Patent classifications
H04L12/701
PERSONAL MONITORING USING A REMOTE TIMER
Method and apparatus for monitoring the status and location of personnel using a remote timer. In some embodiments, a method includes execution of a subject application (app) on a network accessible device. A countdown timer of a remote server is initiated to monitor a time interval, the remote server communicating with the network accessible device over a network. Geo positions of the network accessible device are monitored during the monitored time interval. The remote server sends a notification to a monitoring device responsive to at least one of the following events: the monitored time interval ends without the remote server receiving an authorized personal identification (PID) value; or the remote server receives an unauthorized PID value prior to the conclusion of the monitored time interval. In further embodiments, a notification is sent based on an out-of-bounds geo position of the network accessible device during the time interval.
Method and a first device for managing data frames in switched networks
A method and a first device (110) of a switched network (100), for managing data frames received, at a first port, from a second device (120) are disclosed. The first device (110) handles the first port and a second port for transfer of data frames between the first and second devices (110, 120). The first device (110) is addressable by a Media Access Control address, MAC address, associated with the first port. The first device (110) receives (201), from the second device (120), at least one data frame at the second port. The first device (110) sends (202), on the first port, a message including the MAC address associated with the first port.
Multi-independent level secure (MILS) storage encryption
In one embodiment, a method includes: receiving, by a first computing device on a first port of a plurality of ports, a data packet, wherein each of the ports corresponds to one of a plurality of security classes, and the first computing device comprises a plurality of cryptographic modules, each module configured to encrypt data for a respective one of the security classes; tagging the data packet, wherein tagging data identifies one of the security classes and the first port; routing, based on at least one header, the data packet to a first cryptographic module of the plurality of cryptographic modules; encrypting the data packet using the first cryptographic module; and storing the encrypted data packet in a first data storage device.
Dynamic Subscription and Message Routing on a Topic Between Publishing Nodes and Subscribing Nodes
A system for dynamic message routing on a topic between publishing nodes and subscribing nodes includes a plurality of message queues, at least one topic/node table, a subscribing module, a publishing module, and other modules to send messages between one or more publisher and one or more subscribers. These modules are coupled together by a bus in a plurality of nodes and provide for the dynamic message routing on a topic between publishing nodes and subscribing nodes. The message queues store messages at each node for delivery to subscribers local to that node. The topic/node table lists which clients subscribe to which topics, and is used by the other modules to ensure proper distribution of messages. The subscribing module is use to establish a subscription to a topic for that node. The publishing module is used to identify subscribers to a topic and transmit messages to subscribers dynamically. The other modules include various devices to optimize message communication in a publish/subscribe architecture operating on a distributed computing system. The present invention also includes a number of novel methods including: a method for publishing a message on a topic, a method for forwarding a message on a topic, a method for subscribing to messages on a topic, a method for automatically removing subscribers, a method for direct publishing of messages, and methods for optimizing message transmission between nodes.
Personal monitoring using a remote timer
Method and apparatus for monitoring the status and location of personnel using a remote timer. In some embodiments, a method includes execution of a subject application (app) on a network accessible device. A countdown timer of a remote server is initiated to monitor a time interval, the remote server communicating with the network accessible device over a network. Geo positions of the network accessible device are monitored during the monitored time interval. The remote server sends a notification to a monitoring device responsive to at least one of the following events: the monitored time interval ends without the remote server receiving an authorized personal identification (PID) value; or the remote server receives an unauthorized PID value prior to the conclusion of the monitored time interval. In further embodiments, a notification is sent based on an out-of-bounds geo position of the network accessible device during the time interval.
Data multicasting with router replication and target instruction identification in a distributed multi-core processing architecture
Methods, procedures, apparatuses, computer programs, computer-accessible mediums, processing arrangements and systems generally related to data multi-casting in a distributed processor architecture are described. Various implementations may include identifying a plurality of target instructions that are configured to receive a first message from a source; providing target routing instructions to the first message for each of the target instructions including selected information commonly shared by the target instructions; and, when two of the identified target instructions are located in different directions from one another relative to a router, replicating the first message and routing the replicated messages to each of the identified target instructions in the different directions. The providing target routing instructions may further comprise the selected information utilizing a subset of bits that is commonly shared by the target instructions and being identified as a left operand, right operand or predicate operand, and may include the selection of one of a plurality of multiple-instruction subsets of the target instructions.
Path selection for an application based on a performance score in a software-defined network
A method may include receiving a data flow of an application directed to the destination in a software-defined network (SDN). The method may also include identifying a classification of the application. The method may additionally include identifying a set of performance thresholds associated with the classification of the application. The method may also include determining a current performance of the data flow of the application in the SDN. The method may also include generating a performance score for the application based on the set of performance thresholds and the current performance of the data flow of the application in the SDN. The method may further include causing the performance score for the application to be presented via an interface.
Systems and methods for optimized route caching
A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet.
Managed switch architectures: software managed switches, hardware managed switches, and heterogeneous managed switches
For a logical switching element implemented across several managed switching elements, some embodiments provide a method that receives a packet for processing through a logical processing pipeline of the logical switching element. The method processes the packet through a first set of stages of the logical processing pipeline of the logical switching element. The method modifies a set of context tag values to indicate a logical output port of the logical switching element for the packet. The method forwards the packet to a managed switching element of the several managed switching elements based on the logical output port in the set of context tag values stored in the packet.
System and method for processing and forwarding transmitted information
A system and method for handling a digital electronic flow between a first and second entity in which a flow policy is determined that is to be applied to the flow and the flow is then directed along a path in accordance with the policy. An ID is supplied for each flow and a tag associated with each flow which indicates the policy to be applied to its associated flow. Flows are also associated with one another, with associated flows having associated policies. In particular the flow may be processed or forwarded. The path may include a graph structure and virtual applications.