Patent classifications
H04L67/1019
System and method for cloud-based analytics
A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics platform may allow the manual and automatic uploading to and/or downloading from a cloud server. The platform may include single sign-on (SSO) capabilities such that a user may have one set of credentials to access data from the cloud-based analytics and/or data stored locally. The platform may include data validation and processing in order to provide real-time feedback on uploads based on file type, file size, access rights, extracted data, and transformed data.
Sharing cryptographic session keys among a cluster of network security platforms monitoring network traffic flows
A first example network security platform disclosed herein includes a platform selector to determine a platform selection value based on a first parameter value in a first message from a client and a second parameter value in a second message from a server, the first and second messages associated with establishment of an encrypted network traffic flow between the client and the server. The example first network security platform also includes a key retriever to obtain a cryptographic session key associated with the encrypted network traffic flow from a selected one of a cluster of network security platforms based on the platform selection value, the first network security platform included in the cluster of network security platforms. The example first network security platform further includes a traffic analyzer to analyze network traffic associated with the encrypted network traffic flow based on the cryptographic session key.
DATA PROCESSING METHOD AND APPARATUS, AND COMPUTING NODE
A data processing method and apparatus are disclosed. The data processing method includes: receiving, by a first edge computing node in an edge computing cluster, a container image update instruction; obtaining, by the first edge computing node, a to-be-updated container image; and sending, by the first edge computing node, the to-be-updated container image to another edge computing node in the edge computing cluster. The first edge computing node is an edge computing node in the edge computing cluster, the edge computing cluster includes at least two edge computing nodes, and the container image update instruction is used to instruct the at least two edge computing nodes in the edge computing cluster to update a container image. In this way, the time required for downloading the container image is reduced.
Selection of ranked service instances in a service infrastructure
Embodiments generally relate to selecting a service instance in a service infrastructure. In some embodiments, a method includes sending, by a service registry, a status request to each service instance of a plurality of service instances, where the service registry maintains a data store of performance information associated each of the service instances. The method further includes receiving, by the service registry, a plurality of status responses, where each status response is received from a respective service instance of the plurality service instances, and where each status response includes one or more performance characteristics. The method further includes ranking, by the service registry, the service instances based at least in part on the one or more performance characteristics. The method further includes performing, by the service registry, service lookups based on the ranking.
Data-interoperability-oriented trusted processing method and system
A data-interoperability-oriented trusted processing method and system applied to a P2P network system are provided. The P2P network system includes a plurality of nodes. The trusted processing method includes a storage method and a query method. Firstly, a directed acyclic graph ledger structure is employed to be matched with an nRW consensus mechanism during a storage process, so that a supervision problem in a large-scale sharing exchange process is solved. Secondly, in a query process, a P2P network system is optimized by maintaining a tree structure with high fault tolerance and load balance through a hop optimization method to construct the P2P network system with a relatively balanced network, so that a query delay is not greatly influenced on the premise of ensuring the load balance, and an expandability of the system is ensured.
DATA-INTEROPERABILITY-ORIENTED TRUSTED PROCESSING METHOD AND SYSTEM
A data-interoperability-oriented trusted processing method and system applied to a P2P network system are provided. The P2P network system includes a plurality of nodes. The trusted processing method includes a storage method and a query method. Firstly, a directed acyclic graph ledger structure is employed to be matched with an nRW consensus mechanism during a storage process, so that a supervision problem in a large-scale sharing exchange process is solved. Secondly, in a query process, a P2P network system is optimized by maintaining a tree structure with high fault tolerance and load balance through a hop optimization method to construct the P2P network system with a relatively balanced network, so that a query delay is not greatly influenced on the premise of ensuring the load balance, and an expandability of the system is ensured.
Workload balancing technique for a telephone communication system
A workload balancing technique enhances balancing of workloads processed by components of a telephone communication system configured to render telephony services over a computer network. The telephony services illustratively include private branch exchange (PBX) services suitable for customers with geographically dispersed telephone service demands. The workload balancing technique is invoked by the communication system to reduce contention among the components of the system, such as telephone access servers (TASes) coupled to a proxy router, when servicing telephony requests issued by the customers, thus enabling rendering of the telephony services in an efficient and cost-effective manner. As described herein, an available TAS is randomly selected to service a telephony request received by the proxy router from a network coupled to the communication system.
Efficient data forwarding in a networked device
A method for network communication is provided. The method includes assigning a first network port identifier for return communication to a packet that originates on a node of the network device and determining whether the packet has a destination internal or external to the network device. The method includes translating the first network port identifier for return communication to a second network port identifier that is within a range of network port identifiers specific to the node, responsive to determining the packet has the external destination, and sending the packet from the node of the network device to the external destination, with the packet having the second network port identifier for return communication.
Multi-Tenant Identity Cloud Service with On-Premise Authentication Integration and Bridge High Availability
Embodiments include a multi-tenant cloud system that receives a request for an authenticate action for a user. Embodiments create an authenticate target action and register a cache listener for a cache that includes a filter to listen for a target action response that is responsive to the authenticate target action, the filter listing a plurality of bridges assigned to an on-premise active directory. Embodiments randomly select one of the plurality of bridges and sends the authenticate target action to the active directory via the selected bridge. Embodiments wait for a cache callback and, at the cache callback, receive a target action response that includes a result of the authenticate action.
Systems and Methods for Server Failover and Load Balancing
Systems and methods for server failover and/or load balancing are provided herein. Systems for server failover and load balancing may include a computer system in electronic communication over a network with one or more client applications, the computer system including a plurality of servers, and an engine stored on and executed by a client, the engine configured to allow one or more clients to select a target server among the plurality of servers using a client application identifier.