Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Nec Europe Ltd patents


Recent patent applications related to Nec Europe Ltd. Nec Europe Ltd is listed as an Agent/Assignee. Note: Nec Europe Ltd may have other listings under different names/spellings. We're not affiliated with Nec Europe Ltd, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "N" | Nec Europe Ltd-related inventors


Network management system and method for a shared radio access network, ran, infrastructure

A network management system for a shared radio access network (ran) infrastructure provided by a mobile network operator includes a master operator network manager of the mobile network operator for managing the shared ran infrastructure; one or more tenants configured to receive resource allocations from the master operator network manager; and a capacity or resource broker configured to decide on the resource allocations to the one or more tenants, wherein the capacity or resource broker resides inside the network of the mobile network operator.. . ... Nec Europe Ltd

Method and system for providing a proof-of-work

A method for providing a proof-of-work includes computing, by a verification computing device (vcd), a first linear feedback shift register sequence (lfsr-s) using a first polynomial having a first degree and computing, by the vcd, a second lfsr-s based on a second polynomial. A challenge, generated by the vcd and using elements of the second lfsr-s, is transmitted to the pcd. ... Nec Europe Ltd

Method and network for discovering a set of objects within a defined geographical space

A method for discovering a set of objects within a defined geographical space, wherein the objects in the set of objects match at least one predefined characteristic, and wherein object information regarding the at least one predefined characteristic is provided by different servers, includes discovering objects within the defined geographical space by a geo discovery request based on geographical coordinates; finding, from the discovered objects, a starting object matching the at least one predefined characteristic within a definable sub-space of the defined geographical space; ranking objects within the definable sub-space by increasing distance to the starting object to establish a rank; sending a query to one or more of the different servers for gathering object information regarding a first object in the rank which is located nearest to the starting object; checking whether the first object in the rank matches the at least one predefined characteristic.. . ... Nec Europe Ltd

Method for operating a service system

A method for operating one or more service systems performed in a memory of an analyzing entity (ae) includes a) receiving, by an input interface of the ae, one or more control requests for controlling one or more resources of at least one of the one or more service systems; b) assessing, by the ae, an impact on the one or more service systems of the one or more control requests by checking an effect on already performed control requests for resources of the one or more service systems when the one or more control requests would be performed on one or more of the resources of the at least one of one or more service systems; and c) checking, by the ae, if the assessed impact violates one or more adverse situation rules (asr).. . ... Nec Europe Ltd

Method and system for byzantine fault-tolerance replicating of data on a plurality of servers

A method for byzantine fault-tolerant replication of data on a plurality of n servers by a client, wherein the n servers include one primary node (pn) and n−1 replica nodes (repn), wherein f servers may arbitrarily fail, and wherein all n servers include a trusted computing entity (tce), includes: performing a request procedure, performing a prepare procedure, performing a commit procedure, and performing a reply procedure. The request procedure includes providing a request message for requesting a certain operation, and transmitting the request message to all n servers. ... Nec Europe Ltd

Method for storing data in a cloud and network for carrying out the method

A method for storing data in a cloud includes providing at least one data file to be stored together with a predefined number t of replicas of the at least one data file within the cloud, at least one authentication tag corresponding to the at least one data file and t functions that are configurable to take at least a predefined time to compute. The at least one data file, the at least one authentication tag and the t functions are transmitted to the cloud. ... Nec Europe Ltd

Providing and configuring a virtual base station

A method for providing a virtual base station in a mobile network comprising a virtual base station (vbs), wherein the vbs comprises at least one radio access point (rap) and a virtual radio access function (vraf), includes configuring the vbs by providing a description of radio access functionalities, which are executed by the rap or by the vraf; and jointly executing the vbs locally on the at least one rap and on a centralized entity (ce) forming a logical functional network entity.. . ... Nec Europe Ltd

Method for providing congestion information in a network

A method for providing congestion information in a network is performed in a memory available to a computing entity. A traffic demand is obtained within a certain part of the network by evaluating an amount of traffic in the part of the network per time. ... Nec Europe Ltd

Method and system for providing encrypted data on a client

The present invention relates to a method for providing encrypted data on a client, a cloud or the like, performed in a memory available to a computation device comprising the steps of a) providing for each user a user specific encryption key for encrypting user-specific plaintext, b) computing a common decryption key with a pre-determined function using the user specific encryption keys as input for said function, and wherein the common decryption key is computed based on at least two product groups of the same prime order, c) encrypting each user-specific plaintext with the corresponding user-specific encryption key resulting in user-specific ciphertexts, d) computing a common ciphertext with said function using the user-specific ciphertexts as input for said function, e) providing the common ciphertext and the common decryption key for decryption, preferably to a user, wherein step c) is performed such that encryption is homomorphic in the user-specific plaintext as well in the user-specific encryption keys, wherein said function is a polysized function supporting poly-many additions and a single multiplication.. . ... Nec Europe Ltd

Method for providing m2m data

A method for providing m2m data items according to m2m data subscriptions retrieved from an m2m frontend (fe) by an m2m backend (be) to one or more m2m applications includes representing the data items by a set of parameters including a required update frequency and a weight representing an importance of the data item; determining a schedule for retrieving data items from the fe by the be based on the weights of the data items; determining that an actual period required to update each of one or more respective data items is larger than a required period corresponding to the required update frequency and adding a penalty value to the weight of each of the respective one or more data items to provide updated weights; and modifying the schedule based on the updated weights.. . ... Nec Europe Ltd

Method and system for analyzing a data flow

A method for analyzing a data flow includes: (a) extracting packet information of a packet, (b) determining a status of the packet based on the extracted packet information by applying at least one probabilistic filter to the packet and storing the packet for later inspection based on the status of the packet indicating that the packet is out-of sequence, and (c) inspecting the stored packet based on inspection rules. Upon a partial match of an inspection rule with the extracted packet information, a result of the inspection is temporarily stored. ... Nec Europe Ltd

Method and system for accessing a device by a user

A system for authenticating a user accessing a device includes an authentication server and a ticket granting server. The authentication server is configured to generate a part of an authentication ticket which is combinable with at least one other part generated by at least one other authentication server to produce a complete authentication ticket, and to generate a part of a user session key which is combinable with at least one other part generated by the at least one other authentication server to produce a combined user session key. ... Nec Europe Ltd

Method and system for providing a transaction forwarding service in blockchain implementations

A method of providing a transaction forwarding service in a blockchain includes executing a smart contract in the blockchain so as to determine whether a respective full node is eligible to execute the smart contract. The smart contract specifies eligible full nodes, a filter of a respective light client and a reward for executing the smart contract. ... Nec Europe Ltd

Method to control vehicle fleets to deliver on-demand transportation services

A method for providing dispatching services for an on-demand transportation (odt) service includes determining that a predictive assignment message should be transmitted to a vehicle, generating, in response to the determining that a predictive assignment should be transmitted to a vehicle, the predictive assignment message, and transmitting, to the vehicle, the predictive assignment message. Generating the predictive assignment message uses one or more prediction models computed from historical and real-time odt service data.. ... Nec Europe Ltd

04/05/18 / #20180095787

Seamless sdn-supported ran-app migration

A method for performing centralized radio access network (cran) process migration, wherein the cran comprises a number of remote radio access points and a centralized processing center including a number of physical compute hosts that perform at least part of a radio access network functionality, includes executing a cran process on a first of the physical compute hosts and starting a new instance of the cran process on a second of the physical compute hosts; duplicating traffic destined to the cran process to both instances of the cran process; during a first time interval, processing the traffic on the first and the second physical compute host in parallel and suppressing the output of the second physical compute host; and when the second physical compute host reaches a same state with respect to the cran process as the first physical compute host, forwarding duplicate outputs from both instances to higher layers.. . ... Nec Europe Ltd

03/29/18 / #20180091777

Method and system for observing a predetermined monitoring area

A method for observing a predetermined monitoring area, wherein one or more sensing platform nodes are employed to observe a predetermined number of sub-areas of the monitoring area, includes observing the sub-areas of the monitoring area using the sensing platform nodes so as to collect measuring data for the sub-areas. A prediction model is provided for analyzing predictability of measuring data for the sub-areas based on the collected measuring data. ... Nec Europe Ltd

03/29/18 / #20180091615

Method and device of processing icn interest messages in a dtn scenario

A method of processing information centric networking (icn) interest messages in a delay tolerant networking (dtn) scenario, wherein icn data mules receive interests for content from end-users and disseminate content to end-users based on the interests and/or during encounters with other icn data mules, includes performing a popularity estimation of content; appending, by a first end-user when forwarding an interest for given content to a data mule, a nonce to the interest; and employing, by a first data mule, the appended nonce according to predefined rules to maintain and/or record a counter for interests for the given content. The counter functions as a popularity indicator for the given content.. ... Nec Europe Ltd

03/22/18 / #20180084567

Scheduler-managed routing of information in cloud-ran data centers

A method of managing radio access network (ran) processing within a data center of a centralized radio access network (cran), wherein the data center comprises a plurality of compute resources that perform at least part of the ran processing of a plurality of connected remote radio access points, includes assigning, to packets from the plurality of remote radio access points, an identification information that originates from the ran; deciding, by schedulers based on a scheduling algorithm, on which of the compute resources processing of the packets is to take place; and using the identification information to route the packets within the data center. The compute resources are implicitly addressed through the identification information.. ... Nec Europe Ltd

03/22/18 / #20180083780

Method for verifying information

A method for verifying information in a cloud computing system includes generating, by one or more computation devices, an evaluation key and a verification key in a memory available to at least one of the one or more computation devices based on a security parameter and a function to be evaluated; computing, by the one or more computation devices, an output of the function to be evaluated in a memory available to at least one of the one or more computation devices using an input; computing, by the one or more computation devices, a proof for an outcome using the evaluation key in a memory available to at least one of the computation devices; and verifying, by the one or more computation devices, if the proof is valid based on the verification key in a memory available to at least one of the one or more computation devices.. . ... Nec Europe Ltd

03/15/18 / #20180077139

Method and system for accessing service/data of a first network from a second network for service/data access via the second network

A method for accessing service/data of a first network from a second network includes accessing the services and data of the first network from the second network includes registering a user device with the first network to access the services or data of the first network. The user device connects with the second network and authenticates the user device with the second network subsequent to registering the user device with the first network. ... Nec Europe Ltd

03/15/18 / #20180075732

Method for verifying authenticity of a monitoring signal and corresponding monitoring system

A method for verifying authenticity of a monitoring signal includes employing a multitude of actuators to impact a physical environment with individual signals, wherein the individual signals originate from the actuators and are directed to the physical environment; observing, via at least one sensor device, the physical environment so as to record the monitoring signal, wherein the monitoring signal represents a combined impact of the individual signals on the physical environment; and comparing the monitoring signal with an expected signal to determine a degree of similarity between the monitoring signal and the expected signal, wherein the expected signal is computed on the basis of one or more predetermined template.. . ... Nec Europe Ltd

03/15/18 / #20180075362

Method for incident detection in a time-evolving system

A method for incident detection in a time-evolving system (tos), having a plurality of objects moving in time and space along predefined paths, is performed in a memory available to a computation device. The method includes, in a step a), providing predictions of at least two system parameters by using for each prediction a different prediction procedure based on observations. ... Nec Europe Ltd

03/08/18 / #20180068238

Method for providing configuration information for a system comprising a plurality of moving objects

A method for providing configuration information for a system having a plurality of vehicles includes assigning, for each vehicle, a first number of degrees of freedom (dof); presetting one or more system parameters representing a performance of at least part of the system (sp); successively optimizing each respective vehicle at each station by selecting a dof for each vehicle from a second number of dof for the respective vehicle and computing a global sp; assigning each vehicle of each station a dof resulting from a first system configuration (sc); evaluating the global sp for the first sc; identifying one or more stations having a negative impact (nis) on the global sp on the first sc; and successively optimizing, for the one or more nis, each vehicle locally at each respective nis with regard to the sp with a number of dof greater than said second number of dof.. . ... Nec Europe Ltd

02/22/18 / #20180054773

Information dissemination in a multi-technology communication network

A method for executing or adapting a forwarding strategy in a vehicular ad-hoc network (vanet) includes performing, by a first vehicle being a node in the vanet, the following actions: analyzing current environmental conditions; creating a forwarding strategy based on the current environmental conditions; and forwarding information to other vehicles in the vanet according to the created forwarding strategy.. . ... Nec Europe Ltd

02/15/18 / #20180048561

Method for forwarding data in a network, forwarding element for forwarding data and a network

A method for forwarding data in form of flows in a software-defined network includes forwarding, if the data matches a present forwarding rule on a first forwarding element, the data with a time delay according to a time delay policy and generated by a delay entity such that a first number of first packets of the data is forwarded by the first forwarding element with a first forwarding time delay, and a second number of second packets of the data with a second forwarding time delay. The first forwarding time delay and the second forwarding time delay have a certain time difference from each other.. ... Nec Europe Ltd

02/15/18 / #20180048530

Method and system for supporting detection of irregularities in a network

A method for supporting detection of irregularities in a network includes monitoring features of said network using at least one monitoring device in order to collect spatio-temporal measuring data; providing, in an off-line phase, a training matrix where collected measuring data is aggregated in a predetermined time window such that said training matrix includes spatia-temporal correlations; performing, in said off-line phase, non-negative matrix factorization in order to decompose said training matrix into a coefficient matrix and a basis matrix, wherein temporal correlations and spatial correlations are jointly considered; creating, in an on-line phase; a current runtime matrix on a basis of measuring data newly collected in the on-line phase, computing, in said on-line phase, a current runtime coefficient matrix on a basis of said current runtime matrix and said basis matrix; and comparing, in said on-line phase, said current runtime coefficient matrix with at least one previous coefficient matrix.. . ... Nec Europe Ltd

02/08/18 / #20180039932

Method for providing a typical load profile of a vehicle for a public transport system

A method for providing a typical load profile of a vehicle includes computing dwell times and maximum load stops, wherein a maximum load stop indicates a stop having a largest load on a route for a trip using route information and vehicle scheduling information based on automatic vehicle location data, computing one or more trip load profiles by identifying a load progression rate by performing a local regression procedure dividing the route into subsections such that the loads between adjacent subsections can be represented by a linear function on input of the computed maximum load, the computed dwell times, and maximum load stops, and constraining the identified load progression rate to an admissible value by evaluating the rate load progression with regard to historical dwell times and the computed maximum load stops. The method further includes computing the typical load profile based on load profiles of computed trips.. ... Nec Europe Ltd

02/01/18 / #20180034580

Method for operating a mobile communication network

A method for operating a mobile communication network includes identifying link processing jobs running on one or more entities in the mobile communication network which cause an increase of data transmission delay in a communication link between the radio access network and a core network of the mobile communication network. One or more of the identified link processing jobs is selected. ... Nec Europe Ltd

02/01/18 / #20180034272

A method and a system for controlling energy supply to a client

A method for controlling energy supply to a client, wherein the client is connected to at least two energy utilities and/or energy grids for receiving energy for operating its energy systems, includes providing a demand request signal by at least one operation unit and/or by at least one of the at least two energy utilities and/or energy grids for requesting a demand modification with regard to at least one energy system of the client. A functional entity balances the energy supply to the client, so that a supply of energy from the at least two energy utilities or energy grids to the client is provided under consideration of the demand request signal or signals in a complementary way.. ... Nec Europe Ltd

01/25/18 / #20180026935

Hybrid access dns optimization for multi-source download

A method for operating a home gateway that implements hybrid access with a number of interfaces to different access networks includes resolving, by a domain name service (dns) proxy function of the home gateway, dns resolution requests received from a client of the home gateway; and returning, by the dns proxy function, corresponding dns resolution responses to the client. The dns proxy function, based on a single dns resolution request from the client, requests a number of dns resolutions via different interfaces of the home gateway transparently to the client.. ... Nec Europe Ltd

01/25/18 / #20180025435

Method for secure ledger distribution and computer system using secure distributed ledger technology

A method of providing secure ledger distribution for interbank settlement includes establishing a private sidechain among a centralized computer system of a central bank and computer systems of at least a sender bank and a receiver bank, each of which have an account with the central bank. The centralized computer system receives a transaction from the computer system of the sender bank as a payment request. ... Nec Europe Ltd

01/25/18 / #20180023830

A method for operating a thermal system and a thermal system

A method for operating a thermal system, wherein a component of a facility or building has to be heated and/or cooled by the thermal system, includes selecting a control mode of the thermal system for bringing and/or maintaining the component to or at a definable temperature value or to or within a definable temperature value range. The control mode is dynamically selected from multiple different control modes under consideration of at least one boundary condition of the component and/or at least one environmental context parameter and under consideration of data regarding learnt/adapted thermal behaviour of the component.. ... Nec Europe Ltd

01/11/18 / #20180013830

Method and system for managing encrypted data of devices

A method for managing data of devices using one or more computing entities includes encrypting, by one or more encrypting entities, the data based on encryption policies using encryption keys; storing the encrypted data as ciphertext at a storing entity; requesting decryption keys to decrypt the stored ciphertext by one or more clients; computing restricted decryption keys based on access right policies for the requesting clients by a security management entity; and providing the generated decryption keys to the requesting clients for decrypting the stored ciphertext.. . ... Nec Europe Ltd

01/04/18 / #20180007614

Mitigation of signalling congestion in cellular networks

A method for signalling congestion avoidance based on non-access stratum (nas) level congestion control in a mobile network includes activating or starting a group specific nas level congestion control mechanism that applies to a group of terminals; receiving at a serving node of a terminal of the group of terminals an nas session management (sm) request message from the terminal related to a particular access point name (apn); and transmitting from the serving node of the terminal to the terminal one or more nas reject messages that indicate suppression or prevention of nas sm signalling of the terminal that is related either to all apns to which the terminal has established or activated ip bearers or to all apns to which the terminal has a subscription.. . ... Nec Europe Ltd

12/28/17 / #20170374512

Method for performing distributed geographic event processing and geographic event processing system

A method for performing distributed geographic event processing includes defining a geographical state system including: a universe of locations, a family of initial states which assigns an initial state to each location in the universe of locations, a set of geographic input events, each geographic input event including one or more state transition functions that map, for one or more locations in a support of the respective geographic input event, a current state to a pair of a next state and an output event, and a global aggregation function for aggregating sets of output events. The method further includes geographically dividing the universe of locations into a plurality of subsets; and instructing each of a plurality of computational nodes to instantiate a local state system corresponding to a respective one of the subsets.. ... Nec Europe Ltd

12/28/17 / #20170374051

Method for operating a network and a network

A method for providing a guarantee of a network property includes receiving, from a network user, a signature and a request for the network property, wherein the request for the network property includes a public key of the network user; verifying that the signature received from the network user matches the public key of the network user; demonstrating the capability of providing the network property by determining policies to be installed on nodes of the network so as to enable the network property to be provided; generating, in response to the demonstrating the capability of providing the network property, a secure certificate that contains a secure acknowledgment (ack) of a commitment to provide the network property; and providing the secure certificate to the network user as a guarantee of the network property.. . ... Nec Europe Ltd

12/21/17 / #20170366338

Method and system for providing encrypted data

A method for providing encrypted data on a client, a cloud or the like includes, providing, for each user, a user-specific encryption key for encrypting user-specific plaintext. A common decryption key is computed with a pre-determined f netion using the user-specific encryption keys as input for the function, the function is a polysized function supporting poly-many additions and a single multiplication. ... Nec Europe Ltd

12/14/17 / #20170359832

Method for providing m2m data

A method for providing m2m data includes parameterizing m2m data subscriptions by parameters representing a data item to be subscribed, a required period, and a weight; determining, for all of the m2m data subscriptions, a schedule for retrieving data from a front end based on the importance of the data items such that when the actual period with which data updates for a data item can be provided is larger than the required period for the data item a penalty value is added to the weight; modifying the schedule based on the updated weights for retrieving data for the data items such that an overall penalty is minimized and/or an overall actuality of the cached data is maximized; and retrieving data items from the front end and caching the retrieved data from the front end by a back end.. . ... Nec Europe Ltd

12/07/17 / #20170353903

Method for operating a centralized radio access network

A method for operating a centralized radio access network (c-ran) having a plurality of base stations, wherein at least a portion of base station processing is performed at a centralized processing entity, and wherein a virtualized environment is provided by the centralized processing entity such that the plurality of base stations run in virtual machines, includes relocating base station processing from a first virtual machine that performs base station processing for a first base station that serves an initial cell to a second virtual machine by: introducing a target cell for which the second virtual machine performs base station processing, simultaneously transmitting, via at least a portion of antennas of the first base station, signals for both the initial cell and the target cell, and handing over user terminals that are assigned to the initial cell to the target cell.. . ... Nec Europe Ltd

11/23/17 / #20170339187

Intrusion detection and prevention system and method for generating detection rules and taking countermeasures

A detection rules generation engine includes an initial population creation subsystem configured to receive filtered network traffic instances from a network tap and to build an initial population of decision trees having nodes which are sorted based on an information gain of network features of the traffic instances. A parents selection subsystem is configured to select two individuals from the population based on a selection probability. ... Nec Europe Ltd

11/23/17 / #20170337587

Privacy-aware in-network personalization system

A personalization system includes a preprocessing component configured to receive a request from a user over a communications network and generate a request key using predefined attributes of the request. A categorization component is configured to map the request key to a subset of domain-dependent vocabulary. ... Nec Europe Ltd

10/26/17 / #20170310478

Method for providing encrypted information and encrypting entity

A method for providing encrypted information by an information entity to one or more operating entities, the information entity having a database for storing encrypted information and the one or more operating entities being configured to operate on the encrypted information, wherein the encrypted information is stored encrypted with an encryption key known to the one or more operating entities includes performing, by an operating entity, a request on the encrypted information, wherein plaintext information to be stored encrypted is provided in tuples, each having id information, one or more fields with field information specifying the fields, and values, wherein at least the values are encrypted with non-deterministic order preserving encryption with at least one encryption key such that each plaintext value is encrypted into a set of encrypted values, and wherein the set of encrypted values is partitioned into a left set and a right set.. . ... Nec Europe Ltd

09/28/17 / #20170279735

Method for operating a virtual network infrastructure

A method for operating a virtual network infrastructure, wherein a corresponding physical infrastructure comprises one or more physical infrastructure resources, includes monitoring utilization levels of one or more resource units of the one or more physical infrastructure resources for virtual resources requesting the one or more resource units; calculating average absolute resource utilization values based on the utilization levels for each of the virtual resources; calculating a reference resource of score (rras) for each of the one or more resource units of the one or more physical infrastructure resources, wherein the rras indicates an impact of the utilization of a reference resource unit on utilization of other resource units on a physical infrastructure resource using the calculated average absolute resource utilization values; and assigning resources by a virtual infrastructure controller (vic) and/or a vic-agent on a resource, based on the rras for the virtual resources.. . ... Nec Europe Ltd

09/21/17 / #20170272971

Method for multi-channel operation in a vehicular network and vehicular network

A method for multi-channel operation in a vehicular network, the vehicular network including a plurality of communicating entities being designated as either a service provider or as a service user, a control channel for exchanging management frames among the communicating entities, and at least two different service channels for application-specific information exchange among the communicating entities, includes performing, by the communication entities, channel load estimation through a combination of physical channel measurements and an analysis of the transmitted service announcement messages (sam) generated by service providers; and performing, by the communication entities based on the results of the channel load estimation together with existing services on the service channels and user and/or application preference configurations, dynamic service channel switching to either provide or consume a service.. . ... Nec Europe Ltd

09/21/17 / #20170270413

Real-time filtering of digital data sources for traffic control centers

A system for filtering data for a traffic control center includes: a plurality of data sources, comprising a plurality of traffic-related data sources and a weather-related data source; one or more network computing devices, configured to process data from the plurality of data sources to predict causes associated with predicted traffic incidents, and to select data from the plurality of data sources to be output to the traffic control center based on the predicted causes; and one or more output devices, located at the traffic control center, configured to display respective data selected by the one or more network computing devices.. . ... Nec Europe Ltd

08/24/17 / #20170245160

A method for operating a wireless network, a wireless network and a base station

A method for operating a wireless network, wherein a base station is provided for data communication in uplink (ul) and downlink (dl) directions with at least one mobile device, includes operating the base station in a full duplex data communication mode during communication with the at least one mobile device.. . ... Nec Europe Ltd

08/24/17 / #20170243012

Method and system for providing an update of code on a memory-constrained device

A method for providing an update of code on a memory-constrained device includes a) determining a minimum necessary compressed code space (mnccs) of the update of code, b) dividing the update of code into a plurality of chunks, c) applying an all-or-nothing encryption scheme (aone) on each chunk, d) providing integrity information of least one intermediate ciphertext block of each aone encrypted chunk, e) verifying integrity of the one or more intermediate ciphertext blocks based on the provided integrity information, f) providing the encryption key of the aone for decryption of the update of code if integrity was verified, and g) decrypting the intermediate ciphertext blocks using the provided encryption key and updating the code.. . ... Nec Europe Ltd

08/17/17 / #20170237552

Method and system for at least partially updating data encrypted with an all-or-nothing encryption scheme

A method for at least partially updating encrypted data stored on one or more servers includes dividing the encrypted data into equal sized chunks; encrypting each chunk using an all-or-nothing encryption scheme (aone) with an encryption key, wherein an additional randomness per chunk is embedded into the aone; outputting a plurality of ciphertext blocks for each chunk; storing the encrypted chunks on the one or more servers such that an i-th ciphertext block of each encrypted chunk is stored on an i-th server, wherein a result of a predetermined function performed on the randomness for all encrypted chunks is stored with each encrypted chunk; determining one or more chunks to update; reverting the predetermined function by accessing all the encrypted chunks; decrypting the one or more chunks to update based on the result of, updating the decrypted chunks; re-encrypting the updated decrypted chunks, and storing the re-encrypted chunks.. . ... Nec Europe Ltd

08/10/17 / #20170228660

Scalable system and method for real-time predictions and anomaly detection

A method detects an event or anomaly in real-time and triggers an action based thereon. A stream of data is received from data sources. ... Nec Europe Ltd

08/10/17 / #20170228554

Method for provably secure erasure of data

A method for provably secure erasure of data, performed in a memory available to one or more computing devices, includes generating prover state information (psi), verifier state information (vsi), and common reference information (cri) based on security information, a pregiven time-constraint, and a pregiven space-constraint, the generating psi, vsi, and cri being performed interactively between a prover computing device (pcd), and a verifier computing device, (vcd); computing, by the vcd based on the vsi, a challenge; computing a proof-of-erasure (poe) by the pcd based on the psi and the computed challenge, the poe having a size corresponding to the pregiven space-constraint; and verifying by the vcd based on the vsi and the poe.. . ... Nec Europe Ltd

08/03/17 / #20170219353

Method and system for determining a path of an object for moving from a starting state to an end state set avoiding one or more obstacles

A method for determining a path of an object for moving from a starting node representing a starting state to an end state includes a) determining a plurality of child nodes to a parent node, b) checking whether transitions from the parent node to each of the child nodes are free of obstacles and excluding partial paths that are not free of obstacles, c) computing a cost value for each of the non-excluded partial paths, d) adding the computed cost value to a cost value from the starting node to the parent node, e) adding an estimated or expected cost value for a partial path from each of the child nodes to an end node representing an end state, f) determining a lowest overall cost value and selecting a new parent node, and g) repeatedly performing steps a)-f) until at least one termination condition is fulfilled.. . ... Nec Europe Ltd

07/27/17 / #20170215123

Information dissemination in a multi-technology communication network

A method for information dissemination in a multi-technology communication network wherein network nodes are equipped with first communication means for operating via a long range communication network and with second communication means for performing short-range communication includes performing, by a central entity, the steps of determining coverage areas of the network nodes; establishing dissimilarity relations between network nodes with respect to the coverage areas of the network nodes such that a dissimilarity relation index value is larger for two network nodes covering less similar areas; and selecting, subject to configurable constraints, network nodes with a highest dissimilarity relation index value as mobile infrastructure nodes that are intended to act as relay and/or forwarder nodes for supporting optimal information penetration in a given destination dissemination area.. . ... Nec Europe Ltd

07/20/17 / #20170208043

A method for storing of data within a cloud storage and a cloud storage system

A method for storing data at a cloud storage, wherein data of a user is stored at the cloud storage upon a user request, includes encrypting the data of the user; directing the user request to a data manager; and before an uploading of the encrypted data to the cloud storage, performing, by the data manager, a deduplication on the encrypted data, so that uploading of the data is only performed, if the data is not yet stored within the cloud storage.. . ... Nec Europe Ltd

06/15/17 / #20170171789

Radio access management system and method

A radio access management system includes a radio access network including a number of base stations, a backhaul network to which the base stations are connected via backhaul links, and a backhaul resource controller configured to acquire information about both the load of the radio access network and of the backhaul network and to at least one of suggest or enforce handovers of user terminals connected to the base stations based on the acquired load information.. . ... Nec Europe Ltd

06/08/17 / #20170163039

A method and a system for controlling energy supply to different units

A method for controlling energy supply to different units includes receiving, by an aggregator, the demand request signal, and performing, by the aggregator, an allocation of the requested demand modification to the units based on a negotiating process with the units for minimizing an impact of the allocation on a future operation of another utility or of other utilities. Each unit is connected to multiple utilities for receiving enemy for operating its energy systems. ... Nec Europe Ltd

05/18/17 / #20170142212

Method for monitoring a status in form of presence and/or absence of a network entity

A method for monitoring a status in a form of presence and/or absence of a subscribed network entity in a network by a presence service, wherein the network is a software defined network having one or more forwarding elements being configurable for recognizing and applying one or more actions on packets being forwarded by the forwarding elements and one or more network entities, includes monitoring the status of the subscribed network entity. The monitoring the status of the subscribed network entity includes providing the presence service with a status update of the selected network entity only when at least one of the one or more forwarding elements, to which the selected network entity is directly connected, has detected a change in the presence status of the subscribed network entity; and dropping packets of the subscribed network entity destined for the presence service.. ... Nec Europe Ltd

05/18/17 / #20170142026

Efficent cascading of flow tables in software defined networks (sdn)

A method of providing access control for a software defined network (sdn) controller includes establishing a cascaded flow of flow table entries by linking together flow table entries of flow tables that are installed at network resources and that apply to the same packets or network flows, analyzing the impact of configuration requests from one or more applications regarding the installation and/or removal of flow table entries on existing cascaded flows, and rejecting configuration requests if the installation and/or removal of flow table entries according to the configuration requests would destroy an existing cascaded flow. The sdn controller includes an interface for interacting with one or more applications that are installed to run at the control plane of the sdn atop the sdn controller.. ... Nec Europe Ltd

05/11/17 / #20170134277

Method and network device for handling packets in a network by means of forwarding tables

A method for handling packets in a network by means of forwarding tables includes providing a software switching layer for implementing a software forwarding table; providing a hardware switching layer for implementing at least one of exact matching forwarding tables and wildcard matching forwarding tables; and redistributing, by using a switch management component for controlling the software switching layer and the hardware switching layer, installed forwarding table entries (ftes) matching a particular flow between the software switching layer and the hardware switching layer based on traffic characteristics of said flow.. . ... Nec Europe Ltd

04/20/17 / #20170111227

Method for mounting a device at a server in a network

A method for mounting a device at a server in a network includes attaching the device at an anchor. A virtualized connection is set up between the anchor and the server based on a predefined anchor configuration, temporary device information is encoded into a network flow generated by the device. ... Nec Europe Ltd

03/16/17 / #20170076587

Method for verifying authenticity of a monitoring signal and corresponding monitoring system

A method for verifying authenticity of a monitoring signal includes employing a multitude of actuators to impact a physical environment with individual signals, wherein the individual signals originate from the actuators and are directed to the physical environment; observing, via at least one sensor device, the physical environment so as to record the monitoring signal, wherein the monitoring signal represents a combined impact of the individual signals on the physical environment; and comparing the monitoring signal with an expected signal to determine a degree of similarity between the monitoring signal and the expected signal, wherein the expected signal is computed on the basis of one or more predetermined templates, wherein the predetermined templates are previously generated in a secret initialization procedure in such a way that the impact on the physical environment for each of the individual signals is separately recorded as a template by the sensor device.. . ... Nec Europe Ltd

03/09/17 / #20170071023

Method, user equipment, master evolved node b and communication system for dual connectivity

A method for dual connectivity (dc) performed by a user equipment (ue), wherein said the ue is in connected mode and is connected to a master evolved node b (menb) and connectable to a secondary evolved node b (senb), includes informing a communication system entity about regarding dc support of said the ue, and when the ue supports dc, receiving a connection reconfiguration message to change or split bearers from the menb to the senb.. . ... Nec Europe Ltd

02/09/17 / #20170036560

Method for load balancing of charging stations for mobile loads within a charging stations network and a charging stations network

A method for load balancing of charging stations for mobile loads within a charging stations network includes performing, based on a prediction of a charging demand of the mobile loads, a distribution of an energy-power-range limitation (Δe, Δp)p, lim for each of the charging stations p under consideration of a definable optimization parameter, wherein p=1, . . ... Nec Europe Ltd

01/12/17 / #20170011296

Weighted similarity estimation in data streams with applications to collaborative filtering and viral marketing

A method estimates similarities in data streams. A data source receives input vectors from users. ... Nec Europe Ltd








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Nec Europe Ltd in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Nec Europe Ltd with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###