H04L67/564

METHODS AND APPARATUS TO IDENTIFY MAIN PAGE VIEWS
20230216935 · 2023-07-06 ·

Methods, apparatus, systems, and articles of manufacture are disclosed to identify main page views. An example apparatus includes at least one memory, machine readable instructions, and processor circuitry to at least one of instantiate or execute the machine readable instructions to: access a log of requests from a proxy, the log of requests including main page requests and embedded page requests, the log of requests including timestamps corresponding to the main page requests and the embedded page requests, identify, based on consecutive ones of the timestamps occurring within a time interval, at least one of the main page requests associated with the time interval, and credit the at least one of the main page requests as a main page view.

Network computing system executing programmatic adapters to implement asynchronous communications

A computing system can establish asynchronous network communications with exchanges to facilitate cross-medium transactions between originating and recipient clients. Such communications can result in filtering out errant responses that would otherwise cause an open transaction to fail.

Cloud-based explicit proxy with private access feature set
11695736 · 2023-07-04 · ·

A system for processing data is disclosed that includes a first processor configured to operate one or more algorithms to identify a user identity as a function of user metadata and to provide access to a predetermined network resource using a cloud-based explicit proxy as a function of the user identity and one or more service requests, the first processor configured to operate one or more algorithms to detect a change in the one or more service requests and wherein access to the predetermined network resources using the cloud-based explicit proxy is modified as a function of the detected change in the one or more service requests.

Automated sequential site navigation

A website is navigated automatically in a sequential manner, for example by performing a series of specific network requests in a specified order, without necessarily using a browser, and without necessarily rendering each web page in the sequence. Interactions with a website are automatically recorded, stored, and analyzed. Requests and responses can be associated with particular in-put/output operations. Based on the analysis, the system can determine what data is expected by web servers, so that it can effectively simulate browser operations in connection with those web servers, and extract useful information from the data received in response to those operations. Thus, data extraction and/or other operations can be performed more efficiently and more quickly, while reducing the computing resources needed.

Automated sequential site navigation

A website is navigated automatically in a sequential manner, for example by performing a series of specific network requests in a specified order, without necessarily using a browser, and without necessarily rendering each web page in the sequence. Interactions with a website are automatically recorded, stored, and analyzed. Requests and responses can be associated with particular in-put/output operations. Based on the analysis, the system can determine what data is expected by web servers, so that it can effectively simulate browser operations in connection with those web servers, and extract useful information from the data received in response to those operations. Thus, data extraction and/or other operations can be performed more efficiently and more quickly, while reducing the computing resources needed.

COMPUTING DEVICE FOR EXECUTING INDIRECT COMMANDS

A processor may receive, by a computing device, the indirect command from a user. The indirect command may include an instruction to the computing device to collect an information dataset from a secondary source. A processor may analyze the information dataset from the secondary source. A processor may determine one or more actions to be performed. The one or more actions may be based, at least in part, on the information dataset from the secondary source. A processor may execute the one or more actions.

Enforcing security policies on mobile devices in a hybrid architecture
11533307 · 2022-12-20 · ·

Systems and methods include intercepting traffic on a mobile device based on a set of rules; determining whether a connection associated with the traffic is allowed based on a local map associated with an application; responsive to the connection being allowed or blocked based on the local map, one of forwarding the traffic associated with the connection when allowed and generating a block of the connection at the mobile device when blocked; and, responsive to the connection not having an entry in the local map, forwarding a request for the connection to a cloud-based system for processing therein. The cloud-based system is configured to allow or block the connection based on the connection not having an entry in the local map.

Enforcing security policies on mobile devices in a hybrid architecture
11533307 · 2022-12-20 · ·

Systems and methods include intercepting traffic on a mobile device based on a set of rules; determining whether a connection associated with the traffic is allowed based on a local map associated with an application; responsive to the connection being allowed or blocked based on the local map, one of forwarding the traffic associated with the connection when allowed and generating a block of the connection at the mobile device when blocked; and, responsive to the connection not having an entry in the local map, forwarding a request for the connection to a cloud-based system for processing therein. The cloud-based system is configured to allow or block the connection based on the connection not having an entry in the local map.

Method and system for transparent tcp proxy to containerized applications

Example aspects include techniques for implementing a transparent TCP proxy for containerized applications. These techniques may include receiving an outgoing packet from the containerized application via a container bridge and determining, based on a connection associated with the outgoing packet, whether the outgoing packet corresponds to an incoming packet identified by a first marking as being redirected through the TCP proxy. In addition, the techniques may include in response to determining that the outgoing packet corresponds to the incoming packet, adding a second marking to the outgoing packet to indicate that the outgoing packet is to be routed through the TCP proxy, sending the outgoing packet to the TCP proxy based on the second marking, and transmitting an outgoing processed packet to an external device having the destination address, the outgoing processed packet resulting from a performance of a proxy operation by the TCP proxy on the outgoing packet.

System and method for controlling electronic communications

Example embodiments include a controlled content repository, wherein the controlled content repository is accessible according to an access protocol, wherein the access protocol comprises at least one set of access rules, wherein the access protocol enables determining if first data associated with a first object and second data associated with a second object can be made available to a first computing device; a data structure for storing a first object and a second object; and a controlling computing device, in communication with the controlled content repository, for providing the first data associated with the first object and the second data associated with the second object to the first computing device after determining that the first data associated with the first object and the second data associated with the second object is authorized to be made available to the first computing device in accordance with the access protocol.