Patent classifications
H04L67/564
METHOD AND SYSTEM FOR PROVIDING HIGH EFFICIENCY, BIDIRECTIONAL MESSAGING FOR LOW LATENCY APPLICATIONS
A system and a method for routing a message to an application over a connection oriented session in a Kafka messaging platform environment are provided. The method includes: acquiring a plurality of partitions from the Kafka messaging platform; designating a first partition from among the plurality of partitions as a sticky partition; generating a plurality of routing keys that are configured to route to the sticky partition; receiving a subscription from a service that corresponds to a first application; transmitting, to the first application, a first routing key that identifies the subscription from among the plurality of routing keys; and receiving messages from Kafka services that are routed by the first routing key to the first application. For any particular application or set of applications, a plurality of connection oriented sessions may be used to achieve load balancing and high availability.
Systems and methods for operation retry
The present disclosure relates to systems and methods for operation retry. The system may determine whether a retry is allowed for a target operation based on a retry strategy included in a retry proxy component. In response to determining that the retry is allowed for the target operation, the system may execute the target operation. The system may detect whether there is an exception associated with the execution of the target operation. In response to determining that there is the exception associated with the execution of the target operation, the system may determine whether a retry is needed for the target operation based on the retry strategy. In response to determining that the retry is unneeded for the target operation, the system may stop the target operation.
Systems and methods for operation retry
The present disclosure relates to systems and methods for operation retry. The system may determine whether a retry is allowed for a target operation based on a retry strategy included in a retry proxy component. In response to determining that the retry is allowed for the target operation, the system may execute the target operation. The system may detect whether there is an exception associated with the execution of the target operation. In response to determining that there is the exception associated with the execution of the target operation, the system may determine whether a retry is needed for the target operation based on the retry strategy. In response to determining that the retry is unneeded for the target operation, the system may stop the target operation.
SYSTEMS AND METHODS FOR MODIFYING EMBEDDED ELEMENTS FOR RENDERING WITHIN A WEBSITE
In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for intercepting HTTP traffic (e.g., including HTTP requests and responses) for displaying a third-party website in an embedded element (e.g., inline frame) of a website. The extension may, for example, intercept HTTP requests in order to inject one or more required cookies and/or other HTTP headers in order to pass session information and other information along with the HTTP request. The browser extension may, in various other embodiments, be configured to: (1) intercept an HTTP response (e.g., to a modified HTTP request sent via the browser extension); (2) modify the HTTP response; and (3) cause a web browser to render a target website based at least in part on the modified HTTP response.
Leveraging web cookies for carrying messages across cloud application communications
Embodiments described herein leverage web cookies to carry messages across cloud application communications, wherein the messages are between entities that are not part of the cloud application itself. For example, in embodiments, a proxy server is interconnected between a client computer that is executing a front-end component of an application and an application server that is executing a back-end component of the application. The proxy server intercepts a request from the front-end component that is intended for the back-end component and generates a response thereto that includes a command to create a web cookie at the client computer, wherein the web cookie includes data to be utilized by a custom code component of the client computer. The proxy server may further cause the custom code component to be injected into the front-end component of the application for execution by the client computer.
Data processing method for mini app, apparatus, device and medium
A data processing method and apparatus for a mini app, a device and a medium are provided. An implementation of the method may include: intercepting a request message of the mini app, and sending the request message to a target server, where the request message comes from a technology stack; acquiring returned data targeting at the request message and returned from the target server, where the returned data includes cookie content, field information for indicating storage of the cookie content, and a data set corresponding to the request message; and storing the cookie content into a cookie storage database of the mini app according to the field information, and returning the returned data to the technology stack issuing the request message.
Curating proxy server pools
A system and method of forming proxy server pools is provided. The method comprises several steps, such as requesting a pool to execute the user's request and retrieving an initial group. The system checks the service history of an initial group, including whether any of the proxy servers in an initial group are exclusive to existing pools. The exclusive proxy servers in an initial group with eligible proxy servers are replaced when needed and new proxy server pools are formed. The system also records the service history of proxy servers and pools before and after the pools are created. The method can also involve predicting the pool health in relation with the thresholds foreseen and replacing the proxy servers below the threshold.
Security Techniques for Device Assisted Services
Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.
Distributed split edge application architecture
In an embodiment, application delivery to end-user devices may be handled by a combination of an application device and a distributed set of split edge devices located closer to the end-user device within a network. The split edge devices are instructed by the application device about how to manage traffic to and from the end-user devices. The application device determines whether content is stored to content cache of a split edge device. The application device, when the content is stored to the split edge device, refrains from sending the content and instead sends instructions to the split edge device that include reference to a location of the content, and instruct the split edge device to send the content to an application and/or device. The application device, when the content is not stored to the split edge device, sends the content with instructions to store the content locally.
Network controlled content recording using network and local storage
A storage controller of a network controlled content recording system that uses a combination of network and local storage determines to record content for a user. The storage controller performs an evaluation to determine whether to store the content in network or local storage. The evaluation may include evaluating a set of rules and/or characteristics of the user, characteristics of the content, characteristics of a request to record the content, and so on. The storage controller then arranges for the content to be recorded accordingly. Subsequently, the storage controller may reevaluate storage locations and direct transfer accordingly. This reevaluation may include determining that various characteristics related to the user, the content, and so on have changed and that transfer is appropriate due to that change.