H04L2101/30

PLMN selection for mission critical devices

A method for selecting a Public Land Mobile Network (PLMN) at a user equipment (UE), comprising receiving, from a network entity, a list of PLMN identifiers, attempting to register the UE with a network using at least one PLMN identifier from the list of PLMN identifiers, and if the attempt to register with the network is successful, performing a Session Initiation Protocol (SIP) registration to an Internet Protocol (IP) Multimedia Sub-system (IMS) associated to the PLMN identifier.

Server-side detection and mitigation of client-side content filters

A server-side technique to detect and mitigate client-side content filtering, such as ad blocking. In operation, the technique operates on a server-side of a client-server communication path to provide real-time detect the existence of a client filter (e.g., an ad blocker plug-in) through transparent request exchanges, and then to mitigate (defeat) that filter through one or operations designed to modify the HTML response body or otherwise obscure URLs. Preferably, the publisher (the CDN customer) defines one or more criteria of the page resources being served by the overlay (CDN) and that need to be protected against the client-side filtering.

System for detecting and preventing malware execution in a target system

A system for detecting and preventing execution of malware on a target system includes an interface for receiving training data. The training data includes domain names known to be legitimate and domain names known to be associated with malware. The system is configured to train a first model to classify the domain names in the training data as being legitimate domain names or malware-associated domain names using a supervised learning methodology. The system configured to train a second model to predict a correct domain name associated with domain names in the training data using an unsupervised learning methodology. The system configured to train a third model to classify the domain names in the training data as being legitimate domain names or malware-associated domain names based on an output of the first learning model and an output of the second learning model.

NETWORK ADDRESS RESOLUTION
20220191166 · 2022-06-16 · ·

A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource.

DEVICE AND METHOD FOR PROVIDING EDGE COMPUTING SERVICE IN WIRELESS COMMUNICATION SYSTEM
20220191090 · 2022-06-16 ·

The present disclosure relates to a communication technique which combines a 5G communication system, for supporting a higher data transmission rate than 4G systems, with IoT technology, and a system for same. The present disclosure relates to a wireless communication system, and more specifically, the present disclosure relates to: an application layer network structure which provides an edge computing service in a cellular wireless communication system (5G system); and a method for same. A method according to an embodiment of the present disclosure is a method for a terminal to acquire edge data network setting information in order to receive an edge computing service in a wireless communication system, and includes: a step for transmitting an initial provisioning request message to an edge data network configuration server; and a step for receiving, from the edge data network configuration server, an initial provisioning response message including information about an edge data network, wherein the initial provisioning request message may include a URI address of the edge data network configuration server.

INTERNET OF THINGS DEVICE HIERARCHIES
20220182806 · 2022-06-09 ·

In embodiments, Internet of Things (IoT) devices may be organized according to an IoT device hierarchy, which may include parent and/or child associations between resources associated with IoT devices and/or with groupings of IoT devices. IoT devices wishing to support an IoT device hierarchy may utilize an extended IoT device resource model which provides for IoT device hierarchy information and interfaces to be provided by supporting IoT devices. A supporting resource may have one or more parent properties and/or child properties which may identify, respectively, parent or child resources which are associated with the resource. In various embodiments, these parent properties and/or child properties may include uniform resource identifiers (URI). A supporting resource may also identify an interface type for a hierarchical access interface, through which one or more descendant resources may be accessed through a single command. Other embodiments may be descried and/or claimed.

Specifying link layer information in a URL

A system of specifying link layer information in a URL is described. In an embodiment, a URL is generated which includes both a link layer network type and information which is used by a resolving device to identify a particular link layer network of the specified type. In various embodiments, the URL includes a link layer network type and a corresponding link layer network name or pairs of link layer network types and corresponding link layer network names. Where the URL comprises more than one link layer network name, the resolving device may determine at runtime which of the named link layer networks to connect to and this decision may be based on criteria or preference information included within the URL.

Resource query processing
11350421 · 2022-05-31 · ·

A device may be configured to receive, process, forward, and/or respond to one or more resource queries. For example, the device may determine whether multiple queries are satisfied by a multicast response. The device may receive a first query and a second query directed to a resource, The first and the second query may comprise a structure proxy rule identifier (sPRID). The device may determine the similarity between the two queries. For example, the similarity determination may be based on the sPRID of the two queries. The device may determine whether a response that satisfies the first query also satisfies the second query, which may be based on a response to the first query and information comprised within the sPRID of the two queries. If the response satisfies both queries, the device may multicast the response.

SSL/TLS spoofing using tags
11736516 · 2023-08-22 · ·

A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example, the endpoint DNS agent receives an HTTP message from a client browser including a Server Name Identifier tag, and generates a signed certificate spoofing the domain identified in the Server Name Identifier tag to insert itself as a man-in-the-middle between the identified domain and the client browser.

Optically analyzing text strings such as domain names

Systems and methods determine whether domain names are potentially maliciously registered variants of a set of monitored domain names. A computer system can receive domain names from a feed of newly registered domain names. For each received domain name, the computer system can generate a series of images of the domain name in different fonts and/or with various distortions applied thereto. The computer system can then transform the domain name images back to text via optical character recognition. Due to the differences in fonts and/or distortions applied to the generated images of the received domain name, the optical character recognition process can produce different text strings than the originally received domain name. The converted textual domain names are then analyzed to determine whether any one is sufficiently similar to a monitored domain name, indicating that the received domain name could be a malicious variant thereof.