Patent classifications
H04L41/0233
DETECTING ANOMALOUS COMMUNICATIONS
A computer-implemented method for detecting anomalous communications in a service oriented communication system. The method includes providing at least one decoy service, hosted by a decoy server communicably coupled to the service oriented communication system, wherein the at least one decoy service is addressable using a corresponding decoy service identifier; detecting, at the decoy server, a request to consume at least one instance of the at least one decoy service, wherein the request originates from a client communicably coupled to the decoy server via the service oriented communication system; and performing, at the decoy server, a response to the request to consume the at least one instance of the at least one decoy service.
METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR GENERATING RESPONDER ALERT DATA OBJECTS BASED ON GLOBAL ALERT POLICY DATA OBJECTS AND INLINE ALERT POLICY DATA OBJECTS
Various embodiments herein described are directed to methods, apparatuses and computer program products configured for improving alert generation and management in network computer systems. In some embodiments, a client device may generate one or more responder alert data objects for an incident data object based at least in part on global alert policy data object(s) and inline alert policy data object(s). Additional example embodiments provide various example global alert policy creation user interfaces, global alert policy edit user interfaces, inline alert policy creation user interfaces, and/or inline alert policy edit user interfaces that facilitate various user inputs and software operations in an incident alert and management platform.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
Systems and Methods for Managed Services Provisioning Using Service-Specific Provisioning Data Instances
A technical solution for significantly improving the scalability of the capability of an electronic information exchange platform is disclosed. Services provided by the platform may be described in a uniform way via service-specific provisioning descriptors. To provision services for a client system, a managed services provisioning system provides a service configuration interface through which a service associated with a tuple of a particular sender, receiver, and document type can be selected for further configuration. A service provisioning interface is dynamically generated for obtaining service-specific provisioning information from a user for generating a service-specific provisioning data instance that can be deployed to a backend system. At runtime, the backend system utilizes the service-specific provisioning data instance to provide the provisioned service for a client system. In this way, a variety of services can be efficiently provisioned for a diverse set of clients in a scalable, streamlined, and cost-effective manner.
Systems and Methods for Managed Services Provisioning Using Service-Specific Provisioning Data Instances
A technical solution for significantly improving the scalability of the capability of an electronic information exchange platform is disclosed. Services provided by the platform may be described in a uniform way via service-specific provisioning descriptors. To provision services for a client system, a managed services provisioning system provides a service configuration interface through which a service associated with a tuple of a particular sender, receiver, and document type can be selected for further configuration. A service provisioning interface is dynamically generated for obtaining service-specific provisioning information from a user for generating a service-specific provisioning data instance that can be deployed to a backend system. At runtime, the backend system utilizes the service-specific provisioning data instance to provide the provisioned service for a client system. In this way, a variety of services can be efficiently provisioned for a diverse set of clients in a scalable, streamlined, and cost-effective manner.
Network Architecture, Methods, and Devices for a Wireless Communications Network
- Stefan Parkvall ,
- Janne Peisa ,
- Gunnar Mildh ,
- Robert Baldemair ,
- Stefan Wager ,
- Jonas Kronander ,
- Karl Werner ,
- Richard Abrahamsson ,
- Ismet Aktas ,
- Peter Alriksson ,
- Junaid Ansari ,
- Shehzad Ali Ashraf ,
- Henrik Asplund ,
- Fredrik Athley ,
- Håkan Axelsson ,
- Joakim Axmon ,
- Johan Axnäs ,
- Kumar Balachandran ,
- Gunnar Bark ,
- Jan-Erik Berg ,
- Andreas Bergström ,
- Håkan Björkegren ,
- Nadia Brahmi ,
- Cagatay Capar ,
- Anders Carlsson ,
- Andreas Cedergren ,
- Mikael Coldrey ,
- Icaro L. J. da Silva ,
- Erik Dahlman ,
- Ali El Essaili ,
- Ulrika Engström ,
- Mårten Ericson ,
- Erik Eriksson ,
- Mikael Fallgren ,
- Rui Fan ,
- Gabor Fodor ,
- Pål Frenger ,
- Jonas FRIDÉN ,
- Jonas Fröberg Olsson ,
- Anders Furuskär ,
- Johan Furuskog ,
- Virgile Garcia ,
- Ather Gattami ,
- Fredrik GUNNARSSON ,
- Ulf Gustavsson ,
- Bo Hagerman ,
- Fredrik Harrysson ,
- Ning He ,
- Martin Hessler ,
- Kimmo Hiltunen ,
- Songnam Hong ,
- Dennis Hui ,
- Jörg Huschke ,
- Tim Irnich ,
- Sven Jacobsson ,
- Niklas Jaldén ,
- Simon Järmyr ,
- Zhiyuan Jiang ,
- Martin Johansson ,
- Niklas Johansson ,
- Du Ho Kang ,
- Eleftherios KARIPIDIS ,
- Patrik Karlsson ,
- Ali S. Khayrallah ,
- Caner Kilinc ,
- Göran N. Klang ,
- Sara Landström ,
- Christina Larsson ,
- Gen LI ,
- Bo Lincoln ,
- Lars Lindbom ,
- Robert Lindgren ,
- Bengt Lindoff ,
- Fredrik Lindqvist ,
- Jinhua Liu ,
- Thorsten Lohmar ,
- Qianxi Lu ,
- Lars Manholm ,
- Ivana Maric ,
- Jonas Medbo ,
- Qingyu Miao ,
- Reza Moosavi ,
- Walter Müller ,
- Elena Myhre ,
- Johan Nilsson ,
- Karl Norrman ,
- Bengt-Erik Olsson ,
- Torgny Palenius ,
- Sven PETERSSON ,
- Jose Luis Pradas ,
- Mikael Prytz ,
- Olav Queseth ,
- Pradeepa Ramachandra ,
- Edgar Ramos ,
- Andres Reial ,
- Thomas Rimhagen ,
- Emil Ringh ,
- Patrik Rugeland ,
- Johan Rune ,
- Joachim SACHS ,
- Henrik Sahlin ,
- Vidit Saxena ,
- Nima Seifi ,
- Yngve Selén ,
- Eliane Semaan ,
- Sachin Sharma ,
- Cong Shi ,
- Johan Sköld ,
- Magnus Stattin ,
- Anders Stjernman ,
- Dennis Sundman ,
- Lars Sundström ,
- Miurel Isabel Tercero Vargas ,
- Claes Tidestav ,
- Sibel Tombaz ,
- Johan TORSNER ,
- Hugo Tullberg ,
- Jari Vikberg ,
- Peter von Wrycza ,
- Thomas Walldeen ,
- Anders Wallén ,
- Pontus Wallentin ,
- Hai Wang ,
- Ke WANG HELMERSSON ,
- Jianfeng Wang ,
- Yi-Pin Eric Wang ,
- Niclas Wiberg ,
- Emma Wittenmark ,
- Osman Nuri Can Yilmaz ,
- Ali Zaidi ,
- Zhan Zhang ,
- Zhang ZHANG ,
- Yanli Zheng
Methods and apparatus in a fifth-generation wireless communications network, including an example method, in a wireless device, that includes determining a reporting quality threshold for a parameter related to channel state information (CSI); performing a measurement for each of a plurality of beams from a first predetermined set of beams for evaluation; evaluating the measurement for each of the plurality of beams against the reporting quality threshold; discontinuing the performing and evaluating of measurements in response to determining that the reporting quality threshold is met for one of the beams, such that one or more beams in the first predetermined set of beams are not measured and evaluated; and reporting, to the wireless communications network, CSI for the one of the beams.
Network Architecture, Methods, and Devices for a Wireless Communications Network
- Stefan Parkvall ,
- Janne Peisa ,
- Gunnar Mildh ,
- Robert Baldemair ,
- Stefan Wager ,
- Jonas Kronander ,
- Karl Werner ,
- Richard Abrahamsson ,
- Ismet Aktas ,
- Peter Alriksson ,
- Junaid Ansari ,
- Shehzad Ali Ashraf ,
- Henrik Asplund ,
- Fredrik Athley ,
- Håkan Axelsson ,
- Joakim Axmon ,
- Johan Axnäs ,
- Kumar Balachandran ,
- Gunnar Bark ,
- Jan-Erik Berg ,
- Andreas Bergström ,
- Håkan Björkegren ,
- Nadia Brahmi ,
- Cagatay Capar ,
- Anders Carlsson ,
- Andreas Cedergren ,
- Mikael Coldrey ,
- Icaro L. J. da Silva ,
- Erik Dahlman ,
- Ali El Essaili ,
- Ulrika Engström ,
- Mårten Ericson ,
- Erik Eriksson ,
- Mikael Fallgren ,
- Rui Fan ,
- Gabor Fodor ,
- Pål Frenger ,
- Jonas FRIDÉN ,
- Jonas Fröberg Olsson ,
- Anders Furuskär ,
- Johan Furuskog ,
- Virgile Garcia ,
- Ather Gattami ,
- Fredrik GUNNARSSON ,
- Ulf Gustavsson ,
- Bo Hagerman ,
- Fredrik Harrysson ,
- Ning He ,
- Martin Hessler ,
- Kimmo Hiltunen ,
- Songnam Hong ,
- Dennis Hui ,
- Jörg Huschke ,
- Tim Irnich ,
- Sven Jacobsson ,
- Niklas Jaldén ,
- Simon Järmyr ,
- Zhiyuan Jiang ,
- Martin Johansson ,
- Niklas Johansson ,
- Du Ho Kang ,
- Eleftherios KARIPIDIS ,
- Patrik Karlsson ,
- Ali S. Khayrallah ,
- Caner Kilinc ,
- Göran N. Klang ,
- Sara Landström ,
- Christina Larsson ,
- Gen LI ,
- Bo Lincoln ,
- Lars Lindbom ,
- Robert Lindgren ,
- Bengt Lindoff ,
- Fredrik Lindqvist ,
- Jinhua Liu ,
- Thorsten Lohmar ,
- Qianxi Lu ,
- Lars Manholm ,
- Ivana Maric ,
- Jonas Medbo ,
- Qingyu Miao ,
- Reza Moosavi ,
- Walter Müller ,
- Elena Myhre ,
- Johan Nilsson ,
- Karl Norrman ,
- Bengt-Erik Olsson ,
- Torgny Palenius ,
- Sven PETERSSON ,
- Jose Luis Pradas ,
- Mikael Prytz ,
- Olav Queseth ,
- Pradeepa Ramachandra ,
- Edgar Ramos ,
- Andres Reial ,
- Thomas Rimhagen ,
- Emil Ringh ,
- Patrik Rugeland ,
- Johan Rune ,
- Joachim SACHS ,
- Henrik Sahlin ,
- Vidit Saxena ,
- Nima Seifi ,
- Yngve Selén ,
- Eliane Semaan ,
- Sachin Sharma ,
- Cong Shi ,
- Johan Sköld ,
- Magnus Stattin ,
- Anders Stjernman ,
- Dennis Sundman ,
- Lars Sundström ,
- Miurel Isabel Tercero Vargas ,
- Claes Tidestav ,
- Sibel Tombaz ,
- Johan TORSNER ,
- Hugo Tullberg ,
- Jari Vikberg ,
- Peter von Wrycza ,
- Thomas Walldeen ,
- Anders Wallén ,
- Pontus Wallentin ,
- Hai Wang ,
- Ke WANG HELMERSSON ,
- Jianfeng Wang ,
- Yi-Pin Eric Wang ,
- Niclas Wiberg ,
- Emma Wittenmark ,
- Osman Nuri Can Yilmaz ,
- Ali Zaidi ,
- Zhan Zhang ,
- Zhang ZHANG ,
- Yanli Zheng
Methods and apparatus in a fifth-generation wireless communications network, including an example method, in a wireless device, that includes determining a reporting quality threshold for a parameter related to channel state information (CSI); performing a measurement for each of a plurality of beams from a first predetermined set of beams for evaluation; evaluating the measurement for each of the plurality of beams against the reporting quality threshold; discontinuing the performing and evaluating of measurements in response to determining that the reporting quality threshold is met for one of the beams, such that one or more beams in the first predetermined set of beams are not measured and evaluated; and reporting, to the wireless communications network, CSI for the one of the beams.
METHOD AND SYSTEM FOR MANAGING NETWORK-TO-NETWORK INTERCONNECTION
This disclosure describes methods and systems to externally manage network-to-network interconnect configuration data in conjunction with a centralized database subsystem. An example of the methods includes receiving and storing, in the centralized database subsystem, data indicative of user intent to interconnect at least a first network and a second network. The example method further includes, based at least in part on the data indicative of user intent, determining and storing, in the centralized database subsystem, a network intent that corresponds to the user intent. The example method further includes providing data indicative of the network intent from the centralized database subsystem to a first data plane adaptor, associated with the first network, and a second data plane adaptor, associated with the second network.
METHOD AND SUBSYSTEM THAT COLLECTS, STORES, AND MONITORS POPULATION METRIC DATA WITHIN A COMPUTER SYSTEM
The current document is directed to methods and subsystems within computing systems, including distributed computing systems, that collect, store, process, and analyze population metrics for types and classes of system components, including components of distributed applications executing within containers, virtual machines, and other execution environments. In a described implementation, a graph-like representation of the configuration and state of a computer system included aggregation nodes that collect metric data for a set of multiple object nodes and that collect metric data that represents the members of the set over a monitoring time interval. Population metrics are monitored, in certain implementations, to detect outlier members of an aggregation.