H04L67/34

Application sharing method and apparatus
11509708 · 2022-11-22 · ·

An application sharing method includes obtaining a distance between an icon of a first application and an icon of a second application, where the first application is a to-be-shared application, and the second application is used to share the first application; determining whether the distance is less than a preset distance; if the distance is less than the preset distance, obtaining application information of the first application in an application store on the Internet, and obtaining information about a to-share-with user, where the application information includes a link address of the first application in the application store; and sending the link address to the to-share-with user by using the second application.

Applying network policies to devices based on their current access network

A server of a distributed computing system that is at least partially hosted on a particular access network receives a plurality of messages from a plurality of devices over a network, each of the messages associated with a corresponding source address. For each of the plurality of devices, a current access network is determined for the device. For each of the devices with a current access network being the particular access network, a first network policy is applied to the device. For each of the devices with a current access network being other than the particular access network, a second network policy is applied to the device, the second network policy defining a second encryption requirement.

Technologies for switching network traffic in a data center

Technologies for switching network traffic include a network switch. The network switch includes one or more processors and communication circuitry coupled to the one or more processors. The communication circuitry is capable of switching network traffic of multiple link layer protocols. Additionally, the network switch includes one or more memory devices storing instructions that, when executed, cause the network switch to receive, with the communication circuitry through an optical connection, network traffic to be forwarded, and determine a link layer protocol of the received network traffic. The instructions additionally cause the network switch to forward the network traffic as a function of the determined link layer protocol. Other embodiments are also described and claimed.

Method and system that determine malicious nodes in a distributed computation network
11595421 · 2023-02-28 · ·

A computation is divided into computation tasks that are sent to worker nodes and distributed results are received in response. A redundant subtask is sent to each of the worker nodes, the redundant subtask being a random linear combination of the computation tasks sent to others of the worker nodes. The worker nodes perform the redundant subtasks to produce redundant results. The redundant result of each worker node is combined with distributed results of others of the worker nodes to determine whether one or more of the worker nodes are acting maliciously. Optionally, the worker nodes can be initially evaluated for trustworthiness using a homomorphic hash function applied to an initial computation task and applied to results of the initial tasks. If the results of both hash functions match, then the worker nodes are considered trustworthy and can be used for subsequent computations with redundant subtasks as described above.

Method and control unit for configuring an add-on interface of a vehicle

A method and control unit for configuring an add-on interface of a vehicle are presented. The vehicle includes at least one vehicle internal system, at least one add-on system arranged in the vehicle after manufacture, and at least one internal communication unit. The method includes receiving information related to at least one node of the at least one add-on system. The method also includes creating, based on the received information, a definition of at least one signaling used by the at least one node, and also configuring, by using the definition of the at least one signaling used by the at least one node, an add-on interface. The add-on interface is arranged in the vehicle as an interface between the at least one vehicle internal system and the at least one add-on system.

Net-aware service to control media distribution node output

A method includes receiving a first control command including a value for a first control parameter. The method further includes determining an association between the first control command and an identifier of the first control parameter. The method also includes identifying a graphical user interface (GUI) tool and information of the GUI tool based on the identifier of the first control parameter. The method includes launching a GUI that includes the GUI tool. The method further includes updating the first control parameter using the GUI tool based on the information of the GUI tool and the value for the first control parameter. The method also includes initiating content streaming using a first modulator in response to updating the first control parameter. The method includes identifying performance data for the first modulator associated with the content streaming. The method further includes sending the performance data to a server via the network.

Autonomous optimization of intra-train communication network
11595256 · 2023-02-28 · ·

A system for dynamically adjusting a configuration of an intra-train communication network includes an electronic device and a computer-readable storage medium. The computer-readable storage medium has one or more programming instructions that, when executed, cause the electronic device to receive one or more parameters values associated with a train consist, determine whether a potentially adverse condition that would affect intra-train communication for the train consist is anticipated based on at least a portion of the received parameters, in response to determining that the potentially adverse condition is anticipated, identify one or more updated network parameter settings that will assist in maintaining intra-train communication of the train consist during an occurrence of the potentially adverse condition by executing a machine learning model, and implement the identified one or more updated network parameter settings.

Centralized machine learning predictor for a remote network management platform

A remote network management platform is provided that includes an end-user computational instance dedicated to a managed network, a training computational instance, and a prediction computational instance. The training instance is configured to receive a corpus of textual records from the end-user instance and to determine therefrom a machine learning (ML) model to determine the numerical similarity between input textual records and textual records in the corpus of textual records. The prediction instance is configured to receive the ML model and an additional textual record from the end-user instance, to use the ML model to determine respective numerical similarities between the additional textual record and the textual records in the corpus of textual records, and to transmit, based on the respective numerical similarities, representations of one or more of the textual records in the corpus of textual records to the end-user computational instance.

Interface proxy device for cyber security

A system for providing cyber protection to medical devices in a medical environment is presented. The system comprises a medical device comprising software services, a backend server to maintain and provide software updates to medical devices, and an interface proxy box connected to the medical device and in communication with the backend server. The interface proxy box determines the software services resident on the medical device. The interface proxy box installs the software services determined to be resident on the medical device on the interface proxy box and configures the installed software services to match the software services resident on the medical device. The interface proxy box communicates periodically with the backend server and receives and applies security updates to the software services installed and configured on the interface proxy box. The medical device utilizes the updated software services on the interface proxy box.

Accessing client credential sets using a key

Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.