Follow us on Twitter
twitter icon@FreshPatents

Den patents

Bulk PDF Downloads
      

This page is updated frequently with new Den-related patent applications.




 Two-phase cooling with ambient cooled condensor patent thumbnailTwo-phase cooling with ambient cooled condensor
An apparatus for cooling a computer system includes a primary cooling loop. The primary cooling loop includes an evaporator configured to cool at least a component of the computer system, an ambient cooled condenser connected to the evaporator, a first pump to provide a coolant flow within the cooling loop, a pressure regulator configured to maintain a selected pressure in the primary cooling loop, and a controller responsive to changes in outdoor ambient conditions and an amount of heat dissipated by the computer system and configured to dynamically adjust the pump and pressure regulator in response thereto..
International Business Machines Corporation


 Radiation source patent thumbnailRadiation source
A radiation system to generate a radiation emitting plasma, the radiation system include a fuel emitter to provide a fuel target at a plasma formation region, a first laser arranged to provide a first laser beam at the plasma formation region incident on the fuel target to generate a radiation emitting plasma, an imaging device arranged to obtain a first image of the radiation emitting plasma at the plasma formation region, the first image indicating at least one image property of the radiation emitting plasma, and a controller. The controller is arranged to receive the first image, and to generate at least one instruction based on the at least one image property of the radiation emitting plasma to modify operation of at least one component of the radiation system to reduce a detrimental effect of debris..
Asml Netherlands B.v.


 Data transfer using non-radio frequency (rf) and rf signals patent thumbnailData transfer using non-radio frequency (rf) and rf signals
Certain aspects of the present disclosure provide methods and apparatuses for wireless communications between devices. An example method generally includes obtaining, via a non-audible signal, identification information, and using the identification to establish a connection, via a radio access technology (rat), with a second device for transferring data between the first device and the second device via the rat..
Qualcomm Incorporated


 Methods for a link recovery of a wireless network and respective devices patent thumbnailMethods for a link recovery of a wireless network and respective devices
The method for a link recovery of a wireless network including an access point and a station, comprises the steps of: providing a reserve wireless network on the access point;installing a connection profile on the station for the reserve wireless network; after a connection loss in the wireless network,connecting the station to the access point via the reserve wireless network; the station requesting new security credentials from the access point via the reserve wireless network for a link recovery with the access point; the access point announcing new security credentials to the station via the reserve wireless network; and upon reception of the new credentials, the station reconfiguring its profile and triggering a link reconnect for the wireless network.. .
Thomson Licensing


 Device-to-device discovery and control in a wide area network patent thumbnailDevice-to-device discovery and control in a wide area network
The disclosure relates to a method for discovery of one or more devices of a group of devices to establish a direct connection between at least two devices of the group of devices over a wide area network. The wide area network contains or is connected to a discovery server system.
Nederlandse Organisatie Voor Toegepast-natuurweten Schappelijk Onderzoek Tno


 Data distribution method, data distribution device and heterogeneous network patent thumbnailData distribution method, data distribution device and heterogeneous network
The present invention relates to the field of communication technology, and particularly to a data distribution method, a data distribution device and a heterogeneous network. The data distribution method comprises: obtaining, via a data distribution device, cellular network access information and wireless local area network access identification information of a user terminal; obtaining, via the data distribution device, cellular network status information and wireless local area network status information; and judging, in combination of the obtained information and distribution policy, that downlink service is required to be distributed to a wireless local area network by the data distribution device, and guiding a data package in the downlink service needed to be distributed, to be distributed to the wireless local area network and transmitted to the user terminal.
Chengdu Skspruce Technology, Inc.


 Method of radio bearer transmission in dual connectivity patent thumbnailMethod of radio bearer transmission in dual connectivity
A method of radio bearer transmission in dual connectivity for a network in a long term evolution (lte) system is disclosed. The method comprises generating at least a packet data convergence protocol protocol data unit (pdcp pdu) by a pdcp entity of the network corresponding to a radio bearer (rb), and assigning each pdcp pdu with an identity, wherein the identity indicates which pdcp entity the pdcp pdu belongs to..
Acer Incorporated


 Wireless communication device and method patent thumbnailWireless communication device and method
A wireless communication device includes a memory and a processor coupled to the memory and configured to receive, from a first device, a first identifier identifying the first device, the first device having a function of performing wireless communication, determine which of a first connection scheme and a second connection scheme is employed for the wireless communication based on the first identifier, the second connection scheme performing a connection after execution of selection processing in which the processor determines whether or not the wireless communication is started between the first device and the wireless communication device, and the first connection scheme performing the connection without the execution of the selection processing, and perform the connection between the wireless communication device and the first device using one of the first connection scheme and the second connection scheme in accordance with a result of a determination.. .
Fujitsu Limited


 Method and  mapping identities to device-to-device synchronization sequences patent thumbnailMethod and mapping identities to device-to-device synchronization sequences
In one aspect of the teachings herein, device-to-device, d2d, synchronization signals are generated as a function of an abbreviated identifier associated with the d2d synchronization signals, e.g., the abbreviated identifier serves as a synchronization reference identifier or as an abbreviated device identifier for the wireless device transmitting the d2d synchronization signals. Advantageously, the abbreviated identifier is derived from a full identifier, e.g., a full-length device identifier taken from a full identifier space that is larger than the numeric range represented by the abbreviated identifier space.
Telefonaktiebolaget Lm Ericsson (publ)


 Methods and systems for managing a connection between electronic devices patent thumbnailMethods and systems for managing a connection between electronic devices
Methods and systems for managing a connection between electronic devices are provided. First, a first electronic device generates a specific signal, wherein the specific signal includes a specific code and identification data corresponding to the first electronic device.
Noodoe Corporation


Method for continuously providing emergency call service through packet network


A method and a device for maintaining an emergency call service through a packet network in a mobile communication network are provided. Ue using volte receives identification information indicating whether an ims voice over ps (vops) is supported from a network to determine whether the ims vops of the network is supported, and processes paging for a cs voice call according to the determination result if the emergency call service continues through the packet network..
Samsung Electronics Co., Ltd.


Communication control device, communication control method, and base station


Provided is communication control device including a determination unit which determines whether an access type of a small cell which at least partially overlaps a macro cell of a radio communication system is a closed access type or an open access type, an identification unit which, when it is determined that the access type of the small cell is the closed access type, identifies a user terminal of the macro cell which should be protected from interference caused by a radio signal from the small cell, and an interference control unit which transmits an interference control signal to a base station of the small cell so that the interference on the user terminal identified by the identification unit is reduced.. .
Sony Corporation


Location-controlled wi-fi module


A system and method of controlling wi-fi module operation based on vehicle location includes: detecting at a vehicle a geopolitical identifier broadcast by a wireless carrier system; determining whether operational settings of the wi-fi module conform to operational settings specified for the detected geopolitical identifier; and changing the operational settings of the wi-fi module when not conforming to the operational settings specified for the detected geopolitical identifier.. .
Gm Global Technology Operations Llc


Terminal device and mobile radio communication by terminal device


A method of performing uplink mobile communications may include identifying a first uplink data and a second uplink data, wherein the first uplink data has a higher transmission priority than the second uplink data, and evaluating a plurality of candidate uplink channels to generate a plurality of uplink channel quality measures. Each of the plurality of uplink channel quality measures may be associated with one of the plurality of candidate uplink channels.
Intel Ip Corporation


Method and application recognition qos-differentiated device-to-device communication in wireless communication system


The present invention relates to a device-to-device (d2d) communication method and an apparatus therefor. A device-to-device communication method according to an embodiment of the present invention may comprise the steps of: transmitting, to a base station, a device-to-device communication registration request message including identification information and interest information of a device-to-device communication service; receiving, from the base station, a device-to-device communication registration response message including device-to-device communication resource information which has been allocated according to the identification information of the device-to-device communication service; and transmitting a device-to-device communication signal using the allocated device-to-device communication resource.
Samsung Electronics Co., Ltd


Method and device for transmitting device-to-device discovery signal


Disclosed are method and device for transmitting a d2d discovery signal. The method may include determining, by a ue, system discovery resources; determining a discovery resource set desired for the transmission of the d2d discovery signal; and transmitting the d2d discovery signal through physical resources corresponding to the determined discovery resource set.
China Academay Of Telecommunication Technology


Satellite beam power backoff


A method and apparatus for a non-geosynchronous orbit (ngso) satellite to comply with equivalent power flux density (epfd) limits are disclosed. The example implementations may allow a constellation of ngso satellites to comply with epfd limits without disabling beams transmitted from the ngso satellites.
Qualcomm Incorporated


Wireless communication apparatus and wireless communication method


To suppress concentration of channel quality information requests and reports in a case of discontinuously transmitting reference signals at specific resources in a time domain, and thereby preventing degradation in throughput. A transmission apparatus transmits an instruction of csi request distributed for each reception apparatus in a subframe concurrently with or earlier than a reference signal csi-rs to each of reception apparatuses.
Sun Patent Trust


Systems and methods for localized device wakeup using bluetooth low energy communications


Systems and methods for activating select devices are described herein. More particularly, this specification relates to using structure specific service ids (sssids) when two devices that are part of a common ecosystem are deciding whether to establish a connection according to a bluetooth protocol.
Google Inc.


Phy for ultra-low power wireless receiver


Methods, systems, and devices are described for wireless communication at a wireless device. An access point (ap) may identify a pending communication for a wireless device and transmit a wakeup message comprising a device specific sequence to a companion radio of the device.
Qualcomm Incorporated


Data transmission system and communication method


A data transmission system includes a device and a base. The base includes a near field communication (nfc) module and a processing module configured to determine whether a wireless network exits.
Hon Hai Precision Industry Co., Ltd.


Coordination of channel scanning among multiple radios


Examples herein disclose preventing multiple radios from simultaneously scanning a same channel. The examples identify a first scan time associated with the multiple radios and determine a second scan time based on the first scan time.
Hewlett-packard Enterprise Development Lp


Connection-less mesh networking


A node forms a connection-less mesh network with one or more other nodes. The node controls to generate an identifier that identifies the node; to update the identifier and a data payload; to periodically wirelessly broadcast, at a predetermined frequency, broadcast-information that comprises the generated identifier and the updated data payload; and to periodically receive, at a predetermined frequency, other-broadcast-information which is the broadcast-information respectively broadcast from each of the one or more other nodes.
Tenten Technologies Limited


Beacon-implemented system for mobile content management


A mobile content management system includes a plurality of distributed beacon transmitters, each configured to continuously broadcast messages including a url, the url having a host domain address and an identifier unique to the respective beacon embedded therein. Client devices proximate to one or more of the beacons, and having appropriate browser applications executed thereon, are able to receive the broadcast messages and subsequently transmit content requests to the host server associated with the url.

Apparatus for role identification and power supply control in a wireless tunneling system


A disclosed wireless tunneling system determines a suitable configuration of a wireless tunneling apparatus for tunneling communications between two processing apparatuses through a wireless link. Responsive to determining the configuration of the wireless tunneling apparatus, the wireless tunneling system establishes a communication with another wireless tunneling apparatus through the wireless link, while maintaining compliance of the communications between the two processing apparatuses with a wired communication protocol.
Lattice Semiconductor Corporation


Content-aware inter-rat rab steering


A method for congestion control at an enodeb is described, comprising detecting congestion at an enodeb and entering a congestion control mode, receiving, at the enodeb, a new user equipment (ue) connection request that contains a radio resource control (rrc) establishment cause, and using the rrc establishment cause for identifying a congestion management strategy, the congestion management strategy comprising one of initiating a handover for an existing lte bearer, or redirecting the new ue connection request to a 3g nodeb.. .
Parallel Wireless, Inc.


Controlling the operation of mobile terminals with respect to multiple radio access technologies


According to an aspect, there is provided a method of operating a mobile device in a communication network. The method comprises receiving a list of wireless local area network (wlan) identifiers from the communication network (600).
Telefonaktiebolaget Lm Ericsson (publ)


Client association management for improving mu-mimo transmissions


Devices, computer-program products, and methods for identifying two or more traffic flows with similar packet traffic characteristics are disclosed. In some implementations, the traffic flows may be transmittable over one or more wireless paths.
Aruba Networks, Inc.


Blind mobility load balancing between source and target cells


An example method is provided and includes monitoring a plurality of neighboring nodes to detect attempts to perform mobility load balancing by the neighboring nodes; detecting an attempt to perform mobility load balancing by at least one neighboring node; determining an identity of the at least one of the neighboring nodes; and setting an offset parameter for the identified neighboring node(s) to an optimal value. The monitoring may include monitoring a number of handover requests received within a predetermined time period.
Cisco Technology, Inc.


Methods and user authentication and human intent verification in mobile devices


Methods and apparatus for user authentication and human intent verification of administrative operations for esims of an euicc included in a mobile device are disclosed. Certain administrative operations, such as import, modification, and/or export, of an esim and/or for an euiccs firmware can require user authentication and/or human intent verification before execution of the administrative operations are performed or completed by the mobile device.
Apple Inc.


Network access control


An access device receives a neighbor discovery protocol (ndp) packet sent from a user equipment (ue). The access device parses the ndp packet to obtain equipment information of the ue carried by the ndp packet.
Hangzhou H3c Technologies Co., Ltd.


Access method, system, and device of terminal, and computer storage medium


The present disclosure discloses a terminal access method, system and device, and a computer storage medium. The method comprises: after establishing an wifi connection with a wireless gateway, a terminal sends a terminal identity verification request and a gateway identity verification request to the wireless gateway; and after confirming that the terminal identity verification and gateway identity verification succeed, accesses to a wireless broadband network through the wifi connection..
Zte Corporation


Apparatus and sponsored connectivity to wireless networks using application-specific network access credentials


At least one feature pertains to a method operational at a user device. The method includes receiving and storing a shared key from an application service provider, and determining that a wireless communication network provides application-specific access to an application service provided by the application service provider.
Qualcomm Incorporated


System and detecting malicious attacks in a telecommunication network


The solution introduces a method and system in a network node of a telecommunication network such as the mme. The method includes receiving, from an enodeb, an attach request that originated from a ue, the attach request including an identifier associated with a subscriber of the ue; checking a ue blacklist to determine whether the identifier in the attach request is on the ue blacklist; in response to the ue identifier being on the ue blacklist: rejecting the attach request; updating a success rate metric to reflect the failed attach request; comparing the success rate metric to a threshold; and in response to a decrease in the success rate metric below the threshold, recognizing a malicious attack and taking mitigating steps..
Mavenir Systems, Inc.


Method and automatic detection and selection of an alternative roaming provider


A method, apparatus and computer program product are provided to cause a plurality of network identifiers to be stored in a memory; assign a priority value to each of a plurality of networks; in an instance in which a mobile terminal is roaming, identify available networks; and select an available network based on the priority value of stored network identifiers. The selection of the available networks may further include determining the signal strength of the available networks; and further basing the selection of an available network on the signal strength of the available networks..
Nokia Technologies Oy


Accident information management apparatus, vehicle including accident information management apparatus, and accident information management method


A vehicle includes a communication unit including an antenna array having a plurality of antenna elements for transmitting and receiving a signal and a beamformer for forming a beam pattern focused in a specific direction by adjusting a phase of the signal transmitted from the plurality of antenna elements, and a controller for controlling the communication unit to transmit a request signal of accident associated information by focusing the beam pattern onto a peripheral vehicle.. .
Hyundai Motor Company


Efficient way of performing emergency calls in multi-subscriber identity module solutions


A method for performing emergency calls includes: camping a first subscription of a mobile communication device on a first cell on a first communication network; camping a second subscription of the mobile communication device on a second cell on a second communication network; determining by the mobile communication device whether one of the first and second subscriptions supports emergency calls; and initiating an emergency call on the determined subscription.. .
Qualcomm Incorporated


Method and controlling feedback information


Methods and apparatuses for providing feedback information to a second terminal, to avoid disturbance of data directed to a user associated with a first terminal. The method includes receiving data directed to the user associated with the first terminal, transmitting a request for a current status of the user to the wearable device, receiving broadcast packets, wherein the broadcast packets comprises an identifier of the wearable device and the current status of the user, based on the identifier of the wearable device, determining whether the wearable device has been paired with the first terminal, and if so, executing, at the first terminal, at least one feedback operation directed to the second terminal using the current status of the user to indicate the current status of the user..
Anhui Huami Information Technology Co.,ltd.


Spatially mapping radio frequency data in 3-dimensional environments


Embodiments described herein provide for the generation of 3-d rf performance maps of an environment by correlating rf performance data generated from known locations within the environment with spatial data generated of the environment. One embodiment comprises an apparatus that generates spatial data of an environment in a 3-d coordinate system.
The Boeing Company


Determining location of a device in a mimo network using multipath component evaluation


The invention is directed to systems, methods and computer program products for determining a location of a device on a massive mimo (multiple-input multiple-output) network. The device transmits a signal comprising several multipath components (mpcs) either omnidirectionally or with limited directivity.
Sony Corporation


Location based service (lbs) system, triggering of mobile station lbs applications


An application executed within a mobile station to be triggered only by a network element, such as a mobile positioning center (mpc) or a mobile center (mc). The network element is coupled to a base station.
Qualcomm Incorporated


System for creating anonymous social gatherings


A system for creating an anonymous social gathering of 3 or more persons. The system has a server digital device and a client digital device both operatively connected to a distributed network and thus to each other.

Battery beacon systems and methods of use


A device for operation as part of a system or network, the device combining a power cell, a battery housing enclosing the power cell, and an on-board radiobeacon within the housing, where the battery is configured to supply dc power to an external apparatus and to the radiobeacon in parallel. A sensor or sensor package may also be included in the battery device and reports to the system or network.
Pb Inc


Methods and apparatuses for providing content data and accessing content data


Embodiments of the present invention provide methods and apparatuses of providing content data and accessing con tent data. The method for providing content data comprises: receiving a first request for content data, the first request being originated from a first user equipment and comprising an indication of the requested content data and an indication from where the requested content data is accessible; identifying a local equipment that is in proximity to the first user equipment and has pre-stored the requested content data; and returning a first response directed to the first user equipment, by which the first user equipment is informed to access the requested content data from the local equipment via a first device-to-device communication with the local equipment.
Nokia Technologies Oy


Method and producing personal area network identifier (panid) on network in wireless communication system


A method for creating a personal area network identifier (pan id) of a network in a wireless communication system includes creating a first pan id; receiving a message including a second pan id from a source coordinator; comparing the first pan id with the second pan id included in the received message; and when the first pan id and the second pan id are the same according to the comparison result, transmitting an indication message related to a pan id conflict to the source coordinator, wherein at least any one of the first pan id and the second pan id may be created through a hash algorithm and the indication message may include at least any one of a conflicted pan id or an error code indicating a conflict.. .
Lg Electronics Inc.


Method and program product for location based customer and vendor direct connectivity


A method comprises connecting to an application platform comprising a plurality of modules being configured to network a plurality of clients for a plurality of vendors. A request for a service is submitted.

Waveform display control of visual characteristics


Waveform display control techniques of visual characteristics are described. In one or more examples, a method is described of increasing user efficiency in identifying particular sounds in a waveform display of sound data without listening to the sound data.
Adobe Systems Incorporated


Acoustic camera based audio visual scene analysis


Techniques are disclosed for scene analysis including the use of acoustic imaging and computer audio vision processes for monitoring applications. In some embodiments, an acoustic image device is utilized with a microphone array, image sensor, acoustic image controller, and a controller.
Intel Corporation


Presentation of audio based on source


In one aspect, a device includes a processor, at least one camera accessible to the processor, and memory accessible to the processor. The memory bears instructions executable by the processor to identify, at least in part based on input from the at least one camera, a source of sound.
Lenovo (singapore) Pte. Ltd.


Methods and systems for enhancing pitch associated with an audio signal presented to a cochlear implant patient


An exemplary sound processor 1) identifies at least one frequency bin, included in a plurality of frequency bins included in a frequency spectrum of an audio signal that is presented to a cochlear implant patient, that contains spectral energy above a modified spectral envelope, 2) identifies each frequency bin that contains spectral energy below the modified spectral envelope, 3) enhances the spectral energy contained in the at least one frequency bin identified as containing spectral energy above the modified spectral envelope, and 4) compresses the spectral energy contained in each frequency bin identified as containing spectral energy below the modified spectral envelope.. .
Advanced Bionics Ag


System and delivering advertisement data to a mobile device


A method of delivering advertisement data to a mobile device that incorporates teachings of the subject disclosure may include, for example, extracting metadata from video content corresponding to the selected advertisement in response to receiving an advertisement selection command and sending the metadata to an advertising management system. Data is received from the advertisement data management system indicating multiple communication devices associated with the media processor and a selection is received indicating a selected mobile communication device of the multiple communication devices.
At&t Intellectual Property I, Lp


System and interactive second screen


A method and system for interactive second screen comprises the steps of capturing audio, video or image information from the primary screen via sensors built with the secondary screen device; ingesting and collecting vdna (video dna) fingerprints of the captured media information in the secondary screen device; sending the ingested fingerprints along with other information such as metadata, user's location, etc, to the content identification server via internet or mobile networks; providing content-aware information or resources back to the secondary screen device, and providing user interaction with the content-aware information and resources.. .

Providing service based on user operation behavior


A service providing method based on user operation behavior including determining whether a current service interface provides a valid service according to received operation information; and when the valid service is not provided, performing the following operation: providing a preset service for a user when a preset service trigger condition is met. The present disclosure also provides a service providing apparatus based on user operation behavior.
Alibaba Group Holding Limited


Set-top box, providing awareness in a hospitality environment


A system and method for providing awareness in a hospitality environment are presented. In one embodiment, a vertical and horizontal array of set-top boxes is provided and each set-top box includes an identification corresponding to the room in which the set-top box is placed.
Enseo, Inc.


Sharing behavioral patterns between devices


A system that incorporates teachings of the present disclosure may include, for example, a set-top box having a controller to present media content at a presentation device as directed by a user, monitor the media content consumed by the user, detect a first behavioral pattern based on the media content consumed by the user, transmit the detected first behavioral pattern to a communication device of the user, receive from the communication device a second behavioral pattern, and identify media content correlating to the second behavioral pattern. The communication device can be adapted to adjust communication operations according to the detected first behavioral pattern.
At&t Intellectual Property I, Lp


Transmission broadcast service, reception method therefor, and reception apparatus therefor


A method of a broadcast receiving device to receive broadcast service includes: receiving a broadcast table; receiving service signaling data corresponding to a service object; determining a consumption model of the service object on the basis of the service signaling data; receiving a content item configuring the service object on the basis of the service signaling data when the consumption model is a predetermined consumption model; displaying a guide on content on the basis of the broadcast table or the service signaling data; identifying one of the received content item according to an additional information request on the content; and controlling the guide on the basis of the identified content item.. .
Lg Electronics Inc.


Method and hardware-enforced, always-on insertion of a watermark in a video processing path


A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the method comprises the steps of receiving data comprising the media program in the receiver disposed at a subscriber station, generating a watermark, the watermark generated at least in part according to a secure data processor-unique identifier irreversibly stored in the secure data processor, processing the received data to reproduce the media program, and inserting portions of the generated watermark in the reproduced media program at locations determined at least in part according to the secure data processor-unique identifier to produce a watermarked media program provided for display..
Syphermedia International, Inc.


Standard-guided video decoding performance enhancements


Disclosed herein are innovations in decoding compressed video media data. The disclosed innovations facilitate decoding operations with improved computational efficiency, faster speeds, reduced power, reduced memory usage, and/or reduced latency.
Microsoft Technology Licensing, Llc


Application- or context-guided video decoding performance enhancements


Disclosed herein are innovations in decoding compressed video media data. The disclosed innovations facilitate decoding operations with improved computational efficiency, faster speeds, reduced power, reduced memory usage, and/or reduced latency.
Microsoft Technology Licensing, Llc


System and decoding using parallel processing


An apparatus for decoding frames of a compressed video data stream having at least one frame divided into partitions, includes a memory and a processor configured to execute instructions stored in the memory to read partition data information indicative of a partition location for at least one of the partitions, decode a first partition of the partitions that includes a first sequence of blocks, decode a second partition of the partitions that includes a second sequence of blocks identified from the partition data information using decoded information of the first partition.. .
Google Inc.


Moving picture coding method, moving picture coding apparatus, moving picture decoding method, and moving picture decoding apparatus


The moving picture coding method for coding an input image includes: converting a value of a first parameter into a first binary signal, the first parameter identifying a type of a sample offset process to be applied to a reconstructed image corresponding to the input image; and coding at least a portion of the first binary signal through bypass arithmetic coding using a fixed probability.. .
Sun Patent Trust


Video frame decoding method and apparatus


A video frame decoding method and apparatus in order to implement efficient and fast video decoding. The method includes acquiring a target time point of a video, obtaining a frame number of a corresponding random access frame according to the target time point, obtaining a frame number of a frame that can be independently decoded, where the dependency set includes at least one dependency, and the dependency represents a correspondence between a frame number of a random access frame and a frame number of a frame that can be independently decoded, and obtaining, according to the frame number of the frame that can be independently decoded, video data of the frame that can be independently decoded, and decoding the random access frame..
Huawei Technologies Co., Ltd.


Projection system, and information processing apparatus


A projection system includes image projection apparatuses to project one image onto a projection face based on image information, a projection controller to divide the image information into a plurality of segment image data, and to instruct each of the image projection apparatuses to project corresponding segment image data, a positional deviation detector disposed at each of the image projection apparatuses to detect a positional deviation at the image projection apparatuses, an identification unit to identify which image projection apparatus requires a calibration processing; a projection unit to cause the identified image projection apparatus to project a calibration image information; an image capture apparatus to capture the calibration image information; and a calibration unit to calibrate the segment image data projected by the identified image projection apparatus based on the captured calibration image information.. .

Three-plate optical system and projector


A three-plate image projecting optical system that has a compact and simple configuration and achieves enhanced luminance efficiency and reduction of light quantity loss on the dichroic coating, and a projector equipped with the optical system. The optical system includes a color separating/combining prism having a first/second dichroic coatings, and a first to third digital micromirror devices.
Konica Minolta, Inc.


Method and system for automated datacenter floor volume calculation applied to datacenter thermal management


A system and method are disclosed for automatically updating a virtual model of a facility such as a datacenter, for example for use in maintaining an accurate thermal management plan. Photo images of the facility may periodically be captured.
Ca, Inc.


Message transmission system, message transmission method, and program for wearable terminal


When a person 500 is present within a field of view of a user, a user terminal 10 acquires the field of view of the user as image data, and transmits the field-of-view image to a field-of-view image analysis server 100. The field-of-view image analysis server 100 extracts a feature amount from the field-of-view image, and identifies the person near a center of the field-of-view image by referring to a feature amount database 150.
Optim Corporation


Systems and methods for time-lapse selection subsequent to capturing media content


Systems, methods, and non-transitory computer-readable media can capture media content including an original set of frames. A selection of a time-lapse amount can be received.
Facebook, Inc.


Image processing for camera based display system


A display system for a vehicle is disclosed. The system comprises an imager configured to capture image data in a field of view rearward relative the vehicle.
Gentex Corporation


Information processing apparatus, charge processing method, and computer-readable recording medium


An information processing apparatus includes a provider identification information acquiring unit that acquires a piece of provider identification information for each of a plurality of devices that cooperatively execute a plurality of functions, based on device identification information of the device, the piece of provider identification information allowing identification of whether a provider of the device is a predetermined provider as a provider of a cooperating function; a determining unit that determines whether a non predetermined-provider device provided by a provider other than the predetermined provider exists among the devices based on pieces of the provider identification information; a charge processing unit that performs charge processing to profit the predetermined provider when the non predetermined-provider device exists; and a cooperation controlling unit that controls the devices to cooperatively execute the functions based on the cooperating function.. .
Ricoh Company, Limited


Wireless communication apparatus that displays images associated with contents stored in an external storage device


A wireless communication apparatus includes a memory device storing data associated with a storage device that is external to the wireless communication apparatus, an image capturing device, a display, and a controller. The controller is configured to identify an external storage device corresponding to a code captured by the image capturing device, generate display data from the data stored in the memory device if the data stored in the memory device are associated with the identified external storage device, and control the display to generate a display image from the display data..
Kabushiki Kaisha Toshiba


Light guide, illuminating device, and image reading device


A light guide includes an incident surface provided at least at an end portion of the light guide in a longitudinal direction, and receiving light from a light source, an output surface constituting a part of an outer peripheral surface, and outputting the light introduced through the incident surface, a reflecting surface extending along the optical axis so as to oppose the output surface, and including a plurality of reflection patterns that reflect the introduced light toward the output surface, and a reflecting plate opposed to a region in the outer peripheral surface other than the incident surface, the output surface, and the reflecting surface, and reflecting the light from the light source. The outer peripheral surface includes a sloped portion formed so as to come closer to the reflecting plate in a direction away from the incident surface in the longitudinal direction..
Kyocera Document Solutions Inc.


Information processing apparatus, information processing method, and information processing system


An information processing apparatus includes a memory that stores, for each of multiple printers, selection information associating at least one of a string, an image, and job information of a print job with printer identification information for identifying the printer being associated with terminal identification information for identifying an information processing terminal currently located near the printer, circuitry that selects, in response to a request for printing data, one of the multiple printers to print the requested data using the selection information stored in the memory, and further selects an information processing apparatus associated with the selected printer, a transmitter that transfers the a confirmation message requesting to confirm that the selected printer prints the requested data to the selected information processing terminal. The circuitry instructs the selected printer to print the requested data in response to receiving a confirmation response from the selected information processing terminal..
Ricoh Company, Ltd.


Output system, output apparatus, and output method


An output system includes a terminal apparatus to receive an accumulation instruction from a user, an accumulation apparatus to accumulate first output job information, an output apparatus to acquire data from an accumulation destination specified in the first output job information, and an authentication apparatus to authenticate the user. The output apparatus includes a holder to hold authentication history information of the user with identification information of the user and terminal apparatus, an authentication controller to request, upon detecting failure in the accumulation apparatus or authentication apparatus, the terminal apparatus identified by the identification information utilizing the identification information of the user and terminal apparatus to perform authentication based on the identification information of the user, and an output controller to acquire second output job information from the terminal apparatus succeeded in authentication, acquire data specified in the second output job information from the terminal apparatus, and output the data..
Ricoh Company, Ltd.


Facsimile apparatus, image transmission method, and computer-readable recording medium


A facsimile apparatus includes: a first receiver that receives, from any one of at least one child device, a first image, transmission-destination-information, and transmission-source-information-processing-apparatus-identifying-information; a first transmitter that transmits a facsimile of the first image to the transmission destination represented by the transmission-destination-information; a registration unit that registers transfer information that associates, with each other, first-transmission-source-information where a transmission source is the transmission destination represented by the transmission-destination-information and transfer-destination-information-processing-apparatus-identifying-information where a transfer destination is the information processing apparatus represented by the transmission-source-information-processing-apparatus-identifying-information; a second receiver that receives a facsimile of a second image and second-transmission-source-information representing a transmission source from which the second image is transmitted; and a second transmitter that, when the transmission source represented by the second-transmission-source-information matches the transmission source represented by the first-transmission-source-information, transmits the second image to the child device represented by the transfer-destination-information-processing-apparatus-identifying-information that is associated with the first-transmission-source-information.. .
Ricoh Company, Limited


Information processing device, computer-readable recording medium, and system


An information processing device includes a specification unit configured to receive identification information for identifying a scanner device, and specify a driver configured to control the scanner device identified by the identification information; an item acquirer configured to acquire a list of items that are settable by the specified driver for controlling the scanner device, and return the list to a transmission source of the identification information; a scan instruction receiver configured to receive a scan instruction and set values for the respective items from the transmission source of the identification information; and an execution controller configured to send, in accordance with the reception of the scan instruction, the set values to the driver that is specified based on the identification information to cause the driver to perform scan using the scanner device.. .

Top up communication system and method thereof


A top up communication system and method thereof are provided, which provides a call between at least two electronic devices, where each of the at least two electronic devices has a unique identification code. The method includes following steps: buying a deposit code on the web-site or obtaining it sent from others; surfing a user interface of an activating data server; inputting the deposit code into the user interface to generate an activate identification data; scanning the activate identification data by a scanner to generate a shortcut icon on a monitor of the scanner; transmitting a dialed command to a connection generation server by triggering the shortcut icon; using the dialed command to establish a communication link between the at least two electronic devices by the connection generation server..

Method and providing call flow information to terminal devices


Methods and apparatus for providing call flow information to devices associated with call flow destinations are provided herein. In some embodiments, a method for providing call flow information to a terminal device comprises receiving a communication specifying an initial destination from a calling party, and at least one of assigning the received communication to a terminal device associated with the initial destination and an alternate destination, forwarding the received communication from a terminal device associated with the initial destination to a terminal device associated with the alternate destination, or re-assigning the received communication to a terminal device associated with the alternate destination rather than with the initial destination responsive to a call set up failure.
Vonage Network Llc


Gathering information for members of call


Responsive to detecting a call from a first user into a call system, a user identifier associated with the first user by the call and user information associated with the user identifier can be added to respective user information stored in an e-meeting data structure associated with the call. Responsive to determining the call system recognizes the voice of the first user, the first user can be identified based on the voice of the first user.
International Business Machines Corporation


Multiple devices ringing coordination


A method includes accessing, at a first user device, an application that coordinates ringing of multiple user devices registered to a smart phone number that are within a predetermined proximity of each other. The method includes broadcasting an identity and a ring state associated with the user device.
Verizon Patent And Licensing Inc.


System and call distribution


A computer-implemented method for distributing phone calls includes the steps of receiving or initiating a telephone call from or with a caller associated with caller identification information, generating masked caller identification information by masking a portion of the caller identification information, transmitting the masked caller identification information to a plurality of potential call-buyers, determining a call-buyer of the plurality of potential call-buyers to receive the incoming phone call, and storing the caller identification information with the masked caller identification information. A system and computer-readable medium are also disclosed..

Identifying and filtering incoming telephone calls to enhance privacy


A method for filtering a telephone call is provided. The method may comprise receiving from a caller the telephone call directed to a communication device associated with an intended call recipient.
Ooma, Inc.


Systems and methods for scoring phone numbers


Certain implementations of the disclosed technology include systems and methods for determining a reachability score of a phone number. A method includes receiving personally identifiable information associated with the subject; querying one or more public or private databases with the personally identifiable information; receiving, in response to the querying, phone number information related to the personally identifiable information; extracting, from the phone number information, one or more phone numbers associated with the subject; determining, with one or more computer processors, based at least in part on the one or more phone numbers, a phone type corresponding to the respective one or more phone numbers; determining, with the one or more computer processors, a reachability score for at least one of the one or more phone numbers, wherein the reachability score is based, at least in part, on the phone type; and outputting an indication of the reachability score.
Lexisnexis Risk Solutions Inc.


System and utilizing customer data in a communication system


Systems and methods for utilizing customer data in a communication system are provided. In exemplary embodiments, customer records at a customer data warehousing system are accessed.
Fonality, Inc.


Computer-implemented determining call connection status


A computer-implemented system and method for determining call connection status is provided. A call initiated by a calling party to a receiving party is monitored.
Intellisist, Inc.


System and cellular call monitoring using downlink channel correlation


Methods and systems for monitoring communication of mobile communication terminals, such as cellular phones. An off-air monitoring system reconstructs both directions of a call conducted between two mobile terminals by receiving only downlink channels.
Verint Systems Ltd.


Identifying line faults using regression analysis on near and far end errors


The invention presents a method of identifying faults on a dsl line, typically intermittent faults arising from unstable joints in the dsl line. The method collects errored seconds data at the dslam and at the customer's premises equipment (cpe, typically a home hub or router).
British Telecommunications Public Limited Company


System and remotely controlling features of wireless mobile devices


An apparatus including a plurality of wireless beacons carried by a wireless portable device, a wireless transceiver of the portable device that monitors a predetermined wireless spectrum and detects a signal from another of the plurality of wireless beacons, a processor of the portable device that decodes the detected beacon for an identifier including a sequence of bits, a processor of the portable device that correlates a content of the identifier with one of a plurality of programs of the portable device by matching the one or more bits of an identifier sequence of the one program with a content and location of one or bits of the identifier of the detected beacon and a processor of the portable device that interacts with another device that is directly physically adjacent the portable device via the beacon carried by the portable device and via execution of the one program.. .

Controlling mute function on telephone


A method for controlling a mute function in a telephone device, and the telephone device and a computer program product that implements the method. The method includes: while the mute function is active, voice recognition software in the telephone device processes sound detected by a microphone in the telephone device to recognize and identify one or more specific words as having been spoken by a specific person and not by another person, and in response, the telephone device activates an alarm in the telephone device to communicate that the mute function is active..
International Business Machines Corporation


Method and system for matching profile records


According to embodiments described in the specification, an exemplary method and a system is provided for matching electronic data records. A server maintains, in memory, a plurality of user profile records, each record including an identifier, one or more subject trait parameters, and one or more desired trait parameters.
Conch&media Ltd.


Method and device for the management of applications


A method by a user terminal are a related user terminal are disclosed for managing applications that are executable by the user terminal. Folder information is generated that defines folders of applications.
Telefonaktiebolaget L M Ericsson (publ)


Device-free activity identification using fine-grained wifi signatures


A system includes a device that is disposed within an environment and is adapted to communicate over a radio frequency communication link. The system also includes a wireless access point disposed within the environment, including a wireless transceiver in communication with the device over a radio frequency communication link using a plurality of channels, and recording a channel state information data set for the radio frequency communication link.
The Trustees Of The Stevens Institute Of Technology


Methods and apparatus to supplement web crawling with cached data from distributed devices


Methods and apparatus to supplement web crawling with cached data from distributed devices are disclosed. An example method includes identifying a first webpage.
The Nielsen Company (us), Llc


Bulk uploading of multiple self-referencing objects


A computer implemented method, computer program product, and system for performing create, read, update, or delete operations on a plurality of resources in a client-server environment. In an embodiment, the computer implemented method includes the steps of identifying individual resources requiring operations to be performed, assigning local references for any resources to which a uri (uniform resource identifier) has not been provided by the server, generating metadata describing the local references and operations to be performed, wrapping each individual resource with the metadata to provide a plurality of wrapped resources arranging the wrapped resources into a single payload, and transmitting the single payload to the server..
International Business Machines Corporation


Automatically generating web conference recording bookmarks based on user analytics


Arrangements described herein include accessing user data associated with a user participating in a web conference. The user data includes user analytics generated by tracking and analyzing use, by the user, of web based resources unrelated to the web conference.
International Business Machines Corporation


Server side data cache system


In an example embodiment, a system and method to store and retrieve application data from a database are provided. In an example embodiment, location data comprising a database identifier is received.
Paypal, Inc.


News publishing system and method


A method, computer program product, and computing system for receiving a first geotagged news content item, wherein the first geotagged news content item is based, at least in part, upon first news content associated with a first identified location. A first geotagged news post is generated based, at least in part, upon the first geotagged news content item.
Newsbyme, Llc


Tracking use of a virtualization service according to globalization characteristic based usage


Tracking of data processing usage of a workload is initiated, within a virtualized environment, comprising one or more globalization characteristics, wherein the at least one globalization characteristic requires conversion by at least one globalization service managed by a virtualization service provider of the virtualized environment. The at least one globalization characteristic is detected.
International Business Machines Corporation


Response prototypes with robust substitution rules for service virtualization


In a method of service emulation, a transaction subset including ones of a plurality of message transactions previously communicated between a system under test and a target system for emulation is defined. The message transactions include requests and responses thereto that are stored in a computer-readable memory.
Ca, Inc.


Network function virtualization service chaining


Systems and methods for managing a service set in network function virtualization (nvf) are provided. A service set can be defined as an ordered list of services to be applied to packet traffic and assigned to instances of the services in a distributed pool of virtual hosts.
Telefonaktiebolaget L M Ericsson (publ)


Method and system of transferring a message in a session initiation protocol based communications network


Systems and methods of transferring a message in a sip-based communications network, from a first node to a third node via intermediate nodes are provided. In one exemplary embodiment, a network node for registering in an ims communications network may include a controller circuit.
Telefonaktiebolaget Lm Ericsson (publ)


Entity registration in multiple dispersed storage networks


A method includes obtaining a set of encoded data slices for storage. The method further includes selecting, based factor(s) from a set of factors, one or more of a local vault, a regional vault, and a global vault for storing the set of encoded data slices.
International Business Machines Corporation


Embedded executable data for cross network transfer


A device identifier is associated with a client device that is used to interact with multiple remote content data sources over one or more computer networks. Interaction data is received from a client device based on executable code that is embedded in content requested by the client device.
Linkedin Corporation


Location and boundary controls for storage volumes


This disclosure describes, in one embodiment, a system that includes a block storage and virtual machine (vm) manager to identify one or more storage node(s) that meet at least one policy constraint and to select a storage node with capacity from the one or more storage node(s) that meets all of the at least one policy constraints, the at least one policy constraint related to a respective geolocation of each of the identified storage node(s).. .
Intel Corporation


Method, server and system for application synchronization


A method is provided for application synchronization. The method includes: establishing a communication connection between an originating terminal and a destination terminal, where the originating terminal and the destination terminal log in the server through a same login account, and receiving a synchronization request message sent by the originating terminal, where the synchronization request message includes a program identification of a target application and a terminal identification of the destination terminal.
Tencent Technology (shenzhen) Company Limited


Socially driven feed of aggregated content in substantially real time


Example systems and methods are described for aggregating and ranking content from multiple social network sources. In one implementation, a method identifies multiple content items associated with social updates by a user's social relationships in at least one social network.
Nuzzel, Inc.


Data transferring method, device and system thereof


In a method, device and system for transferring data, a request is received by a server from an initiating user client for transferring data, where the request includes the initiating user identification and information about a target for which the data is transferred. A data transfer interface that corresponds to the target is created by the server and published on a social information display platform that corresponds to the initiating user identification.
Tencent Technology (shenzhen) Company Limited


Inter-layer communication of events between tcp layer and higher layers when implemented in different concurrent execution entities


Inter-layer communication of events between different concurrent execution entities, where a transmission control protocol (tcp) layer instance executes in a first execution entity and a higher layer instance executes in a second execution entity. In an example transaction, the first execution entity receives a tcp packet, and the tcp layer instance in the first execution entity generates an event message by processing the received tcp packet.
Oracle International Corporation


Information processing apparatus, terminal device, information processing method, and non-transitory computer readable recording medium


An information processing apparatus according to the present invention includes an acquiring unit and an associating unit. The acquiring unit acquires, from an application, terminal information, which is used to identify a terminal device, and feature information, which is created on the basis of information that is allocated to the terminal device and that varies in accordance with the time elapsed, and acquires, from a browser, cookie information and the feature information.
Yahoo Japan Corporation


Video stream transmission over ip network


A system includes a first buffer that stores first media packets therein received from a first media stream. A second buffer stores second media packets therein received from a second media stream.
Imagine Communications Corp.


Method and system for client-server real-time interaction based on streaming media


A method of processing real-time streaming media is performed at a computer system having one or more processors and a memory. The computer system obtains a streaming media based search request from a terminal, the search request including information from a streaming media data packet captured by the terminal.
Tencent Technology (shenzhen) Company Limited


Multicast flow overlay using registration over a reliable transport


An example method includes exchanging targeted hello messages to establish a targeted neighbor connection between a first routing device and a second routing device, wherein one of the routing devices comprises a central routing device, and wherein another one of the routing devices comprises an ingress routing device. The example method further includes processing a source-active register message that specifies a source address and an identifier that are collectively associated with a multicast stream, and wherein the source-active register message further indicates whether the multicast stream is active or withdrawn.
Juniper Networks, Inc.


Method and initiating network conference


The present application provides a method including: acquiring mail information related to the network conference; identifying sender address information, recipient address information, and mail title information in the mail information; determining a sender address indicated by the sender address information as a first participant address of the network conference; determining a recipient address indicated by the recipient address information as a second participant address of the network conference; determining a mail title indicated by the mail title information as a conference subject of the network conference; and sending a conference reservation request that includes the conference subject, the first participant address and the second participant address to a conference reservation server. Information related to the network conference may be automatically generated by using the method or the apparatus in the present application..
Huawei Technologies Co., Ltd.


Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback


An adaptable network security system includes trust mediator agents that are coupled to each network component. Trust mediator agents continuously detect changes in the security characteristics of the network and communicate the detected security characteristics to a trust mediator.
American Express Travel Related Services Company, Inc.


Security activation for dual connectivity


Methods and apparatus for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to a first node and to the second node. An example method, implemented in the first node, includes determining (610) a first set of security algorithms, the first set including those algorithms supported by the wireless terminal.
Telefonaktiebolaget L M Ericsson (publ)


Mitigating neighbor discovery-based denial of service attacks


In one embodiment, a device in a network determines whether a destination address of a packet received by the device is within a neighbor discovery (nd) cache of the device. The device determines whether the destination address is not in a set of addresses used to generate an address lookup array or possibly in the set of addresses used to generate the address lookup array, in response to determining that the destination address of the packet is not within the nd cache.
Cisco Technology, Inc.


Locking applications and devices using secure out-of-band channels


Systems and methods are provided for locking/unlocking a user account for accessing a client application. The systems and methods pair a user account for accessing a client application to a separate user authentication account.
Ncluud Corporation


Selective sinkholing of malware domains by a security device via dns poisoning


Techniques for selective sinkholing of malware domains by a security device via dns poisoning are provided. In some embodiments, selective sinkholing of malware domains by a security device via dns poisoning includes intercepting a dns query for a network domain from a local dns server at the security device, in which the network domain was determined to be a bad network domain and the bad network domain was determined to be associated with malware (e.g., a malware domain); and generating a dns query response to the dns query to send to the local dns server, in which the dns query response includes a designated sinkholed ip address for the bad network domain to facilitate identification of an infected host by the security device..
Palo Alto Networks, Inc.


Method of physical chip identification for networks of electronic appliance


A technology precluding attacks through peripheral devices thefts to a network of electronic appliance, by utilizing physical chip identification devices, is disclosed. The electronic appliance in the network are divided into the peripheral devices and stem servers managing registration information of the peripheral devices, wherein the stem servers serve as central control using software, and the peripheral devices are managed at device-level by having physical chip identification devices, thus the security of the whole network is efficiently reinforced..

Methods and systems for automated anonymous crowdsourcing of characterized device behaviors


Methods, and devices implementing the methods, use device-specific classifiers in a privacy-preserving behavioral monitoring and analysis system for crowd-sourcing of device behaviors. Diverse devices having varying degrees of “smart” capabilities may monitor operational behaviors.
Qualcomm Incorporated


Method and system for tracking fraudulent activity


A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. In an example embodiment, the system includes a server communicatively coupled to a database.
Paypal, Inc.


Methods, systems, and computer readable media for converging on network protocol stack vulnerabilities using fuzzing variables, vulnerability ratings and progressive convergence


A method for progressive convergence on network protocol stack vulnerabilities includes defining an initial protocol field and field value space for fuzz testing of a network communications protocol stack implementation. The method further includes dividing the initial space into regions corresponding to combinations of protocol fields and field values.
Ixia


Security threat detection


Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network.
Fortinet, Inc.


System and detecting mobile cyber incident


A method for detecting mobile cyber incidents includes: allowing a mobile incident collection server to determine whether new text is received; extracting the text original hash from the received new text by means of the mobile incident collection server; allowing the mobile incident collection server to determine whether attached file exists on the basis of the extracted text original hash; if the attached file exists, extracting the attached file by means of the mobile incident collection server; and storing and managing the app information of the extracted attached file as mobile cyber incident information in the mobile incident collection server.. .
Korea Internet & Security Agency


Mechanism to augment ips/siem evidence information with process history snapshot and application window capture history


A method to augment a plurality of ips or siem evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system.
International Business Machines Corporation


Detection of rogue access points


A method and apparatus determine whether a rogue access point (ap) is present within a wireless network. The method includes sending a first ap discovery message including a pre-stored identifier of a known ap previously accessed by a ue; sending one or more additional ap discovery messages, each additional message including a generated identifier of a non-existent ap; and receiving responses to the first and additional ap discovery messages.
Samsung Electronics Co., Ltd.


Mechanism to augment ips/siem evidence information with process history snapshot and application window capture history


A method to augment a plurality of ips or siem evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system.
International Business Machines Corporation


Malware detection based on training using automatic feature pruning with anomaly detection of execution graphs


A threat detection system for detecting malware can automatically decide, without manual expert-level interaction, the best set of features on which to train a classifier, which can result in the automatic creation of a signature-less malware detection engine. The system can use a combination of execution graphs, anomaly detection and automatic feature pruning.
Threattrack Security, Inc.


File and bit location authentication


An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content.
International Business Machines Corporation


Geo-fence authorization provisioning


A system includes a communication module that receives a request to post content to an event gallery associated with an event. The request in turn includes geo-location data for a device sending the content, and identification data identifying the device or a user of the device.

Firewall industrial systems


Selectively enabling communication of dual protocol packets from a source device directed to a service of an object class at target devices is provided. Steps can include providing an access control database including an entry correlating a source device, an object class and a service of the object class; from a source device, receiving a dual protocol packet including a frame and a field according to a first network communication protocol and an encapsulated packet of a second network communication protocol; obtaining from the frame, an identification of the source device; obtaining from the encapsulated packet, an identification and a service of an object class to which the encapsulated packet is directed; comparing the identification of the source device, the identification and service of the object class, and the entry of the access control database; and selectively transmitting the dual protocol packet as a function of the comparison..
Rockwell Automation Technologies, Inc.


Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations


The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive identifiers to be saved in a validation database residing on a validation database server/web server, such that the local/mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and/or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local/mobile computing device.
Invysta Technology Group


Identity management


There are provided apparatuses and methods for providing user information stored at an access network to a content provider, the access network for providing a user device with access to the internet, the user information relating to a user of an application module stored on the user device, the user device for requesting and receiving content from a said content provider. A request for an identifier for the user device to use when requesting content from a content provider is received at an access network, which generates and transmits an identifier to the user device.
Openwave Mobility Inc.


Computer dynamic website instantiation


A computer system, a computer-implemented method, and a computer program product for dynamic website instantiation. The system includes an interface component which is configured to receive from a first code reader device a first read notification indicating that a unique code is read for the very first time wherein the unique code includes a reference to a url portion in combination with an identifier number; and to further receive from the first reader device location data indicating a particular physical location which is associated with the first read notification.

Method for managing access to protected computer resources


A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computer and the client computer(s); server software means and client software means adapted to forward its identity data and identity data of the client computer(s) to the clearinghouse means at the beginning of an operating session; and a hardware key connected to the client computer, the key being adapted to generate a digital identification as part of the identity data; wherein the hardware key is implemented using a hardware token access system, a magnetic card access system, a smart card access system, a biometric identification access system or a central processing unit with a unique embedded digital identification.. .
Prism Technologies Llc


A computer implemented method, communications system and computer programs products for securing operations in authentication and authorization systems using biometric information


The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available, establishing a dual channel verification through the use of a second server and reinforcing an authentication factor mechanism by including a biometric identity verification of biometric information of the user.. .
Telefonica Digital EspaÑa, S.l.u.


Systems and methods for combined otp and kba identity authentication


Certain implementations include systems and methods for combined one-time- passcode (otp) and knowledge-based-authentication (kba) identity authentication. A method is provided that includes receiving a set of identity information associated with a subject; querying one or more databases; receiving personally identifiable information; producing at least one knowledge based authentication (kba) identity proofing question having a personally identifiable correct answer; generating a unique correct one-time pass (otp) code for the personally identifiable correct answer; generating one or more incorrect answers with corresponding incorrect codes; outputting, the at least one kba identity proofing question; outputting the personally identifiable correct answer with the unique correct otp code, and the one or more incorrect answers with corresponding incorrect codes; receiving a response code; comparing the response code and the unique correct otp code; and responsive to a match between the response code and the unique correct otp code, outputting a first indication of authentication..
Lexisnexis Risk Solutions Inc.


End-to-end authentication at the service layer using public keying mechanisms


In a machine-to-machine/internet-of-things environment, end-to-end authentication of devices separated by multiple hops is achieved via direct or delegated/intermediated negotiations using pre-provisioned hop-by-hop credentials, uniquely generated hop-by-hop credentials, and-or public key certificates, whereby remote resources and services may be discovered via single-hop communications, and then secure communications with the remote resources may be established using secure protocols appropriate to the resources and services and capabilities of end devices, and communication thereafter conducted directly without the overhead or risks engendered hop-by-hop translation.. .
Convida Wireless, Llc


Multi-domain applications with authorization and authentication in cloud environment


A multi-domain application requiring sso and slo operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (mds) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (slos) on the domains of the multi-domain application and to invalidate the user sessions on the domains.
Sap Se


Role-based access tool


The tool to provide a role-based access tool is configured to receive a single sign-on login from a user; determine an identity of the user based on the single sign-on login; authorize a defined role of the user by: accessing a database comprising a plurality of users and associated roles; and determining the defined role based on the user's identity and the associated roles in the database; present one or more service catalogs to the user based on the defined role of the user; receive a request to complete an action associated with the one or more service catalogs; process the action for execution after receiving the request; and run the action on one or more systems.. .
Bank Of America Corporation


Mapping specific user credentials to temporary user favorite credentials


A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a master cookie file containing sets of records associated with the user, his or her accounts or web sites, and registered values associated with form tags (e.g. Username, password, address, email, telephone, etc.).
International Business Machines Corp.


Establishing a secure channel with a human user


A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“pin”) is shared between a user and an application.
Intertrust Technologies Corporation


Information processing apparatus, information processing method, and information processing system


An information processing apparatus includes a storage that stores access-limited identification information and access-unlimited identification information, and one or more processors that execute a process. The process includes receiving a login request to log into the information processing apparatus from a terminal and performing a login process based on an account specified by the terminal; when an identification information request is received from a non-logged-in terminal that has not logged into the information processing apparatus, sending the access-unlimited identification information to the non-logged-in terminal; and when the identification information request is received from a logged-in terminal that has logged into the information processing apparatus, sending the access-limited identification information accessible by the account specified by the logged-in terminal and the access-unlimited identification information to the logged-in terminal..
Ricoh Company, Ltd.


Validation database resident on a network server and containing specified distinctive identifiers of local/mobile computing devices may be used as a digital hardware key in the process of gaining authorized access to a users online website account such as, but not limited to, e-commerce website accounts, online financial accounts and online email accounts


The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive identifiers to be saved in a validation database residing on a validation database server/web server, such that the local/mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and/or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local/mobile computing device.
Invysta Technology Group


Security check method and system, terminal, verification server


Described are a security check method and system, a terminal, and a verification server. The method includes: receiving a selection operation on one of service provider identifiers; triggering an interface switching instruction according to the selection operation, and switching, according to the interface switching instruction, to an original virtual resource accumulation page corresponding to a user identifier and the service provider identifier selected by a user; receiving a virtual resource acquisition instruction input by the user on the original virtual resource accumulation page; switching from the original virtual resource accumulation page to a verification interface according to the virtual resource acquisition instruction; receiving verification information input on the verification interface, and uploading the verification information and the service provider identifier to a verification server for verification; and receiving a new virtual resource accumulation page that is returned by a virtual resource server after verification of the verification server succeeds..
Tencent Technology (shenzhen) Company Limited


Restricting broadcast and multicast traffic in a wireless network to a vlan


Traffic broadcast to a vlan is restricted. To do so, a plurality of stations are associated with a bssid (basic service set identifier).
Meru Networks


System and securely storing and sharing information


The present application generally relates to systems, devices, and methods to conduct the secure exchange of encrypted data using a three-element-core mechanism consisting of the key masters, the registries and the cloud lockboxes with application programming, interfaces providing interaction with a wide variety of user-facing software applications. Together the mechanism provides full lifecycle encryption enabling cross-platform sharing of encrypted data within and between organizations, individuals, applications and devices.
Reid Consulting Group


Systems and methods for managing resetting of user online identities or accounts


Systems and methods are disclosed for managing the resetting of online identities or accounts of users of internet web pages. One method includes: receiving, through an electronic device, a request to reset login information to access a web page associated with the user's online account; determining that an ip address associated with the request is not identified as being suspicious; receiving user data intrinsic to the user's request; automatically verifying two or more values of the data intrinsic to the user's request as being indicative of a level of trust of the identity of the user; and transmitting, to the user over the internet, a subset of options to reset the login information, the subset being selected based on the level of trust..
Aol Inc.


Method and configuring connection between devices in communication system


Disclosed are a communication scheme and a system thereof for converging an iot technology and a 5g communication system for supporting a high data transmission rate beyond that of a 4g system. A method and an apparatus for configuring a connection with a second device, which provides access to a network, by a first device in a communication system, is provided.
Samsung Electronics Co., Ltd.


Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (ccs)


The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key.
Netskope, Inc.


Systems and methods for securely streaming media content


Systems and methods securely provide media content from a media server to a media client via a network. The media content is segmented to create multiple media segments that are each identified in a playlist, and at least one of the media segments is encrypted using a cryptographic key.
Echostar Technologies L.l.c.


Message distribution control


A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message is to be protected, identifying content in the message to be protected, adding the identified content to a database of protected content, and determining whether subsequently received content in a subsequently received message is associated with the identified content. A system for controlling distribution of content in a message sent by a message sender comprises a processor configured to receive an indication from the message sender that the message is to be protected, identify content in the message to be protected, add the identified content to a database of protected content, and determine whether subsequently received content in a subsequently received message is associated with the identified content..
Dell Software Inc.


System and mobile authentication


A method for two factor authentication is described. The method comprises a server receiving an activation code for verification from a mobile device.
Ca, Inc.


Control for controlling authenticity of codes resulting from application of a bijective algorithm to messages


A device (cd) is intended for controlling authenticity of a code received with a message by an electronic device (ed2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (cd) has i) a first computation means (cm1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (cm2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (cm3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical..
Gemalto Sa


Converting mobile traffic between ip vpn and transport level vpn


Techniques described herein convert mobile traffic between different types of vpn protocols, including ip and transport. In an embodiment, a security proxy associated with a server receives a packet associated with a client app on a device, the packet including a source identifier and a destination identifier.
Mobile Iron, Inc.


Inter-pod traffic redirection and handling in a multi-pod network environment


An example method for to inter-pod traffic redirection and handling in a multi-pod network environment is provided and includes receiving a packet with an overlay header outgoing from a first pod, identifying the packet as redirected based on a source address in the overlay header indicating a second pod and a destination address in the overlay header indicating a third pod, the first pod being distinct from the second pod and the third pod, setting a redirection bit in the overlay header tagging the packet as redirected, and transmitting the packet to the third pod.. .
Cisco Technology, Inc.


Internet profile service


Systems and methods for creating and using a domain profile include identifying a status of a first page associated with a domain. The first page is retrieved and additional pages from the domain are identified based on hyperlinks from the first page.
Verisign, Inc.


Server device


A server device accepts profile information from a user wishing to use the service to proceed with registration of the user to the service, receives and records a message whose destination is an unregistered user who has not yet registered for the service together with identification information to identify the destination user, and transmits the message to a new registered user if it is determined, based on the profile information accepted from the new registered user and the identification information, that the new registered user who has registered for the service after the receipt of the message corresponds to the destination user.. .

Building or enhancing a relationship between users of a communications network


A method for building or enhancing a relationship between user a and user c may include receiving an identification of user c of a communications network with whom user a of the communications network wants to build or enhance a relationship. The method may also include receiving an identification of an existing relationship that user a wants to use as a model for building or enhancing the relationship with user c.
International Business Machines Corporation


Systems and methods for providing notifications based on subject subscription


Systems, methods, and non-transitory computer-readable media can identify a resource provided via a social networking system. A request for a user account to subscribe to a subject that is presentable via the resource can be received.
Facebook, Inc.


Building or enhancing a relationship between users of a communications network


A method for building or enhancing a relationship between user a and user c may include receiving an identification of user c of a communications network with whom user a of the communications network wants to build or enhance a relationship. The method may also include receiving an identification of an existing relationship that user a wants to use as a model for building or enhancing the relationship with user c.
International Business Machines Corporation


Auto clean-up of unused email rules


Usage-based management of email rules is provided. An unused email rule of a set of active rules is identified.
International Business Machines Corporation


Method and system for synchronizing instant messages between multiple clients


A method of synchronizing the display of instant messages between multiple clients is performed at a computer system. Upon receipt of a first synchronization request from a client, the first synchronization request including a conversation identifier and a last message timestamp, the computer system identifies a conversation including a set of messages associated with the conversation identifier.
Tencent Technology (shenzhen) Company Limited


Electronic communication system


An electronic communication system for sending, receiving, storing, organizing, displaying, and sharing electronic messages and content (e.g., text, image, audio, and video) is described. The electronic communication system provides a platform where users can communicate and share information with each other.
Boogoo Intellectual Property Llc


Pending interest table behavior


One embodiment provides a system that facilitates efficient aggregation of multiple interest messages for the same content from multiple predecessors. During operation, an intermediate node receives a first interest message from a predecessor node.
Palo Alto Research Center Incorporated


Electronic communication system


An electronic communication system for sending, receiving, storing, organizing, displaying, and sharing electronic messages and content (e.g., text, image, audio, and video) is described. The electronic communication system provides a platform where users can communicate and share information with each other.
Boogoo Intellectual Property Llc


Method and system for providing private chat within a group chat


Embodiments of the present application provide a method and system for private chat within a group chat. During operation, the system receives, at a server from a computing device, a first message that includes a first private chat identifier, private chat counterpart information, and private chat content data.
Alibaba Group Holding Limited


Auto clean-up of unused email rules


Usage-based management of email rules is provided. An unused email rule of a set of active rules is identified.
International Business Machines Corporation


System and discovery and early notification of future unavailability


A method, computer program product, and computer system for determining, by a computing device, one or more communication threads between a plurality of users. A first user of the plurality of users is identified as likely to be unavailable for a predetermined amount of time at a future date.
International Business Machines Corporation


Cell forwarding order selection for sending packets


In one embodiment, packets are sent a packet switching mechanism of a packet switching device, which includes partitioning each particular packet into a plurality of cells with each particular packet and cell derived therefrom associated with a same particular timestamp and a same particular ingress point identifier representing an ingress point of a plurality of ingress points of the packet switching mechanism. These cells are sent through the packet switching mechanism by selecting and forwarding, at each of a plurality of points within the packet switching mechanism.
Cisco Technology, Inc., A Corporation Of California


A system and a analysing a plurality of data packets


A system and a method for analysing a plurality of data packets where the data packets are analysed to determine which of a number of subsequent process(es) is/are to further analyse the data packets. Information identifying the subsequent process(es) is added to a fifo.
Napatech A/s


Pre-sorter distributing gtp packets


Pre-sorter systems and methods are disclosed for distributing gtp packets. The pre-sorter forwards gtp packets based upon entries within one or more pre-sort tables, and the entries associate f-teids with output ports that can be coupled to gtp sessions controllers and/or other external systems.
Anue Systems, Inc.


Identifier assignment to a new switch in a switch group


One embodiment of the present invention provides a switch. The switch includes a switch group module, a persistent storage module, and an allocation module.
Brocade Communications Systems, Inc.


Resource prioritization and communication-channel establishment


A resource prioritization system and method for processing request communications by prioritizing resources based on obtainment parameters and establishing communication channels. The resource prioritization system and method may receive a request from a user device.
Liveperson, Inc.


Generating application build options in cloud computing environment


A method of generating application build options in a cloud computing environment that includes receiving application usage data by a set of currently instantiated applications. The method further includes identifying, in view of the application usage data, a set of application resources in a cloud computing environment.
Red Hat, Inc.


Dynamic management of computing platform resources


Embodiments of the invention provide for methods for management of logically partitioned computing resources of a data processing system configured with hypervisors that each manages one or more logical partitions of the computing resources. The data processing system is configured with domains, and allocated to each domain are one or more hypervisors and logical partitions managed thereby.
International Business Machines Corporation


Dynamic management of computing platform resources


Embodiments of the invention provide for systems and computer program products for management of logically partitioned computing resources of a data processing system configured with hypervisors that each manages one or more logical partitions of the computing resources. The data processing system is configured with domains, and allocated to each domain are one or more hypervisors and logical partitions managed thereby.
International Business Machines Corporation


Data stream identifying


A data stream identifying method and device is presented, which may include receiving a data stream of a first application and a data stream of a second application; extracting a common resource address in the data stream of the first application and the data stream of the second application; determining that the data stream of the first application belongs to the second application when the common resource address includes an address of a server of the first application; and determining that the data stream of the second application belongs to the first application when the common resource address includes an address of a server of the second application. Further, an application to which a data stream belongs can be more correctly identified, so that more accurate data is provided for services, such as traffic statistics and charging, thereby improving user experience..
Huawei Technologies Co., Ltd.


Controlling notification based on power expense and social factors


In one embodiment, a computer system receives an indication of a power state of a client device, identifies messages to be sent to the client device, determines a transmit cost and a value of each of the messages, and stores at least one of the messages in a queue based on the transmit cost and value of the message.. .
Facebook, Inc.


Congestion abatement in a network interconnect


A method and system for detecting congestion in a network of nodes, abating the network congestion, and identifying the cause of the network congestion is provided. A congestion detection system may comprise a detection system, an abatement system, and a causation system.
Cray Inc.


Congestion causation in a network interconnect


A method and system for detecting congestion in a network of nodes, abating the network congestion, and identifying the cause of the network congestion is provided. A congestion detection system may comprise a detection system, an abatement system, and a causation system.
Cray Inc.


Sdn packet forwarding


A method for forwarding a software defined networking (sdn) packet, applied in a data forwarding device in a sdn network, comprising: dividing a flow table with a plurality of flow table entries according to a class in advance, and obtaining multi-layer flow tables serial in sequence; wherein each layer of flow table corresponds to a class of flow table; and receiving a sdn packet, searching each layer of flow table in sequence according to a precedence order of the multi-layer flow tables, or directly pointing to a specified flow table to search a matched flow table entry, and processing the sdn packet.. .
Hangzhou H3c Technologies Co., Ltd.


Communication apparatus, communication method, control apparatus, and management apparatus in a communication system


A communication technique, a control technique, and a management technique are provided that can suppress effects on communication services caused when switching a communication path route. A communication apparatus (4) which performs communication over communication paths configured in a network includes: a first means for identifying a communication path group corresponding to the communication paths to one of which a received packet belongs; and a second means for forwarding the received packet to a network node associated with the communication path group corresponding to the received packet, among a plurality of network nodes which can terminate the communication paths..
Nec Corporation


Application-based network packet forwarding


Methods and systems for detecting an application associated with a given ip flow and differentially forwarding packets based on determined application are provided. According to one embodiment, an initial internet protocol (ip) packet of an ip flow is received by a network device.
Fortinet, Inc.


Shortest path bridge with mpls labels


A method is implemented by a node for enabling shortest path bridging in a network that is scalable to support sixteen million virtual local area network (vlan) identifiers using multiprotocol label switching (mpls) encapsulation. The method comprises allocating a tunnel label using a distributed tunnel label allocation algorithm, allocating a source label using a distributed source label allocation algorithm, assigning a bridge instance a service label, and distributing the tunnel label, source label and service label to other nodes in the mpls network..
Telefonaktiebolaget L M Ericsson (publ)


Segment routing label switch paths in network functions virtualization communications networks


A method is provided in one example embodiment and includes receiving a request to create a path through a network, wherein the path originates on a first network device and terminates on the second network device; identifying a first controller associated with the first network device, wherein the first controller proxies control plane functions for the first network device; identifying a second controller associated with the second network device, wherein the second controller proxies control plane functions for the second network device; and computing the path using the first controller as a source and the second controller as a destination. The first controller installs the computed path on the first network device and the second controller installs the computed path on the second network device..
Cisco Technology, Inc.


Link discovery method, system, and device


The present invention provides a link discovery method. In the method, a first controller sends a first message to a first node, and the first node receives the first message, and sends the second link discovery packet from a first port to the second node; the second node receives the second link discovery packet at a second port, and sends a second message to the second controller according to the label, where the second message carries the second link discovery packet and an identifier of the second port; and the second controller receives the second message, extracts an identifier of the first port in the first link discovery packet and the identifier of the second port in the second message, and determines that a link exists between the first port of the first node and the second port of the second node..
Huawei Technologies Co., Ltd.


System for analyzing patient out-of-network utilization and improving retention


A patient out-of-network utilization analysis and reporting system includes: an out-of-network utilization analysis server, configured to access one or more databases to obtain healthcare claims information, to generate out-of-network utilization analysis information corresponding to identification of potential sources of patient out-of-network utilization based on the obtained healthcare claims information, and to the send out-of-network utilization analysis information to a client computing device, wherein the healthcare claims information includes procedure-related information and/or physician attribution information; and the client computing device, configured to receive out-of-network utilization analysis information via a network from a server and to display the out-of-network utilization analysis information to a user of the client computing device.. .
Aetna Inc.


Terminal device, information transmission method, and non-transitory computer readable recording medium


A terminal device according to the present invention includes an application and a browser. The application includes a providing unit that provides the browser that is instructed by the application to perform a predetermined process with terminal information that is used to identify a terminal device and that is acquired by the application.
Yahoo Japan Corporation


Dynamic community support


An approach for assisting a user with a service request is provided. In the approach, it is determined that an error has occurred on a computing device of a user.
International Business Machines Corporation


Probability-distribution-based log-file analysis


The current document is directed to systems, and methods incorporated within the systems, that carry out probability-distribution-based analysis of log-file entries. A monitoring subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to detect changes in the state of the distributed computer system.
Vmware, Inc.


Method and systems for identifying faulty communication calls


This disclosure relates generally to call monitoring techniques, and more particularly to method and system for identifying faulty communication calls. In one embodiment, a method comprises generating communication call record information for a communication call upon determining release of the communication call on a signaling plane.
Wipro Limited


Information processing method and switch


An information processing method and a switch are described, in which the method includes the steps of acquiring a first information transmitted by the server through the first connection; deciding whether a first parameter in the first information matches a first predetermined parameter, the first parameter including at least virtual local area network (vlan) identification information and internet protocol (ip) address information corresponding to a network port into which the first connection line is plugged on the server; determining the first connection line connected at the switch is in a wrong connection when it is decided that the first parameter does not match the first predetermined parameter. The recognition whether a connection of a network cable plugged in a network port of the server and the port of the switch are correct may be realized automatically..
Lenovo (beijing) Co., Ltd.


Method and tracing session at policy server


In one embodiment, a method includes receiving at a policy server, a request to trace a session at the policy server, tracing the session at the policy server, wherein tracing comprises running the session and identifying access results from the trace, and transmitting the access results from the policy server to a network device requesting the trace. An apparatus and logic are also disclosed herein..
Cisco Technology, Inc.


Predicting hardware failures in a server


A computer system is monitored for conditions bearing on the effective age of various hardware components of the system. Upon detecting an age adjustment condition, the affected hardware components are identified.
International Business Machines Corporation


Optimizing allocation of multi-tasking servers


Optimizing allocation of multi-tasking servers is provided. A schedule that identifies a plurality of time periods is received.
International Business Machines Corporation


Distributed operating system for network devices


Methods, systems, and computer programs are presented for managing a global network topology. One method includes an operation for generating, by a network device, a local topology identifying which network entities are connected to each external port of the network device.
Pluribus Networks, Inc.


Physical change tracking system for enclosures within data centers


Embodiments for implementing change control management in computing center environments by a processor. A determination is made of a present status of a monitored component of a computing device in the computer center environment.
International Business Machines Corporation


Method and binding device


A method and an apparatus are provided for binding a terminal with an electronic device. In the method, the server receives a binding request sent from a terminal, where the binding request includes a device identification identifying an electronic device and a user account corresponding to the terminal.
Xiaomi Inc.


Software version maintenance in a software defined network


As disclosed herein a method includes a software defined networking controller identifying an element managed by the controller on which to perform a software version maintenance operation, de-activating the identified element in a software defined network (sdn), ensuring that there is an active backup for the element in the sdn while the identified element is de-activated, initiating the software version maintenance operation on the de-activated identified element, and in response to completion of the software version maintenance operation, re-activating the de-activated identified element in the sdn. A computer system, and a computer program product corresponding to the method are also disclosed herein..
International Business Machines Corporation


Multi-fabric manager


One embodiment of the present invention provides a computing system. The computing system includes processing circuitry, one or more ports, a persistent storage module, and a management module.
Brocade Communications Systems, Inc.


Context-aware smart home energy manager


A context-aware smart home energy management (cashem) system and method is disclosed. Cashem dynamically schedules household energy use to reduce energy consumption by identifying contextual information within said household, selecting a comfort of service preference, wherein said comfort of service preference is based on different said contextual information, and extracting an appliance use schedule for maximum energy savings based on said contextual information in light of said comfort of service preferences, by executing a program instruction in a data processing apparatus.
Honeywell International Inc.


Internet of things (iot) communication method, communication end, and user end


An iot communication method, including: receiving via an account of the communication end, access information or control information sent from an account of a user end. The access information includes an identifier of a source terminal and an access command which accesses status information of the source terminal.
Tencent Technology (shenzhen) Co., Ltd.


Reliable multicast in low-power and lossy networks


In one embodiment, a device in a network sends a first multicast message to a plurality of destinations in the network. The first multicast message includes a first bitmap that identifies the destinations.
Cisco Technology, Inc.


Pim source discovery by last hop router


Techniques are described for enhancements to protocol independent multicast (pim) to enable a last hop router (lhr) to perform source discovery and directly build or join a source tree. According to the techniques of this disclosure, the lhr builds a communication channel with a rendezvous point (rp) router and requests source information for at least one multicast group for which the lhr has interested receivers.
Juniper Networks, Inc.


Method of authenticating devices using certificates


A first device, upon detecting participation in an authentication system, transmits new and old identification information of a first certificate revocation list that the first device manages to a second device. In a case where the new and old identification information of a second certificate revocation list that the second device manages is older than the new and old identification information of the received first certificate revocation list, the second device transmits a transmission request for the first certificate revocation list to the first device.
Panasonic Intellectual Property Management Co., Ltd.


Method and system for certificate discovery and ranking certificate authorities


Certificate detectors scan a network for certificate resource information and send the information to a certificate database. A correlation engine extracts and correlates this information.
Digicert, Inc.


Apparatus and sponsored connectivity to wireless networks using application-specific network access credentials


At least one feature pertains to a method operational at a user device that includes receiving, from an application service provider, an application-specific certificate associated with at least one application service provided by the application service provider. The method also includes determining that a wireless communication network provides application-specific access to the application service provided by the application service provider, and transmitting a registration request including the application-specific certificate to the wireless communication network for authentication of the user device.
Qualcomm Incorporated


One-to-many matching with application to efficient privacy-preserving re-identification


Authentication methods are disclosed for determining whether a person or object to be authenticated is a member of a set of authorized persons or objects. A query signature is acquired comprising a vector whose elements store values of an ordered set of features for the person or object to be authenticated.
Xerox Corporation


Network service packet header security


In one embodiment, a network service packet header security method includes receiving a network service packet, analyzing the network service packet in order to identify a plurality of service functions and an associated service function path for the service functions, identifying which security function or functions may be performed by each of the service functions on a network service packet header to be generated for the network service packet, requesting at least one key for securing at least part of the network service packet header, receiving the at least one key, securing the network service packet header based on the at least one key, and sending the network service packet with the network service packet header to one of the service functions. Related apparatus and methods are also described..
Cisco Technology, Inc.


Policy-based key sharing


Methods of providing policy based access to master keys, enabling keys to be distributed to groups of users in a secure manner while minimizing disruptions to the user in the event of changes to group membership or changes to user attributes. User attributes are identified.
Oracle International Corporation


Providing in-line services through radio access network resources under control of a mobile packet core in a network environment


A method is provided in one example embodiment and includes sending, by a first entity associated with an access network, a first request message including a session identifier associated with a user session to a second entity associated with a core network. The method further includes establishing a first control channel with the second entity in which the first control channel is associated with the session identifier.
Vodafone Ip Licensing Limited


Method for transmitting/receiving a comp reference signal


A method of generating reference signals by a base station in a wireless communication system is disclosed. The method including a sequence of a first reference signal using a cell identifier of the base station, transmitting, to a first user equipment (ue), a message including mode information indicating a first mode for a coordinated multi-point (comp) operation and a predetermined identifier being different from the cell identifier of the base station and generating a sequence of a second reference signal for the first ue using the predetermined identifier instead of the cell identifier of the base station..
Lg Electronics Inc.


Methods and systems for harq protocols


Methods described herein are for wireless communication systems. One aspect of the invention is directed to a method for a harq process, in which the harq process includes a first transmission of an encoder packet and at least one retransmission.
Apple Inc.


Method and packet retransmission in dsl systems


Embodiments disclosed herein include systems and methods of packet retransmission. More specifically, at least one nonlimiting example of a method includes receiving data from above a y (gamma) interface, the data being identified as protected or not protected data; and storing the protected fragment in a retransmission queue included in a transport protocol specific transmission convergence layer..
Lkanos Communications, Inc.


Method and system for robust message retransmission


Techniques are disclosed for message retransmission. In one embodiment, an agent in a distributed system that receives and/or relays messages from a master node identifies messages that have not been successfully delivered, and adds a stub for each such message to a message queue.
Vmware, Inc.


Method and transmitting and receiving packet in communication system


A method for transmitting a packet for n data streams in a communication system is provided. The method includes dividing each of the data streams into data payloads and adding a header for discriminating between the n data streams to each of the data payloads, determining, from the source packet flow, an fec source formed by source packets generated from an (n−m) number of data streams, distinguishing at least one source packet block, generating a source symbol block from the at least one distinguished source packet block, generating a repair symbol block formed by at least one repair symbol, determining a repair flow id for identifying a repair flow formed by the repair symbols generated from the fec source packet flow, generating an fec repair packet by adding a header to each of the repair symbols of the repair flow, and transmitting the source packet and the fec repair packet..
Samsung Electronics Co., Ltd.


Enhanced automatic identification system


The invention relates to method and apparatus for improving the performance of communication systems using run length limited (rll) messages such as the existing automatic identification system (ais). A binary data sequence is forward error correction (fec) coded and then the sequence is compensated, for example by bit-erasure, so that either bit-stuffing is not required, or a bit stuffer will not be activated to ensure that the coded sequence meets the rll requirement.
University Of South Australia


System physical layer pipe for a digital television system


Methods and apparatuses are provided for transmitters and receivers for conveying and retrieving important system information carried in a multi-carrier modulation system for which the data stream is organized in multiple physical layer pipes (plp). This is particularly important when broadcasters share the same physical channel.
Thomson Licensing


Radiation receiver apparatus


Radiation receiver apparatus with a radiation receiver and a radiation entrance face, wherein the radiation receiver includes an active region that detects radiation with a target wavelength in the near-infrared, an optical element is arranged between the radiation entrance face and the radiation receiver, an optical axis of the optical element extends through the radiation receiver, the optical element is shaped and arranged relative to the radiation receiver such that, of radiation incident on the radiation entrance face at an angle of greater than or equal to 40° to the optical axis, at most 10% is incident on the radiation receiver, and a visible light filter is formed between the radiation receiver and the radiation entrance face.. .
Osram Opto Semiconductors Gmbh


Optical transmission module


An optical transmission module that converts an electric signal to an optical signal and outputs the optical signal, including: a package; a plurality of light-emitting elements each emitting light in the interior of the package; a plurality of light-receiving elements each including a light-receiving surface on which a portion of the light is incident in the interior of the package, for monitoring light outputs of the plurality of light-emitting elements; and light-shielding members provided on the plurality of light-receiving elements while avoiding the light-receiving surfaces.. .
Oclaro Japan, Inc.


Uspl-fso lasercom point-to-point and point-to-multipoint optical wireless communication


Enhancements in optical beam propagation performance can be realized through the utilization of ultra-short pulse laser (uspl) sources for laser transmit platforms, which are can be used throughout the telecommunication network infrastructure fabric. One or more of the described and illustrated features of uspl free space-optical (uspl-fso) laser communications can be used in improving optical propagation through the atmosphere, for example by mitigating optical attenuation and scintillation effects, thereby enhancing effective system availability as well as link budget considerations, as evidenced through experimental studies and theoretical calculations between uspl and fog related atmospheric events..
Attochron, Llc


Smart remote node optical network unit and operation method thereof


Disclosed is a smart remote node optical network node including an optical layer monitoring unit configured to transmit a monitoring light signal to an optical network unit through an optical switch and receive a monitoring light signal reflected from the optical network unit, an infra recognition unit configured to recognize whether an optical connector is connected to an output port of a remote node and an identification number of the optical connector when the optical connector is connected thereto, and a control unit connected to the optical layer monitoring unit and the infra recognition unit and configured to control recognition and monitoring operations of the remote node according to a remote node application.. .
Electronics And Telecommunications Research Institute


Communications in a medical device system with temporal optimization


Systems and methods for managing communication strategies between implanted medical devices. Methods include temporal optimization relative to one or more identified conditions in the body.
Cardiac Pacemakers, Inc.


Electronic device and performing wireless communication using beamforming thereof


Various embodiments of the present disclosure provide an electronic device and a method of performing wireless communication using beamforming provided. The electronic device for performing wireless communication using beamforming includes: a communication unit for communicating signals with a correspondent node; a memory for storing a beamforming setup table; and a controller for: identifying identification information regarding the correspondent node based on at least one of schedule information, a reception packet and a transmission packet; identifying beamforming setup information corresponding to the identification information identified regarding the correspondent node, from the beamforming setup table; and establishing a beamforming link with the correspondent node based on the beamforming setup information, to communicate data via the link.
Samsung Electronics Co., Ltd.


Beam training in communication system


The present disclosure relates to a pre-5th-generation (5g) or 5g communication system to be provided for supporting higher data rates beyond 4th-generation (4g) communication system such as long term evolution (lte). The present invention relates to a method and an apparatus in a communication system.
Samsung Electronics Co., Ltd.


Method for antenna array with steerable spotlight beams


Cellular array implementations with multiple steerable spotlight beams irradiated from a common aperture are disclosed herein. Such an approach can easily be adapted to suit various geographical population densities and distributions.
Huawei Technologies Co., Ltd.


Object identification and weight


The object identification and weight device is a thin layer pad that can capture an object's current identification and weight. The device will return the real-time object's identification and weight when the object (with a pre-configured nfc tag) is placed on the device (pad).

Mobile device-centric electronic subscriber identity module (esim) provisioning


The embodiments set forth techniques for enabling mobile devices to trigger an electronic subscriber identity module (esim) provisioning process. In some embodiments, a main operating system (os) of the mobile device communicates a provisioning command to an embedded universal integrated circuit card (euicc) included in the mobile device.
Apple Inc.


Method of and transmit noise reduction at a receiver


A method of reducing the noise from a transmitter at an associated receiver is disclosed. Noise contributions in active channels are identified and used to update a shared noise cancellation filter.
Analog Devices Global


Non-binary low density parity check decoder with format transforming variable node processor


A non-binary low density parity check decoder includes a check node processor configured to generate check node to variable node messages based on variable node to check node messages, and a variable node processor configured to generate the variable node to check node messages and to calculate perceived values of variable nodes based on the check node to variable node messages. The variable node to check node messages and the check node to variable node messages are in a normalized format.
Avago Technologies General Ip (singapore) Pte. Ltd.






Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.


4.3536

9804

3 - 0 - 237