Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

742 results about "Application protocol" patented technology

Application protocol is one such protocol. Application protocols govern various processes, such as the process for downloading a web page, or for sending e-mail. The application protocol directs how these processes are done.

System and method for providing value-added services (VAS) in an integrated telecommunications network using session initiation protocol (SIP)

A system and method for providing Value-Added Services (VAS) in an integrated telecommunications network having a packet-switched network portion (PSN) operable with Session Initiation Protocol (SIP). The integrated telecommunications network includes a SIPext SSP server, a trigger server, and a service node having a Service Logic Program (SLP) that is operable with Intelligent Network Application Protocol (INAP). The SIPext SSP and service nodes are provided with the capability to communicate using SIP-compliant messaging. New header fields are provided that specify operations to be performed by the service node with respect to a service. INAP service parametric data is also provided in the header fields in a sequential form. When a call is received in the SIPext SSP server for a user having a subscription for a VAS, it queries the user profile stored in the trigger server. If the user is subscribed for a service, a SIP request message is formulated based on the user profile, wherein appropriate headers are populated with relevant parametric information and call context data. The service node launches the SLP based on the information provided in the request message and sends a SIP response message to the SIPext SSP server with an instruction concerning the provisioning of the VAS. The SIPext SSP server, thereafter, takes an appropriate action based on the response message and any parametric information contained therein.
Owner:TELEFON AB LM ERICSSON (PUBL)

Detecting Anomalous Network Application Behavior

System and Method for detecting anomalous network application behavior. Network traffic between at least one client and one or more servers may be monitored. The client and the one or more servers may communicate using one or more application protocols. The network traffic may be analyzed at the application-protocol level to determine anomalous network application behavior. Analyzing the network traffic may include determining, for one or more communications involving the client, if the client has previously stored or received an identifier corresponding to the one or more communications. If no such identifier has been observed in a previous communication, then the one or more communications involving the client may be determined to be anomalous. A network monitoring device may perform one or more of the network monitoring, the information extraction, or the information analysis.
Owner:EXTRAHOP NETWORKS

Device for classifying and recognizing network application flow quantity and method thereof

A network application flow classifying recognizing device includes a dynamic flow classifying device which builds a hash table by taking the IP five-tuple array contained in a massage as the key assignments and searches a network flow table by making use of the hash table; a (address, port ) checking matching device which searches an information table of the address to carry through matching on the received messages; a service terminal matching device which carries through matching on the received messages by searching a service port table, a flow/action characteristic matching device which counts the flow characteristic and action characteristic aiming at the front M messages of the flow and carries through matching with the information in a flow/action characteristic mode library; a protocol characteristic code matching device which carries through matching on the front L bytes of the message payload and the protocol characteristic codes of a protocol characteristic code library; a decision device which comprehensively analyzes and judges the application type or application protocol that a network flow belongs to; a network topology detecting device which searches the currently active nodes and uses a node information to dynamically update the information table of the address aiming at various application service.
Owner:PEKING UNIV

Multiple application protocol identification method and device

The invention discloses a multiple application protocol identification method and an application protocol identification engine. According to the multiple application protocol identification method, characteristic conditions, decryption suite conditions, application protocol characteristics, application protocol hit action, various detection identification modules and corresponding rule description methods are provided on the basis of XM language; the application protocol identification engine comprises identification modules, such as a strong correlation identification module, a single packet identification module, a multi-packet identification module, an algorithm decryption and identification module and a channel extraction and identification module; a configuration module; and an application protocol characteristic matching unit, a full-flow table storage unit, a half-flow association table storage unit, and a rule base storage unit. By the use of the multiple application protocol identification method and the application protocol identification engine, flexible rule description configuration mechanisms and online, accurate and comprehensive identification of application protocols and encrypted traffic are achieved.
Owner:BEIJING TOPSEC TECH +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products