Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 4625. Отображено 100.
05-01-2012 дата публикации

Network Problem Determination

Номер: US20120005318A1
Принадлежит: International Business Machines Corp

Techniques for problem determination are provided. The techniques include identifying one or more configuration items in two or more systems connected to one or more networks, performing a comparison of one or more common configuration items from the one or more configuration items in the two or more systems connected to one or more networks, and using the comparison to detect deviation between one or more configuration items of one of the two or more systems and one or more respective configuration items in the other one or more systems.

Подробнее
19-01-2012 дата публикации

Query-based semantic analysis of ad hoc configuration languages for networks

Номер: US20120016909A1
Автор: Gary Levin, Sanjai Narain
Принадлежит: Telcordia Technologies Inc

A method is provided for analyzing the semantic content of network configuration files, comprising the steps of accessing configuration files associated with corresponding network components, the files containing commands that define the configuration of those components; transforming the commands into a structural database based, at least in part, on a non-grammatical analysis of the commands, wherein the structure of the commands is represented as the structural database; and constructing a semantic database of the configuration files by querying the structural database.

Подробнее
02-02-2012 дата публикации

Communication device

Номер: US20120030526A1
Автор: Munehisa Matsuda
Принадлежит: Brother Industries Ltd

A communication device includes a receiving unit, a first determining unit, and a sending unit. The receiving unit is configured to receive, from a terminal device, a plurality of input values corresponding to a plurality of setting items. The first determining unit, when the plurality of setting items includes a plurality of related items that are related to each other, is configured to determine whether input values, among the plurality of input values, corresponding to the plurality of related items are compatible. The sending unit is configured to send error data indicating an error screen toward the terminal device when the input values corresponding to the plurality of related items are incompatible, the error screen showing that at least one input value among the plurality of input values has an error.

Подробнее
27-09-2012 дата публикации

Virtualized Policy Tester

Номер: US20120245917A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Embodiments of the present invention are directed to testing policy changes associated with a production network. A virtual network that represents at least a portion of the production network can be generated. A first transaction log based on a first execution of the virtual network using test traffic and a first set of policies that are implemented in the production network can be obtained. A second transaction log based on a second execution of the virtual network using the test traffic and a second set of policies to be implemented in the production network can be obtained. Based on a comparison of the first and second transaction logs, it can be determined whether the second set of policies has a desired effect in the virtual network.

Подробнее
22-11-2012 дата публикации

Systems and methods for managing policies on a computer

Номер: US20120297035A1
Принадлежит: Quest Software Inc

An apparatus, system, and method are disclosed for managing policies on a computer having a foreign operating system. Policies may specify hardware or software configuration information. Policies on a first computer with a native operating system are translated into configuration information usable on a second computer having a foreign operating system. In an embodiment, a translator manager manages the association between the policy on the first computer and the translator on the second computer. Computer management complexity and information technology management costs are reduced by centralizing computer management on the native operating system. Further reductions in management complexity are realized when the present invention is used in conjunction with network directory services.

Подробнее
09-05-2013 дата публикации

Method and apparatus for updating a user terminal

Номер: US20130117425A1
Автор: Magnus Jarl
Принадлежит: Individual

A method and arrangement in a User Terminal (UT) for updating an operational parameter in the UT, the method is comprising: to register, for at least one software module in the UT, a corresponding validator and/or a corresponding consistency verifier to a proxy module in the UT, wherein the validator is adapted to validate parameter syntax and wherein the consistency verifier is adapted to verify parameter consistency; to receive, from a Service Provider (SP), an operational parameter to be updated in the UT; and to check syntax validity and consistency of the received operational parameter which is based on each validator and/or each consistency verifier registered to the proxy module.

Подробнее
16-05-2013 дата публикации

Systems and methods for discovering network topology

Номер: US20130121686A1
Принадлежит: Level 3 Communications LLC

A method for determining network topology of a provider network includes selecting a first network element, selecting a first port on the first network element, and iteratively performing connectivity validation tests using the first port, wherein each connectivity validation test is associated with a type of network element and yields a result that indicates whether a second port on a second network element of the associated type is connected to the first port. A system for discovering topology of a network, the system comprising a topology discovery engine in operable communication with a near network element and operable to identify a first port of a far network element that is connected to a second port of the near network element by remotely altering operation of the near network element to cause the second network element to respond in a manner that identifies the first port.

Подробнее
23-05-2013 дата публикации

Information technology service management

Номер: US20130132534A1
Принадлежит: Hewlett Packard Development Co LP

A desired instance of a service model is stored, and an observed instance of the service model is provided. Inconsistencies between the desired instance and the observed instance may be detected based on a comparison between the desired instance and the observed instance.

Подробнее
23-05-2013 дата публикации

SERVICE CONFIGURATION ASSURANCE

Номер: US20130132550A1
Принадлежит: ORACLE INTERNATIONAL CORPORATION

Systems, methods, and other embodiments associated with service configuration assurance are described. One example method includes comparing an expected device configuration model with an actual device configuration model for the network device and communicating service identifiers in the expected device configuration for which there is no corresponding service configuration item in the actual device configuration model to a user. The example method may also include generating a service-impact event notification when a likely service-impacting configuration change is detected. 1. A non-transitory computer-readable medium storing computer-executable instructions that when executed by a computer cause the computer to perform a method comprising:identifying an expected device configuration model for a network device, where the expected device configuration model comprises one or more expected service configuration items associated with the network device;identifying an actual device configuration model of the network device, where the actual device configuration model comprises one or more service configuration items associated with the network device; for at least one service provided by the network device, identifying expected service configuration items that realize the service with a service identifier for the service;', 'matching identified expected service configuration items with service configuration items in the actual device configuration model;', 'associating service identifiers for expected service configuration items with matching service configuration items in the actual device configuration model;', 'identifying an expected service configuration item in the expected device configuration model that includes a service identifier and for which there is no corresponding service configuration item in the actual device configuration model;, 'comparing the expected device configuration model with the actual device configuration model bycommunicating the ...

Подробнее
12-09-2013 дата публикации

Cross Layer Coordinated Channel Bonding

Номер: US20130239160A1
Принадлежит: Broadcom Corp

Different data communication architectures deliver a wide variety of content, including audio and video content, to consumers. The architectures employ channel bonding to deliver more bandwidth than any single communication channel can carry. In some implementations, the communication architectures distribute video programming in the form of MPEG2 TS packets, flagged by marker packets, in a round-robin manner across the communication channels. Channel bonding synchronization information may be present in packets defined above the data-link layer or added to fields within data-link layer frames.

Подробнее
19-09-2013 дата публикации

Methods, Test Systems and Arrangements for Verifying Compliance with Requirement Specifications

Номер: US20130244584A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A method for verifying compliance of a communication device with one or more requirement specifications is disclosed. The method comprises establishing a link between a test system and the communication device, wherein the establishing comprises configuring one or more bearers and one or more control channels; closing a test loop comprising the test system and the communication device, wherein the closing comprises activating a test loop function of the communication device; sending data in a downlink of the test loop from the test system to the communication device; receiving the data at the communication device; transferring at least some of the data to an uplink transmission arrangement of the communication device after a specific event has occurred; and verifying, at the test system, transmission in an uplink of the test loop from the communication device to the test system. Corresponding test system and test loop function arrangement are also disclosed.

Подробнее
03-10-2013 дата публикации

Method and Apparatus for Parameterizing a Safety Device

Номер: US20130261772A1
Принадлежит: SIEMENS AG

A method and apparatus for parameterizing a device with parameters from a parameter list, wherein in an event of a match occurring between an external parameter token calculated externally based on the parameter list, and an internal parameter token calculated internally by the device to be parameterized based on the parameter list, an external device token input into the device is compared with an internal device token, which is calculated internally by the device to be parameterized based on a device ID for the device and the internal parameter token to validate the parameter list such that fast and reliable parameterization of a device, particularly a safety critical device, which is provided in an industrial installation or a vehicle, is achieved.

Подробнее
31-10-2013 дата публикации

System and method for secure provisioning of virtualized images in a network environment

Номер: US20130290694A1
Принадлежит: Cisco Technology Inc

An example method includes setting up a secure channel between a blade and a provisioning server in a network environment, downloading an image of a virtual machine monitor (VMM) from the provisioning server to the blade through the secure channel, and booting the image to instantiate the VMM on the blade. The blade and the provisioning server are mutually authenticated and authorized with a plurality of parameters. Booting the image may include loading the image on a memory element of the blade and transferring control to the image. In some embodiments, booting the image includes modifying a root file system of the image by adding the daemon such that an agent is included in the root file system. The agent can download another image corresponding to an operating system of a virtual machine.

Подробнее
09-01-2014 дата публикации

SYSTEMS AND METHODS FOR MANAGING POLICIES ON A COMPUTER

Номер: US20140012964A1
Принадлежит: Dell Software Inc.

An apparatus, system, and method are disclosed for managing policies on a computer having a foreign operating system. Policies may specify hardware or software configuration information. Policies on a first computer with a native operating system are translated into configuration information usable on a second computer having a foreign operating system. In an embodiment, a translator manager manages the association between the policy on the first computer and the translator on the second computer. Computer management complexity and information technology management costs are reduced by centralizing computer management on the native operating system. Further reductions in management complexity are realized when the present invention is used in conjunction with network directory services. 1. A computer system comprising:a workstation having a non-Windows operating system, a tangible computer storage medium with user applications stored therein, and a computer processor;a policy refresh component, stored in the storage medium, that checks whether a Windows native policy stored on a Windows computer and associated with the workstation has been changed;a translator manager, stored in the storage medium, that manages the association of the Windows native policy with the workstation and, upon a determination by the policy refresh component that the Windows native policy has been changed, receives the Windows native policy from the Windows computer;a policy translator, stored in the storage medium, that receives the Windows native policy from the translator manager and translates the Windows native policy into configuration information usable by the non-Windows operating system;an update configuration component, stored in the storage medium, that applies the configuration information usable by the non-Windows operating system by saving the configuration information in a policy-related file on the workstation;wherein the Windows native policy can be read, in its native ...

Подробнее
06-03-2014 дата публикации

Network access device and method for automatically establishing connection to a wide area network

Номер: US20140064149A1
Автор: Clifford A. Frey
Принадлежит: Meraki LLC

A network access device (NAD) is configured to automatically establish a connection to a WAN. The NAD tests IP configurations according to a first priority scheme at least until a currently best scoring one of the IP configurations is selected for use to communicate over the WAN. The testing of the IP configurations includes transmitting requests according to a first priority scheme and tracking any replies reflecting which IP configurations are valid. The first priority scheme is for selecting among IP configurations for testing and prioritizing a first type of IP configuration over a dynamically determined type of IP configuration. Which IP configurations of the dynamically determined type that are to be tested are determined by attempting to obtain DHCP leases using different VLAN IDs according to a second priority scheme of VLAN IDs to include in DHCP requests.

Подробнее
06-03-2014 дата публикации

System, Device, Method and Computer Program Product for Managing Devices

Номер: US20140068093A1
Автор: Kiyotaka Ohara
Принадлежит: Brother Industries Ltd

A system for managing a communication device having a first function of using a first communication protocol and a second function of using a second communication protocol is provided. The communication device is connected to a network including a first device using the first communication protocol and a second device using the second communication protocol. The system is provided with an inputting system that accepts an input for changing an operation regarding the communication of the communication device from a user, and a judging system that judges whether a trouble would arise in communication, in which the communication device is involved, based on the input inputted by the user through use of the inputting system.

Подробнее
20-03-2014 дата публикации

COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM

Номер: US20140082163A1
Принадлежит: Panasonic Corporation

An objective of the present invention is to determine a function of each communication apparatus with few steps. A first communication apparatus () is capable of carrying out at least one of a function of an apparatus which receives an access thereto from a second communication apparatus (), and a function of a host which accesses the second communication apparatus (). The first communication apparatus () comprises: an access request issuing unit () which issues a request which denotes the function thereof to the second communication apparatus (); and a conflict assessment unit () which, either when the request and a request which the second communication apparatus () has issued conflict or when the request is rejected, makes the access request issuing unit () reissue a request to the second communication apparatus () which denotes another function. 1. A communication apparatus including a data storing section and being capable of serving at least one of a role as a device for allowing another communication apparatus at a position remote from the communication apparatus to access the data storing section and a role as a host for accessing a data storing section included in the other communication apparatus , the communication apparatus comprising:an access control section that controls the role to be served by the communication apparatus;an access request issuing section that issues, to the other communication apparatus, a request that the communication apparatus serve one of the roles that the communication apparatus is capable of serving;an acquisition section that acquires, via the access control section, a request issued by the other communication apparatus and that acquires a response to the request issued by the access request issuing section; anda conflict determining section that reissues, to the other communication apparatus via the access request issuing section, a request that communication apparatus serve the other role in accordance with the roles that ...

Подробнее
20-03-2014 дата публикации

Method and apparatus for cause analysis involving configuration changes

Номер: US20140082423A1
Принадлежит: HITACHI LTD

A technique determines which configuration change(s) caused an application invocation failure of a computer application without the need for a knowledge database. To determine which configuration change is the most likely cause, the cause analysis program checks other computers that have experienced the same configuration changes. The cause analysis program checks and counts the application invocation results before and after each configuration change is done. If the same configuration changes are found in the other computers, the program checks whether each configuration change caused or cured the same problem in that computer. The program counts the similar cases for all of the computers. Subsequently, the program calculates the ratio of those instances involving a change from success to failure and the ratio of those instances involving a change from failure to success out of all instances for each configuration change.

Подробнее
03-04-2014 дата публикации

Verification of Configuration Information in BGP VPNs

Номер: US20140095678A1
Автор: Allan David
Принадлежит: ROCKSTAR CONSORTIUM US LP

Described are mechanisms for verifying configuration information in 2547 BGP VPNs. An originating PE generates a first knowledge digest encoding first configuration information associated with a current set of information advertised for a VRF. The originating PE also generates a second knowledge digest encoding second configuration information associated with cumulative information advertised for the VRF. The originating PE is capable of receiving a message from a user PE, the message including a third knowledge digest encoding third configuration information related to the user VRF. The originating PE is capable of comparing the first knowledge digest to the third knowledge digest and producing a first indication if the third configuration information encoded in the third knowledge digest is not a subset of the first configuration information encoded in the first knowledge digest. 1. A system for verifying configuration in a virtual private network (VPN) , the VPN using border gateway protocol (BGP) , the system comprising:at least one processor; and instructions executable to generate a first knowledge digest encoding first configuration information associated with a current set of information advertised for a provider edge device, the current set of information comprising at least one forwarding table entry associated with the provider edge device; instructions executable to receive a second knowledge digest encoding second configuration information; and', 'instructions executable to compare the first knowledge digest to the second knowledge digest to determine whether the configuration information encoded in the second knowledge digest is a subset of the configuration encoded in the first knowledge digest., 'at least one storage element storing instructions executable by the at least one processor, the instructions comprising2. The system of claim 1 , wherein the instructions comprise instructions executable to implement a virtual routing and forwarding engine.3 ...

Подробнее
01-01-2015 дата публикации

VDP REQUEST PACKET PROCESSING

Номер: US20150003288A1
Автор: Wu Qiang
Принадлежит:

A method and an edge switch for processing a VDP request packet are provided. The edge switch receives a notification for changing traffic features and a VDP request packet from a data server, determines filter information to be changed according to filter information in the VDP request packet, requests a VSI management server to process a VSI configuration and strategy according to the filter information to be changed, receiving a response from the VSI management server and processing the VSI configuration and strategy according to the filter information to be changed. 1. A method for processing a Virtual Station Interface Discovery and Configuration Protocol (VDP) request packet , comprising an edge switch:receiving a notification for changing traffic features and a VDP request packet from a data server,determining filter information to be changed according to filter information in the VDP request packet,requesting a VSI management server to process a VSI configuration and strategy according to the filter information to be changed, andreceiving a response from the VSI management server, and processing the VSI configuration and strategy according to the filter information to be changed.2. The method according to claim 1 , wherein the notification for changing the traffic features comprises a notification for increasing the traffic features; anddetermining the filter information to be changed according to the filter information in the VDP request packet, requesting the VSI management server to process the VSI configuration and strategy according to the filter information to be changed, receiving the response from the VSI management server and processing the VSI configuration and strategy according to the filter information to be changed comprises:determining filter information to be increased according to the filter information in the VDP request packet, requesting the VSI configuration and strategy from the VSI management server according to the filter information ...

Подробнее
06-01-2022 дата публикации

ROBUST AND SECURE CLOUD-BASED PLATFORM FOR DATA PROCESSING AND MANAGEMENT

Номер: US20220006839A1
Принадлежит:

Methods, devices and systems for providing a robust and secure cloud-based platform for data processing and management are described. In an example, a method for improving the configurability and compliance of a cloud-computing environment comprising a plurality of zones includes receiving, at a configuration engine, a plurality of parameters and a plurality of security rules for each of the plurality of zones, creating, based on the plurality of parameters, a virtual network and one or more subnets for each of the plurality of zones, and updating, based on the plurality of security rules, one or more routing tables assigned to the one or more subnets to ensure traffic to and from a zone of the plurality of zones passes through a corresponding firewall of the zone. 1. A system for improving configurability and compliance of a cloud-computing environment comprising a plurality of zones , the system comprising: [ create an express route with a virtual network gateway,', 'create, based on the at least one parameter, a virtual network and a subnet,', 'connect the virtual network to the express route,', 'create, based on the at least one security rule, a routing table and a network security guard (NSG) that are assigned to the subnet,', 'configure at least one of a firewall, load balancer, virtual machine, or public IP address associated with the virtual network, and', 'update, based on the at least one security rule, the routing table to ensure traffic to and from the zone passes through the firewall,, 'receive at least one parameter and at least one security rule for each of the plurality of zones, and for each of the plurality of zones, 'wherein the zone is configured to host a workload on the virtual network, and', 'wherein the workload is compliant with at least one standard., 'a processor and a memory including instructions stored thereupon, wherein the instructions upon execution by the processor cause the processor to2. The system of claim 1 , wherein the ...

Подробнее
04-01-2018 дата публикации

ARTIFICIAL INTELLIGENCE (AI) TECHNIQUES FOR LEARNING AND MODELING INTERNAL NETWORKS

Номер: US20180004870A1
Принадлежит:

Introduced here are techniques for modeling networks in a discrete manner. More specifically, various embodiments concern a virtual machine that collects data regarding a network and applies algorithms to the data to discover network elements, which can be used to discover the topology of the network and model the network. The algorithms applied by the virtual machine may also recognize patterns within the data corresponding to naming schemes, subnet structures, application logic, etc. In some embodiments, the algorithms employ artificial intelligence techniques in order to more promptly respond to changes in the data. The virtual machine may only have read-only access to certain objects residing within the network. For example, the virtual machine may be able to examine information hosted by a directory server, but the virtual machine may not be able to effect any changes to the information. 1. A computer-implemented method for modeling an internal network , the method comprising: 'wherein the computing device resides within an internal network;', 'causing a security module to be installed on a computing device executing a Microsoft Windows operating system,'}establishing a communication link between the security module and an Active Directory database that includes valid network identities used to facilitate a directory service for the internal network;executing one or more algorithms that identify common characteristics of the valid network identities;creating a model of the valid network identities based on the common characteristics;continually monitoring whether changes have been made to the valid network identities; and 'modifying the model of the valid network identities to account for the change.', 'in response to determining that a change was made to a valid network identity,'}2. The computer-implemented of claim 1 , wherein the security module is executed by a virtual machine hosted on the computing device.3. The computer-implemented method of claim 1 , ...

Подробнее
07-01-2016 дата публикации

System For Cloud-Managed Mobile Device Administration

Номер: US20160006604A1
Принадлежит:

An improved system for cloud-managed mobile device administration (MDM) is described. MDM may be implemented with the use of a third-party product that has management features for particular vendors of mobile devices. The cloud-managed mobile device administration and provisioning eases the administrative burden during deployments, and for on-going mobile device administration. Multiple systems may also manage mobile devices after putting the device into supervised mode, instead of being locked into using the computer that provisioned it originally for any subsequent management and administration needs. 1. A system comprising:an administrative module comprising a frontend console and a central database;a plurality of server modules associated with the administrative module wherein each server module comprises a server module interface for connecting with a mobile device group;a plurality of mobile device groups wherein each of the plurality of mobile device groups is associated with one of the plurality of the server modules and wherein each of the mobile device groups includes at least one mobile device having mobile device data including device data and version data;wherein the central database includes central data related to each of the plurality of mobile device groups and the mobile device data of at least one mobile device;wherein the server module interface retrieves the mobile device data for the at least one mobile device and wherein the administrative module compares the mobile device data retrieved by the sever module interface with the central data when the at least one mobile device is connected to the server module interface.2. The system of claim 1 , wherein the server module interface provides installation data retrieved from the administrative module for the at least one mobile device when the at least one mobile device is connected to the server module interface.3. The system as in wherein the content of the installation data is selected by the ...

Подробнее
07-01-2021 дата публикации

ENSURING DATA CONSISTENCY BETWEEN A MODULAR DEVICE AND AN EXTERNAL SYSTEM

Номер: US20210006409A1
Принадлежит:

The present application relates to ensuring data consistency between a modular device and an external system. Techniques are described for ensuring data consistency between devices at a control device using configuration signatures. A control device can receive and store a baseline configuration signature for a first modular device. Upon initialization of the first modular device, the control device can receive a current configuration signature from the first modular device. The control device can compare the current configuration signature with the baseline configuration signature and, if a mismatch is found, generate a notification indicating that data subsequently received from the first modular device is of uncertain integrity. 1. A method , comprising:receiving, from a configuration application, by a computing device, and storing a baseline configuration signature for a first modular device;upon initialization of the first modular device, receiving, over a first data communications network, a current configuration signature from the first modular device;comparing the current configuration signature with the baseline configuration signature; andupon determining the current configuration signature and the baseline configuration signature do not match, generating, by operation of one or more computer processors, a notification indicating that data subsequently received from the first modular device is of uncertain integrity.2. The method of claim 1 , wherein the baseline configuration signature is generated by the configuration application and received from the configuration application over a second data communications network.3. The method of claim 2 , wherein the configuration application is configured to generate the baseline configuration signature using initial configuration data for the first modular device and upon successful configuration of the first modular device.4. The method of claim 3 , wherein the first modular device is configured claim 3 , upon ...

Подробнее
07-01-2021 дата публикации

Monitoring apparatus, network system, topology management method, and computer readable medium

Номер: US20210006470A1
Принадлежит: Mitsubishi Electric Corp

An information obtaining unit (53) of a monitoring apparatus (40) obtains from each node, topology map information created in each node by an exchange of information and sharing of information between nodes that belong to a ring network. The topology map information is information that indicates a connection relation between the nodes in the ring network. A topology comparison unit (54) of the monitoring apparatus (40) compares the topology map information obtained from each node by the information obtaining unit (53) with topology definition information retained in a memory (42) beforehand, and determines whether or not a configuration of the ring network is according to design. The topology definition information is information that defines the connection relation between the nodes in the ring network.

Подробнее
02-01-2020 дата публикации

SYSTEM FOR PROVISIONING RACKS AUTONOMOUSLY IN DATA CENTERS

Номер: US20200007394A1
Принадлежит:

A provisioning system autonomously and asynchronously brings up data center racks. In an embodiment, the provisioning system determines presence of a first and second device connected to a network. The provisioning system generates a first and second thread for validation of the first and second devices, respectively. Responsive to determining by the first thread that the first device is not validated, the provisioning system notifies a detection system that the validation of the first device has not passed. Responsive to determining by the second thread that the second device is validated, the provisioning system provisions the second device for integration with one or more provisioned devices on the network. 1. A method for provisioning data center racks of devices , the method comprising:determining, by one or more processors, presence of a device of a plurality of devices connected to a network, the plurality of devices further including one or more provisioned devices;receiving a network address of the device from the one or more provisioned devices;transmitting a request to the device using the network address;receiving device information from the device responsive to the request; andprovisioning, by the one or more processors, the device for integration with the one or more provisioned devices responsive to validating the device information.2. The method of claim 1 , further comprising:responsive to determining that the device does not pass a stage of validation, automatically re-attempting validation using the device information.3. The method of claim 1 , further comprising:receiving an application programming interface call from the device, wherein transmitting the request is responsive to receiving the application programming interface call.4. The method of claim 1 , wherein provisioning the device for integration with the one or more provisioned devices comprises:determining at least one of a type of the device, a version of the device, or an identifier ...

Подробнее
03-01-2019 дата публикации

SECURITY POLICY ANALYZER SERVICE AND SATISFAIBILITY ENGINE

Номер: US20190007443A1
Принадлежит:

Security policies may be utilized to grant or deny permissions related to the access of computing resources. Two or more security policies may be compared to determine whether the policies are equivalent, whether one security is more permissive than another, and more. In some cases, it may be possible to identify whether there exists a security permission that is sufficient to determine two security policies lack equivalency. Propositional logics may be utilized in the evaluation of security policies. 1. A computer-implemented method , comprising: a first security policy encoding a first set of security permissions;', 'a second security policy encoding a second set of security permissions;, 'receiving, via an interface, information specifyingdetermining a first propositional logic expression based at least in part on the first set of security permissions;determining a second propositional logic expression based at least in part on the second set of security permissions;identifying a set of parameters that is sufficient to determine the first propositional logic and the second propositional logic lack equivalency such that applying the first security policy to the set of parameters results in a denial of access to a computing resource associated to the set of parameters and applying the second security policy to the set of parameters results in a grant of access to the computing resource; and an indication that the first security policy and the second security policy lack equivalency; and', 'the set of parameters., 'providing, via the interface2. The computer-implemented method of claim 1 , wherein determining the first propositional logic and the second propositional logic lack equivalency comprises utilizing a satisfiability modulo theories (SMT) solver to determine whether constraints generated based at least in part from the first propositional logic and the second propositional logic are satisfiable.3. The computer-implemented method of claim 2 , wherein the ...

Подробнее
02-01-2020 дата публикации

AUTOMATED PACKETLESS NETWORK REACHABILITY ANALYSIS

Номер: US20200007569A1
Принадлежит: Amazon Technologies, Inc.

Methods, systems, and computer-readable media for automated packetless network reachability analysis are disclosed. An analysis is performed of network configuration data for a network comprising a host computer. Based at least in part on the analysis, one or more ports at the host computer that are reachable from another computer are determined. Based at least in part on the analysis, one or more routes to the one or more ports are determined. A report is generated that is descriptive of the one or more ports and the one or more routes. 1. A system , comprising: generate one or more queries of network configuration data for a network comprising a host computer, wherein the one or more queries are expressed in a query language, and wherein the one or more queries are generated based at least in part on a set of rules;', 'determine one or more ports at the host computer that are open and reachable from outside the network, wherein the one or more ports are determined based at least in part on results of the one or more queries;', 'determine one or more processes that are listening on the one or more ports, wherein the one or more processes are determined using an agent installed on the host computer; and', 'generate a report descriptive of the one or more ports and the one or more processes., 'one or more computing devices configured to implement a network security evaluator, wherein the network security evaluator is configured to2. The system as recited in claim 1 , wherein the network security evaluator is further configured to:determine and report one or more routes to the one or more ports from outside the network.3. The system as recited in claim 1 , wherein the network security evaluator is further configured to:determine and report one or more configuration settings that cause the one or more ports to be open and reachable from outside the network.4. The system as recited in claim 1 , wherein the network security evaluator is further configured to:determine ...

Подробнее
27-01-2022 дата публикации

SECURE NETWORK DEVICE MANAGEMENT IN A TELECOMMUNICATIONS NETWORK

Номер: US20220030034A1
Принадлежит: LEVEL 3 COMMUNICATIONS, LLC

A secure network device management system and method include monitoring and validating commands to network devices before such commands are executed. The security system accumulates inputs from a network device intended for display on a terminal and provided by the network device in response to inputs from the terminal and received by the network device. When a control input to execute the command is received from the terminal, the security system reproduces the command from the accumulated inputs and compares the reproduced command to a command list to determine whether the command is authorized. If so, the security system provides the control input to the network device such that the network device executes the command. Otherwise, the security system may delete the command and transmit an alert to the terminal. 1. A method for managing network devices , the method comprising:transmitting a plurality of inputs received from an input device to a network device, the plurality of inputs associated with a command executable by the network device;storing a plurality of characters in an accumulator, the plurality of characters received from the network device in response to the transmitted plurality of inputs;receiving a control input from the input device, the control input for executing the command at the network device;in response to receiving the control input, reproducing the command for the network device from the plurality of characters stored in the accumulator; andverifying whether the reproduced command is authorized for execution at the network device including determining if the reproduced command is at least one of included in a list of authorized commands for the network device or excluded from a list of unauthorized commands for the network device, wherein at least one of the list of authorized commands and the list of unauthorized commands is based on characteristics of a user of the user computing device.2. The method of claim 1 , wherein at least one of ...

Подробнее
14-01-2016 дата публикации

METHODS AND APPARATUS FOR IMPROVING COMPATIBILITY BETWEEN NETWORK DEVICES

Номер: US20160011862A1
Принадлежит: JUNIPER NETWORKS, INC.

In some embodiments, an apparatus includes a network device configured to receive an anomaly database of a first image that stores a set of differences between the first image and a base image. The network device is configured to compare the anomaly database of the first image with an anomaly database of a second image storing a set of differences between the second image and the base image to determine if the first and second images include at least one incompatible critical feature or incompatible non-critical feature. The network device is configured to send a signal associated with a first action if the first and second images include the at least one incompatible critical feature. The network device is configured to send a signal associated with a second action different from the first action if the first and second images include the at least one incompatible non-critical feature. 120-. (canceled)21. An apparatus , comprising:a network device configured to be included within a plurality of network devices operatively coupled within a network, the network device configured to receive information indicating a set of differences between a first image to be installed on the network device, and a base image,the network device configured to compare the set of differences between the first image and the base image, to a set of differences between a second image installed on a network device of the plurality of network devices and the base image, to determine (1) if the first image and the second image include at least one incompatible critical feature, the at least one incompatible critical feature including at least one feature associated with enabling communication between the plurality of network devices, and (2) if the first image and the second image include at least one incompatible non-critical feature,the network device configured to send a signal associated with a first action if the first image and the second image include the at least one incompatible ...

Подробнее
14-01-2021 дата публикации

SYSTEM AND METHOD FOR UPDATING NETWORK COMPUTER SYSTEMS

Номер: US20210011700A1
Принадлежит:

An update system configured to provide software updates, software patches and/or other data packets to one or more computer systems via a network is disclosed. The update system may interact with a network management system, such as an enterprise management system, to distribute data packets and gather configuration information. The update system may generate and send commands to the network management system. The network management system may carry out the commands to distribute data packets and/or gather configuration information. 1. A computer-implemented method comprising:receiving, by a computing system, client configuration information associated with a plurality of client computer systems, the client configuration information being determined based on scanning, via one or more agents, the plurality of client computer systems;acquiring, by the computing system, data indicating that a particular client computer system, out of the plurality of client computer systems, is to have a particular data packet installed;comparing, by the computing system, the client configuration information and the data to determine that the particular data packet is transmissible to the particular client computer system;determining, by the computing system, based on the client configuration information, that the particular client computer system meets one or more conditions for installing the particular data packet;causing, by the computing system, the particular data packet to be communicated to and installed at the particular client computer system via at least one agent out of the one or more agents;verifying, by the computing system, that the particular data packet has been successfully installed at the particular client computer system; and the update system interface comprises an installation status field associated with the particular client computer system and the particular data packet, the installation status field being color coded based on an installation status of the ...

Подробнее
10-01-2019 дата публикации

Secure configuration data storage

Номер: US20190012463A1
Принадлежит: ARM IP LTD

A machine-implemented method for controlling a configuration data item in a storage-equipped device having at least two security domains, comprising receiving, by one of the security domains, a configuration data item; storing the configuration data item; providing a security indication for the configuration data item; and when an event indicates untrustworthiness of the data item, invalidating a configuration effect of the stored configuration data item. Further provided is a machine-implemented method for controlling a storage-equipped device as a node in a network of devices, comprising receiving information that a data source or type of a configuration data item is untrusted; analysing metadata for the data source and the configuration data item; populating a knowledge base with analysed metadata; and responsive to the analysed metadata, transmitting security information to the network of devices. A corresponding device and computer program product are also described.

Подробнее
14-01-2016 дата публикации

Radio Resource Management Information Measurement Method and Apparatus, and Device

Номер: US20160013984A1
Принадлежит: Huawei Technologies Co Ltd

Embodiments of the present invention provide a radio resource management (RRM) information measurement method and apparatus, and a device. The method includes determining at least one piece of configuration information used, by user equipment, for radio RRM measurement, where the configuration information includes at least one type of signal type information used for the RRM measurement, and signal combination information used for the RRM measurement, and sending the configuration information to the user equipment, so that the user equipment performs the RRM measurement according to the configuration information.

Подробнее
11-01-2018 дата публикации

CONFIGURING METHOD AND CORRESPONDING COMMUNICATION NETWORK DEVICE, SYSTEM, COMPUTER READABLE PROGRAM PRODUCT AND COMPUTER READABLE STORAGE MEDIUM

Номер: US20180013627A1
Принадлежит:

The disclosure relates to a method for configuring an WLAN (Wireless Local Area Network) access point adapted to use at least one operational frequency channel to transmit or receive data when the access point is in an operational mode. The configuring includes checking an availability of at least one restricted frequency channel, a use of the restricted frequency channel being restricted by the availability, choosing the operational frequency channel from a set of frequency channels according to the checked availability, a first configuring comprising a first checking of restricted frequency channels belonging to a first proper sub-set of the set being performed before entering into the operational mode. At least one second checking of at least one restricted frequency channel of the set, that has not been checked as available, is performed after the first configuring. 1. A method comprising configuring an WLAN access point adapted to use at least one operational frequency channel to transmit or receive data when said access point is in an operational mode , said configuring comprising:checking an availability of at least one restricted frequency channel, a use of said restricted frequency channel being restricted by said availability;choosing said operational frequency channel from a set of frequency channels including said checked frequency channel, according to said checked availability;a first configuring comprising a first checking of restricted frequency channels belonging to a first proper sub-set of said set being performed before entering into said operational mode;wherein at least one second checking of at least one restricted frequency channel of said set, that has not been checked as available, is performed after said first configuring.2. The method of claim 1 , wherein said first configuring is performed during a first boot of the access point in a location.3. The method of claim 1 , wherein at least one of said second checking is performed for all not ...

Подробнее
14-01-2021 дата публикации

ORCHESTRATION OF MESHES

Номер: US20210014113A1
Принадлежит:

Methods, apparatus, systems, and articles of manufacture to orchestrate execution of services in a mesh of orchestrators of an edge cloud computing environment are disclosed. An example orchestrator apparatus includes an interface to receive a service to be executed and to monitor execution of the service. The example apparatus includes an orchestration delegate to select resources and orchestrate deployment of the service to execute using the selected resources. The example apparatus includes a delegated orchestration manager to manage the orchestration delegate based on information from the interface and the orchestration delegate regarding execution of the service. 1. An orchestrator apparatus comprising: receive a service to be executed; and', 'monitor execution of the service;, 'an interface to select resources; and', 'orchestrate deployment of the service to execute using the selected resources; and, 'an orchestration delegate to 'manage the orchestration delegate based on (a) information from the interface and (b) information corresponding to execution of the service by the orchestration delegate.', 'a delegated orchestration manager to2. The apparatus of claim 1 , wherein the orchestrator apparatus is in communication with an edge orchestrator to receive instructions from the edge orchestrator regarding execution of the service.3. The apparatus of claim 2 , wherein the orchestrator apparatus is part of a mesh of orchestrators to be managed by the edge orchestrator.4. The apparatus of claim 1 , wherein the orchestration delegate and the delegated orchestration manager are to adjust resource allocation to comply with a contract associated with the execution of the service.5. The apparatus of claim 4 , wherein the adjustment of resource allocation is to occur across edge computing entities.6. The apparatus of claim 1 , wherein the resources are implemented in at least one of an edge claim 1 , fog claim 1 , or cloud computing entity.7. The apparatus of claim 1 , ...

Подробнее
15-01-2015 дата публикации

DYNAMIC PORT TYPE DETECTION

Номер: US20150019696A1
Принадлежит:

An aspect includes dynamic port type detection. A link initialization frame that includes a protocol identifier is received at a port of a switch. Based on successfully decoding the protocol identifier, the port is configured to a mode of operation compatible with the protocol identifier. A table in the switch is updated to configure one or more other ports of the switch to the mode of operation compatible with the protocol identifier. A handshake response is sent to acknowledge the successful decoding of the protocol identifier. If no handshake response is received at a server prior to expiration of a wait pulse repetition time, the server periodically transmits the link initialization frame with a different protocol identifier for an alternate mode of operation until the handshake response is received or all supported modes of operation are checked. 1. A method for dynamic port type detection , comprising:receiving a link initialization frame at a port of a switch, the link initialization frame comprising a protocol identifier; and configuring the port to a mode of operation compatible with the protocol identifier;', 'updating a table in the switch to configure one or more other ports of the switch to the mode of operation compatible with the protocol identifier; and', 'sending a handshake response to acknowledge the successful decoding of the protocol identifier., 'based on successfully decoding the protocol identifier2. The method of claim 1 , wherein the link initialization frame is defined at one or more of a physical layer and a link layer claim 1 , and the link initialization frame is received at the switch from a link between the switch and a server.3. The method of claim 2 , further comprising:resetting one or more of the physical layer and the link layer to configure the port of the switch based on one or more of: receiving a link reset request at the port and sending a link disable signal from the port, wherein the link disable signal is configured to ...

Подробнее
19-01-2017 дата публикации

COMPLIANCE VALIDATION FOR SERVICES BASED ON USER SELECTION

Номер: US20170019314A1
Принадлежит:

Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist. 1. A method for validation of services , the method comprising:receiving, by one or more processors, a request of a service;parsing, by one or more processors, the received request of the service to identify information included in the received request of the service;generating, by one or more processors, a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service; anddetermining, by one or more processors, a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.2. The method of claim 1 , wherein determining the validation result utilizing the generated checklist further comprises:identifying, by one or more processors, one or more script functions ...

Подробнее
03-02-2022 дата публикации

METHOD AND SYSTEM FOR FACILITATING EDGE RACK EMULATION

Номер: US20220038343A1
Принадлежит:

A system for facilitating emulation in a distributed environment is provided. During operation, the system can obtain configuration of a physical edge rack, which can include one or more physical computing devices. The system can then present an emulated edge rack in a user interface. The emulated edge rack can be a digital twin of the physical edge rack. Based on a user input received via the user interface, the system can emulate a power-on event on the emulated edge rack. The emulated power-on event can emulate a power-on event for the physical edge rack. The system can then emulate the deployment of a component in the powered-on emulated edge rack based on configuration information received via the user interface. The deployed component can be configured based on the configuration information. 1. A method for facilitating emulation in a distributed environment , comprising:obtaining configuration of a physical edge rack, which includes one or more physical computing devices;presenting an emulated edge rack in a user interface, wherein the emulated edge rack is a digital twin of the physical edge rack;in response to receiving a user input via the user interface, emulating a power-on event on the emulated edge rack, wherein the emulated power-on event emulates a power-on event for the physical edge rack; andemulating deployment of a component in the powered-on emulated edge rack based on configuration information received via the user interface, wherein the deployed component is configured based on the configuration information.2. The method of claim 1 , further comprising:presenting, on the user interface, virtual connectivity among the emulated edge rack and a set of emulated network devices; andemulating network operations of the emulated edge rack with the emulated network devices.3. The method of claim 1 , wherein the component is one of: a compute node facilitating compute operations and a target node facilitating storage operations.4. The method of claim 1 ...

Подробнее
18-01-2018 дата публикации

CONFIGURATION OF A MANAGED DEVICE

Номер: US20180019917A1
Принадлежит:

Example implementations relate to configuring a managed device. For example, configuration of a managed device may be performed by a services controller. The services controller may comprise a processing resource and a memory resource storing machine readable instructions to cause the processing resource to perform a number of actions. For instance, the services controller may manage configuration of a network using a hierarchical configuration model. The services controller may define a plurality of configuration elements for each of a plurality of managed devices in the hierarchical configuration model, where configuration elements shared among the plurality of managed devices are assigned a same setting from the services controller, and the configuration elements assigned by the services controller are customizable by each of the plurality of managed devices. 1. A services controller comprising:a processing resource; and manage configuration of a network using a hierarchical configuration model; and', configuration elements shared among the plurality of managed devices are assigned a same setting from the services controller; and', 'the configuration elements assigned by the services controller are customizable by each of the plurality of managed devices., 'define a plurality of configuration elements for each of a plurality of managed devices in the hierarchical configuration model, wherein], 'a memory resource storing machine readable instructions to cause the processing resource to2. The services controller of claim 1 , including instructions to cause the processing resource to define default configurations for the managed devices in the hierarchical configuration model by assigning a plurality of configuration elements associated with the services controller to the managed devices.3. The services controller of claim 1 , including instructions to cause the processing resource to:represent each of the plurality of managed devices in the hierarchical ...

Подробнее
18-01-2018 дата публикации

CONFIGURATION VALIDATION OF A DEVICE

Номер: US20180019920A1
Принадлежит:

In some examples, the validation controller may comprise a processing resource and a memory resource storing machine readable instructions to cause the processing resource to perform a number of actions. In some examples, the validation controller may determine functional capabilities for a topology that includes a plurality of devices to be configured by the validation controller. The validation controller may compare a configuration element for the plurality of devices to the functional capabilities for the plurality of devices. The validation controller may validate the configuration element based on the comparison. The validation controller may also push the configuration element to the plurality of devices when the configuration element is validated. 1. A validation controller comprising:a processing resource; and determine functional capabilities for a topology that includes a plurality of devices to be configured by the validation controller;', 'compare a configuration element for the plurality of devices to the functional capabilities for the plurality of devices;', 'validate the configuration element based on the comparison; and', 'push the configuration element to the plurality of devices when the configuration element is validated., 'a memory resource storing machine readable instructions to cause the processing resource to2. The validation controller of claim 1 , wherein the plurality of devices include network devices within a network hierarchy.3. The validation controller of claim 1 , wherein validating the configuration element includes a syntax validation claim 1 , a semantic validation claim 1 , and a platform-limit validation of the plurality of devices.4. The validation controller of claim 1 , including instructions to cause the processing resource to modify the configuration element when a conflict is identified between the configuration element and the functional capabilities.5. The validation controller of claim 1 , including instructions to ...

Подробнее
18-01-2018 дата публикации

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR NETWORK TEST CONFIGURATION USING VIRTUAL LOCAL AREA NETWORK (VLAN) SCANNING

Номер: US20180019967A1
Автор: Ameling Thomas
Принадлежит:

Methods, systems, and computer readable media for network test configuration using VLAN scanning are disclosed. One method for network test configuration using VLAN scanning occurs at a first port of a network equipment test device. The method includes sending a plurality of address resolution protocol (ARP) requests to a system under test (SUT), wherein each of the plurality of ARP requests includes a different virtual local area network (VLAN) identifier (ID). The method also includes receiving an ARP response from the SUT, wherein the ARP response indicates a first VLAN ID associated with the SUT. The method further includes using the first VLAN ID when sending test packets to the SUT via the first port. 1. A method for network test configuration using VLAN scanning , the method comprising: sending a plurality of address resolution protocol (ARP) requests to a system under test (SUT), wherein each of the plurality of ARP requests includes a different virtual local area network (VLAN) identifier (ID);', 'receiving an ARP response from the SUT, wherein the ARP response indicates a first VLAN ID associated with the SUT; and', 'using the first VLAN ID when sending test packets to the SUT via the first port., 'at a first port of a network equipment test device2. The method of comprising: sending a second plurality of ARP requests to the SUT, wherein each of the second plurality of ARP requests includes a different VLAN ID;', 'receiving a second ARP response from the SUT, wherein the second ARP response indicates a second VLAN ID associated with the SUT; and', 'using the second VLAN ID when sending test packets to the SUT via the second port., 'at a second port of the network equipment test device3. The method of wherein the first VLAN ID is different from the second VLAN ID.4. The method of wherein the first VLAN ID is the same as the second VLAN ID.5. The method of wherein using the first VLAN ID when sending test packets to the SUT includes storing the first VLAN ID ...

Подробнее
16-01-2020 дата публикации

System and method for controlling rollback of firmware

Номер: US20200019397A1
Принадлежит: SEAGATE TECHNOLOGY LLC

A method includes receiving a firmware package including at least one firmware element having a security revision number. The security revision number of the at least one firmware element is compared to at least one firmware state identifier to determine if the firmware package is a rollback. At least one rollback policy is applied to the firmware package to approve or reject the firmware package when the firmware package is a firmware rollback. The firmware package is installed when the firmware package is approved by the at least one rollback policy.

Подробнее
22-01-2015 дата публикации

METHOD AND APPARATUS FOR TRANSMITTING PROCESS DATA IN AN AUTOMATICALLY CONTROLLED INSTALLATION

Номер: US20150023178A1
Автор: GRUBER Winfried
Принадлежит:

A process data transmitter transmits process data at defined recurring time intervals as a serial transmit data stream including data symbols at a defined symbol rate. A process data receiver samples the serial transmit data stream at a sampling rate which is higher than the symbol rate by a defined factor to thereby generate a serial receiver data stream having a plurality of sampling values per data symbol. The process data receiver subdivides the serial receiver data stream into data packets, each of which has a defined first number of sampling values. The process data receiver selects a defined second number of sampling values from the respective data packets. The second number is smaller than the first number by the defined factor and the sampling values selected from each data packet are equidistant from one another. The process data receiver processes the selected sampling values as received process data. 1. A method for transmitting process data in an automatically controlled installation , the method comprising the steps of:providing a process data transmitter which transmits respective current process data via a data line at defined recurring time intervals, andproviding a process data receiver which receives the process data via the data line,wherein the process data transmitter transmits the process data via the data line in the form of a serial transmit data stream comprising a plurality of data symbols at a defined symbol rate,wherein the process data receiver samples the serial transmit data stream at a sampling rate which is higher than the symbol rate by a defined factor in order to thereby generate a serial receiver data stream comprising a plurality of sampling values per data symbol,wherein the process data receiver subdivides the serial receiver data stream into data packets, each of which has a defined first number of sampling values,wherein the process data receiver selects a defined second number of sampling values from the respective data ...

Подробнее
21-01-2021 дата публикации

Method for applying a patch to a virtualized network function to be updated

Номер: US20210021462A1
Принадлежит: ORANGE SA

A method including: identifying a set of dependent virtualised network functions included in a first virtual network, the set including at least a virtualised network function to be updated; creating a second virtual network including clones of virtual machines implementing the dependent virtualised network functions of the set; interconnecting, in the second virtual network, clones of the dependent virtualised network functions, identically to an interconnection in the first network of dependent virtualised network functions; identifying an input data packet of the dependent virtualised network functions, duplicating the packet and sending the duplicated packet to the second network; applying a patch to the clone of the virtualised network function to be updated in the second network; triggering an alert when a performance value of a dependent virtualised network function of the first virtual network differs from a performance value on the clone of the virtualised network function in the second network.

Подробнее
21-01-2021 дата публикации

MANAGING A CONFIGURATION REQUEST IN A COMPUTING NETWORK

Номер: US20210021465A1
Принадлежит:

Example implementations relate to managing configuration requests in computer networks which include a set of configurable external entities. In an example, a received configuration request can be decomposed into a set of provisioning items and the set of provisioning items can be stored in a data structure. Using provisioning items from the data structure, a set of provisioning operations can be constructed, and the set of provisioning operations can be dispatched to at least one of the configurable external entities of the set of configurable external entities to provision the at least one configurable external entity in accordance with the received configuration request. 1. A method for managing a configuration request in a computing network that includes a set of configurable network entities , the method comprising:decomposing a received configuration request into a set of provisioning items;storing the set of provisioning items in a data structure;constructing a set of provisioning operations using provisioning items from the data structure; anddispatching the set of provisioning operations to at least one of the configurable network entities of the set of configurable network entities to provision the at least one configurable network entity in accordance with the received configuration request.2. A method according to further comprising:issuing a notification of configuration request completion following completion of the set of provisioning operations by the set of configurable network entities.3. A method according to wherein constructing a set of provisioning operations comprises using provisioning items from the data structure to construct a set containing a minimum number of provisioning operations required to implement the configuration request.4. A method according to wherein constructing a set of provisioning operations comprises analysing the provisioning items to identify and remove provisioning items that relate to:duplicate provisioning ...

Подробнее
21-01-2021 дата публикации

Virtual network function bus-based auto-registration

Номер: US20210021487A1
Принадлежит: VERIZON PATENT AND LICENSING INC

A Network Functions Virtualization (NFV) system reads, from a data bus coupled to the NFV system, Virtual Network Function (VNF) parameters published to the data bus by a new VNF. The NFV system publishes, to the data bus based on the VNF parameters, instructions to multiple components of the NFV system defining which VNF capabilities of the new VNF are to be managed, controlled, or monitored by which of the multiple NFV system components. The multiple components of the NFV system control, manage, or monitor the new VNF based on the published instructions. The data bus can include a Data Movement as a Platform (DMaaP) system that publishes and subscribes to streams of records.

Подробнее
22-01-2015 дата публикации

Recovering from a failure to connect to a network that was remotely configured on a headless device

Номер: US20150026317A1
Принадлежит: Qualcomm Connected Experiences Inc

The disclosure relates to wireless communications. An aspect determines whether or not an attempt to connect to a local wireless network using a given network configuration failed, determines whether or not a previous attempt to connect to the local wireless network using the given network configuration was successful, and if the attempt to connect failed and the previous attempt was successful, switches between a state of retrying to connect to the local wireless network and a state of waiting to receive a new network configuration.

Подробнее
26-01-2017 дата публикации

DYNAMIC PORT TYPE DETECTION

Номер: US20170026239A1
Принадлежит:

An aspect includes dynamic port type detection. Packet routing paths are defined in a table of a switch for flows within a network based on a communication received on a secure channel between a network controller and the switch. A link initialization frame that includes a protocol identifier is received at a port of the switch. Based on successfully decoding the protocol identifier, the port is configured to a mode of operation compatible with the protocol identifier. The table in the switch is updated to configure one or more other ports of the switch to the mode of operation compatible with the protocol identifier. A handshake response is sent to acknowledge the successful decoding of the protocol identifier. 1. A method for dynamic port type detection , comprising:defining a plurality of packet routing paths in a table of a switch for a plurality of flows within a network based on a communication received on a secure channel between a network controller and the switch;receiving a link initialization frame at a port of the switch from a server, the link initialization frame comprising a protocol identifier; and configuring the port to a mode of operation compatible with the protocol identifier;', 'updating the table in the switch to configure one or more other ports of the switch to the mode of operation compatible with the protocol identifier; and', 'sending a handshake response to acknowledge the successful decoding of the protocol identifier., 'based on successfully decoding the protocol identifier2. The method of claim 1 , wherein the link initialization frame is defined at one or more of a physical layer and a link layer.3. The method of claim 2 , further comprising:resetting one or more of the physical layer and the link layer to configure the port of the switch based on one or more of: receiving a link reset request at the port and sending a link disable signal from the port, wherein the link disable signal is configured to wraparound from an output of the ...

Подробнее
26-01-2017 дата публикации

AUTOMATED COMPLIANCE CHECKING THROUGH ANALYSIS OF CLOUD INFRASTRUCTURE TEMPLATES

Номер: US20170026416A1
Принадлежит:

Systems and methods for determining a state of an information technology (IT) environment are disclosed. A server accesses an infrastructure-as-code (IaC) template for the IT environment, where the IT environment is virtualized and cloud-based. The server deconstructs, using a parser for the IaC template, the IaC template to a graph database representation of the IT environment, wherein the graph database representation implements a predefined cloud resource ontology (CRO). The server determines, using the graph database representation, the state of the IT environment. The server provides, as a digital transmission, an output corresponding to the determined state of the IT environment. 1. A system for determining a state of an information technology (IT) environment , the system comprising:processing circuitry and memory; the processing circuitry to:access an infrastructure-as-code (IaC) template for the IT environment, wherein the IT environment is virtualized and cloud-based;deconstruct, using a parser for the IaC template, the IaC template to a graph database representation of the IT environment, wherein the graph database representation implements a predefined cloud resource ontology (CRO);determine, using the graph database representation, the state of the IT environment; andprovide, as a digital transmission, an output corresponding to the determined state of the IT environment.2. The system of claim 1 , wherein:the processing circuitry determines the state of the IT environment by determining adherence of the IT environment to one or more rules; andthe output corresponding to the determined state of the IT environment comprises an indication whether the IT environment adheres to the one or more rules.3. The system of claim 2 , wherein the one or more rules comprise following a security policy or following a resource usage policy.4. The system of claim 1 , wherein:the processing circuitry determines the state of the IT environment by comparing a first version ...

Подробнее
28-01-2016 дата публикации

Methods, test systems and arrangements for verifying compliance with requirement specifications

Номер: US20160029230A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

Systems and methods for verifying compliance of a communication device with one or more requirement specifications is provided. In one exemplary embodiment, a method may be performed at a communication device for verifying compliance of the communication device with a requirement specification. Further, while a test loop is activated in the communication device, the method may include receiving, at a receiver of the communication device and on a downlink of a radio link, downlink data. In response to determining an occurrence of an event specific to verifying the compliance of the communication device with the requirement specification and used to control when the communication device transfers the received downlink data from the receiver to a transmitter of the communication device, the method may include transferring, from the receiver, to the transmitter, the received downlink data. Also, the method may include transmitting, from the transmitter on an uplink of the radio link, the received downlink data. The received downlink data transmitted on the uplink may be used to verify the compliance.

Подробнее
25-01-2018 дата публикации

NETWORK FUNCTIONS VIRTUALIZATION BASED FAULT PROCESSING METHOD AND APPARATUS

Номер: US20180026832A1
Автор: Yu Fang
Принадлежит: Huawei Technologies Co., Ltd

An embodiment of the present invention provides a NFV based fault processing method. The method includes: determining a NFVI fault; obtaining self-healing policy information used to indicate whether to perform a self-healing operation on the NFVI fault; and performing the self-healing operation on the NFVI fault when the self-healing policy information indicates that the self-healing operation is to be performed on the NFVI fault. Therefore, time for reporting and making a fault analysis for the infrastructure fault can be saved, the infrastructure fault is rectified as quickly as possible, a fault processing delay is reduced, and system performance can be improved. 1. An apparatus , comprising:a processor, configured to determine a network functions virtualization infrastructure (NFVI) fault; anda receiver, configured to obtain self-healing policy information used to indicate whether to perform a self-healing operation on the NFVI fault;wherein the processor is configured to perform the self-healing operation on the NFVI fault when the self-healing policy information indicates that the self-healing operation is to be performed on the NFVI fault.2. The apparatus according to claim 1 , wherein the self-healing policy information comprises updated self-healing policy information.3. The apparatus according to claim 1 , further comprising:a transmitter, configured to send self-healing start information, wherein the self-healing start information is used to indicate that the self-healing operation on the NFVI fault is started.4. The apparatus according to claim 3 , wherein the transmitter is further configured to send self-healing complete information claim 3 , wherein the self-healing complete information is used to indicate that the self-healing operation on the NFVI fault is complete.5. The apparatus according to claim 3 , wherein the transmitter is further configured to send fault information of the NFVI fault when the self-healing policy information indicates that ...

Подробнее
25-01-2018 дата публикации

NETWORK NODE POLICY GENERATION AND IMPLEMENTATION

Номер: US20180026843A1
Принадлежит:

An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node. 1. A computer-implemented method for network management by an operator node comprising a specially configured hardware computing system , the method comprising:receiving, by the operator node, a selection of node objects for inclusion within a node configuration, each selected node object comprising a node software component;generating, by the operator node, a configuration policy based on the selected node objects, the configuration policy identifying the selected node objects and comprising a set of tests that, when run, test for the presence of one or more of the selected node objects;scanning a target node communicatively coupled to the operator node to determine a configuration of the target node;applying the configuration policy to the determined configuration of the target node, wherein applying the configuration policy comprises running the set of tests on the determined configuration of the target to determine the presence of the selected node objects identified by the configuration policy;identifying, based on the application of the configuration policy to the determined configuration of the target node, a set of the selected node objects identified by ...

Подробнее
23-01-2020 дата публикации

Method for managing non-chatty iot devices to remain in an authenticated state

Номер: US20200026339A1

Methods for managing non-chatty IoT devices in a network are provided. In one aspect, a method includes receiving classification information identifying that an internet IoT device is connected to a port of a switch and determining that the IoT device has been inactive for a predetermined threshold period of time based on a logoff timer configured for the port. The IoT device is woken up from a power-save mode based on a guaranteed wakeup timer of the IoT device or a Wake-on-LAN packet sent to the IoT device by the switch. The logoff timer is then resent, causing the IoT device to remain in an authenticated state. Systems and machine-readable media are also provided.

Подробнее
10-02-2022 дата публикации

ELECTRONIC DEVICE, METHOD FOR ELECTRONIC DEVICE, COMPUTER READABLE MEDIUM, AND APPARATUS

Номер: US20220045901A1
Автор: WANG Xin
Принадлежит: ARRIS Enterprises LLC

The present disclosure relates to an electronic device, a method for an electronic device, a computer readable medium, and an apparatus. An electronic device, comprises: a memory having instructions stored thereon; and a processor configured to execute the instructions stored on the memory, to cause the electronic device to perform at least the following: receiving a network configuration information processing request from a first user device for a network to which the first user device is connected; determining whether one or more user devices have been set as primary devices, the primary devices having authorities to process network configuration information; in response to determining that the one or more user devices have been set as primary devices: determining whether the first user device is one of the primary devices; in response to determining that the first user device is one of the primary devices, responding to the network configuration information processing request; and in response to determining that the first user device is not one of the primary devices, denying the network configuration information processing request; and in response to determining that no user device is set as a primary device: responding to the network configuration information processing request. 1. An electronic device , comprising:a memory having instructions stored thereon; anda processor configured to execute the instructions stored on the memory, to cause the electronic device to perform at least the following:receiving a network configuration information processing request from a first user device for a network to which the first user device is connected;determining whether one or more user devices have been set as primary devices, the primary devices having authorities to process network configuration information;in response to determining that the one or more user devices have been set as primary devices:determining whether the first user device is one of the primary ...

Подробнее
10-02-2022 дата публикации

TECHNIQUES FOR PROTECTING APPLICATIONS FROM UNSECURE NETWORK EXPOSURE

Номер: US20220046051A1
Принадлежит: Twistlock, Ltd.

A method and system for protecting an application from unsecure network exposure. The method includes identifying an at-risk application, wherein identifying the at-risk application further comprises determining that the application is configured incorrectly; identifying at least one port through which the at-risk application is accessible when the at-risk application is determined to be configured incorrectly; and determining, based on the identified at least one port through which the at-risk application is accessible, whether an exposure vulnerability exists, wherein the exposure vulnerability is an unapproved exposure of at least one of the at least one port to external resources. 1. A method for protecting an application from unsecure network exposure , comprising:identifying an at-risk application, wherein identifying the at-risk application further comprises determining that the application is configured incorrectly;identifying at least one port through which the at-risk application is accessible when the at-risk application is determined to be configured incorrectly; anddetermining, based on the identified at least one port through which the at-risk application is accessible, whether an exposure vulnerability exists, wherein the exposure vulnerability is an unapproved exposure of at least one of the at least one port to external resources.2. The method of claim 1 , further comprising:performing at least one mitigation action when an exposure vulnerability exists.3. The method of claim 1 , further comprising:sending, to a test external resource, connection data for connecting to the at-risk application via the at least one port, wherein the test external resource is configured to attempt to connect to the at-risk application based on the connection data and to return the results of the attempt to connect to the at-risk application.4. The method of claim 3 , wherein the attempt to connect to the at-risk application includes the test external resource ...

Подробнее
24-01-2019 дата публикации

HOME NETWORK INFORMATION

Номер: US20190028334A1
Принадлежит:

An example includes a communication interface and a mapping module. The communication interface is to receive a request from an access point, wherein the request is for home network information. The mapping module is to receive the request from the communication interface and determine, based on a first table, a second switch where the requested home network information is stored. The mapping module is then to cause the communication interface to transmit the request received from the access point to the second switch; receive, via the communication interface, a response from the second switch, wherein the response comprises the requested home network information. The mapping module then causes the communication interface to transmit the received home network information on to the access point. 115-. (canceled)16. A system , comprising:a first switch comprising a first processor and a first memory storing instructions which, when executed by the first processor, cause the first processor to:receive a request from an access point for home network information of a user device of a plurality of user devices;determine, based on an index table stored on the first switch, a second switch storing the home network information of the user device, wherein the index table identifies a subset of home network information for the plurality of user devices stored on each of a plurality of switches, wherein the first switch does not store the home network information of the user device;transmit the request received from the access point to the second switch;receive a response from the second switch comprising the home network information of the user device;transmit the home network information of the user device to the access point;the second switch comprising a second processor and a second memory storing instructions which, when executed by the second processor, cause the second processor to:receive the request from the first switch;retrieve, based on the request received from ...

Подробнее
24-01-2019 дата публикации

Splitting Network Discovery Payloads based on Degree of Relationships between Nodes

Номер: US20190028369A1
Принадлежит:

An example embodiment may involve performing a discovery process to identify configuration items representing computing devices and applications in a managed network and determining that the configuration items exceed a threshold payload size. The embodiment may then involve generating a graph that represents the configuration items as nodes interconnected by unidirectional edges. The edges may represent respective associations between pairs of configuration items to which they connect, and the respective associations are classified either as weak associations that represent non-dependency relationships between a respective pair of nodes or as strong associations that represent dependency relationships between the respective pair of nodes. The embodiment may involve dividing the graph into overlapping sub-graphs based on the respective associations represented by the edges and, for each sub-graph, separately transmitting the configuration items defined therein to one or more server devices. 1. A system comprising:a proxy server application disposed within a managed network, wherein the managed network includes computing devices configured to execute applications; perform a discovery process to identify configuration items representing the computing devices and the applications;', 'determine that the configuration items exceed a threshold payload size;', 'based on determining that the configuration items exceed the threshold payload size, generate a graph that represents the configuration items as nodes interconnected by unidirectional edges, wherein the edges represent respective associations between pairs of configuration items to which they connect, wherein the respective associations are classified either as weak associations that represent non-dependency relationships between a respective pair of nodes or as strong associations that represent dependency relationships between the respective pair of nodes;', 'divide the graph into overlapping sub-graphs based on ...

Подробнее
24-04-2014 дата публикации

System for controlling and verifying open programmable network and method thereof

Номер: US20140115126A1

In a network environment in which pieces of heterogeneous network equipment interwork, a system receives a request including configuration information regarding a network operation with respect to at least one piece of a network equipment. The system verifies whether the request is in conflict with a network configuration and property managed by the system, and when an error does not occur according to verification results, the system transfers the verification results including configuration information to the network equipment.

Подробнее
28-01-2021 дата публикации

SYSTEM AND METHOD FOR NETWORK VALIDATION ARCHITECTURE FOR CLUSTERED AND FEDERATED STORAGE SYSTEMS

Номер: US20210028987A1
Автор: Krivenok Dmitry
Принадлежит:

A method, computer program product, and computer system for performing, by a single unified architecture, an initial network validation, wherein the initial network validation may be performed before a storage cluster is fully configured. The single unified architecture may perform a cluster expansion validation, wherein the cluster expansion validation may be performed before at least one of a new storage application and a new storage controller is added into the storage cluster. The single unified architecture may perform a pre-reconfiguration validation, wherein the pre-reconfiguration validation may be performed as a network reconfiguration operation in the storage cluster before a network reconfiguration request is processed. The single unified architecture may perform ongoing network validation, wherein the ongoing network validation may be performed periodically as a background process. 1. A computer-implemented method comprising:performing, by a single unified architecture, an initial network validation, wherein the initial network validation is performed before a storage cluster is fully configured;performing, by the single unified architecture, a cluster expansion validation, wherein the cluster expansion validation is performed before at least one of a new storage application and a new storage controller is added into the storage cluster;performing, by the single unified architecture, a pre-reconfiguration validation, wherein the pre-reconfiguration validation is performed as a network reconfiguration operation in the storage cluster before a network reconfiguration request is processed; andperforming, by the single unified architecture, ongoing network validation, wherein the ongoing network validation is performed periodically as a background process.2. The computer-implemented method of wherein the single unified architecture includes cluster-wide validation business logic supporting heterogeneous storage clusters claim 1 , multiple network fabrics ...

Подробнее
02-02-2017 дата публикации

Assessment of operational states of a computing environment

Номер: US20170033995A1
Принадлежит: Appformix Inc

An assessment environment is provided to generate real-time or nearly real-time events and/or alarms based at least on operational state of a host device. An agent module executing in the host device can monitor some or all of the performance metrics that are available in the host device and can analyze the monitored information in order to generate operational information and/or intelligence associated with an operational state of the host device and/or a computing component (e.g., an application, a virtual machine, or a container) associated therewith. The monitoring and analysis can be performed locally at the host device in real-time or nearly real-time. Analysis of the monitored information can be utilized to update first control information indicative of occurrence of an event and/or second control information indicative of presence or absence of an alarm condition. The control information can be sent to a remote device.

Подробнее
02-02-2017 дата публикации

Techniques for evaluating server system reliability, vulnerability and component compatibility using crowdsourced server and vulnerability data

Номер: US20170034023A1
Принадлежит: Datagrid Systems Inc

Various aspects described herein are directed to different techniques for: evaluating server system reliability, vulnerability and component compatibility using crowdsourced server and vulnerability data; generating automated recommendations for improving server system metrics; and automatically and conditionally updating or upgrading system packages/components.

Подробнее
02-02-2017 дата публикации

SYSTEMS AND METHODS FOR MONITORING OPERATIONAL STATUSES OF NETWORK SERVICES

Номер: US20170034038A1
Принадлежит:

An exemplary method of monitoring operational statuses of network services includes a monitoring probe that is deployed in a media service network accessing test configuration data from a control server, testing the network services based on the test configuration data, determining operational statuses of the network services based on the testing, and reporting the operational statuses of the network service to the control server. In certain examples, the test configuration data indicates a media resource locator (“MRL”) network service to be tested, and the monitoring probe accesses MRL data from the MRL network service and parses the MRL data to identify one or more additional network services to be tested. The monitoring probe tests the additional network services and reports the operational statuses of the additional network services to the control server. 1. A method comprising: the set of network services includes a media resource locator network service to be tested,', 'the service types of the network services include a media resource locator service type for the media resource locator network service, and', 'the resource addresses for the network services include a media resource locator address for the media resource locator network service;, 'accessing, by a monitoring probe deployed in a media service network, test configuration data from a control server, the test configuration data indicating a set of network services to be tested, service types of the network services, and resource addresses for the network services, whereintesting, by the monitoring probe and based on the test configuration data, the network services;determining, by the monitoring probe and based on the testing of the network services, operational statuses of the network services; andreporting, by the monitoring probe, the operational statuses of the network services to the control server.2. The method of claim 1 , wherein the testing of the network services comprises determining ...

Подробнее
04-02-2016 дата публикации

Dynamic Audio/Video Channel Bonding

Номер: US20160036660A1
Принадлежит:

A data communication architecture delivers a wide variety of content, including audio and video content, to consumers. The architecture employs channel bonding to deliver more bandwidth than any single communication channel can carry. In some implementations, the communication architecture communicates content according to an initial bonding configuration. The communication architecture may adjust the bonding configuration to adapt to bonding environment changes affecting the communication capabilities or requirements associated with transmitting the content. 1. (canceled)2. A product comprising:a machine readable medium other than a transitory signal; and receive, from a distribution server, a bonding configuration specifying a set of physical channels forming a bonded channel group;', 'form the bonded channel group between the distribution server and a destination device;', 'monitor a status of: the destination device, a first physical channel, or both;', 'send, to the distribution server, a configuration communication indicating the status;', 'receive an update to the bonding configuration, the update generated responsive to the configuration communication, the update including an alteration to the bonding configuration that adds the first physical channel to the set of physical channels or removes the first physical channel from the set of physical channels; and', 're-establish the bonded channel group in accord with the update to the bonding configuration., 'instructions stored on the machine readable medium, the instructions, when executed, configured to cause a processor to3. The product of claim 2 , where the status comprises a bandwidth availability for the first physical channel.4. The product of claim 2 , where the instructions are further configured to send the configuration communication when the status meets a bonding adaptation criterion.5. The product of claim 4 , where the bonding adaptation criterion comprises a demand threshold claim 4 , a ...

Подробнее
01-02-2018 дата публикации

TECHNOLOGIES FOR EVENT BASED DEBUGGING OF DATA CENTER SWITCHING

Номер: US20180034686A1
Принадлежит:

Systems, methods, and computer-readable media for improving debugging and troubleshooting of datacenter networks, and more particularly improving the speed of forwarding/data path related problems without going into ASIC level debugging. A switch could, for example, have a processor which communicates with an ASIC. The processor can receive flow information and a notification from the ASIC, the notification indicating a predefined error condition has been identified in a packet. The processor can modify the ASIC programming based on the notification, such that the ASIC records additional, more-detailed, flow information for the switch. The processor can then receive, from the modified ASIC, the additional flow information. The additional flow information can then be used (either by the processor or by an operator) to identify the exact reason for the errors in the flow path. 1. A method comprising:receiving, at a processor, flow information from a programmable integrated circuit which routes packets in a switch;receiving a notification from the programmable integrated circuit, wherein the notification indicates at least one predefined error condition has been identified in a packet associated with the flow information;upon receiving the notification, modifying a programming of the programmable integrated circuit to record additional flow information for the switch, to yield a modified programmable integrated circuit; andreceiving, from the modified programmable integrated circuit, the additional flow information.2. The method of claim 1 , wherein the programmable integrated circuit is a programmable Application-Specific Integrated Circuit.3. The method of claim 1 , wherein the flow information is received as a User Datagram Protocol packet.4. The method of claim 1 , further comprising:identifying a point of failure within the switch based on the additional flow information.5. The method of claim 1 , further comprising:storing the flow information and the additional ...

Подробнее
01-02-2018 дата публикации

SYSTEMS AND METHODS FOR DISCOVERING NETWORK TOPOLOGY

Номер: US20180034706A1
Принадлежит:

A method for determining network topology of a provider network includes selecting a first network element, selecting a first port on the first network element, and iteratively performing connectivity validation tests using the first port, wherein each connectivity validation test is associated with a type of network element and yields a result that indicates whether a second port on a second network element of the associated type is connected to the first port. A system for discovering topology of a network, the system comprising a topology discovery engine in operable communication with a near network element and operable to identify a first port of a far network element that is connected to a second port of the near network element by remotely altering operation of the near network element to cause the second network element to respond in a manner that identifies the first port. 1. A method for determining network topology of a provider network , the network including a plurality of network elements , the method comprising:selecting a first network element;selecting a first port on the first network element; and each connectivity validation test is associated with a type of network element and yields a result that indicates whether a second port on a second network element of the associated type is connected to the first port;', 'the result is based on evaluation of network communication data received at the first port as part of each connectivity validation test; and', 'in response to determining that the second port of the second network element is connected to the first port, storing connectivity data in memory, the connectivity data identifying at least the first port and the second port., 'iteratively performing connectivity validation tests using the first port, wherein2. The method as recited in wherein the type of network element includes a model of the second network element.3. The method as recited in wherein the type of network element includes a ...

Подробнее
17-02-2022 дата публикации

Method for managing remote device through management device

Номер: US20220052902A1
Автор: Chenbo LI
Принадлежит: Huawei Technologies Co Ltd

Embodiments of the present invention disclose a data transmission method, applied to a first device. The first device is connected to a management device and a second device. The method includes: receiving, by the first device, a first request sent by the management device, where the first request includes a device identifier of the second device; generating a second request based on the first request, and sending the second request to the second device; receiving feedback information generated after the second device executes the second request, and sending the feedback information to the management device. By implementing the embodiments of the present invention, an existing problem can be resolved: Normal service communication and service performance are affected because the management device cannot communicate with the second device and therefore cannot manage the second device.

Подробнее
17-02-2022 дата публикации

Electronic device, method, and medium for generating and detecting errors in configuration files

Номер: US20220052908A1
Принадлежит: ARRIS Enterprises LLC

An electronic device to: present a Graphical User Interface (GUI) to a user, the GUI including a plurality of selectable elements and one or more parameter controls associated with each of the plurality of selectable elements, each of the plurality of selectable elements corresponding to a feature of a network access device; receive a user selection of at least one of the plurality of selectable elements; receive one or more parameter values associated with the at least one selectable element inputted by the user via the parameter controls; and generate a configuration file of the network access device based at least on the at least one selectable element selected by the user, and the one or more parameter values associated with the at least one selectable element inputted by the user, in response to an activation of a first interactive button on the GUI by the user.

Подробнее
17-02-2022 дата публикации

DEVICE CONFIGURATION PARAMETER DETERMINATION

Номер: US20220052918A1
Принадлежит:

Systems, devices, media, and methods are presented for assigning configuration parameters to unknown devices by comparing characteristics of unknown devices to characteristics of known devices. Characteristics of an unknown device are compared to characteristics of known devices to identify a similar device having known configuration parameters. The unknown devise is then assigned the configuration parameters of the identified similar device. 1. A method for determining device configuration of a client device , the method comprising:distributing, by a server system, a device characteristic capture application to a plurality of client devices, the device characteristic capture application associated with an application on the plurality of client devices, the device characteristic capture application configured to attain device characteristics of each client device;receiving, by the server system, the attained device characteristics of the plurality of client devices;comparing, by the server system, the attained device characteristics of a client device having an unknown device type to the device characteristics of client devices having known device types;assigning, by the server system, the client device having the unknown device type into one of a plurality of features categories associated with one of the client devices having the known device types according to similarity of the attained device characteristics of the client device having the unknown device type to the device characteristics of the one of the client devices having the known device types, each features category associated with one or more features of the application and each feature having a feature level selected from a plurality of feature levels;identifying the one or more feature levels associated with the assigned features category for the unknown client device; anddistributing the identified one or more feature levels to the unknown client device for configuring features of the application on ...

Подробнее
17-02-2022 дата публикации

DATA COLLECTION METHOD AND DEVICE

Номер: US20220052919A1
Принадлежит: Huawei Technologies CO.,Ltd.

In a data collection method for a remote attestation process, a remote attestation server delivers a subscription configuration to a network device, where the subscription configuration for subscribing to information related to remote attestation performed by the network device. The remote attestation server receives the subscription information returned by the network device based on the subscription configuration. 1. A data collection method for a remote attestation process , and the method comprises:delivering, by a remote attestation server, a subscription configuration to a network device, wherein the subscription configuration is for subscribing to information related to remote attestation performed by the network device; andreceiving, by the remote attestation server, subscription information sent by the network device in response to the subscription configuration.2. The method according to claim 1 , wherein the subscription configuration comprises a data stream subscription configuration or an event subscription configuration.3. The method according to claim 2 , wherein the subscription configuration comprises the data stream subscription configuration claim 2 , and the subscription information comprises one or more of:integrity information of software at each layer of a trust chain, wherein the integrity information of software at each layer of the trust chain is recorded when the network device is booted up;dynamic integrity information of an operating system that is recorded when the network device runs;dynamic integrity information of software that is recorded when the network device runs;an identity certificate related to the network device; ora remote attestation certificate related to the network device.4. The method according to claim 2 , wherein the subscription configuration comprises the event subscription configuration claim 2 , and the subscription information comprises information related to one or more of the following triggered events: device ...

Подробнее
31-01-2019 дата публикации

SYSTEM AND METHOD OF AUTOMATED ASSESSMENT GENERATION

Номер: US20190036775A1
Принадлежит:

Systems and methods for automated content provisioning to a user device are disclosed herein. The system can include a memory including a user profile database containing information relating to a plurality of users and a content library database including a plurality of data packets. The system can include at least one server and a user device. The user device can: receive a request for content receipt; send an electrical signal containing a content request to the server; send an electrical signal containing hardware configuration data to the server; receive first data packets; launch evaluation software; evaluate received response data with the launched evaluation software; generate outcome data for a plurality of attributes of the received response data; and automatically deliver second presentation data received in second data packets. 1. A system for automated assessment generation , the system comprising: a user profile database comprising user metadata relating to a plurality of users, wherein the user metadata relating to the plurality of users identifies attributes of the plurality of users; and', 'a content library database comprising a plurality of data packets for providing to a user;, 'a memory comprisinga user device; and receive an evaluation generation request from the user device for generation of an evaluation;', 'identify a cohort for recipient of the evaluation, wherein the cohort comprises a plurality of users;', 'retrieve user metadata from the memory;', 'identify a hardware configuration of user devices associated with the plurality of users in the cohort;', 'identify potential data packets based on information received in the evaluation generation request and on the identified hardware configuration of user devices associated with the plurality of users in the cohort;', 'receive a selection of data packets for inclusion in the assessment from the identified potential data packets;', 'calculate assessment data from metadata associated with the ...

Подробнее
31-01-2019 дата публикации

DETERMINING AN EFFECT OF A NETWORK CONFIGURATION CHANGE

Номер: US20190036776A1
Автор: Smith Rodney Bruce
Принадлежит:

A method may include identifying a first set of values indicative of a present state of a software-defined network (SDN). The method may further include receiving one or more proposed changes to the SDN via an interface. The method may also include determining, based on the one or more proposed changes to the SDN, a potential state of the SDN and a second set of values indicative of the potential state of the SDN. The method may further include generating a change index based on a comparison of the first set of values with the second set of values. The method may also include providing the change index via the interface. 1. A method , comprising:identifying a first set of values indicative of a present state of a software-defined network (SDN), the SDN having a centralized control plane isolated from a data plane;receiving one or more proposed changes to the SDN via an interface;determining, based on the one or more proposed changes to the SDN, a potential state of the SDN and a second set of values indicative of the potential state of the SDN;generating a change index based on a comparison of the first set of values with the second set of values; andproviding the change index via the interface.2. The method of further comprising:identifying a change threshold associated with a permission level of an administrator account associated with the one or more proposed changes; andin response to the change index not exceeding the change threshold, allowing the one or more proposed changes to be implemented in the SDN.3. The method of further comprising:identifying a first change threshold associated with a first permission level of a first administrator account, the first administrator account being associated with the one or more proposed changes; andin response to the change index exceeding the first change threshold, preventing the one or more proposed changes from being implemented in the SDN.4. The method of further comprising:receiving an authorization to implement ...

Подробнее
30-01-2020 дата публикации

DELEGATING DISPERSED STORAGE NETWORK CONFIGURATION CAPABILITIES WHILE PRESERVING OWNERSHIP CONSTRAINTS

Номер: US20200036587A1
Принадлежит:

A method includes delegating, by a managing unit of a dispersed storage network (DSN), authority to configure a sub-portion of at least a portion of the DSN managed by the managing unit to a designated entity according to one or more configuration constraints. The managing unit manages parent configuration data that contains a compilation of configuration changes made to the at least a portion of the DSN. The method further includes managing, by the designated entity, child configuration data that includes a compilation of configuration changes made to the sub-portion of the at least a portion of the DSN. The method further includes, when resolution of the child configuration data and the parent configuration data is triggered, determining whether the child configuration data is formatted in a manner consistent with formatting of the parent configuration data and, if so, incorporating the child configuration data into the parent configuration data. 1. A method comprises:delegating, by a managing unit of a dispersed storage network (DSN), authority to configure a sub-portion of at least a portion of the DSN managed by the managing unit to a designated entity of the DSN according to one or more configuration constraints, wherein the managing unit manages parent configuration data, wherein the parent configuration data contains a compilation of configuration changes made to the at least a portion of the DSN, and wherein the parent configuration data is stored in a first storage container of the DSN;managing, by the designated entity, child configuration data, wherein the child configuration data includes a compilation of configuration changes made to the sub-portion of the at least a portion of the DSN, wherein the child configuration data is stored in a second storage container of the DSN; 'incorporating, by the managing unit, the child configuration data into the parent configuration data.', 'when the child configuration data is formatted in the manner consistent ...

Подробнее
30-01-2020 дата публикации

IDENTIFICATION OF CONFLICT RULES IN A NETWORK INTENT FORMAL EQUIVALENCE FAILURE

Номер: US20200036591A1
Автор: Mohanram Kartik
Принадлежит:

Systems, methods, and computer-readable media for identifying conflict rules between models of network intents. A first and second model of network intents are obtained, the models describing the operation and communication between one or more network devices in a network. A logical exclusive disjunction between the first and second models is calculated over the space of possible packet conditions and network actions defined by models, without enumerating all possible packet conditions and network actions. It is detected whether the models are in conflict with respect to at least a first network device. If the models are in conflict, it is determined whether a given rule of a plurality of rules associated with the first model is a conflict rule. The determining comprises calculating the intersection between the given rule and the logical exclusive disjunction, wherein the given rule is a conflict rule if the calculated intersection is non-zero. 1. A method comprising:obtaining, via one or more processors, a plurality of models of network intents;analyzing, via the one or more processors, the plurality of models to yield a result;when the result indicates a conflict, performing a conflict rule calculation to determine whether one or more rules is a conflict rule; andwhen the one or more rules is the conflict rule, generating a listing with the conflict rule and/or generating a notification with the conflict rule.2. The method of claim 1 , determining whether the one or more rules is the conflict rule includes calculating an intersection, and', 'the one or more rules is the conflict rule if the intersection is non-zero., 'wherein,'}3. The method of claim 2 , wherein the intersection includes a logical exclusive disjunction that is a Reduced Ordered Binary Decision Diagram (ROBDD).4. The method of claim 1 , wherein the plurality of models includes a reference model and a model under test.5. The method of claim 1 , further comprising:performing back annotation to ...

Подробнее
31-01-2019 дата публикации

Overlapping control resource sets with different priority levels

Номер: US20190037577A1
Принадлежит: Qualcomm Inc

Methods, systems, and devices for wireless communication are described. One method may include receiving, at user equipment (UE), a control resource set configuration message from a base station; identifying an overlap between a first control resource set and a second control resource set of a wireless channel; identifying a priority level of the first control resource set and a priority level of the second control resource set based on the control resource set configuration message; and monitoring the first control resource set based on the identified overlap, the priority level of the first control resource set, and the priority level of the second control resource set.

Подробнее
30-01-2020 дата публикации

DEVICE QUARANTINE IN A WIRELESS NETWORK

Номер: US20200037163A1
Принадлежит:

Techniques for device quarantine in a wireless network are described. According to various implementations, a device a mobile client device) that requests a connection to a wireless network is placed in a quarantine state in the wireless network. Attributes of the device are determined and connection parameters are specified based on the attributes. In at least some embodiments, the device can be released from the quarantine state subject to the connection parameters. 1. A device comprising:at least one processor; andone or more computer-readable storage media including instructions stored thereon that, responsive to execution by the at least one processor, cause the device to perform operations comprising:determining that a device is attempting to connect to a network;responsive to determining that the device is attempting to connect to the network, querying the device for an attribute value corresponding to an attribute of the device;receiving a response from the device including the attribute value;determining that the received attribute value matches an uncharacterized attribute value on a list of uncharacterized attribute values for which performance attributes on the network have not yet been determined;responsive to determining that the attribute value matches an uncharacterized attribute value, applying a policy for the attribute value to determine a network connection parameter; andreleasing the device from a quarantine state subject to the network connection parameter.2. The device of , wherein the network connection parameter comprises a software version. j. The device of , wherein the network connection parameter comprises a device driver version ,4. The device of claim 1 , wherein the operations of releasing the device from the quarantine state enables the device to access the network based upon an expanded set of access permissions compared to access permissions of the quarantine state.5. The device of claim 1 , wherein the operations further comprise: ...

Подробнее
04-02-2021 дата публикации

SELF-ASSEMBLING AND SELF-CONFIGURING MICROSERVICES

Номер: US20210036909A1
Принадлежит:

A system for managing systems with interrelated microservices with self-assembling and self-configuring microservices includes a plurality of host resource services microservices, a plurality of directory services microservices and a plurality of tenant microservices. Each of the microservices is provided with an API with a standard way to identify the API and its components, which together identify the functionality of the API in a common way. The host resources service microservice are started up in a host. A determination is made whether there is a directory service microservice running in the host and, if there is none, then spinning up a directory service microservice. A plurality of tenant microservices are installed and a determination is made whether all tenant microservices are running, If not, then copies of the tenant microservices that are not running are spun up. 1. A method comprising:starting up a host resources services microservice in a host;determining whether there is a directory service microservice running;when the directory service microservice is not running, spinning a first directory service microservice;installing a plurality of tenant microservices in the host;determining whether each of the plurality of tenant microservices are running; andwhen a first tenant microservice is not running, spinning up a copy of the first tenant microservice.2. The method of wherein the host resources services microservice claim 1 , the directory service microservice and the plurality of tenant microservices each comprise an application programming interface (API) including a list of individual functions available over the API claim 1 , input parameters claim 1 , output parameters claim 1 , a revision claim 1 , a security scheme claim 1 , and a set of tags whereby a functionality of the API is identified in a common way.3. The method of wherein the host resources services microservice claim 1 , the directory service microservice and the plurality of tenant ...

Подробнее
04-02-2021 дата публикации

ABORTING NETWORK DEVICE UPGRADES

Номер: US20210036912A1
Принадлежит:

Examples of the present disclosure relate to updating network devices belonging to a group of network devices. In one aspect, a network controller coupled to the network devices of the group of network access devices, responsive to a first command, initiates a group update process for the network devices of the group is to update the network devices of the group sequentially according to an ordered list. Responsive to a second command during the group update process while a firmware image of a particular network device is updated, the network controller aborts the group update process for the network devices of the group. Aborting the group update process comprises removing a first subset of network devices subsequent to the particular network device in the ordered list from the ordered list such that the firmware image of the first subset of network devices will not be updated and rolling back the firmware image of the particular network device. 1. A network controller to couple to a plurality of network devices , wherein the plurality of network devices belong to a group , the network controller to control a group update process for the plurality of network devices of the group , the network controller comprising:a processing resource;a storage medium storing instructions executable by the processing resource to cause the network controller to:initiate the group update process to update the network access devices of the group sequentially according to an ordered list; andresponsive to receiving a command to abort the group update process during the group update process while a firmware image of a particular one of the plurality of network devices is updated, abort the group update process, wherein aborting the group update process comprises:removing a first subset of network devices subsequent to the particular one of the plurality of network devices in the ordered list from the ordered list such that the firmware image of the first subset of network devices will ...

Подробнее
04-02-2021 дата публикации

NETWORK DEVICE CONFIGURATION UPDATE USING RANK AND HEALTH

Номер: US20210036913A1
Принадлежит:

Systems and methods are provided for network device configuration update. A method includes selecting a group of network devices to receive a configuration update; ranking the network devices according to an importance; updating each of the network devices in order of the ranking, from least important to most important, comprising: generating a first health score for the network device, the first health score representing a performance level of the network device prior to the configuration update; updating a configuration of the network device according to the configuration update subsequent to generating the first health score; generating a second health score for the updated network device subsequent to updating the configuration of the network device; and responsive to the second health score being lower than the first health score by more than a predetermined score threshold, rolling back the configuration update for the network devices that have been updated. 1. A system comprising:a hardware processor; and selecting a group of network devices to receive a configuration update;', 'ranking the network devices according to an importance of the network devices;', generating a first health score for the network device, the first health score representing a performance level of the network device prior to the configuration update;', 'updating a configuration of the network device according to the configuration update subsequent to generating the first health score;', 'generating a second health score for the updated network device subsequent to updating the configuration of the network device; and', 'responsive to the second health score being lower than the first health score by more than a predetermined score threshold, rolling back the configuration update for the network devices that have been updated., 'updating each of the network devices in order of the ranking, from least important to most important, comprising], 'a non-transitory machine-readable storage ...

Подробнее
04-02-2021 дата публикации

DETECT IMPACT OF NETWORK MAINTENANCE IN SOFTWARE DEFINED INFRASTRUCTURE

Номер: US20210036922A1
Принадлежит:

A system may assist with checking policy impact in a software-defined infrastructure environment. The system's data analysis may enable it to discover and quantify the impact of policies on software-defined infrastructure objects in the same or different layers. 1. An apparatus comprising:a processor; and obtaining a policy for maintaining a service;', 'parsing the policy to extract a first object;', 'querying for a second object based on the first object;', 'determining workload variables exposed by the first object and the second object; and', 'annotating knowledge graph model of the service based on the first object, the second object, and the workload variables., 'a memory coupled with the processor, the memory storing executable instructions that when executed by the processor cause the processor to effectuate operations comprising2. The apparatus of claim 1 , the operations further comprising determining configurations variables exposed by the first object and the second object.3. The apparatus of claim 2 , wherein the configuration variables comprise number of serving gateways or number packet of data network gateways.4. The apparatus of claim 2 , wherein the configuration variables comprise type of server or number of central processing units for a virtual machine.5. The apparatus of claim 1 , wherein:the first object is a serving gateway, the second object is a mobility management entity.6. The apparatus of claim 1 , wherein:the first object is a serving gateway, andthe second object is a virtual network function.7. The apparatus of claim 1 , wherein the first object is a serving gateway.8. The apparatus of claim 1 , wherein:the first object is a network server, andthe second object is a virtual machine.9. The apparatus of claim 1 , wherein:the first object is an evolved packet core, andthe second object is a packet data network gateway.10. The apparatus of claim 1 , wherein:the first object is network server, andthe second object is a base station.11. The ...

Подробнее
08-02-2018 дата публикации

A METHOD AND AN APPLIANCE FOR MAINTAINING A CONFIGURATION DATA STRUCTURE

Номер: US20180041385A1
Принадлежит:

Disclosed is a device for maintaining a configuration data structure expressing configuration of a device. The configuration is maintained by an operative process making desired changes to the configuration and adding, to the configuration data structure, change descriptors indicative of the changes. When the configuration data structure is updated, an auxiliary process is run in parallel with the operative process. The auxiliary process includes requesting functional entities of the device to report their configurations prevailing at an update time instant, and constructing an auxiliary configuration data structure on the basis of the reported information. The configuration data structure is updated by replacing a portion of the configuration data structure corresponding to the update time instant with the auxiliary configuration data structure. There is no need to freeze the configuration during the update because the auxiliary process is run in parallel with the operative process. 119-. (canceled)21. An appliance according to claim 20 , wherein the processing system is configured to initialize the auxiliary process so that data used for the auxiliary process and defining at least the configurations of the functional entities prevailing at the update time instant equals to data used for the operative process and defining at least the configurations of the functional entities prevailing at the update time instant.22. An appliance according to claim 20 , wherein the processing system is configured to:copy, from first memory areas of the device to second memory areas of the device, data defining at least the configurations of the functional entities prevailing at the update time instant,use, for the operative process, the data contained by the first memory areas and change the data in accordance with the operative process, anduse, for the auxiliary processes, the copied data contained by the second memory areas and change the copied data in accordance with the ...

Подробнее
08-02-2018 дата публикации

SYSTEM AND METHOD FOR DISCOVERING CONFIGURATIONS OF LEGACY CONTROL SYSTEMS

Номер: US20180041393A1
Принадлежит:

A system includes at least one processor configured to identify multiple nodes coupled to at least one network of an industrial plant, obtain configuration data from each of the nodes, parse the configuration data to extract specified information from the configuration data, and store the extracted specified information in a specified format. To parse the configuration data for each node, the at least one processor may be configured to generate a memory layout for the configuration data from the node, open a checkpoint file containing the configuration data from the node, and identify at least one point and header information for the at least one point in the checkpoint file using the memory layout. To identify the multiple nodes, the at least one processor can be configured to generate a network diagram of the nodes coupled to the at least one network and identify the nodes from the network diagram. 1. A system comprising: identify multiple nodes coupled to at least one network of an industrial plant;', 'obtain configuration data from each of the nodes;', 'parse the configuration data to extract specified information from the configuration data; and', 'store the extracted specified information in a specified format., 'at least one processor configured to2. The system of claim 1 , wherein claim 1 , to parse the configuration data for each node claim 1 , the at least one processor is configured to:generate a memory layout for the configuration data from the node;open a checkpoint file containing the configuration data from the node; andidentify at least one point and header information for the at least one point in the checkpoint file using the memory layout.3. The system of claim 2 , wherein the header information for each node comprises:a node number for the node; andan internal entity identification (ID) of the at least one point for the node.4. The system of claim 1 , wherein claim 1 , to identify the multiple nodes claim 1 , the at least one processor is ...

Подробнее
08-02-2018 дата публикации

Communication system, communication device, and communication method

Номер: US20180041394A1
Автор: Hirokazu Ozawa
Принадлежит: NEC Corp

Provided is a communication device capable of minimizing effects on a continuously operated service after control software is updated. In a communication device ( 10 ), a control unit ( 11 ) stores information about the communication device ( 10 ) in a storage unit ( 12 ) before control software is updated. The control unit ( 11 ) compares, after updating the control software, information about the communication device ( 10 ) stored in the storage unit ( 12 ) with information about the communication device ( 10 ) obtained after updating the control software, and performs predetermined processing based on a result of the comparison.

Подробнее
08-02-2018 дата публикации

System Diagram GUI Development System and Method of Use

Номер: US20180041401A1
Автор: Hugman Christopher
Принадлежит:

A site diagram system for use by a user for capturing a physical and/or logical layout of a one or more networked devices, to plan a one or more sites or to create a system diagram or a install checklist. said site diagram system comprising a one or more computers. Said one or more computers comprising a processor and a memory. Said processor configured to run a device application. Said device application configured to create said system diagram. Said device application comprises a surveys list comprising a record of a one or more surveys comprising at least a first survey. each among said one or more surveys comprising a data collected by said user concerning a site location. Said one or more surveys comprising a survey map and a one or more placed icons. Said survey map comprising a representation of said site location including floor plans and similar. 1. A site diagram system for use by a user for capturing a physical and/or logical layout of a one or more networked devices , to plan a one or more sites or to create a system diagram or a install checklist , wherein:said site diagram system comprising a one or more computers;said one or more computers comprising a processor and a memory;said processor configured to run a device application;said device application configured to create said system diagram;said device application comprises a surveys list comprising a record of a one or more surveys comprising at least a first survey;each among said one or more surveys comprising a data collected by said user concerning a site location;said one or more surveys comprising a survey map and a one or more placed icons;said survey map comprising a representation of said site location including floor plans and similar;said one or more placed icons comprising representations of assets to be placed on said survey map;said one or more placed icons each comprise an asset settings;said device application comprises said survey map configured to receive a one or more among said ...

Подробнее
24-02-2022 дата публикации

SYSTEM AND METHOD FOR IDENTIFYING OPERATIONAL DISRUPTIONS IN MOBILE COMPUTING DEVICES VIA A MONITORING APPLICATION THAT REPETITIVELY RECORDS MULTIPLE SEPARATE CONSECUTIVE FILES LISTING LAUNCHED OR INSTALLED APPLICATIONS

Номер: US20220058074A1
Автор: Huang George
Принадлежит:

A system and method for discovering fault conditions such as conflicts between applications and an operating system, driver, hardware, or a combination thereof, installed in mobile computing devices uses a mobile device running a diagnostic application. A list of applications that were launched or installed during a time period prior to an operational disruption is retrieved. A data table of combinations of incompatible programs and drivers is used to analyze the list of the applications that were launched or installed to create a list of potential fault-causing interactions due to software incompatibilities of software installed in the mobile computing device. A knowledge database is updated with data identifying at least one of the potential fault-causing interactions. Further disclosed is a computer program that identifies hardware-created or software-created problems and operational disruptions in mobile computing devices by collecting data on incompatibilities in particular mobile computing devices on the internet. 1. A method , comprising:executing, in a mobile computing device, a monitoring application that monitors user and device activities;monitoring and recording, by the monitoring application, user and device activities, the monitoring and recording of user and device activities comprising monitoring and recording at least one of cell changes, roaming table updates, a preferred roaming list, or a combination thereof;analyzing the recorded user and device activities; andextracting information from the analyzed user and device activities, wherein the extracted information is used to enhance features of the mobile computing device related to the monitored and recorded user and device activities.2. The method of claim 1 , comprising troubleshooting claim 1 , in the mobile computing device claim 1 , features of the mobile computing device according to the extracted information claim 1 , wherein information received from the troubleshooting is used to suggest ...

Подробнее
06-02-2020 дата публикации

SYSTEMS AND METHODS TO REPROGRAM MOBILE DEVICES

Номер: US20200042376A1
Автор: Huang George
Принадлежит:

A computing device including: more than two Universal Serial Bus (USB) ports configured to be connected respectively to more than two mobile devices simultaneously; at least one processor coupled to the USB ports; and a memory storing instructions configured to instruct the at least one processor to reprogram, through the more than two USB ports, the more than two mobile devices simultaneously. 1. A computing device , comprising:more than two Universal Serial Bus (USB) ports configured to be connected respectively to more than two mobile devices simultaneously;at least one processor coupled to the USB ports; anda memory storing instructions configured to instruct the at least one processor to reprogram, through the more than two USB ports, the more than two mobile devices simultaneously.2. The computing device of claim 1 , wherein each USB port respectively includes a USB host controller.3. The computing device of claim 2 , wherein the respective USB host controllers are configured to buffer commands when reprogramming the mobile devices to facilitate simultaneous communications between the mobile devices and the at least one processor during reprogramming of the mobile devices.4. The computing device of claim 1 , wherein the reprogramming of the mobile devices includes backing up data from the mobile devices.5. The computing device of claim 1 , wherein the reprogramming of the mobile devices includes removing data from the mobile devices.6. The computing device of claim 5 , wherein the data includes a program configured in the mobile devices.7. The computing device of claim 1 , wherein the reprogramming of the mobile devices includes restoring data to the mobile devices.8. The computing device of claim 6 , wherein the data includes an operating system for the mobile devices.9. The computing device of claim 1 , comprising a network interface configured to provide a connection to at least one server over a computer network to provide resources during the ...

Подробнее
24-02-2022 дата публикации

NETWORK DATA ANALYTICS METHOD AND APPARATUS

Номер: US20220060388A1
Автор: LI Zhuoming
Принадлежит: Huawei Technologies CO.,Ltd.

A network data analytics method and apparatus are provided. The method includes receiving, by a network repository function network element, a first message from a first device, where the first message is used to discover a network data analytics function network element, and the first message carries a first analytics identifier and first analytics filtering information. 1. A network data analytics method , comprising:sending, by a network data analytics function network element, registration information of the network data analytics function network element to a network repository function network element, wherein the registration information comprises one or more analytics identifiers, and an analytics service range of the network data analytics function network element, and wherein the network data analytics function network element is capable of providing an analytics service corresponding to the one or more analytics identifiers; andreceiving, by the network data analytics function network element, a registration response message sent by the network repository function network element.2. The method according to claim 1 , wherein the analytics service range comprises one or more of following information: an analytics filtering parameter range claim 1 , a data collection range claim 1 , and a data analytics range.3. The method according to claim 1 , wherein the registration information carries configuration information of the network data analytics function network element claim 1 , and the configuration information comprises the analytics service range.4. A network data analytics method claim 1 , comprising:receiving, by a first network data analytics function network element, a third message sent by a first device, wherein the third message is used to request an analytics service, and the third message carries first analytics filtering information;determining, by the first network data analytics function network element, whether an analytics service range of ...

Подробнее
24-02-2022 дата публикации

SYSTEM AND METHODS FOR SUPPORTING ARTIFICIAL INTELLIGENCE SERVICE IN A NETWORK

Номер: US20220060390A1
Автор: LI Xu, Zhang Hang
Принадлежит: Huawei Technologies Co., Ltd.

There is provided a system including a platform controller for managing artificial intelligence services, wherein the system includes a processor coupled with a memory, having stored thereon instructions. The instructions, when executed by the processor, configure the platform controller to receive an artificial intelligence (AI) service registration request from an AI controller controlling the AI service, the AI service registration request including information indicative of locations of the AI service and transmit an AI service registration response to the AI controller, the AI service registration response including routing information at least in part specifying how to reach a coordinator associated with the AI service, the coordinator corresponding to a location of the AI service and transmit a notification indicative of availability of the AI service to a device. When a request for access to the AI service is received from the device, the platform controller is configured to transmit a response to the device, wherein the response is indicative of whether the request is accepted. 1. A system including a platform controller for managing artificial intelligence services , comprising a processor coupled with a memory having stored thereon instructions , the instructions when executed by the processor configure the platform controller to:receive an artificial intelligence (AI) service registration request from an AI controller controlling the AI service, the AI service registration request for registering the AI service or updating an existing AI service registration, the AI service registration request including information indicative of locations of the AI service;transmit an AI service registration response to the AI controller, the AI service registration response including routing information at least in part specifying how to reach a coordinator associated with the AI service, the coordinator corresponding to a location of the AI service;transmit a ...

Подробнее
24-02-2022 дата публикации

Failure reduction system for communication network

Номер: US20220060391A1
Принадлежит: Intel Corp

In one embodiment, a method comprises determining whether an automation recommendation for a network is to be forwarded to a management system of the network, wherein the automation recommendation specifies an action to take with respect to a plurality of platforms of the network and is received from a recommendation system utilizing artificial intelligence to generate the automation recommendation; responsive to a determination to forward the automation recommendation, assessing an impact of the automation recommendation; and performing an action with respect to the automation recommendation based on the impact.

Подробнее
07-02-2019 дата публикации

Automatic configuration of email client

Номер: US20190044901A1
Принадлежит: Flurry Inc

A method of configuring an email client is disclosed. An email address is received. The email address is parsed to obtain a domain. A mailserver configuration is generated based on the domain. The email client is configured according to the mailserver configuration.

Подробнее
15-02-2018 дата публикации

METHODS AND APPARATUS TO TRACK CHANGES TO A NETWORK TOPOLOGY

Номер: US20180046715A1
Принадлежит:

Methods and apparatus to track network topology changes are disclosed. An example apparatus includes machine readable instructions, and a processor to execute the instructions to perform operations. The operations include, in response to a reporting message generated by a software defined controller containing topology change information corresponding to a topology change event scheduled to occur at a future time, store, in a topology database, a pre-validation data record reflecting the occurrence of the topology change event. The pre-validation data record indicates the occurrence is not validated. In addition, a validation seeking message is generated to validate occurrence of the topology change event and is transmitted to a network device to be subject to the topology change event after the future time. In response to a validation message from the network device, a post-validation data record is stored in the topology database. 1. A method to track changes to a network topology , the method comprising:in response to a reporting message including topology change information corresponding to a topology change event, generating a confirmation-seeking message based on the topology change information to confirm the topology change event; andupdating a topology data set representing the network topology based on a response to the confirmation-seeking message.2. The method of wherein the confirmation-seeking message comprises a loopback address of a network element subject to the topology change event claim 1 , a type of topology change event claim 1 , a status of the topology change event claim 1 , and information indicating a position of the network element within the network topology.3. The method of claim 1 , further comprising:generating a pre-confirmation data record, the pre-confirmation data record to reflect the topology change information contained in the reporting message; andstoring the pre-confirmation data record in a pre-confirmation topology database.4 ...

Подробнее
16-02-2017 дата публикации

Media hub devices with passive monitoring of user devices and targeted media transmission through in-channel transmission or shifted channel transmission

Номер: US20170046676A1
Принадлежит: Catalina Marketing Corp

Systems and methods associated with media hub devices are provided that passively monitor user devices and transmit targeted media through in-channel transmissions that use the same channel used to monitor the user devices, or shifted channel transmissions that are different than the channel used to monitor the user devices. For example, a media hub device may passively monitor customer devices by scanning a wireless communication channel and obtaining device identification information transmitted by a user device that communicates the device identification information via the wireless communication channel. A media hub device may link the user device with a particular user or may anonymously monitor user behavior, through the monitored user device, without explicit knowledge of the identity of the user. Targeted media may be provided to the user device either in-channel using the same channel used to passively monitor the user device or a shifted channel using a different channel.

Подробнее
06-02-2020 дата публикации

Intermediate node determining method and apparatus

Номер: US20200044923A1
Автор: Hao Wu, Yingtao Li
Принадлежит: Huawei Technologies Co Ltd

Embodiments of the present invention provide an intermediate node determining method and apparatus, where the method includes: collecting an original data flow used to acquire a target service; based on the original data flow, determining request nodes and response nodes that are in nodes, and determining a connection relationship between the nodes; combining the determined request nodes into a first composite node and the determined response nodes into a second composite node, and determining, based on the determined connection relationship between the nodes, a connection path between the first composite node and the second composite node; and determining, based on a selected optimization objective and from the connection paths, at least one preferred connection path, to acquire an intermediate node on the at least one preferred connection path.

Подробнее
06-02-2020 дата публикации

MANAGEMENT DEVICE AND MANAGEMENT METHOD

Номер: US20200044933A1
Автор: SAEKI Takumi
Принадлежит: Mitsubishi Electric Corporation

A management device that manages at least one device included in equipment includes: an information acquisition unit that acquires connection information indicating a connection point of a device associated with device-specific information of the device; and a management unit that provides information indicating the device associated with the connection information acquired by the information acquisition unit. 110-. (canceled)11. A management device that manages at least one device included in equipment , the management device comprising:a processor; anda memory to store a program which, when executed by the processor, performs processes of:acquiring connection information indicating a connection point of a device associated with device-specific information of the device; andproviding information indicating the device associated with xe connection information acquired,wherein the information acquiring includes searching the device having the device-specific information in an order based on at least either of a number of networks and a number of devices present between the management device and each of the devices to be searched, to acquire the connection information of the device searched.12. The management device according to claim 11 , wherein for displaying the device associated with the connection information acquired in a configuration diagram claim 11 , the processor provides information on the device by displaying the device in the configuration diagram in a mode different from other devices displayed in the configuration diagram.13. A management device that manages at least one device included in equipment claim 11 , the management device comprising:a processor; anda memory to store a program which, when executed by the processor, performs processes of:acquiring connection information indicating a connection point of a device associated with device-specific information of the device; and providing information indicating the device associated with the ...

Подробнее
06-02-2020 дата публикации

SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION

Номер: US20200045017A1
Принадлежит: LEVEL 3 COMMUNICATIONS, LLC

Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet. 1. A method for firewall configuration comprising:receiving, at a processing device, input defining a firewall policy for a firewall managing access to a subnet of network components deployed within a communications network, the firewall policy including a firewall configuration for the firewall and a network component configuration for a network component of the subnet of network components;executing, using the processing device and a virtual network component, first instructions associated with the firewall configuration;executing, using the processing device and the virtual network component, second instructions associated with the network component configuration;determining, based on the execution of the first instructions, that the firewall configuration is valid;determining, based on the execution of the second instructions, that the network component configuration is valid;automatically configuring, using the processing device, the firewall configuration at the firewall and the network component configuration at the network component in response to determining that the firewall configuration and the network component configuration are valid; andactivating, using the processing device, the firewall within the communications network to manage traffic to and from the subnet.2. The method of claim 1 , wherein the virtual network component is a replica of the network component.3. The method of claim 1 , wherein determining that the firewall configuration is valid comprises:capturing first data corresponding to the firewall configuration; andverifying that the first data satisfies a first rule; and capturing second data corresponding to the network ...

Подробнее
06-02-2020 дата публикации

SYSTEM AND METHOD FOR DEPLOYING SOFTWARE AND APPLICATIONS

Номер: US20200045197A1
Автор: ZHAO Dehua
Принадлежит:

A system and method for discovering compatible multifunction peripherals and deploying software and applications across a network includes a memory for storing internet protocol (IP) addresses and software for updating multifunction peripherals, a user interface for entering IP addresses and simple network management protocol (SNMP) configuration data, a network interface for communicating with multifunction peripherals across a network, and a processor. The processor transmits an SNMP Get message to each of the configured IP addresses and receives in response version data from each multifunction peripheral that responds to the SNMP Get query. The processor validates that the software update is compatible with the current version of the multifunction peripheral. The processor transmits the software update only to those multifunction peripherals that are compatible with the software update. 1. A system , comprising:a memory storing a plurality of internet protocol (IP) addresses and software associated with a multifunction peripheral;a network interface configured to communicate with the plurality of IP addresses; and transmit a query to each of the plurality of IP addresses via the network interface,', 'receive, from one of the plurality of IP addresses, data associated with a version of a multifunction peripheral associated with the IP address,', 'validate that the software is compatible with the version of the multifunction peripheral based at least in part on the received data, and', 'transmit the software to the multifunction peripheral only when the software is compatible., 'a processor configured to'}2. The system of claim 1 , wherein the plurality of IP addresses includes an IP subnet.3. The system of claim 1 , wherein the plurality of IP addresses includes a range of IP addresses.4. The system of claim 1 , wherein the query is a simple network management protocol (SNMP) Get.5. The system of claim 1 , wherein the data associated with a version of a ...

Подробнее
16-02-2017 дата публикации

SELF-CONFIGURING NETWORKED MEDIA HUB DEVICES WITH AUTOMATED CONFIGURATION AND FAILOVER RECOVERY OF PEERS

Номер: US20170048106A1
Принадлежит: Catalina Marketing Corporation

Various systems and methods of self-configuring networked media hub devices with failover recovery of peers are disclosed. For example, a media hub device may be configured in an “out-of-the-box” solution in which the media hub, upon startup, obtains configuration data from a remote device. Peer media hub devices may be connected to one another via a local network and may each be self-configured in the same manner. Each media hub device may monitor other media hub devices on the local network. Based on such monitoring, each media hub device may detect that one of the media hub devices is offline and a new media hub device is online. One or more of the online media hub devices may automatically configure the new media hub device using the offline media hub device's configuration data, thereby configuring the new media hub device to replace the offline media hub device. 1. A system of self-configuring networked media hub devices with automated configuration of peers , wherein a given media hub device is configured to provide media to a user based at least in part on configuration data used to automatically configure the given media hub device , the system comprising:a media hub device comprising one or more physical processors programmed by one or more computer program instructions to:identify one or more peer media hub devices on a network;compare an identity of each of the one or more peer media hub devices with a list of known peer media hub devices on the network;determine that at least a first media hub device, from among the one or more peer media hub devices identified on the network, is not on the list of known peer media hub devices based on the comparison; andtransmit, via the network, at least a portion of first configuration data to the first media hub device, wherein the first media hub device configures itself based on the portion of the first configuration data provided by the media hub device.2. The system of claim 1 , wherein the media hub device is ...

Подробнее
08-05-2014 дата публикации

Compatible Communication Between Devices using Different Communication Protocols

Номер: US20140126655A1
Принадлежит: TEXAS INSTRUMENTS INCORPORATED

In a method for communicating with a plurality of devices using different communication protocols, a signal is received at a transceiver device from a neighbor device via a physical layer of a communication media. At a first time the signal contains a header frame from a first device conforming to a first communication protocol and at another time the signal contains a header frame from a second device conforming to a second communication protocol. The transceiver determines which of the different communication protocols is being used by each of the plurality of devices. The transceiver may then process inbound payload data using the indentified protocol type. Data frames are transmitted to the first device using the first communication protocol and data frames are transmitted to the second device using the second communication protocol. 1. A method for communicating with a plurality of devices using different communication protocols , the method comprising:receiving a signal at a transceiver device from a neighbor device via a physical layer of a communication media, wherein at a first time the signal contains a header frame from a first device conforming to a first communication protocol and at another time the signal contains a header frame from a second device conforming to a second communication protocol;determining which of the different communication protocols is being used by each of the plurality of devices,transmitting data frames from the transceiver device to the first device using the first communication protocol; andtransmitting data frames from the transceiver device to the second device using the second communication protocol.2. The method of claim 1 , wherein a table is maintained in which the type of communication protocol being used by each of the plurality of devices is noted.3. The method of claim 1 , wherein the header frame from the first device is modulated with a first modulation type and the header frame from the second device is modulated ...

Подробнее
26-02-2015 дата публикации

METHOD AND APPARATUS FOR CONTROLLING RESOURCE OF CLOUD VIRTUAL BASE STATION

Номер: US20150055483A1

A method and apparatus for managing a cloud virtual base station system are disclosed. The present invention comprises configuring an initial resource and reconfiguring the resource to add or remove a resource of an execution file of the cloud virtual base station system, monitoring an error of the cloud virtual base station system, a wireless resource, a status of the execution file, or a configuration status of the reconfigured resource, managing configuration information of a list of software added or removed during an operation, controlling the cloud virtual base station system in a predetermined specific mode, managing hardware information, file information, or control information of each module of the cloud virtual base station system, and managing the execution file for each module of the cloud virtual base station system by adding or removing the predetermined specific mode initially or during an operation. 1. A cloud virtual base station management system for managing a cloud virtual base station system , the system comprising:an initialization and loader that configures an initial resource and reconfigures the resource to add or remove a resource of an execution file of the cloud virtual base station system; anda target status managing unit that monitors or manages an error of the cloud virtual base station system, a wireless resource, a status of the execution file, or a configuration status of the reconfigured resource.2. The system of claim 1 , further comprising a configuration managing unit that is driven by the initialization and loader claim 1 , wherein the configuration managing unit activates or inactivates a hardware shape for the cloud virtual base station system claim 1 , blocks the hardware shape or releases the blocking claim 1 , adds or removes a hardware shape claim 1 , change a parameter claim 1 , or manages configuration information of a list of software added or removed during an operation.3. The system of claim 2 , further comprising a ...

Подробнее
03-03-2022 дата публикации

METHODS, SYSTEMS, AND MEDIA FOR NETWORK MODEL CHECKING USING ENTROPY BASED BDD COMPRESSION

Номер: US20220070282A1
Принадлежит:

Methods, systems and media for network model checking using entropy based binary decision diagram (BDD) compression are described. Two related compression techniques are described: bit level reduction to reduce the number of bits required for each network field according to its nature, and field level reduction to reduce the size of the BDD tree by finding a near-optimum ordering of the fields in the BDD space. These two techniques, separately or together, may alleviate the state explosion problem the limits application of BDD based model checking. The two techniques complement each other synergistically, particularly in the domain of computer network checking and verification.

Подробнее
14-02-2019 дата публикации

SYSTEMS AND METHODS FOR DOWNLOADING CONFIGURATION DATA TO FIRE ALARM CONTROL PANEL DEVICES AND PERIPHERAL DEVICES IN A FIRE ALARM SYSTEM

Номер: US20190051139A1
Принадлежит:

Systems and methods for downloading configuration data to control panel devices and peripheral devices in a connected system are provided. Some methods can include a master device in the connected system receiving and implementing a change to configuration data of the master device, the master device identifying the change to the configuration data of the master device, and the master device broadcasting a configuration message to a plurality of slave devices of the master device, wherein the configuration message can include the change to the configuration data of the master device. 1. A method comprising:a master device in a connected system receiving an update to first configuration data of the connected system;the master device determining whether the update to the first configuration data of the connected system includes a first change to second configuration data of the master device;when the update to the first configuration data of the connected system includes the first change to the second configuration data of the master device, the master device updating the second configuration data of the master device to reflect the first change to the second configuration data of the master device;the master device analyzing the update to the first configuration data of the connected system to identify portions of the update to the first configuration data of the connected system that are relevant to a first plurality of slave devices in the connected system, the first plurality of slave devices being slaves of the master device;the master device broadcasting a configuration message to all of the first plurality of slave devices, the configuration message including only the portions of the update to the first configuration data of the connected system that are relevant to the first plurality of slave devices;a first one of the first plurality of slave devices receiving the configuration message and, responsive thereto, determining whether the portions of the update ...

Подробнее