Patent classifications
H04L67/1097
Host Routed Overlay with Deterministic Host Learning and Localized Integrated Routing and Bridging
Systems, methods, and devices for improved routing operations in a network computing environment. A system includes a virtual customer edge router and a host routed overlay comprising a plurality of host virtual machines. The system includes a routed uplink from the virtual customer edge router to one or more of the plurality of leaf nodes. The system is such that the virtual customer edge router is configured to provide localized integrated routing and bridging (IRB) service for the plurality of host virtual machines of the host routed overlay.
Host Routed Overlay with Deterministic Host Learning and Localized Integrated Routing and Bridging
Systems, methods, and devices for improved routing operations in a network computing environment. A system includes a virtual customer edge router and a host routed overlay comprising a plurality of host virtual machines. The system includes a routed uplink from the virtual customer edge router to one or more of the plurality of leaf nodes. The system is such that the virtual customer edge router is configured to provide localized integrated routing and bridging (IRB) service for the plurality of host virtual machines of the host routed overlay.
FEDERATED IDENTITY MANAGEMENT WITH DECENTRALIZED COMPUTING PLATFORMS
Provided is a process that establishes user identities within a decentralized data store, like a blockchain. A user's mobile device may establish credential values within a trusted execution environment of the mobile device. Representations of those credentials may be generated on the mobile device and transmitted for storage in association with an identity of the user established on the blockchain. Similarly, one or more key-pairs may be generated or otherwise used by the mobile device for signatures and signature verification. Private keys may remain resident on the device (or known and input by the user) while corresponding public keys may be stored in associated with the user identity on the blockchain. A private key is used to sign representations of credentials and other values as a proof of knowledge of the private key and credential values for authentication of the user to the user identity on the blockchain.
FEDERATED IDENTITY MANAGEMENT WITH DECENTRALIZED COMPUTING PLATFORMS
Provided is a process that establishes user identities within a decentralized data store, like a blockchain. A user's mobile device may establish credential values within a trusted execution environment of the mobile device. Representations of those credentials may be generated on the mobile device and transmitted for storage in association with an identity of the user established on the blockchain. Similarly, one or more key-pairs may be generated or otherwise used by the mobile device for signatures and signature verification. Private keys may remain resident on the device (or known and input by the user) while corresponding public keys may be stored in associated with the user identity on the blockchain. A private key is used to sign representations of credentials and other values as a proof of knowledge of the private key and credential values for authentication of the user to the user identity on the blockchain.
EDGE DEVICE INTERFACE SYSTEM AND METHOD FOR MONITORING AND MODIFYING CONTROL AND RESPONSE SIGNALS TRANSMITTED TO AND FROM INJECTION-MOLDING MACHINES AND ROBOTS
An edge device interface system and method for monitoring, recording, and calculating control and response signals generated by and between an injection molding system including an injection-molding machine and a robotic handling device. The edge device interface system of the invention includes an edge device interposed between the connector of the injection-molding machine and the connector of a robotic handling device using standardized connectors. The edge device interface system may be interposed between the connector of the injection-molding machine and the connector of a robotic handling device to emulate the function of either device as desired. The edge device interface system and method utilizes data observed both from standardized connectors and auxiliary inputs to provide insight into molding process steps and equipment, including what components of the injection molding system that may be contributing to any molding process instability or inefficiency, and for generating signals for real-time adjustment of the molding process.
SYNCHRONIZING CONFIGURATION OF PARTNER OBJECTS ACROSS DISTRIBUTED STORAGE SYSTEMS USING TRANSFORMATIONS
A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
SYNCHRONIZING CONFIGURATION OF PARTNER OBJECTS ACROSS DISTRIBUTED STORAGE SYSTEMS USING TRANSFORMATIONS
A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
Emulating A Local Interface To A Remotely Managed Storage System
Systems, methods, and computer readable storage mediums for emulating a local interface to a remotely managed storage system, including: receiving a request for remote access a storage system, wherein access is provided using a user interface (‘UI’); identifying, for a user profile, a version of the UI that is utilized when locally accessing the storage system; and presenting, a remote UI for the storage system, wherein a version of the remote UI matches the version of the UI that is utilized when the user locally accesses the storage system, wherein the remote UI provides read-only access to the storage system.
Emulating A Local Interface To A Remotely Managed Storage System
Systems, methods, and computer readable storage mediums for emulating a local interface to a remotely managed storage system, including: receiving a request for remote access a storage system, wherein access is provided using a user interface (‘UI’); identifying, for a user profile, a version of the UI that is utilized when locally accessing the storage system; and presenting, a remote UI for the storage system, wherein a version of the remote UI matches the version of the UI that is utilized when the user locally accesses the storage system, wherein the remote UI provides read-only access to the storage system.
COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS
A content management system for collecting files from one or more authenticated submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions.