US20100088698A1 - Techniques for managing communication sessions - Google Patents
Techniques for managing communication sessions Download PDFInfo
- Publication number
- US20100088698A1 US20100088698A1 US12/244,855 US24485508A US2010088698A1 US 20100088698 A1 US20100088698 A1 US 20100088698A1 US 24485508 A US24485508 A US 24485508A US 2010088698 A1 US2010088698 A1 US 2010088698A1
- Authority
- US
- United States
- Prior art keywords
- session
- virtual machine
- authentication
- secure network
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 title claims abstract description 83
- 238000000034 method Methods 0.000 title claims abstract description 59
- 230000004044 response Effects 0.000 claims abstract description 22
- 238000013475 authorization Methods 0.000 claims description 43
- 238000012545 processing Methods 0.000 claims description 29
- 235000014510 cooky Nutrition 0.000 claims description 17
- 230000008569 process Effects 0.000 claims description 10
- 230000007246 mechanism Effects 0.000 claims description 9
- 230000003993 interaction Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 2
- 230000000977 initiatory effect Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 8
- 230000009471 action Effects 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5011—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- a method for managing a communication session.
- An access authorization is detected; the access authorization is received from an identity service.
- the access authorization is also generated by the identity service in response to a request issued by a principal for access to a protected resource.
- the request is initially handled by a first virtual machine, which redirected the request to the identity service for authentication.
- the access authorization is broadcasts within a secure network; the secure network includes the first virtual machine and second virtual machines.
- the first virtual machine and each of the second virtual machines are capable of servicing the request for access to the protected resource.
- the access authorization includes a first virtual machine identifier and a first virtual machine assigned session identifier to uniquely identify a communication session between the principal and the protected resource.
- the communication session is to be initially handled by the first virtual machine.
- an identity is authenticated via various techniques (e.g., challenge and response interaction, cookies, assertions, etc.) that use various identifying information (e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.).
- identifying information e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.
- a “true identity” is one that is unique to a resource across any context that the resource may engage in over a network (e.g., Internet, Intranet, etc.).
- each resource may have and manage a variety of identities, where each of these identities may only be unique within a given context (given service interaction, given processing environment, given virtual processing environment, etc.).
- VM's are used to provide load balancing and fail-over mechanisms within a single Access Gateway machine, instead of using multiple Access Gateways. So, various embodiments herein teach techniques for sharing user sessions across multiple VM's in a single Access Gateway.
- the VM looks for the VMId, if the VMid is the VM's own id, the VM updates the existing session, otherwise, the VM creates a new session and stores the session in a sequential fashion (such as a linked list) at the same index value in a global session table.
- the VM session management service subsequently receives a broadcast message over the secure network.
- the broadcast message includes an authentication response from the identity service and the session authentication information.
- the VM session management service matches the session authentication information in the broadcast message with the session authentication information originally produced and assuming a match initiates an active communication session between the principal and the protected resource on the first virtual machine. This is a situation where the VM session management service identifies the session of a principal (user) where the VM session management service is waiting for authentication and the VM session management service is the owner.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
- Networks are rapidly becoming overloaded and taxed with traffic from governments, organizations, and private individuals. In particular, the Internet is increasingly being used to conduct business, acquire information, and for leisure. Moreover, there have been recent governmental efforts made to ensure all participants within the United States have affordable access to high speed connectivity to the Internet. However, if every participant were to have a high speed connection to the Internet, then websites will become even more overtaxed and not be capable of supporting the increased speed with which transactions are received and processed.
- To respond to this overtaxing situation, enterprises have replicated processing devices that can be used by users to access a particular enterprise service. So, when a user establishes a communication session with a particular enterprise service, the session is handled by one of many available devices that the enterprise uses to deliver that service.
- The problem with this approach is that the user can become disconnected from the device, which the user is accessing, for a variety of reasons. For example, the user session can be idle for an extended period of time causing an automatic disconnect from the session and correspondingly the device. In another case, the device may experience network problems or may fail itself. In each case, the user is forced to manually establish a new session with the enterprise to access another device of the enterprise that delivers the service.
- This is inconvenient for the user and creates a perception that the enterprise is not providing highly available services, which may cause the user to switch enterprises.
- Thus, what is needed is a mechanism for improved management of communication sessions.
- In various embodiments of the invention, techniques are presented for managing communication sessions. More specifically and in an embodiment, a method is provided for managing a communication session. An access authorization is detected; the access authorization is received from an identity service. The access authorization is also generated by the identity service in response to a request issued by a principal for access to a protected resource. The request is initially handled by a first virtual machine, which redirected the request to the identity service for authentication. Next, the access authorization is broadcasts within a secure network; the secure network includes the first virtual machine and second virtual machines. The first virtual machine and each of the second virtual machines are capable of servicing the request for access to the protected resource. Additionally, the access authorization includes a first virtual machine identifier and a first virtual machine assigned session identifier to uniquely identify a communication session between the principal and the protected resource. The communication session is to be initially handled by the first virtual machine.
-
FIG. 1 is a diagram of a method for managing a communication session, according to an example embodiment of the invention. -
FIG. 2 is a diagram of another method for managing a communication session, according to an example embodiment of the invention. -
FIG. 3 is a diagram of still anothermethod 300 for managing a communication session, according to an example embodiment of the invention. -
FIG. 4 is a diagram of a communication session management system, according to an example embodiment of the invention. - A “resource” includes a user, content, a processing device, a node, a service, an application, a system, a schema definition, a directory, an operating system (OS), a file system, a data store, a database, a policy definition, a configuration definition, a file, content, a World-Wide Web (WWW) service, a WWW page, groups of users, a digital certificate, an attestation, combinations of these things, etc. The terms “service,” “application,” and “system” may be used interchangeably herein and refer to a type of software resource that includes instructions, which when executed by a machine (virtual or physical) performs operations that change the state of the machine and that may produce output.
- A “principal” is a special type of resource that performs one or more actions against other resources. So a principal may be a user or an automated service. A principal also can authenticate for access to secure networks via the proper credentials. Authentication provides a unique identity for the principal within the context of the secure network.
- A “processing environment” refers to one or more physical processing devices organized within a local network. For example, several computers connected via a local area network (LAN) may collectively be viewed as a processing environment. The processing environment also refers to software configurations of the physical processing devices, such as but not limited to operating system, file system, directory service, etc. A single processing environment may be logically defined, such that it spans multiple different networks (e.g., multiple different LAN's, a LAN and a wide-area network (WAN), etc.).
- An “identity service” refers to a special type of service that is designed to manage and supply authentication services and authentication information for resources. So, an identity service may authenticate a given resource for access to a variety of local and external services being managed by that identity service. A single resource may have multiple identity services. In addition the identity service itself may be viewed as a type of resource. In this manner, identity service may authenticate and establish trust with one another viewing one another as specific type of resource.
- According to an embodiment, some example identity services are described in “Techniques for Dynamically Establishing and Managing Authentication and Trust Relationships,” filed on Jan. 27, 2004, and having the U.S. Ser. No. 10/765,523; “Techniques for Establishing and Managing a Distributed Credential Store,” filed on Jan. 29, 2004, and having the U.S. Ser. No. 10/767,884; and “Techniques for Establishing and Managing Trust Relationships,” filed on Feb. 3, 2004, and having the U.S. Ser. No. 10/770,677; all of which are commonly assigned to Novell, Inc., of Provo, Utah and the disclosures of which are incorporated by reference herein.
- An identity service may also provide single sign-on services to a resource. That is, a resource may sign-on to an identity service and acquire identities and credentials to access a variety of other services or resources. In some cases, the identity service is modified or enhanced to perform some of the teachings presented herein and below.
- Again a resource is recognized via an “identity.” An identity is authenticated via various techniques (e.g., challenge and response interaction, cookies, assertions, etc.) that use various identifying information (e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.). A “true identity” is one that is unique to a resource across any context that the resource may engage in over a network (e.g., Internet, Intranet, etc.). However, each resource may have and manage a variety of identities, where each of these identities may only be unique within a given context (given service interaction, given processing environment, given virtual processing environment, etc.).
- Various embodiments of this invention can be implemented in existing network architectures, security systems, data centers, gateways, routers, bridges, proxies (reverse, transparent, and/or forward) and/or other network communication devices. Any particular architectural layout or implementation presented herein is provided for purposes of illustration and comprehension only and is not intended to limit aspects or embodiments of the invention.
- It is within this context, that various embodiments of the invention are now presented with reference to the
FIGS. 1-4 . -
FIG. 1 is a diagram of amethod 100 for managing a communication session, according to an example embodiment of the invention. The method 100 (hereinafter “port session broadcasting service”) is implemented as instructions in a machine-accessible and readable medium. The instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted inFIG. 1 . The port session broadcasting service is also operational over and processes within a network. The network may be wired, wireless, or a combination of wired and wireless. - At 110, the port session broadcasting service detects an access authorization received from an identity, such as one of the identity services discussed and incorporated by reference herein and above. The access authorization is generated by the identity service in response to a request issued by a principal. The principal makes the request for purposes of accessing a protected resource of a secure network.
- A secure network is one in which access is restricted via some security mechanism. In some cases, this may entail using encrypted communication access as well as requiring successful authentication for any resource making access.
- The request is initially handled by a first virtual machine that had redirected the request to the identity service from within the secure network for purposes of authenticating the principal and the request for access to the protected resource.
- According to an embodiment, at 111, the port session broadcasting service recognizes the resource as a World-Wide Web (WWW) browser activated link. The activated link is directed to the protected resource by a user of the WWW browser. The user is the principal, in this embodiment, and the protected resource is a WWW page that the user is attempting to access by activating the link to that WWW page from within the WWW browser.
- In another case, at 112, the port session broadcasting service listens on a common communication back channel within the secure network for the access authorization. The common communication back channel is used by the identity service to provide authentication notifications to requesters. In other words, the communication from the identity service to the secure network occurs via just the common communication back channel and this is where the port session broadcasting service listens to detect the access authentication.
- Continuing with the embodiment at 112 and at 113, the port session broadcasting service listens on a gateway device used to communicate with the identity service from the secure network. The gateway device is a dedicated or logical device that provides communication bridging between the secure network and other networks, such as the Internet.
- At 120, the port session broadcasting service broadcasts the access authorization within the secure network. The secure network includes the first virtual machine, which initiated the authentication of the request (and which caused the identity service to produce the access authorization for that request), and second virtual machines. The first virtual machine and each of the second virtual machines are capable of servicing the request for access to the protected resource.
- Furthermore, the access authorization includes a first virtual machine identifier and a first virtual machine assigned session identifier. The first virtual machine identifier uniquely indicates that it is the first virtual machine of the secure network that set up a potential communication session and requested that the identity service authenticate the principal for access to the protected resource. The first virtual machine assigned session identifier is a unique session identifier within the context of a processing environment associated with the first virtual machine. So, session identifiers can clash between virtual machines of the first network but the combination of session identifiers along with virtual machine identifiers does not clash within the secure network and is unique.
- In some cases, random numbers may also be generated and combined with the session identifiers and the virtual machine identifiers to ensure that each session is uniquely identified by all virtual machines of the secure network.
- According to an embodiment, at 130, the port session broadcasting service and the processing depicted at 110-120 in
FIG. 1 is processed as a Transmission Control Protocol (TCP) socket listener service on a gateway device of the secure network. - Continuing with the embodiment at 130 and at 131, the port session broadcasting service broadcasts the access authorization and the request within the secure network to a plurality of UNIX datagram socket listeners. Each UNIX datagram socket listener processes on a unique one of the virtual machines of the secure network.
- Still continuing with the embodiments of 130 and 131 depicted at 132, the port session broadcasting service recognizes the first virtual machine and each of the second virtual machines as virtual machines processing on or accessible to the gateway device. Each virtual machine (VM) capable of servicing the request and capable of providing failover support for the request in the event that the first virtual machine fails to the handle the request for the principal during the communication session.
- So, by broadcasting the access authorization, each of the virtual machines (including the first virtual machine) can identify which of them is the owner of the communication session and which of them are designated as backups to the communication session. The access authorization permits the second virtual machines to pick up and process the communication session without re-authentication and without losing the communication session that is established initially between the principal and the protected resource.
- An example implementation is now provided for the port session broadcasting service along with other components that provide a novel mechanism for failover and load balancing session management (discussed in greater detail herein and below with reference to the
FIGS. 2-4 ). - VM's are used to provide load balancing and fail-over mechanisms within a single Access Gateway machine, instead of using multiple Access Gateways. So, various embodiments herein teach techniques for sharing user sessions across multiple VM's in a single Access Gateway.
- The Access Gateway can use different authentication mechanisms to authenticate the user and can maintain the user session using Hypertext Transfer Protocol (HTTP) cookies. Multiple VM's in the Access Gateway are used for load balancing the HTTP request;, the user may have been authenticated to one of the VMs, but later the requests from the same user session can go to an entirely different VM for processing. Hence, a mechanism is provided for sharing the user session across the VM's and effective failover from one VM to another without losing a user's session. So, embodiments discussed herein above and below discuss techniques for effectively load balancing and failover support for user sessions across multiple VM's in a single Access Gateway.
- Consider a scenario, where multiple virtual machines are used in an Access Gateway for load balancing of HTTP requests. The Access Gateway can use an external identity service for authenticating the user. When the user tries to access a protected resource controlled by the Access Gateway, the Access Gateway does an HTTP redirection to the identity service for authentication. The user then authenticates at the identity service, and the identity service redirects the user back to Access Gateway page, and provides the authentication status to the Access Gateway through a back channel.
- In this scenario, if there are multiple VM's running in an Access Gateway, the back-channel authentication status response received from the identity service is shared with all the VM's of the Access Gateway, because the user's request from the browser after authentication can reach any one of the VM's.
- Consider another scenario, where a user was authenticated and being processed by one of the VM's using an HTTP cookie. The user may have been idle for sometime; or, perhaps the VM crashed due for some reason. So, new requests from the same user session are handled by a different VM without losing the user's sessions.
- The embodiments herein provide an effective technique for sharing the user sessions to address the above-discussed scenarios.
- When multiple VM's are running in an Access Gateway, a common back-channel listener (port session broadcasting service) is initiated on the Access Gateway for receiving or detecting an authentication response (access authentication) from the identity service. In a particular implementation, a Unix Datagram socket listener is created for each VM and a master TCP socket listener, which actually listens on the back-channel port and shares the response with all the VM's. The authentication response from the identity service first reaches the master TCP listener (port session broadcasting service), listening on the back-channel port, and then the master listener broadcasts the response to the UNIX datagram socket listeners of the individual VM's. Through this mechanism, each VM gets the authentication response (access authentication) from the identity service and they make their own copy of the user session data structures from the authentication response.
- The sequence of processing proceeds as follows:
-
- 1. A browser accesses a protected resource, the request is being processed by (Virtual Machine #1 of the secure network (VM1).
- 2. VM1 creates the initial data structures for the proposed communication session; marks the data structure as authentication pending; creates a cookie and redirects the browser to identity service with the cookie set in the header. The cookie contains afield (VMId (VM identifier)), which identifies the VM that created the cookie.
- 3. The browser authenticates with the identity service and redirects the browser back to the Access Gateway and then sends the authentication response(access authentication) through the back-channel communication.
- 4. The back-channel master listener receives the authentication response and in turn broadcasts the response to all the VM's of the secure network.
- 5. The VM, which initially created the request, identifies that it already has a session structure marked as pending. It marks the session as authentication completed and initiates the session.
- 6. The other VM's create new session structures from the authentication response and mark the owner of the session as the VM1.
- 7. Now, the redirected request from browser after authentication, can reach either VM1 or any of the other VM's. In each particular situation, all the VM's have the session corresponding to the user (principal) and can serve the user with the requested page (protected resource).
- Another situation involved here is potential cookie collision, since the cookie contains an index value to identify the user session associated with the cookie. To remedy this, each cookie structure or session metadata maintained by each of the VM's can appear as follows:
-
Cookie { Index - an index value, which identifies user session from a global session table; VMid, - an id, which identifies the owner (VM) for the session; Zero or more Random numbers; } - Under processing load, there can be multiple browser requests reaching the Access Gateway and load balanced by VM's. In this scenario, there is a high possibility that two or more VM's create the cookie with a same index value. When the VM gets the authentication response from identity service and tries to update/create the session structures, if the index value is the same, there could be confusion as to which session is appropriate, the authentication response should be associated the VMid to avoid the potential collision.
- So, in this scenario the VM looks for the VMId, if the VMid is the VM's own id, the VM updates the existing session, otherwise, the VM creates a new session and stores the session in a sequential fashion (such as a linked list) at the same index value in a global session table.
-
FIG. 2 is a diagram of anothermethod 200 for managing a communication session, according to an example embodiment of the invention. The method 200 (hereinafter “virtual machine (VM) session management service”) is implemented as instructions in a machine-accessible and computer-readable storage medium. The instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted inFIG. 2 . The VM session management service is also operational over and processes within a network. The network may be wired, wireless, or a combination of wired and wireless. - The
method 100 of theFIG. 1 is presented from the perspective of receiving an access authentication from an identity service and broadcasting that access authentication to virtual machines throughout a secure network. The VM session management service is presented from the perspective of a particular, initial first virtual machine that initiates authentication of an initial principal's request to access a protected resource by redirecting that request to the identity service. - At 210, the VM session management service receives a request from a principal to access a protected resource on a first virtual machine of a secure network.
- According to an embodiment, at 211, the VM session management service identifies the principal as a user that is using a WWW browser to access a protected page of the secure network. The protected page is the protected resource.
- Continuing with the embodiment at 211 and at 212, the VM session management service creates a WWW browser cookie as the session authentication information (discussed below at 220).
- Still continuing with the embodiments at 211 and 212, and at 213, the VM session management service sets the cookie within a header that accompanies the redirected request (discussed below at 230). This was also discussed above with reference to the example illustration that followed the discussion of the
FIG. 1 for themethod 100. - At 220, the VM session management service produces session authentication information for a communication session between the principal and the protected resource. The session authentication information includes a session identifier for the session and a first virtual machine identifier for the first virtual machine. The first virtual machine handles the session once the request is properly authenticated for access to the protected resource.
- At 230, the VM session management service redirects the request with the session authentication information to an identity service for authentication.
- According to an embodiment, at 240, the VM session management service subsequently receives a broadcast message over the secure network. The broadcast message includes an authentication response from the identity service and the session authentication information. The VM session management service matches the session authentication information in the broadcast message with the session authentication information originally produced and assuming a match initiates an active communication session between the principal and the protected resource on the first virtual machine. This is a situation where the VM session management service identifies the session of a principal (user) where the VM session management service is waiting for authentication and the VM session management service is the owner.
- In another scenario, at 250, the VM session management service manages the session authentication information in a table, which is accessible to the first virtual machine and which includes other session authentication information associated with other virtual machines of the secure network having other communication sessions. The table provides a mechanism for providing failover support and load balancing for each of those other communication sessions. That is, the table permits the VM session management service to assume an existing communication session when a particular virtual machine fails or is experiencing heavy processing load. This is described in greater detail below with reference to the
method 300 of theFIG. 3 . -
FIG. 3 is a diagram of a still anothermethod 300 for managing a communication session, according to an example embodiment. The method 300 (hereinafter referred to as “session manager”) is implemented in a computer-readable storage medium as instructions, the instructions when executed by a machine (computer or processor-enabled device) performs the processing depicted with respect to theFIG. 3 . The session manager is also operational over a network; the network can be wired, wireless, or a combination of wired and wireless. - The session manager presents the perspective of a virtual machine (such as a virtual machine of a gateway device) that does not initially own a principal (user or automated service) created session with a protected resource, where that session is authenticated and ready for use. The
method 100 demonstrated how the authentication response is broadcast to virtual machines; themethod 200 demonstrated how authentication is initiated and how sessions are owned initially; the method 300 (session manager) now demonstrates how those sessions are shared for purposes of load balancing and failover support. - At 310, the session manager receives an authentication authorization, which is associated with a request for access to a protected resource of a secure network.
- According to an embodiment, at 311, the session manager receives the authentication authorization as a broadcast message from a socket listener that listens on a gateway device of the secure network for the authentication authorization to be sent from an identity service back to the first virtual machine of the secure network that initiated the authentication of the request.
- At 320, the session manager identifies with the authentication authorization a first virtual machine identifier and a session identifier that the first virtual machine had assigned to a communication session between a requesting principal and the protected resource.
- At 330, the session manager determines that the first virtual machine identifier and the session identifier are not present in a session table being managed by the session manager. This indicates that a new authenticated session that the session manager is unaware of is being initiated over the secure network for the principal and the protected resource and is initially be handled by the first virtual machine, which is not the virtual machine that the session manager is processing on and not the virtual machine or processing environment having the session table of the session manager.
- At 340, the session manager creates session metadata for the communication session. The session manager associates the session metadata with the communication session in the session table for subsequent use if the first virtual machine experiences processing loads beyond a predefined threshold of if the first virtual machine fails during the communication session.
- In an embodiment, at 341, the session manager sets an owner for the communication session to initially be the first virtual machine within the session metadata.
- In another case, at 342, the session manager manages the session metadata as a list of lists. The first list is based on identifiers for communication sessions and each first list entry of the first list is associated with its own second list based on identifiers for virtual machines that initially handled those corresponding communication sessions.
- In yet another situation, at 350, the session manager receives a request to take over the communication session fro the first virtual machine and sets a status for the communication session within the session metadata to active and permit the principal and the protected resource to continue to interact with one another on a virtual machine that is different from the first virtual machine during the communication session. Here, the communication session is essentially shared and picked up as needed by the session manager upon an indication that the session needs to be serviced and is not being properly serviced by the initial first virtual machine.
- In an embodiment, at 360, the session manager detects a non-responsive first virtual machine and sets a status for the communication session with the session metadata to active. Next, the session manager automatically and dynamically transitions the principal and the protected resource to continue to interact with one another on a virtual machine that is different from the first virtual machine during the communication session. That particular virtual machine is the virtual machine that processes the session manager.
-
FIG. 4 is a diagram of a communicationsession management system 400, according to an example embodiment of the invention. The communicationsession management system 400 is implemented as instructions on or within a machine-accessible and computer-readable storage medium. The instructions when executed by a machine (computer or processor-enabled device) perform various aspects of the processing depicted with respect to themethods FIGS. 1 and 2 , respectively and the processing associated with thesystem 300 of theFIG. 3 . The communicationsession management system 400 is also operational over a network and the network may be wired, wireless, or a combination of wired and wireless. - The communication
session management system 400 includes agateway device 401 and an authorizationsocket listener service 402. Each of these will now be discussed in turn. - The
gateway device 401 may be a physical machine such as a server, proxy, router, etc. Alternatively, thegateway device 401 may be a logical machine, such as a VM, or even a service that processes as instructions on a physical machine. In an embodiment, thegateway device 401 permits protocol communication between different networks utilizing different protocols. - The authorization
socket listener service 402 is implemented in a computer-readable storage medium and is to process on the gateway device 401 (when thegateway device 401 is a physical device) or within a processing context of the gateway device 401 (when thegateway device 401 is a logical device). - The authorization
socket listener service 402 detects authentication authorizations for principals by listening on a specific port that an identity service uses to send the authentication authorizations. The principals have requested interaction to protected resources of the secure network. This action prompts the authentication to occur via the identity service and correspondingly the authentication authorizations to be sent by the identity service on the specific port. - The authorization
socket listener service 402 broadcasts the authentication authorizations over the secure network to a plurality of virtual machines. The virtual machines cooperate to provide load balancing and failover support for communication sessions between the principals and the protected resources within the secure network. - According to an embodiment the plurality of machines are VM's. Furthermore, in some cases, the VM's process on the
single gateway device 401. In some cases, each VM includes its own datagram socket listener that receives the broadcasts. - In a particular case, the specific port is a common back channel used for communication with the identity service within the secure network.
- The above description is illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of embodiments should therefore be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
- The Abstract is provided to comply with 37 C.F.R. §1.72(b) and will allow the reader to quickly ascertain the nature and gist of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
- In the foregoing description of the embodiments, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting that the claimed embodiments have more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Description of the Embodiments, with each claim standing on its own as a separate exemplary embodiment.
Claims (24)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/244,855 US20100088698A1 (en) | 2008-10-03 | 2008-10-03 | Techniques for managing communication sessions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/244,855 US20100088698A1 (en) | 2008-10-03 | 2008-10-03 | Techniques for managing communication sessions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100088698A1 true US20100088698A1 (en) | 2010-04-08 |
Family
ID=42076840
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/244,855 Abandoned US20100088698A1 (en) | 2008-10-03 | 2008-10-03 | Techniques for managing communication sessions |
Country Status (1)
Country | Link |
---|---|
US (1) | US20100088698A1 (en) |
Cited By (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110047545A1 (en) * | 2009-08-24 | 2011-02-24 | Microsoft Corporation | Entropy Pools for Virtual Machines |
US20110176537A1 (en) * | 2010-01-19 | 2011-07-21 | Jeffrey Lawson | Method and system for preserving telephony session state |
US20110225467A1 (en) * | 2010-03-12 | 2011-09-15 | International Business Machines Corporation | Starting virtual instances within a cloud computing environment |
US20110276705A1 (en) * | 2009-01-19 | 2011-11-10 | Nederlandse Organisatie Voor Toegepast- Natuurwetenschappelijk Onderzoek Tno | Managing Associated Sessions in a Network |
US20120059934A1 (en) * | 2010-09-08 | 2012-03-08 | Pierre Rafiq | Systems and methods for self-loading balancing access gateways |
US8416923B2 (en) | 2010-06-23 | 2013-04-09 | Twilio, Inc. | Method for providing clean endpoint addresses |
US8509415B2 (en) | 2009-03-02 | 2013-08-13 | Twilio, Inc. | Method and system for a multitenancy telephony network |
US8570873B2 (en) | 2009-03-02 | 2013-10-29 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US8582737B2 (en) | 2009-10-07 | 2013-11-12 | Twilio, Inc. | System and method for running a multi-module telephony application |
US8601136B1 (en) | 2012-05-09 | 2013-12-03 | Twilio, Inc. | System and method for managing latency in a distributed telephony network |
US8611338B2 (en) | 2008-04-02 | 2013-12-17 | Twilio, Inc. | System and method for processing media requests during a telephony sessions |
US8649268B2 (en) | 2011-02-04 | 2014-02-11 | Twilio, Inc. | Method for processing telephony sessions of a network |
US8738051B2 (en) | 2012-07-26 | 2014-05-27 | Twilio, Inc. | Method and system for controlling message routing |
US8737962B2 (en) | 2012-07-24 | 2014-05-27 | Twilio, Inc. | Method and system for preventing illicit use of a telephony platform |
US8837465B2 (en) | 2008-04-02 | 2014-09-16 | Twilio, Inc. | System and method for processing telephony sessions |
US8838707B2 (en) | 2010-06-25 | 2014-09-16 | Twilio, Inc. | System and method for enabling real-time eventing |
US8935377B2 (en) | 2012-10-29 | 2015-01-13 | At&T Intellectual Property I, L.P. | Dynamic registration of listener resources for cloud services |
US8938053B2 (en) | 2012-10-15 | 2015-01-20 | Twilio, Inc. | System and method for triggering on platform usage |
US8948356B2 (en) | 2012-10-15 | 2015-02-03 | Twilio, Inc. | System and method for routing communications |
US8964726B2 (en) | 2008-10-01 | 2015-02-24 | Twilio, Inc. | Telephony web event system and method |
US9001666B2 (en) | 2013-03-15 | 2015-04-07 | Twilio, Inc. | System and method for improving routing in a distributed communication platform |
US9117061B1 (en) * | 2011-07-05 | 2015-08-25 | Symantec Corporation | Techniques for securing authentication credentials on a client device during submission in browser-based cloud applications |
US9137127B2 (en) | 2013-09-17 | 2015-09-15 | Twilio, Inc. | System and method for providing communication platform metadata |
US9160696B2 (en) | 2013-06-19 | 2015-10-13 | Twilio, Inc. | System for transforming media resource into destination device compatible messaging format |
US9210275B2 (en) | 2009-10-07 | 2015-12-08 | Twilio, Inc. | System and method for running a multi-module telephony application |
US9225840B2 (en) | 2013-06-19 | 2015-12-29 | Twilio, Inc. | System and method for providing a communication endpoint information service |
US9226217B2 (en) | 2014-04-17 | 2015-12-29 | Twilio, Inc. | System and method for enabling multi-modal communication |
US9240941B2 (en) | 2012-05-09 | 2016-01-19 | Twilio, Inc. | System and method for managing media in a distributed communication network |
US9246694B1 (en) | 2014-07-07 | 2016-01-26 | Twilio, Inc. | System and method for managing conferencing in a distributed communication network |
US9247062B2 (en) | 2012-06-19 | 2016-01-26 | Twilio, Inc. | System and method for queuing a communication session |
US9253254B2 (en) | 2013-01-14 | 2016-02-02 | Twilio, Inc. | System and method for offering a multi-partner delegated platform |
US9251371B2 (en) | 2014-07-07 | 2016-02-02 | Twilio, Inc. | Method and system for applying data retention policies in a computing platform |
US9282124B2 (en) | 2013-03-14 | 2016-03-08 | Twilio, Inc. | System and method for integrating session initiation protocol communication in a telecommunications platform |
US9325624B2 (en) | 2013-11-12 | 2016-04-26 | Twilio, Inc. | System and method for enabling dynamic multi-modal communication |
US9336500B2 (en) | 2011-09-21 | 2016-05-10 | Twilio, Inc. | System and method for authorizing and connecting application developers and users |
US9338064B2 (en) | 2010-06-23 | 2016-05-10 | Twilio, Inc. | System and method for managing a computing cluster |
US9338018B2 (en) | 2013-09-17 | 2016-05-10 | Twilio, Inc. | System and method for pricing communication of a telecommunication platform |
US9338280B2 (en) | 2013-06-19 | 2016-05-10 | Twilio, Inc. | System and method for managing telephony endpoint inventory |
US9344573B2 (en) | 2014-03-14 | 2016-05-17 | Twilio, Inc. | System and method for a work distribution service |
US9363301B2 (en) | 2014-10-21 | 2016-06-07 | Twilio, Inc. | System and method for providing a micro-services communication platform |
US9398622B2 (en) | 2011-05-23 | 2016-07-19 | Twilio, Inc. | System and method for connecting a communication to a client |
US9459926B2 (en) | 2010-06-23 | 2016-10-04 | Twilio, Inc. | System and method for managing a computing cluster |
US9459925B2 (en) | 2010-06-23 | 2016-10-04 | Twilio, Inc. | System and method for managing a computing cluster |
US9459912B1 (en) * | 2015-06-24 | 2016-10-04 | International Business Machines Corporation | Installing virtual machines within different communication pathways to access protected resources |
US9477975B2 (en) | 2015-02-03 | 2016-10-25 | Twilio, Inc. | System and method for a media intelligence platform |
US9483328B2 (en) | 2013-07-19 | 2016-11-01 | Twilio, Inc. | System and method for delivering application content |
US20160330136A1 (en) * | 2014-01-09 | 2016-11-10 | Nokia Solutions And Networks Oy | Allocating virtual machines in a gateway coupled to a software-defined switch |
US9495227B2 (en) | 2012-02-10 | 2016-11-15 | Twilio, Inc. | System and method for managing concurrent events |
US9516101B2 (en) | 2014-07-07 | 2016-12-06 | Twilio, Inc. | System and method for collecting feedback in a multi-tenant communication platform |
US20170019823A1 (en) * | 2014-03-31 | 2017-01-19 | Nec Corporation | Mobile communication system, communication apparatus and communication control method |
US9553799B2 (en) | 2013-11-12 | 2017-01-24 | Twilio, Inc. | System and method for client communication in a distributed telephony network |
US9590849B2 (en) | 2010-06-23 | 2017-03-07 | Twilio, Inc. | System and method for managing a computing cluster |
US9602586B2 (en) | 2012-05-09 | 2017-03-21 | Twilio, Inc. | System and method for managing media in a distributed communication network |
US9641677B2 (en) | 2011-09-21 | 2017-05-02 | Twilio, Inc. | System and method for determining and communicating presence information |
US9648006B2 (en) | 2011-05-23 | 2017-05-09 | Twilio, Inc. | System and method for communicating with a client application |
US9774687B2 (en) | 2014-07-07 | 2017-09-26 | Twilio, Inc. | System and method for managing media and signaling in a communication platform |
US9811398B2 (en) | 2013-09-17 | 2017-11-07 | Twilio, Inc. | System and method for tagging and tracking events of an application platform |
US9948703B2 (en) | 2015-05-14 | 2018-04-17 | Twilio, Inc. | System and method for signaling through data storage |
US10063713B2 (en) | 2016-05-23 | 2018-08-28 | Twilio Inc. | System and method for programmatic device connectivity |
US20180275765A1 (en) * | 2013-11-18 | 2018-09-27 | Amazon Technologies, Inc. | Account management services for load balancers |
WO2018201233A1 (en) * | 2017-05-05 | 2018-11-08 | Royal Bank Of Canada | Distributed memory data repository based defense system |
US10165015B2 (en) | 2011-05-23 | 2018-12-25 | Twilio Inc. | System and method for real-time communication by using a client application communication protocol |
US20190073236A1 (en) * | 2013-12-03 | 2019-03-07 | Vmware, Inc. | Methods and apparatus to automatically configure monitoring of a virtual machine |
US10419891B2 (en) | 2015-05-14 | 2019-09-17 | Twilio, Inc. | System and method for communicating through multiple endpoints |
US10630555B1 (en) * | 2016-08-26 | 2020-04-21 | Berryville Holdings, LLC | Network appliance for providing configurable virtual private network connections |
US10659349B2 (en) | 2016-02-04 | 2020-05-19 | Twilio Inc. | Systems and methods for providing secure network exchanged for a multitenant virtual private cloud |
US10686902B2 (en) | 2016-05-23 | 2020-06-16 | Twilio Inc. | System and method for a multi-channel notification service |
US10970057B2 (en) | 2014-02-26 | 2021-04-06 | Vmware Inc. | Methods and apparatus to generate a customized application blueprint |
US20210136059A1 (en) * | 2019-11-05 | 2021-05-06 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
CN113572801A (en) * | 2020-09-30 | 2021-10-29 | 中兴通讯股份有限公司 | Session establishing method, device, access network equipment and storage medium |
US20210385210A1 (en) * | 2020-06-09 | 2021-12-09 | Strata Identity, Inc. | Systems, methods, and storage media for abstraction and enforcement in an identity infrastructure |
US20220294788A1 (en) * | 2021-03-09 | 2022-09-15 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
US11637934B2 (en) | 2010-06-23 | 2023-04-25 | Twilio Inc. | System and method for monitoring account usage on a platform |
US11855905B2 (en) * | 2018-10-20 | 2023-12-26 | Netapp, Inc. | Shared storage model for high availability within cloud environments |
US12204797B1 (en) | 2023-06-30 | 2025-01-21 | Netapp, Inc. | Lock reservations for shared storage |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6157636A (en) * | 1997-03-06 | 2000-12-05 | Bell Atlantic Network Services, Inc. | Network session management with gateway-directory services and authorization control |
US6223202B1 (en) * | 1998-06-05 | 2001-04-24 | International Business Machines Corp. | Virtual machine pooling |
US20070088762A1 (en) * | 2005-05-25 | 2007-04-19 | Harris Steven T | Clustering server providing virtual machine data sharing |
US7212537B2 (en) * | 2002-07-10 | 2007-05-01 | Samsung Electronics Co., Ltd. | Apparatus and method for recovering communication sessions in a wireless network gateway |
US20070130305A1 (en) * | 2005-12-02 | 2007-06-07 | Piper Scott A | Maintaining session states within virtual machine environments |
US20070171921A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session |
US20070283412A1 (en) * | 2006-01-25 | 2007-12-06 | Netrake Corporation | System, Method, and Interface for Segregation of a Session Controller and a Security Gateway |
US20070288652A1 (en) * | 2004-08-02 | 2007-12-13 | Carter Stephen R | Network application layer routing |
US20070297339A1 (en) * | 2005-11-09 | 2007-12-27 | Dilithium Networks Pty Ltd | Accelerated Session Establishment In A Multimedia Gateway |
US20070300069A1 (en) * | 2006-06-26 | 2007-12-27 | Rozas Carlos V | Associating a multi-context trusted platform module with distributed platforms |
US20070300220A1 (en) * | 2006-06-23 | 2007-12-27 | Sentillion, Inc. | Remote Network Access Via Virtual Machine |
US20080178278A1 (en) * | 2007-01-22 | 2008-07-24 | Doron Grinstein | Providing A Generic Gateway For Accessing Protected Resources |
US7424025B2 (en) * | 2003-10-01 | 2008-09-09 | Santera Systems, Inc. | Methods and systems for per-session dynamic management of media gateway resources |
US20090119664A1 (en) * | 2007-11-02 | 2009-05-07 | Pike Jimmy D | Multiple virtual machine configurations in the scalable enterprise |
-
2008
- 2008-10-03 US US12/244,855 patent/US20100088698A1/en not_active Abandoned
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6157636A (en) * | 1997-03-06 | 2000-12-05 | Bell Atlantic Network Services, Inc. | Network session management with gateway-directory services and authorization control |
US6223202B1 (en) * | 1998-06-05 | 2001-04-24 | International Business Machines Corp. | Virtual machine pooling |
US7212537B2 (en) * | 2002-07-10 | 2007-05-01 | Samsung Electronics Co., Ltd. | Apparatus and method for recovering communication sessions in a wireless network gateway |
US7424025B2 (en) * | 2003-10-01 | 2008-09-09 | Santera Systems, Inc. | Methods and systems for per-session dynamic management of media gateway resources |
US20070288652A1 (en) * | 2004-08-02 | 2007-12-13 | Carter Stephen R | Network application layer routing |
US20070088762A1 (en) * | 2005-05-25 | 2007-04-19 | Harris Steven T | Clustering server providing virtual machine data sharing |
US20070297339A1 (en) * | 2005-11-09 | 2007-12-27 | Dilithium Networks Pty Ltd | Accelerated Session Establishment In A Multimedia Gateway |
US20070130305A1 (en) * | 2005-12-02 | 2007-06-07 | Piper Scott A | Maintaining session states within virtual machine environments |
US20070171921A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session |
US20070180493A1 (en) * | 2006-01-24 | 2007-08-02 | Citrix Systems, Inc. | Methods and systems for assigning access control levels in providing access to resources via virtual machines |
US20070198656A1 (en) * | 2006-01-24 | 2007-08-23 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment |
US20070283412A1 (en) * | 2006-01-25 | 2007-12-06 | Netrake Corporation | System, Method, and Interface for Segregation of a Session Controller and a Security Gateway |
US20070300220A1 (en) * | 2006-06-23 | 2007-12-27 | Sentillion, Inc. | Remote Network Access Via Virtual Machine |
US20070300069A1 (en) * | 2006-06-26 | 2007-12-27 | Rozas Carlos V | Associating a multi-context trusted platform module with distributed platforms |
US20080178278A1 (en) * | 2007-01-22 | 2008-07-24 | Doron Grinstein | Providing A Generic Gateway For Accessing Protected Resources |
US20090119664A1 (en) * | 2007-11-02 | 2009-05-07 | Pike Jimmy D | Multiple virtual machine configurations in the scalable enterprise |
Cited By (251)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8755376B2 (en) | 2008-04-02 | 2014-06-17 | Twilio, Inc. | System and method for processing telephony sessions |
US11856150B2 (en) | 2008-04-02 | 2023-12-26 | Twilio Inc. | System and method for processing telephony sessions |
US11283843B2 (en) | 2008-04-02 | 2022-03-22 | Twilio Inc. | System and method for processing telephony sessions |
US10893079B2 (en) | 2008-04-02 | 2021-01-12 | Twilio Inc. | System and method for processing telephony sessions |
US10986142B2 (en) | 2008-04-02 | 2021-04-20 | Twilio Inc. | System and method for processing telephony sessions |
US9306982B2 (en) | 2008-04-02 | 2016-04-05 | Twilio, Inc. | System and method for processing media requests during telephony sessions |
US11611663B2 (en) | 2008-04-02 | 2023-03-21 | Twilio Inc. | System and method for processing telephony sessions |
US11444985B2 (en) | 2008-04-02 | 2022-09-13 | Twilio Inc. | System and method for processing telephony sessions |
US11706349B2 (en) | 2008-04-02 | 2023-07-18 | Twilio Inc. | System and method for processing telephony sessions |
US11722602B2 (en) | 2008-04-02 | 2023-08-08 | Twilio Inc. | System and method for processing media requests during telephony sessions |
US11765275B2 (en) | 2008-04-02 | 2023-09-19 | Twilio Inc. | System and method for processing telephony sessions |
US9906571B2 (en) | 2008-04-02 | 2018-02-27 | Twilio, Inc. | System and method for processing telephony sessions |
US8611338B2 (en) | 2008-04-02 | 2013-12-17 | Twilio, Inc. | System and method for processing media requests during a telephony sessions |
US9906651B2 (en) | 2008-04-02 | 2018-02-27 | Twilio, Inc. | System and method for processing media requests during telephony sessions |
US10560495B2 (en) | 2008-04-02 | 2020-02-11 | Twilio Inc. | System and method for processing telephony sessions |
US11831810B2 (en) | 2008-04-02 | 2023-11-28 | Twilio Inc. | System and method for processing telephony sessions |
US11575795B2 (en) | 2008-04-02 | 2023-02-07 | Twilio Inc. | System and method for processing telephony sessions |
US10893078B2 (en) | 2008-04-02 | 2021-01-12 | Twilio Inc. | System and method for processing telephony sessions |
US9456008B2 (en) | 2008-04-02 | 2016-09-27 | Twilio, Inc. | System and method for processing telephony sessions |
US8837465B2 (en) | 2008-04-02 | 2014-09-16 | Twilio, Inc. | System and method for processing telephony sessions |
US10694042B2 (en) | 2008-04-02 | 2020-06-23 | Twilio Inc. | System and method for processing media requests during telephony sessions |
US11843722B2 (en) | 2008-04-02 | 2023-12-12 | Twilio Inc. | System and method for processing telephony sessions |
US9596274B2 (en) | 2008-04-02 | 2017-03-14 | Twilio, Inc. | System and method for processing telephony sessions |
US9591033B2 (en) | 2008-04-02 | 2017-03-07 | Twilio, Inc. | System and method for processing media requests during telephony sessions |
US8964726B2 (en) | 2008-10-01 | 2015-02-24 | Twilio, Inc. | Telephony web event system and method |
US9807244B2 (en) | 2008-10-01 | 2017-10-31 | Twilio, Inc. | Telephony web event system and method |
US9407597B2 (en) | 2008-10-01 | 2016-08-02 | Twilio, Inc. | Telephony web event system and method |
US10187530B2 (en) | 2008-10-01 | 2019-01-22 | Twilio, Inc. | Telephony web event system and method |
US10455094B2 (en) | 2008-10-01 | 2019-10-22 | Twilio Inc. | Telephony web event system and method |
US11005998B2 (en) | 2008-10-01 | 2021-05-11 | Twilio Inc. | Telephony web event system and method |
US11632471B2 (en) | 2008-10-01 | 2023-04-18 | Twilio Inc. | Telephony web event system and method |
US11665285B2 (en) | 2008-10-01 | 2023-05-30 | Twilio Inc. | Telephony web event system and method |
US12261981B2 (en) | 2008-10-01 | 2025-03-25 | Twilio Inc. | Telephony web event system and method |
US11641427B2 (en) | 2008-10-01 | 2023-05-02 | Twilio Inc. | Telephony web event system and method |
US9667669B2 (en) * | 2009-01-19 | 2017-05-30 | Koninklijke Kpn N.V. | Managing associated sessions in a network |
US20110276705A1 (en) * | 2009-01-19 | 2011-11-10 | Nederlandse Organisatie Voor Toegepast- Natuurwetenschappelijk Onderzoek Tno | Managing Associated Sessions in a Network |
US11785145B2 (en) | 2009-03-02 | 2023-10-10 | Twilio Inc. | Method and system for a multitenancy telephone network |
US8570873B2 (en) | 2009-03-02 | 2013-10-29 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US8995641B2 (en) | 2009-03-02 | 2015-03-31 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US9621733B2 (en) | 2009-03-02 | 2017-04-11 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US8737593B2 (en) | 2009-03-02 | 2014-05-27 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US9894212B2 (en) | 2009-03-02 | 2018-02-13 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US10348908B2 (en) | 2009-03-02 | 2019-07-09 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US9357047B2 (en) | 2009-03-02 | 2016-05-31 | Twilio, Inc. | Method and system for a multitenancy telephone network |
US10708437B2 (en) | 2009-03-02 | 2020-07-07 | Twilio Inc. | Method and system for a multitenancy telephone network |
US11240381B2 (en) | 2009-03-02 | 2022-02-01 | Twilio Inc. | Method and system for a multitenancy telephone network |
US8509415B2 (en) | 2009-03-02 | 2013-08-13 | Twilio, Inc. | Method and system for a multitenancy telephony network |
US20110047545A1 (en) * | 2009-08-24 | 2011-02-24 | Microsoft Corporation | Entropy Pools for Virtual Machines |
US9495190B2 (en) * | 2009-08-24 | 2016-11-15 | Microsoft Technology Licensing, Llc | Entropy pools for virtual machines |
US12107989B2 (en) | 2009-10-07 | 2024-10-01 | Twilio Inc. | System and method for running a multi-module telephony application |
US10554825B2 (en) | 2009-10-07 | 2020-02-04 | Twilio Inc. | System and method for running a multi-module telephony application |
US8582737B2 (en) | 2009-10-07 | 2013-11-12 | Twilio, Inc. | System and method for running a multi-module telephony application |
US9210275B2 (en) | 2009-10-07 | 2015-12-08 | Twilio, Inc. | System and method for running a multi-module telephony application |
US11637933B2 (en) | 2009-10-07 | 2023-04-25 | Twilio Inc. | System and method for running a multi-module telephony application |
US9491309B2 (en) | 2009-10-07 | 2016-11-08 | Twilio, Inc. | System and method for running a multi-module telephony application |
US8638781B2 (en) * | 2010-01-19 | 2014-01-28 | Twilio, Inc. | Method and system for preserving telephony session state |
US20110176537A1 (en) * | 2010-01-19 | 2011-07-21 | Jeffrey Lawson | Method and system for preserving telephony session state |
US8122282B2 (en) * | 2010-03-12 | 2012-02-21 | International Business Machines Corporation | Starting virtual instances within a cloud computing environment |
US20110225467A1 (en) * | 2010-03-12 | 2011-09-15 | International Business Machines Corporation | Starting virtual instances within a cloud computing environment |
US9459925B2 (en) | 2010-06-23 | 2016-10-04 | Twilio, Inc. | System and method for managing a computing cluster |
US8416923B2 (en) | 2010-06-23 | 2013-04-09 | Twilio, Inc. | Method for providing clean endpoint addresses |
US11637934B2 (en) | 2010-06-23 | 2023-04-25 | Twilio Inc. | System and method for monitoring account usage on a platform |
US9590849B2 (en) | 2010-06-23 | 2017-03-07 | Twilio, Inc. | System and method for managing a computing cluster |
US9459926B2 (en) | 2010-06-23 | 2016-10-04 | Twilio, Inc. | System and method for managing a computing cluster |
US9338064B2 (en) | 2010-06-23 | 2016-05-10 | Twilio, Inc. | System and method for managing a computing cluster |
US9967224B2 (en) | 2010-06-25 | 2018-05-08 | Twilio, Inc. | System and method for enabling real-time eventing |
US8838707B2 (en) | 2010-06-25 | 2014-09-16 | Twilio, Inc. | System and method for enabling real-time eventing |
US11936609B2 (en) | 2010-06-25 | 2024-03-19 | Twilio Inc. | System and method for enabling real-time eventing |
US11088984B2 (en) | 2010-06-25 | 2021-08-10 | Twilio Ine. | System and method for enabling real-time eventing |
US12244557B2 (en) | 2010-06-25 | 2025-03-04 | Twilio Inc. | System and method for enabling real-time eventing |
WO2012033613A1 (en) * | 2010-09-08 | 2012-03-15 | Citrix Systems, Inc. | Systems and methods for self-load balancing access gateways |
US9037712B2 (en) * | 2010-09-08 | 2015-05-19 | Citrix Systems, Inc. | Systems and methods for self-loading balancing access gateways |
US20120059934A1 (en) * | 2010-09-08 | 2012-03-08 | Pierre Rafiq | Systems and methods for self-loading balancing access gateways |
US11848967B2 (en) | 2011-02-04 | 2023-12-19 | Twilio Inc. | Method for processing telephony sessions of a network |
US10708317B2 (en) | 2011-02-04 | 2020-07-07 | Twilio Inc. | Method for processing telephony sessions of a network |
US11032330B2 (en) | 2011-02-04 | 2021-06-08 | Twilio Inc. | Method for processing telephony sessions of a network |
US8649268B2 (en) | 2011-02-04 | 2014-02-11 | Twilio, Inc. | Method for processing telephony sessions of a network |
US10230772B2 (en) | 2011-02-04 | 2019-03-12 | Twilio, Inc. | Method for processing telephony sessions of a network |
US9882942B2 (en) | 2011-02-04 | 2018-01-30 | Twilio, Inc. | Method for processing telephony sessions of a network |
US9455949B2 (en) | 2011-02-04 | 2016-09-27 | Twilio, Inc. | Method for processing telephony sessions of a network |
US9648006B2 (en) | 2011-05-23 | 2017-05-09 | Twilio, Inc. | System and method for communicating with a client application |
US11399044B2 (en) | 2011-05-23 | 2022-07-26 | Twilio Inc. | System and method for connecting a communication to a client |
US12170695B2 (en) | 2011-05-23 | 2024-12-17 | Twilio Inc. | System and method for connecting a communication to a client |
US10560485B2 (en) | 2011-05-23 | 2020-02-11 | Twilio Inc. | System and method for connecting a communication to a client |
US10819757B2 (en) | 2011-05-23 | 2020-10-27 | Twilio Inc. | System and method for real-time communication by using a client application communication protocol |
US10122763B2 (en) | 2011-05-23 | 2018-11-06 | Twilio, Inc. | System and method for connecting a communication to a client |
US9398622B2 (en) | 2011-05-23 | 2016-07-19 | Twilio, Inc. | System and method for connecting a communication to a client |
US10165015B2 (en) | 2011-05-23 | 2018-12-25 | Twilio Inc. | System and method for real-time communication by using a client application communication protocol |
US9117061B1 (en) * | 2011-07-05 | 2015-08-25 | Symantec Corporation | Techniques for securing authentication credentials on a client device during submission in browser-based cloud applications |
US11489961B2 (en) | 2011-09-21 | 2022-11-01 | Twilio Inc. | System and method for determining and communicating presence information |
US10841421B2 (en) | 2011-09-21 | 2020-11-17 | Twilio Inc. | System and method for determining and communicating presence information |
US10212275B2 (en) | 2011-09-21 | 2019-02-19 | Twilio, Inc. | System and method for determining and communicating presence information |
US10182147B2 (en) | 2011-09-21 | 2019-01-15 | Twilio Inc. | System and method for determining and communicating presence information |
US10686936B2 (en) | 2011-09-21 | 2020-06-16 | Twilio Inc. | System and method for determining and communicating presence information |
US9336500B2 (en) | 2011-09-21 | 2016-05-10 | Twilio, Inc. | System and method for authorizing and connecting application developers and users |
US9942394B2 (en) | 2011-09-21 | 2018-04-10 | Twilio, Inc. | System and method for determining and communicating presence information |
US9641677B2 (en) | 2011-09-21 | 2017-05-02 | Twilio, Inc. | System and method for determining and communicating presence information |
US11997231B2 (en) | 2011-09-21 | 2024-05-28 | Twilio Inc. | System and method for determining and communicating presence information |
US12020088B2 (en) | 2012-02-10 | 2024-06-25 | Twilio Inc. | System and method for managing concurrent events |
US11093305B2 (en) | 2012-02-10 | 2021-08-17 | Twilio Inc. | System and method for managing concurrent events |
US9495227B2 (en) | 2012-02-10 | 2016-11-15 | Twilio, Inc. | System and method for managing concurrent events |
US10467064B2 (en) | 2012-02-10 | 2019-11-05 | Twilio Inc. | System and method for managing concurrent events |
US11165853B2 (en) | 2012-05-09 | 2021-11-02 | Twilio Inc. | System and method for managing media in a distributed communication network |
US8601136B1 (en) | 2012-05-09 | 2013-12-03 | Twilio, Inc. | System and method for managing latency in a distributed telephony network |
US10637912B2 (en) | 2012-05-09 | 2020-04-28 | Twilio Inc. | System and method for managing media in a distributed communication network |
US9350642B2 (en) | 2012-05-09 | 2016-05-24 | Twilio, Inc. | System and method for managing latency in a distributed telephony network |
US10200458B2 (en) | 2012-05-09 | 2019-02-05 | Twilio, Inc. | System and method for managing media in a distributed communication network |
US9602586B2 (en) | 2012-05-09 | 2017-03-21 | Twilio, Inc. | System and method for managing media in a distributed communication network |
US9240941B2 (en) | 2012-05-09 | 2016-01-19 | Twilio, Inc. | System and method for managing media in a distributed communication network |
US9247062B2 (en) | 2012-06-19 | 2016-01-26 | Twilio, Inc. | System and method for queuing a communication session |
US10320983B2 (en) | 2012-06-19 | 2019-06-11 | Twilio Inc. | System and method for queuing a communication session |
US11991312B2 (en) | 2012-06-19 | 2024-05-21 | Twilio Inc. | System and method for queuing a communication session |
US11546471B2 (en) | 2012-06-19 | 2023-01-03 | Twilio Inc. | System and method for queuing a communication session |
US11882139B2 (en) | 2012-07-24 | 2024-01-23 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
US9270833B2 (en) | 2012-07-24 | 2016-02-23 | Twilio, Inc. | Method and system for preventing illicit use of a telephony platform |
US10469670B2 (en) | 2012-07-24 | 2019-11-05 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
US9948788B2 (en) | 2012-07-24 | 2018-04-17 | Twilio, Inc. | Method and system for preventing illicit use of a telephony platform |
US11063972B2 (en) | 2012-07-24 | 2021-07-13 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
US9614972B2 (en) | 2012-07-24 | 2017-04-04 | Twilio, Inc. | Method and system for preventing illicit use of a telephony platform |
US8737962B2 (en) | 2012-07-24 | 2014-05-27 | Twilio, Inc. | Method and system for preventing illicit use of a telephony platform |
US8738051B2 (en) | 2012-07-26 | 2014-05-27 | Twilio, Inc. | Method and system for controlling message routing |
US9307094B2 (en) | 2012-10-15 | 2016-04-05 | Twilio, Inc. | System and method for routing communications |
US11246013B2 (en) | 2012-10-15 | 2022-02-08 | Twilio Inc. | System and method for triggering on platform usage |
US10757546B2 (en) | 2012-10-15 | 2020-08-25 | Twilio Inc. | System and method for triggering on platform usage |
US10257674B2 (en) | 2012-10-15 | 2019-04-09 | Twilio, Inc. | System and method for triggering on platform usage |
US9319857B2 (en) | 2012-10-15 | 2016-04-19 | Twilio, Inc. | System and method for triggering on platform usage |
US8938053B2 (en) | 2012-10-15 | 2015-01-20 | Twilio, Inc. | System and method for triggering on platform usage |
US8948356B2 (en) | 2012-10-15 | 2015-02-03 | Twilio, Inc. | System and method for routing communications |
US11689899B2 (en) | 2012-10-15 | 2023-06-27 | Twilio Inc. | System and method for triggering on platform usage |
US11595792B2 (en) | 2012-10-15 | 2023-02-28 | Twilio Inc. | System and method for triggering on platform usage |
US9654647B2 (en) | 2012-10-15 | 2017-05-16 | Twilio, Inc. | System and method for routing communications |
US10033617B2 (en) | 2012-10-15 | 2018-07-24 | Twilio, Inc. | System and method for triggering on platform usage |
US8935377B2 (en) | 2012-10-29 | 2015-01-13 | At&T Intellectual Property I, L.P. | Dynamic registration of listener resources for cloud services |
US9253254B2 (en) | 2013-01-14 | 2016-02-02 | Twilio, Inc. | System and method for offering a multi-partner delegated platform |
US10051011B2 (en) | 2013-03-14 | 2018-08-14 | Twilio, Inc. | System and method for integrating session initiation protocol communication in a telecommunications platform |
US11032325B2 (en) | 2013-03-14 | 2021-06-08 | Twilio Inc. | System and method for integrating session initiation protocol communication in a telecommunications platform |
US9282124B2 (en) | 2013-03-14 | 2016-03-08 | Twilio, Inc. | System and method for integrating session initiation protocol communication in a telecommunications platform |
US10560490B2 (en) | 2013-03-14 | 2020-02-11 | Twilio Inc. | System and method for integrating session initiation protocol communication in a telecommunications platform |
US11637876B2 (en) | 2013-03-14 | 2023-04-25 | Twilio Inc. | System and method for integrating session initiation protocol communication in a telecommunications platform |
US9001666B2 (en) | 2013-03-15 | 2015-04-07 | Twilio, Inc. | System and method for improving routing in a distributed communication platform |
US9240966B2 (en) | 2013-06-19 | 2016-01-19 | Twilio, Inc. | System and method for transmitting and receiving media messages |
US9338280B2 (en) | 2013-06-19 | 2016-05-10 | Twilio, Inc. | System and method for managing telephony endpoint inventory |
US10057734B2 (en) | 2013-06-19 | 2018-08-21 | Twilio Inc. | System and method for transmitting and receiving media messages |
US9160696B2 (en) | 2013-06-19 | 2015-10-13 | Twilio, Inc. | System for transforming media resource into destination device compatible messaging format |
US9225840B2 (en) | 2013-06-19 | 2015-12-29 | Twilio, Inc. | System and method for providing a communication endpoint information service |
US9992608B2 (en) | 2013-06-19 | 2018-06-05 | Twilio, Inc. | System and method for providing a communication endpoint information service |
US9483328B2 (en) | 2013-07-19 | 2016-11-01 | Twilio, Inc. | System and method for delivering application content |
US11379275B2 (en) | 2013-09-17 | 2022-07-05 | Twilio Inc. | System and method for tagging and tracking events of an application |
US10439907B2 (en) | 2013-09-17 | 2019-10-08 | Twilio Inc. | System and method for providing communication platform metadata |
US10671452B2 (en) | 2013-09-17 | 2020-06-02 | Twilio Inc. | System and method for tagging and tracking events of an application |
US12166651B2 (en) | 2013-09-17 | 2024-12-10 | Twilio Inc. | System and method for providing communication platform metadata |
US11539601B2 (en) | 2013-09-17 | 2022-12-27 | Twilio Inc. | System and method for providing communication platform metadata |
US9137127B2 (en) | 2013-09-17 | 2015-09-15 | Twilio, Inc. | System and method for providing communication platform metadata |
US9338018B2 (en) | 2013-09-17 | 2016-05-10 | Twilio, Inc. | System and method for pricing communication of a telecommunication platform |
US9811398B2 (en) | 2013-09-17 | 2017-11-07 | Twilio, Inc. | System and method for tagging and tracking events of an application platform |
US12254358B2 (en) | 2013-09-17 | 2025-03-18 | Twilio Inc. | System and method for tagging and tracking events of an application |
US9853872B2 (en) | 2013-09-17 | 2017-12-26 | Twilio, Inc. | System and method for providing communication platform metadata |
US9959151B2 (en) | 2013-09-17 | 2018-05-01 | Twilio, Inc. | System and method for tagging and tracking events of an application platform |
US12166663B2 (en) | 2013-11-12 | 2024-12-10 | Twilio Inc. | System and method for client communication in a distributed telephony network |
US11621911B2 (en) | 2013-11-12 | 2023-04-04 | Twillo Inc. | System and method for client communication in a distributed telephony network |
US10063461B2 (en) | 2013-11-12 | 2018-08-28 | Twilio, Inc. | System and method for client communication in a distributed telephony network |
US11394673B2 (en) | 2013-11-12 | 2022-07-19 | Twilio Inc. | System and method for enabling dynamic multi-modal communication |
US10069773B2 (en) | 2013-11-12 | 2018-09-04 | Twilio, Inc. | System and method for enabling dynamic multi-modal communication |
US11831415B2 (en) | 2013-11-12 | 2023-11-28 | Twilio Inc. | System and method for enabling dynamic multi-modal communication |
US10686694B2 (en) | 2013-11-12 | 2020-06-16 | Twilio Inc. | System and method for client communication in a distributed telephony network |
US9325624B2 (en) | 2013-11-12 | 2016-04-26 | Twilio, Inc. | System and method for enabling dynamic multi-modal communication |
US9553799B2 (en) | 2013-11-12 | 2017-01-24 | Twilio, Inc. | System and method for client communication in a distributed telephony network |
US20180275765A1 (en) * | 2013-11-18 | 2018-09-27 | Amazon Technologies, Inc. | Account management services for load balancers |
US10936078B2 (en) * | 2013-11-18 | 2021-03-02 | Amazon Technologies, Inc. | Account management services for load balancers |
US10678585B2 (en) * | 2013-12-03 | 2020-06-09 | Vmware, Inc. | Methods and apparatus to automatically configure monitoring of a virtual machine |
US20190073236A1 (en) * | 2013-12-03 | 2019-03-07 | Vmware, Inc. | Methods and apparatus to automatically configure monitoring of a virtual machine |
US20160330136A1 (en) * | 2014-01-09 | 2016-11-10 | Nokia Solutions And Networks Oy | Allocating virtual machines in a gateway coupled to a software-defined switch |
US11483254B2 (en) * | 2014-01-09 | 2022-10-25 | Nokia Solutions And Networks Oy | Allocating virtual machines in a gateway coupled to a software-defined switch |
US10970057B2 (en) | 2014-02-26 | 2021-04-06 | Vmware Inc. | Methods and apparatus to generate a customized application blueprint |
US10291782B2 (en) | 2014-03-14 | 2019-05-14 | Twilio, Inc. | System and method for a work distribution service |
US10003693B2 (en) | 2014-03-14 | 2018-06-19 | Twilio, Inc. | System and method for a work distribution service |
US9628624B2 (en) | 2014-03-14 | 2017-04-18 | Twilio, Inc. | System and method for a work distribution service |
US11330108B2 (en) | 2014-03-14 | 2022-05-10 | Twilio Inc. | System and method for a work distribution service |
US10904389B2 (en) | 2014-03-14 | 2021-01-26 | Twilio Inc. | System and method for a work distribution service |
US9344573B2 (en) | 2014-03-14 | 2016-05-17 | Twilio, Inc. | System and method for a work distribution service |
US11882242B2 (en) | 2014-03-14 | 2024-01-23 | Twilio Inc. | System and method for a work distribution service |
US20170019823A1 (en) * | 2014-03-31 | 2017-01-19 | Nec Corporation | Mobile communication system, communication apparatus and communication control method |
US10873892B2 (en) | 2014-04-17 | 2020-12-22 | Twilio Inc. | System and method for enabling multi-modal communication |
US9907010B2 (en) | 2014-04-17 | 2018-02-27 | Twilio, Inc. | System and method for enabling multi-modal communication |
US10440627B2 (en) | 2014-04-17 | 2019-10-08 | Twilio Inc. | System and method for enabling multi-modal communication |
US12213048B2 (en) | 2014-04-17 | 2025-01-28 | Twilio Inc. | System and method for enabling multi-modal communication |
US11653282B2 (en) | 2014-04-17 | 2023-05-16 | Twilio Inc. | System and method for enabling multi-modal communication |
US9226217B2 (en) | 2014-04-17 | 2015-12-29 | Twilio, Inc. | System and method for enabling multi-modal communication |
US9246694B1 (en) | 2014-07-07 | 2016-01-26 | Twilio, Inc. | System and method for managing conferencing in a distributed communication network |
US9858279B2 (en) | 2014-07-07 | 2018-01-02 | Twilio, Inc. | Method and system for applying data retention policies in a computing platform |
US9588974B2 (en) | 2014-07-07 | 2017-03-07 | Twilio, Inc. | Method and system for applying data retention policies in a computing platform |
US10757200B2 (en) | 2014-07-07 | 2020-08-25 | Twilio Inc. | System and method for managing conferencing in a distributed communication network |
US10747717B2 (en) | 2014-07-07 | 2020-08-18 | Twilio Inc. | Method and system for applying data retention policies in a computing platform |
US11973835B2 (en) | 2014-07-07 | 2024-04-30 | Twilio Inc. | System and method for managing media and signaling in a communication platform |
US9774687B2 (en) | 2014-07-07 | 2017-09-26 | Twilio, Inc. | System and method for managing media and signaling in a communication platform |
US10229126B2 (en) | 2014-07-07 | 2019-03-12 | Twilio, Inc. | Method and system for applying data retention policies in a computing platform |
US11768802B2 (en) | 2014-07-07 | 2023-09-26 | Twilio Inc. | Method and system for applying data retention policies in a computing platform |
US11341092B2 (en) | 2014-07-07 | 2022-05-24 | Twilio Inc. | Method and system for applying data retention policies in a computing platform |
US11755530B2 (en) | 2014-07-07 | 2023-09-12 | Twilio Inc. | Method and system for applying data retention policies in a computing platform |
US9251371B2 (en) | 2014-07-07 | 2016-02-02 | Twilio, Inc. | Method and system for applying data retention policies in a computing platform |
US9553900B2 (en) | 2014-07-07 | 2017-01-24 | Twilio, Inc. | System and method for managing conferencing in a distributed communication network |
US10116733B2 (en) | 2014-07-07 | 2018-10-30 | Twilio, Inc. | System and method for collecting feedback in a multi-tenant communication platform |
US9516101B2 (en) | 2014-07-07 | 2016-12-06 | Twilio, Inc. | System and method for collecting feedback in a multi-tenant communication platform |
US10212237B2 (en) | 2014-07-07 | 2019-02-19 | Twilio, Inc. | System and method for managing media and signaling in a communication platform |
US9509782B2 (en) | 2014-10-21 | 2016-11-29 | Twilio, Inc. | System and method for providing a micro-services communication platform |
US11019159B2 (en) | 2014-10-21 | 2021-05-25 | Twilio Inc. | System and method for providing a micro-services communication platform |
US12177304B2 (en) | 2014-10-21 | 2024-12-24 | Twilio Inc. | System and method for providing a micro-services communication platform |
US9363301B2 (en) | 2014-10-21 | 2016-06-07 | Twilio, Inc. | System and method for providing a micro-services communication platform |
US10637938B2 (en) | 2014-10-21 | 2020-04-28 | Twilio Inc. | System and method for providing a micro-services communication platform |
US9906607B2 (en) | 2014-10-21 | 2018-02-27 | Twilio, Inc. | System and method for providing a micro-services communication platform |
US11544752B2 (en) | 2015-02-03 | 2023-01-03 | Twilio Inc. | System and method for a media intelligence platform |
US9477975B2 (en) | 2015-02-03 | 2016-10-25 | Twilio, Inc. | System and method for a media intelligence platform |
US10467665B2 (en) | 2015-02-03 | 2019-11-05 | Twilio Inc. | System and method for a media intelligence platform |
US10853854B2 (en) | 2015-02-03 | 2020-12-01 | Twilio Inc. | System and method for a media intelligence platform |
US9805399B2 (en) | 2015-02-03 | 2017-10-31 | Twilio, Inc. | System and method for a media intelligence platform |
US11272325B2 (en) | 2015-05-14 | 2022-03-08 | Twilio Inc. | System and method for communicating through multiple endpoints |
US12081616B2 (en) | 2015-05-14 | 2024-09-03 | Twilio Inc. | System and method for signaling through data storage |
US9948703B2 (en) | 2015-05-14 | 2018-04-17 | Twilio, Inc. | System and method for signaling through data storage |
US10560516B2 (en) | 2015-05-14 | 2020-02-11 | Twilio Inc. | System and method for signaling through data storage |
US11265367B2 (en) | 2015-05-14 | 2022-03-01 | Twilio Inc. | System and method for signaling through data storage |
US10419891B2 (en) | 2015-05-14 | 2019-09-17 | Twilio, Inc. | System and method for communicating through multiple endpoints |
US9459912B1 (en) * | 2015-06-24 | 2016-10-04 | International Business Machines Corporation | Installing virtual machines within different communication pathways to access protected resources |
US9553877B2 (en) * | 2015-06-24 | 2017-01-24 | International Business Machines Corporation | Installing virtual machines within different communication pathways to access protected resources |
US9560052B2 (en) * | 2015-06-24 | 2017-01-31 | International Business Machines Corporation | Installing virtual machines within different communication pathways to access protected resources |
US11171865B2 (en) | 2016-02-04 | 2021-11-09 | Twilio Inc. | Systems and methods for providing secure network exchanged for a multitenant virtual private cloud |
US10659349B2 (en) | 2016-02-04 | 2020-05-19 | Twilio Inc. | Systems and methods for providing secure network exchanged for a multitenant virtual private cloud |
US11627225B2 (en) | 2016-05-23 | 2023-04-11 | Twilio Inc. | System and method for programmatic device connectivity |
US11622022B2 (en) | 2016-05-23 | 2023-04-04 | Twilio Inc. | System and method for a multi-channel notification service |
US10063713B2 (en) | 2016-05-23 | 2018-08-28 | Twilio Inc. | System and method for programmatic device connectivity |
US11076054B2 (en) | 2016-05-23 | 2021-07-27 | Twilio Inc. | System and method for programmatic device connectivity |
US11265392B2 (en) | 2016-05-23 | 2022-03-01 | Twilio Inc. | System and method for a multi-channel notification service |
US10686902B2 (en) | 2016-05-23 | 2020-06-16 | Twilio Inc. | System and method for a multi-channel notification service |
US12143529B2 (en) | 2016-05-23 | 2024-11-12 | Kore Wireless Group, Inc. | System and method for programmatic device connectivity |
US10440192B2 (en) | 2016-05-23 | 2019-10-08 | Twilio Inc. | System and method for programmatic device connectivity |
US12041144B2 (en) | 2016-05-23 | 2024-07-16 | Twilio Inc. | System and method for a multi-channel notification service |
US11996983B1 (en) * | 2016-08-26 | 2024-05-28 | Cyber Ip Holdings, Llc | Network appliance for providing configurable virtual private network connections |
US10630555B1 (en) * | 2016-08-26 | 2020-04-21 | Berryville Holdings, LLC | Network appliance for providing configurable virtual private network connections |
US11258672B1 (en) * | 2016-08-26 | 2022-02-22 | Berryville Holdings, LLC | Network appliance for providing configurable virtual private network connections |
US11316829B2 (en) | 2017-05-05 | 2022-04-26 | Royal Bank Of Canada | Distributed memory data repository based defense system |
US12041030B2 (en) | 2017-05-05 | 2024-07-16 | Royal Bank Of Canada | Distributed memory data repository based defense system |
WO2018201233A1 (en) * | 2017-05-05 | 2018-11-08 | Royal Bank Of Canada | Distributed memory data repository based defense system |
US12267252B2 (en) | 2018-10-20 | 2025-04-01 | Netapp, Inc. | Shared storage model for high availability within cloud environments |
US11855905B2 (en) * | 2018-10-20 | 2023-12-26 | Netapp, Inc. | Shared storage model for high availability within cloud environments |
US20210136059A1 (en) * | 2019-11-05 | 2021-05-06 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
US12047373B2 (en) * | 2019-11-05 | 2024-07-23 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
US11876796B2 (en) * | 2020-06-09 | 2024-01-16 | Strata Identity, Inc. | Systems, methods, and storage media for abstraction and enforcement in an identity infrastructure |
US20210385210A1 (en) * | 2020-06-09 | 2021-12-09 | Strata Identity, Inc. | Systems, methods, and storage media for abstraction and enforcement in an identity infrastructure |
CN113572801A (en) * | 2020-09-30 | 2021-10-29 | 中兴通讯股份有限公司 | Session establishing method, device, access network equipment and storage medium |
US12238101B2 (en) * | 2021-03-09 | 2025-02-25 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
US20220294788A1 (en) * | 2021-03-09 | 2022-09-15 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
US12204797B1 (en) | 2023-06-30 | 2025-01-21 | Netapp, Inc. | Lock reservations for shared storage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20100088698A1 (en) | Techniques for managing communication sessions | |
US8516569B2 (en) | Uninterrupted virtual private network (VPN) connection service with dynamic policy enforcement | |
US9032094B2 (en) | Network application layer routing | |
US7743155B2 (en) | Active-active operation for a cluster of SSL virtual private network (VPN) devices with load distribution | |
JP4304055B2 (en) | Methods and structures for providing client session failover | |
US8572249B2 (en) | Network appliance for balancing load and platform services | |
EP2856702B1 (en) | Policy service authorization and authentication | |
US11394703B2 (en) | Methods for facilitating federated single sign-on (SSO) for internal web applications and devices thereof | |
US7886061B1 (en) | Virtual folders for tracking HTTP sessions | |
WO2018140882A1 (en) | Highly available web-based database interface system | |
WO2022247751A1 (en) | Method, system and apparatus for remotely accessing application, device, and storage medium | |
US8250633B2 (en) | Techniques for flexible resource authentication | |
US10972453B1 (en) | Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof | |
CN103404103A (en) | System and method for combining an access control system with a traffic management system | |
AU2006302251A1 (en) | Apparatus system and method for real-time migration of data related to authentication | |
US10873497B2 (en) | Systems and methods for maintaining communication links | |
US8738897B2 (en) | Single sign-on functionality for secure communications over insecure networks | |
US20130340042A1 (en) | Secure configuration of authentication servers | |
CN106656514A (en) | kerberos authentication cluster access method, SparkStandalone cluster, and driving node of SparkStandalone cluster | |
US6839708B1 (en) | Computer system having an authentication and/or authorization routing service and a CORBA-compliant interceptor for monitoring the same | |
US10931662B1 (en) | Methods for ephemeral authentication screening and devices thereof | |
US10791119B1 (en) | Methods for temporal password injection and devices thereof | |
US11095436B2 (en) | Key-based security for cloud services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NOVELL, INC.,UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KRISHNAMURTHY, RAVISHANKAR;REEL/FRAME:021851/0830 Effective date: 20081002 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST FIRST LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0216 Effective date: 20120522 Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST SECOND LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0316 Effective date: 20120522 |
|
AS | Assignment |
Owner name: CPTN HOLDINGS LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028841/0047 Effective date: 20110427 |
|
AS | Assignment |
Owner name: APPLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CPTN HOLDINGS LLC;REEL/FRAME:028856/0230 Effective date: 20120614 |
|
AS | Assignment |
Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0316;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034469/0057 Effective date: 20141120 Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0216;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034470/0680 Effective date: 20141120 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |