Patent classifications
H04L67/303
Client manager and router
A method for managing and routing client queries within an entity is provided. The method may include receiving a client query including origination identification data associated with a sender of the client query. In response to searching in a database for history correlating to the origination identification data, determining that no relevant history exists with respect to the origination identification data. The method may include identifying the sender by identifying, within the query, a first character string identical to a first keyword stored in a classification model within a database, using the first keyword to identify a second character string that includes the first keyword in addition to other characters, identifying, from a list of sub-entities, a sub-entity associated with the first keyword and using a combination of the first keyword, the sub-entity and one or more attributes to identify the sender as an existing client.
Client manager and router
A method for managing and routing client queries within an entity is provided. The method may include receiving a client query including origination identification data associated with a sender of the client query. In response to searching in a database for history correlating to the origination identification data, determining that no relevant history exists with respect to the origination identification data. The method may include identifying the sender by identifying, within the query, a first character string identical to a first keyword stored in a classification model within a database, using the first keyword to identify a second character string that includes the first keyword in addition to other characters, identifying, from a list of sub-entities, a sub-entity associated with the first keyword and using a combination of the first keyword, the sub-entity and one or more attributes to identify the sender as an existing client.
Cross environment update of cloud resource tags
A method for updating cloud resource tags is provided. The tag associated with a cloud resource may assign the cloud resource to one or more categories to enable tracking of the cloud resource. The method may include determining, based on a synchronization profile, the scope of the update. For example, the scope of the update may encompass individual resources, groups of resources, and/or subscriptions. A metadata data store may be queried to retrieve mapping rules corresponding to tags of resources from one or more cloud service providers that are within the scope of the update. If the value of a tag does not match the value specified by the corresponding mapping rule, the value of the tag may be updated to match the value specified by the mapping rule. Related systems and articles of manufacture, including computer program products, are also provided.
Contextually driven diversion enhancement framework
An approach is provided in which the approach establishes a geo-fence around a user in response to the user invoking a video conversation corresponding to a conversational context. The approach determines an action in response to detecting an entity crossing the geo-fence. The action is based on the entity and the conversational context of the video conversation. The approach invokes the action by transmitting a message to a device in proximity to the entity.
GENERATING AND UTILIZING LOGICAL PROVISIONING MODELS TO DEPLOY NETWORK EQUIPMENT
For systems that can include, but are not limited to telecommunications, content distribution, and internetworking, the technologies described herein are generally directed to deploying network services, e.g., for large inventories of network equipment, complex deployments, and different processes being handled by isolated and difficult to modify legacy systems. For example, a method described herein can include receiving, by operations support equipment comprising a processor, a provisioning request for a network provisioning task. The method can further include, based on the network provisioning task, selecting, by the operations support equipment, a logical provisioning model to facilitate processing the provisioning request. Further, the network can include, based on the logical provisioning model, identifying, by the operations support equipment, an infrastructure engine to provision network equipment corresponding to the network provisioning task.
Restricted access to sensitive content
In one aspect, the present disclosure relates to a method including: receiving, by a client device, a request to access content stored on a remote server; determining, by the client device, that the requested content includes sensitive information based on a user profile associated with the client device; modifying, by the client device, the requested content in response to the determination that the content includes sensitive information; and providing, by client device, access to the modified content in place of the requested content that includes the sensitive information.
UE FLIGHT PATH REPORTING
A method for obtaining flight path information comprises: receiving, at a network entity, a capability report indicating a capability of a UE to report a flight path of the UE; and transmitting, from the network entity, a flight path report message that requests the UE to provide: partial-path reporting by reporting first flight path information indicative of a portion of the flight path of the UE that is less than all of the flight path; or triggered reporting by reporting second flight path information in response to occurrence of a trigger event, the second flight path information indicative of at least some of the flight path of the UE; or differential reporting by reporting third flight path information indicative of a difference between a present flight path of the UE and a previous flight path of the UE; or any combination thereof.
Graphically managing a networking device configuration
A computing device may perform a method that includes graphically presenting a plurality of virtual routing and forwarding (VRF) elements which represent a plurality of stored VRF profiles, with each VRF element presenting profile data from one of the plurality of stored VRF profiles. The method may further include receiving input selecting a VRF element which represents and presents profile data from a selected stored VRF profile and receiving input modifying the profile data presented by the selected VRF element. A VRF profile may be generated, for a networking device of a networking infrastructure, based on the selected stored VRF profile and the input modifying the profile data presented by the selected VRF element. Thereafter, a VRF element may be graphically presented which represents and presents profile data from the generated VRF profile for the networking device.
Graphically managing a networking device configuration
A computing device may perform a method that includes graphically presenting a plurality of virtual routing and forwarding (VRF) elements which represent a plurality of stored VRF profiles, with each VRF element presenting profile data from one of the plurality of stored VRF profiles. The method may further include receiving input selecting a VRF element which represents and presents profile data from a selected stored VRF profile and receiving input modifying the profile data presented by the selected VRF element. A VRF profile may be generated, for a networking device of a networking infrastructure, based on the selected stored VRF profile and the input modifying the profile data presented by the selected VRF element. Thereafter, a VRF element may be graphically presented which represents and presents profile data from the generated VRF profile for the networking device.
BLUETOOTH CONNECTION METHOD AND RELATED APPARATUS
A Bluetooth connection method and a related apparatus are disclosed, and relate to the field of short-range wireless communications technologies. A first electronic device establishes a BLE connection to a second electronic device, and exchanges data with the second electronic device based on a first connection interval. The first electronic device further establishes a BR/EDR connection to a third electronic device. When device class information of the second electronic device is the same as device class information prestored in a memory, the first electronic device exchanges data with the second electronic device based on a second connection interval. The second connection interval is greater than the first connection interval. In this way, a throughput speed of exchanging data by the third electronic device can be increased.