Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Technical Disclosure Commons

Series

2020

Articles 1081 - 1097 of 1097

Full-Text Articles in Entire DC Network

Node And Service Discovery In Wireless Local Area Network Controller Cluster Architectures Using Hyperledger, Niranjan M. M, Nagaraj Kenchaiah, Vijay Kothamasu, Ramachandra Murthy Jan 2020

Node And Service Discovery In Wireless Local Area Network Controller Cluster Architectures Using Hyperledger, Niranjan M. M, Nagaraj Kenchaiah, Vijay Kothamasu, Ramachandra Murthy

Defensive Publications Series

In the wireless cluster deployments, node discovery is a challenge. Further, it can be more challenging to discover the services running in such deployments. There are existing methods which use "client side discovery" and "server side discovery" that need a centralized "Service Registry" to maintain all available service instances. Presented herein are techniques that provide for the utilization of a private blockchain and HyperLedger in order to discover nodes and their services in wireless cluster deployments. Techniques of this proposal may provide for de‑centralizing node and service discovery in wireless cluster deployments without compromising authentication and security aspects. In one …


Trustworthiness Among Controllers And Switches In Multi-Provider Software Defined Network Deployments Using A Trusted Platform Module (Tpm) And Secure Ledger, Niranjan M. M, Nagaraj Kenchaiah Jan 2020

Trustworthiness Among Controllers And Switches In Multi-Provider Software Defined Network Deployments Using A Trusted Platform Module (Tpm) And Secure Ledger, Niranjan M. M, Nagaraj Kenchaiah

Defensive Publications Series

The OpenFlow® protocol especially OpenFlow® Discovery Protocol (OFDP) utilizes clear text Link Layer Discovery Protocol (LLDP) message exchanges to discover network topology. Such exchanges lack security and may lead to network attacks such as LLDP flooding, link fabrication, etc. Currently, the OpenFlow® protocol both in the case of discovery (OFDP) as well during subsequent communication between a controller and a switch (even with Transport Layer Security (TLS)) does not offer a way to understand whether or not a discovered controller or switch is a trustworthy device. Presented herein are techniques that provide Trusted Platform Module (TPM) and blockchain-based trust establishment …


Secure And Efficient Method To Distribute Configurations In Wireless Cluster Deployments Using Hyper Ledger, Niranjan M. M, Nagaraj Kenchaiah Jan 2020

Secure And Efficient Method To Distribute Configurations In Wireless Cluster Deployments Using Hyper Ledger, Niranjan M. M, Nagaraj Kenchaiah

Defensive Publications Series

An enterprise wireless clustering deployment is comprises of cluster of Wireless Local Area Network (LAN) Controllers (WLCs), intended to provide collaborative services such as load balancing of Access Points (APs), distributed mDNS gateway, etc. Since these cluster deployments are typically very large, configuring individual WLCs is difficult. Presented herein are techniques to incorporate WLC cluster deployments with an authenticated distributed ledger to securely store the configuration and subsequent changes (e.g., only maintain changes from the previous one, using dictionary method: key-value pair to identify the difference). This avoids the use of control Datagram Transport Layer Security (DTLS) connection between AP …


Dynamic And Customer Tailored Consumable Life Projection Messaging, Hp Inc Jan 2020

Dynamic And Customer Tailored Consumable Life Projection Messaging, Hp Inc

Defensive Publications Series

A technique calculates, based on a customer's own typical printing profile, the

approximate number of remaining pages that can be printed using the current remaining

level of individual consumables in the printer, informs the customer when replenishment

is needed, and enables the customer to reorder consumables more cost-effectively.


Customized Printed Handouts For Sales Prospects, Hp Inc Jan 2020

Customized Printed Handouts For Sales Prospects, Hp Inc

Defensive Publications Series

A system captures an image of a prospective customer, records it with related

image in a CRM database, generates content of value to the customer, and prints a

handout for the customer that includes the valued content.


Offline Cable Detection Method, Hp Inc Jan 2020

Offline Cable Detection Method, Hp Inc

Defensive Publications Series

A printer's cable detect information can be read through an external interface,

even when the printer itself is not powered on.


Communication Bus For Embedded Sensor Systems, Hp Inc Jan 2020

Communication Bus For Embedded Sensor Systems, Hp Inc

Defensive Publications Series

A communications bus using features of both I2C and SPI topologies enables

communications between a master and multiple slaves at high data rates over a span of

several feet.


Hardware Security-Based Data Content Protection, Hp Inc Jan 2020

Hardware Security-Based Data Content Protection, Hp Inc

Defensive Publications Series

The method described here, uses a hardware‐based handshaking and

hardware bound policies executed in computing devices, to geo‐fence

contents being viewed in computers.


Pcle Gen4 And Pcle Gen3/Sata Devices Switching Scheme, Hp Inc Jan 2020

Pcle Gen4 And Pcle Gen3/Sata Devices Switching Scheme, Hp Inc

Defensive Publications Series

Disclosed is a way to support PCIe NVMe Gen4 SSD Devices in addition to maintaining support for

PCIe NVMe Gen3 SSD’s and SATA and Hybrid drives like H10. Chipsets are being architected to

support PCIe Gen4 interface in the CPU for higher bandwidth devices such as graphics and high

speed SSDs. However, the I/O controller in the chipset maintains support for PCIe Gen3/SATA and

stops short of supporting PCIe Gen4 devices.


Using Build-In Mic To Detect Airplane Mode By Hearing Background Noise, Hp Inc Jan 2020

Using Build-In Mic To Detect Airplane Mode By Hearing Background Noise, Hp Inc

Defensive Publications Series

A mobile device such as notebook need to modify its operation in airplane, at least turning off wireless

transmitter. Other operational changes include reduce significantly battery charging rate if AC is

available. That is due to airplane’s limited power capability while airborne.

The current airplane mode is handled manually. The write‐up described to use build‐in mic‐phone for

airplane mode detection. By listening to unique background character inside airplane cabin during

airborne, the notebook device with its build‐in mic can detect airline mode, then adjust device operation

automatically.


Insult Detection And Filtering, Christina Abboud, Jyrki Alakuijala Jan 2020

Insult Detection And Filtering, Christina Abboud, Jyrki Alakuijala

Defensive Publications Series

Website publishers, search engines, social media service providers, and other online entities need to comply with regulation that requires removal of content that is deemed to be insulting to an individual. This disclosure describes techniques to match and remove text that is similar to insult strings that mandated for removal. One-way hashes of insult strings are used to enable removal of insulting content without exposing the name of the subject of the insult string. Name canonicalization is performed and a semantic fingerprint is obtained using a one-way function.


Browser With Smart Search In Page Button, Benjamin Azose, Kathleen Brennan, Phd Jan 2020

Browser With Smart Search In Page Button, Benjamin Azose, Kathleen Brennan, Phd

Defensive Publications Series

Web browsers offer find in page functionality to search for a phrase within the content of a webpage. However, this requires the user to access the menu option and type the phrase which is a cumbersome process on smartphones or other devices with small screens and/or limited input capabilities. Per techniques of this disclosure, a readily accessible option, e.g., a displayed button, corresponding to a likely search phrase is provided as part of the browser user interface, thus simplifying the search process. When the user permits, the likely search phrase is determined based on prior searches by the user.


Prefabricated Dome Building With Large Panoramic Windows. Dome Structure Made Of Prefabricated Reinforced Polyurethane Segments. Large Panoramic Windows Made Of Acrylic., Paul Terras Jan 2020

Prefabricated Dome Building With Large Panoramic Windows. Dome Structure Made Of Prefabricated Reinforced Polyurethane Segments. Large Panoramic Windows Made Of Acrylic., Paul Terras

Defensive Publications Series

Prefabricated dome building with large panoramic windows.

Dome structure made of prefabricated reinforced polyurethane segments.

Large panoramic windows made of acrylic.

1. Dome house constructed of prefabricated reinforced polyurethane segments.

10, 12 or 14 prefabricated reinforced polyurethane segments are used to build a compleat dome house. Segments are reinforced with either steel, or composite bars. Reinforcement extensions are designed to be used for segments interconnection, and mounting the segments to the foundation or base. Interconnected rebars are forming stable structure.

Male-female joints are used to connect the segments. Segments are glued together and sealed. One or several segments can be …


Optimized Simultaneous Authentication Of Equals (Sae) Identity Pre-Shared Key (Ipsk), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, Mansi Jain Jan 2020

Optimized Simultaneous Authentication Of Equals (Sae) Identity Pre-Shared Key (Ipsk), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, Mansi Jain

Defensive Publications Series

Presented here are techniques for the residential deployment of common Wi-Fi® services with an optimized Simultaneous Authentication of Equals (SAE) Identity Pre-Shared Key (iPSK) flow. The techniques presented herein avoid the use of an Authentication, Authorization, and Accounting (AAA) server for clients whose entries are absent through the upfront use of bloom filter information provided by an AAA server. The techniques presented herein can also be used for Wi-Fi Protected Access II (WPA2) iPSK optimization or SAE (Wi-Fi® Protected Access 3 (WPA3) personal), which has more latency sensitive call flow due to SAE auth commit timeouts consideration.


Machine Learning Assisted Quick Eyescan (Mlaqe) For Signal Integrity Check, Jim Xu, Sreenivasa Rao Bandlamudi, Ankit Sood, Vinit Bansal, Ravi Eda, Arun Singh Jan 2020

Machine Learning Assisted Quick Eyescan (Mlaqe) For Signal Integrity Check, Jim Xu, Sreenivasa Rao Bandlamudi, Ankit Sood, Vinit Bansal, Ravi Eda, Arun Singh

Defensive Publications Series

Presented herein is a quick scan method for signal integrity checks through sampling of four points under certain thermal condition. The techniques presented herein use a machine learning trained model to ensure signal integrity check fidelity.


Directing Users To An Available Parking Spot At An Optimal Location Near The Destination, Adalberto Foresti Jan 2020

Directing Users To An Available Parking Spot At An Optimal Location Near The Destination, Adalberto Foresti

Defensive Publications Series

High demand for parking generated by the large numbers of people simultaneously looking for parking within the same area often makes it tedious and difficult to find a parking spot, leading to delays and frustration. Individual drivers typically attempt to find a parking spot closest to an event venue. Finding a parking spot via such an approach requires luck and timing. Many drivers tend to overestimate their luck, thus adding to congestion and wasting more time in the process of finding a parking space. To address these issues, this disclosure describes techniques that use real-time information on available parking spaces …


Segment Routing Policies With Built-In Resiliency, Clarence Filsfils, Zafar Ali, Swadesh Agrawal, Francois Clad, Jose Liste, Jiri Chaloupka Jan 2020

Segment Routing Policies With Built-In Resiliency, Clarence Filsfils, Zafar Ali, Swadesh Agrawal, Francois Clad, Jose Liste, Jiri Chaloupka

Defensive Publications Series

Techniques are described herein to establish hierarchical Segment Routing (SR) policies with built-in resiliency. These techniques increase the scalability of the SR Path Computation Element (PCE) and SR network. Specifically, once such policies are installed by the SR PCE, the SR PCE does not have to take any action in the event of failure. This is an improvement over current approaches, which employ the SR head-end node as a single point of failure.