H04L29/06

MOBILE DEVICE POLICY ENFORCEMENT
20180004937 · 2018-01-04 ·

In general, in one aspect, a method includes receiving software code with an invalid characteristic, repeatedly attempting to execute the software code with the invalid characteristic on a device, and in response to successful execution of the software code with the invalid characteristic, taking an action. The action may include an action to remediate the device.

ELASTIC OUTBOUND GATEWAY
20180007002 · 2018-01-04 ·

In general, in an aspect, a method for providing an outbound gateway protection includes provisioning one or more worker gateways located in a first gateway virtual private cloud, the one or more worker gateways sharing configuration data with the controller gateway, provisioning one or more load balancer gateways in one or more client virtual clouds, the one or more client virtual clouds each comprising one or more clients, the one or more load balancer gateways distributing client requests among the worker gateways, assigning groups of the one or more clients to one of the one or more load balancer gateways based on requests from a majority of the worker gateways, and communicating outbound network traffic from the clients via the assigned load balancer gateways.

CHANNEL BASED COMMUNICATION AND TRANSACTION SYSTEM

System and methods are provided for receiving identification information from remote user devices associated with users. The identification information serves to obtain corresponding stored user profiles. Primary communication channels are generated for each user based upon their profiles. Each such primary channel is limited to communication with, and facilitates electronic communication between, a single corresponding enterprise data source, and users. For each respective primary channel in a subset of the primary channels of a first user, a corresponding plurality of sub-channels is generated based upon their profile. Each such plurality of sub-channels forms a corresponding hierarchical tree with the corresponding primary channel as root node and the sub-channels as child nodes. A sub-channel in a hierarchy of sub-channels enables secure bidirectional communication between (i) the remote user device associated with the first user and (ii) the enterprise data source associated with the primary channel of the hierarchy.

COMMUNICATION CONTROL DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION CONTROL METHOD
20180007095 · 2018-01-04 ·

A communication control device is configured to control data communication between terminals using a communication network. The communication control device include: a status-information acquiring unit configured to acquire respective pieces of status information which represent operating states of the terminals; a reception-information acquiring unit configured to acquire respective pieces of reception information which represent states of the communication network when the terminals have received data; a communication determining unit configured to determine a type of communication on the basis of a combination of pieces of status information of multiple terminals that participate in the same communication; and a quality control unit configured to control quality of data that each terminal transmits or receives on the basis of the determined type of communication and the acquired reception information.

METHOD AND APPARATUS FOR PERFORMING COMMUNICATION IN SOFTWARE-DEFINED NETWORKING, AND COMMUNICATIONS SYSTEM
20180006891 · 2018-01-04 ·

Embodiments of the present disclosure provide a method and an apparatus for performing communication in software-defined networking, and a communications system. The method includes: receiving a message sent by a network device, where the message includes a signaling message; determining, according to a control policy, a matching condition that matches the message, where the control policy includes a matching condition and operation information corresponding to the matching condition; processing the message according to the operation information corresponding to the matching condition that matches the message; and sending the processed message to the network device. According to the method and the apparatus for performing communication in software-defined networking, and the communications system in the present disclosure, a problem in the prior art that a control device serving as a network control center cannot communicate with a base station is resolved.

SYSTEMS AND METHODS FOR DETECTING AND INTERFERING WITH COMPROMISED DEVICES AND UNAUTHORIZED DEVICE RELOCATION IN A COMMUNICATION NETWORK
20180006839 · 2018-01-04 ·

Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.

DYNAMIC SECURITY MODULE SERVER DEVICE AND METHOD OF OPERATING SAME
20180007082 · 2018-01-04 ·

Disclosed herein are a dynamic security module server device for transmitting a dynamic security module to a user terminal and receiving a security management event from the user terminal, and a method of operating the dynamic security module server device. The dynamic security module server device includes a communication unit configured to transmit and receive a security management event over a network, and a processor configured to control the communication unit. The processor is configured to create a security session with the security client of a user terminal, and to transmit a dynamic security module to the security client of the user terminal so that part or all of code performing security management in the security client of the user terminal in which the security session has been created has a predetermined valid period.

PROCESS FOR REINFORCING THE SECURITY OF A PAY TELEVISION SYSTEM BASED ON PERIODIC MANDATORY BACK-COMMUNICATION

The invention relates to a process for transmitting streaming digital content to a client device for access to digital content. The inventive process makes it possible, in particular, to apply an access control system to the protection of direct-mode video streams. The process also makes it possible to significantly improve the security and safety of the system, based on a periodic mandatory back-communication on the part of the client device.

PROVIDING SECURITY SERVICE
20180007001 · 2018-01-04 ·

In an example, a security service providing system receives a service request for requesting security service for a target flow, determine a security device for providing security service for the target flow and first service configuration information and next-hop information of the security device according to security service information carried in the service request, and configure the first service configuration information and the next-hop information of the security device onto the security device, so that the security device provides security service to the target flow according to the first service configuration information and forwards the target flow according to the next-hop information

DHCP AGENT ASSISTED ROUTING AND ACCESS CONTROL
20180006996 · 2018-01-04 · ·

Systems and methods for increasing layer 2 visibility of layer 3 network devices so as to facilitate implementation of device-oriented policy actions by layer 3 network devices are provided. According to one embodiment, unique physical addresses of one or more host devices are retrieved by a dynamic host configuration protocol (DHCP) agent that is operatively coupled with a DHCP server. The physical addresses are mapped to corresponding Internet Protocol (IP) addresses assigned by the DHCP server to the one or more host devices. The mapping is relayed directly or indirectly to a network security device. Network traffic management/security policies are defined within the network security device corresponding to at least one of the unique physical addresses.