H04L69/162

Methods and Apparatus for Cross-Layer Transport Awareness
20210391950 · 2021-12-16 · ·

Techniques are provided for managing cross-layer transport awareness of a user space protocol stack. A protocol layer of a user space protocol stack within a user space application operated in a user space of a first device can receive a batch of packets of a data flow from a corresponding protocol layer operated by a second device. The protocol layer can process a group of packets in the batch of packets to generate a set of acknowledgement packets of the data flow, and process an additional packet in the batch of packets to generate an additional acknowledgement packet of the data flow. The additional acknowledgement packet is indicated to supersede the set of acknowledgement packets. The protocol layer can transmit the additional acknowledgement packet to the second device to indicate that both the group of packets and the additional packet have been received by the first device.

Fingerprinting to identify devices and applications for use in management and policy in the cloud

Systems and methods include obtaining a plurality of parameters associated with a host; determining a fingerprint of the host utilizing the plurality of parameters; and providing the fingerprint to cloud service for enrollment and management of the host in the cloud service. The cloud service can include microsegmentation of the host. The cloud service can include any of Internet access for the host and private resource access by the host.

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD AND RECORDING MEDIUM RECORDING INFORMATION PROCESSING PROGRAM
20220210227 · 2022-06-30 ·

An information processing system includes: a setting processing processor that registers, based on setting information acquired from a storage device through a first communication path, the storage device as a storage device capable of presenting specific information to a user terminal; an acquisition processing processor that acquires, when the storage device is registered by the setting processing processor, the specific information corresponding to a request acquired from the user terminal, through a second communication path different from the first communication path; and a presentation processing processor that presents the specific information acquired with the acquisition processing processor to the user terminal.

Communication system and method of autonomous vehicle and terminal device

Provided are a communication system and a communication method of an autonomous vehicle. The system includes: a plurality of application modules, and an in-vehicle terminal. The in-vehicle terminal includes: an external communication module configured to communicate with another autonomous vehicle or a server in a message mode, and an internal communication module configured to communicate with the plurality of application modules in a service mode.

Methods and apparatus for self-tuning operation within user space stack architectures

Methods and apparatus for efficient data transfer within a user space network stack. Unlike prior art monolithic networking stacks, the exemplary networking stack architecture described hereinafter includes various components that span multiple domains (both in-kernel, and non-kernel). For example, unlike traditional “socket” based communication, disclosed embodiments can transfer data directly between the kernel and user space domains. Direct transfer reduces the per-byte and per-packet costs relative to socket based communication. A user space networking stack is disclosed that enables extensible, cross-platform-capable, user space control of the networking protocol stack functionality. The user space networking stack facilitates tighter integration between the protocol layers (including TLS) and the application or daemon. Exemplary systems can support multiple networking protocol stack instances (including an in-kernel traditional network stack).

Method and system for transparent database command replacement
11366785 · 2022-06-21 ·

A database command replacer intercepts database commands to one or more database servers, extracts the database command and defined parameters within the command, and determines if the database command is defined in the list of commands subject to replacement; if not, the command is passed through to the destination database server. If the database command is in the list of commands subject to replacement, the replacement command is retrieved, the mapped parameter values are incorporated into the replacement command, the replacement command is transmitted to the destination database server, and the resultant information is relayed back to the origination program. No changes are required to either the client or server software in existing client/server database arrangements.

Use of DHCP for location information of a user device for automatic traffic forwarding
11363022 · 2022-06-14 · ·

Systems and methods implemented by an application executed on a user device for service discovery and connectivity include, responsive to joining a new network, performing a Dynamic Host Configuration Protocol (DHCP) operation to obtain network configuration parameters; receiving a DHCP message in response with the network configuration parameters; via an application executed on the user device for service discovery and connectivity analyzing data in the DHCP message to determine one or more forwarding profiles on the new network, wherein the one or more forwarding profiles are based on a location or trust of the new network; and automatically installing the determined one or more forwarding profiles.

Zero copy socket splicing

Some embodiments provide a novel method for splicing Transmission Control Protocol (TCP) sockets on a computing device that processes a kernel of an operating system. The method receives a set of packets at a first TCP socket of the kernel. The method stores the set of packets at a kernel memory location sends the set of packets directly from the kernel memory location out through a second TCP socket of the kernel.

Managing network sockets

In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20220173933 · 2022-06-02 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.