Patents Assigned to NEC Europe Ltd.
-
Publication number: 20180091615Abstract: A method of processing information centric networking (ICN) interest messages in a delay tolerant networking (DTN) scenario, wherein ICN data mules receive interests for content from end-users and disseminate content to end-users based on the interests and/or during encounters with other ICN data mules, includes performing a popularity estimation of content; appending, by a first end-user when forwarding an interest for given content to a data mule, a nonce to the interest; and employing, by a first data mule, the appended nonce according to predefined rules to maintain and/or record a counter for interests for the given content. The counter functions as a popularity indicator for the given content.Type: ApplicationFiled: March 25, 2015Publication date: March 29, 2018Applicant: NEC Europe Ltd.Inventors: Jan Seedorf, Dirk Kutscher, Bilal Gill
-
Publication number: 20170316574Abstract: A method for verifying positions of a plurality of monitoring devices includes selecting a second monitoring device by a first monitoring device. A first number of monitoring devices out of the plurality of monitoring devices is supervised, the plurality of monitoring devices being positioned such that each monitoring device of the plurality of monitoring devices can be monitored by at least one other monitoring device of the plurality of monitoring devices. Correct positions of the plurality of monitoring devices have been determined and stored prior to verification, and security information for secure communication has been exchanged between two of the plurality of monitoring devices for all of the plurality of monitoring devices.Type: ApplicationFiled: October 30, 2014Publication date: November 2, 2017Applicant: NEC Europe Ltd.Inventors: Ghassan Karame, Wenting Li
-
Publication number: 20170163039Abstract: A method for controlling energy supply to different units includes receiving, by an aggregator, the demand request signal, and performing, by the aggregator, an allocation of the requested demand modification to the units based on a negotiating process with the units for minimizing an impact of the allocation on a future operation of another utility or of other utilities. Each unit is connected to multiple utilities for receiving enemy for operating its energy systems. A demand request signal is provided by at least one operational entity and/or by at least one utility for requesting a demand modification of a utility and/or of one form of energy.Type: ApplicationFiled: March 6, 2015Publication date: June 8, 2017Applicant: NEC Europe Ltd.Inventors: Maja Schwarz, Anett Schuelke, Mischa Schmidt
-
Publication number: 20170142212Abstract: A method for monitoring a status in a form of presence and/or absence of a subscribed network entity in a network by a presence service, wherein the network is a software defined network having one or more forwarding elements being configurable for recognizing and applying one or more actions on packets being forwarded by the forwarding elements and one or more network entities, includes monitoring the status of the subscribed network entity. The monitoring the status of the subscribed network entity includes providing the presence service with a status update of the selected network entity only when at least one of the one or more forwarding elements, to which the selected network entity is directly connected, has detected a change in the presence status of the subscribed network entity; and dropping packets of the subscribed network entity destined for the presence service.Type: ApplicationFiled: June 26, 2014Publication date: May 18, 2017Applicant: NEC Europe Ltd.Inventor: Roberto BIFULCO
-
Patent number: 9565613Abstract: A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached.Type: GrantFiled: July 21, 2014Date of Patent: February 7, 2017Assignees: NEC CORPORATION, NEC Europe Ltd.Inventors: Hajime Zembutsu, Toshiyuki Tamura, Stefan Schmid, Tarik Taleb, Gottfried Punz
-
Publication number: 20160217013Abstract: A method for generating a virtual device resource (VDR) accessible by an application includes providing a request for discovery of information by one or more applications; converting the provided request into one or more requests for one or more BigData repositories, wherein the converted one or more requests are supported by the one or more BigData repositories and fit the provided request; transmitting the converted one or more requests to the one or more BigData repositories; executing the transmitted one or more requests resulting in one or more descriptions of virtual device resources; selecting one or more virtual device resources (MR) based on the one or more descriptions; and generating the selected, one or more virtual device resources (VDR).Type: ApplicationFiled: February 10, 2014Publication date: July 28, 2016Applicant: NEC Europe Ltd.Inventors: JaeSeung Song, Martin BAUER, Barbara Pareglio
-
Publication number: 20160179627Abstract: A method for check pointing a global state of a distributed system with one or more distributed applications organized in a directed acyclic graph topology includes, upon receiving a marker in an active input channel of a first task application, putting an active input channel on hold, performing check pointing by saving an internal state of the first task application when all input channels have received a marker and are put on hold, forwarding the marker via all output channels of the first task application to at least one other task application of the one or more task applications, and reactivating all input channels of the first task application, wherein the global state is a union of all internal states of the task applications after each of the one or more task applications has been check pointed.Type: ApplicationFiled: July 30, 2013Publication date: June 23, 2016Applicant: NEC Europe Ltd.Inventors: Maurizio Dusi, Luca Fiori, Francesco Gringoli
-
Patent number: 9247474Abstract: A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached.Type: GrantFiled: January 10, 2014Date of Patent: January 26, 2016Assignees: NEC CORPORATION, NEC Europe Ltd.Inventors: Hajime Zembutsu, Toshiyuki Tamura, Stefan Schmid, Tarik Taleb, Gottfried Punz
-
Publication number: 20150326668Abstract: An Intelligent Transport System enabled cellular mobile network, comprising an infrastructure including a number of base stations (5), and a number of vehicles (4) being equipped with both vehicle-to-vehicle and vehicle-to-infrastructure communication facilities, wherein particular events function as trigger for said vehicles (4) to send event specific warning messages to their serving base station (5a) within said infrastructure, is characterized in that said base stations (5) comprise an evaluation module being configured to analyze and categorize warning messages received from any of said vehicles (4) according to predefinable criteria, and to estimate the number of vehicles (4) that may be affected by the event related to a warning message, and a control module for performing uplink radio resource adaptation dependent on said warning message's category and said estimated number of affected vehicles (4).Type: ApplicationFiled: July 4, 2012Publication date: November 12, 2015Applicant: NEC Europe Ltd.Inventors: Andreas Mäder, Long Le
-
Publication number: 20150294251Abstract: A computer-implemented method for assigning tasks to a plurality of agents includes determining, by a processor, a stance for an agent of the plurality of agents; and, when an unassigned task is available, assigning, by the processor, the unassigned task to an agent in the second stance. The stance is selected from the group consisting of a first stance and a second stance. Determining the stance is based on whether an unassigned task is available. The first stance relates to balancing tasks among the plurality of agents and the second stance relates to maximizing an amount of tasks assigned to a subset of the plurality of agents.Type: ApplicationFiled: April 11, 2014Publication date: October 15, 2015Applicant: NEC Europe Ltd.Inventors: Hanno Hildmann, Miquel Martin Lopez
-
Publication number: 20150271681Abstract: A method for supporting radio access network sharing is usable in connection with a hosting RAN (radio access network) provided by a hosting RAN provider. The hosting RAN includes one or more cells that are served by radio access network resources of the hosting RAN. At least one participating operator uses allocated shared radio access network resources of the hosting RAN provided by the hosting RAN provider under a sharing agreement. A controlling entity supervises shared radio access network resource utilization of the participating operator in the cells of the hosting RAN.Type: ApplicationFiled: October 15, 2013Publication date: September 24, 2015Applicant: NEC Europe Ltd.Inventors: Xavier Costa Pérez, Joerg Swetina
-
Publication number: 20150254468Abstract: A method for executing applications on an untrusted device includes selecting one or more applications as sensitive applications. One or more instruction sequences of the said one or more sensitive applications are modified by an external dongle. The one or more sensitive applications are executed on the untrusted device according to the modified instruction sequences. Whether correct execution of the instructions of the said modified instruction sequences has Occurred is checked by the external dongle.Type: ApplicationFiled: November 6, 2013Publication date: September 10, 2015Applicant: NEC Europe Ltd.Inventors: Ghassan Karame, Joao Girao, Wenting Li
-
Publication number: 20150257030Abstract: A method and system provides for adapting a computational load in a partly centralized radio access network. A computational load of computational elements of a central processor is measured or estimated, which central processor communicates with a plurality of radio access points and user equipment in the partly centralized radio access network. It is determined, by the central processor, whether the computational load should be reduced or increased. The computational load is adjusted by changing at least one of a modulation and coding scheme of the user equipment or an uplink power.Type: ApplicationFiled: March 7, 2014Publication date: September 10, 2015Applicant: NEC Europe Ltd.Inventor: Peter Rost
-
Publication number: 20150160035Abstract: A method and computer system for detecting crowds in a location tracking system utilizes a grid and the pigeonhole principle to minimize an amount of hardware, memory and/or processing capability required in the location tracking system. In particular, an amount of storage required to determine whether a location update has resulted in a crowd grows only linearly, rather than quadratically, with the number of objects being tracked because a number of active grid points will be, at most, four times the number of objects being tracked. By determining whether an individual active grid point is within a crowd area, the computational time required for detecting a crowd within this crowd area is independent from the total number of objects being tracked.Type: ApplicationFiled: December 9, 2013Publication date: June 11, 2015Applicant: NEC Europe Ltd.Inventors: Salvatore Longo, Tobias Jacobs
-
Publication number: 20150156191Abstract: The present invention relates to a method for accessing service/data of a first network from a second network for service/data access via the second network, comprising the steps of a) Pairing of a user device with the first network, b) Attaching the user device to the second network, c) Authenticating the user device with the second network, d) Providing connectivity information for services/data of the first network to the second network, e) Providing available services/data information by the first network to the second network, f) Accessing a service and/or data of the first network by the second network. The present invention relates also to a system for accessing service/data of a first network from a second network for service/data access via the second network.Type: ApplicationFiled: November 8, 2012Publication date: June 4, 2015Applicant: NEC Europe Ltd.Inventors: Mischa SCHMIDT, Hans-Joerg KOLBE, Raihan UL-ISLAM
-
Publication number: 20150134961Abstract: A method for identifying potentially malicious network elements within a network is useable in a network which includes a plurality of domains administrated by different operators P1, . . . , Pn. In the method, a functional entity receives qualifying information regarding at least one network element that has been transmitted by at least some of the operators P1, . . . , Pn. The at least one network element is qualified as being potentially malicious. The functional entity provides at least one of an alarm information and an alarm activity based on a predefined number of the operators P1, . . . , Pn having transmitted the qualifying information regarding a same potentially malicious network element to the functional entity.Type: ApplicationFiled: May 25, 2012Publication date: May 14, 2015Applicant: NEC Europe LtdInventors: Jens-Matthias Bohli, Giuseppe Bianchi
-
Patent number: 9032515Abstract: A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and that the results of the single inspections are accumulated along the communication path (1). Furthermore, a multimedia system with attack detection functionality is described.Type: GrantFiled: August 21, 2007Date of Patent: May 12, 2015Assignee: NEC Europe Ltd.Inventors: Saverio Niccolini, Thilo Ewald, Stefan Schmid
-
Patent number: 9032487Abstract: A method and system for providing service access to a user, includes the steps of: a) Registering a local identity provider located in al local network at a global identity provider with a local identifier of the local identity provider, b) Requesting service access requiring identity authentication to a service provider by a user located in the local network, c) Requesting an identity management service from the global identity provider by the service provider, d) Redirecting the user's access request to the local identity provider according to the provided local identifier within the local network, e) Checking if the local identifier corresponds to the local network of the user, f) Providing the requested identity management service to the service provider by the global identity provider in accordance with a result of the checking according to step e), and g) Granting service access for the user to the service provider.Type: GrantFiled: November 11, 2011Date of Patent: May 12, 2015Assignee: NEC Europe Ltd.Inventors: Marcus Kuhnen, Joao Girao, Yukiko Endo
-
Patent number: 9021018Abstract: A method for supporting the selection of communication peers in an overlay network, wherein a multitude of communication peers participate in the overlay network by providing certain pieces of information, and wherein at least one peer-to-peer server—tracker—is provided that maintains a database of the participating communication peers and the information possessed by them, wherein the tracker, upon receiving a query regarding a specific piece of information from a communication peer—requesting client—, answers the query by providing the requesting client a list that includes a subset of all communication peers possessing the requested piece of information, includes providing a network entity located such that it receives messages directed from the requesting client to the tracker, wherein the network entity stamps topological location information of the requesting client into any of the messages directed from the requesting client to the tracker. Furthermore, a corresponding system is disclosed.Type: GrantFiled: October 29, 2010Date of Patent: April 28, 2015Assignee: NEC Europe Ltd.Inventors: Sebastian Kiesel, Hans-Joerg Kolbe, Rolf Winter
-
Patent number: 9003497Abstract: A method and system for securely pairing wireless devices, includes deploying a master device in a network environment, and a new device to be securely integrated into the network environment executes an unauthenticated key exchange with the master device. The master device has a security association with a camera system that monitors an operational area where the new device is placed, based on the exchanged key, the master device and the new device each compute a key confirmation code. The camera system learns the key confirmation code from the master device. The camera system watches for devices transmitting the key confirmation code and provides images of such identified devices to the master device, based on an analysis of an image of a device identified by the camera system, an authorization decision is made with respect to accepting the identified device as new device of the network environment.Type: GrantFiled: October 26, 2010Date of Patent: April 7, 2015Assignee: NEC Europe Ltd.Inventors: Jens-Matthias Bohli, Osman Ugus