H04L69/169

Hierarchical scanning of internet connected assets
10425430 · 2019-09-24 · ·

A system for hierarchical scanning includes an interface and a processor. The interface is to receive an indication to scan using a payload; provide the payload to a set of addresses on a set of ports; and receive a set of responses. Each response is associated with an address and a port. The processor is to: for each response of the set of responses: determine whether a follow-up probe exists associated with the response; and in the event the follow-up probe exists associated with the response: execute the follow-up probe on the address and the port associated with the response; and store the set of data received in response to the follow-up probe in a database.

SYSTEMS AND METHODS FOR MANAGING A PAYMENT TERMINAL VIA A WEB BROWSER
20190259012 · 2019-08-22 ·

The present disclosure relates generally to communication with payment terminals via TCP/IP protocol. Using network technology and novel processes, in particular embodiments, the present systems and methods facilitate local network discovery and communication between a payment terminal and an electronic cash register (ECR) via a browser. For example, in certain embodiments, the present systems and methods leverage TCP/IP network technology to securely facilitate communications between SaaS ECR software running in a browser environment and one or more payment terminals.

Systems and methods for securely transferring selective datasets between terminals

Systems and methods for securely transmitting data between terminals include receiving, by a first communication device, an internet protocol (IP) packet via a first application programming interface (API) running on a first computer, dividing, by a splitting unit in the first communication device, the IP packet into a command portion and a data portion, encoding, by a data encoding unit in the first communication device, the data portion into a text delimited non-IP format, transmitting, by a transmitting unit in the first communication device, the encoded data portion and the command portion, receiving, by a second communication device, the encoded data portion and the command portion, decoding, by a data decoding unit in the second communication device, the encoded data portion into IP format, combining, by a constructor unit in the second communication device, the decoded data portion and the command portion to regenerate the IP packet, and receiving, by a second API running on a second computer, the regenerated IP packet.

COMMUNICATION PROTOCOLS OVER INTERNET PROTOCOL (IP) NETWORKS
20240163293 · 2024-05-16 ·

A system and methods comprise a gateway that includes a processor coupled to a security system at a premises. A touchscreen at the premises is coupled to the gateway and presents user interfaces. The user interfaces include a security interface that provides control of functions of the security system and access to data collected by the security system, and a network interface that provides access to network devices. A camera is located at the premises and coupled to the gateway via a plurality of interfaces. A security server at a remote location is coupled to the gateway. The security server comprises a client interface through which remote client devices exchange data with the gateway and the security system.

Methods and apparatuses for enabling multi-host multipath secure transport with QUIC

Methods and apparatuses for enabling multi-host multipath secure transport with Quick User Datagram Protocol (UDP) Connections (QUIC) are described herein. A method performed by a client endpoint may involve sending, to a network node, a request to establish a QUIC connection with a destination endpoint, the request to establish the QUIC connection including a flow identifier (ID). The method may involve receiving, from the network node, a response including an indication that the request to establish the QUIC connection with the destination endpoint is accepted. The method may involve encapsulating inner QUIC packetized data within outer QUIC packetized data, the inner QUIC packetized data including the flow ID. The method may involve sending, to the network node, the outer QUIC packetized data for forwarding toward the destination endpoint based on the flow ID.

METHODS AND SYSTEMS FOR HANDLING SCALABLE NETWORK CONNECTIONS

There is described a method and system for handling network connections in a server. The method includes: creating a network socket for a network connection in a first memory; monitoring the network connection for activity; and storing state information associated with the network socket in a second memory when there is no activity on the network connection for a predetermined period of time.

Device and method for facilitating secure communications over a cellular network

A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device during a first predetermined period of time; securing the utility-related data at the hub device using digital envelopes during the first predetermined period of time; initiating by the hub device an autonomous wake up process during a second predetermined period of time; sending the secure utility-related data over a first network to a designated server via at least one User Datagram protocol (UDP) message during the second predetermined period of time; and receiving an acknowledgement of receipt message of the at least one UDP message from the designated server; wherein the first and second predetermined periods of time typically do not overlap, but may overlap.

Method and apparatus for controlling handshake in a packet transmission network
10374758 · 2019-08-06 · ·

The present invention relates to a method and apparatus for controlling a handshake operation. Datagram Transport Layer Security (DTLS) is an important secure protocol in the IP based Internet of things. The performance of DTLS handshake can be significantly affected by network status, traffic and packet loss rate, etc. It is therefore suggested evaluating a package loss rate and estimating causes of packet loss. Then, a DTLS handshake strategy may be changed adaptively based on the detection of packet loss and network status. As a result, the successful rate and delay of DTLS handshake can be improved. An acknowledgement and a non-acknowledgement mode may be used in a hybrid way to evaluate the package loss rate and estimate causes of packet loss and eventually improve performance of DTLS handshake.

Connection migration for Internet of Things (IoT) devices

Technology is described for migrating connections for Internet of Things (IoT) devices. Data packets may be received from an IoT device for forwarding to a first physical host in a computing service environment. A determination to migrate the connection for the IoT device from the first physical host to a second physical host in the computing service environment may be performed when a throughput of the data packets received from the IoT device for the first physical host exceeds a defined threshold. A connection migration procedure may be initiated to migrate the connection for the IoT device from the first physical host to the second physical host. The connection migration procedure may include an exchange of session state information for the IoT device from the first physical host to the second physical host to enable the migration of the connection to the second physical host.

Connection migration for Internet of Things (IoT) devices

Technology is described for migrating connections for Internet of Things (IoT) devices. Data packets may be received from an IoT device for forwarding to a first physical host in a computing service environment. A determination to migrate the connection for the IoT device from the first physical host to a second physical host in the computing service environment may be performed when a throughput of the data packets received from the IoT device for the first physical host exceeds a defined threshold. A connection migration procedure may be initiated to migrate the connection for the IoT device from the first physical host to the second physical host. The connection migration procedure may include an exchange of session state information for the IoT device from the first physical host to the second physical host to enable the migration of the connection to the second physical host.