Patent classifications
H04L61/35
APPARATUS, METHOD, AND STORAGE MEDIUM
An apparatus includes a memory and a processor configured to acquire a device driver corresponding to a device, deploy the acquired device driver so as to be operable, generate an address allowing a function of the device to be called from one or more client apparatuses, register the address and a path to the device driver in association with each other, generate, based on first information in which a function to be provided by each device is described and the address, second information including the function of the device and the address, and register the second information.
SELF-LEARNING DEVICE CLASSIFIER
Systems and methods classify unknown devices communicating over a packet-switched network based on traffic-borne characteristics comprising packet parameters, flow parameters, and/or operating-system parameters. Embodiments utilize “self-learning” to optimize the level of classification accuracy.
System for wireless mesh network communication
A general wireless mesh network of communication devices with packet message transmission, especially for telemetry and automation, includes at least a single control communication device and a set of slave communication devices. The control communication device searches in the network and assigns a virtual routing number to each slave communication device. The virtual routing number reflects a distance of the slave communication device from the control communication device, expressed by the number of routings, and is stored in the slave communication device. The slave communication device, for further routing of packets in the mesh network, uses time slots assigned according to the difference between said virtual routing number and the virtual routing number of the sender of a received packet. Packet routing is based on successive flooding of the virtual routing structure and time division multiplexing.
Systems and methods for automatically providing Whois service to top level domains
Methods and systems are disclosed for quickly providing Whois services to a new top level domain after it is provisioned in a registry. In one embodiment, domain data is received at a first system regarding a top level domain (TLD). The domain data is assigned an authoritative port of a Whois server and is provisioned in a registry database. In certain embodiments, the Whois server provides information relating to domain name registrations of the TLD in the database, according to the authoritative port. The Whois server determines that a Whois query is received at the authoritative port for the queried TLD and responds with the queried information. To the requester, the responses appear as if they are sent from a unique Whois server for each TLD, but the Whois server is actually shared among the TLDs.
SYSTEMS, METHODS AND APPARATUS FOR GEOFENCE NETWORKS
Systems, methods and devices for location-based services are disclosed in the present invention. A multiplicity of network devices, a database, and a server platform in network-based communication. The database stores a space-network model binding IP addresses and physical locations. The server platform is operable to generate at least one geofence in the space-network model and specify entitlements for the location-based services within the at least one geofence. The at least one geofence and specific entitlement are stored to the database. The multiplicity of network devices are configured to learn the space-network model and the at least one geofence and perform tasks based on the entitlements specified for the location-based services within the at least one geofence.
Encoding method and decoding method for a list of identifiers, associated computer program products, transmitter and receiver applying said methods
This method (100) for encoding a list of identifiers in a network including a transmitter including a global list of identifiers and able to transmit a code corresponding to a coded list of identifiers, comprises the following steps: associating (105) with each identifier an ordinal number; ordering the list of identifiers in order to obtain a sorted list; defining (120) a variable equal to the number of identifiers in the list to be transmitted; if the variable is positive (125), coding (130, 135) the first identifier of the sorted list with a code corresponding to the number of sub-sets of the global list of cardinal equal to the number of identifiers of the sorted list and including at least one identifier, for which the ordinal number is in a strict order relationship with the ordinal number of the first identifier, removing (140) this identifier from the sorted list; coding (145) the list with the sum of the obtained codes.
Systems and methods of discovering and controlling devices without explicit addressing
A method of discovering a device in a communication network having multiple interconnected nodes includes continuously monitoring, by a device to be discovered, any IP packets sent by a discoverer. The method further includes transmitting, by the discoverer, an IP packet destined for a downstream device and receiving, by the device to be discovered, the IP packet. The method further includes determining, by the device to be discovered, whether the IP packet is intended for the device to be discovered. If the IP packet is not intended for the device to be discovered, retransmitting, by the device to be discovered, the IP packet to the downstream device via an egress port of the device to be discovered.
System and method employing an agile network protocol for secure communications using secure domain names
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link.
SYSTEM AND METHOD FOR MODIFYING ELECTRONIC DOCUMENTS TRANSMITTED THROUGH AN INTERMEDIARY
Communications between participants over a communications link are proxied by an intermediary, such as an Integrated Order Mechanism (TOM). Participants interact with each other through the IOM. The IOM may be transparent to the participants such that they are not aware that the IOM is involved in processing communications. For example, in the context of a transaction by a customer making a purchase from a merchant over the Internet, the IOM facilitates the processing of transactions by processing requests from both the customer and the merchant. Neither the customer nor the merchant may be aware that the transactions are being handled by the IOM. Navigation objects may be provided for the communications over a network. For example, a navigation bar may be included on a merchant web page to provide the customer with a link back to a shopping application provided by the IOM.
Method and system for domain maliciousness assessment via real-time graph inference
The presently disclosed method and system exploits information and traces contained in DNS data to determine the maliciousness of a domain based on the relationship it has with other domains. A method may comprise providing data to a machine learning module that was previously trained on domain and IP address attributes or classifiers. The method then may comprise classifying apex domains and IP addresses based on the IP address and domain attributes or classifiers. Additionally, the method may comprise associated each of the domains and IP addresses based on the corresponding classification. The method may further comprise building a weighted domain graph at real-time utilizing the DNS data based on the aforementioned associations among domains. The method may then comprise assessing the maliciousness of a domain based on the weighted domain graph that was built.