Abstract:
In a network, a common agnostic data exchange method between two devices native to the network, the devices using different formats and transmission protocols, includes invoking a proxy at each device, and a first proxy receiving a first data record from a first device, the first data record having a first format. The first proxy identifies the first format by comparing a first pattern of the first data record to reference patterns of one or more reference data records and determines if a sufficient pattern match exists between the first pattern and the reference pattern. The first proxy translates the first data record's format into an inter-proxy data record having an inter-proxy format and transmits the inter-proxy data record to a second proxy coupled to a second device. The second proxy translates the inter-proxy data record to a second data record having a format employed at the second device.
Abstract:
A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
Abstract:
A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
Abstract:
In a network, a common agnostic data exchange method between two devices native to the network, the devices using different formats and transmission protocols, includes invoking a proxy at each device, and a first proxy receiving a first data record from a first device, the first data record having a first format. The first proxy identifies the first format by comparing a first pattern of the first data record to reference patterns of one or more reference data records and determines if a sufficient pattern match exists between the first pattern and the reference pattern. The first proxy translates the first data record's format into an inter-proxy data record having an inter-proxy format and transmits the inter-proxy data record to a second proxy coupled to a second device. The second proxy translates the inter-proxy data record to a second data record having a format employed at the second device.
Abstract:
In a network, a common agnostic data exchange method between two devices native to the network, the devices using different formats and transmission protocols, includes invoking a proxy at each device, and a first proxy receiving a first data record from a first device, the first data record having a first format. The first proxy identifies the first format by comparing a first pattern of the first data record to reference patterns of one or more reference data records and determines if a sufficient pattern match exists between the first pattern and the reference pattern. The first proxy translates the first data record's format into an inter-proxy data record having an inter-proxy format and transmits the inter-proxy data record to a second proxy coupled to a second device. The second proxy translates the inter-proxy data record to a second data record having a format employed at the second device.
Abstract:
A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.