Patent classifications
H04L2101/365
Washroom device installation system
A system and method for joining devices to a network according to a protocol that names the joined devices based on a predetermined naming sequence that is common across all devices joined to the network in a given facility.
METHODS AND APPARATUS FOR AUTHENTICATING DEVICES
A network management agent is provided to enable a secure connection to a network to be established. The network management agent confirms the identity of a device upon receipt of a device identifier from the device, via a first communication channel, and responds with a security token, via the first communication channel, which the device uses to confirm the identity of the network management agent. The network management agent is able to trust the device and the device is able to trust the network management agent, such that the device may be granted access to a network which it trusts. The network management agent may be provided, via a second communication channel, with a device identifier and a device security token for the device from which the security token to be transmitted over the first channel is derived.
Discovery-less virtual addressing in software defined networks
A virtual address of a destination of a packet is parsed into a set of virtual address components. A subset of the set of virtual address components is tokenized into a token. The token is converted into at least a portion of a hostname. A look-up of a real network address corresponding to the hostname is performed. The packet is caused to be transmitted to the real network address, wherein the real network address corresponds to a host machine on a physical network, the receiving virtual entity operating on the host machine.
System and method for tracking and managing one or more devices in a dynamic network
A method of tracking and managing the one or more devices 106A-N in one or more networks 108A-N is provided. The method includes following steps: (i) obtaining information of the one or more devices 106A-N: (ii) creating an ID to a device; (iii) monitoring the one or more devices 106A-N to identify the switching of the one or more devices 106A-N between the one or more networks 108A-N; (iv) updating a workflow of the device when the device switched to a new network from the one or more networks 108A-N; (v) generating a detailed report on all the actions performed on that particular device.
ASSIGNING CONTEXTUAL IDENTITY TO A DEVICE BASED ON PROXIMITY OF OTHER DEVICES
A device management service at a provider network may assign a contextual identity to a newly installed device at a client network based on proximity of other devices to the new device. When a new device is installed on a client network, the device broadcasts a request for proximity data. When another device receives the request, it generates proximity data. For example, it may measure a strength of the radio signal received from the new device, which varies depending on how close the devices are. The new device receives proximity data from the other devices on the client network. The new device then transmits the proximity data to a device management service. The device management service uses an algorithm to determine an estimated location of the new device based on the proximity data. The device management service determines a contextual identity of the new device based on the estimated location.
NAMING SMART DEVICES
A computer implemented method of naming a smart wireless device includes detecting a first other wireless device, determining that the first other wireless device is likely in a same area of an environment, obtaining a first name of the first other wireless device, and generating a name for the smart wireless device as function of the first name of the first other wireless device in response to the first other wireless device having been determined to be in the same area of the environment.
LOW-LATENCY, OUTBOUND MESSAGE MONITORING, CONTROL, AND AUTHENTICATION
Embodiments of the present disclosure provide a first set of methods, computer-readable media, and system configured for: receiving a configuration for a domain name system (DNS) to log all queries; publishing a customized sender policy framework (SPF) policy to the DNS, the customized SPF policy comprising a macro-endowed mechanism; logging a plurality of received SPF customized queries; accessing a log comprising the plurality of received SPF customized queries; extracting data from each of the received SPF customized queries, the data being populated by the macro mechanism associated with the SPF customized query; populating a datastore with extracted data comprising at least one of the following: a username, a IP address, and a domain, as extracted from each received SPF customized query; and providing, based on the extracted data, an indication of outbound emails sent from the domain. In various embodiments, email authorizations and restrictions may be based thereon.
LOW-LATENCY, OUTBOUND MESSAGE MONITORING, CONTROL, AND AUTHENTICATION
Embodiments of the present disclosure provide a first set of methods, computer-readable media, and system configured for: receiving a configuration for a domain name system (DNS) to log all queries; publishing a customized sender policy framework (SPF) policy to the DNS, the customized SPF policy comprising a macro-endowed mechanism; logging a plurality of received SPF customized queries; accessing a log comprising the plurality of received SPF customized queries; extracting data from each of the received SPF customized queries, the data being populated by the macro mechanism associated with the SPF customized query; populating a datastore with extracted data comprising at least one of the following: a username, a IP address, and a domain, as extracted from each received SPF customized query; and providing, based on the extracted data, an indication of outbound emails sent from the domain. In various embodiments, email authorizations and restrictions may be based thereon.
Low-latency, outbound message monitoring, control, and authentication
Embodiments of the present disclosure provide a first set of methods, computer-readable media, and system configured for: receiving a configuration for a domain name system (DNS) to log all queries; publishing a customized sender policy framework (SPF) policy to the DNS, the customized SPF policy comprising a macro-endowed mechanism; logging a plurality of received SPF customized queries; accessing a log comprising the plurality of received SPF customized queries; extracting data from each of the received SPF customized queries, the data being populated by the macro mechanism associated with the SPF customized query; populating a datastore with extracted data comprising at least one of the following: a username, a IP address, and a domain, as extracted from each received SPF customized query; and providing, based on the extracted data, an indication of outbound emails sent from the domain. In various embodiments, email authorizations and restrictions may be based thereon.
VENUE SYSTEM JOIN INTO ONLINE MEETING SERVICES
A venue system being able to join a meeting offered by a meeting service for which the venue system itself is not native. Thus, the venue system might join into meetings offered by a variety of meeting services, to thereby take advantage of the substantial offerings of a venue system. Furthermore, the joining is done via a web application that is indeed native to the meeting service. Because the native web applications is offered by the same entity as the meeting services, the web applications are typically kept up-to-date to thereby take fuller advantage of newer offerings of the meeting services as the capabilities of the meeting services evolve. Accordingly, even without updating the venue system itself, the venue system is capable of offering more up-to-date services of a variety of different meeting services even though the venue service itself is not native to those various meeting services.