Patent classifications
H04L67/62
MECHANISMS FOR AN INTELLIGENT SERVICE LAYER REQUEST ABSTRACTION SERVICE
Systems and methods are described herein to automate managing of service layer operations comprised of multiple elementary operations and offloading the burden of performing such multi-step operations from a requesting entity to the service layer. A Request Abstraction Service (RAS) is described herein for the autonomous execution of such multi-step operations. Methods and apparatuses are also described herein for a service layer framework for integrating generic and functional user interfaces as services managed by the SL on behalf of requesting entities.
MECHANISMS FOR AN INTELLIGENT SERVICE LAYER REQUEST ABSTRACTION SERVICE
Systems and methods are described herein to automate managing of service layer operations comprised of multiple elementary operations and offloading the burden of performing such multi-step operations from a requesting entity to the service layer. A Request Abstraction Service (RAS) is described herein for the autonomous execution of such multi-step operations. Methods and apparatuses are also described herein for a service layer framework for integrating generic and functional user interfaces as services managed by the SL on behalf of requesting entities.
TECHNIQUES FOR CROSS PLATFORM COMMUNICATION PROCESS FLOW METRIC GENERATION AND DISPLAY
A method that includes receiving a first request for a data object associated with a communication process flow that controls electronic communications between a tenant and a set of users corresponding to the tenant. The first request may include a set of querying parameters and a set of triggering parameters. The method may further include querying, based on the set of querying parameters, a communication process flow management service for data associated with the communication process flow. The method may further include generating, based on the querying, the data object that includes the data associated with the communication process flow. The method may further include transmitting, to a communication platform in accordance with the set of triggering parameters, a second request that comprises the data object. The second request may cause posting of an entry of the data object into a communication channel of the communication platform.
CREATION METHOD FOR ACTION RESOURCE, EXECUTION METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM
A creation method for creating an action resource, an execution method of an action, an electronic device, and a storage medium are provided. The creation method includes receiving a first creation request that includes a target resource; creating a first action resource, which is a resource used for triggering a first action for the target resource, according to the first creation request; creating the first action resource includes: creating at least one of a first conflict priority attribute and a first conflict priority effective time attribute for the first action resource; the first conflict priority attribute represents a priority of the first action resource relative to an action resource that conflicts with the first action resource and is aimed at the target resource, and the first conflict priority effective time attribute represents a time range in which the first action resource has exclusive access to the target resource.
Method and device for timeout monitoring
Disclosed are a method and device for timeout monitoring, comprising: determining key information of a request message, the key information including a sending time of the request message; storing the key information to a first level cache; scanning the first level cache according to a set frequency, if the first level cache includes a first request message, storing the key information of the first request message into a second level cache, the first request message being a request message for which a reply message is not received; scanning the second level cache, and determining by a message log whether a reply message is received for a second request message in the second level cache, if not, the second request message times out, the second request message is a request message in which the difference value between a sending time and a current time is greater than a time-out threshold.
Method and device for timeout monitoring
Disclosed are a method and device for timeout monitoring, comprising: determining key information of a request message, the key information including a sending time of the request message; storing the key information to a first level cache; scanning the first level cache according to a set frequency, if the first level cache includes a first request message, storing the key information of the first request message into a second level cache, the first request message being a request message for which a reply message is not received; scanning the second level cache, and determining by a message log whether a reply message is received for a second request message in the second level cache, if not, the second request message times out, the second request message is a request message in which the difference value between a sending time and a current time is greater than a time-out threshold.
Access control for data transmission
A method and apparatus for access control for data transmission in idle mode and/or inactive mode in a wireless communication system is provided. An allowed timer is defined, and the allowed timer is started based on a result of access barring check. While the allowed timer is running, the wireless device can perform an uplink (UL) transmission without further access barring check.
Scheduling services on a platform including configurable resources
Technology related to scheduling services on a platform including configurable computing resources is disclosed. In one example, a method includes scheduling a service to execute on a first computing node based on an availability of general-purpose computing resources at the first computing node. The first computing node can be selected from a plurality of computing nodes. Network traffic transiting the first computing node can be analyzed during the execution of the service to determine a hardware accelerator of a second computing node is capable of assisting the execution of the service. The service can be scheduled to execute on the second computing node and the hardware accelerator of the second computing node can be used to assist with the execution of the service.
Scheduling services on a platform including configurable resources
Technology related to scheduling services on a platform including configurable computing resources is disclosed. In one example, a method includes scheduling a service to execute on a first computing node based on an availability of general-purpose computing resources at the first computing node. The first computing node can be selected from a plurality of computing nodes. Network traffic transiting the first computing node can be analyzed during the execution of the service to determine a hardware accelerator of a second computing node is capable of assisting the execution of the service. The service can be scheduled to execute on the second computing node and the hardware accelerator of the second computing node can be used to assist with the execution of the service.
Data storage system with powered move attack protection
A data storage system can consist of a network controller connected to a data storage device and a remote host. An attack mitigation strategy may be generated with an attack module connected to the network controller in response to detected data storage conditions in the data storage device. The attack mitigation strategy can be executed with the attack module by sending separate first and second security queries to the data storage device over time. At least a powered move attack can then be identified based on the second security query.