H04L29/02

E-mail firewall with policy-based cryptosecurity

An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall includes a simple mail transfer protocol relay for causing the e-mail messages to be transmitted between the first site and selected ones of the second sites. Policy managers enforce-administrator selectable policies relative to one or more of encryption and decryption, signature, source/destination, content and viruses.

Dynamic spectrum management

Described herein are methods, metrics and apparatus for bandwidth allocation for cognitive radio. Information that needs to be passed between different components of a dynamic spectrum management (DSM) system for dynamic bandwidth allocation along with the corresponding interfaces is identified. Methods and associated metrics for measuring network performance, evaluating channel sensing results and handling various bandwidth allocation scenarios are presented. Also provided is an admission control mechanism for quality of service support. Alternate channel monitoring may be performed in the background so that when a new channel is needed, an alternate channel may be immediately allocated and service disruption to the DSM system is reduced. A channel may be dynamically assigned as the primary channel in multiple channel scenarios to support tasks such as transmission of acknowledgment frames. Hybrid mode devices that may access a television white space (TVWS) database and perform spectrum sensing are also described.

Policy control method and apparatus for terminal peripheral

Provided are a policy control method and device for one or more terminal peripherals. The method includes: an M2M gateway executing one or more operations for one or more terminal peripherals according to a transaction trigger condition in policy definition, wherein the one or more operations for the one or more terminal peripherals are one or more operations corresponding to the transaction trigger condition in the policy definition. The solution solves the technical problem in the related art that it is impossible to implement control for one or more terminal peripherals through the M2M gateway according to the policy definition, which implements policy control of one or more terminal peripherals through the M2M gateway and improves the intelligent degree of an M2M system.

Content Sharing Method, Terminal, Server, and System
20170302499 · 2017-10-19 ·

Embodiments provide a content sharing method and system. A source terminal cloud server receives a content sending command sent by a source terminal, where the content sending command carries an address of a destination terminal cloud server. The source terminal cloud server sends a connection request to the destination terminal cloud server according to the address of the destination terminal cloud server, where the connection request is used to request to establish a connection to the destination terminal cloud server. The source terminal cloud server sends shared content to the destination terminal cloud server after the connection is established. After the shared content is transferred between the cloud servers, terminals respectively log in to their respective cloud servers.

Data Transmission Method and Device
20170302500 · 2017-10-19 ·

Embodiments relate to a data transmission method. A relay node receives information that is about an SCMA codebook used by the relay node and that is sent by a destination node. The relay node receives two or more source signals sent by two or more source nodes. The relay node performs network coding on the received two or more source signals. The relay node performs SCMA codebook mapping on a signal obtained after the network coding, so as to obtain at least two modulation symbols. The relay node sends to the destination node, the at least two modulation symbols obtained after the SCMA mapping.

ROUTING TRAFFIC BETWEEN NETWORKS GOVERNED BY DIFFERENT VERSIONS OF THE INTERNET PROTOCOL
20170250910 · 2017-08-31 ·

Systems and methods for routing traffic between networks governed by different Internet Protocol (IP) versions. An example method may comprise: receiving a network packet having an original source address defined in a first address space and an original destination address defined in the first address space, wherein the first address space is associated with a first Open Systems Interconnection (OSI) network layer protocol; identifying, using a network layer address mapping transformation, a new destination address associated with the original destination address, wherein the new destination address is defined in a second address space associated with a second OSI network layer protocol; substituting the original destination address of the network packet with the new destination address; selecting, from a pool of available network layer addresses defined in the second address space, a new source address; substituting the original source address of the network packet with the new source address; and causing the network packet to be transmitted to a destination host identified by the new destination address.

Fragment-based mobile device application streaming utilizing crowd-sourcing

Technology for decomposing an application into fragments and streaming the application in fragments is disclosed herein. According to at least one embodiment, a computer-implemented method includes steps of sending one or more messages to cause a plurality of computing devices that can be used to execute the compute task to be identified, sending at least one message to initiate execution of the compute task to determine the plurality of application fragments including a first application fragment and a second application fragment, collecting fragment information associated with the application fragments from one or more of the plurality of computing devices, storing the fragment information at a storage device, determining that the second application fragment follows the first application fragment based on a fragments relationship data structure, and streaming the second application fragment to a mobile game computing device.

Data sending method and forwarding device

A data sending method includes receiving, by a forwarding device using a first flexible Ethernet (FlexE) group and in multiple timeslots included in a first timeslot set, multiple first encoded data blocks from a physical coding sublayer (PCS), determining, by the forwarding device according to the timeslots included in the first timeslot set and the first FlexE group, a second FlexE group and multiple timeslots included in a second timeslot set, and sending, by the forwarding device, the first encoded data blocks using the second FlexE group and in the timeslots included in the second timeslot set.

Unidirectional communication system and method

A unidirectional communication system to allow the sending of alerts and notification to remote operators while relieving the problem of the protection of a secured network against cyberattacks when the secured network has a need to communicate information from the secured network to a public network. In practice, the solution is based on the use of a data diode (also known under the name of network diode) to allow unidirectional transmission of information from the secured network to a public network, which makes a computer attack on the secured network from the public network impossible. Further, because of a commanded data diode, no sensitive information can leak from the secured network via the system according to the invention. The transmission of the message is only done after the message to be sent has been cleaned of sensitive information and then encrypted.

Method for associating NS with VNF, apparatus, and system
11163607 · 2021-11-02 · ·

A method for associating a network service (NS) with a virtualized network function (VNF) to enable a network manager (NM) to determine a relationship between the NS and the VNF and maintain the NS. The method includes sending, by the NM, an NS instantiation request message to a network function virtualization orchestrator (NFVO), where the NS instantiation request message carries the information about the NS. The method further includes receiving, by the NM, an NS instantiation completion message from the NFVO, where the NS instantiation completion message carries information about the NS and information about N VNFs. The method further includes determining a mapping relationship between the NS and the N VNFs according to the information about the NS and the information about the N VNFs, where information about each VNF in the information about the N VNFs represents the VNF in the N VNFs forming the NS, and N≥one.