H04L67/1074

Downloading of server-based content through peer-to-peer networks

A system is described for downloading server-based content to peers in a P2P network. The server-based content can be partitioned and different peers can be given priority for downloading the different parts. A client on each peer can view what content is available on each of the other peers as well as what content is available on a virtual peer, which represents content on the server and only makes content that exists on the server and not on any peers available for download. Consequently, a client on a peer requesting to download the content can download the content from the peers and the virtual peer based on a file sharing protocol, such as BitTorrent.

SYSTEM FOR TRIGGERING RESOURCE CHANNEL MAPPING FOR DYNAMIC AUTHENTICATION
20230216916 · 2023-07-06 · ·

Systems, computer program products, and methods are described herein for triggering resource channel mapping for dynamic authentication. The present invention is configured to receive, from a user input device, a request from a user to access resources via a first resource channel; retrieve information associated with the user; query a resource channel repository using the information associated with the user; retrieve, from the resource channel repository, information associated with a second resource channel based on at least the query, wherein the second resource channel is associated with the user; in response, automatically trigger a resource channel mapping engine; map, using the resource channel mapping engine, the second resource channel and the first resource channel; and in response, authorize the request to access the resources via the first resource channel.

Distributed software defined networking

The Distributed Software Defined Network (dSDN) disclosed herein is an end-to-end architecture that enables secure and flexible programmability across a network with full lifecycle management of services and infrastructure applications (fxDeviceApp). The dSDN also harmonizes application deployment across the network independent of the hardware vendor. As a result, the dSDN simplifies the network deployment lifecycle from concept to design to implementation to decommissioning.

System and method for peer group detection, visualization and analysis in identity management artificial intelligence systems using cluster based analysis of network identity graphs

Systems and methods for graph based artificial intelligence systems for identity management systems are disclosed. Embodiments of the identity management systems disclosed herein may utilize a network graph approach to peer grouping of identities of distributed networked enterprise computing environment. Specifically, in certain embodiments, data on the identities and the respective entitlements assigned to each identity as utilized in an enterprise computer environment may be obtained by an identity management system. A network identity graph may be constructed using the identity and entitlement data. The identity graph can then be clustered into peer groups of identities. The peer groups of identities may be used by the identity management system and users thereof in risk assessment or other identity management tasks.

System and method for peer group detection, visualization and analysis in identity management artificial intelligence systems using cluster based analysis of network identity graphs

Systems and methods for graph based artificial intelligence systems for identity management systems are disclosed. Embodiments of the identity management systems disclosed herein may utilize a network graph approach to peer grouping of identities of distributed networked enterprise computing environment. Specifically, in certain embodiments, data on the identities and the respective entitlements assigned to each identity as utilized in an enterprise computer environment may be obtained by an identity management system. A network identity graph may be constructed using the identity and entitlement data. The identity graph can then be clustered into peer groups of identities. The peer groups of identities may be used by the identity management system and users thereof in risk assessment or other identity management tasks.

Peer-to-peer (P2P) downloading
11695829 · 2023-07-04 · ·

The present disclosure provides a method, system, and device for peer-to-peer downloading across a network. To illustrate, a server may receive a request from a peer device for at least a portion of a file. The server may send, to the peer device, download information including a checksum corresponding to the portion of the file, a token corresponding to authorization for the peer device to perform P2P communication, an indicator that identifies at least one device that includes the portion of the file, or a combination thereof. The server may update tracking information to indicate that the peer device received the portion of the file.

Peer-to-peer (P2P) downloading
11695829 · 2023-07-04 · ·

The present disclosure provides a method, system, and device for peer-to-peer downloading across a network. To illustrate, a server may receive a request from a peer device for at least a portion of a file. The server may send, to the peer device, download information including a checksum corresponding to the portion of the file, a token corresponding to authorization for the peer device to perform P2P communication, an indicator that identifies at least one device that includes the portion of the file, or a combination thereof. The server may update tracking information to indicate that the peer device received the portion of the file.

Unified integration pattern protocol for centralized handling of data feeds
11695822 · 2023-07-04 · ·

System and methods are provided for implementing a Unified Integration Pattern (UIP) protocol for centralized handling of data feeds between client systems. In embodiments, a method includes: receiving an authentication Application Program Interface (API) message and data file transfer request for a data transfer event from a sending client system in a network of distinct client systems; authenticating the sending client system based on the authentication API message; uploading a data file from the sending client system based on the authenticating; receiving a notification API message from the sending client system indicating that that uploading of the data file to the computer system is complete; sending the data file to a receiving client system in the network of distinct client systems based on API message and data file request and the notification API message; and sending a notification message to the sending client system regarding the data transfer event.

Unified integration pattern protocol for centralized handling of data feeds
11695822 · 2023-07-04 · ·

System and methods are provided for implementing a Unified Integration Pattern (UIP) protocol for centralized handling of data feeds between client systems. In embodiments, a method includes: receiving an authentication Application Program Interface (API) message and data file transfer request for a data transfer event from a sending client system in a network of distinct client systems; authenticating the sending client system based on the authentication API message; uploading a data file from the sending client system based on the authenticating; receiving a notification API message from the sending client system indicating that that uploading of the data file to the computer system is complete; sending the data file to a receiving client system in the network of distinct client systems based on API message and data file request and the notification API message; and sending a notification message to the sending client system regarding the data transfer event.

Content centric sharing of digital objects

A unique bag identifier is generated for digital objects to be stored in object storage. A unique download identifier is generated for downloading of these objects and a unique upload identifier is generated for uploading of the objects; all three identifiers are associated in a database. The identifiers are distributed verbally, by electronic mail, by text message, etc. Any holder of these identifiers may access the digital objects without a user account and without installing an application on a computing device other than using a browser. A QR code or alphanumeric code is displayed on a computing device in order to allow another device to access the objects. Objects may be uploaded via electronic mail. Uploading or downloading is protected by an owner-generated password. Digital objects are sealed by calculating their hashes, placing these hashes in a file and calculating a hash for that file. This file hash is submitted to a block chain and a transaction identifier is returned.