H04L67/59

Providing communication services using sets of I/O user devices

A user terminal emulation server maintains a database identifying network addresses, UI capabilities, and communication protocols of I/O user devices. Communication sessions are established between a user terminal emulation application and a network entity and I/O user devices proximately located to a user and provide a combined I/O user interface. Delay profiles are determined between the application and the I/O user devices. A downlink flow from the network entity is split into a plurality of downlink flow components assigned to the I/O user devices. For each of the downlink flow components, the server formats the component for transmission to the assigned I/O user device, initiates transmission of the formatted downlink flow component to the assigned I/O user device, and controls timing for when the formatted downlink flow component is transmitted to the assigned I/O user device based on the delay profile associated with the assigned I/O user device.

Providing communication services using sets of I/O user devices

A user terminal emulation server maintains a database identifying network addresses, UI capabilities, and communication protocols of I/O user devices. Communication sessions are established between a user terminal emulation application and a network entity and I/O user devices proximately located to a user and provide a combined I/O user interface. Delay profiles are determined between the application and the I/O user devices. A downlink flow from the network entity is split into a plurality of downlink flow components assigned to the I/O user devices. For each of the downlink flow components, the server formats the component for transmission to the assigned I/O user device, initiates transmission of the formatted downlink flow component to the assigned I/O user device, and controls timing for when the formatted downlink flow component is transmitted to the assigned I/O user device based on the delay profile associated with the assigned I/O user device.

Artificial intelligence delivery edge network
11734611 · 2023-08-22 · ·

Approaches, techniques, and mechanisms are disclosed for accessing AI services from one region to another region. An artificial intelligence (AI) service director is configured with mappings from domain names of AI cloud engines to IP addresses of edge nodes of an AI delivery edge network. The AI cloud engines are located in an AI source region. The AI delivery edge network is deployed in a non-AI-source region. An AI application, which accesses AI services using a domain name of an AI cloud engine in the AI cloud engines located in the AI source region, is redirected to an edge node in the edge nodes of the AI delivery edge network located in the non-AI-source region. The AI application is hosted in the non-AI-source region. The AI services is then provided, by way of the edge node located in the non-AI-source region, to the AI application.

Artificial intelligence delivery edge network
11734611 · 2023-08-22 · ·

Approaches, techniques, and mechanisms are disclosed for accessing AI services from one region to another region. An artificial intelligence (AI) service director is configured with mappings from domain names of AI cloud engines to IP addresses of edge nodes of an AI delivery edge network. The AI cloud engines are located in an AI source region. The AI delivery edge network is deployed in a non-AI-source region. An AI application, which accesses AI services using a domain name of an AI cloud engine in the AI cloud engines located in the AI source region, is redirected to an edge node in the edge nodes of the AI delivery edge network located in the non-AI-source region. The AI application is hosted in the non-AI-source region. The AI services is then provided, by way of the edge node located in the non-AI-source region, to the AI application.

Automatic IPV6/IPV4 fallback approach in proxy networks
11736435 · 2023-08-22 · ·

The method for an automated IPv6/IPv4 fallback approach in proxy networks is presented. In some embodiments, the method comprises receiving, at a proxy server, a request from a client executing on a client computer for access to a target computer; determining identification-information of the client; determining an address pair including an IPv6 address and an IPv4 address of the proxy server; assigning the address pair to the identification-information of the client; establishing a first communications connection between the client computer and the proxy server using one of IP addresses included in the address pair, and a second communications connection between the proxy server and the target computer using one of IP addresses included in the address pair; and facilitating a network packet flow between the client computer and the target computer using the first communications connection and the second communications connection.

CLOUD-BASED VEHICLE COMMUNICATION MANAGER
20230262432 · 2023-08-17 ·

Cloud-based communication management is provided. Status information regarding vehicles is maintained to a non-volatile storage. A request intended to be performed by one of the vehicles is received to a cloud server over a communications network from a requesting device. Responsive to the request being performable by a mobile edge computing (MEC) device in a cell of the communications network instead of the one of the vehicles, the request is sent by the cloud server to the MEC device to be processed by the MEC device instead of being performed by the one of the vehicles.

METHOD FOR PROCESSING VIA CONDITIONAL AUTHORIZATION

A system and method for transaction processing with conditional authorization are disclosed. The method includes receiving an authorization request message from a resource provider and sending the authorization request message to an authorizing entity. When an error response is received from the authorizing entity, the method includes determining a conditional authorization response and sending the conditional authorization response to the resource provider. Then a final authorization response is sent to the resource provider.

Adapter for providing unified transaction interface

Embodiments of the invention are directed to enabling access transaction systems to accept different communication protocols. In some embodiment, an access device receives, from a portable device, an indication that a transaction is to be performed by exchanging transaction information between the portable device and a remote computer, wherein the remote computer is configured to communicate using a first communication protocol. Next, the access device determines that the portable device is configured to communicate using a second communication protocol. The access device then converts communications between the portable device and the remote computer from the second communication protocol to the first communication protocol to assist the portable device and the remote computer in exchanging the transaction information.

Adapter for providing unified transaction interface

Embodiments of the invention are directed to enabling access transaction systems to accept different communication protocols. In some embodiment, an access device receives, from a portable device, an indication that a transaction is to be performed by exchanging transaction information between the portable device and a remote computer, wherein the remote computer is configured to communicate using a first communication protocol. Next, the access device determines that the portable device is configured to communicate using a second communication protocol. The access device then converts communications between the portable device and the remote computer from the second communication protocol to the first communication protocol to assist the portable device and the remote computer in exchanging the transaction information.

System and Method for Improving Internet Communication by Using Intermediate Nodes
20230254386 · 2023-08-10 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both. The partition into slices may be overlapping or non-overlapping, and the same slice (or the whole content) may be fetched via multiple tunnel devices.