Patent classifications
H04L69/162
Systems and methods for cloud based unified service discovery and secure availability
Systems and methods implemented by an application executed on a user device for service discovery and connectivity include discovering one or more cloud services for a user associated with the user device; creating and operating an interface on the user device; and intercepting traffic at the interface from one or more client applications on the user device and splitting the traffic based on configuration to the one or more cloud services. The method can further include authenticating the user into the one or more cloud services prior to the splitting.
TECHNOLOGIES FOR CONTROLLING MEMORY ACCESS TRANSACTIONS RECEIVED FROM ONE OR MORE I/O DEVICES
Technologies for secure I/O include a compute device, which further includes a processor, a memory, a trusted execution environment (TEE), one or more input/output (I/O) devices, and an I/O subsystem. The I/O subsystem includes a device memory access table (DMAT) programmed by the TEE to establish bindings between the TEE and one or more I/O devices that the TEE trusts and a memory ownership table (MOT) programmed by the TEE when a memory page is allocated to the TEE.
Methods and systems for data transmission
A method for data transmission may be implemented on an electronic device having one or more processors. The one or more processors may include a master queue including a master queue head and a plurality of primary ports that are connected to each other using a serial link. The method may include operating the master queue head to obtain a message. The method may also include operating the master queue head to segment the message into a plurality of segments. The method may also include operating the master queue head to transmit the plurality of segments to a first primary port of the plurality of primary ports in the master queue. The method may also include operating the first primary port to transmit the plurality of segments to a second primary port of the plurality of primary ports in the master queue.
System and method for improving content fetching by selecting tunnel devices
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.
Adaptive multipath tunneling in cloud-based systems
Systems and methods implemented by a mobile device include establishing a plurality of tunnels to a gateway, wherein each of the plurality of tunnels is on one of a plurality of link layer channels at the mobile device; intercepting network traffic on the mobile device; forwarding the network traffic to one of the plurality of tunnels based on a set of traffic forwarding rules; and responsive to a network change for the mobile device, managing the plurality of tunnels and continuing the forwarding based on the managing. The systems and methods can further include determining characteristics including bandwidth of each of the plurality of link layer channels; and utilizing the characteristics with the set of traffic forwarding rules for the forwarding.
SOCKETS FOR SHARED LINK APPLICATIONS
A method is disclosed comprising: instantiating a first plurality of type-1 network sockets on a source computing system, each of the type-1 network sockets having a first queue depth; instantiating a second plurality of type-2 network sockets on the source computing system, each of the type-2 network sockets having a second queue depth that is greater than the first queue depth; transitioning the source computing system into a first state, the first state being one in which data replication messages are transmitted by the source computing system to a target computing system by using both the type-1 and type-2 network sockets; transitioning the source computing system from the first state. into a second state, the second state being one in which data replication messages are transmitted by the source computing system to the target computing system by using the type-2 network sockets,
Delegated communication methods and systems for a wearable device
Systems and methods for delegating communication from a wearable computing device to a remote network via a host computing device connected to the remote network include providing a host routing service and a host data communications endpoint at the host computing device. Incoming data message(s) formatted according to an Internet Protocol and destinated for delivery to an application program at the wearable computing device are received via the host routing service. The incoming data message(s) are encapsulated using a transport protocol and transmitted to a data routing service of the wearable computing device. In a reverse direction, outgoing data message(s) destinated for delivery to a remote computing device connected to the remote network and encapsulated in a transport protocol are received via the host routing service. The outgoing data message(s) are de-encapsulated, re-encapsulated using an Internet Protocol, and transmitted to the remote computing device via the remote network.
HYBRID INFORMATION-CENTRIC NETWORKING PROXY
Techniques for providing Hybrid information-centric networking (hICN) via a proxy application is described. A hICN proxy application provides hICN to legacy applications by diverting network traffic of a plurality of network traffic types to the hICN proxy application and storing network traffic information for the network traffic in a connection table. The hICN proxy application also translates the diverted network traffic to a hICN network traffic protocol and selects a forwarding strategy for the translated network traffic in order to send the hICN traffic over various non-hICN network protocol types. The hICN proxy application also transmits the translated traffic to a server proxy application using the selected forwarding strategy.
SYSTEM AND METHOD FOR FORWARDING TRAFFIC OF ENDPOINT
Disclosed is a system for forwarding traffic of an endpoint. The system includes the endpoint configured to transmit traffic generated by an application to a server and a security gateway configured to receive the traffic from the endpoint and analyzes data related to information security of secure sockets layer (SSL) traffic among the traffic. Here, the endpoint includes a local redirection module configured to store redirection information including server connection information for transmitting the traffic to the server and to perform redirection related to transmission of the traffic and a local proxy module configured to decode the data with respect to the SSL traffic among the traffic received from the local redirection module and then to forward the decoded SSL traffic to the security gateway according to the redirection of the local redirection module.
System and Method for Improving Content Fetching by Selecting Tunnel Devices
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.