Patent classifications
H04L67/564
Applying a data valuation algorithm to sensor data for gateway assignment
Data valuation techniques in a sensor data environment are provided. For example, a method obtains at least one sensor data element generated by at least one sensor associated with a set of one or more sensors operatively coupled to a gateway. At least one data valuation algorithm is applied to the at least one sensor data element to compute at least one value. The computed value is distributed for assignment to one or more of the gateway, the at least one sensor, and the at least one sensor data element.
Applying a data valuation algorithm to sensor data for gateway assignment
Data valuation techniques in a sensor data environment are provided. For example, a method obtains at least one sensor data element generated by at least one sensor associated with a set of one or more sensors operatively coupled to a gateway. At least one data valuation algorithm is applied to the at least one sensor data element to compute at least one value. The computed value is distributed for assignment to one or more of the gateway, the at least one sensor, and the at least one sensor data element.
Managed network content monitoring and filtering system and method
A system and method for content request monitoring and filtering for a plurality of managed devices in a managed network uses a smart PAC file that is uniquely associated with a particular user using a particular managed device and a DNS look up to perform both the logging/monitoring of the content request and the filtering without a hardware appliance or partial proxying.
Priority-based processing of messages from multiple servers
Systems and methods for priority-based processing of messages received from multiple servers. An example method may comprise: receiving, by a first processing thread, in a non-blocking mode, a plurality of sub-application layer protocol packets from a plurality of servers; processing one or more sub-application layer protocol packets received from a first server of the plurality of servers, to produce a first application layer message; writing the first application layer message to a first message queue of a plurality of message queues associated with the plurality of servers, the first message queue corresponding to the first server; processing one or more sub-application layer protocol packets received from a second server of the plurality of servers, to produce a second application layer message; writing the second application layer message to a second message queue of a plurality of message queues associated with the plurality of servers, the second message queue corresponding to the second server; and reading, by a second processing thread, an application layer message having a most recent timestamp among a plurality of application layer messages in the plurality of message queues, the plurality of application layer messages including the first application layer message and the second application layer message.
Network proxy for energy efficient video streaming on mobile devices
Examples of systems and methods for network proxy server for energy efficient video streaming on mobile devices are generally described herein. A proxy server to deliver video content may include a communication module to intercept a request for video content from a mobile device, the request for video content intended for a content server and forward a modified request for the video content to the content server. The communication module may receive the video content from the content server and transfer a portion of the video content to the mobile device using a multipath transport protocol.
FILE UPLOAD CONTROL FOR CLIENT-SIDE APPLICATIONS IN PROXY SOLUTIONS
A computer-implemented method includes receiving, by a proxy device, a document from a service provider in response to a request to the service provider from a client device. The proxy device injects into the document event monitoring code for monitoring user actions on the client device. The proxy device sends the document with the event monitoring code to the client device. The event monitoring code intercepts a user request for a file upload event using a client-side application on the client device. The proxy device receives a client request including file information regarding the file upload event from the event monitoring code. The proxy device determines whether the file upload event should be allowed or blocked based on the received file information and stored policy data.
DYNAMIC CONTENT DELIVERY
Dynamic content can be delivered via email. Email messages include HTML content with one or more hyperlinks referring to a network-connected dynamic content server. The hyperlinks are accessed upon rendering of the email on a client device, triggering a request to a dynamic content server. The dynamic content server determines a content item to be served in response to the request. The dynamic content item determination may be based on factors including the identity of the requester, the email communication in which the hyperlink is embedded, recent activities or behavior on the part of the requester, and/or known preference or demographic information associated with the requester. The request can be directed to a selected content item stored within a content delivery network, for transmission back to the requester and display to the user within the email.
TRANSFORMING WEB-BASED DIGITAL CONTENT TO ENABLE NATIVE RENDERING
A content distribution system transforms digital content items published by a publisher in a markup language according to a native data model that enables native rendering of those content items. Components of a digital content item transformed according to the native data model are organized as an ordered stack of components that can each be independently and natively rendered. The components of a transformed digital content item are rendered using native display services available on the platform on which the item is being rendered without requiring specialized rendering software. To transform digital content items, the content distribution system includes transformation rules that encapsulate the native data model. A transformation rule describes how at least one type of component of a digital content item is to be transformed to make the component compliant with the native data model that enables native rendering.
Byte range caching
A caching system segments content into multiple, individually cacheable chunks cached by a cache server that caches partial content and serves byte range requests with low latency and fewer duplicate requests to an origin server. The system receives a request from a client for a byte range of a content resource. The system determines the chunks overlapped by the specified byte range and sends a byte range request to the origin server for the overlapped chunks not already stored in a cache. The system stores the bytes of received responses as chunks in the cache and responds to the received request using the chunks stored in the cache. The system serves subsequent requests that overlap with previously requested ranges of bytes from the already retrieved chunks in the cache and makes requests to the origin server only for those chunks that a client has not previously requested.
Methods and systems for implementing a regionally contiguous proxy service
System and method for efficiently implementing scalable, highly efficient decentralized proxy services through proxy infrastructures situated in different geo-locations. In one aspect, the systems and methods enable users from any geographical location to send requests to the geographically closest proxy infrastructure. One exemplary method described allows proxy infrastructures to gather, classify, and store metadata of exit nodes in its internal database. In another aspect, systems and methods described herein enable proxy infrastructures to select metadata of exit nodes from its internal database and forward requests from a user device to respective proxy servers or proxy supernodes to which the selected exit nodes are connected.