-
101.
公开(公告)号:US20180146222A1
公开(公告)日:2018-05-24
申请号:US15360170
申请日:2016-11-23
发明人: Kourosh Soroushian
IPC分类号: H04N21/2368 , H04N21/434 , H04N21/8547
CPC分类号: H04N21/2368 , H04N21/23608 , H04N21/4341 , H04N21/8547
摘要: Described herein are systems, methods and apparatus for demultiplexing and multiplexing multimedia streams where one or more of the underlying elementary streams appears intermittently, that is, one or more particular elementary streams are “spurious”. Typically, a multiplexed multimedia stream contains elementary streams for video, audio and ancillary data. A transcoding process typically involves demultiplexing into elementary streams, transcoding, and then multiplexing the elementary streams back into a multiplexed stream. Bu if one of the elementary streams is not present for a time period, then a multiplexer that expects a continuous stream of data of each elementary stream type may fail or excessively buffer the elementary streams that are present. Without limitation, the teachings presented here provide solutions to the problems of handling spuriously appearing sources in a transcoding solution.
-
公开(公告)号:US09948709B2
公开(公告)日:2018-04-17
申请号:US15011409
申请日:2016-01-29
发明人: Mark C. Holland , Manish Jain
CPC分类号: H04L67/1076 , H04L43/0852 , H04L67/40
摘要: This patent document describes, among other things, methods and systems for determining which if any page resources a server might push to a client (using, e.g., an HTTP 2.0 server push mechanism). The approaches described herein improve web page load times by pushing page resources that a client is likely to need to render the base page, while reducing wasteful server pushes of resources that the client is unlikely to request from the server because, for example, they are already cached at the client.
-
公开(公告)号:US09923757B1
公开(公告)日:2018-03-20
申请号:US15723704
申请日:2017-10-03
发明人: Lance E. Hester
CPC分类号: H04L41/0604 , G06F17/30327 , G06F17/30598 , G06F17/30902 , G06F21/50 , G06F21/552 , G06F2221/2101 , H04L41/0631 , H04L63/14 , H04L63/1408 , H04L63/1441
摘要: This document describes techniques for reducing a size of data sets related to network security alarms or logs, or other messages. Preferably, the reduction is performed via a clustering and compressing algorithm that, among other things, enables an operator to provide customized control in the form of ordered, per-attribute thresholds, or “stop” points. These thresholds function to preserve important information while still achieving excellent clustering and compression results. In some embodiments, the technique described herein can be used to reliably produce reduced-size data sets composed entirely of unique entries. The unique entries can thus be used as keys into a database, e.g., for storage and later analysis or other purposes.
-
公开(公告)号:US09912784B2
公开(公告)日:2018-03-06
申请号:US14827341
申请日:2015-08-17
发明人: Charles E. Gero
IPC分类号: G06F13/00 , H04L29/06 , H04L12/743 , H04L29/08 , H04L29/12
CPC分类号: H04L69/08 , H04L29/08792 , H04L45/7453 , H04L61/1511 , H04L67/02 , H04L67/1095 , H04L67/28 , H04L67/2828 , H04L69/04
摘要: A data differencing technique enables a response from a server to the request of a client to be composed of data differences from previous versions of the requested resource. To this end, data differencing-aware processes are positioned, one at or near the origin server (on the sending side) and the other at the edge closest to the end user (on the receiving side), and these processes maintain object dictionaries. The data differencing-aware processes each execute a compression and differencing engine. Whenever requested objects flow through the sending end, the engine replaces the object data with pointers into the object dictionary. On the receiving end of the connection, when the data arrives, the engine reassembles the data using the same object dictionary. The approach is used for version changes within a same host/path, using the data differencing-aware processes to compress data being sent from the sending peer to the receiving peer.
-
公开(公告)号:US20180034930A1
公开(公告)日:2018-02-01
申请号:US15483805
申请日:2017-04-10
IPC分类号: H04L29/08
CPC分类号: H04L67/2804
摘要: Described herein are improved systems, methods, and devices for delivering and managing metadata in a distributed computing platform such as a content delivery network (CDN) so as to configure content servers to handle client requests. The teachings hereof provide, among other things, scalable and configurable solutions for delivering and managing metadata, preferably by leveraging dynamically obtained control information. For example, in one embodiment, a given content server may store metadata, e.g., in a configuration file, that references dynamic, late-bound control information for use in satisfying dependencies. This dynamic control information can be requested by the CDN content server, typically from a remote host, when needed to parse and execute the metadata.
-
公开(公告)号:US09876820B2
公开(公告)日:2018-01-23
申请号:US15633312
申请日:2017-06-26
IPC分类号: H04L29/06
CPC分类号: H04L63/166 , H04L9/0643 , H04L9/0825 , H04L9/083 , H04L9/0869 , H04L63/0435 , H04L63/0442 , H04L63/061 , H04L63/0823 , H04L2209/76
摘要: An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. To provide the forward secrecy for this particular leg, the edge server selects an ephemeral value, and applies a cryptographic hash the value to compute a server random value, which is then transmitted back to the requesting client. That server random value is later re-generated at the cryptographic server to enable the cryptographic server to compute a master secret. The forward secrecy is enabled by ensuring that the ephemeral value does not travel on the wire.
-
107.
公开(公告)号:US20180020082A1
公开(公告)日:2018-01-18
申请号:US15473279
申请日:2017-03-29
CPC分类号: H04L67/42 , H04L41/0803 , H04L41/5051 , H04L41/509 , H04L63/08 , H04L67/02 , H04L67/2814 , H04L67/322
摘要: Described herein are improved systems, methods, and devices for delivering and managing metadata in a distributed computing platform such as a content delivery network (CDN) so as to configure content servers to handle client requests. The teachings hereof provide, among other things, scalable and configurable solutions for delivering and managing metadata, preferably by leveraging dynamically obtained control information. For example, in one embodiment, a given content server may store metadata, e.g., in a configuration file, that references dynamic, late-bound control information for use in satisfying dependencies. This dynamic control information can be requested by the CDN content server, typically from a remote host, when needed to parse and execute the metadata.
-
公开(公告)号:US09819582B2
公开(公告)日:2017-11-14
申请号:US14672119
申请日:2015-03-28
IPC分类号: H04L29/06 , H04L12/715
CPC分类号: H04L45/64 , H04L63/0815
摘要: A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (IdP), the IdP having generated the assertion upon receiving an authentication request from a service provider (SP), the SP having generated the authentication request upon receiving from a client a request for a protected resource. The acceleration server receives the assertion and forwards it to the SP, which verifies the assertion and returns to the acceleration server a token, together with the protected resource. The acceleration server then returns a response to the requesting client that includes a version of the protected resource that points back to the acceleration server and not the SP. When the acceleration server then receives an additional request from the client, the acceleration server interacts with the service provider using an overlay network optimization.
-
109.
公开(公告)号:US09742858B2
公开(公告)日:2017-08-22
申请号:US13720636
申请日:2012-12-19
发明人: Mark C Holland
CPC分类号: H04L67/2804 , G06F11/3006 , G06F11/3419 , G06F11/3476 , G06F11/3495 , G06F2201/875 , H04L41/14 , H04L67/02 , H04L67/22 , H04L67/2823 , H04L67/2842 , H04L67/34
摘要: A system for measuring and monitoring performance of online content is provided. In one embodiment, the system includes an intermediary device, such as a web proxy, that receives client requests for content, such as requests for web pages. The device obtains the requested content, modifies it by applying one or more performance optimizations, and serves it to the client. The device also inserts code into the content for execution by the client to gather and report data reflecting, e.g., how quickly the client is able to get and process the content. The code includes information identifying the modifications the device made, and this is reported with the timing data, so that the effect on performance can be analyzed. In other embodiments, the device selects one of multiple versions of content, and the inserted code contains information identifying the selected version. The foregoing are merely examples; other embodiments are described herein.
-
公开(公告)号:US20170235954A1
公开(公告)日:2017-08-17
申请号:US15584590
申请日:2017-05-02
发明人: Sreenath Kurupati
CPC分类号: G06F21/566 , G06F2221/031 , G06F2221/034 , G06F2221/0715 , G06F2221/2133 , H04L29/06877 , H04L63/1425 , H04L63/1458 , H04W12/06 , H04W12/12
摘要: A method including collecting, by a processing device, raw data regarding an input to fill a form field. The method further includes converting, by the processing device, the raw data to test data, wherein the test represents behavioral characteristics of the entry of the input. The method further includes identifying a human characteristic model corresponding to the behavior characteristics of the entry of the input. The method further includes generating a predictor from a comparison of the test data against the corresponding human characteristic model. The predictor includes a score indicating a probability that the input originated from a human user or from a malicious code imitating the human user.
-
-
-
-
-
-
-
-
-