Goyal et al., 2025 - Google Patents
Unified Multi-Channel AI Orchestration Platform ArchitectureGoyal et al., 2025
View PDF- Document ID
- 6199654311215369242
- Author
- Goyal I
- Patil G
- Shaikh A
- Publication year
- Publication venue
- Journal of Computer Science and Technology Studies
External Links
Snippet
The unified Multi-Channel Platform (MCP) server architecture centralizes management, orchestration, and governance of AI agents across enterprises. Organizations deploying autonomous agents face challenges with siloed implementations, inconsistent standards …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11170316B2 (en) | System and method for determining fuzzy cause and effect relationships in an intelligent workload management system | |
| US9432350B2 (en) | System and method for intelligent workload management | |
| US12175240B1 (en) | Digital processing systems and methods for facilitating the development and implementation of applications in conjunction with a serverless environment | |
| US20200233699A1 (en) | Platform-based change management | |
| US12493540B1 (en) | Dynamic execution of artificial intelligence agents through device management | |
| Ray | A review on agent-to-agent protocol: Concept, state-of-the-art, challenges and future directions | |
| Pecka | Making secure software insecure without changing its code: The possibilities and impacts of attacks on the devops pipeline | |
| US20140007258A1 (en) | Systems and methods for governing the disclosure of restricted data | |
| Zeng et al. | Quantitative Risk Assessment for Cloud‐Based Software Migration Processes | |
| Vakhula et al. | Research on Policy-as-Code for Implementation of Role-based and Attribute-based Access Control | |
| Ahmed | Cloud-Native DevOps | |
| Goyal et al. | Unified Multi-Channel AI Orchestration Platform Architecture | |
| Danylko | ASP. NET 8 Best Practices: Explore techniques, patterns, and practices to develop effective large-scale. NET web apps | |
| Nguyen et al. | Customer experience survey management software: a secure and scalable multi-tenant architecture | |
| Blount et al. | Introduction to Agents | |
| Khan | Comparison of Public Cloud Platforms using Automated CI/CD Pipelines | |
| Rodríguez Quiñones | Privacy-Focused LLM for Local Data Processing: Implementing OLLAMA and RAG to Securely Query Personal Files in Closed Environments | |
| de Jesus Silva | Zero trust security for microservices in scalable systems | |
| Hastings | Combating Source Poisoning and Next-Generation Software Supply Chain Attacks Using Education, Tools, and Techniques | |
| Feil et al. | Stage 1—Cloud Strategy and Launch Phase | |
| Prieto-Blazquez et al. | Engineering Cloud-Based Technological Infrastructure | |
| Patel et al. | Automating IAM Policies | |
| Gangula | Securing Digital Transformation: A Framework for Mainframe and Cloud Ape Governance | |
| Huang et al. | Deploying Agentic AI in Enterprise Environments | |
| Chowdhary et al. | Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide |