Patent classifications
H04L41/028
METHOD AND DEVICE FOR INTRUSION DETECTION IN A COMPUTER NETWORK
A device and method for intrusion detection in a computer network. A data packet is received at an input of a hardware switch unit, an output of the hardware switch unit is selected for sending the data packet or a copy as a function of security layer information from the data packet and of a hardware address, context information for the data packet being determined, an actual value from a field being compared in a comparison by a hardware filter with a setpoint value for values from this field, the field including security layer data or mediation layer data, and an interrupt for a computing device being triggered as a function of a result of the comparison, an analysis for detecting an intrusion pattern in a network traffic in the computer network, triggered by the interrupt, being carried out as a function of the context information for the data packet.
Node-indexed system, apparatus and method configured to sequence client events within a peer-to-peer network
Systems, apparatus, and methods for tracking and sequencing client events in a federated computer network are discussed herein. Various embodiments provide a computer-implemented method for assigning timestamps to client events received by nodes within the network and appending node identifiers to the timestamps to create node time signatures for the client events to facilitate updating of a client event database. Still other embodiments provide methods for comparing a last event node time signature to a recently received node time signature and generating an updated node time signature in view of the same. Such embodiments address client event sequencing problems that tend to plague federated and distributed networks as they expand in scale, geographic distribution, complexity, and involve programmatic client event generating services such as credential management services.
COMPUTER NETWORK TROUBLESHOOTING
- Arjun Mathur ,
- Andrew Ash ,
- Anuraag Bahl ,
- Andy Chen ,
- Aydin Keskin ,
- Christopher Rogers ,
- Anshuman Prasad ,
- Ankit Shankar ,
- Casey Patton ,
- Christopher Wynnyk ,
- Joanna Peller ,
- Jonathan Victor ,
- Mackenzie Bohannon ,
- Mitchell Skiles ,
- Nikhil Taneja ,
- Ryan Norris ,
- Scott Adams ,
- Samuel Sinensky ,
- Sri Krishna Vempati ,
- Thomas Mathew ,
- Vinoo Ganesh ,
- Rahij Ramsharan
A system for troubleshooting network problems is disclosed. A model can use demographic information, network usage information, and network membership information to determine an importance of a problem. The importance of the problem for the user who reported the problem, a number of other users affected by the problem, and the importance of the problem to the other users can be used to determine a priority for resolving the problem. Before and after a work order is executed to resolve the problem, network metrics can be gathered, including aggregate network metrics, and automatically presented in various user interfaces. The analysis of the metrics can be used to update a database of which work orders are assigned in response to which problems.
Computer network troubleshooting
- Arjun Mathur ,
- Andrew Ash ,
- Anuraag Bahl ,
- Andy Chen ,
- Aydin Keskin ,
- Christopher Rogers ,
- Anshuman Prasad ,
- Ankit Shankar ,
- Casey Patton ,
- Christopher Wynnyk ,
- Joanna Peller ,
- Jonathan Victor ,
- Mackenzie Bohannon ,
- Mitchell Skiles ,
- Nikhil Taneja ,
- Ryan Norris ,
- Scott Adams ,
- Samuel Sinensky ,
- Sri Krishna Vempati ,
- Thomas Mathew ,
- Vinoo Ganesh ,
- Rahij Ramsharan
A system for troubleshooting network problems is disclosed. A model can use demographic information, network usage information, and network membership information to determine an importance of a problem. The importance of the problem for the user who reported the problem, a number of other users affected by the problem, and the importance of the problem to the other users can be used to determine a priority for resolving the problem. Before and after a work order is executed to resolve the problem, network metrics can be gathered, including aggregate network metrics, and automatically presented in various user interfaces. The analysis of the metrics can be used to update a database of which work orders are assigned in response to which problems.
Methods, network node and wireless device for handling access information
A radio network (600) comprising at least one network node (604) broadcasts access information (AIT) comprising a range of access parameters, using a demodulation reference signal (RS4) out of a set of predefined demodulation reference signals. The radio network (600) also transmits a synchronization signal (SSI 7) associated with a predefined mapping to at least two candidate demodulation reference signals including the demodulation reference signal used for broadcasting the access information. Thereby, a wireless device (602) receiving the synchronization signal is able to demodulate the broadcasted access information and derive valid access related parameters therefrom, based on the synchronization signal (SSI 7).
Machine To Machine Architecture
A machine-to-machine communication platform provides a flexible system for device control and solution hosting. In particular, the communication platform hosts and manages third party vertical solutions that interact with external devices. A third party gateway provides the third parties with access to the communication platform so that the third parties may define, configure, and monitor custom vertical solutions that are locally hosted in the communication platform. The communication platform provides a communication manager that implements a device independent communication facility for communicating with the external devices. As a result, the communication platform connects to, communicates with, and controls virtually any external device.
Methods and apparatus for selecting a read mechanism
A system receives managed resource data collected by an agent from a managed resource in a storage area network. The system evaluates conditions associated with the managed resource data to select a read mechanism based on the conditions, and applies the read mechanism to read managed object data from the managed object database. The managed object data corresponds to the managed resource data. After application of the read mechanism, the system synchronizes the managed object data from the managed object database with the managed resource data collected from the managed resource.
Machine to machine architecture
A machine-to-machine communication platform provides a flexible system for device control and solution hosting. In particular, the communication platform hosts and manages third party vertical solutions that interact with external devices. A third party gateway provides the third parties with access to the communication platform so that the third parties may define, configure, and monitor custom vertical solutions that are locally hosted in the communication platform. The communication platform provides a communication manager that implements a device independent communication facility for communicating with the external devices. As a result, the communication platform connects to, communicates with, and controls virtually any external device.
Method and system for user equipment configuration
A method of managing configuration of user equipment that has a configuration database modifiable with configuration data in a first format, and a communications unit for receiving configuration data in a second format is described. The method comprises storing a user agent at the user equipment; providing received configuration data in the second format to the user agent; using the user agent to transform the configuration data into the first format in the user equipment; and modifying the configuration database with the configuration data in the first format.
Agent device, image-forming-device management system, image-forming-device management method, image-forming-device management program, and storage medium
An agent device is connected with one or more image-forming devices in a local network having a firewall provided therein. A management device carries out remote management of the image-forming devices in the local network through the Internet. The agent device includes a command receiving unit which starts connection with the management device and receives a management command from the management device via the firewall, the command being sent by the management device in response to the connection. An image-forming-device communication unit receives device-state information of a corresponding one of the image-forming devices according to the management command. A command response transmitting unit transmits the device-state information to the management device through the Internet.