|| List of recent Network Address-related patents
| Method and mitigating distributed denial of service attacks|
An approach for mitigating distributed denial of service (ddos) attacks includes assigning a set of temporary network addresses to a hostname for a finite period and assigning one or more other sets of temporary network addresses to the hostname in one or more following finite periods, responding to a hostname lookup request based on the set of temporary network addresses, the one or more other sets of temporary network addresses, or a combination thereof that are active, responding to a network address lookup request based on at least one of the set of temporary network addresses and the one or more other sets of temporary network addresses that is associated with a current one of the finite period or the one or more following finite periods, and retiring the set of temporary network addresses, the one or more sets of temporary network addresses, or a combination thereof after a configurable number of finite periods, wherein no further network address or hostname lookup request is served based on the retired set of temporary network addresses, the retired one or more sets of temporary network addresses, or a combination thereof.. .
Verizon Patent And Licensing Inc.
| Network address mapping to nearby location identification|
In one implementation, software workload or device addresses (e.g., ipv4 or ipv6 addresses) are mapped to a nearby physical location identification. The physical location of a dematerialized workload or a device is determined by associating the network address of the dematerialized workload or device to the address of a physical tag.
Cisco Technology, Inc.
| Monitoring nat behaviors through uri dereferences in web browsers|
A method comprising dereferencing, in a web browser, a uniform resource identifier (uri) comprising a web resource and a reflex tag, creating a request message comprising a request for the web resource and a reflex request corresponding to the reflex tag, wherein the reflex request is a request for address and port information from a web server comprising the web resource, encapsulating the request message in a transport message comprising an internet protocol (ip) address and a port of the web browser, transmitting the transport message to the web server, receiving a response message from the web server, wherein the response message comprises a second ip address and a second port number of the browser as seen by the web server, and determining a characteristic of at least one network address translation (nat) device coupled between the web browser and the web server based on the second ip address and second port number.. .
Futurewei Technologies, Inc.
| Methods, systems, and related architectures for managing network connected thermostats|
A thermostat management system facilitates an automatic pairing of a thermostat with a thermostat communication account. The thermostat management system receives a public network address associated with a computer device on a private network accessing the thermostat management account.
| Networked gaming system and method|
A system for providing live-play, network-based gaming to players is described, the system comprising first and second gaming devices in communication with a gaming server, the gaming server for determining whether to allow the second player to play the game of chance and/or skill against the first player or with the first player against a house entity based on a location of the first electronic gaming device and the location of the second electronic gaming device, wherein the location of the first electronic gaming device and the second electronic gaming device are determined using a first network address pre-assigned to the first electronic gaming device and a second network address pre-assigned to the second electronic gaming device, respectively.. .
| System and registering an ip telephone|
A system and method for establishing connection of an ip telephone to a network may include, in response to receiving a registration request from an ip telephone, generating a command to cause network access devices to ping the ip telephone. The command may be communicated to the network access devices.
Centurylink Intellectual Property Llc
| Open communication method in a heterogeneous network|
An open communication method between at least two sub-networks using a broker node. Each of the sub-networks has a different routable network addressing scheme.
Toyota Infotechnology Center Usa, Inc.
|Digital multimedia recorder with functionality following loss of provider network service|
A network addressable appliance with digital multimedia recording capabilities has limited access including playback of stored multimedia content upon faulty connection with a service provider network. Upon a connectivity event, the network addressable appliance compares a retrieved hardware address for a connected residential gateway to a stored hardware address for an assigned residential gateway.
At&t Intellectual Property I, L.p.
|Method and system for remigration of virtual machines and virtual applications between cloud-computing facilities|
The current document discloses methods and systems for extending an internal network within a source cloud-computing facility to a new target cloud-computing facility and redeploying a virtual machine or virtual application previously running on a target cloud-computing facility within the context of an extended internal network in the target cloud-computing facility. The currently disclosed methods and systems, which allow a virtual machine or virtual application formerly executing on a target cloud-computing facility to resume execution on a new target cloud-computing facility, using the computational and storage facilities of the new target cloud-computing facility but depending on network support from the source cloud-computing facility, without changing ip and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate..
|Method and system for migration of virtual machines and virtual applications between cloud-computing facilities through multiplexed secure tunnels|
The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing ip and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate.
Method and system for migration of virtual machines and virtual applications between cloud-computing facilities
The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing ip and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate..
Method and system for configuring sharing input apparatus among devices
A method and a system for configuring sharing of an input apparatus among devices are provided. The method includes: receiving an instruction for configuring sharing of an input apparatus among devices, where the devices include this device and at least one adjacent device; sending an adjacent device search request message by using a communications module of this device; receiving device information fed back by the adjacent device; analyzing a device name and a network address of the adjacent device according to the device information; and transferring a configuration file of configuring sharing of the input apparatus among devices to the adjacent device, so that the adjacent device configures sharing of the input apparatus among devices according to the configuration file.
Huawei Technologies Co., Ltd.
Method and system for optimizing a network by independently scaling control segments and data flow
A server array controller that includes a data flow segment (dfs) and at least one control segment (cs). The dfs includes the hardware-optimized portion of the controller, while the cs includes the software-optimized portions.
F5 Networks, Inc.
Providing custom names for headless devices
A headless device does not have a user interface that conveniently allows the user to enter a custom name for the headless device. In this disclosure, a custom name may be determined (either automatically or via user input) at a user device, such as a user device that has a user interface.
Method for performing transactional communication using a universal transaction account identifier assigned to a customer
A method for sending a transactional message assigns a universal transactional account (uta) identifier to a customer, associates the assigned uta identifier with a customer account corresponding to the customer, assigns an account network address corresponding to a service provider, stores, in a routing database, the uta identifier in association with the account network address, creates, using a second terminal including a processor, the transactional message comprising the uta identifier and a value, and sends the transactional message to the service provider, the sending the transactional message to the service provider including using the routing database to look up the account network address corresponding to the uta identifier and transmitting the transactional message to the account network address.. .
System and monitoring network traffic
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined.
At&t Intellectual Property Ii, L.p.
System and distributed multi-processing security gateway
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a server side session, receives a data packet, assigns a central processing unit core from a plurality of central processing unit cores in a multi-core processor of the security gateway to process the data packet, processes the data packet according to security policies, and sends the processed data packet. The proxy network address is selected such that a same central processing unit core is assigned to process data packets from the server side session and the host side session.
A10 Networks, Inc.
Dns package in a partitioned network
A domain name system (“dns”) package and a method for providing domain name resolution services in a partitioned network are disclosed. The system may include one or more built-in root name servers; one or more built-in top level domain (“tld”) name servers; and a recursive name server.
Apparatus for detecting stolen automotive components
In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a decryption/encryption module, and a network address. Upon assembly of a vehicle, the components form addressable nodes of that vehicle.
Data processing method, in an ad hoc radio communication network, radio communication stations and corresponding computer programmes
A method for data processing, in an ad hoc radio communication network including a set of radio communication stations each forming a node of the ad hoc network, in order to create a group of stations, including the following steps: creating by a first station of a first message indicating the network address of the group and the network addresses of the stations in the group; transmitting from all of the stations in the ad hoc network, the said first message; upon receipt of the said first message by the said station, each station: records in a lookup correlation-mapping table, the network address of the group in correlation with the network addresses of the stations in the group; and if the network address of the said station is present among the network addresses of the stations in the group, records the network address of the group indicated in the first message as the group address of the said station.. .
Advanced bacnet router
In a bacnet internetwork, a bacnet router is configured to improve communications between bacnet devices by caching the addresses and data parts of messages sent between the devices, for diagnostic purposes, to avoid duplication of information, perform proxy functionality and address duplicate device and network address information.. .
Method and system of providing ip-based packet communications in a utility network
One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device.
Silver Spring Networks, Inc.
A method for offering a purchase incentive from a retail merchandiser to a retail customer through a handheld customer communications device is executed at least in part by a computer system and includes receiving, at a first processor having a network address, data from an encoding that is scanned and wirelessly transmitted from the handheld customer communications device. A product that is associated with the encoding data is identified and a wireless address that is associated with the handheld customer communications device is recorded.
Uniteu Technologies, Inc.
Mobile phone docking station vpns
A device includes a memory that stores multiple different types of applications and a data table, and a processing unit. The processing unit is configured to receive configuration data that sets up multiple network interfaces on the device, and assigns one of multiple different network addresses to each of the multiple network interfaces, store the configuration data in the data table, execute a first type of application of the multiple different types of applications, receive one or more first packets from executing the first type of application of the multiple different types of applications, retrieve a first virtual private network (vpn) identifier associated with a first vpn from the data table based on the first type of application of the multiple different types of applications, and send the one or more first packets via the first vpn identified by the first vpn identifier..
Verizon Patent And Licensing Inc.
User equipment having web real time communication architecture
A communication device configured to provide web real-time communication (webrtc) for interne protocol (ip) multimedia services utilizing one or more 3gpp protocols. The communication device can be configured to authenticate communication with one or more clients using one or more ip multimedia subsystem (ims) credentials.
System and evaluating performance and evolution ability of network address and identification schemes
In a method, formal descriptions of network address and identification schemes are received. Then validity and completeness of the formal descriptions are verified.
Selectively using network address translated mapped addresses based on their prior network reachability
In one embodiment, network address translated (nat) mapped addresses are selectively used based on their prior network reachability. One embodiment maintains for each particular mapped address (e.g., nat public address pool member), a reachability status level based on prior usage of the particular mapped address to communicate with external destinations.
Cisco Technology, Inc., A Corporation Of California
Method for sharing media content, terminal device, and content sharing system
A method for sharing media content, a terminal device, and a content sharing system are provided. A method for sharing media content may include: obtaining, by a first terminal device, m network addresses from the n second terminal devices; obtaining, based on the m network addresses, m pieces of media content from a content server, editing the m pieces of media content obtained from the content server to obtain first media content, and generating editing information according to an editing manner used when the first media content is obtained; sending the editing information to the content server; receiving a second network address sent by the content server; and publishing the second network address on a social networking server.
Huawei Technologies Co., Ltd.
Systems and methods for a data center architecture facilitating layer 2 over layer 3 communication
An information handling system is provided. The information handling system includes a plurality of core devices coupled to each other and to a plurality of distribution devices and a plurality of top-of-rack devices coupled to a plurality of servers and to the distribution devices.
Dell Products L.p.
Techniques for selected internet protocol traffic offload support at an assisting enodeb
Techniques are described for selected internet protocol traffic offload (sipto) support at an assisting enodeb. A connection may be established between a first enodeb and a ue, and it may be determined whether a connection exists or is pending between the ue and a second enodeb.
Mitigating a cyber-security attack by changing a network address of a system under attack
In response to determining that a computer is undergoing a cyber attack, a newly assigned ip address is received for the computer. A currently assigned ip address of the computer is changed to the newly assigned ip address..
International Business Machines Corporation
Distributed network interfaces for application cloaking and spoofing
Systems and methods associated with distributing an application's network interface over nodes of a networking fabric are presented. Nodes of the fabric can operate as interface modules, each taking on a role or responsibility for a portion of the application's network address including ip address, port assignments, or other portions of the network address.
Nant Holdings Ip, Llc
Streaming media search and playback system
A method is provided for playing back media from a network. The method includes receiving a search criteria from a network enabled device.
Migration of guest bridge
A system and method for migrating a guest bridge are provided. An example method includes maintaining at a guest bridge a set of forwarding tables including a set of mappings from a network address to at least one virtual network interface of a set of virtual network interfaces.
Red Hat Israel, Ltd.
Ensuring data quality by filtering network address observations
In one embodiment, a filtering technique is provided for ensuring data quality of network address observations. A network address observation is obtained of a network address associated with a source device, the network address observation associating the network address with one or more directly observed attributes.
Skyhook Wireless, Inc.
Method to publish remote management services over link local network for zero-touch discovery, provisioning, and management
A system, method, and computer-readable medium are disclosed for using zero configuration networking (zeroconf) to automate the discovery of the internet protocol (ip) network address of a remote access controller (rac). A rac service associated with a networking device is registered programmatically or as a result of receiving user input to a command line interface.
Dell Products L.p.
Processing multiple network address observations
In one embodiment, a processing technique is provided that utilizes multiple network address observations. One or more records are obtained that maintain network address observations, each network address observation associating one or more attributes with a network address observed by one or more source devices.
Skyhook Wireless, Inc.
Data redirection system and method therefor
A data redirection system and method comprises a first and second redirector in one or more embodiments. The first redirector may receive and respond to requests for a network service by redirecting a client's request to the second redirector.
Propagating attributes between network addresses
In one embodiment, a technique is provided for propagating network address to attribute associations between network addresses. One or more profiles are obtained that maintain an association between a first network address and one or more attributes, the association produced from network address observations of the first network address by one or more source devices in communication with a network.
Skyhook Wireless, Inc.
Method for managing computer network access
A client computer initiates a first communication session at a first network address and receives therefrom a second network address. The client computer then initiates a second communication session at the second network address and receives therefrom an access configuration including a control setting for a communication protocol capable of being utilized during a third communication session.
Helios Software, Llc
Determining fixed/mobile and proxy/non-proxy network addresses
In one embodiment, a processing technique is provided for determining a refined attribute of a network address based on one or more other attributes. A network address associated with a source device in communication with a network is observed.
Skyhook Wireless, Inc.
Mapping/translation techniques for generating associations between network addresses and attributes that were not directly observed
In one embodiment, a mapping/translation technique is provided for generating an association between an observed network address and one or more attributes that are not directly observed. A network address is observed that is associated with a source device.
Skyhook Wireless, Inc.
Method and system for mobile terminal to access the network through cell phone
A method for a mobile terminal to access a network through a cell phone is provided. The mobile terminal may be connected to a network enabled cell phone via a wifi (wireless fidelity) connection mode, and the network enabled cell phone may serve as a gateway router.
Huizhou Tcl Mobile Communication Co., Ltd
Video transmission system
A video analysis system includes memory having stored therein video analysis software and a processor configured to execute the video analysis software to receive from a mobile video system a dynamic network address, to associate the dynamic network address with a unique identifier of the mobile video system in the memory, and to communicate with the mobile video system using the dynamic network address based on selection by a user of the unique identifier.. .
Utc Fire & Security Corporation
Method, apparatus, and system for network address translation
A method, an apparatus, and a system for network address translation related to the field of communications technologies. A nat control apparatus receives a network address migration message after a first data center migrates a nat mapping entry corresponding to a migrated virtual machine vm to a second data center, verifies the network address migration message, and updates home information of the nat mapping entry in a network address mapping table from the first data center to the second data center according to the network address migration message.
Huawei Technologies Co., Ltd.
Redistributing sources for adaptive bit rate streaming
A system includes one or more network media service devices, with each network media node operably connected upstream to one or more gateway devices. At least one of the network media service devices is configured to intercept an abr-related request to receive digital media content for a media channel sent from a client set top box to a remote abr server located upstream from the at least one network media device, identify a second gateway device that is storing the digital media content, the second gateway device having previously received the digital media content from the remote abr server, and return a network address of the second gateway device to the client set top box for use by the client set top box to receive the digital media content from the second gateway device.
Lan multiplexing apparatus
The control device of a lan multiplexing apparatus performs a process to encapsulate a mac frame received from at least any one of the lan and the wireless lan with a packet header including a packet network address including at least a multiplexing identifier and a mac address and to send the encapsulated packet to the packet network, and a process to send a mac frame obtained by decapsulating a packet received from the packet network to at least any one of the lan and the wireless lan corresponding to a destination of the mac frame.. .
Multi-device monitoring and control using intelligent device channel sharing
A physical network address of one of a set of wireless customer-premise monitoring devices is translated to a shared logical device physical network address in response to receipt from an application server of a first data packet addressed to the physical network address. The shared logical device physical network address forms a logical device group and physically addresses each of the set of wireless customer-premise monitoring devices over a single wireless communication channel.
International Business Machines Corporation
Systems and methods for secured global lan
This invention relates to a method and a network device for establishing a virtual private network (vpn) among local area networks (lans). The method uses a cloud controller that has a static ip address to control a plurality of network devices.
Stratusee Technologies, Inc.
Vendor specific base station auto-configuration framework
There are provided measures for a unified (i.e. Multi-vendor, multi-rat, and multi-nem capable) network element auto-configuration framework.
Nokia Solutions And Networks Oy
Multiprotocol label switching transport for supporting a very large number of virtual private networks
A network node for forwarding a data packet to a virtual network. The network node may maintain a table comprising one-to-one mapping information between one or more virtual private network (vpn) labels and one or more identifying labels for a destination virtual network.
Futurewei Technologies, Inc.
System and method employing an agile network protocol for secure communications using secure domain names
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link..
System and methods of installing and operating devices without explicit network addresses
A method of discovering addressing information of one or more upstream devices to respond to specific messages by a second device on behalf of the one or more upstream devices in a network includes acquiring the addressing information in an upstream direction from one or more downstream devices to the one or more upstream devices. The method further includes acquiring the addressing information in a downstream direction from the one or more upstream devices to the one or more downstream devices.
Accedian Networks Inc.
A public network links a plurality of nodes, each associated with at least one network address. A transport network connects a plurality of routers, each of which is also connected to the public network.
Media Network Services As
Intermediary content provider
Methods of providing published content are presented. Content providers, including advertisers, can have their network addresses become black listed through no fault of their own.
That Is, Llc
System and signaling and data tunneling in a peer-to-peer environment
An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables an endpoint to use a tunneling server to bypass a network address translation (nat) device that is blocking messages to an endpoint on the other side of the nat device..
Provisioning a secure customer domain in a virtualized multi-tenant environment
To provision a secure customer domain in a virtualized multi-tenant environment, a virtual machine (vm) is configured for a customer in the customer domain. A first, second, and third virtual network interfaces (vnics) are configured in the vm.
International Business Machines Corporation
Controlling the status of network address space
Methods, computer systems, and computer readable media provide for automated control of the status of network address space. Blocks of networking address space assigned to a network may be allocated from a free status to a new status based upon a request to allocate a particular size block.
Information processing apparatus and recording medium
An information processing apparatus includes plural network interfaces, a specifying unit, a setting unit, and an assigning unit. The plural network interfaces include a first network interface for connection of the apparatus to a network, and a second network interface for direct wireless connection of another device to the apparatus.
Fuji Xerox Co., Ltd
Content pre-render and pre-fetch techniques
Content pre-render and pre-fetch techniques are described. In one or more implementations, a likelihood is predicted of subsequent navigation to content associated with a network address based at least in part on monitored navigation performed by a computing device to one or more network addresses.
Systems and methods for providing atc center data to aircraft
Systems and methods for providing air traffic control center data to aircraft is provided. In certain embodiments an avionics system includes a communication device configured to communicate with a data center and an air traffic control center; and a processing unit configured to execute machine readable instructions.
Honeywell International Inc.
Controlling loads and collecting building information via ip networks
The subject matter disclosed herein provides methods for controlling loads in an ip network that is divided into one or more zones and/or subzones. In one aspect, there is provided a method that can associate a plurality of controllers with one of a plurality of zones.
Reduced power location determinations for detecting geo-fences
Various different areas of interest are identified, these areas being geographic areas that are also referred to as geo-fences. Whether a computing device is in a geo-fence can be determined based on the location of the geo-fence and the location of the computing device.
Dvpn large-scale networking and spoke
According to an example a dynamic virtual private network (d-vpn) large-scale networking method includes establishing, by a spoke, a dvpn channel with a hub; issuing, by the spoke, subnet information about the spoke to the hub; and obtaining, by the spoke, subnet information about the hub and another spoke as well as corresponding private network address of a next hop sent by the hub.. .
Hangzhou H3c Technologies Co., Ltd.
Early network notification in live migration
The sending of an early notification when a guest migrates in a virtual machine system is described. A guest hosted by a computer system is migrating from a source hypervisor to a target hypervisor.
Domain name system bypass in user applications
Disclosed herein are methods, systems, and software for bypassing a domain name system. In one example, a method of operating a user communication device includes receiving a user instruction requesting content within a user application of the user communication device.
Request routing in a networked environment
A system, methods, and interfaces for managing request routing functionality associated with resource requests for one or more resources associated with a content provider. The request routing functionality can correspond to the processing of domain name service (“dns”) requests for resources by computing devices and the resolution of the dns requests by the identification of a network address of a computing device that will provide the requested resources.
Management of network devices within a dispersed data storage network
A method of managing devices in a dispersed data storage network is disclosed. A device list is maintained including entries for every device in the dispersed data storage network.
System and using an ordinary article of commerce to access a remote computer
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates uniform product code (“upc”) numbers to internet network addresses (or “urls”).
Systems, methods and apparatus to apply permissions to applications
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address having a second network address associated with a second entity to execute the application, an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted, and a shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to transmit the signed message to the second entity with an indication of authorization via the first network address in response to a match in the trusted address database, and transmit the signed message to the second entity with an indication of non-authorization via the first network address in response to a lack of a match in the trusted address database..
System and distributed load balancing with distributed direct server return
Embodiments may include a load balancer that receives a request packet sent by a remote client to an original destination address of multiple network addresses serviced by the load balancer, and selects according to a load balancing protocol, a host computer of a plurality of host computers to process the request. The load balancer may, from among a plurality of ports on the selected host computer, select a particular port having a one-to-one association with the original destination address, the association specified by mapping information accessible to the load balancer, and send the request packet to the selected port on the selected host computer.
Detecting and correcting network interruptions using network address translation
Embodiments provide a network address translation (nat) service for network devices. A network connection from at least one private network device to the nat service is received and a network connection from at least one remote device to the nat service is received.