H04L67/34

AUTOMATED DELIVERY OF MEDICAL DEVICE SUPPORT SOFTWARE
20230133749 · 2023-05-04 ·

Embodiments of the present invention include a portable medical device with an integrated web server. The portable medical device is configured to establish a communication session with a user device. The integrated web server is configured to load software onto the user computing device for exchanging data with the portable medical device.

DIFFERENTIAL CLIENT-SIDE ENCRYPTION OF INFORMATION ORIGINATING FROM A CLIENT
20230139090 · 2023-05-04 ·

A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.

Cloud Computing Platform That Executes Third-Party Code in A Distributed Cloud Computing Network

A compute server receives a first request from a client device that triggers execution of a first third-party code piece. The first request is directed to a first zone. A single process at the compute server executes the first third-party code piece. As a result of executing the first third-party code piece, a second request is generated that triggers execution of a second third-party code piece. The second request is directed to a second zone. The single process executes the second third-party code piece. A response is generated to the first request based at least in part on the executed first third-party code piece and the executed second third-party code piece. The generated response is transmitted to the client device.

BROWSER NAVIGATION FOR FACILITATING DATA ACCESS
20230138362 · 2023-05-04 ·

An apparatus for decoding and rendering or otherwise processing, manipulating, or outputting a variety of digital data is provided. The apparatus may include a browser engine configured to receive first encoded digital data. The apparatus may include a browser extension configured to intercept the first encoded digital data transmitted in response to a first request from the browser engine. The browser extension may be configured to intercept a first decoder written in a platform-independent syntax for decoding at least a portion of the first encoded digital data. The browser extension may be configured to point the browser engine to one or more local storage locations of the first encoded digital data and the first decoder.

Intent-based, network-aware network device software-upgrade scheduling

A controller device manages a plurality of network devices. The controller device includes one or more processing units configured to receive an upgrade request; obtain a redundancy model indicating network device redundancies or service redundancies; determine, based on the upgrade request and the redundancy model, an update graph having nodes each representing one of the network devices or one of the services, the update graph also having at least one edge that connects two of the nodes and that indicates the network redundancy or the service redundancy; determine, based on the update graph including the at least one edge, an update schedule for performing an update of software for the network devices that ensures availability for the first network device or second network device or availability for the service; and update the software of each of the network devices according to the update schedule.

Device upgrade method and apparatus
11640313 · 2023-05-02 · ·

Embodiments of the present disclosure provide a device upgrade method and apparatus. Both NFVI (network functions virtualisation infrastructure) resources used to create a target VNFC (virtualised network function component) and NFVI resources used to scale out/up the target VNFC are fewer than those occupied by a to-be-upgraded VNFC; or both the NFVI resources used to create the target VNFC and the NFVI resources used to scale out/up the target VNFC are fewer than those required for upgrading the to-be-upgraded VNFC.

REUSE OF EXECUTION ENVIRONMENTS WHILE GUARANTEEING ISOLATION IN SERVERLESS COMPUTING

Systems, methods, and computer-readable media are provided for reusing execution environments and code of serverless functions while ensuring isolation in serverless computing environments. In some examples, a method can include, in response to a first request to run a serverless function, executing, at an execution environment on a network, computer-readable code configured to perform the serverless function; after the computer-readable code has executed, modifying a pointer to an area of memory used to store a first state of the serverless function to reference a different area of memory; in response to a second request to run the serverless function, reusing, at the execution environment, the computer-readable code to perform the serverless function; and based on the pointer referencing the different area of memory, using the different area of memory to store a second state of the serverless function.

Systems and methods for consistently applying rules to messages
11659051 · 2023-05-23 · ·

The disclosed computer-implemented method for consistently applying rules to messages may include (i) identifying a user account on a message server that comprises both unarchived messages to which message rules are applied by default and archived messages to which the message rules are not applied by default, (ii) detecting a new message rule that specifies an action to be performed on relevant messages within the user account on the message server, (iii) locating at least one archived message within the user account on the message server to which the new message rule applies, and (iv) applying the new message rule to the at least one archived message by performing the specified action on the at least one archived message. Various other methods, systems, and computer-readable media are also disclosed.

DEVICE CONTROL METHOD AND DEVICE

This application provides a device control method and a device. Based on a dependency relationship between a first application and a second application, the second application may be installed on a first device, so that the first application may obtain, from a server corresponding to the second application through the second application, a resource for performing a response operation by the device. This not only saves storage space and running space for installing an application on the first device and reduces consumption of traffic for downloading the application, but also reduces costs of an interconnection between a device vendor and an application vendor.

Installable Mutable Intelligent Security Package and Security System in Internet of Things Networks

Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate a report that includes information associated with the anomaly.