Patent classifications
H04L2101/365
SYSTEM AND METHOD FOR TRACKING AND MANAGING ONE OR MORE DEVICES IN A DYNAMIC NETWORK
A method of tracking and managing the one or more devices 106A-N in one or more networks 108A-N is provided. The method includes following steps: (i) obtaining information of the one or more devices 106A-N: (ii) creating an ID to a device; (iii) monitoring the one or more devices 106A-N to identify the switching of the one or more devices 106A-N between the one or more networks 108A-N; (iv) updating a workflow of the device when the device switched to a new network from the one or more networks 108A-N; (v) generating a detailed report on all the actions performed on that particular device.
Communication terminal, communication system, communication method, and recording medium
A communication terminal receives, from a mobile terminal, counterpart terminal identification information for identifying a counterpart communication terminal that the communication terminal is to start communication, and determines a communication application to be used by the counterpart communication terminal based on the received counterpart terminal identification information. When the determined communication application is a first communication application, the communication terminal identifies, as the counterpart communication terminal, a first counterpart communication terminal that uses the first communication application. When the determined communication application is a second communication application, the communication terminal identifies, as the counterpart communication terminal, a second counterpart communication terminal that uses the second communication application. The communication terminal further transmits a communication start request to the identified counterpart communication terminal that uses the determined communication application, to start communication with the identified counterpart communication terminal through the determined communication application.
SYSTEMS AND METHODS FOR DEEP LINKING OF SAAS APPLICATION VIA EMBEDDED BROWSER
Embodiments described include systems and methods of determining one or more links of one or more network applications to access to perform a task is provided. The method can include receiving, by a server, a request from a client application on a client device. The request can identify a name of a task to be performed. The client application can include an embedded browser for accessing one or more network applications. The method can include determining, by the server, one or more links of the one or more network applications hosted on one or more third party servers that are to be used to perform a task identified by the name of the task. The method can include causing, responsive to the request and to perform the task, the embedded browser of the client application on the client device to access the one or more links of the one or more network applications hosted on the one or more third party servers.
Distributed network emulation implemented by a host in a virtualized computing environment
Example methods are provided for a host to implement distributed network emulation in a virtualized computing environment. The method may comprise detecting one or more packets from a source network address associated with a source virtualized computing instance to a destination network address associated with a destination virtualized computing instance. The method may also comprise, in response to determination that a network emulation rule configured for the source virtualized computing instance and destination virtualized computing instance is applicable to the one or more packets, determining a physical network condition associated with a path between the source virtualized computing instance and destination virtualized computing instance. The method may further comprise emulating a desired network condition specified by the network emulation rule by performing an emulation action on the one or more packets.
NETWORKING CONNECTION MANAGEMENT BASED ON CONTAINER IDENTIFICATION
Described herein are systems, methods, and software to enhance packet . In one implementation, a host computing element identifies a packet from a process executing on the host computing element. In response to identifying the packet, the host computing element determines whether the packet originates from a container namespace corresponding to a container on the host computing element or a host namespace corresponding to the host computing element. If the packet originates from a container namespace, the host computing element may determine supplemental information for the container associated with the container namespace, and process the packet based on the supplemental information.
Systems and methods for tagging client devices
The disclosed computer-implemented method for tagging client devices may include (i) receiving from a router at least one network packet that indicates that a client device has attempted to connect to the router and that includes device information identifying the client device, (ii) prompting, automatically in response to receiving the network packet indicating that the client device has attempted to connect to the router, a user to tag the client device with a descriptive name to facilitate management of the client device, (iii) receiving, in response to prompting the user to tag the client device, a tag that indicates a specific descriptive name for the client device, and (iv) transmitting, automatically in response to receiving the tag, the specific descriptive name to at least one of the router and a cloud security server. Various other methods, systems, and computer-readable media are also disclosed.
Techniques to reduce time to music for a playback device
An example playback device is configured to detect an input indicating a command to power up the playback device and, based on the input, begin initialization of a wireless network interface. After beginning initialization of the wireless network interface but before the playback device is capable of establishing a connection to at least one wireless network type via the wireless network interface, the playback device causes the wireless network interface to scan for available wireless networks of the at least one wireless network type. The playback device identifies at least one available wireless network and stores an indication of the at least one available wireless network. After the playback device is capable of establishing a connection, the playback device uses the stored indication of the at least one available wireless network to establish a connection to a given wireless network of the at least one available wireless network.
LOW-LATENCY, OUTBOUND MESSAGE MONITORING, CONTROL, AND AUTHENTICATION
A platform may receive configuration information of individual user authorizations for outbound messaging through specification of one or more authorized vendors. The platform maintains a list of the vendors and, for each vendor, a DKIM public key associated with the vendor, without publishing the public keys to a DNS, and publishes a customized SPF policy comprising a macro mechanism for identifying a particular user that transmitted a message to the DNS. The platform logs received SPF customized queries, extracts data populated by the macro mechanism from the logged queries, and analyzes the extracted data to determine a particular user associated with the query, to determine whether the user is authorized to utilize a vendor associated with the domain based on the configuration information. Responsive to the determination that the individual is authorized to utilize the vendor, the platform publishes the DKIM public key associated with the vendor to the DNS.
Edge application server assignment for ad-hoc groups of user equipment
Systems, methods, apparatuses, and computer program products for the assignment of a common edge application server (EAS) for ad-hoc groups of user equipment (UE). A method may include generating or updating binding information comprising a correlation between a group identifier of an ad-hoc group of user equipment (UE) and an edge application server (EAS) identifier assigned to the ad-hoc group, and storing, updating, and/or deleting the binding information, or causing the binding information to be stored, in a database.
Method for adding smart home device to contacts and system
A system for adding a smart home device includes a first mobile phone configured to set, using contact information of a second user, a second mobile phone allowed to make a call to the smart home device, the second mobile phone is configured to automatically add contact information of the smart home device and make a voice call or a video call with the smart home device using the contact information of the smart home device, such that a user is configured to enable, in a setting manner of the smart home device, a friend to automatically discover the smart home device, and then make an audio call or a video call.