Patent classifications
G06F8/61
SYSTEM AND METHOD FOR USING VIRTUAL ADDRESSING TO EXECUTE APPLICATION IMAGES
One or more computing devices, systems, and/or methods are provided. In an example, a method comprises storing a first application image and a second application image in an application image memory, designating the first application image as active, receiving a first address for accessing the application image memory from a processor, modifying the first address based on a first offset between a base starting address of the first application image and a starting physical address of the first application image in the application image memory to generate a second address, and accessing the application image memory using the second address.
Service enabler function
The present application describes a method and apparatus for updating a service in a service layer function of a network. In particular, a method for adding a service is disclosed. Initially, a request is received at a service enabler function located in the service layer function to add the service. A service description of the requested service is reviewed to understand its capabilities. A verification request is sent to a service capability located in the service layer function. Further, another service layer function or application is notified that the requested service is enabled.
Service enabler function
The present application describes a method and apparatus for updating a service in a service layer function of a network. In particular, a method for adding a service is disclosed. Initially, a request is received at a service enabler function located in the service layer function to add the service. A service description of the requested service is reviewed to understand its capabilities. A verification request is sent to a service capability located in the service layer function. Further, another service layer function or application is notified that the requested service is enabled.
MONITORING DEVICE AND MONITORING METHOD
According to one embodiment, there is provided a monitoring device for a terminal including a connection unit to which at least one device is able to be connected and mounted with a container file storing application software for controlling a business to be performed by using the device connected to the connection unit. The monitoring device includes a detection unit, an acquisition unit, and a processing unit. The detection unit detects an abnormality in the terminal. The acquisition unit acquires the container file mounted on the terminal in which the abnormality is detected. The processing unit installs the acquired container file on an alternative terminal.
MONITORING DEVICE AND MONITORING METHOD
According to one embodiment, there is provided a monitoring device for a terminal including a connection unit to which at least one device is able to be connected and mounted with a container file storing application software for controlling a business to be performed by using the device connected to the connection unit. The monitoring device includes a detection unit, an acquisition unit, and a processing unit. The detection unit detects an abnormality in the terminal. The acquisition unit acquires the container file mounted on the terminal in which the abnormality is detected. The processing unit installs the acquired container file on an alternative terminal.
Software deployment certification
The present disclosure pertains to validation of runtime objects for a software deployment using a certificate. After creating the runtime objects during a build process, a certificate may be generated based on the runtime objects. The certificate may include a fingerprint of the runtime objects that may be used before deployment to determine whether the runtime objects have been changed. Before deployment, the runtime objects and the certificate may be obtained and the certificate may be validated. In addition, the runtime objects may be validated using the fingerprint included in the certificate. For instance, the fingerprint may be re-generating based on the runtime objects for deployment. The runtime objects may be validated by comparing the re-generated fingerprint to the fingerprint in the certificate. The runtime objects may be deployed if the certificate and the runtime objects are valid.
Software deployment certification
The present disclosure pertains to validation of runtime objects for a software deployment using a certificate. After creating the runtime objects during a build process, a certificate may be generated based on the runtime objects. The certificate may include a fingerprint of the runtime objects that may be used before deployment to determine whether the runtime objects have been changed. Before deployment, the runtime objects and the certificate may be obtained and the certificate may be validated. In addition, the runtime objects may be validated using the fingerprint included in the certificate. For instance, the fingerprint may be re-generating based on the runtime objects for deployment. The runtime objects may be validated by comparing the re-generated fingerprint to the fingerprint in the certificate. The runtime objects may be deployed if the certificate and the runtime objects are valid.
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.
Generating applications for versatile platform deployment
Implementations generally relate to a method of automatically generating applications for multiple platforms based on one source of application code. Implementations include receiving a signal from a client device to initiate an application generation process, for example, through a graphical user interface (GUI). In an implementation, the application generation process analyzes the application code to differentiate between core application code, which is shared between many platforms, and device-specific code, and then separates the core application code from the device-specific code. The core application code may then be deployed for use in a plurality of applications such as a web application, progressive web application, or, as taken together with device-specific code, as a native mobile application. Applications may be deployed with features that are automatically determined based on their deployment method and the feature set of each platform.