H04L2101/30

SYSTEM AND METHOD FOR CONNECTING A COMMUNICATION TO A CLIENT

A method and system for connecting a communication to a client including at a system bridge, establishing a client subscription connection with a client device; receiving an incoming communication request at the system bridge; publishing an incoming communication notification from the system bridge to the client device; receiving a client communication at the system bridge; and merging the incoming communication request into the client communication at the system bridge.

ESTABLISHING QUALITY OF SERVICE FOR INTERNET OF THINGS DEVICES

Techniques for establishing network quality of service for an internet of things device are described. A manufacturer usage description identifier relating to the internet of things device is received. The internet of things device is coupled to a communication network. Quality of service parameters relating to the internet of things device and the communication network are determined based on the manufacturer usage description identifier. The quality of service parameters are provided to a network policy controller. The network policy controller is configured to establish a quality of service for the internet of things device on the communication network based on the one or more quality of service parameters

METHOD FOR EVALUATING DOMAIN NAME AND SERVER USING THE SAME

The disclosure provides a method for evaluating domain name and a server using the same method. The method includes: retrieving a raw domain name and dividing the raw domain name into a plurality of parts; retrieving a specific part of the parts, wherein the specific part include characters; encoding the characters into encoded data; padding the encoded data to a specific length; projecting the encoded data being padded as embedded vectors; sequentially inputting the embedded vectors to a plurality cells of a long short term memory model to generate a result vector; and converting the result vector to a prediction probability via a fully-connected layer and a specific function.

CUSTOMIZED DOMAIN NAMES IN A CONTENT DELIVERY NETWORK

A computer-implemented method, operable in a content delivery network (CDN) including a plurality of cache servers and domain name servers. At a cache server in the CDN, a first domain name is obtained, the first domain name being associated with a client request for a resource from the cache server. One or more values associated with the client request are determined and a second domain name is generated, including information from the first domain name and information relating to the one or more values associated with the client request. The second domain name is provided to the client. A domain name server in the CDN obtains a request to resolve a first domain name; extracts one or more keys and one or more corresponding values from the first domain name, and generates a second domain name based on the first domain name, the second domain name excluding information from the first domain name relating to the one or more keys and the one or more values. The name server resolves the second domain name using at least some of the one or more values extracted from the first domain name.

Domain Name Obfuscation And Metadata Storage Via Encryption
20200074092 · 2020-03-05 ·

Systems and methods are described for the generation of domain names that may be associated with a particular user device and may be encrypted to obfuscate the domain names of content requested by the user device.

SYSTEMS AND METHODS FOR UTILIZING MOBILE ACCESS POINTS FOR MULTIPLE-NETWORK COMMUNICATION OF DELAY-TOLERANT DATA IN A NETWORK OF MOVING THINGS, FOR EXAMPLE INCLUDING A NETWORK OF AUTONOMOUS VEHICLES

Systems and methods for optimizing data communication in a network of moving things. As non-limiting examples, various aspects of this disclosure provide systems and methods for communicating delay tolerant information in a network of moving things, for example comprising any of a variety of types of vehicles (e.g., autonomous vehicles, vehicles controlled by local operators, vehicles controlled by remote operators, etc.).

Specifying link layer information in a URL

A system of specifying link layer information in a URL is described. In an embodiment, a URL is generated which includes both a link layer network type and information which is used by a resolving device to identify a particular link layer network of the specified type. In various embodiments, the URL includes a link layer network type and a corresponding link layer network name or pairs of link layer network types and corresponding link layer network names. Where the URL comprises more than one link layer network name, the resolving device may determine at runtime which of the named link layer networks to connect to and this decision may be based on criteria or preference information included within the URL.

OPTICALLY ANALYZING DOMAIN NAMES
20200053119 · 2020-02-13 ·

Systems and methods determine whether domain names are potentially maliciously registered variants of a set of monitored domain names. A computer system can receive domain names from a feed of newly registered domain names. For each received domain name, the computer system can generate a series of images of the domain name in different fonts and/or with various distortions applied thereto. The computer system can then transform the domain name images back to text via optical character recognition. Due to the differences in fonts and/or distortions applied to the generated images of the received domain name, the optical character recognition process can produce different text strings than the originally received domain name. The converted textual domain names are then analyzed to determine whether any one is sufficiently similar to a monitored domain name, indicating that the received domain name could be a malicious variant thereof.

METHOD AND SYSTEM FOR UPDATING A WHITELIST AT A NETWORK NODE

A method and a system for updating a first whitelist at a network node. The network node receives data packets from an Internet of Things (IoT) device and determines a predetermined identifier for the IoT device. The network node then determines whether the predetermined identifier is in the first whitelist. When the predetermined identifier is not in the first whitelist, the network node starts a first time period. When the predetermined identified is on the first whitelist, the network node determines whether the data packets are received within the first time period. When the data packets are received within the first time period, the network node identifies destination addresses of the data packets and updates the first whitelist based on the destination addresses and the predetermined identifier. The updated first whitelist is stored in non-transitory computer readable storage medium in the network node.

Managed directory service

Techniques for connecting computer system entities to remote computer system resources are described herein. A computer system entity that requests access to a remote computer system resource has that request fulfilled by a managed directory service which receives the request and connects the computer system entity to the remote computer system resource. While connected, the managed directory service receives commands to perform operations on the remote computer system resource and, if the computer system entity is authorized to perform the operations on the remote computer system resource, the managed directory service performs the operation on the remote computer system resource.