H04L47/808

Authorizations Associated With Externally Shared Communication Resources

Various embodiments of the present disclosure are directed to a group-based communication apparatus that is configured to enable end-users (e.g., non-admin users) to initiate, by way of client devices, generation of a shareable resource associated with a group-based communication resource identifier to efficiently authorize communication between client devices associated with different organization identifiers in group-based communication interfaces associated with a shared group-based communication resource identifier.

METHOD AND ENTITY FOR CHECKING PORT CONSISTENCY OF NIDD MESSAGE
20220295268 · 2022-09-15 · ·

Embodiments of the present disclosure provide a method and an entity for checking port consistency of NIDD message. A first aspect of the present disclosure provides a method performed at a first entity (100), comprising: receiving (S101), from a second entity, a non-internet protocol data delivery, NIDD, message including one or more RDS port numbers; and determining (S102) whether the one or more RDS port numbers are within a configured RDS port list. According to embodiments of the present disclosure, network resources for transmitting the invalid NIDD data may be saved, and undesired actions in the communication system may be avoided.

System and method for SaaS/PaaS resource usage and allocation in an analytic applications environment

Systems and method for SaaS/PaaS resource usage and allocation in an analytic applications environment. An exemplary method can provide an analytic applications environment, a control plane comprising a server, the control plane further comprises a provisioning component and a console interface, a data warehouse, and a monitoring agent. The method can provision an instance of the data warehouse in the context of a tenant, the provisioned instance of the data warehouse having an initial size. Upon the provisioning the instance of the data warehouse, the method can add adding an entry to a metrics repository of the monitoring agent, the added entry indicative of the initial size of the provisioned instance of the data warehouse, the added entry being tagged, the tag being indicative of the tenant. The method can monitor, by the monitoring agent, an amount of data stored at the provisioned instance of the data warehouse.

Device-assisted services for protecting network capacity

Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity.

Traveler tracking system

Systems and methods described herein may include a memory and a computing a system in communication with said memory. The computing system may be configured to receive data from network management systems. In one embodiment, the network management system includes a network gateway. Users at venues may access external network resources using the network management system. Further, the network management systems may extract device identifiers from network packets sent from user devices to request access to external network resources. In some embodiments, the network management system may provide transmission control protocol handshake completion data to user devices. In some embodiments, the computing system also receives one or more attributes associated with the venue, user data associated with the user device, and connection data associated with communication between the user device and said external network resource.

Single user device staging
11411813 · 2022-08-09 · ·

Disclosed are various examples for staging client devices. In one example, a computing device identifies a user profile logged in a client device based on receiving a profile identifier from a management component executed on the client device. The computing device determines that user profile is to be unmanaged by a management service based on a list of associated user profiles for the client device. A message is transmitted to the client device. The message causes the management component to refrain from enforcing a plurality of policies of the management service on the client device.

Method and device for performing traffic control on user equipment

A method for performing traffic control on user equipment accessing a wireless access point includes: determining identity type information of user equipment, the user equipment being connected to a shared wireless access point provided by a wireless routing device; and preferentially scheduling traffic of the user equipment if the identity type information of the user equipment indicates that the user equipment is a preferred device, the preferred device including an owner's device of a provider of the wireless routing device.

RESOURCE APPROPRIATION IN A MULTI-TENANT ENVIRONMENT USING RISK AND VALUE MODELING SYSTEMS AND METHODS

Described embodiments provide systems and methods for resource appropriation in a multi-tenant environment using risk and value modeling. A resource server can provide a plurality of applications access to a plurality of resources in response to requests from clients based in part on risk scores and value scores. The resource server can generate and execute a risk model and a value model to determine a risk score and a value score for each of the applications. The resource server can use the risk and value scores to determine access to a particular resource for a requested application. The resource server can assign a first allocation of resource tokens to an application. The resource tokens can correspond to access privileges to plurality of resources. The resource server can dynamically modify the resource allocation for applications responsive to changes to a risk score or value score of a respective application.

Method and apparatus for allocating bandwidth based on machine learning in passive optical network

A method and apparatus for allocating a bandwidth based on machine learning in a passive optical network, the method including generating an inference model to predict a consumed bandwidth required for transmission by learning unstructured data of a PON including an OLT and traffic data corresponding to state information of the PON collected from the PON, predicting a consumed bandwidth with respect to a queue corresponding to a class requiring a low-latency service among classes of ONUS connected to the OLT based on the generated inference model, performing a VBA with respect to the queue corresponding to the class requiring the low-latency service based on the predicted consumed bandwidth, and performing a DBA with respect to a queue corresponding to a class not requiring the low-latency service using a transmission bandwidth which remains after the VBA is performed.

Method and device, and server and terminal for processing network resource access

The invention relates to the technical field of network security, in particular to a method and device for processing network resource access, a server and a terminal. The purpose is to improve network security. The technical scheme is: receiving a first access request for a target network resource, generating a second access request corresponding to the first access request according to a preset corresponding relationship, and transmitting (directly or indirectly, the same below) to a target network resource server; receiving a first response returned by the target network resource server according to the second access request (directly or indirectly, the same below), and converting the first response to generate information in an image coding format as second response information content; generating a second response according to the second response information content as a response to the first access request, and transmitting (directly or indirectly) to a user terminal.