Patent classifications
H04L67/1061
Alarm information processing method and apparatus, system, and computer storage medium
An alarm information processing method, apparatus, system, and computer storage medium are provided. The method includes receiving alarm information generated by a first node at a first time. It is determined whether the alarm information is a root alarm, and in response to a determination that the alarm information is a root alarm, a plurality of first links comprising the first node are obtained, to generate a first link set. The plurality of first links of the first link set are searched for one or more nodes located before the first node, and alarm information is generated within a first time range before the first time and a second time range after the first time, to obtain a second node. Alarm root source analysis is performed on the second node, and an analysis result is notified.
Method and first node for managing transmission of probe messages
A method and a first node for managing transmission of at least one probe message for detection of failure of a second node are disclosed. A network comprises the first and second nodes. The first node receives a message about an event related to the second node. The message comprises an identifier of the second node and an event type of the event. The first node retrieves at least one policy for failure detection based on the event type. The first node modifies a probe list based on said at least one policy with respect to the second node. The probe list indicates an order in which nodes, neighbouring to the first node, are to be probed by transmission of the probe messages thereto. The second node is one of the nodes neighbouring to the first node. The first node transmits the probe messages according to the probe list.
Controlling data transmission
A method of controlling transmission of data over a data network comprising authenticating a first user; sending a request message comprising data corresponding to a first group of user identifiers representative of proposed recipients, and determining updates to the group of user identifiers. The updates being based on a group score representing a similarity measure indicative of an overlap between the first group and a second group of user identifiers associated with an historical data package; and a user score for a second user identifier in the second group based on the group score and access data associated with the historical data package. A control message is transmitted to the client system, and an updated group of user identifiers is generated based on the control message. A data package is constructed and transmitted to a set of recipients based on the updated group of user identifiers.
Self-describing interfaces for communication with gateways
In one aspect, a request is sent to a device for a device descriptor that describes custom interfaces. The custom interfaces may be expressed according to a defined data structure. The device descriptor that describes the custom interfaces is received at a gateway. An interface agnostic application is executed to translate the device descriptor to the custom interfaces for consumption of the data described by the custom interfaces.
DISTRIBUTED LEDGER SYSTEM FOR MANAGING VEHICLE SENSOR DATA UTILIZED TO DEVELOP COLLISION PROFILES
Systems and methods are disclosed with respect to using a distributed ledger, such as a blockchain, for managing vehicle sensor data utilized to develop collision profiles. These collision profiles may be helpful when analyzing a collision to determine conditions that preceded the collision, to determine fault, and/or to determine an extent of damage to one or more vehicles involved in the collision. The sensor data may be collected from any of a number of sensors configured to capture position, orientation, movement, acceleration, driver behavior, etc.
Local peer to peer direct connection in network address translator (NAT) and overlay networks
In a method of Local Peer to Peer Direct Connection in NAT and overlay network. A request is received from a first peer at a relay gateway to establish a direct connection with a second peer. The first peer and the second peer are located behind a NAT firewall. An authentication request is relayed from the first peer at the relay gateway. The authentication request is forwarded from the relay gateway to the second peer. Upon performing authentication at the second peer, an authentication response is received at the relay gateway. The authentication response is received from the relay gateway at the first peer. An internal route propagation is performed from the second peer to the first peer via the relay gateway. A Local Peer to Peer Direct Connection is established between the first peer and the second peer for packet flow through the direct connection.
Communication device for peer-to-peer communication and a communication network using the same
A communication device can have a peer-to-peer communication application installed on it. The device can be configured to detect at least one other communication device including the peer-to-peer communication application, and may be configured to set up a connection with the detected communication device. The device can be configured to, in response to a request to set up peer-to-peer communication sent to the first device on a predetermined port and via a predetermined protocol by a second detected device exchange with the second device information required for setting up peer-to-peer communication with the second device, and to set up the peer-to-peer communication. The peer-to-peer communication application can be configured to send, on the predetermined port and via the predetermined protocol a request to set up peer-to-peer communication to a third detected communication device.
Distributed ledger system for managing medical records
Systems and methods are disclosed with respect to using a distributed ledger, such as a blockchain, for managing medical records. The medical records may be accessible by medical institutions such as hospitals, and may be controlled by the patient. The patient may, for example, decide which entities can access and/or edit the medical records.
SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION
A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers.
Secure friendship establishment in a mesh network
Disclosed are techniques for establishing an encrypted connection between a first node and a second node in a wireless mesh network. In an aspect, the first node receives, from a provisioner node in the wireless mesh network, a first value encrypted with a device-specific encryption key known only to the first node and the provisioner node, wherein the second node receives, from the provisioner node, the first value encrypted with a second device-specific encryption key, generates a friendship-specific encryption key based on the first value, an identifier of the first node, and an identifier of the second node, wherein the second node generates the friendship-specific encryption key, sends, to the second node, a first message encrypted with the friendship-specific encryption key, and receives, from the second node, a second message encrypted with the friendship-specific encryption key.