H04L41/00

OTA System Software Upgrade Control Method and Terminal Device
20230021634 · 2023-01-26 ·

In an embodiment an over the air (OTA )system software upgrade control method includes accessing, by a terminal device, an OTA server, and obtaining version information of a target system software upgrade package that is on the OTA server and whose version is later than a current system software version of the terminal device, requesting, by the terminal device, from a management device, authorization information corresponding to the version information of the target system software upgrade package, determining, by the terminal device in response to the authorization information that is received from the management device and that corresponds to the version information of the target system software upgrade package, that the target system software upgrade package is obtainable from the OTA server, and obtaining the target system software upgrade package from the OTA server, wherein the authorization information indicates whether the terminal device is allowed to obtain the target system software upgrade package from the OTA server.

NETWORK MANAGEMENT APPARATUS, METHOD, AND PROGRAM

A network management apparatus according to an embodiment includes: a storage device configured to store information indicating a correspondence relationship between information objects related to a logical layer, information objects related to a physical layer in a network configuration, and information objects related to a facility layer which are objects in which the information objects related to the physical layer are housed; an acquisition unit configured to acquire an information object related to an occurrence path of a failure in the logical layer of the network configuration, from the storage device; and a search unit configured to search for, among the information objects related to the facility layer stored in the storage device, an information object related to the facility layer and the physical layer associated with the information object related to the occurrence path of the failure acquired from the acquisition unit, as a candidate for a facility that causes the failure.

Network Attack Detection Method and Apparatus
20230025946 · 2023-01-26 ·

A network attack detection method and apparatus is provided. The network protection device obtains first key data from received first network traffic, and matches the first key data with an attack signature in a signature database to obtain a first matching result; if the network protection device determines, based on the first matching result, that the first network traffic is aggressive, the network protection device obtains a target attack detection model based on the first network traffic, where the target attack detection model is used to identify one or more attack signatures that are different from the attack signature in the signature database; and when the network protection device receives second network traffic, the network protection device determines, based on the target attack detection model, whether the second network traffic is aggressive.

Receiver Circuit and Receiver Circuit Control Method

The present disclosure provides a receiver circuit and a receiver circuit control method. In the present disclosure, the input data is detected by a detection circuit to obtain a data rate detection result, and the bandwidth of the receiver is automatically adjusted according to the data rate detection result.

TELEMETRY SCHEME WITH A CONSTANT INSENSIBLE GROUP DELAY
20230022461 · 2023-01-26 · ·

Aspects of the subject technology relate to systems and methods for optimizing telemetry schemes with a constant insensible group delay. Systems and methods are provided for receiving an acquisition including compressed data and dummy data from a downhole logging system, determining a prior decompressor queue size based on the acquisition for a plurality of time intervals, determining a decompressor data size based on the acquisition for the plurality of time intervals, and determining a delay where the prior decompressor queue size is continuously greater than or equal to the decompressor data size for the plurality of time intervals.

METHOD FOR RECEIVING FIRMWARE AND METHOD FOR TRANSMITTING FIRMWARE

A method includes (a) receiving i-th data among first to n-th data transmitted in a multicast manner from a firmware providing apparatus, (b) acquiring partitioning information thereof, a MAC chaining value, length information, i-th firmware data, and MAC from the i-th data, (c) authenticating the MAC chaining value of the i-th firmware data, the length information, and the i-th firmware data by comparing a MAC of the i-th firmware data with a value computed by a first MAC generation algorithm, which uses the MAC chaining value of the i-th firmware data, the length information, and the i-th firmware data as a relevant input; (d) authenticating the order of the i-th firmware data by using the MAC chaining value of the i-th firmware data and a second MAC generation algorithm; and (e) obtaining the firmware by combining a first to an n-th firmware data obtained by executing (a) to (d).

Computer Technology For Security Enforcement During Edge Computations
20230231765 · 2023-07-20 ·

Computer technology that each edge computing device has appropriate security software, and associated configuration thereof, to be included in edge computing system deployment having a predetermined security level. The types of security software may include encryption/decryption software, encryption/decryption key handling software and/or security load sharing software. The edge computing devices may include unmanned aerial vehicles and/or other unmanned transport vehicles (for example, wheeled ground vehicles) to transport the respective edge computing devices into physical proximity with the client device that will be using the edge computing system deployment.

DYNAMIC ALLOCATION OF NETWORK RESOURCES USING EXTERNAL INPUTS
20230231814 · 2023-07-20 ·

Systems and methods for managing network resources are disclosed. One method can comprise receiving first information relating to network traffic parameters and receiving second information relating to one or more contextual events having an effect on the network traffic parameters. The first information and the second information and be correlated. And one or more network resources can be allocated based on the correlation of the first information and the second information.

DYNAMIC ALLOCATION OF NETWORK RESOURCES USING EXTERNAL INPUTS
20230231814 · 2023-07-20 ·

Systems and methods for managing network resources are disclosed. One method can comprise receiving first information relating to network traffic parameters and receiving second information relating to one or more contextual events having an effect on the network traffic parameters. The first information and the second information and be correlated. And one or more network resources can be allocated based on the correlation of the first information and the second information.

Network data extraction parser-model in SDN

A parser model may be used with software-defined applications or controllers. A network topology may be detected and based on the change in the network topology, a network device may filter certain network data traffic for processing by a software-defined network controller.