Patent classifications
H04L67/143
DEVICE CONTROL APPARATUS AND CONTROL METHOD
According to one embodiment, a device control apparatus includes a communication interface connectable to several client terminals via a network and a local device interface connectable to several peripheral devices. The device control apparatus functions as registration unit configured to receive an occupation request for a peripheral device from a client terminal and then register the peripheral device for which the occupation request has been received as occupied by the client terminal if the peripheral device is not registered as occupied by another client terminal. A setting unit sets a release time for releasing the occupation of the registered peripheral device, and an update unit updates the release time whenever communication occurs between the registered peripheral device and the client terminal. A release unit releases the registered occupation of the peripheral device once the release time elapses.
AUTOMATICALLY DETECTING AUTHORIZED REMOTE ADMINISTRATION SESSIONS IN A NETWORK MONITORING SYSTEM
In one embodiment, a service receives administration traffic data in a network associated with a remote administration session in which a control device remotely administers a client device. The service analyzes the administration traffic data to determine whether any portion of the administration traffic data is resulting from an administration session involving a trusted administrator. The service flags a first portion of the administration traffic data as authorized when the first portion of the administration traffic data is determined to result from an administration session involving a trusted administrator, and a second portion of the administration traffic data is non-flagged. The service assesses the second portion of the administration traffic data using a machine learning-based traffic classifier to determine whether the second portion of the administration traffic data is malicious.
Systems and methods for controlling sign-on to web applications
The described technology provides a single sign-on capability so that a user who is already signed on to a web application from a client application may not be required to sign-on again when he/she later needs access to the web application from the same or another client application. The technology also provides a multiple login prevention capability to detect multiple sign-on events using the same credentials and disable one or more of the associated multiple sessions.
Systems and methods for controlling sign-on to web applications
The described technology provides a single sign-on capability so that a user who is already signed on to a web application from a client application may not be required to sign-on again when he/she later needs access to the web application from the same or another client application. The technology also provides a multiple login prevention capability to detect multiple sign-on events using the same credentials and disable one or more of the associated multiple sessions.
Methods and systems for managing communication sessions
A voice enabled device can assist a computing device, such as a server, in processing/analyzing a voice input. The voice enabled device can initiate a network communication session and transmit the voice input to the computing device. The computing device can classify the voice input as a type of communication session (e.g., conversation, etc. . . . ). Based on the type of communication session, the computing device can either remain in communication with the voice enabled device and continue to process voice input or terminate the communication after instructing the voice enabled device to process the voice input.
METHOD AND SYSTEM FOR BINDING INFORMATION SERVICE
A method, a system, and a non-transitory storage medium are described in which an binding information service is provided. The binding information service may include applying one or multiple criteria to binding information stored by a binding service function. The binding information service may identify candidate binding information instances that may need deletion based on the one or multiple criteria. The binding information service may interrogate a policy control network device as to the current registrability of the binding information. The binding information service may delete or maintain the binding information based on a result of the interrogation. The binding information service may also include directing the binding service function to delete binding information based on one or multiple criteria. The one or multiple criteria may relate to the age of the binding information or a last time the registrability of the binding information was confirmed.
Efficient topics in transport protocols
Messages can be exchanged using efficient topics. When a server is interconnected with endpoints via a broker that implements a topic-based transport protocol, the server can dynamically generate a response ID for a request message the server intends to send to an endpoint. The server can generate the response ID from an endpoint ID of the endpoint and a message ID for the request message. The server can include the endpoint ID and the message ID in the request message and can subscribe to a topic containing the response ID. Upon receiving the request message, the endpoint can extract the endpoint ID and the message ID and use them to generate the response ID. The endpoint can then send a response message that includes the topic containing the response ID. Alternatively, the response ID could be generated from a message ID and a pre-agreed upon unique ID.
Efficient topics in transport protocols
Messages can be exchanged using efficient topics. When a server is interconnected with endpoints via a broker that implements a topic-based transport protocol, the server can dynamically generate a response ID for a request message the server intends to send to an endpoint. The server can generate the response ID from an endpoint ID of the endpoint and a message ID for the request message. The server can include the endpoint ID and the message ID in the request message and can subscribe to a topic containing the response ID. Upon receiving the request message, the endpoint can extract the endpoint ID and the message ID and use them to generate the response ID. The endpoint can then send a response message that includes the topic containing the response ID. Alternatively, the response ID could be generated from a message ID and a pre-agreed upon unique ID.
PROVIDING MULTIPLE TCP CONNECTIONS BETWEEN A CLIENT AND SERVER
One example may include a process that includes establishing a transmission control protocol (TCP) connection between a client device and a server to form a virtual private network (VPN), permitting communication between the client device and the server on the TCP connection, monitoring, via the VPN server, communication over the TCP connection to identify one or more connection parameters, establishing a second connection between the client device and the server when the one or more connection parameters indicate a slowing of the TCP connection below a threshold and below a previously measured connection rate, receiving, via the TCP connection, application data used by one of the applications operating on the client device, and receiving, via the second connection, application data used by another application of the applications.
METHODS AND SYSTEMS FOR TRANSMITTING SESSION-BASED PACKETS
The present invention discloses methods and systems for sending and receiving IP packets between network nodes through a tunnel. The tunnel is created according to a session. When the IP packet is a first of the IP packets in sequence of a session, establish a tunnel and send the IP packet through the tunnel of the session. When the IP packet is not the first of the IP packets in sequence of a session, sending the IP packet through the tunnel of the session.