[go: up one dir, main page]

Goyal et al., 2025 - Google Patents

Unified Multi-Channel AI Orchestration Platform Architecture

Goyal et al., 2025

View PDF
Document ID
6199654311215369242
Author
Goyal I
Patil G
Shaikh A
Publication year
Publication venue
Journal of Computer Science and Technology Studies

External Links

Snippet

The unified Multi-Channel Platform (MCP) server architecture centralizes management, orchestration, and governance of AI agents across enterprises. Organizations deploying autonomous agents face challenges with siloed implementations, inconsistent standards …
Continue reading at al-kindipublishers.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models

Similar Documents

Publication Publication Date Title
US11170316B2 (en) System and method for determining fuzzy cause and effect relationships in an intelligent workload management system
US9432350B2 (en) System and method for intelligent workload management
US12175240B1 (en) Digital processing systems and methods for facilitating the development and implementation of applications in conjunction with a serverless environment
US20200233699A1 (en) Platform-based change management
US12493540B1 (en) Dynamic execution of artificial intelligence agents through device management
Ray A review on agent-to-agent protocol: Concept, state-of-the-art, challenges and future directions
Pecka Making secure software insecure without changing its code: The possibilities and impacts of attacks on the devops pipeline
US20140007258A1 (en) Systems and methods for governing the disclosure of restricted data
Zeng et al. Quantitative Risk Assessment for Cloud‐Based Software Migration Processes
Vakhula et al. Research on Policy-as-Code for Implementation of Role-based and Attribute-based Access Control
Ahmed Cloud-Native DevOps
Goyal et al. Unified Multi-Channel AI Orchestration Platform Architecture
Danylko ASP. NET 8 Best Practices: Explore techniques, patterns, and practices to develop effective large-scale. NET web apps
Nguyen et al. Customer experience survey management software: a secure and scalable multi-tenant architecture
Blount et al. Introduction to Agents
Khan Comparison of Public Cloud Platforms using Automated CI/CD Pipelines
Rodríguez Quiñones Privacy-Focused LLM for Local Data Processing: Implementing OLLAMA and RAG to Securely Query Personal Files in Closed Environments
de Jesus Silva Zero trust security for microservices in scalable systems
Hastings Combating Source Poisoning and Next-Generation Software Supply Chain Attacks Using Education, Tools, and Techniques
Feil et al. Stage 1—Cloud Strategy and Launch Phase
Prieto-Blazquez et al. Engineering Cloud-Based Technological Infrastructure
Patel et al. Automating IAM Policies
Gangula Securing Digital Transformation: A Framework for Mainframe and Cloud Ape Governance
Huang et al. Deploying Agentic AI in Enterprise Environments
Chowdhary et al. Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide