Patent classifications
H04L67/562
Systems and methods of providing ledger as a service
Described herein are systems and methods for a providing Ledger as a Service (LaaS). Blockchain technology helps bring potential solutions to the distributed ledger problem, with a linear record structure to record transaction history. However, there are different types of blockchain techniques (e.g., Hyperledger, Ethereum, Quorum), and users/developers need to know the explicit features of each technique and align with the required APIs. Ledger as a Service can allow users to an develop applications more efficiently, and can allow users to easily migrate applications among different blockchain techniques and platforms (e.g., between Hyperledger and Ethereum). LaaS can also allow for simplified transactions with a blockchain, and can additionally provide simplified communication between blockchains of different types.
Systems and methods of providing ledger as a service
Described herein are systems and methods for a providing Ledger as a Service (LaaS). Blockchain technology helps bring potential solutions to the distributed ledger problem, with a linear record structure to record transaction history. However, there are different types of blockchain techniques (e.g., Hyperledger, Ethereum, Quorum), and users/developers need to know the explicit features of each technique and align with the required APIs. Ledger as a Service can allow users to an develop applications more efficiently, and can allow users to easily migrate applications among different blockchain techniques and platforms (e.g., between Hyperledger and Ethereum). LaaS can also allow for simplified transactions with a blockchain, and can additionally provide simplified communication between blockchains of different types.
TOKEN BROKERING IN PARENT FRAME ON BEHALF OF CHILD FRAME
The disclosed technology is generally directed to web authentication. In one example of the technology, authentication of a broker with an identity provider is initiated. The broker is a first application that is executing in a top-level frame. At the broker, from a second application that is executing on a first descendent frame that is a descendant frame of the top-level frame, a token request is received. Via the broker, a first token is requested from the identity provider on behalf of the second application. The first token is associated with an authorization of secure delegated remote access of at least one resource by the second application. At the broker, from the identity provider, the first token is received. Via the broker, the first token is provided to the second application.
MEC information obtaining method and apparatus
The present disclosure relates to mobile edge computing (MEC) information obtaining methods and apparatus. One example method performed by a first network element includes receiving target reference information from a second network element, and sending, to the second network element, information about a MEC platform corresponding to the target reference information. The target reference information comprises target capability information.
Data stream management
A method for managing data streams for similar content on multiple client devices includes receiving a new request for content from a server provider. In response to determining there is an existing request associated with an existing data stream for the content from the server provider, the method includes blocking the new request. The method also includes receiving the existing data stream from the service provider for the content via an external network and performing a stream computation for the existing data stream to provide a first data stream for the existing request for the content and a second data stream for the new request for the content. The method also includes sending the first data stream for the existing request for the content to a first client device and the second data stream for the new request for the content to a second client device, via a local network.
Data stream management
A method for managing data streams for similar content on multiple client devices includes receiving a new request for content from a server provider. In response to determining there is an existing request associated with an existing data stream for the content from the server provider, the method includes blocking the new request. The method also includes receiving the existing data stream from the service provider for the content via an external network and performing a stream computation for the existing data stream to provide a first data stream for the existing request for the content and a second data stream for the new request for the content. The method also includes sending the first data stream for the existing request for the content to a first client device and the second data stream for the new request for the content to a second client device, via a local network.
METHOD FOR DETERMINING A LEVEL OF CONTAMINATION IN COVERED ZONES AND SYSTEM FOR COLLECTING AND PROCESSING ENVIRONMENTAL INFORMATION
A method for determining the level of contamination in cities comprising the steps of providing a server, transmitting information from users which report contamination issues by means of a mobile electronic device to the server, providing a wireless sensor network (WSN) for measuring level of contamination, obtaining measured data tagged with a geo-reference tag and a time stamp, and configured for supporting delay-tolerant communications transmitting data measured from sensors to the server, processing data measured and information from users by using big data and machine learning algorithms, and providing reports on contamination levels; and a system for collecting and processing environmental information comprising at least one mobile electronic device, including at least one environmental sensor, at least one wireless communication interface, a geo-location unit, and a storage unit; at least one communication gateway and at least a server for storing and processing the information obtained.
CLOUD AUTOMATION FULFILLMENT ENABLER
Contact centers often have data maintained, such as on site, that cannot be exposed externally, such as the data comprising sensitive information that may be at risk if it were to be exposed to a public connection. Resources available via a public network (e.g., Internet) may include natural language processing, such as to acquire and/or provide information as well as make workflow decisions with a user. By initiating a communication from the contact center to the external resource (e.g., cloud provider), a trusted communication may be established to allow the external resource to utilize natural language to process the content of the communication with the data accessed via the trusted communication.
MESSAGE FORMAT INDICATOR FOR RESOURCE-CONSTRAINED DEVICES
Systems and methods for message format communication among resource-constrained devices are generally described. In some examples, a first message sent by an edge computing device may be received. A determination may be made that the first message comprises a first data format identifier. A determination may be made that the first message comprises a first data format patch. A determination may be made that the first data format identifier was previously stored in a data structure in association with a first data format. In various examples, the first data format may be modified using the first data format patch to generate a first modified data format. The first modified data format may be stored in the data structure in association with the first data format identifier. In some examples, a payload of the first message may be read using the first modified data format.
Systems and methods for end user connection load balancing
Described herein are systems and methods for end user connection load balancing amongst multiple on-premise connector proxies deployed across geographic locations and reducing connection setup latency without using a shared or distributed database. The system can load balance connections deterministically amongst the on-premise connector proxies using load statistics. The system utilizes an intelligent DNS service that can use network experience data, service availability, and application metrics to provide sophisticated traffic management via DNS or API-based decisions. The system can include a domain name system (DNS) resolver configured to receive metrics for a first connector and a second connector of a data center of an entity, receive a DNS request including an entity identifier and a data center identifier; and transmit a response to the DNS request identifying a server selected based on the metrics identified using the entity identifier and the data center identifier.