Patent classifications
H04L69/40
Management of a security system at a premises
A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.
Communication system, first server, second server, non-transitory computer-readable recording medium storing computer-readable instructions for first server and non-transitory computer-readable recording medium storing computer-readable instructions for second server
A first server may receive error information from a communication device at a predetermined timing, send error receipt information to a second server. The second server may send destination information to the first server, the destination information indicating a destination in the second server to which the first server is to send a changing signal in response to the state of the communication device being changed from the error state to a non-error state. The first server may send the changing signal to the second server by using the destination information. The second server may identify from a memory first data to be sent to the communication device, send first relation information related to the identified first data to the first server. The first server may send to the communication device first instruction information corresponding to the first relation information.
Linear view-change BFT
Techniques for implementing linear view-change in a Byzantine Fault Tolerant (BFT) protocol running on a distributed system comprising n replicas are provided. According to one set of embodiments, at a time of performing a view-change from a current view number v to a new view number v+1, a replica in the n replicas corresponding to a new proposer for new view number v+1 can generate a PREPARE message comprising a single COMMIT certificate, where the single COMMIT certificate is the highest COMMIT certificate the new proposer is aware of. The new proposer can then transmit the PREPARE message with the single COMMIT certificate to all other replicas in the n replicas.
Live virtual constructive gateway systems and methods
A live virtual constructive (LVC) gateway system is configured to transparently separate, merge, and route data traffic between operator systems, live tactical Line Replaceable Unit (LRU) systems, and simulated tactical LRU systems. The LVC gateway is configured to receive LRU commands from an operator system, parse, the commands, and reconstruct the commands suitable for transmission to live or simulated tactical LRU systems. The LVC gateway is also configured to receive live and simulated status and target data from live tactical LRU and simulated tactical LRU systems, respectively, and merge the data for transmission to an operator system.
DATA REPLICATION TO MEET A RECOVERY POINT OBJECTIVE
A storage system performs data replication with a recovery point objective (RPO). The storage system replicates data at intervals through data transfers over a network. The storage system determines bandwidth of the network. The storage system determines the intervals for replicating the data, based on size of data transfers, network bandwidth, and the recovery point objective.
I/O to unpinned memory supporting memory overcommit and live migration of virtual machines
Systems and methods of error handling in a network interface card (NIC) are provided. For a data packet destined for a local virtual machine (VM), if the NIC cannot determine a valid translation memory address for a virtual memory address in a buffer descriptor from a receive queue of the VM, the NIC can retrieve a backup buffer descriptor from a hypervisor queue, and store the packet in a host memory location indicated by an address in the backup buffer descriptor. For a transmission request from a local VM, if the NIC cannot determine a valid translated address for a virtual memory address in the packet descriptor from a transmit queue of the VM, the NIC can send a message to a hypervisor backup queue, and generate and transmit a data packet based on data in a memory page reallocated by the hypervisor.
MAINTAINING CLINICAL MESSAGING DURING NETWORK INSTABILITY
Various techniques for facilitating communication with and across a clinical environment and a cloud environment are described. For example, a method for providing messaging in a clinical environment during a temporary network interruption is described. A connectivity adapter may keep the messages in the queue despite the temporary network interruption. As long as the network connection is restored before the messages become stale, the connectivity adapter may be able to transmit the messages in the queue despite the network interruption.
WIRELESS DATA LINK LAYER COMPRESSION AND DECOMPRESSION
A method of processing data frames for transmission on a wireless access interface of a wireless communications system, the method comprising receiving a first data frame comprising a first protocol header, the first protocol header associated with a medium access control (MAC) frame format for data transmission within a local area network (LAN), applying header compression in accordance with a header compression context to the first data frame by compressing one or more protocol header fields of the first protocol header to form a first compressed data frame for transmission on the wireless access interface, receiving a second data frame comprising a second protocol header associated with the MAC frame format, and determining that none of the fields of the second protocol header are to be compressed in accordance with the header compression context before the second data frame is transmitted on the wireless access interface.
Method of managing an emergency mode transaction procedure, and an associated device
A method and device for managing an emergency procedure of an emergency transaction mode that can be activated in the event of a computer attack on or a failure of a transaction network. The method may be carried out by an electronic device suitable for performing a transaction in a normal mode or in the emergency mode. The method performs operations that may include receiving an activation command for activating the emergency mode procedure, where the command includes an identifier of the procedure and first encrypted data; verifying the activation command, which includes verifying the first encrypted data; and if verification of the command is successful, activating the emergency procedure.
System, computer program, computer-readable medium and method for providing a redundant relay, particularly a routing function
A system, computer program, computer-readable medium and method for providing a redundant relay, particularly routing function in a network, wherein a superordinate subnetwork is connected to a subordinate subnetwork via redundant relays, particularly routers, a maximum of one of the redundant relays is operated in an active mode at any one time, while the remaining relay(s) are in standby mode, each redundant relay forms a relay redundancy module for controlling the relay mode and a DHCPv6 client for processing a prefix delegation, particularly in accordance with RFC 3633, and the redundant relays each include a relay control module, to which the relay redundancy module of the particular relay signals the current relay mode, and the relay control module of the active relay synchronizes a virtual DUID of its DHCPv6 client and/or a prefix delegated to the active relay to the (or each) relay in standby mode.