Patent classifications
H04L63/166
System for data routing in networks
Systems, methods, and devices for routing data in a network are described. A user device may send a request for video data that has been captured by a premises device. A computing device at the premises may receive the request and determine a capability of the user device. Based on the capability of the user device, the computing device may select a protocol from a plurality of protocols with which the video data is to be transmitted to the user device. Based on determining that the video data cannot be transmitted via the computing device, the video data may be transmitted from the premises device to the user device via the determined protocol.
Splitting an SSL Connection Between Gateways
A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an SSL connector, for performing an SSL handshake with the client computer using the signed certificate created by said certificate creator, and a second security computer communicatively coupled with a server computer via an SSL connection, and communicatively coupled with the first security computer via a non-SSL connection, including an SSL connector, for performing an SSL handshake with the server computer using a signed certificate provided by the server computer, and a protocol appender, for appending attributes of the signed certificate provided by the server computer within a message communicated to the first security computer. A method is also described and claimed.
INTERCEPTION FOR ENCRYPTED, TRANSCODED MEDIA
Certain embodiments of the invention generally relate to lawful interception of communications for IP Multimedia System-based (IMS-based) voice over IP (VoIP). For example, some embodiments relate to interception of communications including interception for encrypted, transcoded media. A method may include identifying a network node that provides call content interception. The method may also include determining a codec type used at a location of the call content interception at the network node. The method may further include sending a matched codec of the codec type used at the location of the call content interception at the network node to a delivery function in the communications network.
SYSTEMS AND METHOD FOR PAYMENT TRANSACTION PROCESSING WITH PAYMENT APPLICATION DRIVER
A pre-certified payment application driver code configured to satisfy requirements of a particular level of a credit card data security certification compliance may be integrated with first and second POS applications to generate first and second integrated applications, respectively, as a fully integrated, tested and production-ready solution. Each integrated application meets all levels of data security compliance requirements and enables data security-compliant transactions with end-to-end encryptions by enabling, in response to a POS application initiating a payment transaction, a payment terminal to share an encryption key with a payment server. Each integrated application can receive payment data encrypted with the encryption key, transmit the encrypted payment data to the payment server for processing the payment transaction using the encrypted payment data, and receive a processing result of the payment transaction from the payment server and communicate the processing result to the POS application.
Autonomous server agents
Methods, systems, and devices are described for orchestrating server management in a modern IT network. The described techniques may be implemented to manage any number of networked severs, whether local, remote, or both. Server orchestration may leverage a central, cloud-based management system and/or one or more autonomous agents installed on servers with the network. The autonomous agents may each be registered with the supervisory server and may have awareness of one another.
On-box behavior-based traffic classification
In one embodiment, a networking device in a network detects an traffic flow conveyed in the network via the networking device. The networking device generates flow data for the traffic flow. The networking device performs a classification of the traffic flow using the flow data as input to a machine learning-based classifier. The networking device performs a mediation action based on the classification of the traffic flow.
MECHANISM TO ENABLE THIRD PARTY SERVICES AND APPLICATIONS DISCOVERY IN DISTRIBUTED EDGE COMPUTING ENVIRONMENT
A method and system support communication between a service executed by an edge server and a mobile application. The method includes receiving a transmission control protocol (TCP) handshake with an Internet Protocol (IP) anycast address from the mobile application; replying to the TCP handshake with an IP unicast address for the service to be utilized for a transport layer security (TLS) session; and establishing the TLS session between the service and the mobile application using the IP unicast address.
INTELLIGENT DATAFLOW-BASED SERVICE DISCOVERY AND ANALYSIS
The disclosed embodiments are directed toward monitoring and classifying encrypted network traffic. In one embodiment, a method is disclosed comprising intercepting an encrypted network request, the network request transmitted by a client device to a network endpoint; identifying a network service associated with the network endpoint based on unencrypted properties of the encrypted network request; identifying, based on the encrypted network request and a series of subsequent network requests issued by the client device, an action taken by the client device, the action comprising an activity performed during a session established with the network service; and updating a catalog of network interactions using the network service and the action.
INTERNET OF THINGS COMMUNICATION METHOD AND APPARATUS
The present disclosure provides an Internet of Things communication method and apparatus. The method includes: receiving a resource addition request transmitted by a client, where the resource addition request is used to indicate addition of an identification of a reference resource into a collection resource on the first server; performing communication with the reference resource according to an access location of the reference resource and the identification of the reference resource; adding the identification of the reference resource into the collection resource if the communication between the first server and the reference resource is successful. In this way, before adding the reference resource, the first server first performs communication with the reference resource, and adds the identification of the reference resource into the collection resource after determining that the communication between the first server and the reference resource is successful, thereby ensuring the validity of the reference resource.
Transmission control protocol (TCP) acknowledgement (ACK) packet suppression
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive a transport packet at a transport layer; de-encapsulating the transport packet using a transport protocol to identify a security packet; communicating the security packet to a security layer by the transport layer; communicating an acknowledgement signal to the transport layer from the security layer in response to receiving the security packet; suppressing an acknowledgement packet at the transport layer in response to receiving the acknowledgement signal; adding an acknowledgment indication to a next data packet to be sent after the suppress action; and sending the next data packet.