Data switching networks (H04L12)

H04L12/02 - Details(17)
H04L12/04 - Switchboards(11)
H04L12/14 - Charging arrangements(19)
H04L12/18 - For broadcast or conference(65)
H04L12/40 - Bus networks(59)
H04L12/403 - (11)
H04L12/407 - (2)
H04L12/413 - (10)
H04L12/42 - Loop networks(12)
H04L12/423 - (3)
H04L12/433 - (6)
H04L12/437 - (10)
H04L12/44 - Star or tree networks(12)
H04L12/46 - Interconnection of networks(36)
H04L12/56 - Packet switching systems(346)
H04L12/64 - Hybrid switching systems(39)

essage transfer method and device // 2642812
FIELD: information technology.SUBSTANCE: redirecting messages method differs in that way is applied to the network device the second level and contains acceptation of a message by the source; evaluate the type of message; and where the message type is the specified type redirect the message in accordance with the flow of processing according to the specified type, message type assessment evaluates whether a message to one of the following specified types multiaddress distribution data message; protocol messages of multiaddress distribution and non-multiaddress message distribution.EFFECT: increase the security of the multiaddress distribution.10 cl, 5 dwg

Intelligent household appliance control method, device and system, mobile and wearable intelligent household appliances and apparatus // 2642410
FIELD: personal use and household items.SUBSTANCE: invention relates to intelligent household appliance control method, device, system and apparatus. Control method comprises: receiving, by an intelligent household appliance, a wireless broadcast message containing identifier information; determining, by the intelligent household appliance, whether the identifier information is pre-stored unique identifier information of a wearable device; when the identifier information is the pre-stored unique identifier information, executing, by the intelligent household appliance, a preset control command to switch from an initial operation state to an intelligent operation state.EFFECT: technical result consists in the simplification of user control operations.30 cl, 20 dwg

ethod for protecting information and telecommunication network from passive computer attacks // 2642403
FIELD: information technology.SUBSTANCE: probability of attacker's awareness of the protected information and telecommunication network (ITN) is calculated for a given time interval, taking into account the type and number of detected passive computer attacks, the value of the calculated probability of the attacker's awareness for a given time interval is compared with a predetermined threshold value; if the calculated value of the attacker's awareness does not exceed the predetermined threshold, a plurality of control actions on the ITN and its protection system are selected in accordance with the calculated probability of the attacker's awareness, and the selected control actions are applied to the ITN and its protection system; the reception and transmission of message packets (PS) to the communication channel is prohibited when the calculated probability of the attacker's awareness of the protected ITN exceeds the given threshold value, as well as when the impact of an active computer attack is determined.EFFECT: increased coefficient of effective operation of information and telecommunication network, taking into account the level of attacker's awareness of the protected information and telecommunication network.3 dwg

ethod of information transmission // 2642383
FIELD: information technology.SUBSTANCE: method of information transmission is characterized by the fact that information in a format of PCI-Express packets is transmitted both by serial high-speed communication links and by a parallel bus, and depending on the addresses in the packet, data is redirected either inside I-Bus controller, or to an external bus of PCI-Express and then through the RCI-Express commutator and to the other I-Bus controllers. The PCI-Express commutator is designed to transmit a packet to several I-Bus controllers simultaneously, and the I-Bus controller is designed to operate in a double speed flow processing mode. Determination of the amount of the required terminal stations and commutators with determination of the required topology of communication links between them are preliminary carried out, the used commutators and terminal devices for information reception/transmission are adjusted, the transmitted information is divided into packets for transmission by the PCI-Express standard with a payload size of not more than 4 kilobytes.EFFECT: ensuring the use of a packet format of PCI-Express standard for transmission by both serial and parallel buses.2 dwg

ethod and device for disconnecting connection // 2642368
FIELD: information technology.SUBSTANCE: method is implemented by the fact that when the connection between the device owner account and the device is disconnected, the connection of the permission between the shared device account and the device is simultaneously disconnected. The method includes: receiving a disconnect request sent by the user account, the disconnect request is used to disconnect the connection between the user account and the device; if the user account is a device owner account, the extract of at least one shared account corresponding to the device; A shared account is an account that has management permission with respect to a device shared by another user account; and disconnecting the connection between the device and the owner account and disconnecting the permission connection between the device and at least one shared account.EFFECT: improves device security.8 cl, 11 dwg, 2 tbl

Ram, network data processing system and table searching method for ram // 2642358
FIELD: radio engineering, communication.SUBSTANCE: in table searching method for a random access memory (RAM) receives from each physical interface with a network processor an access message to the service table, the network processor parses the access to the service table, allocates the virtual memory library address for the access message to the table services according to the identification information, access the virtual memory library corresponding to the address of the virtual memory library allocated to the search appropriate services table.EFFECT: increase of search speed for random access memory.13 cl, 4 dwg

Communication with use of at least two different types of multimedia data // 2642352
FIELD: information technology.SUBSTANCE: method of blocking the reception and transmission of multimedia data in a communication system is provided. The method comprises the step of receiving, in the form of one information input, indicating that two or more streams containing multimedia data of various types relating to communication between the participants' devices should be blocked for the participant device. In response to receiving this information, blocking of the noted two or more streams of multimedia data transmitted both from the noted participant device and to the noted participant device is performed, while maintaining the connection established for the noted communication.EFFECT: ensuring the blocking of reception and transmission of multimedia data.23 cl, 31 dwg

Control method and apparatus for intelligent home device // 2642334
FIELD: monitoring systems.SUBSTANCE: invention relates to means of controlling an intelligent home device. Method includes: acquiring personal information about participants, determining an operating mode of an intelligent home device according to the personal information, which contains identification information about preferences or priorities of participants, wherein determination of operating mode includes determination of the mean value of information about preferences of participants or determination of operating mode based on the highest priority. Control device comprises an information acquisition unit and a mode determination unit.EFFECT: technical result is a wider range of means of controlling an intelligent home device.25 cl, 15 dwg
Pigmented compositions for skin care // 2641965
FIELD: cosmetology.SUBSTANCE: invention represents a skin care composition containing a dermatologically acceptable medium, a plurality of interfering pigments, where the total number of all interfering pigments in the composition, having a particle size of 2 mcm to 75 mcm, is 3% or less of the total composition weight; and where the composition has a redness reducing index less than 11.5, where the composition has a healthy skin colour change degree (HSCCD) less than 3, and where many pigments contain at least first and second interfering pigments, the first interfering pigment having a hue (h) in the range 185-215, and where the second interfering pigment has a hue (h) in the range 80-95.EFFECT: reduced visibility of skin irregularities.12 cl, 5 tbl, 18 ex

ethod and home gateway for implementation of voice messages functions // 2641724
FIELD: radio engineering, communication.SUBSTANCE: when the called user does not answer during a voice call for a predetermined period of time, the home gateway of the callee enters the message processing state. Then, the home gateway of the called user performs a message processing operation to receive the message information in accordance with the caller's needs and corresponding to the information of the message according to the needs of the called user, when the called user picks up the phone.EFFECT: providing the ability to receive, store and reproduce message information directly by a single user unit, without additional devices and the participation of a communication operator.10 cl, 8 dwg

ethod for access to local services in wlan // 2641660
FIELD: radio engineering, communication.SUBSTANCE: communication network node allows a wireless device to exchange data with a device providing local services, such as a printer or projector, a local area network (LAN) or wireless local area network (WLAN). The communication network node communicates with both the communication network and LAN or WLAN. The method comprises of identifying 200 the request in a multiaddress domain name system (mDNS), wherein the mDNS-request is received from the wireless communication device, and assigning 202 local link address (LL) to the wireless communication device. The method also includes extracting (204) local IP address of authentication and authorization service (AAS), having authorization information regarding the device providing local services, and authentication (206) using AA-S of what type of services the wireless device is authorized to use. Moreover, the method includes extracting (208) local IP address of the device providing local services and transmission (210) of data on services between the wireless device and device providing local services, through the use of LL-address of the device providing local services.EFFECT: it is possible for end users to access the installed devices providing local services in the local area network.10 cl, 7 dwg

ethod for managing intelligent device, terminal and server // 2641541
FIELD: information technology.SUBSTANCE: method for controlling an intelligent device is that the device identity is obtained from the intelligent device and a detailed data request containing the device identification data is sent to the server via the terminal. Receiving a response with the detailed data returned from the server, and push the response with detailed data to the user through the terminal. And the detailed data response contains a group of initiating conditions and a group of execution conditions corresponding to the device identification data. Sending the control instruction to the server via the terminal. The control instruction contains the first trigger condition and the first execution condition. Moreover, the control instruction is configured to allow the server to control the intelligent device with the ability to perform the first execution condition when the server detects that the first trigger condition is satisfied. Also, a terminal and a server for managing an intelligent device are claimed.EFFECT: increasing the accuracy and convenience of managing an intelligent home.25 cl, 34 dwg

Connection fault management in communication network // 2641483
FIELD: radio engineering, communication.SUBSTANCE: method comprises the steps of: generating (S1) a set of multipoint ECMP routes for sending data between endpoints in the network, the ECMP multi-point routes contains a set of multipoint connection routes between the same endpoints, with each ECMP route from the set of multipoint ECMP routes contains a multi-point ECMP route having N endpoints and identified using a multicast address; creating (S2) a set of maintenance associations for the ECMP to monitor the generated ECMP routes between the endpoints; and using (S3) the created set of ECMP maintenance associations to send control packets; the method further comprising the steps of: identifying each multipoint ECMP route associated with two endpoints using a multicast MAC address; and building a group MAC address by performing an operation on the values of the trunk identifier associated with the multipoint ECMP routes.EFFECT: increase the speed of data transfer.8 cl, 4 dwg, 3 tbl

ethod and device for configuration of providing solution in cloud protection computing architecture // 2641477
FIELD: information technology.SUBSTANCE: device for configuration of providing solutions protection in cloud computing architecture contains: reception module, executed with the ability to receive configuration request providing solution protection and transfer received configuration request providing solutions protection in the first definition module; the first definition module, made with the ability to define, according to the configuration request which provides solution protection, information on protection possibility and information on requirements to limit the protection of application object to be configured; and transfer certain information on protection possibility and information on requirements to limit the protection of application object to be configured in the second definition module; and the second definition module, made with the ability to define, according to the infrastructure information, information about infrastructure manager and information of application object in the installed base with information about the capabilities of protection, and information on protection possibility and information on requirements to limit the protection of application object to be configured that provides solution protection of application object to be configured.EFFECT: automatic selection of protection providing solution that provides flexibility and facilitates complete system management.12 cl, 7 dwg, 2 tbl

Device and method of queue management // 2641250
FIELD: information technology.SUBSTANCE: in this method: an approximate number of queue packets is received. The current dequeueing operation is performed on the packets. The approximate number of packets is stored within the queue management component and the approximate number of packets is used to indicate the state of the current number of packets in the queue; the number of times, that the dequeueing is allowed, is determined according to the approximate number of packets. The state of the current number of packets in the queue contains one of the following conditions: the approximate number of packets is 0, the approximate number of packets is equal to any number in the 1-N interval, and the approximate number of packets is greater than N, where N is the number of times the clock cycle, required for receiving the current number of packets in the queue, allows you to dequeue.EFFECT: reduction of the time required to determine whether the dequeueing is allowed again.6 cl, 6 dwg

Communication center, communication system, method of processing of packets and program // 2641232
FIELD: radio engineering, communication.SUBSTANCE: communication center includes a packet processing unit that handles packets adopted by recourse to the first table (s) that stores the record (s) that specifies the conditions of conformity, which compares accepted packets, and content processing, applied to packets that meet the criteria for conformity; and independent functional unit, which appealed to the second table (s) in which the event (s) associated with the change (s) to be applied to the record (s) saved in the first table (s), when detected attack event (s), and which rewrites the record (and) the first table (s) on the basis of the coming event (s).EFFECT: providing the ability to allow a communication center in a centralised management network to modify the command issued by the control device without prompting the control device each time or without first placing an alternative fault record in the thread table for disaster recovery.7 cl, 11 dwg

ethod of registration and electronic mail message acknowledgement // 2641227
FIELD: radio engineering, communication.SUBSTANCE: method comprises the steps of: receiving an e-mail message sent by the sender by the incoming message server of the communication operator; checking incoming messages by the server, whether the sent e-mail contains the e-mail address to be certified; transmitting the message unchanged to the recipient; inserting and recording text and other elements of the e-mail message sent by the sender to the communication operator database; creation of the electronic receipt by the data processing unit containing at least the data of the recipient, the date of message retrieval, the date of the message receipt, its contents, the attached data and the notification of the message receipt without changes transmitted to the recipient user; imposition of a digital signature algorithm on an electronic receipt using an appropriate algorithm in the certification server to obtain a certificate; and passing the certificate to the sender through the outgoing message server.EFFECT: improved security of data transmission.13 cl, 3 dwg

ethod and device for network access // 2640748
FIELD: radio engineering, communication.SUBSTANCE: network access method includes: receiving in the first terminal connected to the network access information, instructing the second terminal to perform network access, the access information includes the service set identifier (SSID) and the password access; selecting a plurality of destination addresses including access information from the selected multicast address segment; and multicasting transmission of a plurality of multicast messages over a user datagram protocol (UDP) to the second terminal in accordance with a plurality of destination addresses. In this case, the selection of the plurality of destination addresses includes: performing a calculation for encrypting the access information according to the predetermined encryption algorithm, and obtaining a transmission cryptogram corresponding to the access information; and selecting a plurality of destination addresses including the transmission cryptogram from the selected multicast address segment according to the transmission cryptogram.EFFECT: increase the efficiency of network access.10 cl, 10 dwg

Efficient communication for devices of home network // 2640728
FIELD: radio engineering, communication.SUBSTANCE: network communication device is configured to: communicate with another network device using the second communication protocol. This other network device is configured to communicate with the service on the server through the first network using the first communication protocol; receive network configuration information from the noted other network device to enable the network communication device to join the first network; to communicate with the first network using the received information about the network configuration; and connect to the service through the first network using the first communication protocol.EFFECT: possibility of communication without the mandatory presence of a central node or hub and without the mandatory requirement that each network communication device is always switched on.20 cl, 70 dwg, 25 tbl

ethod of troubleshooting process, device and system based on virtualization of network functions // 2640724
FIELD: radio engineering, communication.SUBSTANCE: in the method, using the first functional entity, information about the malfunction of at least one second functional entity that provides the virtualized network service and the fault information of at least one NFVI are obtained; and, using the first functional entity, a fault correlation analysis is performed for the virtualized network service of at least one second functional entity and at least one NFVI that is made in accordance with the fault information of at least one second functional entity and information on the malfunction of at least one NFVI. The first functional object contains the network functions virtualization organizer, NFVO, or the virtualized network functions manager, VNFM.EFFECT: improved security of data transmission.12 cl, 6 dwg

ethod and device for web application control // 2640720
FIELD: radio engineering, communication.SUBSTANCE: method is performed by obtaining a marker of indication of web application on the open web page, a browser identifier and an universal resource locator URL of the web application, reception of the first instruction, which is used to display a list of recently opened applications, display a marker of indication of web application in the list of recently opened applications in accordance with the first instruction, and reception of the second instruction, that he user selects the web application according to the list of recently opened applications, and opening of the web application corresponding to the URL, in accordance with the second instruction using the browser corresponding to the identifier of the browser, to provide a possibility of quick launch of the web application.EFFECT: increase the efficiency of the reverse transition to a web application in the form of a web page.11 cl, 7 dwg

ethod for controlling overload and device // 2640643
FIELD: radio engineering, communication.SUBSTANCE: method comprises the stages for: determining a first overload indication information by means of a gateway device, wherein the first overload indication information is used to indicate an overload control policy, and sending the first overload indication information by the gateway device to a mobility management entity, so that the mobility management entity executes the overload control policy according to the first overload indication information, at that the method further comprises: sending information regarding the delay timer to the mobility management entity by means of the gateway device, so that the mobility management entity executes the overload control policy according to the first overload indication information before the delay timer expires.EFFECT: increased network fault resistance.11 cl, 29 dwg

ethod of selecting safe route in communication network of general use // 2640627
FIELD: radio engineering, communication.SUBSTANCE: in the method, the information about the structure of the communication network, the initial data on the nodes and subscribers of the network is preliminary set, a set of all possible routes for its transmission is formed, the malicious nodes of the communication network are identified, for that form control messages for every route and transmit them to the appropriate routes, receive service messages in response to the control messages, the routes containing the malicious nodes are removed from the set of message transmission routes, according to the received service messages use the safest route with the least number of nodes included in it for the transmission of the message or report about the absence of a safe route.EFFECT: increase the security of data transmission in the network.3 cl, 5 dwg

ethod of network protocol deep review for analysis and filtration of their contents // 2640295
FIELD: radio engineering, communication.SUBSTANCE: signals are decoded into a sequence of bytes representing, on a logical level, a set of incoming network packets that are written and stored in the memory of the first and second network interfaces, each of the network interfaces has a control register and two memory areas, one memory area of each interface is for buffering of incoming packets, and the second memory area of each interface is designed for outgoing packets stored before they are encoded into a signal and sent to the transmission medium, control registers and memory areas of each interface are displayed in the computer main memory, which serves as a common memory for network interfaces and programs for deep review of traffic; at the software level, packets are selected from the queues of incoming packets by analyzing the length of headers and the heading of level 7 and filtering them by deciding to skip the packet in the transmission medium or block its further transmission by sending commands through the control registers.EFFECT: increased speed of analysis and filtering the contents of network packets.4 cl, 3 dwg

Serial interface bus adapter of multiplex data-exchange channel // 2639959
FIELD: physics.SUBSTANCE: adapter is proposed that contains a PCI-E bus and an AXI bus connected via an AXI-PCI-E bridge, as well as 4 to 8 bus channels of a serial interface bus with centralized control, each of which is configured to act simultaneously as a controller bus, terminal and bus monitor.EFFECT: use of a high-speed PCI-E interface for data exchange with the control microprocessor and the memory containing jobs allows the user to flexibly change the operating schedule without interrupting the exchange via the multiplex channel, while control and initialization of the device is done by writing to internal control registers and also can occur without interrupting operation.1 dwg

Equipment, method and software computer tool for data transfer with reduced power consumption during connection inactivity time // 2639957
FIELD: radio engineering, communication.SUBSTANCE: equipment for controlling the transfer of data through a network connection. The mentioned equipment is configured to switch the network controller to an energy-saving mode by interrupting the power supply to the output of the network controller, and to generate and deliver mutated signals of activation of connection on the network connection when no data have to be transferred through the network connection.EFFECT: increase the speed of data transfer.14 cl, 3 dwg
ethod and system of update of dialog selection in communication line aggregation // 2639692
FIELD: radio engineering, communication.SUBSTANCE: verification of the fact that the implementation of line aggregation control protocol (LACP), which depends on the dialogs, is valid on the network device of the network for the aggregation port. Then, it is determined that the operations using the improved line aggregation protocol data units (LAGPDUs) are possible. Improved LACPDU can be used to update information on the selection of the dialogs, and the definition is based, in part at least, on verifying the compatibility between the first set of operating parameters of a network device and the second set of the operating parameters of the partner network device. Then the dialog selection state for the aggregation port of a line aggregation group is updated on the basis of a determination that the dialog selection state is incorrect where the dialog selection state specifies a list of dialogs transmitted through the aggregation port.EFFECT: increased bandwidth.27 cl, 22 dwg

Control method of mediators table in the wireless network, using the device-mediators // 2639688
FIELD: radio engineering, communication.SUBSTANCE: unit-mediator comprises facility to control the mediators table, the receiver for receiving the message from the first device with limited resources. The mentioned message is addressed to at least one corresponding destination device, the control facility to check whether the entry for the first limited resource device is included in the set of entries in the mediator table. The set of entries in the mediator table indicates the set of devices with limited resources, that are supervised by the unit-mediator, the transmitter for message redirection, depending on the result of the mediators table check, the mediators table control facility configured to clear the mediators table.EFFECT: protocol elements adding, that can be used to improve the heuristic of the table clearing on the mediators, which leads to the increase of communication network speed and efficiency.12 cl, 1 dwg

System information signaling to tts-devices // 2639660
FIELD: radio engineering, communication.SUBSTANCE: disclosed the method of the system information updating, executed by the network node in the wireless communication system, at that the method includes the steps, where provide: sending the system information (SI) to one or more user equipment elements (UEs), wherein the mentioned SI contains the plurality of alternative sets, wherein each set assigns the different values to one or plurality of radio communication system parameters; assigning: to prohibit the access to user equipment elements (UE) from the first UE group and to allow the access to user equipment elements (UEs) from the second group; determining the set of the alternative sets plurality to be applied to UE from the mentioned first group of UEs to prohibit the network access of the mentioned UE from the first group; transmitting the SI selection signal to the mentioned UE from the mentioned first group, wherein the SI selection signal indicates the mentioned specific set to be applied by the mentioned UEs, and thereby provide the application of radio communication system parameters from the mentioned specific set by the mentioned UE.EFFECT: system information updating in the wireless communication system with the ability to rapidly disconnect the part of the user equipment from the network.14 cl, 8 dwg

ethod of installing uninterrupted communication connection and communication device // 2638880
FIELD: radio engineering, communication.SUBSTANCE: sets the first communication connection between the first and second communication device in accordance with the transmission control protocol using the first address of the communication network associated with the first communication device. The monitoring unit, coupled with the first communication device, checks whether the second address of the communication network is valid based on the name resolution protocol. The monitoring unit, upon coupling the second valid communication network address and with the existing first communication connection, initiates the establishment of the second communication connection between the transport and switching functional unit interfaced with the first and second communication device. The transport and switching functional unit establishes the second connection using the second address of the communication network associated with the first communication device. The first communication connection, with a successful second connection, is cancelled.EFFECT: no interruption of communication.18 cl, 1 dwg

ethod for remote controlling household appliance operation, portable end communication device and computer software product // 2638755
FIELD: physics.SUBSTANCE: method for remote controlling the household appliance operation is proposed, in which: the data on the household appliance state are received by means of a communication end device; the current operating mode and control of the display device are recorded to display the graphical user interface. The issuance of information on the current operating mode includes the provision in the user interface of a graphical image describing the current operating mode, and for developing the graphic image, the distinguishing features between the current operating mode and the reference state of the home appliance are set, and the base image in which the home appliance is displayed in the reference state, at least, one overlaid image is superimposed, which illustrates the differing characteristics and which, interacting with the base image, displays the household appliance in the current operating mode.EFFECT: increasing the accuracy of determining the current operating mode of the household appliance.9 cl, 5 dwg

Power control of electric system of lighting // 2638749
FIELD: electricity.SUBSTANCE: network switch is disclosed to control the power supply to the network device. The switch contains: a set of ports; and a processor configured to control the mentioned switch in such a manner that the mentioned switch supplies power to the device after receiving a signal intended for the device, continues to supply the power to the device until serial signals from the device are received for a period less than a predetermined shutdown period, and stops to supply the power to the device if otherwise.EFFECT: control the power supply to the device.12 cl, 5 dwg

Contact wire network for communication between fixed parts of system and at least one moving part of system // 2638739
FIELD: radio engineering, communication.SUBSTANCE: system comprises: a plurality of contact wire segments, a plurality of voltage sources, a plurality of data transmission devices, and a plurality of communication elements. Each data transmission device has one reception range, this reception range is displayed to a section that is obtained from the length of the segment of the contact wires plus the first overlap length and the second overlap length. The data transmission device connected to the corresponding segment of the contact wires is configured in such a way that the information signal level it provides is so aligned to the corresponding reception range that, due to the attenuation of the level caused by the line attenuation along the conductors and communication elements, this level in the receiving device of the moving part of the system that is outside the specified reception range, can not be evaluated as a valid signal.EFFECT: ensuring higher speed of data transmission.14 cl, 3 dwg

System and method of creating service chains and virtual networks in cloud // 2638733
FIELD: information technology.SUBSTANCE: method of creating virtual networks executed by a cloud component, comprises: a network diagram of the virtual network is received using the graphical user interface. The network diagram contains elements each representing a network component; the correctness of the network diagram is validated; after a successful validation of the network diagram, a network diagram is compiled into calls of the application programming interface (API); the API calls are performed and, using the executed API calls, the virtual network is set in accordance with the network diagram. The virtual network contains the virtual network components that correspond to the elements of the network diagram.EFFECT: creation of virtual networks.20 cl, 5 dwg

Identification of loaded applications, compatible with base // 2637880
FIELD: information technology.SUBSTANCE: method is performed by defining function provided by the main program on the client computer, sending an application search request and a list of specified defined functions to the server, the list of said defined functions is not a list of programs or an application list, receiving a list of applications available from the server that may be used in the basic mode of operation, with one or more of the specified functions, presenting the application list, receiving from the user of application selection from this list, sending this selection to the server, receiving the selected application, and activating the received application using the main program.EFFECT: ensuring the operation of client computer, through which the application is received from the server for use with the main program on client computer.19 cl, 8 dwg

Communication system, communication equipment and communication control method // 2637471
FIELD: radio engineering, communication.SUBSTANCE: communication system includes the communication equipment wirelessly connected to terminals, and the network, that contains: the address translation table, configured to unload traffic from the terminal to the network. The address translation table includes the source ports, associated with the terminals respectively; and the source translation facility for translating the source port in the address translation table for each radio bearer by allocating the predetermined source port ranges to various radio bearers. The radio bearer is set between the terminal, which is the traffic source, and the communication equipment.EFFECT: provision of the ability to introduce the unloading traffic function into the communication system.15 cl, 12 dwg

ethod, device and system of implementing video conferencing calls based on unified communication // 2637469
FIELD: physics.SUBSTANCE: videoconference subsystem based on unified communication (UC) is proposed. The subsystem comprises a videoconference terminal VCT including a video signal processing module and a call control module, and connected to the network, the call control module being connected to the video signal processing module, the subsystem further comprising a central PC, a UC client, and a user input device. The UC client is installed on the central PC, the central PC is connected to the network, the VCT is connected to the central PC, the UC client includes a VCT application module and a UC-VCT communication module, and the VCT includes a VCT-UC communication module.EFFECT: improving the results of video conferencing calls.16 cl, 15 dwg

ethod, device and system for obtaining access to network // 2637466
FIELD: information technology.SUBSTANCE: method includes the steps of obtaining a request for access to the network, which is transmitted by the first communication device; Determine the current status of the network access device; sending a request to switch the state to the terminal, if the network access device is currently in the denied access to the devices. Terminal with the ability to compose the response message based on the switch request condition; receive response message sent by the Terminal; and switching network access devices in the State of the permission for access to devices based on the reply message.EFFECT: simplify the process of gaining access to the network.14 cl, 20 dwg, 2 tbl

ethod and system for protection of virtual network image and computer data media // 2637419
FIELD: information technology.SUBSTANCE: method for protection of a virtual network image includes: editing and definition, by the application level, at least one subnetwork model based on a query for editing the network; building, by the network virtualization level, at least one subnetwork model in accordance with at least one said edited and defined subnetwork model and integrating that at least one built subnetwork model in the global representation of the network, when the global network representation contains at least one protection policy and at least one objective of optimizing image for at least one subnetwork model in order to create spare copies; and displaying, by the controller level, at least one subnetwork model contained in the global representation network, respectively in the operating network of devices and backup network of devices, according to said at least one security policy and at least one image optimisation objective for at least one subnetwork model and when the operating network of devices shows failures, the specified conditions are satisfied, and the backup network of devices shows no failures, switching the operating image of the corresponding network from the operating network of devices to the backup network of devices.EFFECT: protection of virtual network image.11 cl, 8 dwg

ethod for eliminating vulnerabilities of devices having access to internet // 2636700
FIELD: information technology.SUBSTANCE: method for eliminating the vulnerabilities contains the following steps: define a router which provides access to the network; get access to the Wi-Fi network of the router; identify at least one "smart" thing which is connected to the Wi-Fi network of the router; get the settings of the "smart" thing. Getting the settings is produced from the web-interface of the "smart" thing using crawler for parsing elements of the web-pages of the web-interface according to the DOM-model; produce an analysis of the received settings on the vulnerability. The analysis includes comparing the received settings with settings with known vulnerabilities; form actions to eliminate certain vulnerabilities, while actions include changes in the web-interface; perform the generated actions on the "smart" thing to eliminate vulnerabilities.EFFECT: ensuring the information security of devices which have access to the Internet.7 dwg

Automatic establishment of redundant paths with careful restoration in packet switching network // 2636689
FIELD: radio engineering, communication.SUBSTANCE: path management method includes stages for receiving a type-length-value (TLV) of an explicit path (EP) through a routing protocol based on communication channel state, the shortest path search algorithm is executed to obtain the shortest path for free path links, wherein this shortest path becomes the primary path, and the network graph is updated to cut-off the links of the primary path or to deflect the links of the primary path, and the reserve path is calculated using the algorithm of the shortest path search on the updated network graph.EFFECT: maintaining automatic establishment of redundant paths and recovery in the packet switched network.30 cl, 20 dwg

ethod and device for data sharing // 2636687
FIELD: radio engineering, communication.SUBSTANCE: method for sharing data in a DLNA-device in which a DLNA-server is provided comprises the stages, where: a first connection event of the mobile data storage device to the DLNA-device is monitored and detected; a mounting route of the mobile data storage device to a configuration document of the DLNA server is added to detect the first event and the DLNA server is initiated to read the mounting route from the configuration document, to make the data stored in the directory corresponding to the mounting route in a mobile data storage device suitable for sharing with at least one DLNA-client; and sharing data use with at least one DLNA-client according to the mounting route through the DLNA-server.EFFECT: provided data sharing in the mobile device in the DLNA system and improved sharing characteristics of the DLNA system.9 cl, 5 dwg

ethod and device for thread-specific multimedia data translation // 2636678
FIELD: radio engineering, communication.SUBSTANCE: method comprises: obtaining the translation address of the intelligent camera by the first terminal, the translation address corresponds to the thread-specific multimedia data collected by the intelligent camera; display of the list of translating devices by the first terminal in which such list includes information about the device of at least one terminal and at least one terminal has the function of translating the thread-specific multimedia data; sending the translation address to the second terminal if the first terminal receives the command to select the second terminal, whereby the second terminal receives the thread-specific multimedia data based on the translation address and converts the thread-specific multimedia data into an image for translation, wherein the second terminal is any terminal of at least one terminal, characterized in that obtaining the translation address of the intelligent camera by the first terminal comprises: obtaining information about the address of the intelligent camera by the first terminal; and formation of the translation address by the first terminal according to the specified format, based on the address information.EFFECT: increase the speed of data transfer.12 cl, 9 dwg, 1 tbl

ethod of multipath routing using data traffic flow splitting // 2636665
FIELD: information technology.SUBSTANCE: method comprises of the steps of receiving the traffic data flow by an intermediate system, calculating two or more reliable routes in the communication network, using the Dijkstra algorithm composition, constructing a truncated event tree, filling in the routing tables for two or more reliable nodes in order of decreasing their reliability, forming a vector of the values of data traffic flow splitting into two or more subflows, taking into account the computed reliable routes of the communication network, the capacity of the communication channels, the loading of communication channels, splitting in the intermediate system each flow into two or more subflows, routing protocol data units or bytes of each, recombining in the intermediate system each data traffic flow, transmitting data traffic flows from the intermediate system in the end system of the recipient.EFFECT: increase in reliability of communication.2 tbl, 4 dwg

Protection method of virtual private communication networks elements from ddos-attacks // 2636640
FIELD: radio engineering, communication.SUBSTANCE: method according to which create the parameters, changing statistic models of the virtual network subscribers from the white list of IP-addresses network traffic, describe the values of the abnormal behaviour parameters of subscribers from the white list of IP-addresses, during the virtual private network element is operating provide the monitoring of the subscribers abnormal behaviour, if the abnormal behaviour is detected then check the timestamps, the cryptographic hashing function, if the subscriber has not confirmed its legitimacy, the connection is broken and the reconnection is carried out, in case of the IP-address absence in the "White" and "Black" lists, the content of the received packet is filtered according to the specified filtering rules, if it detects and confirms the signs of the DDoS attacks start, simulate its effect on the virtual private network element, if the virtual private network element parameter values of the confirmed DDoS attack as a result of simulation are below the required ones, the received network traffic from the virtual private network users, that are not in the white list is redirected to the clearing centres.EFFECT: protection of virtual communication networks elements from DDoS-attacks.6 dwg
ethod and hardware for processing interaction between devices // 2636122
FIELD: information technology.SUBSTANCE: method includes: receiving an interaction initiation message sent from the first device belonging to the gateway and including identification of the first device; searching for the interaction execution message of the second device corresponding to the interaction initiation message from the previously stored communication linking message according to the identification of the first device. The second device belongs to the gateway, and the communication linking message includes the interaction logic between the first device and the second device; sending the interaction execution message to the second device. The second device is configured to act according to the interaction execution message.EFFECT: reducing server load, improving the performance of the interaction logic between devices and eliminating the problem of low response speed or no response.24 cl, 15 dwg

ethod for providing naming service inside industrial automation system and communication device // 2636113
FIELD: radio engineering, communication.SUBSTANCE: method for providing a naming service inside an industrial automation system is proposed. In the proposed method, the communication devices of the industrial automation system through the naming service component verify whether the device name is associated with the corresponding communication device with a topological and/or hierarchical component of the name which essentially completely indicates the spatial or hierarchical arrangement of the corresponding communication device. If the check result is positive, the communication devices use their associated device names as full device names. If the check result is negative, the communication devices automatically generate their full device names from the topological and / or hierarchical components of the name, distributed via messages with router notifications, as well as the component of the name unambiguous within their respective partial network.EFFECT: extended range of technical facilities for providing a naming service inside an industrial automation system.14 cl, 4 dwg

Object of interface management service, function service object and method of control of elements // 2636112
FIELD: radio engineering, communication.SUBSTANCE: device comprises: a south interface module configured with the possibility to receive the device management service request message sent by the network element and obtain a network standard identifier which corresponds to the network element and is transferred in the device management service request message; and a function adaptation module configured with the possibility to: perform the protocol conversion on the device management service request message in accordance with the protocol format corresponding to the network standard identifier; send, according to the type of service carried in the device management service request message received after the protocol conversion, the device management service request message to the service function object; and receive a reply message to the service request which is formed in accordance with the device management service request message and is sent by the service function object. The south interface module is further configured with the possibility to send a response message to the service request to the network element.EFFECT: high data transmission speed.15 cl, 15 dwg

ethod (versions) and client device for processing and displaying electronic letters // 2635906
FIELD: information technology.SUBSTANCE: group message item is created by the client device, and the group message item is associated with a group of emails in a variety of emails, the creation of the group message item includes determining by the client device that each email in the group of emails is associated with a group message item based on the grouping parameter. An element of an individual message is created by the client device. The individual message item is associated with an individual email in a variety of e-mail messages, and the creation of an individual message item includes the determination by the client device that an individual email is not associated with a group message item based on the grouping parameter in the personalized e-mail data. The client device displays a group message item and an individual message item at the same time so that the group message item is visually distinguished from the individual message item.EFFECT: increasing the speed of processing e-mails.20 cl, 15 dwg

ethod and device for creating group, method and device to exit group // 2635889
FIELD: information technology.SUBSTANCE: exit request is accepted to exit the target group that contains a target group identifier. The subgroup identifier associated with the group identifier is searched for, with the subgroup members that corresponds to the desired subgroup identifier, constitute a subset of the target group members. The appropriate list of the target group members is searched for according to the group identifier. It is determined, whether the group member that submitted the exit request is a creator of the target group. If it is determined that the group member that submitted the exit request is a creator of the target group, this target group and the subgroup associated with this target group is deleted. If it is determined that the group member that submitted the exit request is not a creator of the target group, the group member that submitted the exit request is deleted from the list of the target group members. An appropriate list of the subgroup members is searched for according to the identified subgroup identifier. The group member is deleted from the found list of the subgroup members.EFFECT: reducing the consumption of server resources by reducing the number of the group members.8 cl, 25 dwg
 
2550942.
Up!