H04L41/0846

Device migration

Personalization data such as settings and/or state is migrated across devices including mobile phones. Device personalizations are pushed to a cloud service or other mechanism for backup and subsequent transmission to other devices. The personalization data can later be employed to configure one or more other devices in the same manner as a first device.

Timeout value adaptation

A mechanism is provided for updating a timeout value of an application in a computer system. Hardware and software configuration data of the remote computing device is determined. A local computing device in the server system is provided in accordance with the determined hardware and software configuration data. An application on the local computing device is executed for determining the execution time of the application. An echo request packet is sent to the remote computing device. A current network time delay is determined from the elapsed time between sending and receiving a response to the echo request packet from the remote computing device. The timeout value from the current network time delay and the execution time is calculated. The sending, determining, and calculating steps are repeated during execution of the application by the remote computing device for repeatedly updating the timeout value using the calculated timeout value.

Systems and methods for live, on-device configuration validation

Embodiments of the present disclosure provide systems and methods for performing network device configuration validation online. A second instance of the command process (a shadow interpreter) can be run within a isolated validation environment on a network device that is active on a network. A copy of the configuration database on the network device is associated with the isolated validation environment. The validation handler erases the currently running configuration commands within the validation copy of the configuration database, and enters each new configuration command through the shadow interpreter to validate the new configuration commands on the network device without impacting the current functioning of the network device. After all the new configuration commands are entered, the validation report generates a report identifying the validation status for each command.

Bridging Configuration Changes for Compliant Devices
20170264480 · 2017-09-14 ·

Various implementations disclosed herein provide a mechanism for determining that a configuration status of a compliant device is too far out-of-date, and subsequently bridging the configuration status of the compliant device to the up-to-date configuration data and instructions in response. In various implementations, determination of the configuration status of the compliant device is possible using a single request from the compliant device, which in turn reduces the amount of network traffic and utilization of network resources needed to update the compliant device with the up-to-date configuration data and instructions.

MIGRATION OF SETTINGS FROM A NON-CONNECTED BUILDING CONTROLLER TO ANOTHER BUILDING CONTROLLER

A Heating, Ventilation, and/or Air Conditioning (HVAC) controller configured to control at least part of an HVAC system of a building. The HVAC controller may include a user interface and a controller. In response to a selection by a user at the user interface, the controller may assemble and present via the user interface an output that encodes settings in a machine readable form. The controller may display the encoded settings on the display with fixed segments of a fixed segment display. An application program code on a remote device may be utilized to capture the displayed fixed segments that encode the settings in an image. The captured image of fixed segments may be decoded at the remote device or may be sent to a remote computing device for processing and/or decoding.

System and method for test to production support in a cloud platform environment

In accordance with an embodiment, described herein is a system and method for replicating a source service domain to a target service domain in a cloud computing platform environment. In accordance with an embodiment, the system comprises a cloud platform component provided as an installable software suite within the cloud environment, that supports provisioning of enterprise applications; a test to production (T2P) framework module that includes a plurality of T2P plugins and a PaaS plugin; and a user interface where an administrator or a user can invoke the plugins to replicate a source service domain to a target service domain. The system allows a user to manually customize move plans for service domain configurations based on the requirements of the target service domain, and recreate the configurations in the target service domain in accordance with the customized move plans.

CONFIGURATION METHOD AND RELATED DEVICE
20220239560 · 2022-07-28 · ·

Embodiments of this application disclose a configuration method that may be applied to a software-defined wide area network (SD-WAN). The method includes: receiving a correspondence between a device identifier of a first device and a first location; sending, to the first device, a verification request related to verifying whether the first device is located at the first location; receiving a verification response to the verification request; and determining, based on the verification response, whether to send configuration information corresponding to the first location to the first device. The methods in the embodiments of this application may be implemented by a software-defined network (SDN) controller.

CROSS-CLIENT SENSOR USER INTERFACE IN AN INTEGRATED SECURITY NETWORK
20220238006 · 2022-07-28 ·

An integrated system includes a system user interface (SUI) that provides an iconic, at-a-glance representation of integrated security system status. The SUI is for use across all client devices including mobile or cellular telephones, a mobile portal, a web portal, and a touchscreen device. The SUI includes a number of display elements presented across all types of client devices for monitoring status of the integrated security system. The display elements of the SUI include an orb icon, text summary, security button, device warnings, system warnings, interesting sensors, and quiet sensors. The SUI thus provides system status summary information agnostically across all clients. Additionally, the SUI provides consistent iconography, terminology, and display rules across all clients as well as consistent sensor and system detail across clients.

SYSTEMS AND METHODS FOR CLOUD-BASED ASSET MANAGEMENT AND ANALYSIS REGARDING WELL DEVICES
20210406786 · 2021-12-30 ·

A method for a cloud-computing system to communicatively couple with a remote terminal unit (RTU) that monitors and/or controls one or more operations a well device associated with a hydrocarbon well may include receiving, via at least one processor, a request from an asset attempting to communicatively couple with the cloud-computing system. The method may then include determining whether the asset is known and receiving one or more attributes regarding the asset when the asset is not known. After receiving the attributes, the method may include determining whether a profile that corresponds to the one or more attributes exists and sending configuration data to the asset based on the profile when the profile exists.

Generation and deployment of inherited network topology models

A deployment system may generate and deploy network topology models within one or more workload resource domains. In some examples, the deployment system may implement a hierarchical data structure to store and manage multiple variations of a network topology models, in which network topology definitions and other characteristics may be inherited between related elements in the data structure. Data structures storing network topology models may be implemented as hierarchical levels of elements storing related, overlapping, and/or alternative portions of network topologies. A network topology model may be generated for deployment by combining the portions of network topologies stored within a branch of elements in the hierarchy, and the model may be deployed across one or more workload resource domains. Modifications to network topology models may be applied to individual elements and/or propagated to related elements based on the relationships and metadata defined for the in the hierarchical structure.