H04L61/45

Method and system for generating durable host identifiers using network artifacts

A host identification engine receives network traffic from a network and uses one or more artifact extractors to extract artifact data items that can identify a host. The artifact data items can be stored in a host signature database. Network addresses to which the hosts correspond can be stored in a network address database. A mapping table can be implemented to match the data in the signature database and network database to generate durable host identification data that can accurately track hosts as they use different identification data and/or move between hosts.

METHODS AND APPARATUS TO PERFORM NETWORK-BASED MONITORING OF MEDIA ACCESSES
20230198937 · 2023-06-22 ·

An example system includes: at least one memory; programmable circuitry; and instructions to cause the programmable circuitry to: obtain a public internet protocol (IP) address associated with a household and a timestamp in response to a census impression request indicating a media access on a first client device of the household; obtain a private IP address associated with the first client device; cause storing of the public IP address, the private IP address, and the timestamp in a panelist impression record in association with a panelist identifier, the panelist identifier corresponding to a panelist audience member, the panelist audience member enrolled in a panel of an audience measurement entity; send the census impression request to a census system; and send the panelist impression record to a meter collection system.

METHODS AND APPARATUS TO PERFORM NETWORK-BASED MONITORING OF MEDIA ACCESSES
20230198937 · 2023-06-22 ·

An example system includes: at least one memory; programmable circuitry; and instructions to cause the programmable circuitry to: obtain a public internet protocol (IP) address associated with a household and a timestamp in response to a census impression request indicating a media access on a first client device of the household; obtain a private IP address associated with the first client device; cause storing of the public IP address, the private IP address, and the timestamp in a panelist impression record in association with a panelist identifier, the panelist identifier corresponding to a panelist audience member, the panelist audience member enrolled in a panel of an audience measurement entity; send the census impression request to a census system; and send the panelist impression record to a meter collection system.

FLOW CLASSIFICATION FOR INFORMATION CENTRIC NETWORK PROTOCOLS

Embodiments include technologies for identifying an equivalence class identifier in a packet received by a node configured to perform information centric networking (ICN) in an ICN network, where the packet includes a name identifying content associated with a producer node in the ICN network. Embodiments also include determining an equivalence class for the packet by determining a name prefix of the name based, at least in part, on the equivalence class identifier. Embodiments further include taking an action affecting a particular packet, the action based, at least in part, on the equivalence class. In specific embodiments, the name includes a plurality of name components, and the equivalence class identifier is a count indicating a number of name components in the name to be grouped together to determine the name prefix. In further embodiments, the number is greater than a particular number of name components in a routable name prefix.

Assigning client virtual machines based on location
09832256 · 2017-11-28 · ·

Providing a virtual machine includes receiving a first request from a first client device, the request comprising information related to accessing one of a plurality of virtual machines, wherein the first client device is associated with a user; and also receiving a first location of the first client device. The method also includes stopping an existing virtual machine, from among the plurality of virtual machines, that is currently executing that is associated with the user; and based on the first location of the first client device, providing a first virtual machine, from among the plurality of virtual machines, to the first client device. At any given time instant there will be only one virtual machine running for a user in hypervisor memory and that one virtual machine is based on a current location of that user.

DHCP SERVER IP ADDRESS ALLOCATION IMPROVEMENT TO NULLIFY THE IMPACT OF MAC RANDOMIZATION
20230179567 · 2023-06-08 ·

A Dynamic Host Configuration Protocol (DHCP) server includes a memory storing computer-readable instructions, and a processor configured to execute the computer-readable instructions to determine a media access control (MAC) address associated with a client, determine the MAC address associated with the client is a randomized MAC address, and assign an IP address the client from a DHCP IP server pool. The processor assigns an IP address to the client from a DHCP IP server pool using one of identifying, in a DHCP server table, at least one host name of the client and assigning a previously assigned IP address to the at least one host name of the client, and when the host name of the client is not available, assigning the IP address using a first lease with a first duration shorter than a default lease duration used for non-randomized MAC addresses.

Dynamic attribute based application policy

Systems, methods, and computer-readable storage media are provided for dynamically setting an end point group for an end point. An endpoint can be assigned a default end point group when added to a network. For example, the default end point group can be a baseline port/security group which is considered an untrusted group. The end point can then be dynamically assigned an end point group based on a set of group selection rules. For example, the group selection rules can identify an end point group based on the MAC address or other attributes. When the end point is added to the network, the MAC address and/or other attributes of the end point can be determined and used to assign an end point group. As another example, an end point group can be assigned based on the amount of traffic or guest operation system.

SYSTEMS AND METHODS FOR CLASSIFYNG ELECTRONIC ACTIVITIES BASED ON SENDER AND RECEPIENT INFORMATION

The system and methods described herein can classify electronic activities based on sender and recipient information. The system can determine a relationship between a sender of an electronic activity and at least one recipient of the electronic activity using a sender node profile and a recipient node profile. The system can assign a tag to the electronic activity based on the relationship between the sender and one or more recipients of the electronic activity. The system can process the electronic activity based on the assigned tag.

SYSTEMS AND METHODS FOR CLASSIFYNG ELECTRONIC ACTIVITIES BASED ON SENDER AND RECEPIENT INFORMATION

The system and methods described herein can classify electronic activities based on sender and recipient information. The system can determine a relationship between a sender of an electronic activity and at least one recipient of the electronic activity using a sender node profile and a recipient node profile. The system can assign a tag to the electronic activity based on the relationship between the sender and one or more recipients of the electronic activity. The system can process the electronic activity based on the assigned tag.

TECHNIQUES FOR BYPASSING THE DOMAIN NAME SYSTEM
20220060771 · 2022-02-24 ·

In various embodiments, a client application requests information relating to content servers from which particular content can be accessed, or a manifest server that maintains such information and is distinct from the Domain Name System (DNS) automatically determines that the client application is likely to request the content server information. The manifest server then transmits, to the client application, information specifying (1) hostnames associated with the content servers from which the particular content can be accessed, and (2) Internet Protocol (IP) addresses corresponding to the hostnames. Thereafter, the client application can use the IP addresses to connect to the content servers and validate certificates provided by the content servers, in order to establish secure communication channels with the content servers.