Patent classifications
H04L67/34
Method and control unit for configuring an addon interface
A method and control unit for configuring an add-on interface of a vehicle are presented. The vehicle comprises at least one vehicle internal system, at least one add-on system, the add-on system being arranged in the vehicle after the vehicle is produced by a manufacturer, and at least one internal communication unit arranged for communication with at least one vehicle external communication unit. The method comprises: receiving, using the at least one internal communication unit, configuration information related to at least one sensor of the vehicle from the at least one vehicle external communication unit; and configuring, based on the configuration information, how at least one sensor signal S.sub.sensor from the at least one sensor is to be processed by an add-on interface, the add-on interface being arranged in the vehicle as an interface between the at least one vehicle internal system and the at least one add-on system.
Hybrid clouds
Systems and methods may create and manage hybrid clouds including both standard compute nodes and edge devices. Edge devices can be enrolled in a hybrid cloud by deploying a lightweight container to the edge device.
Provisioning network devices using a vendor-neutral platform
Network devices are provisioned using a single vendor-neutral data model with a non-relational database. Provisioning requirements are collected upon detecting a new network device that needs to be configured and/or installed. Based on the provisioning requirements, a configuration object is retrieved using a data model in the non-relational database. The configuration object is transformed to a concrete configuration file for the network device. After applying the configuration file to the network device, a separate process validates the configuration of the network device by comparing the observed network configuration with the initial target configuration data included in the configuration object.
Systems and methods for application scripts for cross-domain applications
Embodiments described include systems and methods for executing in an embedded browser an application script for network applications of different origins. A client application can establish a first session with a first network application of a first entity at a first origin via an embedded browser within the client application and a second session with a second network application of a second entity at a second origin via the embedded browser within the client application. A scripting engine within the client application of a client device of a user at a third origin can identify an application script having instructions to interact with the first network application and the second network application, and can execute the instructions to perform a task across the first network application of the first entity at the first origin and the second network application of the second entity at the second origin.
Edge computing system
A method of traffic reduction in a mesh computing system (400), the mesh computing system (400) comprising hosts located on edge nodes of the mesh computing system (400) and a central registry located outside the mesh computing system (400), the central registry holding the images. The method comprises, at a first host located at a first edge node, receiving (920) a request from a client for an image, sending (930) a request for the image to at least one other host of the mesh computing system (400). When the first host receives (940) notification that at least a second host holds the image, the first host downloads (960) the image from the second host to the first host. The first host creates (970) a container from the image. A host at a node (636; 700) and a mesh computing system (400) are also provided.
Automated honeypot creation within a network
Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.
Set top box having downloaded extender service agent to provide enhanced Wi-Fi coverage
A set top box (STB) providing enhanced Wi-Fi coverage. The STB downloads and configures an extender service agent for implementing extender capability at the STB. pairing the extender service agent with a router, and providing extended wireless IP connectivity using a fronthaul connection via the antenna to clients in range of IP signals radiated by the antenna. When the STB uses a wired backhaul connection all of an available bandwidth is used for the fronthaul connection, and when a wireless backhaul connection is used, the available bandwidth is split between the backhaul connection and the fronthaul connection.
Maintaining a cached version of a file at a router device
A router device may receive, from a user device, a request for access to a file. The router device may determine that a cached version of the file is stored in a first data structure associated with the router device. The router device may communicate with a server device to determine whether the cached version of the file is current. The server device may be associated with a second data structure that stores a master version of the file. The router device may generate a copy of the cached version of the file based on communicating with the server device. The router device may send the copy of the cached version of the file to the user device.
Peer-level control of industrial automation system components
Embodiments of this present disclosure may include a system that includes a first network device. The first network device may perform an operation according to a device configuration file. The system may also include a second network device that directly communicatively couples to the first network device through a peer-to-peer (P-P) communication network. The second network device may include a backup file of the device configuration file. The second network device may transmit the backup file of the device configuration file to the first network device in response to detecting that the first network device is lacking the device configuration file.
Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
Disclosed herein are embodiments of methods, devices and systems for device fingerprinting and automatic and dynamic software deployment to one or more endpoints on a computer network. The device fingerprinting systems and devices herein are configured to operate with limited data without sitting between network devices and the internet, without monitoring all network traffic, and without limited or no active scanning. The embodiments herein may passively collect information as distributed peers and may perform very limited active scans. In some embodiments, the information is used as an input to a custom hierarchical learning model to fingerprint devices on a network by identifying attributes of the devices such as the operating system family, operating system version, and device role. In some embodiments, a dynamic deployer selection process may be utilized to simply and efficiently deploy software. Some embodiments herein involve end-to-end encryption of credentials in a deployment process.