H04L67/2866

Curating proxy server pools
11616848 · 2023-03-28 · ·

A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.

CONSISTENT HASHING FOR COMMUNICATION DEVICES

A method for allocating a device-specific resource from one or more databases is provided. The method includes receiving, at an interface, a coupling identifier including a pool identifier and a resource identifier, as part of a processing request from a requesting entity, the processing request including a request for the device-specific resource, wherein the coupling identifier associates the requesting entity with the device-specific resource based on the resource identifier, extracting, at the interface, the pool identifier from the coupling identifier, identifying, by the interface, the processing service in which the device-specific resource associated with the resource identifier is cached, based on the pool identifier, and transmitting, from the interface to the identified processing service, at least a part of the processing request to process the cached requested device-specific resource.

CROSS-NETWORK DIFFERENTIAL DETERMINATION
20230078066 · 2023-03-16 ·

Provided are systems, methods, and computer-program products for a proxy network that can determine, for a set of objects, an initial differential, where the initial differential is determined using a rules data store of a host network. The proxy network can further determine a supplemental differential for the set of objects. The proxy network can further determine a final differential that is the sum of the initial differential and the supplemental differential. The proxy network can further determine a final sum for the set of objects that is the object value less the final differential. The proxy network can further generate an outbound data packet that includes values corresponding to the set of objects and the final sum. When the host network receives the outbound data packet, the host network can modify an object data store using the values corresponding to the set of objects and the final sum.

PROXYING TCP FINGERPRINTS
20230071608 · 2023-03-09 ·

In some embodiments, a computer-implemented method for an automated proxying TCP fingerprints comprises: receiving, at a proxy server, a request from a source host, to establish a first communications connection between the source host and a destination host; establishing, by the proxy server, a second communications connection between the source host and the proxy server; determining a plurality of fingerprint values specific to the source host; establishing by the proxy server, using at least the plurality of fingerprint values specific to the source host, a third communications connection between the proxy server and the destination host; facilitating, by the proxy server, communications between the source host and proxy server via the second communications connection and between the proxy server and the destination host via the third communications connection.

PROXYING TCP FINGERPRINTS
20230071608 · 2023-03-09 ·

In some embodiments, a computer-implemented method for an automated proxying TCP fingerprints comprises: receiving, at a proxy server, a request from a source host, to establish a first communications connection between the source host and a destination host; establishing, by the proxy server, a second communications connection between the source host and the proxy server; determining a plurality of fingerprint values specific to the source host; establishing by the proxy server, using at least the plurality of fingerprint values specific to the source host, a third communications connection between the proxy server and the destination host; facilitating, by the proxy server, communications between the source host and proxy server via the second communications connection and between the proxy server and the destination host via the third communications connection.

Curating proxy server pools
11637902 · 2023-04-25 · ·

A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.

Curating proxy server pools
11637902 · 2023-04-25 · ·

A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.

Proxy selection by monitoring quality and available capacity
11606438 · 2023-03-14 · ·

Empirical data of exit nodes are continuously monitored and each exit node's overall performance and available capacity are calculated. The empirical data can include monitoring the number of concurrent requests currently being executed by each exit node and the disconnection chronology of each exit node. Further, each exit node is tested by benchmark requests and ping messages and each exit node's quality rate is calculated. Additionally, systems and methods are provided to select an exit node with the highest quality and available capacity value, from a particular pool to route the user request.

Proxy selection by monitoring quality and available capacity
11606438 · 2023-03-14 · ·

Empirical data of exit nodes are continuously monitored and each exit node's overall performance and available capacity are calculated. The empirical data can include monitoring the number of concurrent requests currently being executed by each exit node and the disconnection chronology of each exit node. Further, each exit node is tested by benchmark requests and ping messages and each exit node's quality rate is calculated. Additionally, systems and methods are provided to select an exit node with the highest quality and available capacity value, from a particular pool to route the user request.

Distributed Deep Learning System

A distributed deep learning system according to an embodiment includes M distributed processing nodes that perform deep learning of a neural network distributed from each other, and N aggregation processing nodes that are connected to each of the M distributed processing nodes via a first communication line and a second communication line, and perform aggregation of distributed processing results obtained at the M distributed processing nodes via the first communication line. Accordingly, even in a case of a plurality of users sharing the distributed deep learning system at the same time, efficient and stable distributed deep learning processing can be realized.