Abstract:
A power source is configured to notify an external monitoring device of a condition such as a low power condition of the power source. The power source has an associated controller that monitors the condition of the power source. The power source receives a first threshold condition for a power source, establishes a communications channel with an external monitoring device, transmits a notification related to the first threshold condition of the power source to the external monitoring device through the communications channel and discontinues the established communications channel based on a reception condition of the external monitoring device. The controller terminates notification after reception of an acknowledgment sent by the external monitoring device or after an elapsed time. The communications channel can be a wireless communications channels or can be a network such as the Internet.
Abstract:
A system incorporates notification aspects of a presence system with content distribution capabilities of a content delivery network to both notify subscribers of the presence of content from a host and provide relatively fast and efficient delivery of the content to the user. A content host provides content, such as streaming audio or video media, to a content delivery network. The content host also provides notification of the availability of the content to a central site or presence server. A subscriber to the content host receives, from the presence server, notification as to the availability of content by the content host. The subscriber also receives notification as to the location of the content in the content delivery network. Based upon the notification, the subscriber retrieves the content from the content delivery network.
Abstract:
Transparent network devices intercept messages from non-transparent network devices that establish a connection. Transparent network devices modify these messages to establish an inner connection with each other. The transparent network devices mimic at least some of the outer connection messages to establish their inner connection. The mimicked messages and any optional reset messages are intercepted by the transparent network devices to prevent them from reaching the outer connections. Transparent network devices modify network traffic, using error detection data, fragmentation data, or timestamps, so that inner connection network traffic inadvertently received by outer connection devices is rejected or ignored by the outer connection network devices. Transparent network devices may use different sequence windows for inner and outer connection network traffic. To prevent overlapping sequence windows, transparent network devices monitor the locations of the inner and outer connection sequence windows and may rapidly advance the inner connection sequence window as needed.
Abstract:
Transaction accelerators can be configured to terminate secure connections. A server-side accelerator intercepts a secure connection request that is from a client and that is directed to a server. The server-side accelerator responds to the secure connection request in place of the server, thereby establishing a secure connection between the client and the server-side accelerator. Alternatively, the server-side accelerator monitors the establishment of a secure connection between the client and the server. After the secure connection has been established, the server-side accelerator forwards security information to a client-side accelerator, enabling the client-side accelerator to assume control of the secure connection. As a result of this arrangement, the client-side accelerator is able to encrypt and decrypt data on the secure connection and accelerate it in cooperation with the server-side accelerator. In a further embodiment, the accelerated traffic between accelerators is carried across the network via another secure connection.
Abstract:
Presently disclosed are apparatus and methods for coordinating the delivery of messages and/or message notifications among multiple messaging media and message services so that the successful delivery of one copy of a message results in the deletion of other, redundant message copies still in transit to the recipient and the cancellation of any other message waiting notifications still pending. The system may be implemented with a network-connected device (such as but not limited to a server, switch, or router) containing or having connected to it a user interface, a coordination server, and a plurality of message services. Embodiments of the invention thus provide message delivery management that is more user-friendly, computationally- and resource-efficient and more adaptable to changing user preferences and user locations/addresses.
Abstract:
In an edge network, message traffic between the edge network and a core network passes through the edge router. A port scanning attack directed to the network as a whole (core network) potentially emanates from within the LAN. The edge router includes a network throttling device which identifies and mitigates harmful transmissions such that they do not propagate to the core network. The network throttling device has a connection daemon to scan transactions and determine deviant or atypical connection attempts. A session database stores a transaction history representing a window of previous connection attempts. A pattern detector examines the history and looks for malicious behavior. Identified deviant patterns cause a throttler enforcer to limit the triggering user by restricting future connection attempts, thus mitigating harmful effects. Usage, therefore, is not prevented, but resilience to deviant practices is provided. Accordingly, virus propagation via port scanning is mitigated to a safe level and false alarms targeting legitimate activity are minimized.
Abstract:
Conventional countermeasures to Distributed Denial of Service (DDoS) attacks typically focus on practices and rules for organizing a robust, DDoS-resilient network which anticipates proactive cooperation of users. Such measures involve widespread implementation cooperation and may be difficult or problematic to enforce in a large organization. Configurations of the invention employ the attacker's technique preventatively against the attack to identify sources likely to be employed for DDoS attacks. Crawlers scan web sites for identifying pages likely to be exploited as launch pads by DDoS attackers. A scanner device dispatches robots for sending probe messages from the launch pads which emulate an actual attack. Each of the probe messages are sent to a known, predetermined destination for determining identifying characteristics of such a message. The identifying characteristics define a signature of messages emanating from the launch pad. Such probe messages are tagged with an identifying field or label, such as a predetermined address. The signatures are then employed for comparison with other incoming message traffic.
Abstract:
A system and method provide for transferring remote media from a remote media source to a communication or other end device at a time prior to a hold period, which media is usable as local MOH media during a hold period. A system and method further provide for responding to an initiated hold time by replacing remote MOH media with the local MOH media if remote MOH media is received in conjunction with the hold period.
Abstract:
A transmitter device of the content distribution system transmits content portions of a content message to a receiver device using respective multicast channels within a network. In such an arrangement, by using multiple multicast channels for transmission of the content portions forming the content message, the transmitter device limits the ability for an unauthorized user, monitoring a particular multicast channel, to distinguishing the content portions from noise or to retrieve the complete content message from the transmitter device, thereby providing security to the content message. Furthermore, the content distribution system utilizes multicast channels within a network to deliver the content portions to all receiver devices in communication with the network, thereby minimizing the power requirements needed by the transmitter device to deliver the content portions to a receiver device farthest from the transmitter device.
Abstract:
A method, apparatus and computer program product for performing time interval processing and annotation in presence systems includes obtaining presence information attributes relating to a presentity. The presence information for the presentity is modified with presence information attributes to provide annotated presence information for the presentity. The annotated presence information is then forwarded to at least one subscriber.