Patent classifications
H04L67/562
Inline frame monitoring
An example inline frame monitor is disclosed. The inline frame monitor injects monitoring logic into a document object model to monitor an activity within a dynamically loaded inline frame of a web page. Data regarding the activity within the dynamically loaded inline frame is received. A policy is applied to validate or invalidate the activity within the dynamically loaded inline frame.
Inline frame monitoring
An example inline frame monitor is disclosed. The inline frame monitor injects monitoring logic into a document object model to monitor an activity within a dynamically loaded inline frame of a web page. Data regarding the activity within the dynamically loaded inline frame is received. A policy is applied to validate or invalidate the activity within the dynamically loaded inline frame.
System and method for discovering interfaces in a network
A system and method for discovering interfaces in a network is provided wherein a remote system is configured to discover by connecting to plurality of servers, and intelligently stitching together interfaces that exist between different applications. The remote system is configured to identify these interfaces through message queue servers in the network and their queue managers. Further, stitching together the interfaces is done based upon the hops that a message performs from one system to its target application using message queues. Interface name is created by reading message header, applications involved and queue properties. The system capabilities also include tracking the usage of interfaces based on the traffic that is flowing through them. The system provides a repeatable process to obtain accurate repository of interfaces.
System and method for discovering interfaces in a network
A system and method for discovering interfaces in a network is provided wherein a remote system is configured to discover by connecting to plurality of servers, and intelligently stitching together interfaces that exist between different applications. The remote system is configured to identify these interfaces through message queue servers in the network and their queue managers. Further, stitching together the interfaces is done based upon the hops that a message performs from one system to its target application using message queues. Interface name is created by reading message header, applications involved and queue properties. The system capabilities also include tracking the usage of interfaces based on the traffic that is flowing through them. The system provides a repeatable process to obtain accurate repository of interfaces.
Secure remotely controlled system, device, and method
A system, device, and method for implementing secure control over audio-visual (AV) equipment connected to an AV gateway is disclosed. The solution includes utilizing a user device to remotely control the AV gateway by connecting both the user device and the AV gateway to an Internet of Things (IoT) network, and facilitating communication between the user device and the AV gateway via messages using an MQTT broker or IoT cloud services.
Secure remotely controlled system, device, and method
A system, device, and method for implementing secure control over audio-visual (AV) equipment connected to an AV gateway is disclosed. The solution includes utilizing a user device to remotely control the AV gateway by connecting both the user device and the AV gateway to an Internet of Things (IoT) network, and facilitating communication between the user device and the AV gateway via messages using an MQTT broker or IoT cloud services.
Methods, systems, and computer readable media for distributing network function (NF) high availability (HA) topology information in a core network
A method for distributing network function (NF) high availability (HA) topology information in a core network includes, at an NF repository function (NRF) including at least one processor, receiving, from a plurality of producer NFs in an NF set, NFRegister requests including NF HA topology information for the producer NFs. The method further includes registering the producer NFs and storing the NF HA topology information for the producer NFs. The method further includes receiving, from a consumer NF or service communication proxy (SCP), an NFDiscover request containing at least one service discovery parameter that corresponds to a service provided by the producer NFs. The method further includes responding to the NFDiscover request by generating an NFDiscover response, including, in the NFDiscover response, the NF HA topology information for the producer NFs, and transmitting the NFDiscover response to the consumer NF or SCP.
PUBLISH AND SUBSCRIBE COMMUNICATION SYSTEM
One or more computing devices, systems, and/or methods for implementing a publish and subscribe communication system utilizing a load balancer and task schedulers are provided. Subscription requests are received from subscribers for subscribing to a topic published by a publisher. An external subscription list is maintained to track communication address information of the subscribers. A number of task schedulers are created based upon a count of subscribers within the external subscription list. The subscribers are assigned to the task schedulers such that a number of subscribers assigned to a task scheduler is limited according to a subscriber assignment limit. In response to the publisher creating data to publish to the topic, the task schedulers are controlled to use the communication address information to directly transfer data of the topic to the subscribers assigned to the task schedulers.
PUBLISH AND SUBSCRIBE COMMUNICATION SYSTEM
One or more computing devices, systems, and/or methods for implementing a publish and subscribe communication system are provided. A topic identifier comprising publisher and subscriber information and a topic data type of a topic may be generated. The topic identifier and communication address information associated with the topic may be maintained at an external broker. The communication information may be provided from the external broker to a requestor in response to an inquiry regarding the topic identifier. Access to data published to the topic may be provided such that a publisher of the topic directly transfers data of the topic to a subscriber of the topic.
QUIC AND ANYCAST PROXY RESILIENCY
Techniques for managing migrations of QUIC connection session(s) across proxy nodes, data centers, and/or private application nodes are described herein. A global key-value datastore, accessible by proxy nodes and/or application nodes, may store mappings between a first QUIC connection, associated with a proxy node and a client device, on the frontend of the proxy node and a second QUIC connection, associated with the proxy node and an application node, on the backend of the proxy node. With the global key-value datastore being accessible by the proxy nodes, when a proxy node receives a QUIC packet on the front end or the back end, the proxy node may determine where to map this connection to on the opposite end. Additionally, with the global key-value datastore being accessible to the application nodes, when an application node receives a QUIC packet, the application node may determine the client device associated with the connection.