摘要:
Remote site downloading of content to a hotspot occurs by way of a cache server, which, when networked the hotspot, processes download, order proxies received from remote content provider servers or content user mobile devices. The cache server stores content files downloaded over the Internet from the content provider servers according to the proxies, and delivers content files to the appropriate mobile devices when they sign in at the hotspot. For example, a set top box at a hotspot can receive an instant message which includes a data set, including cookies, from a personal data assistant. There after, the set top box can download a movie from a movie vendor web site which has been previously ordered and paid for by a user using the personal data assistant over a cellular network, and then wirelessly transmit the movie to the personal data assistant using Wi-Fi protocol when it arrives at the hotspot and is authenticated.
摘要:
There is provided a system for resolving a proxy server name for a web browser request issued by a user device in a network. The user device has a browser configured with the proxy server name. The system includes a Domain Name System (DNS) server and a web server. The DNS server generates a private Internet Protocol (IP) address associated with the user device in response to a non-resolvable DNS query from the user device that specifies the proxy server name, and creates a one-to-one mapping that relates the private IP address to the proxy server name. The web server receives a web browser request from the user device. The web browser request has been redirected to the web server and has an original destination IP address equal to the private IP address. The web server identifies the proxy server name from the private IP address using the one-to-one mapping.
摘要:
A method for enabling an access device to securely access content from at least a content provider and prevent a cloned access device from accessing such content. During registration of the access device with the content provider, the access device requests from a designated certificate authority a certificate having a public key of the content provider therein. Upon authentication of the certificate, the access device generates a key and uses the public key to exchange the key with the content provider. The key is then used for subsequent secure communications between the access device and the content provider. In this manner, a cloned device does not have access to the key and is unable to download content from the content provider.
摘要:
A method for enabling access to digital rights managed (DRM) content from a server to a portable playback device using a device that functions as a proxy for enabling communication between the server and the portable playback device. The method provides for establishing a connection with a device capable of operating as a gateway device for passing data between the portable playback device and the server, requesting that the device establish a connection with the server and operate as a proxy for enabling data exchange between the portable playback device and the server, sending to the server, upon establishing the connection with the server via the device operating as a proxy, data indicating DRM solutions supported by the portable playback device, and a list comprising requested DRM content to be downloaded to the portable playback device, and receiving from the server, via the device operating as a proxy, the requested DRM content and DRM rules associated with the received content.
摘要:
The downloading of content to a requesting client (A1, A2 and A3) through content distribution network consisting of edge servers occurs upon receiving a content request, a content server responses with a request-routing message that includes source data identifying the content and path data identifying a path through the network to a source of such content. Having the path information in request-routing message enables a requesting client to make the request to a particular edge server, which in turn can register the downloading request and access the content from an appropriate location, thereby obviating the frequent communication between the content server and edge servers on the path.
摘要:
A portable communications device advantageously can access an enterprise network through a Virtual Private Network link without the need for a VPN client. To accomplish communications, the portable communications device establishes a communication link with a wireless access point using one or several well-known secure wireless protocols. The wireless access point establishes a communication link with the enterprise network through the VPN and bridges the connections to afford an end-to-end link between the portable computing device and the enterprise network.
摘要:
There is provided, in a source device, a method for handing off a media session from the source device to a target device in a network. The target device is informed of an impending handoff of the media session. Session state information is transmitted to the target device in preparation for the handoff. The source device is authenticated with respect to a router that is common to both the source device and the target device, prior to the handoff. The conducting of the media session on the source device is ceased in place of the target device, subsequent to the handoff.
摘要:
A mechanism to improve the security and access control over a network, such as a wireless local area network (“WLAN”), that takes advantage of web browser interactions without requiring explicit separate communication session between a hot spot network and a service provider network. The method comprises receiving a request to access the WLAN from a mobile terminal (MT)/client disposed within a coverage area of the WLAN. The access point (AP) of the network associates a session ID and randomized number with an identifier associated with the MT and stores data mapping the session ID to the identifier of the MT and randomized number. The local server transmits an authentication request in the form of a web page, which includes the session ID and randomized number, to the MT. The AP receives from the MT a digitally signed authentication message, a parameter list containing user credential information, session ID, and randomized number concerning the MT, the authentication message being digitally signed using the session ID and randomized number together with the parameter list. The AP correlates the session ID and parameter list received from the MT and, using the stored mapping data, generates a local digital signature for comparison with the received digitally signed authentication message for controlling access of the MT to the WLAN.
摘要:
A wireless Local Area Network (LAN 11) capable of providing “enterprise guest” hosting includes at least one an e-open wireless LAN access point (15) that provides access to both guests and local users. Upon receipt of a request for access, the access point forwards the request to an authentication proxy. The authentication proxy then authenticates the party requesting access in accordance with that party's status (that is, whether the party is a local user or guest). Upon successful authentication, the network routes the traffic from a local user differently as compared to that for a guest. For example traffic from guests goes to gateway for receipt in an external network such as the Internet, whereas traffic from the local user goes to a local network, e.g., a corporate intranet. In this way, the Wireless LAN 11, after ascertaining the status of the party requesting access, can limit guest traffic according to the guest access policy.
摘要:
A wireless Local Area Network provides data service through a data LAN and also provides video broadcast service through a video LAN. A wireless LAN subscriber accesses the video LAN through one of a plurality of Video Access Points (VAPs) that broadcast multiple video programs on a channel having a frequency different than the frequency over which the subscriber accesses the data LAN. Each VAP maintains the video channel in a one-way broadcast-only mode to prevent a wireless LAN subscriber from seeking to uplink information on that channel. In this way, the wireless LAN can employ a common protocol for both data and video transmission, and deliver the video streams at the maximum permissible downlink transmission rate.