Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

212 results about "Localhost" patented technology

In computer networking, localhost is a hostname that means this computer. It is used to access the network services that are running on the host via the loopback network interface. Using the loopback interface bypasses any local network interface hardware.

Method And Apparatus For Trusted Federated Identity

A trusted computing environment, such as a smartcard, UICC, Java card, global platform, or the like may be used as a local host trust center and a proxy for a single-sign on (SSO) provider. This may be referred to as a local SSO provider (OP). This may be done, for example, to keep authentication traffic local and to prevent over the air communications, which may burden an operator network. To establish the OP proxy in the trusted environment, the trusted environment may bind to the SSO provider in a number of ways. For example, the SSO provider may interoperate with UICC-based UE authentication or GBA. In this way, user equipment may leverage the trusted environment in order to provide increased security and reduce over the air communications and authentication burden on the OP or operator network.
Owner:INTERDIGITAL PATENT HLDG INC

Method for opening a proprietary MAC protocol in a non-DOCSIS modem compatibly with a DOCSIS modem

A two way communication system is adapted for compatible inter-operation of a plurality of devices operating in accordance with a plurality of protocols. The communication system includes a first group of one or more remote devices that interface with a local host in accordance with a first protocol and a second group of one or more remote devices that interface wit the local host in accordance with a second protocol. The local host includes a protocol processor that identifies transmissions from the first and second groups of remote devices and routes transmissions from the first group of remote devices to a first processor operating in accordance with the first protocol and also routes transmissions from the second group of remote devices to a second processor operating in accordance with the second protocol.
Owner:AVAGO TECH WIRELESS IP SINGAPORE PTE

Service for NAT traversal using IPSEC

Disclosed are methods and apparatus for methods and apparatus for facilitating a secure connection between a first and a second node in a computer network where one or both of the nodes may or may not reside behind a network address translation (NAT) enabled gateway. Embodiments of the present invention provide a seamless integration by providing a uniform solution for establishing secure connections, such as IPSEC, between two nodes irrespective of whether they are behind a NAT-enabled gateway or not. In general, a gateway is operable to receive a request from a remote host for a secure connection to a local host that within the home network of the gateway. The gateway then forwards this received request to a NAT traversal service. The NAT traversal service receives the request and then automatically sends an initiation message to set up a secure session, e.g., performing authentication and exchanging keys. In a specific aspect, the setup data utilizes an IKE (Internet Key Exchange) initiation message that is sent to the originator of the request via the gateway. Upon receipt of this initiation message, the gateway is then able to set up a two way connection to allow other setup data to flow between the remote and local hosts to complete the setup session and then secure data to flow between the remote and local hosts in a secure communication session, such as in IPSec or VPN session.
Owner:CISCO TECH INC

Distributed network applications platform architecture

A system and methods that allow local access of data residing and processed on remote messaging system computers is provided. In an illustrative implementation, a plurality of messaging systems having host computers coupled to network interface units (NIUs) act as messaging system nodes (MS Nodes). The NIUs of each of the MS Nodes are interconnected to form a wide area network (WAN) such that data may be freely communicated between the MS Nodes. An exemplary messaging system architecture comprises a host computer interconnected to a NW that, itself, is interconnected to telephone networks and to external computer networks. NIUs support a number of interfaces that allow the communication of data between the NIU and the host, and between the NIU and the external telephone and computer networks. In the distributed messaging system, a call originating from a local MS Node requesting data that resides on a remote messaging system may be transferred to the remote MS Node that has the requested data. The call is processed such that a local NIU accepts the call and communicates the call to a local host. The local host processes the call and determines that the data being requested resides on a remote host. The call is then passed back to the local NIU and transferred to the appropriate NIU using the WAN for processing by the appropriate remote host having the requested data.
Owner:UNISYS CORP

Mechanisms for providing connectivity in NAT redundant/fail-over scenarios in unshared address-space

Disclosed are methods and apparatus for facilitating reliable session based communication with a local host via a subnet of redundant network devices that also implement network address translation (NAT) or the like. In general, embodiments of the present invention include mechanisms for reestablishing access to a local host after the local host's active network device has failed and been replaced by a new active network device with an address space that differs from the failed network device. In this invention, the network devices associated with the same local host also implement NAT, or the like. In brief, for each of its associated local hosts, the new active network device causes an address server to be updated with a new public address that is assigned from its address space to the local host. This update allows other remote hosts access to the local hosts by obtaining the updated address information from the address server. Communication sessions that were established prior to the failing active network device may also be retained by the new active network device. In this aspect, for each ongoing particular session between a remote host and a local host of the new active network device, the new active network device updates the remote host with a new public address assigned to local host for use in the particular session.
Owner:CISCO TECH INC

Method of mutually authenticating between software mobility device and local host and a method of forming input/output (i/o) channel

A method of mutually authenticating between a local host and a software mobility device including an operating system virtualization layer, and a method of forming an input / output (I / O) channel. The method of authenticating a local host in the software mobility device includes requesting a certificate from the local host in which an integrity value of the local host is stored, and receiving the certificate from the local host; receiving an integrity value measured in the local host and comparing the measured integrity value with the integrity value included in the certificate to verify the local host; and when the local host is verified, encrypting a security profile of the software mobility device and transmitting the encrypted security profile to the local host so as to provide secure communication between the local host and the software mobility device.
Owner:SAMSUNG ELECTRONICS CO LTD

Packet forwarding method in TRILL (transparent interconnection of lots of links) network and routing bridge

The invention discloses a packet forwarding method in a TRILL (transparent interconnection of lots of links) network and a router bridge. Both an entrance RB (router bridge) and an exit RB distribute local unique labels for local ports, and an MAC (media access control) address of a local host and the labels distributed for the local ports are learnt into local MAC address table entries; an MAC address table entry corresponding to a target MAC address of a packet to be forwarded from the local host is searched by the entrance RB in a local MAC address table, TRILL encapsulation including the entrance RB, the entrance label, the exit RB and the exit label is performed for the packet to be forwarded according to search results, and the encapsulated TRILL packet is sent to the exit RB; TRILL decapsulation is performed by the exit RB for the TRILL packet, an inner layer source MAC address is learnt, the inner layer source MAC address, the entrance RB and the entrance label are learnt to the local MAC address table entries, and the decapsulated packet is forwarded according to the exit label. By adopting the method and the routing bridge, the packet forwarding based on the labels can be realized, the search of the MAC address table can be reduced, and the complexity of packet forwarding can also be reduced.
Owner:XINHUASAN INFORMATION TECH CO LTD

Clock synchronizing method over fault-tolerant Ethernet

A device that recognizes the time synchronization packet and substitutes a real-time value from the master internal counter into the proper place in a data packet is placed between an Ethernet Media Access Controller (MAC) and a Physical Interface Transceiver (PHY). A second device monitors the packet passing from the MAC to the PHY and determines when it is a time synchronization packet from the time master. Upon recognition of the proper packet, the second device simultaneously captures the master's time value and captures the value of a local real-time clock. The result of these captures are presented to the local host computer which controls the time base clock that increments the local real-time clock to either speed up or slow down this local clock, thereby synchronizing the local clock to the time master clock. The offset and skew of the local clock to the master clock is reduced to only the network latency plus variability due to network congestion.
Owner:HONEYWELL INT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products