H04L69/02

Image communication apparatus, control method for the same, and computer-readable storage medium
09912578 · 2018-03-06 · ·

When a forwarding destination of image data is set, the forwarding destination can be designated via an input screen for inputting destination information or the forwarding destination can be designated via an address book. When setting of the forwarding destination via the input screen for inputting destination information is instructed, connection confirmation based on destination information input via the input screen is performed, and when this connection confirmation is made, the destination information input via the input screen is set and registered as the forwarding destination.

Verification of a wireless protocol implementation

The description relates to wireless protocol verification. One example can obtain information relating to a wireless protocol and receive information relating to wireless communications associated with a wireless device. The example can compare the wireless communications with the wireless protocol and generate a verification report that conveys whether the wireless communications comply with the wireless protocol.

System and method for rule matching in a processor

In one embodiment, a system includes a format block configured to receive a key, at least one rule, and rule formatting information. The rule can have one or more dimensions. The format block can be further configured to extract each of the dimensions from the at least one rule. The system can further include a plurality of dimension matching engines (DME). Each DME can be configured to receive the key and a corresponding formatted dimension, and process the key and the corresponding dimension for returning a match or nomatch. The system can further include a post processing block configured to analyze the matches or no matches returned from the DMEs and return a response based on the returned matches or nomatches.

Method and apparatus for preserving end to end semantic and performance enhancement of split-TCP protocols
09866488 · 2018-01-09 · ·

In one example embodiment, a network node includes a processor configured to receive one or more data packets from a transmitter and transmit at least one first-type confirmation message to the transmitter based on a threshold, the at least one first-type confirmation message including an acknowledgement that all but at least two bytes of data included in the one or more data packets are received from the transmitter. The processor is further configured to transmit at least one second-type confirmation message to the transmitter based on at least one of a size of a buffer at the network node available for receiving data packets and an acknowledgement from an end device acknowledging receipt of the one or more data packets, the at least one second message including an acknowledgement of one or more of the at least two bytes of data.

Methods, devices, and systems for determining a subset for autonomous sharing of digital media
12184747 · 2024-12-31 ·

Methods, systems, and devices for determining a subset of user devices from among a complete set of user devices based on a set of received information, i.e., attributes associated with a photograph or user device that transmitted the photograph and attributes, where the disposition of the information may be used to determine the subset and then perform facial recognition on the subset of user associated photographs in order to accurately identify each user or users present in the photograph.

SYSTEMS AND METHODS FOR TEMPORAL CONTEXT MONITORING AND ENFORCEMENT FOR TELECOMMUNICATIONS NETWORKS
20250007800 · 2025-01-02 · ·

Methods and systems for temporal context monitoring and enforcement for telecommunications networks are disclosed. A first and a second set of metrics associated with a network are collected. The first set of metrics are associated with a first time and indicate a first state of the network. The second set of metrics are associated with a second time and indicate a second state of the network. An indication of an anomaly on the network is determined responsive to comparing the second set of metrics with the first set of metrics. A network policy is applied to revert the network from the second state to the first state.

DIFFERENTIATING CONTROLLERS AND RECONCILERS FOR SOFTWARE OPERATORS IN A DISTRIBUTED COMPUTING ENVIRONMENT
20250039281 · 2025-01-30 ·

A technique for differentiation controllers and reconcilers for software operators in a distributed computing environment is described herein. In one example of the present disclosure, a system can include a node of a distributed computing environment that includes a container configured to execute a controller associated with a software operator to. The controller can determine a reconciler that is associated with the container, detect an event that is associated with the reconciler, and invoke the reconciler via a selected communication protocol. The system can include the reconciler configured to process the event in response to being invoked by the controller and to provide a response associated with the event to the controller via the selected communication protocol.

METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIUMS FOR CONFIGURING ELECTRONIC MESSAGING APPLICATIONS

Methods, systems, and computer-readable mediums configure electronic messaging applications to communicate with a server storing messages to and/or from an electronic messaging account of a user. A method involves receiving an electronic message address and a password of the user as inputs, deriving server connection settings based on the electronic message address, and applying the server connection settings to the electronic messaging account. Another method involves receiving an electronic message address of the user and discovering the server connection settings for the electronic messaging account on a server having a designated protocol name as a server prefix name to assist in locating the server and having the server connection settings. The method also involves retrieving the server connection settings from a file provided by the server in response to locating the server having the designated name and applying the server connection settings to the electronic messaging account.

DYNAMIC SECURE PACKET BLOCK SIZING
20170353493 · 2017-12-07 ·

Disclosed herein are methods, systems, and software for handling secure transport of data between end users and content serving devices. In one example, a method of operating a content server includes identifying a content request from an end user device. The method further includes, responsive to the user request, determining a transmission control protocol window size and a secure layer protocol block size. The method also provides scaling the secure layer protocol block size to match the transmission control protocol window size, and transferring secure layer protocol packets to the end user device using the scaled secure layer protocol block size.

METHOD AND APPARATUS FOR REDUCING NETWORK RESOURCE TRANSMISSION SIZE USING DELTA COMPRESSION
20170324827 · 2017-11-09 ·

A near end network optimizer receives, from a client device, a request for a network resource. Responsive to determining that a version of the network resource is stored in the near end network optimizer, a request for the network resource is transmitted to a far end network optimizer along with a version identifier that identifies that version. The near end network optimizer receives, from the far end network optimizer, a response that includes a differences file that specifies the difference(s) between the version of the network resource stored in the near end network optimizer with a most current version of the network resource. The response does not include the entire network resource. The near end network optimizer applies the specified difference(s) to the version that it has stored to generate an updated version of the network resource, and transmits the updated version of the network resource to the client device.