Patent classifications
H04L67/563
OPTIMIZED DIRECTORY ENUMERATION AND DATA COPY FOR CLIENT DRIVE REDIRECTION IN VIRTUAL DESKTOPS
System and methods are provided for improved directory enumeration and data copy with shared client directories in virtual desktops by quickly and efficiently retrieving shared directory entries from the client device over a separate fast channel and caching them on the virtual desktop, where the directory entries can be available locally to applications in the virtual desktop for performing directory enumeration. The fast channel can further be utilized for efficiently transferring data in data copy operations between the client device and the virtual desktop.
OPTIMIZED DIRECTORY ENUMERATION AND DATA COPY FOR CLIENT DRIVE REDIRECTION IN VIRTUAL DESKTOPS
System and methods are provided for improved directory enumeration and data copy with shared client directories in virtual desktops by quickly and efficiently retrieving shared directory entries from the client device over a separate fast channel and caching them on the virtual desktop, where the directory entries can be available locally to applications in the virtual desktop for performing directory enumeration. The fast channel can further be utilized for efficiently transferring data in data copy operations between the client device and the virtual desktop.
Packet Acknowledgment Techniques for Improved Network Traffic Management
A proxy server (700) receives, from a sending device, a packet intended for a receiving device (600). The proxy sewer (700) sends, to the receiving device (600), a promise frame (300) indicating that the proxy server (700) will deliver the packet to the receiving device (600) later. The receiving device (600) receives the promise frame (300) from the proxy server (700), and sends an acknowledgement of the packet to the sending device via the proxy sewer (700). The proxy server (700) forwards the acknowledgement of the packet from the receiving device (600) to the sending device, and delivers the packet to the receiving device (600) after having forwarded the acknowledgement to the sending device. The receiving device (600) receives the packet from the proxy server (700) after having sent the acknowledgement of the packet to the sending device via the proxy server (700).
Packet Acknowledgment Techniques for Improved Network Traffic Management
A proxy server (700) receives, from a sending device, a packet intended for a receiving device (600). The proxy sewer (700) sends, to the receiving device (600), a promise frame (300) indicating that the proxy server (700) will deliver the packet to the receiving device (600) later. The receiving device (600) receives the promise frame (300) from the proxy server (700), and sends an acknowledgement of the packet to the sending device via the proxy sewer (700). The proxy server (700) forwards the acknowledgement of the packet from the receiving device (600) to the sending device, and delivers the packet to the receiving device (600) after having forwarded the acknowledgement to the sending device. The receiving device (600) receives the packet from the proxy server (700) after having sent the acknowledgement of the packet to the sending device via the proxy server (700).
METHOD AND SYSTEM FOR REAL-TIME TRANSCODING OF MPEG-DASH ON-DEMAND MEDIA SEGMENTS WHILE IN TRANSIT FROM CONTENT HOST TO DASH CLIENT
A system, method and computer program product for real-time post-processing system that transforms MPEG-DASH on-demand media streams, including a DASH media player device; an intercepting media server device; a MPEG-DASH content origin server device; and a proxy media client device coupled to the DASH media player device and the intercepting media server device and configured to intercept MPEG-DASH HTTP requests from the DASH media player device and forward the intercepted requests to the intercepting media server device instead of the MPEG-DASH content origin server device. The intercepting media server device is configured to act as an HTTP proxy device, and forward the intercepted requests to the MPEG-DASH content origin server, and with each corresponding MPEG-DASH media subsegment acquired perform analysis of the video media content within the subsegment and apply selective transcoding.
METHOD AND SYSTEM FOR REAL-TIME TRANSCODING OF MPEG-DASH ON-DEMAND MEDIA SEGMENTS WHILE IN TRANSIT FROM CONTENT HOST TO DASH CLIENT
A system, method and computer program product for real-time post-processing system that transforms MPEG-DASH on-demand media streams, including a DASH media player device; an intercepting media server device; a MPEG-DASH content origin server device; and a proxy media client device coupled to the DASH media player device and the intercepting media server device and configured to intercept MPEG-DASH HTTP requests from the DASH media player device and forward the intercepted requests to the intercepting media server device instead of the MPEG-DASH content origin server device. The intercepting media server device is configured to act as an HTTP proxy device, and forward the intercepted requests to the MPEG-DASH content origin server, and with each corresponding MPEG-DASH media subsegment acquired perform analysis of the video media content within the subsegment and apply selective transcoding.
Methods and apparatuses for content delivery over mobile networks with multi-access edge computing (MEC) control and user plane separation (CUPS)
A method is performed at a mobile core, including assigning a first cache servicing a client device in response to a first request for a media content item based at least in part on a first IP address of the client device associated with a first edge location. The method further includes providing a first portion of the media content item from the first cache. The method additionally includes triggering a plurality of caches at edge locations proximate to the first edge location to retrieve a second portion of the media content item. The method also includes receiving a continuation request from the client device with a second IP address associated with a second edge location. The method further includes selecting a second cache from the plurality of caches based at least in part on the second IP address and continuing providing the media content item from the second cache.
AUTOMATED ROUTING BASED ON CONTENT METADATA
Methods, computer readable media, and devices for automated routing based on content metadata are provided. One method may include receiving a user request for content with metadata from a client by a content distribution network (CDN), parsing the user request for content to generate an evaluation of the metadata, determining a routing decision representing a selection of one of a plurality of origin services for the user request for content based on the evaluation of the metadata, transmitting the user request for content to the selected one of the plurality of origin services based on the routing decision, receiving a response to the user request for content from the selected one of the plurality of origin services, and sending the response to the client.
Indirect transmission of session data
The systems and methods described herein can enable the indirect transmission of session data between different domains. The system can pass the session data through a hashing function so that the data from a given domain remains private and secure to the specific domain. The system can generate clusters of associated domains for a given client device that the system can use to maintain a session between the client device and the domain.
Method and apparatus for distributed emulation of behavior of a malicious domain
A method and apparatus that provide a malicious domain emulator in a distributed cloud computing network are described. A malicious node emulator is executed as a third-party code in a compute server of the cloud computing platform to enable emulation of behavior of a malicious node. The malicious node emulator receives requests from one or multiple network devices addressed to the malicious domain and automatically emulates the behavior of the malicious domain to respond to these requests. The malicious node emulator logs information related to the requests and the network devices transmitting the requests.