摘要:
Disclosed is a system and method for providing a transparent proxy for Internet communications. A filtering and redirection module receives IP requests from at least one client, reads and saves the destination of the IP requests, and rewrites the destination of the IP request to the destination of a proxy module. Upon being unable to read, or otherwise determine, a destination for an IP request, the proxy module accesses destination information about the IP request from the filtering and redirection module. The proxy module then transmits the IP request to a web server at the original destination.
摘要:
A method and system for providing secure, anonymous access to a wireless local area network, including configuring an access point to drop packets except packets exhibiting an URL access protocol like HTTP and HTTPS, intercepting a URL access request by an access point from a mobile device via a web browser, re-directing the URL access request to a web server by the access point generating a security key by one of the access points and the web server, communicating the generated security key to the said web server securely by the access point or vice versa and setting the security key by the access point is described. A mobile device including means for forwarding a request for secure access to a wireless local area network via a URL access request, means for receiving a mobile code or a signal for displaying a security key and means for setting the security key is also described.
摘要:
A method and system for caching data such as audio, video and/or other data uses information including future access request information for improved caching performance. According to an exemplary embodiment, a cache system includes a cache operative to cache a plurality of data items. A processor is operative to enable at least one of the data items in the cache to be replaced using future access request information for the at least one data item.
摘要:
A method for mapping from an MPEG-2 transport stream to an IP-based RTP/UDP/IP stack for broadcasting service in a WLAN. All the mapping functions may be performed in a receiver transcoder (FIG. 2). Mobile devices such as laptop computers, cell phones and PDAs have limited battery power, CPU processing and memory resources. To reduce CPU processing power and consumption battery power in these devices certain data processing functions are achieved in the communicating systems, such as the de-multiplexer function that typically prepares an MPEG-2 for retransmission at the local level. When a transcoder, capable of de-multiplexing and MPEG-2 transport stream receives a program it de-multiplexes the stream based on PIDs assigned to each transport packet. This de-multiplexing function extracts several components from a transport stream: video and audio PES/ES associated with programs and PSI (PAT and PMTs).
摘要:
A method and system for providing secure, anonymous access to a wireless local area network, including configuring an access point to drop packets except packets exhibiting an URL access protocol like HTTP and HTTPS, intercepting a URL access request by an access point from a mobile device via a web browser, re-directing the URL access request to a web server by the access point generating a security key by one of the access points and the web server, communicating the generated security key to the said web server securely by the access point or vice versa and setting the security key by the access point is described. A mobile device including means for forwarding a request for secure access to a wireless local area network via a URL access request, means for receiving a mobile code or a signal for displaying a security key and means for setting the security key is also described.
摘要:
There is provided a method for automatically detecting and indicating a mis-configuration condition in an electronic device having one or more factory-default settings. At least one mis-configuration rule that relates to at least one mis-configuration condition of the electronic device, is checked against at least one corresponding current configuration setting to determine whether the electronic device is mis-configured. A mis-configuration alert is provided with respect to the electronic device, when the electronic device is determined to be mis-configured in said checking step.
摘要:
A technique for scheduling distribution of a content file within a content delivery network and a content delivery network adapted to perform the same are disclosed. The technique comprise scheduling distribution of the content file based on delivery location, service time of content requests, and cache server hierarchy. Preferably, a multicasting tree for delivering each content file is dynamically established in the content delivery network based on location and service time considerations.
摘要:
There is provided a system for resolving a proxy server name for a web browser request issued by a user device in a network. The user device has a browser configured with the proxy server name. The system includes a Domain Name System (DNS) server and a web server. The DNS server generates a private Internet Protocol (IP) address associated with the user device in response to a non-resolvable DNS query from the user device that specifies the proxy server name, and creates a one-to-one mapping that relates the private IP address to the proxy server name. The web server receives a web browser request from the user device. The web browser request has been redirected to the web server and has an original destination IP address equal to the private IP address. The web server identifies the proxy server name from the private IP address using the one-to-one mapping.
摘要:
A remote site downloading system is disclosed in which a local computer establishes a session with a content server, and a content file and geographic destination drive are selected. The local computer is typically on a first access network and the user wishes to have the file downloaded to a geographic drive, i.e., a remote site computer whose location and other properties are mapped in a mapping file on the local computer. The geographic drive is usually on a different access network in a dynamic location such as a hotspot or a fixed location such as broadband cable or DSL. The local computer is specially programmed to allow selection of the geographic target drive, pack information comprising cookies and a URL, and sends it to the remote geographic drive computer, where it may act as a proxy to cause downloading from the content server to the geographic drive on the remote site computer.
摘要:
The invention provides a method for improving the security of a mobile terminal in a WLAN environment by installing two shared secrets instead of one shared secret, the initial session key, on both the wireless user machine and the WLAN access point during the user authentication phase. One of the shared secrets is used as the initial session key and the other is used as a secure seed. Since the initial authentication is secure, these two keys are not known to a would be hacker. Although the initial session key may eventually be cracked by the would be hacker, the secure seed remains secure as it is not used in any insecure communication.