Radio discovery for a mesh Access Point (AP) may be provided. Topology information associated with a first network may be received wherein the first network may comprise a mesh network. A Topology Descriptor Message (TDM) may then be created based on the topology information. The TDM may then be transmitted by a first Access Point (AP).
Optimal coding scheme parameters may be provided. Information associated with a plurality of client devices may be received by a computing device. A map of locations of the plurality of client devices relative to an Access Point (AP) may be created based on the information. A connected dominating set of client devices within the plurality of client devices may be identified based on the map. A first client device in the connected dominating set may then be caused to relay data between the AP and a second client device comprising a client device in the plurality of client devices that is dominated by the first client device in the connected dominating set.
In part, the disclosure relates to a photonic device that may include a curved waveguide that includes a plurality of layers; a curved elongate structure defining an upper surface, an inner elongate surface, and an outer elongate surface, the curved elongate structure comprising a first end, and a second end; and a ridge extending from the upper surface, the ridge having a first side and a second side; and a trench defined by one or more of the plurality of layers and the first side; the curved elongate structure defines a first elongate section and a second elongate section, wherein a first cross-section of the ridge has a first shape that substantially extends along the first elongate section of the structure, the first shape is defined by the first side and a step extending from the first side and above the bottom of the trench.
In one embodiment, a device obtains transaction data regarding a transaction attempted within a software development environment, wherein the transaction data is captured by instrumentation code inserted into the software development environment at runtime. The device identifies, based on the transaction data, an access policy for the transaction. The device makes, based on the access policy, a determination that the transaction is not authorized. The device causes, via the instrumentation code, the transaction to be blocked from completing within the software development environment.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network, a first network message is received from a first access point (AP) identifying a first service set identifier (SSID) associated with a first wireless network, a second network message is received from a second AP identifying a second SSID associated with a second wireless network, and a visual similarity is determined between a first visual representation of the first SSID and a second visual representation of the second SSID. The second SSID is designated as suspicious based on the determined visual similarity.
A managed network supporting backscattering communication devices may be provided. A computing device may determine a plurality of locations respectively associated with a plurality of devices in a preterminal space. At least one of the plurality of devices may be power with energy transmitted from at least one Access Point (AP) to the least one of the plurality of devices at its location. Data may be received from the at least one of the plurality of devices in response to powering the at least one of the plurality of devices.
In one embodiment, a method includes detecting, at a virtual authenticator in an endpoint device, a linkup event, transmitting, to a supplicant in the endpoint device, a request for an identity associated with the endpoint device, receiving, at the virtual authenticator, a response from the supplicant, wherein the response comprises the identity, receiving, from an authentication server, an authorization result, wherein the authorization result is based on authenticating the endpoint device using the received identity, and enforcing, by the virtual authenticator, the authorization result at the endpoint device.
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
8.
SYSTEM AND METHOD FOR PROVIDING SCHC-BASED EDGE FIREWALLING
In one embodiment, a method includes identifying, using a Static Context Header Compression (SCHC) rules engine, one or more packets matching a rule, selecting a firewall decision based on the identified one or more packets and the rule, and applying the firewall decision to the one or more identified packets.
In one embodiment, Ethernet Virtual Private Network (EVPN) is implemented using Internet Protocol Version 6 (IPv6) Segment Routing (SRv6) underlay network and SRv6-enhanced Border Gateway Protocol (BGP) signaling. A particular route associated with a particular Internet Protocol Version 6 (IPv6) Segment Routing (SRv6) Segment Identifier (SID) is advertised in a particular route advertisement message of a routing protocol (e.g., BGP). The SID includes encoding representing a particular Ethernet Virtual Private Network (EVPN) Layer 2 (L2) flooding Segment Routing end function of the particular router and a particular Ethernet Segment Identifier (ESI), with the particular SID including a routable prefix to the particular router. The particular router receives a particular packet including the particular SID; and in response, the particular router performs the particular EVPN end function on the particular packet.
H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
H04L 45/02 - Mise à jour ou découverte de topologie
H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p.ex. des commutateurs d'étiquette multi protocole [MPLS]
H04L 45/741 - Routage dans des réseaux avec plusieurs systèmes d'adressage, p.ex. avec IPv4 et IPv6
H04L 49/35 - Interrupteurs spécialement adaptés à des applications spécifiques
H04L 61/5007 - Adresses de protocole Internet [IP]
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
H04L 69/324 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche liaison de données [couche OSI 2], p.ex. HDLC
10.
Extended Security Scheme for Reducing the Prevalence of Broken Object Level Authorization
A system and method for an extended security scheme for reducing the prevalence of broken object level authorization. In one embodiment, a method includes receiving code associated with an application programming interface (API), wherein the code includes one of an API definition and an API server stub, and parsing the code for one or more keywords associated with an extended security scheme. If the code includes the API definition, the method further includes generating an associated API server stub based on at least one of the one or more keywords and the API definition. If the code includes the API server stub, the method further includes generating an associated API definition based on at least one of the one or more keywords and the API server stub.
Roaming validation for Access Network Providers (ANPs), and particularly to protecting communications between Stations (STAs) and ANPs while providing roaming validation for ANPs may be provided. An ANP may first register a roaming federation system. The ANP may determine a roaming message based on subscription features of the network, and the ANP may request signing of the roaming message by the roaming federation system. The ANP may receive the signed roaming message from the roaming federation system and send the signed roaming message to a STA. The ANP may then receive a request to connect to the network from the STA and initiate a connection for the STA.
maxmax) comprising a first predetermined value and a preemption Arbitrary Interframe Space Number (AIFSN) of less than or equal to a second predetermined value. AC parameters for others of the plurality of ACs may be received wherein a non-preemption AIFSN associated with any of the others of the plurality of ACs is greater than a sum of the first predetermined value the second predetermined value. Preemption for traffic in the preemption AC may be allowed.
Techniques for extending network elements to inspect, extract, and complement tracing information added to L7 flows by application distributed tracing systems. The techniques may include receiving a Layer-7 (L7) message of an L7 flow associated with a distributed application and determining that the L7 message includes tracing information. In some examples, the tracing information may be mapped to a marking that is to be included in a Layer 3 (L3) or Layer-4 (L4) packet carrying the L7 message, and the L3 or L4 packet including the marking may be sent to an L3 or L4 network element. In some examples, the L3 or L4 network element may be configured to utilize the marking to determine a network decision for the L3 or L4 packet.
Symbol multiplexing Physical Medium Attachment (PMA) may be provided. A plurality of first lanes may be received and then Alignment Markers (AMs) from the plurality of first lanes may be used to determine symbol boundaries and identify the plurality of first lanes. Next, groups of the plurality of first lanes may be de-skewed and checkerboard patterns in the plurality of first lanes may be undone. Then the plurality of first lanes may be symbol-wise multiplexed to a plurality of second lanes. The plurality of second lanes may then be sent.
An optical modulator may include a lower waveguide, an upper waveguide, and a dielectric layer disposed therebetween. When a voltage potential is created between the lower and upper waveguides, these layers form a silicon-insulator-silicon capacitor (also referred to as SISCAP) guide that provides efficient, high-speed optical modulation of an optical signal passing through the modulator. In one embodiment, at least one of the waveguides includes a respective ridge portion aligned at a charge modulation region which may aid in confining the optical mode laterally (e.g., in the width direction) in the optical modulator. In another embodiment, ridge portions may be formed on both the lower and the upper waveguides. These ridge portions may be aligned in a vertical direction (e.g., a thickness direction) so that ridges overlap which may further improve optical efficiency by centering an optical mode in the charge modulation region.
G02F 1/025 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p.ex. commutation, ouverture de porte ou modulation; Optique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur basés sur des éléments à semi-conducteurs ayant au moins une barrière de potentiel, p.ex. jonction PN, PIN dans une structure de guide d'ondes optique
G02B 6/132 - Circuits optiques intégrés caractérisés par le procédé de fabrication par le dépôt de couches minces
G02B 6/136 - Circuits optiques intégrés caractérisés par le procédé de fabrication par gravure
G02F 1/01 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p.ex. commutation, ouverture de porte ou modulation; Optique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur
G02F 1/225 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p.ex. commutation, ouverture de porte ou modulation; Optique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur par interférence dans une structure de guide d'ondes optique
Certain embodiments of the present disclosure are directed towards an optical assembly such as a multiplexers/demultiplexers (MDM). One example optical assembly generally includes: a fiber array configured to provide an optical signal with a plurality of wavelengths; optical wavelength filters configured to separate the plurality of wavelengths into respective optical signals; a lens array configured to receive the respective optical signals from the optical wavelength filters and focus the respective optical signals before reaching an optical interface for a photonic chip; and a birefringent crystal disposed between the lens array and the optical interface.
G02B 6/42 - Couplage de guides de lumière avec des éléments opto-électroniques
G02B 6/27 - Moyens de couplage optique avec des moyens de sélection et de réglage de la polarisation
G02B 6/293 - Moyens de couplage optique ayant des bus de données, c. à d. plusieurs guides d'ondes interconnectés et assurant un système bidirectionnel par nature en mélangeant et divisant les signaux avec des moyens de sélection de la longueur d'onde
17.
EXTENDING DISTRIBUTED APPLICATION TRACING FOR NETWORK OPTIMIZATIONS
Techniques for extending network elements to inspect, extract, and complement tracing information added to L7 flows by application distributed tracing systems. The techniques may include receiving a Layer-7 (L7) message of an L7 flow associated with a distributed application and determining that the L7 message includes tracing information. In some examples, the tracing information may be mapped to a marking that is to be included in a Layer 3 (L3) or Layer-4 (L4) packet carrying the L7 message, and the L3 or L4 packet including the marking may be sent to an L3 or L4 network element. In some examples, the L3 or L4 network element may be configured to utilize the marking to determine a network decision for the L3 or L4 packet.
A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid process software,” can be configured to participate in multi-parry conversations. The humanoid can monitor electronic communications in a conversation involving the humanoid and at least one other party. The humanoid can model the electronic communications by uniquely identifying each of the electronic communications as a stream of data. For example, the data can be labeled and sorted in a database and/or arranged in a nodal graph representation. The humanoid can participate in the conversation based on the modeling.
G06F 40/35 - Représentation du discours ou du dialogue
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
19.
SYMBOL MULTIPLEXING PHYSICAL MEDIUM ATTACHMENT (PMA)
Symbol multiplexing Physical Medium Attachment (PMA) may be provided. A plurality of first lanes may be received and then Alignment Markers (AMs) from the plurality of first lanes may be used to determine symbol boundaries and identify the plurality of first lanes. Next, groups of the plurality of first lanes may be de-skewed and checkerboard patterns in the plurality of first lanes may be undone. Then the plurality of first lanes may be symbol-wise multiplexed to a plurality of second lanes. The plurality of second lanes may then be sent.
Systems and methods are provided for providing transference of a user equipment to a 5G network when a voice call is terminated. The systems and method can include receiving, at a mobility management entity, a voice call termination message from a serving gateway, determining, by the mobility management entity, whether the user equipment includes a 5G subscription and 5G capability based on the voice call termination message, and providing, by the mobility management entity, a handover message to the user equipment to initiate a handover to the 5G network based on the determining of whether the user equipment includes the 5G subscription and 5G capability.
H04W 36/32 - La resélection étant déclenchée par des paramètres spécifiques par des données de localisation ou de mobilité, p.ex. des données de vitesse
H04W 8/22 - Traitement ou transfert des données du terminal, p.ex. statut ou capacités physiques
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
21.
LICENSE BASED TRAFFIC MANAGEMENT IN HYBRID NETWORKS
Systems and methods for managing traffic in a hybrid environment include monitoring traffic load of a local network to determine whether the traffic load exceeds or is likely to exceed a maximum traffic load, where the maximum traffic load is a traffic load for which a service can be provided by the local network, based on a license. An excess traffic load is determined if the traffic load exceeds or is likely to exceed the maximum traffic load. One or more external networks which have a capacity to provide the service to the excess traffic load are determined, to which the excess traffic load is migrated. The local network includes one or more service instances for providing the service for up to the maximum traffic load, and the service to the excess traffic load is provided by one or more additional service instances in the one or more external networks.
H04W 28/02 - Gestion du trafic, p.ex. régulation de flux ou d'encombrement
H04W 28/24 - Négociation de l'agrément du niveau de service [SLA Service Level Agreement]; Négociation de la qualité de service [QoS Quality of Service]
H04W 36/22 - Exécution d'une resélection à des fins spécifiques pour gérer le trafic
H04W 48/06 - Restriction d'accès effectuée dans des conditions spécifiques sur la base des conditions de trafic
22.
TECHNIQUES TO PROVIDE A FLEXIBLE WITNESS IN A DISTRIBUTED SYSTEM
A flexible witness service system architecture is provided that comprises one or more cluster sites each having at least two storage/compute nodes; at least one local external device associated with at least one of the one or more cluster sites, the at least one local external device configured to run a local witness service. A central cloud management platform is in communication with the one or more cluster sites, the central cloud management platform being configured to run a cloud witness service. The local witness service and the cloud witness service perform identical arbitration services if a storage/compute node in one of the one or more cluster sites fails or communication between storage/compute nodes in a cluster fails.
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p.ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau
H04L 67/1034 - Réaction aux pannes de serveur par un répartiteur de charge
H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]
23.
SYSTEMS AND METHODS TO OPTIMIZE NON-3GPP UNTRUSTED WI-FI TO NEW RADIO EVOLVED PACKET SYSTEM FALLBACK HANDOVER
The present technology is generally directed to optimizing a non-3GPP untrusted Wi-Fi to 5G system handover followed by Evolved Packet System (EPS) fallback, more specifically, to delaying removal of the Wi-Fi session resources and creating a voice flow as part of the EPS fallback. The present technology can receive a request for an EPS fallback from a mobile device for a handover to a 5G network while the mobile device is in communication over non-3GPP access network, maintain one or more resources of the non-3GPP access network during data path switching from the non-3GPP access network to the 5G network, generate a list of EPS bearer identifiers to transmit to an access and mobility management function (AMF), wherein the list of EPS bearer identifiers is associated with a voice flow to transfer the one or more resources of the non-3GPP access network as part of the handover from the non-3GPP access network to the 5G network, and transmit the list of EPS bearer identifiers to a mobility management entity (MME).
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 36/22 - Exécution d'une resélection à des fins spécifiques pour gérer le trafic
H04W 36/32 - La resélection étant déclenchée par des paramètres spécifiques par des données de localisation ou de mobilité, p.ex. des données de vitesse
24.
TIME SENSITIVE NETWORK (TSN) QUALITY OF SERVICE (QOS) MANAGEMENT
Time Sensitive Network (TSN) Quality of Service (QoS) management may be provided. A number of Transmit Opportunities (TxOPs) to use for transmitting data between an Access Point (AP) and a client device over a wireless link may be received. An initial gate configuration to the AP for transmitting data between the AP and the client device over the wireless link for a transmit period of each cycle of a number of cycles may be provided based on the number of TxOPs. A change in a network condition of the wireless link may be detected. The initial gate configuration for the transmit period in a current cycle of the number of cycles may be adjusted in response detecting the change in the network condition of the wireless link.
A managed network supporting backscattering communication devices may be provided. A computing device may determine a plurality of locations respectively associated with a plurality of devices in a preterminal space. At least one of the plurality of devices may be power with energy transmitted from at least one Access Point (AP) to the least one of the plurality of devices at its location. Data may be received from the at least one of the plurality of devices in response to powering the at least one of the plurality of devices.
H04B 5/79 - pour le transfert de données en combinaison avec le transfert d'énergie
G01S 13/75 - Systèmes utilisant la reradiation d'ondes radio, p.ex. du type radar secondaire; Systèmes analogues utilisant des transpondeurs alimentés par les ondes reçues, p.ex. utilisant des transpondeurs passifs
26.
INTEGRATION OF POWER AND OPTICS THROUGH COLD PLATES FOR DELIVERY TO ELECTRONIC AND PHOTONIC INTEGRATED CIRCUITS
In one embodiment, an apparatus includes an upper cold plate and a lower cold plate, at least one of the upper cold plate or the lower cold plate comprising an electrical or optical path extending therethrough, a substrate and die package interposed between the upper cold plate or the lower cold plate, and a connector coupled to one of the upper cold plate or the lower cold plate for transmitting power or an optical signal through the electrical or optical path to the substrate and die package.
This disclosure describes techniques for generating a conversation summary. The techniques may include processing at least one statement indication of the conversation to determine at least one statement that is a candidate highlight of the conversation. The techniques may further include applying linguistic filtering rules to the candidate highlight to determine the candidate highlight is an actual highlight. The techniques may further include generating the conversation summary including providing the actual highlight as at least a portion of the conversation summary.
G10L 15/26 - Systèmes de synthèse de texte à partir de la parole
G10L 15/02 - Extraction de caractéristiques pour la reconnaissance de la parole; Sélection d'unités de reconnaissance
G10L 15/06 - Création de gabarits de référence; Entraînement des systèmes de reconnaissance de la parole, p.ex. adaptation aux caractéristiques de la voix du locuteur
G10L 15/22 - Procédures utilisées pendant le processus de reconnaissance de la parole, p.ex. dialogue homme-machine
G10L 15/32 - Reconnaisseurs multiples utilisés en séquence ou en parallèle; Systèmes de combinaison de score à cet effet, p.ex. systèmes de vote
Federated multi-access edge computing availability notifications may be provided by: transmitting, from a User Equipment (UE) to a node of a wireless network of a federated service, an attach request for the wireless network that includes authentication credentials for an independent identity provider in an identity federation, wherein the independent identity provider is external and independent from the wireless network and used to authenticate the UE to the wireless network; forwarding, from the node to the independent identity provider, the authentication credentials; transmitting, from the independent identity provider to the node, an authentication success message; receiving, at the UE via the node, the authentication success message; transmitting, from the UE to the node, a Multi-access Edge Computing (MEC) query; and receiving, at the UE from the node, a MEC response that identifies MEC resources that are available to the UE.
A method includes generating a first shortest path tree for traffic routing in a network, the first shortest path tree identifying a corresponding shortest path from the network node to other nodes in the network and generating a second shortest path tree for traffic routing after removing an element from the network. The second shortest path tree identifies a corresponding shortest path from the network node to the other nodes in the network with the element removed. A third shortest path tree is generated, which is a weighted version of the second shortest path tree with a weight value added to any node or link in the network sharing a SRLG value with the element removed from the network. Network traffic is enforced based on a comparison of the third shortest path tree with at least one of the first shortest path tree and the second shortest path tree.
Rotation of a wireless client device address is based on an encryption key and a nonce value. Key information and nonce value information are shared between a wireless client device and a network infrastructure component over a secure communication channel. The wireless client device encrypts the nonce value using the key information and encodes the encrypted value as a device address. The wireless client device then identifies itself via a source address value in a message transmitted over a wireless network. Upon receiving the message, the network infrastructure component decrypts information derived from the source address value and compares the resulting data to the nonce value. If a match is identified, the network infrastructure identifies the wireless client device as a source of the message. In some embodiments, the nonce value is updated with each rotation to provide for improved entropy of generated device addresses.
Techniques for using device proximity of a primary device and a secondary device to allow or deny connections to network resource(s), as well as terminate existing connections to the network resource(s). The techniques may include monitoring a proximity-based direct networking connection between a primary device and a secondary device, the proximity-based direct networking connection established in association with authenticating the primary device to access a resource. The techniques may also include determining, based at least in part on the monitoring, that a network proximity between the primary device and the secondary device exceeds a threshold proximity. Based at least in part on determining that the network proximity exceeds the threshold proximity, the techniques may include causing termination of the access to the resource for the primary device.
Techniques for using device proximity of a primary device and a secondary device to allow or deny connections to network resource(s), as well as terminate existing connections to the network resource(s). The techniques may include monitoring a proximity-based direct networking connection between a primary device and a secondary device, the proximity-based direct networking connection established in association with authenticating the primary device to access a resource. The techniques may also include determining, based at least in part on the monitoring, that a network proximity between the primary device and the secondary device exceeds a threshold proximity. Based at least in part on determining that the network proximity exceeds the threshold proximity, the techniques may include causing termination of the access to the resource for the primary device.
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
H04W 12/63 - Sécurité dépendant du contexte dépendant de la proximité
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
Preemption in wireless may be provided. Access Category (AC) parameters may be received for a preemption AC within a plurality of ACs. The preemption AC parameters may comprise a Contention Window maximum (CWmax) comprising a first predetermined value and a preemption Arbitrary Interframe Space Number (AIFSN) of less than or equal to a second predetermined value. AC parameters for others of the plurality of ACs may be received wherein a non-preemption AIFSN associated with any of the others of the plurality of ACs is greater than a sum of the first predetermined value the second predetermined value. Preemption for traffic in the preemption AC may be allowed.
Aspects described herein include an optical apparatus. The optical apparatus includes a first optical waveguide formed in a first semiconductor layer and a second optical waveguide formed in a second semiconductor layer and separated from the first optical waveguide by a dielectric layer. The first optical waveguide extends in a direction of an optical path. The first optical waveguide and the second optical waveguide are at least partly overlapping along the direction. At least the first optical waveguide has a first ridge extending along the direction. The first ridge defined between spacers having a predetermined width.
Presented herein are techniques to facilitate providing slice attribute information to a user equipment (UE) for one or more slice types with which the user equipment is allowed to establish one or more session(s). In one example, a method may include obtaining, by a network element, a registration request for connection of a UE to a mobile network; performing an authentication for connection of the UE to the mobile network; and upon successful authentication, providing, by the network element, a registration response to the UE, wherein the registration response identifies one or more network slice types with which the UE is authorized to establish a session and the registration response identifies one of: attribute information for each of the one or more network slice types or network location information from which attribute information for each of the one or more network slice types is to be obtained.
Automated techniques for converting network devices from a Layer 2 (L2) network into a Layer 3 (L3) network in a hierarchical manner are described herein. The network devices may be configured to boot such that their ports are in an initialization mode in which the ports are unable to transmit locally generated DHCP packets. When a network device detects that a neighbor (or “peer”) device has acquired an IP address or has been configured by a network controller, then the port on which the neighbor device is detected can then be transitioned from the initialization mode into a forwarding mode. In the forwarding mode, the port can be used to transmit packets to obtain an IP address. Thus, the network devices are converted from an L2 device to an L3 device in a hierarchical order such that upstream devices are discovered and converted into L3 devices before downstream devices.
H04L 61/5014 - Adresses de protocole Internet [IP] en utilisant le protocole de configuration dynamique de l'hôte [DHCP] ou le protocole d'amorçage [BOOTP]
37.
SYSTEM AND METHOD FOR PROVIDING LOCATION-BASED ACCESS IN 5G
In one embodiment, a method includes transmitting, to a multi-factor authentication (MFA) agent running on a user device, a request for a location of the user device, receiving, from the MFA agent, the location of the user device, wherein the location is determined by the MFA agent to be a most common location indicated by a plurality of location indicators, receiving, from a policy server, a location-based access policy, appending, to the location-based access policy, the location of the user device and determining, based on the location of the user device and the location-based access policy, whether to allow the user device to access one or more of: a remote service, a remote database, and a remote device.
Time Sensitive Network (TSN) Quality of Service (QoS) management may be provided. A number of Transmit Opportunities (TxOPs) to use for transmitting data between an Access Point (AP) and a client device over a wireless link may be received. An initial gate configuration to the AP for transmitting data between the AP and the client device over the wireless link for a transmit period of each cycle of a number of cycles may be provided based on the number of TxOPs. A change in a network condition of the wireless link may be detected. The initial gate configuration for the transmit period in a current cycle of the number of cycles may be adjusted in response detecting the change in the network condition of the wireless link.
A method, computer system, and computer program product are provided for stress-testing electronics using telemetry modeling. Telemetry data is received from one or more devices under test during a hardware testing phase, the telemetry data including one or more telemetry parameters. The telemetry data is processed using a predictive model to determine future values for the one or more telemetry parameters. Additional hardware testing is performed, wherein the additional hardware testing includes adjusting one or more testing components based on the determined future values.
One or more animated files are generated using an image of a user and stored in a data store associated with the user. It is determined that the user is participating in an online meeting and the user is not transmitting video. The one or more animated files are obtained from the data store and transmitted for display playback on a loop on devices of participants participating in the online meeting with the user when the user is not transmitting video.
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport utilisant des icônes
G06T 13/40 - Animation tridimensionnelle [3D] de personnages, p.ex. d’êtres humains, d’animaux ou d’êtres virtuels
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
41.
VALIDATION OF IPXE SCRIPTS USING OWNER CERTIFICATES AND OWNERSHIP VOUCHERS
Techniques and architecture are described for validating and verifying iPXE scripts prior to execution during a booting process. During the booting process of a network device, right after the UEFI/BIOS stage of the booting process, a trusted iPXE script may make a request to a network server for the ownership voucher and owner certificate of the network device. The ownership voucher and owner certificate may then be stored in a trusted platform module (TPM) on the network device. In configurations, the retrieved owner certificate may be validated by the ownership voucher. The owner certificate may be used to validate iPXE scripts. Once validated, the iPXE scripts may be executed and the booting process may be continued to the kernel loading step and the application loading step. During a subsequent booting process of the network device, the ownership voucher and owner certificate may be retrieved from the TPM.
G06F 9/448 - Paradigmes d’exécution, p.ex. implémentation de paradigmes de programmation
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Techniques for ensuring symmetric forwarding between disparate networks. The techniques may include receiving a gateway preference order associated with a route advertised by an edge node, the edge node associated with a first network. The techniques may also include determining, based at least in part on the gateway preference order, that a gateway node is a more preferred gateway for the route than another gateway node, the gateway node configured to facilitate communications between the first network and a second network. In some examples, the techniques may also include converting the gateway preference order into a metric associated with an IP routing protocol that is in use in the second network. In some examples, the route including the metric may be distributed within the second network such that the gateway node is the more preferred gateway for return traffic of the route.
Techniques for determining whether HTTP/2 or HTTP/3 is a preferred protocol for communication between a client device and a server over a network are described. A change associated with a network interface of a client device is detected. Based at least in part on detecting the change, a determination is made to identify a preferred communication protocol for a network over which the client device communicates using the network interface. A HTTP/2 probe is transmitted over the network and to a server. A HTTP/3 probe is transmitted over the network and to the server. In response to not receiving a HTTP/3 probe response, the preferred communication protocol is determined to be HTTP/2. In response to receiving the HTTP/2 probe response and the HTTP/3 probe response, the preferred communication protocol is determined to be HTTP/3. The client device communicates with the server over the network using the preferred communication protocol.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
H04L 67/2871 - Architectures; Dispositions - Détails de mise en œuvre d'entités intermédiaires uniques
44.
SYSTEMS AND METHODS FOR ASYMMETRICAL PEER FORWARDING IN AN SD-WAN ENVIRONMENT
In one embodiment, a method includes receiving, by a first node of a node cluster in a software-defined wide area network (SD-WAN), traffic from a wide area network (WAN), assigning, by the first node of the node cluster, flow ownership of the traffic to the first node, and communicating, by the first node of the node cluster, the traffic to a local area network (LAN). The method also includes receiving, by the first node of the node cluster, return traffic from a second node of the node cluster and detecting, by the first node of the node cluster, a diversion of the return traffic. The method further includes relinquishing, by the first node of the node cluster, the flow ownership and assigning, by the first node of the node cluster, the flow ownership to the second node of the node cluster.
Embodiments include a photonic device with a compensation structure. The photonic device includes a waveguide with a refractive index which changes according to the thermo-optic effect as a temperature of the photonic device fluctuates. The compensation structure is positioned on the photonic device to counteract or otherwise alter the thermo-optic effect on the refractive index of the waveguide in order to prevent malfunctions of the photonic device.
G02B 6/122 - Elements optiques de base, p.ex. voies de guidage de la lumière
G02B 6/12 - OPTIQUE ÉLÉMENTS, SYSTÈMES OU APPAREILS OPTIQUES - Détails de structure de dispositions comprenant des guides de lumière et d'autres éléments optiques, p.ex. des moyens de couplage du type guide d'ondes optiques du genre à circuit intégré
In one embodiment, a power control block includes a power input for receiving pulse power from a power source, a power output coupled to a transmission line connector, a pulse power module operable to receive the pulse power and transmit the pulse power to the power output, a Power over Ethernet (PoE) module operable to receive the pulse power and transmit PoE to the power output, and a power controller for selecting the pulse power module to deliver the pulse power to the power output or the PoE module to deliver the PoE to the power output.
A method is provided that is performed for a wireless network that includes one or more wireless client devices that may rotate their media access control (MAC) address used for wireless communication with one or more wireless access point devices in the wireless network. The method includes determining an impact of MAC address rotation by the one or more wireless client devices on operational resources of one or more networking devices or networking processes in a network infrastructure associated with the wireless network. The method further includes scheduling MAC address rotation by the one or more wireless client devices according to the impact on operational resources of the one or more networking devices or networking processes in the network infrastructure.
A method is provided in which an AP of a MLD AP device may decide to include all out-of-link BSS parameters updates in a beacon frame (beacon). A flag is included in the beacon frame to indicate that all updates are included in the beacon frame and thus the client device that receives the beacon frame should not send probe request frames (probe requests) to obtain these updates. Thus, a non-AP MLD that receives a beacon frame with the above indication and that has all critical BSS parameters corresponding to the Change Sequence Number (CSN) that preceded the updates indicated by the AP, should not send probe requests to obtain the updated parameters. The number of bits to assign to the complete BSS Update Report Indication flag may vary depending on the number of updates to be reported.
A Software-Defined Networking (SDN)-based “upstream” approach is a controller-based solution that provides secure key distribution and management for multi-site data centers. The approach uses an SDN Multi-Site Controller (MSC) that acts as an intermediary between SDN controllers at sites in a multi-site data center and manages the distribution of keys to sites. The approach is not dependent upon any particular routing protocol, such as the Border Gateway Protocol (BGP), and is well suited for multicast stream encryption by allowing the same key to be used for all replicated packets sent to downstream sites from an upstream source site. The approach distributes keys in a secure manner, ensures that data transferred between sites is done in a secure manner, and supports re-keying with error handling.
Presented herein are techniques in which a first device connects to a communication session in which a plurality of devices communicates. The plurality of devices includes the first device and a second device. The first device outputs first audio that includes a first audio watermark associated with the communication session and the second device outputs second audio that includes a second audio watermark associated with the communication session. The first device detects the second audio watermark in the second audio outputted by the second device and one or more actions are performed in response to detecting the second audio watermark
A polarization rotator includes a bus waveguide disposed on a first layer having a longitudinal axis, a first end, and a second end, and a first upper waveguide and a second upper waveguide disposed on a second layer, above the first layer, the first upper waveguide and the second upper waveguide widening as the first upper waveguide and the second upper waveguide extend from the first end to the second end. The first upper waveguide and the second upper waveguide may also symmetrically bend toward each other and then away from each other proximate the second end.
G02B 6/126 - OPTIQUE ÉLÉMENTS, SYSTÈMES OU APPAREILS OPTIQUES - Détails de structure de dispositions comprenant des guides de lumière et d'autres éléments optiques, p.ex. des moyens de couplage du type guide d'ondes optiques du genre à circuit intégré utilisant des effets de polarisation
G02B 6/125 - Courbures, branchements ou intersections
A polarization splitter rotator includes a first lower waveguide and a second lower waveguide disposed on a first layer, the first lower waveguide and the second lower waveguide, in a first portion of the device, widening symmetrically as the first lower waveguide and the second lower waveguide extend from an input end of the device to an output end of the device, and, in a second portion of the device, at least the second lower waveguide widening further, asymmetrically, from the first lower waveguide, and a bus waveguide disposed on a second layer, above the first layer, at least partially overlapping portions of the first lower waveguide and the second lower waveguide.
G02B 6/126 - OPTIQUE ÉLÉMENTS, SYSTÈMES OU APPAREILS OPTIQUES - Détails de structure de dispositions comprenant des guides de lumière et d'autres éléments optiques, p.ex. des moyens de couplage du type guide d'ondes optiques du genre à circuit intégré utilisant des effets de polarisation
G02B 6/122 - Elements optiques de base, p.ex. voies de guidage de la lumière
G02B 6/125 - Courbures, branchements ou intersections
53.
STANDARDIZED INTERFACE FOR WIDE AREA NETWORK PROGRAMMING
Techniques for providing a standardized interface that is configured to provide application developers with ways for interacting with different wide area network controllers. A standardized interface may include an application programming interface (API) server that can receive a connectivity request associated with an application that is to be hosted on an application orchestration system. The API server may determine, based at least in part on the connectivity request, a vendor network to be used by the application to send traffic to a remote service. Based at least in part on determining the vendor network, the API server may translate the connectivity request into a first format that is understandable by a controller of the vendor network. The API server may also provide the connectivity request in the first format to the controller of the vendor network such that a path through the vendor network can be determined.
Cluster formation for networks for Ultra-Wideband (UWB) Time-Difference-of-Arrival (TDoA) networks may be provided. A plurality of anchors may be set to a primary setting. Synchronization messages may then be broadcast by the plurality of anchors. Then the plurality of anchors may send responses to the synchronization messages. A room consensus may be performed to determine probabilities of obstacles between the plurality of anchors. The plurality of anchors may then send proposals of one or more clusters based on the room consensus. One or more clusters may be formed by the plurality of anchors based on the proposals.
G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p.ex. gestion de la mobilité
H04W 84/18 - Réseaux auto-organisés, p.ex. réseaux ad hoc ou réseaux de détection
In one embodiment, a method includes receiving at a thermal modeling module, data from a Power Sourcing Equipment device (PSE) for cables extending from the PSE to Powered Devices (PDs), the cables configured to transmit power and data from the PSE to the PDs, calculating at the thermal modeling module, thermal characteristics for the cables based on the data, and identifying a thermal rise above a specified threshold at one of the cables. The data comprises real-time electrical data for the cables. An apparatus and logic are also disclosed herein.
Techniques for routing service mesh traffic based on whether the traffic is encrypted or unencrypted are described herein. The techniques may include receiving, from a first node of a cloud-based network, traffic that is to be sent to a second node of the cloud-based network and determining whether the traffic is encrypted or unencrypted. If it is determined that the traffic is encrypted, the traffic may be sent to the second node via a service mesh of the cloud-based platform. Alternatively, or additionally, if it is determined that the traffic is unencrypted, the traffic may be sent to the second node via an encrypted tunnel. In some examples, the techniques may be performed at least partially by a program running on the first node of the cloud-based network, such as an extended Berkeley Packet Filter (eBPF) program, and the like.
Techniques are described for extending a cellular quality of service bearer through an enterprise fabric network. In one example, a method obtaining, by a first switch of a network, a packet to be delivered to a client connected to the network via a cellular access point; identifying quality of service (QoS) bearer information associated with the packet, wherein the QoS bearer information is associated with a radio access bearer for the client and the QoS bearer information comprises a bearer indicator and a QoS class identifier; providing a fabric tunnel encapsulation for the packet, wherein the bearer indicator and the QoS class identifier are included within the fabric tunnel encapsulation of the packet; and forwarding the packet within the fabric tunnel encapsulation toward a second switch of the network via a fabric tunnel, wherein the cellular access point is connected to the network via the second switch.
Techniques for combining independent sessions between application(s) and a VPN, proxy service, or similar system, including inner protocol sessions (e.g., such as QUIC, etc.), coming from a single device to form a single logical session, where the single logical session could share a single authentication/authorization token are described. The techniques include receiving, from a device within a network, a request for a first application to access a service associated with the proxy service or the VPN, sending, to the device, a first authentication request, and receiving, from the device, a message including a token. The techniques may further include authenticating, by the proxy service or the VPN, the token using a unique identifier associated with the device and enabling, by the proxy service or the VPN, the device to access the service via a first session flow.
A method is provided to determine administrator users associated with network devices in a network. The method includes sending to one or more network devices in a network or to an entity that manages or controls access to the one or more network devices, a query to identify one or more administrator users for each of the one or more network devices. The method involves obtaining a response to the query, the response including an identifier of each the one or more administrator users for a respective network device of the one or more network devices. The method may then involve using the identifier of each of the one or more administrator users for each of the one or more network devices to send a notification to the one or more administrator users.
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
H04L 41/12 - Découverte ou gestion des topologies de réseau
H04L 67/75 - Services réseau en affichant sur l'écran de l'utilisateur les conditions du réseau ou d'utilisation
60.
PERFORMING COLLABORATION ACTIONS BASED ON COMBINATIONS OF OBJECTS AND CONTEXTUAL INFORMATION
In one example embodiment, a plurality of objects selected by a user on a user interface for a collaboration tool are identified. The plurality of objects include at least two different types of objects. One or more collaboration actions to perform are determined by a computing device based on the types and contextual information for the plurality of objects. The one or more collaboration actions are presented on the user interface. A presented collaboration action is initiated from the user interface.
Presented herein are techniques associated with providing an alternative network indication to a client device in a wireless local area network (WLAN) roaming federation. In one example a method is provided that may include obtaining access network information for each of a plurality of access networks that neighbor a first access network through connection of a client device with the first access network involving a first identity provider profile; determining an alternative access network with which the client device is recommended to seek connection or an alternative identity provider profiles with which the client device is recommended to connect to the first access network; and enabling the client device to initiate a connection with the alternative access network or to re-initiate a connection with the first access network utilizing the alternative identity provider profile.
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
H04W 8/02 - Traitement de données de mobilité, p.ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]; Transfert de données de mobilité, p.ex. entre HLR, VLR ou réseaux externes
The present disclosure is directed to systems and techniques for providing service continuity for User Equipment (UE) services associated with certain network slices. In one example, the systems and techniques can receive a registration request from a UE, wherein the registration request includes a requested slice, and determine a current network location of the UE. In response to determining that the current network location of the UE does not support the requested slice, one or more additional network locations that support the requested slice can be identified. Location information associated with the one or more additional network locations can be identified and a registration response message can be transmitted to the UE, wherein the registration response message includes location information of an one or more additional Tracking Area Identities (TAIs) or additional Registration Areas (RAs) that support the requested slice.
According to some embodiments, a method includes detecting a start of an OpenTelemetry span by an application and determining security information related to the start of the OpenTelemetry span. The method further includes monitoring the application for one or more application behaviors during execution of the OpenTelemetry span. The method further includes detecting an end of the OpenTelemetry span by the application, and in response, calculate a security score for the OpenTelemetry span using the security information related to the start of the OpenTelemetry span and the one or more application behaviors detected during execution of the OpenTelemetry span. The method further includes updating a status of the OpenTelemetry span to include the security score and a text string related to the calculation of the security score.
Techniques for a Software-Defined Networking (SDN) controller associated with a multisite network to implement jurisdictional data sovereignty polices in a multisite network, route network traffic flows between user sites and destination services over one or more provider sites, and/or perform a routing operation on the network traffic flow(s) based on the jurisdictional data sovereignty policies. The jurisdictional data sovereignty polices may be implemented using destination group tags (DGTs) and/or source group tags (SGTs). A secure access service edge (SASE) associated with the network controller may generate, store, and distribute the DGTs to provider sites and/or the SGTs to user sites. Based on the SGT and/or DGT associated with a network traffic flow, one or more services may be applied to the network traffic flow, and the network traffic flow may be routed through a particular region of a software-defined access (SDA) transit.
Techniques for combining independent sessions between application(s) and a VPN, proxy service, or similar system, including inner protocol sessions (e.g., such as QUIC, etc.), coming from a single device to form a single logical session, where the single logical session could share a single authentication/authorization token are described. The techniques include receiving, from a device within a network, a request for a first application to access a service associated with the proxy service or the VPN, sending, to the device, a first authentication request, and receiving, from the device, a message including a token. The techniques may further include authenticating, by the proxy service or the VPN, the token using a unique identifier associated with the device and enabling, by the proxy service or the VPN, the device to access the service via a first session flow.
A system is provided for reducing infrared (IR) light emitting diode (LED) power in a night mode for LED operations. The system may include an input power source, one or more LEDs coupled to the input power source, an auto-exposure controller (AEC) coupled to one or more LEDs, and one or more transistor switches coupled between the one or more LEDs and the AEC. The AEC may be coupled to an image sensor of an imaging system and may configure attributes of exposure frames for the image sensor. The AEC may generate a plurality of pulses that control one or more transistor switches. The AEC may execute an algorithm that synchronizes the activation of one or more LEDs to occur during the exposure frame.
H04N 23/56 - Caméras ou modules de caméras comprenant des capteurs d'images électroniques; Leur commande munis de moyens d'éclairage
H04N 23/74 - Circuits de compensation de la variation de luminosité dans la scène en influençant la luminosité de la scène à l'aide de moyens d'éclairage
H04N 23/11 - Caméras ou modules de caméras comprenant des capteurs d'images électroniques; Leur commande pour générer des signaux d'image à partir de différentes longueurs d'onde pour générer des signaux d'image à partir de longueurs d'onde de lumière visible et infrarouge
H04N 23/65 - Commande du fonctionnement de la caméra en fonction de l'alimentation électrique
Techniques for enabling a network access provider to make automatic Software as a Service (SaaS) optimization decisions. Among other things, the techniques may include determining a SaaS application that is being accessed by client endpoints via flows through a network access provider. The techniques may also include determining, based at least in part on a policy associated with the network access provider, whether to enable network optimizations for traffic through the network access provider to the SaaS application. Based at least in part on a determination that the network optimizations are to be enabled for the traffic to the SaaS application, the techniques may include installing a service definition associated with the SaaS application in a service policy database of the network access provider.
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
68.
BI-DIRECTIONAL POWER OVER ETHERNET FOR DIGITAL BUILDING APPLICATIONS
A system includes a plurality of network devices comprising a plurality of ports, a power bus connecting the network devices, wherein power is shared between the network devices over the power bus, and a controller for identifying available power and allocating power to the ports. The ports include a plurality of PSE (Power Sourcing Equipment) PoE (Power over Ethernet) ports each operable to transmit power to a device connected to one of the PSE PoE ports, a plurality of PD (Powered Device) PoE ports each operable to receive power from a device connected to one of the PD PoE ports, and a plurality of bi-directional PoE ports each configurable to operate as a PSE PoE port to transmit power to a device connected to one of the bi-directional PoE ports or as a PD PoE port to receive power from the connected device.
G06F 1/26 - Alimentation en énergie électrique, p.ex. régulation à cet effet
G06F 1/28 - Surveillance, p.ex. détection des pannes d'alimentation par franchissement de seuils
G06F 1/30 - Moyens pour agir en cas de panne ou d'interruption d'alimentation
G06F 1/3212 - Surveillance du niveau de charge de la batterie, p.ex. un mode d’économie d’énergie étant activé lorsque la tension de la batterie descend sous un certain niveau
Techniques for automatically claiming switches of a tenant computer network by a remote, cloud-based network controller. A first seed switch is manually claimed by a user by implementing the remote, cloud-based network controller. After claiming the seed switch a set of switches immediately connected with the seed switch are identified by Device Connector logic in the seed switch and immediately connected switches. Switches directly connected to those switches are then identified using Device Connector logic of the switches. This process is performed iteratively by identifying immediately connected switches until all of the switches are identified. All or a subset of the identified switches can then be claimed by the remote, cloud-based controller based on a response from the tenant network user.
Legacy preamble puncturing for fine timing and frequency offset estimation may be provided. Within a user information field of a trigger frame, a legacy preamble puncturing pattern may be allocated to each of a plurality of client devices wherein each of the plurality of client devices is allocated with at least one respective corresponding non-overlapping sub-channel. Next, from each of the plurality of client devices on their respective corresponding non-overlapping sub-channel, a respective corresponding preamble may be received. Time and frequency synchronization may then be performed for each of the plurality of client devices based on their respective corresponding preamble.
Improved Radio Frequency (RF) performance by optimizing temperature may be provided. A plurality of heatmaps may be created associating a plurality of component heat characteristics, of a plurality of components of a device, with a plurality of pre-defined performance trade-off states. Next, a shortest path through the plurality of pre-defined performance trade-off states may be determined. The device may then be placed in successive ones of the plurality of pre-defined performance trade-off states according to the determined shortest path until a Transmit (TX) performance target is met.
H04W 52/20 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques utilisant le taux d'erreur
H04W 52/30 - Commande de puissance d'émission [TPC Transmission power control] utilisant les limitations de la quantité totale de puissance d'émission disponible
72.
CLUSTER FORMATION FOR ULTRA-WIDEBAND TIME-DIFFERENCE-OF-ARRIVAL NETWORKS
Cluster formation for networks for Ultra-Wideband (UWB) Time-Difference-of-Arrival (TDoA) networks may be provided. A plurality of anchors may be set to a primary setting. Synchronization messages may then be broadcast by the plurality of anchors. Then the plurality of anchors may send responses to the synchronization messages. A room consensus may be performed to determine probabilities of obstacles between the plurality of anchors. The plurality of anchors may then send proposals of one or more clusters based on the room consensus. One or more clusters may be formed by the plurality of anchors based on the proposals.
G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de position; Localisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
73.
NON-FUNGIBLE TOKENS AS SOUVENIRS OF MULTIMEDIA COMMUNICATION SESSIONS
Techniques are provided herein for generating Non-Fungible Tokens (NFTs) as souvenirs of multimedia communication sessions. In one example embodiment, during a multimedia communication session with a plurality of participants, an indication to generate an NFT from content of the multimedia communication session is obtained from a first participant of the plurality of participants. Content data is captured from the multimedia communication session as the multimedia communication session is occurring. The NFT is generated from the content data. The NFT is a souvenir of the multimedia communication session.
H04L 65/613 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p.ex. radio sur Internet pour la commande de la source par la destination
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
H04L 65/1089 - Procédures en session en supprimant des médias
H04L 65/1096 - Fonctions supplémentaires, p.ex. renvoi d'appel ou mise en attente d'appel
This disclosure describes techniques for data path monitoring and visibility in communications among network devices. The techniques include determining that personally identifiable information (PII) is included in a data traffic flow intended for delivery to a destination endpoint. A probe may be sent from a source endpoint to identify an intended data path of the data traffic flow to the destination endpoint. The techniques include validating the intended data path of the data traffic flow against a policy related to data routing. Based at least in part on a result of the validation, the techniques may include allowing or dropping the data traffic flow, or various other actions.
A first endpoint in a Quantum Key Distribution (QKD) system determines an operating mode for a hybrid transceiver for communicating in an optical communication session with a second endpoint. The operating mode is selected from a group containing a classical reception mode, a classical transmission mode, a quantum transmission mode, and a quantum reception mode. The first endpoint configures an input to a homodyne detector of the hybrid transceiver based on the operating mode and operates the hybrid transceiver in the operating mode for at least a portion of the optical communication session.
H04B 10/40 - Systèmes de transmission utilisant des ondes électromagnétiques autres que les ondes hertziennes, p.ex. les infrarouges, la lumière visible ou ultraviolette, ou utilisant des radiations corpusculaires, p.ex. les communications quantiques Émetteurs-récepteurs
76.
OFDMA ASSISTED FAST ROAMING IN LABEL SWITCHED MOBILE NETWORKS
In one embodiment, a wireless access point receives, from a mobile system, a broadcast beacon that includes a roaming notification indicating that the mobile system intends to roam to the wireless access point. The wireless access point allocates, after receiving the broadcast beacon from the mobile system, an orthogonal frequency-division multiple access resource unit for use by the mobile system. The wireless access point sends a trigger message to the mobile system that includes an indication of the orthogonal frequency-division multiple access resource unit. The wireless access point performs, after sending the trigger message, a handoff exchange with the mobile system using the orthogonal frequency-division multiple access resource unit to attach the mobile system to the wireless access point.
H04W 8/02 - Traitement de données de mobilité, p.ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]; Transfert de données de mobilité, p.ex. entre HLR, VLR ou réseaux externes
H04W 36/00 - Dispositions pour le transfert ou la resélection
77.
ROUTING BASED ON HIERARCHICAL DOMAINS IN A NETWORK ENVIRONMENT
In one example, a network device within a network domain determines routing information to exchange in a network. The network domain corresponds to an actual entity and includes a structure with a plurality of domains arranged in hierarchical levels corresponding to a hierarchy of entities of the actual entity. The routing information indicates at least one domain and hierarchical level of the structure. The network device exchanges the routing information in the network to control routing through the entities of the actual entity.
Techniques for a Software-Defined Networking (SDN) controller associated with a multisite network to implement jurisdictional data sovereignty polices in a multisite network, route network traffic flows between user sites and destination services over one or more provider sites, and/or perform a routing operation on the network traffic flow(s) based on the jurisdictional data sovereignty policies. The jurisdictional data sovereignty polices may be implemented using destination group tags (DGTs) and/or source group tags (SGTs). A secure access service edge (SASE) associated with the network controller may generate, store, and distribute the DGTs to provider sites and/or the SGTs to user sites. Based on the SGT and/or DGT associated with a network traffic flow, one or more services may be applied to the network traffic flow, and the network traffic flow may be routed through a particular region of a software-defined access (SDA) transit.
Methods are provided to perform a name resolution triggered monitoring agent selection for full stack observability. The methods involve obtaining a name resolution request for an enterprise service to be accessed by an endpoint device. A plurality of service instances are configured to provide the enterprise service. The methods further involve determining, based on the name resolution request, a monitoring agent from a plurality of monitoring agents of a monitoring service that monitors performance of the enterprise service and selecting a service instance, from the plurality of service instances, that is associated with the monitoring agent in a name resolution record. The methods further involve providing, to the endpoint device, location information for accessing the service instance and provisioning the monitoring agent to monitor the performance of the enterprise service executed by the service instance for the endpoint device.
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
H04L 61/2514 - Traduction d'adresses de protocole Internet [IP] entre adresses IP locales et globales
H04L 61/3015 - Enregistrement, génération ou allocation de nom
H04L 67/1036 - Répartition de la charge des demandes adressées aux serveurs pour des services autres que la fourniture de contenu à utilisateur, p.ex. répartition des charges entre serveurs de noms de domaine
80.
METHOD FOR IMPLEMENTING CLOUD-BASED SECURITY PROTOCOLS FOR A USER DEVICE
A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.
A system is provided for reducing infrared (IR) light emitting diode (LED) power in a night mode for LED operations. The system may include an input power source, one or more LEDs coupled to the input power source, an auto-exposure controller (AEC) coupled to one or more LEDs, and one or more transistor switches coupled between the one or more LEDs and the AEC. The AEC may be coupled to an image sensor of an imaging system and may configure attributes of exposure frames for the image sensor. The AEC may generate a plurality of pulses that control one or more transistor switches. The AEC may execute an algorithm that synchronizes the activation of one or more LEDs to occur during the exposure frame.
A quantum memory manager (QMM) of a source endpoint obtains a memory request from a quantum application for quantum memory blocks. The source endpoint negotiates with a destination endpoint to determine a memory lifetime value that includes a minimum decoherence time for qubits stored at the source endpoint and qubits stored at the destination endpoint. The QMM allocates a quantum memory block of a plurality of qubit storage locations to the quantum application based on the memory lifetime value. The QMM receives communication qubits that are entangled with destination qubits sent to the destination endpoint, and stores the communication qubits in the quantum memory block. Each particular communication qubit of the communication qubits is entangled with a particular destination qubit of the destination qubits.
G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage
G06F 12/02 - Adressage ou affectation; Réadressage
A method, computer system, and computer program product are provided for cloud-based code execution. A computing service receives a request from a client to provide to the client a software bill of materials corresponding to the computing service. The software bill of materials is provided to the client. Executable code is received from the client, wherein the client provides the executable code based on the client analyzing the software bill of materials. In response to receiving an execution instruction, the computing service executes the executable code.
In one embodiment, a device identifies a plurality of paths in a wireless backhaul network between a gateway and a plurality of access points that provide wireless connectivity to a mobile system. The device determines a movement of the mobile system. The device determines, based on the movement of the mobile system, that a particular path in the plurality of paths is not needed to provide wireless connectivity to the mobile system. The device causes one or more networking nodes along the particular path to enter into a power saving mode.
In one embodiment, a device sends data traffic to a gateway of a backhaul mesh network via a first wireless access point of the backhaul mesh network. The device maintains, while associated with the first wireless access point, an association with a second wireless access point of the backhaul mesh network by sending a frame to the first wireless access point that is relayed by the first wireless access point to the second wireless access point. The device makes a determination that additional data traffic should be sent to the gateway of the backhaul mesh network via the second wireless access point. The device sends, based on the determination, the additional data traffic to the gateway of the backhaul mesh network via the second wireless access point.
Methods are presented herein for a reduced state machine that describes nodes and relationship dynamics representing real network elements (networking devices and software processes) in a computer/data network, and abstracted logical items. Logical states of networking features of the network elements are reflected in the graph, while configuration data is stored for completeness. A method called a “Versioner Algorithm” is provided to record the temporal history of a node and its state over time within the node's metadata itself, while recorded relationships represent logical relations between observed nodes. A method is also provided to time-travel back to observe a historical view of the network. Further still, a method is provided to a difference of two historical topologies and return that data in human-readable or machine consumable form.
H04L 41/12 - Découverte ou gestion des topologies de réseau
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
H04L 41/0859 - Récupération de la configuration du réseau; Suivi de l’historique de configuration du réseau en conservant l'historique des différentes générations de configuration ou en revenant aux versions de configuration précédentes
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
87.
Network hierarchy constructs enabling instant global wide area network connectivity
This disclosure describes techniques and mechanisms for disclosure describes techniques and mechanisms for a central management plane to automatically create and assign system identifiers to network devices, thereby creating a global network hierarchy within a network. The techniques enable the use of a system identifier to be automatically generated and assigned, as well as configuration and network policies to be automatically generated based on the system identifier. Accordingly, the techniques enable automation of regional connectivity and policy application, a simplified manner of troubleshooting/debugging of any connectivity issues, and a simplified, aggregated view of statistic and analytics related to problems at site, sub-region, and region levels.
Techniques for preserving privacy while still allowing secure access to private resources. Among other things, the techniques may include receiving a request to provide a remote device with access to a private resource. In some instances, the request may be redirected to an identity provider service to authenticate the user of the remote device to maintain anonymity of an identity of the user. The techniques may also include receiving an indication of an entitlement-set provided by the identity provider service, the indication of the entitlement-set indicative of whether the user is entitled to access the resource without revealing the identity of the user. The techniques may also include at least one of authorizing the remote device to access the resource or refraining from authorizing the remote device to access the resource based at least in part on the indication of the entitlement-set.
Techniques for preserving privacy while still allowing secure access to private resources. Among other things, the techniques may include receiving a request to provide a remote device with access to a private resource. In some instances, the request may be redirected to an identity provider service to authenticate the user of the remote device to maintain anonymity of an identity of the user. The techniques may also include receiving an indication of an entitlement-set provided by the identity provider service, the indication of the entitlement-set indicative of whether the user is entitled to access the resource without revealing the identity of the user. The techniques may also include at least one of authorizing the remote device to access the resource or refraining from authorizing the remote device to access the resource based at least in part on the indication of the entitlement-set.
Techniques for preserving privacy while still allowing secure access to private resources. Among other things, the techniques may include receiving a request to provide a remote device with access to a private resource. In some instances, the request may be redirected to an identity provider service to authenticate the user of the remote device to maintain anonymity of an identity of the user. The techniques may also include receiving an indication of an entitlement-set provided by the identity provider service, the indication of the entitlement-set indicative of whether the user is entitled to access the resource without revealing the identity of the user. The techniques may also include at least one of authorizing the remote device to access the resource or refraining from authorizing the remote device to access the resource based at least in part on the indication of the entitlement-set.
This disclosure describes techniques and mechanisms for disclosure describes techniques and mechanisms for a central management plane to automatically create and assign system identifiers to network devices, thereby creating a global network hierarchy within a network. The techniques enable the use of a system identifier to be automatically generated and assigned, as well as configuration and network policies to be automatically generated based on the system identifier. Accordingly, the techniques enable automation of regional connectivity and policy application, a simplified manner of troubleshooting/ debugging of any connectivity issues, and a simplified, aggregated view of statistic and analytics related to problems at site, sub-region, and region levels.
Techniques are described for routing traffic through an interconnect cloud gateway based on cloud traffic routing indicators. The interconnect cloud gateway can advertise the cloud traffic routing indicators, which can include cloud indicators and transport gateway indicators. The cloud indicators can include cloud tags utilized to route cloud traffic. The transport gateway indicators can include transport gateway flags utilized to identify private networks utilized to route the cloud traffic. The cloud traffic can routed during normal private network operation through private networks, which can be dynamically replaced by public networks due to occurrences of failures preventing the data traffic from being routed through the private networks and to cloud networks.
Techniques and architecture are described for a pull model for obtaining and implementing config changes on network devices are described herein. A user submits intent configuration to the network controller that needs to be delivered to several network sites. The network controller generates a config file. The network controller sends a pull notification message to all network devices that need to retrieve the config file. This pull notification message only contains a corresponding transaction ID for each network device and a location for the network device to use to pull the config file. The network devices may utilize a HTTP REST API exposed by the network controller to obtain the config file from the network controller. The network devices may utilize a REST API exposed by the network controller to reply with statuses of the configuration transaction. The techniques and architecture may be applied to multi-tenant network devices.
Providing cooling airflow through electronic devices is described. The electronic device includes a directional cooling system which provides for cooling airflow to be efficiently routed through the electronic device to provide improved and directed cooling to heat producing components.
According to some embodiments, a method includes detecting a start of an OpenTelemetry span by an application and determining security information related to the start of the OpenTelemetry span. The method further includes monitoring the application for one or more application behaviors during execution of the OpenTelemetry span. The method further includes detecting an end of the OpenTelemetry span by the application, and in response, calculate a security score for the OpenTelemetry span using the security information related to the start of the OpenTelemetry span and the one or more application behaviors detected during execution of the OpenTelemetry span. The method further includes updating a status of the OpenTelemetry span to include the security score and a text string related to the calculation of the security score.
Techniques are provided for read-based storage of time-series records. In one example, a server obtains at least one indication of one or more records of a plurality of records written to a record database by a producer that have been read from the record database by at least one consumer. The server stores in a time-series database the one or more records that have been read by the at least one consumer. One or more records of the plurality of records that have not been read by the at least one consumer may be pruned from storage in the time-series database.
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
In one embodiment, an illustrative method herein may comprise: obtaining, by a device, one or more independent telemetry streams, wherein each of the one or more independent telemetry streams is uniquely identifiable by a span identifier; translating, by the device, each of the one or more independent telemetry streams into a corresponding QUIC protocol stream; mapping, by the device, the span identifier of each of the one or more independent telemetry streams to a respective stream identifier that uniquely identifies a QUIC channel of a multiplexed QUIC protocol stream; and communicating, by the device, the multiplexed QUIC protocol stream containing each of the one or more independent telemetry streams on its corresponding QUIC channel to cause a retrieving device to determine the span identifier of each of the one or more independent telemetry streams based on their respective stream identifier.
Methods for discovering telemetry retrieval capabilities of telemetry devices. The methods include a computing device obtaining telemetry capability related information for one or more telemetry devices and determining one or more telemetry retrieval methods supported by each of the one or more telemetry devices based on the telemetry capability related information. The methods further include obtaining telemetry data based on the one or more telemetry retrieval methods determined to be supported by a respective telemetry device.
Techniques are described for embedded device based fingerprint signing and public ledger registering management. A digital fingerprint associated with media content can be identified. An embedded integrated circuit (IC) of the computing device can be utilized to store security data associated with the media content. The security data can include at least one digital certificate. The at least one digital certificate can include a device certificate utilized to generate a cryptographic signature associated with the metadata and the digital fingerprint. A file can be generated and registered with a public ledger. The file can include the digital fingerprint, the metadata, the at least one certificate, and the cryptographic signature.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
100.
LOW LIGHT EXPOSURE CONTROL USING INFRARED LIGHT-EMITTING DIODE ZONES DURING NIGHT VISION
A method is provided for low light exposure control during night vision. The method may include actively illuminating a region by using a plurality of IR LEDs. The IR LEDs are arranged so that an IR LED of the plurality of IR LEDs covers one of a plurality of zones, which combine to cover the region. The method may also include capturing an image frame by an imaging system including an image sensor. The image frame may be made up of pixels and captured using the light originating from the plurality of IR LEDs and reflected from the region onto the image sensor. The method may also include calculating auto-exposure control (AEC) parameters for the image frame to establish an average setting, recalculating AEC parameters for a first zone the plurality of zones and adjusting the power of a first IR LED of the plurality of IR LEDs.