Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

94 results about "Application-level gateway" patented technology

In the context of computer networking, an application-level gateway (also known as ALG, application layer gateway, application gateway, application proxy, or application-level proxy) consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, BitTorrent, SIP, RTSP, file transfer in IM applications, etc. In order for these protocols to work through NAT or a firewall, either the application has to know about an address/port number combination that allows incoming packets, or the NAT has to monitor the control traffic and open up port mappings (firewall pinhole) dynamically as required. Legitimate application data can thus be passed through the security checks of the firewall or NAT that would have otherwise restricted the traffic for not meeting its limited filter criteria.

Method and apparatus for extending network address translation for unsupported protocols

Clients that are connected on a private network and which are assigned a private IP address that is not routable on the Internet can connect to the Internet through a router/server that includes a network address translator (NAT). For outgoing packets, the NAT translates the client's private source IP address and generalized port number (GPN) to the NAT's global IP address and GPN. For incoming packets sent to the NAT's global IP address and GPN, the NAT translates the global destination IP address and GPN to the client's private IP address and GPN. For protocols which cannot be directly supported by the NAT, such as those in the IPSec security protocol suite, the NAT is extended by creating in the NAT's translation table an entry that associates, for a specific unsupported protocol, a client's private IP address and GPN, the NAT's global IP address and GPN, and a foreign address on the Internet, that is valid until a specified or default expiration time. Outgoing packets from the client to that foreign address and incoming packets from that foreign address to the NAT's global IP address and GPN are translated according to the entry until the entry expires. In associations with these translations to outgoing and incoming packets, the client implements any Application Layer Gateway (ALG) that would otherwise be implemented at the NAT. Further, at the client, outgoing packets are modified before being transmitted so as to pre-compensate for the effects of the translations. Incoming packets at the client from the NAT are similarly modified so as to post-compensate for the effects of the translations. For the IPSec protocol, these modification include adjusting the checksum in the TCP or UDP header to account for IP address and TCP or UDP port number translations.
Owner:ALCATEL-LUCENT USA INC

Method and apparatus for application-independent end-to-end security in shared-link access networks

Clients that are connected on a private network and which are assigned a private IP address that is not routable on the Internet can connect to the Internet through a router/server that includes a network address translator (NAT). For outgoing packets, the NAT translates the client's private source IP address and generalized port number (GPN) to the NAT's global IP address and GPN. For incoming packets sent to the NAT's global IP address and GPN, the NAT translates the global destination IP address and GPN to the client's private IP address and GPN. For protocols which cannot be directly supported by the NAT, such as those in the IPSec security protocol suite, the NAT is extended by creating in the NAT's translation table an entry that associates, for a specific unsupported protocol, a client's private IP address and GPN, the NAT's global IP address and GPN, and a foreign address on the Internet, that is valid until a specified or default expiration time. Outgoing packets from the client to that foreign address and incoming packets from that foreign address to the NAT's global IP address and GPN are translated according to the entry until the entry expires. In associations with these translations to outgoing and incoming packets, the client implements any Application Layer Gateway (ALG) that would otherwise be implemented at the NAT. Further, at the client, outgoing packets are modified before being transmitted so as to pre-compensate for the effects of the translations. Incoming packets at the client from the NAT are similarly modified so as to post-compensate for the effects of the translations. For the IPSec protocol, these modification include adjusting the checksum in the TCP or UDP header to account for IP address and TCP or UDP port number translations.
Owner:ALCATEL-LUCENT USA INC

Method and apparatus for internet protocol multimedia bearer path optimization through a succession of border gateways

A method for identifying alternate end-to-end media paths through internet protocol realms using substitute session description protocol parameters is disclosed. The method includes receiving an session description protocol offer, including a list of previously traversed through internet protocol realms. The method continues with determining the next internet protocol realm for a media path based on unspecified signaling criteria. Finally, the method includes that if the next internet protocol realm to be traversed through is on the list of previously traversed through internet protocol realms, bypassing at least one border gateway associated with the current and previously traversed through internet protocol realms. The system implementing a method for identifying optimal end-to-end media paths and internet protocol multimedia subsystems include a list of internet protocol realm instances, an application level gateway configured to receive a session description protocol offer having connection information and port information, and a procedure to determine that if the next internet protocol realm that the media path may traverse through is on the list of instances, the media path connection information and port information is substituted to facilitate border gateway bypassing.
Owner:ALCATEL LUCENT SAS

Application layer dynamic intrusion detection system and detection method based on artificial intelligence

The invention discloses an application layer dynamic intrusion detection system and detection method based on artificial intelligence, wherein the detection system comprises an application layer gateway, a detection module, a judgment and operation module, a sample database and an updating module, the detection module comprises a detection model mixed with a convolutional neural network and a bidirectional long and short term memory neural network. The detection module after initialization is used for making an attack judgment on an application layer data packet, filtering the data packet above the threshold value and putting the data packet into a malicious sample database, and meanwhile, the data packet under the threshold value is not processed. The updating module is used for traininga new model by using the malicious samples and normal samples with a certain proportion in the sample database and updating the detection model in the detection module in real time. According to the invention, a universal detection method is used for the attack method of the application layer, the method has the advantages of high detection rate and low misjudgment rate. Meanwhile, the intrusion detection system has the advantage of dynamic updating model, and has good filtering effect on unknown zero-day attack.
Owner:JINAN UNIVERSITY

System and method for interworking between IPv4 (internet protocol version 4) and IPv6 (internet protocol version 6) based on DHT (distributed hash table)

InactiveCN102098353ASuitable for dynamic deploymentLoad balancingData switching networksExtensibilityIp address
The invention provides a system and method for interworking between the IPv4 (internet protocol version 4) and the IPv6 (internet protocol version 6) based on a DHT (distributed hash table). The system only improves a terminal and takes a new double stack gateway which is arranged at the network perimeter between the IPv4 and the IPv6 as an application layer gateway rather than changing the othernetwork element equipment arranged in the original IPv4 or IPv6 network. The common point of the terminal and the application layer gateway is that an application later is additionally provided with five sequence connection modules, namely an address conversion module, a DHT layer building and maintaining module, a route path querying module, a shortest route path computing module and a data packet transmitting module; and on the basis of the added modules, each application layer gateway is logically mapped to form a DHT converge network. In order to realize the interconnection and the intercommunication of the IPv4 node and the IPv6 node, the terminal is further additionally provided with a scene judging module. The invention is used for realizing the interconnection and the intercommunication of the IPv4 and the IPv6 on the basis that the existing IPv4 protocol and IPv6 protocol are minimally changed. In the invention, the address difference of the original IPv4 network node and IPv6 network node is eliminated, and the data communication is completed by two different host machines according to an IP (internet protocol) address sequence with a set rule. By adopting the DHT technology, the invention is good in expandability and scalability.
Owner:BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products