Patents Issued in April 20, 2017
-
Publication number: 20170111278Abstract: The ensuring of predictable and quantifiable networking performance includes adaptively throttling the rate of VM-to-VM traffic flow. A receiving hypervisor can detect congestion and communicate messages for throttling traffic flow to reduce congestion at the receiving hypervisor.Type: ApplicationFiled: December 27, 2016Publication date: April 20, 2017Inventors: Changhoon Kim, Albert G. Greenberg, Alireza Dabagh, Yousef A. Khalidi, Deepak Bansal, Srikanth Kandula
-
Publication number: 20170111279Abstract: The subject matter described herein includes methods, systems, and computer readable media for implementing intelligent routing via diverting Diameter traffic from an overloaded Policy and Rules Charging Function (PCRF). An exemplary method includes receiving, at a Diameter Routing Agent (DRA), a first session establishment request for a subscriber and generating a routing entry in a routing table that associates the subscriber with a first destination identifier identifying a first PCRF. The method also includes receiving an indication that the first PCRF is overloaded, receiving a second session establishment request for the subscriber, and generating a new routing entry in the routing table that associates the subscriber with a second destination identifier that does not identify the first PCRF.Type: ApplicationFiled: October 20, 2015Publication date: April 20, 2017Inventors: Jared Michael Renzullo, Tarek Assali
-
Publication number: 20170111280Abstract: The present disclosure provide a data transmission method, including: receiving, by a central processing node, downlink user data from a first gateway GW; sending, by the central processing node, the downlink user data to a corresponding base station; and when it is determined that an interface between the central processing node and the first GW is congested, sending, by the central processing node, a first bearer switching request message to the first GW, where the first bearer switching request message is used to instruct the first GW to bypass the central processing node when transmitting data. In the embodiments of the present invention, when determining that an interface between a central processing node and a first GW is congested, the central processing node sends a first bearer switching request message to the first GW, so that the first GW transmits downlink user data with the central processing node bypassed.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Inventors: Jinfang Zhang, Bojie Li, Lu Rong
-
Publication number: 20170111281Abstract: Embodiments disclosed herein may be directed to a load-balancing server. In some embodiments, the load-balancing server comprises: at least one memory comprising instructions; at least one processing device configured for executing the instructions; and a load-balancing module, coupled to the at least one memory, the at least one processing device, and at least one data transformation module, and configured for: determining a first amount of computing resources for allocating to the at least one data transformation module using a load-balancing technique, wherein the at least one data transformation module is coupled to the at least one memory, the at least one processing device, and the load-balancing module.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Applicant: Anthelio Healthcare Solutions Inc.Inventors: Kiran Kumar Kodeboina, Dan B. Ayala, Cynthia G. Nicholas, Brenda S. Ikerd
-
Publication number: 20170111282Abstract: A T-SDN controller including a T-LSP manager, a temporal path element, a T-TED, a T-LDB, a T-LSPDB, and a network interface. The T-LSP receives a path request including time intervals and a set of constraints. The temporal path element obtains traffic engineering information and computes a path satisfying time intervals and a set of constraints. The T-TED reserves bandwidth corresponding to the path during the time intervals upon request by the T-LSP manager. The T-LDB reserves labels for the links during the time intervals upon request by the T-LSP manager. The T-LSPDB stores the time intervals, the set of constraints, the labels, and the bandwidth. The network interface permits the T-LSP manager to communicate with the nodes in the network to establish a temporal LSP along the path as computed.Type: ApplicationFiled: September 19, 2016Publication date: April 20, 2017Inventor: Huaimo Chen
-
Publication number: 20170111283Abstract: Systems and methods described herein are directed to solutions for NoC interconnects that provide congestion avoidance and end-to-end uniform and weighted-fair allocation of resource bandwidths among various contenders in a mesh or torus interconnect. The example implementations are fully distributed and involve using explicit congestion notification messages or local congestion identification for congestion detection. Based on the congestion level detected, the injection rates of traffic at various agents are regulated that avoids congestion and also provides end-to-end QoS. Alternative example implementations may also utilize end-to-end credit based flow control between communicating agents for resource and bandwidth allocation of the destination between the contending sources. The resource allocation is performed so that both the weighted and strict bandwidth allocation QoS policies are satisfied.Type: ApplicationFiled: December 28, 2016Publication date: April 20, 2017Inventors: Sailesh Kumar, Eric Norige
-
Publication number: 20170111284Abstract: An application server coupleable to a wireless communication system that comprises multiple wireless remote communication units is described. The application server comprises: a memory operably configured to store internet protocol (IP) addresses for the multiple wireless remote communication units, wherein at least one wireless remote communication unit is assigned multiple IP addresses; a processor, operably coupled to the memory, and configured to select one IP address from the multiple IP addresses based on the different data types of communication that the at least one wireless remote communication unit wishes to support; and a transmitter configured to instruct the at least one wireless remote communication unit to use the selected one IP address.Type: ApplicationFiled: October 14, 2016Publication date: April 20, 2017Inventor: Timothy James Speight
-
Publication number: 20170111285Abstract: A method and apparatus for randomly accessing high efficiency video coding (HEVC) bitstream for moving picture experts group (MPEG) media transport (MMT). The method includes receiving a plurality of packets for a video in decoding order. The method also includes determining a packet marked to begin processing the video, removing packets of leading pictures in the marked packet from the memory, and processing the packets remaining in the memory.Type: ApplicationFiled: February 2, 2016Publication date: April 20, 2017Inventor: Youngkwon Lim
-
Publication number: 20170111286Abstract: A storage system includes a storage unit having routing circuits networked with each other, each of the routing circuits configured to route packets to node modules that are connected thereto, each of the node modules including nonvolatile memory, and connection units, each coupled with one or more of the routing circuits for communication therewith, and configured to access each of the node modules through one or more of the routing circuits. When a first connection unit transmits to a target node module a lock command to lock a memory region of the target node module for access thereto, and then a second connection unit transmits a write command to the target node module before the first connection unit transmits to the target node module an unlock command to unlock the memory region, the target node module is configured to return an error notice to the second connection unit.Type: ApplicationFiled: April 21, 2016Publication date: April 20, 2017Inventors: Kazunari KAWAMURA, Atsuhiro KINOSHITA, Takahiro KURITA
-
Publication number: 20170111287Abstract: Disclosed aspects manage a shared pool of configurable computing resources. A resource demand value is identified for a target host. Resource supply values of dynamically-assigned resources are computed for donor hosts. Using the resource demand value and the resource supply values, dynamically-assigned resources are reclaimed from the donor hosts and distributed to the target host.Type: ApplicationFiled: January 3, 2016Publication date: April 20, 2017Inventors: Joseph W. Cropper, Sadek Jbara, Taylor D. Peoples
-
Publication number: 20170111288Abstract: Described herein are various technologies pertaining to a computing system architecture that facilitates construction of virtual motherboards and virtual storage devices. A computing system includes a plurality of computing nodes and a plurality of storage nodes, where the computing nodes are disaggregated from the storage nodes. The computing nodes include respective system on chip modules. The computing nodes and the storage nodes are communicatively coupled by way of a full bisection bandwidth network, where each storage node is allocated network bandwidth that at least matches the maximum input/output speed of the storage node. Responsive to receipt of a client request, computing nodes are allocated to the client and exposed to an application of the client as a motherboard. Likewise, storage nodes are allocated to the client and exposed to the application of the client as a larger storage device.Type: ApplicationFiled: December 26, 2016Publication date: April 20, 2017Inventors: James Wiliamson Mickens, Ali Raza Farasat
-
Publication number: 20170111289Abstract: Disclosed aspects manage a shared pool of configurable computing resources. A resource demand value is identified for a target host. Resource supply values of dynamically-assigned resources are computed for donor hosts. Using the resource demand value and the resource supply values, dynamically-assigned resources are reclaimed from the donor hosts and distributed to the target host.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Joseph W. Cropper, Sadek Jbara, Taylor D. Peoples
-
Publication number: 20170111290Abstract: An apparatus and method of communication in a network includes a hub having a burst time plan generating section to generate a burst time plan including time slot allocation information that allocated transmission time slots in a subsequent frame to remote terminals. The allocation information identifies at least one time slot in the subsequent frame as a dummy time slot assigned to at least one remote terminal already acquired in the network. The hub also includes a transmitter to transmit the burst time plan including the allocation information. A corresponding remote terminal and computer readable media are also discussed.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Applicant: VT IDIRECT, INC.Inventors: David Thompson NEMETH, Jason B MAIORANA, Sadaf FARDEEN
-
Publication number: 20170111291Abstract: A virtual computing services deployment network provides a consistent user experience from a variety of locations via a connection fabric for accessing a virtual desktop. The connection fabric identifies a user profile defining the virtualized desktop resources required for a particular user. The connection fabric includes distributed data and processing in nodes distributed throughout a public access network accessible from a user access device. Each of the fabric nodes is operable to provide an identifier (such as an IP address) of a computing resource adapted to provide the user specific desktop. A user access device accesses a local fabric node in the connection fabric, and the fabric node determines a computing resource matching a user profile of expected computing resources. The fabric node associates the user access device with the computing resource and sends the user access device an identifier for directly accessing the computing resource.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Applicant: VMware, Inc.Inventors: Clinton B. Battersby, Kenneth Ringdahl, James Snow, Paul J. Gaffney, Andrew W. Hobgood
-
Publication number: 20170111292Abstract: A method and associated system. An expiration time instant of a token for accessing a service is determined. Accessibility of the service based on the expiration time instant of the token is determined. In response to determining that the service is inaccessible, a deferred expiration time instant of the token is determined based on access information about the service.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventor: Qin Zhao
-
Publication number: 20170111293Abstract: The invention relates to a method for the periodic transport of real-time data in a distributed computer system, which computer system comprises node machines (100, 101, 102, 103), in particular a plurality of node machines (100, 101, 102, 103), and distributor units (121, 122), in particular a plurality of distributor units (121, 122), wherein the node machines (100, 101, 102, 103) and the distributor units (121, 122) have access to a global time, and wherein real-time data is transported by means of time-triggered real-time messages.Type: ApplicationFiled: October 14, 2016Publication date: April 20, 2017Inventor: Stefan Poledna
-
Publication number: 20170111294Abstract: An improved integrated Clos network may include a plurality of servers, each server comprising a processor and a network interface chip, and a plurality of cross bar switches, each cross bar switch having a direct connection to each network interface chip such that a data packet can be transferred between any two servers by means of any cross bar switch. Each network interface chip can be configured to receive a data packet directly from memory associated with the processor comprising the same server as the network interface chip, read and process the data packet in order to produce a processed data packet configured to be routed from the network interface chip via a cross bar switch to a network interface chip associated with a different server, select a cross bar switch, and transmit the processed data packet to the selected cross bar switch.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventors: Michael LAOR, David ZELIG
-
Publication number: 20170111295Abstract: A method of data switching. Data is received at least one input port of a crosspoint switch. The crosspoint switch configurably casts the data to at least one output port of the crosspoint switch. The or each output port of the crosspoint switch is connected to a respective input of a logic function device such as a FPGA. The logic function device applies a logic function to data received from the or each output port of the crosspoint switch, such as address filtering or multiplexing, and outputs processed data to one or more respective logic function device output interfaces. Also, a method of switching involving circuit switching received data to an output while also copying the data to a higher layer function.Type: ApplicationFiled: December 3, 2014Publication date: April 20, 2017Inventors: David SNOWDON, Scott McDAID, Charles THOMAS, Lindsay POWLES
-
Publication number: 20170111296Abstract: Techniques for handling dynamic cascade port/LAG changes without breaking communication in an extended bridge are provided. According to one embodiment, a first network device (e.g., controlling bridge) in a system of network devices (e.g., extended bridge) can receive a command relating to a change to at least one port or LAG of the system. The first network device can then transmit change messages to one or more other network devices (e.g., port extenders) in the system that are affected by the change, where the change messages are transmitted in an order based on the distance of each of the one or more other network devices from the first network device.Type: ApplicationFiled: October 5, 2016Publication date: April 20, 2017Inventors: Bipin Agarwal, Kwun-Nan Kevin Lin, Venkata Gopi Ravi Kumar Pedaprolu
-
Publication number: 20170111297Abstract: A display control method is for performing a process of displaying user information in chronological order, executed by a computer including a processor. The process includes displaying, by a terminal on a display device, a first display area for displaying the user information which is received and a second display area different from the first display area; accepting an instruction to display the user information, which is displayed in the first display area, in the second display area on the display device; and displaying the user information in the second display area on the display device.Type: ApplicationFiled: March 29, 2016Publication date: April 20, 2017Inventors: Hiroaki ARISADA, Tasuku OKUDA
-
Publication number: 20170111298Abstract: Methods and apparatus related to identifying one or more messages sent by a user, identifying two or more contacts that are associated with one or more of the messages, determining a strength of relationship score between identified contacts, and utilizing the strength of relationship scores to provide additional information related to the contacts. A strength of relationship score between a contact and one or more other contacts may be determined based on one or more properties of one or more of the messages. In some implementations, contacts groups may be determined based on the strength of relationship scores. In some implementations, contacts groups may be utilized to disambiguate references to contacts in messages. In some implementations, contacts group may be utilized to provide suggestions to the user of additional contacts of a contacts group that includes the indicated recipient contact of a message.Type: ApplicationFiled: December 29, 2016Publication date: April 20, 2017Inventors: Andrew Tomkins, Shanmugasundaram Ravikumar, Shalini Agarwal, MyLinh Yang, Bo Pang, Mark Yinan Li
-
Publication number: 20170111299Abstract: A display control method is for performing a process executed by a computer including a processor. The process includes reporting a theme to two or more user terminals; receiving options selected at the two or more user terminals with respect to the theme, from the two or more user terminals; and displaying, on a display device, the options and user information items regarding users who selected the options, in display areas provided for the respective options.Type: ApplicationFiled: March 29, 2016Publication date: April 20, 2017Inventors: HIROAKI ARISADA, Tasuku Okuda
-
Publication number: 20170111300Abstract: An approach for selectively blocking responses from members in a conversation thread, such as an email message or an instant messaging session. A first member in a conversation thread receives notification that one or more other members are reading the thread or typing responses and the first member can selectively block the one or more other members from posting responses until the first member has posted a response or until the first member manually unblocks the one or more other members. A member that has been blocked in the conversation thread can send a request to whoever blocked them to be allowed to post a response in the thread.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Snehal S. Devasthali, Bhavana R. Gaikwad, Girish Padmanabhan, Prasad P. Purandare
-
Publication number: 20170111301Abstract: Methods and systems for routing messages are described. In one embodiment, the method includes generating a plurality of message exchanges of a message broker, generating a plurality of message queues of the message broker, and generating a first queue shard of a plurality of queue shards. In some embodiments, generating a first queue shard includes binding a first message exchange from the plurality of message exchanges with a first message queue from the plurality of message queues. In some embodiments, the method includes dedicating a first message server to the first queue shard. In some cases, the first message server includes a shared-nothing architecture.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventor: Jared Robinson
-
Publication number: 20170111302Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for providing messages to client devices. In certain examples, a stream of messages is provided to a messaging application on a client device at a desired message feed rate. A message download rate of the stream of messages by the messaging application is monitored. A determination is made that the message download rate is less than the desired message feed rate. In response, the stream of messages is provided to a buffer on the client device at the desired message feed rate, and the stream of messages is sent from the buffer to the messaging application at the message download rate. A determination is made that the message download rate is greater than the desired message feed rate and, in response, a stored quantity of messages on the buffer is allowed to decrease.Type: ApplicationFiled: June 29, 2016Publication date: April 20, 2017Inventors: Andrey Kushnir, Maksim Terekhin, Leonid Mosenkov
-
Publication number: 20170111303Abstract: Notifying a user about a previous conversation includes based on an analysis of the previous conversation between a first user and second user determining a characterization between the first user and the second user, in response to the first user selecting, via a user device, an option to open a subsequent conversation with the second user, notifying the first user via an alert as to the characterization of the previous conversation that the first user had with the second user before reengaging the second user in a subsequent conversation, and based on an analysis of the subsequent conversation between the first user and the second user, updating the characterization to a current characterization in a database.Type: ApplicationFiled: October 19, 2015Publication date: April 20, 2017Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Pamela A. Nesbitt
-
Publication number: 20170111304Abstract: An email received by a user is determined. A task associated with the email is determined. An incentive content for the email is determined. Responsive to the user completing the task, the incentive content is provided to the user.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Kevin C. Carr, Al Chakra, Jeremy E. Crafts, Bryan M. Dempsey, Marit L. Imsdahl, Cheranellore Vasudevan
-
Publication number: 20170111305Abstract: A method for managing messages may include detecting a need to manage a multiplicity of messages in an inbox of a user based on one of a predetermined criterion or a preset trigger or action. The method may also include analyzing a set of components of each message. The method may additionally include creating a plurality of batches of messages in response to detecting the need to manage the multiplicity of messages in the inbox of the user. Each batch may be based on the analysis of the set of components of each message. The method may further include performing a selected action on a chosen batch of messages.Type: ApplicationFiled: October 19, 2015Publication date: April 20, 2017Inventors: Paul R. Bastide, Matthew E. Broomhall, Brenton P. Chasse, Thomas J. Evans, IV
-
Publication number: 20170111306Abstract: Embodiments of the present invention provide a message processing method and apparatus, and relate to the field of communications technologies. The method includes: comparing a message feature of a currently processed message with a specified tracking feature; determining a user corresponding to the message as a target user when determining that the message feature matches the tracking feature; and reporting a signaling message of the target user to a network management server. In the present invention, a network fault is quickly located, and network connection efficiency is improved.Type: ApplicationFiled: December 28, 2016Publication date: April 20, 2017Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Heng CHEN, Yu Yin, Dengjing Cao, Weiming Huang
-
Publication number: 20170111307Abstract: A computer-implemented method of posting content to a social medium comprises receiving content posted by a user along with an associated posting time which indicates when the user selected an option to post the content to the social medium; determining that publication of the content posted by the user is dependent on a trigger; and in response to determining that publication of the content is dependent on the trigger, storing the content with the associated posting time and suspending publication of the content until the trigger is satisfied such that the posting time published with the content indicates a time prior to transmission of the content from an electronic device to a server for publishing.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Inventors: Yuka Nomura, Koichi Takahashi, Takashi Takahashi, Daisuke Tomoda, Hiroki Yoshinaga
-
Publication number: 20170111308Abstract: A message processing operation of an electronic device that includes a processor is provided. The message processing operation includes running an application for processing a message, providing a screen displaying a first unread message and a second unread message through the application, and processing message read confirmation of the first unread message at a first time and processing message read confirmation of the second unread message at a second time that is different from the first time.Type: ApplicationFiled: October 19, 2016Publication date: April 20, 2017Inventors: Boseong KIM, Sujeong YOON, Jinseok KANG, Jaeyoung LEE, Dongho JANG
-
Publication number: 20170111309Abstract: A method for improving client subnet efficiency by equivalence class aggregation includes receiving a Domain Name System (DNS) query from a client, determining, based on predetermined class criteria, that the client is associated with an equivalency class, searching a cache associated with the equivalence class for an answer corresponding to the DNS query, and upon locating the answer, serving the answer to the client. If it is determined that the cache does not include the answer, the method proceeds with querying, by a recursive server, an authoritative server using client subnet data associated with the equivalence class, receiving the answer from the authoritative server, storing the answer to the cache associated with the equivalency class, and serving the answer to the client. The client subnet data may include a representative CIDR block, the representative CIDR block being used to make queries on behalf of all clients associated with the equivalence class.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Robert Thomas Halley, Brian Wellington
-
Publication number: 20170111310Abstract: A method is provided, in one embodiment, which is performed on a client computing device, the method comprising: connecting the client with a plurality of segments of a private network, wherein the private network comprises a plurality of name resolving servers; registering the client as primary name resolving server for serving name requests for names in the private network received from applications on the client; and then forwarding the received name requests simultaneously to the plurality of name resolving servers.Type: ApplicationFiled: October 10, 2016Publication date: April 20, 2017Inventors: Kurt Glazemakers, Thomas Bruno Emmanuel Cellerier
-
Publication number: 20170111311Abstract: A user equipment (UE) configured to receive a resource over a multimedia broadcast multicast service (MBMS) includes a processor and a transceiver. The processor is configured to determine whether a uniform resource identifier (URI) is an MBMS URI. The transceiver is configured to transmit a domain name server (DNS) query to a DNS based on the MBMS URI and receive at least one resource record from the DNS. The processor is further configured to determine at least one of a unicast location or a multicast location based on the at least one resource record received from the DNS.Type: ApplicationFiled: October 18, 2016Publication date: April 20, 2017Inventors: Imed Bouazizi, Kyungmo Park
-
Publication number: 20170111312Abstract: An apparatus prevents communication by a client device to a domain that cannot be uniquely identified by relocating the DNS mapping of the domain to a destination IP Address that is uniquely identifiable and that represents a location of an apparatus that provides a data path to the domain.Type: ApplicationFiled: December 29, 2016Publication date: April 20, 2017Inventor: Paul Michael Martini
-
Publication number: 20170111313Abstract: In one embodiment, a caching resolver receives a name server query from an end device for an Internet Protocol (IP) address for a hostname, and determines whether the hostname requested is in an access control list (ACL). In response to the hostname being in the ACL, the caching resolver examines a received response to the name server query for the hostname, wherein the received response contains a particular IP address for the hostname, and adds the particular IP address for the hostname to the ACL. In one embodiment, the ACL is local to the caching resolver, while in another embodiment, adding the particular IP address for the hostname to the ACL comprises sending a message to a remote ACL-maintaining device that maintains the ACL.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Eliot Lear, James Bieda
-
Publication number: 20170111314Abstract: A relay service enables two peers attempting to communicate with one another to each connect to a publicly-accessible relay server, which servers are associated with an overlay network and are selected by a directory service. After end-to-end connectivity is established, preferably the hosts communicate with each other by relaying data packets via the overlay network relay servers. Communications (both connection control messages and data being relayed) between a host and a relay server occurs at an application layer using a modified version of the TURN protocol.Type: ApplicationFiled: December 26, 2016Publication date: April 20, 2017Inventors: Martin Lohner, Brandon Williams
-
Publication number: 20170111315Abstract: The present invention provides a network device and a method for allocating an access point name. The network device includes: a receiving module, configured to receive a user activation request sent by user equipment UE, where the user activation request includes user location information ULI; a parsing module, configured to parse the ULI received by the receiving module, to acquire an area code of a location of the UE; a determining module, configured to determine an area code set to which the area code acquired by the parsing module belongs; and an acquiring module, configured to acquire, according to a mapping relationship between the area code and an actual access point name APN, the actual APN for the UE. The embodiments of the present invention can implement centralized management on UE based on a geographical area range.Type: ApplicationFiled: December 27, 2016Publication date: April 20, 2017Inventor: Sirui Long
-
Publication number: 20170111316Abstract: Provided is a User Datagram Protocol (UDP)-based control command transmission method, in which a sender sends a control command packet to a receiver based on a UDP; and the receiver sends an Acknowledgement (ACK) packet to the sender based on the UDP after receiving the control command packet. A sender and a receiver are also provided.Type: ApplicationFiled: October 20, 2016Publication date: April 20, 2017Inventors: Xiaolei Lou, Xiaobo Zeng, Binbin Jiang
-
Publication number: 20170111317Abstract: In one embodiment, a computer implemented method provides a client computing device network access to a private network by a network traffic manager, and the method includes: obtaining context parameters related to a context of the client computing device; selecting as a function of the context parameters one or more policies as selected policies, wherein each policy is associated with one or more network entitlement rules defining network access rules to a networking device or an application in the private network according to the policy; retrieving the one or more network entitlement rules associated with the selected policies; and providing the network traffic manager with the one or more network entitlement rules, thereby providing the client computing device the network access.Type: ApplicationFiled: September 9, 2016Publication date: April 20, 2017Inventors: Kurt Glazemakers, Adam Douglas Rose
-
Publication number: 20170111318Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: December 30, 2016Publication date: April 20, 2017Inventors: Scott M. PETRY, Ramesh RAJAGOPAL, Peter K. LUND, Fredric L. COX, Adam P. MOORE, Leslie L. DUNSTON, Varley H. TAYLOR, Zachary L. SEGAL, Luka I. STOLYAROV, Joshua R. MCMAINS, Brian T. ZAUGG
-
Publication number: 20170111319Abstract: Methods and systems for selectively blocking, allowing and/or reformatting IPv6 headers by traversing devices are provided. According to one embodiment, reputation information regarding observed senders of Internet Protocol (IP) version 6 (IPv6) packets and packet fragments is maintained by a traversing device based on conformity or nonconformity of extension headers contained within the IPv6 packets with respect to a set of security checks performed by the traversing device. When an IPv6 packet or packet fragment is received from a particular source IP address indicated by the reputation information to be associated with one or more nonconformity issues, then dropping, rate limiting or quarantining, by the traversing device, the IPv6 packet or the packet fragment.Type: ApplicationFiled: December 30, 2016Publication date: April 20, 2017Applicant: Fortinet, Inc.Inventor: Thorsten Jäger
-
Publication number: 20170111320Abstract: A method of processing a message by a first interconnection device, the method including: recording a first database of processing rules in the first interconnection device, recording an identifier of a second interconnection device in the first interconnection device, and processing a communication in accordance with local processing rules of the first local database of rules and with remote processing rules obtained from a second interconnection device which is identified by the identifier of the second interconnection device.Type: ApplicationFiled: March 12, 2015Publication date: April 20, 2017Inventors: Liana BOZGA, Louis DAVY, Jean-Olivier GERPHAGNON
-
Publication number: 20170111321Abstract: A method and apparatus for facilitating communication between a client and a proxy server. A message is received from a client at a gateway. The message includes a uniform resource identifier that references an interface associated with a resource. The gateway transforms the uniform resource identifier into a context resource identifier that also references the interface. The gateway performs an initial authorization check for the client and a user of the client with respect to the interface. The gateway inserts the context resource identifier into the message to form a modified message in response to a successful initial authorization check. The gateway sends the modified message to the proxy server.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Jigesh Saheba, Roberto A. Masiero, Isabel Espina Carvajal
-
Publication number: 20170111322Abstract: Detecting an application state using a DNS-controlled proxy is described. In one or more embodiments, a proxy on a computer establishes a first secure connection with a browser and the proxy establishes a second secure connection with a web server. The proxy forwards a request for a test asset from the browser to the web server. In response to the request, the web server responds with the test asset, which is sent via the proxy to the browser. The browser attempts to load the test asset to determine if a desktop application is installed and running on the computer.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventor: Mansukh Patidar
-
Publication number: 20170111323Abstract: Methods, systems and computer readable media for a MiTM proxy that supports client authentication are described.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Applicant: Avaya Inc.Inventors: Vijaykumar V. Borkar, Saurabh Sule
-
Publication number: 20170111324Abstract: An apparatus, system, and method are disclosed for secure data transmissions. A method includes receiving a request for data that is encrypted according to a first encryption scheme, and determining a first public IP address associated with the request. The first public IP address identifies a remote client that created the request and is located in a field of a data packet that includes the request. The method includes determining a second public IP address associated with the request that identifies a sender of the request and is determined dynamically when the request is received. The method includes verifying an authenticity of the request in response to the first public IP address of the remote client matching the second public IP address of the sender. The method includes encrypting the requested data according to a second encryption scheme, and transferring the data to the remote client.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Inventor: Jerry Glade Hayward
-
Publication number: 20170111325Abstract: A content delivery platform is provided that includes generating a first content package of content that is encrypted with a unique symmetric key, and a second content package including a link encrypted with the key to the first content package. The first content package is stored in a repository, and a request including the key is transmitted to a first computing device associated with a mail exchange for an encryption key file. An encryption key file is generated using the unique symmetric key and together with a authorizing token is received. A third content package is generated that is encrypted using the encryption key file and includes the encrypted link. The third content package is transmitted to a distributor gateway and the encrypted link is accessible in response to the consumer decrypting the third content package. The link is available to provide to access to the content for the consumer.Type: ApplicationFiled: December 29, 2016Publication date: April 20, 2017Inventors: Jay Maller, Bikram CHAUDRI
-
Publication number: 20170111326Abstract: A retrieving system for retrieving information concealed within a sequence of symbols. The system includes a decoder configurable using rule information and operable when so configured to retrieve the information concealed within the sequence of symbols by applying to the sequence of symbols at least one decoder rule determined by the configuration of the encoder.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Inventors: Dilipsinhji JADEJA, Anita JADEJA
-
Publication number: 20170111327Abstract: In one embodiment, a social networking system provides people look up service and establish anonymous communication session between users; creates contact association for future communication between users; and configures one or more privacy settings for users.Type: ApplicationFiled: December 28, 2016Publication date: April 20, 2017Inventor: Charles Chu-Shin Wu