OPTICAL LIMITER AND METHOD FOR LIMITING RADIANT FLUX

    公开(公告)号:US20230140182A1

    公开(公告)日:2023-05-04

    申请号:US17995165

    申请日:2021-03-10

    发明人: Marco MENCHETTI

    IPC分类号: G02F1/01 G02B26/02

    摘要: An aspect relates to an optical limiter (200) for limiting the radiant flux of an optical source beam, comprising: an optical control port (221) for illumination by an optical control beam originating from the source beam; an optical input port (221) for illumination by an optical transmission beam originating from the source beam; an optical output port (225) for illumination by the transmission beam; and a thermally driven light mill (211, 212); wherein the light mill is arranged with respect to the input port, the control port and the output port such that illumination of the control port by the control beam drives the light mill to rotate only when the control beam has a radiant flux equal to or in excess of a predetermined radiant flux threshold; and rotation of the light mill causes an area of the output port illuminated by the transmission beam to change.

    LOW LATENCY CONTENT DELIVERY
    3.
    发明申请

    公开(公告)号:US20230121792A1

    公开(公告)日:2023-04-20

    申请号:US17915264

    申请日:2021-03-16

    IPC分类号: H04L65/613 H04L65/612

    摘要: The invention provides a method of media content delivery, where the time taken to deliver each chunk of content is measured, from which the stability or consistency of delivery times are calculated. The amount of data buffered at the user's device awaiting decoding and play-back can then be adjusted (such as by playing out the content slower or quicker), in order to achieve a good compromise between continuous play-out and low end-to-end delay, taking into consideration the current network characteristics.

    Attack signature generation
    4.
    发明授权

    公开(公告)号:US11611570B2

    公开(公告)日:2023-03-21

    申请号:US16473953

    申请日:2017-12-19

    发明人: Fadi El-Moussa

    IPC分类号: H04L9/40 G06F21/55

    摘要: A computer implemented method to generate a signature of a network attack for a network-connected computing system, the signature including rules for identifying the network attack, the method including generating, at a trusted secure computing device, a copy of data distributed across a network; the computing device identifying information about the network attack stored in the copy of the data; and the computing device generating the signature for the network attack based on the information about the network attack so as to subsequently identify the network attack occurring on a computer network.

    WIRELESS NETWORK ACCESS POINT AND METHOD FOR OPERATION THEREOF

    公开(公告)号:US20230033489A1

    公开(公告)日:2023-02-02

    申请号:US17787155

    申请日:2020-12-18

    IPC分类号: H04W24/08 H04W60/04 H04L1/20

    摘要: The present disclosure relates to a computer-implemented method of operating a wireless network access point of a wireless network. The method includes wirelessly exchanging management frames with a device to attach the device to the access point, thereby establishing: a wireless downlink data communication channel from the access point to the device, and a wireless uplink data communication channel from the device to the access point. The method further includes performing a wireless link test comprising: transmitting a test frame to the device on the downlink channel, the test frame having a length greater than each of the management frames, including a sequence of test data bits, and being configured to require a mirror response comprising the sequence of test data bits; monitoring for receipt of the mirror response on the uplink; and, if the mirror response is received, determining the test is passed.

    PRIORITIZING UTILITIES INFRATRUCTURE

    公开(公告)号:US20230022067A1

    公开(公告)日:2023-01-26

    申请号:US17758391

    申请日:2020-12-18

    IPC分类号: G06Q50/26 G06Q10/06

    摘要: A method of maintaining a plurality of infrastructure components as part of a transmission network for a utility service in a defined geographic region having associated environmental characteristics, wherein each infrastructure component is deployed at a location in the region having associated one or more location characteristics and is of a component type having associated one or more infrastructure characteristics. The method including for each infrastructure component, executing a classifier based on one or more of the infrastructure characteristics, the location characteristics, and the environmental characteristics to forecast a measure of susceptibility of the infrastructure component to one or more operational impediments. The method further includes selecting an infrastructure component based on the forecast susceptibilities and deploying one or more mitigation measures for the selected infrastructure component to mitigate one or more operational impediments to which the selected component is determined to be susceptible based on the forecast susceptibilities.

    Implementing service function chains

    公开(公告)号:US11558246B2

    公开(公告)日:2023-01-17

    申请号:US16468121

    申请日:2017-12-08

    发明人: Anne-Louise Krug

    摘要: Methods and apparatus are disclosed for configuring one or more processors to implement service function chains comprising one or more virtualised service functions. A method according to one aspect, performed by a processing module (330) implemented on one or more processors (30), involves steps being performed in respect of at least one new virtualised service function (33) to be included in a service function chain of: determining a position in the service function chain at which the new virtualised service function (33) is to be included; allocating at least one internal address to the new virtualised service function, the at least one internal address being an address to be usable by a switching processor (34); and providing to the switching processor (34) an indication of the at least one internal address allocated to the new virtualised service function (33).

    TELECOMMUNICATIONS NETWORK
    8.
    发明申请

    公开(公告)号:US20230006731A1

    公开(公告)日:2023-01-05

    申请号:US17757279

    申请日:2020-11-19

    IPC分类号: H04B7/185 H04W76/10

    摘要: A method of operating a wireless telecommunications network includes identifying a signal coverage area of a moving base station, that forms part of a first telecommunications network, to which to allocate a first physical network identifier, determining a second physical network identifier for enabling user equipment to access an access point that serves the identified signal coverage area, wherein the access point is stationary relative to the moving base station and forms part of a second wireless telecommunications network, and associating the first physical network identifier with the second physical network identifier. The method further includes allocating the first physical network identifier to the moving base station to allow user equipment within the signal coverage area to access the moving base station via the first physical network identifier when the moving base station is providing a telecommunications signal in the identified signal coverage area.

    INTERACTION-BASED RENDERING OF SPATIAL ENVIRONMENTS

    公开(公告)号:US20220413597A1

    公开(公告)日:2022-12-29

    申请号:US17758910

    申请日:2020-12-18

    IPC分类号: G06F3/01

    摘要: A computer implemented method of navigating a digital representation of a spatial environment by a user in which a portion of the digital representation is rendered by a rendering computer system for visualization by the user. The method including accessing a digital model of the spatial environment including a specification of each of a plurality of virtual resources in the spatial environment, each specification identifying at least a location of a resource in the spatial environment and at least one trigger criterion for determining when a resource is accessed by the user; monitoring the satisfaction of trigger criteria for the plurality of virtual resources; and responsive to the monitoring, determining the portion of the digital representation for rendering by the rendering computer system for visualization by the user.

    ELECTRONIC MAIL SECURITY
    10.
    发明申请

    公开(公告)号:US20220407830A1

    公开(公告)日:2022-12-22

    申请号:US17756031

    申请日:2020-10-30

    IPC分类号: H04L51/212 H04L9/40

    摘要: A computer implemented method of detecting malicious electronic mail comprising: receiving an electronic mail message including an indication of a purported sender network domain and a Simple Mail Transfer Protocol identifier (SMTP ID); processing the SMTP ID with a classifier, wherein the classifier is implemented using a supervised machine learning method trained to classify the SMTP ID as originating from the purported sender domain based on a training data set including authentic electronic mail messages from the domain; and responsive to a classification, by the classifier, of the received message indicating that the received message originates from a sender other than the purported sender domain, identifying the received message as malicious.