being comprised of at least a block header and one or more transaction values, wherein each transaction value includes at least a transaction hash;
receiving, by the receiving device of the processing server, a data file associated with a specific transaction hash included in a block in the blockchain, wherein the data file includes one or more deterministic transaction inputs, where each of the one or more deterministic transaction inputs is associated with one or more predetermined conditions for deterministically satisfying the corresponding deterministic transaction input;
responsive to satisfaction of one of the one or more predetermined conditions of at least one of the one or more deterministic transaction inputs, modifying, by a data modification module of the processing server, the corresponding at least one of the one or more deterministic transaction inputs included in the data file;
generating, by a hashing module of the processing server, a new hash value via application of one or more hashing algorithms to the modified at least one of the one or more deterministic transaction inputs included in the data file;
generating, by a generation module of the processing server, a new transaction value based on at least the generated new hash value, the specific transaction hash, and a reference identifier associated with an executable script associated with the blockchain, wherein the new transaction value is based on the modified at least one of the one or more deterministic transaction inputs included in the data file, wherein the executable script is configured to execute the modified data file and output a deterministic response matching the generated new transaction value for verification of the satisfaction of the one of the one or more predetermined conditions of the at least one of the one or more deterministic transaction inputs;
digitally signing, by a signing module of the processing server, the generated new transaction value; and
electronically transmitting, by a transmitting device of the processing server, the signed new transaction value.

US Pat. No. 10,715,330

CRYPTOLOGIC BLOCKCHAIN-BASED CUSTODY AND AUTHORIZATION TRACKING FOR PHYSICAL CONCESSIONS

Accenture Global Solution...

1. A system including:network interface circuitry configured to:
access a blockchain via a peer network for the blockchain,
the blockchain configured to:
track:
 a custody status for a physical concession; and
 an authorization status for a receiving custodian of the physical concession;
store a proof of authorization for the receiving custodian, the proof of authorization confirming an entitlement of the receiving custodian to obtain issue of the physical concession, the proof of authorization including an identifier of the physical concession in an encrypted form to obscure the identity of the physical concession from non-stakeholder peers associated with the blockchain; and
implement a consensus operating procedure by temporally ordering multiple status exchanges for the physical concession;
authorization circuitry configured to:
obtain an identifier for the physical concession via a scan of a machine-cognizable code presented on behalf of the receiving custodian;
using the identifier and via the network interface circuitry, access the proof of authorization stored on the blockchain for the receiving custodian; and
via the network interface circuitry, access the custody status for the physical concession;
cause an issuance display,
the issuance display confirming issue of the physical concession to the receiving custodian is allowed, and
the issuance display caused at a time that the custody status is unissued and the receiving custodian is authorized; and
cause a rejection display,
the rejection display confirming issue to the receiving custodian is disallowed, and
the rejection display caused at a time that the custody status is issued or the receiving custodian is unauthorized; and
tracking circuitry configured to:
responsive to causing the issuance display, send a custody change request to the peer network via the network interface circuitry, the custody change request configured to request, for addition to the blockchain, a record of a status exchange changing the custody status from unissued to issued.

US Pat. No. 10,715,329

PERSONATED REALITY ECOSYSTEM

PERSONATED REALITY SOLUTI...

1. A Personated Reality Ecosystem (PRE) for authenticating a personated virtual assistant (PVA), the system comprising:a. a personal computing device, comprising a processor capable of executing computer-executable instructions, RAM, a disk, and at least one of a microphone, a video camera, a graphical user interface implemented on the multi-touch input surface, and a keyboard, wherein the disk comprises:
i. an Interface Module (303), comprising instructions for:
A. receiving, by one or more of the microphone and the keyboard, a registration request from a human user;
B. receiving, by one or more of the microphone, the video camera, and the keyboard, a Unique User ID (UUID) (204) and a human user data, wherein the human user data comprises a biometric and a password from the human user,
C. transmitting securely, by the Interface Module, the received human user biometric (203) to Vault Mgmt. Module (309),
D. concatenating, by the Interface Module, the human user biometric (203) and the password,
E. transmitting securely, by the Interface Module, the concatenation of the human user biometric (203) and the password to a human user key generator (305),
F. receiving a human user key (210) from the human user key generator (305),
G. transmitting securely the human user key (210) to a Registration Module (306),
H. receiving, by one or more of the microphone, the graphical user interface implemented on a multi-touch input surface, and the keyboard, a request to initiate an Episode of Interaction (EOI), and
I. transmitting securely, by the Interface Module, the EOI request to a Launch Initial Interaction Module (330),
ii. the human user key generator (305),
iii. the Registration Module (306), comprising instructions for:
A. receiving the UUID (204) and the human user key (210) from the Interface Module (303),
B. transmitting securely the UUID (204) and the human user key (210) to a smart contract UserReg (601) of a blockchain distributed ledger (600),
C. receiving a confirmation from the smart contract UserReg (601) when registration has been completed,
D. receiving a confirmation from a smart contract TokenGen (602) when a non-fungible token has been generated,
E. authorizing a Digital DNA Generation Module (307) to proceed, upon receiving the confirmation that the registration is complete and the confirmation that the non-fungible token has been generated, and
F. authorizing a Key Generation Module (308) to proceed, upon receiving the confirmation that the registration is complete and the confirmation that the non-fungible token has been generated,
iv. the Digital DNA Generation Module (307), comprising instructions for:
A. receiving the non-fungible token data string (615) from the smart contract TokenGen (602),
B. dividing the non-fungible token data string (615) into a plurality of Digital DNA (1400) segments, and
C. transmitting securely the Digital DNA (1400) segments to a Digital DNA Implant Module (922) in a Cloud Computing System (900),
v. the Key Generation Module (308), comprising instructions for:
A. receiving authorization to proceed from the Registration Module (306),
B. generating a PVA ID Key (1204) upon receiving authorization to proceed from the Registration Module (306),
C. transmitting securely the PVA ID Key (1204) to a Vault (315) for storage,
D. generating a Binding Key (1212) upon receiving authorization to proceed from the Registration Module (306),
E. transmitting securely the Binding Key (1212) to the Vault (315) for storage,
F. generating a PVA public encryption key (1251) and a PVA private decryption key (1252) upon receiving authorization to proceed from the Registration Module (306),
G. transmitting securely the PVA public encryption key (1251) and the PVA private decryption key (1252) to the Vault (315) for storage,
H. generating an EOI public encryption key (1821) and an EOI private decryption key (1822),
I. transmitting securely the EOI public encryption key (1821) and the private decryption key (1852) to the Vault (315) for storage,
J. generating an EOI Digital Seal Key (1801) upon receiving authorization to proceed from the Registration Module (306), and
K. transmitting securely the EOI Digital Seal Key (1801) to the Vault (315) for storage,
vi. the Vault (315),
vii. the Vault Mgmt. Module (309), comprising instructions for:
A. receiving the human user biometric (203) from the Interface Module (303),
B. transmitting securely the human user biometric (203) to a Human User/Personalized Virtual Assistant (HU/PVA) Binding Module (923) in the Cloud Computing System (900),
C. receiving a request for a Unique Personalized Virtual Assistant (UPVAID) (1205) by the PVA Generation Module (920),
D. requesting the UPVAID (1205) from the Vault (315),
E. transmitting securely the UPVAID (1205) to PVA Generation Module (920),
F. receiving a request for the PVA ID Key (1204) from an ID Generation Module (310),
G. requesting the PVA ID Key (1204) from the Vault (315),
H. receiving the PVA ID Key (1204) from the Vault,
I. transmitting securely the PVA ID Key (1204) to the ID Generation Module (310),
J. receiving a request for the Binding Key (1212) from the HU/PVA Binding Module (923),
K. requesting the Binding Key (1212) from the Vault (315),
L. receiving the Binding Key (1212) from the Vault (315),
M. transmitting securely the Binding Key (1212) to the HU/PVA Binding Module (923),
N. receiving a request for the PVA public encryption key (1251) from an Encryption Module (921) in the Cloud Computing System (900),
O. requesting the PVA public encryption key (1251) from the Vault (315),
P. receiving the PVA public encryption key (1251) from the Vault (315),
Q. transmitting securely the PVA public encryption key (1251) to the Encryption Module (921),
R. receiving a request for the PVA private decryption key (1252) from a Decryption Module in the Cloud Computing System,
S. requesting the PVA private decryption key (1252) from the Vault (315),
T. receiving the PVA private decryption key (1252) from the Vault (315),
U. transmitting securely the PVA private decryption key (1252) to the Decryption Module,
V. receiving a request for the EOI Digital Seal Key (1801) from the EOI Mgmt. Module (925),
W. requesting the EOI Digital Seal Key (1801) from the Vault (315),
X. receiving the EOI Digital Seal Key (1801) from the Vault (315),
Y. transmitting securely the EOI Digital Seal Key (1801) to the Launch Initial Interaction Module (330),
Z. receiving a request for the PVA ID Key (1204) from the ID Generation Module (310),
AA. requesting the PVA ID Key (1204) from the Vault (315),
BB. receiving the PVA ID Key (1204) from the Vault (315),
CC. transmitting securely the PVA ID Key (1204) to the ID Generation Module (310),
DD. requesting the UPVAID (1205) from the Vault (315),
EE. receiving the UPVAID (1205) from the Vault (315),
FF. transmitting securely the UPVAID (1205) to a PVA Generation Module (920) in the Cloud Computing System (900),
GG. receiving a request for the UPVAID (1205) from the HU/PVA Biding Module (923),
HH. requesting the UPVAID (1205) from the Vault (315),
II. receiving a request for the UPVAID (1205),
JJ. transmitting securely the UPVAID (1205) to the HU/PVA Biding Module (923),
KK. receiving an EOI Transcript from the Launch Initial Interaction Module (330),
LL. transmitting securely the EOI Transcript to an EOI Mgmt. Routine (925) in the Cloud Computing System (900), and
MM. transmitting securely each Digital DNA (1454) segment of the plurality of Digital DNA segments with the origin coordinates and the end coordinates of each respective vector of the plurality of vectors to the Vault (315),
viii. the ID Generation Module (310), comprising instructions for:
A. receiving the UUID (204) from the Interface Module (303),
B. requesting the PVA ID Key (1204) from the Vault Mgmt. Module,
C. receiving the PVA ID Key (1204) from the Vault Mgmt. Module,
D. concatenating the UUID (204) and the PVA ID Key (1204),
E. transmitting securely the concatenation of the UUID (204) and the PVA ID Key (1204) to a UPVAIDHash Module (311),
F. receiving the UPVAID (1205) from the UPVAIDHash Module (311), and
G. transmitting securely the UPVAID (1205) to the Vault (315) for storage, and
ix. the Launch Initial Interaction Module (330), comprising instructions for:
A. receiving an authorization to activate from a smart contract ChainVer (605) in the blockchain distributed ledger (600),
B. initiating the EOI, between the human user (200) and a UniquePVA (1202) bound to the human user,
C. recording in an EOI transcript (1800) an interaction between the human user (200) and the UniquePVA (1202), and
D. transmitting securely the EOI transcript (1800) to the EOI Mgmt. Module (925);
b. a blockchain distributed ledger (600), comprising:
i. the smart contract UserReg (601), comprising instructions for:
A. receiving the human user key (210) and the UUID (204) from the Registration Module (306),
B. writing the human user key (210) and the UUID (204) to a new block on the blockchain distributed ledger (600),
C. transmitting securely the human user key (210) and the UUID (204) to the smart contract TokenGen in the blockchain distributed ledger, and
D. transmitting securely a confirmation that registration has been completed to the Registration Module (306),
ii. the smart contract TokenGen (602), comprising instructions for:
A. receiving the human user key (210) and the UUID (204) from the smart contract UserReg (601),
B. generating a unique non-fungible token using the human user key (210) and the UUID (204),
C. writing the unique non-fungible token and the UUID (204) to a new block on the blockchain distributed ledger (600),
D. generating a non-fungible token data string (615) using the non-fungible token,
E. transmitting securely the non-fungible token data string (615) to the Digital DNA generation module (307), and
F. transmitting securely a confirmation that the non-fungible token has been generated,
iii. a smart contract ChainWrit (603), comprising instructions for:
A. receiving a digital binding chain (1600) and the UPVAID (1205) from the HU/PVA Binding Module (923), and
B. writing the digital binding chain (1600) and the UPVAID (1205) to a new block in the blockchain distributed ledger (600),
iv. a smart contract SealWrit (604), comprising instructions for:
A. receiving the EOI Digital Seal (1805), the UUID (204) and the UPVAID (1205) from the EOI Mgmt. Module (925), and
B. writing the EOI Digital Seal (1805), the UUID (204) and the UPVAID (1205) to a new block in the blockchain distributed ledger (600); and
c. the cloud computing system, comprising a plurality of computing services, each comprising a processor capable of executing computer-executable instructions, RAM, and a storage service, wherein the storage service comprises:
i. the PVA Generation Module (920), comprising instructions for:
A. requesting the UPVAID (1205) from the Vault Mgmt. Module (309),
B. receiving the UPVAID (1205) from the Vault Mgmt. Module (309),
C. creating a personated virtual assistant (PVA), wherein a GenericPVA (1201) is an animated 2-dimensional or 3-dimensional digital figure configured to:
I. communicate with the human user (200) and
II. perform tasks under the direction of the human user (200), and
D. transmitting securely the GenericPVA (1201) and the UPVAID (1205) to the Digital DNA implant module (922),
ii. a Digital DNA Implant Module (922), comprising instructions for:
A. receiving the GenericPVA (1201) and the UPVAID (1205) from the PVA Generation Module (920),
B. receiving authorization to proceed from the Registration Module (306),
C. receiving the Digital DNA (1400) from the Digital DNA Generation Module (307),
D. creating the UniquePVA (1202) by implanting the Digital DNA (1400) into the GenericPVA (1201), and
E. transmitting securely the UniquePVA (1202) to the HU/PVA Binding Module (923),
iii. the HU/PVA Binding Module (923), comprising instructions for:
A. receiving the human user biometric (203) from the Interface Module (303),
B. receiving the Binding Key (1212) from the Vault Mgmt. Module (309),
C. receiving the UniquePVA (1202) from the Digital DNA Implant Module (922),
D. receiving the UPVAID (1205) from the Vault Mgmt. Module (309),
E. concatenating the human user biometric (203), the binding key (1212) and the UniquePVA (1202),
F. transmitting securely the concatenation of the human user biometric (203), the binding key (1212) and the UniquePVA (1202) to a ChainHash Module (905) in the Cloud Computing System (900),
G. receiving the digital binding chain (1600) from the ChainHash module (905), and
H. transmitting securely the digital binding chain (1600) and the UPVAID (1205) to the smart contract ChainWrit (603),
iv. the ChainHash Module (905), comprising instructions for:
A. receiving the concatenation of the human user biometric (203), the binding key (1212) and the UniquePVA (1202),
B. generating the digital binding chain (1600) by hashing the concatenation of the human user biometric (203), the binding key (1212) and the UniquePVA (1202), and
C. transmitting securely the digital binding chain (1600) to the HU/PVA Binding Module (923),
v. the EOI Mgmt. Module (925), comprising instructions for:
A. receiving the EOI transcript (1800) from the Launch Initial Interaction Module (330),
B. requesting the EOI Digital Seal Key (1801) from the Vault Mgmt. Module (309),
C. receiving the EOI Digital Seal Key (1801) from the Vault Mgmt. Module (309),
D. concatenating the EOI transcript (1800) and the EOI Digital Seal Key (1801),
E. transmitting securely the concatenation of the EOI transcript (1800) and the EOI Digital Seal Key (1801) to an EOIHash Module (904) in the Cloud Computing System (900),
F. receiving the EOI digital seal (1805) from the EOIHash module (904), and
G. transmitting securely the EOI digital seal (1805) and the UPVAID (1205) to the smart contract SealWrit (604),
vi. the EOIHash Module (904), and
A. receiving the concatenation of the EOI transcript (1800) and the EOI Digital Seal Key (1801),
B. generating the EOI Digital Seal (1805) by hashing the concatenation of the EOI transcript (1800) and the EOI Digital Seal Key (1801),
C. transmitting securely the EOI Digital Seal (1805) to the EOI Mgmt. Module (925), and
vii. the Encryption Module (921).

US Pat. No. 10,715,327

SOFTWARE CREDENTIAL TOKEN ISSUANCE BASED ON HARDWARE CREDENTIAL TOKEN

Architecture Technology C...

1. A method for issuing a software credential token with reliance on a hardware credential token, the method comprising:providing a data server, wherein the data server allows access thereto via a set of hardware credential tokens;
receiving, at an authentication server for the data server, a request for a software credential token from a personal computing device, wherein the request includes an indication of a hardware credential token of the set of hardware credential tokens upon which the request relies;
obtaining, at the authentication server, an email address and a public key corresponding to the hardware credential token;
sending, from the authentication server, an email to the email address, the email including a one-time password encrypted with the public key, wherein access to the email is restricted to an individual to which the hardware credential token was issued;
receiving an inputted password from the personal computing device;
in response to determining that the inputted password matches the one-time password, issuing a software credential token to the individual,
wherein the authentication server uses the software credential token to authenticate the individual for access to the online resource without the hardware credential token.

US Pat. No. 10,715,326

SYSTEMS AND METHODS FOR MANAGING NETWORKED COMMITMENTS OF SECURE ENTITIES

3. A System-on-Chip (SoC), comprising:a processor,
a memory,
a subsystem of a plurality of any executable codes stored in the SoC and capable of being executed by the SoC processor;
an executable code management subsystem comprising a specific code executable by the SoC processor for selecting and loading into the SoC memory said any executable codes for execution by the SoC processor;
an input/output subsystem allowing the SoC to communicate with other SoCs to exchange secure messages with said other SoCs, at least certain of these secure messages containing an encrypted body and the hash of the content of an executable code,
a signature subsystem for the exchanged secure messages, capable of generating a hash of an executable code currently loaded in the SoC memory, wherein:
in response to the reception by the SoC of a secure message containing a hash while a certain executable code is loaded in the SoC memory for execution, decrypting the encrypted body of the received secure message only if the hash contained in the received message matches the hash of the executable code currently loaded in the SoC memory; and
before signing a secure message to be issued resulting from the execution of said currently loaded executable code, the said signature subsystem generates or checks the hash of said currently loaded executable code for inclusion into said secure message, thus guaranteeing that the same hash is re-propagated from a received secure message to an issued secure message generated by the currently loaded executable code and intended to be processed by the same executable code in another SoC.

US Pat. No. 10,715,325

SECURE, REAL-TIME BASED DATA TRANSFER

Siemens Aktiengesellschaf...

1. A method for real-time-based transfer of a plurality of data telegrams by a field bus in an industrial plant, without delays, from at least one verified transmitter to at least one verified receiver, the method steps comprising:(a) providing, by the transmitter, each data telegram to be transferred from the transmitter to the receiver with an additional data index;
(b) storing, by the receiver, each data telegram received from the transmitter in a memory, along with an associated additional data index;
(c) transferring, by transmitter, a data telegram that has already been transferred to the receiver a second time after one of (i) a defined time interval has elapsed and (ii) a defined number of data telegrams is transferred, the data telegram that is transferred the second time having an additional signature, and the data telegram that is transferred the second time being additionally encrypted by the transmitter;
(d) performing, by the receiver, a comparison of the signed data telegram transferred a second time with a corresponding data telegram stored in the memory after receiving the signed data telegram transferred the second time to verify the transmitter;
wherein, on each occasion during which steps a) to d) are repeated, a signed data telegram transferred from the transmitter to the receiver the second time has a data index that differs from the data index of the signed data telegram that was transferred the second time in a previous run.

US Pat. No. 10,715,324

DEVICE AND METHOD FOR SECURING COMMANDS EXCHANGED BETWEEN A TERMINAL AND AN INTEGRATED CIRCUIT

1. Method for transmitting data between a terminal and an integrated circuit, said terminal and said integrated circuit communicating by means of an interface for transmitting and receiving data, said method comprising at least one iteration of the following steps, implemented by the terminal,generating a first command intended for said integrated circuit, said first command comprising data and a first command header;
adding to said first command a first complementary piece of data, called a first piece of obfuscation data,
encrypting said data of said first command and said first command header, delivering a first encrypted command comprising the data of said first command, the first piece of obfuscation data and the first command header;
generating a second command, said second command comprising a second command header and data being constituted by said first encrypted command, said second command header being a universal and anonymous header; and
transmitting said second command to said integrated circuit via a stream of commands into which at least one decoy command is also inserted.

US Pat. No. 10,715,323

TRACEABLE KEY BLOCK-CHAIN LEDGER

EBAY INC., San Jose, CA ...

1. A computer-implemented key management method comprising:creating a cryptographic key at a key source;
generating a genesis block for a key block-chain ledger corresponding to the cryptographic key;
securely modifying the genesis block to include metadata describing the key source;
performing a first key transaction with the cryptographic key;
generating a first transaction block corresponding to the first key transaction with the cryptographic key and adding the first transaction block to the key block-chain ledger; and
securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.

US Pat. No. 10,715,322

SYSTEM AND METHOD FOR UPDATING DATA IN BLOCKCHAIN

Alibaba Group Holding Lim...

1. A computer-implemented method for updating data in blockchain, to be performed by a system for updating data in blockchain, comprising:obtaining, from a client, one or more requests for updating a plurality of pieces of data in one or more blockchains, wherein the client corresponds to one or more local accounts in the system, and the one or more requests comprise one or more unsigned blockchain transactions;
obtaining one or more blockchain addresses respectively associated with the one or more local accounts and obtaining one or more private keys respectively associated with the one or more blockchain addresses; and
updating the plurality of pieces of data in the one or more blockchains based at least on the one or more blockchain addresses and the one or more private keys by:
updating the one or more unsigned blockchain transactions respectively based on the one or more blockchain addresses,
signing, in a Trusted Execution Environment (TEE), the one or more updated blockchain transactions respectively with the one or more private keys, and
transmitting the signed one or more blockchain transactions to one or more blockchain nodes of the one or more blockchains for execution, wherein:
the one or more blockchain addresses and the one or more private keys are stored in the system and are not stored at the client.

US Pat. No. 10,715,321

PHYSICAL UNCLONABLE FUNCTION USING MESSAGE AUTHENTICATION CODE

Micron Technology, Inc., ...

1. A system comprising:at least one physical unclonable function (PUF) device;
a message authentication code (MAC) module configured to receive a first input based on at least one value provided by the at least one PUF device;
a monotonic counter configured to provide a counter value;
at least one processor; and
memory containing instructions configured to instruct the at least one processor to:
generate, based on the first input, a first output from the MAC module, wherein generating the first output comprises linking the counter value with the at least one value provided by the at least one PUF device;
after generating the first output, increment the counter value to provide an incremented value; and
generate, based on the incremented value and at least one new value provided by the at least one PUF device, a second output from the MAC module.

US Pat. No. 10,715,320

PASSWORD GENERATION WITH KEY AND DERIVATION PARAMETER

HEWLETT PACKARD ENTERPRIS...

1. A non-transitory machine-readable medium comprising executable instructions to:receive a user input string for generating an application password for a particular application;
generate a key for the particular application;
specify derivation parameters for the application password, including instructions to:
select a hash function from a set of hash functions through an indiscriminate selection process;
determine a hashing iteration value through the indiscriminate selection process; and
select a character set through the indiscriminate selection process;
generate the application password using the key and the derivation parameters; and
send the key and the derivation parameters for remote storage by:
sending the key to a first remote device; and
sending the derivation parameters to a second remote device different from the first remote device.

US Pat. No. 10,715,319

METHOD AND SYSTEM FOR SPACETIME-CONSTRAINED OBLIVIOUS TRANSFER

UNIVERSITE PARIS DIDEROT,...

1. A method for performing spacetime-constrained oblivious transfer between a party A and a party B, the method comprising:synchronizing a plurality of agents A, B, Ai, Bi to a common reference frame F in a spacetime that is at least approximately Minkowski,
wherein i?{0, 1, . . . , m?1},
wherein m corresponds to a cardinality of a plurality of messages xi from which spacetime-constrained oblivious transfer is to be performed,
wherein the agents A and Ai of the plurality of agents are associated with the party A, and
wherein the agents B and Bi of the plurality of agents are associated with the party B;
specifying output spacetime regions R0, R1, . . . , Rm?1, wherein no connection by a causal curve in spacetime exists for any pair of output spacetime regions selected from the output spacetime regions R0, R1, . . . , Rm?1;
generating random numbers r??outcome and s??basis by the agent A,
wherein different elements s of a set ?basis label different orthogonal bases of a Hilbert space, and
wherein, for any fixed s??basis, different elements r of a set ?outcome label different orthogonal quantum states |?rs from an orthogonal basis s;
generating a quantum state |?rs of a quantum system, by the agent A;
transmitting the quantum state to the agent B, by the agent A;
transmitting the random numbers r and the random numbers s to the agent Ai, by the agent A, wherein i?{0, 1, . . . , m?1};
obtaining an associated message xi??outcome by the agent Ai, wherein i?{0, 1, . . . , m?1};
encoding, by the agent Ai, the plurality of messages xi using the random numbers r to obtain an encoded ti, wherein i?{0, 1, . . . , m?1};
transmitting, by the agent Ai, the encoded ti and the random numbers s to the agent Bi at a spacetime point that is in the causal past of at least one spacetime point of an output spacetime region Ri and that is not causally connected to any spacetime point of output spacetime region Rk for any k?{0, 1, . . . , m?1}/{i}, wherein i?{0, 1, . . . , m?1};
obtaining, by the agent B, a selector input b?{0, 1, . . . , m?1};
forwarding, by the agent B, the quantum state to an agent Bb;
measuring, by the agent Bb, the quantum state in the orthogonal basis s to obtain outcome r???outcome;
and computing a received message yb??outcome by decoding an encoded xb using r? and tb, in output spacetime region Rb.

US Pat. No. 10,715,318

LIGHTWEIGHT CRYPTOGRAPHIC SERVICE FOR SIMPLIFIED KEY LIFE-CYCLE MANAGEMENT

INTERNATIONAL BUSINESS MA...

1. A method for a cryptographic service facilitating asymmetric encryption, the cryptographic service implemented on one or more computer systems, the method comprising:receiving, by the cryptographic service, one or more unique identifiers;
determining, by the cryptographic service, whether each of the one or more unique identifiers is valid;
generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid; and
sending, by the cryptographic service, a success reply including a private key for each key pair generation,
wherein the key pair enables the cryptographic service to avoid digital certificates or associated key life-cycle management for the encryption of data between a requester and one or more remote system,
wherein in the key pair comprises the private key and a public key, the private key being distributed once to a requester and the public key being provided on demand,
wherein the method of the cryptographic service provides a success reply including a public key to a remote system upon receiving the unique identifier from the remote system and validating the unique identifier received from the remote system with respect to a get request from the remote system.

US Pat. No. 10,715,317

PROTECTION OF CONFIDENTIALITY, PRIVACY AND FINANCIAL FAIRNESS IN A BLOCKCHAIN BASED DECENTRALIZED IDENTITY MANAGEMENT SYSTEM

International Business Ma...

1. A processor-implemented method of improving security in a blockchain network of devices by protecting security, privacy, and secure transfer of identity assets, wherein the blockchain network of devices supports a blockchain, and wherein the processor-implemented method comprises:creating, by an identity asset provider device, an identity asset related to an entity, wherein the identity asset provider device is utilized by an identity asset provider of the identity asset;
creating, by the identity asset provider device, a provider key, wherein the provider key is composed of multiple bits;
setting, by the identity asset provider device, a full price for the provider key, wherein the full price is for all of the multiple bits that make up the provider key;
encrypting, by the identity asset provider device, the identity asset with the provider key in order to generate an encrypted version of the identity asset;
transmitting, from the identity asset provider device to an identity asset consumer device, a first bit of the provider key and a first proof of correctness for the first bit of the provider key;
double encrypting, by the identity asset provider device a last bit of the provider key to create a last encrypted bit;
transmitting from the identity asset provider device to the blockchain network of devices, the last double encrypted bit and a second proof of correctness for the last bit of the provider key; and
transferring, from the identity asset provider device to the identity asset consumer device, subsequent bits from the provider key, wherein the subsequent bits are bits that are after the first bit of the provider key and before the last bit of the provider key.

US Pat. No. 10,715,316

SYSTEM AND METHOD FOR DELIVERING INFORMATION IN A COMMUNICATION NETWORK USING LOCATION IDENTITY

Geo Codex, LLC, Los Ange...

1. A method for controlling access to digital information, said digital information comprising a plurality of digital files, comprising:for each one of said plurality of digital files, receiving from a corresponding producer device a location identity, said location identity comprising a location value and a proximity value, said location value comprising a geographical location and said proximity value identifying a geographical region in relation to said geographical location;
storing in a memory device on a distributor device said location identity for each one of said plurality of digital files;
prompting a receiver device to provide its location to said distributor device;
receiving from said receiver device a current location of said receiver device in response to said prompting, said receiver device being operated by a user;
receiving from said receiver device a request for data;
using said current location of said receiver device and said request to select one of said plurality of files, said selected one of said plurality of digital files including said data and having a location identity that matches said current location of said receiver device; and
providing said one of said plurality of digital files to said receiver device;
wherein said one of said plurality of files is selected from said plurality of files in response to receiving said request for said data, and certain ones of said plurality of files.

US Pat. No. 10,715,315

SECURE MANAGEMENT OF CONTENT USING A MIDDLEWARE LAYER BETWEEN A CLIENT AND A SERVER

BigFork Technologies, LLC...

1. A method performed by a client application executing on a client computing device, the method comprising:generating a private key and a public key corresponding to the client application, wherein the private key is stored at the client computing device;
transmitting the public key to a middleware application executing on a middleware computing device, a server application executing on a server computing device, or both, wherein:
the client application and the server application are engaged in a trusted relationship;
receiving, at the client application, a request to perform an operation on an encrypted content that is stored at the middleware computing device and that is encrypted with the public key by the middleware application or the server application;
decrypting the encrypted content using the private key to generate a decrypted content; and
presenting the decrypted content on a display screen of the client computing device.

US Pat. No. 10,715,314

CLOUD FILE SYSTEM

PUCCINI WORLD LIMITED, W...

1. A non-transitory tangible machine-readable medium that provides instructions that, when executed by a processor of a client device, cause the processor to perform operations for saving a file to a cloud file system, wherein the cloud file system resides, at least partially, in a cloud storage system, the operations comprising:splitting the file into a plurality of chunks;
for each of the plurality of chunks, performing the following:
generating an encryption key based on data with that chunk,
encrypting that chunk using the generated encryption key,
generating a chunk identifier based on data within the encrypted chunk,
including the encryption key and the chunk identifier in a file manifest,
determining whether the cloud storage system includes the encrypted chunk, and
transmitting the encrypted chunk and chunk identifier to the cloud storage system only if it is determined that the cloud storage system does not contain the encrypted chunk;
wherein the file manifest includes a list of the encryption keys and corresponding chunk identifiers for the plurality of chunks;
generating a file manifest encryption key based on the data within the file manifest;
encrypting the file manifest using the file manifest encryption key;
generating a file manifest identifier based on data within the encrypted file manifest;
determining that the cloud storage system does not include the encrypted file manifest; and
transmitting the encrypted file manifest and the file manifest identifier to the cloud storage system responsive to the determining that the cloud storage system does not include the encrypted file manifest.

US Pat. No. 10,715,313

SYSTEMS AND COMPUTER-BASED METHODS OF DOCUMENT CERTIFICATION AND PUBLICATION

BLOCKCHAIN CERTIFIED DATA...

1. A computer-based method implemented in a document certification computer system deployed through the internet network and which interacts with a public blockchain, said document certification computer system having hardware and software resources located in at least one computer server and which are accessible through said internet network, said document certification computer system communicating via electronic data messages with at least one document issuer computer system through which a document issuer manages issuances of certified documents and at least one validator computer system through which a validator manages access rights and resources allocated to a document issuer account of said document issuer, said computer-based method comprising:generating an issuer permanent master key which is assigned to said document issuer account and stored in a first key vault,
certifying and publishing a document through an execution of a first process including generating a document persistence key which is assigned to said document and stored in a second key vault, rights to permanently erase said document persistence key being assigned to said document issuer account, encrypting document data with an encryption algorithm and an encryption key which is calculated by a key derivation function from said issuer permanent master key, said document persistence key and an intermediate key which is generated and assigned to said document, registering information including encrypted document data in said blockchain, and generating a document web address of a corresponding published certified document, said web address carrying recovery information of said document intermediate key and identification data of said published certified document,
reading said published certified document through an execution of a second process which is accessible to said web address, said second process including recovering, from said identification data, said encrypted document data in said information registered in said blockchain and an access to said first and second key vaults, calculating said encryption key with said key derivation function from said issuer permanent master key, said document persistence key and said intermediate key recovered from said web address, decrypting said encrypted document data using said encryption key and displaying said certified document using said decrypted document data, and
upon request from a legitimate holder of said published certified document, claiming a right to be forgotten, operating from said document issuer account a permanent erasure of said document persistence key, thereby rendering inoperative the execution of said second process and a display of said published certified document in said internet network.

US Pat. No. 10,715,312

SYSTEM AND METHOD FOR BLOCKCHAIN-BASED DEVICE AUTHENTICATION BASED ON A CRYPTOGRAPHIC CHALLENGE

Workday, Inc., Pleasanto...

1. A processor implemented method for blockchain-based authentication by a user device to enable a second device to perform an action on a first device on behalf of a user linked to the user device, based on a command to perform the action received from the second device, the method comprising:obtaining an identity information associated with an identity document of the user, wherein the identity information uniquely identifies the user;storing the identity information, and a set of credentials, with a blockchain to link the identity information with the set of credentials for the user, wherein the set of credentials comprise a blockchain-compatible public-private key pair associated with the user that is created using a hardware-based cryptographic processor on the user device, wherein the blockchain-compatible public-private key pair comprises a user public key and a user private key;signing a first trust certificate on the blockchain, by the user private key, to obtain a first signed trust certificate, wherein signing the first trust certificate by the user private key indicates that the user device enables the first device to perform the action on behalf of the user, wherein the first trust certificate comprises a public key of the first device which is associated with the user public key of the user device; and
signing a second trust certificate on the blockchain, by the user private key, to obtain a second signed trust certificate, wherein signing the second trust certificate by the user private key indicates that the user device enables the second device to perform the action on behalf of the user, wherein the second trust certificate comprises a public key of the second device which is associated with the user public key of the user device, wherein when the first device receives the command to perform the action from the second device, the first device receives the second trust certificate from the second device, and the first device communicates a cryptographic challenge using the public key of the second device, to the second device, wherein the second device transmits a response to the cryptographic challenge to the first device, wherein the first device checks, using the public key of the second device, whether the response matches with a predetermined correct response or not, wherein the first device authenticates the second device and executes the command to perform the action received from the second device only if the response matches with the predetermined correct response, and wherein the user device, the first device, and the second device are different devices.

US Pat. No. 10,715,311

SYSTEM AND METHOD FOR BLOCKCHAIN-BASED USER AUTHENTICATION BASED ON A CRYPTOGRAPHIC CHALLENGE

Workday, Inc., Pleasanto...

1. A processor implemented method for blockchain-based authentication of a user, using a user device, the method comprising:obtaining an identify information associated with an identity document of the user, wherein the identity information uniquely identifies the user;
storing a record with a blockchain, wherein the record comprises the identity information and a set of credentials, wherein the set of credentials comprises a public key of a blockchain-compatible public-private key pair associated with the user that is created using a hardware-based cryptographic processor on the user device, wherein the blockchain-compatible public-private key pair comprises a public key and a private key;
initiating a call to a relying party device;
receiving a request from the relying party device for an account identifier for an account associated with a relying party;
providing the account identifier to the relying party device;
obtaining a cryptographic challenge from the relying party device when the record that comprises the user identity information of the user and the set of credentials is found to be stored with the blockchain, wherein the cryptographic challenge includes a random value; and
transmitting a response to the cryptographic challenge to the relying party device, wherein the response to the cryptographic challenge includes an encrypted random value that is encrypted with the private key of the public-private key pair, wherein the relying party device checks whether the response matches with a predetermined correct response or not in part by obtaining the public key from the blockchain and decrypting the encrypted random value using the obtained public key, wherein the relying party device authenticates the user only if the response matches with the predetermined correct response.

US Pat. No. 10,715,310

METHOD AND APPARATUS FOR DECRYPTING DATA BLOCKS OF A PATTERN-ENCRYPTED SUBSAMPLE

QUALCOMM Incorporated, S...

1. A method for decrypting data blocks, comprising:receiving, by a processor, a frame of data blocks, wherein the frame includes a plurality of pattern-encrypted subsamples, and each pattern-encrypted subsample includes one or more encrypted data blocks and one or more unencrypted data blocks in accordance with a predetermined pattern;
determining, by the processor, a first buffer portion and a second buffer portion based on a number of the data blocks in the frame and the predetermined pattern;
sorting, by the processor, the data blocks by copying the encrypted data blocks into adjacent storage locations in the first buffer portion in accordance with an order of the encrypted data blocks in the frame; and
performing, by the processor, a decryption call to a crypto engine to generate corresponding decrypted data blocks using the sorted encrypted data blocks in the first buffer portion.

US Pat. No. 10,715,308

TRANSMITTING CIRCUIT, SEMICONDUCTOR APPARATUS AND SEMICONDUCTOR SYSTEM CONFIGURED TO USE THE TRANSMITTING CIRCUIT

SK hynix Inc., Icheon-si...

1. A transmitting circuit comprising:a clock generation circuit configured to receive a plurality of clock signals to generate a plurality of output clock signals and to advance a phase of rising edge of a specific clock signal among the plurality of output clock signals by sensing the logic levels of a plurality of data signals; and
a serializer configured to receive the plurality of data signals and output the plurality of data signals as output data which is serial type data in synchronization with the plurality of output clock signals.

US Pat. No. 10,715,307

EMBEDDED TIME OF DAY RECEIVER FOR CLOCK TRANSMISSION

Microsemi Semiconductor U...

1. In a receiver receiving a single input signal that includes a first signal at a first frequency modulated by data representing an encoded phase difference between a first phase of the first signal at the first frequency and a second phase of a second signal at a second frequency, a method for extracting the first signal and the second signal from the single input signal, the method comprising:receiving the single input signal;
generating a recovered first input signal from the received single input signal by extracting and phase locking the first signal with respect to the phase of a local clock internal to the receiver;
decoding over a decode frame time the data representing an encoded phase difference at the start of the decode frame time between the first signal and the second signal for both a current decode frame time and an immediately prior decode frame time;
generating a phase difference between the first signal and the second signal as a function of decoded data representing an encoded phase difference at the start of a current decode frame time and decoded data representing an encoded phase difference at the start of an immediately prior decode frame time;
subtracting the generated phase difference from the phase of the generated recovered first signal to obtain a recovered second phase of the second signal; and
generating a recovered second signal by phase locking a signal at the second frequency at the recovered second phase.

US Pat. No. 10,715,306

METHOD AND APPARATUS FOR SENDING SERVICE, METHOD AND APPARATUS FOR RECEIVING SERVICE, AND NETWORK SYSTEM

Huawei Technologies Co., ...

1. A method for sending a service, comprising:obtaining, by a transmit end device, an original data stream;
inserting, by the transmit end device, a quantity mark k into the original data stream to generate a first data stream, wherein the quantity mark k identifies a quantity of first data units in the original data stream, and k is greater than or equal to zero, wherein each data unit in the original data stream is respectively an idle unit or a non-idle unit, and each idle unit is insertable and deletable between the transmit end device and a receive end device; and
sending, by the transmit end device, the first data stream.

US Pat. No. 10,715,305

IMAGE FORMING APPARATUS PERFORMING WIRELESS COMMUNICATION WITH REPLACEMENT MEMBER, AND COMMUNICATION METHOD

KYOCERA Document Solution...

1. An image forming apparatus comprising:an antenna configured to be able to transmit and receive a radio signal;
a wireless communication portion having a storage portion that stores member data regarding a replacement member attachable to and detachable from the image forming apparatus, the wireless communication portion being provided to the replacement member, the wireless communication portion being configured to be activated in response to radiation of a radio wave from the antenna and perform wireless communication;
a transmission processing portion configured to transmit a transmission request for transmitting the member data to the wireless communication portion, by using the antenna;
a decoding processing portion configured to decode, at a predetermined reference timing in a predetermined bit period, a response signal that is transmitted from the wireless communication portion to the antenna in response to the transmission request and that includes the member data and has been encoded at the predetermined bit period;
a determination processing portion configured to determine success or failure of reception of the member data on the basis of the response signal that has been decoded by the decoding processing portion;
a change processing portion configured to change a decoding timing of the response signal to be decoded by the decoding processing portion, when the determination processing portion has determined that reception of the member data has failed; and
a retransmission processing portion configured to retransmit the transmission request to the wireless communication portion when the decoding timing has been changed by the change processing portion.

US Pat. No. 10,715,304

MODULATION METHOD AND APPARATUS APPLICABLE TO OVXDM SYSTEM, AND OVXDM SYSTEM

SHENZHEN SHEN ZHEN KUANG-...

1. A modulation method applicable to an Overlapped X Division Multiplexing (OvXDM) system, and comprising the following steps:generating an initial envelope waveform in a modulation domain based on design parameters;
subtracting a tail length of the initial envelope waveform from a width of the initial envelope waveform in the modulation domain, to obtain a virtual cutoff width of the initial envelope waveform;
dividing the virtual cutoff width of the initial envelope waveform by a first quantity of times of overlapped multiplexing, to obtain a modulation-domain shift interval;
shifting the initial envelope waveform by the modulation-domain shift interval in the modulation domain based on the first quantity of times of overlapped multiplexing, to obtain offset envelope waveforms in the modulation domain;
multiplying symbols in a to-be-modulated sequence by the offset envelope waveforms that are respectively corresponding to the symbols, to obtain modulated envelope waveforms in the modulation domain; and
superimposing the modulated envelope waveforms in the modulation domain, to obtain a complex modulated envelope waveform in the modulation domain.

US Pat. No. 10,715,303

APPARATUS AND A METHOD FOR MANAGING FULL-DUPLEX COMMUNICATION BETWEEN A BASE STATION AND A PLURALITY OF USER EQUIPMENTS

HUAWEI TECHNOLOGIES CO., ...

1. An apparatus for managing full-duplex communication between a base station and a set of user equipment, the base station comprising a plurality of transmitter antennas, the plurality of transmitter antennas being associated with a downlink communication channel H between the base station and the set of user equipment and a plurality of interference channels Gi between the base station and a plurality of neighboring base stations, the apparatus comprising a processor and a memory coupled to the processor to store instructions, which when executed by the processor, cause the processor to perform operations, the operations comprising:determining an aggregate interference channel G on the basis of the plurality of interference channels Gi;
modifying the aggregate interference channel G to obtain a modified aggregate interference channel F under a constraint that a performance measure depending on the downlink communication channel H and the modified aggregate interference channel F meets a performance measure criterion, wherein the modified aggregate interference channel F spans a subspace of a space spanned by the aggregate interference channel G; and
precoding signals to be transmitted by the plurality of transmitter antennas on the basis of a precoder matrix W, wherein the precoder matrix W depends on the modified aggregate interference channel F;
wherein modifying the aggregate interference channel G to obtain the modified aggregate interference channel F comprises removing at least one column or row of the aggregate interference channel G that is most aligned to a space spanned by the downlink communication channel H.

US Pat. No. 10,715,301

RADIO-SPECTRUM SHARING (NR-SS) IN FREQUENCY-DIVISION DUPLEXING (FDD) SPECTRUM

QUALCOMM Incorporated, S...

26. An apparatus comprising:a processor configured to:
identify a frame in a first frequency band of a frequency-division duplexing (FDD) network shared by a plurality of network operating entities, the frame including a plurality of channel sensing time slots, wherein each channel sensing time slot of the plurality of channel sensing time slots is assigned to a different network operating entity power class, and wherein the apparatus is associated with a first network operating entity of the plurality of network operating entities; and
identify a first channel sensing time slot from the plurality of channel sensing time slots based on the first network operating entity associated with a first network operating entity power class; and
a transceiver configured to:
communicate, with a second wireless communication device in the first frequency band, a reservation signal in the first channel sensing time slot to reserve the first frequency band in a transmission time slot in the frame;
communicate, with the second wireless communication device in the first frequency band, downlink (DL) data in a DL portion of the transmission time slot;
communicate, with the second wireless communication device in the first frequency band, uplink (UL) data in a UL portion of the transmission time slot; and
refrain from communicating in the first frequency band during another frame based on a reservation from another network operating entity, the another network operating entity associated with a second network operating entity power class.

US Pat. No. 10,715,300

DEMODULATION REFERENCE SIGNAL INDICATING AND RECEIVING METHODS, TRANSMIT END, AND RECEIVE END

Huawei Technologies Co., ...

1. A demodulation reference signal (DMRS) receiving method carried out by a receive end, the method comprising:receiving a DMRS indication information that indicates a code division multiplexing (CDM) group information of an antenna port, wherein the CDM group information comprises a number of CDM groups; and
assisting in demodulating a data based on the DMRS indication information,
wherein the number of CDM groups is a number of CDM groups that have a possibility of being occupied or co-scheduled in a system and that are not used for transmitting data; and
wherein a value is assigned for the number of CDM groups as follows:
a value of 1 for the number of CDM groups indicates that a CDM group 1 is occupied or co-scheduled;
a value of 2 for the number of CDM groups indicates that a CDM group 1 and a CDM group 2 are occupied or co-scheduled; and
a value of 3 for the number of CDM groups indicates that a CDM group 1, a CDM group 2, and a CDM group 3 are occupied or co-scheduled.

US Pat. No. 10,715,299

SEQUENCE GENERATION AND TRANSMISSION METHOD BASED ON TIME AND FREQUENCY DOMAIN TRANSMISSION UNIT

LG Electronics Inc., Seo...

1. A method of transmitting, by a user equipment, control information to a base station in a wireless communication system, the method comprising:determining an information symbol s representing an acknowledgement (ACK)/negative acknowledgement (NACK) to be transmitted to the base station;
determining a frequency direction sequence c(k)={c(0), c(1), . . . , c(Nk?1)}, wherein k=0, . . . , Nk?1 is a frequency domain subcarrier index and Nk is equal to a number of subcarriers included in a resource block allocated for an uplink control channel;
determining a time direction sequence x(n)={x(0), x(1), . . . , x(Nn?1)}, wherein n=0, . . . , Nn?1 is a time domain symbol index and Nn is equal to a number of orthogonal frequency division multiplexing (OFDM) symbols for the ACK/NACK to be transmitted through the uplink control channel except for OFDM symbols having pilot signals associated with the uplink control channel;
generating Nk*Nn information symbols s(k, n) based on s(k, n)=s*c (k)*x(n); and
transmitting the Nk*Nn information symbols s(k, n) to the base station through the uplink control channel using Nk subcarriers included in the resource block in a frequency domain and Nn OFDM symbols for the ACK/NACK in a time domain.

US Pat. No. 10,715,298

ENHANCED RESOURCE MAPPING SCHEME

21. At least one non-transitory machine readable storage medium having instructions embodied thereon for an eNodeB to communicate with a User Equipment (UE), the instructions when executed cause the eNodeB to:process reference signals to form an OFDM symbol comprising a DeModulation Reference signal (DM-RS) for a first antenna port (AP) multiplexed in a physical resource block with a DM-RS for a second AP, and a DM-RS for a third AP multiplexed in the physical resource block with a DM-RS for a fourth AP;
process, for transmission to the UE, the OFDM symbol using an extended physical downlink control channel (xPDCCH);
signal, by higher layers via a UE specific dedicated RRC signalling, a configuration of the xPDCCH transmission having one of N xPDCCH sets including whether the one of N xPDCCH sets is either localized or distributed; and
define L extended control channel element (xCCE) as an aggregation level for one xPDCCH message, wherein L is a positive integer and a number of xPDCCH transmission candidates are dependent on the aggregation level.

US Pat. No. 10,715,296

METHOD AND APPARATUS FOR ALLOCATING AND TRANSMITTING TIME AND FREQUENCY RESOURCE FOR RESOURCE REQUEST INDICATOR

HUAWEI TECHNOLOGIES CO., ...

1. An apparatus, comprising:a storage medium including executable instructions; and
a processor;
wherein the executable instructions, when executed by the processor, cause the apparatus to:
allocate a first code set for a resource request indicator (RRI) of a first terminal device, wherein the RRI comprises a first part and a second part, and the first code set comprises a first code allocated for the first part of the RRI, a second code allocated for the first part of the RRI, a third code allocated for the second part of the RRI and a fourth code allocated for the second part of the RRI, each of the foregoing first through fourth codes of the first code set being allocated to the first user terminal for a time slot; and
allocate a second code set for a non-RRI uplink control signaling of a second terminal device, wherein the non-RRI uplink control signaling comprises a pilot part and a data part, and the second code set comprises a first code allocated for the pilot part of the non-RRI uplink control signaling, a second code allocated for the pilot part of the non-RRI uplink control signaling, a third code allocated for the data part of the non-RRI uplink control signaling and a fourth code allocated for the data part of the non-RRI uplink control signaling, each of the foregoing first through fourth codes of the second code set being allocated to the second user terminal for the time slot; and
receive the RRI using the first code set and the non-RRI uplink control signaling using the second code set, wherein
the first part of the RRI and the pilot part of the other uplink control signaling are multiplexed in a same time and frequency resource of the time slot in a code division manner;
the second part of the RRI and the data part of the other uplink control signaling are multiplexed in a same time and frequency resource of the time slot in a code division manner;
at least one of the first code and the second code of the first code set is orthogonal to the corresponding codes allocated for the pilot part of the non-RRI uplink control signaling, and
at least one of the third code and the fourth code of the code set is orthogonal to the corresponding codes allocated for the data part of the non-RRI uplink control signaling.

US Pat. No. 10,715,295

METHOD AND APPARATUS FOR ENCODING AND PROCESSING ACKNOWLEDGEMENT INFORMATION

HUAWEI TECHNOLOGIES CO., ...

1. A method for encoding acknowledgement information, comprising:generating acknowledgement information bits corresponding to each component carrier in at least one component carrier, wherein the each component carrier in the at least one component carrier comprises at least one downlink subframe;
ordering the acknowledgement information bits as following:
placing acknowledgement information bits into last N_sps×a bit positions, with the acknowledgement information bits corresponding to N_sps physical downlink shared channels (PDSCHs) scheduled by semi-persistent scheduling, wherein N_sps indicates the number of PDSCHs scheduled by downlink semi-persistent scheduling (SPS) in the at least one downlink subframe;
placing acknowledgement information bits into first DAI_max×a bit positions, with the acknowledgement information bits corresponding to downlink subframes corresponding to downlink control information (DCI) of DAI=1 to DAI=DAI_max, wherein the DAI indicates value of a downlink assignment index (DAI) field in DCI which is received on the each component carrier and used for controlling PDSCH transmission or indicating SPS release, DAI_max indicates a maximum value of the DAI field in DCI; and
setting the remaining (D×a?(DAI_max+N_sps)×a) acknowledgement information bits to ‘0’;
wherein the a is a bit number of acknowledgement information bits corresponding to each of the downlink subframes and the D is a number of downlink subframes for which the acknowledgement information bits need to be generated;
alternately assigning the ordered acknowledgement information bits corresponding to the each component carrier to two groups and obtaining two groups of acknowledgement information bits;
encoding the two groups of acknowledgement information bits to obtain two groups of codeword bits, respectively, and generating a total codeword bits to be transmitted from the two groups of codeword bits; and
transmitting the total codeword bits to a receiver.

US Pat. No. 10,715,294

METHOD AND APPARATUS FOR SENDING AND RECEIVING CONTROL CHANNEL IN WIRELESS COMMUNICATION SYSTEM

Samsung Electronics Co., ...

1. A method for transmitting downlink control information by a base station in a communication system, the method comprising:transmitting, to a terminal using higher layer signaling, configuration information for identifying a control resource, the configuration information including a number of symbols associated with the control resource;
generating the downlink control information including information on at least one resource block to be used for data transmission or data reception of the terminal; and
transmitting, to the terminal on a physical downlink control channel (PDCCH), the downlink control information through the control resource identified based on the number of symbols included in the configuration information.

US Pat. No. 10,715,293

DMRS INDICATION METHOD AND SYSTEM, BASE STATION AND USER EQUIPMENT

CHINA MOBILE COMMUNICATIO...

1. A method for indicating a De Modulation Reference Signal (DMRS), applying to a Base Station (BS), the method comprising:allocating a designated DMRS port, a number of layers, and a length of Orthogonal Cover Codes (OCC) according to a table of DMRS configuration parameters, wherein the table of DMRS configuration parameters comprises entries indicating DMRS configuration parameters of combinations of at least two lengths of OCCs; and
sending a DMRS indication generated corresponding to information on DMRS configuration parameters allocated,
wherein the table of DMRS configuration parameters comprises entries indicating DMRS configuration parameters for one-codeword transmission and entries indicating DMRS configuration parameters for two-codeword transmission,
wherein the entries indicating DMRS configuration parameters for one-codeword transmission comprise four entries indicating DMRS configuration parameters for one-layer transmission with a length of the OCCs of 2, eight entries indicating DMRS configuration parameters for one-layer transmission with a length of the OCCs of 4, three entries indicating DMRS configuration parameters for two-layer to four-layer retransmission with the length of the OCCs of 4, and a reserved entry,
wherein the entries indicating DMRS configuration parameters for two-codeword transmission comprise two entries indicating DMRS configuration parameters for two-layer transmission with the length of the OCCs of 2, four entries indicating DMRS configuration parameters for two-layer transmission with the length of the OCCs of 4, six entries indicating DMRS configuration parameters for Single-User (SU) three-layer to eight-layer transmission with the length of the OCCs of 4, and a reserved entry.

US Pat. No. 10,715,292

TECHNIQUES FOR TRANSMITTING A PHYSICAL UPLINK SHARED CHANNEL IN AN UPLINK PILOT TIME SLOT

QUALCOMM Incorporated, S...

1. A method for wireless communication at a user equipment (UE), comprising:identifying a physical uplink shared channel (PUSCH) to transmit in an uplink pilot time slot (UpPTS) of a subframe;
determining a first timing for transmitting the PUSCH in the UpPTS based at least in part on a scheduling timing for the PUSCH, wherein the scheduling timing is based at least in part on a latency reduction capability of the UE;
determining that a second timing associated with transmitting uplink control information (UCI) satisfies a threshold, wherein the threshold is based at least in part on a difference between the first timing and the scheduling timing;
determining whether to transmit the UCI on the PUSCH in the UpPTS based at least in part on the second timing; and
transmitting the PUSCH in the UpPTS based at least in part on determining whether to transmit the UCI.

US Pat. No. 10,715,290

APPARATUS AND METHOD FOR BEAM MANAGEMENT BASED ON CHANNEL STATE INDICATOR-REFERENCE SIGNAL

KT CORPORATION, Gyeonggi...

1. A method for a user equipment (UE) to receive a channel state indicator (CSI)-reference signal (RS) from a base station (BS), the method comprising:receiving configuration information of a CSI-RS resource set including one or more CSI-RS resources; and
receiving a CSI-RS from the BS through CSI-RS resources included in the CSI-RS resource set,
wherein the configuration information of the CSI-RS resource set includes indication information that indicates beam configurations for the respective CSI-RS resources included in the CSI-RS resource set,
wherein one of the CSI-RS resources in the CSI-RS resource set is composed of a symbol different from that of the others in the CSI-RS resource set, and
wherein each of the CSI-RS resources is composed of one symbol.

US Pat. No. 10,715,289

APPARATUS AND METHOD FOR ALLOCATING CHANNEL STATE INFORMATION-REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM

PANTECH CORPORATION, Seo...

1. A communication method, comprising:receiving, at a user equipment (UE), at least a part of a subframe from an eNB, wherein the subframe consists of resource elements arranged in frequency and time domain;
obtaining, at the UE, a first Cell State Information Reference Signal (CSI-RS) from a first resource element of the subframe;
obtaining, at the UE, a second CSI-RS from a second resource element of the subframe, wherein the first resource element and the second resource element are adjacent to each other;
measuring, at the UE, channel state at least based on one of the first CSI-RS and the second CSI-RS;
receiving, at the UE, at least a part of another subframe from the eNB, wherein the subframe is transmitted by a first antenna port and the another subframe is transmitted by a second antenna port, and the subframe and the another subframe are transmitted simultaneously;
obtaining, at the UE, a third CSI-RS from a third resource element of the another subframe;
obtaining, at the UE, a fourth CSI-RS from a fourth resource element of the another subframe,
wherein:
a location of the first resource element in the subframe in frequency and time domain is same as a location of the third resource element in the another subframe in frequency and time domain; and
a location of the second resource element in the subframe in frequency and time domain is same as a location of the fourth resource element in the another subframe in frequency and time domain; and
transmitting, at the UE, the measured channel state to the eNB.

US Pat. No. 10,715,288

WIRELESS LOCAL AREA NETWORK SOUNDING PROTOCOL

Apple Inc., Cupertino, C...

1. A method of determining first and second resource allocations between an access point (AP) and a first station (STA) and a second STA, the method comprising:by the AP:
sounding during a first joint sounding and data epoch: i) a first channel between the AP and the first STA, and ii) a second channel between the AP and the second STA;
exchanging data during a first data epoch, wherein the first STA and the second STA use respectively first and second resource allocations, and wherein the first and second resource allocations are based on the sounding during the first joint sounding and data epoch; and
refreshing the first and second resource allocations based at least in part on sounding during a second joint sounding and data epoch,
wherein the first joint sounding and data epoch begins at a first time, the second joint sounding and data epoch begins at a second time, and a difference between the second time and the first time is not greater than a channel coherence time, and
wherein the sounding comprises:
sending to each STA downlink (DL) medium access control (MAC) data frames comprising DL data,
receiving from each STA composite uplink (UL) MAC frames that combine UL data with DL measurement reports determined based on measurements of the DL data in the DL MAC data frames,
estimating DL paths to each STA based on the received DL measurement reports, and
estimating UL paths from each STA based on measurements of the UL data in the received composite UL MAC frames.

US Pat. No. 10,715,287

COMMUNICATION APPARATUS AND CONTROL INFORMATION RECEIVING METHOD

Sun Patent Trust, New Yo...

1. An integrated circuit for a communication apparatus communicating with a base station, the integrated circuit comprising:receiving circuitry, which, in operation, controls reception of control information, which is one of first control information including downlink resource assignment information or second control information including uplink resource assignment information; and
processing circuitry, which, in operation:
determines a size of control information, which has been adjusted by the base station such that in a case where at least one of (i) a number of antenna port(s) of the communication apparatus or (ii) a number of antenna port(s) of the base station is one, a size of the second control information with a format including no precoding matrix indicator (PMI) has been adjusted by the base station as being equal to a size of the first control information with a format including no PMI, and a size of the second control information with a format including the PMI has been adjusted by the base station as being different from a size of the first control information; and
detects whether the control information is addressed to the communication apparatus or not based on the determined size of control information and detects whether the control information is the first control information or the second control information.

US Pat. No. 10,715,286

SEPARATE REPORTING OF RF AND BB CAPABILITIES OF A MOBILE USER EQUIPMENT IN A WIRELESS COMMUNICATIONS SYSTEM SUPPORTING CARRIER AGGREGATION

Telefonaktiebolaget LM Er...

1. A method of communicating carrier aggregation (CA) capabilities from User Equipment (UE) to a node in a wireless communication network, the method comprising:separately transmitting, to the node, CA capabilities relating to the UE radio frequency (RF) operation and CA capabilities relating to the UE baseband (BB) operation;
wherein the RF capabilities comprise a number of supported frequency bands and a number of MIMO layers supported; and
wherein the BB capabilities comprise an indication of the aggregated bandwidth supported and an indication of the Channel State Information (CSI) process complexity supported.

US Pat. No. 10,715,285

SYSTEMS AND METHODS FOR PARTIAL COLLISION MULTIPLE ACCESS

HUAWEI TECHNOLOGIES CO., ...

1. A method of transmitting data at a transmitter device, comprising:determining a sequence pattern from a group of sequence patterns, wherein the group of sequence patterns comprise a first, second, third, and fourth sequence pattern, and each of the four sequence patterns comprises at least two non-zero elements indicating resource elements associated with the corresponding sequence pattern;
wherein a first specific non-zero element of the first sequence pattern indicates a first resource element of a first resource element block, and a second specific non-zero element of the first sequence pattern indicates a second resource element of the first resource element block; wherein a first specific non-zero element of the second sequence pattern indicates a first resource element of a second resource element block, and a second specific non-zero element of the second sequence pattern indicates a second resource element of the second resource element block;
wherein the first resource elements of the first and second resource element blocks have a same resource element position in each of the first and second resource element blocks, and the second resource elements of the first and second resource element blocks have a same resource element position in each of the first and second resource element blocks;
wherein a first specific non-zero element of the third sequence pattern indicates the first resource element of the first resource element block, and a second specific non-zero element of the third sequence pattern indicates the second resource element of the second resource element block;
wherein a first specific non-zero element of the fourth sequence pattern indicates the second resource element of the first resource element block, and a second specific non-zero element of the fourth sequence pattern indicates the first resource element of the second resource element block;
mapping the data to the at least two resource elements indicated by the two non-zero elements of the determined sequence pattern; and
sending the mapped data.

US Pat. No. 10,715,284

REQUESTING RETRANSMISSION OF DATA IN A MULTICAST NETWORK

MITSUBISHI ELECTRIC CORPO...

1. A method of requesting retransmission of a lost data packet initially transmitted by a multicast transmitter in a network, the multicast transmitter multicasting data packets in the network, the method comprising:upon detection of a loss of at least one data packet on a data link between the multicast transmitter and a first multicast receiver, setting a timer value and arming a timer;
upon detection that the timer reaches the set timer value, sending a non-acknowledgment message to the multicast transmitter via an uplink control link, the non-acknowledgment message comprising an identifier of at least one lost data packet, if it has not been previously retransmitted by the multicast transmitter and received by the first multicast receiver; and
receiving a loss report message on a multicast downlink control link from the multicast transmitter, the loss report message identifying data packets to be retransmitted by the multicast transmitter in association with a transmission mode among the unicast mode and the multicast mode,
wherein if a given data packet is identified to be retransmitted in multicast mode and if the given data packet belongs to the detected at least one lost data packet, then the non-acknowledgment message does not comprise the identifier of the given data packet, and
wherein if a given data packet is identified to be retransmitted in unicast mode and if the given data packet belongs to the detected at least one lost data packet, then the non-acknowledgment message at least comprising the identifier of the given data packet is transmitted to the multicast transmitter without waiting for the timer to reach the set timer value.

US Pat. No. 10,715,283

APPARATUS AND METHOD OF TRANSMITTING AND RECEIVING HARQ ACK/NACK INFORMATION FOR NEW RADIO

KT CORPORATION, Gyeonggi...

1. A method of transmitting hybrid automatic repeat request (HARQ) information for a downlink (DL) data channel, by a user equipment, the method comprising:receiving, from a base station, HARQ timing indication information for a plurality of the downlink channels;
receiving, from the base station, uplink (UL) control channel resource indication information for HARQ feedback to each DL data channel; and
transmitting the HARQ information through one or the plurality of the UL control channels indicated by the UL control channel resource indication information in the same slot when the HARQ timing indication information indicates the same slot,
wherein the HARQ timing indication information and the UL control channel resource indication information are received through DL control information, respectively,
wherein when the UL control channel resources indicated by the UL control channel resource indication information are allocated in the same slot for the plurality of the HARQ feedback, the HARQ information is transmitted through one UL control channel in one of the UL control channel resources, and
wherein the one UL control channel resource is the UL control channel resource indicated by a last DL control information among the plurality of the DL control information which includes the UL control channel resource indication information.

US Pat. No. 10,715,282

METHOD AND RELATED DEVICE FOR IMPROVING TCP TRANSMISSION EFFICIENCY USING DELAYED ACK

HUAWEI TECHNOLOGIES CO., ...

1. A data transmission method, comprising:receiving K packets using a first protocol, wherein each packet comprises a sequence number, and the K packets are a subset of L packets sent by a transmit end;
determining a second sending delay based on a target packet when it is detected that the target packet is lost using the first protocol based on sequence numbers in the K packets, wherein the second sending delay is greater than a first sending delay, and the first sending delay is preset;
sending an acknowledgement (ACK) message to the transmit end using the first protocol based on the second sending delay, wherein the ACK message is used to notify the transmit end that a receive end has received the L packets;
sending a retransmission request for the target packet to the transmit end using a second protocol; and
receiving, using the second protocol, the target packet retransmitted by the transmit end.

US Pat. No. 10,715,281

ASYNCHRONOUS RETRANSMISSION PROTOCOL

Panasonic Intellectual Pr...

1. An apparatus for transmitting data over a physical uplink shared channel in a wireless communication system using an asynchronous hybrid automatic repeat request, HARQ, the apparatus comprising:a first timer configured to start upon uplink data transmission and expire after a first predetermined time;
a second timer configured to start upon expiry of the first timer and to expire after a second predetermined time;
a receiver for receiving downlink control information including a positive acknowledgement for the uplink data transmission or retransmission, or a resource assignment accompanied by a field for distinguishing between a new transmission and a retransmission, wherein the resource assignment accompanied by the field indicating the retransmission indicates that uplink data of the uplink data transmission has not been successfully decoded, and wherein the receiver is configured to perform the receiving only when the first timer is expired and the second timer is running; and
a transmitter for performing HARQ retransmission of the uplink data according to the received resource assignment in the physical uplink shared channel upon receiving the resource assignment,
wherein the second timer is further configured to stop upon receiving the positive acknowledgement.

US Pat. No. 10,715,280

METHOD AND APPARATUS FOR DETERMINING A FEEDBACK TIME SEQUENCE, AND DEVICE AND STORAGE MEDIUM

China Mobile Comm. Co., L...

1. A method for determining a hybrid automatic repeat request (HARQ) feedback timing, comprising:determining a configuration of a currently-used time division duplex (TDD) frame structure;
determining a length of a currently-used transmission time interval (TTI); and
determining, according to the configuration of the TDD frame structure and the length of the TTI, a relative position association between a data transmission TTI and a feedback TTI of the data transmission TTI in an HARQ process, or a relative position association between an initial transmission TTI, a feedback TTI and a retransmission TTI in an HARQ process,
wherein in each radio frame, numbering sequentially all TTIs comprised in the radio frame; the relative position association between the feedback TTI and the data transmission TTI comprises an TTI interval between the feedback TTI and the data transmission TTI,
or,
wherein in each subframe, numbering sequentially all TTIs comprised in the subframe; the relative position association between the feedback TTI and the data transmission TTI comprises: a subframe interval between the feedback TTI and the data transmission TTI, a number of the feedback TTI in a subframe where the feedback TTI is located, and a number of the data transmission TTI in a subframe where the data transmission TTI is located.

US Pat. No. 10,715,279

METHODS OF GUARANTEED RECEPTION OF COMMON SIGNALS IN AN AVIONICS SYSTEM COMPRISING A PLURALITY OF ELECTRONIC COMPUTERS

THALES, Courbevoie (FR)

1. A method of guaranteed reception and of processing of an external event in the form of a digital signal in an avionics system comprising a plurality of electronic computers linked together by a data bus, each computer comprising data processing electronics, wherein each electronic computer comprises one and the same software layer, which, on receipt of an external event, carries out the following steps:at a first instant, sending, to each of the other electronic computers, a first signal (ACK) attesting the reception of said external event by said electronic computer, one and only one of the electronic computers sending a stamp representative of said first instant;
at a second instant termed “TimeOut ACK”, when said electronic computer has not received at least one of the first signals emanating from one of the other electronic computers, sending a second failure signal (FAIL) to each of the other electronic computers attesting the absence of reception of said first signal; and
at a third instant termed “TimeOut GUARANTEED”, when a second failure signal has been received by said electronic computer, not taking into account the external event by said plurality of electronic computers, and when no failure signal has been received by said electronic computer, taking into account the external event, according to a temporal order defined by the stamp, by the data processing electronics of said electronic computer,
wherein the external event is external with respect to the plurality of electronic computers, and
wherein the plurality of electronic computers operating in a cyclic manner, a number of cycles elapsing between reception of a physical event, and taking into account by various processing electronics of the electronic computers is of the order of five.

US Pat. No. 10,715,278

TRANSCODING WIRELESS COMMUNICATION SYSTEM

Purdue Research Foundatio...

1. A method of operating a communication relay node, comprising:configuring the communication relay node to receive a signal vector that represents a message encoded by one or more codeword sets;
configuring the communication node to remap a subpacket vector parsed from the received signal vector for transmission over a second communication link;
receiving the signal vector;
parsing the received signal vector into a plurality of subpacket vectors, wherein the respective lengths of the subpacket vectors are less than a length of the received signal vector;
remapping each of the subpacket vectors to one or more transmission vector such that the relationship between the sub-packet vectors and the one or more transmission vector comprises a one-to-one relationship or a one-to many-relationship;
transmitting the one or more transmission vectors over a communication link.

US Pat. No. 10,715,277

SYSTEMS AND METHODS FOR PROVIDING RESILIENCE TO LTE SIGNALING INTERFERENCE IN WIFI

Cable Television Laborato...

1. A method for enhancing operation of a wireless communication device operating in a conflicting signaling environment, comprising:detecting errors in first unlicensed communications between the wireless communication device and an external device;
determining that the errors are periodic; and
in response to determining that the errors are periodic, changing error correction implemented by the wireless communication device.

US Pat. No. 10,715,276

BANDWIDTH CONSTRAINED COMMUNICATION SYSTEMS WITH OPTIMIZED LOW-DENSITY PARITY-CHECK CODES

NTWINE, LLC, La Jolla, C...

1. A bandwidth constrained equalized transport (BCET) communication system, comprising:a transmitter that transmits a signal, comprising:
an error control code encoder;
a pulse-shaping filter; and
a first interleaver;
a communication channel that transports the signal; and
a receiver that receives the signal, comprising:
a receiving filter;
an information-retrieving equalizer;
a deinterleaver with an error control code decoder; and
a second interleaver;
wherein:
the error control code encoder appends redundant information onto the signal;
the pulse-shaping filter intentionally introduces memory into the signal in the form of inter-symbol interference;
the receiving filter is matched to the pulse-shaping filter;
the information-retrieving equalizer is a trellis-based equalizer;
the information-retrieving equalizer, the second interleaver, and the deinterleaver with the error control code decoder are joined in an iterative turbo equalization loop;
the communication system is bandwidth constrained;
the error control code encoder is a low-density parity-check (LDPC) error control code encoder;
the error control encoder comprises code that is optimized based on the intentionally introduced memory into the signal, a code rate, a signal-to-noise ratio, and an equalizer structure in the receiver; and
the signal comprises an information rate that is higher than for an equivalent system without intentional introduction of the memory at the transmitter.

US Pat. No. 10,715,275

CONFIGURING CHANNEL QUALITY INDICATOR FOR COMMUNICATION SERVICE CATEGORIES IN WIRELESS COMMUNICATION SYSTEMS

1. A method, comprising,configuring, by a network device comprising a processor, a user equipment to report channel quality information in a channel state information report, wherein the channel quality information comprises first channel quality information based on a first block error rate threshold value corresponding to an ultra-reliable low latency communication and second channel quality information based on a second error rate threshold value corresponding to enhanced mobile broadband communication;
receiving, by the network device, the channel state information report from the user equipment; and
scheduling, by the network device, the user equipment for the ultra-reliable low latency communication based on the first channel quality information.

US Pat. No. 10,715,273

JOINT CHANNEL ESTIMATION AND DATA DETECTION TECHNIQUE TO DECODE 5G UPLINK CONTROL CHANNEL

14. A method, comprising:receiving, by a network node device comprising a processor, an uplink control channel transmission from a mobile device;
facilitating, by the network node device, a channel estimation of the uplink control channel transmission based on a matching subcarrier symbol in both a first sequence corresponding to signaling of a hybrid automatic repeat request acknowledgement by the mobile device, and a second sequence corresponding to signaling of a hybrid automatic repeat request negative acknowledgement by the mobile device, the first sequence and the second sequence being transmitted to the mobile device by the network node device; and
decoding, by the network node device, the uplink control channel transmission based on a result of the channel estimation.

US Pat. No. 10,715,272

SIGNAL PROCESSING METHOD AND DEVICE

Huawei Technologies Co., ...

1. A signal processing method comprising:receiving, by a radio network controller, first soft information associated with a first encoded signal and a first cyclic redundancy check (CRC),
wherein the first soft information is sent by a first base station and results from decoding a first subflow of the first encoded signal, and
wherein the first encoded signal originates from a mobile station and the first soft information is a likelihood probability value and comprises first soft information associated with the first subflow;
obtaining, by the radio network controller, a selective combining result of the first subflow by performing selective combining according to (a) a result of the first CRC and (b) a result of a second CRC obtained from decoding of the first subflow in a second encoded signal received from a second base station; and
in response to the selective combining result indicating either the first or second CRC is incorrect, determining, by the radio network controller, a soft combining result of the first subflow according to the first soft information from the first base station and first soft information from the second base station.