H04L12/6418

Network awareness of device location

Systems and methods for managing a network are disclosed. One method can comprise detecting a triggering event at a node. Location information of the node can be transmitted to a routing device in response to the triggering event. Location information of the node can be transmitted to a management device. The management device can be configured to control an operation of one or more of the node and the routing device in response to the location information.

Network validation with dynamic tunneling

Systems and methods for provisioning and validating a network are disclosed. One method can comprise providing a first communication tunnel between a network access point and a first tunnel endpoint. Availability of the first tunnel endpoint can be determined. If the first tunnel endpoint is determined to be available, network traffic can be routed to the first tunnel endpoint. If the first tunnel endpoint is determined to be unavailable, a second communication tunnel between the network access point and a second tunnel endpoint can be provided.

Method for preventing electronic control unit from executing process based on malicious frame transmitted to bus

A method for use in a network communication system including a plurality of electronic controllers that communicate with each other via a bus in accordance with a Controller Area Network (CAN) protocol determines whether or not content of a predetermined field in a frame which has started to be transmitted meets a predetermined condition indicating fraud. In a case where the content of the predetermined field meets the predetermined condition, a frame including predetermined consecutive dominant bits for notifying an anomaly is transmitted before an end of the frame is transmitted. A number of times the frame including the predetermined consecutive dominant bits is transmitted is recorded for each identifier (ID) represented by content of an ID field included in a plurality of frames which has been transmitted. A malicious electronic controller is determined in accordance with the number of times recorded for each ID.

Searching apparatus utilizing sub-word finite state machines
11586956 · 2023-02-21 · ·

An apparatus that searches an input stream having a sequence of N-bit wide data words for a pattern using a plurality of small FSMs is disclosed. The apparatus includes a plurality of sub-word FSMs and a combiner. Each sub-word FSM has an input word size less than N-bits. Each FSM processes a corresponding segment of the N-bit words and generates a match output indicative of a possible match to the pattern when one of the input words to that FSM is received and that FSM moves to a predetermined match state. The combiner receives the match outputs from all of the sub-word FSMs and generates a pattern match output if all of the sub-word FSMs indicate a match to the pattern. The pattern is a variable pattern. In one embodiment, the FSMs are single bit FSMs.

Traffic delivery using anycast and end user-based mapping in an overlay network

An overlay network is enhanced to provide traffic delivery using anycast and end user mapping. An anycast IP address is associated with sets of forwarding machines positioned in the overlay network. These locations correspond with IP addresses for zero rated billing traffic. In response to receipt at a forwarding machine of a packet, the machine issues an end user mapping request to the mapping mechanism. The mapping request has an IP address associated with the client from which the end user request originates. The mapping mechanism resolves the request and provides a response to the request. The response is an IP address associated with a set of server machines distinct from the forwarding machine. The forwarding machine encapsulates the packet and proxies the connection to the identified server. The server receives the connection, decapsulates the request, and processes the packet. The server machine responds to the requesting client directly.

GRADE OF SERVICE CONTROL CLOSED LOOP

Systems and methods for managing network traffic receives, at a grade of service device, network traffic information for a plurality of network traffic channels from a network device separate from the grade of service device. The network traffic information is compared to a threshold to determine a behavior value for each network traffic channel. Each network traffic channel is mapped to a grade of service according to the behavior value.

System and method for aggregating and analyzing the status of a system

A state of a system having a plurality of appliances is controlled by using a device discovery process to establish a listing of each of the plurality of appliances in the system. The listing of each of the plurality of appliances is then used, with reference to a command and/or protocol database, to configure a software agent to exchange communications, via a one or more communication channels, with each of the plurality of appliances. An action triggering state of at least one of the plurality of appliances is associated with an action. The action is performed when it is determined that a current state of the at least one of the plurality of appliances corresponds to the action triggering state.

Integrated cloud system for premises automation

A system comprises premises equipment including premises devices located at a premises. The system includes a partner device located at the premises and configured to use a partner protocol different from a protocol of the premises equipment. The system includes a system server configured to interact with the premises devices. The system server is configured to interact with the partner device via a partner proxy corresponding to the partner device. The system includes automation rules coupled to the system server. The automation rules include actions and triggers for controlling interactions between at least one of the partner device and the premises devices. The system includes a user interface coupled to the system server and configured to interact with the premises devices and the partner device.

System communication utilizing path between neighboring networks
11489690 · 2022-11-01 · ·

A method of storing a communication path between neighboring home-control networks is provided. Each home-control network includes a network controller and a plurality of network devices. Each network device is configured to transmit and receive messages using at least one of powerline signaling and radio frequency signaling. A server receives a notification from a first network controller indicating that a first network device within a first home-control network received a message transmitted from a second network device within a second home-control network. The server stores an indication of a communication path from the server to the first network device via the second home-control network in a memory of the server.

System and method for discovering interfaces in a network

A system and method for discovering interfaces in a network is provided wherein a remote system is configured to discover by connecting to plurality of servers, and intelligently stitching together interfaces that exist between different applications. The remote system is configured to identify these interfaces through message queue servers in the network and their queue managers. Further, stitching together the interfaces is done based upon the hops that a message performs from one system to its target application using message queues. Interface name is created by reading message header, applications involved and queue properties. The system capabilities also include tracking the usage of interfaces based on the traffic that is flowing through them. The system provides a repeatable process to obtain accurate repository of interfaces.