H04L67/1095

Method and server device for providing internet of things platform service
11483391 · 2022-10-25 · ·

A method and a server device for providing an IoT platform service are provided. According to at least one aspect of the present disclosure, a method of providing an IoT platform service, which is performed by an IoT platform server apparatus, generates a shadow device corresponding to an IoT device, manages state information of the IoT device through the corresponding shadow device, and registers and administers a specification (i.e., a device descriptor) regarding common features of a plurality of devices.

NEAR-HITLESS UPGRADE OR FAST BOOTUP WITH MOBILE VIRTUALIZED HARDWARE
20230083347 · 2023-03-16 ·

An embodiment is directed to switchover operations with a mobile virtualized network device in a mobile device. The mobile virtualized hardware switchover operations may be used to selectively and temporarily provide virtualized control-plane operations to the data-plane of a non-redundant network device undergoing an upgrade or a reboot of its control plane. A non-redundant network device may operate hitless, or near hitless, operation even when its control plane is unavailable.

NEAR-HITLESS UPGRADE OR FAST BOOTUP WITH MOBILE VIRTUALIZED HARDWARE
20230083347 · 2023-03-16 ·

An embodiment is directed to switchover operations with a mobile virtualized network device in a mobile device. The mobile virtualized hardware switchover operations may be used to selectively and temporarily provide virtualized control-plane operations to the data-plane of a non-redundant network device undergoing an upgrade or a reboot of its control plane. A non-redundant network device may operate hitless, or near hitless, operation even when its control plane is unavailable.

PREVENTING DUPLICATIVE FILE PROCESSING
20230082068 · 2023-03-16 ·

In some implementations, a device may determine whether an existing record for a file, received at a file storage location, is present in a record log. The device may generate, based on determining that the existing record for the file is not present in the record log, a record for the file in the record log. The record may identify the file and a first region. The device may determine, after generating the record, whether the record has been changed to identify a second region. The device may process the file based on determining that the record has not been changed to identify the second region.

DATA SENDING METHOD AND APPARATUS, DATA RECEIVING METHOD, APPARATUS, AND SYSTEM, AND MEDIUM
20230081785 · 2023-03-16 ·

This application discloses a data sending method and apparatus, a data receiving method, apparatus, and system, and a medium, and relates to the communication field. The method is applied to a master module that exchanges first data with a communication peer device based on the QUIC protocol. The master module is configured to provide an application service. The method includes: The master module obtains the first data, where the first data is for implementing the application service; the master module sends the first data to a slave module serving as a backup module; and the master module processes the first data based on a backup success message received from the slave module, where the backup success message indicates that the first data is successfully backed up. In this application, interruption of the application service can be avoided.

DATA SENDING METHOD AND APPARATUS, DATA RECEIVING METHOD, APPARATUS, AND SYSTEM, AND MEDIUM
20230081785 · 2023-03-16 ·

This application discloses a data sending method and apparatus, a data receiving method, apparatus, and system, and a medium, and relates to the communication field. The method is applied to a master module that exchanges first data with a communication peer device based on the QUIC protocol. The master module is configured to provide an application service. The method includes: The master module obtains the first data, where the first data is for implementing the application service; the master module sends the first data to a slave module serving as a backup module; and the master module processes the first data based on a backup success message received from the slave module, where the backup success message indicates that the first data is successfully backed up. In this application, interruption of the application service can be avoided.

Data replication techniques
11481137 · 2022-10-25 · ·

Techniques for determining replication modes may include: issuing, while unsolicited data transfer mode is enabled for a first link, first write operations over the first link; issuing, while unsolicited data transfer mode is disabled for the first link, second write operations over the first link; determining a first performance metric for the first link in accordance with the first write operations; determining a second performance metric for the first link in accordance with the second write operations; and determining, in accordance with the first and second performance metrics whether to enable or disable unsolicited data transfer mode for the first link for a first time period. The first and second performance metrics may be response times. Unsolicited data transfer mode, when enabled, allows write data payload to be sent to a target without receiving an acknowledgement regarding receipt of a write command block for the write operation from the target.

PROXY-ENABLED COMMUNICATION ACROSS NETWORK BOUNDARIES BY SELF-REPLICATING APPLICATIONS
20230078581 · 2023-03-16 ·

The disclosure provides an approach for cross-network communication by self-replicating applications. Embodiments include identifying, by a first instance of a self-replicating application on a first computing device having a first network connection to a parent component, a second computing device that is connected to the first computing device via a second network connection. Embodiments include self-replicating, by the first instance of the self-replicating application, across the second network connection to produce a second instance of the self-replicating application on the second computing device. Embodiments include initiating, by the first instance of the self-replicating application, a proxy tunnel on the first computing device. Embodiments include receiving, by the proxy tunnel, a first communication from the second instance of the self-replicating application via the second network connection. Embodiments include sending, by the proxy tunnel, based on the first communication, a second communication to the parent component via the first network connection.

PROXY-ENABLED COMMUNICATION ACROSS NETWORK BOUNDARIES BY SELF-REPLICATING APPLICATIONS
20230078581 · 2023-03-16 ·

The disclosure provides an approach for cross-network communication by self-replicating applications. Embodiments include identifying, by a first instance of a self-replicating application on a first computing device having a first network connection to a parent component, a second computing device that is connected to the first computing device via a second network connection. Embodiments include self-replicating, by the first instance of the self-replicating application, across the second network connection to produce a second instance of the self-replicating application on the second computing device. Embodiments include initiating, by the first instance of the self-replicating application, a proxy tunnel on the first computing device. Embodiments include receiving, by the proxy tunnel, a first communication from the second instance of the self-replicating application via the second network connection. Embodiments include sending, by the proxy tunnel, based on the first communication, a second communication to the parent component via the first network connection.

Point-to-point distributed decentralized system
11481375 · 2022-10-25 · ·

Embodiments relate to high throughput blockchain systems that can handle large numbers of real-time operations. A system may include a server that handles the matching of operations in a quick and trusted manner and a blockchain that executes the matched operations in a decentralized manner after the matching is confirmed by the server. The server may receive an operation request from a user. To confirm the operation request, the user may cause a broadcast of entry on the blockchain that confirms the validity of the operation request. Upon verifying the operation request, the server may match the operation request with other operation requests that meet the criteria specified by the user's request. A set of code instructions recorded on the blockchain may generate one or more entries that execute the operations related to the match.