Patent classifications
H04L2101/30
Identifying malicious identifiers
Methods and systems for identifying malicious URIs. The system accepts a list of URIs as input and extracts features related to a given URI and uses the features to discover patterns that indicate malicious content. Once trained, the classifier can then classify new inputs as either malicious or non-malicious.
CLIENT DEVICE APPLICATION INTERACTION MONITORING
Systems and methods herein allow for automatic monitoring of conversions associated with uniform resource identifiers (URIs) accessed via client applications but actuated on web browsers. Upon actuation of a URI on a browser of a client device, a data processing system can assign a click ID to the actuation event and send it to the client device. The client device can open the URI in a client application and send the click ID and a client ID associated with the client device to the client device. The data processing system can map the click ID to the client ID. Upon occurrence of a URI related conversion, on the client application, the data processing system can receive a conversion message indicative of the conversion and including the client ID, and link the URI related conversion to the click ID based on the stored mapping.
Bidirectional communication system and server apparatus used therein
When a client has accessed a server via routers, the server inherits an IP address used during the access and further adds an arbitrary system ID thereto, thereby generating a new connection address. The server then notifies the system ID to the client and further generates a communication process for communicating with the client. The communication between the client and the server from then on is performed, based on the new connection address, by the communication process. Since the connection address, which is generated anew for the communication between the communication process of the server and the client, includes the same IP address as was used during the initial access, the NAT functions of the routers can be used without any problems.
IP tolerance and signaling interworking
In an attempt to establish a communication session between a first communication entity and a second communication entity, a first message is received. For example, the first message may be a SIP INVITE message. A determination is made, based on a registration message from the first communication entity and/or the second communication entity, that at least one of the first communication entity or the second communication entity is Internet Protocol (IP) version intolerant. In response to determining that the at least one of the first communication entity or the second communication entity is IP version intolerant, one or more IP addresses are adapted in messages (e.g., the SIP INVITE message) for establishing the communication session. The adaption changes/removes the one or more IP addresses to a different IP version to ensure proper IP compatibility.
Electronic subscriber identity module (eSIM) transfer via activation code
A mechanism for sharing electronic subscriber identity module (eSIM) credentials between two mobile communication devices is described. This includes establishing, by a source user equipment (UE) comprising a first of the mobile communication devices, a data connection with a subscription manager data preparation (SMDP+) server associated with eSIM credentials stored at the source UE. The source UE notifies the SMDP+ server of an intent to transfer the eSIM credentials. The source UE receives metadata describing an activation code containing identification data for the eSIM credentials. The source UE forwards the activation code to a destination UE comprising a second of the mobile communication devices. The activation code is forwarded to support a download of the eSIM credentials to the destination UE from the SMDP+ server.
Method and Device for Switching Internet Access mode of Gateway Device
The present disclosure provides a method and a device for switching an Internet access mode of a gateway device. The method includes that: a DNS detection domain name is acquired, the DNS detection domain name being a predefined domain name; at least according to the DNS detection domain name, it is determined whether an EWAN connection is online, the EWAN connection being a network connection of the gateway device in an EWAN mode; and in a case that the EWAN connection is offline, the Internet access mode of the gateway device is switched to an LTE mode.
RESOLVING DECENTRALIZED IDENTIFIERS USING MULTIPLE RESOLVERS
The resolving of a decentralized identifier to a corresponding data structure using multiple resolvers. This allows for the use of a consensus of resolvers to improve trust in the resolution process. In order to resolve, a decentralized identifier is sent to multiple resolvers. In response, each of at least some of those resolvers will return a data structure of a particular type (e.g., a decentralized identifier document) that is associated with the decentralized identifier. Then, it is determined whether the data structure for at least some number of resolvers matches each other. That is, it is determined whether at least some predetermined threshold of resolvers is returning the same data structure (e.g., the same decentralized identifier document). If so, then it is determined that the matching data structure is indeed associated with the decentralized identifier. Otherwise, the resolution process has failed.
METHOD AND APPARATUS FOR DETERMINING GATEWAY INFORMATION
Embodiments of the present disclosure provide a method and an apparatus for determining gateway information. A first device obtains first information of user equipment, where the first information of the user equipment is used to indicate an area in which the user equipment subscribes to a service, and the first device determines gateway information corresponding to a first domain name, where the first domain name includes the first information of the user equipment. The first domain name includes the first information of the user equipment, and the first information is used to indicate the area in which the user equipment subscribes to the service. Compared with a method in which a number segment is used to generate a domain name, this reduces a quantity of domain names that need to be configured and maintained, and reduces maintenance costs of an operator.
TECHNIQUES FOR INVITE ENFORCEMENT AND DOMAIN CAPTURE
Techniques for invite enforcement and domain capture. In one embodiment, for example, a method performed in an online service computing environment comprises the operations of: storing, in a database, an association between a team of one or more user accounts and a domain name service domain; receiving a request to invite an e-mail address belonging to the domain name service domain to join the team; creating, in a database, a placeholder user account that is a member of the team; associating, in a database, the e-mail address with the placeholder user account; and after an invitation for the e-mail address to join the team is accepted, converting, in a database, the individual user account to a team account that is (a) a member of the team and (b) associated with the e-mail address.
NAME-BASED ROUTING SYSTEM AND METHOD
An advanced routing system and protocol (referred to herein as “Route Exchange” or “REX”) hides familiar IPv4 and IPv6 addresses and replaces traditional routing logic with words and relationships between named elements. Among other things, this makes IP routing tables significantly easier to understand. In addition, a single routing scheme can be used for any combination of private networks, public networks, IPv4 addressing models, and IPv6 addressing models. Underneath the words lie real IP addresses that move the packets from place to place. These routing addresses abstract away the underlying network.