Patent classifications
H04L41/0273
Control apparatus, control target apparatus, and alarm-setting method using the apparatuses
Provided is a method of a control device to set an alarm. The method includes: discovering a first control target device including an alarm service and a second target device including a content providing service; receiving a device list registered for the alarm service from the first target device; receiving available content information from the second target device; selecting an alarm target device and a content from the device list and the content information; and transmitting an alarm setting request message to the first target device on the basis of the selected alarm target device and content.
Money transfer by use of a payment proxy
In some examples, a financial transaction is effectuated between first and second users of a payment service system. The payment service system receives, from the first user, a request for a first payment proxy identifier for the first user, and receives from the second user, a request for a second payment proxy identifier for the second user. The payment service system generates the payment proxy identifiers with a currency indicator prefixing one or more alphanumeric characters. The payment proxy identifiers enable the payment service system to identify the financial accounts of the respective users in lieu of payment card mechanisms. The payment service system receives a message from the second user indicating a money transfer request, initiates a transfer of funds from an account of the second user to an account of the first user, and sends an email message to the first user indicating the transfer of funds.
SYSTEMS AND METHODS FOR IDENTIFYING INTERNET ATTACKS
The present disclosure relates to a system (1) and a method that employs such system (1) to detect and counteract Internet attacks of Man-in-the-Browser and/or Man-in-the-Middle type. The system (1) comprises a Traffic Inspector (2) in signal communication with a client computer (3) having a Web browser (4) residing therein for Internet browsing and with a Web server (5) having a Web application (6) residing therein. The Traffic Inspector (2) is configured to receive a request associated with the Web application (6) from the Web browser (4) and to send it to the Web browser (5), the Traffic Inspector (2) is configured to receive a DOM server code associated with the request from the Web server (5). The system is characterized in that it comprises a Traffic Analyzer (7) in signal communication with the Traffic Inspector (2) and having an algorithm application (8) residing therein, the Traffic Inspector (2) is configured to add a default code portion to the DOM server code to thereby generate a DOM client code to be sent to the Web browser (4) to receive a DOM rendered code associated with the DOM client code, the Traffic Inspector (2) is configured to send the DOM client code and the DOM rendered code to the Traffic Analyzer (7), the algorithm application (8) is configured to process the DOM rendered code to compare it with the DOM client code, to thereby identify at least one code difference.
MONEY TRANSFER BY USE OF A PAYMENT PROXY
In some examples, a financial transaction is effectuated between first and second users of a payment service system. The payment service system receives, from the first user, a request for a first payment proxy identifier for the first user, and receives from the second user, a request for a second payment proxy identifier for the second user. The payment service system generates the payment proxy identifiers with a currency indicator prefixing one or more alphanumeric characters. The payment proxy identifiers enable the payment service system to identify the financial accounts of the respective users in lieu of payment card mechanisms. The payment service system receives a message from the second user indicating a money transfer request, initiates a transfer of funds from an account of the second user to an account of the first user, and sends an email message to the first user indicating the transfer of funds.
Remote control of equipment
A method for controlling selection of a communication method between an equipment control device belonging to a wide-area communication network and equipment belonging to a local communication network. The method includes the following steps relating to the control device: requesting the equipment to initiate a connection to the control device, the request being sent at the time of a routine connection of the equipment to the control device; determining whether the equipment can be reached by the control device using a direct method; and configuring the equipment if the equipment cannot be reached using a direct method.
TRACE CHAIN INFORMATION QUERY METHOD AND DEVICE
This application provides a trace chain information query method, including: receiving, by a trace chain server, first trace chain information sent by a first service node and second trace chain information sent by a second service node, where the first service node is a service node in a first trace chain, the second service node is a service node in a second trace chain, both the first trace chain and the second trace chain are generated as triggered by a same user operation, the first trace chain information includes a group identifier, the second trace chain information includes the group identifier, and the group identifier is used to indicate the user operation; and finding, by the trace chain server, the first trace chain information and the second trace chain information based on the group identifier.
Systems and methods for configuring routers and for facilitating communication between routers
Aspects of the subject disclosure may include, for example, storing, in a database, subscriber information associated with a plurality of subscribers of a wireless carrier, the subscriber information comprising first subscriber information associated with a first subscriber of the wireless carrier, the first subscriber information comprising first configuration data for a first router of the first subscriber, the first router being located at a first physical location; wirelessly receiving from a second router of the first subscriber, via a wireless service of the wireless carrier, a first registration request made by the second router, the second router being located at a second physical location; responsive to receiving the first registration request, generating first provisioning information, the first provisioning information being based at least in part upon the first configuration data for the first router that is stored in the database; and wirelessly sending to the second router, via the wireless service of the wireless carrier, the first provisioning information, the first provisioning information enabling the first router and the second router to communicate with one another via the wireless service through a first tunnel mechanism. Other embodiments are disclosed.
Method, apparatus and system for simultaneously transmitting or receiving multiple managed objects
The present invention relates to a method for simultaneously transmitting and receiving multiple managed objects in order to compensate for the inadeguacies of the current 3GPP TS32.607 standard, characterized in that, the method comprises: encapsulating two or more managed objects in one or more atomic transactions according to internal attributes and data processing of the managed objects, wherein each atomic transaction includes at least two managed objects; according to a pre-defined association rule, determining association relationships between managed objects in the one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and transmitting one or more atomic transactions through a communication network.
IPSec acceleration method, apparatus, and system
An Internet Protocol Security (IPsec) acceleration method includes generating, by an Internet Key Exchange (IKE) device, an IKE link establishment session packet according to an IPSec configuration parameter and a security policy in a security policy database (SPD), sending, by the IKE device, the IKE link establishment session packet to a peer device, establishing a security association (SA) with the peer device, and sending, by the IKE module, the SA to a data forwarding device, where the IKE device and the data forwarding device are discrete devices.
Method and apparatus for accessing services affiliated with a discovered service provider
A method of accessing services affiliated with a service provider is disclosed. An issuer performs a bootstrap procedure with the at least one discovered service provider. The issuer performs a discovery procedure to determine available service capability layers (SCLs) supported by the at least one discovered service provider. The issuer transmits a domain name system-based service discovery (DNS-SD) query from the issuer to a DNS-SD M2M service discovery function (MSDF) server. The DNS-SD MSDF server is provisioned with SCL discovery records. The DNS-SD MSDF server is registered with a public DNS registrar entity. The SCL discovery records include, for each SCL, a type of M2M service capabilities supported by each SCL and a class of M2M services supported by each SCL. The issuer receives SCL discovery records from the DNS-SD MSDF server in response to the DNS-SD query.