Patent classifications
H04L2101/30
Semantic validation method and apparatus
A semantic validation method, applied to a Machine-to-Machine Communications (M2M) system, where the method includes receiving, by an apparatus storing a semantic description resource, an operation request related to a first semantic description resource, including semantic information of the first semantic description resource, an association relationship between the first semantic description resource and another semantic description resource, and a uniform resource identifier (URI) of an ontology referenced by the first semantic description resource, determining that the first semantic description resource is associated with the semantic description resource, sending a semantic validation request message to an apparatus that stores the ontology referenced by the first semantic description resource. Hence, accuracy of a resource and data shared between industries and applications using a public capability of the M2M system can be ensured in a case of no priori knowledge.
Method for evaluating domain name and server using the same
The disclosure provides a method for evaluating domain name and a server using the same method. The method includes: retrieving a raw domain name and dividing the raw domain name into a plurality of parts; retrieving a specific part of the parts, wherein the specific part include characters; encoding the characters into encoded data; padding the encoded data to a specific length; projecting the encoded data being padded as embedded vectors; sequentially inputting the embedded vectors to a plurality cells of a long short term memory model to generate a result vector; and converting the result vector to a prediction probability via a fully-connected layer and a specific function.
NETWORK COMMUNICATION METHOD, SYSTEM, COMPUTING DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM
Techniques for network communication are described herein. The disclosed techniques include generating a request for accessing a target server by a computing device, the request comprising a URL; determining whether to select a QUIC transport protocol based on the URI; selecting the QUIC transport protocol in response to a determination that the URL comprises QUIC identification information; and establishing a QUIC connection with the target server via a QUIC stack of the computing device according to the QUIC transport protocol.
Domain name obfuscation and metadata storage via encryption
Systems and methods are described for the generation of domain names that may be associated with a particular user device and may be encrypted to obfuscate the domain names of content requested by the user device.
Establishing quality of service for internet of things devices
Techniques for establishing network quality of service for an internet of things device are described. A manufacturer usage description identifier relating to the internet of things device is received. The internet of things device is coupled to a communication network. Quality of service parameters relating to the internet of things device and the communication network are determined based on the manufacturer usage description identifier. The quality of service parameters are provided to a network policy controller. The network policy controller is configured to establish a quality of service for the internet of things device on the communication network based on the one or more quality of service parameters.
Cross-chain interactions using a domain name scheme in blockchain systems
Implementations of the present disclosure include identifying, by a relay that is communicatively linked with a first blockchain instance and a second blockchain instance in a unified blockchain network, a blockchain domain name of a first blockchain instance; identifying a blockchain domain name of the second blockchain instance; receiving, from a node of the first blockchain instance, an access request for accessing the second blockchain instance, wherein the access request including the blockchain domain name of the second blockchain instance; identifying a chain identifier of the second blockchain instance based on the blockchain domain name of the second blockchain instance, wherein the chain identifier of the second blockchain instance indicates a blockchain network configuration of the second blockchain instance; and providing access to the second blockchain instance for the first blockchain instance based on the blockchain network configuration indicated by the chain identifier of the second blockchain instance.
HYBRID CLOUD APPLICATION PROGRAMMING INTERFACE MANAGEMENT PLATFORM
A system and method are disclosed for managing the deployment of application programming interfaces (APIs) within a hybrid cloud network architecture. APIs can be created for applications or services deployed to a hybrid cloud including public clouds and/or private clouds. The APIs are deployed to API gateways associated with each data center in the network. The network is conceptually divided into spaces, where each space corresponds to a set of API gateways deployed within designated geographical regions. The API gateways are mapped to the network locations for the API gateways by interacting with Domain Name System (DNS) name servers. API calls use the domain names as included in the DNS records to resolve the API call as being directed to a specific API gateway corresponding to the service for the API call.
IP TOLERANCE AND SIGNALING INTERWORKING
In an attempt to establish a communication session between a first communication entity and a second communication entity, a first message is received. For example, the first message may be a SIP INVITE message. A determination is made, based on a registration message from the first communication entity and/or the second communication entity, that at least one of the first communication entity or the second communication entity is Internet Protocol (IP) version intolerant. In response to determining that the at least one of the first communication entity or the second communication entity is IP version intolerant, one or more IP addresses are adapted in messages (e.g., the SIP INVITE message) for establishing the communication session. The adaption changes/removes the one or more IP addresses to a different IP version to ensure proper IP compatibility.
Systems and methods to bypass online advertisement blockers
Some embodiments provide an adblocking bypass system for ensuring that advertisements are loaded and presented on a user device running one or more adblockers. The adblocking bypass system is comprised of a bypass loader and a bypass proxy. The bypass loader is a component that is embedded within content publisher content. When the content publisher content is downloaded and parsed by a user device, the bypass loader executes by detecting the presence of any adblocker on the user device. If found, the bypass loader forwards any blocked advertisement calls to the bypass proxy. The bypass proxy retrieves the requested advertisements and returns them to the bypass loader which then reintroduces the advertisements in final content presentation or rendering. The bypass proxy may also modify the content publisher content by replacing any blocked advertisement calls embedded within the content with calls to the bypass proxy.
METHOD AND APPARATUS FOR GENERATING SUMMARY OF URL FOR URL CLUSTERING
A method for generating a summary of URL (Uniform Resource Locator) according to an aspect of the inventive concept is performed by a computer device. The method may include obtaining a URL, parsing the URL to extract fields from the URL, generating attribute information indicating characteristics of each field for the fields, and generating a summary of the URL using the attribute information. A summary of an URL may be generated by reflecting structural characteristics of the URL, and the summary may be provided to URL clustering. Therefore, URL clustering in which the structural characteristics of the URL are fully reflected becomes possible. Furthermore, unlike existing machine learning-based clustering, a URL summary is generated based on rules and applied to URL clustering. Therefore, an operation time required for URL summarization or clustering is short, and it is possible to immediately reflect new data.