Patent classifications
H04L67/564
CROSS-NETWORK DIFFERENTIAL DETERMINATION
Provided are systems, methods, and computer-program products for a proxy network that can determine, for a set of objects, an initial differential, where the initial differential is determined using a rules data store of a host network. The proxy network can further determine a supplemental differential for the set of objects. The proxy network can further determine a final differential that is the sum of the initial differential and the supplemental differential. The proxy network can further determine a final sum for the set of objects that is the object value less the final differential. The proxy network can further generate an outbound data packet that includes values corresponding to the set of objects and the final sum. When the host network receives the outbound data packet, the host network can modify an object data store using the values corresponding to the set of objects and the final sum.
CROSS-NETWORK DIFFERENTIAL DETERMINATION
Provided are systems, methods, and computer-program products for a proxy network that can determine, for a set of objects, an initial differential, where the initial differential is determined using a rules data store of a host network. The proxy network can further determine a supplemental differential for the set of objects. The proxy network can further determine a final differential that is the sum of the initial differential and the supplemental differential. The proxy network can further determine a final sum for the set of objects that is the object value less the final differential. The proxy network can further generate an outbound data packet that includes values corresponding to the set of objects and the final sum. When the host network receives the outbound data packet, the host network can modify an object data store using the values corresponding to the set of objects and the final sum.
Fast network recognition of active applications for real time user notification
In some embodiments, an active application is identified from an outgoing communication and/or what application is active on a device. In some embodiments, system will intercept and/or analyze a message sent by a computing device. For example, the system may run as an Internet proxy application on the device and/or on an Internet server. Optionally, the system reads message header and/or uses information from the header to determine what application sent the message. In some embodiments, the system includes a procedure that recognizes communications that are not of interest and/or discards these communications. Additionally or alternatively, the system includes a procedure that truncates a communication header and/or eliminates data not useful in determining the source of the communication. Optionally, the system uses a short list to identify the application and a long list when the application was not recognized based on the short list.
Fast network recognition of active applications for real time user notification
In some embodiments, an active application is identified from an outgoing communication and/or what application is active on a device. In some embodiments, system will intercept and/or analyze a message sent by a computing device. For example, the system may run as an Internet proxy application on the device and/or on an Internet server. Optionally, the system reads message header and/or uses information from the header to determine what application sent the message. In some embodiments, the system includes a procedure that recognizes communications that are not of interest and/or discards these communications. Additionally or alternatively, the system includes a procedure that truncates a communication header and/or eliminates data not useful in determining the source of the communication. Optionally, the system uses a short list to identify the application and a long list when the application was not recognized based on the short list.
Artificial intelligence based imaging systems and methods for interacting with individuals via a web environment
Artificial intelligence-based systems and methods are described for interacting with individuals via a web environment. A provisioning server is configured to receive a request from a web browser, executing on a client device, for a predefined imaging code stored in a memory of the provisioning server. The provisioning server responds to the request by transferring the predefined imaging code to the web browser. The predefined imaging code is configured to be executed by the client device to load, into a memory of the client device, one or more images of an individual; and determine, based on image analysis of the one or more images of the individual, one or more personal attributes of the individual.
Method of enhancing customer relationship management content and workflow
Forward-looking sales activities are poorly served by existing Customer Relationship Managements systems, as the customer information those systems maintain by definition does not include the speculatively interested “leads” pursued in initial sales contacts. An Enrichment database, asynchronously loaded with corporate and optionally individual contact information in anticipation of use, provides real-time access to information in support of such first customer contacts. The Enrichment information may also be used to expedite creation and revision of CRM records.
Distributed network address translation for efficient cloud service access
A method for coordinating distributed network address translation (NAT) in a network within which several logical networks are implemented. The logical networks include several tenant logical networks and at least one service logical network that include service virtual machines (VMs) that are accessed by VMs of the tenant logical networks. The method defines a group of replacement IP address and port number pairs. Each pair is used to uniquely identify a VM across all tenant logical networks. The method sends to at least one host that is hosting a VM of a particular tenant logical network, a set of replacement IP address and port number pairs. Each replacement IP address and port number pair can be used by the host to replace a source IP address and a source port number in a packet that is destined from the particular VM to a VM of the particular service logical network.
Distributed network address translation for efficient cloud service access
A method for coordinating distributed network address translation (NAT) in a network within which several logical networks are implemented. The logical networks include several tenant logical networks and at least one service logical network that include service virtual machines (VMs) that are accessed by VMs of the tenant logical networks. The method defines a group of replacement IP address and port number pairs. Each pair is used to uniquely identify a VM across all tenant logical networks. The method sends to at least one host that is hosting a VM of a particular tenant logical network, a set of replacement IP address and port number pairs. Each replacement IP address and port number pair can be used by the host to replace a source IP address and a source port number in a packet that is destined from the particular VM to a VM of the particular service logical network.
Browser Extension for Validating Communications
A computing device comprising a secure browser extension for a web browser monitors for satisfaction of one or more operating conditions to identify whether one or more unauthorized applications are intercepting web browser communications. Based on satisfaction of at least one operating condition, the secure browser extension of the computing device sends an HTTPS request to a known service via the web browser. The secure browser extension receives an HTTPS response to the HTTPS request via the web browser. The secure browser extension determines whether the certificate included in the HTTPS response is trusted by the secure browser extension. Based on determining the certificate is not trusted, the secure browser extension terminates the web browser session and generates a notification for display at the computing device that indicates web browser communications are compromised.
METHOD FOR OBTAINING ENRICHMENT INFORMATION AND CONTROLLER
A method for obtaining enrichment information and a controller are provided. The method includes: querying, by an enrichment information handling circuit, whether a database stores a first enrichment information corresponding to a user device in response to the enrichment information handling circuit receiving a first creation request associated with the user device from an application; triggering, by the enrichment information handling circuit, the application to subscribe to the database for enrichment information corresponding to the user device in response to determining that the database stores the first enrichment information corresponding to the user device; and pushing, by the database, second enrichment information to the application in response to presence of the second enrichment information corresponding to the user device in the database.