Automatic RSVP tunnel endpoint aliasing

    公开(公告)号:US11700149B1

    公开(公告)日:2023-07-11

    申请号:US17566939

    申请日:2021-12-31

    摘要: Provisioning a set of tunnel endpoint aliases for a tunnel endpoint. A request is sent from the first tunnel endpoint to the second tunnel endpoint over a control plane of a network to provision the set of tunnel endpoint aliases. The second tunnel endpoint generates the set of tunnel endpoints and sends a response including the set of tunnel endpoint aliases to the first tunnel endpoint over the control plane. The first tunnel endpoint sends network traffic over the network tunnel that includes a tunnel endpoint alias of the set of tunnel endpoint aliases received.

    ALIAS MANAGEMENT METHOD AND DEVICE
    42.
    发明申请

    公开(公告)号:US20230018257A1

    公开(公告)日:2023-01-19

    申请号:US17953077

    申请日:2022-09-26

    发明人: Cuili GE

    摘要: Embodiments of this application relate to the communications field, and describe an alias management method and device. One example method includes receiving, by a mission critical service server, a first call request message from a first client determining, by the mission critical service server based on the identity of the calling user, that the calling user has an alias call right receiving, by the mission critical service server from a functional alias management entity, activating user information corresponding to the identity of the alias requested to be called; calling, by the mission critical service server, a user in the activating user information based on the activating user information corresponding to the identity of the alias requested to be called; and sending, by the mission critical service server, a first call response message to the first client.

    System and method for facilitating routing

    公开(公告)号:US11546446B2

    公开(公告)日:2023-01-03

    申请号:US17248423

    申请日:2021-01-25

    发明人: Armand Prieditis

    摘要: A system and method are provided for routing content requests. On a given server network, content requests comprising a character string may be routed up a hierarchical network topology until a linear chain, corresponding to the character string, is identified. Thus, the content request is forwarded up the hierarchy until an intersecting server network is reached. Then the content request is forwarded down the hierarchy until, along a published linear chain corresponding to the character string, until a content source is reached. Content is provided to the requestor along a reverse path of the content request.

    NETWORK SECURITY FROM HOST AND NETWORK IMPERSONATION

    公开(公告)号:US20220394009A1

    公开(公告)日:2022-12-08

    申请号:US17819783

    申请日:2022-08-15

    摘要: Systems and methods may include sending, to a network registrar, an extended duplicate address request (EDAR) message including a first nonce generated by a host computing device, and receiving, from the network registrar, an extended duplicate address confirmation (EDAC) message including a second nonce and a first signature, a first nonce pair including the first nonce and the second nonce being signed by the network registrar via a first key pair of the network registrar via the first signature. The systems and methods may further include sending a first neighbor advertisement (NA) message to the host computing device including the second nonce. The second nonce and a public key of the network registrar verifies the first signature from the network registrar, the verification of the first signature indicating that a router through which the host computing device connects to a network is not impersonating the network.

    CREATING A PSEUDONYM FOR REQUESTING A NETWORK SLICE

    公开(公告)号:US20220210121A1

    公开(公告)日:2022-06-30

    申请号:US17570793

    申请日:2022-01-07

    摘要: A wireless device requests a network slice from a network by, first, identifying at least one network slice to be requested. Based on a mapping method that is specific to the wireless device, the wireless device forms a slice pseudonym for the or each network slice to be requested. The wireless device then transmits a request message to the network, wherein the request message comprises the or each slice pseudonym. The network node receives the request message sent by the wireless device, wherein the request message comprises at least one slice pseudonym. Based on a mapping method that is used by the wireless device and that is specific to the wireless device, the network node identifies at least one requested network slice from the or each received slice pseudonym. The network node then permits use of the requested network slice.

    SUPPORTING UNMODIFIED APPLICATIONS IN A MULTI-TENANCY, MULTI-CLUSTERED ENVIRONMENT

    公开(公告)号:US20220156102A1

    公开(公告)日:2022-05-19

    申请号:US17525076

    申请日:2021-11-12

    申请人: DIAMANTI, INC.

    摘要: Embodiments of the disclosure provide systems and methods for supporting unmodified applications on a tenant cluster in a multi-tenant, multi-cluster environment. According to one embodiment, a method for supporting unmodified applications in a multi-tenant, multi-cluster environment can comprise creating, in the multi-tenant, multi-cluster environment, a tenant cluster executing one or more applications. The tenant cluster and the one or more applications executing on the tenant cluster can be adopted by a domain cluster of the multi-tenant, multi-cluster environment without modification to the one or more applications for execution in the multi-tenant, multi-cluster environment. The tenant cluster and the one or more applications executing on the tenant cluster can then be managed by the domain cluster of the multi-tenant, multi-cluster environment.

    SYSTEMS AND METHODS FOR RESOLVING CONFLICTS IN INTERNET SERVICES

    公开(公告)号:US20240113997A1

    公开(公告)日:2024-04-04

    申请号:US18540742

    申请日:2023-12-14

    申请人: NAMECHEAP, INC.

    IPC分类号: H04L61/30

    CPC分类号: H04L61/3005

    摘要: The technology disclosed relates to resolution of conflicts between a requested internet service, requested by an internet service requesting server, and a package internet services. The method includes receiving from the internet service requesting server a request to resolve a conflict including at least one of: (i) a request to substitute an alternate internet service in the package of internet services for the requested internet service; (ii) a request to replace an existing connection with a service in the package of internet services with the requested internet service; and (iii) a request to initiate a custom resolution application. The method then responsively initiates performing a conflict resolution action(s).