Patent classifications
H04L67/06
File-based downlink transmission and retransmission
Disclosed are techniques for wireless communication. In an aspect, a network entity transmits, to a user equipment (UE), at least one file, the at least one file comprising a group of data packets, wherein each data packet of the group of data packets of the at least one file is associated with a file identifier of the at least one file, transmits, to the UE, after transmitting the last data packet of the group of data packets of the at least one file, a request for the UE to report a reception status of the at least one file, transmits, to the UE, one or more repair bits for the at least one file, receives an acknowledgment from the UE, and ceases transmission of the one or more repair bits upon reception of the acknowledgment from the UE.
Maintaining a cached version of a file at a router device
A router device may receive, from a user device, a request for access to a file. The router device may determine that a cached version of the file is stored in a first data structure associated with the router device. The router device may communicate with a server device to determine whether the cached version of the file is current. The server device may be associated with a second data structure that stores a master version of the file. The router device may generate a copy of the cached version of the file based on communicating with the server device. The router device may send the copy of the cached version of the file to the user device.
Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
Disclosed herein are embodiments of methods, devices and systems for device fingerprinting and automatic and dynamic software deployment to one or more endpoints on a computer network. The device fingerprinting systems and devices herein are configured to operate with limited data without sitting between network devices and the internet, without monitoring all network traffic, and without limited or no active scanning. The embodiments herein may passively collect information as distributed peers and may perform very limited active scans. In some embodiments, the information is used as an input to a custom hierarchical learning model to fingerprint devices on a network by identifying attributes of the devices such as the operating system family, operating system version, and device role. In some embodiments, a dynamic deployer selection process may be utilized to simply and efficiently deploy software. Some embodiments herein involve end-to-end encryption of credentials in a deployment process.
Method and system for automatic creation of trust communities
A method of automatically creating trust communities in a fleet of devices. The method includes finding candidate devices in a fleet of devices via one or more candidate discovery techniques and generating device-related data based on the candidate devices that are found, analyzing the device-related data via an analytics engine and creating one or more fleet orchestrator device lists based on the analysis of the device-related data, and automatically creating one or more new trust communities or suggesting joining one or more previously existing trust communities based at least on the one or more fleet orchestrator device lists for the candidate devices, wherein the one or more new trust communities or previously existing trust communities include at least a sub-set of the devices in the fleet, and wherein at least one of the managed devices in the sub-set of devices is configured as a root device to publish files via a file sharing function.
Method and system for automatic creation of trust communities
A method of automatically creating trust communities in a fleet of devices. The method includes finding candidate devices in a fleet of devices via one or more candidate discovery techniques and generating device-related data based on the candidate devices that are found, analyzing the device-related data via an analytics engine and creating one or more fleet orchestrator device lists based on the analysis of the device-related data, and automatically creating one or more new trust communities or suggesting joining one or more previously existing trust communities based at least on the one or more fleet orchestrator device lists for the candidate devices, wherein the one or more new trust communities or previously existing trust communities include at least a sub-set of the devices in the fleet, and wherein at least one of the managed devices in the sub-set of devices is configured as a root device to publish files via a file sharing function.
INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE
An information processing method and an electronic device are provided. The method is performed by a first wearable device, where the first wearable device includes a first image collector, and the method includes: obtaining a second face image by the first image collector and receiving a first face image from the second wearable device in a case that the first wearable device and a second wearable device are in a preset positional relationship; and processing first target information from the second wearable device in a case that the first face image matches the second face image.
INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE
An information processing method and an electronic device are provided. The method is performed by a first wearable device, where the first wearable device includes a first image collector, and the method includes: obtaining a second face image by the first image collector and receiving a first face image from the second wearable device in a case that the first wearable device and a second wearable device are in a preset positional relationship; and processing first target information from the second wearable device in a case that the first face image matches the second face image.
RESOURCE DOWNLOAD IN PEER-TO-PEER NETWORKS
In one example in accordance with the present disclosure, a system is described. The system includes a resource splitter to determine a quantity of blocks to divide a resource to be downloaded. A transmitter of the system broadcasts, per block, an identification request through a peer-to-peer network to identify computing devices that have the block. A downloader of the system downloads blocks from other computing devices on the peer-to-peer network. The system also includes an assembler to re-assemble the resource from received blocks.
SYSTEMS, METHODS, AND APPARATUS FOR REMOTE DATA TRANSFERS TO MEMORY
A method may include receiving, at a target, from a server, a command, information to identify data, and access information to perform a data transfer using a memory access protocol, and performing, based on the command, based on the access information, the data transfer between the target and a client using the memory access protocol. The information to identify the data may include an object key, and the object key and the access information may be encoded, at least partially, in an encoded object key. The method may further include sending, based on the data transfer, from the target to the server, a completion. The method may further include sending, based on the completion, from the server to the client, an indication of success. The method may further include reconstructing the data based on the parity data.
SYSTEMS, METHODS, AND APPARATUS FOR REMOTE DATA TRANSFERS TO MEMORY
A method may include receiving, at a target, from a server, a command, information to identify data, and access information to perform a data transfer using a memory access protocol, and performing, based on the command, based on the access information, the data transfer between the target and a client using the memory access protocol. The information to identify the data may include an object key, and the object key and the access information may be encoded, at least partially, in an encoded object key. The method may further include sending, based on the data transfer, from the target to the server, a completion. The method may further include sending, based on the completion, from the server to the client, an indication of success. The method may further include reconstructing the data based on the parity data.