H04L67/564

Support for Multi-Type Users in a Single-Type Computing System
20230050683 · 2023-02-16 ·

Persistent storage contains a parent table and one or more child tables, the parent table containing: a class field specifying types, and one or more filter fields. One or more processors may: receive a first request to read first information of a first type for a first entity; determine that, in a first entry of the parent table for the first entity, the first type is specified in the class field; obtain the first information from a child table associated with the first type; receive a second request to read second information of a second type for a second entity; determine that, in a second entry of the parent table for the second entity, the second type is indicated as present by a filter field that is associated with the second type; and obtain the second information from a set of additional fields in the second entry.

Support for Multi-Type Users in a Single-Type Computing System
20230050683 · 2023-02-16 ·

Persistent storage contains a parent table and one or more child tables, the parent table containing: a class field specifying types, and one or more filter fields. One or more processors may: receive a first request to read first information of a first type for a first entity; determine that, in a first entry of the parent table for the first entity, the first type is specified in the class field; obtain the first information from a child table associated with the first type; receive a second request to read second information of a second type for a second entity; determine that, in a second entry of the parent table for the second entity, the second type is indicated as present by a filter field that is associated with the second type; and obtain the second information from a set of additional fields in the second entry.

Dynamically coordinated service maintenance operations and adaptive service polling for microservices

Techniques are provided for a coordinated microservice system including a coordinator and multiple services, which interact with each other. Each of the services can have multiple execution instances, which run independently of each other. In operation, the current status of each instance is evaluated against one or more rules to determine whether the current status changes the topography of the services and updating the topography based on the changes. An execution plan is created for executing a command based on one or more predefined rules and the updated topography, where the execution plan includes one or more steps for executing the command on each instance of the service. The execution plan is executed on each instance of the service in accordance with the one or more predefined rules.

Dynamically coordinated service maintenance operations and adaptive service polling for microservices

Techniques are provided for a coordinated microservice system including a coordinator and multiple services, which interact with each other. Each of the services can have multiple execution instances, which run independently of each other. In operation, the current status of each instance is evaluated against one or more rules to determine whether the current status changes the topography of the services and updating the topography based on the changes. An execution plan is created for executing a command based on one or more predefined rules and the updated topography, where the execution plan includes one or more steps for executing the command on each instance of the service. The execution plan is executed on each instance of the service in accordance with the one or more predefined rules.

Browser extension for validating communications

A computing device comprising a secure browser extension for a web browser monitors for satisfaction of one or more operating conditions to identify whether one or more unauthorized applications are intercepting web browser communications. Based on satisfaction of at least one operating condition, the secure browser extension of the computing device sends an HTTPS request to a known service via the web browser. The secure browser extension receives an HTTPS response to the HTTPS request via the web browser. The secure browser extension determines whether the certificate included in the HTTPS response is trusted by the secure browser extension. Based on determining the certificate is not trusted, the secure browser extension terminates the web browser session and generates a notification for display at the computing device that indicates web browser communications are compromised.

Activity detection in web applications
11582318 · 2023-02-14 · ·

An analytics server receives from client computing devices end-user events. Each client computing device is operated by an end-user to access an application at a web server based on the end-user events resulting in calls being passed through a proxy to the web server. The analytics server receives from the proxy the calls being made to the web server, and receives return responses from the web server being passed through the proxy. The return responses correspond to activities being performed within the application. The end-user events are correlated with the corresponding calls and return responses from the proxy. Respective correlated end-user events, calls and return responses are translated into respective event vectors. The respective event vectors are processed to determine similarities among the client computing devices. The similar activities are associated with a quality indicator to identify anomalies within the application for corrective action to be taken.

Wireless network policy manager for a service mesh

A computer device may include a memory storing instructions and processor configured to execute the instructions to host a network function container that implements a microservice for a network function in a wireless communications network, wherein the network function container is deployed by a container orchestration platform; host a service proxy container associated with the network function container, wherein the service proxy container is deployed by the container orchestration platform; and configure the hosted service proxy container to apply a wireless network policy to the microservice for the network function. The processor may be further configured to intercept messages associated with the microservice for the network function using the configured service proxy container; and apply the wireless network policy to the intercepted messages using the configured service proxy container.

Integrated secure device manager systems and methods for cyber-physical vehicles

Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.

Systems, methods, and apparatus to process background requests while monitoring network media

Methods, apparatus, systems, and articles of manufacture to monitor mobile Internet usage are disclosed. Example apparatus disclosed herein to monitor application usage associated with a device means for differentiating between foreground requests and background requests included in a burst of logged requests. Disclosed example apparatus further include means for calculating a presentation duration for a first application executed by the device based on at least a subset of the foreground requests identified in the burst of logged requests.

Systems, methods, and apparatus to process background requests while monitoring network media

Methods, apparatus, systems, and articles of manufacture to monitor mobile Internet usage are disclosed. Example apparatus disclosed herein to monitor application usage associated with a device means for differentiating between foreground requests and background requests included in a burst of logged requests. Disclosed example apparatus further include means for calculating a presentation duration for a first application executed by the device based on at least a subset of the foreground requests identified in the burst of logged requests.