H04L67/34

Systems and methods for providing individual and/or synchronized virtual tours through a realm for a group of users

In accordance with one embodiment of the invention, a method coordinates experiences of a realm for a group of users, including at least an administrative user and at least one participating user. The method includes transmitting, from the server to an administrative user, a session identifier associated with the realm. The method also includes receiving, by the server, a user acceptance to join a session using the session identifier so that the at least one participating user can experience the realm. In response to receiving the acceptance, the method also includes transmitting to a computing device of the participating user, by the server, executable code including data describing a series of locations in the realm. The series of locations comprises at least a first location and a second location, and the first location is associated with a first panoramic image and the second location is associated with a second panoramic image. The executable code is configured to receive instructions from at least one computing device of at least one user within the group to display the realm at at least one selected location, and display, on the computing device, data corresponding to the realm at at least one of the locations selected by at least one of the users within the group.

Automatically generating a response on behalf of a first user to a request received from a second user

A server automatically generates a response on behalf of a first user to a request received from a second user. The server receives configuration information for configuring automatic response generation for the first user, including information identifying the first user, information specifying a type of service provided by the first user including a plurality of parameters that define details for the service, and information providing an availability of the first user to provide the specified type of service. A request is received from the second user. The first user is selected from multiple users to respond to the request. A response is automatically generated using at least some of the received configuration information. The response is automatically transmitted to the second user on behalf of the first user.

GENERATING CUSTOMIZED WELLBORE SOFTWARE APPLICATION INSTALLER FOR DEPLOYMENT IN A WELLBORE COMPUTING NETWORK
20230101628 · 2023-03-30 ·

A container stack configurator can build customized software applications and deploy the applications to a wellbore computing network or through offline installer devices. The stack configurator can receive a selection from a user of a configuration repository. The stack configurator can determine available branches of the configuration repository including images, tags, and container names. The stack configurator can present a list of services associated with the container names to the user using a user interface. The stack configurator can receive a selection of an installer type and generate a customized build of the installer type. The customized build of the installer can be an offline installer that is deployable on an offline target machine using a first communication media or an online installer that is deployable to an online target machine using a second communication media.

Secure device-bound edge workload delivery

The disclosed technology provides for packaging a secure cloud workload at a workload provisioning service. A unique device identifier is received from an edge device. The unique identifier is associated with the edge device. A unique packaging key is cryptographically generated based on the received unique device identifier, a unique workload identifier corresponding to a secure cloud workload to be executed on the edge device, and a nonce. The secure cloud workload is encrypted to generate a packaged secure cloud workload using the cryptographically generated unique packaging key. The encrypted secure cloud workload is transmitted to the edge device. The edge device is capable of independently cryptographically generating the unique packaging key using the unique device identifier, the unique workload identifier, and the nonce. The edge device is also capable of decrypting the packaged secure cloud workload using the generated unique packaging key cryptographically generated by the edge device.

Systems and methods for removing identifiable information

Systems and methods for censoring text characters in text-based data are provided. In some embodiments, an artificial intelligence system may be configured to receive text-based data and store the text-based data in a database. The artificial intelligence system may be configured to receive a list of target pattern types identifying sensitive data and receive censorship rules for the target pattern types determining target pattern types requiring censorship. The artificial intelligence system may be configured to assemble a computer-based model related to a received target pattern type in the list of target pattern types. The artificial intelligence system may be configured to use a computer-based model to identify a target data pattern corresponding to the received target pattern type within the text-based data, identify target characters within the target data pattern, and to assign an identification token to the target characters.

SYSTEMS AND METHODS TO CONFIGURE PIN PAD FOR MICROPROCESSOR-ENABLED AND CONTACTLESS PAYMENT VEHICLE
20230095646 · 2023-03-30 ·

A method of network configuration of a personal identification number (PIN) pads includes receiving a request to upgrade a PIN pad from a merchant or an individual software vendor (ISV) to read microprocessor-enabled or contactless payment vehicles, retrieving a PIN pad configuration hash value from the PIN pad, obtaining current configuration using the hash value, sending instructions to the PIN pad to upgrade the PIN pad over a network if the PIN pad is capable of reading microprocessor-enabled or contactless payment vehicles, and downloading and installing drivers to enable PIN pad readers to read and process at least one of the microprocessor-enabled payment vehicles and contactless payment vehicles according to the instructions. The method further performs additional operations such as updating the PIN pad registry with the PIN pad configuration and enabling the PIN pad to read the microprocessor-enabled or contactless payment vehicles.

ON-VEHICLE RELAY DEVICE, INFORMATION PROCESSING METHOD AND PROGRAM

An on-vehicle relay device comprises a control unit selectively executing a control program stored in a storage or an update processing program, and the control unit specifies, in executing the control program, a first communication unit to which any one of the on-vehicle ECUs as a relay destination is connected with reference to network configuration information stored in a storage, specifying, in executing the update processing program, a second communication unit for communicating with an external device that performs update-related processing of the control program with reference to network configuration information stored in the storage; and prohibiting communication through a communication unit other than the specified communication unit.

Techniques for transparently emulating network conditions
11573884 · 2023-02-07 · ·

In various embodiments, a network emulation application emulates network conditions when testing a software application. In response to a request to emulate a first set of network conditions for a first client device that is executing the software application, causing a kernel to implement a first pipeline and to automatically input network traffic associated with the first client device to the first pipeline instead of a default bridge. In response to a request to emulate a second set of network conditions for a second client device that is executing the software application, causing the kernel to implement a second pipeline and to automatically input network traffic associated with the second client device to the second pipeline instead of the default bridge. Each of the pipelines perform one or more traffic shaping operations on at least a subset of the network traffic input into the pipeline.

Systems, methods, and storage media for interfacing a user device with a decentralized architecture

Systems, methods, and storage media for creating an interface between a smart contract to be executed on a decentralized architecture and a user component, the method comprising: receiving code corresponding to the smart contract at an interface server; the interface server parsing an application binary interface (ABI) corresponding to the smart contract; the interface server constructing an enhanced application binary interface (EABI) based on the ABI; and the interface server creating a REST API interface specific to the smart contract based on the EABI.

METHOD OF PROCESSING SERVICE DATA, ELECTRONIC DEVICE AND STORAGE MEDIUM
20230094948 · 2023-03-30 ·

A method of processing service data, an electronic device, and a storage medium are provided, which relate to a field of a computer technology, and in particular to a field of service deployment technology. The method of processing service data includes: determining, in response to receiving an operation request for a target service, a request type of the operation request; determining a target proxy module corresponding to the request type based on the request type; and sending the operation request by using the target proxy module, so that a service deployment cluster operates on the target service based on the operation request.