Patent classifications
H04L29/06
REAL-TIME APPLICATION BEHAVIOR CHANGES
Aspects of the present disclosure relate to systems and methods for adjusting a behavior of an application in real-time. Telemetry for a client computing device, a server computing device, and a network associated with the application may be received. It may be determined, while the application is running in real-time, whether to adjust the behavior of the application using the received telemetry. In response to determining to adjust the behavior of the application, the behavior of the application may be adjusted based on the received telemetry while the application is running in real-time.
WEIGHTED DATA CENTER RESELECTION
An initial data center is selected to host the online conference. This data center can be selected based on the locations of the participants, a weighting (or ‘priority’) of the participants, or a combination of the two (e.g., locations that are weighted by the participant's priority.) Typically, the data center closest to the centroid (i.e., geometric center, or ‘center of mass’) of the participants is selected. In anticipation that participants will join and/or leaver the conference, a list is calculated that each possible change to a respective data center that will be selected if that change occurs. This list may be distributed to the data centers that, if selected, would host the online conference.
CORE NETWORK CONNECTIONLESS SMALL DATA TRANSFER
Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network. The transfer of data may take place in an absence of an existing device context between the network node interacting with the device and the core network through which the data travels. State management overhead and signaling overhead may be reduced by use of the exemplary aspects disclosed herein. For example, the device does not need to perform an authentication and key agreement (AKA) procedure to transfer the data and an existing (or pre-existing) device context need not be maintained at the core network.
TECHNOLOGIES FOR DISTRIBUTED ACTING AND KNOWLEDGE FOR THE INTERNET OF THINGS
Technologies for a distributed Internet of Things (IoT) system are disclosed. Several IoT devices may form a peer-to-peer network without requiring a central server. Information may be stored in a distributed manner in the distributed IoT system, allowing for storing information without transmitting it to a remote server, which may be costly and introduce security or privacy risks. Each IoT device of the distributed IoT system includes a machine learning algorithm that is capable of uncovering patterns in the input of the distributed IoT system, such as a pattern of user inputs in certain situations, and the distributed IoT system may adaptively anticipate a user's intentions.
MULTIPLE ANTENNAS AND INTERRUPTION TIME VALUES FOR SOUNDING REFERENCE SIGNAL (SRS) SWITCHING
A user equipment (UE) may transmit a sounding reference signal (SRS) on a component carrier (CC) that is otherwise configured for downlink communications. Due to a carrier aggregation configuration or UE capability, the UE may need to retune certain components to transmit on the CC. If the SRS transmission, including the retuning time, collides with another transmission (e.g., in uplink or downlink) the UE may drop the SRS, drop the other transmission, or puncture the other transmission to facilitate the SRS transmission. The determination about a collision may depend on the retuning time, channel, or type of control information in the other transmission. In some cases, a UE may drop the other transmission if transmitting the SRS would prevent the UE from transmitting a demodulation reference signal, hybrid automatic repeat request (HARD) feedback. In some cases, the determination may be based upon a prioritization and may also depend on a subsequent subframe.
DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING
The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.
Sharing User Context And Preferences
Technology for interoperability is disclosed by enabling the sharing of user context or preferences for a computing experience across computing devices, operating systems, applications, or locations. A platform and application programming interface (API) are provided for computer applications and services to store and retrieve context data associated with a computing experience. Access to the context data for sharing may be managed by an access controller, which enables a user to manage access permissions for the sharing of the context data. The context data may be defined according to a common schema, which specifies the information for sharing and may be communicated using common communication channels or protocols. Thus context data may be shared across nearly any application or service including those developed in different computer programming languages or operating on different types of computing devices or devices running different operating systems or by different software developers.
METHOD, DEVICE AND MEDIUM FOR DETERMINING CODING FORMAT
A method, device and medium for determining a coding format are provided. The method includes: receiving one or more data packets forwarded by a call center during a VoLTE communication, in which the one or more data packets carry a first coding format; detecting whether the first coding format is same with a negotiated second coding format; and modifying the coding format used during the VoLTE communication from the second coding format to the first coding format, if the first coding format is not same with the negotiated second coding format.
SECURE INDUSTRIAL CONTROL PLATFORM
According to some embodiments, an overall chain-of-trust may be established for an industrial control system. Secure hardware may be provided, including a hardware security module coupled to or integrated with a processor of the industrial control system to provide a hardware root-of-trust. Similarly, secure firmware associated with a secure boot mechanism such that the processor executes a trusted operating system, wherein the secure boot mechanism includes one or more of a measured boot, a trusted boot, and a protected boot. Objects may be accessed via secure data storage, and data may be exchanged via secure communications in accordance with information stored in the hardware security model.
SPATIAL REUSE AND TRANSMIT OPPORTUNITY DURATION REPRESENTATION
Certain aspects of the present disclosure relate to providing a mechanism that may be used to flexibly and efficiently signal spatial reuse (SR) and/or transmit opportunity (TXOP) duration information.