Patent classifications
H04L61/5053
Method and Device for Managing Internet Protocol Version 6 Address, and Terminal
The method includes that: when a first service has yet not ended before an original lifetime of a first IPv6 address terminates, a first terminal sends an address updating request message for querying about whether or not the first service supports IPv6 address updating to a second terminal; the first terminal receives an address updating response message returned by the second terminal; when a first determination result carried in the address updating response message indicates that the first service supports IPv6 address updating, the first terminal requests to establish a backup session for the first service with the second terminal by virtue of a second IPv6 address, which is pre-stored; and in the case that the first service has yet not ended when the original lifetime of the first IPv6 address terminates, the first terminal continues executing the first service with the second terminal by virtue of the backup session.
System and method for automatically learning and maintaining IP address allocation topology
A topology map engine obtains, from a dynamic host control protocol relay device, a relayed request, of a client, for a dynamic host control protocol lease. The relayed request has at least one given IP address of the dynamic host control protocol relay device inserted therein. A search is made in a database for that IP address. If not found, dynamic host control protocol relay device information is obtained. This information includes: an identifier of the dynamic host control protocol relay device; and at least one network interface of the dynamic host control protocol relay device and any internet protocol addresses assigned to same. This information is obtained at the topology map engine and stored in the database.
ASSIGNING DEVICE IDENTIFIERS BY HOST IDENTIFIER AVAILABILITY
A method for electronic device identifier assignment at a host computing device includes receiving, from a separate electronic device, a current local identifier of the separate electronic device and a full unique identifier of the separate electronic device. A host-specific identifier is assigned to the separate electronic device by, based at least in part on determining that the current local identifier of the separate electronic device is included in a set of local identifier values available for assignment, assigning the host-specific identifier to the separate electronic device with a same local identifier value as the current local identifier. Based at least in part on determining that the current local identifier of the separate electronic device is already assigned by the host computing device to a different separate electronic device, the host-specific local identifier is selected from the set of local identifier values available for assignment and assigned to the separate electronic device.
Cross-layer correlation in secure cognitive network
A communication network is defended using a distributed infrastructure that leverages coordination across disparate abstraction levels. At each node computing device comprising a communication network, a stored event list is used to detect at least one node event which occurs at a machine code level and is known to have the potential to interfere directly with the internal operation of the node computing device. The at least one node event is one which is exclusive of an event within a network communication domain. In response to detecting the at least one node event at one of the plurality of network nodes, an optimal network-level defensive action is automatically selectively determined by the network. The network level defensive action will involve a plurality of network nodes comprising the communication network.
EXTENDING NETWORK ADDRESS LIFETIME WHEN ADDRESS SYSTEM IS UNAVAILABLE
Embodiments disclosed herein provide systems, methods, and computer readable media for extending the lifetime of a network address when an address system is unavailable. In a particular embodiment, a method provides, upon determining that a first network address for a network element has reached a preferred lifetime for the first network address, transitioning the network element to an extended rebind state that allows the first network address to remain in the preferred state. While the network element is in the extended rebind state, the method provides attempting to contact an address system and determining whether a second network element is assigned the first network address. The method further provides maintaining the first network address in the preferred state and the network element in the extended rebind state until contact is made with the address system or the second network element is determined to be assigned the first network address.
Communication method and mobile electronic device using the same
A communication method and a mobile electronic device are provided. The communication method includes: receiving a message packet; determining whether or not the received message packet is an abnormal packet; and when the received message packet is determined out as the abnormal packet, increasing a count value; keeping to receive the message packets and determine whether or not the received message packet is an abnormal packet; and when the count value is greater than an upper-limit value, re-deriving an IP address.
Cloud-assisted peer-to-peer virtual access endpoint
Technologies directed to a secured peer-to-peer cloud-assisted authentication exchange protocol are described. A first wireless device receives a first request including information identifying a second wireless device. The first wireless device determines that the information matches second information. The first wireless device activates a virtual access point (VAP) with a modified service set identifier (SSID) having a group identifier appended to a first SSID. The first wireless device authenticates the second wireless device to the VAP. The first wireless device sends credentials and a second SSID to the second wireless device. The second SSID corresponds to a second access point (AP). The first wireless device receives a second request from the second wireless device to connect to the second AP. The first wireless device authenticates the second wireless device with the second AP. The first wireless device deactivates the VAP after expiration of an amount of time.
SHORT-TERM LEASE ALLOCATION FOR NETWORK ADDRESS CONFLICT REDUCTION IN DHCP FAILOVER DEPLOYMENTS
Systems and methods are provided for monitoring a connection state between a primary DHCP server and a secondary DHCP server, determining that a connection between the primary DHCP server and the secondary DHCP server has not been established within a first timeframe, establishing a partner-down operation state at one or more of the primary DHCP server and secondary DHCP server, and, during an established partner-down operation state, issuing/allocating short-term network address leases from one of the primary DHCP servers or secondary DHCP servers. Short-term network leases of the present disclosure may have a duration of between 1 second and 5 minutes.
UNSOLICITED HANDLING OF UNIQUE IDENTIFIER FOR STATIONS
Methods, systems, and computer readable media can be operable to facilitate an exchange of messages between an access point and a station, wherein the access point an unsolicited unique identifier response that comprises a unique identifier from the station. The station provides the unsolicited unique identifier response to the access point after a secure connection is established between the access point and the station such that the unsolicited unique identifier response is sent via the secure connection. The response from the station may include additional limitations on the use of the unique identifier by the access point. The access point may provide different features a station or allow or disallow access to a service or a feature depending upon the unsolicited unique identifier response received from the station.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR CREATING INTERNET PROTOCOL (IP) ADDRESS POOLS FROM DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) SERVERS TO ASYNCHRONOUSLY SERVE IP ADDRESS ALLOCATION REQUESTS BY SESSION MANAGEMENT FUNCTIONS (SMFs)
A method for obtaining and maintaining Internet protocol (IP) address pools and using the IP address pools to respond to IP address allocation requests from service management functions (SMFs) includes, at an IP address provider microservice implemented using at least one processor, obtaining from dynamic host configuration protocol (DHCP) servers, a plurality of IP addresses and corresponding IP address leases and storing the IP addresses in IP address pools. The steps further include maintaining the IP address leases. The method further includes receiving, from an SMF, a request for allocation of an IP address. The method further includes allocating one of the IP addresses from one of the pools to the SMF. The method further includes communicating the IP address to the SMF.