摘要:
A payment system for accessing Internet content is located within an Internet service providers network. The system includes an access controller (106) and a payment authority (108). When an end-user makes a request for a URL, the access controller terminates the request and determines whether the requested URL is one for which a charge for accessing the content referenced by that URL is required. That determination is made by comparing the requested URL with a set of rules that are supplied by all the content providers for which the service provider supports payment. If no match is found, the request is forwarded to the content provider. If a rule is found that matches the requested URL, the end-user is identified and the request is forwarded to the payment authority where a payment policy associated with the matched rule is applied. If the end-user fulfills the requirements of this payment policy, then access to the content is granted. The end-user may fulfill the requirements of the payment policy, for example, through a current subscription to a content provider's site, through an auto-payment agreement in which all charges of less than an agreed upon amount are automatically accepted, or by specifically accepting and agreeing to pay an indicated charge for accessing the requested content. In accepting any such payment arrangement, the end-user's account with the service provider is debited for the appropriate charge and the content provider's account is credited for the end-user's access.
摘要:
A system for, and method of, retrieving network management data in a network and a network management station incorporating the system or the method. In one embodiment, the system includes: (1) an information querier, associated with a network management station, that develops a query for at least some network management data from a target agent in the network and assigns a path for a response from the target agent that is unique to the target agent and (2) a response receiver, associated with the information querier, that receives, via the path, the response from the target agent containing the at least some the network management data.
摘要:
An RF antenna grid design in which the antenna array is installed on a patch panel cover allows for the retrofitting of an RF antenna grid on existing patch panel based systems without disrupting network operation. An apparatus for determining connectivity between device ports on a patch panel and cable ends having corresponding RFID tags attached thereto comprises a patch panel having a plurality of device ports and a patch panel cover comprising a plurality of RFID antennas, where each of the RFID antennas comprises one or more protruding portions thereof, each of the protruding portions of the RFID antennas being in close physical proximity to one or more of the plurality of device ports when the patch panel cover is positioned in a fixed positional relationship to the patch panel (e.g., when the patch panel cover is “attached” to the patch panel).
摘要:
Methods and apparatus are provided for selectively overriding the blocking of traffic due to automated detection algorithms. A target victim can protect against unwanted traffic by maintaining a central filter identifying a source address of at least one source computing device whose transmission of packets to the target victim should be limited; maintaining an override filter listing at least one regular expression identifying one or more source computing devices whose transmission of packets to the target victim should be transmitted to the target victim; converting the source address to an address in a Domain Name Service format if the central filter indicates that the received at least one packet is received from the at least one source computing device; and transmitting the at least one packet to the target victim if the Domain Name Service format satisfies a regular expression appearing in the override filter.
摘要:
An application programming interface (API) is described that allows creating or destroying one or more pairs of data structures for asynchronously passing between the operating system and a network application pointers to packet buffers mapped to both parties.
摘要:
Radio Frequency Identification (RFID) tags and an antenna grid are used for automatic determination of cable connections. An RF antenna grid is advantageously employed on a device having a plurality of device ports (e.g., cable connection points) which may, for example, be physically organized in a two-dimensional arrangement. Then, when RFID tags are fixed to one or more cable ends, it can advantageously be determined which of the one or more cables are connected to which of the ports on the device. The RF antenna grid may comprise a plurality of individual antennas which are advantageously multiplexed such that a single RFID reader can handle the sensing for all antennas. Also, opposing ends of a given cable may be advantageously provided with RFID tags having related ID codes such that connections which exist between two connected ports of the device may be easily and efficiently determined.
摘要:
A network server stores database tables for use in resolving labels into network addresses as requested by a remote browser client. Each user has an associated address-table which stores user defined labels associated with network addresses. Users may access other user's address-tables if such other users grant authority to do so. Each user defines the address-tables to be searched, along with a search order, to be used when the user requests that a label be resolved into a network address. During address resolution, the server will resolve a received label into the network address associated with the label as defined by the first accessed address-table which contains the label. The search order as defined by the user may be overridden for a particular address resolution request by an appropriate user command. In various embodiment, the network addresses may be WWW addresses and electronic mail addresses.
摘要:
Methods and apparatus are provided for detecting unwanted traffic in one or more packet networks utilizing string analysis. Unwanted traffic received by a target victim, such as a malicious attack, is detected by maintaining a rule base identifying one or more string expressions; analyzing one or more error entries in a log file, the log file comprising one or more requests received by the target victim; determining if the one or more requests include a string that matches one or more of the string expressions in the rule base; and sending a denunciation message to a central filter if the one or more requests include a string that matches one or more of the string expressions in the rule base. The string expressions may comprise, for example, a string or a regular expression and can represent one or more resources that an attacker may attempt to access.
摘要:
Methods and apparatus are provided for detecting unwanted traffic in one or more packet networks utilizing string analysis. Unwanted traffic received by a target victim, such as a malicious attack, is detected by maintaining a rule base identifying one or more string expressions; analyzing one or more error entries in a log file, the log file comprising one or more requests received by the target victim; determining if the one or more requests include a string that matches one or more of the string expressions in the rule base; and sending a denunciation message to a central filter if the one or more requests include a string that matches one or more of the string expressions in the rule base. The string expressions may comprise, for example, a string or a regular expression and can represent one or more resources that an attacker may attempt to access.