Adaptive background in video conferencing

    公开(公告)号:US12224874B2

    公开(公告)日:2025-02-11

    申请号:US18467946

    申请日:2023-09-15

    Abstract: Methods are provided in which a collaboration server connects at least two participants via respective user devices to a collaboration session. The collaboration server further distributes, to the respective user devices, media stream data and one or more customized graphical items that are distinguishably displayed in the collaboration session. The one or more customized graphical items are displayed in a foreground or a background associated with a collaboration space of first participant of the at least two participants. The collaboration server further detects a selection, by one of the respective user devices, of a graphical item from the one or more customized graphical items displayed in the collaboration space and performs at least one action associated with the graphical item during the collaboration session based on detecting the selection of the graphical item.

    Reliable observability in control towers based on side-channel queries

    公开(公告)号:US12223463B2

    公开(公告)日:2025-02-11

    申请号:US17524909

    申请日:2021-11-12

    Abstract: In one embodiment, a control tower device obtains, first state information from sensing or reporting systems or devices at a particular location via a first communication channel. The control tower device makes, based on the first state information, an evaluation regarding the particular location using one or more digital twins representing one or more entities of the particular location. The control tower device obtains second state information from one or more trusted verifiers for the particular location via a second communication channel. The control tower device verifies, based on the second state information, the evaluation regarding the particular location.

    Fault isolation and recovery of CPU cores for failed secondary asymmetric multiprocessing instance

    公开(公告)号:US12222830B2

    公开(公告)日:2025-02-11

    申请号:US18539996

    申请日:2023-12-14

    Abstract: According to certain embodiments, a system includes one or more processors and one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including executing a software process of a secondary instance, the secondary instance running in parallel with a primary instance and associated with a plurality of cores including a bootstrap core, registering a non-maskable interrupt for the bootstrap core in the secondary instance, determining whether the secondary instance is in a fault state, wherein, if the secondary instance is in the fault state, halting the plurality of cores associated with the secondary instance, without impact to the primary instance, and recovering the bootstrap core by switching a context of the bootstrap core from the secondary instance to the primary instance via the non-maskable interrupt.

    System and Method for Achieving Zero Packet Loss in Wireless Roaming

    公开(公告)号:US20250048177A1

    公开(公告)日:2025-02-06

    申请号:US18365451

    申请日:2023-08-04

    Abstract: In one embodiment, a method for achieving zero packet loss in wireless roaming is implemented by a processor of a wireless client device in a system. The wireless client device establishes a first data plane in association with a first radio connected to a first access point and a second data plane in association with a second radio. The first data plane is different from and operates concurrently with the second data plane. The wireless client device determines a second access point by scanning a plurality of operating channels using the second radio. The wireless client device synchronizes the second data plane with a network controller to connect the second radio with the second data plane to the second access point. The wireless client device switches traffic of the first data plane connected to the first access point to the second data plane connected to the second access point.

    Opportunistic Client Locating For Fast Edge Server Association

    公开(公告)号:US20250047740A1

    公开(公告)日:2025-02-06

    申请号:US18794211

    申请日:2024-08-05

    Abstract: The present disclosure describes systems and methods for associating a client device with an edge server. The method includes receiving by each of a plurality of cloud servers a signal from a client device requesting a resource provided by the plurality of cloud servers. Each of the cloud servers then calculates a distance between each cloud server and the client device, and an approximate location of the client device may be determined based on the calculated distance and the known location of the cloud servers. Using the approximate location of the client device, at least one of a plurality of edge servers that are located within a predetermined distance of the client device is identified by the cloud server, and the cloud server or client device may choose one of the identified edge servers through which the client device may be associated to communicate with the cloud server.

    Shared Risk Assessment and Clustering for Industrial IOT Applications

    公开(公告)号:US20250047682A1

    公开(公告)日:2025-02-06

    申请号:US18364600

    申请日:2023-08-03

    Abstract: In one embodiment, a method may access a plurality of Industrial Internet of Things (IIoT) devices within a network. The method may determine a shared risk model associated with the plurality of IIoT devices within the network. The method may determine, using the shared risk model, a shared risk value for each of the plurality of IIoT devices within the network. The method may determine, using the shared risk model, a plurality of associated clusters of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network. The method may determine an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network.

    IDENTIFYING SWITCHING PATHS FOR PORTS OF CROSSPOINT SWITCH

    公开(公告)号:US20250047620A1

    公开(公告)日:2025-02-06

    申请号:US18365640

    申请日:2023-08-04

    Abstract: A method includes identifying a switching path for source ports and destination ports of a crosspoint based switch including a two-tiered spine-and-leaf architecture. The method includes determining whether a switching path for a connection between a source port and a destination port is available, and identifying whether the source port and the destination port are associated with a same leaf. In response to determining that the switching path is available, the method includes executing a connection between the source port and the destination port utilizing a switching path on the same leaf. In response to determining that the switching path is unavailable, the method includes identifying whether free connections are available between a source leaf and a spine and a destination leaf and the spine. When the free connections are unavailable, the switching path for the connection between the source port and the destination port is executable by rewiring.

    COMPUTING SUSTAINABILITY GAINS FOR EQUIPMENT INFRASTRUCTURE

    公开(公告)号:US20250045769A1

    公开(公告)日:2025-02-06

    申请号:US18362102

    申请日:2023-07-31

    Abstract: A method comprises: storing vendor device information that maps vendor devices to replacement devices and replacement energies; storing energy provider information that maps unit energy costs to geolocations; obtaining, from a deployed number of units of a device, telemetry records that indicate an energy consumed by, and a geolocation of, the deployed number of units, and information defining an operational configuration of the device; identifying, in the vendor device information, a replacement device and a replacement energy consumed by the replacement device; computing sustainability gains using a replacement number of units of the replacement device in place of the deployed number of units of the device based on the energy consumed, the replacement energy consumed, and the geolocation; determining a change to the operational configuration, and commanding the device to implement the change; and reporting the sustainability gains and the change to the operational configuration.

    POST-QUANTUM RISK ANALYSIS USING CIPHER SUITE DEPENDENCY GRAPHS AND RISK SCORING USING CALL PATHS

    公开(公告)号:US20250045422A1

    公开(公告)日:2025-02-06

    申请号:US18365358

    申请日:2023-08-04

    Abstract: A method to identify and remediate unsafe cipher suite deployments. The method includes identifying a target to be analyzed, determining a collection of cipher suites used by the target, generating and displaying a cipher suite dependency graph for the target based on the collection of cipher suites, and classifying the target as being one of post-quantum computing safe and post-quantum computing unsafe based on the cipher suite dependency graph and based on a predetermined rule for each cipher suite in the collection of cipher suites. A cipher suite hosted by a target can be remediated to convert the target to a post-quantum computing safe state.

Patent Agency Ranking