Patent classifications
H04L2101/659
IPV4 and IPV6 support in an MBMS network
Multicasting in Multimedia Broadcast Multicast Service (MBMS) nodes and the respective nodes. The method in a node configured as an MBMS gateway includes, in response to receipt of a session start request message for a multicast session, allocating a transport network IPv4 multicast address and a transport network IPv6 multicast address for the session, and generating another session start request message and transmitting it to a node configured as a Mobility Management Element (MME). The session start request message includes a first pair of the allocated transport network IPv4 multicast address and an IPv4 multicast source address, and a second pair of the allocated transport network IPv6 multicast address and an IPv6 multicast source address. In response to receipt of MBMS data from a node configured as a Broadcast-Multicast Service Center (BM-SC), the MBMS data is sent using at least one of the first and second pair of addresses.
System and method for fingerprint validation
A system for optimization of data transmission, comprising a content protection extraction system configured to operate on a remote processor and to extract content protection data associated with a data file and to transmit the content protection data to a central processor and a content protection confirmation system configured to operate on the central processor and to receive the content protection data and to verify whether the content protection data is associated with an authenticated data file.
Method and apparatus for finding a neighbor in a wireless communication system
A device and method for performing Internet Protocol (IP) configuration by a station (STA) of a wireless communication network. The method includes: prior to associating with an access point (AP), receiving, at the STA from the AP, a beacon frame including subnet information and IP type information of the AP; transmitting, by the STA to the AP, a request frame including a requested IP address. Here, the requested IP address is determined by the STA based on the subnet information and the IP type information of the AP. The method also includes: receiving, by the STA from the AP, a response frame including information on an availability of the requested IP address; and associating with the AP by the STA based on the response frame.
Private alias endpoints for isolated virtual networks
In accordance with a designation of a private alias endpoint as a routing target for traffic directed to a service from within an isolated virtual network of a provider network, a tunneling intermediary receives a baseline packet generated at a compute instance. The baseline packet indicates a public IP (Internet Protocol) address of the service as the destination, and a private IP address of the compute instance as the source. In accordance with a tunneling protocol, the tunneling intermediary generates an encapsulation packet comprising at least a portion of the baseline packet and a header indicating the isolated virtual network. The encapsulation packet is transmitted to a node of the service.
Method and Device for Managing Internet Protocol Version 6 Address, and Terminal
The method includes that: when a first service has yet not ended before an original lifetime of a first IPv6 address terminates, a first terminal sends an address updating request message for querying about whether or not the first service supports IPv6 address updating to a second terminal; the first terminal receives an address updating response message returned by the second terminal; when a first determination result carried in the address updating response message indicates that the first service supports IPv6 address updating, the first terminal requests to establish a backup session for the first service with the second terminal by virtue of a second IPv6 address, which is pre-stored; and in the case that the first service has yet not ended when the original lifetime of the first IPv6 address terminates, the first terminal continues executing the first service with the second terminal by virtue of the backup session.
DEVICE IDENTIFICATION SYSTEMS
Methods and systems for a device identification system may be provided. The device identification system may determine an identity of a user device associated with a transaction. The identity may be determined by network address information, hard link information, soft link information, and/or other such information. The network address information may include IPv4 information, IPv6 information, a device ID, and/or other such information. The identity of the user device may be determined and a transaction conducted from the user device may be assigned a fraudulent transaction risk score according to the information. Transactions that are determined to be at a high risk of fraud may be reviewed or otherwise flagged and/or canceled.
INSERTION OF MANAGEMENT PACKET INTO A DETERMINISTIC TRACK
In one embodiment, a method comprises: a first network device in a deterministic network identifying first and second slots for transmission of a data packet toward a destination device along a deterministic track of the deterministic network, the first slot reserved for the first network device receiving the data packet from a second network device and the second slot reserved for transmission by the first network device of the data packet toward the destination device along the deterministic track; the first network device detecting, in the first slot, an absence of receiving the data packet from the second network device; and the first network device selectively generating and transmitting in the second slot, in response to the absence of receiving the data packet, a management packet along the deterministic track.
METHOD AND SYSTEM OF USING IPV6 NEIGHBOR DISCOVERY OPTIONS FOR SERVICE DISCOVERY
A method is disclosed of using IPv6 Neighbor Discovery to discover application services in an IPv6 network, the method including hosting a list of application services on a first host device; creating an application service Neighbor Discovery option for the list of application services hosted on the first host device; attaching the application service Neighbor Discovery option to a Neighbor Discovery solicitation response, a Neighbor Discovery advertisement, or a Neighbor Discovery solicitation request; and sending the Neighbor Discovery solicitation response, the Neighbor Discovery advertisement, or the Neighbor Discovery solicitation request with the application service Neighbor Discovery option from the first host device to one or more second host devices on a IPv6 network connection, wherein the application service Neighbor Discovery option provides the one or more second host devices with the list of application services hosted on the first host device.
SYSTEMS AND METHODS FOR GEOFENCE SECURITY
The present invention is directed to methods and systems for enforcing at least one rule within a geofence. The rule is enforced by a fencing agent on an Unmanned Aerial Vehicle (UAV). The geofence is defined by a plurality of geographic designators, with the plurality of geographic designators each being associated with an Internet Protocol (IP) address, preferably an IPv6 address.
ROUTING TRAFFIC BETWEEN NETWORKS GOVERNED BY DIFFERENT VERSIONS OF THE INTERNET PROTOCOL
Systems and methods for routing traffic between networks governed by different Internet Protocol (IP) versions. An example method may comprise: receiving a network packet having an original source address defined in a first address space and an original destination address defined in the first address space, wherein the first address space is associated with a first Open Systems Interconnection (OSI) network layer protocol; identifying, using a network layer address mapping transformation, a new destination address associated with the original destination address, wherein the new destination address is defined in a second address space associated with a second OSI network layer protocol; substituting the original destination address of the network packet with the new destination address; selecting, from a pool of available network layer addresses defined in the second address space, a new source address; substituting the original source address of the network packet with the new source address; and causing the network packet to be transmitted to a destination host identified by the new destination address.