H04L67/34

Internet of things solution deployment in hybrid environment
11550636 · 2023-01-10 · ·

Example methods are provided to deploy an Internet of Things (IoT) solution in a hybrid environment. The methods include deploying a first agent application on a first edge gateway of a first vendor by the first edge gateway. The first agent application is configured to collect a first set of information associated with the first edge gateway. The methods include deploying a second agent application on a second edge gateway of a second vendor by the second edge gateway. The second agent application is configured to collect a second set of information associated with the second edge gateway. In response to a determination of a first virtualized computing environment on the first edge gateway or a second virtualized computing environment on the second edge gateway fulfils a first requirement of a template to deploy the IoT solution, the methods include deploying the IoT solution in the first virtualized computing environment, the second virtualized computing environment, or both.

System and method for cloud security monitoring

The invention relates to a computer-implemented system for security monitoring of Member accounts in a cloud environment. The Member accounts are provided as instances of cloud services in one or more monitored clouds by one or more cloud service providers. The system is programmed to automatically deploy software agents to the Member accounts. The software agents are configured to monitor activities in the Member accounts and to push security and operations data to a SIEM platform. The security and operations data may comprise alerts and activity logs for the Member accounts, public internet protocol (IP) addresses used by the Member accounts, and identifying information for individuals and information technology (IT) assets associated with the Member accounts. The system includes a user interface to define customized alerts based on the security and operations data, and the system generates and sends the customized alerts to a system administrator or security analyst.

Service worker configured to serve multiple single page applications

Disclosed herein is a system configured to implement a service worker capable of serving multiple single page applications (SPAs) that are hosted in the same uniform resource locator (URL) space (e.g., a domain within which the SPAs are hosted). Accordingly, the defined scope of the service worker is no longer bound by only one SPA, but rather by a root directory of a web site that hosts multiple SPAs. Since the service worker described herein serves multiple SPAs, the service worker implements an approach to ensure that a correct application controller corresponding to the SPA that hosts a URL is invoked. To do this, the service worker is configured to leverage a router and a routing table to associate a URL included in a request from a browser with the correct application controller corresponding to the SPA that hosts the URL for which the request is sent.

Systems and methods for auto-configuring a user equipment device with content consumption material
11696102 · 2023-07-04 · ·

Methods and systems are provided for auto-configuring a newly purchased user equipment (UE) device with content consumption material that is associated with a user. These methods and systems are provided by way of receiving, in response to the user having purchased the UE device, purchase information (e.g., a credit card number) and a UE device identifier (e.g., a serial number of a purchased UE device). After receipt of this information, a database is searched to identify a user account that is associated with the purchase information. The user account identifies content consumption material that has been processed by other UE devices to enable the user to consume content. A communication is then transmitted to the UE device that causes the UE device to be configured with the identified content consumption material.

Remote detection of device updates
11550563 · 2023-01-10 · ·

A method comprising: identifying, by a cloud server, a set of local area networks (LAN) associated with the cloud server, based on a similarity parameter with respect to an end device connected within each of the LANs; forming a communications network comprising all of the LANs in the set; detecting, by at least a subset of the LANs, a download file received by the respective end devices in each of the LANs in the subset; calculating an update event likelihood score with respect to the download file, based, at least in part, on a plurality of parameters associated with the download file; and issuing, by at least one of the LANs in the subset, a notification that the download file is associated with an update event affecting all of the end devices in each of the LANs, when the update event likelihood score exceeds a specified threshold.

Distributed software defined networking

The Distributed Software Defined Network (dSDN) disclosed herein is an end-to-end architecture that enables secure and flexible programmability across a network with full lifecycle management of services and infrastructure applications (fxDeviceApp). The dSDN also harmonizes application deployment across the network independent of the hardware vendor. As a result, the dSDN simplifies the network deployment lifecycle from concept to design to implementation to decommissioning.

Technologies for assigning workloads to balance multiple resource allocation objectives

Technologies for allocating resources of managed nodes to workloads to balance multiple resource allocation objectives include an orchestrator server to receive resource allocation objective data indicative of multiple resource allocation objectives to be satisfied. The orchestrator server is additionally to determine an initial assignment of a set of workloads among the managed nodes and receive telemetry data from the managed nodes. The orchestrator server is further to determine, as a function of the telemetry data and the resource allocation objective data, an adjustment to the assignment of the workloads to increase an achievement of at least one of the resource allocation objectives without decreasing an achievement of another of the resource allocation objectives, and apply the adjustments to the assignments of the workloads among the managed nodes as the workloads are performed. Other embodiments are also described and claimed.

Method and system for cross-platform deployment
11693642 · 2023-07-04 · ·

A method and system which provides a solution of cross-platform application deployment, which is based on a Topology and Orchestration Specific for Cloud Applications (TOSCA) template and is compatible with application deployment on other platforms. This solution supports cross-platform application deployment on both a TOSCA platform and a non-TOSCA platform. By adding information about a target platform and application deployment information required for application deployment on the target platform to a deployment template, an upper server performs parsing and sends the application deployment information to the target platform, thereby implementing cross-platform application deployment on the TOSCA platform and the non-TOSCA platform by using one universal template.

Distributed process framework
11693670 · 2023-07-04 ·

Providing a distributed processing framework. Initially, the process begins by building a server process plug-in by invoking a code generation module to generate required boilerplate and cross-platform code. Then commencing a server process by loading plug-in code and giving it a thread of control. In addition, client machines discovering the existence of a plug-in code being executed. Further, one or more client applications running on a client server at least issuing commands to the plug-in code, monitoring the events of the plug-in code, update the properties of the plug-in code without information regarding the plug-in interface.

System and method for providing security protection for FPGA based solid state drives

According to some example embodiments, a method for providing security to a storage device includes receiving, by the storage device, a public key via a network; sending, by the storage device, the received public key and a proposed configuration corresponding to the storage device to a security manager that resides in a control plane of the network; determining, by the security manager, whether the public key received from the storage device matches a private key available to the security manager; downloading, by the security manager, the proposed configuration to the storage device; determining, by the security manager, if the proposed configuration is successfully downloaded to the storage device; operating the storage device according to the downloaded configuration; and granting, by the security manager, a request to lease the storage device operating in the downloaded configuration for a time interval.