H04L67/1095

Multicast data transmission method, related apparatus, and system

A multicast data transmission method includes: determining, by a first BFIR in a first BIER domain, a BIFT-id and a bitstring that correspond to multicast data in a second BIER domain, where the BIFT-id is determined based on at least an SI to which a BFR-id of a first BFER belongs and a BSL supported by the first BFER, and the first BFER is a BFER in the second BFER domain that is used to receive the multicast data; encapsulating the multicast data into a BIER data packet, where a BIER header of the BIER data packet includes the BIFT-id and the bitstring that correspond to the multicast data in the second BIER domain; and finally sending the labeled BIER data packet to a second BFIR, where the label is a label corresponding to a prefix of the second BFIR.

Multicast data transmission method, related apparatus, and system

A multicast data transmission method includes: determining, by a first BFIR in a first BIER domain, a BIFT-id and a bitstring that correspond to multicast data in a second BIER domain, where the BIFT-id is determined based on at least an SI to which a BFR-id of a first BFER belongs and a BSL supported by the first BFER, and the first BFER is a BFER in the second BFER domain that is used to receive the multicast data; encapsulating the multicast data into a BIER data packet, where a BIER header of the BIER data packet includes the BIFT-id and the bitstring that correspond to the multicast data in the second BIER domain; and finally sending the labeled BIER data packet to a second BFIR, where the label is a label corresponding to a prefix of the second BFIR.

NETWORK CONNECTED APPARATUS AND CLOUD DATA PROCESSING METHOD
20230032525 · 2023-02-02 · ·

A network-connected apparatus and a cloud data processing method are provided. In the method, a file is stored in one or more local storages which include a cloud-synchronized folder. The file is uploaded to a remote storage. The cloud-synchronized folder stores the metadata of the files uploaded to the remote storage. The metadata of the file is identified. One or more computing resources are triggered according to the identified result of the metadata. Each computing resource is used for providing computing services on the file. Accordingly, resources may be properly used, and computing efficiency may be enhanced.

Computerized method of managing a computer remote session operation
11489840 · 2022-11-01 · ·

A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of predefined user accounts with low security permissions on said server, where said user accounts are not tied to any specific real user; Whenever a remote user requests to start a remote session, finding an available user account not currently in use on said computer, allocating it for the remote session and marking it as unavailable for subsequent session requests; Generating a one-time password for said user account; Communicating the assigned user account identifier and temporary password to client component on the user's side, either directly or through an intermediate broker; causing the client component to connect to the server using said user account identifier and temporary password; and, upon termination of the remote session, deleting the assigned user account's data and marking it as available again.

Computerized method of managing a computer remote session operation
11489840 · 2022-11-01 · ·

A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of predefined user accounts with low security permissions on said server, where said user accounts are not tied to any specific real user; Whenever a remote user requests to start a remote session, finding an available user account not currently in use on said computer, allocating it for the remote session and marking it as unavailable for subsequent session requests; Generating a one-time password for said user account; Communicating the assigned user account identifier and temporary password to client component on the user's side, either directly or through an intermediate broker; causing the client component to connect to the server using said user account identifier and temporary password; and, upon termination of the remote session, deleting the assigned user account's data and marking it as available again.

SECURITY BROKER WITH CONSUMER PROXYING FOR TEE-PROTECTED SERVICES

The technology disclosed herein enable a consumer to verify the integrity of services running in trusted execution environments. An example method may include: receiving, by a broker device, a request to verify that a service is executing in a trusted execution environment, wherein the request comprises data identifying the service; determining, by the broker device, a computing device that is executing the service; initiating, by the broker device, a remote integrity check of the computing device executing the service; receiving, by the broker device, integrity data of the trusted execution environment of the computing device; and providing, by the broker device, the integrity data to a consumer device associated with the service.

Systems and methods for integrating neural network image analyses into medical image viewing applications

Systems for delivering one or more studies, where each of the one or more studies has a series of digital images associated with only one person and generated by an imaging modality, is disclosed. The systems include a syncing application that is configured to execute within a local area network and that is in data communication with imaging modalities and/or computing devices configured to display images generated by each of the imaging modalities. The systems also include a server adapted to be external to the local area network and in data communication with the syncing application and a client-side viewing application installed on one or more of the computing devices. The client-side viewing application is configured to acquire the studies, including unrendered data representative of the digital images of the series, locally render the unrendered data, and enable a user to manipulate the digital images.

Document replication based on distributional semantics
11487709 · 2022-11-01 · ·

Embodiments of the present invention are directed toward systems, methods, and computer storage media for using a neural network language model to identify semantic relationships between file storage specifications for replication requests. By treating file storage specifications (or at least a portion thereof) as “words” in the language model, replication vectors can be determined based on the file storage specifications. Instead of determining the relationship of the file storage specifications based on ordering within a document, the relationship can be based on proximity of the replication requests in a replication session. When a replication request is received from a user, the replication vectors can be used to determine a semantic similarity between the received replication request and one or more additional replication requests.

Document replication based on distributional semantics
11487709 · 2022-11-01 · ·

Embodiments of the present invention are directed toward systems, methods, and computer storage media for using a neural network language model to identify semantic relationships between file storage specifications for replication requests. By treating file storage specifications (or at least a portion thereof) as “words” in the language model, replication vectors can be determined based on the file storage specifications. Instead of determining the relationship of the file storage specifications based on ordering within a document, the relationship can be based on proximity of the replication requests in a replication session. When a replication request is received from a user, the replication vectors can be used to determine a semantic similarity between the received replication request and one or more additional replication requests.

Method and system for backing up and restoring data

A method and system for backing up and restoring data includes: determining, at a server storage area network (SAN) node, an LUN required for protection within a server SAN node based on communication between a backup agent and a logic unit number (LUN) agent in the server SAN node; determining a target backup device based on communication between the backup agent and respective target agent of a plurality of backup devices, the plurality of backup devices being connected with the server SAN node; and transmitting a virtual disk control command to the target backup device in response to the backup or restoration being triggered, such that data in the LUN required for protection is backed up to the target backup device or restored from the target backup device via an activated virtual disk interface of the target backup device.