Abstract:
A first salient idea is to keep the traffic flowing though the migrating stateful function, without freezing any connection as the traffic is steered, and to process the data traffic by the first instance as the migration is ongoing when the data traffic corresponds to an existing state and does not require any state update. A second salient idea is to forward the data traffic received by the first instance to the second instance when the data traffic corresponds to a new state created or an existing state updated by the first instance as the migration is ongoing. The first instance will process the traffic with or without forwarding to the second instance as long as it receives any data traffic. The migration terminates when the first instance no longer receives any data traffic. The data traffic, forwarded by the first instance to the second instance, is forwarded together with a metadata describing the new state creation or the existing state update, allowing the second instance to process both the data traffic resulting from a traffic steered from to the second instance and the traffic still buffered by the first instance after the migration started, resulting in a data loss less migration. Processing the data traffic by the first instance for existing states without forwarding to the second instance and forwarding the data traffic from the first instance to the second instance along with a metadata allows to keep a high level of performance of the stateful function by maintaining the data processing by the first instance while the second instance is starting, and to avoid any data loss during the migration by forwarding the data traffic received and processed, after the migration started, by the first instance, along with the metadata for any new state to the second instance.
Abstract:
Network equipment (100) configured to operate a plurality of network functions (111) and to receive data packets from at least one device (10), wherein the network equipment (100) comprises at least one classifier (112, 113) configured to receive a data packet from one device (10) and to modify, before processing by at least one network function (111), said data packet by adding an additional header comprising at least one offset field and one data field for listing at least one identifier, each identifier identifying one of the network functions (111).
Abstract:
The invention relates to a method for securely accessing a web service by a browser running a web application on a user device through a network, wherein the web service is hosted by a local device. The method is remarkable in that the local device comprises a global name that uniquely identifies the local device and a certificate associated to its global name and in that the method further comprises a step of sending by the web application to the network a request for accessing a generic name addressing the web service; a step of receiving from the network to the web application a response to the request comprising the global name identifying the local device hosting the web service; a step of verifying by the web application that the received global name is comprised in a list, called white list, wherein the white list comprises global names of local devices being trusted for hosting the web service; and when the verification is successful, a step of sending by the web application to the network a request for securely accessing the global name addressing the web service authenticated by the certificate, the certificate being checked by the browser during the connection.
Abstract:
A device (220, 230) stores a main password and at least one temporary password for client authentication. In one embodiment, directed to Wi-Fi, the device is an access point (220) that begins a device insertion protocol without knowing which password the user input. The access point (220) generates (S318) PMKs for the passwords it stores and then generates (S320) from the PMKs PTKs that are used to verify (S322) a MIC1 received from the client (210). The PTK that checks the MIC1 is then used to generate (S324) a GTK and a MIC2 that are sent (S326) to the client (210). A similar solution is provided for password-based WPA2 Enterprise. The solutions enable ordinary users to use the main password and a guest to use a temporary password, for example valid for a specific day only, without giving any information about the main password to the guest.
Abstract:
A system and method for generating multiple images with rich color acquisition using a plenoptic camera having a main lens disposed in front of a micro array of lenses, a mosaic color filter array and an image sensor, characterized in that it comprises: capturing a first set of images using an ordinary state of an electrically controllable birefringent medium being disposed between said main lens and said micro array of lenses, said ordinary state providing an ordinary ray to each pixel; capturing a second set of images using an extraordinary state of said electrically controllable birefringent medium, said extraordinary state splitting the light from said main lens into an ordinary ray and a extraordinary ray respectively impinging on two adjacent pixels of different colors, said extraordinary ray being shifted by distance of one pixel on said image sensor; performing a weighted subtraction of information about said second set of images from information about said first set of images; and generating a final set of images with rich color information from said weighted subtraction and said first set of images.
Abstract:
The present invention relates to a reliable method and device for transfer of data from a first network to a second network. The method and device of the present invention can for example be used for a transfer of voluminous backup data over a link with limited bandwidth.
Abstract:
A network system and a method for checking plausibility of value returned by a device in the network system are provided. The network system comprises a plurality of devices. The method for checking plausibility of value returned by a device comprises: computing, by the device, a first hash address in a distributed hash table based on network addressing information and a current output value of the device; determining, by the device, a plurality of current neighbors in the distributed hash table; advertizing, by the device, the current output value of the device and a previous output value of the device to the determined plurality of current neighbors; and checking, by each of the determined plurality of current neighbors, the plausibility of value returned by the device.
Abstract:
The invention relates to a device and method for online storage, to a device and method for searching for similar content, to a transmission device and method, and to a receiving device and method. Encrypted data is recorded at an online service provider. With the encrypted data, encrypted hashing data is recorded with a public key, and the content to be recorded with the encrypted hashing is encrypted, thus making it possible to advantageously prevent data duplication at the online service provider while maintaining the privacy of the users of the service. In order to search for similar content having multimedia reference data, marks are also recorded at the service provider. In order to limit the number of false positives returned, the mark can also contain a search mark and/or an encrypted selection mark.
Abstract:
A network equipment configured to operate a plurality of network functions (111) and to receive data packets from at least one device (10) at an input classifier (112), comprises one output classifier (112, 113) configured to perform: - receiving, after processing by one or several network functions (111) operated at the network equipment (100), a first data packet belonging to a data flow untracked yet by the output classifier (113), the first data packet comprising services chaining information and identification information of the untracked data flow; - obtaining, from the services chaining information of the first data packet, a reverse services path to be applied to a further data packet received in response to the first data packet and belonging to the untracked data flow; - storing the identification information of the untracked data flow along with the obtained reverse services path. Network equipment (100)
Abstract:
In one embodiment, it is proposed a method for storing input data on a set of DNA strands, said input data being represented in a numeral system. This method is remarkable in that it comprises: formatting said input data into a set of blocks of data, each block of data having a size inferior to a size of one DNA strand; applying a first encoding with an erasure code on said set of blocks of data, defining a first set of modified blocks of data, each modified block of data having a size inferior to a size of one DNA strand; applying a second encoding using an error correcting code on each modified block of data of said first set, defining a second set of modified blocks of data, each modified block having a size inferior to a size of one DNA strand; encoding each modified block of data of said second set into a nucleotides block sequence; generating a set of DNA strands, each DNA strand comprising a nucleotides block sequence obtained through said encoding.