Patent classifications
H04L67/146
Sticky sessions in a proxy infrastructure
Systems and methods herein provide for a proxy infrastructure. In the proxy infrastructure, a network element (e.g., a supernode) is connected with a plurality of exit nodes. At one of a plurality of messenger units of the proxy infrastructure, a proxy protocol request is received directly from a client computing device. The proxy protocol request specifies a request and a target. In response the proxy protocol request, a selection is made between one between one of the plurality of exit nodes. A message with the request is sent from the messenger to the supernode connected with the selected exit node. Finally, the message is sent from the supernode to the selected exit node to forward the request to the target.
Session-based device grouping
Techniques for session-based device grouping are described. In an example, a computer system receives first data requesting an output, determines a function to provide content data based at least in part on the first data, determines a session identifier of a session associated with execution of the function, and determines session data associated with the session identifier. The session data includes a first device identifier of a first device, an indication that the first device is outputting the content data, and a second device identifier of a second device. The computer system also causes, based at least in part on the session data including the second device identifier, the second device to output the content data.
Customer data handling in a proxy infrastructure
Systems and methods herein provide for a proxy infrastructure. In the proxy infrastructure, a network element (e.g., a supernode) is connected with a plurality of exit nodes. At one of a plurality of messenger units of the proxy infrastructure, a proxy protocol request is received directly from a client computing device. The proxy protocol request specifies a request and a target. In response the proxy protocol request, a selection is made between one between one of the plurality of exit nodes. A message with the request is sent from the messenger to the supernode connected with the selected exit node. Finally, the message is sent from the supernode to the selected exit node to forward the request to the target.
Messaging and gaming applications rewards
Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing at least one program and a method for providing a platform that facilitates communication between a messaging application and a web-based gaming application; receiving, via the platform, a request from the web-based gaming application to execute a reward activity; determining, by the messaging application, that the request satisfies a reward activity criterion; generating the reward activity on the messaging application in response to receiving the request; and communicating, via the platform, a status of the reward activity from the messaging application to the web-based gaming application.
Messaging and gaming applications rewards
Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing at least one program and a method for providing a platform that facilitates communication between a messaging application and a web-based gaming application; receiving, via the platform, a request from the web-based gaming application to execute a reward activity; determining, by the messaging application, that the request satisfies a reward activity criterion; generating the reward activity on the messaging application in response to receiving the request; and communicating, via the platform, a status of the reward activity from the messaging application to the web-based gaming application.
Systems and methods for identity graph based fraud detection
A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving, at a commerce platform system, a transaction from a user having initial transaction attributes and transaction data. The method may also include determining, by the commerce platform system, an identity associated with the user, wherein the identity is associated with additional transaction attributes not received with the transaction. Furthermore, the method may include accessing, by the commerce platform system, a feature set associated with the initial transaction attributes and the additional transaction attributes, wherein the feature set comprises machine learning (ML) model features for detecting transaction fraud. The method may also include performing, by the commerce platform system, a machine learning model analysis using the feature set and the transaction data to determine a likelihood that the transaction is fraudulent, and performing, by the commerce platforms system, the transaction when the likelihood that the transaction is fraudulent does not satisfy a transaction fraud threshold.
INTERNET-BASED PROXY SERVICE TO MODIFY INTERNET RESPONSES
A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server retrieves the requested network resource. The proxy server determines that the requested resource is an HTML page. The proxy server scans the HTML page to locate one or more modification tokens that each indicates content that is subject to being modified. For at least one of the located modification tokens, the proxy server automatically modifies at least a portion of the content of the HTML page that corresponds to that modification token. The proxy server then transmits the modified HTML page to the client device.
DYNAMIC SECURITY MODULE SERVER DEVICE AND METHOD OF OPERATING SAME
Disclosed herein are a dynamic security module server device for transmitting a dynamic security module to a user terminal and receiving a security management event from the user terminal, and a method of operating the dynamic security module server device. The dynamic security module server device includes a communication unit configured to transmit and receive a security management event over a network, and a processor configured to control the communication unit. The processor is configured to create a security session with the security client of a user terminal, and to transmit a dynamic security module to the security client of the user terminal so that part or all of code performing security management in the security client of the user terminal in which the security session has been created has a predetermined valid period.
Monitoring Traffic in a Computer Network
A computer-implemented method, computerized apparatus and computer program product for monitoring traffic in a computer network. The computer network comprises a plurality of devices configured to apply a transformation function on a target port identifier of a requested transmission by an application program executing thereon and direct the transmission to a different target port per the scrambled identifier thereby obtained. The transformation function depends on at least one parameter shared among the plurality of devices and applying thereof is conditioned on the application program requesting transmission being listed in a list of authorized application programs. Attempts to access invalid ports as defined by the transformation function are identified and an action for mitigating a security threat ascribed thereto is provided.
Correlated Personalization of Multiple Communication Services
A message (203) of a first communication service is received from a service provider. On the basis of the received message (203) of the first communication service, an information element for personalizing communication services is stored. The received message (203) of the first communication service is then forwarded towards a subscriber (10). Further, a message (205) of a second communication service is received from the subscriber. The stored information element is inserted into the received message (205) of the second communication service. The received message (205) of the second communication service with the inserted information element is then forwarded towards the service provider. The service provider may then personalize the second communication service based on the information element.