-
公开(公告)号:US20180270107A1
公开(公告)日:2018-09-20
申请号:US15460308
申请日:2017-03-16
IPC分类号: H04L12/24
CPC分类号: H04L41/0686 , H04L41/0677
摘要: Embodiments for fault detection in an end-to-end communication flow between microservices within a cloud computing environment by one or more processors. A communication pattern may be established between an invoking microservice and one or more microservices to enable fault detection of a failure of an end-to-end communication flow between the invoking microservice and the one or more microservices, wherein the communication pattern includes a request to self-monitor for the fault detection by the one or more microservices, and an acknowledgement response provided by the invoking microservice to the one or more microservices indicating success or failure of the end-to-end communication flow between the invoking microservice and the one or more microservices.
-
公开(公告)号:US20210144179A1
公开(公告)日:2021-05-13
申请号:US16679712
申请日:2019-11-11
IPC分类号: H04L29/06 , H04L12/931 , H04L12/46
摘要: Embodiments for extending managed switching network in a computing environment. Security policy and authentication functionality may be extended and implemented in a virtualization layer of a virtual switch locally installed on a computer of a user for network switching in a network.
-
公开(公告)号:US20160328553A1
公开(公告)日:2016-11-10
申请号:US15216899
申请日:2016-07-22
IPC分类号: G06F21/36 , G06F21/62 , G06F21/46 , G06F3/0482
摘要: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
摘要翻译: 本文提供了用于认证用户使用处理设备的设施。 用户预定义一种或多种类型的认证者,并将它们与图形图像相关联。 当尝试激活处理设备时,图形图像的图形图像被选择以呈现给用户。 所选择的图形图像被呈现给用户,然后用户提供输入以与设备进行认证。 确定用户是否被认证以使用该设备。 基于从用户接收的输入进行确定,并进一步基于与所选择的图形图像相关联的认证器。 改变每个与预定义的认证器和认证类型相关联的图像的选择使得认证器中的可变性适合于在给定时间解锁设备,从而为认证过程提供更大的安全性。
-
公开(公告)号:US20200076806A1
公开(公告)日:2020-03-05
申请号:US16115193
申请日:2018-08-28
摘要: Embodiments for managing for managing access to computing system resources are described. A list of privileged users having access to a computing system privilege is received. The computing system privilege is associated with a set of privilege credentials. The receiving of a first set of credentials and a second set of credentials from a user attempting to access the computing system privilege is detected. The user is caused to be granted access to the computing system privilege only if the first set of credentials matches the set of privilege credentials and the second set of credentials is associated with one of the privileged users.
-
公开(公告)号:US20200076538A1
公开(公告)日:2020-03-05
申请号:US16116879
申请日:2018-08-29
发明人: Hesham SOULTAN , Alaa YOUSSEF , Nader M. NASSAR , Tamer M. NASSAR
摘要: Embodiments for intelligent communication message format automatic correction in a computing system by a processor. An appropriateness of the communication message formats is learned based on a plurality of factors for receiving communication messages from a communication system. A communication message, having one or more errors of a received communication message, may be automatically corrected according to the learned appropriateness of the communication messages.
-
公开(公告)号:US20180276993A1
公开(公告)日:2018-09-27
申请号:US15465916
申请日:2017-03-22
CPC分类号: G08G5/0043 , B64C39/024 , B64C2201/027 , B64C2201/108 , B64C2201/127 , B64C2201/128 , B64C2201/143 , B64C2201/182 , G08G5/0013 , G08G5/0026 , G08G5/0034 , G08G5/0069
摘要: Embodiments for managing drones by one or more processors are described. A first aerial drone having a payload coupled thereto is controlled such that the first aerial drone travels from a first location to a second location. A second aerial drone is controlled such that the second aerial drone travels to the second location. While the first aerial drone and the second aerial drone are in flight at the second location, the payload is detached from the first aerial drone and coupled to the second aerial drone. After the payload is detached from the first aerial drone and while the payload is coupled to the second aerial drone, the second aerial drone is controlled such that the second aerial drone travels from the second location to a third location.
-
公开(公告)号:US20180196422A1
公开(公告)日:2018-07-12
申请号:US15401256
申请日:2017-01-09
CPC分类号: G06Q10/0834 , B64C2201/128 , G05D1/104
摘要: Embodiments for managing drones by one or more processors are described. Information about each of a plurality of drones is received. Each of the plurality of drones is associated with a respective one of a plurality of users. A request to transport an item from an origination point to a destination is received. Based on the information about the plurality of drones, the origination point, and the destination, a first of the plurality of drones is selected to transport the item from the origination point to an intermediate region. Based on the information about the plurality of drones, the origination point, and the destination, a second of the plurality of drones is selected to transport the item from the intermediate region to the destination.
-
公开(公告)号:US20160132673A1
公开(公告)日:2016-05-12
申请号:US14538932
申请日:2014-11-12
IPC分类号: G06F21/36
摘要: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
-
-
-
-
-
-
-