Patent classifications
H04L69/22
Communication time calculation method and recording medium recording communication time calculation program
A method for calculating a communication time between a first and second devices includes: adding, to a first packet, first timer information indicating an elapsed time from activation of the first device, and transmitting the first packet; transmitting notification information including the first timer information and second timer information indicating an elapsed time from activation of the second device; transmitting a second packet including the first and second timer information, third timer information indicating an elapsed time from activation of the second device, and first time information indicating a time in the second device; and calculating a communication time from the first device to the second device based on the first timer information, the second timer information, the third timer information, and the first time information, fourth timer information indicating an elapsed time from activation of the first device, and second time information indicating a time in the first device.
Communication time calculation method and recording medium recording communication time calculation program
A method for calculating a communication time between a first and second devices includes: adding, to a first packet, first timer information indicating an elapsed time from activation of the first device, and transmitting the first packet; transmitting notification information including the first timer information and second timer information indicating an elapsed time from activation of the second device; transmitting a second packet including the first and second timer information, third timer information indicating an elapsed time from activation of the second device, and first time information indicating a time in the second device; and calculating a communication time from the first device to the second device based on the first timer information, the second timer information, the third timer information, and the first time information, fourth timer information indicating an elapsed time from activation of the first device, and second time information indicating a time in the first device.
Inline encryption of packet data in a wireless communication system
The disclosure describes wireless communication systems. The wireless communication system includes first memory, second memory, a direct memory access (DMA) controller, an encryption engine in-line between the DMA controller and the second memory, a first microprocessor, and a second microprocessor. The first microprocessor communicates with other systems that generate application data to be wirelessly transmitted. The application data to be wirelessly transmitted is stored in the second memory and programs the DMA controller to transfer packets of the application data to the first memory from the second memory. The encryption engine receives the packets of the application data from the DMA controller, encrypts the packets to generate encrypted application data packets, and outputs the encrypted application data packets for storage to the first memory.
Inline encryption of packet data in a wireless communication system
The disclosure describes wireless communication systems. The wireless communication system includes first memory, second memory, a direct memory access (DMA) controller, an encryption engine in-line between the DMA controller and the second memory, a first microprocessor, and a second microprocessor. The first microprocessor communicates with other systems that generate application data to be wirelessly transmitted. The application data to be wirelessly transmitted is stored in the second memory and programs the DMA controller to transfer packets of the application data to the first memory from the second memory. The encryption engine receives the packets of the application data from the DMA controller, encrypts the packets to generate encrypted application data packets, and outputs the encrypted application data packets for storage to the first memory.
Dynamic forward proxy chaining
Methods for dynamic forward proxy chaining are performed by systems and devices. A forward proxy server receives an electronic communication message that includes destination information in a header and payload information. Destination information includes an ordered set of subsequent destination identifiers associated with subsequent forward proxy servers and an ultimate destination identifier for the electronic communication message. The destination information in the electronic communication message is modified by the forward proxy server to generate a modified electronic communication message. Based on proxy operations performed by the forward proxy server, destination information is modified by removing destinations, adding destinations, altering ports for destinations, and other modifications. The forward proxy server establishes an electronic connection with a next destination based on the destination information or the modified destination information, and the modified electronic communication message is provided to the next destination by the forward proxy server via the electronic connection.
Dynamic forward proxy chaining
Methods for dynamic forward proxy chaining are performed by systems and devices. A forward proxy server receives an electronic communication message that includes destination information in a header and payload information. Destination information includes an ordered set of subsequent destination identifiers associated with subsequent forward proxy servers and an ultimate destination identifier for the electronic communication message. The destination information in the electronic communication message is modified by the forward proxy server to generate a modified electronic communication message. Based on proxy operations performed by the forward proxy server, destination information is modified by removing destinations, adding destinations, altering ports for destinations, and other modifications. The forward proxy server establishes an electronic connection with a next destination based on the destination information or the modified destination information, and the modified electronic communication message is provided to the next destination by the forward proxy server via the electronic connection.
Wireless communication with code separation
In an example of the described techniques, a wireless communication system includes first memory, second memory, a first microcontroller, and a second microcontroller. The first microcontroller manages drivers for a wireless transceiver and direct data movement between the wireless transceiver and the first memory. The second microcontroller communicates with other systems that generate application data to be wirelessly transmitted. The application data to be wirelessly transmitted is stored in the second memory. Additionally, the second microcontroller direct data movement between the second memory and the first memory.
Wireless communication with code separation
In an example of the described techniques, a wireless communication system includes first memory, second memory, a first microcontroller, and a second microcontroller. The first microcontroller manages drivers for a wireless transceiver and direct data movement between the wireless transceiver and the first memory. The second microcontroller communicates with other systems that generate application data to be wirelessly transmitted. The application data to be wirelessly transmitted is stored in the second memory. Additionally, the second microcontroller direct data movement between the second memory and the first memory.
Decrypting synthetic transactions with beacon packets
Decrypting synthetic transactions with beacon packets is provided. A probe receives, from a client device, a start beacon packet that identifies a test of a service provided by one or more servers. The probe establishes, responsive to receipt of the start beacon packet, a log for the test. The probe stores, in the log established responsive to the start beacon packet, data packets transmitted between the client device and the one or more servers subsequent to the start beacon packet and encrypted with a key using a security protocol. The probe receives, from the client device, key information used to decrypt the data packets of the test encrypted with the key using the security protocol. The probe provides at least one of the data packets for evaluation or decryption using the key information to determine a performance of the service.
Decrypting synthetic transactions with beacon packets
Decrypting synthetic transactions with beacon packets is provided. A probe receives, from a client device, a start beacon packet that identifies a test of a service provided by one or more servers. The probe establishes, responsive to receipt of the start beacon packet, a log for the test. The probe stores, in the log established responsive to the start beacon packet, data packets transmitted between the client device and the one or more servers subsequent to the start beacon packet and encrypted with a key using a security protocol. The probe receives, from the client device, key information used to decrypt the data packets of the test encrypted with the key using the security protocol. The probe provides at least one of the data packets for evaluation or decryption using the key information to determine a performance of the service.