G06F15/16

CLUSTERING OF VIRTUAL PRIVATE NETWORK SERVERS
20230052050 · 2023-02-16 · ·

A method in a first virtual private network (VPN) server associated with clustering a plurality of VPN servers in a clustered network, the method including receiving, from a VPN service provider (VSP) control infrastructure, VPN data associated with a user device having an established VPN connection with the clustered network; and communicating, utilizing key information, the VPN data with the user device during the established VPN connection. Various other aspects are contemplated.

TELECOMMUNICATION AND MULTIMEDIA MANAGEMENT METHOD AND APPARATUS

A telecommunication and multimedia management apparatus and method that supports voice and other media communications and that enables users to: (i) participate in multiple conversation modes, including live phone calls, conference calls, instant voice messaging or tactical communications; (ii) review the messages of conversations in either a live mode or a time-shifted mode and to seamlessly transition back and forth between the two modes; (iii) participate in multiple conversations either concurrently or simultaneously; (iv) archive the messages of conversations for later review or processing; and (v) persistently store media either created or received on the communication devices of users. The latter feature enables users to generate or review media when either disconnected from the network or network conditions are poor and to optimize the delivery of media over the network based on network conditions and the intention of the users participating in conversations.

DETECTION OF SIGNALS IN A VIRTUAL MEETING

A method, a system, and a computer program product for determining whether signals are received by one or more devices in a virtual meeting. The method includes transmitting a data stream received from one or more host computing devices to one or more user computing devices in a plurality of user computing devices. The host and user computing devices are communicatively coupled using a real-time online connection. A first hash in a plurality of hashes is generated by the server using a portion of the data stream and stored in a memory location. The first hash is compared to a second hash received from the user computing devices. The second hash is generated by the user computing devices upon receipt of the transmitted data stream. Based on the comparison, a status of the real-time online connection between the host computing devices and the user computing devices is determined.

System, Device, and Method of Measuring Directional Latency and Congestion in a Communication Network
20230048089 · 2023-02-16 ·

Systems, devices, and methods of measuring directional latency and congestion in a communication network. A Uni-Directional Latency Determination Unit is connected in a communication network, located between an end-user device and a server. It monitors packets transported between the end-user device and the server, and it estimates a uni-directional latency of packet transport from the end-user device to the server or from the server to the end-user device. It utilizes a Transmission Control Protocol (TCP) Header and Timestamp Analyzer, to perform an analysis of data contained in timestamps of TCP packet headers of transported packets; and particularly, it analyzes data contained in a TSval field of such TCP packet headers. Congestion mitigation operations are accordingly deployed or activated.

APPARATUSES AND METHODS OF SIGNALING ENHANCEMENT FOR ALWAYS-ON PROTOCOL DATA UNIT (PDU) SESSION
20230048935 · 2023-02-16 ·

A method of signaling enhancement for an always-on PDU session is provided. A User Equipment (UE) transmits a Non-Access Stratum (NAS) request message to a mobile communication network. The NAS request message includes an Always-on PDU Session Requested (APSR) Information Element (IE). The UE receives a NAS response message including an Always-on PDU Session Indication (APSI) IE from the mobile communication network. The APSI IE includes a time length indicator. In response to the APSI IE indicating that the always-on PDU session is not allowed, the UE starts a timer based on the time length indicator and retransmits the NAS request message to the mobile communication network when the timer expires.

ENHANCED QUANTUM CIRCUIT OPERATION VIA A UNIVERSALLY IMPLEMENTABLE 4X4 UNITARY MATRIX DECOMPOSITION
20230051437 · 2023-02-16 ·

Systems, computer-implemented methods and/or computer program products are provided to facilitate operation of a quantum circuit on a set of qubits via providing and implementing decompositions of one or more unitary matrices. According to an embodiment, a system can implement a unitary matrix by providing and implementing a decomposition of the unitary matrix, to thereby facilitate operation of and/or operate a quantum circuit on a set of qubits. The system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a unitary matrix management component that decomposes a defined 4×4 unitary matrix into a defined circuit comprising a sequence of universal gates. The sequence of universal gates can be a same sequence for each defined 4×4 unitary matrix of a set of candidate 4×4 unitary matrices including the defined 4×4 unitary matrix.

ENHANCED QUANTUM CIRCUIT OPERATION VIA A UNIVERSALLY IMPLEMENTABLE 4X4 UNITARY MATRIX DECOMPOSITION
20230051437 · 2023-02-16 ·

Systems, computer-implemented methods and/or computer program products are provided to facilitate operation of a quantum circuit on a set of qubits via providing and implementing decompositions of one or more unitary matrices. According to an embodiment, a system can implement a unitary matrix by providing and implementing a decomposition of the unitary matrix, to thereby facilitate operation of and/or operate a quantum circuit on a set of qubits. The system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a unitary matrix management component that decomposes a defined 4×4 unitary matrix into a defined circuit comprising a sequence of universal gates. The sequence of universal gates can be a same sequence for each defined 4×4 unitary matrix of a set of candidate 4×4 unitary matrices including the defined 4×4 unitary matrix.

SYSTEM AND METHOD FOR UPDATING INTERFACE ELEMENTS BASED ON REAL-TIME TRANSFER PROTOCOL AVAILABILITY

A server computer system, comprises a processor; a communications module coupled to the processor; and a memory coupled to the processor, the memory storing instructions that, when executed, configure the processor to obtain information associated with a request to transfer data to a data record; determine, based on an identifier associated with the data record, whether a real-time transfer protocol is available to complete the transfer; and send, via the communications module and to a client device associated with a recipient of the request to transfer the data to the data record, a signal updating one or more interface elements of an interface displayed on the client device based on whether the real-time transfer protocol is available to complete the transfer.

FEDERATED SERVICE REGISTRIES FOR ACCESS PROVIDERS
20230051134 · 2023-02-16 ·

Techniques for federated service registries are provided. A first access server determines a first plurality of services available within a local network associated with the first access server, as well as a second plurality of services available at one or more remote networks. A request for a first service is received from a client device, where the first service is not included in the first plurality of services and is included in the second plurality of services. A tunnel is established from the client device to one or more remote networks.

PRIVATE NETWORK ACCESS

A method is disclosed including establishing a browser session in response to receiving a request from a browser application in a public network. The browser session is assigned to a dedicated network service running in a dedicated network name space. Requests received from the browser application are proxied to a dedicated network service. A local web session in the dedicated network service authenticates a user of the browser application for access to at least one private webservice. A security client in the dedicated network service establishes a networking tunnel between the proxy and a remote gateway to the private network, thereby obtaining network access to the private webservice from the dedicated network name space. Within the dedicated network name space, proxied requests addressing the private webservice are forwarded over the networking tunnel to the private network.