H04L67/01

Dynamic topic adaptation for machine translation using user session context
11561975 · 2023-01-24 · ·

According to various embodiments, the Query Context Translation Engine identifies a topic of a search query history received during a current user session. The search query history in a first language. The Query Context Translation Engine identifies, in a translation table, target text that corresponds with a query in the search query history, the target text comprising at least one word. The Query Context Translation Engine obtains at least one search result based on a translation of the target text in a second language.

METHOD AND SYSTEM FOR OPERATING A SAFETY-CRITICAL DEVICE VIA A NON-SECURE NETWORK AND FOR PROVIDING RELIABLE DISENGAGEMENT OF OPERATIONS OF THE DEVICE
20230229794 · 2023-07-20 ·

A system and method for operating, at a near location, a safety-critical device 260 located at a remote location. The system comprises a first control panel interface 200 and at least one operating input device 220 at a near location, adapted for transmitting control signals to the safety-critical device 260 at a remote location. The first control panel interface 200 comprises hardware barrier communication means 206 and at least a first and a second hardware safety barrier 202, 204, each with safety barrier interfaces connected to the at least one operating input device 220 and to the hardware barrier communication means 206 for communication through the non-secure network 240. The system further comprises a second control panel interface 250, connected to the safety-critical device at the remote location, adapted for receiving control signals from the first control panel interface 210 via a secure communication tunnel 242. The second control panel interface 250 comprises hardware barrier communication means 256 and at least a first and a second hardware safety barrier 252, 254, each with safety barrier interfaces connected to the hardware barrier communication means 256 for communication through the non-secure network 240. A switch 215 is connected to the first and second hardware safety barriers 202, 204 of the first control panel interface 200, controlling Hi- and Lo-signal inputs on the hardware safety barriers, such that a Hi-signal is input on the first hardware safety barrier 202 and a Lo-signal is input on the second hardware safety barrier 204 and vice versa for respectively enabling and disengaging operation of the safety-critical device 260. The safety-critical device 260 is activated when both hardware barriers 252, 254 are activated and the switch is in an enabled state.

METHOD AND SYSTEM FOR OPERATING A SAFETY-CRITICAL DEVICE VIA A NON-SECURE NETWORK AND FOR PROVIDING RELIABLE DISENGAGEMENT OF OPERATIONS OF THE DEVICE
20230229794 · 2023-07-20 ·

A system and method for operating, at a near location, a safety-critical device 260 located at a remote location. The system comprises a first control panel interface 200 and at least one operating input device 220 at a near location, adapted for transmitting control signals to the safety-critical device 260 at a remote location. The first control panel interface 200 comprises hardware barrier communication means 206 and at least a first and a second hardware safety barrier 202, 204, each with safety barrier interfaces connected to the at least one operating input device 220 and to the hardware barrier communication means 206 for communication through the non-secure network 240. The system further comprises a second control panel interface 250, connected to the safety-critical device at the remote location, adapted for receiving control signals from the first control panel interface 210 via a secure communication tunnel 242. The second control panel interface 250 comprises hardware barrier communication means 256 and at least a first and a second hardware safety barrier 252, 254, each with safety barrier interfaces connected to the hardware barrier communication means 256 for communication through the non-secure network 240. A switch 215 is connected to the first and second hardware safety barriers 202, 204 of the first control panel interface 200, controlling Hi- and Lo-signal inputs on the hardware safety barriers, such that a Hi-signal is input on the first hardware safety barrier 202 and a Lo-signal is input on the second hardware safety barrier 204 and vice versa for respectively enabling and disengaging operation of the safety-critical device 260. The safety-critical device 260 is activated when both hardware barriers 252, 254 are activated and the switch is in an enabled state.

Method, apparatus, client terminal, and server for data processing
11563805 · 2023-01-24 · ·

Embodiments of the present specification provide a method, an apparatus, a client terminal, and a server for data processing. The method includes: selecting, based on a data attribute of to-be-processed data, a target coordinating server from a plurality of coordinating servers, the plurality of coordinating servers belonging to a plurality of server clusters respectively; and sending a data processing request to the target coordinating server, such that a server cluster to which the target coordinating server belongs processes the data processing request preferentially, the data processing request directing to the to-be-processed data.

Method, apparatus, client terminal, and server for data processing
11563805 · 2023-01-24 · ·

Embodiments of the present specification provide a method, an apparatus, a client terminal, and a server for data processing. The method includes: selecting, based on a data attribute of to-be-processed data, a target coordinating server from a plurality of coordinating servers, the plurality of coordinating servers belonging to a plurality of server clusters respectively; and sending a data processing request to the target coordinating server, such that a server cluster to which the target coordinating server belongs processes the data processing request preferentially, the data processing request directing to the to-be-processed data.

METHODS AND SYSTEMS FOR DETECTION AND CLASSIFICATION OF MULTIMEDIA CONTENT IN SECURED TRANSACTIONS USING PATTERN MATCHING
20230231939 · 2023-07-20 ·

An apparatus is provided for classifying content in one or more transactions. The apparatus includes a transaction boundary detector to detect boundaries of the one or more transactions associated with a first server or a first destination, wherein the one or more transactions include one or more requests from a client or a source and one or more corresponding responses from the first server or the first destination. A multimedia session generator generates a multimedia session object based on the detected boundaries of the one or more transactions. A multimedia classifier classifies the content associated with a first multimedia session. A traffic processing and policy enforcement unit applies traffic management to the first multimedia session based upon the classification.

METHODS AND SYSTEMS FOR DETECTION AND CLASSIFICATION OF MULTIMEDIA CONTENT IN SECURED TRANSACTIONS USING PATTERN MATCHING
20230231939 · 2023-07-20 ·

An apparatus is provided for classifying content in one or more transactions. The apparatus includes a transaction boundary detector to detect boundaries of the one or more transactions associated with a first server or a first destination, wherein the one or more transactions include one or more requests from a client or a source and one or more corresponding responses from the first server or the first destination. A multimedia session generator generates a multimedia session object based on the detected boundaries of the one or more transactions. A multimedia classifier classifies the content associated with a first multimedia session. A traffic processing and policy enforcement unit applies traffic management to the first multimedia session based upon the classification.

Congestion Mitigation in a Distributed Storage System

A system comprises a plurality of computing devices that are communicatively coupled via a network and have a file system distributed among them, and comprises one or more file system request buffers residing on one or more of the plurality of computing devices. File system choking management circuitry that resides on one or more of the plurality of computing devices is operable to separately control: a first rate at which a first type of file system requests (e.g., one of data requests, data read requests, data write requests, metadata requests, metadata read requests, and metadata write requests) are fetched from the one or more buffers , and a second rate at which a second type of file system requests (e.g., another of data requests, data read requests, data write requests, metadata requests, metadata read requests, and metadata write requests) are fetched from the one or more buffers.

Congestion Mitigation in a Distributed Storage System

A system comprises a plurality of computing devices that are communicatively coupled via a network and have a file system distributed among them, and comprises one or more file system request buffers residing on one or more of the plurality of computing devices. File system choking management circuitry that resides on one or more of the plurality of computing devices is operable to separately control: a first rate at which a first type of file system requests (e.g., one of data requests, data read requests, data write requests, metadata requests, metadata read requests, and metadata write requests) are fetched from the one or more buffers , and a second rate at which a second type of file system requests (e.g., another of data requests, data read requests, data write requests, metadata requests, metadata read requests, and metadata write requests) are fetched from the one or more buffers.

Applying filter expressions to requests at an edge server
11562030 · 2023-01-24 · ·

An edge server receives a request from a client device for an action to be performed on a resource. The edge server determines whether data traffic is associated with one or more filters. When the edge server determines that there are filters associated with the type of data traffic, the edge server accesses a data structure storing properties of the request. For each request property in the data structure, the edge server applies a related filter to a value of the request property and determines where the value of the request property matches an expected value. In response to determining that one or more filters match, the edge server performs actions on the request. When the edge server performs the actions on the request, the edge server sends the request to the origin server.