Patent classifications
H04L63/0414
Headless browser system with virtual API
Systems, methods, and computer-readable storage devices to enable virtual API technology embodied in an SDK for use within a mobile application, a mobile payment wallet, or a mobile operating system.
Systems, methods, and devices for digital advertising ecosystems implementing content delivery networks utilizing edge computing
Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.
Mutually secure optical data network and method
A digital optical data network system for improving information security in Passive Optical Networks (“PON”) by providing virtual information separation in the router, such as a premise router, or routers interfacing the entire PON, such as by utilizing virtual routing and forwarding, thus allowing safe data traffic between multiple carriers, service providers accessing the PON and multiple end users on the PON such as tenants in a building, employees of a business entity, or subscribers in a residential community.
MEDIA ACCESS CONTROL (MAC) ADDRESS ANONYMIZATION BASED ON ALLOCATIONS BY NETWORK CONTROLLER ELEMENTS
A method is provided to anonymize the media access control (MAC) address of a client device. The method involves generating a plurality of media access control (MAC) addresses for use by a client device in a network. Policies are defined that determine which one of the plurality of MAC addresses is to be used by the client device. The plurality of MAC addresses allocated for use by the client device are registered with a management entity in the network.
MOBILE DEVICE IDENTIFICATION USING SECOND ENTITY MATCHING
An improved technique for identifying a user's mobile device is discussed. A persistent and unified identifier that bridges mobile app to mobile web and to other web browser-compatible mediums is utilized. Using a unique verification identifier, the unified identifier is consistently verified, revived and distributed across application and browser mediums.
INVISIBLE MIDDLEWARE FOR ASYNCHRONOUS COMMUNICATION
Embodiments herein describe middleware that serves as an intermediary between two computing systems performing asynchronous communication. Rather than communicating directly with each other, the two computing system communicate with the middleware; however, the middleware can be introduced seamlessly so that the two system believe they are communicating with each other rather than the middleware—i.e., the middleware is invisible to the systems. Asynchronous communication with guaranteed delivery may require the two computing systems to perform a handshake operation where the computing system transmitting the object does not consider the task complete until receiving a confirmation from the receiving computing system that the object was processed successfully.
Handling of unique identifiers for stations
Methods, systems, and computer readable media can be operable to facilitate an exchange of messages between an access point and a station, wherein the access point requests a unique identifier from the station. The station may either respond with a message declining to provide a unique identifier or respond with a message including a unique identifier to be used by the access point for the station. The response from the station may include additional limitations on the use of the unique identifier by the access point. The access point may enforce different policies against a station depending upon how the station responds to the unique identifier request.
External function invocation by a data system
A query referencing a function associated with a remote software component is received by a network-based data warehouse system. Temporary security credentials corresponding to a role at a cloud computing service platform are obtained. The role has permission to send calls to a web endpoint corresponding to the remote software component. A request comprising input data and electronically signed using the temporary security credentials is sent to a web Application Programming Interface (API) management system of the cloud computing service platform. The request, when received by the web API management system, causes the web API management system to invoke external functionality provided by the remote software component at the web endpoint with respect to the input data. A response comprising a result of invoking the external functionality is received from the web API management system, and the result data is processed according to the query.
Data cleansing system and method
System and method for updating customer data that includes a plurality of electronically stored contact records that each include contact information for a respective individual contact. Filtering is applied to the customer data to identify contacts that fall within defined filtering criteria. Information about the identified contacts is provided to a decision making authority for a further layer of filtering. Customer data is updated based on feedback derived from the decision making authority.
Transient identification generation
In an approach to transient identification generation, one or more computer processors receive a request for one or more identification artifacts associated with a user from a requesting entity. One or more computer processors determine a first set of identification artifacts. One or more computer processors transmit the first set of identification artifacts to the requesting entity. One or more computer processors determine whether the first set of identification artifacts is an approved response to the request for the one or more identification artifacts. In response to determining the first set of identification artifacts is the approved response to the request for the one or more identification artifacts, one or more computer processors generate a transient identification that includes the first set of identification artifacts. One or more computer processors transmit the transient identification to the requesting entity.