Patent classifications
H04L67/564
CURATING PROXY SERVER POOLS
A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.
CURATING PROXY SERVER POOLS
A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.
Dynamic routing of authentication requests
Methods, systems, and computer readable media for dynamically routing authentication requests are described. An embodiment can include receiving, at one or more computing devices, a network authentication request. An embodiment can also include creating, at the one or more computing devices, an authentication context based on information in the authentication request. An embodiment can also include dynamically routing, using the one or more computing devices, the authentication request to an authentication server.
Unified Display For Virtual Resources
Methods and systems for unifying display of virtual resources are described herein. A virtual session between a client device and a server device may be established. During the virtual session, a user may request, via the client device, to access a uniform resource locator (URL) via a browser associated with the server device. The URL request may be redirected. For example, the client device may receive, from the server device, a request to access the URL via a different browser. The client device may determine another browser with which to access the URL, and the URL may be launched via the other browser. The client device may generate a unified display of the URL launched via the other browser and one or more other URLs.
CURATING SERVICES THROUGH PROXIES WITH EXTENSIBLE POLICY
Techniques for operating a proxy service that imports information about resources and for determining how to handle the resources are disclosed. Policy is used to configure the proxy service, which is provisioned to operate between a client and a provider service. A request is then received (e.g., from the client) for a resource that is available from the provider service. In response to the request, the proxy service imports claims describing the resource. The proxy service evaluates the claims using the policy to determine how to respond to the request. Based on the evaluation, the proxy service provides a response to the client.
CURATING SERVICES THROUGH PROXIES WITH EXTENSIBLE POLICY
Techniques for operating a proxy service that imports information about resources and for determining how to handle the resources are disclosed. Policy is used to configure the proxy service, which is provisioned to operate between a client and a provider service. A request is then received (e.g., from the client) for a resource that is available from the provider service. In response to the request, the proxy service imports claims describing the resource. The proxy service evaluates the claims using the policy to determine how to respond to the request. Based on the evaluation, the proxy service provides a response to the client.
METHODS AND SYSTEMS FOR EVENT MANAGEMENT
A method for an index map-based event system includes receiving at least one subscription rule; processing the at least one subscription rule to determine an index map generation; generating an index map based on the determination; dynamically inserting into a received event, properties of the index map; and sending the modified event to a transport layer for dispatching. A method for dynamic property insertion in an event system includes receiving at least one subscription rule, each of the at least one subscription rule having a set of filter rules; generating an index map based on the filter rules; and annotating properties of a received event with properties referenced the index map correlating to characteristics of the received event. A device is configured to execute the methods disclosed herein. A system is configured to execute the methods disclosed herein.
METHODS AND SYSTEMS FOR EVENT MANAGEMENT
A method for an index map-based event system includes receiving at least one subscription rule; processing the at least one subscription rule to determine an index map generation; generating an index map based on the determination; dynamically inserting into a received event, properties of the index map; and sending the modified event to a transport layer for dispatching. A method for dynamic property insertion in an event system includes receiving at least one subscription rule, each of the at least one subscription rule having a set of filter rules; generating an index map based on the filter rules; and annotating properties of a received event with properties referenced the index map correlating to characteristics of the received event. A device is configured to execute the methods disclosed herein. A system is configured to execute the methods disclosed herein.
Optimizing interaction between applications and devices in a communications network
An apparatus can monitor interactions between IoT devices and IoT applications. Based on the monitoring, the apparatus may identify an interaction between a given IoT device and a given IoT application that can be adjusted. In an example, the apparatus may generate a recommendation or instruction in response to identifying the interaction. A first instruction may indicate a change in behavior for one of the IoT device or the IoT application. The apparatus may send the instruction to the one of the IoT device or the IoT application, for example, so as to cause the one of the IoT device or the IoT application to change the respective behavior, thereby adjusting the interaction between the IoT device and the IoT application.
Signal processing for making predictive determinations
In some examples, unstructured data is evaluated using a natural language processing model to output a set of subjective indicators. These subjective indicators are scored using a predictive model to determine whether a dependent user has or is likely to develop a particular condition such as a cellular abnormality.