Patent classifications
H04L67/562
METHOD OF PROCESSING SERVICE DATA, ELECTRONIC DEVICE AND STORAGE MEDIUM
A method of processing service data, an electronic device, and a storage medium are provided, which relate to a field of a computer technology, and in particular to a field of service deployment technology. The method of processing service data includes: determining, in response to receiving an operation request for a target service, a request type of the operation request; determining a target proxy module corresponding to the request type based on the request type; and sending the operation request by using the target proxy module, so that a service deployment cluster operates on the target service based on the operation request.
METHOD OF PROCESSING SERVICE DATA, ELECTRONIC DEVICE AND STORAGE MEDIUM
A method of processing service data, an electronic device, and a storage medium are provided, which relate to a field of a computer technology, and in particular to a field of service deployment technology. The method of processing service data includes: determining, in response to receiving an operation request for a target service, a request type of the operation request; determining a target proxy module corresponding to the request type based on the request type; and sending the operation request by using the target proxy module, so that a service deployment cluster operates on the target service based on the operation request.
REGULATION METHODS FOR PROXY SERVICES
Systems and methods to manage and regulate the requests of multiple proxy clients are disclosed. In one aspect, the system and methods disclosed herein aids in configuring proxy server(s) with a rate-limit functionality. Configuration of the rate-limit functionality may be realized by, but not limited to, installing configuration file(s) and/or software application(s) on the proxy server(s). The configuration provides information about the list of restricted and unrestricted domains and their respective request limit specification in a given time frame. Therefore, each time before a proxy server forwards the clients' requests to a target domain, the proxy server checks and ensures that the request count to the particular target domain is well within the limit specified in the request limit specification. Thus, the embodiments described herein aid in preventing the IP addresses of proxy service providers from being blocked or denied from the target websites.
Resource management system, resource management device, and non-transitory recording medium
A resource management system includes a resource management device that manages a usage of a resource, a reservation management device that manages a reservation for the resource, and a communication relay device that communicates with the resource management device. The resource management device receives reservation information transmitted from the reservation management device. The reservation information is information on the reservation for the resource. The resource management device transmits, to the communication relay device, a request for identification information identifying the communication relay device. The resource management device receives the identification information, which is transmitted from the communication relay device in response to the request. The identification information is used to execute an event associated with the reservation information. The resource management device transmits, to an operation display terminal that displays a usage status of the resource, the identification information and a password that is associated with the identification information.
Method and system for propagating data between different domains in a privacy focused way
A method for recording information within first-party cookies on a web browser, including propagating recorded information from a second cookie associated with a second domain to a first cookie associated with a first domain, wherein the first cookie and the second cookie are each first-party cookies, such that a first web resource of the first domain and a second web resource of the second domain each have access to the recorded information via its associated first-party cookie, and corresponding server and system.
DISTRIBUTED MULTI-ACCESS EDGE SERVICE DELIVERY
Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining capability data of a shared ledger data structure, wherein the capability data specifies one or more capability for respective ones of a plurality of service capability applications; joining a service capability application of the plurality of service capability applications to a service delivery application in dependence on the examining; and running the service delivery application, with the service capability application joined to the service delivery application. .
Privileged remote access for OT/IOT/IIOT/ICS infrastructure
Systems and methods for privileged remote access to Operational Technology (OT)/Internet of Things (IOT)/Industrial IOT (IIOT)/Industrial Control System (ICS) infrastructure, implemented in a cloud-based system. The method includes steps of, responsive to determining a user can access an application associated with the OT/IOT/IIOT/ICS infrastructure, determining the user's security and access policies and creating a session for the user; establishing a secure connection to the application via a lightweight connector connected to the application; and brokering a connection between the user's device and the application through the lightweight connector, enabling the user to interact with the application for the OT/IOT/IIOT/ICS infrastructure, based on the user's security and access policies.
BROKER CELL FOR DISTRIBUTED MESSAGE SYSTEM
Examples are disclosed that relate to message queuing telemetry transport (MQTT) broker cells. One example provides a computing system configured to implement an MQTT broker cell comprising instructions executable to operate two or more back-end brokers arranged in a matrix, the matrix comprising m vertical chains of back-end brokers and k back-end brokers in each vertical chain, each vertical chain comprising at least a head back-end broker and a tail back-end broker, each vertical chain configured to replicate a state update received at the head back-end broker through the vertical chain to the tail back-end broker, and operate n front-end brokers, each front-end broker configured to output a control message to a selected vertical chain of the m vertical chains and to output an application message for publication to subscribers and to one or more other MQTT broker cells. The instructions are further executable to operate r networking devices.
BROKER CELL FOR DISTRIBUTED MESSAGE SYSTEM
Examples are disclosed that relate to message queuing telemetry transport (MQTT) broker cells. One example provides a computing system configured to implement an MQTT broker cell comprising instructions executable to operate two or more back-end brokers arranged in a matrix, the matrix comprising m vertical chains of back-end brokers and k back-end brokers in each vertical chain, each vertical chain comprising at least a head back-end broker and a tail back-end broker, each vertical chain configured to replicate a state update received at the head back-end broker through the vertical chain to the tail back-end broker, and operate n front-end brokers, each front-end broker configured to output a control message to a selected vertical chain of the m vertical chains and to output an application message for publication to subscribers and to one or more other MQTT broker cells. The instructions are further executable to operate r networking devices.
Methods and systems of an all purpose broadband network with publish subscribe broker network
A first optimization server including a first publish-subscribe broker is configured to connect to a first cellular base transceiver station, where the first cellular base transceiver station is configured to communicatively connect to entities, including a first entity, in an RF coverage area of the first cellular base transceiver station. A second optimization server includes a second publish-subscribe broker, where the first publish-subscribe broker and the second publish-subscribe broker are part of a publish-subscribe broker network that is operable to distribute published data packets between entities that are connected to a publish-subscribe broker of the publish-subscribe broker network, where the publish-subscribe broker network is configured to route data packets published by the first entity to a second entity via the first publish-subscribe broker and the second publish-subscribe broker if the second entity has subscribed to receive the data packets published by the first entity.