Patent classifications
H04L101/622
Electronic asset location identification and tracking system with receiver clustering
A system and method for determining the presence of an asset or person at a particular spot within a location. The asset or person is provided with a beacon transmitting a beacon signal. A plurality of receivers are disposed throughout the location. In one embodiment, two or more adjacent or nearby receivers are grouped together to define a receiver cluster. The receiver cluster having the highest average signal strength from the signal being transmitted from the beacon of the asset or person as determined by an electronic identification and location tracking system determines the particular area within the location where the asset or person is present at.
Method for displaying electronic price tag, server and storage medium
An electronic price tag display method and an electronic price tag display system, a server and a computer readable storage medium. The method is applied to the server, and includes: obtaining basic information of data to be displayed in an image; converting the basic information into bitmap data; and delivering the bitmap data to an electronic price tag in order that the electronic price tag displays the content of the data to be displayed. By implementing the method, the process of manually editing bitmap data by the user is abandoned, the manpower resource and the time cost are saved, the efficiency of display control of the electronic price tag is improved, and the condition that the editing result is affected by human operation error is avoided simultaneously.
Distributed storage system and method of reusing symmetric keys for encrypted message transmissions
Distributed storage system and method for transmitting storage-related messages between host computers in a distributed storage system uses a handshake operation of a first-type communication connection between a source data transport daemon of a source host computer and a target data transport daemon of a target host computer to derive a symmetric key at each of the source and target data transport daemons. The two symmetric keys are sent to a source data transport manager of the source host computer and to a target data transport manager of the target host computer. The source and target data transport managers then use the same symmetric keys to encrypt and decrypt storage-related messages that are transmitted from the source data transport manager to the target data transport manager through multiple second-type communication connections between the source and target data transport managers.
Systems and methods of detecting malicious powershell scripts
Disclosed herein are systems and methods of executing scanning software, such an executable software program or script (e.g., PowerShell script), by a computing device of an enterprise, such as a security server, may instruct the computing device to search all or a subset of computing devices in an enterprise network. The scanning software may identify PowerShell scripts containing particular malware attributes, according to a malicious-code dataset. The computing system executing the scanning software may scan through the identified PowerShell scripts to identify particular strings, values, or code-portions, and take a remedial action according to the scanning software programming.
Group voice communication of walkie-talkie mode in Bluetooth communication system
A voice communication method between two or more wearable electronic devices via Bluetooth communication includes: providing the two or more wearable electronic devices paired with a mobile phone device; determining whether a distance between the two or more wearable electronic devices is larger than a distance threshold; controlling a wearable electronic device to enter a walkie-talkie mode to start a walkie-talkie conversation with one or more other wearable electronic devices when the distance is larger than the distance threshold; and during the walkie-talkie mode using the such wearable electronic device to send voice data from the wearable electronic device to one or more other wearable electronic devices to make the other wearable electronic device(s) to receive and play the voice data in the walkie-talkie mode for different user(s).
Multi-customer (multi-tenants) support with hypervisor based bond implementation
Systems and methods for transparent high availability for multi-customer support with hypervisor based bond implementation. The method can include creating a network path bond between a plurality of compute instances and a plurality of Network Virtualization Devices (“NVD”), the network path bond comprising a plurality of network paths, identifying a monitoring bond coupling the plurality of NVDs to a monitoring agent, creating a number of monitoring VNICs, each of the number of monitoring VNICs residing in one of the plurality of NVDs, overlaying a unique IP address to each of the monitoring VNICs, determining with the monitoring agent a health of at least one of network paths, the network paths including an active network path and an inactive network path, and activating the inactive network path when the active network path fails.
Positioning with relays
Methods, systems, and devices for wireless communications are described. A position of a user equipment (UE) may be determined when communications between the UE and a base station are routed through a relay node. For example, the UE 115 may determine whether communications are received from the base station or the relay node based on positioning assistance data that contains positioning-related information about different base stations and relay nodes in the system. The UE may then transmit a position metric based on this determination, where a location server uses this position metric for determining the location of the UE. Additionally or alternatively, the location server or base station may use the positioning assistance data to determine whether an uplink transmission is received directly from the UE or via the relay node and may generate a position metric that the location server uses for determining the location of the UE.
Endpoint security mechanism to detect IP theft on a virtual machine mobility in switch fabric
Methods to secure against IP address thefts by rogue devices in a virtualized datacenter are provided. Rogue devices are detected and distinguished from a migration of an endpoint in a virtualized datacenter. A first hop network element in a one or more network fabrics intercepts a request that includes an identity of an endpoint and performs a local lookup for the endpoint entity identifier. Based on the lookup not finding the endpoint entity identifier, the first hop network element broadcasts a message such as a remote media access address (MAC) query to other network elements in the one or more network fabrics. Based on the received response, which may include an IP address associated with the MAC address, the first hop network element performs a theft validation process to determine whether the request originated from a migrated endpoint or a rogue device.
Layer-2 networking storm control in a virtualized cloud environment
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Storm control information applicable to the L2 port is sent to a network virtualization device that hosts the L2 virtual network interface.
Assigning security group tag for infrastructure traffic and preserving security group tag in snooped packets in dynamic segmentation
The system determines a first source MAC associated with a switch. The system updates a MAC address table by mapping the first source MAC to a first tag which indicates a source role corresponding to a network infrastructure. A processor associated with the switch generates a first packet which indicates the first source MAC. The system performs a first search in the MAC address table based on the indicated first source MAC to obtain the first tag, and performs a second search in a policy table based on the first tag for a policy which indicates an action to be applied to the first packet. If the second search is not successful, the system modifies a header of the first packet by adding the first tag. If the second search is successful, the system determines that the indicated action comprises allowing the first packet and transmits the first packet.