H04L67/562

Methods and systems of an all purpose broadband network with publish subscribe broker network

A first optimization server including a first publish-subscribe broker is configured to connect to a first cellular base transceiver station, where the first cellular base transceiver station is configured to communicatively connect to entities, including a first entity, in an RF coverage area of the first cellular base transceiver station. A second optimization server includes a second publish-subscribe broker, where the first publish-subscribe broker and the second publish-subscribe broker are part of a publish-subscribe broker network that is operable to distribute published data packets between entities that are connected to a publish-subscribe broker of the publish-subscribe broker network, where the publish-subscribe broker network is configured to route data packets published by the first entity to a second entity via the first publish-subscribe broker and the second publish-subscribe broker if the second entity has subscribed to receive the data packets published by the first entity.

APPARATUSES AND METHODS FOR REDUCING LATENCY IN A CONVEYANCE OF DATA IN NETWORKS

Aspects of the disclosure may include, for example, determining, by a first processing system, that first data is unavailable within a first storage device of the first processing system, resulting in a first determination, determining, based on the first determination, that the first data is available within a second storage device of a second processing system, resulting in a second determination, wherein the first processing system and the second processing system are included in a first tier of a processing system hierarchy, and wherein the processing system hierarchy includes a second tier, the second tier including a third processing system, obtaining, based on the second determination, the first data from the second storage device of the second processing system, and transmitting, based on the obtaining of the first data from the second storage device of the second processing system, the first data to a communication device. Other embodiments are disclosed.

SECURITY BROKER WITH CONSUMER PROXYING FOR TEE-PROTECTED SERVICES

The technology disclosed herein enable a consumer to verify the integrity of services running in trusted execution environments. An example method may include: receiving, by a broker device, a request to verify that a service is executing in a trusted execution environment, wherein the request comprises data identifying the service; determining, by the broker device, a computing device that is executing the service; initiating, by the broker device, a remote integrity check of the computing device executing the service; receiving, by the broker device, integrity data of the trusted execution environment of the computing device; and providing, by the broker device, the integrity data to a consumer device associated with the service.

AUDITABLE AND TAMPER-RESISTANT REMOTE ZERO TRUST ACCESS
20230034771 · 2023-02-02 ·

A routing service, associated with a peer-to-peer blockchain network, receives data from a computer device, and executes policy decisions regarding access to a resource. A connection management broker receives data from the routing service, and executes policy enforcement regarding access to the resource, thereby providing access to the resource via an implicit trust zone. The connections among the computer device, distributed cloud-based access control, authentication, and routing service, and the connection management broker comprise an untrusted zone. The routing service has no access or visibility to the resource. Upon roaming by the computer device or the connection management broker across multiple access points, statuses are provided by the computer device, the connection management broker, and the routing service.

AUDITABLE AND TAMPER-RESISTANT REMOTE ZERO TRUST ACCESS
20230034771 · 2023-02-02 ·

A routing service, associated with a peer-to-peer blockchain network, receives data from a computer device, and executes policy decisions regarding access to a resource. A connection management broker receives data from the routing service, and executes policy enforcement regarding access to the resource, thereby providing access to the resource via an implicit trust zone. The connections among the computer device, distributed cloud-based access control, authentication, and routing service, and the connection management broker comprise an untrusted zone. The routing service has no access or visibility to the resource. Upon roaming by the computer device or the connection management broker across multiple access points, statuses are provided by the computer device, the connection management broker, and the routing service.

Intelligent edge computing platform with machine learning capability

An edge computing platform with machine learning capability is provided between a local network with a plurality of sensors and a remote network. A machine learning model is created and trained in the remote network using aggregated sensor data and deployed to the edge platform. Before being deployed, the model is edge-converted (“edge-ified”) to run optimally with the constrained resources of the edge device and with the same or better level of accuracy. The “edge-ified” model is adapted to operate on continuous streams of sensor data in real-time and produce inferences. The inferences can be used to determine actions to take in the local network without communication to the remote network. A closed-loop arrangement between the edge platform and remote network provides for periodically evaluating and iteratively updating the edge-based model.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR UTILIZING MACHINE LEARNING TO AUTOMATICALLY CONFIGURE FILTERS AT A NETWORK PACKET BROKER

A method for network flow metadata processing at a network packet broker is described herein. The method includes, receiving, as input at a network packet broker, network traffic flow data, aggregating the network traffic flow data over a predefined time period to generate Internet protocol (IP) flow feature vectors containing metadata parameters associated with one or more particular endpoint devices, and providing the IP flow feature vectors to a machine learning element in the network packet broker. The method further includes identifying, by the machine learning element, anomalies existing in the metadata parameters included in the IP flow feature vectors, and automatically configuring one or more filter elements in the network packet broker in response to detecting the identified anomalies of the IP flow feature vectors.

Curating proxy server pools
11616848 · 2023-03-28 · ·

A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.

Curating proxy server pools
11616848 · 2023-03-28 · ·

A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.

System and method for remote support, and web application server for executing the same

A system for a remote support according an embodiment includes a web viewer configured to receive a request for execution of a remote support service from a logged-in administrator, a web application server configured to receive a request for generation of a connection space for the remote support service from the web viewer and generate a first connection space and a first connection code for identifying the first connection space based on the request for generation, a relay server configured to receive the first connection code, generate a second connection space in which the first connection code is stored, and receive a request for provision of the remote support service from a mobile terminal, and a message broker configured to mediate a plurality of message queues between the first connection space and the second connection space for the remote support service between the web viewer and the mobile terminal.