Patent classifications
H04L12/08
SUPPORTING MULTICAST COMMUNICATIONS
Various example embodiments for supporting multicast communications in a communication system are presented. Various embodiments for supporting multicast communications may be configured to support multicast communications of multiple virtual private networks over a single multicast distribution tree. Various embodiments for supporting multicast communications of multiple virtual private networks over a single multicast distribution tree may support communication of a packet of a virtual private network within a network, wherein the packet includes a set of tuples associated with a set of egress devices to which the packet is to be delivered via a multicast distribution tree supported within the network, wherein, for each of the egress devices, the respective tuple associated with the respective egress device includes a respective device identifier of the egress device that uniquely identifies the respective egress device within the network and a respective label assigned by the respective egress device for the virtual private network.
SUPPORTING MULTICAST COMMUNICATIONS
Various example embodiments for supporting multicast communications in a communication system are presented. Various embodiments for supporting multicast communications may be configured to support multicast communications of multiple virtual private networks over a single multicast distribution tree. Various embodiments for supporting multicast communications of multiple virtual private networks over a single multicast distribution tree may support communication of a packet of a virtual private network within a network, wherein the packet includes a set of tuples associated with a set of egress devices to which the packet is to be delivered via a multicast distribution tree supported within the network, wherein, for each of the egress devices, the respective tuple associated with the respective egress device includes a respective device identifier of the egress device that uniquely identifies the respective egress device within the network and a respective label assigned by the respective egress device for the virtual private network.
Cloud-based managed networking service that enables users to consume managed virtualized network functions at edge locations
A method for providing a managed networking service for a cloud computing system enables users to consume managed virtualized network functions (VNFs) at edge locations. The method includes registering a plurality of third-party vendors for the managed networking service. The plurality of third-party vendors provide a plurality of VNFs for the managed networking service. The method also includes receiving user input from a user of the cloud computing system. The user input includes a request to deploy the plurality of VNFs at an edge location. The plurality of VNFs can be provided by different third-party vendors through the managed networking service. The method also includes causing the plurality of VNFs to be deployed on an edge device that is located at the edge location. The plurality of VNFs can be represented as logical entities in a database that is utilized by the managed networking service.
NETWORK APPLICATION SECURITY QUESTION DETECTION AND MODIFICATION
A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.
NETWORK APPLICATION SECURITY QUESTION DETECTION AND MODIFICATION
A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.
Establishing trust between two devices
Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
Method for detecting a resending of a frame
A method for detecting a resending of a frame, each frame sent that includes an identifier and a counter, the counter remaining identical during a resending, each frame sent being received by a plurality of gateways, each gateway retransmitting each frame to a central server, a response delay being predefined, the method comprising the steps of receiving a first frame comprising an identifier and a counter, storing as reference parameters a first reception time and the counter, receiving a second frame comprising the same identifier and another counter, and, if the values of the counters are equal then determining a second reception time of the second frame, and, if the difference between the reception times is greater than the response delay, then the second frame is a resending of the first frame, and updating the reference parameters with the second reception time.
Method for detecting a resending of a frame
A method for detecting a resending of a frame, each frame sent that includes an identifier and a counter, the counter remaining identical during a resending, each frame sent being received by a plurality of gateways, each gateway retransmitting each frame to a central server, a response delay being predefined, the method comprising the steps of receiving a first frame comprising an identifier and a counter, storing as reference parameters a first reception time and the counter, receiving a second frame comprising the same identifier and another counter, and, if the values of the counters are equal then determining a second reception time of the second frame, and, if the difference between the reception times is greater than the response delay, then the second frame is a resending of the first frame, and updating the reference parameters with the second reception time.
Service registration method and usage method, and related apparatus
A service registration method and usage method, and a related apparatus are used to reduce risks generated when a service of an AP-type service providing node cannot be registered and a CP-type service providing node provides a service since distributed characteristics of a service providing node are not distinguished in a network partition scenario. The method is: obtaining, by a registration service node, network partition information, and receiving a registration request of a service providing node, where the registration request carries a distributed characteristic of the service providing node, and the distributed characteristic meets both consistency and partition tolerance, or meets both availability and partition tolerance; and determining, by the registration service node according to the network partition information and the distributed characteristic of the service providing node, whether registration of a service provided by the service providing node is allowed.
Service registration method and usage method, and related apparatus
A service registration method and usage method, and a related apparatus are used to reduce risks generated when a service of an AP-type service providing node cannot be registered and a CP-type service providing node provides a service since distributed characteristics of a service providing node are not distinguished in a network partition scenario. The method is: obtaining, by a registration service node, network partition information, and receiving a registration request of a service providing node, where the registration request carries a distributed characteristic of the service providing node, and the distributed characteristic meets both consistency and partition tolerance, or meets both availability and partition tolerance; and determining, by the registration service node according to the network partition information and the distributed characteristic of the service providing node, whether registration of a service provided by the service providing node is allowed.