H04L47/19

Methods for internet communication security
11729143 · 2023-08-15 · ·

The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users, and data protocol in network communications by exchanging nonpublic identification codes, application identifiers, and data type identifiers via pre-established communication pathways and comparing against pre-established values to provide authorized communication and prevent compromised nodes from spreading malware to other nodes.

Software-Based Fabric Enablement
20230308347 · 2023-09-28 ·

A first fabric abstraction layer couples to a data link layer and a physical layer of a network fabric device. The network fabric device is connected to other network elements within a network via at least one network connection, such as a fiber optic connection. A second fabric abstraction layer couples to the data link layer and an application of the network device. The second fabric abstraction layer provides an application programming interface (API) to the application. The API allows the application to generate configuration instructions for configuring the at least one network connection. Upon receiving the configuration instructions generated by the application, the second abstraction layer sends the configuration instructions to the first abstraction layer via the data link layer. The first abstraction layer then configures the at least one network connection to transmit data according to the configuration instructions.

DETERMINING TRACEABILITY OF NETWORK TRAFFIC OVER A COMMUNICATIONS NETWORK

System and method for determining traceability of network request traffic over a communications network for reducing strain in traffic processing resources, which includes: provisioning a direct interconnect on the communications network between the server and a predefined source, the direct interconnect providing a private service interface, a defined pairings data of the predefined source with the direct interconnect stored in a storage as a network traffic almanac; provisioning a public service interface on the communications network; receiving a request traffic having an address of the predefined source via the public service interface; consulting the defined paring data with the address to determine if the request traffic matches the predefined source; and de-prioritizing processing of the request traffic based on the request traffic being received on the public service interface rather than the direct interconnect, by dynamically applying a prioritize criterion to the second request traffic before generating a response traffic.

Stateless distributed load-balancing

Aspects of the subject technology provide state-less load-balancing using sequence numbers to identify traffic flows. In some implementations, a process of the technology can include steps for receiving, by a load-balancer, a first packet from a source device including a request to access the service provided by a server coupled to the load-balancer, determining a load for each of the servers, wherein each server is associated with a unique set of sequence numbers, and forwarding the request to a target server selected based on its corresponding load, and wherein the request is configured to cause the target server to issue a reply to the source device. Systems and machine-readable media are also provided.

Methods for Internet Communication Security
20220014499 · 2022-01-13 ·

The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users, and data protocol in network communications by exchanging nonpublic identification codes, application identifiers, and data type identifiers via pre-established communication pathways and comparing against pre-established values to provide authorized communication and prevent compromised nodes from spreading malware to other nodes.

Method and apparatus for configuring QoS flow in wireless communication system

The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The present disclosure relates to a method and an apparatus for configuring a QoS flow in a mobile communication system.

Session maturity model with trusted sources

Aspects of the present disclosure disclose provide systems and methods for performing session maturity modeling and tracking to aid in the identification of network traffic that should and/or should not be subjected to DOS mitigation mechanisms. More specifically, based on a maturity status of identification information associated with a communication, a communication may bypass high traffic mitigation mechanisms such as packet rate and connection rate limitations.

Methods for Transmitting and Receiving Data in 5G NR Device Based on Data/Service Tagging from Application Processor

Techniques and devices for service-specific tagging of data by an application processor (AP) of a user equipment device (UE). A first indication may be sent from the UE to a baseband processor (BB) of the UE of one or more quality of service preferences for an upcoming data session, and the BB may configure one or more layers of the BB according to the quality of service preferences. The BB may further communicate with a network to establish protocols for the quality of service preferences. The BB may determine one or more network conditions, and may transmit feedback from the BB to the AP related to the determined network conditions. In response, the AP may send a second indication of one or more updated quality of service preferences to the BB based at least in part on the feedback received from the BB.

User space redirect of packet traffic

Enhanced packet redirect capabilities are disclosed herein for draining traffic to a server. In an implementation, a server in an infrastructure service receives a packet from a stateless load balancer. The packet may comprise a request for content. A user space program on the server determines whether a connection identified in the packet belongs to the server. If the connection belongs to the server, the user space program handles the request for the content. If not, the server forwards the packet to a secondary server in the infrastructure service. The secondary server, to which the connection may belong, can then handle the request.

Protocols and methods for transmitting a data flow transiting between a host computer and a remote client
11165852 · 2021-11-02 · ·

Protocols for transmitting a data flow transiting between a host computer and a remote client use the bandwidth of a computer network. The data includes at least display and sound data generated by a user session running on the host computer, and control data generated by at least one remote system I/O device. The transmission protocol includes a plurality of data flow reliability treatments to address transmission failures, the reliability treatments applying to the display, sound and control data respectively being different from each other.