Patent classifications
H04L67/562
Method and corresponding proxy server, system, computer-readable storage medium and computer program
A method is provided. The method includes receiving a request message, the request message relating to a transaction between a first client and a second client, the request message including first client data and second client data, the first client data identifying an account to be used by the first client in the transaction, the second client data indicating if the second client is subscribed to a service. The method further includes determining if the second client is subscribed to the service, and generating an authentication request message if the second client is not subscribed to the service, the authentication request message requesting confirmation that a holder of the account is the first client. The method further includes sending the authentication request message, and receiving an authentication response message from the external server in response, the authentication response message including an indication whether the holder is the first client.
Method and corresponding proxy server, system, computer-readable storage medium and computer program
A method is provided. The method includes receiving a request message, the request message relating to a transaction between a first client and a second client, the request message including first client data and second client data, the first client data identifying an account to be used by the first client in the transaction, the second client data indicating if the second client is subscribed to a service. The method further includes determining if the second client is subscribed to the service, and generating an authentication request message if the second client is not subscribed to the service, the authentication request message requesting confirmation that a holder of the account is the first client. The method further includes sending the authentication request message, and receiving an authentication response message from the external server in response, the authentication response message including an indication whether the holder is the first client.
BROKERING SERVERS BASED ON REMOTE ACCESS PERFORMANCE
Examples of a method for brokering remote servers are described herein. In some examples, performance data is received from a plurality of remote servers, where the performance data indicates rendering performance of a foreground application executed by at least one of the remote servers and streamed from at least one of the remote servers over a remote desktop connection. An indication of a selected application is received from a client. The client is directed to at least one of the remote servers based on the performance data and the selected application.
Automotive gateway providing secure open platform for guest applications
An automotive gateway includes one or more interfaces and one or more processors. The one or more interfaces are configured to communicate with electronic subsystems of a vehicle. The one or more processors and configured to host one or more guest applications and to control communication traffic between the one or more guest applications and the electronic subsystems of the vehicle in accordance with a security policy.
Methods and apparatus for emerging use case support in user space networking
Methods and apparatus for emerging use case support in user space networking architectures. In one embodiment, an apparatus configured to segregate packet data based on a packet type is disclosed. The exemplary embodiment provides a custom data type registry that enables the definition, addition, removal, modification, and/or prioritization of custom packet processing rules. Variants of the registry may support custom ethertype packets, network packets, and/or transport packets. In another embodiment, mechanisms for enabling an intermediary packet processing stage are described. Intermediary packet processing may enable user space system extensions that support e.g., packet filtering, packet modification, and/or other forms of packet processing.
METHOD AND SYSTEM TO IMPLEMENT PROXYING FOR OPERATIONS THROUGH AN APPLICATION PROGRAM FOR A TRANSACTION MANAGER
Disclosed is an improved approach to implement the XA architecture, which permits a TM to call back to a RM via an AP. This approach avoids the need for the TM to maintain authentication/authorization credentials for each RM that will be contacted by the TM. This approach therefore also eliminates the need to establish a direct connection between the TM and the RM. An approach is also provided to integrate a traditional XA application with an XA transaction.
METHOD AND SYSTEM TO IMPLEMENT PROXYING FOR OPERATIONS THROUGH AN APPLICATION PROGRAM FOR A TRANSACTION MANAGER
Disclosed is an improved approach to implement the XA architecture, which permits a TM to call back to a RM via an AP. This approach avoids the need for the TM to maintain authentication/authorization credentials for each RM that will be contacted by the TM. This approach therefore also eliminates the need to establish a direct connection between the TM and the RM. An approach is also provided to integrate a traditional XA application with an XA transaction.
Cloud access security broker systems and methods with an in-memory data store
A method performed by a Cloud Access Security Broker (CASB) service includes scanning data stored in one of a cloud provider and a Software-as-a-Service (SaaS) application, wherein the data is for a user associated with a company of a plurality of companies; detecting an incident in a file or email in the data during the scanning; maintaining details of the incident in an in-memory data store, including a current snapshot of the file or email; and providing a notification to the tenant of the incident. The method can further include, subsequent to the incident and while the file or email is being updated, updating the details of the incident in the in-memory data store.
Sparse information sharing system
In an approach for a sparse information sharing system, a processor receives a request from a host owner for a host to become a server of an information sharing system, wherein the request specifies at least one type of information the server will maintain and provide to visitors of the server. A processor syncs the server with other servers of the information sharing system with information of the specified at least one type of information. A processor, responsive to the server receiving updated information from a visitor of the server, notifies the other servers of the updated information.
Sparse information sharing system
In an approach for a sparse information sharing system, a processor receives a request from a host owner for a host to become a server of an information sharing system, wherein the request specifies at least one type of information the server will maintain and provide to visitors of the server. A processor syncs the server with other servers of the information sharing system with information of the specified at least one type of information. A processor, responsive to the server receiving updated information from a visitor of the server, notifies the other servers of the updated information.