H04L67/34

Upgrade a version of a service

According to examples, a method for upgrading a version of a service across a plurality of computing nodes may include instructing a host device to pre-spawn a number of first host processes configured to provide a first version of the service in the computing nodes and to pre-spawn a number of second host processes configured to provide a second version of the service according to a first scaling constraint in the computing nodes. The method may also include, in response to receiving an indication that each of the second host processes is operating properly in the computing nodes, instructing the host device to decrease the number of first host processes and to increase the number of second host processes in the computing nodes as defined in a second scaling constraint.

Integration application creator design
11474842 · 2022-10-18 · ·

Application generation and integration application generation methods are disclosed. An application generation function includes automatically providing a set of software artifacts to an application developer that may be used as an aid to providing an application with augmented capabilities for an end-user. The augmented capabilities configured to adhere to certain rules regarding certification criteria and requirements of a multi-tenant cloud infrastructure. Generated applications and plug-in capabilities may further be required to meet certification criteria applicable to an application store hosted within a cloud infrastructure.

USING A REMOTE POD IN KUBERNETES

Embodiments are directed to using remote pods. An intermediary software is instantiated in a worker node virtual machine and is used to cause a pod virtual machine to be created, the pod virtual machine being remote from the worker node virtual machine. An overlay network is established between the intermediary software in the worker node virtual machine and a pod space in the pod virtual machine. The overlay network is used to cause containers to be created in the pod virtual machine, where the worker node virtual machine is configured to use the overlay network to manage communications with the pod virtual machine.

Software upgrade in a home network using lower layer messaging
11601535 · 2023-03-07 · ·

Principles, apparatuses, systems, circuits, methods, and computer program products for performing a software upgrade in a MoCA network includes receiving an image of a software upgrade at a server and sending the image in the MoCA network using an L2ME message channel to a client that is enabled to receive the image and store the image in a client memory. The image may be broken up into packets, and a sequence number may be assigned to each packet to assist the client in assembling them. CRC information may also be appended to the packets to enable the client to verify their contents.

Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
11601273 · 2023-03-07 · ·

System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and one of a plurality of secure elements (SE). A first request to renew a service is received from an SP system over a communications network. The first request includes a service qualifier associated with the service. A secure element corresponding to the service qualifier is determined. A second request to delete data associated with the service qualifier from the secure element is transmitted to the secure element. A third request to install an application on the secure element is transmitted to the secure element. A fourth request to activate the application on the secure element is transmitted to the secure element.

FAST PROVISIONING OF MACHINES USING NETWORK CLONING

Some embodiments of the invention provide a method for cloning a set of one or more applications implemented by a first set of machines connected through a first logical network that defines a virtual private cloud in a set of one or more datacenters. The method instantiates a cloned, second set of machines that is a replicated copy of the first set of machines. The method identifies a set of network configuration data that configures a set of logical forwarding elements (LFEs) of the first logical network. The method uses the identified set of network configuration data to define a cloned, second logical network to connect the cloned, second set of machines.

Headless device installations

A method of installing a plurality of headless devices includes: scanning for the plurality of headless devices that are to be initially installed and are not yet connected to any network; detecting a first headless device of the plurality of headless devices; communicatively coupling the first headless device to a network; and storing network data relating to the coupling of the first headless device to the network in a storage device. The method further includes scanning for a subsequent headless device of the plurality of headless devices; and determining if the subsequent headless device is to be communicatively coupled to the network using the stored network data. In response to a determination that the subsequent headless device is to be communicatively coupled to the network, the method includes using the stored network data, communicatively coupling the subsequent headless device to the network using the stored network data without user input of the network data; and then deleting the network data relating to the coupling of the first headless device to the network from the storage device when a last headless device has been connected to the network.

System and method for facilitating installation of user nodes in fixed wireless data network
11475181 · 2022-10-18 · ·

A mobile application for facilitating installation of the user nodes in a fixed wireless network utilizes augmented reality to provide location, usage, and recommendation information about nearby service nodes. A camera of the mobile computing device captures image data depicting the surrounding area, which is displayed on a touchscreen display of the mobile computing device with graphical elements including icons and textual information overlaid on the captured image data in different positions and with different visual characteristics based on geometric information for the mobile computing device and the surrounding area, the relative position of nearby service nodes with respect to the mobile computing device, and information about the service nodes such as typical usage and/or whether the service node is recommended or not. A virtual antenna is also overlaid on the image data, and an image depicting the virtual antenna as it would look once installed is generated and stored.

TRANSPORT OF MASTER DATA DEPENDENT CUSTOMIZATIONS
20230126702 · 2023-04-27 ·

A method, a system, and a computer program product for transporting master data dependent configuration data for execution of a transaction. A request to import a transaction data from a first computing system to a second computing system is received. The transaction data is associated with execution of a transaction by the second computing system. Based on the received request, a determination that a first type of data is required for execution of the transaction by the second system. The first type of data includes one or more keys identifying dependencies of the first type of data on a second type of data. One or more transport objects for transporting the transaction data from the first to the second system are generated. The transaction data identifies the first and second types of data and the keys. The transaction is executed using the transport objects imported to the second system.

Secure device pairing

Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware.