Patent classifications
H04L63/00
MALICIOUS DNS SERVER DETECTION DEVICE AND CONTROL METHOD THEREOF
Disclosed is a malicious domain name system (DNS) server detecting method performed by a server detection device including transmitting at least one domain address thus pre-verified to at least one DNS server candidate, receiving at least one IP address associated with the transmitted at least one domain address from the at least one DNS server candidate, determining at least one verification target DNS server based on the received at least one IP address, and determining a malicious DNS server among the at least one verification target DNS server by comparing at least one normal IP address with the received at least one IP address.
Verifying the rendering of video content at client devices using trusted platform modules
Systems and methods for verifying the rendering of video content on information resources are provided herein. A server can transmit a video content element having a first bit stream corresponding to a predesignated frame to a client device. The client device can identify the first bit stream as corresponding to the predesignated frame. The client device can decode the first bit stream corresponding to the predesignated frame of the video content element to generate a second bit stream. The client device can transmit, to the server, a tracking message including the second bit stream. The server can compare the second bit stream included in the tracking message from the client device with a third bit stream maintained at a database. The server can determine that the video content element is rendered at the client device responsive to the second bit stream matching the third bit stream.
Client-directed placement of remotely-configured service instances
Methods and apparatus for client-directed placement of remotely configured service instances are described. One or more placement target options are selected for a client of a network-accessible service based on criteria such as service characteristics of the placement targets. The selected options, including a particular placement target that includes instance hosts configurable from remote control servers, are indicated programmatically to the client. A determination is made that a service instance is to be configured at the particular placement target on behalf of the client. A remote control server is configured to issue administrative commands to an instance host at the particular placement target to configure the service instance.
Synchronized Vault Management In A Distributed Storage Network
A method for execution by a distributed storage network begins by receiving a request to transfer a copy of a set of encoded data slices from at least some associated virtual storage vaults to a destination virtual storage vault and continues by determining whether the destination storage unit supports a source virtual storage vault of the at least some source virtual storage vaults. When the destination storage unit supports the source virtual storage vault the method continues by determining a sub-set of encoded data slices of the set of encoded data slices for transfer and finally, by facilitating sending the sub-set of encoded data slices to the destination storage unit.
COMPUTER-IMPLEMENTED METHOD FOR STORING DATA USING A DISTRIBUTED TRANSACTION DATABASE, COMPUTER PROGRAM PRODUCT, AND NETWORK
In a computer-implemented method for storing data in a network of linked computing units (10, 20, 30, 40, 50, 60) using a distributed transaction database (GDB), a distributed transaction database (GDB) in the form of a distributed graph database formed using nodes is used, and data is stored in at least one node (N) of the graph database, wherein the node (N) is stored using a real sub-quantity of the computing units (10, 20, 30, 40, 50, 60) of the network. The computer program product can be loaded directly into a storage device of an electronic computing unit (10, 20, 30, 40, 50, 60) and has program means in order to early out the steps of the method when the program is ran in a computing unit. The network of linked computing units (10, 20, 30, 40, 50, 60) stores a distributed transaction database (GDB) in the form of a distributed graph database comprising nodes (N) in which data is stored according to such a method.
INFORMATION ACQUISITION METHOD AND APPARATUS, STORAGE MEDIUM, AND ELECTRONIC APPARATUS
An information acquisition method and apparatus, a storage medium, and an electronic apparatus are provided. The method includes: a first network element obtains first acquisition information indication; the first network element determines acquisition indication information corresponding to the first network element according to the first acquisition information indication; and the first network element performs information acquisition and processing according to the acquisition indication information corresponding to the first network element. According to the solution, during the transmission of an information stream, the quality of service of the information stream is guaranteed on a transmission layer and a processing layer by virtue of the acquisition information indication, thereby solving the problems in the related art that an information transmission process is complex and it is difficult to guarantee latency and service quality, and achieving the effects that an information range that can be sensed in the communication system is expanded, the capability of information sensing in the communication system is enhanced, the implementation during the information transmission is simple, the quality of service can be highly guaranteed, and the solution is applicable to multiple kinds of network architectures.
Methods, devices, and computer programs for provisioning or controlling operator profiles in terminals
Methods are disclosed for provisioning and/or controlling operator profiles in terminals, each having an integrated circuit card identified by an integrated circuit card identifier. According to one aspect, a discovery server is configured with an authorization table including associations of integrated circuit card identifier, service provider identifier, and operator identifier(s). The discovery server receives, from a data preparation node, an event registration request that includes a number of elements. The discovery server determines whether the event is authorized. If so, the event is registered. This enables a terminal to seek to retrieve the event, to contact the data preparation node, and to eventually perform the profile operation. Some embodiments enable the network-initiated provisioning and/or controlling of operator profiles in machine-to-machine devices.
Quantum key distribution in a multi-cloud environment
In an approach to improve the field of multi-cloud environments by detecting data corruption between storage systems. Embodiments perform information tunneling on data transferring between a source storage system and a target storage system. Further, embodiments determine a checksum data of a data payload does not match an Internet Protocol (IP) packet extracted checksum and a blockchain based checksum and compare the checksum data at the target storage system with the IP packet extracted checksum and the blockchain based checksum to identify one or more checksum mismatches. Additionally, embodiments identify a corruption in a data payload based on the comparison between the checksum data at the target storage system and the IP packet extracted checksum and the blockchain based checksum, validate the corruption in the data payload, and update respective entities of identified corruption in the data payload.
PROVABLY FAIR GAMES USING A BLOCKCHAIN
A computer-implemented method of pseudo-randomly generating winning game elements for use in playing a game. An oracle obtains: a set of seed data items, the set of seed data items comprising one or more user seed data items; and a sequence of first public keys, each first public key representing a respective one of the set of first game elements. The oracle generates an output of a game transaction that comprises an output script. The script comprises the sequence of at least some of the first public keys, and wherein the output script is configured to, when executed, generate at least one pseudorandom number, the pseudorandom number being based on the set of seed data items, and to select a winning key, the winning public key being the public key at a position in the sequence of first public keys corresponding to the pseudorandom number.
INTERNET OF VEHICLE SERVICE ACTIVATION METHOD, AND COMPUTER DEVICE, AND STORAGE MEDIUM
An Internet of Vehicles service activation method comprises: receiving first vehicle information of a vehicle to be activated, which is sent by a mobile terminal; when the received first vehicle information is comprised in a vehicle information database, sending an activation request message to the mobile terminal and starting a countdown of a preset time period; when a vehicle-started event sent by a vehicle-mounted terminal is received before the end of the countdown, extracting, from the vehicle-started event, second vehicle information corresponding to the vehicle-mounted terminal; and when the first vehicle information is the same as the second vehicle information, activating an Internet of Vehicles service of the vehicle to be activated.