Patent classifications
H04L67/1068
System, Network, Device and Stacked Spectrum Method for Implementing Spectrum Sharing of Multiple Contiguous and Non-Contiguous Spectrum Bands Utilizing Universal Wireless Access Gateways to Enable Dynamic Security and Bandwidth Policy Management
A system and method in various embodiments implements a virtual spectrum band stacking technique facilitating spectrum sharing by converting and combining spectrum bands consisting of several different RF channels, common air interfaces, and radio channel protocols in the radio frequency channel domain to form IP Virtual Radio Channels (IP-VRCs) in the packet data domain. This virtual spectrum stacking technique combines the transmissions of contiguous and non-contiguous RF channels with differing physical layers into IP-VRCs. This technique enables simultaneous parallel high-speed wireless transmission; virtual radio channel hopping for enhanced security; and customized security schemes for different IP-VRC Groups. The deployment of the combination of IP-VRC Groups; Universal “Small Cell” Base Stations; and Universal Wireless End-Point Devices allows the aggregation of all available spectrum bands for use within a building environment. Some benefits of this deployment include expansion of spectrum utilization, service quality, security, applications and transmission throughput for wireless end-point devices.
Fault tolerant periodic leader rotation for blockchain
An example operation may include one or more of storing a list of unavailable blockchain peers that cannot be a lead peer of a blockchain consensus protocol, generating a pre-prepare message comprising a new block of a blockchain, appending commit messages received during a commit stage of a previous block to the blockchain, to the pre-prepare message, where the commit messages identify an unavailable blockchain peer from the list that is now available, and broadcasting the pre-prepare message with the new block and the appended commit messages to a plurality of blockchain peers.
Edge sharing orchestration system
A network device includes a processor and a memory. The processor effectuates operations including instantiating an edge share orchestrator that identifies edge devices including a customer device. Edge share orchestrator also determines that the customer device lacks computing power or functionality to perform at least a portion of an existing or augmented service and identifies at least one additional device of the edge devices capable of providing additional computing power or functionality for performing the at least a portion of the existing service or augmented service associated with the customer device. Edge share orchestrator also meshes the additional computing power or functionality of the at least one additional device with the customer device and performs the at least a portion of the existing or augmented service associated with the customer device using the meshed additional computing power or functionality of the at least one additional device and the customer device.
Load-balancing cluster
A load-balancing cluster includes a switch having a plurality of ports; and a plurality of servers connected to at least some of the plurality of ports of the switch. Each server is addressable by the same virtual Internet Protocol (VIP) address. Each server in the cluster has a mechanism constructed and adapted to respond to connection requests at the VIP by selecting one of the plurality of servers to handle that connection, wherein the selecting is based, at least in part, on a given function of information used to request the connection; and a firewall mechanism constructed and adapted to accept all requests for the VIP address for a particular connection only on the server that has been selected to handle that particular connection. The selected server determines whether it is responsible for the request and may hand it off to another cluster member.
AD HOC DECENTRALIZED CLOUD INFRASTRUCTURE
Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.
Peer to peer remote application discovery
Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein.
Method and device for acquiring bit torrent resource information
A method and a device for acquiring bit torrent (BT) resource information are provided. When interacting with a peered terminal for exchanging the data of a BT resource, in the case that a local terminal does not have the metadata of the BT resource, the local terminal, after performing the BT protocol handshake, determines the number of data slices of the BT resource based on the bitmap A of the BT resource sent by the peered terminal, and then a NOT operation of the bitmap A is performed, and the bitmap B obtained through the NOT operation is fed back to the peered terminal to trigger the peered terminal to send an acquisition request to the local terminal for the data blocks of the BT resource.
SCALABLE PROXY CLUSTERS
The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the scalable cluster (iii) efficient methods of configuring the proxy cluster, (iv) natural resiliency of clusters and/or proxy nodes within a cluster, (v) methods for scaling of clusters, (vi) configurability of clusters to span multiple servers, multiple racks and multiple datacenters, thereby ensuring high availability and disaster recovery (vii) switching between proxies or between servers without loss of session.
Automated storage selection with blockchain and NLP
A processor may receive a request for storage in a blockchain network. The request may include information as to a specific storage that is required. The processor may commit the request to the blockchain network. The processor may provide the request to one or more proposing entities. The processor may receive, from the one or more proposing entities, respective proposals in response to the request for storage. The processor may determine which of the respective proposals best match the information included in the request. The processor may automatically accept the best matched proposal.
Systems and methods for enabling service interoperability functionality for wifi direct devices connected to a network via a wireless access point
Certain embodiments herein are directed to enabling service interoperability functionality for wireless fidelity (WiFi) Direct devices connected to a network via a wireless access point. A WiFi Direct device may identify various other WiFi Direct devices on a WiFi network for performing a requested service, such as printing content or displaying content to a screen. In so doing, the device may share information associated with an access point to which the device is connected with the other devices, which may also share information associated with an access point to which they are connected. In this way, WiFi Direct devices may discover their connectivity with respect to other devices to utilize a broader array of connection options for implementing a desired service, and hence, may leverage application programming interface (API) modules directed at providing service interoperability functionality between software applications and services requested by the software applications.