G06F8/61

METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
20230007031 · 2023-01-05 ·

Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.

SOLUTION FOR GENERATING AT LEAST ONE INSTALLATION OPERATION FOR AT LEAST ONE ONGOING INSTALLATION PROCESS AT AN INSTALLATION SITE

A method for generating at least one installation operation for at least one on-going installation process of at an installation site includes obtaining site information of the at least one ongoing installation process at the installation site from a site control unit arranged at the installation site, obtaining site information gathered from one or more previous installation processes at one or more other installation sites from one or more external databases, defining at least one installation operation for the at least one ongoing installation process based on the site information of the at least one ongoing installation process and the site information gathered from the one or more previous installation processes, and generating at least one signal including an instruction to perform the at least one installation operation for the at least one ongoing installation process to the site control unit. A computing unit, an installation support system, and a computer program performing at least partly the method are disclosed.

SOLUTION FOR GENERATING AT LEAST ONE INSTALLATION OPERATION FOR AT LEAST ONE ONGOING INSTALLATION PROCESS AT AN INSTALLATION SITE

A method for generating at least one installation operation for at least one on-going installation process of at an installation site includes obtaining site information of the at least one ongoing installation process at the installation site from a site control unit arranged at the installation site, obtaining site information gathered from one or more previous installation processes at one or more other installation sites from one or more external databases, defining at least one installation operation for the at least one ongoing installation process based on the site information of the at least one ongoing installation process and the site information gathered from the one or more previous installation processes, and generating at least one signal including an instruction to perform the at least one installation operation for the at least one ongoing installation process to the site control unit. A computing unit, an installation support system, and a computer program performing at least partly the method are disclosed.

METHOD AND APPARATUS FOR CRYPTOGRAPHICALLY ALIGNING AND BINDING A SECURE ELEMENT WITH A HOST DEVICE
20230006823 · 2023-01-05 · ·

A secure element device that is configured to be cryptographically bound to a host device includes a secure element host key slot configured to store host key information that allows only the host device to control the secure element, a secure memory storing binding information, and limited functionality allowing the binding information to be read from the secure memory by the host device during a binding process. The binding information is cryptographically correlated with the host key information. The host key information is generated by the host device using the binding information read from the secure element and a secret key. The secure element device further includes general functionality only accessible to the host device using the host key information that is generated by the host device. The secure memory includes prevention measures impeding unauthorized entities from obtaining information from the secure memory.

METHOD AND APPARATUS FOR CRYPTOGRAPHICALLY ALIGNING AND BINDING A SECURE ELEMENT WITH A HOST DEVICE
20230006823 · 2023-01-05 · ·

A secure element device that is configured to be cryptographically bound to a host device includes a secure element host key slot configured to store host key information that allows only the host device to control the secure element, a secure memory storing binding information, and limited functionality allowing the binding information to be read from the secure memory by the host device during a binding process. The binding information is cryptographically correlated with the host key information. The host key information is generated by the host device using the binding information read from the secure element and a secret key. The secure element device further includes general functionality only accessible to the host device using the host key information that is generated by the host device. The secure memory includes prevention measures impeding unauthorized entities from obtaining information from the secure memory.

PACKAGE DISTRIBUTION AND INSTALLATION IN RESPONSE TO USER LOGON

Disclosed are various implementations for distributing and installing packages in response to user logon events. A logon event associated with a user account is detected for a client device. A query containing a respective user account identifier is sent to a provisioning service to retrieve a set of packages to install on the client device. The set of packages are received from the provisioning service and installed on the client device.

PACKAGE DISTRIBUTION AND INSTALLATION IN RESPONSE TO USER LOGON

Disclosed are various implementations for distributing and installing packages in response to user logon events. A logon event associated with a user account is detected for a client device. A query containing a respective user account identifier is sent to a provisioning service to retrieve a set of packages to install on the client device. The set of packages are received from the provisioning service and installed on the client device.

PRESENTING CONTENT RECEIVED FROM THIRD-PARTY RESOURCES
20230236707 · 2023-07-27 ·

Aspects of the present disclosure involve systems comprising a computer-readable storage medium storing a program and a method for performing operations comprising: receiving, by a messaging application, a first content item generated by a first client device using a third-party resource; generating the first content item for display on a second client device together with an indication of the third-party resource used to generate the first content item; receiving, from the second client device, selection of the indication of the third-party resource; generating, for display on the second client device, a first user interface that includes a plurality of content items associated with the third-party resource and a first option to access the third-party resource, the plurality of content items including the first content item; and enabling the second client device to use the third-party resource in response to receiving selection of the first option to access the third-party resource.

PRESENTING CONTENT RECEIVED FROM THIRD-PARTY RESOURCES
20230236707 · 2023-07-27 ·

Aspects of the present disclosure involve systems comprising a computer-readable storage medium storing a program and a method for performing operations comprising: receiving, by a messaging application, a first content item generated by a first client device using a third-party resource; generating the first content item for display on a second client device together with an indication of the third-party resource used to generate the first content item; receiving, from the second client device, selection of the indication of the third-party resource; generating, for display on the second client device, a first user interface that includes a plurality of content items associated with the third-party resource and a first option to access the third-party resource, the plurality of content items including the first content item; and enabling the second client device to use the third-party resource in response to receiving selection of the first option to access the third-party resource.

TECHNIQUES FOR IMPLEMENTING ROLLBACK OF INFRASTRUCTURE CHANGES IN A CLOUD INFRASTRUCTURE ORCHESTRATION SERVICE

Techniques for implementing rollback of infrastructure changes in an infrastructure orchestration service are described. In certain examples, an infrastructure orchestration service is disclosed that manages both provisioning and deploying of infrastructure assets within a cloud environment. The service receives a plan comprising a set of instructions associated with a set of infrastructure assets of an execution target and identifies a first state of the set of infrastructure assets. The service executes the set of instructions in the plan to achieve a second state for the set of infrastructure assets. Based in part on the executing, the service receives a trigger for rolling back the plan to restore the set of infrastructure assets in the plan to the first state and executes a rollback plan for the plan. The service then transmits a result associated with the execution of the rollback plan.