Patent classifications
H04L67/1001
Intelligent asynchronous data exchange across microservices in a distributed environment
In an example embodiment, a specialized architecture is utilized in conjunction with a message broker to enable asynchronous communications. The specialized architecture provides central components within each data center to enable the communication, and also is able to segregate functionality across different microservice landscapes. A message broker alone may not be sharable across data centers for various technical reasons, such as security concerns, latency, or other technical constraints. Topic names may be utilized by the message broker to ensure delivery of the message to the correct microservice in the other data center.
System providing faster and more efficient data communication
A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers.
System providing faster and more efficient data communication
A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers.
Methods and systems for enhancing cyber security in networks
The present application is directed a computer-implemented technique for enhancing security and preventing cyber-attacks on a network. The technique includes receiving information from user equipment, selecting a first VPN server from a VPN service provider based upon a traffic-type of the user equipment, creating a policy to prevent cyber-attacks such that traffic associated with the received information of the user equipment is routed to the first VPN server, provisioning the first VPN server to last a predetermined amount of time based on the policy, coordinating the policy with a router on the network, with the traffic being sent to the VPN server via the router, and sending, after a predetermined condition is met, a request to the VPN service provider to transmit a second VPN server, and where the first VPN server terminates.
Methods and systems for enhancing cyber security in networks
The present application is directed a computer-implemented technique for enhancing security and preventing cyber-attacks on a network. The technique includes receiving information from user equipment, selecting a first VPN server from a VPN service provider based upon a traffic-type of the user equipment, creating a policy to prevent cyber-attacks such that traffic associated with the received information of the user equipment is routed to the first VPN server, provisioning the first VPN server to last a predetermined amount of time based on the policy, coordinating the policy with a router on the network, with the traffic being sent to the VPN server via the router, and sending, after a predetermined condition is met, a request to the VPN service provider to transmit a second VPN server, and where the first VPN server terminates.
Service registration based on service capabilities requirements and preferences
A registrar entity, such as a service layer gateway, obtains the service capabilities requirements or preferences of a new registree entity, such as an application, and only accepts a registration of the registree if the registrar has sufficient remaining service capacities to meet the service capabilities requirements or preferences of the registree entity while ensuring that the provision of support to existing registree entities is not impacted. If the registrar lacks the capabilities to satisfy the requirements or preferences, it may contact a server to identify another registrar which has the capabilities. Updates to requirements or preference may originate at any node, e.g., at a user equipment device or a service.
Method and apparatus for native authentication to cloud services with identity management of on-premise applications from the cloud
A technique is provided that enables native authentication to cloud services by employing identity management of on-premise applications from the cloud. More specifically, a Web-service interface built on an innovative orchestration of platform-independent container technology is created. An identity management application is made available inside a container and which therefore can execute in any cloud-service provider. Specifically, this application can communicate back into a business' on-premise applications, using the Representation State Transfer (REST) application programming interface architecture. The container is published to the cloud for users to download. Thus, for example, by way of this technique, a user can log onto any cloud application with using the same logon information the user uses on-premise.
Method and apparatus for native authentication to cloud services with identity management of on-premise applications from the cloud
A technique is provided that enables native authentication to cloud services by employing identity management of on-premise applications from the cloud. More specifically, a Web-service interface built on an innovative orchestration of platform-independent container technology is created. An identity management application is made available inside a container and which therefore can execute in any cloud-service provider. Specifically, this application can communicate back into a business' on-premise applications, using the Representation State Transfer (REST) application programming interface architecture. The container is published to the cloud for users to download. Thus, for example, by way of this technique, a user can log onto any cloud application with using the same logon information the user uses on-premise.
Information processing apparatus, information processing system, non-transitory computer-readable medium, and information processing method
Provided are a request processing unit to send a first process distribution request to other information processing apparatuses via a communication I/F unit, the first process distribution request being a request for ordering execution of a first process on a first; and an order destination selecting unit to receive, via the communication I/F unit, as a response to the first process distribution request, a first estimated reply time calculated as the time required to receive the transfer of the first data and to reply a first process result obtained by executing the first process on the first data, to use the first estimated reply time to select an order destination to which the execution of the first process is to be ordered by the plurality of information processing apparatuses, and to order the execution of the first process on the first data to the order destination via the communication interface unit.
Information processing apparatus, information processing system, non-transitory computer-readable medium, and information processing method
Provided are a request processing unit to send a first process distribution request to other information processing apparatuses via a communication I/F unit, the first process distribution request being a request for ordering execution of a first process on a first; and an order destination selecting unit to receive, via the communication I/F unit, as a response to the first process distribution request, a first estimated reply time calculated as the time required to receive the transfer of the first data and to reply a first process result obtained by executing the first process on the first data, to use the first estimated reply time to select an order destination to which the execution of the first process is to be ordered by the plurality of information processing apparatuses, and to order the execution of the first process on the first data to the order destination via the communication interface unit.