Follow us on Twitter
twitter icon@FreshPatents

Network Address patents

Bulk PDF Downloads
      

This page is updated frequently with new Network Address-related patent applications.




 Communication method, wireless access point, wireless controller and communication system patent thumbnailCommunication method, wireless access point, wireless controller and communication system
A communication method includes automatically sending a dhcp discovery request to a dhcp server after power on; receiving network configuration parameters assigned by the dhcp server responding to the dhcp discovery request; and sending a predefined domain name query request for a predefined domain name according to a network address of a dns server included in the network configuration parameters. The domain name query request passes through a wireless controller.
Sangfor Technologies Company Limited


 Method and system of transferring a message in a session initiation protocol based communications network patent thumbnailMethod and system of transferring a message in a session initiation protocol based communications network
Systems and methods of transferring a message in a sip-based communications network, from a first node to a third node via intermediate nodes are provided. In one exemplary embodiment, a network node for registering in an ims communications network may include a controller circuit.
Telefonaktiebolaget Lm Ericsson (publ)


 Facilitating access to remote cloud services patent thumbnailFacilitating access to remote cloud services
The disclosed embodiments disclose techniques for facilitating access to a remote cloud service via a cloud controller for a distributed filesystem. Two or more cloud controllers collectively manage distributed filesystem data that is stored in the cloud storage systems; the cloud controllers ensure data consistency for the stored data, and each cloud controller caches portions of the distributed filesystem.
Panzura, Inc.


 Network bootstrapping for a distributed storage system patent thumbnailNetwork bootstrapping for a distributed storage system
Embodiments are directed towards configuring a distributed storage system over a network. Master computers and subordinate computers may separate components of the distributed storage system.
Igneous Systems, Inc.


 Mobile device-centric electronic subscriber identity module (esim) provisioning patent thumbnailMobile device-centric electronic subscriber identity module (esim) provisioning
The embodiments set forth techniques for enabling mobile devices to trigger an electronic subscriber identity module (esim) provisioning process. In some embodiments, a main operating system (os) of the mobile device communicates a provisioning command to an embedded universal integrated circuit card (euicc) included in the mobile device.
Apple Inc.


 Facilitating text-to-speech conversion of a domain name or a network address containing a domain name patent thumbnailFacilitating text-to-speech conversion of a domain name or a network address containing a domain name
To facilitate text-to-speech conversion of a username, a first or last name of a user associated with the username may be retrieved, and a pronunciation of the username may be determined based at least in part on whether the name forms at least part of the username. To facilitate text-to-speech conversion of a domain name having a top level domain and at least one other level domain, a pronunciation for the top level domain may be determined based at least in part upon whether the top level domain is one of a predetermined set of top level domains.
Blackberry Limited


 System,  small cell gateway selective data path offload patent thumbnailSystem, small cell gateway selective data path offload
An example method is provided in one example embodiment and includes receiving an assignment request from a core node in a network to establish a tunnel for user plane traffic; forwarding first parameters to a controller of an enterprise network, wherein the first parameters include a tunnel identifier and a network address associated with the core node; receiving an assignment response; and forwarding second parameters to the core node, wherein the second parameters include a tunnel identifier and a network address associated with the controller. In some instances, the assignment request can be a request to establish a tunnel for user plane data traffic.
Cisco Technology, Inc.


 Payment processing system including point-of-sale device with a unique identifier and associated methods patent thumbnailPayment processing system including point-of-sale device with a unique identifier and associated methods
In a payment processing system, a secure intermediary system associates payment processing devices including a pos device, mobile communication device, and transaction server with unique identifiers. The secure intermediary receives communications of transaction data from the payment processing devices, the communications including identifiers.
Blackberry Limited


 Voip routing based on rtp server-to-server routing patent thumbnailVoip routing based on rtp server-to-server routing
A system and method of providing voip services by using multiple real-time transport protocol servers (rtp) servers for transmitting voip data between user endpoints. The rtp servers are selected based on the network addresses of the respective endpoints according to the network topology.
Algoblu Holdings Limited


 Bonding router patent thumbnailBonding router
This invention relates to providing a bonded broadband router for customer premises. The invention provides an apparatus and method for receiving packets from a local area network and sending them over an aggregated link comprising one or more communication links.
Shared Band Limited


Parallel asynchronous data replication


A primary data storage system and a secondary data storage system are connected with a mesh of network connections during replication procedures from the primary storage system to the secondary storage system. In some implementations, at the primary storage system, file system metadata is analyzed for different subsets of the primary file system to determine changed and/or potentially changed files and/or directories for each subset.
Overland Storage, Inc.


Automated annotation of a resource on a computer network using a network address of the resource


A user provides an annotation, such as text or graphics, in relation to a resource available on a computer network. The annotation is automatically stored and/or retrieved without requiring separate action from the user to accomplish the storage or retrieval.
Callahan Cellular L.l.c.


System and determination of code coverage for software applications in a network environment


A system and method for determination of code coverage for software applications in a network environment. In accordance with an embodiment, a software application can be instrumented by a code coverage tool to contain instructions for tracing executed code, and sending collected data to a network grabber at an indicated network address or port.
Oracle International, Corporation


Mobile internet protocol (ip) location


A mobile ip location server that retrieves the location of a mobile device based on the public ip address that a mobile device is using. A mobile ip location server comprises a mobile location protocol interface, an identifier resolver, and a location manager.
Telecommunication Systems, Inc.


Method and dynamically presenting content using an interface for setting conditional network destinations


Qr codes or the like are used in hardlink applications, by which different users may receive different information in response to a user's interaction with a touchpoint. The content delivered to a particular user in response to a hardlink code or a presented hyperlink may be dependent on the time of the scan, the geographic location of the user, a weather condition at the geographical location, personal information associated with the user, a number of previous scans of the code by prior individuals, and any combination of the these or other variables, which may be determined by an originator of the qr code or other party.
Life In Mobile Innovations, Inc.


Network address resolution


A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource..
Level 3 Communications, Llc


System and bgp sflow export


A method and apparatus of a device that exports border gateway protocol (bgp) data in sflow samples. The device generates separate tables for bgp attribute information, community list information, and autonomous systems path (as_path) attribute information, where each entry in the bgp attribute information table is associated with an entry in the community list information table and an entry in the as_path attribute information table.
Arista Networks, Inc.


Method and system for propagating network policy


A technique for acquiring and disseminating network node characteristics to enable policy decisions including receiving a resolution request from one or more clients in a network environment is disclosed. Information, for example, network address, is then acquired from one or more sources regarding a specific location in a network, for example, a network node.
Threatstop, Inc.


Mangement of network address pools


Systems and methods for storing and managing pools of network addresses. An example method may comprise: identifying, in a data structure representing a pool of network addresses, an index value of an element having a defined state; determining, by a processing device, a network address in view of the index value and a base network address associated with the pool; and modifying the state of the element of the data structure..
Red Hat Israel, Ltd.


Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Scoped network address pool mangement


Systems and methods for storing and managing pools of network addresses. An example method may comprise: receiving, by a processing device, a request for a network address to be associated with a network interface of a machine, wherein the machine is represented by one of: a virtual machine or a computer system; identifying a hierarchy of groups that include the machine; searching the hierarchy of groups to identify a group having an associated pool of network addresses; and selecting a network address from the pool of network addresses..
Red Hat Israel, Ltd.


Optimized border gateway protocol best path selection for optimal route reflection


Embodiments are provided for optimized best path selection for optimal route reflection and include configuring, by a cloud-based node, a first cluster of nodes in an autonomous system, and determining whether any paths for a network address prefix are available in the first cluster of nodes. Embodiments also include selecting a best path from one or more paths if the one or more paths are determined to be available in the first cluster for the network address prefix.
Cisco Technology, Inc.


Generation and use of numeric identifiers for locating objects and navigating in spatial maps


A computer system implements novel addressing algorithms to translate different types of non-network addresses requested by distributed clients into unique numeric addresses device of language-specific alphabetic characters. The non-network addresses may locate different objects in different addressing or locating systems for physical and virtual objects or locations.
Naviworld Limited


System and monitoring network traffic


Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined.
At&t Intellectual Property Ii, Lp


Communication device of an industrial automation configurating the communication device


A communication device of an industrial automation system and method for configuring the communication device, wherein a communication network address assigned to the communication device is independently generated from at least one prefix communicated via router advertisement messages by at least one router assigned within a subnetwork and from a device-specific interface identifier, where the communication device interrogates at at least one server of a name service system, in accordance with a name resolution protocol, which communication network addresses are assigned to its communication device name, the communication network addresses interrogated at the at least one server of the name service system are checked with regard to correspondence to the prefix, and where the communication device assigns to itself only those communication network addresses interrogated at the server of the name service system which have a correspondence to the prefix communicated by the router.. .
Siemens Aktiengesellschaft


Apparatus and processing alternately configured longest prefix match tables


A network switch includes a memory configurable to store alternate table representations of an individual trie in a hierarchy of tries. A prefix table processor accesses in parallel, using an input network address, the alternate table representations of the individual trie and searches for a longest prefix match in each alternate table representation to obtain local prefix matches.
Xpliant, Inc.


Tracking system


A tracking unit comprising: positioning means for determining a location of the tracking unit; a transceiver unit for communicating at least position data of the tracking unit; a power supplying circuitry for supplying power to the tracking unit; the tracking unit being configured to switch from a first power saving state to an active state after a first predetermined period; send a request to a network address of a positioning application for checking if a location update request has been given to the tracking unit; in response to the location update request being given, determine the location of the tracking unit and send the position data of the tracking unit to the network address; and in response to the location update request not being given or the position data of the tracking unit being sent to the network address, switch back to the first power saving state.. .
Yepzon Oy


Method and system for acquiring and distributing location-related information


The present application provides a method and a system for acquiring and distributing location-related information. The method includes: receiving a positioning request initiated by a first application running on a client device, wherein the positioning request includes a network address identifying the client device and a user identifier shared by the first application and a second application running on a mobile terminal; generating a positioning instruction according to the user identifier; pushing the positioning instruction to the second application running on the mobile terminal; receiving, from the mobile terminal, location information obtained when the second application running on the mobile terminal performs positioning according to the positioning instruction; identifying a plurality of search results associated with the location information; and sending the location information and the plurality of search results associated with the location information to the first application running on the client device..
Tencent Technology (shenzhen) Company Limited


Systems and methods for application controlled network selection between narrowband and broadband wireless networks


A method, apparatus, and system for application controlled network selection between a broadband network and a narrowband network include operating an application with an end device with a narrowband connection to the end device; acquiring a source broadband connection comprising a source broadband network address; negotiating a peer-to-peer broadband connection with the end device utilizing the narrowband connection to communicate the source broadband network address; utilizing the peer-to-peer broadband connection for data associated with the application responsive to successful negotiating; and managing the peer-to-peer broadband connection using the narrowband connection as a control channel therefor. The narrowband connection can include digital mobile radio (dmr), land mobile radio (lmr), project 25 (p25), terrestrial trunked radio (tetra), or the like..
Motorola Solutions, Inc.


Audio commenting and publishing system


An audio commenting and publishing system including a storage database, media content and a computing device all coupled together via a network. The computing device comprises a processor and an application executed by the processor configured to input audio data that a user wishes to associate with the media content from an audio recording mechanism or a memory device.
Soundlink, Inc.


Detecting anomaly action within a computer network


A method for network monitoring includes intercepting, in an anomaly detection module, a first data packet transmitted over a network in accordance with a predefined protocol to or from an entity on the network. Both a network address that is assigned to the entity and a strong identity, which is incorporated in the first data packet in accordance with the predefined protocol, of the entity are extracted from the intercepted first data packet.
Light Cyber Ltd.


System and methods of installing and operating devices without explicit network addresses


A method of discovering addressing information of one or more upstream devices to respond to specific messages by a second device on behalf of the one or more upstream devices in a network includes acquiring the addressing information in an upstream direction from one or more downstream devices to the one or more upstream devices. The method further includes acquiring the addressing information in a downstream direction from the one or more upstream devices to the one or more downstream devices.
Accedian Networks Inc.


Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (nats), or clouds


Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (nats), or clouds is disclosed. According to one exemplary method, the method occurs at a registration server configured to operate in a public network.
Ixia


Multi-subnet participation for network gateway in a cloud environment


A network management server allocates network addresses to a network gateway connected to a public network after receiving an allocation request that specifies a number of network addresses to allocate to the network gateway. The network management server determines a first and second subnets of the public network ha mg respectively, first and second pools of available network addresses capable of being allocated to devices on the public network, and allocates one or more available network addresses from the first and second pools to the network gateway..
Vmware, Inc.


Initiating live presentation content sharing via radio frequency beacons


Systems, methods, and modes are disclosed for sharing presentation content displayed on a meeting room display during a meeting. The system comprises one or more presentation gateways each associated with a network address and configured for receiving and transmitting presentation content to a meeting room display during a meeting.
Crestron Electronics, Inc.


Method for continuous, frame-specific click-stream recording


A method for tracking a user's movements between network addresses can include, subsequent to a request for a (current) network address from a user, receiving the network address and an identifier for a region associated with the network address. The method can also include locating a record that contains the identifier for the region and a time that immediately precedes the request for the network address from the user.
Open Text S.a.


Method for setting up an uninterrupted communication connection and communication device


A method in which a monitoring unit allocated to a communication device checks, based on a name resolution protocol, whether a second communication network address allocated to the first communication device becomes valid in order to set up an uninterrupted communication connection to the communication device that is allocated to an industrial automation system, where in cases of an allocation of a new valid communication network address and an existing communication connection, the monitoring unit initiates a set-up of an additional communication connection using the new communication network address.. .
Siemens Aktiengesellschaft


Safechannel encrypted messaging system


Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (os) running on a host device and a virtual machine running on top of the native os are presented. The host device includes a processor to communicate with an application having a target network address.
Webcloak, Llc


Portable encryption and authentication service module


Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address.
Webcloak, Llc


Deterministic mapping


network address translating is contemplated to be of a type where a network address translator (nat), a carrier grade nat (cgn), or other type of translator may facilitate reconstruction of translated addresses in a manner that ameliorates the amount of data that must be stored to facilitate the reconstruction.. .
Cable Television Laboratories, Inc.


Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Mesh network addressing


In embodiments of mesh network addressing, a router registers an address for an end device and assigns a child identifier to the end device. The router encodes an endpoint identifier of the end device, and a router identifier of the router into an endpoint identifier, which the router incorporates into a routing locator (rloc) for the end device.
Google, Inc.


Devices, debugging network connectivity


The devices, systems, and methods test network connectivity, where the physical network is used to provide one or more service chains connecting service appliances, including firewalls, intrusion detection systems, load balancers, network address translators, web servers, and so on. A service chain may involve multiple routing paths.

Method and system for migration of virtual machines and virtual applications between cloud-computing facilities


The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing ip and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate..
Vmware, Inc.


Networked lighting such lighting apparatus to identify itself and communicate its network address


In various embodiments an apparatus configured to be connected to a lighting network and to control a first and a second lighting unit in response to at least one signal received via the lighting network is disclosed. In one example, the apparatus comprises a processor configured to receive an identification command, and in response thereto to execute an algorithm for communicating a network address associated with the apparatus, the algorithm comprising sequentially, for each bit of the network address: controlling the first lighting unit, to indicate a value of the bit by the lighting unit entering a state corresponding to the value of the bit, and causing the second lighting unit, to signal that the first lighting unit validly indicates the value of the bit and causing the second lighting unit to enter a state which indicates an end of the network address..
Koninklijke Philips N.v.


Provision of additional network addressable numbers on single mobile device


A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation


Provision of additional network addressable numbers on single mobile device with no calling number identifier


A method and system are described for servicing a second line service (“sls”) based communication request originating from a subscriber's telecommunications device (“td”) even if the call signal does not include sufficient information to identify the phone number from which the subscriber initiated the call. The method involves associating the sls phone number of the subscriber, the primary number of the subscriber and the primary number of a third party via a special relationship number..
Movius Interactive Corporation


Subnetworks of peer to peer networks


A respective identifier of each node of a plurality of nodes in a plurality of subnetworks of a peer to peer network may be generated. The identifier may include a node address identifying the node and a subnetwork address identifying a subnetwork in the plurality of subnetworks in which the node is located.
Hewlett Packard Enterprise Development Lp


Selecting network services based on hostname


In an embodiment, a method configures a network to route data on a first network service that connects a user's network with a service provider network. In the method, an instruction to route data from the network addressed to a hostname on the first network service is received, according to the hostname, a first ip address that addresses a server identified by the hostname is determined.
Level 3 Communications, Llc


Measurement method, apparatus, and system for minimization of drive tests


The present application discloses a method, an apparatus, and a system for minimization of drive tests (mdt), and relates to the field of communications technologies. In a technical solution, by obtaining a mapping relationship between a trace control entity (tce) address and a tce identifier, and according to the tce identifier included in the mdt report reported by the ue, a corresponding tce address is obtained and the mdt report is sent to a tce corresponding to the tce address.
Huawei Technologies Co.,ltd.


Content pre-render and pre-fetch techniques


Content pre-render and pre-fetch techniques are described. In one or more implementations, a likelihood is predicted of subsequent navigation to content associated with a network address based at least in part on monitored navigation performed by a computing device to one or more network addresses.
Microsoft Technology Licensing, Llc


Method, device and system for processing network address, wlan and ue


Provided are a method, device, system for accessing a network address, wlan and ue. The method comprises: a trusted wlan access network acquires a flow routing policy of a ue; and the trusted wlan access network allocates at least one network address for the ue according to the flow routing policy of the ue.
Zte Corporation


Managing network computing components utilizing request routing


Aspects of the disclosure will be described with regard to the processing of a client computing device dns queries by a dns processing service to determine an identifier associated with a previously instantiated hosted virtual machine instance. In one aspect, if the previously instantiated hosted virtual machine instance is instantiated, the dns service can resolve the dns query by transmitting network address information associated with the previously instantiated hosted virtual machine instance.
Amazon Technologies, Inc.


Base-station-to-base-station gateway and related devices, methods, and systems


The present disclosure relates to a base-station-to-base-station (bs-bs) gateway in a long term evolution (lte) cellular communication network and methods of operation thereof. In one embodiment, the bs-bs gateway receives information from a first base station which includes a hostname and a network address of the first base station.
Telefonaktiebolaget L M Ericsson (publ)


Method for setting up a secure communication connection, a communication device and connection controller


In the case of a secure communication connection to a communication device connected to the industrial automation system via a non-secure subnetwork, a monitoring unit checks whether a new communication network address assigned to the communication device for a connection to the non-secure subnetwork becomes valid. In the event of a change in a communication network address and in the case of a still existing secure communication connection, the monitoring unit transmits an address change notification via the existing secure communication connection, where upon receiving the address change notification, the set-up of an additional secure communication connection and a changeover from the existing secure communication connection to the additional secure communication connection are initiated..
Siemens Aktiengesellschaft


Discovery of network address allocations and translations in wireless communication systems


A wireless user device is served by a wireless network that performs network address translation (nat). The wireless user device exchanges user data using a device ip address and a network gateway exchanges the user data with external systems using an external ip address.
Sprint Communications Company L.p.


System for electronically transferring assets


Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, by a first computing device of a first user, for obtaining an image of a code presented on a display of a second computing device of a second user, deciphering the code to obtain an identifier of the second user and a signature, verifying that the signature is valid and, based thereon, initiating a first transaction: preventing the first user and the second user from entering into any other transactions until the first transaction is completed or canceled, receiving an acceptance of the first user to transfer a first amount of a digital currency to the second user, obtaining a digital currency network address of the second user based on the identifier, initiating the transfer through a digital currency network using the digital currency network address of the second user and a private key of the first user, reporting the transaction to a remote system, receiving a confirmation from the first user that a second amount of a real currency has been received from the first user, and sending a notification to the second device indicating that the transaction is complete.. .
Plutus Financial Inc.


Slot based management controller address


Techniques for determining an address of a management controller are provided. A microcontroller on a cartridge may read a signal from an enclosure, wherein the signal is associated with a slot in the enclosure.
Hewlett Packard Enterprise Development Lp


Ad hoc group bidding


A method includes storing locations of mobile devices that are registered for ad hoc grouping, and matching an access request that specifies a location that corresponds to a goal for an ad hoc grouping with candidate mobile devices that match the access request. The method also includes retrieving network addresses of the candidate mobile devices and sending invitations to join the ad hoc grouping.

Methods and systems for maintaining routing tables in an ad-hoc wireless network


Disclosed herein are methods and systems for maintaining routing tables in an ad-hoc wireless network. In an embodiment, a first node receives, from a second node having a second network address, a first data packet having a third network address as the source address and a fourth network address as the destination address.

Network address resolution


A content delivery network with at least one first content server bound to a first domain associated with a first characteristic (e.g., popular) associated with content servable from the content delivery network. The content delivery network includes at least one second content server bound to a second domain associated with a second characteristic (e.g., unpopular) associated with content servable from the content delivery network.

Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Network address resolution


A content delivery method, and related apparatus, that involves the operations of receiving a request for a content resource including at least one embedded resource with a tag. Upon identification of the tag, using at least one delivery parameter to generate a modified embedded resource.

Method and system for authenticating a user


The invention relates to a method for authenticating a user (10) at an entity (16), the method comprising the steps of detecting, by means of a contact module (20) of the entity (16), a contacting of the user (10) made in a browser of a terminal (12), and sending, by means of the contact module (20), a network address of an authentication module (24) of the entity (16) to a mobile device (14) of the user (10) in an authentication message, verifying the acceptability of an entity certificate of the authentication module (24) by means of the mobile device (14) based on the network address, and verifying acceptability of a user certificate of the mobile device (14) by means of the authentication module (24), and in case the entity certificate and the user certificate are acceptable, authenticating the user (10) at the entity (16) by establishing a communication channel (114, 120, 114, 120) between the mobile device (14) and the authentication module (24), whereas in case the entity certificate or the user certificate is not acceptable, rejecting the user (10) at the entity 16. The invention also relates to a system for authenticating a user (10) at an entity (16)..

Portable electronic device, server and connection method thereof


A portable electronic device including a network unit and a processing unit is provided. The processing unit is connected to the network unit.

Translating network address


In a process of establishing a tunnel between a hub device and a spoke device, the hub device in a dvpn obtains a public address and port information of a device in a public network after the public address and the port information are translated through a nat device. The hub device transmits the public address and the port information of the spoke device to a server in the dvpn, so that another spoke device obtains the public address and the port information to establish a direct tunnel with the spoke device..

Role based multicast messaging infrastructure


Certain embodiments of the present invention provide techniques that enable messages to be sent to a processing entity within a computing device without knowing the network address of the processing entity. In certain embodiments, instead of using the network address of the processing entity, a message can be communicated to the processing entity using information indicative of a role or state or function performed by the processing entity..

Forwarding policies on a virtual service network


In providing packet forwarding policies in a virtual service network that includes a network node and a pool of service load balancers serving a virtual service, the network node: receives a virtual service session request from a client device, the request including a virtual service network address for the virtual service; compares the virtual service network address in the request with the virtual service network address in each at least one packet forwarding policy; in response to finding a match between the virtual service network address in the request and a given virtual service network address in a given packet forwarding policy, determines the given destination in the given packet forwarding policy; and sends the request to a service load balancer in the pool of service load balancers associated with the given destination, where the service load balancer establishes a virtual service session with the client device.. .
A10 Networks, Inc.


Effecting communication events


Disclosed are methods and devices (e.g. Servers) for establishing a real-time communication event between a user of a client device and another user of another client device via a communication network.
Microsoft Technology Licensing, Llc


Detection of infected network devices and fast-flux networks by tracking url and dns resolution changes


A system and method for detecting fast-flux malware are presented. Domain name system (dns) lookup requests to dns servers from a local area network (lan) to a wide area network (wan) are monitored.
The Boeing Company


Communication system, communication apparatus, control apparatus, network device, communication method, control method, and program


A technique capable of changing communication services that can be provided by a communication system is provided. A communication system according to the present invention includes: first means that is capable of executing a network function for providing a communication service; and second means that adds a label corresponding to a network address that is assigned to a group of network functions, to a packet belonging to the group, and sends the packet to the network function which performs packet forwarding within the group based on the label..
Nec Corporation


Wireless network system and smart device management method using led lighting devices


The present disclosure provides a wireless network system and a smart device management method using led lighting devices. The wireless network system includes a wireless router and a plurality of led lighting devices with wi-fi modules that have wireless access and network switch capabilities.
Sengled Optoelectronics Co., Ltd


Method and system of providing ip-based packet communications in a utility network


A wireless communication system and method include a plurality of nodes that are part of a wireless local area network (lan), and a plurality of access points connected to the wireless lan and at least one wide area network (wan). At least one of the nodes registers with at least two of the access points, and, for each of the access points with which that node registers, obtain a unique network address corresponding to that access point, such that the node obtains a plurality of unique network addresses each respectively associated with a corresponding one of the access points with which the node registers.
Silver Spring Networks, Inc.


System and ubiquitous appliance control


A slave relay station is adapted to serve and/or host pages comprising a simplified graphic user interface (gui) encoded in a widely recognized format such as, for example, html or wml. The gui embodies activatable links corresponding to control functions for configured appliances.
Universal Electronics Inc.


Initiating a conference call via radio frequency beacons


Systems, methods, and modes are disclosed for initiating a conference call on a conferencing endpoint from a portable electronic device. The system comprises a conferencing endpoint associated with a network address and configured for receiving conferencing information and using said conferencing information to dial a conference call.
Crestron Electronics, Inc.


Convenient wifi network access using unique identifier value


A wifi network manager stores a unique identifier value such as a network address associated with a communication device as being a valid credential for the communication device to subsequently access a wifi network including one or more access points. The wifi network manager monitors use of the unique identifier value to access the wifi network.
Time Warner Cable Enterprises Llc


Implementing network communication


When a node device receives a packet transmitted from a device connecting with the node device, the node device searches a public network address of a next hop in a first table according to a private address of the next hop, searches for an ipsec security association (sa) in a second table according to the public network address searched out, performs ipsec encapsulation for the received packet by use of the ipsec sa corresponding to the public network address, and transmits the packet.. .
Hangzhou H3c Technologies Co., Ltd.


Methods, systems, and apparatuses for providing a single network address translation connection for multiple devices


Techniques and systems for operating a device as a proxy network address translation device for other devices are provided. For example, a method, computing device, or computer-program product may be provided.
Belkin International, Inc.


Method for processing raw ip packet and device thereof


Methods for processing a raw internet protocol (ip) packet and corresponding devices are provided. A method is applied on a broadband network gateway (bng) side, and the method includes that after it is acquired that a customer premises equipment (cpe) goes on line, a public network ip address and a public network identifier range are allocated to the cpe; and after a downlink raw ip packet is received, the packet is forwarded to a corresponding cpe according to a destination ip address of the packet and a route of a public network identifier, another method is applied on a cpe side, and the includes that: a public network ip address and a public network identifier range allocated by a bng are received; after an uplink raw ip packet transmitted by a user is received, a source ip address in the packet is replaced with the public network ip address, a value of an identifier field in the packet is replaced with a value in the public network identifier range allocated by the bng, and then the uplink raw ip packet is transmitted to the bng.
Zte Corporation


Method for accessing a digital network by way of one or more internet service providers


Described herein is a method for accessing a digital network. For example, the method may include receiving a message from a network access device at a first internet service provider, and sending at least a portion of the received message through a network to an access service provider.
Mymail, Ltd.


Image monitoring framework


A computing platform may receive, from a network device, a message identifying data that was transmitted by a user device located in a private network associated with an organization. The network device may be located at a boundary between the private network and a public network.
Bank Of America Corporation


Context-aware distributed firewall


A context-aware distributed firewall scheme is provided. A firewall engine tasked to provide firewall protection for a set of network addresses applies a reduced set of firewall rules that are relevant to the set of addresses associated with the machine.
Nicira, Inc.


Cooperative network architecture


A method for transmitting information relating to a communication network, implemented by a first server of a communication network, the method comprising the following steps: storing a data table matching identifiers of subnetworks of the communication network associated with respective qualities of service, with at least one network address of a user terminal, the network address comprising an ip address of the user terminal; receiving a request from a second server of a service provider, the request requesting information linked to said communication network; transmitting at least a part of the data table to the second server, the part comprising the matches between each subnetwork identifier and the at least one network address of a user terminal.. .
Orange


Key management system for toll-free data service


A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may perform a validation operation to validate that the network address is associated with the toll-free data service.
Verizon Patent And Licensing Inc.


Process for assigning a network address to a terminal network-element, network, interconnection network-element, addressing server and associated terminal network-element


The invention relates to a process for assignment, by an addressing server for a network, of a network address to a terminal network-element connected to one of the connection ports of one of the interconnection network-elements of said network, comprising: transmission of a network address request by said terminal network-element to said interconnection network-element, the determination by said interconnection network-element of a location of said terminal network-element where said location combines a topological identifier for said interconnection network-element with at least one identifier for said connection port, the transmission by said interconnection network-element to said addressing server of said request with said location, assignment by said addressing server to said terminal network-element of said network address based on said location.. .
Bull Sas


Optimizing global ipv6 address assignments


In one embodiment, a device in a network determines that one or more network nodes should use a stateful address configuration protocol to obtain network addresses. The device causes the one or more network nodes to use the stateful address configuration protocol, in response to determining that the one or more nodes should use the stateful address configuration protocol to obtain network addresses.
Cisco Technology, Inc.


Method, apparatus and system for determining content acquisition path and processing request


The present disclosure provide a method for determining a content acquisition path, a method for processing a content request and a corresponding apparatus and system. The method for determining the content acquisition path includes: receiving a request from a user, where the request is used for requesting an original content provider to provide a content, and the request carries a name of the content, a network address of the original content provider and a network address of the user; calculating at least two forwarding paths to the original content provider, and determining a content acquisition path according to link cost on each forwarding path and a cache hit rate of a network node on each forwarding path to the content; and sending the request to a next network node according to the content acquisition path, for enabling the next network node to forward or respond to the request..
Huawei Technologies Co., Ltd.


Parallel multipath routing architecture


Disclosed are various embodiments for a parallel multipath routing architecture. An edge node of an overlay network receives packets to be communicated to a destination network address.

Determining physical location of a networked computing device


Techniques for determining location of a networked computing device are presented herein. An association module may be configured to associate two or more co-located computing devices based on an association selected from the group consisting of a common user, network address similarities, local communications between the two or more co-located computing devices, and co-location patterns.

Network address translation


Systems and methods for connecting a network using one network protocol with a network using another network protocol are provided. According to an embodiment, a method is provided for performing network address translation.
Fortinet, Inc.


Transmission network address translation traversal


A transmission system and a transmission method for network address translation traversal are provided. The transmission system includes a private network device, a network address record device, a public network device and a network address translation server.
Institute For Information Industry


Conveying device-dependent context in a network address


A method for conveying context information that governs packets flowing in at least a first direction between at least one wireless device and a corresponding node communicating with the device comprises an embedder node populating a context portion, of a header of a packet for flow in a second reverse direction, that, once populated with context information that governs packet flow in the first direction, is imparted in the packet flow along the network in either the first or second direction and is conveyed in both directions, an unpacker node retrieving the context information from the context portion of a packet flowing in the first direction, and a configurer node applying the retrieved information to govern packet flow in the first direction therefrom. The embedder, unpacker and/or configurer nodes can be the same..
Huawei Technologies Co., Ltd.


Method and system protecting against identity theft or replication abuse


A method, implemented by a computer-implemented authentication system, for authenticating a user attempting to access a target component of a computer system, the method comprising: a) receiving, from a first user system via a computer network, user authentication information and a network address identifying the first user system within the computer network; b) obtaining at least one data item of contextual information indicative of a property of an environment of a wireless communications device associated with the user authentication information; c) authenticating the user based on at least the user authentication information; and d) subject to successful authentication, granting access to the target component and storing a data record comprising the received network address and the received contextual information.. .
Sms Passcode A/s


Changing group member reachability information


In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.. .
Cisco Technology, Inc.


Method and device for forwarding packet


Provided is a method for forwarding a packet, which includes that: when a matched network address port group translation entry is found according to a source internet protocol (ip) address and a source port number of a received packet, or according to a target ip address and a target port number of the received packet, the packet is translated according to the network address port group translation entry and then sent out. Also provided is a device for forwarding a packet.
Zte Corporation


Network control method and system


A network address determining unit determines a network address in an ip network between a parent node and a plurality of child nodes from the ip address of the parent node on the basis of a received subnet mask value assigned to the parent node. A host address determining unit determines the host address of a child node in the ip network from a logical address assigned to the child node.
Azbil Corporation


Dynamically assigning network addresses


Dynamically assigning network addresses provided by a server in a network to virtual network adapters in virtual machines, in which a reassignment of the assigned network addresses due to suspending virtual machines is prevented. Network addresses of the virtual machines in the network are logged.
International Business Machines Corporation


Method for setting up a local control channel between a control unit and a building-internal access portal


A method sets up a local control channel between a control unit for controlling a building-internal electrical component, connected to a building-internal access portal, and the access portal, by authenticating the control unit against a building-external authentication server via a building-external communication network; transmitting a network address of the building-internal access portal using the building-external authentication server to the control unit upon successful authentication of the control unit against the building-external authentication server via the building-external communication network; transmitting an access authorization for the building-internal access portal to the control unit using the building-external authentication server via the building-external communication network upon successful authentication of the control unit against the building-external authentication server via the building-external communication network; and setting up the local control channel between the control unit and the building-internal access portal in response to receiving the network address of the building-internal access portal and the access authorization.. .
Deutsche Telekom Ag




Network Address topics:
  • Network Address
  • Network Device
  • Communications
  • Computer Network
  • Sequencing
  • Computer Readable
  • Access Point
  • Computer Program
  • Internet Address
  • Internet Protocol
  • Virtual Private Network
  • Agile Network Protocol For Secure Communications Using Secure Domain Names
  • Network Communication
  • Domain Name
  • Secure Communication


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Network Address for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Network Address with additional patents listed. Browse our RSS directory or Search for other possible listings.


    3.196

    5150

    3 - 0 - 101