H04L67/563

GLOBAL REGISTRATION SYSTEM FOR AERIAL VEHICLES
20220377494 · 2022-11-24 · ·

Systems and methods for vehicle registration are disclosed. A server computer and at least one database are constructed and configured for network communication with at least one vehicle. The at least one vehicle transmits a registration request to the server computer. The server computer assigns a unique registration ID for the at least one vehicle. The at least one database comprises a geofence database storing information of a multiplicity of registered geofences. Each of the multiplicity of registered geofences comprises a plurality of geographic designators defined by a plurality of unique Internet Protocol version 6 (IPv6) addresses. One of the plurality of unique IPv6 addresses is encoded as a unique identifier for each of the multiplicity of registered geofences. The server computer caches the information of the multiplicity of registered geofences on the at least one vehicle.

METHODS AND APPARATUS TO REDIRECT INTERNET CLIENTS FOR MEDIA MONITORING

Methods, apparatus, systems and articles of manufacture are disclosed to redirect internet clients for media monitoring. An example apparatus disclosed herein includes a wireless communication controller to establish a plurality of connections to a WI-FI router, the plurality of connections corresponding to simulated WI-FI clients, and a client interface to identify a connection of a WI-FI client to the apparatus and route network traffic of the WI-FI client to the WI-FI router via the plurality of connections.

System and method for URL fetching retry mechanism
11593446 · 2023-02-28 · ·

A method for overcoming intermittent, temporary, or other fetching failures by using multiple attempts for retrieving a content from a web server to a client device is disclosed. The URL fetching may use direct or non-direct fetching schemes, or a combination thereof. The non-direct fetching method may use intermediate devices, such as proxy server, Data-Center proxy server, tunnel devices, or any combination thereof. Upon sensing a failure of a fetching action, the action is repeated using the same or different parameters or attributes, such as by using different intermediate devices, selected based on different parameters or attributes, such as different countries. The repetitions are limited to a pre-defined maximum number or attempts. The fetching attempts may be performed by the client device, by an intermediate device in a non-direct fetching scheme, or a combination thereof. Various fetching schemes may be used sequentially until the content is retrieved.

Cross datacenter read-write consistency in a distributed cloud computing platform

A distributed storage system including a server is configured to accept a request including a consistency indicator that flags for the server that cross datacenter consistency is desired. The server may be required to detect the consistency indicator and in response, to determine a consistency key based at least in part on the request. In an example aspect, the consistency key may comprise a hash value determined by a hash function shared across datacenters, whereby every datacenter may determine the same consistency key for a given resource and datacenter combination. The server may be further configured to determine a preferred datacenter for handling the request based at least in part on the consistency key, and thereafter to redirect the request to the preferred datacenter. In embodiments, the consistency indicator may also denote a scope of the strong consistency required by the calling client.

Cross datacenter read-write consistency in a distributed cloud computing platform

A distributed storage system including a server is configured to accept a request including a consistency indicator that flags for the server that cross datacenter consistency is desired. The server may be required to detect the consistency indicator and in response, to determine a consistency key based at least in part on the request. In an example aspect, the consistency key may comprise a hash value determined by a hash function shared across datacenters, whereby every datacenter may determine the same consistency key for a given resource and datacenter combination. The server may be further configured to determine a preferred datacenter for handling the request based at least in part on the consistency key, and thereafter to redirect the request to the preferred datacenter. In embodiments, the consistency indicator may also denote a scope of the strong consistency required by the calling client.

System for migration of data from legacy computer system using wireless peer-to-peer connection

A method, system and computer-usable medium are disclosed for migrating data from a legacy computer system to a new computer system. Certain aspects include instantiating a wireless portal at a new computer system using a passcode and a randomly generated key, wherein the passcode is generated using the randomly generated key and a private key; displaying the randomly generated key at the new computer system; setting up a wireless peer-to-peer connection between a legacy computer system and the wireless portal by entering the randomly generated key in a second application executed at the legacy computer system; and migrating data from the legacy computer system to the new computer system using the peer-to-peer wireless connection.

System for migration of data from legacy computer system using wireless peer-to-peer connection

A method, system and computer-usable medium are disclosed for migrating data from a legacy computer system to a new computer system. Certain aspects include instantiating a wireless portal at a new computer system using a passcode and a randomly generated key, wherein the passcode is generated using the randomly generated key and a private key; displaying the randomly generated key at the new computer system; setting up a wireless peer-to-peer connection between a legacy computer system and the wireless portal by entering the randomly generated key in a second application executed at the legacy computer system; and migrating data from the legacy computer system to the new computer system using the peer-to-peer wireless connection.

System and method for enabling secure service-based communications via 5G proxies

Systems and methods enable secure service-based communications in networks that use a Services Communications Proxy (SCP). A Network Function (NF) producer receives a service request including an authorization token and a signed service request object, wherein the service request originates from an NF consumer of the wireless core network and is forwarded to the NF producer via the SCP. The NF producer verifies the signed service request object and generates, after the verifying, a service response. The service response includes a signed service response object. The NF producer sends, to the NF consumer and via the SCP, the service response with the signed service response object.

System and method for enabling secure service-based communications via 5G proxies

Systems and methods enable secure service-based communications in networks that use a Services Communications Proxy (SCP). A Network Function (NF) producer receives a service request including an authorization token and a signed service request object, wherein the service request originates from an NF consumer of the wireless core network and is forwarded to the NF producer via the SCP. The NF producer verifies the signed service request object and generates, after the verifying, a service response. The service response includes a signed service response object. The NF producer sends, to the NF consumer and via the SCP, the service response with the signed service response object.

Indirect Transmission of Session Data
20230057236 · 2023-02-23 ·

The systems and methods described herein can enable the indirect transmission of session data between different domains. The system can pass the session data through a hashing function so that the data from a given domain remains private and secure to the specific domain. The system can generate clusters of associated domains for a given client device that the system can use to maintain a session between the client device and the domain.