Patent classifications
H04L63/00
Modularized control system to enable IoT wireless network control and sensing of other devices
Internet of Things (IoT) system and method of interfacing arbitrary non-network connected devices to wireless computer networks. The invention provides a configurable wireless communications module, in either fixed or removable formats, with wireless (e.g. WiFi) network connectivity. The invention uses at least one internal processor, which is configured to operate as a sandbox or virtual machine manner to isolate the code used to operate the arbitrary non-network connected device from the code used to operate the communications module.
METHOD AND CORRESPONDING TELECOMMUNICATION NETWORK FOR SECURE DATA TRANSMISSIONS BASED ON GRAPH DATABASE
A method of communication between nodes in a telecommunications network. Each node maintains a copy of a shared digital ledger, is identified by a respective identification code and implements a software application configured to manage the transmission of data packets and maintain the shared digital ledger. The method includes: memorizing a list of identification codes, each code identifying a respective node included in a subset of nodes of the network, identifying a receiver node to transmit the data packet, generating a data packet to be delivered to a recipient node, transmitting to the first node of the minimum sequence of nodes the data packet, issuing a request to the network nodes to record the data packet transmission in the distributed ledger, and when a data packet is received, the method requires that each receiver node, other than the recipient node of the data packet, repeats at least some steps.
CONTROL METHOD, CONTROL APPARATUS AND CLOUD-BASED CONTROL SYSTEM
The disclosure provides a control method, a control apparatus and a cloud-based control system, and belongs to the technical field of cloud-based control. The control method includes: receiving first identification information sent by a client, wherein the first identification information comprises a first identifier and first position information of a device to be controlled; verifying whether the first identifier corresponds to the first position information; if the first identifier corresponds to the first position information, sending a verification requirement to the client, wherein the verification requirement is used for requesting a user to control the device to be controlled at a position of the device to be controlled; receiving a control instruction for the device to be controlled sent by a current control device; determining, according to the verification requirement and the control instruction, whether the client has control permission to the device to be controlled; if the client has the control permission, receiving a remote control instruction sent by the client, and controlling the device to be controlled through the current control device.
STORING AND RETRIEVING DATA ASSOCIATED WITH AN ASSET
Some embodiments of the present disclosure relate to a computer implemented method of storing data associated with an asset on a blockchain. Other embodiments relate to a computer implemented method of retrieving data associated with an asset that is stored on a blockchain. The methods are performed on a blockchain node of a blockchain network.
Training Method for Detection Model, System, Device, and Storage Medium
This application provides a training method for a detection model, a system, a device, and a storage medium, belongs to the field of network security technologies, and further relates to application of an AI technology in the field of network security technologies. Some embodiments of this application provide a method for training a detection model by using federated learning. In the method, a gateway device serves as a participant of federated learning, and a server aggregates model parameters and delivers shared malicious samples for the gateway device. When the gateway device performs model training, the gateway device exchanges information such as the model parameters and the shared samples with the server, to obtain a detection model through training.
BARE-METAL CONNECTION STORAGE METHOD AND SYSTEM, AND APPARATUS
A bare-metal connection storage method includes establishing a storage network, where the storage network includes a plurality of bare-metals, an access switch, a core switch, and a storage device. The plurality of bare-metals are coupled to the access switch, the access switch is coupled to the core switch, and the core switch is coupled to the storage device. The method configures the storage network, so that each of the plurality of bare-metals is coupled to the storage device.
SECURE COMMUNICATION METHOD AND APPARATUS IN PASSIVE OPTICAL NETWORK
The present disclosure provides methods for secure communication. In an example method, an optical line terminal (OLT) sends a first message to an optical network unit (ONU), where the first message includes a first key algorithm, a certificate of the OLT, and a public key of the OLT, and the first key algorithm is a key algorithm supported by both the OLT and the ONU. The ONU verifies the certificate of the OLT, and after the verification succeeds, the ONU determines a shared key based on the first key algorithm and the public key of the OLT. The ONU sends a second message to the OLT, where the second message includes a certificate of the ONU and a public key of the ONU. The OLT verifies the certificate of the ONU. After the verification succeeds, the OLT determines the shared key based on the first key algorithm and the public key of the ONU.
Method for configuring operating time period for mailbox content and instant messaging content in system
A method for setting an operation time range of mailbox content and instant messaging content in a system is disclosed in the present invention, wherein a method for setting an operation time of mailbox content includes: selecting a role, a user or an employee as a mailbox user; setting a permission time range for each mailbox user, wherein said permission time range includes one or more of the following types: a time range from a time point, which is determined by going backwards from a current time for a fixed time length, to the current time, a time range from a start time to a current time, a time range from a deadline to a system initial time, and a time range from a start time to a deadline; and the content within the permission time range of the mailbox user in a mailbox account used by the mailbox user being operated by said mailbox user. In the present invention, by setting a permission time range, only the content set within the permission time range in the mailbox account or the instant messaging account can be operated, thus improving the security of data information in the mailbox account and the instant messaging account.
Alarm management system with blockchain technology
An alarm management system includes a control arrangement, an alarm device, a blockchain, a blockchain application, and a plurality of nodal access sites. The arrangement includes a processor and a storage medium. The device is configured to output an event signal to the control arrangement. The blockchain is stored in the medium, and includes a plurality of transaction types. Each transaction type includes at least one linked transaction, and the at least one linked transaction is time stamped. The blockchain application is stored in the medium, and is executed by the processor, and is configured to time stamp each one of the transactions. The blockchain is applied by the application to determine a current associated transaction with any one of the transaction types, and output data associated with the current transaction. The plurality of nodal access sites are configured to receive and output the data associated with the current transaction.
COMMUNICATION PROTOCOL FOR PROVIDING VIDEO CUSTOMIZED ALERTING TONEST BASED ON EARLY SESSION MODEL
The present disclosure provides an optimal method of delivering a called party's set video during a voice call connection to the calling party as video Customized Alerting Tones (CAT). More specifically, to generate a video call that delivers the video CAT in the form of early media from a voice call, the disclosure utilizes the early session model suggested by the 3GPP standard to provide a communication protocol for negotiating and establishing a session for the early media. Additionally, the present disclosure provides a method of performing exception handling in a communication protocol for video CAT delivery to ensure calling stability in abnormalities such as errors occurring in the codec negotiation process for video CAT in the network, server failure situations, and user equipment and server malfunctions.