H04L67/34

SYSTEMS AND METHODS FOR REAL-TIME REPOSITORY MANAGEMENT FOR UNIVERSAL SERVICE DEPLOYMENT

Systems and methods described herein related to real-time management of service deployment systems are disclosed. A management system may monitor an infrastructure environment repository in real-time. Differences in configurations stored within the repository may be identified and used to generate configuration data. The configuration data may be used to update service operating parameters and service deployment configurations. The configuration data may be used to generate deployment data. The deployment data may be utilized to deploy one or more services on an updated infrastructure using the updated services.

METHODS AND SYSTEMS FOR IMPLEMENTING A FUNCTION FOR AN APPLICATION USING A MIDDLEWARE

Embodiments of the disclosure provide methods and systems for implementing a function for an application using a middleware on a computer. An exemplary method may include initializing an application node in the middleware corresponding to the application, the initializing comprising binding the function to the application node and associating the application node with a cryptor, connecting the middleware to a remote device through a transport layer using the cryptor, publishing a message to invoke the function from the application node, through the middleware, to the cryptor, and communicating with the remote device to invoke the function, using the cryptor, based on the message.

DYNAMIC MICROSERVICE INTERCOMMUNICATION CONFIGURATION

Methods and systems for managing communications include identifying a system condition in a distributed computing system comprising a first microservice in communication with a second microservice. A communications method is identified responsive to the identified system condition using a reinforcement learning model that associates communication methods with system conditions. The identified communications method is implemented for communications between the first microservice and the second microservice, such that the first microservice and the second microservice use the identified communications method to transmit data.

NON-HTTP LAYER 7 PROTOCOL APPLICATIONS RUNNING IN THE BROWSER
20220337654 · 2022-10-20 ·

Layer 7 protocol (non-HTTP) client applications are executed in the browser. The non-HTTP layer 7 protocol client application connects to a compute server that proxies layer 4 packets to the origin network that has the non-HTTP layer 7 protocol service. As an example, an SSH client (a non-HTTP layer 7 protocol) can execute in the browser and the TCP packets (layer 4 packets) are proxied by a compute server to the origin network that has the appropriate SSH server. The non-HTTP layer 7 protocol client application allows users to run commands or otherwise interact with the client as if they were using a native application (one that is not executed within the browser) without any client-side configuration or agent.

BULK DATA TRANSFER BETWEEN MESH NODES

A method of data transfer to a plurality of devices on a mesh network includes receiving bulk data at a proxy device in the mesh network; storing, at the proxy device, the bulk data; confirming, to a source of the bulk data, that the bulk data is received; after confirming that the bulk data is received, performing a transfer of the bulk data packet-by-packet to at least one other node in the mesh network; and performing a unicast communication to identify missing packets. The transfer can be or include a cascade transfer in which the data is transferred packet-by-packet to a next available node in the mesh network that itself passes a received packet to its next available node in the mesh network.

Differential client-side encryption of information originating from a client
11477180 · 2022-10-18 · ·

A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.

System and method for rendering electronic content

A method and system for rendering electronic content is provided. The method includes: receiving a request for electronic content; retrieving browser data associated with a browser configured to render the electronic content; determining a nature of the electronic content; reviewing the browser data in relation to the nature of the electronic content to determine whether the browser supports the electronic content; and if the browser supports the electronic content, transmitting the electronic content supported by the browser. The system includes: a connection module configured to receive a request for electronic content; a browser module configured to retrieve browser data; a content module configured to determine a nature associated with the electronic content; a rendering module configured to review the browser data in relation to the nature of the electronic content to determine whether the browser supports the electronic content.

Identifying un-deployed features of an application

Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.

Industrial internet connected control system

An apparatus is provided. The apparatus including a plurality of network interfaces, including a first network interface and a second network interface. The apparatus also includes a processor with two or more independent processing units, including a first independent processing unit and a second independent processing unit. The apparatus further includes a memory having first instructions and second instructions stored thereon. Execution of the first instructions, cause the first independent processing unit to execute operations associated with a first operating system and communicate, via the first network interface, over a bi-direction communication, with one or more platform computing devices. Execution of the second instructions, cause the second independent processing unit to execute real-time operations associated with a second operating system and communicate, via the second network interface, with one or more computing devices each having one or more sensors thereon.

BROKER-BASED BUS PROTOCOL AND MULTI-CLIENT ARCHITECTURE

A system and method for an eSync bus protocol is provided. The eSync bus protocol uses a broker to route communications between electronic devices within an electronic environment, such as within a vehicle or the like. The electronic devices may first register with the broker, and thereafter send messages to the broker for routing to other registered electronic devices. In this way, the broker may act as an intermediary to route communications using the eSync bus protocol. A multi-client architecture is also provided in which multiple domains may be defined by the functions performed by electronic devices within a respective domain.