H04L67/025

Software-based fabric enablement
11706087 · 2023-07-18 · ·

A first fabric abstraction layer couples to a data link layer and a physical layer of a network fabric device. The network fabric device is connected to other network elements within a network via at least one network connection, such as a fiber optic connection. A second fabric abstraction layer couples to the data link layer and an application of the network device. The second fabric abstraction layer provides an application programming interface (API) to the application. The API allows the application to generate configuration instructions for configuring the at least one network connection. Upon receiving the configuration instructions generated by the application, the second abstraction layer sends the configuration instructions to the first abstraction layer via the data link layer. The first abstraction layer then configures the at least one network connection to transmit data according to the configuration instructions.

Software-based fabric enablement
11706087 · 2023-07-18 · ·

A first fabric abstraction layer couples to a data link layer and a physical layer of a network fabric device. The network fabric device is connected to other network elements within a network via at least one network connection, such as a fiber optic connection. A second fabric abstraction layer couples to the data link layer and an application of the network device. The second fabric abstraction layer provides an application programming interface (API) to the application. The API allows the application to generate configuration instructions for configuring the at least one network connection. Upon receiving the configuration instructions generated by the application, the second abstraction layer sends the configuration instructions to the first abstraction layer via the data link layer. The first abstraction layer then configures the at least one network connection to transmit data according to the configuration instructions.

Gracefully handling endpoint feedback when starting to monitor

A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed.

Gracefully handling endpoint feedback when starting to monitor

A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed.

Adaptive Signaling for Network Performance Measurement, Access, and Control
20230224374 · 2023-07-13 ·

Systems and methods are provided for initiation, use, access, and control of functionality of a network. In one aspect, the systems and methods can be utilized to generate information defining signaling or control performance and operational characteristics associated with the functionality in a variety of network environments. In another aspect, based on such information, adaptive signaling can be utilized to monitor, analyze and detect specific signaling signatures associated with the functionality. Managing signaling or control messages in response to information collected by monitoring and analyzing the adaptive signaling permits originating or requesting the functionality without conventional operation of a network component.

COMMAND SERVICES MANAGER FOR SECURE SHARING OF COMMANDS TO REGISTERED AGENTS
20230013916 · 2023-01-19 ·

A command services manager of a control device can receive a command from a user interface device and provide for the storing and sharing of the command with one or more service providers so as to provide an improved user experience. Media service providers can register with a network resource associated with the command services manager. The command can be encrypted and stored locally at the control device or remotely at a network resource and be sent to a registered media service provider so that the media service provider can provide improved search responses and/or customize the interaction with the user, recommendation of content availability from other service providers, etc. The command services manager can also receive notifications from the media service provider and provide the notifications to the user, for example, notifications indicative of the success or failure of a command.

METHODS AND APPARATUS FOR HINDRANCE OF ADVERSE AND DETRIMENTAL DIGITAL CONTENT IN COMPUTER NETWORKS
20230014242 · 2023-01-19 ·

A network computer system provides logic to cause a client compute device to perform operations in connection with the client compute device rendering a publisher's webpage. The operations performed by the client compute device include retrieving rules from a collection of rules, each rule of the collection being associated with at least one of a plurality of third-party digital content identifiers, each third-party digital content identifier uniquely identifying a corresponding third-party digital content; detection of execution of a third-party tag on the client compute device, including identifying a digital content identifier that is utilized in execution of the third-party tag; matching the digital content identifier of the executing third-party tag to one of the retrieved rules; and implementing a security or compliance operation with respect to the third-party tag based at least in part on the matched rule.

SYSTEM AND METHOD FOR RULES ENGINE THAT DYNAMICALLY ADAPTS APPLICATION BEHAVIOR
20230017196 · 2023-01-19 ·

In some implementations, a system enables an administrator to customize a set of rules to dynamically adjust the configuration and output of an application provided to users. A configuration interface for setting rules that dynamically adjust output of an application is provided. Data indicating one or more rules are received through the configuration interface. Activity data indicating user interaction with the application or sensor data for at least some of a plurality of users of the application are then received from multiple client devices. A determination relating to the activity data satisfying at least one condition or trigger is then made. Instructions to adjust output of the application according to one or more system actions of the one or more rules are then communicated to client devices associated with the users in the first subset of the plurality of users.

SYSTEM AND METHOD FOR RULES ENGINE THAT DYNAMICALLY ADAPTS APPLICATION BEHAVIOR
20230017196 · 2023-01-19 ·

In some implementations, a system enables an administrator to customize a set of rules to dynamically adjust the configuration and output of an application provided to users. A configuration interface for setting rules that dynamically adjust output of an application is provided. Data indicating one or more rules are received through the configuration interface. Activity data indicating user interaction with the application or sensor data for at least some of a plurality of users of the application are then received from multiple client devices. A determination relating to the activity data satisfying at least one condition or trigger is then made. Instructions to adjust output of the application according to one or more system actions of the one or more rules are then communicated to client devices associated with the users in the first subset of the plurality of users.

ENHANCING ONLINE CONTENTS BASED ON DIGITAL ALLIANCE DATA

One or more non-transitory storage media storing instructions which, when executed by one or more computing devices, cause performance of a method of enhancing online contents based on digital alliance data are disclosed. The method comprising receiving from a web server a webpage at a first user device associated with a first user and a first user account managed by a communication data management server; extracting a type of data of a plurality types of data from a body or metadata of the webpage; and determining that the type of data matches certain data regarding an organization. The method further comprises updating the webpage with specific data related to one or more members or contacts of an alliance network of the first user account that are associated with the organization; and causing displaying the updated webpage by the first user device.