UNIFYING INTERFACE FOR CLOUD CONTENT SHARING SERVICES

    公开(公告)号:US20210264045A1

    公开(公告)日:2021-08-26

    申请号:US17062391

    申请日:2020-10-02

    Abstract: Methods and systems that allow a user to see the people or groups who have access to files that are maintained by a plurality of cloud content sharing services. In particular, the user may see what specific party has access to each particular file or directory, regardless of multiple cloud content sharing services involved. Moreover, a user interface and exposed application program interface allows the user to manipulate the permissions, e.g., granting access, to another person or group, to a file or directory. The user interface may also allow the user to terminate access to the file or directory for a person or group. The user's action to change a permission may be effected independently of the particular cloud content sharing service.

    Scalable edge computing
    73.
    发明授权

    公开(公告)号:US10944689B2

    公开(公告)日:2021-03-09

    申请号:US16024465

    申请日:2018-06-29

    Abstract: There is disclosed in one example a communication apparatus, including: a telemetry interface; a management interface; and an edge gateway configured to: identify diverted traffic, wherein the diverted traffic includes traffic to be serviced by an edge microcloud configured to provide a plurality of services; receive telemetry via the telemetry interface; use the telemetry to anticipate a future per-service demand within the edge microcloud; compute a scale for a resource to meet the future per-service demand; and operate the management interface to instruct the edge microcloud to perform the scale before the future per-service demand occurs.

    SCALABLE EDGE COMPUTING
    75.
    发明申请

    公开(公告)号:US20200007460A1

    公开(公告)日:2020-01-02

    申请号:US16024465

    申请日:2018-06-29

    Abstract: There is disclosed in one example a communication apparatus, including: a telemetry interface; a management interface; and an edge gateway configured to: identify diverted traffic, wherein the diverted traffic includes traffic to be serviced by an edge microcloud configured to provide a plurality of services; receive telemetry via the telemetry interface; use the telemetry to anticipate a future per-service demand within the edge microcloud; compute a scale for a resource to meet the future per-service demand; and operate the management interface to instruct the edge microcloud to perform the scale before the future per-service demand occurs.

    Method for replicating data in a network and a network component

    公开(公告)号:US20190045005A1

    公开(公告)日:2019-02-07

    申请号:US15951211

    申请日:2018-04-12

    Abstract: A method for replicating data to one or more distributed network nodes of a network is proposed. A movement of a moving entity having associated data stored on a first node of the network is estimated. The moving entity is physically moving between nodes of the network. According to the method, at least a second node of the network depending on the estimated movement is chosen. The method contains replicating the associated data of the first node to the second node or a group of nodes and contains managing how data is stored at those nodes based on the moving entity.

    TECHNOLOGIES FOR CACHE SIDE CHANNEL ATTACK DETECTION AND MITIGATION

    公开(公告)号:US20190042739A1

    公开(公告)日:2019-02-07

    申请号:US16022976

    申请日:2018-06-29

    Abstract: Technologies for cache side channel attack detection and mitigation include an analytics server and one or more monitored computing devices. The analytics server polls each computing device for analytics counter data. The computing device generates the analytics counter data using a resource manager of a processor of the computing device. The analytics counter data may include last-level cache data or memory bandwidth data. The analytics server identifies suspicious core activity based on the analytics counter data and, if identified, deploys a detection process to the computing device. The computing device executes the detection process to identify suspicious application activity. If identified, the computing device may perform one or more corrective actions. Corrective actions include limiting resource usage by a suspicious process using the resource manager of the processor. The resource manager may limit cache occupancy or memory bandwidth used by the suspicious process. Other embodiments are described and claimed.

    PRE-VALIDATION OF A PLATFORM
    79.
    发明申请

    公开(公告)号:US20180357099A1

    公开(公告)日:2018-12-13

    申请号:US15617375

    申请日:2017-06-08

    CPC classification number: G06F9/5005 G06F9/45504 G06F9/4881

    Abstract: Particular embodiments described herein provide for a network element that can be configured to determine a pre-execution performance test, where the pre-execution performance test is at least partially based on requirements for a process to be executed, cause the pre-execution performance test to be executed on a platform before the process is executed on the platform, where the platform is a dynamically allocated group of resources, analyze results of the pre-execution performance test, and cause the process to be executed on the platform if the results of the pre-execution performance test satisfy a condition. In an example, the process is a virtual network function.

    ALLOWING VARIED DEVICE ACCESS BASED ON DIFFERENT LEVELS OF UNLOCKING MECHANISMS
    80.
    发明申请
    ALLOWING VARIED DEVICE ACCESS BASED ON DIFFERENT LEVELS OF UNLOCKING MECHANISMS 审中-公开
    基于不同层次的解锁机制允许变化的设备访问

    公开(公告)号:US20160080393A1

    公开(公告)日:2016-03-17

    申请号:US14951654

    申请日:2015-11-25

    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.

    Abstract translation: 系统和方法可以提供用于从设备的一个或多个解锁接口接收运行时间输入,并且基于运行时间输入从多个访问级别中选择关于设备的访问级别。 所选择的访问级别可以具有相关联的安全策略,其中可以基于相关联的安全策略来执行运行时输入的认证。 在一个示例中,如果认证成功,则使用一个或多个加密密钥来将设备关于所选择的访问级别放置在解锁状态。 如果认证不成功,另一方面,相对于所选择的访问级别,设备可以保持在锁定状态。

Patent Agency Ranking