Patent classifications
H04L101/622
Removing virtual machine identifiers from packets
A server, includes a virtual machine identifier assigning section to assign an identifier of a virtual machine operating on the server; and a network interface to transmit a packet including a Layer 2 header information which includes the identifier of the virtual machine and a first packet field for a VLAN-Tag, wherein the network, interface transmits the packet to a packet encapsulate section which encapsulates a second packet field including the Layer 2 header information with a virtual network identifier representing a virtual network to which the virtual machine belongs.
Theft detector
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.
Systems and methods of detecting malicious powershell scripts
Disclosed herein are systems and methods of executing scanning software, such an executable software program or script (e.g., PowerShell script), by a computing device of an enterprise, such as a security server, may instruct the computing device to search all or a subset of computing devices in an enterprise network. The scanning software may identify PowerShell scripts containing particular malware attributes, according to a malicious-code dataset. The computing system executing the scanning software may scan through the identified PowerShell scripts to identify particular strings, values, or code-portions, and take a remedial action according to the scanning software programming.
Methods and apparatus to recognize metered devices connected to proprietary WiFi extenders
Example methods and apparatus to recognize metered devices connected to proprietary WiFi extenders are disclosed herein. In some examples, a first device comprising at least one memory including a table, and at least one processor to broadcast a first message to a network extender, the first message including a first address associated with a second device and a message identifier, identify, in response to obtaining a second message including the message identifier, a second address embedded on a data link layer of the second message, and store the second address in the table in association with the second device.
Method, device and system for configuring radio transmission and reception parameters
Disclosed is a method for configuring radio transmission and reception parameters. The method includes: configuring, by a station, a transmission module by using a first parameter set and transmitting a first radio frame, where the first radio frame has a second parameter set; and configuring, by the station, a reception module by using the second parameter set and receiving a second radio frame triggered by the first radio frame. Also disclosed are an apparatus and system for configuring radio transmission and reception parameters.
System and method for non-disruptive migration of software components to a public cloud system
A system supporting transferring content between an on-premises network and a public cloud network includes a first cloud computing platform comprising a first software instance having a first IP address, a subnet configured to extend across on-premises network and a public cloud network, a first gateway associated with the on-premises network, a second gateway associate with the public cloud network, a secure communication path between the first and second gateways. The subnet comprises a shared IP address range between the public cloud network and the on-premises network, and the first IP address of the first software instance is the same as an IP address of the first software instance that resided on the on-premises network.
Enhanced security for multi-link wireless operations
This disclosure describes systems, methods, and devices related to security for multi-link operations. A multi-link device (MLD) may establish a first communication link between a first device of the MLD and a first device of a second MLD, and a second communication link between a second device of the MLD and a second device of the second MLD. The MLD may generate a group-addressed message. The MLD may protect the group-addressed message using a first key or a first integrity key. The MLD may protect the group-addressed message using a second key or a second integrity key. The MLD may send, using the first communication link, the group-addressed message protected using the first key or the first integrity key, and may send, using the second communication link, the group-addressed message protected using the second key or the second integrity key.
Service function chaining with session-based routing
Techniques are disclosed for session-based load-balancing of network traffic to network service instances. In one example, a network device receives a first packet of a forward packet flow from a network service instance of a plurality of network service instances after application of a network service. The first packet specifies a Media Access Control (MAC) address of the network service instance as a source MAC address. The network device defines a session comprising the forward packet flow and a reverse packet flow and stores an association between the session and the MAC address of the network service instance. The network device determines that a second packet received from a destination device is associated with the reverse packet flow of the session. The network device forwards the second packet to the same network service instance based on the association between the session and the MAC address of the network service instance.
Redundancy in an automation system covering more than one system area
An automation system includes a first system area including a transmitting redundancy handling device and a second system area including a receiving redundancy handling device. Device obtains a first communication protocol packet with automation application data and a sequence number linked thereto, extracts the sequence number and places it in a destination option header of a first IPv6 packet, which also includes the first communication protocol packet, sends packet to the receiving redundancy handling device, obtains a second communication protocol packet having the same automation application data and sequence number, places the sequence number in a destination option header of a second IPV6 packet also including the second communication protocol packet, and sends packet to device. Device receives the packets, analyses the destination option headers, determines that the sequence number is the same in the packets and discards the first or the second IPv6 packet based on the determination.
Wireless transmit/receive unit (WTRU) to WTRU relay media access control (MAC) access conflict support
A relay node may detect conflicts regarding media access control (MAC) addresses. A source node may send a request to the relay node. The request may be a request to establish communications with a target node. The source may send, to the relay node, an indication of the MAC address of the source node. The source node may receive a reject message from the relay node. The reject message may comprise an indication of a conflict associated with the MAC address of the source node.