D Hood, S Dahlfort - US Patent 9,164,065, 2015 - Google Patents
BACKGROUND Whether they carry gas, liquids or electrical energy, utility lines that span geographic regions can fail for a number of reasons, including seismic events, windstorms …
B Xing, YPE Wang - US Patent 9,094,907, 2015 - Google Patents
BACKGROUND Time keeping in computing systems requires information for synchronizing the time with a world time keeping stan dard and a mechanism for accurately maintaining …
US Chunduri, W Lu, AC Lindem III - US Patent 8,995,667, 2015 - Google Patents
An automated key transition method is executed by a node in a network. The network includes a set of nodes utilizing a current key identifier provided by a group key …
X Yang, X Zhang, Q Gao, BO Xie - US Patent 11,063,859, 2021 - Google Patents
Embodiments provide a packet processing method. In accordance with this method, a first LSP packet can be received by a network device. The following determinations can be …
P Unbehagen, G Parsons, P Ashwood-Smith… - 2016 - rfc.fr
Abstract IEEE 802.1 Qca Path Control and Reservation (PCR) specifies explicit path control via IS-IS in Layer 2 networks in order to move beyond the shortest path capabilities provided …
In this chapter, the usability of voice biometric authentication is investigated. In doing so, we first studied the current status of Internet of Things [IoT] authentication technologies. We …
This document defines a new optional Intermediate System to Intermediate System (IS-IS) TLV named CAPABILITY, formed of multiple sub-TLVs, which allows a router to announce its …
This document describes how the National Institute of Standards and Technology (NIST) Secure Hash Standard family of algorithms can be used with OSPF version 2's built-in …
Deployment experience gained from implementing algorithms to determine Loop-Free Alternates (LFAs) for multi-homed prefixes (MHPs) has revealed some avenues for potential …