A computer-implemented method is provided for transparently optimizing data transmission between a first endpoint and a second endpoint in a computer network. The endpoints have a directly established data session therebetween. The data session is identified by each endpoint at least to itself in the same way throughout the session. The method includes the steps of: relaying data between the endpoints transparently in the session using a network optimization service; and transparently modifying or storing at least some of the data transmitted from the second endpoint to the first endpoint using the network optimization service in order to optimize data communications between the endpoints, wherein transparently modifying at least some of the data comprises changing the data, replacing the data, or inserting additional data such that the first endpoint receives different data than was sent by the second endpoint.
An optimization service discovery method for optimizing data transmission by multi-session applications, includes: receiving an optimization service lookup query from one of a plurality of user clients in a network, each of said user clients executing a multi-session application; and identifying an optimization service and responding to the query with a network address of one or more servers providing said optimization service.
A computer-implemented method is provided for transparently optimizing data transmission between a first endpoint and a second endpoint in a computer network. The endpoints have a directly established data session therebetween. The data session is identified by each endpoint at least to itself in the same way throughout the session. The method includes the steps of: relaying data between the endpoints transparently in the session using a network optimization service; and transparently modifying or storing at least some of the data transmitted from the second endpoint to the first endpoint using the network optimization service in order to optimize data communications between the endpoints, wherein transparently modifying at least some of the data comprises changing the data, replacing the data, or inserting additional data such that the first endpoint receives different data than was sent by the second endpoint.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
H04L 45/00 - Routing or path finding of packets in data switching networks
An optimization service discovery method for optimizing data transmission by multi-session applications, includes: receiving an optimization service lookup query from one of a plurality of user clients in a network, each of said user clients executing a multi-session application; and identifying an optimization service and responding to the query with a network address of one or more servers providing said optimization service.
A computer-implemented method is provided for transparently optimizing data transmission between a first endpoint and a second endpoint in a computer network. The endpoints have a directly established data session therebetween. The data session is identified by each endpoint at least to itself in the same way throughout the session. The method includes the steps of: relaying data between the endpoints transparently in the session using a network optimization service; and transparently modifying or storing at least some of the data transmitted from the second endpoint to the first endpoint using the network optimization service in order to optimize data communications between the endpoints, wherein transparently modifying at least some of the data comprises changing the data, replacing the data, or inserting additional data such that the first endpoint receives different data than was sent by the second endpoint.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
H04L 45/00 - Routing or path finding of packets in data switching networks
A computer-implemented method of caching multi-session data communications in a computer network, includes the steps of: (a) receiving, intercepting, or monitoring one or more data sessions between a client executing a multi-session application for retrieving a desired content object and one or more metadata services, said client communicating with the one or more metadata services to discover metadata for the content object; (b) analyzing queries and responses exchanged between the client and the one of more metadata services to discover metadata for the content object; (c) receiving or intercepting subsequent data sessions between the client and content sources; (d) identifying a data protocol used by the client and identifying data queries within the data sessions; (e) identifying the content object or portions thereof requested by the client in the data queries; and (f) determining if the content object or portions thereof are stored in cache and, if so, sending the content object or portions thereof stored in cache to the client, and, if not, sending the data queries to the content sources, storing data responses from the content sources, and sending the data responses to the client.
H04N 21/63 - Control signaling between client, server and network componentsNetwork processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB'sCommunication protocolsAddressing
A computer-implemented method is provided for transparently optimizing data transmission between a first endpoint and a second endpoint in a computer network. The endpoints have a directly established data session therebetween. The data session is identified by each endpoint at least to itself in the same way throughout the session. The method includes the steps of: relaying data between the endpoints transparently in the session using a network optimization service; and transparently modifying or storing at least some of the data transmitted from the second endpoint to the first endpoint using the network optimization service in order to optimize data communications between the endpoints, wherein transparently modifying at least some of the data comprises changing the data, replacing the data, or inserting additional data such that the first endpoint receives different data than was sent by the second endpoint.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy
A computer-implemented method of caching multi-session data communications in a computer network, includes the steps of: (a) receiving, intercepting, or monitoring one or more data sessions between a client executing a multi-session application for retrieving a desired content object and one or more metadata services, said client communicating with the one or more metadata services to discover metadata for the content object; (b) analyzing queries and responses exchanged between the client and the one of more metadata services to discover metadata for the content object; (c) receiving or intercepting subsequent data sessions between the client and content sources; (d) identifying a data protocol used by the client and identifying data queries within the data sessions; (e) identifying the content object or portions thereof requested by the client in the data queries; and (f) determining if the content object or portions thereof are stored in cache and, if so, sending the content object or portions thereof stored in cache to the client, and, if not, sending the data queries to the content sources, storing data responses from the content sources, and sending the data responses to the client.
G06F 15/167 - Interprocessor communication using a common memory, e.g. mailbox
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
H04N 21/63 - Control signaling between client, server and network componentsNetwork processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB'sCommunication protocolsAddressing
9.
Optimizing data transmission between a first endpoint and a second endpoint in a computer network
A computer-implemented method is provided for transparently optimizing data transmission between a first endpoint and a second endpoint in a computer network. The endpoints have a directly established data session therebetween. The data session is identified by each endpoint at least to itself in the same way throughout the session. The method includes the steps of: relaying data between the endpoints transparently in the session using a network optimization service; and transparently modifying or storing at least some of the data transmitted from the second endpoint to the first endpoint using the network optimization service in order to optimize data communications between the endpoints, wherein transparently modifying at least some of the data comprises changing the data, replacing the data, or inserting additional data such that the first endpoint receives different data than was sent by the second endpoint.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy
An optimization service discovery method for optimizing data transmission by multi-session applications, includes: receiving an optimization service lookup query from one of a plurality of user clients in a network, each of said user clients executing a multi-session application; and identifying an optimization service and responding to the query with a network address of one or more servers providing said optimization service.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04N 21/63 - Control signaling between client, server and network componentsNetwork processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB'sCommunication protocolsAddressing
G06F 17/30 - Information retrieval; Database structures therefor
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
12.
Methods and systems for caching data communications over computer networks
A computer-implemented method of caching multi-session data communications in a computer network, includes: (a) receiving, intercepting, or monitoring data sessions between a client and metadata services; (b) analyzing queries and responses exchanged between the client and the metadata services to discover metadata for a desired content object; (c) receiving or intercepting subsequent data sessions between the client and content sources; (d) identifying a data protocol used by the client and identifying data queries within the data sessions; (e) identifying the content object requested by the client in the data queries; and (f) determining if the content object is stored in cache and, if so, sending the content object stored in cache to the client, and, if not, sending the data queries to the content sources, storing data responses from the content sources, and sending the data responses to the client.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
13.
Methods, systems, and computer readable media for detection of an unauthorized service message in a network
A method is described for detecting an unauthorized service message in a communications network. The method comprising the steps of: receiving a signaling message associated with a supplementary service (SS) message and/or a unstructured supplementary service data (USSD) message from a first network node, the signaling message comprising identification information of the sender of the SS message and/or USSD message and first location information of the first network node; requesting second location information of the first network node from the a second network node serving the sender of the SS message and/or USSD message; and, comparing the first location information with the second location information in order to determine whether the SS message and/or USSD message is authorized or not.
Methods, systems, and computer program products for delivery of SMS messages are disclosed. According to one method, first routing data for delivery of an SMS message to a mobile terminal is received at a network element. Second routing data is transmitted from the network element in response to receiving the first routing data. An SMS message having the second routing data is received at the network element. The second routing data is converted at the network element to the first routing data for delivery of the SMS message to a mobile terminal. The network element uses the first and second routing data to correlate a request for the first routing data with receipt of the SMS message. The network element compares an SMSC address in the request for the first routing data with an SMSC address in the SMS message to detect the presence of address spoofing.