H04L41/0293

Inheritance of universal resource identifier (URI) parameters
09769010 · 2017-09-19 · ·

A method is provided for accessing a multimedia content containing at least one data segment. This data segment is accessible via a document describing the content. The method includes a first step of obtaining the document describing the content, from which document at least a first universal address of a segment is generated; a second step of obtaining at least one parameter associated with the universal address of the document describing the content; a step of reading at least one address generator rule in the document describing the content; and as a function of the address generator rule, of the first universal address of the segment, and of the parameter that has been obtained, a last step of generating the second universal address for the segment. Also provided is a method of generating a document that is suitable for use in the context of the access method.

MONEY TRANSFER BY USE OF A PAYMENT PROXY
20220230148 · 2022-07-21 ·

In some examples, a financial transaction is effectuated between first and second users of a payment service system. The payment service system receives, from the first user, a request for a first payment proxy identifier for the first user, and receives from the second user, a request for a second payment proxy identifier for the second user. The payment service system generates the payment proxy identifiers with a currency indicator prefixing one or more alphanumeric characters. The payment proxy identifiers enable the payment service system to identify the financial accounts of the respective users in lieu of payment card mechanisms. The payment service system receives a message from the second user indicating a money transfer request, initiates a transfer of funds from an account of the second user to an account of the first user, and sends an email message to the first user indicating the transfer of funds.

Integrated analysis and reclamation of remote service resources

One or more databases contain data defining: a common authentication configuration for a plurality of remote services, and individual authentication configurations for each of the remote services, where a particular remote service of the remote services is associated with a particular individual authentication configuration. One or more server devices are configured to: (i) access, by way of the common authentication configuration and the particular individual authentication configuration, a master userid of the particular remote service; (ii) receive, from the particular remote service, a list of userids that are registered to the managed network and configured to use the particular remote service; (iii) receive, from the particular remote service, access data representing use of the particular remote service by the userids; (iv) determine, from the access data, most-recent access times of the userids; and (v) store, in the one or more databases, representations of the most-recent access times.

Network Topology Discovery Method, Device, and System
20210377125 · 2021-12-02 ·

A network topology discovery method, includes: A second network device receives a first LLDP packet sent by a first network device. The first LLDP packet includes first slice information, and the first slice information is used to indicate a network slice to which a first port of the first network device belongs. The second network device sends the first slice information and second slice information to a management device. The second slice information is used to indicate a network slice to which a second port of the second network device belongs.

Network management device and method for discovering and managing network connected databases

Systems, software, and methods for managing traditional (i.e., TCP/IP-based), non-traditional, and traditional-non-traditional hybrid networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device, application or service on a network. In another example, information related to at least one aspect of the network is obtained by a network management device through connection to a non-TCP/IP network, or by way of a gateway device or application, at least one applicable management policy is identified, and the identified policy is used to manage at least one aspect of the network's operation. In another example, devices, applications or services presenting various behaviors under various scenarios are evaluated and placed under management.

WEB LOCATION IMPLEMENTING PAYMENT PROXY

In some examples, a system receives a request to associate a user-defined payment proxy with a financial account of a first user. The payment proxy has a syntax including a symbol followed by a string of characters. The system may generate a webpage in which the user-defined payment proxy is included in the URL of the webpage. The system may detect the payment proxy in a message associated with a second user, and may cause the webpage to be displayed on the device of the second user, including an entry field for receiving a payment amount to transfer to the first user. Based on identifying the financial account of the first user at least based on the payment proxy included in the URL of the webpage, the system initiates a transfer of the payment amount to the financial account of the first user.

Health monitoring for cloud computing platforms

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a health monitoring system for a cloud application platform. One of the methods includes deploying, by a health monitoring application of a cloud application platform that provisions resources from an underlying cloud infrastructure system, probes for testing components of the cloud application platform. Each probe is configured to perform tests that measure performance of a component of the cloud application platform. A probe can attempt to provision resources from the underlying cloud infrastructure system by launching a test application on the cloud application platform and determine whether the test application launched successfully using resources from the underlying cloud infrastructure system. The health monitoring application receives results of the tests and provides, for display in a graphical user interface, a representation of a history of the results of the tests for at least one of the components.

Payment proxy including a user-defined identifier

In some examples, a system generates an identifier for association with a user financial account. The identifier may have a syntax including a currency indicator and a string including one or more characters concatenated together such that the currency indicator appears immediately before the string. The system generates a user-defined identifier and maps, in a database, the user-defined identifier to the user financial account. The system receives a message indicating an intent to transfer funds from a sending user to a receiving user. The message may include the user-defined identifier in lieu of account information of the user financial account, to identify the user as the receiving user. The system parses the message to identify the user-defined identifier and accesses the account information of the user financial account using the identifier. The system initiates a transfer of funds from the sending user account to the user financial account.

MONEY TRANSFER BY USE OF A PAYMENT PROXY
20230022512 · 2023-01-26 ·

In some examples, a payment system generates, for a first user, a proxy identifier having a syntax including a symbol and a string of one or more characters that are concatenated such that the symbol appears immediately before the string. The proxy identifier is associated with a financial account of the first user. The payment system receives an indication of an intent to transfer funds from a second user to the first user. The indication includes the proxy identifier in lieu of financial account information of the first user, and to identify the financial account of the first user for receiving the funds. Based at least on identifying the proxy identifier, the payment system accesses the financial account information of the first user and initiates the transfer of funds from the financial account of the second user to the financial account of the first user.