H04L69/24

DETECTION OF SIGNALS IN A VIRTUAL MEETING

A method, a system, and a computer program product for determining whether signals are received by one or more devices in a virtual meeting. The method includes transmitting a data stream received from one or more host computing devices to one or more user computing devices in a plurality of user computing devices. The host and user computing devices are communicatively coupled using a real-time online connection. A first hash in a plurality of hashes is generated by the server using a portion of the data stream and stored in a memory location. The first hash is compared to a second hash received from the user computing devices. The second hash is generated by the user computing devices upon receipt of the transmitted data stream. Based on the comparison, a status of the real-time online connection between the host computing devices and the user computing devices is determined.

INFORMATION PROCESSING METHOD BASED ON ELECTRONIC DEVICE INTERACTION, AND ELECTRONIC DEVICE
20230046997 · 2023-02-16 ·

An information processing method includes, in a situation that a connection between a first electronic device and a second electronic device is established for first time, obtaining identity information of the second electronic device; obtaining a communication protocol corresponding to the identity information; and based on a data path formed after the first electronic device is connected to the second electronic device, sending the communication protocol to the second electronic device, to enable the second electronic device to communicate with the first electronic device based on the communication protocol.

Payload recording and comparison techniques for discovery

Persistent storage may contain an input discovery payload that contains entries representing configuration items and relationships therebetween, wherein the configuration items contain attributes defining devices, components, or applications on a network. One or more processors may be configured to: provide, for display, a graphical user interface containing a representation of the input discovery payload and a button; provide the input discovery payload to an identification and reconciliation engine (IRE) software application; receive, from the IRE software application, an output discovery payload that includes a log generated from execution of the IRE software application on the input discovery payload, wherein the log indicates, for the configuration items and the relationships in the input discovery payload, how a configuration management database (CMDB) would be updated by the IRE software application; and provide, for display, a further graphical user interface containing a further representation of the output discovery payload.

Payload recording and comparison techniques for discovery

Persistent storage may contain an input discovery payload that contains entries representing configuration items and relationships therebetween, wherein the configuration items contain attributes defining devices, components, or applications on a network. One or more processors may be configured to: provide, for display, a graphical user interface containing a representation of the input discovery payload and a button; provide the input discovery payload to an identification and reconciliation engine (IRE) software application; receive, from the IRE software application, an output discovery payload that includes a log generated from execution of the IRE software application on the input discovery payload, wherein the log indicates, for the configuration items and the relationships in the input discovery payload, how a configuration management database (CMDB) would be updated by the IRE software application; and provide, for display, a further graphical user interface containing a further representation of the output discovery payload.

Multiplexing and congestion control
11582184 · 2023-02-14 · ·

Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.

Multiplexing and congestion control
11582184 · 2023-02-14 · ·

Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.

Technologies for scalable capability detection for multimedia casting
11582270 · 2023-02-14 ·

Technologies for casting digital media content include a source computing device communicatively coupled to a destination computing device. The source computing device is configured to transmit a set of identifiers of the source computing device to the destination computing device and receive a set of identifiers of the destination computing device from the destination computing device. Each set of identifiers includes a version (e.g., hardware or software) associated with the respective computing device and a unique identifier of the respective computing device. The source computing device is additionally configured to determine a subset of casting session parameters from a set of casting session parameters based on the one or more capabilities of the destination computing device which are usable by the destination computing device to establish a casting session and stream digital media content in accordance with the subset of casting session parameters. Other embodiments are described and claimed.

Technologies for scalable capability detection for multimedia casting
11582270 · 2023-02-14 ·

Technologies for casting digital media content include a source computing device communicatively coupled to a destination computing device. The source computing device is configured to transmit a set of identifiers of the source computing device to the destination computing device and receive a set of identifiers of the destination computing device from the destination computing device. Each set of identifiers includes a version (e.g., hardware or software) associated with the respective computing device and a unique identifier of the respective computing device. The source computing device is additionally configured to determine a subset of casting session parameters from a set of casting session parameters based on the one or more capabilities of the destination computing device which are usable by the destination computing device to establish a casting session and stream digital media content in accordance with the subset of casting session parameters. Other embodiments are described and claimed.

Position parameterized recursive network architecture with topological addressing
11582185 · 2023-02-14 · ·

A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.

Position parameterized recursive network architecture with topological addressing
11582185 · 2023-02-14 · ·

A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.