Patent classifications
H04L69/322
METHOD AND DEVICE FOR CONFIGURING DATA FLOW
A method and device for configuring a data flow are disclosed in embodiments of this disclosure. The method includes: transmitting indication information to an SDAP entity receiving end if a DRB corresponding to a QoS data flow is changed from a source DRB to a target DRB. The indication information is used to indicate that transmission of a first QoS data flow is completed on the source DRB or transmission of data of a second QoS data flow starts on the target DRB,. Data of the QoS data flow includes data of the first QoS data flow and data of the second QoS data flow.
METHOD FOR TRANSMITTING/RECEIVING DATA IN WIRELESS COMMUNICATION SYSTEM, AND WIRELESS COMMUNICATION TERMINAL
A method for transmitting a TB PPDU in a wireless communication system is disclosed. A Non-AP STA can receive a frame for triggering the transmission of a physical layer protocol data unit (PPDU) from an access point (AP), and transmit, in response to the frame, the PPDU including a packet extension (PE) field for providing a processing time for the PPDU. At this time, the frame indicates a format for the PPDU transmitted in response to the frame, and a maximum value of duration for the PE field can be changed according to the format of the PPDU indicated by the frame.
Systems and methods of malware detection
Systems and methods for detecting suspicious malware by analyzing data such as transfer protocol data or logs from a host within an enterprise is provided. The systems and methods include a database for storing current data and historical data obtained from the network and a detection module and an optional display. The embodiments herein extract information from non-encrypted transfer protocol metadata, determine a plurality of features, utilize an outlier detection model that is based on historical behaviors, calculate a suspiciousness score, and create alerts for analysis by users when the score exceeds a threshold. In doing so, the systems and methods of the present invention improve the ability to identify suspicious outliers or potential malware on an iterative basis over time.
Systems and methods of malware detection
Systems and methods for detecting suspicious malware by analyzing data such as transfer protocol data or logs from a host within an enterprise is provided. The systems and methods include a database for storing current data and historical data obtained from the network and a detection module and an optional display. The embodiments herein extract information from non-encrypted transfer protocol metadata, determine a plurality of features, utilize an outlier detection model that is based on historical behaviors, calculate a suspiciousness score, and create alerts for analysis by users when the score exceeds a threshold. In doing so, the systems and methods of the present invention improve the ability to identify suspicious outliers or potential malware on an iterative basis over time.
Cloud gateway for legacy computing devices
The document describes systems and methods for handling local (legacy) devices. A local cloud gateway comprises a plurality of interface connectors of different types to physically connect a plurality of these legacy devices to the cloud, comprising a plurality of distant servers. Developments describe the step of extracting the functional messages out of messages stemming from local legacy devices (e.g. protocol translators), secure communications, logical representations of legacy devices in the cloud (“twins”), administration options, various user interfaces (e.g. buzzer) for seamless configuration and use, the use of one or more actuators (retroactions on the physical world), etc. Software and/or hardware embodiments are described.
Cloud gateway for legacy computing devices
The document describes systems and methods for handling local (legacy) devices. A local cloud gateway comprises a plurality of interface connectors of different types to physically connect a plurality of these legacy devices to the cloud, comprising a plurality of distant servers. Developments describe the step of extracting the functional messages out of messages stemming from local legacy devices (e.g. protocol translators), secure communications, logical representations of legacy devices in the cloud (“twins”), administration options, various user interfaces (e.g. buzzer) for seamless configuration and use, the use of one or more actuators (retroactions on the physical world), etc. Software and/or hardware embodiments are described.
CLOUD GATEWAY FOR LEGACY COMPUTING DEVICES
The document describes systems and methods for handling local (legacy) devices. A local cloud gateway comprises a plurality of interface connectors of different types to physically connect a plurality of these legacy devices to the cloud, comprising a plurality of distant servers. Developments describe the step of extracting the functional messages out of messages stemming from local legacy devices (e.g. protocol translators), secure communications, logical representations of legacy devices in the cloud (“twins”), administration options, various user interfaces (e.g. buzzer) for seamless configuration and use, the use of one or more actuators (retroactions on the physical world), etc. Software and/or hardware embodiments are described.
CLOUD GATEWAY FOR LEGACY COMPUTING DEVICES
The document describes systems and methods for handling local (legacy) devices. A local cloud gateway comprises a plurality of interface connectors of different types to physically connect a plurality of these legacy devices to the cloud, comprising a plurality of distant servers. Developments describe the step of extracting the functional messages out of messages stemming from local legacy devices (e.g. protocol translators), secure communications, logical representations of legacy devices in the cloud (“twins”), administration options, various user interfaces (e.g. buzzer) for seamless configuration and use, the use of one or more actuators (retroactions on the physical world), etc. Software and/or hardware embodiments are described.
Method, apparatus and computer program product for processing data
Data is received at a buffer used by a protocol processing stack which protocol processes the received data. The received data is made available to, for example, an application, before the protocol processing of the data is complete. If the protocol processing is successful, the data made available to the application is committed.
Method, apparatus and computer program product for processing data
Data is received at a buffer used by a protocol processing stack which protocol processes the received data. The received data is made available to, for example, an application, before the protocol processing of the data is complete. If the protocol processing is successful, the data made available to the application is committed.