Patent classifications
H04L61/30
NETWORK ADDRESS RESOLUTION
A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource.
NETWORK ADDRESS RESOLUTION
A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource.
Phone number alias generation
The disclosed systems and techniques enable an enterprise system to store contact phone numbers for users while avoiding storing and managing personal phone numbers for the user. For example, the enterprise system may forward personal phone numbers to an aliasing server configured to (i) generate alias phone numbers based on the personal email addresses and (ii) provide the alias phone numbers to the enterprise system. The aliasing server may operate as a “middle man” that receives phone calls or text messages directed to the alias phone numbers and that forwards the phone calls or text messages to the corresponding personal phone numbers (when appropriate). The enterprise system may store and maintain the alias phone numbers in lieu of storing the personal email addresses.
PATTERN MATCHING BY A NETWORK DEVICE FOR DOMAIN NAMES WITH WILDCARD CHARACTERS
A network device may receive data, may extract primary patterns from a plurality of domain names included in the data, may process the primary patterns, with a hash model, to generate hash keys for the primary patterns, wherein a hash key includes a hash value associated with a wildcard character, and may store the plurality of domain names in a hash table. The network device may extract a particular primary pattern from a particular domain name included in a search request, may determine potential matching patterns based on the particular primary pattern, and may process the potential matching patterns, with the hash model, to generate potential matching hash keys for the potential matching patterns, wherein a hash key includes a hash value associated with a wildcard character. The network device may search, based on the potential matching hash keys, the hash table to identify a matching domain name.
Low-latency identification of network-device properties
A method comprises analyzing, by a machine-learning model, a first network communication with a first set of inputs. The method also comprises inferring, by the machine-learning model and based on the analyzing, that a first device that is a party to the first network communication exhibits a device property. The method also comprises extracting, from the machine-learning model, a first set of significant inputs that had a significant impact on the determining. The method also comprises creating, using the first set of inputs, a rule for identifying the device property. The rule establishes a condition that, when present in a network communication, implies that a party to the network communication exhibits the device property.
SUPPORTING UNMODIFIED APPLICATIONS IN A MULTI-TENANCY, MULTI-CLUSTERED ENVIRONMENT
Embodiments of the disclosure provide systems and methods for supporting unmodified applications on a tenant cluster in a multi-tenant, multi-cluster environment. According to one embodiment, a method for supporting unmodified applications in a multi-tenant, multi-cluster environment can comprise creating, in the multi-tenant, multi-cluster environment, a tenant cluster executing one or more applications. The tenant cluster and the one or more applications executing on the tenant cluster can be adopted by a domain cluster of the multi-tenant, multi-cluster environment without modification to the one or more applications for execution in the multi-tenant, multi-cluster environment. The tenant cluster and the one or more applications executing on the tenant cluster can then be managed by the domain cluster of the multi-tenant, multi-cluster environment.
SUPPORTING UNMODIFIED APPLICATIONS IN A MULTI-TENANCY, MULTI-CLUSTERED ENVIRONMENT
Embodiments of the disclosure provide systems and methods for supporting unmodified applications on a tenant cluster in a multi-tenant, multi-cluster environment. According to one embodiment, a method for supporting unmodified applications in a multi-tenant, multi-cluster environment can comprise creating, in the multi-tenant, multi-cluster environment, a tenant cluster executing one or more applications. The tenant cluster and the one or more applications executing on the tenant cluster can be adopted by a domain cluster of the multi-tenant, multi-cluster environment without modification to the one or more applications for execution in the multi-tenant, multi-cluster environment. The tenant cluster and the one or more applications executing on the tenant cluster can then be managed by the domain cluster of the multi-tenant, multi-cluster environment.
Proxy end registration method, system, and related apparatus
Provided are a proxy end registration method, a proxy end registration system, a computer-readable memory medium, and a terminal. The method includes: receiving, by a management end, heartbeat information sent by a proxy end, and determining whether a management end database contains a UUID in the heartbeat information, wherein the heartbeat information is generated according to a MAC address of the proxy end and timestamp information; if not, determining whether a first hash counter in the heartbeat information is 0, the first hash counter being used for indicating a heartbeat IP transformation state of the heartbeat information; if the first hash counter is not 0, notifying the proxy end of the need to re-register; or if the first hash counter is 0, allowing the proxy end to register.
Proxy end registration method, system, and related apparatus
Provided are a proxy end registration method, a proxy end registration system, a computer-readable memory medium, and a terminal. The method includes: receiving, by a management end, heartbeat information sent by a proxy end, and determining whether a management end database contains a UUID in the heartbeat information, wherein the heartbeat information is generated according to a MAC address of the proxy end and timestamp information; if not, determining whether a first hash counter in the heartbeat information is 0, the first hash counter being used for indicating a heartbeat IP transformation state of the heartbeat information; if the first hash counter is not 0, notifying the proxy end of the need to re-register; or if the first hash counter is 0, allowing the proxy end to register.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR INGRESS MESSAGE RATE LIMITING
Methods, systems, and computer readable media for ingress message rate limiting are disclosed. One method occurs at a first network node of a first network comprises: obtaining, from a transport layer security (TLS) message from a second network node of a second network, an identifier identifying the second network node or the second network; receiving a request message from the second network node or the second network; determining, using the identifier, that an allowed ingress message rate associated with the second network node or the second network has been reached or exceeded; and in response to determining that the allowed ingress message rate associated with the second network node or the second network has been reached or exceeded, performing a rate limiting action.