Patent classifications
H04L2101/622
Electronic apparatus and operating method of the same
Provided are an electronic apparatus and an operating method of the same. The electronic apparatus includes: a communicator; a memory storing one or more instructions; and a processor configured to control the electronic apparatus by executing the one or more instructions to: collect peripheral device information based on a message received from a peripheral device, by using a first device discovery protocol and a second device discovery protocol; transmit the peripheral device information to a server through the communicator; and receive a home network device list of the electronic apparatus from the server through the communicator, the home network device list being generated by the server based on the peripheral device information.
METHODS AND APPARATUS TO IDENTIFY ELECTRONIC DEVICES
Methods, apparatus, systems, and articles of manufacture are disclosed to identify devices. An example apparatus to identify devices comprises at least one memory; machine readable instructions; and processor circuitry to at least one of instantiate or execute the machine readable instructions to: determine if a device identification repository includes a first device identifier included in a query; infer first device information for the first device identifier based on a second device identifier and second device information included in the device identification repository; and transmit the first device information in response to the query.
Virtual IP support for bare metal cloud infrastructures
Disclosed is an improved approach for managing floating/virtual IP addresses in a virtualization system. Where a bare metal cloud provider does not provide adequate facilities to implement broadcast operations, the approach would capture broadcast packets, and from the captured packets, generate calls to the cloud provider to implement configuration changes to reflect the changes desired by the broadcast packets.
Network node, wireless device and methods for handling interference
A network node (300), a wireless device (304) and methods therein, for handling interference in a wireless network where a Listen-Before-Talk, LBT, scheme is employed to control transmissions. The network node (300) determines whether a first wireless device (302) is compatible with a second wireless device (304) at a serving network node (300) so that uplink signals transmitted (3:1A, 3:2A) from the wireless devices (302, 304) are spatially separable at the serving network node (300). An LBT-related message is then transmitted (3:4A) to the first wireless device (302), which message indicates that the wireless devices (302, 304) are compatible or incompatible at the serving network node (300). The second wireless device (304) is then able to detect (3:4A), i.e. overhear, the LBT-related message and use it as a basis for deciding (3:5) whether to perform a transmission or not. The second wireless device (304) can thus decide to transmit when the compatibility information indicates that the wireless devices (302, 304) are compatible, or refrain from transmission when the compatibility information indicates that the wireless devices (302, 304) are incompatible.
System and method to provide homogeneous fabric attributes to reduce the need for SA access in a high performance computing environment
Systems and methods for InfiniBand fabric optimizations to minimize SA access and startup failover times. A system can comprise one or more microprocessors, a first subnet, the first subnet comprising a plurality of switches, a plurality of host channel adapters, a plurality of hosts, and a subnet manager, the subnet manager running on one of the one or more switches and the plurality of host channel adapters. The subnet manager can be configured to determine that the plurality of hosts and the plurality of switches support a same set of capabilities. On such determination, the subnet manager can configure an SMA flag, the flag indicating that a condition can be set for each of the host channel adapter ports.
In-band management interface with user space datapath
A method of utilizing the same hardware network interface card (NIC) in a gateway of a datacenter to communicate datacenter tenant packet traffic and packet traffic for a set of applications that execute in the user space of the gateway and utilize a network stack in the kernel space of the gateway. The method sends and receives packets for the datacenter tenant packet traffic through a packet datapath in the user space. The method sends incoming packets from the NIC to the set of applications through the datapath in the user space, a user-kernel transport driver connecting the kernel network stack to the datapath in the user space, and the kernel network stack. The method receives outgoing packets at the NIC from the set of applications through the kernel network stack, the user-kernel transport driver, and the data path in the user space.
Computing device and method for performing a secure neighbor discovery
Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.
Method and system for provisioning device specific WLAN credentials
A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.
Wireless emergency stop systems including mobile device controllers linked with safety stop devices
A wireless emergency stop system includes a machine safety device connected to a machine stop circuit for stopping operation of a machine when the machine stop circuit is activated. The machine safety device includes a wireless communication interface. The system also includes a mobile device controller configured to control operation of the machine, and a safety stop device. The safety stop device includes a wireless communication interface for wireless communication with the machine safety device, and an emergency stop switch configured to, when activated, transmit an emergency stop signal to the machine safety device to trigger an emergency stop of the machine. The mobile device controller is configured to link with the safety stop device via short-range wireless communication.
Systems and methods for network authentication with a shared secret
A computing system can associate a customer device of a customer with a financial transaction record and the merchant, the financial transaction record indicative of a first purchase from the merchant by the customer, transmit a first query to the customer device prompting the customer to input information regarding an aspect of the first purchase, the first query including a description of a predetermined product parameter of the financial transaction record indicative of the first purchase from the merchant by the customer, authenticating, by the computing system, the first request by determining that the customer-input response to the first query corresponds to the established aspect of the first purchase in accordance with a predetermined accuracy threshold, and authorizing, by the computing system, connection of the customer device to the network provided by the merchant based at least in part on the first request being authenticated.