Patent classifications
H04L61/25
Online portal for improving cybersecurity risk scores
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity. Embodiments further include calculating a security score for at least one of the one or more types of data based, at least in part, on processing of security information extracted from the at least one type of data, wherein the security information is indicative of a level of cybersecurity. Some embodiments also comprise assigning a weight to the calculated security score based on a correlation between the extracted security information and an overall security risk determined from analysis of one or more previously-breached entities in the same industry as the entity. Additional embodiments include calculating an overall cybersecurity risk score for the entity based, at least in part, on the calculated security score and the weight assigned to the calculated security score.
Online portal for improving cybersecurity risk scores
Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity. Embodiments further include calculating a security score for at least one of the one or more types of data based, at least in part, on processing of security information extracted from the at least one type of data, wherein the security information is indicative of a level of cybersecurity. Some embodiments also comprise assigning a weight to the calculated security score based on a correlation between the extracted security information and an overall security risk determined from analysis of one or more previously-breached entities in the same industry as the entity. Additional embodiments include calculating an overall cybersecurity risk score for the entity based, at least in part, on the calculated security score and the weight assigned to the calculated security score.
NETWORK-BASED REMOTE CONTROL
The subject matter of the present disclosure can be implemented in, among other things a computer-readable storage medium encoded with instructions for causing a programmable processor to receive, by a server, a first message from a remote control that is distinct from and external to the server, wherein the first message includes a remote control identifier and control information for controlling one or more functions of at least one device other than the remote control. The instructions also cause the programmable processor to retrieve, by the server, a controlled device identifier that uniquely identifies a controlled device that is distinct from and external to the server. The instructions also cause the programmable processor to send a second message from the server to the controlled device identified by the controlled device identifier to control an operation of the controlled device.
NETWORK-BASED REMOTE CONTROL
The subject matter of the present disclosure can be implemented in, among other things a computer-readable storage medium encoded with instructions for causing a programmable processor to receive, by a server, a first message from a remote control that is distinct from and external to the server, wherein the first message includes a remote control identifier and control information for controlling one or more functions of at least one device other than the remote control. The instructions also cause the programmable processor to retrieve, by the server, a controlled device identifier that uniquely identifies a controlled device that is distinct from and external to the server. The instructions also cause the programmable processor to send a second message from the server to the controlled device identified by the controlled device identifier to control an operation of the controlled device.
MULTICAST AND UNICAST MEDIUM ACCESS CONTROL (MAC) ADDRESS ASSIGNMENT PROTOCOL (MUMAAP)
Methods and apparatuses are described herein for multicast and unicast MAC address assignment protocol (MUMAAP). A first node may transmit, to a second node, based on a unicast MAC address of the second node or a multicast MAC address associated with the second node, a discover message that may include a first MAC address or a first range of MAC addresses. The first node may receive an offer message with a second range of MAC addresses. If the first node selects a second MAC address from the received second range of MAC addresses, the first node may transmit a request message indicating that the second MAC address or the second range of MAC addresses is allocated to the first node. The first node may receive an acknowledge message indicating that the second MAC address or the second range of MAC addresses is allocated to the first node.
Dynamic binding and load determination in a content delivery network (CDN)
A content provider has a plurality of content provider domain names, and a content delivery network (CDN) allocates a plurality of CDN domain names to the particular content provider. The content provider domain names are mapped to the CDN domain names. CDN domain names are bound to corresponding CDN clusters. The binding of the of CDN domain names to corresponding CDN clusters is modified.
Dynamic binding and load determination in a content delivery network (CDN)
A content provider has a plurality of content provider domain names, and a content delivery network (CDN) allocates a plurality of CDN domain names to the particular content provider. The content provider domain names are mapped to the CDN domain names. CDN domain names are bound to corresponding CDN clusters. The binding of the of CDN domain names to corresponding CDN clusters is modified.
Automated installation location detection for ethernet-based devices
Methods and structures are disclosed for self-automating a process of determining a device's location based on its network address. A computing device includes a network interface configured to communicate with a physical port of a network switch and a memory configured to store a plurality of different initialization protocols each associated with a corresponding network address of a plurality of network addresses. Each of the initialization protocols may be associated with a different physical location. The computing device also includes a processor configured to attempt to connect to the network switch via the network interface using a network address from the stored plurality of network addresses. In response to connecting with the network switch using the network address, the processor identifies a corresponding initialization protocol associated with the network address and executes the corresponding initialized procedure.
Automated installation location detection for ethernet-based devices
Methods and structures are disclosed for self-automating a process of determining a device's location based on its network address. A computing device includes a network interface configured to communicate with a physical port of a network switch and a memory configured to store a plurality of different initialization protocols each associated with a corresponding network address of a plurality of network addresses. Each of the initialization protocols may be associated with a different physical location. The computing device also includes a processor configured to attempt to connect to the network switch via the network interface using a network address from the stored plurality of network addresses. In response to connecting with the network switch using the network address, the processor identifies a corresponding initialization protocol associated with the network address and executes the corresponding initialized procedure.
Network-based remote control
The subject matter of the present disclosure can be implemented in, among other things a computer-readable storage medium encoded with instructions for causing a programmable processor to receive, by a server, a first message from a remote control that is distinct from and external to the server, wherein the first message includes a remote control identifier and control information for controlling one or more functions of at least one device other than the remote control. The instructions also cause the programmable processor to retrieve, by the server, a controlled device identifier that uniquely identifies a controlled device that is distinct from and external to the server. The instructions also cause the programmable processor to send a second message from the server to the controlled device identified by the controlled device identifier to control an operation of the controlled device.