Patent classifications
H04L2101/30
Service providing apparatus, storage medium and service providing method
A service providing apparatus configured to acquire a resource request from a terminal apparatus, specify destination information, which is associated with authentication information stored in a storage and coinciding with authentication information included in the acquired resource request, from the storage, determine whether domain information included in the acquired resource request and the specified destination information coincide with each other, and transmit a first response including information indicating that authentication is required and the domain information to the terminal apparatus when the domain information and the destination information coincide with each other, and transmit a second response not including the domain information to the terminal apparatus when the domain information and the destination information do not coincide with each other.
ELECTRONIC APPARATUS, SYSTEM FOR INTERNET-OF-THINGS ENVIRONMENT AND CONTROL METHOD THEREOF
A first electronic apparatus is provided including a communicator configured to communicate with at least one among a plurality of electronic apparatuses respectively assigned with main resource identifiers for identifying the apparatuses over a network and a controller configured to assign a sub resource identifier, which corresponds to a main resource identifier of a second electronic apparatus and has a smaller unit size than the main resource identifier, to the second electronic apparatus, transmit the assigned sub resource identifier to the second electronic apparatus which the second electronic apparatus stores, use the assigned sub resource identifier of the second electronic apparatus to request communication with the second electronic apparatus, begin communication with the second electronic apparatus if the second electronic apparatus responds to the request for communication, and perform an operation of the second electronic apparatus based on a command from the first electronic apparatus.
SYSTEMS AND METHODS FOR DELAY TOLERANT NETWORKING IN A NETWORK OF MOVING THINGS, FOR EXAMPLE INCLUDING A NETWORK OF AUTONOMOUS VEHICLES
Systems and methods for optimizing data communication in a network of moving things. As non-limiting examples, various aspects of this disclosure provide systems and methods for communicating delay tolerant information in a network of moving things, for example comprising any of a variety of types of vehicles (e.g., autonomous vehicles, vehicles controlled by local operators, vehicles controlled by remote operators, etc.).
Provisioning tool for a content delivery network (CDN)
A tool that allows a CDN customer, partner, or other authorized entity to create a DNS canonical name (CNAME) on the content delivery network without having to contact the content delivery network service provider directly.
RELIABILITY OF A CONNECTION DURING A COMMUNICATION SESSION ON A NETWORK DEVICE
The present application details methods and systems for improving the reliability of a connection during a communication session on a network device. In one or more embodiments, the network device maps to and connects with multiple datacenters. For example, the network device connects with a primary datacenter and participates in a communication session via a primary media bridge connection while jointly being connected with a secondary datacenter. In addition, the network device can switch from the primary media bridge connection to a secondary media bridge connection if a fault is detected on the primary media bridge connection.
CLASSIFYING UNIFORM RESOURCE LOCATORS
A target domain name is classified using hash strides including domain name components. The hash strides are fed into a set of bloom filters programmed to identify pre-determined domain name categories. A programmable mapping table is provided for selecting one of many probable classifications.
Server-side detection and mitigation of client-side content filters
A server-side technique to detect and mitigate client-side content filtering, such as ad blocking. In operation, the technique operates on a server-side of a client-server communication path to provide real-time detect the existence of a client filter (e.g., an ad blocker plug-in) through transparent request exchanges, and then to mitigate (defeat) that filter through one or operations designed to modify the HTML response body or otherwise obscure URLs. Preferably, the publisher (the CDN customer) defines one or more criteria of the page resources being served by the overlay (CDN) and that need to be protected against the client-side filtering.
CLASSIFYING UNIFORM RESOURCE LOCATORS
A target domain name is classified using hash strides including domain name components. The hash strides are fed into a set of bloom filters programmed to identify pre-determined domain name categories. A programmable mapping table is provided for selecting one of many probable classifications.
INTERNET OF THINGS DEVICE HIERARCHIES
In embodiments, Internet of Things (IoT) devices may be organized according to an IoT device hierarchy, which may include parent and/or child associations between resources associated with IoT devices and/or with groupings of IoT devices. IoT devices wishing to support an IoT device hierarchy may utilize an extended IoT device resource model which provides for IoT device hierarchy information and interfaces to be provided by supporting IoT devices. A supporting resource may have one or more parent properties and/or child properties which may identify, respectively, parent or child resources which are associated with the resource. In various embodiments, these parent properties and/or child properties may include uniform resource identifiers (URI). A supporting resource may also identify an interface type for a hierarchical access interface, through which one or more descendant resources may be accessed through a single command. Other embodiments may be descried and/or claimed.
CCN routing using hardware-assisted hash tables
One embodiment provides a system that facilitates forwarding of packets with variable length names. During operation, the system receives a packet with a hierarchically structured variable length identifier (HSVLI) which comprises contiguous name components ordered from a most general level to a most specific level. The system performs a longest prefix match lookup by selecting an entry from a first data structure of entries. The entries indicate a name component, forwarding information for the name component, and a plurality of entry identifiers that chain an entry to another entry. If a size of the name component is less than or equal to a predetermined threshold, the system selects an entry based on the name component. If the size is greater, the system selects an entry based on a compressed key which can be a hash of the name component. The system also resolves collisions associated with the selected entry.