H04L67/1095

ADAPTIVE QUERY ROUTING IN A REPLICATED DATABASE ENVIRONMENT

Technologies are described providing adaptive query routing in a replicated database environment. The technologies can be used with a variety of replication protocols. Prepared statements, such as for queries, from a database client can be routed to a source node, or a source node and available replica nodes, when a replica node becomes unavailable. When a replica node becomes available again, a prepared statement can be updated to indicate that the updated prepared statement can be executed at nodes including the replica node that is available again. Prepared statement routing can also be used when a portion of replicated data becomes unavailable at a replica node, but a portion of replicated data remains available.

ADAPTIVE QUERY ROUTING IN A REPLICATED DATABASE ENVIRONMENT

Technologies are described providing adaptive query routing in a replicated database environment. The technologies can be used with a variety of replication protocols. Prepared statements, such as for queries, from a database client can be routed to a source node, or a source node and available replica nodes, when a replica node becomes unavailable. When a replica node becomes available again, a prepared statement can be updated to indicate that the updated prepared statement can be executed at nodes including the replica node that is available again. Prepared statement routing can also be used when a portion of replicated data becomes unavailable at a replica node, but a portion of replicated data remains available.

RELIABLE HIERARCHICAL STORAGE MANAGEMENT WITH DATA SYNCHRONIZATION

A system hosts a file system representing a replica of file systems hosted on a plurality of nodes, each node storing data on a first storage medium. The system stores data on a second storage medium that is slower than the first storage medium. The system stores on the second storage medium a file received from one of the nodes when the file remains un-accessed by the nodes for a predetermined period of time. The first storage medium on the plurality of nodes stores a pointer to the file and not the data content of the file stored on the second storage medium. The system provides the file from the second storage medium to the first storage medium on one of the nodes while providing the plurality of nodes read and write access to the file stored on the second storage medium using the pointer on the first storage medium.

RELIABLE HIERARCHICAL STORAGE MANAGEMENT WITH DATA SYNCHRONIZATION

A system hosts a file system representing a replica of file systems hosted on a plurality of nodes, each node storing data on a first storage medium. The system stores data on a second storage medium that is slower than the first storage medium. The system stores on the second storage medium a file received from one of the nodes when the file remains un-accessed by the nodes for a predetermined period of time. The first storage medium on the plurality of nodes stores a pointer to the file and not the data content of the file stored on the second storage medium. The system provides the file from the second storage medium to the first storage medium on one of the nodes while providing the plurality of nodes read and write access to the file stored on the second storage medium using the pointer on the first storage medium.

NATIVE ACTIVITY TRACKING USING CREDENTIAL AND AUTHENTICATION MANAGEMENT IN SCALABLE DATA NETWORKS

Native activity tracking using credential and authentication management in scalable data networks is described, including detecting a request from an extension installed on a browser to access a data network, initiating another request from the extension to a server to retrieve authentication data to access the data network, transferring from the server to the extension the authentication data and an instruction to the extension to generate a further request, transmitting the further request to the data network from the browser, the request comprising the authentication data from the server without manual input of the authentication data, presenting an overlay on the browser, the overlay being configured to indicate a login status associated with the data network, and storing one or more portions of data transferred between the data network and the browser, the storing being performed by the extension if access to the data network has been provided to the browser in response to the request.

NATIVE ACTIVITY TRACKING USING CREDENTIAL AND AUTHENTICATION MANAGEMENT IN SCALABLE DATA NETWORKS

Native activity tracking using credential and authentication management in scalable data networks is described, including detecting a request from an extension installed on a browser to access a data network, initiating another request from the extension to a server to retrieve authentication data to access the data network, transferring from the server to the extension the authentication data and an instruction to the extension to generate a further request, transmitting the further request to the data network from the browser, the request comprising the authentication data from the server without manual input of the authentication data, presenting an overlay on the browser, the overlay being configured to indicate a login status associated with the data network, and storing one or more portions of data transferred between the data network and the browser, the storing being performed by the extension if access to the data network has been provided to the browser in response to the request.

CONTROL METHOD, MOBILE NODE, AND RECORDING MEDIUM
20230073703 · 2023-03-09 ·

A control method to be performed by a first mobile node disconnected from a mobile line among a plurality of mobile nodes each being connectable to the mobile line includes: transmitting and receiving a mobile line connection status to and from each of one or more second mobile nodes via near-field wireless communication; building a MANET with the one or more second mobile nodes based on a first mobile line connection status of the first mobile node and a second mobile line connection status of each of the one or more second mobile nodes; generating, after the building of the MANET, first transaction data including at least first MANET routing information that indicates the MANET connection status of the first mobile node; and recording a block including the first transaction data into a first distributed ledger that is used for a blockchain in the MANET.

CONTROL METHOD, MOBILE NODE, AND RECORDING MEDIUM
20230073703 · 2023-03-09 ·

A control method to be performed by a first mobile node disconnected from a mobile line among a plurality of mobile nodes each being connectable to the mobile line includes: transmitting and receiving a mobile line connection status to and from each of one or more second mobile nodes via near-field wireless communication; building a MANET with the one or more second mobile nodes based on a first mobile line connection status of the first mobile node and a second mobile line connection status of each of the one or more second mobile nodes; generating, after the building of the MANET, first transaction data including at least first MANET routing information that indicates the MANET connection status of the first mobile node; and recording a block including the first transaction data into a first distributed ledger that is used for a blockchain in the MANET.

VEHICLE INTERACTION SYSTEM AS WELL AS CORRESPONDING VEHICLE AND METHOD
20220332190 · 2022-10-20 · ·

According to an aspect of the present disclosure, an interaction system for a first vehicle is provided, which comprises a processor and a memory storing processor-executable instructions that, when executed by the processor, cause the latter to implement steps comprising: receiving a first input from the first vehicle and displaying a first avatar on a display; and receiving a second input from a second vehicle and displaying a second avatar on the display, wherein the first input and the second input are updated in real time, and the first avatar and the second avatar dynamically change accordingly.

SYSTEM FOR BLOCKING A RANSOMWARE ATTACK
20230132303 · 2023-04-27 · ·

Provided is a system for blocking a phishing attack including a phishing attack prevention storage device, and an agent program which is installed in a user terminal or a service server and performs an interworking operation with the phishing attack prevention storage device when the user terminal or the service server is connected with the phishing attack prevention storage device via a network. According to the embodiment of the present invention, when there is an open request for the file stored in the phishing attack prevention storage device from the user terminal or the service server, the phishing attack prevention storage device may check a storage operation mode and create a fake file other than the open-requested original file when the storage operation mode corresponds to a list-only mode to return the fake file to the user terminal or the service server.