Patent classifications
H04L67/1042
Method and apparatus for trust based authentication in SDN clustering
A method of managing a node in a cluster of nodes in an SDN network. The method comprising receiving from the node a request to join the cluster and a list of references authenticating the node. The references are verified and if the referenced passed the verification the node is allowed to join the cluster. Then a trust level of the node is calculated based on the number of verified references, wherein a role of the node in the cluster depends on the trust level of said node.
PEER-TO-PEER NETWORK FOR TELECOMMUNICATION NETWORK TRAFFIC REROUTING
Devices, computer-readable media and methods are disclosed for establishing a peer-to-peer network for rerouting network traffic of a telecommunication network during a network disruption. For example, a processing system may detect a network disruption between a first device and a second device of the telecommunication network. The processing system may identify a first peering device having a connection to the first device of the telecommunication network, identify a second peering device having a connection to the second device of the telecommunication network, and establish a peer-to-peer network via at least the first peering device and the second peering device, wherein at least one of the first peering device or the second peering device is a mobile endpoint device configured to operate as a virtual network function. The processing system may then route network traffic between the first device and the second device via the peer-to-peer network.
PEER-TO-PEER NETWORK FOR TELECOMMUNICATION NETWORK TRAFFIC REROUTING
Devices, computer-readable media and methods are disclosed for establishing a peer-to-peer network for rerouting network traffic of a telecommunication network during a network disruption. For example, a processing system may detect a network disruption between a first device and a second device of the telecommunication network. The processing system may identify a first peering device having a connection to the first device of the telecommunication network, identify a second peering device having a connection to the second device of the telecommunication network, and establish a peer-to-peer network via at least the first peering device and the second peering device, wherein at least one of the first peering device or the second peering device is a mobile endpoint device configured to operate as a virtual network function. The processing system may then route network traffic between the first device and the second device via the peer-to-peer network.
Systems and methods for private settlement of distributed ledger transactions
Systems and methods for private settlement of distributed ledger transactions are disclosed. In one embodiment, in an information processing device for a node for a first party in a computer network comprising at least one computer processor, a method for transferring assets with transaction privacy using a distributed ledger may include: (1) receiving, from the first party, a transaction to transfer ownership of one or more first z-tokens to a second party in exchange for second z-tokens; (2) receiving, from the second party, acceptance of the transaction; (3) committing the transaction to a distributed ledger; and (4) executing the transaction and updating a state to update a number of first z-tokens and a number of second z-tokens for the first party and the second party based on the transaction.
Systems and methods for private settlement of distributed ledger transactions
Systems and methods for private settlement of distributed ledger transactions are disclosed. In one embodiment, in an information processing device for a node for a first party in a computer network comprising at least one computer processor, a method for transferring assets with transaction privacy using a distributed ledger may include: (1) receiving, from the first party, a transaction to transfer ownership of one or more first z-tokens to a second party in exchange for second z-tokens; (2) receiving, from the second party, acceptance of the transaction; (3) committing the transaction to a distributed ledger; and (4) executing the transaction and updating a state to update a number of first z-tokens and a number of second z-tokens for the first party and the second party based on the transaction.
MANAGING IDENTIFIERS FOR MULTINODAL MASTER SYSTEMS OF UNKNOWN OR CHANGING SIZE
Systems, methods, and other embodiments associated with distributed primary identifier management in a multi-master database system are described. One embodiment includes adding a new master node to a system with a plurality of master nodes. Assigning a master node number to the new master node in relation to the plurality of master nodes. The master node number is converted into a binary value and a reverse bit order of the master node number is generated. The new master node is configured to assign primary identifiers within an address space to data objects, wherein the primary identifiers include the reverse bit order of the master node number to reduce collisions between the data objects.
INTERNET GROUP MANAGEMENT PROTOCOL HOST TRACKING
A computer network device (such as a switch or a router) that implement host tracking is described. During operation, the computer network device may receive a report message that is associated with a host, which indicates that the host wants to join a group in a network that receives an audio-video channel from a source. In response, the computer network device may add information associated with the host to a group data structure associated with one or more hosts in the group. Then, when the computer network device receives a leave message that is associated with the host, the computer network device may remove or deactivates the host from the group data structure. Moreover, when the group data structure is empty or has no active hosts, the computer network device may stop forwarding the audio-video channel from the source to the group without further delay.
DIRECTORY SERVICE USER SYNCHRONIZATION
Disclosed are various examples for enrolling a client device and synchronizing user attributes for the client device across multiple directory services. A search request for user attributes can be sent to a first directory service with an identifier for a user account. The first directory service can query for the identifier and send back user attributes. If a global identifier is included in the attributes, another search request for user attributes can be sent to a second directory service with the global identifier. The second directory service can query for the global identifier and send back user attributes.
Peer-To-Peer Syncable Storage System
A system for creating a sync group in a distributed system may include an offline electronic device having a short range communication transmitter and a storage service, and a computer-readable storage medium comprising one or more programming instructions. The system may receive a request from an application to create a sync group, and verify that the application has read access to the storage service. In response to verifying that the application has read access to the storage service, the system may create the sync group by receiving an indication of one or more objects stored in the storage service that are to be shared, identifying one or more members of the sync group, and assigning one or more permissions to the one or more members that are identified. The system may synchronize access to the objects among the electronic device and one or more member electronic devices.
OBJECT IDENTIFICATION FOR GROUPS OF IOT DEVICES
An Internet of Things (IoT) network composite object includes a device owner with name server and sub-object list, sub-objects, and a blockchain recording the sub-objects. An IoT network composite object includes a device owner with composite object type name server, and blockchain. An IoT network coalition group includes coalition group name server, coalition group member list, and blockchain. An IoT network apparatus includes device identity generator, message publisher, network applier, device describer, and packer sender. An IoT network apparatus includes a device registrar to register device to first network through a portal to second network, device joiner, token requester, and authentication request sender. An IoT network apparatus includes an identity verifier to verify the identity of an authentication request, and an authentication request response returner. An IoT network apparatus including a caller entity credential issuer, an object entity provisioner, credential presenter, and access control list policy applier.