Patent classifications
H04L41/508
System and method for privacy policy enforcement
A system and method for privacy policy enforcement to ensure reconciliation between users communicating via an open system interconnection (OSI) communication architecture, with receiving of a privacy policy for at least one user's device and a usage policy for at least one user, receiving encryption codes, receiving private data from a first user to be sent to a second user, encrypting by a first server the received data, receiving a privacy policy enforcement vector, and performing selective decryption, by a second server, for each data segment, wherein data segments that correspond to a match between the privacy policy and usage policy are decrypted, and wherein at least one of the first server and the second server is external to the first user and second user.
System and method for management of cloud-based systems
System and method for reporting usage of a network infrastructure includes obtaining a map that includes at least one flow-mapping that correlates a flow feature with a service and that correlates a flow feature with an endpoint type, wherein the endpoint types include at least a subscriber type and a service type; at a first computer, receiving flow telemetry of a network infrastructure, the flow telemetry representing at least the destination and source attributes for network traffic in the flow telemetry; categorizing the flow telemetry into at least a subscriber flow category based on the source and destination endpoint types of the traffic; for subscriber flow telemetry of a subscriber, processing the subscriber flow telemetry into at least one flow feature; identifying at least one service to attribute to at least a portion of the subscriber flow telemetry, the service identified through the processed flow feature and a flow-mapping.
POLICY ENFORCEMENT AS A SERVICE FOR THIRD PARTY PLATFORMS WITH ASYNCHRONOUS USER TRACKING MECHANISMS
Systems, methods, and computer-readable media for providing a Policy Enforcement as a Service (PEaaS) are described. The PEaaS may allow customer service providers to define policies for usage restrictions to be implemented across their distributed systems/platforms. The policy enforcement mechanisms of the PEaaS may prevent users from overloading the systems/platforms of the customer service providers. The PEaaS may also include mechanisms for asynchronously (or lazy) tracking user infractions or suspensions. The lazy tracking mechanism may track and perform asynchronous (async) computation of infraction records and suspension sets/lists. Other embodiments may be described and/or claimed.
SPEED BOOST FOR ELIGIBLE USER EQUIPMENT ON A LOCAL AREA NETWORK
A method for providing a differentiated feature to a first user equipment (UE) connected to a local area network (LAN) implemented by a router connected to a customer premises equipment (CPE) provisioned with a default feature associated with a first service tier of a plurality of service tiers provided by an internet service provider includes obtaining data indicating the first UE has connected to the LAN and determining the first UE is eligible for a second service tier of the different tiers. In response to determining the first UE is eligible for the second service tier, the method includes causing the CPE to be dynamically provisioned for a differentiated service associated with the second service tier. The method includes sending a message to the router to configure the router to provide the differentiated feature to the first UE.
MOBILE CORE CLIENT ARCHITECTURE
Methods and systems are disclosed for automatically managing multiple types of applications, electronic forms, electronic forms data instances, network services and, network services. The methods and systems allow organizations with a mobile workforce that relies on established business processes to execute timely and secure exchange of information while providing easy to use, fast, accurate and flexible information capture capability in the field. These organizations and/or third-party providers may optimize the design of mobile applications to better match existing corporate processes and forms in order to reflect existing business needs, preferred graphical user interfaces, processes and experiences on the mobile devices. Organizations and/or third-party providers may also build mobile applications that allow information to be automatically created and updated both online and offline and synchronized or routed to another mobile device, an application server, web service, software-as-a-service (SaaS), database or website.
Multi-tenant-cloud-aggregation and application-support system
The present application is directed to a distributed system that provides multi-cloud aggregation and that includes a cloud-connector server, cloud-connector nodes, and one or more service-provider nodes that cooperate to provide services that are distributed across multiple clouds. A service-provider node obtains tenant-associated information from a virtual data center in which the service-provider node is installed and provides the tenant-associated information to the cloud-connector server.
Mobile core client architecture
Methods and systems are disclosed for automatically managing multiple types of applications, electronic forms, electronic forms data instances, network services and, network services. The methods and systems allow organizations with a mobile workforce that relies on established business processes to execute timely and secure exchange of information while providing easy to use, fast, accurate and flexible information capture capability in the field. These organizations and/or third-party providers may optimize the design of mobile applications to better match existing corporate processes and forms in order to reflect existing business needs, preferred graphical user interfaces, processes and experiences on the mobile devices. Organizations and/or third-party providers may also build mobile applications that allow information to be automatically created and updated both online and offline and synchronized or routed to another mobile device, an application server, web service, software-as-a-service (SaaS), database or website.
SYSTEM AND METHOD FOR PRIVACY POLICY ENFORCEMENT
A system and method for privacy policy enforcement to ensure reconciliation between users communicating via an open system interconnection (OSI) communication architecture, with receiving of a privacy policy for at least one user's device and a usage policy for at least one user, receiving encryption codes, receiving private data from a first user to be sent to a second user, encrypting by a first server the received data, receiving a privacy policy enforcement vector, and performing selective decryption, by a second server, for each data segment, wherein data segments that correspond to a match between the privacy policy and usage policy are decrypted, and wherein at least one of the first server and the second server is external to the first user and second user.
REDUCTION OF MANAGEMENT COMPLEXITY OF AN INFORMATION TECHNOLOGY SYSTEM
IT assets of the IT system are grouped into asset groups by verifying characteristics and relations of the IT assets against affinity criteria in decreasing order of an affinity level of corresponding affinity criteria. A description of target platforms eligible to host the IT assets includes an indication of one or more hosting constraints and an indication of a complexity level of each target platform. At least part of the IT assets of the asset groups are mapped onto respective the target platforms by verifying the characteristics and/or relations of the IT assets of the asset groups, in decreasing order of the affinity level of the corresponding affinity criteria. The IT system is configured by hosting each mapped IT asset on the respective one or more target platform, which aggregates IT assets that have a higher affinity level on target platforms that have a lower complexity level.
System and method for management of cloud-based systems
System and method for reporting usage of a network infrastructure includes obtaining a map that includes at least one flow-mapping that correlates a flow feature with a service and that correlates a flow feature with an endpoint type, wherein the endpoint types include at least a subscriber type and a service type; at a first computer, receiving flow telemetry of a network infrastructure, the flow telemetry representing at least the destination and source attributes for network traffic in the flow telemetry; categorizing the flow telemetry into at least a subscriber flow category based on the source and destination endpoint types of the traffic; for subscriber flow telemetry of a subscriber, processing the subscriber flow telemetry into at least one flow feature; identifying at least one service to attribute to at least a portion of the subscriber flow telemetry, the service identified through the processed flow feature and a flow-mapping.