Open Access. Powered by Scholars. Published by Universities.®
Articles 1081 - 1097 of 1097
Full-Text Articles in Entire DC Network
Node And Service Discovery In Wireless Local Area Network Controller Cluster Architectures Using Hyperledger, Niranjan M. M, Nagaraj Kenchaiah, Vijay Kothamasu, Ramachandra Murthy
Node And Service Discovery In Wireless Local Area Network Controller Cluster Architectures Using Hyperledger, Niranjan M. M, Nagaraj Kenchaiah, Vijay Kothamasu, Ramachandra Murthy
Defensive Publications Series
In the wireless cluster deployments, node discovery is a challenge. Further, it can be more challenging to discover the services running in such deployments. There are existing methods which use "client side discovery" and "server side discovery" that need a centralized "Service Registry" to maintain all available service instances. Presented herein are techniques that provide for the utilization of a private blockchain and HyperLedger in order to discover nodes and their services in wireless cluster deployments. Techniques of this proposal may provide for de‑centralizing node and service discovery in wireless cluster deployments without compromising authentication and security aspects. In one …
Trustworthiness Among Controllers And Switches In Multi-Provider Software Defined Network Deployments Using A Trusted Platform Module (Tpm) And Secure Ledger, Niranjan M. M, Nagaraj Kenchaiah
Trustworthiness Among Controllers And Switches In Multi-Provider Software Defined Network Deployments Using A Trusted Platform Module (Tpm) And Secure Ledger, Niranjan M. M, Nagaraj Kenchaiah
Defensive Publications Series
The OpenFlow® protocol especially OpenFlow® Discovery Protocol (OFDP) utilizes clear text Link Layer Discovery Protocol (LLDP) message exchanges to discover network topology. Such exchanges lack security and may lead to network attacks such as LLDP flooding, link fabrication, etc. Currently, the OpenFlow® protocol both in the case of discovery (OFDP) as well during subsequent communication between a controller and a switch (even with Transport Layer Security (TLS)) does not offer a way to understand whether or not a discovered controller or switch is a trustworthy device. Presented herein are techniques that provide Trusted Platform Module (TPM) and blockchain-based trust establishment …
Secure And Efficient Method To Distribute Configurations In Wireless Cluster Deployments Using Hyper Ledger, Niranjan M. M, Nagaraj Kenchaiah
Secure And Efficient Method To Distribute Configurations In Wireless Cluster Deployments Using Hyper Ledger, Niranjan M. M, Nagaraj Kenchaiah
Defensive Publications Series
An enterprise wireless clustering deployment is comprises of cluster of Wireless Local Area Network (LAN) Controllers (WLCs), intended to provide collaborative services such as load balancing of Access Points (APs), distributed mDNS gateway, etc. Since these cluster deployments are typically very large, configuring individual WLCs is difficult. Presented herein are techniques to incorporate WLC cluster deployments with an authenticated distributed ledger to securely store the configuration and subsequent changes (e.g., only maintain changes from the previous one, using dictionary method: key-value pair to identify the difference). This avoids the use of control Datagram Transport Layer Security (DTLS) connection between AP …
Dynamic And Customer Tailored Consumable Life Projection Messaging, Hp Inc
Dynamic And Customer Tailored Consumable Life Projection Messaging, Hp Inc
Defensive Publications Series
A technique calculates, based on a customer's own typical printing profile, the
approximate number of remaining pages that can be printed using the current remaining
level of individual consumables in the printer, informs the customer when replenishment
is needed, and enables the customer to reorder consumables more cost-effectively.
Customized Printed Handouts For Sales Prospects, Hp Inc
Customized Printed Handouts For Sales Prospects, Hp Inc
Defensive Publications Series
A system captures an image of a prospective customer, records it with related
image in a CRM database, generates content of value to the customer, and prints a
handout for the customer that includes the valued content.
Offline Cable Detection Method, Hp Inc
Offline Cable Detection Method, Hp Inc
Defensive Publications Series
A printer's cable detect information can be read through an external interface,
even when the printer itself is not powered on.
Communication Bus For Embedded Sensor Systems, Hp Inc
Communication Bus For Embedded Sensor Systems, Hp Inc
Defensive Publications Series
A communications bus using features of both I2C and SPI topologies enables
communications between a master and multiple slaves at high data rates over a span of
several feet.
Hardware Security-Based Data Content Protection, Hp Inc
Hardware Security-Based Data Content Protection, Hp Inc
Defensive Publications Series
The method described here, uses a hardware‐based handshaking and
hardware bound policies executed in computing devices, to geo‐fence
contents being viewed in computers.
Pcle Gen4 And Pcle Gen3/Sata Devices Switching Scheme, Hp Inc
Pcle Gen4 And Pcle Gen3/Sata Devices Switching Scheme, Hp Inc
Defensive Publications Series
Disclosed is a way to support PCIe NVMe Gen4 SSD Devices in addition to maintaining support for
PCIe NVMe Gen3 SSD’s and SATA and Hybrid drives like H10. Chipsets are being architected to
support PCIe Gen4 interface in the CPU for higher bandwidth devices such as graphics and high
speed SSDs. However, the I/O controller in the chipset maintains support for PCIe Gen3/SATA and
stops short of supporting PCIe Gen4 devices.
Using Build-In Mic To Detect Airplane Mode By Hearing Background Noise, Hp Inc
Using Build-In Mic To Detect Airplane Mode By Hearing Background Noise, Hp Inc
Defensive Publications Series
A mobile device such as notebook need to modify its operation in airplane, at least turning off wireless
transmitter. Other operational changes include reduce significantly battery charging rate if AC is
available. That is due to airplane’s limited power capability while airborne.
The current airplane mode is handled manually. The write‐up described to use build‐in mic‐phone for
airplane mode detection. By listening to unique background character inside airplane cabin during
airborne, the notebook device with its build‐in mic can detect airline mode, then adjust device operation
automatically.
Insult Detection And Filtering, Christina Abboud, Jyrki Alakuijala
Insult Detection And Filtering, Christina Abboud, Jyrki Alakuijala
Defensive Publications Series
Website publishers, search engines, social media service providers, and other online entities need to comply with regulation that requires removal of content that is deemed to be insulting to an individual. This disclosure describes techniques to match and remove text that is similar to insult strings that mandated for removal. One-way hashes of insult strings are used to enable removal of insulting content without exposing the name of the subject of the insult string. Name canonicalization is performed and a semantic fingerprint is obtained using a one-way function.
Browser With Smart Search In Page Button, Benjamin Azose, Kathleen Brennan, Phd
Browser With Smart Search In Page Button, Benjamin Azose, Kathleen Brennan, Phd
Defensive Publications Series
Web browsers offer find in page functionality to search for a phrase within the content of a webpage. However, this requires the user to access the menu option and type the phrase which is a cumbersome process on smartphones or other devices with small screens and/or limited input capabilities. Per techniques of this disclosure, a readily accessible option, e.g., a displayed button, corresponding to a likely search phrase is provided as part of the browser user interface, thus simplifying the search process. When the user permits, the likely search phrase is determined based on prior searches by the user.
Prefabricated Dome Building With Large Panoramic Windows. Dome Structure Made Of Prefabricated Reinforced Polyurethane Segments. Large Panoramic Windows Made Of Acrylic., Paul Terras
Defensive Publications Series
Prefabricated dome building with large panoramic windows.
Dome structure made of prefabricated reinforced polyurethane segments.
Large panoramic windows made of acrylic.
1. Dome house constructed of prefabricated reinforced polyurethane segments.
10, 12 or 14 prefabricated reinforced polyurethane segments are used to build a compleat dome house. Segments are reinforced with either steel, or composite bars. Reinforcement extensions are designed to be used for segments interconnection, and mounting the segments to the foundation or base. Interconnected rebars are forming stable structure.
Male-female joints are used to connect the segments. Segments are glued together and sealed. One or several segments can be …
Optimized Simultaneous Authentication Of Equals (Sae) Identity Pre-Shared Key (Ipsk), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, Mansi Jain
Optimized Simultaneous Authentication Of Equals (Sae) Identity Pre-Shared Key (Ipsk), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, Mansi Jain
Defensive Publications Series
Presented here are techniques for the residential deployment of common Wi-Fi® services with an optimized Simultaneous Authentication of Equals (SAE) Identity Pre-Shared Key (iPSK) flow. The techniques presented herein avoid the use of an Authentication, Authorization, and Accounting (AAA) server for clients whose entries are absent through the upfront use of bloom filter information provided by an AAA server. The techniques presented herein can also be used for Wi-Fi Protected Access II (WPA2) iPSK optimization or SAE (Wi-Fi® Protected Access 3 (WPA3) personal), which has more latency sensitive call flow due to SAE auth commit timeouts consideration.
Machine Learning Assisted Quick Eyescan (Mlaqe) For Signal Integrity Check, Jim Xu, Sreenivasa Rao Bandlamudi, Ankit Sood, Vinit Bansal, Ravi Eda, Arun Singh
Machine Learning Assisted Quick Eyescan (Mlaqe) For Signal Integrity Check, Jim Xu, Sreenivasa Rao Bandlamudi, Ankit Sood, Vinit Bansal, Ravi Eda, Arun Singh
Defensive Publications Series
Presented herein is a quick scan method for signal integrity checks through sampling of four points under certain thermal condition. The techniques presented herein use a machine learning trained model to ensure signal integrity check fidelity.
Directing Users To An Available Parking Spot At An Optimal Location Near The Destination, Adalberto Foresti
Directing Users To An Available Parking Spot At An Optimal Location Near The Destination, Adalberto Foresti
Defensive Publications Series
High demand for parking generated by the large numbers of people simultaneously looking for parking within the same area often makes it tedious and difficult to find a parking spot, leading to delays and frustration. Individual drivers typically attempt to find a parking spot closest to an event venue. Finding a parking spot via such an approach requires luck and timing. Many drivers tend to overestimate their luck, thus adding to congestion and wasting more time in the process of finding a parking space. To address these issues, this disclosure describes techniques that use real-time information on available parking spaces …
Segment Routing Policies With Built-In Resiliency, Clarence Filsfils, Zafar Ali, Swadesh Agrawal, Francois Clad, Jose Liste, Jiri Chaloupka
Segment Routing Policies With Built-In Resiliency, Clarence Filsfils, Zafar Ali, Swadesh Agrawal, Francois Clad, Jose Liste, Jiri Chaloupka
Defensive Publications Series
Techniques are described herein to establish hierarchical Segment Routing (SR) policies with built-in resiliency. These techniques increase the scalability of the SR Path Computation Element (PCE) and SR network. Specifically, once such policies are installed by the SR PCE, the SR PCE does not have to take any action in the event of failure. This is an improvement over current approaches, which employ the SR head-end node as a single point of failure.