H04L67/562

MESSAGE BROKER RESOURCE DELETION
20230239370 · 2023-07-27 ·

The described technology is generally directed towards a message broker resource monitoring service that obtains message broker resource parameter data of a resource, based on communications of a message broker. Based on the resource parameter data and historical data, message broker resource monitoring service obtains a predicted message delivery time value, which can be in association with confidence. If the predicted message delivery time value satisfies a resource deletion criterion, e.g., the predicted message delivery time value, with sufficient confidence, exceeds a threshold value, the message broker resource monitoring service triggers an action to delete the resource. To obtain the predicted value, a regression such as symmetric conformal quantile regression can be applied to the parameter data, e.g., to obtain a predicted message delivery time/latency value.

MESSAGE BROKER RESOURCE DELETION
20230239370 · 2023-07-27 ·

The described technology is generally directed towards a message broker resource monitoring service that obtains message broker resource parameter data of a resource, based on communications of a message broker. Based on the resource parameter data and historical data, message broker resource monitoring service obtains a predicted message delivery time value, which can be in association with confidence. If the predicted message delivery time value satisfies a resource deletion criterion, e.g., the predicted message delivery time value, with sufficient confidence, exceeds a threshold value, the message broker resource monitoring service triggers an action to delete the resource. To obtain the predicted value, a regression such as symmetric conformal quantile regression can be applied to the parameter data, e.g., to obtain a predicted message delivery time/latency value.

Using a Web Proxy to Provide a Secure Remotely Controlled System, Device, and Method

A system, device, and method for implementing secure control over audio visual (AV) equipment connected to an AV gateway is disclosed. The solution implements secure and remote control over audio visual (AV) equipment included in an AV network by enabling a web browser running on a user device to utilize a web proxy shuttle to communicate control commands to an AV gateway that controls the AV equipment.

Using a Web Proxy to Provide a Secure Remotely Controlled System, Device, and Method

A system, device, and method for implementing secure control over audio visual (AV) equipment connected to an AV gateway is disclosed. The solution implements secure and remote control over audio visual (AV) equipment included in an AV network by enabling a web browser running on a user device to utilize a web proxy shuttle to communicate control commands to an AV gateway that controls the AV equipment.

Information transmission method and device
11711434 · 2023-07-25 · ·

One or more implementations of the present specification provide an information transmission method. Target information selected by a user of a first computing device is obtained by the first computing device. A unique identifier is obtained by the first computing device and from a second computing device, subsequent to the second computing device receiving the unique identifier from a server. The unique identifier is associated with the second computing device according to a mapping relationship. The unique identifier and the target information are sent to the server. The server identifies the second computing device associated with the unique identifier from the mapping relationship and forwards the target information to the second computing device.

Information transmission method and device
11711434 · 2023-07-25 · ·

One or more implementations of the present specification provide an information transmission method. Target information selected by a user of a first computing device is obtained by the first computing device. A unique identifier is obtained by the first computing device and from a second computing device, subsequent to the second computing device receiving the unique identifier from a server. The unique identifier is associated with the second computing device according to a mapping relationship. The unique identifier and the target information are sent to the server. The server identifies the second computing device associated with the unique identifier from the mapping relationship and forwards the target information to the second computing device.

Communicating with a Data Center Management and Monitoring Console via a Broker

A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: identifying data center asset data to monitor; monitoring data center assets within a data center; selecting an asset data broker, the asset data broker performing an asset data aggregation operation, the asset data aggregation operation collecting and aggregating the data center asset data; and, providing aggregated data center asset data to a data center monitoring and management console.

DYNAMIC ACCESS CONTROL IN SERVICE MESH WITH SERVICE BROKER
20230027507 · 2023-01-26 ·

One example method includes performing dynamic access control in a computing network. A computing environment is configured such that an application can access a service without specifying secrets. The secrets needed to access the service are obtained and stored in a credential store. The secrets can be obtained using the service mesh in a manner that isolates the application from the secrets.

Peer-to-peer relaying of discovery information

Certain aspects of the present disclosure relate to methods and apparatus for wireless communication, and more specifically to advertising discovery information, relaying discovery information, and to the secure relay of discovery information in wireless networks. Various frame structures are provided for such transmitting and relaying of discovery information. According to certain aspects of the present disclosure, security is provided for relaying discovery information. According to certain aspects of the present disclosure, compensation may be provided to a device that relays discovery information (e.g., when the relaying results in a transaction).

Peer-to-peer relaying of discovery information

Certain aspects of the present disclosure relate to methods and apparatus for wireless communication, and more specifically to advertising discovery information, relaying discovery information, and to the secure relay of discovery information in wireless networks. Various frame structures are provided for such transmitting and relaying of discovery information. According to certain aspects of the present disclosure, security is provided for relaying discovery information. According to certain aspects of the present disclosure, compensation may be provided to a device that relays discovery information (e.g., when the relaying results in a transaction).