Patent classifications
H04L61/301
DATA NETWORK NAME (DNN) MANIPULATION
A method of operating a core access and mobility management function (AMF) node configured to operate in a communications network includes receiving a protocol data unit (PDU) session request from user equipment (UE). The PDU session request includes a requested data network name (DNN). The method also includes determining if a trigger has been activated. The method further includes receiving a manipulated DNN or replacement DNN for the requested DNN in response to the trigger being activated.
DATA NETWORK NAME (DNN) MANIPULATION
A method of operating a core access and mobility management function (AMF) node configured to operate in a communications network includes receiving a protocol data unit (PDU) session request from user equipment (UE). The PDU session request includes a requested data network name (DNN). The method also includes determining if a trigger has been activated. The method further includes receiving a manipulated DNN or replacement DNN for the requested DNN in response to the trigger being activated.
Point of presence management in request routing
A system and method for the management of client computing device DNS queries and subsequent resource requests within a content delivery network service provider domain are provided. The management of the DNS queries can include the selection of computing devices corresponding to various Point of Presence locations for processing DNS queries. Additionally, the management of the content requests can include the selection of computing devices corresponding to resource cache components corresponding to various Point of Presence locations for providing requested content. The selection of the computing devices can incorporate logic related to geographic criteria, testing criteria, and the like.
Point of presence management in request routing
A system and method for the management of client computing device DNS queries and subsequent resource requests within a content delivery network service provider domain are provided. The management of the DNS queries can include the selection of computing devices corresponding to various Point of Presence locations for processing DNS queries. Additionally, the management of the content requests can include the selection of computing devices corresponding to resource cache components corresponding to various Point of Presence locations for providing requested content. The selection of the computing devices can incorporate logic related to geographic criteria, testing criteria, and the like.
Managing network connected devices
Methods, systems, and computer program products for managing Internet of Things (IoT) network-connected devices.
POINT OF PRESENCE MANAGEMENT IN REQUEST ROUTING
A system and method for the management of client computing device DNS queries and subsequent resource requests within a content delivery network service provider domain are provided. The management of the DNS queries can include the selection of computing devices corresponding to various Point of Presence locations for processing DNS queries. Additionally, the management of the content requests can include the selection of computing devices corresponding to resource cache components corresponding to various Point of Presence locations for providing requested content. The selection of the computing devices can incorporate logic related to geographic criteria, testing criteria, and the like.
POINT OF PRESENCE MANAGEMENT IN REQUEST ROUTING
A system and method for the management of client computing device DNS queries and subsequent resource requests within a content delivery network service provider domain are provided. The management of the DNS queries can include the selection of computing devices corresponding to various Point of Presence locations for processing DNS queries. Additionally, the management of the content requests can include the selection of computing devices corresponding to resource cache components corresponding to various Point of Presence locations for providing requested content. The selection of the computing devices can incorporate logic related to geographic criteria, testing criteria, and the like.
Cross network rich communications services content
When a Rich Communications Services (RCS) data file is to be provided to a terminating user equipment (UE) that is on a different mobile communications network than an originating UE, the network address, or uniform resource locator (URL), of the RCS data file may be modified to indicate that the RCS data file is to traverse a network-to-network interface (NNI). An RCS system on the originating mobile communications network may identify if the terminating UE is on the same or different mobile communications network. If the terminating UE is on a different mobile communications network, then the RCS system may modify the URL to indicate the originating and terminating mobile communications networks and send the URL to an RCS system of the terminating mobile communications network. The modified URL enables retrieval of the RCS data file network by a content system of the terminating mobile communications network.
NETWORK ADDRESS RESOLUTION
A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource.
COLLECTING PASSIVE DNS TRAFFIC TO GENERATE A VIRTUAL AUTHORITATIVE DNS SERVER
The present application describes a system and method for passively collecting DNS traffic data as that data is passed between a recursive DNS resolver and an authoritative DNS server. The information contained in the collected DNS traffic data is used to generate a virtual authoritative DNS server, or a zone associated with the authoritative DNS server, when it is determined that the authoritative DNS server has been compromised.