H04L67/563

REDIRECTION SERVICE RESOURCE LOCATOR MECHANISM
20230099800 · 2023-03-30 ·

A system can include circuitry that processes a URL for information; circuitry that transmits at least a portion of the information via a network interface; circuitry that receives metadata via the network interface responsive to the transmission of at least a portion of the information; circuitry that associates at least a portion of the metadata with a short URL; and circuitry that transmits the short URL. Various other apparatuses, systems, methods, etc., are also disclosed.

REDIRECTION SERVICE RESOURCE LOCATOR MECHANISM
20230099800 · 2023-03-30 ·

A system can include circuitry that processes a URL for information; circuitry that transmits at least a portion of the information via a network interface; circuitry that receives metadata via the network interface responsive to the transmission of at least a portion of the information; circuitry that associates at least a portion of the metadata with a short URL; and circuitry that transmits the short URL. Various other apparatuses, systems, methods, etc., are also disclosed.

SYSTEMS AND METHODS OF MANAGING COMMUNICATION ENDPOINTS
20230100519 · 2023-03-30 · ·

In one embodiment, a method includes receiving a trigger to dynamically modify a serving site of a communication endpoint, wherein the communication endpoint is registered to receive digital communication service from a first serving site. The method further includes determining a stored serving-site selection policy applicable to the communication endpoint. The method also includes selecting a second serving site for the communication endpoint based, at least part, on a stored serving-site selection policy. Also, the method includes determining endpoint-configuration requirements of the second serving site. Furthermore, the method includes dynamically generating endpoint configurations that satisfy the endpoint-configuration requirements of the second serving site. Moreover, the method includes writing the generated endpoint configurations to the communication endpoint. Additionally, the method includes causing the communication endpoint to register to receive digital communication service from the second serving site in place of the first serving site.

SYSTEMS AND METHODS OF MANAGING COMMUNICATION ENDPOINTS
20230100519 · 2023-03-30 · ·

In one embodiment, a method includes receiving a trigger to dynamically modify a serving site of a communication endpoint, wherein the communication endpoint is registered to receive digital communication service from a first serving site. The method further includes determining a stored serving-site selection policy applicable to the communication endpoint. The method also includes selecting a second serving site for the communication endpoint based, at least part, on a stored serving-site selection policy. Also, the method includes determining endpoint-configuration requirements of the second serving site. Furthermore, the method includes dynamically generating endpoint configurations that satisfy the endpoint-configuration requirements of the second serving site. Moreover, the method includes writing the generated endpoint configurations to the communication endpoint. Additionally, the method includes causing the communication endpoint to register to receive digital communication service from the second serving site in place of the first serving site.

METHODS AND SYSTEMS OF A SOFTWARE DATA DIODE-TCP PROXY WITH UDP ACROSS A WAN

Disclosed herein are various systems, apparatuses, software, and methods relating to data diode-TCP proxy with a User Datagram Protocol (UDP) across a wide area network (WAN) providing a WAN data diode using a uni-directional semantics protocol, providing a set of data diode proxies in either end of a point-to-point WAN link, providing a symmetric key encryption semantics to extend the WAN data diode securely across a WAN that is specified, wherein the symmetric key encryption semantics are implemented through the set of data diode proxies on either end of the point-to-point WAN link, employing a unidirectional protocol in communication transmitted using the WAN and, with data diode proxies, terminating one or more data channels on either end of the point-to-point WAN link or transporting a requisite information across the WAN over the uni-directional protocol.

METHODS AND SYSTEMS OF A SOFTWARE DATA DIODE-TCP PROXY WITH UDP ACROSS A WAN

Disclosed herein are various systems, apparatuses, software, and methods relating to data diode-TCP proxy with a User Datagram Protocol (UDP) across a wide area network (WAN) providing a WAN data diode using a uni-directional semantics protocol, providing a set of data diode proxies in either end of a point-to-point WAN link, providing a symmetric key encryption semantics to extend the WAN data diode securely across a WAN that is specified, wherein the symmetric key encryption semantics are implemented through the set of data diode proxies on either end of the point-to-point WAN link, employing a unidirectional protocol in communication transmitted using the WAN and, with data diode proxies, terminating one or more data channels on either end of the point-to-point WAN link or transporting a requisite information across the WAN over the uni-directional protocol.

DIGITAL TAG

A method is disclosed. The method comprising receiving, by a transfer application on a first user's device, a payload comprising a digital tag associated with a second user, a transaction identifier, and a transaction amount. Transmitting, by the transfer application to a digital tag computer, the digital tag associated with the second user. Receiving, by the transfer application from the digital tag computer, a primary account number or token associated with the digital tag and transmitting, by the transfer application to an acquiring computer, a push transfer message.

REGULATION METHODS FOR PROXY SERVICES

Systems and methods to manage and regulate the requests of multiple proxy clients are disclosed. In one aspect, the system and methods disclosed herein aids in configuring proxy server(s) with a rate-limit functionality. Configuration of the rate-limit functionality may be realized by, but not limited to, installing configuration file(s) and/or software application(s) on the proxy server(s). The configuration provides information about the list of restricted and unrestricted domains and their respective request limit specification in a given time frame. Therefore, each time before a proxy server forwards the clients' requests to a target domain, the proxy server checks and ensures that the request count to the particular target domain is well within the limit specified in the request limit specification. Thus, the embodiments described herein aid in preventing the IP addresses of proxy service providers from being blocked or denied from the target websites.

Message History Display System and Method

A technique for message history display includes combining message histories for multiple different messaging services. A system constructed according to the technique may include, for example, a message history database; a history aggregation engine that aggregates message logs for storage in the message history database; and a history provisioning engine that provides an aggregated message log associated with the user from the message history database to a requesting device. A method according to the technique may include, for example, identifying a device in association with a user profile; providing an online platform that receives messages from and sends messages to the device; and creating an aggregated log from messages sent to and from the device.

Message History Display System and Method

A technique for message history display includes combining message histories for multiple different messaging services. A system constructed according to the technique may include, for example, a message history database; a history aggregation engine that aggregates message logs for storage in the message history database; and a history provisioning engine that provides an aggregated message log associated with the user from the message history database to a requesting device. A method according to the technique may include, for example, identifying a device in association with a user profile; providing an online platform that receives messages from and sends messages to the device; and creating an aggregated log from messages sent to and from the device.