Patent classifications
H04L69/22
Systems and methods for database geocoding
In an embodiment, a system can determine geocoded data from a database of geographic coordinates and metadata. The system correlates metadata, such as invoice data, to geolocation data, such as GPS or cellular data to determine geocoded data. The system further identifies one or more geographic coordinates for one or more location names, which may not have a corresponding metadata entry, by generating clusters of geographic coordinates. The clusters are then matched to one or location names using a matching algorithm. Accordingly, improved geocoded data may be determined.
PACKET PROCESSING DEVICE TO DETERMINE MEMORY TO STORE DATA IN A SERVER ARCHITECTURE AND COMPUTING SYSTEM INCLUDING SAME
A packet processing device, a method to be performed at the packet processing device, a computer-readable storage medium, and a computing system. The packet processing device is to determine a computing unit of the server architecture, the computing unit to execute a workload; receive a data packet including data to be used by the computing unit to execute the workload; determine, based on the computing unit to execute the workload, a memory of the server architecture to store the data for access by the computing unit to execute the workload; and route the data to the server architecture for storage at the memory.
PACKET PROCESSING DEVICE TO DETERMINE MEMORY TO STORE DATA IN A SERVER ARCHITECTURE AND COMPUTING SYSTEM INCLUDING SAME
A packet processing device, a method to be performed at the packet processing device, a computer-readable storage medium, and a computing system. The packet processing device is to determine a computing unit of the server architecture, the computing unit to execute a workload; receive a data packet including data to be used by the computing unit to execute the workload; determine, based on the computing unit to execute the workload, a memory of the server architecture to store the data for access by the computing unit to execute the workload; and route the data to the server architecture for storage at the memory.
INTERNET OF THINGS
- Ned M. Smith ,
- Keith Nolan ,
- Mark Kelly ,
- Gregory Burns ,
- Michael Nolan ,
- John Brady ,
- Cliodhna Ni Scanaill ,
- Niall Cahill ,
- Thiago Macieira ,
- Zheng Zhang ,
- Glen J. Anderson ,
- Igor Muttik ,
- Davide Carboni ,
- Eugene Ryan ,
- Richard Davies ,
- Toby M. Kohlenberg ,
- Maarten Koning ,
- Jakub Wenus ,
- Rajesh Poornachandran ,
- William C. Deleeuw ,
- Ravikiran Chukka
The Internet can be configured to provide communications to a large number of Internet-of-Things (IoT) devices. Devices can be designed to address the need for network layers, from central servers, through gateways, down to edge devices, to grow unhindered, to discover and make accessible connected resources, and to support the ability to hide and compartmentalize connected resources. Network protocols can be part of the fabric supporting human accessible services that operate regardless of location, time, or space. Innovations can include service delivery and associated infrastructure, such as hardware and software. Services may be provided in accordance with specified Quality of Service (QoS) terms. The use of IoT devices and networks can be included in a heterogeneous network of connectivity including wired and wireless technologies.
INTERNET OF THINGS
- Ned M. Smith ,
- Keith Nolan ,
- Mark Kelly ,
- Gregory Burns ,
- Michael Nolan ,
- John Brady ,
- Cliodhna Ni Scanaill ,
- Niall Cahill ,
- Thiago Macieira ,
- Zheng Zhang ,
- Glen J. Anderson ,
- Igor Muttik ,
- Davide Carboni ,
- Eugene Ryan ,
- Richard Davies ,
- Toby M. Kohlenberg ,
- Maarten Koning ,
- Jakub Wenus ,
- Rajesh Poornachandran ,
- William C. Deleeuw ,
- Ravikiran Chukka
The Internet can be configured to provide communications to a large number of Internet-of-Things (IoT) devices. Devices can be designed to address the need for network layers, from central servers, through gateways, down to edge devices, to grow unhindered, to discover and make accessible connected resources, and to support the ability to hide and compartmentalize connected resources. Network protocols can be part of the fabric supporting human accessible services that operate regardless of location, time, or space. Innovations can include service delivery and associated infrastructure, such as hardware and software. Services may be provided in accordance with specified Quality of Service (QoS) terms. The use of IoT devices and networks can be included in a heterogeneous network of connectivity including wired and wireless technologies.
COMMUNICATION APPARATUS AND CONTROL METHOD THEREOF, AND STORAGE MEDIUM
A communication apparatus includes a processing unit that executes communication protocol processing by an OS kernel in place of the OS kernel. When the communication protocol processing by the OS kernel is hooked, a determination unit determines a state of a neighborhood entry holding cache information on a MAC header to be added to transmission data. A control unit controls a header generation processing based on the determined state of the neighborhood entry. The control unit, if the neighborhood entry holds valid cache information, performs control such that a processing unit generates a header of a layer higher than a MAC layer and the MAC header and, if the neighborhood entry does not hold valid cache information, performs control such that the processing unit generates the header of the higher layer and the OS kernel generates the MAC header.
COMMUNICATION APPARATUS AND CONTROL METHOD THEREOF, AND STORAGE MEDIUM
A communication apparatus includes a processing unit that executes communication protocol processing by an OS kernel in place of the OS kernel. When the communication protocol processing by the OS kernel is hooked, a determination unit determines a state of a neighborhood entry holding cache information on a MAC header to be added to transmission data. A control unit controls a header generation processing based on the determined state of the neighborhood entry. The control unit, if the neighborhood entry holds valid cache information, performs control such that a processing unit generates a header of a layer higher than a MAC layer and the MAC header and, if the neighborhood entry does not hold valid cache information, performs control such that the processing unit generates the header of the higher layer and the OS kernel generates the MAC header.
SYSTEMS AND METHODS USING NETWORK ARTIFICIAL INTELLIGENCE TO MANAGE CONTROL PLANE SECURITY IN REAL-TIME
Described are methods, systems, and media for detecting malicious activity in a network by performing operations comprising: feeding network packets from the network into a header crypto engine; sending the network packets from the header crypto engine to a work scheduler; divaricating the network packets using the work scheduler based on flow data and header data of the network packets to at least one of a firewall and a neural network processor; generating output data comprising: a first output data from the firewall according to rules of the firewall; a second output data from the neural network processor based on behavioral analysis performed by the neural network processor, wherein the second output data is used to update the rules in the firewall; and aggregating the output data from the firewall and the neural network processor to detect malicious activity in the network.
SYSTEMS AND METHODS USING NETWORK ARTIFICIAL INTELLIGENCE TO MANAGE CONTROL PLANE SECURITY IN REAL-TIME
Described are methods, systems, and media for detecting malicious activity in a network by performing operations comprising: feeding network packets from the network into a header crypto engine; sending the network packets from the header crypto engine to a work scheduler; divaricating the network packets using the work scheduler based on flow data and header data of the network packets to at least one of a firewall and a neural network processor; generating output data comprising: a first output data from the firewall according to rules of the firewall; a second output data from the neural network processor based on behavioral analysis performed by the neural network processor, wherein the second output data is used to update the rules in the firewall; and aggregating the output data from the firewall and the neural network processor to detect malicious activity in the network.
Systems and methods for data transmission based on a link layer packet structure
A device may be configured to generate data packets including a packet header and a payload. The packet header may include a value that signals whether the payload encapsulates input data according to a single short packet encapsulation, a single long packet encapsulation, a segmented encapsulation, or a concatenated encapsulation.