Patent classifications
H04L12/50
Remote secured terminal
A method for providing a secured client computer that includes peripheral components. Each peripheral component processes a corresponding peripheral component data of a data type that is not compatible with peripheral component data types processed by a processor of other peripheral components. The processor of each peripheral component codes the corresponding data of the data type for establishing a secured peer-to-peer communication with other peripheral components.
SYSTEM AND METHOD FOR CYBER-SECURE COMMUNICATIONS
Cyber security for a communications network can be enhanced with benchmarking, logging, and monitoring message transfer latencies between nodes to detect any changes in equipment or configuration due to unauthorized surveillance. In addition, the transfer of the messages between nodes is provided with cyber attack mitigation measures to be able to maintain operations even if encryption is compromised.
End point multiplexing for efficient layer 4 switching
This disclosure provides for an enhancement to a transport layer switch and, in particular the management of end points. In this approach, a memory space, such as a large logical ring buffer, is shared by incumbent connections to facilitate a space multiplexing end point management scheme. Preferably, memory allocation in the memory space is done packet-by-packet dynamically. Because the memory space is shared by all admitted connections, packets belonging to the same connection are not necessarily located physically consecutive to each other. A packet indexing mechanism that implements a set of pointers ensures that consecutiveness for packets on the same connection is maintained. This approach to end point multiplexing provides significant benefits by improving resource utilization, and enabling a higher number of connections to be served.
End point multiplexing for efficient layer 4 switching
This disclosure provides for an enhancement to a transport layer switch and, in particular the management of end points. In this approach, a memory space, such as a large logical ring buffer, is shared by incumbent connections to facilitate a space multiplexing end point management scheme. Preferably, memory allocation in the memory space is done packet-by-packet dynamically. Because the memory space is shared by all admitted connections, packets belonging to the same connection are not necessarily located physically consecutive to each other. A packet indexing mechanism that implements a set of pointers ensures that consecutiveness for packets on the same connection is maintained. This approach to end point multiplexing provides significant benefits by improving resource utilization, and enabling a higher number of connections to be served.
Increasing reliability during multi-connectivity handovers
The present disclosure generally relates to techniques to increase reliability of communications within a network during a low reliability period. The network may include a user equipment (UE) communicatively coupled with one or more transmit/receive points (TRPs), with the communications between the UE and the one more TRPs requiring a reliability above a first reliability threshold. A processor of a network entity may identify a low reliability period which occurs when the reliability of the communications is determined to be below a second reliability threshold. The processor may cause the network to perform one or more remedial actions to increase the reliability during the low reliability period.
REMOTE SECURED TERMINAL
A computer implemented method for providing communication between a secured client computer and a remote computer. There is provided a client computer that includes peripheral components. Each peripheral component is configured, by a processor, to process a corresponding peripheral component data of a data type that is not compatible with peripheral component data types processed by a processor of other peripheral components. The processor of each peripheral component is further configured to code the corresponding data of the specified data type. Each peripheral component is configured, by the processor, to establish a secured peer-to-peer communication channel between the peripheral component and the remote computer that is authorized to communicate with the client computer, and is further configured to code data that is communicated between the authorized remote computer and the peripheral component through the secured communication channel. The coded data being indecryptable by the processors of other of the peripheral components.
Method and apparatus for improved data transfer between processor cores
Embodiments of an interconnect apparatus enable improved signal integrity, even at high clock rates, increased bandwidth, and lower latency. In an interconnect apparatus for core arrays a sending processing core can send data to a receiving core by forming a packet whose header indicates the location of the receiving core and whose pay load is the data to be sent. The packet is sent to a Data Vortex switch described herein and in the patents incorporated herein. The Data Vortex switch is on the same chip as an array of processing cores and routes the packet to the receiving core first by routing the packet to the processing core array containing the receiving processing core. The Data Vortex switch then routes the packet to the receiving processor core in a processor core array. Since the Data Vortex switches are not crossbar switches, there is no need to globally set and reset the Data Vortex switches as different groups of packets enter the switches. Mounting the Data Vortex switch on the same chip as the array of processing cores reduces the power required and reduces latency.
Single queue link aggregation
A method for transmitting a packet on a logical port comprising two or more physical ports comprises receiving a packet of a class of service; storing the packet in a memory; maintaining a lookup table relating a plurality of identifiers to at least one physical port; storing a pointer to the stored packet in the memory in a single pointer list for the class of service along with a selected one of the identifiers; and copying the stored packet to one or more physical ports corresponding to the selected identifier for transmission on at least one of the physical ports. In one implementation, a plurality of the physical ports are grouped into a logical port, and the received packet is processed to determine its logical port and its class of service.
Method for wireless fidelity connection and related products
A method for Wi-Fi connection and related products are provided. The method includes obtaining X parameters of a target access point (AP), where the X parameters at least include a target service set identifier (SSID) of the target AP, and X is a positive integer. A Wi-Fi scan is performed according to the X parameters. In response to unsuccessful finding of the target AP, according to current network environment information, M Wi-Fi connection records are determined from historical Wi-Fi connection data, where each of the M Wi-Fi connection records contains an AP previously connected by a terminal, and M is a positive integer. A Wi-Fi scan is performed according to the target SSID and SSIDs in the M Wi-Fi connection records.
Scheduling enhancements for latency-constrained and reliable wireless communication systems
An apparatus for a wireless communication system, is configured to perform semi-persistent scheduling (SPS), wherein a size of an SPS interval is based on one or more transmission time intervals (TTIs). A further apparatus for a wireless communication system is described, wherein the apparatus is configured to perform semi-persistent scheduling, and wherein the apparatus is configured such that the semi-persistent scheduling is controlled via a configuration message.