FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Network Address topics
Network Address
Network Device
Communications
Computer Network
Sequencing
Computer Readable
Access Point
Computer Program
Internet Address
Internet Protocol
Virtual Private Network
Agile Network Protocol For Secure Communications Using Secure Domain Names
Network Communication
Domain Name
Secure Communication

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Network Address patents



      
           
This page is updated frequently with new Network Address-related patent applications. Subscribe to the Network Address RSS feed to automatically get the update: related Network RSS feeds. RSS updates for this page: Network Address RSS RSS


User authentication based on network context

Wake on cloud

Address management in an overlay network environment

Date/App# patent app List of recent Network Address-related patents
07/24/14
20140208394
 Network user identification and authentication patent thumbnailNetwork user identification and authentication
A method of identifying and authenticating a network user includes receiving a first network layer packet from a first user entity. The first network layer packet may include first unique identification information unique to the first user entity and independent of a first network address associated with the first network layer packet.
07/24/14
20140208382
 User authentication based on network context patent thumbnailUser authentication based on network context
Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a request transmitted from the computing device to access a computing solution.
07/24/14
20140208132
 Wake on cloud patent thumbnailWake on cloud
A method can include receiving a request to access a specified resource associated with a user account; and, in response to the request, transmitting, to a network address associated with the user account, instructions for waking a system or device from a sleep state and for accessing the specified resource. Various other apparatuses, systems, methods, etc., are also disclosed..
07/24/14
20140207969
 Address management in an overlay network environment patent thumbnailAddress management in an overlay network environment
Embodiments of the invention relate to overlay network address management. One embodiment includes an overlay gateway including an overlay network manager associated with a physical network.
07/24/14
20140207917
 System, apparatus and method for dynamically updating the configuration of a network device patent thumbnailSystem, apparatus and method for dynamically updating the configuration of a network device
A system, apparatus and method are provided for dynamically updating a configuration of a network device when relevant sources and destinations of network traffic are added, removed or migrated in a network. A configuration of a network device is associated with a set of network addresses representing a set of relevant sources and destinations of network traffic.
07/24/14
20140207686
 Secure real-time health record exchange patent thumbnailSecure real-time health record exchange
A method, an apparatus, and a computer program product for accessing electronic medical records are provided in which a portable computing device uniquely associated with a user authenticates an identification of the user and automatically retrieves information corresponding to the user from electronic healthcare records systems using the identification. The retrieved information may be combined with other information and electronically delivered to a healthcare provider or patient.
07/24/14
20140204950
 Differentiated handling of data traffic with user-class dependent adaptation of network address lookup patent thumbnailDifferentiated handling of data traffic with user-class dependent adaptation of network address lookup
Data traffic between a user at a user equipment and a network resource is preceded by a lookup procedure for obtaining a network address of the network resource. A message of the lookup procedure is processed depending on a class of users to which the user belongs.
07/24/14
20140204947
 Identification of a private device in a public network patent thumbnailIdentification of a private device in a public network
Methods, network address translation (nat) devices, network nodes and system for allowing identification of a private device in a public network or treating traffic of a private device in a public network. The nat may allocate a private ipv4 address to the private device, reserve a block of ports on the public ipv4 address for the private device and send an identification of the block of ports to a network node in the public network.
07/24/14
20140204903
 Method and terminal for selecting ap patent thumbnailMethod and terminal for selecting ap
There is provided a method for selecting an access point (ap), the method performed by a user equipment. The method may comprise: receiving a prioritized list with respect to aps, the prioritized list includes at least one of roaming consortium information, a network address identifier (nai), a public land mobile network (plmn) identifier; scanning at least one or more aps in the vicinity thereby generating an available list which includes at least one or more service set identifiers (ssids) and roaming consortium information; acquiring at least one or more nais from the roaming consortium information in the available list using pre-stored mapping information; comparing the acquired nai with the nai in the prioritized list to select a proper ap..
07/17/14
20140201389
 Router patent thumbnailRouter
An apparatus is disclosed that performs network address translation and/or port translation between networks.. .
07/17/14
20140198781
Method for data transmission and local network entity
The invention relates to a method for data transmission with a local network, the local network comprising a plurality of local network entities for connecting mobile entities to the local network and at least one local network entity for connecting the local network to a data network. The method comprises receiving, by a first local network entity of the local network entities of the local network, a data packet, the network address of the first mobile entity on the basis of the data packet, determining, by the first local network entity on the basis of the network address of the first mobile entity, the second local network entity, via which the first mobile entity is connected to the local network, and forwarding, by the first local network entity, the data comprised by the data packet to the first mobile entity via the second local network entity..
07/17/14
20140198718
Avoiding network address translaton in a mobile data network
A flow setup table in a basestation breakout component allows for servicing non-cacheable ip data flows at the breakout component without the need for network address translation. For each broken out ip flow at the breakout component, the flow setup table holds a mapping between tunnel ids and the ip related information.
07/17/14
20140198650
Avoiding network address translaton in a mobile data network
A flow setup table in a basestation breakout component allows for servicing non-cacheable ip data flows at the breakout component without the need for network address translation. For each broken out ip flow at the breakout component, the flow setup table holds a mapping between tunnel ids and the ip related information.
07/17/14
20140198634
Detecting failures of backup label switched paths in a network environment
A method is provided in one example and includes communicating a first request message to a first network element functioning as a point of local repair for a backup label switched path. The first request message includes a first network address having a predetermined value and an indication of a forwarding equivalence class associated with the backup label switched path.
07/10/14
20140195796
Universal file packager for use with an interoperable keychest
There is provided a system and method for a universal file packager for use with an interoperable key chest. There is provided a method for distributing media contents to distributors, comprising obtaining a first key, a second key and a content, encrypting the second key using the first key to generate an encrypted second key, encrypting the content using the second key to generate an encrypted content, generating a key information file including the encrypted second key, generating a universal file including the encrypted content and a first network address for a central key repository (ckr), providing the key information file for storage in the ckr, and providing the universal file to the distributors.
07/10/14
20140195657
Implementation on baseboard management controller of single out-of-band communication access to multiple managed computer nodes
Certain aspects of the present disclosure are directed to a baseboard management controller (bmc). The bmc includes: a processor; a network interface controller assigned with a network address; and a memory having firmware.
07/03/14
20140189842
Method for defending against session hijacking attacks and firewall
The present disclosure provides a method for defending against session hijacking attacks, including: receiving a first access request transmitted from a legal client side and transmitting the first access request to a server; receiving a first response comprising a first authentication token returned from the server; generating a first sequence value according to a network address of the legal client side and an identification code of the legal client side, and recombining the first authentication token and the first sequence value to form a second authentication token; and replacing the first authentication token in the first response with the second authentication token, and transmitting the first response comprising the second authentication token to the legal client side.. .
07/03/14
20140188839
Using social signals to rank search results
Systems, methods, and computer-readable storage media are provided for using social signals to rank local search results. Local entity website addresses are matched with social network addresses and social network profiles are matched with local entity index records.
07/03/14
20140188262
Method and device for automatic addressing and recognition of spatial proximity relationships in modular systems for transferring objects
A method for the recognition of spatial proximity relationships in a modular system having module assemblies, each module assembly having a transmitter and a receiver arranged so that the transmitter of a first module assembly corresponds to the receiver of a second module assembly, and each of the module assemblies having a network connection for connection via a communication network to other of the module assemblies, includes: automatically requesting and allocating a network address for each of the respective network connections via the communication network so as to enable an addressing of the module assemblies via the network; and determining spatial proximity relationships of the module assemblies by triggering and evaluating the transmitters and receivers using the communication network via the network connection.. .
07/03/14
20140187265
Mobile internet protocol (ip) location
A mobile ip location server that retrieves the location of a mobile device based on the public ip address that a mobile device is using. A mobile ip location server comprises a mobile location protocol interface, an identifier resolver, and a location manager.
07/03/14
20140185622
Method and apparatus for network security
A method of securely routing data traffic between communication networks. In an integrated security device, a host router supports a virtual router that peers with vrf (virtual routing and forwarding) instances associated with participating networks on the host router.
07/03/14
20140185616
Network interface controller supporting network virtualization
A network interface device includes a host interface for connection to a host processor having a memory. A network interface is configured to transmit and receive data packets over a data network, which supports multiple tenant networks overlaid on the data network.
06/26/14
20140181509
Method and apparatus for verifying anti-counterfeiting information
A method and apparatus for verifying anti-counterfeiting information are provided so as to improve an anti-counterfeiting effect, to lower an anti-counterfeiting cost, to extend the scope of population to which anti-counterfeiting effect is applicable and to guarantee the stability of anti-counterfeiting means. The method includes: a terminal obtains and parses encrypted address information of an object; the terminal connects to a network address corresponding to the parsed encrypted address information; the terminal determines that the encrypted address information is valid upon successful connection and sending verification information of the object to the network address corresponding to the encrypted address information; and the terminal receives feedback information about whether the verification information is valid..
06/26/14
20140181287
Dns wildcard beaconing
Dns wildcard beaconing. In one embodiment, for example, a computer-implemented method comprises: receiving a network request from a resolver to resolve a hostname, the network request from the resolver comprising a network address of the resolver, the hostname comprising a unique wildcard portion; storing first data representing an association between at least the unique wildcard portion and the network address of the resolver; receiving a network request from a client for a resource, the network request from the client comprising a network address of the client and at least the unique wildcard portion; storing second data representing an association between at least the unique wildcard portion and the network address of the client; based on the first data and the second data, associating the client with the resolver; and storing third data representing the association between the client and the resolver..
06/26/14
20140181286
Stateful network address translation protocol implemented over a data network
A technique for synchronizing nat information stored on different network devices. Each of the network devices includes a respective nat data structure configured to store nat information.
06/26/14
20140181248
Simple remote access through firewalls for networked devices and applications
A method, apparatus, and system are described for accessing networked devices without accessible network addresses via virtual ip (vip) addresses. The system consists of a soft device services controller (dsc), downloaded on a first local network from the device service manager (dsm) on a wide area network, and a vip access enabled device on a second local network separate from the first area network.
06/26/14
20140181220
System, method and device for migrating data
A system, method and device for migrating data are provided. An attachment type of an attachment received with a message at a device is determined, the message associated with a network address of the device dedicated to data migration.
06/26/14
20140181009
System and method for following updated pre-authorized contact data
Disclosed are systems, methods, and non-transitory computer-readable storage media for following updated pre-authorized contact data. An exemplary computer-implemented method includes transmitting contact data to at least a computing device when a machine-readable code is accessed by the computing device, wherein the machine-readable code encodes a network address for accessing the contact data, and wherein the contact data is associated with an entity.
06/26/14
20140177511
Unicast to multicast conversion
A method for unicast packet conversion whereby a unicast packet is received at a receiving node followed by a determination as to whether the destination address is identified in the packet. If the address is identified, then the unicast packets are converted to a multicast packet and forwarded to a connected station.
06/26/14
20140177006
Carrier images
In one example, a first directive is received at a system. The directive is to embed, into content selected via a printer application accessed at a network-connected printer, a network address.
06/19/14
20140173733
Exploit detection and reporting of a device using server chaining
A server configured for managing server access by a first client application of a device over a communications network. The server receives a status message from the first client application over the communications network, the first client application managed by the server, the message including at least one compliance characteristic associated with a security policy of the server and an unique identification of the device.
06/19/14
20140173723
Reputation of network address
Example embodiments disclosed herein relate to determining a reputation of a network address. A long-term reputation of the network address is determined.
06/19/14
20140173073
Proactive m2m framework using device-level vcard for inventory, identity, and network management
A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (nms).
06/19/14
20140173059
Device commissioning
The disclosed subject matter may provide a system and methods for commissioning a device or appliance into a network. A processor may detect the insertion of a removable device into a data receptacle of a first device.
06/19/14
20140172947
Cloud-based virtual local networks
Systems and methods are described for providing cloud-based virtual local networks. A computerized method for providing cloud-based virtual local networks includes receiving at a network gateway a request for a network address from a network switch, communicating with a user device management entity (udme) server to authorize the network switch, receiving an authorization response from the udme server for the network switch, receiving a network address pool at the network gateway from the udme server, and creating at the network gateway a virtual home router containing a virtual home router context that is unique to the virtual home router and associated with the network address pool..
06/19/14
20140171204
Asynchronous cloud rendered video delivery
Asynchronous cloud rendered video delivery systems and methods are provided. According to one aspect, the method may include at a turn-based game program executed by a game server, receiving a turn input from a client device via a wide area network; determining that a turn advance occurs within the turn-based game program, and determining at least one rendering event associated with the turn advance.
06/19/14
20140169374
System and method for providing a translation mechanism in a network environment
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an internet protocol (ip) address to generate a binding to be used for a network address and port translation (napt).
06/19/14
20140169227
Managing early media for communication sessions establishing via the session initiation protocol (sip)
A communications device sends an invite to a communication session to multiple target devices and receives first and second media streams from first and second target devices prior to receiving a signaling indication that any of the multiple target devices accepts the invite. The communications device selects between the first and second media streams based upon (i) information contained in a first packet of the first or second media streams and/or (ii) signaling information that indicates a forking context for the communication session.
06/19/14
20140169226
Managing early media for communication sessions establishing via the session initiation protocol (sip)
A communications device sends an invite to a communication session to multiple target devices and receives first and second media streams from first and second target devices prior to receiving a signaling indication that any of the multiple target devices accepts the invite. The communications device selects between the first and second media streams based upon (i) information contained in a first packet of the first or second media streams and/or (ii) signaling information that indicates a forking context for the communication session.
06/19/14
20140169168
Configuration of a virtual service network
Configuration of a virtual service network by a configuring node includes: determining that the virtual service is to be configured; determining a configuration associated with the virtual service and including packet forwarding policies associated with the virtual service, each packet forwarding policy including a virtual service network address and a destination; and sending the packet forwarding policies in the configuration to a network node. The network node: stores the packet forwarding policies; receives a data packet for the virtual service and including a virtual service network address; determines a match between the virtual service network address in the data packet with the virtual service network address in a given packet forwarding policy of the stored packet forwarding policies; obtains a given destination in the given packet forwarding policy; and sends the data packet to a service load balancer associated with the given destination by the network node..
06/12/14
20140164936
System for rapid browsing of content with user customization
A graphical user interface adapted to extend the functionality of, for instance, a web browser operating on a personal computing device in communication via a network connection to a remote computing resource, where the graphical user interface includes a glyph overlaying and visible over the browser and any content displayed by the browser wherein activation of the glyph by a user of the browser causes the browser to seek to open an overlaying window according to parameters and content specified by the remote computing resource at a network address associated with the glyph. The user may customize the appearance and functionality of the overlaying window..
06/12/14
20140164935
System for rapid browsing of content
A graphical user interface adapted to extend the functionality of, for instance, a web browser operating on a personal computing device in communication via a network connection to a remote computing resource, where the graphical user interface includes a glyph overlaying and visible over the browser and any content displayed by the browser wherein activation of the glyph by a user of the browser causes the browser to seek to open an overlaying window according to parameters and content specified by the remote computing resource at a network address associated with the glyph.. .
06/12/14
20140164629
System and associated methodology for proximity detection and device association using ultrasound
In one embodiment, a method includes receiving ultrasound frequency sweeps in a sound receiving device. Each of the plurality of ultrasound frequency sweeps is centered on one of at least two predetermined frequencies.
06/12/14
20140164617
Forwarding policies on a virtual service network
In providing packet forwarding policies in a virtual service network that includes a network node and a pool of service load balancers serving a virtual service, the network node: receives a virtual service session request from a client device, the request including a virtual service network address for the virtual service; compares the virtual service network address in the request with the virtual service network address in each of a plurality of packet forwarding policies; in response to finding a match between the virtual service network address in the request and a given virtual service network address in a given packet forwarding policy, determines the given destination in the given packet forwarding policy; and sends the request to a service load balancer in the pool of service load balancers associated with the given destination, where the service load balancer establishes a virtual service session with the client device.. .
06/12/14
20140163993
Facilitating text-to-speech conversion of a domain name or a network address containing a domain name
To facilitate text-to-speech conversion of a username, a first or last name of a user associated with the username may be retrieved, and a pronunciation of the username may be determined based at least in part on whether the name forms at least part of the username. To facilitate text-to-speech conversion of a domain name having a top level domain and at least one other level domain, a pronunciation for the top level domain may be determined based at least in part upon whether the top level domain is one of a predetermined set of top level domains.
06/12/14
20140161131
Flexible and scalable virtual network segment pruning
A segment within a virtual network is identified as being supported by a segment bundling device. The segment within the virtual network supports a first host connected to a first bridging device and a second host connected to a second bridging device.
06/05/14
20140157398
Systems and methods for providing a multiple secure link architecture
Some embodiments disclosed herein include a msl twin network address translator (nat) that includes logic that, when executed by a processor, causes the msl twin nat to receive inbound datagram from msl vpn and record a new vpn owner private ip address from a source ip address in the inbound datagram. In some embodiments the logic causes the msl twin nat to assign a new upip for the inbound datagram and client workstation and facilitate sending the inbound datagram to the client workstation..
06/05/14
20140157380
Method and system for hybrid software as a service user interfaces
A hybrid software as a service (saas) delivery model allows an enterprise to control sensitive data while application code and non-sensitive data are downloaded from a software provider. A client computing device of the enterprise downloads the application code, which determines an appearance and a behavior of a user interface of the application.
06/05/14
20140156402
System, method and computer program product for presenting directed advertising to a user via a network
A system, method and computer program product for presenting an advertisement is described. A request to access a web page may be received from a requester via a network.
06/05/14
20140156063
Accumulation control
Systems, methods, devices, and non-transitory processor readable media of the various embodiments enable control of a conveyor having a plurality of zones each having a control module configured to control a selectable speed of the zone. The various embodiments are disclosed in connection with, but not necessarily limited to, accumulation conveyors with control systems which selectively set the speeds of zones based on conditions of upstream and downstream zones.
06/05/14
20140153569
Call set-up systems
A call set-up system sets up a call, which may be a voice call, between terminals through a plurality of packet switched networks using call agents. The networks are interconnected by network address translation (nat) devices, and the messages to successive call agents include media addresses in the associated networks for the actual data packets of the call when it has been set up.
05/29/14
20140146123
Wireless communication terminal and communication control method
A wireless communication terminal includes an encoder, configured to encode content data; a destination setting section, configured to set a network address on feedback data for the wireless communication terminal, the network address being set on the wireless communication terminal; a transmitter, configured to transmit the feedback data; a receiver, configured to receive the feedback data transmitted form the transmitter and transferred by way of the wireless communication network; and a reproduction processor, configured to perform reproduction processing on the content data in accordance with the received feedback data.. .
05/22/14
20140143875
Detecting application behavior
There is provided a method including generating, by a security application executed in a processing device, an application list including one or more applications which are currently running in the processing device; identifying at least one network address fulfilling predetermined criteria; determining which of the at least one network address fulfilling the predetermined criteria has been connected to by the processing device within a predefined time period; and providing a post-processing entity with the application list and an indication on which of the at least one network address fulfilling the predetermined criteria has been connected to by the processing device within the predefined time period.. .
05/22/14
20140140344
Identifying nated devices for device-specific traffic flow steering
The present disclosure describes methods and apparatus for differentiating subscriber devices of a subscriber hidden by a network address translation device and enables traffic flow steering on a per device basis rather than a per subscriber basis. Identification of subscriber devices is achieved by assigning a reserved set of external ports to each subscriber device.
05/22/14
20140139617
Systems and methods for implementing internet video conferencing using standard phone calls
A video conferencing system (100) includes a switch (125), a server (140), a telephony device (152), and a node (102) in a packet-switched network (135). The switch (125) establishes a circuit-switched connection between a calling party number and a called party number.
05/15/14
20140137267
Distributing overlay network ingress information
Aspects of the present disclosure relate to providing secure access to resources of a private network. For example, a client device may transmit a request identifying the protected resource to an authentication server.
05/15/14
20140136715
Migration of logical partitions between two devices
A method includes receiving, into a target machine communicatively coupled to a first subnetwork, data for migration of a virtual partition from a source machine communicatively coupled to a second subnetwork. The virtual partition has a source network address defined by network addressing of the second subnetwork.
05/15/14
20140136678
System and method for assigning addresses to information handling systems
Information handling system network addresses are managed based on the location of the information handling system. For example, a blade information handling system chassis has network addresses stored in persistent memory and associated with each of plural slots.
05/15/14
20140133402
Architecture for open communication in a heterogeneous network
Network architecture configured for open communication between a plurality of sub-networks. Each of the plurality of sub-networks has a different routable network addressing scheme.
05/15/14
20140133324
Ant syncword specific acquisition thresholding
Systems, methods, and devices for determining an acquisition threshold boundary value and applying that boundary value to identify which incoming signals are directed to a device, based on matching the device syncword with the syncword for the incoming signal. For some implementations using ant protocol, syncwords composed of the last four bits of the preamble and first 14 bits of the network address identify each device.
05/15/14
20140131452
Method, system and apparatus for automatically linking digital content to a device
A method, system and apparatus for automatically linking technical information to a near field communication (nfc) tag comprises programming and/or encoding the nfc tag with a network address of a data source containing technical information, such as maintenance and servicing information, of an object, and then adhering a nfc tag body to that object. When the object is being serviced or maintained by an end user, the end user only needs to tap the nfc tag with a nfc enabled device in order to automatically access the technical information.
05/08/14
20140130038
Cloud platform architecture
A cloud computing environment provides the ability to deploy a web application that has been developed using one of a plurality of application frameworks and is configured to execute within one of a plurality of runtime environments. The cloud computing environment receives the web application in a package compatible with the runtime environment and dynamically binds available services by appropriately inserting service provisioning data (e.g., service network address, login credentials, etc.) into the package.
05/08/14
20140129839
Internet protocol mapping resolution in fixed mobile convergence networks
Techniques for facilitating operation of a communication device having a first internet protocol (ip) address in a first network and a second ip address in a second network include detecting a presence of a network address translation (nat) table; implementing, when the nat table is present, a message exchange protocol to obtain a mapping between the first ip address and the second ip address; and reporting, in a communication message, the mapping between the first ip address and the second ip address. In one operational scenario, the first network is a 3 gpp network and the second network is a broadband fixed network such as a dsl or a cable modem network.
05/08/14
20140129728
Apparatus, systems, and methods for ip reachability in a communications network
In a system and method for establishing communications in a communications network, a network service provider can assign ip addresses to mobile devices dynamically to conserve ip address resources. A network service provider can also implement network address translation to further conserve ip address resources and to provide improved security.
05/08/14
20140126562
Base-station-to-base-station gateway and related devices, methods, and systems
The present disclosure relates to a base-station-to-base-station (bs-bs) gateway in a long term evolution (lte) cellular communication network and methods of operation thereof. In one embodiment, the bs-bs gateway receives information from a first base station which includes a hostname and a network address of the first base station.
05/08/14
20140126349
Rerouting t1 signal over a wide area network
The instant application describes a method and an apparatus for restoring t1 service in the event of a copper cable failure. The apparatus includes an interface configured to receive a t1 signal from a first customer device experiencing the copper cable failure; a converter configured to receive the t1 signal from the interface and place the t1 signal inside an ip packet routable over a wide area network; and a router configured to receive the ip packet from converter and send the ip packet over the wide area network to a central hub for conversion back into the t1 signal and delivery to a second customer device.
05/01/14
20140122395
Differential dynamic host configuration protocol lease allocation
Disclosed is a novel passive fingerprinting technique based on dhcp messages to determine the device type and operating system. Dhcp implementations are shown to vary among device types and have an effect on dhcp lease durations.
05/01/14
20140122386
Differential dynamic host configuration protocol lease allocation
Disclosed is a novel passive fingerprinting technique based on dhcp messages to determine the device type and operating system. Dhcp implementations are shown to vary among device types and have an effect on dhcp lease durations.
05/01/14
20140119218
System, server and method for calculating data volume of network access
A calculating system is provided, which includes at least one enb and a core network. The enb is coupled to two mobile devices.
04/24/14
20140115700
Method and system for detecting website visit attempts by browsers
A method and system of detecting website visit attempts by browsers includes monitoring networking operations generated by a client and intercepting a network address associated with the networking operations, detecting a type of website from the intercepted network address, and determining that a browser on the client has attempted to visit a website of the detected type based on the browser being in a running state and a website identified as historically visited by the browser matching the detected type of website. This can allow for the accurate detection of a browser's attempt to visit a restricted website, thereby accomplishing accurate monitoring of networking activities of the browser and enhancing the accuracy of subsequent prompting or intercepting of the networking activities of the browser..
04/24/14
20140115655
Systems and methods for the rapid deployment of network security devices
A configuration service comprises a deployment package and a production configuration for a network security device. One or more configuration parameters of the production configuration may be defined by an administrator of the network security device (e.g., the customer).
04/24/14
20140115188
Incompatible network gateway provisioned through dns
A first packet of a first protocol version type that includes an incoming request for an action to be performed on an identified resource is received from a client at a proxy server as a result of a dns request resolving to a network address of the proxy server. The proxy server transmits an outgoing request for the action to be performed on the identified resource to a network address of the destination origin server in a second packet that is of the second protocol version type.
04/24/14
20140115174
Network address translation traversals for peer-to-peer networks
In a networking environment, multiple end-users applications running on computing devices may operate behind a respective nat device. Information transferred from one end-user application to another can be accomplished by establishing a connection from one private network to another.


Popular terms: [SEARCH]

Network Address topics: Network Address, Network Device, Communications, Computer Network, Sequencing, Computer Readable, Access Point, Computer Program, Internet Address, Internet Protocol, Virtual Private Network, Agile Network Protocol For Secure Communications Using Secure Domain Names, Network Communication, Domain Name, Secure Communication

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Network Address for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Network Address with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.3478

3720

0 - 1 - 73