G06F8/60

Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach

Disclosed herein are embodiments of methods, devices and systems for device fingerprinting and automatic and dynamic software deployment to one or more endpoints on a computer network. The device fingerprinting systems and devices herein are configured to operate with limited data without sitting between network devices and the internet, without monitoring all network traffic, and without limited or no active scanning. The embodiments herein may passively collect information as distributed peers and may perform very limited active scans. In some embodiments, the information is used as an input to a custom hierarchical learning model to fingerprint devices on a network by identifying attributes of the devices such as the operating system family, operating system version, and device role. In some embodiments, a dynamic deployer selection process may be utilized to simply and efficiently deploy software. Some embodiments herein involve end-to-end encryption of credentials in a deployment process.

Content Transmission Method, Device, and Medium
20230042460 · 2023-02-09 ·

A content transmission method is provided. The method may include: A first device determines that a distance between the first device and a second device is less than a distance threshold. The first device provides a user with a prompt that content transmission can be performed between the first device and the second device. The first device recognizes a gesture operation performed by the user on the first device, and determines transmission content and a transmission direction of the transmission content between the first device and the second device based on the recognized gesture operation. The first device receives the transmission content from the second device or sends the transmission content to the second device based on the determined transmission direction.

METHOD FOR VERIFYING AN EXECUTION OF A SOFTWARE PROGRAM
20230040093 · 2023-02-09 ·

A method can be used for verifying an execution of a compiled software program stored in a program memory of a processor and executed by the processor. A write operation includes assigning a destination address in a register of the processor and writing a datum at a location pointed to by the destination address contained in the register. A verification operation includes reassigning the same destination address in the same register, reading the datum contained at the location pointed to by the destination address contained in the register after the reassignment, and comparing the read datum and the written datum.

METHOD FOR VERIFYING AN EXECUTION OF A SOFTWARE PROGRAM
20230040093 · 2023-02-09 ·

A method can be used for verifying an execution of a compiled software program stored in a program memory of a processor and executed by the processor. A write operation includes assigning a destination address in a register of the processor and writing a datum at a location pointed to by the destination address contained in the register. A verification operation includes reassigning the same destination address in the same register, reading the datum contained at the location pointed to by the destination address contained in the register after the reassignment, and comparing the read datum and the written datum.

METHODS AND SYSTEMS FOR REMOTE CONFIGURATION OF SOFTWARE APPLICATIONS
20230039601 · 2023-02-09 ·

Certain aspects of the present disclosure provide techniques for configuring a software application through a remote configuration service. An example method generally includes receiving, from a remote configuration service, a declarative construct. Generally, the declarative construct includes a definition of a workflow in an application to be executed within a player application deployed on a client device. Information associated with the definition of the workflow is extracted by parsing the declarative construct according to a schema defining a format of the declarative construct. The workflow is executed in the player application based on the extracted information defining functionality of the workflow.

NETWORK-BASED SOLUTION MODULE DEPLOYMENT PLATFORM

The present invention provides a deployment platform that enables solution modules to be created and deployed without writing new code. The solution modules may include existing solutions, solution components, connectors, and the like selected from a solution library. The deployment platform includes a development engine providing functionality for generating deployment information for the solution module. The deployment information may include a blueprint or other information for deploying the solution module to target infrastructure. The deployment platform also includes a deployment engine providing functionality for deploying the solution module to the target infrastructure automatically. During deployment, the deployment engine pushes components of the solution module to the target infrastructure in accordance with the deployment information. During and after deployment, information may be captured and recorded to a distributed ledger to provide end-to-end visibility into the deployed solution over the deployment lifecycle (e.g., including initial deployment, updates/upgrades, and decommissioning).

NETWORK-BASED SOLUTION MODULE DEPLOYMENT PLATFORM

The present invention provides a deployment platform that enables solution modules to be created and deployed without writing new code. The solution modules may include existing solutions, solution components, connectors, and the like selected from a solution library. The deployment platform includes a development engine providing functionality for generating deployment information for the solution module. The deployment information may include a blueprint or other information for deploying the solution module to target infrastructure. The deployment platform also includes a deployment engine providing functionality for deploying the solution module to the target infrastructure automatically. During deployment, the deployment engine pushes components of the solution module to the target infrastructure in accordance with the deployment information. During and after deployment, information may be captured and recorded to a distributed ledger to provide end-to-end visibility into the deployed solution over the deployment lifecycle (e.g., including initial deployment, updates/upgrades, and decommissioning).

Configuration change control for computing environments

Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.

Program update management device
11556331 · 2023-01-17 · ·

Provided is a program update management device that includes: an acquiring part that acquires a scene signal indicating a scene in which a vehicle is used; a determining part that determines a level indicating how strongly the vehicle is restricted when respective functions of a plurality of ECUs are impaired, the plurality of ECUs each having the same function in the scene indicated by the scene signal; and a selecting part that selects, from among the plurality of ECUs, an ECU for which a program update is performed, based on the level.

Virtual machine deployment method and OMM virtual machine

This application describes a virtual machine deployment method and an operation and maintenance management (OMM) virtual machine. The method includes: obtaining, by an OMM virtual machine, a quantity and a specification of service virtual machines created in virtual network function application software to which the OMM virtual machine belongs; and determining, by the OMM virtual machine based on load that needs to be carried by the application software and the quantity and the specification of the service virtual machines, a module to be configured for each service virtual machine. The described implementations avoid or reduce waste of virtual machine resources.