Patent classifications
H04L2101/345
Split-tunneling for clientless SSL-VPN sessions with zero-configuration
Described embodiments provide systems and methods for rewriting an URL in a message transmitted via a clientless SSL VPN session. An intermediary device may identify, in a HTTP response transmitted via the session, an absolute URL that includes a hostname of the server. The device may determine that the absolute URL includes an intranet domain name. The device may generate, responsive to the determination, a URL segment by combining a unique string corresponding to the hostname of the server, with a hostname of the device. The device may rewrite, responsive to the determination, the absolute URL by replacing the server hostname in the absolute URL with the generated URL segment. A DNS server for the client may be configured with a DNS entry comprising a wildcard combined with the device hostname, to cause the DNS server to resolve the rewritten absolute URL to an IP address of the device.
SECURE REMOTE ACCESS TO DEVICES ON OVERLAPPING SUBNETS
In one embodiment, a remote access manager receives an access request from a client to remotely access a device on a local network. The remote access manager generates a universally unique identifier for the access request. The remote access manager sends a response to the client having a one-time use domain name system name that is based on the universally unique identifier. The remote access manager communicates with a web proxy to authorize the client to remotely access the device.
Method of communication between a device and a network
A method of communication between an electronic device and a cellular network employing a communication protocol is disclosed. The device initiates a connection with the network and during the initiation the device issues to the network at least one information criterion. Once the connection is established, the network forwards to the device only communications required by said communication protocol and any communications which meet the information criterion issued by the device.
OID CONFIGURATION, RESOLUTION METHOD, CLIENT, NODE, DATABASE AND STORAGE MEDIUM
Disclosed are an Object Identifier (OID) configuration, a configuration method, an OID Resolution System (ORS) client, an OID node and a database thereof. The OID configuration method may include: a parent OID node performs Domain Name System (DNS) configuration on a service provided by an OID tree to form a DNS resource record, the OID tree including the parent OID node and at least one child OID node of the parent OID node; and the parent OID node stores the DNS resource record in a DNS database of the parent OID node. Also disclosed is a computer storage medium.
SYSTEMS AND METHODS FOR A UNIQUE MECHANISM OF PROVIDING 'CLIENTLESS SSLVPN' ACCESS TO A VARIETY OF WEB-APPLICATIONS THROUGH A SSLVPN GATEWAY
The present disclosure is directed towards systems and methods for rewriting a HTTP response transmitted via a clientless SSL VPN session. An intermediary device may identify, in a HTTP response transmitted via a clientless SSL VPN session, an absolute URL that includes a first hostname of the server. The device may provide a unique string corresponding to the first hostname of the server. The device may generate a URL segment by combining the unique string with a second hostname of the device. The device may rewrite the absolute URL by replacing the first hostname in the absolute URL with the generated URL segment. A domain name system (DNS) server for the client may be configured with a DNS entry comprising a wildcard combined with the second hostname, to cause the DNS server to resolve the rewritten absolute URL to an IP address of the device.
Providing a first digital certificate and a DNS response
A computer-implemented method is for providing a digital certificate to a device. In an embodiment, the method is based on receiving, from the device, authentication data via a secure communication channel. Furthermore, the method is based on receiving, from the device, or determining, by the server, a first certificate identifier. In particular, the first certificate identifier is a hash value. Further aspects of the method are verifying the authentication data and receiving, from the device, a first public key created by the device. In an embodiment, the method is furthermore based on sending a first certificate signing request related to a first domain name based on the first public key to a certificate authority. Herein, the first domain name comprises the certificate identifier, and a domain related to the first domain name is controlled by the server. In particular, the first domain name is a wildcard domain.
System and method for location-based device naming
A system and method for uniquely identifying a storage device among an array of storage devices of a storage system is provided. In some embodiments, a storage device of the storage system is identified. The storage device may currently lack a name or may have an invalid name. A shelf identifier of a storage device shelf in which the storage device is installed is determined. A stack identifier associated with a connection of the storage device is also determined. The storage system constructs a device name for the storage device based on the shelf identifier and the stack identifier. In some such embodiments, a bay in which the storage device is installed is determined, and the device name is further based on an identifier of the bay. The device name may include the stack identifier, the shelf identifier, and/or the identifier of the bay.
METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVISIONING MULTIPLE USER IDENTITIES IN AN IP MULTIMEDIA SUBSYSTEM
A mechanism for an apparatus in a communication network is described. The mechanism comprises receiving provisioning from a second apparatus, wherein said provisioning comprising at least a public identity and a pre-defined range of private identity associated with the public identity, receiving a request comprising a first public identity and its associated private identity from a third apparatus, determining the first public identity already exists in the apparatus, determining the received private identity is not identical to any private identity already provisioned in the apparatus, determining the received private identity is not identical to any private identity in a temporary profile, determining the received private identity is within a pre-defined range of private identity associated with the first public identity, creating a temporary private identity identical to the received private identity and a temporary profile for the received private identity.
PROVIDING A FIRST DIGITAL CERTIFICATE AND A DNS RESPONSE
A computer-implemented method is for providing a digital certificate to a device. In an embodiment, the method is based on receiving, from the device, authentication data via a secure communication channel. Furthermore, the method is based on receiving, from the device, or determining, by the server, a first certificate identifier. In particular, the first certificate identifier is a hash value. Further aspects of the method are verifying the authentication data and receiving, from the device, a first public key created by the device. In an embodiment, the method is furthermore based on sending a first certificate signing request related to a first domain name based on the first public key to a certificate authority. Herein, the first domain name comprises the certificate identifier, and a domain related to the first domain name is controlled by the server. In particular, the first domain name is a wildcard domain.
PATTERN MATCHING BY A NETWORK DEVICE FOR DOMAIN NAMES WITH WILDCARD CHARACTERS
A network device may receive data, may extract primary patterns from a plurality of domain names included in the data, may process the primary patterns, with a hash model, to generate hash keys for the primary patterns, wherein a hash key includes a hash value associated with a wildcard character, and may store the plurality of domain names in a hash table. The network device may extract a particular primary pattern from a particular domain name included in a search request, may determine potential matching patterns based on the particular primary pattern, and may process the potential matching patterns, with the hash model, to generate potential matching hash keys for the potential matching patterns, wherein a hash key includes a hash value associated with a wildcard character. The network device may search, based on the potential matching hash keys, the hash table to identify a matching domain name.