Patent classifications
H04L101/622
Theft detector
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.
Split bearer packet data converge protocol protocol data unit routing
For routing Packet Data Converge Protocol (PDCP) Protocol Data Units (PDU), a processor detects a split bearer configuration for a mobile device. In response to detecting the split bearer configuration, the processor routes PDCP PDU in a Radio Link Control (RLC)/Medium Access Control (MAC) for the at least two cell groups.
Seamless remote network redirection
Disclosed are systems and methods for seamlessly redirecting network data between a client and a remote server. In one exemplary aspect, the method comprises receiving, at a remote server, the network data via a first remote desktop protocol (RDP) channel, wherein the network data is encapsulated and transmitted by a client device configured to communicate with the remote server. The method further comprises replacing a MAC address listed in the network data with a MAC address of a logical network adapter on the remote server, and placing received network packets into a network driver of the logical network adapter, wherein the logical network adapter transfers received data in an operating system of the remote server such that a server-side application on the remote server receives network packets from the client device.
Method and system for provisioning device specific WLAN credentials
A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.
Transparent high availability for customer virtual machines achieved using a hypervisor-based side channel bonding and monitoring
Systems and methods for transparent high availability for customer virtual machines using a hypervisor-based side channel bonding and monitoring are disclosed herein. The method can include creating a network path bond between at least one compute instance and a plurality of Network Virtualization Devices (“NVD”), the network path bond including a plurality of network paths, each network path connecting the compute instance with the Virtualized Network Interface Card (“VNIC”) of one of the plurality of NVDs, identifying a first one of the network paths as an active network path and a second one of the network paths as an inactive network path, performing a health check on the active network path, determining that the active network path failed the health check, marking the first one of the network paths as failed subsequent to determining that the active network path failed the health check, and identifying the second one of the network paths as the active network path.
System to rate the security of a device through fingerprint analysis
An Internet of Things device is herein disclosed. The Internet of Things device comprises a communication module operable to connect to a network, a memory storing a device fingerprint having a plurality of predetermined system parameters, a processor coupled to the memory and operable to execute instructions stored in the memory, and an activity module, including at least one of a sensor and a control device, the activity module under control of the processor, to perform a predetermined operation with at least one of the sensor and the control device. The activity module communicates on the network via the communications module. The processor measures system parameters during performance of the predetermined operation, compares measured system parameters to predetermined system parameters of the device fingerprint, and disables the communications module, the processor, or the activity module responsive to the measured system parameters being out of compliance with the predetermined system parameters.
Methods for identifying a source location in a service chaining topology
In an embodiment, a computer-implemented method provides mechanisms for identifying a source location in a service chaining topology. In an embodiment, a method comprises: receiving a query, from a service plane implementation module executing on a host of a service virtual machine (“SVM”), for a location of a source host implementing a guest virtual machine (“source GVM”) that originated a packet in a computer network and that serviced the packet; in response to receiving the query, performing a search of bindings associated with one or more virtual network identifiers (“VNIs”) or service virtual network identifiers (“SVNIs”) to identify a particular binding that includes a MAC address of the host implementing the source GVM; identifying, in the particular binding, the location of the source host; and providing the location of the source host to the host of the SVM to facilitate forwarding of the packet from the SVM to the GVM.
Managing a second ring link failure in a multiring ethernet network
Examples disclosed herein relate to managing a second ring link failure in a multi-ring Ethernet network. In an example, an inter-connection network node in a multi-ring Ethernet network comprising a major ring and a sub-ring may propagate a signal failure (SF) event, received in response to a second ring link failure in the major ring, to one or more nodes in the sub-ring. In response to receiving the SF event, a Ring Protection Link (RPL) on the sub-ring may be unlocked to allow network traffic through the RPL and avoid loop formation on the multi-ring Ethernet network. The sub-ring may be moved to the ring protection switching state, including performing a filtering database (FDB) flush at every node on the multi-ring Ethernet network whereby all MAC addresses and related port associations for traffic forwarding are cleared from the FDB.
Internet group management protocol (IGMP) of a layer-2 network in a virtualized cloud environment
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. IGMP configuration is distributed to the L2 virtual switches.
Communication method and communications device
This application provides a communication method and a communications device. The method includes: obtaining a media access control (MAC) address that is of a terminal device and that is bound to a session and first route information of an interface, corresponding to the session, between a user plane function network element and a data network; and sending to an application function network element or a gateway of the data network, the MAC address that is of the terminal device and that is bound to the session and the first route information.