-
公开(公告)号:US20210112456A1
公开(公告)日:2021-04-15
申请号:US17131407
申请日:2020-12-22
申请人: Satish Chandra Jha , S M Iftekharul Alam , Ned M. Smith , Vesh Raj Sharma Banjade , Xiaoyun May Wu , Ignacio Javier Alvarez Martinez , Arvind Merwaday
发明人: Satish Chandra Jha , S M Iftekharul Alam , Ned M. Smith , Vesh Raj Sharma Banjade , Xiaoyun May Wu , Ignacio Javier Alvarez Martinez , Arvind Merwaday
摘要: Various systems and methods for improving connectivity of a Mobility-as-a-Service (MaaS) node are described herein, including categorizing MaaS communication traffic of a MaaS node into different levels of priority and controlling duplication or repetition of the MaaS communication traffic using the categorized level of priority of the MaaS communication traffic.
-
公开(公告)号:US20210014203A1
公开(公告)日:2021-01-14
申请号:US17032391
申请日:2020-09-25
申请人: Kshitij Arun Doshi , Uzair Qureshi , Lokpraveen Mosur , Patrick Fleming , Stephen Doyle , Brian Andrew Keating , Ned M. Smith
发明人: Kshitij Arun Doshi , Uzair Qureshi , Lokpraveen Mosur , Patrick Fleming , Stephen Doyle , Brian Andrew Keating , Ned M. Smith
摘要: Methods, systems, and use cases for one-touch inline cryptographic data security are discussed, including an edge computing device with a network communications circuitry (NCC), an enhanced DMA engine coupled to a memory device and including a cryptographic engine, and processing circuitry configured to perform a secure exchange with a second edge computing device to negotiate a shared symmetric encryption key, based on a request for data. An inline encryption command for communication to the enhanced DMA engine is generated. The inline encryption command includes a first address associated with a storage location storing the data, a second address associated with a memory location in the memory device, and the shared symmetric encryption key. The data is retrieved from the storage location using the first address, the data is encrypted using the shared symmetric encryption key, and the encrypted data is stored in the memory location using the second address.
-
公开(公告)号:US20210006972A1
公开(公告)日:2021-01-07
申请号:US17025519
申请日:2020-09-18
摘要: Methods, systems, and use cases for geofence-based edge service control and authentication are discussed, including an orchestration system with memory and at least one processing circuitry coupled to the memory. The processing circuitry is configured to perform operations to obtain, from a plurality of connectivity nodes providing edge services, physical location information, and resource availability information associated with each of the plurality of connectivity nodes. An edge-to-edge location graph (ELG) is generated based on the physical location information and the resource availability information, the ELG indicating a subset of the plurality of connectivity nodes that are available for executing a plurality of services associated with an edge workload. The connectivity nodes are provisioned with the ELG and a workflow execution plan to execute the plurality of services, the workflow execution plan including metadata with a geofence policy. The geofence policy specifies geofence restrictions associated with each of the plurality of services.
-
公开(公告)号:US20200084202A1
公开(公告)日:2020-03-12
申请号:US16683410
申请日:2019-11-14
申请人: Ned M. Smith , John J. Browne , Kapil Sood , Francesc Guim Bernat , Kshitij Arun Doshi , Rajesh Poornachandran , Tarun Viswanathan , Manish Dave
发明人: Ned M. Smith , John J. Browne , Kapil Sood , Francesc Guim Bernat , Kshitij Arun Doshi , Rajesh Poornachandran , Tarun Viswanathan , Manish Dave
摘要: Various approaches for implementing attestation using an attestation token are described. In an edge computing system deployment, an edge computing device includes an attestable feature (e.g., resource, service, entity, property, etc.) which is accessible from use of an attestation token, by the operations of: obtaining a first instance of a token that provides proof of attestation for an accessible feature of the edge computing device, with the token including data to indicate trust level designations for the feature as attested by an attestation provider; receiving, from a prospective user of the feature, a request to use the feature and a second instance of the token, with the second instance of the token originating from the attestation provider; and providing access to the feature based on a verification of the instances of the token, by using the verification to confirm attestation of the trust level designations for the feature.
-
公开(公告)号:US20200076715A1
公开(公告)日:2020-03-05
申请号:US16369426
申请日:2019-03-29
IPC分类号: H04L12/26
摘要: Technologies for collecting metrics associated with a processing resource (e.g., central processing unit (CPU) resources, accelerator device resources, and the like) over a time window are disclosed. According to an embodiment presented herein, a network device receives, in an edge network, a request to provide one or more metrics associated with a processing resource, the request specifying a window indicative of a time period to capture the one or more metrics. The network device obtains the one or more metrics from the processing resource for the specified window and provides the obtained one or more metrics in response to the request.
-
公开(公告)号:US20200027022A1
公开(公告)日:2020-01-23
申请号:US16586593
申请日:2019-09-27
摘要: Systems and techniques for distributed machine learning (DML) in an information centric network (ICN) are described herein. Finite message exchanges, such as those used in many DML exercises, may be efficiently implemented by treating certain data packets as interest packets to reduce overall network overhead when performing the finite message exchange. Further, network efficiency in DML may be improved achieved by using local coordinating nodes to manage devices participating in a distributed machine learning exercise. Additionally, modifying a round of DML training to accommodate available participant devices, such as by using a group quality of service metric to select the devices, or extending the round execution parameters to include additional devices, may have an impact on DML performance.
-
公开(公告)号:US20190327134A1
公开(公告)日:2019-10-24
申请号:US16456443
申请日:2019-06-28
申请人: Satish Chandra Jha , S.M. Iftekharul Alam , Yi Zhang , Eve M. Schooler , Ned M. Smith , Kathiravetpillai Sivanesan , Venkatesan Nallampatti Ekambaram , Srikathyayani Srikanteswara , Kuilin Clark Chen , Zongrui Ding
发明人: Satish Chandra Jha , S.M. Iftekharul Alam , Yi Zhang , Eve M. Schooler , Ned M. Smith , Kathiravetpillai Sivanesan , Venkatesan Nallampatti Ekambaram , Srikathyayani Srikanteswara , Kuilin Clark Chen , Zongrui Ding
摘要: Systems and techniques for mission critical (MC) push notification mechanism in a high-reliability (HR) information centric network (ICN) are described herein. For example, a node may test network links to other nodes to classify the other nodes into proximate nodes and non-proximate nodes based on a reception metric. The node may then elect a set of leader nodes from the proximate nodes. Here, the set of leader nodes are selected based on link quality between respective leader nodes and non-proximate nodes. The node may detect an MC event and create an ICN data packet that contains data from the MC event. The node may then transmit the ICN data packet to the set of leader nodes that then relay the ICN data packet to the non-proximate nodes.
-
公开(公告)号:US20190319964A1
公开(公告)日:2019-10-17
申请号:US16455211
申请日:2019-06-27
申请人: Ned M. Smith , Srikathyayani Srikanteswara , Ravikumar Balakrishnan , Rajesh Poornachandran , Moreno Ambrosin
发明人: Ned M. Smith , Srikathyayani Srikanteswara , Ravikumar Balakrishnan , Rajesh Poornachandran , Moreno Ambrosin
摘要: Systems and techniques for information-centric network namespace policy-based content delivery are described herein. A registration request may be received from a node on an information-centric network (ICN). Credentials of the node may be validated. The node may be registered with the ICN based on results of the validation. A set of content items associated with the node may be registered with the ICN. An interest packet may be received from a consumer node for a content item of the set of content items that includes an interest packet security level for the content item. Compliance of the security level of the node with the interest packet security level may be determined. The content item may be transmitted to the consumer node.
-
公开(公告)号:US20190138908A1
公开(公告)日:2019-05-09
申请号:US16235100
申请日:2018-12-28
申请人: Francesc Guim Bernat , Ned M. Smith
发明人: Francesc Guim Bernat , Ned M. Smith
摘要: Various systems and methods of artificial intelligence (AI) processing using hardware acceleration within edge computing settings are described herein. In an example, processing performed at an edge computing device includes: obtaining a request for an AI operation using an AI model; identifying, based on the request, an AI hardware platform for execution of an instance of the AI model; and causing execution of the AI model instance using the AI hardware platform. Further operations to analyze input data, perform an inference operation with the AI model, and coordinate selection and operation of the hardware platform for execution of the AI model, is also described.
-
公开(公告)号:US20190042315A1
公开(公告)日:2019-02-07
申请号:US16145581
申请日:2018-09-28
摘要: System and techniques for secure edge-cloud function-as-a-service (FaaS) are described herein. A FaaS node may receive a request to execute a function. The FaaS node executes the function and enters a result of the function execution into a blockchain. Here, the blockchain is accessible to a plurality of FaaS architectural nodes.
-
-
-
-
-
-
-
-
-