Patent classifications
H04L63/00
ADAPTING CONNECTIONS OF A LAYERED NETWORK
A computer-implemented method for adapting connections between nodes of a layered network. The layered network comprises a plurality of nodes arranged in an ordered set of layers. The ordered set of layers comprises, in order, a core layer comprising a set of core nodes, a second layer comprising a set of second nodes, and one or more outer layers each comprising a respective set of outer nodes. Each core node is connected to at least one other core node. The method is performed by an adapting node, the adapting node being a node of the layered network that is connected to one or more second nodes and multiple core nodes. The method comprises, based on one or more network properties of the layered network, disabling a respective connection between the adapting node and at least one but not all of the multiple core nodes.
Protocol-independent multi-table packet routing using shared memory resource
A system and method for protocol independent multi-flow table routing includes a first flow table, a second flow table, and a shared hash table accessible by both the first flow table and the second flow table. Upon receipt of a packet, a first secure signature of a first lookup key is generated for the first flow table, and a second secure signature of a second lookup key is generated for the second flow table. The shared hash table stores both the first secure signature in association with a first value corresponding to the first secure signature, and the second secure signature along with a second value corresponding to the second secure signature. The first and second values indicate destination information for the packet.
MESSAGE ENCRYPTION METHOD AND ELECTRONIC DEVICE
An electronic device is provided. The electronic device includes a communication module, a memory, and a server processor operably connected to the communication module and the memory. The server processor acquires, from the first electronic device, a first message encrypted based on first security information about the second electronic device, so as to transmit the first message to the second electronic device, acquires, from the second electronic device, a decryption failure signal for the first message so as to transmit the decryption failure signal to the first electronic device, acquires, from the second electronic device, second security information about the second electronic device so as to transmit same to the first electronic device, receives, from the first electronic device, a second message encrypted based on the second security information, and can transmit the received second message to the second electronic device.
BIER OAM Detection Method, Device, and System
A bit index explicit replication (BIER) operations, administration, and maintenance (OAM) detection method includes a bit forwarding ingress router (BFIR) obtaining a detection request packet based on a first BIER OAM packet, and sending the detection request packet to at least one bit forwarding egress router BFER. The detection request packet includes a first packet and a first packet header. The first packet is a packet obtained by encapsulating the first BIER OAM packet. The first packet header includes a bit string, and the bit string indicates the at least one bit forwarding egress router BFER that is to be measured.
Hybrid data architecture for use within a cognitive environment
A method for receiving a plurality of types of data within a cognitive information processing system environment comprising: receiving data from a plurality of data sources, the plurality of data sources comprising a public data source and a private data source; accessing information from the plurality of data sources via a cognitive data management module; and, providing the information to an inference and learning system.
METHOD AND DEVICE FOR PROVIDING BLOCKCHAIN DID-BASED CERTIFICATE DISTRIBUTION SERVICE
The present disclosure relates to a method and a device for providing a blockchain DID-based certificate distribution service, whereby a certificate can be combined with a form and thereby used as a certificate to be submitted, to an individual or a corporation, for a specific order of business.
Drop-in probe that facilitates management and configuration of internet of things network connected devices
Management and configuration of internet of things network connected devices is facilitated herein. A proxy device comprises a memory that stores executable instructions that, when executed by a processor, facilitate performance of operations that comprise determining a first identity and a first operational parameter of a first device and a second identity and a second operational parameter of a second device. The first device and the second device can be associated with a defined communication network. The proxy device can be provisioned within the defined communication network and can operate as a security update proxy node for the first device and the second device. The operations can also comprise facilitating a first security update at the first device and a second security update at the second device based on a determination that the first device and the second device have delegated responsibility for security synchronization to the proxy device.
Systems and methods for providing individualized communication service
A method for providing individualized communication service includes (1) recognizing a first client being communicatively coupled to a first local communication network, (2) determining an identity of the first client, (3) transporting first data between the first client and a first operator communication network, using the first local communication network in accordance with a first service profile associated with the first client, and (4) transporting the first data using the first operator communication network in accordance with the first service profile.
METHOD AND APPARATUS FOR SUPPORTING SERVICE CONTINUITY POLICY CONTROL
A method performed by a first entity corresponding to an edge enabler client (EEC) in an edge computing system is provided. The method includes transmitting, to a second entity corresponding to an edge enabler server (EES), a registration request message; and receiving, from the second entity, a registration response message, wherein the registration request message includes capability information to perform service continuity planning, and wherein the registration response message includes information on allowing the service continuity planning of the first entity.
LOCAL AREA NETWORK (LAN) DEVICE PRIVACY
Aspects of the present disclosure relate to wireless communications, and more particularly, to techniques for increasing local area network (LAN) device privacy. One aspect provides a method for wireless communications at an access point (AP). The method generally includes: determining a mapping between a first distribution system (DS) medium access control (MAC) address and a second DS MAC address; obtaining, from a source access terminal, a frame having the second DS MAC address; and sending at least a portion of the frame to a target access terminal based on the mapping between the first MAC address and the second MAC address.