H04L12/6418

Traffic delivery using anycast and end user-based mapping in an overlay network

An overlay network is enhanced to provide traffic delivery using anycast and end user mapping. An anycast IP address is associated with sets of forwarding machines positioned in the overlay network. These locations correspond with IP addresses for zero rated billing traffic. In response to receipt at a forwarding machine of a packet, the machine issues an end user mapping request to the mapping mechanism. The mapping request has an IP address associated with the client from which the end user request originates. The mapping mechanism resolves the request and provides a response to the request. The response is an IP address associated with a set of server machines distinct from the forwarding machine. The forwarding machine encapsulates the packet and proxies the connection to the identified server. The server receives the connection, decapsulates the request, and processes the packet. The server machine responds to the requesting client directly.

Prioritizing messages within a message network

A system and a method are disclosed for recommending electronic messages in a message sharing system. Users can post messages to the message sharing system. These messages from posting users are received by the system and sent to receiving users that have subscribed to the posting users. The receiving users interact with the messages in various ways, such as by sharing the messages with other users. Interaction information is received for each of the electronic messages. The interaction information includes an indication of the number of interactions with the electronic message by receiving users. A score is determined for each electronic message based on the interaction information. Electronic messages are selected for being recommended to a user or a group of users based on the scores. The recommendations are then sent to the users, enabling users to better focus their attention on messages that are likely to be interesting.

Packet processing method and router
11606289 · 2023-03-14 · ·

This application discloses a packet processing method and an LSR. The method includes: receiving, by an Ingress LSR of a first MPLS tunnel, a first notification packet that is based on an IGP, where the first notification packet includes an ELC flag, which is used to indicate that the first Egress LSR has ELC; after learning from the first notification packet that the first Egress LSR has ELC, inserting a label into a first packet, to generate a second packet, where the label forms an MPLS label stack, which includes, from bottom to top, a first EL, a first ELI, and a first TL; and sending the second packet to the first Egress LSR through the first MPLS tunnel.

Programmable infrastructure gateway for enabling hybrid cloud services in a network environment

An example method for a programmable infrastructure gateway for enabling hybrid cloud services in a network environment is provided and includes receiving an instruction from a hybrid cloud application executing in a private cloud, interpreting the instruction according to a hybrid cloud application programming interface, and executing the interpreted instruction in a public cloud using a cloud adapter. The method is generally executed in the infrastructure gateway including a programmable integration framework allowing generation of various cloud adapters using a cloud adapter software development kit, the cloud adapter being generated and programmed to be compatible with a specific public cloud platform of the public cloud. In specific embodiments, identical copies of the infrastructure gateway can be provided to different cloud service providers who manage disparate public cloud platforms; each copy of the infrastructure gateway can be programmed differently to generate corresponding cloud adapters compatible with the respective public cloud platforms.

Data processing method and apparatus

A first physical layer coding data block flow and a second physical layer coding data block flow are received. A first data flow is obtained according to the first physical layer coding data block flow and the second physical layer coding data block flow. Multiple subframe headers are generated. A second data flow is obtained according to the first data flow and the multiple subframe headers. Data blocks in the second data flow are distributed to a first physical medium dependent (PMD) sublayer circuit and to a second PMD sublayer circuit to obtain a first PMD sublayer data flow and a second PMD sublayer data flow.

Receiver synchronization

A receiver circuit includes a feedback loop including a device. The receiver circuit also includes a register and a sequencer. The sequencer is configured to, responsive to an error signal being below a threshold value, cause the register to store a value indicative of the state of the feedback loop. The sequencer is also configured to cause the feedback loop to transition to a lower power state, and, responsive to a detected wake-up event, cause the previously stored value indicative of the state of the feedback loop to be loaded from the register into the device and enable the feedback loop.

Lighting control system

Intelligent illumination device are disclosed that use components in an LED light to perform one or more of a wide variety of desirable lighting functions for very low cost. The LEDs that produce light can be periodically turned off momentarily, for example, for a duration that the human eye cannot perceive, in order for the light to receive commands optically. The optically transmitted commands can be sent to the light, for example, using a remove control device. The illumination device can use the LEDs that are currently off to receive the data and then configure the light accordingly, or to measure light. Such light can be ambient light for a photosensor function, or light from other LEDs in the illumination device to adjust the color mix.

Migrating authenticated content towards content consumer

Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.

Method and apparatus for environmental sensing
11665024 · 2023-05-30 · ·

A method for verifying an alarm condition in an environmental sensing system includes monitoring data received from environmental sensors; detecting anomalous data received from one of the plurality of environmental sensors; determining the context in which the anomalous data was acquired is consistent with typical usage activities; and providing an alarm condition alert when the determined context is not consistent with typical activities. A system for intelligently monitoring environmental conditions includes environmental sensors configured to monitor first and second environmental conditions and to communicate with an intelligent analysis module. The intelligent analysis module is configured with logic to determine whether anomalous data has been collected by the environmental sensors, to determine the context in which the anomalous data was collected, to determine whether the anomalous data can be attributed to a routine activity, and to provide an alarm condition if the anomalous data cannot be attributed to a routine activity.

Cloud system for controlling outdoor grill with mobile application
11622008 · 2023-04-04 · ·

Embodiments are directed to communicating with and controlling operation of electronically-controlled appliances. In one scenario, a computer system receives a first input from a computing system indicating that an electronically-controlled appliance is permitted to communicate with a cloud computing platform. The computer system generates a notification that is to be sent to a software application, where the software application is configured to control functions of the electronically-controlled appliance. The computer system transmits the generated notification to the software application, where the generated notification indicates that the cloud computing platform is communicably connected to the electronically-controlled appliance. The computer system then receives a second input from the software application indicating that specified functions are to be performed on the electronically-controlled appliance, and transmits instructions to the electronically-controlled appliance to perform the specified functions. These functions are then interpreted and carried out by a hardware controller on the electronically-controlled appliance.