H04L61/457

ROUTING APPLICATION CALLS
20220150161 · 2022-05-12 ·

Disclosed herein are system, method, and computer program product embodiments for routing communication to applications. In an embodiment, first application can transmit a connection to a second application without knowing the exact route address of the second application. An agent can intercept the connection from a first application intended for a second application. The agent can identify the route address for the second application, determine the protocol the connection was intended to be transmitted, and forward the connection based on the route address and protocol to the second application.

Storage unit including memories of different operational speeds for optimizing data storage functions

A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. A computing device receives a data access request for an encoded data slice (EDS) associated with a data object. The computing device compares a slice name of the data access request with slice names stored within RAM. When the data access request slice name compares unfavorably with those stored slice names, the computing device transmits an empty data access response that includes no EDS to the other computing device without needing to access a hard disk drive (HDD) that stores EDSs. Alternatively, the computing device transmits a data access response that includes the EDS.

Parallel execution of request tracking and resource delivery
11190563 · 2021-11-30 · ·

Systems and methods of parallel uniform resource identifier resource extraction are provided. A tracking uniform resource identifier (URI) generation component can generate a first uniform resource locator (URL) that, responsive to actuation by a client computing device, causes the client computing device to send a content item identifier of a content item and a device identifier of the client computing device, via a computer network, to a records server at a first network location identified by the first URL. A resource URI generation component can generate a second URL that, responsive to actuation by the client computing device, causes the client computing device to retrieve, via the computer network, a first resource from a second network location identified by the second URL for display by the client computing device. A content item packaging component can generate the content item.

REGISTRATION MAPPING TOOLKIT FOR GEOFENCES
20220022003 · 2022-01-20 · ·

Systems and methods for creating a database of geofences and registering geofences, with each geofence in the database being associated with an IP address, preferably an IPV6 address. Each geofence is defined using at least one geographic designator, preferably real property boundaries. Entitlements can be associated with geofences relating to permissive and prohibitive activities within the geofences.

Disaggregated resources and access methods

Disaggregated resources distributed among resource nodes provide access to resource consumers by offering resource node information to the resource consumers. Resource node information supplied by each individual resource node comprises incomplete information with respect to the complete disaggregated resource. Resource consumers collect resource node information to create maps of the disaggregated resource, ensure coherency, or manage the disaggregated resource.

Fast roaming and uniform policy for wireless clients with distributed hashing

Techniques for efficient roaming of clients between access points (APs) of a wireless data communications network are described. A first AP receives a request for a first client device to join the network. The request specifies at least a unique identifier for the first client device. An identifier for a second AP is identified by processing the unique identifier using a predefined hash function. The second AP is one of at least two APs configured to each redundantly store network state information relating to the first client device. A network address of the second AP is determined. A first request to is transmitted to the network address, for network state information including a pairwise master key (PMK) and profile information. The PMK and the profile information are received. The first client device is authenticated and a connection is established between the first client device and the network.

Provisioning persistent, dynamic and secure cloud services

Systems and methods may provide for confirming, by a loader module having administrative rights with respect to a computing device, the operability of an activator module on the computing device. Additionally, the activator module may be used to manage an installation status of one or more service agents or software components on the computing device and making them persistent. In one example, confirming the operability of the activator module includes conducting a presence verification and/or authentication of the activator module, wherein a replacement activator module may be downloaded to the computing device if the presence verification and/or authentication is unsuccessful.

Transport layer security extension for hybrid information centric networking

Presented herein is a solution in which a Producer that provides Transport Layer Security (TLS) over a hybrid Information Centric Network (hICN) announces two different hICN prefixes or namespaces. One hICN prefix is for performing a TLS handshake (also called a handshake prefix or handshake namespace) and another hICN prefix (also called a secure prefix or secure namespace) is to publish content in a secure, and confidential manner with a Consumer that correctly performs a TLS handshake. While the handshake prefix is public and shared by multiple Consumers, a secure prefix is uniquely assigned to a Consumer after the TLS handshake successfully terminates. Content published under the secure prefix is encrypted with the encryption key established during the TLS handshake. Names used in the secure namespace are private, meaning only the Consumer and Producer that perform the handshake can infer any information about a content by looking on the name.

Distributed name resolution for geo-location based networking
11641338 · 2023-05-02 · ·

Systems and methods for resolving names in a data network. A data network includes an information-centric network layer, ICN-layer, with multiple routers, and a name resolution layer with multiple name resolvers. Each router receives an interest packet announcement describing data objects provided by a data producer. Each router determines a first name resolver of the name resolution layer closest to the data producer and sends a name of the provided data object and geo-location of the data producer to the first name resolver. The first name resolver transmits the name of the data object and geo-location of the data producer to other name resolvers. Each router receives an interest packet request describing a data object requested by a data consumer. Each router transmits the interest packet request to a second name resolver spatially closest to the data consumer. Each name resolver provides the geo-location of the requested data object to the data consumer.

Registrar mapping toolkit for geofences
11812325 · 2023-11-07 · ·

Systems and methods for creating a database of geofences and registering geofences, with each geofence in the database being associated with an IP address, preferably an IPv6 address. Each geofence is defined using at least one geographic designator, preferably real property boundaries. Entitlements can be associated with geofences relating to permissive and prohibitive activities within the geofences.