-
公开(公告)号:US20210021594A1
公开(公告)日:2021-01-21
申请号:US17032696
申请日:2020-09-25
IPC分类号: H04L29/06
摘要: Various aspects of methods, systems, and use cases for biometric security for edge platform management. An edge cloud system to implement biometric security for edge platform management comprises a biometric sensor; and an edge node in an edge network, the edge node to: receive a request to access a feature of the edge node, the request originating from an entity, wherein the request comprises an entity identifier and a feature identifier; receive from the biometric sensor, biometric data of the entity; authenticate the entity using the biometric data; and in response to authenticating the entity using the biometric data, grant access to the feature based on a crosscheck to an access control list that includes entity identifiers correlated to feature identifiers, using the received entity identifier and the received feature identifier.
-
公开(公告)号:US20210021533A1
公开(公告)日:2021-01-21
申请号:US17033140
申请日:2020-09-25
申请人: Francesc Guim Bernat , Ned M. Smith , Kshitij Arun Doshi , Suraj Prabhakaran , Timothy Verrall , Kapil Sood , Tarun Viswanathan
发明人: Francesc Guim Bernat , Ned M. Smith , Kshitij Arun Doshi , Suraj Prabhakaran , Timothy Verrall , Kapil Sood , Tarun Viswanathan
IPC分类号: H04L12/841 , H04L12/911 , H04L12/933
摘要: Systems and techniques for intelligent data forwarding in edge networks are described herein. A request may be received from an edge user device for a service via a first endpoint. A time value may be calculated using a timestamp of the request. Motion characteristics may be determined for the edge user device using the time value. A response to the request may be transmitted to a second endpoint based on the motion characteristics.
-
公开(公告)号:US20190158300A1
公开(公告)日:2019-05-23
申请号:US16235894
申请日:2018-12-28
申请人: Dario Sabella , Ned M. Smith , Neal Oliver , Kshitij Arun Doshi , Suraj Prabhakaran , Miltiadis Filippou , Francesc Guim Bernat
发明人: Dario Sabella , Ned M. Smith , Neal Oliver , Kshitij Arun Doshi , Suraj Prabhakaran , Miltiadis Filippou , Francesc Guim Bernat
摘要: An architecture to allow Multi-Access Edge Computing (MEC) billing and charge tracking, is disclosed. In an example, a tracking process, such as is performed by an edge computing apparatus, includes: receiving a computational processing request for a service operated with computing resources of the edge computing apparatus from a connected edge device within the first access network, wherein the computational processing request includes an identification of the connected edge device; identifying a processing device, within the first access network, for performing the computational processing request; and storing the identification of the connected edge device, a processing device identification, and data describing the computational processes completed by the processing device in association with the computational processing request.
-
公开(公告)号:US20190141610A1
公开(公告)日:2019-05-09
申请号:US16235685
申请日:2018-12-28
申请人: Dario Sabella , Ned M. Smith , Neal Oliver , Kshitij Arun Doshi , Suraj Prabhakaran , Francesc Guim Bernat , Miltiadis Filippou
发明人: Dario Sabella , Ned M. Smith , Neal Oliver , Kshitij Arun Doshi , Suraj Prabhakaran , Francesc Guim Bernat , Miltiadis Filippou
摘要: Various systems and methods for enhancing a distributed computing environment with multiple edge hosts and user devices, including in multi-access edge computing (MEC) network platforms and settings, are described herein. A device of a lifecycle management (LCM) proxy apparatus obtains a request, from a device application, for an application multiple context of an application. The application multiple context for the application is determined. The request from the device application for the application multiple context for the application is authorized. A device application identifier based on the request is added to the application multiple context. A created response for the device application based on the authorization of the request is transmitted to the device application. The response includes an identifier of the application multiple context.
-
公开(公告)号:US20230027152A1
公开(公告)日:2023-01-26
申请号:US17956517
申请日:2022-09-29
IPC分类号: H04L41/082 , H04L41/0654 , H04L9/40
摘要: Systems and techniques to upgrade network objects using security islands are described herein. Security islands of node groupings are created based on trust relationships between nodes in an edge network. An upgrade request may be received to upgrade a target edge node in the edge network. Building blocks may be identified for a package installed on the target edge node to be upgraded. A state backup may be stored for the building blocks. An upgrade command and an upgrade payload may be transmitted to the target edge node. The target edge node may be queried to obtain a status of the target edge node. An upgrade action may be determined based on the status and the upgrade action may be executed.
-
公开(公告)号:US20220329522A1
公开(公告)日:2022-10-13
申请号:US17853331
申请日:2022-06-29
申请人: Christian Maciocco , Ren Wang , Kshitij Arun Doshi , Francesc Guim Bernat , Ned M. Smith , Satish Chandra Jha , Vesh Raj Sharma Banjade , S M Iftekharul Alam , Shu-ping Yeh
发明人: Christian Maciocco , Ren Wang , Kshitij Arun Doshi , Francesc Guim Bernat , Ned M. Smith , Satish Chandra Jha , Vesh Raj Sharma Banjade , S M Iftekharul Alam , Shu-ping Yeh
摘要: Disclosed are systems and methods for adaptive resilient network communication. A system may monitor network traffic on multiple pathways between user equipment and an application or a service at a network destination, gather network telemetry data from the monitored network traffic, input the network telemetry data into a trained artificial intelligence model, and classify the network telemetry data using the model. The system may further determine, using the model, an anomaly condition in at least a portion of the multiple pathways, and in response to the determination of an anomaly, select a mitigation technique for the at least a portion of the multiple pathways.
-
公开(公告)号:US20220231964A1
公开(公告)日:2022-07-21
申请号:US17711921
申请日:2022-04-01
申请人: S M Iftekharul Alam , Satish Chandra Jha , Ned M. Smith , Vesh Raj Sharma Banjade , Kshitij Arun Doshi , Francesc Guim Bernat , Arvind Merwaday , Kuilin Clark Chen , Christian Maciocco
发明人: S M Iftekharul Alam , Satish Chandra Jha , Ned M. Smith , Vesh Raj Sharma Banjade , Kshitij Arun Doshi , Francesc Guim Bernat , Arvind Merwaday , Kuilin Clark Chen , Christian Maciocco
摘要: A resource management framework may be used to improve performance of dominant and non-dominant resources for edge multi-tenant applications. The resource management framework may include an admission control mechanism, which may be used to balance disproportionate resource allocations by controlling allocation of unconstrained resources proportional to the requested dominant resources based on resource availability. The admission control mechanism may provide ongoing monitoring of dominant and non-dominant resource utilization, such as using a hybrid centralized-distributed telemetry collection approach. The resource management framework may also include a lightweight resource monitoring and policy enforcement mechanism on distributed networking elements to reduce or eliminate the exploitations of non-dominant resources.
-
公开(公告)号:US20210021619A1
公开(公告)日:2021-01-21
申请号:US17033757
申请日:2020-09-26
申请人: Ned M. Smith , Francesc Guim Bernat , Rajesh Poornachandran , Kshitij Arun Doshi , Tarun Viswanathan , Kapil Sood
发明人: Ned M. Smith , Francesc Guim Bernat , Rajesh Poornachandran , Kshitij Arun Doshi , Tarun Viswanathan , Kapil Sood
IPC分类号: H04L29/06
摘要: Various aspects of methods, systems, and use cases for trust-based orchestration of an edge node. An edge node may be configured for trust-based orchestration in an edge computing environment, where the edge node includes a transceiver to receive an instruction to perform a workload, the instruction from an edge orchestrator, the edge node being in a group of edge nodes managed with a ledger; and a processor to execute the workload at the edge node to produce a result, wherein the execution of the workload is evaluated by other edge nodes in the group of edge nodes to produce a reputation score of the edge node, where the transceiver is to provide the result to the edge orchestrator.
-
公开(公告)号:US20210014132A1
公开(公告)日:2021-01-14
申请号:US17028728
申请日:2020-09-22
摘要: Methods, systems, and use cases for orchestrator execution planning using a distributed ledger are discussed, including an orchestration system with memory and at least one processing circuitry coupled to the memory. The processing circuitry is configured to perform operations to generate an execution plan for a workload based on an SLA. The execution plan includes state transitions associated with corresponding edge service instances. A distributed ledger record is retrieved from the ledger based on a reinforcement learning reward value specified by the record. The reward value is associated with a state transition of the plurality of state transitions. An edge node is selected based on the retrieved distributed ledger record. Execution of an edge service instance of the plurality of edge service instances by the edge node is scheduled. The execution of the edge service instance corresponds to the state transition associated with the reinforcement learning reward value.
-
公开(公告)号:US20210011823A1
公开(公告)日:2021-01-14
申请号:US17028844
申请日:2020-09-22
IPC分类号: G06F11/263 , G06F9/445
摘要: Various aspects of methods, systems, and use cases for testing, integration, and deployment of failure conditions in an edge computing environment is provided through use of perturbations. In an example, operations to implement controlled perturbations in an edge computing platform include: identifying at least one perturbation parameter available to be implemented with a hardware components of an edge computing system that provides a service using the hardware components; determining values, which disrupt operation of the service, to implement the perturbation parameter among the hardware components; deploying the perturbation parameters to the hardware components, during operation of the service to process a computing workload, to cause perturbation effects on the service; collecting telemetry values associated with the hardware components, produced during operation of the service that indicate the perturbation effects upon the operation of the service; and cause a computing operation to occur based on the collected telemetry values.
-
-
-
-
-
-
-
-
-