H04L67/561

Techniques for selective container access to cloud services based on hosting node

A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.

PROXY SERVICES FOR THE SECURE UPLOAD OF FILE SYSTEM TREE STRUCTURES
20230007016 · 2023-01-05 ·

The disclosure is directed towards proxy services for the secure uploading of file-system tree structures. A method includes receiving, at a web security service, an indication that client device to upload content to a storage cloud provider. The proxy service performs a security scan of the content while the content is stored on the client device. A security and/or a privacy concern is identified in the content stored on the client device. A security and/or privacy mitigation action is performed in response to identifying the security and/or privacy concern.

PROXY SERVICES FOR THE SECURE UPLOAD OF FILE SYSTEM TREE STRUCTURES
20230007016 · 2023-01-05 ·

The disclosure is directed towards proxy services for the secure uploading of file-system tree structures. A method includes receiving, at a web security service, an indication that client device to upload content to a storage cloud provider. The proxy service performs a security scan of the content while the content is stored on the client device. A security and/or a privacy concern is identified in the content stored on the client device. A security and/or privacy mitigation action is performed in response to identifying the security and/or privacy concern.

Local servers for managing an intermittent network

A method of managing an intermittent network includes, with a local network manager executed by a processor of a local server, managing at least one local client device to use the local server as a proxy server. The method includes, with an internet connection manager executed by the processor of the local server, transferring data between an internet and the local server based on a quality and speed of a connection to the internet, and, with an update manager, sending data downloaded from the internet by the local server to the local client device. The method includes, with an analytics manager, retrieving analytics data from the local client device. The local server restricts the local client device from accessing the internet through the local server.

Local servers for managing an intermittent network

A method of managing an intermittent network includes, with a local network manager executed by a processor of a local server, managing at least one local client device to use the local server as a proxy server. The method includes, with an internet connection manager executed by the processor of the local server, transferring data between an internet and the local server based on a quality and speed of a connection to the internet, and, with an update manager, sending data downloaded from the internet by the local server to the local client device. The method includes, with an analytics manager, retrieving analytics data from the local client device. The local server restricts the local client device from accessing the internet through the local server.

Group-based communication interface with subsidiary file communications

A group-based communication interface with subsidiary file communications is described. A request to share a file in a feed of a group-based communication platform can be received, wherein the feed comprises a channel, a thread, or a direct message associated with a group of the group-based communication platform. A representation of the file can be rendered in a user interface presented via client device(s) of user(s) associated with the group, wherein the representation of the file is associated with an engageable link for accessing the file, and wherein a thread summary indicator, representing a thread of message(s) associated with the file, is presented proximate the representation of the file. Based at least in part on receiving an indication of an interaction with the thread summary indicator, the message(s) associated with the thread can be rendered in the user interface proximate the representation of the file.

Group-based communication interface with subsidiary file communications

A group-based communication interface with subsidiary file communications is described. A request to share a file in a feed of a group-based communication platform can be received, wherein the feed comprises a channel, a thread, or a direct message associated with a group of the group-based communication platform. A representation of the file can be rendered in a user interface presented via client device(s) of user(s) associated with the group, wherein the representation of the file is associated with an engageable link for accessing the file, and wherein a thread summary indicator, representing a thread of message(s) associated with the file, is presented proximate the representation of the file. Based at least in part on receiving an indication of an interaction with the thread summary indicator, the message(s) associated with the thread can be rendered in the user interface proximate the representation of the file.

Data system on a module (DSoM) for connecting computing devices and cloud-based services
11537631 · 2022-12-27 · ·

A communication device (e.g., a data system on a module (DSoM)/a Data System in a Package (DSiP)) for communicatively coupling a computing device with a cloud-based service to synchronize one or more data modifications, on an asynchronous basis with respect to one another is provided. The communication device may be configured to be communicatively coupled to the computing device and may include a wireless cellular transceiver. The communication device may be configured to one or more of transmit at least one data object from the computing device to the cloud-based service and receive at least one data object from the cloud-based service. Embodiments of the present disclosure may provide a distributed replicated spatiotemporal database packaged on a communication device and integrated with an internet-based secure communication hub.

Data system on a module (DSoM) for connecting computing devices and cloud-based services
11537631 · 2022-12-27 · ·

A communication device (e.g., a data system on a module (DSoM)/a Data System in a Package (DSiP)) for communicatively coupling a computing device with a cloud-based service to synchronize one or more data modifications, on an asynchronous basis with respect to one another is provided. The communication device may be configured to be communicatively coupled to the computing device and may include a wireless cellular transceiver. The communication device may be configured to one or more of transmit at least one data object from the computing device to the cloud-based service and receive at least one data object from the cloud-based service. Embodiments of the present disclosure may provide a distributed replicated spatiotemporal database packaged on a communication device and integrated with an internet-based secure communication hub.

Relay server, authentication system, and relay method
11539696 · 2022-12-27 · ·

A relay server, an authentication system, and a relay method. The relay server receives an authentication request including authentication parameters from a device, determines whether the authentication parameters included in the authentication request are sufficient for an authentication process performed at an authentication server, assigns one or more missing authentication parameters to the authentication request when the authentication parameters included in the authentication request are determined to be insufficient, and relays the authentication request to the authentication server.