H04L47/808

CONFIGURABLE VIEWS OF CONTEXT-RELEVANT CONTENT
20230336500 · 2023-10-19 ·

Providing access to content is disclosed. An indication of a context is received. Access is provided to a context-relevant subset of a body of managed content. In some cases, the context-relevant subset includes a document relevant to the content.

System and Method for Controlling Access to Project Data and To Computing Resources Therefor

A server device, system, method, and for controlling access to project resources is disclosed. The disclosure includes a processor, and a communications module and a memory coupled to the processor. The memory, when executed by the processor, causes the processor to generate a plurality of zones for a project, each zone defining a set of access rights to: i) a database; and ii) at least one tool. The processor configures each set of access rights to allow a proxy service to access the zones, and receives, from a client device and via the proxy service, an access query to access at least one zone. The processor provides the client device access to, via the proxy service, the at least one dataset and at least one tool of the at least one zone.

System and method for increasing flexibility and high availability in remote network devices
11757791 · 2023-09-12 · ·

A network node is provided for use with a broadband data provider facility, and first and second subscriber groups, the broadband data provider facility being operable to provide first and second service group provider data. The network node includes a network access device and a downstream configuration component. The network access device converts the first and second service group provider data into first and second service group network access data, respectively. The downstream configuration component receives a configuration instruction, the first and second service group network access data and, based on the configuration instruction, provides the first service group network access data to the first subscriber group and the second service group network access data to the second subscriber group. The downstream configuration component further receives a second configuration instruction and, based on the second configuration instruction, provides the first service group network access data to the first and second subscriber groups.

SYSTEM AND METHOD FOR INCREASING FLEXIBILITY AND HIGH AVAILABILITY IN REMOTE NETWORK DEVICES
20220407819 · 2022-12-22 · ·

A network node is provided for use with a broadband data provider facility, and first and second subscriber groups, the broadband data provider facility being operable to provide first and second service group provider data. The network node includes a network access device and a downstream configuration component. The network access device converts the first and second service group provider data into first and second service group network access data, respectively. The downstream configuration component receives a configuration instruction, the first and second service group network access data and, based on the configuration instruction, provides the first service group network access data to the first subscriber group and the second service group network access data to the second subscriber group. The downstream configuration component further receives a second configuration instruction and, based on the second configuration instruction, provides the first service group network access data to the first and second subscriber groups.

ROLE-BASED ACCESS CONTROL SYSTEM FOR MANAGING ACCESS TO RESOURCES

A role-based access control method and system provide for receiving a request to provide access to a resource, identifying an identity associated with the request, classifying the URI into a permission that allows access to the resource, generating a graph representing the one or more granted permissions, and authorizing the request including traversing the graph to determine that the first permission is included in the one or more granted permissions.

Scalable traffic management using one or more processor cores for multiple levels of quality of service

Packets are differentiated based on their traffic class. A traffic class is allocated bandwidth for transmission. One or more core or thread can be allocated to process packets of a traffic class for transmission based on allocated bandwidth for that traffic class. If multiple traffic classes are allocated bandwidth, and a traffic class underutilizes allocated bandwidth or a traffic class is allocated insufficient bandwidth, then allocated bandwidth can be adjusted for a future transmission time slot. For example, a higher priority traffic class with excess bandwidth can share the excess bandwidth with a next highest priority traffic class for use to allocate packets for transmission for the same time slot. In the same or another example, bandwidth allocated to a traffic class depends on an extent of insufficient allocation or underutilization of allocated bandwidth such that a traffic class with insufficient allocated bandwidth in one or more prior time slot can be provided more bandwidth in a current time slot and a traffic class with underutilization of allocated bandwidth can be provided with less allocated bandwidth for a current time slot.

Authorizations associated with externally shared communication resources

Various embodiments of the present disclosure are directed to a group-based communication apparatus that is configured to enable end-users (e.g., non-admin users) to initiate, by way of client devices, generation of a shareable resource associated with a group-based communication resource identifier to efficiently authorize communication between client devices associated with different organization identifiers in group-based communication interfaces associated with a shared group-based communication resource identifier.

Access Load Control in Peer-to-Peer Networks
20230096571 · 2023-03-30 ·

Implementations relate to identifying, by a relay device, a first message received from a first requesting device of a plurality of requesting devices; identifying, by the relay device, a second message received from a second requesting device of the plurality of requesting devices; determining, by the relay device based at least in part on a parameter of the first message, that the first message has a first priority level that satisfies a priority threshold; determining, by the relay device based at least in part on a parameter of the second message, that the second message has a second priority level that does not satisfy the priority threshold; transmitting a relay message to a remote device based at least in part on the first message; and transmitting a backoff message to the second requesting device.

Network resource pushing method, device, and storage medium

A network resource pushing method, a device, and a storage medium. The method comprises: a server receiving information of a network resource accessed by a user, and information of the environment of the user when the user accessed the network resource (101); the server applying, according to the information of the environment of the user, a pre-established scenario determination model to determine a user scenario (102); the server establishing an association model between the user scenario and the type of network resource accessed by the user (103); and the server receiving information of a current environment of the user, applying the scenario determination model to determine a current scenario corresponding to the information of the current environment of the user, and pushing to the user, according to the association model, a network resource having a type corresponding to the determined current scenario (104).

Rate limiter

Systems and methods of rate limiting are disclosed herein. In some example embodiments, a rate limiter service receives a request from an online application to access an online resource, and the rate limiter service transmits an indication of the request to a back end system, and an enforcement decision corresponding to the online resource is received from the back end system, with the enforcement decision comprising an instruction to either permit or deny access to the online resource, and the receiving of the enforcement decision from the back end system being performed asynchronously with the receiving of the request and the transmitting of the indication. In some example embodiments, the enforcement decision received from the back end system is stored, the stored enforcement decision is accessed in response to the receiving of the request, and the request is responded to using the accessed enforcement decision.