H04L69/30

Protocol model generator and modeling method thereof

A protocol model generator according to the present disclosure includes: a memory in which a protocol model generating program is stored; and a processor configured to execute the program. Herein, upon execution of the program, the processor extracts multiple strings from a binary corresponding to a protocol, generates a message pool including multiple candidate messages to be used in the protocol corresponding to the binary on the basis of the extracted multiple strings, and generates a protocol model corresponding to the protocol and configured to include nodes corresponding to the respective candidate messages included in the message pool. Further, the candidate messages include messages generated on the basis of the strings and response messages generated corresponding to the messages, and the protocol model is generated including one or more nodes and transition information between the nodes.

SYSTEMS AND METHODS FOR UTILIZING CLIENT SIDE AUTHENTICATION TO SELECT SERVICES AVAILABLE AT A GIVEN PORT NUMBER
20200267184 · 2020-08-20 · ·

Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization. A host computer can change the service(s) available at a given port number on a client by client basis, enabling access to service(s) for trusted clients unavailable to untrusted clients. Preferably, client trust is based on client authentication via a certificate and a valid, signed transport layer security (TLS) handshake (or similar mechanism in other protocol contexts). In some embodiments, an authorization step can be added following authentication. The systems and methods disclosed herein find wide uses in bundling services on ports, as well as protecting access to services from untrusted and/or malicious clients, among others.

Background Pre-Loading and Refreshing of Applications with Audio Inhibition
20200257491 · 2020-08-13 ·

A user device (24) includes a display (56), audio circuitry (58) and a processor (44). The processor is configured to run an application that includes visual content and audio content, by: (i) before a user of the user device invokes the application, running the application in a background mode in which the visual content is not visible on the display, and inhibiting the audio content from being played by the audio circuitry, and (ii) after the user invokes the application, switching to run the application in a foreground mode in which the visual content is visible on the display, and permitting the audio content to be played by the audio circuitry.

Communication device, gateway node and methods for preparing a point-to-point session

A method performed by a first communication device, for preparing a point-to-point, Pt2Pt, session with a second communication device is provided. The first communication device receives (202) from the second communication device, information about one or more communication protocol stacks that are supported by the second communication device for use in the Pt2Pt session. The first communication device obtains (208) a first communication protocol stack that is compatible with at least one out of the one or more protocol stacks that are supported by the second communication device. The first communication protocol stack will be used in the Pt2Pt session with the second communication device. The first communication device then re-configures (209) the first communication device to use the first communication protocol stack in the Pt2Pt session, and sends (210) a message to the second communication device. The message comprises information about said compatible first communication protocol stack which is to be used in the Pt2Pt session.

BASE STATION EQUIPMENT, COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, PROGRAM, FRAME TRANSMITTING METHOD, AND DATA STRUCTURE
20200245190 · 2020-07-30 · ·

If the sequence of a traffic of a first communication link from a communication apparatus to another communication apparatus includes a traffic of a second communication link from that another communication apparatus to a communication apparatus, latency is reduced, thereby saving processing time.

If, after data is transmitted from a communication apparatus to another communication apparatus by the upper layer, a data receive response signal is required from that another communication apparatus to the communication apparatus, a predetermined frame including transmission grant information for that another communication apparatus to transmit the receive response signal and data is generated in the communication apparatus. The communication apparatus transmits this generated frame to that another communication apparatus. That is, data and transmission grant information are transmitted from the communication apparatus to that another communication apparatus as a predetermined frame.

Kernel event triggers

The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.

COMMUNICATION PROCESSING METHOD AND APPARATUS USING RELAY
20200196384 · 2020-06-18 ·

Embodiments of this application provide a base station to which a communication processing method using a relay is applied. A control plane protocol layer includes an RRC layer and a PDCP layer that are respectively peering to those of a terminal; and the control plane protocol layer further includes an adaptation layer, an RLC layer, a MAC layer, and a PHY layer that are respectively peering to those of the relay. Via the base station including the control plane protocol layer, information about the RRC layer and the PDCP layer of the terminal does not need to be parsed in the relay, thereby reducing complexity of implementing the relay.

Base station equipment, communication terminal, communication system, program, frame transmitting method, and data structure
10659990 · 2020-05-19 · ·

If the sequence of a traffic of a first communication link from a communication apparatus to another communication apparatus includes a traffic of a second communication link from that another communication apparatus to a communication apparatus, latency is reduced, thereby saving processing time. If, after data is transmitted from a communication apparatus to another communication apparatus by the upper layer, a data receive response signal is required from that another communication apparatus to the communication apparatus, a predetermined frame including transmission grant information for that another communication apparatus to transmit the receive response signal and data is generated in the communication apparatus. The communication apparatus transmits this generated frame to that another communication apparatus. That is, data and transmission grant information are transmitted from the communication apparatus to that another communication apparatus as a predetermined frame.

Systems and methods for utilizing client side authentication to select services available at a given port number
10645119 · 2020-05-05 · ·

Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization. A host computer can change the service(s) available at a given port number on a client by client basis, enabling access to service(s) for trusted clients unavailable to untrusted clients. Preferably, client trust is based on client authentication via a certificate and a valid, signed transport layer security (TLS) handshake (or similar mechanism in other protocol contexts). In some embodiments, an authorization step can be added following authentication. The systems and methods disclosed herein find wide uses in bundling services on ports, as well as protecting access to services from untrusted and/or malicious clients, among others.

KERNEL EVENT TRIGGERS FOR CONTENT ITEM SECURITY
20200125426 · 2020-04-23 ·

The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.