H04L9/40

DEPLOYMENT OF NETWORK-RELATED FEATURES OVER CLOUD NETWORKS

Briefly, methods and/or apparatuses of virtual deployment of network-related features are disclosed.

DISPLAY SYSTEM, DISPLAY METHOD, AND RECORDING MEDIUM
20230047138 · 2023-02-16 ·

In a display system according to the present disclosure, a server device includes an authentication processor that authenticates a user for use of a file, based on authentication information of the user input at a user terminal and an access information generator that generates first access information for accessing the file if the user is authenticated by the authentication processor for use of the file, and a display device includes a file acquirer that acquires the file from the server device, based on the first access information generated by the access information generator, and a display processor that displays the file acquired by the file acquirer, on the display.

IOT DRONE FLEET

Apparatus, systems, processes, and computer-readable mediums for facilitating the use of drones are described. For one embodiment, such a system includes a user element having a user application computer program configured to instruct a user interface device to facilitate use of user data and use of mission parameter(s) for a proposed drone mission. An owner element includes an owner application computer program configured to facilitate use of owner data and use of at least one drone parameter. A fleet system element is communicatively coupled to the user element and to the owner element and includes a computer system processor configured to facilitate use of a fleet record and use of at least one fleet parameter.

ENVOY FOR MULTI-TENANT COMPUTE INFRASTRUCTURE

A data management and storage (DMS) cluster of peer DMS nodes manages data of a tenant of a multi-tenant compute infrastructure. The compute infrastructure includes an envoy connecting the DMS cluster to virtual machines of the tenant executing on the compute infrastructure. The envoy provides the DMS cluster with access to the virtual tenant network and the virtual machines of the tenant connected via the virtual tenant network for DMS services such as data fetch jobs to generate snapshots of the virtual machines. The envoy sends the snapshot from the virtual machine to a peer DMS node via the connection for storage within the DMS cluster. The envoy provides the DMS cluster with secure access to authorized tenants of the compute infrastructure while maintaining data isolation of tenants within the compute infrastructure.

EQUIPMENT SERVER, DEVICE SERVER, AND COMMUNICATION SYSTEM

There are provided a communication system in which a piece of equipment in a facility and a device working in the facility cooperate easily with each other, an equipment server and a device server in the communication system, and a data structure which is to be communicated in the communication system. In a communication system (1), a message is used for control of a control target by being communicated in a common format between each of equipment servers (7) and each of object servers (9). The control target is a piece (3) of building equipment as a piece of equipment or an object (4) working in a building (2) as a facility.

SYSTEM AND METHOD FOR DYNAMICALLY ORCHESTRATING APPLICATION PROGRAM INTERFACE TRUST
20230047485 · 2023-02-16 ·

A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.

METHOD, APPARATUS, AND COMPUTER PROGRAM FOR CONNECTIONLESS ASSET TRACKING IN WIRELESS COMMUNICATION SYSTEM, AND RECORDING MEDIUM THEREOF
20230052957 · 2023-02-16 ·

The present disclosure relates to a method, an apparatus, and a computer program for a connectionless asset tracking service in a wireless communication system, and a recording medium thereof. A method for a connectionless asset tracking service in a wireless communication system according to an embodiment of the present disclosure may comprise the steps in which a first device: receives an advertising packet from a second device; determines whether at least one advertising data structure (AD structure) included in the advertising packet is an AD structure related to a connectionless asset tracking service; and on the basis of the AD structure related to the connectionless asset tracking service, determines the location of the second device, wherein an AD type field of the AD structure related to the connectionless asset tracking service includes a value indicating a connectionless asset tracking service.

METHOD AND SYSTEM FOR PRIVACY PRESERVING INFORMATION EXCHANGE

Methods and system for privacy preserving information exchange in a network of electronic devices are disclosed. In one embodiment, a method is implemented in an electronic device to serve as a local party for information exchange between the local party and another electronic device to serve as an aggregator. The method includes storing a plurality of values in a 2D vector, where a first dimension of the 2D vector is based on the number of values, and where each position in the first dimension has one unique value. The method further includes transmitting the 2D vector to the aggregator with masking for the aggregator to prevent the aggregator from decoding the 2D vector, where aggregating the masked 2D vector with masked 2D vectors from other local parties allows decoding of the aggregated 2D vector.

Method and Devices for Triggering Lawful Interception

Methods and apparatuses start lawful interception of an ongoing communication process in an after-handover network environment prior to completing an international handover of a user device. The user device is party of the ongoing communication process and an LI target. The user device being an LI target is determined based on the user device's identity, which is retrieved if the international handover is initiated.

OPERATIONS PRODUCTIVITY SOFTWARE SYSTEM, SERVER AND METHOD
20230048011 · 2023-02-16 ·

Disclosed are systems, servers and methods for a multi-tenant framework that manages and controls operations of software as a service (SaaS) applications and services, and the data and metadata (e.g., files) created, updated and interacted with therefrom. The disclosed framework provides a centralized approach to managing the entitlement and provisioning of SaaS applications on client devices across a variety of channels on a network. The disclosed SaaS framework is configured for management, control, deployment and synchronization between devices, applications, systems and platforms both on-premises (on-prem or local devices/storage) and/or hosted on a network (e.g., a cloud platform, service or platform).