G06F8/61

MOBILE DEVICE SECURITY SYSTEMS AND METHODS
20180012001 · 2018-01-11 ·

A system and method for securing a mobile device may include providing software for installation on the mobile device where the software is configured for disabling at least some functionality of the device, storing a mobile device identifier identifying the mobile device, and determining an unlock code for unlocking the mobile device, receiving a notification of sale of the mobile device, and providing the unlock code. Systems and methods for receiving and verifying the unlock code are also described.

System and method of providing system jobs within a compute environment
11709709 · 2023-07-25 · ·

The disclosure relates to systems, methods and computer-readable media for using system jobs for performing actions outside the constraints of batch compute jobs submitted to a compute environment such as a cluster or a grid. The method for modifying a compute environment from a system job disclosure associating a system job to a queuable object, triggering the system job based on an event and performing arbitrary actions on resources outside of compute nodes in the compute environment. The queuable objects include objects such as batch compute jobs or job reservations. The events that trigger the system job may be time driven, such as ten minutes prior to completion of the batch compute job, or dependent on other actions associated with other system jobs. The system jobs may be utilized also to perform rolling maintenance on a node by node basis.

Code monitoring to recommend alternative tracking applications

Disclosed herein at methods and systems for monitoring and analyzing code and identifying a suitable substitute for the identified code. A central server identifies inserted code configured to communicate session data to a second server. The central server then identifies an application having functionality corresponding to the inserted code. The central server then provides an indication of the corresponding application.

Code monitoring to recommend alternative tracking applications

Disclosed herein at methods and systems for monitoring and analyzing code and identifying a suitable substitute for the identified code. A central server identifies inserted code configured to communicate session data to a second server. The central server then identifies an application having functionality corresponding to the inserted code. The central server then provides an indication of the corresponding application.

REMOTE FEATURE ACTIVATION IN POWER MACHINES

Implementations of the present disclosure are generally directed to activating features in power machines. More particularly, implementations of the present disclosure are directed to remote activation of features in power machines. Implementations include, methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting a request for an initialization indicator for a software package from an initialization system of a power machine comprising hardware physically capable of executing at least one function, the request being transmitted, by a communication link of the initialization system, from a machine controller of the initialization system to a remote system, communicating, by the communication link, the initialization indicator from the remote system to the machine controller, and in response to receiving the initialization indicator: storing, by the machine controller, the initialization indicator, and executing, by the machine controller, the software package to control the at least one function.

HIDING AND UNHIDING JAVA CARD APPLET INSTANCES
20230236815 · 2023-07-27 ·

Methods and devices are provided for installing and hiding applets onto smart cards devices. In a first step, a request for installing an instance of a first applet is received at the card device from an off-card entity. The request includes a first applet identifier. An applet instance is then installed with the first applet identifier in a registry of the card device's operating system. In a further step, a request for hiding the instance of the first applet identified by the first applet identifier is received at the card de-vice from the off-card entity. After receiving the hiding request, the smart card operating system finds the applet instance with the give applet identifier and hides it.

HIDING AND UNHIDING JAVA CARD APPLET INSTANCES
20230236815 · 2023-07-27 ·

Methods and devices are provided for installing and hiding applets onto smart cards devices. In a first step, a request for installing an instance of a first applet is received at the card device from an off-card entity. The request includes a first applet identifier. An applet instance is then installed with the first applet identifier in a registry of the card device's operating system. In a further step, a request for hiding the instance of the first applet identified by the first applet identifier is received at the card de-vice from the off-card entity. After receiving the hiding request, the smart card operating system finds the applet instance with the give applet identifier and hides it.

SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.

SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.

METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
20230007031 · 2023-01-05 ·

Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.