H04L67/145

METHODS AND SYSTEMS FOR COMMUNICATION MANAGEMENT
20210400422 · 2021-12-23 ·

Methods and systems for communication management are disclosed. A computing device may receive a computing request. The computing device may determine a timeout parameter associated with the computing request. A notification may be sent if the timeout parameter is predicted to be exceeded or if the timeout parameter is exceeded.

Content management system connect

In embodiments, a computer program may be stored on a storage medium for securely inserting portions of content maintained on external web servers into an online community web page. The computer program may comprise a set of instructions operable to cause a computer to receive a request to render a web page maintained within a social platform, the web page including embedded settings that refer to content on one or more remote servers. The computer program may further cause the computer to retrieve, at a rendering time of the web page, based at least in part on the embedded settings, content from the one or more remote servers, process the retrieved content in a secured environment according to one or more security protocols and insert it into the web page. In embodiments, the computer program may further cause the computer to render the web page in a main window and the inserted content in an isolated custom window. Related methods and apparatus are also presented.

SYSTEM AND METHOD FOR CONNECTION CONCENTRATION IN A DATABASE ENVIRONMENT

In accordance with an embodiment, described herein is a system and method for connection concentration in a database environment. A transparency engine provided between client applications and a database can include a connection pool (e.g., UCP connection pool). The transparency engine can operate as a proxy engine for the database and as a session abstraction layer for the client applications, to enable the client applications to utilize features provided by the connection pool without code changes. The transparency engine can receive application connections from the client applications, and concentrate the application connections on a smaller number of database connections maintained in the connection pool.

System and Method for Creating and Analyzing A Low-Dimension Representation of Webpage Sequence
20210383459 · 2021-12-09 ·

Methods and systems for creating and analyzing low-dimensional representation of webpage sequences are described. Network traffic history data associated with a particular website is retrieved and a word embedding algorithm is applied to the network traffic history data to produce a low dimensional embedding. A prediction model is created based on the low-dimensional embedding. Browsing activity on the particular website is monitored. A set of sessions in the current browsing activity is flagged based on a result of applying the prediction model to the monitored browsing activity.

SYSTEM AND METHOD FOR CORRELATING KEEP-ALIVE CONNECTION COMMUNICATIONS WITH UNARY CONNECTION COMMUNICATIONS
20210385285 · 2021-12-09 ·

Embodiments are directed towards a system and method of employing a bridge service to coordinate messages from a keep-alive connection between a head unit of a vehicle and a connection broker with microservices via unary connections. The bridge service stores configuration information that maps topic connection information for the keep-alive connection with microservice connection information. The bridge service subscribes with the connection broker to topics associated with the microservices based on the configuration information. A message that is published to the keep-alive connection having a published topic that corresponds to a subscribed topic is received from the connection broker. The microservice connection information that maps to the published topic is selected based on the configuration information. The bridge service establishes a unary connection with a microservice based on the selected microservice connection information, which is utilized to provide message payload information from the bridge service to the microservice.

ELECTRONIC DEVICE AND METHOD FOR CONTINUOUSLY REPRODUCING MULTIMEDIA CONTENT IN EXTERNAL ELECTRONIC DEVICE

An electronic device and a method for controlling the electronic device are provided. Multimedia content is reproduced in the electronic device. After the reproduction of the multimedia content in the electronic device, a display of the electronic device is controlled to display a plurality of objects respectively indicating a plurality of external devices which is identified by the electronic device. In response to input to an object among the plurality of objects, an external device indicated by the object is authorized to continuously reproduce multimedia content.

FEDERATED IDENTITY MANAGEMENT WITH DECENTRALIZED COMPUTING PLATFORMS

Provided is a process that establishes user identities within a decentralized data store, like a blockchain. A user's mobile device may establish credential values within a trusted execution environment of the mobile device. Representations of those credentials may be generated on the mobile device and transmitted for storage in association with an identity of the user established on the blockchain. Similarly, one or more key-pairs may be generated or otherwise used by the mobile device for signatures and signature verification. Private keys may remain resident on the device (or known and input by the user) while corresponding public keys may be stored in associated with the user identity on the blockchain. A private key is used to sign representations of credentials and other values as a proof of knowledge of the private key and credential values for authentication of the user to the user identity on the blockchain.

SYSTEMS AND METHODS FOR IDENTITY AND ACCESS MANAGEMENT WITH EXTENDED TRUST

An identity and access management (IAM) extended trust server (ETS) can work with a cloud-based IAM platform to authorize a user in a home zone to access a resource such as an enterprise application in an enterprise computing network. The IAM ETS receives a request from the user to access another resource, determines that other resource resides in a geographical zone that is different from the home zone, checks with the cloud-based IAM platform on whether the user is authorized to access the resource in the geographical zone, and responsive to an indication from the cloud-based IAM platform that the user is authorized to access the resource in the geographical zone, redirects a browser on the user device to the resource in the geographical zone without initiating a new session for the user, thereby providing the user with seamless access across multiple zones in a single global session.

SECURE SESSION RESUME
20220210230 · 2022-06-30 ·

Techniques are disclosed for providing secure resume of sessions such as, for example, application sessions. An example methodology implementing the techniques includes receiving, by a computing device, a request to resume a session, the session being hosted on a remote computer system and accessible by the computing device to enable display of content of the session via the computing device. The method also includes initiating one or more actions on the remote computer system to prevent content of the session from being visible on the computing device in response to resumption of the session and resuming the session on the remote computer system such that the content of the session is hidden from view within a display of the computing device as a result of the initiation of the one or more actions.

High performance wireless network

A wireless mesh network is described. The mesh network uses a plurality of data communications nodes that are organized in a tree-like structure. The network also includes an access server which communicates with the nodes. The mesh network nodes are one or more root access point nodes having a wired connection to an external network; and one or more mesh access point nodes. Both types of nodes communicate with an external network. Each non-root node automatically connects to an associated parent node selected from one or more nodes within a direct wireless communication range of the node. The node selects a parent node based on one or more parent selection criteria from the access server and establishes a connection to the selected parent node. The node then calculates its routing path to the external network. The nodes include unique identifiers and two or more radios.