Patent classifications
H04L69/22
SECURING CONNECTIONS TO UNSECURE INTERNET RESOURCES
A computer program product having a computer readable non-transitory storage medium. The storage medium having encoded thereon a computer code for instructing at least one hardware processor to automatically: (a) intercept a plurality of data packets transported over a computer network; (b) analyze said plurality of data packets to identify at least one secure connection request to an unsecure domain hosted on at least one web server; (c) retrieve a digital security certificate for the unsecure domain from a trusted certification authority; (d) associate the digital security certificate with the unsecure domain, thereby converting the unsecure domain to a secure domain; (e) send the digital security certificate to at least one second client terminal. Thereby the computer program product facilitates a secure connection between the at least one second client terminal and the secure domain.
Signal transmission power adjustment in a wireless device
Wireless communications are described. A wireless device may be configured to transmit a first signal via a first cell group that may overlap in time with a second signal via a second cell group. The wireless device may adjust a signal transmission power of at least one of the first signal or the second signal. Additionally or alternatively, the wireless device may drop at least one of the first signal or the second signal. Adjusting and/or dropping at least one of the first signal or the second signal may be based on the overlap in time of these signals satisfying a duration threshold and a total power to transmit the first signal and the second signal exceeding a power threshold.
Signal transmission power adjustment in a wireless device
Wireless communications are described. A wireless device may be configured to transmit a first signal via a first cell group that may overlap in time with a second signal via a second cell group. The wireless device may adjust a signal transmission power of at least one of the first signal or the second signal. Additionally or alternatively, the wireless device may drop at least one of the first signal or the second signal. Adjusting and/or dropping at least one of the first signal or the second signal may be based on the overlap in time of these signals satisfying a duration threshold and a total power to transmit the first signal and the second signal exceeding a power threshold.
System and method for neutral application programming interface
Systems and methods for neutral application programming interfaces are disclosed. In one embodiment, the disclosure relates to a system for neutral application programming interfaces. The system may comprise a device. The device may be configured to receive a request. The request may comprise an outer payload and an inner payload. The device may be further configured to parse the outer payload based on a common definition of the outer payload. The device may be further configured to extract information of an action from the outer payload. The device may be further configured to parse the inner payload based on a definition of the action. The device may be further configured to process the action.
Application records using session information
Techniques are disclosed for the identification of applications from communication sessions of network traffic between client devices and the generation of application-specific metrics for network traffic associated with the applications. In one example, a router obtains metrics for a plurality of packets. The router determines a session of a plurality of sessions associated with each packet. For each determined session, the router generates metrics for the session from the metrics of the packets associated with the session and determines an application of a plurality of applications associated with the session. For each determined application, the router generates metrics for the application from the metrics of the sessions associated with the application and transmits, to a device, the metrics for the application. In some examples, the router generates the metrics for each application on a per-client, per-next-hop, or per-traffic class basis.
Multiplexing sidelink and radio access traffic
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first wireless node may receive a packet from a second wireless node, wherein the packet is associated with an indication of whether the packet is associated with a radio access link or a sidelink of the first wireless node. The first wireless node may transmit the packet on the radio access link or the sidelink in accordance with the indication. Numerous other aspects are described.
Multiplexing sidelink and radio access traffic
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first wireless node may receive a packet from a second wireless node, wherein the packet is associated with an indication of whether the packet is associated with a radio access link or a sidelink of the first wireless node. The first wireless node may transmit the packet on the radio access link or the sidelink in accordance with the indication. Numerous other aspects are described.
Configurable access-based cache policy control
Various embodiments of the present disclosure relate to a computer-implemented method of receiving a header associated with an object, where the header includes a limit value that specifies a quantity of times the object is to be served from a cache device before revalidation, and a current count value that specifies a number of times that the object has been served since a most-recent revalidation or load, receiving a request for the object from a requesting device, and upon determining that the current count value is below the limit value, serving the object to the requesting device from the cache device, or upon determining that the current count value matches the limit value, transmitting a request for revalidating the object.
Configurable access-based cache policy control
Various embodiments of the present disclosure relate to a computer-implemented method of receiving a header associated with an object, where the header includes a limit value that specifies a quantity of times the object is to be served from a cache device before revalidation, and a current count value that specifies a number of times that the object has been served since a most-recent revalidation or load, receiving a request for the object from a requesting device, and upon determining that the current count value is below the limit value, serving the object to the requesting device from the cache device, or upon determining that the current count value matches the limit value, transmitting a request for revalidating the object.
Access method and apparatus
The application provide an access method, including: sending, to an access point, a first frame that carries uplink transmission requirement information; and if a second frame that carries information about an uplink transmission resource is received from the access point within agreed time period, sending uplink multi-user transmission data to the access point, where the uplink multi-user transmission data is transmitted on the uplink transmission resource; or if the second frame is not received within an agreed time period, accessing, by a station, a channel in a contention access manner that is based on carrier sense CSMA/CA.