Patent classifications
H04L67/146
Methods for three-dimensional searching to precisely target retrieval within diverse types of content and devices thereof
Methods, non-transitory computer readable media, and computing devices for three-dimensional searching that precisely targets retrieval within diverse types of content includes retrieving web content in response to a received request from a client device. A destination page, an address within the page, and an offset distance from a starting point at the address to a correlated responsive portion of the web content to the received request is identified. The responsive web content with the identified destination page, the address, and the offset distance is provided to the requesting client device.
Multi-tenant cloud-based firewall systems and methods
Multi-tenant cloud-based firewall systems and methods are described. The firewall systems and methods can operate overlaid with existing branch office firewalls or routers as well as eliminate the need for physical firewalls. The firewall systems and methods can protect users at user level control, regardless of location, device, etc., over all ports and protocols (not only ports 80/443) while providing administrators a single unified policy for Internet access and integrated reporting and visibility. The firewall systems and methods can eliminate dedicated hardware at user locations, providing a software-based cloud solution. The firewall systems and methods support application awareness to identify application; user awareness to identify users, groups, and locations regardless of physical address; visibility and policy management providing unified administration, policy management, and reporting; threat protection and compliance to block threats and data leaks in real-time; high performance through an in-line cloud-based, scalable system; etc.
Multi-tenant cloud-based firewall systems and methods
Multi-tenant cloud-based firewall systems and methods are described. The firewall systems and methods can operate overlaid with existing branch office firewalls or routers as well as eliminate the need for physical firewalls. The firewall systems and methods can protect users at user level control, regardless of location, device, etc., over all ports and protocols (not only ports 80/443) while providing administrators a single unified policy for Internet access and integrated reporting and visibility. The firewall systems and methods can eliminate dedicated hardware at user locations, providing a software-based cloud solution. The firewall systems and methods support application awareness to identify application; user awareness to identify users, groups, and locations regardless of physical address; visibility and policy management providing unified administration, policy management, and reporting; threat protection and compliance to block threats and data leaks in real-time; high performance through an in-line cloud-based, scalable system; etc.
SHARE BASED AUGMENTED REALITY CONTENT SERVICE SYSTEM
Methods and systems are directed to a content services platform. The content services platform may include a processor and a memory storing instructions that, when executed by the processor, configure the content services platform to perform a method. The method may include receiving a request to initiate a shared session from a first client, the request including a first client identifier. Based on the received request, a session identifier may be provided to the first client associated with the first client identifier. A request from a second client may be received and may be associated with the session identifier. Thus, when message data from the first client is received, the message data may be added to a queue associated with the session identifier such that the message data may be provided from the queue to the second client based on the session identifier.
SHARE BASED AUGMENTED REALITY CONTENT SERVICE SYSTEM
Methods and systems are directed to a content services platform. The content services platform may include a processor and a memory storing instructions that, when executed by the processor, configure the content services platform to perform a method. The method may include receiving a request to initiate a shared session from a first client, the request including a first client identifier. Based on the received request, a session identifier may be provided to the first client associated with the first client identifier. A request from a second client may be received and may be associated with the session identifier. Thus, when message data from the first client is received, the message data may be added to a queue associated with the session identifier such that the message data may be provided from the queue to the second client based on the session identifier.
SYSTEMS AND METHODS FOR CREATING A VIRTUAL KVM SESSION BETWEEN A CLIENT DEVICE AND A TARGET DEVICE
Systems and methods for establishing a KVM session are disclosed. The KVM session is designed to provide a communication channel between a client device and a target device without the use of an appliance. For example, the KVM session includes a virtualized KVM session in which the hardware and software used to create the communication channel are stored on a network-based device, as opposed to a multi-port appliance physically connected to the target device. A virtual KVM session eliminates the need for the target device to have a-priori knowledge related to the client device. The virtual KVM session can individually communicate with the client device and the target device, and negotiate a session between the client device and the target device prior to any communication between the target device and the client device. In some embodiments, the virtual KVM session uses out-of-band signaling and SIP to negotiate a session.
SYSTEMS AND METHODS FOR CREATING A VIRTUAL KVM SESSION BETWEEN A CLIENT DEVICE AND A TARGET DEVICE
Systems and methods for establishing a KVM session are disclosed. The KVM session is designed to provide a communication channel between a client device and a target device without the use of an appliance. For example, the KVM session includes a virtualized KVM session in which the hardware and software used to create the communication channel are stored on a network-based device, as opposed to a multi-port appliance physically connected to the target device. A virtual KVM session eliminates the need for the target device to have a-priori knowledge related to the client device. The virtual KVM session can individually communicate with the client device and the target device, and negotiate a session between the client device and the target device prior to any communication between the target device and the client device. In some embodiments, the virtual KVM session uses out-of-band signaling and SIP to negotiate a session.
Methods and apparatus for dynamic application deeplinking at a mobile electronic device
In one embodiment, a method includes receiving an interaction identifier by a processor and in response to an input entered by a user at a first user interface of a mobile device. The input is associated with a frame within a page displayed at the first user interface. The method further includes receiving interaction information and application deeplinking purchase information associated with the purchase identifier and determining a uniform resource identifier (URI) of a second user interface at the mobile device. The second user interface is different from the first user interface. The method includes sending a signal, based on the URI, to cause the second user interface to be rendered at the mobile device with the interaction information pre-populated to complete an interaction requested by the user.
Methods and apparatus for dynamic application deeplinking at a mobile electronic device
In one embodiment, a method includes receiving an interaction identifier by a processor and in response to an input entered by a user at a first user interface of a mobile device. The input is associated with a frame within a page displayed at the first user interface. The method further includes receiving interaction information and application deeplinking purchase information associated with the purchase identifier and determining a uniform resource identifier (URI) of a second user interface at the mobile device. The second user interface is different from the first user interface. The method includes sending a signal, based on the URI, to cause the second user interface to be rendered at the mobile device with the interaction information pre-populated to complete an interaction requested by the user.
Sticky sessions in a proxy infrastructure
Systems and methods herein provide for a proxy infrastructure. In the proxy infrastructure, a network element (e.g., a supernode) is connected with a plurality of exit nodes. At one of a plurality of messenger units of the proxy infrastructure, a proxy protocol request is received directly from a client computing device. The proxy protocol request specifies a request and a target. In response the proxy protocol request, a selection is made between one between one of the plurality of exit nodes. A message with the request is sent from the messenger to the supernode connected with the selected exit node. Finally, the message is sent from the supernode to the selected exit node to forward the request to the target.