H04L67/1001

Methods and systems for providing a customized network
11503029 · 2022-11-15 · ·

In some embodiments, a system is a reverse-proxying HTTP cache server that handles user session management and dynamically forwards requests to origin/backend servers based on the content being requested. It caches data from origin servers in order to reduce the stress placed on each origin server. It uses encrypted authorization tokens to handle session management and is able to modify origin data on-the-fly in order to inject per-client authorization information into the data stream. It can enforce maximum concurrent session limits, user bans, limit exemptions, and time-limited live content previews.

Methods and systems for providing a customized network
11503029 · 2022-11-15 · ·

In some embodiments, a system is a reverse-proxying HTTP cache server that handles user session management and dynamically forwards requests to origin/backend servers based on the content being requested. It caches data from origin servers in order to reduce the stress placed on each origin server. It uses encrypted authorization tokens to handle session management and is able to modify origin data on-the-fly in order to inject per-client authorization information into the data stream. It can enforce maximum concurrent session limits, user bans, limit exemptions, and time-limited live content previews.

Global internet of things (IoT) quality of service (QoS) realization through collaborative edge gateways

Global Internet of things (IoT) quality of service (QoS) is provided through self-forming, self-healing, and/or collaborative edge IoT gateways. Moreover, global IoT services are provided by logically extending cellular networks with roaming partners to backhaul, track, and/or manage the globally deployed edge IoT gateways. In one aspect, real-time QoS and/or monitoring capabilities for the global IoT services can be provided through a communication between the edge IoT gateways and an edge gateway controller deployed within a cloud. The edge IoT gateways form a structured mesh network to coordinate workload execution under control of the edge gateway controller, which can facilitate a highly efficient QoS and/or SLA management for mobile IoT sensors, to provide a secure monitoring and/or diagnostic capability for the global IoT services.

Global internet of things (IoT) quality of service (QoS) realization through collaborative edge gateways

Global Internet of things (IoT) quality of service (QoS) is provided through self-forming, self-healing, and/or collaborative edge IoT gateways. Moreover, global IoT services are provided by logically extending cellular networks with roaming partners to backhaul, track, and/or manage the globally deployed edge IoT gateways. In one aspect, real-time QoS and/or monitoring capabilities for the global IoT services can be provided through a communication between the edge IoT gateways and an edge gateway controller deployed within a cloud. The edge IoT gateways form a structured mesh network to coordinate workload execution under control of the edge gateway controller, which can facilitate a highly efficient QoS and/or SLA management for mobile IoT sensors, to provide a secure monitoring and/or diagnostic capability for the global IoT services.

Dynamic optimization of backup policy
11500735 · 2022-11-15 · ·

Embodiments of the present disclosure provide a method of backup management, an electronic device and a computer program product. The method comprises: determining a plurality of candidate backup policies for a plurality of clients of a data backup system, determining an expected load balance degree with respect to time for the data backup system to perform data backups for the plurality of clients using the plurality of candidate backup policies, determining an actual load balance degree with respect to time for the data backup system while the data backup system is performing the data backups for the plurality of clients using a plurality of current backup policies, and selecting a plurality of backup policies to be used for the plurality of clients respectively, based on a comparison of the expected load balance degree and the actual load balance degree.

SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION

This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.

SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION

This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.

SECURE ENROLMENT OF SECURITY DEVICE FOR COMMUNICATION WITH SECURITY SERVER

Provided is novel technology for secure security data transmission and more particularly for registering network-enabled security devices such as IP cameras to a security server over a public network such as to a cloud-based security service. An enrolment server is provided that is logged into using a computing device to request and receive an activation code for the security device. The activation code is then provided to the security device, e.g. directly by the computing device. The Security device authenticates itself based on the activation code and in one example provides a public key that will be used to verify its registration. Data transmissions by the device are secured in part on the basis of its registration.

CONFIGURING CONTROL DEVICES OPERABLE FOR A LOAD CONTROL ENVIRONMENT

A control device configuration system may receive, store, process, and/or display control device configuration information. The control device configuration system may filter the control device configuration information based on user selections of configuration options for configuration parameters. The control device configuration system may identify compatible and incompatible configuration options for various configuration parameters. The control device configuration system may allow selections of the incompatible configuration options. The control device configuration system may adjust how it filters the control device configuration information based on the selections of the incompatible configuration options. The control device configuration system may implement a configuration model that includes configuration parameter groups for efficient evaluation of user selections.

CONFIGURING CONTROL DEVICES OPERABLE FOR A LOAD CONTROL ENVIRONMENT

A control device configuration system may receive, store, process, and/or display control device configuration information. The control device configuration system may filter the control device configuration information based on user selections of configuration options for configuration parameters. The control device configuration system may identify compatible and incompatible configuration options for various configuration parameters. The control device configuration system may allow selections of the incompatible configuration options. The control device configuration system may adjust how it filters the control device configuration information based on the selections of the incompatible configuration options. The control device configuration system may implement a configuration model that includes configuration parameter groups for efficient evaluation of user selections.