Proactive M2M Framework Using Device-Level vCard for Inventory, Identity, and Network Management
    86.
    发明申请
    Proactive M2M Framework Using Device-Level vCard for Inventory, Identity, and Network Management 有权
    使用设备级vCard进行库存,身份认证和网络管理的主动式M2M框架

    公开(公告)号:US20140173073A1

    公开(公告)日:2014-06-19

    申请号:US13716519

    申请日:2012-12-17

    CPC classification number: H04L41/0266 H04L41/12 H04L61/1594

    Abstract: A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (NMS). Having the network address for the NMS, the network device may generate a vCard comprising the attributes necessary for registering with the NMS. The network device may then communicate the vCard to the NMS. The NMS may then be configured to identify, register, and add the network device to a directory.

    Abstract translation: 网络设备可以连接到启用智能的网络。 一旦连接,网络设备可以接收网络管理服务器(NMS)的网络地址。 具有NMS的网络地址,网络设备可以生成包括向NMS注册所必需的属性的vCard。 然后,网络设备可以将该VCard通信给NMS。 然后,NMS可以被配置为将网络设备识别,注册和添加到目录。

    Adaptive background in video conferencing

    公开(公告)号:US12224874B2

    公开(公告)日:2025-02-11

    申请号:US18467946

    申请日:2023-09-15

    Abstract: Methods are provided in which a collaboration server connects at least two participants via respective user devices to a collaboration session. The collaboration server further distributes, to the respective user devices, media stream data and one or more customized graphical items that are distinguishably displayed in the collaboration session. The one or more customized graphical items are displayed in a foreground or a background associated with a collaboration space of first participant of the at least two participants. The collaboration server further detects a selection, by one of the respective user devices, of a graphical item from the one or more customized graphical items displayed in the collaboration space and performs at least one action associated with the graphical item during the collaboration session based on detecting the selection of the graphical item.

    IoT fog as distributed machine learning structure search platform

    公开(公告)号:US11562176B2

    公开(公告)日:2023-01-24

    申请号:US16282781

    申请日:2019-02-22

    Abstract: Systems, methods, and computer-readable mediums for distributing machine learning model training to network edge devices, while centrally monitoring training of the models and controlling deployment of the models. A machine learning model architecture can be generated at a machine learning structure controller. The machine learning model architecture can be deployed to network edge devices in a network environment to instantiate and train a machine learning model at the network edge devices. Performance reports indicating performance of the machine learning model at the network edge devices can be received by the machine learning structure controller from the network edge devices. The machine learning structure controller can determine whether to deploy another machine learning model architecture to the network edge devices based on the performance reports and subsequently deploy the another architecture to the network edge devices if it is determined to deploy the architecture based on the performance reports.

    MANUFACTURER USAGE DESCRIPTION (MUD) EXTENSIONS FOR SECURE ACCESS SERVICE EDGE (SASE) SERVICES

    公开(公告)号:US20220360562A1

    公开(公告)日:2022-11-10

    申请号:US17308375

    申请日:2021-05-05

    Abstract: Techniques for associating manufacturer usage description (MUD) security profiles for Internet-of-Things (IoT) device(s) with secure access service edge (SASE) solutions, providing for automated and scalable integration of IoT devices with SASE frameworks. A MUD controller may utilize a MUD uniform resource identifier (URI) emitted by an IoT device to fetch an associated MUD file from a MUD file server associated with a manufacturer of the IoT device. The MUD controller may determine that a security recommendation included in the MUD file is to be implemented by a cloud-based security service provided by the SASE service and cause the IoT device to establish a connection with a secure internet gateway associated with the cloud-based security service. Additionally, or alternatively, the MUD file may include SASE extensions indicating manufacturer recommended cloud-based security services. Further, cloud-based security services may be implemented if local services are unavailable.

Patent Agency Ranking