Patent classifications
H04L61/00
Network function service discovery method and device
Embodiments of this application provide a network function service discovery method and a device. The method performed by an NRF includes: after establishing a communication connection to the NF, obtaining a digital certificate of the NF in a TLS or DTLS two-way authentication process, where the digital certificate of the NF carries a service name of the NF, a service name list on which the NF relies, and a service name list that relies on the NF; receiving a query request for querying an address of a target service that is sent by the NF, where the query request carries a complete domain name of the target service; and performing verification based on the service name of the target service and the digital certificate of the NF, and sending the address of the target service to the NF when the verification succeeds. Therefore, the NF services are discovered.
Link system, link program, and link method
A client accepts operation information for operating a circuit design CAD tool. The client transmits the accepted operation information to an application server. The application server receives the transmitted operation information. The application server generates a result screen representing a result of operating an implementation design CAD tool according to the received operation information. The application server transmits the generated result screen to the client.
BRIDGE PORT EXTENDER
Example implementations relate to a bridge port extender. For example, a bridge port extender may include a processor. The processor may receive an Ethernet frame from a network bridge, where the Ethernet frame includes an encapsulated portion and an unencapsulated portion, and where the unencapsulated portion includes an E-tag. The processor may remove the E-tag from the unencapsulated portion to form a modified Ethernet frame. The processor may transmit the modified Ethernet frame to a client device based on the E-tag.
NAME-BASED ROUTING SYSTEM AND METHOD
An advanced routing system and protocol (referred to herein as “Route Exchange” or “REX”) hides familiar IPv4 and IPv6 addresses and replaces traditional routing logic with words and relationships between named elements. Among other things, this makes IP routing tables significantly easier to understand. In addition, a single routing scheme can be used for any combination of private networks, public networks, IPv4 addressing models, and IPv6 addressing models. Underneath the words lie real IP addresses that move the packets from place to place. These routing addresses abstract away the underlying network.
Techniques to support multiple interconnect protocols for a common set of interconnect connectors
Embodiments may be generally direct to apparatuses, systems, method, and techniques to determine a configuration for a plurality of connectors, the configuration to associate a first interconnect protocol with a first subset of the plurality of connectors and a second interconnect protocol with a second subset of the plurality of connectors, the first interconnect protocol and the second interconnect protocol are different interconnect protocols and each comprising one of a serial link protocol, a coherent link protocol, and an accelerator link protocol, cause processing of data for communication via the first subset of the plurality of connectors in accordance with the first interconnect protocol, and cause processing of data for communication via the second subset of the plurality of connector in accordance with the second interconnect protocol.
Cloud device and method for network device discovering
A network device discovery method receives registration information from the network devices which are registered to the cloud device, and generates a management list for recording the registration information and a management status of each of the registered network devices. When a request of searching for specified network devices of a specified network manager from a specified client device is received, the discovery method retrieves specified network devices managed by the specified network manager from the management list. The discovery method further searches for target network devices which have the same public Internet Protocol (IP) addresses with the specified network devices, and presents one or more target network devices which have not been managed by any network manager to the specified client device for the specified network manager.
Message routing
Methods, devices, signals, and systems are provided in a message routing architecture which provides improved capabilities for integrating “digital” communication through email messages with “analog” communication through voice and/or fax or pager messages. Email can be addressed using nothing more than a standard telephone or fax number. If the registered owner of the telephone or fax number has a corresponding email address, then the invention converts the telephone or fax number to the email address for delivery and uses standard email delivery systems to deliver the message. If no conventional delivery email address is known, or if the message sender or recipient specify multiple delivery modes, then the email message content is transformed into voice, pager and/or fax content and delivered to the recipient using the telephone or fax number which was specified as the email address. Familiar telecommunications services such as call forwarding and selective call blocking can also be used with messages that originate as email. The invention also supports use of telecommunications numbers as indexes into databases which contain public key certificates, to make it unnecessary for a proposed message recipient to provide its public key expressly in advance to each particular proposed message originator.
Transmission apparatus, transmission method, computer-readable storage medium storing transmission program, and relay system
Disclosed is a transmission apparatus or the like that is able to transmit information efficiently. The transmission apparatus, on the basis of history information which includes a service identifier and a message identifier associated therewith, transmits a difference between a third message having a large similarity ratio to a second message included in a specific service and the second message, and a message identifier identifying the second message via a communication network.
Voice and text group chat display management techniques for wireless mobile terminals
A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for all of chat threads currently engaged in by a given mobile terminal. Additionally, a buddy list display supports management of chat buddies, a detail view display allows otherwise truncated messages to be displayed, and a text message editor display supports the composition of text messages. Each chat user may designate public display identifiers for purposes of identification to other chat users. Additionally, each user may designate private display identifiers for each of his/her buddies, which private display identifiers may be used to replace the public display identifiers for that user's buddies when displayed on the user's mobile terminal. In this manner, the use of speech and text based group chatting and similar services in wireless communication environments is more readily enabled.
Voice and text group chat display management techniques for wireless mobile terminals
A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for all of chat threads currently engaged in by a given mobile terminal. Additionally, a buddy list display supports management of chat buddies, a detail view display allows otherwise truncated messages to be displayed, and a text message editor display supports the composition of text messages. Each chat user may designate public display identifiers for purposes of identification to other chat users. Additionally, each user may designate private display identifiers for each of his/her buddies, which private display identifiers may be used to replace the public display identifiers for that user's buddies when displayed on the user's mobile terminal. In this manner, the use of speech and text based group chatting and similar services in wireless communication environments is more readily enabled.