H04L67/104

MESSAGING IN DISTRIBUTED NETWORKS

According to an embodiment of a first aspect of the invention, there is provided a distributed network comprising a plurality of subnets. Each of the plurality of subnets comprises a plurality of nodes. The network is configured to run a set of computational units and to assign each of the computational units to one of the plurality of subnets according to a subnet-assignment, thereby creating an assigned subset of the set of computational units for each of the subnets. The network is further configured to run on each node of the plurality of subnets the assigned subset of the computational units and to replicate the assigned subsets of the computational units across the respective subnets. The network is further configured to exchange unit-to-unit messages between the computational units via a messaging protocol based on the subnet-assignment.

Further aspects of the invention relate to a corresponding computer-implemented method, a node, a computer program product and a software architecture.

MESSAGING IN DISTRIBUTED NETWORKS

According to an embodiment of a first aspect of the invention, there is provided a distributed network comprising a plurality of subnets. Each of the plurality of subnets comprises a plurality of nodes. The network is configured to run a set of computational units and to assign each of the computational units to one of the plurality of subnets according to a subnet-assignment, thereby creating an assigned subset of the set of computational units for each of the subnets. The network is further configured to run on each node of the plurality of subnets the assigned subset of the computational units and to replicate the assigned subsets of the computational units across the respective subnets. The network is further configured to exchange unit-to-unit messages between the computational units via a messaging protocol based on the subnet-assignment.

Further aspects of the invention relate to a corresponding computer-implemented method, a node, a computer program product and a software architecture.

DETECTION AND TRIGGERING FOR UE-TO-UE P2P TRAFFIC FLOW ROUTING OPTIMIZATION
20220377820 · 2022-11-24 ·

An apparatus is provided which comprises at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to perform: detecting whether a first user equipment is present in an area served by a user plane function, and, when it is detected that the first user equipment is present in the area served by the user plane function, storing information about the presence of the first user equipment and controlling whether and when to allocate the first user equipment to the user plane function based on the stored information.

DETECTION AND TRIGGERING FOR UE-TO-UE P2P TRAFFIC FLOW ROUTING OPTIMIZATION
20220377820 · 2022-11-24 ·

An apparatus is provided which comprises at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to perform: detecting whether a first user equipment is present in an area served by a user plane function, and, when it is detected that the first user equipment is present in the area served by the user plane function, storing information about the presence of the first user equipment and controlling whether and when to allocate the first user equipment to the user plane function based on the stored information.

SECURE COMMUNICATION BETWEEN DEVICES
20220377058 · 2022-11-24 · ·

A method of providing secure communication between first and second devices comprises the first device and the second device connecting to a server via a secure communication channel. Encryption keys for the devices are generated and data relating to the encryption keys are exchanged via the server in the secure communication channel. A peer-to-peer connection for exchanging data is generated using encrypted connection information for the devices.

SECURE COMMUNICATION BETWEEN DEVICES
20220377058 · 2022-11-24 · ·

A method of providing secure communication between first and second devices comprises the first device and the second device connecting to a server via a secure communication channel. Encryption keys for the devices are generated and data relating to the encryption keys are exchanged via the server in the secure communication channel. A peer-to-peer connection for exchanging data is generated using encrypted connection information for the devices.

CRYPTOGRAPHIC SERVICES FOR BROWSER APPLICATIONS
20220376933 · 2022-11-24 ·

This disclosure relates to the provision of cryptographic services to web browsers, and more specifically, to systems and methods for providing cryptographic results to a browser from a cryptographic device over a persistent peer-to-peer connection. A method for obtaining cryptographic services for a browser executing a webpage comprising the steps of establishing a persistent peer-to-peer connection over a wireless Internet Protocol communication network between the browser and a cryptographic device, in response to receiving user input to the webpage, transmitting, by the browser, data indicated by the user input over the persistent peer-to-peer connection to the cryptographic device, for cryptographic processing of the data by the cryptographic device using a cryptographic key stored on the cryptographic device to produce a cryptographic result, and receiving, by the browser, the cryptographic result over the persistent peer-to-peer connection from the cryptographic device, and providing the cryptographic result to the webpage.

Method for using legacy Wi-Fi and Wi-Fi P2P simultaneously

A method for using legacy Wi-Fi and Wi-Fi Peer-to-Peer (P2P) simultaneously is provided. The method includes entering a device discovery process of Wi-Fi P2P, if use of a Wi-Fi P2P function is requested while using a legacy Wi-Fi function, acquiring a Group Owner (GO) right of Wi-Fi P2P in the device discovery process, performing a listen state over the same channel as a channel where the legacy Wi-Fi function is in use, through the acquisition of the GO right, and performing a search state over a social channel of Wi-Fi P2P, and repeating the listen state and the search state until the device discovery process is ended.

Method for using legacy Wi-Fi and Wi-Fi P2P simultaneously

A method for using legacy Wi-Fi and Wi-Fi Peer-to-Peer (P2P) simultaneously is provided. The method includes entering a device discovery process of Wi-Fi P2P, if use of a Wi-Fi P2P function is requested while using a legacy Wi-Fi function, acquiring a Group Owner (GO) right of Wi-Fi P2P in the device discovery process, performing a listen state over the same channel as a channel where the legacy Wi-Fi function is in use, through the acquisition of the GO right, and performing a search state over a social channel of Wi-Fi P2P, and repeating the listen state and the search state until the device discovery process is ended.

Fashion item analysis based on user ensembles in online fashion community

In an online fashion community system (100) users provide personal image content, such as digital user fashion images (104, 700) that include users themselves modeling multiple fashion items as an ensemble, as the basis of community interaction. Users also provide information about the multiple fashion items, including information linking (108) to a provider of each fashion item and fashion data (106) such as brand, color, style, etc. User interface system (116) allows users to search among, access, and interact about the user fashion ensembles.