Patent classifications
H04L67/133
Systems and methods for securely using cloud services on on-premises data
The present disclosure relates to systems and methods for providing cloud-based services securely to on-premises networks or other infrastructure. More particularly, the present disclosure relates to systems and methods for enriching first-party data (e.g., data collected directly by an on-premises server) stored within on-premises networks by enabling the on-premises networks to retrieve and process third-party data stored on cloud-based networks. As a technical benefit, cloud-based services can be performed on the first-party data within the on-premises networks.
Remote management of application settings
In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. The method may also include completing processing of the received network communication after the transmitting of the at least some of the identified settings.
Remote management of application settings
In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. The method may also include completing processing of the received network communication after the transmitting of the at least some of the identified settings.
COMPUTER READABLE STORAGE MEDIA FOR DYNAMIC SERVICE DEPLOYMENT AND METHODS AND SYSTEMS FOR UTILIZING SAME
Systems and methods for service deployment are disclosed herein. Certain implementations may include a memory encoded with computer executable instructions that when executed cause a processing unit to operate a service deployment engine and use consistent APIs both (a) internally via a package API when consuming deployment packages in order to expose them, and (b) externally via a service API when exposing available packages and services to the outside world or enterprise server. By doing so, calling applications can depend on the consistency of the service API engine while the enterprise server itself can reliably consume and interact with a dynamic set of packages organized in a consistent and predictable way. The service deployment engine may be configured to act as a dynamic library loader to interrogate, deploy, start/stop, and/or uninstall packages and services in real time. The packages and services may all implement the same package API.
Systems and methods for asynchronous API-driven external application services for a blockchain
Systems and methods for asynchronous API-driven external application services for blockchain are provided. The blockchain may store profile data that permits asynchronous communications and data sharing among a plurality of trusted users, and an application server layer may act as a gateway to a blockchain system to selectively provide limited access to external application services to operate upon the blockchain data.
Systems and methods for asynchronous API-driven external application services for a blockchain
Systems and methods for asynchronous API-driven external application services for blockchain are provided. The blockchain may store profile data that permits asynchronous communications and data sharing among a plurality of trusted users, and an application server layer may act as a gateway to a blockchain system to selectively provide limited access to external application services to operate upon the blockchain data.
Aggregated conversion measurement
Systems and methods described herein can relate to a web browser-based application programming interface (API) that can control the authorization of data transmissions within a networked environment. The system enables content items displayed in a web page to make a call to the browser to request that the browser register the content item with the browser. The web browser can control the network transmissions to content items approved or authorized by the web browser. The system can reduce the number of transmissions that do not result in content for the client device—saving bandwidth and computational resources for the client device.
Aggregated conversion measurement
Systems and methods described herein can relate to a web browser-based application programming interface (API) that can control the authorization of data transmissions within a networked environment. The system enables content items displayed in a web page to make a call to the browser to request that the browser register the content item with the browser. The web browser can control the network transmissions to content items approved or authorized by the web browser. The system can reduce the number of transmissions that do not result in content for the client device—saving bandwidth and computational resources for the client device.
FEDERATED IDENTITY MANAGEMENT WITH DECENTRALIZED COMPUTING PLATFORMS
Provided is a process that establishes user identities within a decentralized data store, like a blockchain. A user's mobile device may establish credential values within a trusted execution environment of the mobile device. Representations of those credentials may be generated on the mobile device and transmitted for storage in association with an identity of the user established on the blockchain. Similarly, one or more key-pairs may be generated or otherwise used by the mobile device for signatures and signature verification. Private keys may remain resident on the device (or known and input by the user) while corresponding public keys may be stored in associated with the user identity on the blockchain. A private key is used to sign representations of credentials and other values as a proof of knowledge of the private key and credential values for authentication of the user to the user identity on the blockchain.
System for Automatically Generating Customer Specific Data Center Application Program Interfaces
A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: monitoring an interaction of a user with a data center monitoring and management console when configuring an aspect of data center infrastructure, the configuring the aspect of data center infrastructure being performed during an infrastructure configuration experience; executing the aspect of data center infrastructure; and, generating an application program interface associated with the aspect of data center infrastructure, the application program interface being generated during the infrastructure configuration experience.