H04L61/25

Entity IP mapping

Systems and methods for mapping IP addresses to an entity include receiving at least one domain name associated with the entity. Embodiments may further include determining one or more variations of the at least one domain name based on analysis of domain name data collected from a plurality of domain name data sources that mention a variation of the at least one domain name. Some embodiments may also include identifying one or more IP addresses pointed to by the one or more variations of the entity's domain name based on analysis of IP address data collected from a plurality of IP address data sources. Additional embodiments include assigning weights to each of the identified one or more IP addresses and creating a mapping of IP addresses to associate with the entity based on analysis of the weighted one or more IP addresses.

Entity IP mapping

Systems and methods for mapping IP addresses to an entity include receiving at least one domain name associated with the entity. Embodiments may further include determining one or more variations of the at least one domain name based on analysis of domain name data collected from a plurality of domain name data sources that mention a variation of the at least one domain name. Some embodiments may also include identifying one or more IP addresses pointed to by the one or more variations of the entity's domain name based on analysis of IP address data collected from a plurality of IP address data sources. Additional embodiments include assigning weights to each of the identified one or more IP addresses and creating a mapping of IP addresses to associate with the entity based on analysis of the weighted one or more IP addresses.

Secure ephemeral access to insecure devices
11750585 · 2023-09-05 · ·

Embodiments are described for establishing a connection between a premise device and a remote user. A security message may be received from an authentication server. The security message may include an origination address of a request from an authenticated remote user. Connections may be allowed from the origination address of the authenticated remote user with the premise device. A timer may be started which counts an amount of time that the connections are allowed. Forwarding may be enabled of connection data between the premise device and the remote user. An acknowledgement message may be sent to the authentication server indicating completion of preparation of the remote access.

Secure ephemeral access to insecure devices
11750585 · 2023-09-05 · ·

Embodiments are described for establishing a connection between a premise device and a remote user. A security message may be received from an authentication server. The security message may include an origination address of a request from an authenticated remote user. Connections may be allowed from the origination address of the authenticated remote user with the premise device. A timer may be started which counts an amount of time that the connections are allowed. Forwarding may be enabled of connection data between the premise device and the remote user. An acknowledgement message may be sent to the authentication server indicating completion of preparation of the remote access.

Network-based remote control

The subject matter of the present disclosure can be implemented in, among other things a computer-readable storage medium encoded with instructions for causing a programmable processor to receive, by a server, a first message from a remote control that is distinct from and external to the server, wherein the first message includes a remote control identifier and control information for controlling one or more functions of at least one device other than the remote control. The instructions also cause the programmable processor to retrieve, by the server, a controlled device identifier that uniquely identifies a controlled device that is distinct from and external to the server. The instructions also cause the programmable processor to send a second message from the server to the controlled device identified by the controlled device identifier to control an operation of the controlled device.

Network-based remote control

The subject matter of the present disclosure can be implemented in, among other things a computer-readable storage medium encoded with instructions for causing a programmable processor to receive, by a server, a first message from a remote control that is distinct from and external to the server, wherein the first message includes a remote control identifier and control information for controlling one or more functions of at least one device other than the remote control. The instructions also cause the programmable processor to retrieve, by the server, a controlled device identifier that uniquely identifies a controlled device that is distinct from and external to the server. The instructions also cause the programmable processor to send a second message from the server to the controlled device identified by the controlled device identifier to control an operation of the controlled device.

TRANSMISSION OF ADDRESS TRANSLATION TYPE PACKETS
20230342307 · 2023-10-26 ·

Apparatuses, systems and methods for routing requests and responses targeting a shared resource. A queue in a communication fabric is located in a path between the requesters and a shared resource. In some embodiments, the shared resource is a shared address translation cache stored in an endpoint. The physical channel between the queue and the shared resource supports multiple virtual channels. The queue assigns at least one entry to each virtual channel of a group of virtual channels where the group includes a virtual channel for each address translation request type from a single requester of the multiple requesters. When the at least one entry for a given requester is de-allocated, the queue allocates this entry only with requests from the assigned virtual channel even if the empty entry is the only available entry of the queue.

TRANSMISSION OF ADDRESS TRANSLATION TYPE PACKETS
20230342307 · 2023-10-26 ·

Apparatuses, systems and methods for routing requests and responses targeting a shared resource. A queue in a communication fabric is located in a path between the requesters and a shared resource. In some embodiments, the shared resource is a shared address translation cache stored in an endpoint. The physical channel between the queue and the shared resource supports multiple virtual channels. The queue assigns at least one entry to each virtual channel of a group of virtual channels where the group includes a virtual channel for each address translation request type from a single requester of the multiple requesters. When the at least one entry for a given requester is de-allocated, the queue allocates this entry only with requests from the assigned virtual channel even if the empty entry is the only available entry of the queue.

Dynamic binding and load determination in a content delivery network
11831603 · 2023-11-28 · ·

A content provider has a plurality of content provider domain names, and a content delivery network (CDN) allocates a plurality of CDN domain names to the particular content provider. The content provider domain names are mapped to the CDN domain names. CDN domain names are bound to corresponding CDN clusters. The binding of the of CDN domain names to corresponding CDN clusters is modified.

Dynamic binding and load determination in a content delivery network
11831603 · 2023-11-28 · ·

A content provider has a plurality of content provider domain names, and a content delivery network (CDN) allocates a plurality of CDN domain names to the particular content provider. The content provider domain names are mapped to the CDN domain names. CDN domain names are bound to corresponding CDN clusters. The binding of the of CDN domain names to corresponding CDN clusters is modified.