Patent classifications
H04L2101/33
DISCOVERY-LESS VIRTUAL ADDRESSING IN SOFTWARE DEFINED NETWORKS
A virtual address of a destination of a packet is parsed into a set of virtual address components. A subset of the set of virtual address components is tokenized into a token. The token is converted into at least a portion of a hostname. A look-up of a real network address corresponding to the hostname is performed. The packet is caused to be transmitted to the real network address, wherein the real network address corresponds to a host machine on a physical network, the receiving virtual entity operating on the host machine.
CONNECTION POOLING FOR SCALABLE NETWORK SERVICES
Systems and methods are described for providing connection pools between source network devices and a target, connection-limited service. Each connection pool can facilitate connections between source devices and the target service, while ensuring that connections to the connection-limited service do not exceed a defined limit. A connection manager service can initialize a connection pool for a target service on request by a client device, and provide an identifier for the connection pool to the client device. Source network devices can then transmit operations for the target service to the connection manager service, which can route the operations to an appropriate connection pool based on the identifier.
SYSTEM AND METHOD FOR PROVIDING CARRIER-INDEPENDENT VOIP COMMUNICATION
Systems and methods for seamlessly providing carrier-independent VoIP calls initiated using an existing carrier-issued telephone number are provided. In exemplary embodiments, the existing carrier-issued telephone number to be called is received. Subsequently, a status regarding if the existing carrier-issued telephone number is a registered telephone number stored in a carrier-independent database is determined. If the existing carrier-issued telephone number comprises a registered telephone number in the carrier-independent database, a call is established via peer-to-peer connection using an address associated with the registered telephone number. However, if the existing carrier-issued telephone number is not a registered telephone number in the carrier-independent database, the call is placed via a standard route.
Hybrid cloud methods, apparatus and systems for secure file sharing and synchronization with backup and server virtualization
Integrated File Sharing and Synchronization (FSS) and Backup Management and Storage (BMS) in a network appliance deployed behind a firewall and within a private trusted Local Area Network (LAN). The appliance processes backup image files of a LAN server's file system to generate fully constructed backup recovery points for the LAN server. Logical blocks for backup image files and associated recovery points may be stored locally on the appliance and redundantly in a trusted cloud domain, and a hypervisor on the appliance provides virtualization of the LAN server based on backup recovery points. A relay server cluster in the cloud facilitates reliable and secure access to the FSS services by remote client devices beyond the firewall, without changing fire wall rules, by employing HTTPS between remote client devices and the relay server cluster, and Secure Shell (SSH) tunneling between the cluster and the appliance behind the firewall.
Service Obtaining and Providing Methods, User Equipment, and Management Server
This application provides service obtaining and providing methods, user equipment, and a management server. The service obtaining method includes: determining, by user equipment, a first Internet protocol IP address by using a preset algorithm based on a service name of a to-be-accessed service; sending, by the user equipment, a communication data packet by using the first IP address as a destination address; and receiving, by the user equipment, the service provided by a serving-end device.
System And Method Of Operating An Email Service For Mobile Telephones
For email communication, an APP downloaded onto a smartphone and email accounts are automatically provided through an associated server system. Each email account is uniquely related the APP and includes a key associated with the telephone number.
Methods and Systems for Secure DNS Routing
Various arrangements for performing secure domain name system (DNS) routing are presented. A secure signature may be generated using an internet protocol (IP) address of an authorized device. An encoded character string may be generated that comprises the IP address. The domain name server may receive a request for an IP address mapped to the hostname. The hostname may be validated using the secure signature. The IP address of the authorized device may be decoded from the encoded character string at least partially in response to the hostname being validated by the domain name server. The IP address decoded from the encoded character string may be transmitted at least partially based on the hostname being validated and the request for the IP address.
Virtual network interface objects
Methods and apparatus for interfaces to manage virtual network interface objects. A system may include resource instances and a network interface virtualization coordinator. Responsive to a record creation request, the coordinator creates an interface records that may include an IP address, subnet information and security properties. The coordinator may, in response to a request to attach the record to a resource instance, enable traffic directed to the IP address to flow to the resource instance. In response to a subsequent detach request, the traffic to the IP address may be disabled at the resource instance. The same interface record may be attached to another resource instance in response to another attach request, enabling traffic directed to the IP address to flow to the second resource instance.
Group communication service providing method, system and computer-readable medium
Provided is a method for providing a group communication service performed in a service server for performing data communication with a manager terminal and a user terminal. The method comprises a first group setting step of setting a first group by providing an interface for receiving group member information from a manager terminal and setting a member classification item, a second group setting step of setting a second group by providing an interface for providing a clustered information on the basis of the member classification item based on information on the first group and receiving a manager input for the clustered information and a message sending step of receiving message information sent according to an input of a manager terminal and sending a message to a user terminal belonging to the second group.
Methods and systems for secure DNS routing
Various arrangements for performing secure domain name system (DNS) routing are presented. A secure signature may be generated using an internet protocol (IP) address of an authorized device. An encoded character string may be generated that comprises the IP address. The domain name server may receive a request for an IP address mapped to the hostname. The hostname may be validated using the secure signature. The IP address of the authorized device may be decoded from the encoded character string at least partially in response to the hostname being validated by the domain name server. The IP address decoded from the encoded character string may be transmitted at least partially based on the hostname being validated and the request for the IP address.