H04L61/30

METHOD AND DEVICE FOR CONVERTING DATA CONTAINING USER IDENTITY

A method for automatically converting electronic data is disclosed. The method comprises scanning a source data table containing data fields; determining a feature for each of the data fields of the source data table; comparing the feature for each of the data fields with a feature rule for identifying user-identity-containing data fields in the source data table; identifying a first data field of the source data table as containing user identity when the feature of the first data field matches the feature rule; identifying a second data field of the source data table as containing no user identity when the feature of the second data field fails to match the feature rule; converting the source data table by replacing data items of the first data field in the source data table identified as containing user identity with corresponding third-party user accounts, and keeping the second data field in the source data table identified as not containing user identity unaltered; and storing the converted data table in a storage medium.

Redundancy administrating method for virtual private network and network switching apparatus with the same method implemented therein
11265186 · 2022-03-01 · ·

At least two egress provider edge (PE) routers of a service provider core network of a virtual private network are set as an anycast transport node. The same logical IP address and the same interior label are allocated to the egress PE routers. The same service label is allocated to virtual private networks, or private routes of virtual private networks, serviced by the two egress PE routers constituting the anycast transport node.

BASE STATION DEVICE, POSITION MANAGEMENT DEVICE, TERMINAL DEVICE, AND CONTROL METHOD
20170318613 · 2017-11-02 · ·

An access network has a position management device function, the loss of connectivity to a core network by a base station is detected, and a state transition process, led by the base station, for transitioning to an Isolated E-UTRAN state is initiated on the basis of the detection. In the state transition process, by performing a reattach procedure from a terminal device, a switch to base station loop-back communication can be made. It is possible thereby to provide a communication control method by which communication between terminals present within the communication coverage of a base station which has lost connectivity to a core network is switched to base station loop-back communication.

System and method for all-in-one content stream in content-centric networks
09800637 · 2017-10-24 · ·

One embodiment of the present invention provides a system for assembling a single content stream that enables downloading of a content collection using the single content stream over a network. During operation, the system obtains the content collection that includes a plurality of content components, and generates a manifest for the content collection. A respective entry in the manifest corresponds to a content component. The system assembles the single content stream by including the manifest followed by the plurality of content components. The manifest and the content components are packaged into objects under a same namespace, thereby facilitating a requester requesting one or more content components within the content collection using interests under the same namespace.

Natural language processing systems and methods for automatic reduction of false positives in domain discovery

A rules engine is adapted for analyzing each match produced by a domain discovery system as matching a seed domain. Utilizing a natural language processing (NLP) library, the rules engine determines segments from the match, assigns a lexical category to each segment based on the context in how a seed domain string is used, and compares the lexical category of the segment that is closest to the seed domain string with a lexical category of the seed domain string. Based on the comparing, the rules engine determines whether the match is relevant to the seed domain and, if not, the match produced by the domain discovery system is identified as a false positive and automatically removed from a set of matches produced by the domain discovery system for the seed domain.

Payment service capable of being integrated with merchant sites
09779436 · 2017-10-03 · ·

A computer-implemented service integrates with merchant sites to enable registered users of the service to perform purchase transactions on the merchant sites. In one embodiment, a merchant can incorporate a reference to a display object served by the service into coding of a page of the merchant's site. When the page is loaded by a user's browser, the reference causes the browser to request the display object from the service for display on the page. If the user is recognized by the service, the service may return a personalized display object that includes functionality for the user to perform a purchase transaction using the service. Also disclosed are embodiments that enable users to initiate transfers of personal account information to the merchant sites.

Multiple device and multiple line connected home and home monitoring
09756179 · 2017-09-05 · ·

Systems, devices, and techniques for multiple device and multiple line enabled computing devices and computing appliances are described herein. A device number can be assigned to a computing device and can be unique to the computing device. A plurality of alias numbers can be provided to the computing device and enabled for use by the computing device. Alias numbers can be enabled on multiple computing appliances, such that a user can transfer voice or video calls between devices using the alias numbers. Further, monitoring components in a home environment, for example, can be associated with one or more alias number so that security alerts can be provided to the various computing devices and computing appliances associated with the alias numbers.

LOW-LATENCY IDENTIFICATION OF NETWORK-DEVICE PROPERTIES
20220046032 · 2022-02-10 ·

A method comprises analyzing, by a machine-learning model, a first network communication with a first set of inputs. The method also comprises inferring, by the machine-learning model and based on the analyzing, that a first device that is a party to the first network communication exhibits a device property. The method also comprises extracting, from the machine-learning model, a first set of significant inputs that had a significant impact on the determining. The method also comprises creating, using the first set of inputs, a rule for identifying the device property. The rule establishes a condition that, when present in a network communication, implies that a party to the network communication exhibits the device property.

Sharing network addresses
09749392 · 2017-08-29 · ·

A network address assigned a shared designation by a first client computer is received, in a first data format, automatically, at a host computer from the first client computer. The network address is categorized and published. Publishing the network address includes converting the network address into a second data format, receiving, at the host computer, a subscription request from a second client computer, and sending the network address to the second client computer in response to receiving the subscription request.

Aliasing of named data objects and named graphs for named data networks

A method for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.