Patent classifications
H04L67/59
SYSTEM AND METHOD FOR REDUCING BANDWIDTH USAGE OF A NETWORK
A method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value.
SYSTEM AND METHOD FOR REDUCING BANDWIDTH USAGE OF A NETWORK
A method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value.
FIRE-AND-FORGET OFFLOAD MECHANISM FOR NETWORK-BASED SERVICES
In various embodiments, a proxy application processes requests associated with a network-based service. In operation, the proxy application determines that a first request received from a client application indicates that a response to the first request can be offloaded from a server machine. Prior to transmitting the first request to the server machine, the proxy application transmits a response to the first request to the client application. The response indicates that the server machine has successfully processed the first request. Advantageously, upon receiving the response, the client application is able to initiate a second request irrespective of the server machine.
Proxy for avoiding on-line tracking of user
The invention provides a method that allows to counter tracking mechanisms to which user terminals are exposed when they communicate data on the Internet. This is achieved by a proxy 5 system, which conceals the activity of user terminals from such tracking mechanisms. At the same time, the proxy system builds an enriched and detailed activity and user profile, to which third parties may be granted conditional access.
Synchronizing cloud data based upon network sensing operations
Disclosed herein are embodiments of a cloud data synchronization system enabling an user operating a mobile client device to download mission-specific data sets from a fixed cloud-based server system to a database of the mobile client device, and then use the downloaded data sets independently on the mobile client device when the mobile client device is disconnected from a network connecting to the fixed cloud-based server system. When connectivity to the fixed cloud-based server system is re-established by the mobile client device in an intermittent and bandwidth-limited communication network environment, the fixed cloud-based server system may provide bi-directional data synchronization between records of the fixed cloud-based server system and the mobile client device to update the data sets on the fixed cloud-based server system and the mobile client device while operating in the intermittent and bandwidth-limited communication network environment.
Gaming apparatus supporting virtual peripherals and funds transfer
In one embodiment, a peripheral management device may have a controller configured to communicate with a gaming machine and a portable electronic device. The controller may be configured to: (i) receive a peripheral data packet from a gaming machine processor, the peripheral data packet including at least one command; (ii) determine whether to process the peripheral data packet on at least one peripheral device of the gaming machine or at least one virtual peripheral device of the portable electronic device; (iii) generate an instructional data packet for the at least one virtual peripheral device if the peripheral data packet is determined to be processed on the at least one virtual peripheral device; and (iv) transmit the instructional data packet to the portable electronic device.
System and method for improving internet communication by using intermediate nodes
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device access an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both. The partition into slices may be overlapping or non-overlapping, and the same slice (or the whole content) may be fetched via multiple tunnel devices.
REMOTE EXECUTION USING A GLOBAL IDENTITY
Embodiments of the present disclosure may provide a streamlined process for performing operations, such as data sharing and data replication, using multiple accounts. A global identity (also referred to as an organization user) may be employed, where the global identity may have access to multiple accounts across the same or different deployments. The global identity may switch between accounts from its login session and perform various tasks in the context of different accounts without undergoing further authentication.
Terminal, cloud apparatus, driving method of terminal, method for processing cooperative data, computer readable recording medium
A terminal, a cloud apparatus, a method of analyzing, by a terminal, activities of a user, and a method of analyzing, by a cloud apparatus, activities of a user. The terminal includes a communication interface that communicates with an external apparatus over a network; a controller that obtains data used to predict activities of a user and anonymize a portion of the obtained data, and transmit the anonymized data and a remaining portion of the data, which is not anonymized, to the external apparatus through the communication interface; and a display that displays notification information related to the activities of the user based on activity prediction data received from the external apparatus, the activity prediction data being generated based on an analysis of the transmitted data.
Distributed database for synchronizing the accessibility of nodes and shared devices
A technique for an access node to synchronize the accessibility of a plurality of access nodes within a network is described. The technique receives an accessibility update and/or device update from a remote node. For the accessibility update, the access node compares entries in the accessibility update to the local accessibility table. If entries in the accessibility update are more up-to-date than the local accessibility table, the access node adjusts the local accessibility table to reflect the updates. The local access node compares the node identifier, heartbeat, and timestamp to determine whether and entry in the local accessibility table is up-to-date. For the device update, the access node compares entries in the device update to the local device table. If entries in the device update are more up-to-date than the local device table, the access node adjusts the local device table to reflect the updates.