Patent classifications
H04L67/34
METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.
Method and System for Interaction Between 5G and Multiple TSC/TSN Domains
A method (1200) by a network node (160, 160c) includes determining (1202) a plurality of Time Sensitive Communication, TSC, or Time Sensitive Networking, TSN, domains (12) that exist in a network. The network node instantiates (1204) at least one virtual bridge (14), wherein each virtual bridge serves at least one TSC and/or TSN domain.
Methods for authenticating and integrating user equipment into an information system, corresponding devices and computer programs
Methods for authenticating and integrating user equipment into an information system, corresponding devices and computer programs. Integration of new user equipment into an operator's information system uses communication protocols providing the authentication of the user equipment and guaranteeing integrity and confidentiality of messages exchanged between the user equipment and a user equipment management server of the information system. The user equipment is provided, at the time of manufacture, with an authentication certificate supplied to the manufacturer by the operator managing the information system in which the equipment is to be integrated. This requires cumbersome and inflexible logistics to implement and limits the choice of users as to which user equipment they might wish to integrate. The proposed solution relies on an ecosystem of already authenticated user equipment present in the local network in order to authenticate the user equipment and thus authorize its integration into the information system.
METHOD FOR UPDATING A SENSOR SYSTEM IN AUTOMOTIVE APPLICATIONS
A method for updating a sensor system, the method including: performing at an update server side the steps of: retrieving a pre-shared sensor key associated with the sensor system, calculating a server signature based on update data and the retrieved sensor key, and transmitting the update data and the calculated server signature to the sensor system; and performing at the sensor system the steps of: receiving the update data and the calculated server signature, retrieving the pre-shared sensor key stored in a register, calculating a sensor system signature based on the update data and the pre-shared sensor key, comparing the sensor system signature with the server signature and processing the update data if the sensor system signature and the server signature are identical.
COMMUNICATION CONSOLE WITH COMPONENT AGGREGATION
Systems methods and devices are provided for a presentation including a communications console with component aggregation. In one potential implementation, a computing device with an application framework receives a communication manager object via a network connectivity device and executes the communication manager object within the application framework. The computing device may then receive and execute communications components and a presentation components within the application framework using the communication manager object. The communication manager object may then manages interface and display of the presentation information via the application framework, as modified by communication components.
MACHINE LEARNING MODEL TRAINING METHOD AND RELATED DEVICE
A machine learning model training method is applied to a first client, a plurality of clients are communicatively connected to a server, the server stores a plurality of modules, and the plurality of modules are configured to construct at least two machine learning models. The method includes: obtaining a first machine learning model, where at least one first machine learning model is selected based on a data feature of a first training data set stored in the first client; performing a training operation on the at least one first machine learning model by using the first data set, to obtain at least one trained first machine learning model; and sending at least one updated module to the server, where the updated module is used by the server to update weight parameters of the stored modules.
IMPLEMENTING A FAULT-TOLERANT MULTI-NRF NETWORK TOPOLOGY
A system, apparatus, method, and non-transitory computer readable medium for implementing a fault-tolerant multi-NRF network topology may include a network repository function (NRF) device including: at least one processor configured to execute computer readable instructions to cause the NRF device to, broadcast a NRF query to a NRF cluster of a core network, the NRF cluster including a plurality of NRF devices located in a public land mobile network (PLMN); receive NRF query responses from each NRF device of the NRF cluster, the NRF query responses including network configuration information of each NRF device; determine a status of each NRF device based on the network configuration information; determine a list of network function (NF) devices registered with the NRF cluster; receive a NF query request from a first NF device; and transmit a NF query response to the first NF device.
DIGITAL CARD INTEGRATION WITH CARD PROCESSING SYSTEM OF CARD ISSUER
Methods and systems for managing a digital wallet are described, including registration of payment cards and use of such payment cards. The digital wallet may be integrated into a mobile application provided by a card issuer, with the digital wallet providing integration between the mobile application and a payment service provider that provides token-based payment systems for implementing virtual cards.
TECHNIQUES FOR IMPLEMENTING ROLLBACK OF INFRASTRUCTURE CHANGES IN A CLOUD INFRASTRUCTURE ORCHESTRATION SERVICE
Techniques for implementing rollback of infrastructure changes in an infrastructure orchestration service are described. In certain examples, an infrastructure orchestration service is disclosed that manages both provisioning and deploying of infrastructure assets within a cloud environment. The service receives a plan comprising a set of instructions associated with a set of infrastructure assets of an execution target and identifies a first state of the set of infrastructure assets. The service executes the set of instructions in the plan to achieve a second state for the set of infrastructure assets. Based in part on the executing, the service receives a trigger for rolling back the plan to restore the set of infrastructure assets in the plan to the first state and executes a rollback plan for the plan. The service then transmits a result associated with the execution of the rollback plan.
SYSTEM AND METHOD OF CONNECTED SOFTWARE UPDATES USING GEO-FENCING AND CHARGER CONNECTION DETECTION
The present disclosure provides a system and method for performing an automatic port over process to replace and/or add to calibration data of an electric vehicle with updated calibration data, comprising: downloading the updated calibration data from a remote computing system; determining whether a charging port of the vehicle is connected to a charging station; determining whether a charging event is complete, wherein an energy storage system of the vehicle receives electrical energy from the charging station through the charging port; determining whether the vehicle is located within a predetermined geo-fence location; and performing the automatic port over process in response to (1) the charging port being connected to the charging station, (2) the charging event being complete, and (3) the vehicle being located within a predetermined geo-fence location