This page is updated frequently with new Network Address-related patent applications.
| Method and system for propagating network policy|
A technique for acquiring and disseminating network node characteristics to enable policy decisions including receiving a resolution request from one or more clients in a network environment is disclosed. Information, for example, network address, is then acquired from one or more sources regarding a specific location in a network, for example, a network node.
| Mangement of network address pools|
Systems and methods for storing and managing pools of network addresses. An example method may comprise: identifying, in a data structure representing a pool of network addresses, an index value of an element having a defined state; determining, by a processing device, a network address in view of the index value and a base network address associated with the pool; and modifying the state of the element of the data structure..
Red Hat Israel, Ltd.
| Scoped network address pool mangement|
Systems and methods for storing and managing pools of network addresses. An example method may comprise: receiving, by a processing device, a request for a network address to be associated with a network interface of a machine, wherein the machine is represented by one of: a virtual machine or a computer system; identifying a hierarchy of groups that include the machine; searching the hierarchy of groups to identify a group having an associated pool of network addresses; and selecting a network address from the pool of network addresses..
Red Hat Israel, Ltd.
| Optimized border gateway protocol best path selection for optimal route reflection|
Embodiments are provided for optimized best path selection for optimal route reflection and include configuring, by a cloud-based node, a first cluster of nodes in an autonomous system, and determining whether any paths for a network address prefix are available in the first cluster of nodes. Embodiments also include selecting a best path from one or more paths if the one or more paths are determined to be available in the first cluster for the network address prefix.
Cisco Technology, Inc.
| Generation and use of numeric identifiers for locating objects and navigating in spatial maps|
A computer system implements novel addressing algorithms to translate different types of non-network addresses requested by distributed clients into unique numeric addresses device of language-specific alphabetic characters. The non-network addresses may locate different objects in different addressing or locating systems for physical and virtual objects or locations.
|System and monitoring network traffic|
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined.
At&t Intellectual Property Ii, Lp
|Communication device of an industrial automation configurating the communication device|
A communication device of an industrial automation system and method for configuring the communication device, wherein a communication network address assigned to the communication device is independently generated from at least one prefix communicated via router advertisement messages by at least one router assigned within a subnetwork and from a device-specific interface identifier, where the communication device interrogates at at least one server of a name service system, in accordance with a name resolution protocol, which communication network addresses are assigned to its communication device name, the communication network addresses interrogated at the at least one server of the name service system are checked with regard to correspondence to the prefix, and where the communication device assigns to itself only those communication network addresses interrogated at the server of the name service system which have a correspondence to the prefix communicated by the router.. .
|Apparatus and processing alternately configured longest prefix match tables|
A network switch includes a memory configurable to store alternate table representations of an individual trie in a hierarchy of tries. A prefix table processor accesses in parallel, using an input network address, the alternate table representations of the individual trie and searches for a longest prefix match in each alternate table representation to obtain local prefix matches.
A tracking unit comprising: positioning means for determining a location of the tracking unit; a transceiver unit for communicating at least position data of the tracking unit; a power supplying circuitry for supplying power to the tracking unit; the tracking unit being configured to switch from a first power saving state to an active state after a first predetermined period; send a request to a network address of a positioning application for checking if a location update request has been given to the tracking unit; in response to the location update request being given, determine the location of the tracking unit and send the position data of the tracking unit to the network address; and in response to the location update request not being given or the position data of the tracking unit being sent to the network address, switch back to the first power saving state.. .
|Method and system for acquiring and distributing location-related information|
The present application provides a method and a system for acquiring and distributing location-related information. The method includes: receiving a positioning request initiated by a first application running on a client device, wherein the positioning request includes a network address identifying the client device and a user identifier shared by the first application and a second application running on a mobile terminal; generating a positioning instruction according to the user identifier; pushing the positioning instruction to the second application running on the mobile terminal; receiving, from the mobile terminal, location information obtained when the second application running on the mobile terminal performs positioning according to the positioning instruction; identifying a plurality of search results associated with the location information; and sending the location information and the plurality of search results associated with the location information to the first application running on the client device..
Tencent Technology (shenzhen) Company Limited
Systems and methods for application controlled network selection between narrowband and broadband wireless networks
A method, apparatus, and system for application controlled network selection between a broadband network and a narrowband network include operating an application with an end device with a narrowband connection to the end device; acquiring a source broadband connection comprising a source broadband network address; negotiating a peer-to-peer broadband connection with the end device utilizing the narrowband connection to communicate the source broadband network address; utilizing the peer-to-peer broadband connection for data associated with the application responsive to successful negotiating; and managing the peer-to-peer broadband connection using the narrowband connection as a control channel therefor. The narrowband connection can include digital mobile radio (dmr), land mobile radio (lmr), project 25 (p25), terrestrial trunked radio (tetra), or the like..
Motorola Solutions, Inc.
Audio commenting and publishing system
An audio commenting and publishing system including a storage database, media content and a computing device all coupled together via a network. The computing device comprises a processor and an application executed by the processor configured to input audio data that a user wishes to associate with the media content from an audio recording mechanism or a memory device.
Detecting anomaly action within a computer network
A method for network monitoring includes intercepting, in an anomaly detection module, a first data packet transmitted over a network in accordance with a predefined protocol to or from an entity on the network. Both a network address that is assigned to the entity and a strong identity, which is incorporated in the first data packet in accordance with the predefined protocol, of the entity are extracted from the intercepted first data packet.
Light Cyber Ltd.
System and methods of installing and operating devices without explicit network addresses
A method of discovering addressing information of one or more upstream devices to respond to specific messages by a second device on behalf of the one or more upstream devices in a network includes acquiring the addressing information in an upstream direction from one or more downstream devices to the one or more upstream devices. The method further includes acquiring the addressing information in a downstream direction from the one or more upstream devices to the one or more downstream devices.
Accedian Networks Inc.
Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (nats), or clouds
Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (nats), or clouds is disclosed. According to one exemplary method, the method occurs at a registration server configured to operate in a public network.
Multi-subnet participation for network gateway in a cloud environment
A network management server allocates network addresses to a network gateway connected to a public network after receiving an allocation request that specifies a number of network addresses to allocate to the network gateway. The network management server determines a first and second subnets of the public network ha mg respectively, first and second pools of available network addresses capable of being allocated to devices on the public network, and allocates one or more available network addresses from the first and second pools to the network gateway..
Initiating live presentation content sharing via radio frequency beacons
Systems, methods, and modes are disclosed for sharing presentation content displayed on a meeting room display during a meeting. The system comprises one or more presentation gateways each associated with a network address and configured for receiving and transmitting presentation content to a meeting room display during a meeting.
Crestron Electronics, Inc.
Method for continuous, frame-specific click-stream recording
A method for tracking a user's movements between network addresses can include, subsequent to a request for a (current) network address from a user, receiving the network address and an identifier for a region associated with the network address. The method can also include locating a record that contains the identifier for the region and a time that immediately precedes the request for the network address from the user.
Open Text S.a.
Method for setting up an uninterrupted communication connection and communication device
A method in which a monitoring unit allocated to a communication device checks, based on a name resolution protocol, whether a second communication network address allocated to the first communication device becomes valid in order to set up an uninterrupted communication connection to the communication device that is allocated to an industrial automation system, where in cases of an allocation of a new valid communication network address and an existing communication connection, the monitoring unit initiates a set-up of an additional communication connection using the new communication network address.. .
Safechannel encrypted messaging system
Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (os) running on a host device and a virtual machine running on top of the native os are presented. The host device includes a processor to communicate with an application having a target network address.
Portable encryption and authentication service module
Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address.
network address translating is contemplated to be of a type where a network address translator (nat), a carrier grade nat (cgn), or other type of translator may facilitate reconstruction of translated addresses in a manner that ameliorates the amount of data that must be stored to facilitate the reconstruction.. .
Cable Television Laboratories, Inc.
Mesh network addressing
In embodiments of mesh network addressing, a router registers an address for an end device and assigns a child identifier to the end device. The router encodes an endpoint identifier of the end device, and a router identifier of the router into an endpoint identifier, which the router incorporates into a routing locator (rloc) for the end device.
Devices, debugging network connectivity
The devices, systems, and methods test network connectivity, where the physical network is used to provide one or more service chains connecting service appliances, including firewalls, intrusion detection systems, load balancers, network address translators, web servers, and so on. A service chain may involve multiple routing paths.
Method and system for migration of virtual machines and virtual applications between cloud-computing facilities
The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing ip and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate..
Networked lighting such lighting apparatus to identify itself and communicate its network address
In various embodiments an apparatus configured to be connected to a lighting network and to control a first and a second lighting unit in response to at least one signal received via the lighting network is disclosed. In one example, the apparatus comprises a processor configured to receive an identification command, and in response thereto to execute an algorithm for communicating a network address associated with the apparatus, the algorithm comprising sequentially, for each bit of the network address: controlling the first lighting unit, to indicate a value of the bit by the lighting unit entering a state corresponding to the value of the bit, and causing the second lighting unit, to signal that the first lighting unit validly indicates the value of the bit and causing the second lighting unit to enter a state which indicates an end of the network address..
Koninklijke Philips N.v.
Provision of additional network addressable numbers on single mobile device
A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation
Provision of additional network addressable numbers on single mobile device with no calling number identifier
A method and system are described for servicing a second line service (“sls”) based communication request originating from a subscriber's telecommunications device (“td”) even if the call signal does not include sufficient information to identify the phone number from which the subscriber initiated the call. The method involves associating the sls phone number of the subscriber, the primary number of the subscriber and the primary number of a third party via a special relationship number..
Movius Interactive Corporation
Subnetworks of peer to peer networks
A respective identifier of each node of a plurality of nodes in a plurality of subnetworks of a peer to peer network may be generated. The identifier may include a node address identifying the node and a subnetwork address identifying a subnetwork in the plurality of subnetworks in which the node is located.
Hewlett Packard Enterprise Development Lp
Selecting network services based on hostname
In an embodiment, a method configures a network to route data on a first network service that connects a user's network with a service provider network. In the method, an instruction to route data from the network addressed to a hostname on the first network service is received, according to the hostname, a first ip address that addresses a server identified by the hostname is determined.
Level 3 Communications, Llc
Measurement method, apparatus, and system for minimization of drive tests
The present application discloses a method, an apparatus, and a system for minimization of drive tests (mdt), and relates to the field of communications technologies. In a technical solution, by obtaining a mapping relationship between a trace control entity (tce) address and a tce identifier, and according to the tce identifier included in the mdt report reported by the ue, a corresponding tce address is obtained and the mdt report is sent to a tce corresponding to the tce address.
Huawei Technologies Co.,ltd.
Content pre-render and pre-fetch techniques
Content pre-render and pre-fetch techniques are described. In one or more implementations, a likelihood is predicted of subsequent navigation to content associated with a network address based at least in part on monitored navigation performed by a computing device to one or more network addresses.
Microsoft Technology Licensing, Llc
Method, device and system for processing network address, wlan and ue
Provided are a method, device, system for accessing a network address, wlan and ue. The method comprises: a trusted wlan access network acquires a flow routing policy of a ue; and the trusted wlan access network allocates at least one network address for the ue according to the flow routing policy of the ue.
Managing network computing components utilizing request routing
Aspects of the disclosure will be described with regard to the processing of a client computing device dns queries by a dns processing service to determine an identifier associated with a previously instantiated hosted virtual machine instance. In one aspect, if the previously instantiated hosted virtual machine instance is instantiated, the dns service can resolve the dns query by transmitting network address information associated with the previously instantiated hosted virtual machine instance.
Amazon Technologies, Inc.
Base-station-to-base-station gateway and related devices, methods, and systems
The present disclosure relates to a base-station-to-base-station (bs-bs) gateway in a long term evolution (lte) cellular communication network and methods of operation thereof. In one embodiment, the bs-bs gateway receives information from a first base station which includes a hostname and a network address of the first base station.
Telefonaktiebolaget L M Ericsson (publ)
Method for setting up a secure communication connection, a communication device and connection controller
In the case of a secure communication connection to a communication device connected to the industrial automation system via a non-secure subnetwork, a monitoring unit checks whether a new communication network address assigned to the communication device for a connection to the non-secure subnetwork becomes valid. In the event of a change in a communication network address and in the case of a still existing secure communication connection, the monitoring unit transmits an address change notification via the existing secure communication connection, where upon receiving the address change notification, the set-up of an additional secure communication connection and a changeover from the existing secure communication connection to the additional secure communication connection are initiated..
Discovery of network address allocations and translations in wireless communication systems
A wireless user device is served by a wireless network that performs network address translation (nat). The wireless user device exchanges user data using a device ip address and a network gateway exchanges the user data with external systems using an external ip address.
Sprint Communications Company L.p.
System for electronically transferring assets
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, by a first computing device of a first user, for obtaining an image of a code presented on a display of a second computing device of a second user, deciphering the code to obtain an identifier of the second user and a signature, verifying that the signature is valid and, based thereon, initiating a first transaction: preventing the first user and the second user from entering into any other transactions until the first transaction is completed or canceled, receiving an acceptance of the first user to transfer a first amount of a digital currency to the second user, obtaining a digital currency network address of the second user based on the identifier, initiating the transfer through a digital currency network using the digital currency network address of the second user and a private key of the first user, reporting the transaction to a remote system, receiving a confirmation from the first user that a second amount of a real currency has been received from the first user, and sending a notification to the second device indicating that the transaction is complete.. .
Plutus Financial Inc.
Slot based management controller address
Techniques for determining an address of a management controller are provided. A microcontroller on a cartridge may read a signal from an enclosure, wherein the signal is associated with a slot in the enclosure.
Hewlett Packard Enterprise Development Lp
Ad hoc group bidding
A method includes storing locations of mobile devices that are registered for ad hoc grouping, and matching an access request that specifies a location that corresponds to a goal for an ad hoc grouping with candidate mobile devices that match the access request. The method also includes retrieving network addresses of the candidate mobile devices and sending invitations to join the ad hoc grouping.
Methods and systems for maintaining routing tables in an ad-hoc wireless network
Disclosed herein are methods and systems for maintaining routing tables in an ad-hoc wireless network. In an embodiment, a first node receives, from a second node having a second network address, a first data packet having a third network address as the source address and a fourth network address as the destination address.
Network address resolution
A content delivery network with at least one first content server bound to a first domain associated with a first characteristic (e.g., popular) associated with content servable from the content delivery network. The content delivery network includes at least one second content server bound to a second domain associated with a second characteristic (e.g., unpopular) associated with content servable from the content delivery network.
Network address resolution
A content delivery method, and related apparatus, that involves the operations of receiving a request for a content resource including at least one embedded resource with a tag. Upon identification of the tag, using at least one delivery parameter to generate a modified embedded resource.
Method and system for authenticating a user
The invention relates to a method for authenticating a user (10) at an entity (16), the method comprising the steps of detecting, by means of a contact module (20) of the entity (16), a contacting of the user (10) made in a browser of a terminal (12), and sending, by means of the contact module (20), a network address of an authentication module (24) of the entity (16) to a mobile device (14) of the user (10) in an authentication message, verifying the acceptability of an entity certificate of the authentication module (24) by means of the mobile device (14) based on the network address, and verifying acceptability of a user certificate of the mobile device (14) by means of the authentication module (24), and in case the entity certificate and the user certificate are acceptable, authenticating the user (10) at the entity (16) by establishing a communication channel (114, 120, 114, 120) between the mobile device (14) and the authentication module (24), whereas in case the entity certificate or the user certificate is not acceptable, rejecting the user (10) at the entity 16. The invention also relates to a system for authenticating a user (10) at an entity (16)..
Portable electronic device, server and connection method thereof
A portable electronic device including a network unit and a processing unit is provided. The processing unit is connected to the network unit.
Translating network address
In a process of establishing a tunnel between a hub device and a spoke device, the hub device in a dvpn obtains a public address and port information of a device in a public network after the public address and the port information are translated through a nat device. The hub device transmits the public address and the port information of the spoke device to a server in the dvpn, so that another spoke device obtains the public address and the port information to establish a direct tunnel with the spoke device..
Role based multicast messaging infrastructure
Certain embodiments of the present invention provide techniques that enable messages to be sent to a processing entity within a computing device without knowing the network address of the processing entity. In certain embodiments, instead of using the network address of the processing entity, a message can be communicated to the processing entity using information indicative of a role or state or function performed by the processing entity..
Forwarding policies on a virtual service network
In providing packet forwarding policies in a virtual service network that includes a network node and a pool of service load balancers serving a virtual service, the network node: receives a virtual service session request from a client device, the request including a virtual service network address for the virtual service; compares the virtual service network address in the request with the virtual service network address in each at least one packet forwarding policy; in response to finding a match between the virtual service network address in the request and a given virtual service network address in a given packet forwarding policy, determines the given destination in the given packet forwarding policy; and sends the request to a service load balancer in the pool of service load balancers associated with the given destination, where the service load balancer establishes a virtual service session with the client device.. .
A10 Networks, Inc.
Effecting communication events
Disclosed are methods and devices (e.g. Servers) for establishing a real-time communication event between a user of a client device and another user of another client device via a communication network.
Microsoft Technology Licensing, Llc
Detection of infected network devices and fast-flux networks by tracking url and dns resolution changes
A system and method for detecting fast-flux malware are presented. Domain name system (dns) lookup requests to dns servers from a local area network (lan) to a wide area network (wan) are monitored.
The Boeing Company
Communication system, communication apparatus, control apparatus, network device, communication method, control method, and program
A technique capable of changing communication services that can be provided by a communication system is provided. A communication system according to the present invention includes: first means that is capable of executing a network function for providing a communication service; and second means that adds a label corresponding to a network address that is assigned to a group of network functions, to a packet belonging to the group, and sends the packet to the network function which performs packet forwarding within the group based on the label..
Wireless network system and smart device management method using led lighting devices
The present disclosure provides a wireless network system and a smart device management method using led lighting devices. The wireless network system includes a wireless router and a plurality of led lighting devices with wi-fi modules that have wireless access and network switch capabilities.
Sengled Optoelectronics Co., Ltd
Method and system of providing ip-based packet communications in a utility network
A wireless communication system and method include a plurality of nodes that are part of a wireless local area network (lan), and a plurality of access points connected to the wireless lan and at least one wide area network (wan). At least one of the nodes registers with at least two of the access points, and, for each of the access points with which that node registers, obtain a unique network address corresponding to that access point, such that the node obtains a plurality of unique network addresses each respectively associated with a corresponding one of the access points with which the node registers.
Silver Spring Networks, Inc.
System and ubiquitous appliance control
A slave relay station is adapted to serve and/or host pages comprising a simplified graphic user interface (gui) encoded in a widely recognized format such as, for example, html or wml. The gui embodies activatable links corresponding to control functions for configured appliances.
Universal Electronics Inc.
Initiating a conference call via radio frequency beacons
Systems, methods, and modes are disclosed for initiating a conference call on a conferencing endpoint from a portable electronic device. The system comprises a conferencing endpoint associated with a network address and configured for receiving conferencing information and using said conferencing information to dial a conference call.
Crestron Electronics, Inc.
Convenient wifi network access using unique identifier value
A wifi network manager stores a unique identifier value such as a network address associated with a communication device as being a valid credential for the communication device to subsequently access a wifi network including one or more access points. The wifi network manager monitors use of the unique identifier value to access the wifi network.
Time Warner Cable Enterprises Llc
Implementing network communication
When a node device receives a packet transmitted from a device connecting with the node device, the node device searches a public network address of a next hop in a first table according to a private address of the next hop, searches for an ipsec security association (sa) in a second table according to the public network address searched out, performs ipsec encapsulation for the received packet by use of the ipsec sa corresponding to the public network address, and transmits the packet.. .
Hangzhou H3c Technologies Co., Ltd.
Methods, systems, and apparatuses for providing a single network address translation connection for multiple devices
Techniques and systems for operating a device as a proxy network address translation device for other devices are provided. For example, a method, computing device, or computer-program product may be provided.
Belkin International, Inc.
Method for processing raw ip packet and device thereof
Methods for processing a raw internet protocol (ip) packet and corresponding devices are provided. A method is applied on a broadband network gateway (bng) side, and the method includes that after it is acquired that a customer premises equipment (cpe) goes on line, a public network ip address and a public network identifier range are allocated to the cpe; and after a downlink raw ip packet is received, the packet is forwarded to a corresponding cpe according to a destination ip address of the packet and a route of a public network identifier, another method is applied on a cpe side, and the includes that: a public network ip address and a public network identifier range allocated by a bng are received; after an uplink raw ip packet transmitted by a user is received, a source ip address in the packet is replaced with the public network ip address, a value of an identifier field in the packet is replaced with a value in the public network identifier range allocated by the bng, and then the uplink raw ip packet is transmitted to the bng.
Method for accessing a digital network by way of one or more internet service providers
Described herein is a method for accessing a digital network. For example, the method may include receiving a message from a network access device at a first internet service provider, and sending at least a portion of the received message through a network to an access service provider.
Image monitoring framework
A computing platform may receive, from a network device, a message identifying data that was transmitted by a user device located in a private network associated with an organization. The network device may be located at a boundary between the private network and a public network.
Bank Of America Corporation
Context-aware distributed firewall
A context-aware distributed firewall scheme is provided. A firewall engine tasked to provide firewall protection for a set of network addresses applies a reduced set of firewall rules that are relevant to the set of addresses associated with the machine.
Cooperative network architecture
A method for transmitting information relating to a communication network, implemented by a first server of a communication network, the method comprising the following steps: storing a data table matching identifiers of subnetworks of the communication network associated with respective qualities of service, with at least one network address of a user terminal, the network address comprising an ip address of the user terminal; receiving a request from a second server of a service provider, the request requesting information linked to said communication network; transmitting at least a part of the data table to the second server, the part comprising the matches between each subnetwork identifier and the at least one network address of a user terminal.. .
Key management system for toll-free data service
A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may perform a validation operation to validate that the network address is associated with the toll-free data service.
Verizon Patent And Licensing Inc.
Process for assigning a network address to a terminal network-element, network, interconnection network-element, addressing server and associated terminal network-element
The invention relates to a process for assignment, by an addressing server for a network, of a network address to a terminal network-element connected to one of the connection ports of one of the interconnection network-elements of said network, comprising: transmission of a network address request by said terminal network-element to said interconnection network-element, the determination by said interconnection network-element of a location of said terminal network-element where said location combines a topological identifier for said interconnection network-element with at least one identifier for said connection port, the transmission by said interconnection network-element to said addressing server of said request with said location, assignment by said addressing server to said terminal network-element of said network address based on said location.. .
Optimizing global ipv6 address assignments
In one embodiment, a device in a network determines that one or more network nodes should use a stateful address configuration protocol to obtain network addresses. The device causes the one or more network nodes to use the stateful address configuration protocol, in response to determining that the one or more nodes should use the stateful address configuration protocol to obtain network addresses.
Cisco Technology, Inc.
Method, apparatus and system for determining content acquisition path and processing request
The present disclosure provide a method for determining a content acquisition path, a method for processing a content request and a corresponding apparatus and system. The method for determining the content acquisition path includes: receiving a request from a user, where the request is used for requesting an original content provider to provide a content, and the request carries a name of the content, a network address of the original content provider and a network address of the user; calculating at least two forwarding paths to the original content provider, and determining a content acquisition path according to link cost on each forwarding path and a cache hit rate of a network node on each forwarding path to the content; and sending the request to a next network node according to the content acquisition path, for enabling the next network node to forward or respond to the request..
Huawei Technologies Co., Ltd.
Parallel multipath routing architecture
Disclosed are various embodiments for a parallel multipath routing architecture. An edge node of an overlay network receives packets to be communicated to a destination network address.
Determining physical location of a networked computing device
Techniques for determining location of a networked computing device are presented herein. An association module may be configured to associate two or more co-located computing devices based on an association selected from the group consisting of a common user, network address similarities, local communications between the two or more co-located computing devices, and co-location patterns.
Network address translation
Systems and methods for connecting a network using one network protocol with a network using another network protocol are provided. According to an embodiment, a method is provided for performing network address translation.
Transmission network address translation traversal
A transmission system and a transmission method for network address translation traversal are provided. The transmission system includes a private network device, a network address record device, a public network device and a network address translation server.
Institute For Information Industry
Conveying device-dependent context in a network address
A method for conveying context information that governs packets flowing in at least a first direction between at least one wireless device and a corresponding node communicating with the device comprises an embedder node populating a context portion, of a header of a packet for flow in a second reverse direction, that, once populated with context information that governs packet flow in the first direction, is imparted in the packet flow along the network in either the first or second direction and is conveyed in both directions, an unpacker node retrieving the context information from the context portion of a packet flowing in the first direction, and a configurer node applying the retrieved information to govern packet flow in the first direction therefrom. The embedder, unpacker and/or configurer nodes can be the same..
Huawei Technologies Co., Ltd.
Method and system protecting against identity theft or replication abuse
A method, implemented by a computer-implemented authentication system, for authenticating a user attempting to access a target component of a computer system, the method comprising: a) receiving, from a first user system via a computer network, user authentication information and a network address identifying the first user system within the computer network; b) obtaining at least one data item of contextual information indicative of a property of an environment of a wireless communications device associated with the user authentication information; c) authenticating the user based on at least the user authentication information; and d) subject to successful authentication, granting access to the target component and storing a data record comprising the received network address and the received contextual information.. .
Sms Passcode A/s
Changing group member reachability information
In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.. .
Cisco Technology, Inc.
Method and device for forwarding packet
Provided is a method for forwarding a packet, which includes that: when a matched network address port group translation entry is found according to a source internet protocol (ip) address and a source port number of a received packet, or according to a target ip address and a target port number of the received packet, the packet is translated according to the network address port group translation entry and then sent out. Also provided is a device for forwarding a packet.
Network control method and system
A network address determining unit determines a network address in an ip network between a parent node and a plurality of child nodes from the ip address of the parent node on the basis of a received subnet mask value assigned to the parent node. A host address determining unit determines the host address of a child node in the ip network from a logical address assigned to the child node.
Dynamically assigning network addresses
Dynamically assigning network addresses provided by a server in a network to virtual network adapters in virtual machines, in which a reassignment of the assigned network addresses due to suspending virtual machines is prevented. Network addresses of the virtual machines in the network are logged.
International Business Machines Corporation
Method for setting up a local control channel between a control unit and a building-internal access portal
A method sets up a local control channel between a control unit for controlling a building-internal electrical component, connected to a building-internal access portal, and the access portal, by authenticating the control unit against a building-external authentication server via a building-external communication network; transmitting a network address of the building-internal access portal using the building-external authentication server to the control unit upon successful authentication of the control unit against the building-external authentication server via the building-external communication network; transmitting an access authorization for the building-internal access portal to the control unit using the building-external authentication server via the building-external communication network upon successful authentication of the control unit against the building-external authentication server via the building-external communication network; and setting up the local control channel between the control unit and the building-internal access portal in response to receiving the network address of the building-internal access portal and the access authorization.. .
Deutsche Telekom Ag
Configuring a device in a network
A method is disclose that may include sending, from a management device to a monitoring device, a request for a network address associated with a configuration setting for the service provided by the monitoring device that generated the event message. The method may include receiving, in the management device and from the monitoring device, the network address.
Methods, systems and apparatus to remotely start a virtual machine
Methods and apparatus to remotely start a virtual machine are disclosed herein. An example method to remotely start a virtual machine includes requesting, at a network device, allocation of a network address to the network device, the network address formerly being allocated to the virtual machine and generating, with the network device, a user interface.
Methods, systems, and related architectures for managing network connected thermostats
A device management system facilitates an automatic pairing of an electronic device with a management account. The device management system receives a public network address associated with a computer device on a private network accessing the management account.
Distribution of media content to wireless communication devices
A data processing system facilitates content-delivery to a wireless communication device over a plurality of content delivery networks (cdns). The data system receives internet protocol (ip) address data sets characterizing ip access to the wireless communication device through one or more ip access networks.
Sprint Communications Company L.p.
Sharing content using a dongle device
A content sharing device may receive, from a content providing device, information that identifies content to be shared with a dongle device via a content sharing service. The content sharing device may receive, from the content providing device, information that identifies a contact with which the content is to be shared.
Verizon Patent And Licensing Inc.
Docsis provisioning of point-to-point ethernet
A system for provisioning of point-to-point ethernet data services via a cable provisioning infrastructure, including cpes, and floor switches that include customer-facing ports, each cpe being connected to a customer-facing port, and a cable operator distribution hub, including aggregation switches, each floor switch being connected to one aggregation switch, a gateway server, and an operations support system server provisioning cable data services to the subscribers, including a host configuration server dynamically allocating network addresses to the cpes, wherein the aggregation switches and the gateway server are configured to intermediate as a double-relay for initial network address request messages between the cpes and the host configuration server, whereby the aggregation switches relay the messages to the gateway server, and the gateway server relays the messages to the host configuration server, and wherein the gateway server is operable to add host configuration server options to messages that it relays.. .
Load balancer bypass
Redirecting message flows to bypass load balancers. A destination intermediary receives a source-side message that includes a virtual address of a load balancer as a destination, and that is augmented to include a network address of a destination machine as a destination.
Controlled use of a hardware security module
Methods are provided for using a hardware module connectable to multiple computer systems, where the multiple computer systems are connectable to a server within a common network. The method includes: providing a network address of the server in persistent memory of the hardware security module; providing an encrypted secret entity in the persistent memory of the hardware security module; providing a private key in the persistent memory of the hardware security module; and based on the hardware security module being connectable to one of the computer systems, the method includes: establishing a secure connection between the hardware security module and the server; retrieving, via the secure connection, a wrapping key from the server and storing it in volatile memory of the hardware security module; and decrypting the encrypted secret entity with the wrapping key and storing the decrypted secret entity in the volatile memory of the hardware security module..
Applying a packet routing policy to an application session
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In routing data packets of an application session, the security gateway: recognizes the application session between a network and an application; determines a user identity from an application session record for the application session; determines packet routing policies applicable to the application session based on the user identity; receives a data packet for the application session, including a source network address and a destination network address; compares the source network address with the host network address, and the destination network address with the application network address; and in response to finding a match between the source network address and the host network address, and between the destination network address and the application network address, processes the data packet using the forwarding interface of the packet routing policy..
Central namespace controller for multi-tenant cloud environments
A centralized namespace controller allocates addresses in a distributed cloud infrastructure on-demand. Upon receiving a request to allocate addresses for a network to be provisioned by a cloud computing system included in the distributed cloud infrastructure, the centralized namespace controller allocates a network address that is unique within the distributed cloud infrastructure.
Methods and systems for managing network addresses in a clustered storage environment
Methods and systems are provided for a clustered storage system. The method assigns a network access address to a virtual network interface card (vnic) at a first cluster node of a clustered storage system, where a physical network interface card assigned to the network access address is managed by a second cluster node of the clustered storage system; and use the vnic by a virtual storage server at the first cluster node to communicate on behalf of the second cluster node..
Fast adjusting load balancer
Some embodiments of the invention provide a load balancer for distributing packet flows that are addressed to a group of data compute nodes (dcns) amongst the dcns of the group. In some embodiments, the load balancer includes a connection data storage comprising several different destination network address translation (dnat) tables.
Barefoot Networks, Inc.
The disclosed subject matter may provide a system and methods for commissioning a device or appliance into a network. A processor may detect the insertion of a removable device into a data receptacle of a first device.
Methods for operating interactive whiteboards and apparatuses using the same
The invention introduces a method for operating interactive whiteboards, performed by a processing unit of a control node, which contains at least the following steps. A connected-device display region, a multi-screen layout region and a whiteboard display region are provided on an interactive display device.
Game scrapbook system, game scrapbook method, and computer readable recording medium recording program for implementing the method
A game scrapbook system associated with a game progress includes: a data table setting setup information by recording at least one game environment associated with a generation of a predetermined event signal; an event signal generation unit generating the event signal when a game environment according to a game progress corresponds to at least a portion of the setup information; an image capturing unit, in response to the event signal, capturing a game image to generate game image information; and an image transmission unit transmitting the generated game image information to a remote location in a network using a network address.. .
Nhn Entertainment Corporation
Facilitation of mobility management across various radio technologies
A more efficient network can be achieved using software-defined networking to configure routing tables to route data traffic to and from proper cells. User equipment address data and network device internet protocol address data can be utilized to define locators specific to a user equipment device in relation to various network devices.
At&t Intellectual Property I Lp
Media session between network endpoints
A media session is established between a first endpoint and a second endpoint via a communication network based on connectivity checks performed by the endpoints. A set of candidate pairs, each comprising a first network address available to the first endpoint and a second network address available to the second endpoint, is generated.
Microsoft Technology Licensing, Llc
Media session between network endpoints
A media session between an initiating endpoint and a responding endpoint is established via a communication network. A set of candidate pairs is generated, each comprising a respective network address available to the initiating endpoint and a respective network address available to the responding endpoint by exchanging network addresses between the initiating endpoint and the responding endpoint.
Discovery of cloud-based access-point controllers
Note that the cloud-based controller may be one of multiple cloud-based controllers from different providers, and the access point may be associated with the cloud-based controller based on the received information specifying unique network address.. .