H04L69/26

Distributed Consent Protecting Data Across Systems And Services
20200280443 · 2020-09-03 · ·

Non-limiting examples of the present disclosure relate to generation and implementation of a new security protocol that is used to secure common data access transactions across distributed network examples. An exemplary proof of verification protocol is disclosed that implements consensus security mechanisms across a plurality of distributed nodes, which may be utilized to validate owners of data in common data access transactions. Extending principles of blockchain security to common data access transactions and Internet of Things (IoT) networking requires a solution that: improves speed in transactional processing; reduces computational complexity; and presents efficient, secure and repeatable validation for owners of data in distributed networking environments. An exemplary proof of verification protocol provides such technical advantages by validating both user-specific data for a subscriber of an application/service and session data for user activity (past and present) within the application/service.

Stream control transmission protocol SCTP-based communications method and system, and apparatus
10764411 · 2020-09-01 · ·

The present disclosure discloses an SCTP-based communications method and system, and an apparatus. The method includes: A network element selector receives an SCTP packet that includes a plurality of SCTP data chunks of a plurality of user terminals. Because each SCTP data chunk carries index information, the network element selector may select a service providing device for each user terminal based on the index information carried in each SCTP data chunk. Therefore, application layer messages of different user terminals in the SCTP may be routed to different servers based on LBI parameters, and corresponding session persistence is implemented in a subsequent interaction process.

Intelligent REST client for operating a data storage system

Improved systems, methods, and techniques for generating representational state transfer (REST) requests from a client computer to a server computer. The disclosed techniques employ a REST application programming interface (also referred to as the RESTful API) for use in receiving the REST requests at the server computer from the client computer, and providing REST responses from the server computer to the client computer. The disclosed techniques further employ an intelligent REST client configured as a webpage (also referred to as the intelligent REST client webpage) that can be accessed by a browser running on the client computer, and transmitted or otherwise served by the server computer for display on the browser of the client computer. The intelligent REST client webpage may be employed by a user of the client computer for efficiently interacting with the RESTful API of the server computer.

Distributed consent protecting data across systems and services
10749676 · 2020-08-18 · ·

Non-limiting examples of the present disclosure relate to generation and implementation of a new security protocol that is used to secure common data access transactions across distributed network examples. An exemplary proof of verification protocol is disclosed that implements consensus security mechanisms across a plurality of distributed nodes, which may be utilized to validate owners of data in common data access transactions. Extending principles of blockchain security to common data access transactions and Internet of Things (IOT) networking requires a solution that: improves speed in transactional processing; reduces computational complexity; and presents efficient, secure and repeatable validation for owners of data in distributed networking environments. An exemplary proof of verification protocol provides such technical advantages by validating both user-specific data for a subscriber of an application/service and session data for user activity (past and present) within the application/service.

UTILITY METER READING TYPE CODE CONVERSION
20200257696 · 2020-08-13 ·

A system for processing reading records collected from a resource distribution network and converting IEC reading type codes is provided. For example, a meter data management system obtains meter reading records that are collected from meter nodes deployed in a resource distribution network. Each of the meter nodes is configured to measure characteristics of resource consumption at a location associated with the meter node, and each of the meter reading records includes a reading value of the resource consumption and an IEC reading type code identifying a type of the reading value. The meter data management system processes the meter reading records by converting a reading record from its original IEC reading type code to a common IEC reading type code so that the multiple meter reading records can be aggregated to generate a load profile. Loads associated with the meter nodes can be adjusted based on the generated load file.

Supporting internet protocol version 4 (IPv4) extension headers
10742775 · 2020-08-11 · ·

A method implemented by a network element (NE) comprises receiving, by a receiver of the NE, an Internet Protocol (IP) version 4 (IPv4) packet from another NE, wherein the IPv4 packet comprises an IPv4 header, an extension header, and upper layer data, wherein the IPv4 header comprises a protocol number associated with the extension header, and wherein the IPv4 packet comprises a total length of the extension header, and processing, by a processor coupled to the receiver, the IPv4 packet based on the total length of the extension header.

Hardware Configurable Security, Monitoring And Automation Controller Having Modular Communication Protocol Interfaces

A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide such functionality by providing for installation of removable, modular communication adapters for communication with a variety of devices external to the security, monitoring and automation controller.

SECURITY, MONITORING AND AUTOMATION CONTROLLER ACCESS AND USE OF LEGACY SECURITY CONTROL PANEL INFORMATION

A system, method and apparatus for controller functionality for each of security, monitoring and automation, as well as a bidirectional Internet gateway, is provided. Such functionality is provided by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. In addition, functionality for gathering configuration information from a previously-installed security system and using that information in a subsequent takeover of that security system is provided.

ELECTRONIC MESSAGE TRANSLATION MANAGEMENT

A computer-implemented method of operation of a translation manager intermediating message distribution in a plurality of networked devices, comprising receiving at the translation manager a request from a networked device for registration; parsing the message by the translation manager to derive an identifier of the networked device; determining by the translation manager at least one capability of the networked device; creating a pairing of the identifier of the networked device and a profile comprising the at least one capability of the networked device; storing the pairing in a data store for use by the translation manager on request to translate a message. The storing the pairing may comprise populating a lookup table and/or operating a database.

DEVICE AND METHOD FOR V2X COMMUNICATION
20200228946 · 2020-07-16 · ·

Disclosed is a method by which a V2X communication device for a vehicle transmits a CPM message. The method for transmitting the CPM message comprises the steps of: determining a transmission mode of the CPM message for generating a collective perception for at least one object detected by the V2X communication device; and transmitting the CPM message on the basis of the transmission mode. The CPM message corresponds to a dynamic CPM message for transmitting dynamic data or a full CPM message for transmitting the dynamic data and static data, wherein the dynamic CPM message can include a dynamic container containing the dynamic data, and the full CPM message can include the dynamic container containing the dynamic data and the static container containing static data.