Patent classifications
H04L67/1091
Infrastructure support in cloud environments
Techniques are disclosed for implementing networks in a virtualized computing environment. One or more spoke virtual networks are instantiated and connected to a first virtual network hub to form a first hub and spoke topology. One or more spoke virtual networks are instantiated and connected to a second hub virtual network to form a second hub and spoke topology. A virtual connection is established from the first virtual network hub to the second hub virtual network. The first and second hub and spoke networks are allocated to a user of the virtualized computing environment.
DATA TRANSMISSION AND NETWORK INTERFACE CONTROLLER
Implementations of this disclosure provide data transmission operations and network interface controllers. An example method performed by a first RDMA network interface controller includes obtaining m data packets from a host memory of a first host; sending the m data packets to a second RDMA network interface controller of a second host; backing up the m data packets to a network interface controller memory integrated into the first RDMA network interface controller; determining that the second RDMA network interface controller does not receive n data packets of the m data packets; and in response, obtaining the n data packets from the m data packets that have been backed up to the network interface controller memory integrated into the first RDMA network interface controller, and retransmitting the n data packets to the second RDMA network interface controller.
Apparatus and method for network based operation of an unmanned aerial vehicle
Embodiment includes of a method and a system of network based operation of an unmanned aerial vehicle is disclosed. One system includes a drone user machine, a drone control machine, and a drone control console. The drone control machine is interfaced with the drone user machine through a network, and the drone control machine is interfaced with a drone through the drone control console. The drone control machine operates to receive user commands from the drone user machine through the network, generate drone control commands which are provided to the drone control console for controlling the drone, wherein the drone control commands are generated based on the user commands, receive video from the drone control console that was generated by a camera located on the drone, and communicate the video to the drone user machine over the network, wherein the video is displayed on a display associated with the drone user machine.
Security Appliance for Protecting Power-Saving Wireless Devices Against Attack
Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.
ACCESS CONTROL AND OWNERSHIP TRANSFER OF DIGITAL CONTENT USING A DECENTRALIZED CONTENT FABRIC AND LEDGER
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client's request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.
Network hardware devices organized in a wireless mesh network for content distribution to client device having no internet connectivity
Wireless mesh network (WMN) architectures of network hardware devices organized in a mesh topology is described. One device communicates, using a first radio, first data with a second device via a first wireless link between the device and the second device. The device communicates, using a second radio, second data with a third device via a second wireless link between the device and the third device. The device communicates, using a third radio, third data with a fourth device via a third wireless link between the device and the fourth device. The device communicates, using a fourth radio, fourth data with a server of a content delivery network (CDN) via a point-to-point wireless link between the device and the server. The device is an only ingress point for content files for a mesh network that includes at least the device, the second device, and the third device.
Integrating web applications with local client applications in multi-user client environment
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to load a web application into a browser; generate a random character string; and access a Uniform Resource Identifier (URI) to trigger execution of a protocol handler. The protocol handler is registered with the operating system to handle the URI scheme. The URI includes the random character string. The at least one processor is further configured to cause the protocol handler to start a local client application and provide the random character string to the local client application. The at least one processor is further configured to cause the local client application to start a Hypertext Transfer Protocol (HTTP) listener on a local loopback HTTP endpoint configured for communication between the web application and the local client application. The pathname of the endpoint includes the random character string.
Security Appliance for Protecting Power-Saving Wireless Devices Against Attack
Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.
Device clustering
Clustering a plurality of client devices running an application as a function of a data structure such that the plurality of client devices are each assigned a cluster. Client devices having similar performance metrics are assigned the same cluster. An operation of the application is modified as a function of the performance metrics of the client device. The modification of application operation is performed by turning certain features of the application on and off using a rule based on device cluster.
Data transmission and network interface controller
Implementations of this disclosure provide data transmission operations and network interface controllers. An example method performed by a first RDMA network interface controller includes obtaining m data packets from a host memory of a first host; sending the m data packets to a second RDMA network interface controller of a second host; backing up the m data packets to a network interface controller memory integrated into the first RDMA network interface controller; determining that the second RDMA network interface controller does not receive n data packets of the m data packets; and in response, obtaining the n data packets from the m data packets that have been backed up to the network interface controller memory integrated into the first RDMA network interface controller, and retransmitting the n data packets to the second RDMA network interface controller.