H04L67/025

AUTOMATED MONITORING OF INFRASTRUCTURE AND APPLICATION ON CLOUD

Disclosed herein are system, method, and computer program product embodiments for determining monitoring compliance for an enterprise application deployed on an application delivery platform. Existing resources, monitors and alerts are discovered with gaps in monitoring being calculated based on a comparison of monitoring objectives and the existing monitors and alerts. Gaps in monitoring are reported in a GUI reflecting effectiveness of existing monitors.

DIGITAL PHOTO FRAME, A SYSTEM THEREOF, AND A METHOD THEREOF
20230044090 · 2023-02-09 ·

The present disclosure provides a method for generating a code by a digital photo frame. The method including receiving, from the terminal and by a controller of the digital photo frame, a request for connecting the terminal to the digital photo frame; and generating, by the controller of the digital photo frame, a code according to authorization information of the digital photo frame, wherein a server issuing the authorization information of the digital photo frame does not generate the code. The present disclosure also provides a method for transmitting photos or videos between a terminal and a digital photo frame, the method comprising: receiving a request for transmitting the photos or the videos; determining whether the digital photo frame and the terminal use a same WLAN; and instructing the terminal or the digital photo frame to transmit the photos or the videos via the WLAN.

SECURITY NETWORK INTEGRATING SECURITY SYSTEM AND NETWORK DEVICES

Systems and methods for a security network integrating security system and network devices are disclosed. A system may comprise a gateway and first and second security panels, each located at a premises. The first and second security panels may be connected, via respective first and second wireless communication protocols, to respective first and second security system components. The first and second security panels may receive respective first and second security data from the respective first and second security system components. The gateway may be configured to receive, via the first and second wireless communication protocols, the respective first and second security data. The gateway may be configured to transmit at least one of the first security data and the second security data to a security server located external to the premises.

SECURITY NETWORK INTEGRATING SECURITY SYSTEM AND NETWORK DEVICES

Systems and methods for a security network integrating security system and network devices are disclosed. A system may comprise a gateway and first and second security panels, each located at a premises. The first and second security panels may be connected, via respective first and second wireless communication protocols, to respective first and second security system components. The first and second security panels may receive respective first and second security data from the respective first and second security system components. The gateway may be configured to receive, via the first and second wireless communication protocols, the respective first and second security data. The gateway may be configured to transmit at least one of the first security data and the second security data to a security server located external to the premises.

System and method for content fetching using a selected intermediary device and multiple servers
11558215 · 2023-01-17 · ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

System and method for content fetching using a selected intermediary device and multiple servers
11558215 · 2023-01-17 · ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

Micro-Service Management Platform Relating to Battery Management
20230011254 · 2023-01-12 ·

The present invention relates to a service platform implemented by one or more computers. The platform comprises one or more micro-services, each micro-service having a standardized generic structure comprising: a subservice implementing a business function, a messaging sub-service. The platform also includes a communication system for exchanging data and messages, referred to as unified communication system.

IoT device identification with packet flow behavior machine learning model
11552975 · 2023-01-10 · ·

Identifying Internet of Things (IoT) devices with packet flow behavior including by using machine learning models is disclosed. Information associated with a network communication of an IoT device is received. A determination of whether the IoT device has previously been classified is made. In response to determining that the IoT device has not previously been classified, a determination is made that a probability match for the IoT device against a behavior signature exceeds a threshold. Based at least in part on the probability match, a classification of the IoT device is provided to a security appliance configured to apply a policy to the IoT device.

Monitoring system and method for connecting a monitoring device to a service server
11595351 · 2023-02-28 · ·

Methods for configuring a monitoring device to communicate with a service server are provided. The method includes the monitoring device sending a message including a code used for authentication of the monitoring device to a control server, receiving one or more addresses of a service server associated with the monitoring device from the control server in response to the monitoring device being authenticated by the control server, storing the one or more addresses retrieved by the control server, and establishing a connection between the monitoring device and the service server using at least one of the one or more addresses received from the control server.

Monitoring system and method for connecting a monitoring device to a service server
11595351 · 2023-02-28 · ·

Methods for configuring a monitoring device to communicate with a service server are provided. The method includes the monitoring device sending a message including a code used for authentication of the monitoring device to a control server, receiving one or more addresses of a service server associated with the monitoring device from the control server in response to the monitoring device being authenticated by the control server, storing the one or more addresses retrieved by the control server, and establishing a connection between the monitoring device and the service server using at least one of the one or more addresses received from the control server.