Patent classifications
H04L2209/84
CONTAINER SCHEDULER WITH MULTIPLE QUEUES FOR SPECIAL WORKLOADS
A computer-implemented method to schedule special containers using a multi-queue scheduler. The method includes receiving, by a scheduler, a first pod including a first container including a first queue, a second queue, an event handler, and an error handler. The method further includes obtaining a set of characteristics for the first pod and determining that the first pod is a special pod. The method includes adding the first pod to the first queue, wherein the first queue is a special queue and includes a special function. The method also includes initiating the special function. The method further includes assigning, based on one or more placement rules, the first pod to a first node of a plurality of nodes.
APPARATUS FOR ELECTRONIC CONTROL OF VEHICLE, APPARATUS FOR GATEWAY AND VEHICLE INCLUDING THE SAME
A vehicle may include an electronic control apparatus of the vehicle that encrypts data, generates an encrypted message including the encrypted data and a message authentication code (MAC) of the encrypted data, and transmits the encrypted message and identification information corresponding to the encrypted message to another apparatus. The vehicle also includes a gateway apparatus that receives the encrypted message and the identification information, determines whether the identification information is identical to pre-stored identification information, generates a MAC of the encrypted data, determines whether the generated MAC is identical to the MAC obtained from the encrypted message, and routes the encrypted message based on the determination result.
METHOD FOR CREATING AND MAINTAINING A DISTRIBUTED LEDGER OF VEHICLE GAS CONSUMPTION AND WEAR AND TEAR INFORMATION
A distributed ledger operated by a group of network participants according to a set of consensus rules stores vehicle condition data and generated vehicle condition reports, The vehicle condition data may be received directly from a vehicle or an associated mobile device and the vehicle condition report may be accessed by an authorized user.
SECURE BROADCAST DELIVERY AND VERIFICATION
A vehicle receives a first portion of content via ATSC broadcast, generates a random nonce, responsive to receiving the content, and sends the nonce and a request for content verification to a remote server. The vehicle receives a message from the remote server indicating whether the first portion of content is likely valid, the message including a second portion of content and a hash value when the content is likely valid. The vehicle then calculates a second hash value, using the random nonce and the first portion of content. The vehicle compares the second hash value to the first hash value, and responsive to the second hash value matching the first hash value, combines the second portion of content and the first portion of content to create combined content. The vehicle then uses a security strategy to convert the combined content into utilizable content, and utilizes the content.
Authenticating Plaintext And Ciphertext In A Vehicle-To-Everything (V2X) Message
Methods and devices and systems for implementing the methods for authenticating plaintext and ciphertext in a vehicle-to-everything (V2X) message include generating ciphertext from a plaintext message to be transmitted in a V2X message, generating a hash of the ciphertext and a hash of the plaintext message, generating a digital signature of a concatenation of the hash of the ciphertext and the hash of the plaintext message, and sending to a network node a V2X message that includes the ciphertext, the hash of the plaintext message, and the digital signature. The hash of the plaintext message, and the digital signature may be configured to enable the network node to verify that the V2X endpoint node signed the concatenation.
METHOD AND SYSTEM FOR PERFORMING IDENTITY CHECKS IN A DISTRIBUTED SYSTEM
A method at a remote proxy on a first node, the method including receiving, at the remote proxy, a first message from a first module on the first node, the first message being directed to a second module on a second node; verifying the first message at the remote proxy utilizing operating system verification; determining, based on a manifest at the remote proxy, the second node; signing, using a private key for the first node, the first message; and sending the first message to the second node.
METHOD AND APPARATUS OF MULTI-LINK COMMUNICATION FOR VEHICLE IN COMMUNICATION SYSTEM
An operation method performed by an access point in a communication system may comprise: transmitting, to a first station, a first frame by using a third communication scheme, the first frame including information on an address of the first station, a first transmission time length, a first reception order, and a first communication scheme to be used for transmitting data to the first station, and information on a second transmission time length, a second reception order, and a second communication scheme to be used for transmitting second data to one or more second stations; receiving, from the first station, a first response frame for the first frame from the first station at a first reception time; and receiving, from the second station, a second response frame for the first frame at a second reception time.
Security Key For Unmanned Aerial Vehicle
Described herein are systems and methods using a security key for an unmanned aerial vehicle. For example, some methods include during flight of an unmanned aerial vehicle, encrypting, using a public key stored by the unmanned aerial vehicle, a symmetric key that is used to encrypt media data captured using one or more sensors of the unmanned aerial vehicle to obtain encrypted media data; landing the unmanned aerial vehicle; connecting a key device to the unmanned aerial vehicle via a serial port connector of the key device and a serial port connector of the unmanned aerial vehicle; while the key device is connected to the unmanned aerial vehicle, decrypting, using a private key stored on the key device, the encrypted symmetric key, which in turn is used to decrypt a portion of the encrypted media data to obtain decrypted media data; and transmitting a portion of the decrypted media data.
MODIFICATION OF TRANSPORT FUNCTIONALITY BASED ON CARBON FOOTPRINT
To encourage users to improve their carbon footprint, a transport may be provided with an enhanced operating manner in response to external events that lower the carbon footprint of one or more occupants of the transport. Events, such as lowering the energy consumption of a person's home dwelling, may be communicated to the transport and trigger an enhanced mode in the transport, such as an enhanced driving mode (e.g. sport mode) or an enhanced charging mode.
Methods and systems for segmenting computing devices in a network
Methods and systems of segmenting computing devices in a wireless network having an access point broadcasting in a single domain are described. In an exemplary method, a request to join the wireless network is received from a computing device. The request is associated with an identifier. When the identifier is not associated with a virtual network within the wireless network, a virtual network is configured within the wireless network and the identifier is associated thereto and the computing device is assigned thereto. When the identifier is associated with an existing virtual network within the wireless network, the computing device is assigned to the existing virtual network.