H04L69/02

MANAGING PRE-PROVISIONING AND POST-PROVISIONING OF RESOURCES USING BITEMPORAL ANALYSIS

Embodiments disclosed are directed to ensuring resource compliance within a cloud-based environment. The embodiments include steps for performing both pre-provisioning and post-provisioning checks of resources, such as network protocols, prior to and after their deployment within the cloud-based environment. These steps include using bitemporal analysis to determine the impact of deploying resources within the environment through the use of multiple execution timelines where the impact of deploying a resource may be evaluated on an alternative timeline that does not change the current resource scope of the cloud-based environment. The analysis may further include tracking the impact of the resource after it has been deployed to ensure resource compliance.

Method, system and device for transmitting feedback information

The embodiments of the present application relate to the technical field of wireless communications, and in particular, to a method, system and device for transmitting feedback information, used for realizing simultaneous feedback of multi-carrier ACK/NACK and periodical CSI. The method for sending feedback information in the embodiments of the present application includes: user equipment determining a PUCCH resource corresponding to first feedback information in second feedback information periodical reporting subframes; the user equipment determining feedback information to be transmitted and including the first feedback information according to the determined PUCCH resource and transmitting same via the PUCCH resource corresponding to the first feedback information. Since the user equipment determines feedback information including first feedback information according to the PUCCH resource corresponding to the first feedback information in the second feedback information periodical reporting subframes and transmits same via the determined PUCCH resource, thus realizing simultaneous feedback of multi-carrier ACK/NACK and periodical CSI.

Method and apparatus for transmitting data packets and method and apparatus for receiving data packets

A data packet has a header and a radio link control (RLC) protocol data unit (PDU). The RLC PDU transports at least one full RLC service data unit (SDU), one or two RLC SDU fragments, or at least one full RLC SDU and at least one RLC SDU fragment. An RLC SDU fragment is only located (i) at the beginning or end of the RLC PDU or at the end of the radio link control protocol data or (ii) at the beginning and end of the RLC PDU. A single field in the header consists of a first bit and a second bit, even when a number of full RLC SDUs and RLC SDU fragments in the RLC PDU is more than two. The single field indicates whether (i) the RLC PDU begins with a fragment of a RLC SDU and (ii) the RLC PDU ends with a RLC SDU fragment. The data packet is formed including the configured header and the configured RLC PDU and transmitted.

Selective Mapping of Coded Multi-Channel Transmission
20190236802 · 2019-08-01 ·

The present invention provides a methods, apparatus and systems for improving a systems-level data rate on a communications link such the orthogonal frequency division multiplexed multiple access (OFDMA) downlink used in used in WiFi and LTE cellular/wireless mobile data applications. The present invention preferably uses a form of multilevel coding and decoding known as tiled-building-block encoding/decoding. With the present invention, different receivers coupled to different parallel downlink channels with different channel qualities decode different received signal constellations at different levels of resolution. This allows the downlink of the OFDMA system to operate with a significantly higher data rate, thus eliminating existing inefficiencies in the downlink and significantly increasing system level bandwidth efficiency.

Associating a user identifier detected from web traffic with a client address

In one embodiment, a device in a network receives a set of known user identifiers used in the network. The device receives web traffic log data regarding web traffic in the network. The web traffic log data includes header information captured from the web traffic and a plurality of client addresses associated with the web traffic. The device detects a particular one of the set of known user identifiers in the header information captured from the web traffic associated with a particular one of the plurality of client addresses. The device makes an association between the particular detected user identifier and the particular client address.

IEEE802.11p PROTOCOL BASED VEHICLE-TO-ROADSIDE AND VEHICLE-TO-VEHICLE COMMUNICATION TEST METHODS ORIENTED TO THE INTERNET OF VEHICLES

An IEEE 802.11p protocol-based vehicle-to-roadside and vehicle-to-vehicle communication test method oriented to the Internet of Vehicles. The method includes: driving a host vehicle and a target vehicle at a same speed on a road segment; the host vehicle being located behind the target vehicle; a constant distance is maintained between the host vehicle and the target vehicle; the host vehicle is equipped with a host vehicular communication unit, the target vehicle is equipped with a target vehicular communication unit communicating with the host vehicular communication unit; calculating a throughput and a round trip time RTT from the target vehicular communication unit to the host vehicular communication unit; repeating driving the host vehicle and target vehicle N times, and calculating an average throughput and an average round trip time (RTT) of the N times; and calculating a network performance parameter according to the average throughput and the RTT.

ADAPTIVE, DECEPTIVE AND POLYMORPHIC SECURITY PLATFORM
20190207978 · 2019-07-04 · ·

A security platform running on a server includes (a) protocol stacks each configured to receive and to transmit IP data packets over a network interface, wherein the protocol stacks have predetermined performance characteristics that are different from each other and wherein each protocol stack includes one or more program interfaces to allow changes to its performance characteristics; (b) application programs each configured to receive and transmit payloads of the IP data packets, wherein at least two of the application programs are customized to handle different content types in the payloads and wherein each application program accesses the program interface of at least one protocol stack to tune performance characteristics of the protocol stack; (c) classifiers configured to inspect at a given time IP data packets then received in the network interface to select one of the protocol stack and one of the application programs to service the data packets; and (d) a control program to load and run the selected protocol stack and the selected application program.

COMPUTER-IMPLEMENTED METHODS, COMPUTER-READABLE MEDIA AND ELECTRONIC DEVICES FOR PROCESSING TEST ELECTRONIC TRANSACTIONS

A computer-implemented method for processing test financial transactions that includes accessing, via a remote-control server, transaction data corresponding to a test run. The transaction data is transmitted via the remote-control server and received at a mobile application API of an electronic device. The transaction data is passed to a payment application of the electronic device. A cryptogram corresponding to the transaction data is generated via the payment application and transmitted for submission to a payment network. A transaction response corresponding to the test run is received at the remote-control server.

Method and apparatus for reducing network resource transmission size using delta compression
10326853 · 2019-06-18 · ·

A method and computing device for delta compression techniques for reducing network resource transmission size are described. A first version of a network resource is received. The first version of the network resource is stored regardless of a directive that a cached version is not to be used to respond to a future request for that network resource. A first request for the network resource is received. A second request for the network resource is transmitted, to a second computing device. A response including a set differences between the first version of the network resource with a most current version of the network resource is received from the second computing device without receiving the entire network resource. An updated version of the network resource is transmitted to the client device, where the updated version is generated by applying the set of differences to the first version of the network resource.

Generic data integrity check

A system, comprising: a configurable parser that comprises one or more configurable parsing engines, wherein the configurable parser is arranged to receive a packet and to extract from the packet headers associated with a set of protocols that comprises at least one protocol; a packet type detection unit that is arranged to determine a type of the packet in response to the set of protocols; and a configurable data integrity unit that comprises a configuration unit and at least one configurable data integrity engine; wherein the configuration unit is arranged to configure the at least one configurable data integrity engine according to the set of protocols; and wherein the at least one configurable data integrity engine is arranged to perform data integrity processing of the packet to provide at least one data integrity result.