Patent classifications
H04L61/35
IP-based matching system
In one aspect, an example method includes (i) accessing, by a computing device, a first Internet Protocol (IP) address that encodes first attributes of a first profile; (ii) accessing, by the computing device, a second IP address that encodes second attributes of a second profile; (iii) comparing, by the computing device, the first IP address and the second IP address using a network layer communication function; (iv) determining, by the computing device, that a result of the comparing satisfies a threshold condition; and (v) based on the result of the comparing satisfying the threshold condition, providing, by the computing device to another device, an indication of a match between the first profile and the second profile.
Tracking changing state data to assist in computer network security
A session table includes one or more records, where each record represents a session. Session record information is stored in various fields, such as key fields, value fields, and timestamp fields. Session information is described as keys and values in order to support query/lookup operations. A session table is associated with a filter, which describes a set of keys that can be used for records in that table. A session table is populated using data contained in security information/events. Rules are created to identify events related to session information, extract the session information, and use the session information to modify a session table. A session table is partitioned so that the number of records in each session table partition is decreased. A session table is processed periodically so that active sessions are moved to the current partition.
APPARATUS AND METHOD FOR UNIVERSAL INFORMATION EXCHANGE
A system and method for communicating is provided. A recipient user is universally identified using a unique universal communication identifier. When a sending user wishes to send an initial communication to the recipient user, the sending user identifies the recipient user by that user’s universal communication identifier. Since the sending user directs their initial communication to the recipient user by using the assigned universal communication identifier, the sending user does not need to know or have access to the recipient’s different unique identifiers that the recipient uses for the various communication exchange technologies that the recipient uses from time to time. That is, the single universal communication identifier associated with the recipient user has been previously associated with the different unique identifiers that the recipient uses for their various communication exchange technologies.
EFFICIENT SERVICE FUNCTION CHAINING OVER A TRANSPORT NETWORK
A method for operating a network includes implementing at least one service function chain (SFC) including several service functions (SFs) for providing traffic steering; encoding traffic steering information related to the at least one SFC; and using redundant information in an addressing scheme of network hosts for addressing the SFs.
MAPPING BETWEEN CLASSICAL URLs AND ICN NETWORKS
A method for routing a request for content from a content provider through an IPv6 network is described, the IPv6 network being an information centric network (ICN) in which content is directly addressed using at least a portion of an IPv6 address. The method includes receiving, at an IPv6 network, a request for content, determining that the request does not comprise an ICN address. The method further includes intercepting the request, and translating the request into an IPv6 address in which at least a portion of the address is directed to or associated with the piece of content. Systems and methods described herein address problems arising from the interaction between IP and ICN networking models.
POWER MANAGEMENT METHOD IN NETWORK AND APPARATUS FOR THE SAME
An operation method of a first communication node includes: measuring a magnitude of a current supplied to a second communication node through a data line in the vehicle network; comparing the measured magnitude of the current with a predetermined threshold value; generating an address resolution protocol (ARP) frame including fault-related information when the second communication node is determined to be in a fault state based on a result of the comparison; and transmitting the ARP frame.
SYSTEM AND METHOD FOR MANAGING ELECTROMAGNETIC INTERFERENCE FOR ELECTRONIC DEVICES
According to an embodiments, a system and method for managing electromagnetic interference in an electronic charging unit is disclosed. The operating frequencies of multiple electronic devices interfacing with the electronic charging unit may be dynamically altered to manage electromagnetic interference from each electronic device such that the aggregated electromagnetic interference from all electronic devices remains within predetermined limits.
Subscription for Communication Attributes
Techniques for subscription for communication attributes are described. According to various embodiments, communication attributes represent attributes pertaining to communication sessions between different endpoints. According to various embodiments, a client network involved in a communication system can subscribe to receive various communication attributes for various subnetworks (“subnets”) of the client network. According to one or more embodiments, various actions can be performed based on communication attributes.
Method and Device for Managing Internet Protocol Version 6 Address, and Terminal
The method includes that: when a first service has yet not ended before an original lifetime of a first IPv6 address terminates, a first terminal sends an address updating request message for querying about whether or not the first service supports IPv6 address updating to a second terminal; the first terminal receives an address updating response message returned by the second terminal; when a first determination result carried in the address updating response message indicates that the first service supports IPv6 address updating, the first terminal requests to establish a backup session for the first service with the second terminal by virtue of a second IPv6 address, which is pre-stored; and in the case that the first service has yet not ended when the original lifetime of the first IPv6 address terminates, the first terminal continues executing the first service with the second terminal by virtue of the backup session.
SYSTEMS AND METHODS FOR GEOFENCE SECURITY
The present invention is directed to methods and systems for enforcing at least one rule within a geofence. The rule is enforced by a fencing agent on an Unmanned Aerial Vehicle (UAV). The geofence is defined by a plurality of geographic designators, with the plurality of geographic designators each being associated with an Internet Protocol (IP) address, preferably an IPv6 address.