Follow us on Twitter
twitter icon@FreshPatents


Networks patents

      

This page is updated frequently with new Networks-related patent applications.




 Fairness in wireless networks with adaptive clear channel assessment thresholds patent thumbnailFairness in wireless networks with adaptive clear channel assessment thresholds
When contending for access to a radio channel (for example csma/ca in wi-fi), an apparatus selects a first clear channel assessment (cca) threshold that is higher than a minimum; determines to temporarily use a second cca threshold that is lower than the first cca threshold; and based on this determination it selects the second cca threshold for a specified time period. In one embodiment this determination is based on the apparatus' use of a spectrum relative to a threshold usage level which may be calculated as a number of successful transmissions by the apparatus on the spectrum over a predefined time period; and/or as a deferring time experienced by the apparatus with respect to the spectrum over a predefined time period.
Nokia Technologies Oy


 Low power redundant transmission network patent thumbnailLow power redundant transmission network
A method and system for using a communication protocol over a low-powered transmission network. The communication system and protocol enables low-powered transmission devices to efficiently and reliably transmit data in challenging environments.
Squadle, Inc.


 Arrangement at a mobile data unit patent thumbnailArrangement at a mobile data unit
The invention is based on a platform that has both hardware and software. The latter includes, amongst other things, an algorithm to solve the problem encountered when, on passing between countries and operators, data services have to roam between mobile networks.

 Method and  determining ims connectivity through non-3gpp access networks patent thumbnailMethod and determining ims connectivity through non-3gpp access networks
A method, apparatus and computer program product are provided for determining ims connectivity through non-3gpp access networks. A method is provided for receiving, in response to an access network query, an available public land mobile network (plmn) list; wherein the plmn list comprises an ip multimedia subsystem access point name (ims apn) indication for the respective plmns with ims connectivity; determining, using a processor, if a connection to a home plmn (hplmn) can be established using an ims apn associated with a plmn from the plmn list; and prioritizing available wireless local area networks (wlan) based on the determining if a connection to the hplmn can be established using the ims apn for the respective plmns of the plmn list associated with the respective wlans..
Nokia Technologies Oy


 Cognitive wireless system  - predicted temporal overlap patent thumbnailCognitive wireless system - predicted temporal overlap
A system and method is disclosed to evaluate the suitability of wi-fi and cellular networks by considering the temporal and spatial overlap of wi-fi aps. .
Sierra Wireless, Inc.


 Inter-system hand-over of a mobile terminal operable with a first and a second radio access network patent thumbnailInter-system hand-over of a mobile terminal operable with a first and a second radio access network
A method and device for initiation a mobile originating service-based inter-system handover. At least two radio access networks (rans) of different types, i.e.
Vringo Infrastructure Inc.


 Centralized network management for different types of rat patent thumbnailCentralized network management for different types of rat
Techniques and apparatus disclosed herein include methods for allocating data sessions among two radio access networks (rans), as might be carried out in a network management node operatively connected to one or more network nodes in each of a first ran and a second ran, where the first and second rans have overlapping coverage areas. An example method includes receiving (401) current data session information and network performance information for each of the first and second rans, from the one or more network nodes, and computing (402) a reallocation of data sessions among the first and second rans, based on the performance information and configuration data for the first and second rans, using a metaheuristic algorithm.
Telefonaktiebolaget Lm Ericsson (publ)


 Connection attempt to alternative access upon connection attempt rejection patent thumbnailConnection attempt to alternative access upon connection attempt rejection
The invention relates to methods, user equipments, computer programs, computer program products and carriers for access network selection between a first network and a second network. Said first and second networks comprise one or more access candidates.
Telefonaktiebolaget Lm Ericsson (publ)


 Mitigating no-service delays for lte capable wireless devices without lte access permission patent thumbnailMitigating no-service delays for lte capable wireless devices without lte access permission
This disclosure relates to reducing or mitigating no-service delays for lte capable wireless devices which do not have permission to access one or more lte networks. According to some embodiments, a mme of a first plmn may receive an lte nas request corresponding to a tracking area from a wireless device.
Apple Inc.


 Using network-provided information to tune wireless network client performance patent thumbnailUsing network-provided information to tune wireless network client performance
According to various aspects, exemplary embodiments are disclosed of systems and methods for dynamic configuration of wireless clients and infrastructure in wireless networks, to tune client performance. A network embodiment includes a wireless network infrastructure and a plurality of devices having clients integrated therewith and configured for wireless communication via the wireless infrastructure and for communication with a server.
Laird Technologies, Inc.


Systems and methods for reuse of wireless communication resources in neighboring communication networks

Methods and apparatus for managing reuse of a wireless medium are provided. One method of managing reuse of a wireless medium includes determining, at an access point, whether to allow reuse of the wireless medium by one or more stations in a basic service set (bss).
Qualcomm Incorporated

Recovery techniques in mobile networks

A technique for protecting location information of a subscriber in a mobile network is disclosed. A user mobility server (ums) receives a first query from a first call state control function (cscf).
Intellectual Ventures I Llc

Communication system

A communication system is disclosed in which a control node generates configuration data for each of a plurality of mmes operating in overlay networks. The configuration data defines a type of user equipment (ue) or a type of ue traffic to be serviced by each mme.
Nec Corporation

Apparatus for transmitting broadcast signal, receiving broadcast signal, transmitting broadcast signal and receiving broadcast signal

A method of transmitting a broadcast signal is proposed. In the method of transmitting the broadcast signal, a system capable of supporting future broadcast services in an environment supporting future hybrid broadcast using terrestrial broadcast networks and the internet is proposed.
Lg Electronics Inc.

Systems and methods for configuring baby monitor cameras to provide uniform data sets for analysis and to provide an advantageous view point of babies

Systems and methods for monitoring babies with cameras using a centralized computation and storage center that allows using visual output signals for computer vision and machine learning analysis and high-level reasoning of baby movements. The system comprises a camera located at a predefined working point above a baby's crib, and one or more communication networks between components of the system including a web-based network for in-depth computer vision and machine learning analysis of the visual output signals by an analysis server..

Method and system for routing of inbound toll-free communications

Aspects of the present disclosure involve systems, methods, computer program products for consolidating toll-free features of two or more telecommunications networks. In one implementation, the network services may be consolidated through utilization of an enhanced feature server (efs) or other type of application server deployed in a telecommunications network.
Level 3 Communications, Llc

Remote sip stack and architecture and methods for video calls between mobile devices

This disclosure describes computer architectures, software, and methods by which a custom signaling protocol is implemented for communicating between an app on a mobile device and an app that is either on a local area network or on a mobile device using a special-purpose cloud service. The cloud service translates messages from the mobile app protocol into sip and also tracks the power state of the mobile app, and translates the sip protocol back to the mobile app protocol when sending the signaling messages to the mobile app.
Sightcall, Inc.

Facilitating quality of service and security via functional classification of devices in networks

Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device.
At&t Intellectual Property I, L.p.

Multiple cloud services delivery by a cloud exchange

In some examples, a network data center comprises a cloud-based services exchange point comprising a network, the cloud-based services exchange point operated by a cloud exchange provider that operates the network data center; and a programmable network platform comprising at least one programmable processor configured to receive a service request that specifies a plurality of cloud services provided by respective cloud service provider networks operated by respective cloud service providers, wherein the service request further specifies a topology for the plurality of cloud services; and provision, responsive to the service request, the cloud-based services exchange point to forward service traffic for the plurality of cloud services according to the topology for the plurality of cloud services.. .
Equinix, Inc.

System and server based control

A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external internet-connected control server associated with the control logic implementing a pid closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic.
May Patents Ltd.

Group reformation mechanism for reducing disruption time in wireless peer to peer networks

A method to reduce group reformation time and maintain seamless connectivity in a peer-to-peer network at the time of disappearance of the group owner (go). Each of the nodes is provided with an emergency leader list which prioritizes a predetermined number of emergency leader nodes each of which is a client node having intent of acting as an emergency leader, wherein the emergency leader list is prepared right at the time of group formation.
Nec Corporation

Security in mixed networks

A device may include a processor circuit configured to transmit, over a network medium, a request for transmission of a data communication to a first device of a network, and receive, over the network medium, a grant of the request. When the first device is associated with a first security profile, the processor circuit may be configured to encrypt the data communication based at least on a first password associated with the first security profile.
Broadcom Corporation

System and building intelligent and distributed l2-l7 unified threat management infrastructure for ipv4 and ipv6 environments

A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine.
Symantec Corporation

Interconnecting external networks with overlay networks in a shared computing environment

A method includes obtaining, by one or more processor, data from a virtual network of a tenant and an identifier of the tenant, where the virtual network of the tenant is one of at least two virtual networks in a shared computing environment where the at least two virtual networks overlay a physical network. Based on obtaining the identifier of the tenant, the method includes setting, by one or more processor, the identifier in metadata of the data and based on the identifier in the metadata, identifying, by the one or more processor, a network connection associated with the tenant.
International Business Machines Corporation

Delivering security functions to distributed networks

Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet received from a switch, the data packet directed to the at least one network asset; selectively forwarding the data packet using the processing and a rule set; inspecting the forwarded packet; directing the enforcement point to at least one of forward the data packet to the at least one network asset and drop the data packet, using the inspection and the rule set; accumulating data associated with at least one of the data packet, the processing, and the inspection; analyzing the at least one of the data packet, the processing, and the inspection; and initiating compilation of a high-level security policy by the compiler using the analysis to produce an updated rule set..
Varmour Networks, Inc.

Methods and systems for allocating and provisioning computing resources

Aspects of the present disclosure include systems and methods for the automatic allocation and/or provisioning of various infrastructural computing resources upon which networks, such as telecommunication networks operate. In various aspects, data identifying one or more computing resources needed to implement, support, and/or otherwise facilitate the execution and/or development of a particular computing process, application, software, process, and/or service may be received via one or more interfaces, such as a graphical user-interface (“gui”).
Level 3 Communications, Llc

Method and system fpor transferring data to improve responsiveness when sending large data sets

Most of the internet traffic today is carried out via the transmission control protocol (tcp). The main advantage of tcp is that it provides reliable data transfer to the application layer and simplifies programming.
Pme Ip Pty Ltd.

Gateways for sensor data packets in cellular networks

A device may include a processor and a computer-readable medium storing instructions which, when executed by the processor, cause the processor to perform operations for forwarding a sensor data packet. The operations may include receiving the sensor data packet.
At&t Mobility Ii Llc

Method and scalable content routing and mobility in named data networks

Various disclosed embodiments include methods, systems, and computer-readable media for named data network (ndn) inter/intra-domain mobility. A complete de-coupling of identity and addressing space is established.
Futurewei Technologies, Inc.

Method for providing bio-inspired routing protocol using overhearing and probabilistic path finding in mobile ad hoc networks and system thereof

A method and system for providing a bio-inspired routing protocol using overhearing and/or probabilistic path finding in a mobile ad hoc network.. .
Agency For Defense Development

Adaptive traffic routing in communication networks

The present invention relates to the field of re-routing packet data in a data communication network, where it is desired to maintain the original packet order at the receiver end without significantly increasing system complexity, processing latency or related costs. For this purpose, the present invention suggests a method of re-routing at least one data-stream and a network element for re-routing at least one data-stream.
Xieon Networks S.à.r.l.

System and control flow management in software defined networks

A novel (software defined network) sdn control plane is introduced having new system capabilities to activate and deactivate controllers in real-time upon automatic measurement of network control traffic and service requirements, and proper controller interactions with network switches as control plane topology changes. Also introduced is a control flow table, which defines the assignment of certain control flows (by originator, location, service type, etc.) to different controllers within the sdn..
Argela Yazilim Ve Bilisim Teknolojileri San. Ve Tic. A.s.

Distributed fault isolation in connected networks

A method is described for determining, via a local fault poller, a list of local unreachable devices of a plurality of devices within a local domain, wherein the local unreachable devices are coupled for communication with the local fault poller. The method comprises determining selected neighboring domains of a plurality of neighboring domains, wherein the selected neighboring domains comprise neighboring devices which are coupled for communication with the local unreachable devices, each neighboring domain having a respective neighboring global fault poller.
Ca, Inc.

Method and data analytics management

An improved system and method for providing data analytics management (dam), in particular for wireless networks having multiple domains, is disclosed. Some embodiments utilize a hierarchical dam structure.
Huawei Technologies Co., Ltd.

Dedicated protection for virtual network embedding

Techniques for virtual network embedding (vne) with dedicated protection of multiple virtual networks against a single node or link failure are described. The virtual network embedding provides dedicated protection without using redundant substrate network resources for each of the individual virtual networks (vns) elements..
Huawei Technologies Canada Co., Ltd.

Flexible channel coordination for multiple optical carrier optical networks

One or more management systems coordinate wavelength configuration patterns of a plurality of multi-wavelength optical transport nodes in an optical network for a first transport period. The one or more management systems determine data traffic demand changes in the optical network; and coordinate wavelength configuration patterns of the plurality of multi-wavelength optical transport nodes in the optical network for a second transport period, that is subsequent to the first transport period, based on the determined data traffic demand changes..
Verizon Patent And Licensing Inc.

Method and controlling out-of-band interference and error vector magnitude (evm)using peak-to-average-power-ratio (papr) reduction with constraints

A method and system uses a constrained set of indexed samples to identify a next generation population of samples that exhibits a more desirable signal characteristic such as lower papr, out-of-band emission and error vector magnitude. The invention generates an intermediate set of indexed samples which are subjected to a fitness function and next generation calculations to produce next generation indexes for the next population of samples.

Network system, inter-site network cooperation control apparatus, network control method, and program

Provided an inter-site network cooperation control apparatus connected to a network control apparatus in each of extension source and extension destination site of a virtual network that receives an extension request from the network control apparatus, notifies the network control apparatus in the extension destination site of an instruction to create a virtual network in the extension destination site, and notifies the network control apparatuses in the extension destination site and the extension source site of an instruction to create virtual ports for a tunnel between the sites, thus a communication connection being established between the virtual networks in the sites via the tunnel between the virtual ports for a tunnel.. .
Nec Corporation

Optical multiplex level and optical channel layer server trails in wavelength switched optical networks

An optical network packet configured to transmit over an optical communication link from a first optical network having a first control plane to a second optical network having a second control plane is generated. Generating the optical network packet comprises generating the packet configured to be transmitted from the first optical network to the second optical network in the optical domain..
Cisco Technology, Inc.

Osnr margin monitoring for optical coherent signals

A method and an apparatus are provided, for monitoring osnr system margin in optical networks, by relying on relationships that exists between the optical signal to noise ratio (osnr) value and the electrical signal to noise ratio (esnr) value.. .
Eci Telecom Ltd.

Backup communications scheme in computer networks

Various techniques for managing communications backup for computer networks are disclosed herein. In one embodiment, a method includes detecting an abnormal operating condition at a primary network node, the primary network node being coupled to a computing device via a first optical connection between an optical switch and the primary network node.
Microsoft Technology Licensing, Llc

Enhanced beamforming training in a wireless local area networks

Apparatus, computer readable media, and methods for enhanced beamforming training in a wireless local area network are disclosed. An apparatus of a access point or station is disclosed.

Method of controlling uplink multiple user transmissions in densely deployed wireless local area networks

Densely populated wireless local area networks (wlans) can encounter issues with processing multiple user (mu) uplink (ul) transmissions sent from many stations (stas) simultaneously. The access points (ap) or master stations in these densely populated wlans must manage the ul mu transmissions.
Intel Corporation

Method and device for simultaneous upstream and downstream measurements in cable tv networks

A cable network tester includes separate ports for receiving downstream and upstream signals, and separate signal processing circuitry for parallel processing the downstream and upstream signals. Results of the upstream and downstream testing, including upstream and downstream frequency scans and other tests related to incoming subscriber services and home wiring integrity, may be simultaneously displayed in real time.
Viavi Solutions Inc.

Conversion of a discrete-time quantized signal into a continuous-time, continuously variable signal

Provided are, among other things, systems, apparatuses, methods and techniques for converting a discrete-time quantized signal into a continuous-time, continuously variable signal. An exemplary converter preferably includes: (1) multiple oversampling converters, each processing a different frequency band, operated in parallel; (2) multirate (i.e., polyphase) delta-sigma modulators (preferably second-order or higher); (3) multi-bit quantizers; (4) multi-bit-to-variable-level signal converters, such as resistor ladder networks or current source networks; (5) adaptive nonlinear, bit-mapping to compensate for mismatches in the multi-bit-to-variable-level signal converters (e.g., by mimicking such mismatches and then shifting the resulting noise to a frequently range where it will be filtered out by a corresponding bandpass (reconstruction) filter); (6) multi-band (e.g., programmable noise-transfer-function response) bandpass delta-sigma modulators; and/or (7) a digital pre-distortion linearizer (dpl) for canceling noise and distortion introduced by an analog signal bandpass (reconstruction) filter bank..
Syntropy Systems, Llc

Conversion of a discrete-time quantized signal into a continuous-time, continuously variable signal

Provided are, among other things, systems, apparatuses, methods and techniques for converting a discrete-time quantized signal into a continuous-time, continuously variable signal. An exemplary converter preferably includes: (1) multiple oversampling converters, each processing a different frequency band, operated in parallel; (2) multirate (i.e., polyphase) delta-sigma modulators (preferably second-order or higher); (3) multi-bit quantizers; (4) multi-bit-to-variable-level signal converters, such as resistor ladder networks or current source networks; (5) adaptive nonlinear, bit-mapping to compensate for mismatches in the multi-bit-to-variable-level signal converters (e.g., by mimicking such mismatches and then shifting the resulting noise to a frequently range where it will be filtered out by a corresponding bandpass (reconstruction) filter); (6) multi-band (e.g., programmable noise-transfer-function response) bandpass delta-sigma modulators; and/or (7) a digital pre-distortion linearizer (dpl) for canceling noise and distortion introduced by an analog signal bandpass (reconstruction) filter bank..
Syntropy Systems, Llc

Modeling system for energy systems

A system for modeling networks of electricity supply and demand including a first user interface; a second user interface; a database, a memory; and a controller adapted to: receive, via the first user interface, a first request to create a first plan for a first node of a collection of the one or more collections, the first request specifying a domain of the collection, receive plan instructions for the first plan, receive a second user request to create a second plan for a second node of the collection, the second user request specify ing the domain of the collection, receive a plan instruction to interconnect the first node with the second node in the first plan, generate a forecast including a projected value for an energy infrastructure variable using the assumptions provided in the first plan and the second plan, and display the forecast on the first user interface.. .

Millimeter-wave high-gain steerable reflect array-feeding array antenna in a wireless local area networks

A reflect array-feeding array (ra-fa) antenna is disclosed. The ra-fa antenna comprising: a reflect array base comprising a plurality of reflecting elements with a phase shift distribution to reflect an incident beam to generate a reflected beam having a narrower beamwidth in an elevation plane and a same beamwidth in an azimuth plane, and a feeding array comprising a phased antenna array with a beam-steering ability to direct the incident beam at the reflecting elements.

Gaming aspects relating to multiplayer/tournament hybrid arcade/wager-based games

Various aspects described for implementing tournament hybrid arcade/wager-based gaming techniques via computer networks, including one or more casino gaming networks. The tournament hybrid arcade/wager-based game may include a non-wager based gaming portion and a wager-based gaming portion.
Synergy Blue, Llc

Hybrid arcade/wager-based gaming aspects relating to entertainment and wagering gaming activities

Various aspects described for implementing hybrid arcade/wager-based gaming techniques via computer networks, including one or more casino gaming networks. The hybrid arcade/wager-based game may include a non-wager based gaming portion and a wager-based gaming portion.
Synergy Blue, Llc

Consensus based authentication and authorization process

In accordance with one or more embodiments, authorization and/or authentication protects against unauthorized use of devices and/or features. Devices managing authorization and/or authentication may be connected to communications services, such as the internet or a social network.
Comcast Cable Communications, Llc

Inspection apparatus, inspection system, and inspection method

An inspection apparatus configured to inspect operation of an ecu coupled to automotive networks, includes an inspection performance control unit configured to transmit two pieces of data including operation-inspection data and security-check data used for inspecting the operation of the ecu, to the ecu, and configured to receive data output from the ecu. The operation-inspection data is data previously generated based on design information of the ecu.

Systems and methods for use in linking discounts for product purchases to social networks

Systems and methods are provided for linking product offerings with social network content. One exemplary method includes verifying, by a computing device, via an application programming interface (api) associated with the social network, a social network action, by a consumer, for a product in a social network, and awarding a discount to the consumer for the product, when the social network action is verified, whereby the consumer is able to purchase the product for the price of the product less the awarded discount.
Mastercard International Incorporated

Multi-network transaction analysis

Techniques described herein relate to analyzing location-based transaction systems, based on data from multiple client devices detected and received via multiple communication networks, and providing customized data to client devices associated with particular locations and/or users of the transaction system. The characteristics of a transaction system and/or specific client locations of the transaction system may be determined, based on data received from multiple client devices.
The Western Union Company

Enhanced fraud screening process for filtering of network statistics in order to detect, block, and deter fraudulent on-line activity

Systems, methods, and computer readable media for screening a transaction for fraud prior to approval. The system comprises a central processing unit, a database coupled to the central processing unit, a plurality of data sources in communication with the central processing unit, and software executing on the central processing unit.
Bis Global, Inc.

Training reinforcement learning neural networks

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for training a q network used to select actions to be performed by an agent interacting with an environment. One of the methods includes obtaining a plurality of experience tuples and training the q network on each of the experience tuples using the q network and a target q network that is identical to the q network but with the current values of the parameters of the target q network being different from the current values of the parameters of the q network..
Google Inc.

Distributed neural networks for scalable real-time analytics

Techniques related to implementing distributed neural networks for data analytics are discussed. Such techniques may include generating sensor data at a device including a sensor, implementing one or more lower level convolutional neural network layers at the device, optionally implementing one or more additional lower level convolutional neural network layers at another device such as a gateway, and generating a neural network output label at a computing resource such as a cloud computing resource based on optionally implementing one or more additional lower level convolutional neural network layers and at least implementing a fully connected portion of the neural network..
Intel Corporation

Apparatuses, methods and systems for defining hardware-agnostic brains for autonomous robots

Conventionally, robots are typically either programmed to complete tasks using a programming language (either text or graphical), shown what to do for repetitive tasks, or operated remotely by a user. The present technology replaces or augments conventional robot programming and control by enabling a user to define a hardware-agnostic brain that uses artificial intelligence (ai) systems, machine vision systems, and neural networks to control a robot based on sensory input acquired by the robot's sensors.
Neurala, Inc.





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Networks for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Networks with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.3824

file did exist - file did put2549

5 - 1 - 58