Patent classifications
H04L67/563
Cloud to on-premise port forwarding with IP address bound to loopback alias
An example method to provide communication between a first computer in a first computer network and a second computer in a second computer network is disclosed. The method includes aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network and establishing a tunnel between the third computer and a fourth computer in the second computer network. Establishing the tunnel includes configuring the fourth computer to forward traffic received from the tunnel to the second computer. The method further includes configuring routing in the first computer network to direct traffic destined for the second computer network to the third computer, and configuring the first computer to transmit packets destined for the second computer with the second computer's address in the second computer network.
Method and system for real-time transcoding of MPEG-DASH on-demand media segments while in transit from content host to dash client
A system, method and computer program product for real-time post-processing system that transforms MPEG-DASH on-demand media streams, including a DASH media player device; an intercepting media server device; a MPEG-DASH content origin server device; and a proxy media client device coupled to the DASH media player device and the intercepting media server device and configured to intercept MPEG-DASH HTTP requests from the DASH media player device and forward the intercepted requests to the intercepting media server device instead of the MPEG-DASH content origin server device. The intercepting media server device is configured to act as an HTTP proxy device, and forward the intercepted requests to the MPEG-DASH content origin server, and with each corresponding MPEG-DASH media subsegment acquired perform analysis of the video media content within the subsegment and apply selective transcoding.
Method and system for real-time transcoding of MPEG-DASH on-demand media segments while in transit from content host to dash client
A system, method and computer program product for real-time post-processing system that transforms MPEG-DASH on-demand media streams, including a DASH media player device; an intercepting media server device; a MPEG-DASH content origin server device; and a proxy media client device coupled to the DASH media player device and the intercepting media server device and configured to intercept MPEG-DASH HTTP requests from the DASH media player device and forward the intercepted requests to the intercepting media server device instead of the MPEG-DASH content origin server device. The intercepting media server device is configured to act as an HTTP proxy device, and forward the intercepted requests to the MPEG-DASH content origin server, and with each corresponding MPEG-DASH media subsegment acquired perform analysis of the video media content within the subsegment and apply selective transcoding.
Method for a Supercomputer to Mitigate Traffic Collisions with 5G or 6G
A supercomputer, with traffic-modeling software and 5G/6G connectivity, can assist an autonomous vehicle in avoiding, or at least minimizing the expected harm of, an imminent collision. Upon detecting the imminent collision, the autonomous vehicle can transmit a message to an access point, requesting an uncontested direct communication link to the supercomputer, and then transfer sensor data and other traffic data to the supercomputer through the access point. The supercomputer can calculate a multitude of sequences of braking, steering, and accelerating actions of the autonomous vehicle, and can select the sequence that enables the autonomous vehicle to avoid the collision if possible. If all sequences cannot avoid the collision, the supercomputer can select the sequence that results in the least harm (fatalities, injuries, and property damage) in the unavoidable collision. The supercomputer relays the selected best sequence of actions through the access point to the autonomous vehicle, thereby mitigating the collision.
Systems and methods for defining and implementing rules for three dimensional geofences
The present invention is directed to methods and systems for enforcing at least one rule within a geofence. The rule is enforced by a fencing agent on an unmanned aerial vehicle (UAV). The geofence is defined by a plurality of geographic designators, with the plurality of geographic designators each being associated with an Internet Protocol (IP) address, preferably an IPv6 address.
Systems and methods for defining and implementing rules for three dimensional geofences
The present invention is directed to methods and systems for enforcing at least one rule within a geofence. The rule is enforced by a fencing agent on an unmanned aerial vehicle (UAV). The geofence is defined by a plurality of geographic designators, with the plurality of geographic designators each being associated with an Internet Protocol (IP) address, preferably an IPv6 address.
Prevention of malicious automation attacks on a web service
Techniques to facilitate prevention of malicious attacks on a web service are disclosed herein. In at least one implementation, a computing system intercepts a web request directed to a web server providing the web service. The computing system identifies whether or not the web request is malicious. When the web request is identified as malicious, the computing system redirects the web request to an isolated mitigation server configured to mimic responses of the web server. The isolated mitigation server processes the web request to generate artificial content based on the web request that appears to be genuine content provided by the web server, and presents the artificial content in response to the web request.
Prevention of malicious automation attacks on a web service
Techniques to facilitate prevention of malicious attacks on a web service are disclosed herein. In at least one implementation, a computing system intercepts a web request directed to a web server providing the web service. The computing system identifies whether or not the web request is malicious. When the web request is identified as malicious, the computing system redirects the web request to an isolated mitigation server configured to mimic responses of the web server. The isolated mitigation server processes the web request to generate artificial content based on the web request that appears to be genuine content provided by the web server, and presents the artificial content in response to the web request.
Blockchain-based one ID service system and method
Provided are a blockchain-based one ID service system and method, in an authentication method according to the embodiment of present invention, an authentication support server maps and registers a first ID issued by a first SP server to a first user and a first site of the first SP server, which is an issuing server, and, upon receiving the first ID from a second SP server, the authentication support server returns information on the first site mapped to the first ID to the second SP server. To this end, there is no need for a separate server configuration to perform an authentication procedure, and it is possible to lessen the burden of performing authentication for SPs.
Blockchain-based one ID service system and method
Provided are a blockchain-based one ID service system and method, in an authentication method according to the embodiment of present invention, an authentication support server maps and registers a first ID issued by a first SP server to a first user and a first site of the first SP server, which is an issuing server, and, upon receiving the first ID from a second SP server, the authentication support server returns information on the first site mapped to the first ID to the second SP server. To this end, there is no need for a separate server configuration to perform an authentication procedure, and it is possible to lessen the burden of performing authentication for SPs.