H04L61/35

METHOD FOR CONFIGURING DEVICE RESOURCES BASED ON NETWORK IDENTIFICATION AND SYSTEM THEREFOR
20210385193 · 2021-12-09 ·

A method for configuring resources at an information handling system may include determining, during initialization, a wide area network (WAN) Internet Protocol (IP) address associated with the information handling system, and retrieving a list of trusted IP addresses from a storage location at the information handling system. The method may further include configuring a first resource at the information handling system to operate in a first state in response to determining that the WAN IP address is included at the list of trusted IP addresses, and configuring the first resource at the information handling system to operate in a second state in response to determining that the WAN IP address is not included at the list of trusted IP addresses.

SYSTEMS AND METHODS FOR DEEP LINKING OF SAAS APPLICATION VIA EMBEDDED BROWSER

Embodiments described include systems and methods of determining one or more links of one or more network applications to access to perform a task is provided. The method can include receiving, by a server, a request from a client application on a client device. The request can identify a name of a task to be performed. The client application can include an embedded browser for accessing one or more network applications. The method can include determining, by the server, one or more links of the one or more network applications hosted on one or more third party servers that are to be used to perform a task identified by the name of the task. The method can include causing, responsive to the request and to perform the task, the embedded browser of the client application on the client device to access the one or more links of the one or more network applications hosted on the one or more third party servers.

Address filtering in a radio frequency front end of a receiver
11374685 · 2022-06-28 · ·

A radio frequency (RF) front end receives one or more symbols of a first frame transmitted by a transmitter. The RF front end determines that the one or more received symbols are correlated to one or more address symbols, where the one or more address symbols are each a time-domain signal of subcarriers that the transmitter transmits. The RF front end provides the received one or more symbols to a baseband system based on the correlation. The baseband system recovers bits of a second frame within the first frame based on the received one or more symbols.

Managing Access To Cloud-Hosted Applications Using Domain Name Resolution
20220200954 · 2022-06-23 ·

Edge clusters execute in a plurality of regional clouds of a cloud computing platforms, which may include cloud POPs. Edge clusters may be programmed to control access to applications executing in the cloud computing platform. Edge clusters and an intelligent routing module route traffic to applications executing in the cloud computing platform. Cost and latency may be managed by the intelligent routing module by routing requests over the Internet or a cloud backbone network and using or bypassing cloud POPs. The placement of edge clusters may be selected according to measured or estimated latency. Latency may be estimated using speed test servers and the locations of speed test servers may be verified.

QUALITY OF SERVICE (QOS) POLICY SELECTION AND FLOW CREATION BASED ON DOMAIN NAME SYSTEM (DNS) APPLICATION METADATA

In one illustrative example, a user plane function (UPF) configured for use in a private 5G network of an enterprise may receive, from a user device, a domain name system (DNS) query associated with an application; send, to a DNS server, one or more corresponding DNS queries based on the DNS query; receive, from the DNS server, one or more DNS query responses which include an IP address and metadata including an application identifier for the application; and send, to a control plane function, a message for reporting which includes the application identifier. In response, a dedicated Quality of Service (QoS) Flow may be created for traffic for the application according to a selected QoS policy associated with the application identifier. For obtaining the metadata, the UPF may interact with a DNS server configured with Extension mechanisms for DNS (EDNS) or a DNS as Authoritative Source (DNS-AS) mechanism.

Beacon services in a content delivery framework

A computer-implemented method in a content delivery network (CDN) comprising multiple content delivery (CD) services including at least one beacon service, the method comprising: at particular CD service in the CDN: (A) obtaining and responding to at least one first request; (B) obtaining and responding to at least one second request; and (C) making a beacon request to a beacon CD service, the beacon request including particular information about: (i) the at least one first request, and (ii) the at least one second request, wherein at least some of the particular information is encoded in the beacon request, wherein the beacon request comprises an HTTP request.

Email security in a multi-tenant email service

The technology described herein helps improve email security within a multi-tenant email service. In particular, the technology described herein helps make it more difficult for a first tenant of the email service to impersonate a second tenant of the email service by validating the sending domain before the email leaves the multi-tenant email service. In particular, the technology runs a sending-side source validation on an email. If the source validation fails, the email is still sent, but using a source IP address that will cause the email to fail a receiving-side email authentication tests, such as the sender policy framework (SPF) email authentication test. In contrast, if the source validation passes, the email is sent using a source IP address that will cause the email to pass the receiving-side email authentication tests.

Method for configuring device resources based on network identification and system therefor
11343230 · 2022-05-24 · ·

A method for configuring resources at an information handling system may include determining, during initialization, a wide area network (WAN) Internet Protocol (IP) address associated with the information handling system, and retrieving a list of trusted IP addresses from a storage location at the information handling system. The method may further include configuring a first resource at the information handling system to operate in a first state in response to determining that the WAN IP address is included at the list of trusted IP addresses, and configuring the first resource at the information handling system to operate in a second state in response to determining that the WAN IP address is not included at the list of trusted IP addresses.

SYSTEMS AND METHODS FOR DECOUPLING AND DELIVERING GEOFENCE GEOMETRIES TO MAPS
20220150663 · 2022-05-12 · ·

System and methods for delivering geofence geometries to a physical map are disclosed. At least one user device is constructed and configured in communication with a server associated at least one database. The at least one user device receives data regarding a scale unit of the physical map and latitude and longitude of all corners of the physical map. The at least one user device converts the latitude and longitude to Internet Protocol (IP) addresses via communication with the server. The at least one user device queries the at least one database for at least one geofence geometry associated with the IP addresses. The at least one user device decouples the at least one geofence geometry from the at least one database and delivers as an overlay to the physical map.

SYSTEM AND METHOD FOR LOOKING UP AN IP ADDRESS IN AN IP ADDRESS SPACE
20230254280 · 2023-08-10 ·

A new approach is proposed that supports IP address lookup. An IP address updater creates a bitmap of an IP address space, wherein each bit in the bitmap corresponds to an IP address in the IP address space. The compressed bitmap is then populated and stored permanently on a shared memory storage that is accessible by multiple client applications at the same time. The client applications may each establish and maintain a connection to the shared memory storage through an IP address lookup agent. When a lookup request for an IP address is received, the IP address lookup agent checks the bitmap and associated information of the IP address space on the shared memory storage to determine if the IP address is malicious or not and to inform the client application making the request accordingly, while the bitmap on the shared memory storage is updated with new IP address update.