Patent classifications
G06F8/61
METHOD AND APPARATUS FOR TRANSMITTING MOBILE EDGE COMPUTING APPLICATION
A method, performed by an electronic device, of transmitting a mobile edge application, includes obtaining information related to an execution environment of at least one pre-installed mobile edge application, receiving an installation request for a new mobile edge application, determining a mobile edge computing host for installing the new mobile edge application, based on the information related to the execution environment and the requirement information related to an execution environment of the new mobile edge application, and transmitting the new mobile edge application to the determined mobile edge computing host.
DIGITAL ENGINEERING SECURE REMOTE ACCESS
An industrial information hub (IIH) and an industrial development hub (IDH) serve as an industrial ecosystem platform where multiple participants can deliver repeatable and standardized services relevant to their core competencies. The IIH system is centered around the development of an ecosystem that creates and delivers value to users—including industrial enterprises, OEMs, system integrators, vendors, etc.—through the aggregation of digital content and domain expertise. The IIH system serves as a trusted information broker between the ecosystem and the OT environments of plant facilities, and provides a platform for connecting assets, contextualizing asset data and providing secure access to the ecosystem. As part of this ecosystem, the IIH system uses a secure remote access architecture to allow users to remotely access data on their plant floor assets via a virtual private network connection.
SYSTEM AND METHOD TO PERFORM DIGITAL AUTHENTICATION USING MULTIPLE CHANNELS OF COMMUNICATION
Embodiments are generally directed to systems, devices, and techniques to authenticate unauthenticated users to perform sensitive actions.
SYSTEM AND METHOD TO PERFORM DIGITAL AUTHENTICATION USING MULTIPLE CHANNELS OF COMMUNICATION
Embodiments are generally directed to systems, devices, and techniques to authenticate unauthenticated users to perform sensitive actions.
INFORMATION PROCESSING SYSTEM AND APPARATUS TO GENERATE DESCRIPTION FILE CORRESPONDING TO REPRODUCTION APPLICATION BASED ON EDIT INSTRUCTION
An information processing system provides combined information in which a description file defining an operation procedure and a reproduction application configured to reproduce the description file are combined, as a combined application to be executed by an image processing apparatus. The information processing system includes one or more control circuits each having a processor and a memory containing instructions that, when executed by the processor, cause the processor to function as an acquisition unit, an output unit, a reception unit, and a generation unit. The acquisition unit is configured to acquire definition information from the reproduction application. The output unit is configured to output screen information to a display based on the definition information. The reception unit is configured to receive an edit instruction corresponding to the screen information. The generation unit is configured to generate the description file corresponding to the reproduction application, based on the edit instruction.
INFORMATION PROCESSING SYSTEM AND APPARATUS TO GENERATE DESCRIPTION FILE CORRESPONDING TO REPRODUCTION APPLICATION BASED ON EDIT INSTRUCTION
An information processing system provides combined information in which a description file defining an operation procedure and a reproduction application configured to reproduce the description file are combined, as a combined application to be executed by an image processing apparatus. The information processing system includes one or more control circuits each having a processor and a memory containing instructions that, when executed by the processor, cause the processor to function as an acquisition unit, an output unit, a reception unit, and a generation unit. The acquisition unit is configured to acquire definition information from the reproduction application. The output unit is configured to output screen information to a display based on the definition information. The reception unit is configured to receive an edit instruction corresponding to the screen information. The generation unit is configured to generate the description file corresponding to the reproduction application, based on the edit instruction.
SYSTEM AND METHOD FOR RULES ENGINE THAT DYNAMICALLY ADAPTS APPLICATION BEHAVIOR
In some implementations, a system enables an administrator to customize a set of rules to dynamically adjust the configuration and output of an application provided to users. A configuration interface for setting rules that dynamically adjust output of an application is provided. Data indicating one or more rules are received through the configuration interface. Activity data indicating user interaction with the application or sensor data for at least some of a plurality of users of the application are then received from multiple client devices. A determination relating to the activity data satisfying at least one condition or trigger is then made. Instructions to adjust output of the application according to one or more system actions of the one or more rules are then communicated to client devices associated with the users in the first subset of the plurality of users.
SYSTEM AND METHOD FOR RULES ENGINE THAT DYNAMICALLY ADAPTS APPLICATION BEHAVIOR
In some implementations, a system enables an administrator to customize a set of rules to dynamically adjust the configuration and output of an application provided to users. A configuration interface for setting rules that dynamically adjust output of an application is provided. Data indicating one or more rules are received through the configuration interface. Activity data indicating user interaction with the application or sensor data for at least some of a plurality of users of the application are then received from multiple client devices. A determination relating to the activity data satisfying at least one condition or trigger is then made. Instructions to adjust output of the application according to one or more system actions of the one or more rules are then communicated to client devices associated with the users in the first subset of the plurality of users.
UNATTENDED DEPLOYMENT OF INFORMATION HANDLING SYSTEMS
A method for deploying an information handling system (platform) determines whether a hardware key coupled to the platform constitutes a deployment key by validating a GUID of the key against a deployment key signature, generated by a trusted server and stored on the key. If the key is validated, a trust factor evaluation is performed by validating the deployment key against a second key, which is bound to a nonvolatile storage component containing a second key signature, generated by the trusted server based on a GUID of the nonvolatile storage component. Upon validating the trust factor, the platform boots into an unattended deployment mode loaded from the deployment key and validates an unattended deployment binary stored in the deployment key against the second key signature to establish a trusted execution session for loading unattended deployment modules from the deployment key and deploying the platform by executing the unattended deployment modules.
UNATTENDED DEPLOYMENT OF INFORMATION HANDLING SYSTEMS
A method for deploying an information handling system (platform) determines whether a hardware key coupled to the platform constitutes a deployment key by validating a GUID of the key against a deployment key signature, generated by a trusted server and stored on the key. If the key is validated, a trust factor evaluation is performed by validating the deployment key against a second key, which is bound to a nonvolatile storage component containing a second key signature, generated by the trusted server based on a GUID of the nonvolatile storage component. Upon validating the trust factor, the platform boots into an unattended deployment mode loaded from the deployment key and validates an unattended deployment binary stored in the deployment key against the second key signature to establish a trusted execution session for loading unattended deployment modules from the deployment key and deploying the platform by executing the unattended deployment modules.