Patent classifications
H04L67/564
METHOD AND SYSTEM FOR UNIVERSAL SECURITY SERVICES ABSTRACTION
A method for providing interoperability between a plurality of security services and target applications by an interoperability service. The method includes receiving a request from one of the plurality of security services to perform a task on a target application, preparing a unified data model for interaction with the target application, determining and organizing data connections to perform the task on the target application, generating a set of requests using the unified data model based on the task and utilizing business logic of the interoperability service for the data connections with the target application, transforming the set of requests into commands and data structures specific to the target application, and sending the set of requests on respective data connections with the target application.
METHOD AND SYSTEM FOR UNIVERSAL SECURITY SERVICES ABSTRACTION
A method for providing interoperability between a plurality of security services and target applications by an interoperability service. The method includes receiving a request from one of the plurality of security services to perform a task on a target application, preparing a unified data model for interaction with the target application, determining and organizing data connections to perform the task on the target application, generating a set of requests using the unified data model based on the task and utilizing business logic of the interoperability service for the data connections with the target application, transforming the set of requests into commands and data structures specific to the target application, and sending the set of requests on respective data connections with the target application.
Method and system for reducing connections to a database
A system automatically maintains a plurality of client connections associated with a plurality of clients, the plurality of client connections including active and idle connections. A first server receives a request from a client of the plurality of clients to access a second server of a plurality of second servers communicatively coupled to the first server, the plurality of second servers having varying communication protocols. The first server then identifies a first communication protocol associated with the second server and activating a link between the first server and the second server using the first communication protocol.
Method and system for reducing connections to a database
A system automatically maintains a plurality of client connections associated with a plurality of clients, the plurality of client connections including active and idle connections. A first server receives a request from a client of the plurality of clients to access a second server of a plurality of second servers communicatively coupled to the first server, the plurality of second servers having varying communication protocols. The first server then identifies a first communication protocol associated with the second server and activating a link between the first server and the second server using the first communication protocol.
Scalable server-based web scripting with user input
Disclosed are techniques and apparatuses that are configured to receive an indication that a web browsing session executing on an enterprise server needs additional information based on a request for additional information being sent to a client device. The request may include an identifier of the web browsing session and an identifier of an enterprise server that initiated the web browsing session. A globally unique identifier related to the web browsing session and an identifier of the enterprise server is stored in a common data store. The web browsing session may be paused when the web browsing session requests additional information from a client device. The client device may respond with the additional information. The system may provide the identifier of the enterprise server to a load balancing component so the identified web browsing session executing on the enterprise server may continue to be used.
Scalable server-based web scripting with user input
Disclosed are techniques and apparatuses that are configured to receive an indication that a web browsing session executing on an enterprise server needs additional information based on a request for additional information being sent to a client device. The request may include an identifier of the web browsing session and an identifier of an enterprise server that initiated the web browsing session. A globally unique identifier related to the web browsing session and an identifier of the enterprise server is stored in a common data store. The web browsing session may be paused when the web browsing session requests additional information from a client device. The client device may respond with the additional information. The system may provide the identifier of the enterprise server to a load balancing component so the identified web browsing session executing on the enterprise server may continue to be used.
DETECTING UNDER-UTILIZED FEATURES AND PROVIDING TRAINING, INSTRUCTION, OR TECHNICAL SUPPORT IN AN OBSERVATION PLATFORM
A first communication, received from a first communication device operated by a first user, is parsed according to a policy to determine associated metadata comprising a first set of attributes. The policy dictates rules for use of the metadata. The first set of attributes is compared to attributes of a plurality of communication devices. Based on the comparing, at least one recipient communication device for the first communication is identified from the plurality of communication devices, wherein at least one of the first set of attributes matches at least one of the attributes of the plurality of communication devices. Based on the policy and the metadata, at least one of a feature available to the at least one identified recipient communication device and behavior of the at least one identified recipient communication device as perceived by a particular user associated with the at least one recipient communication device is determined.
DETECTING UNDER-UTILIZED FEATURES AND PROVIDING TRAINING, INSTRUCTION, OR TECHNICAL SUPPORT IN AN OBSERVATION PLATFORM
A first communication, received from a first communication device operated by a first user, is parsed according to a policy to determine associated metadata comprising a first set of attributes. The policy dictates rules for use of the metadata. The first set of attributes is compared to attributes of a plurality of communication devices. Based on the comparing, at least one recipient communication device for the first communication is identified from the plurality of communication devices, wherein at least one of the first set of attributes matches at least one of the attributes of the plurality of communication devices. Based on the policy and the metadata, at least one of a feature available to the at least one identified recipient communication device and behavior of the at least one identified recipient communication device as perceived by a particular user associated with the at least one recipient communication device is determined.
INTEGRATED SECURE DEVICE MANAGER SYSTEMS AND METHODS FOR CYBER-PHYSICAL VEHICLES
Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.
CONTENT DELIVERY OPTIMIZATION
Content delivery optimization and recommendation is disclosed. A manner of delivering a content object to a mobile device may be determined at least in part by applying a behavior model associated with a user of the mobile device to attributes associated with the content object. The behavior model may be generated based at least in part on observed activities of the user. The content object is provided to the mobile device in the determined manner.