Patent classifications
G06F9/44
Systems and methods of auditing server parameters in a telephony network
The current disclosure relates to a system and method for auditing application parameters in a communication network. In particular, the method includes retrieving a set of golden parameter master lists from an auditing database, where each golden parameter master list corresponds to an application of the telecommunications network, and where each golden parameter master list comprises a set of parameter values for the respective application. The method also includes selecting a list of one or more applications for auditing, and for each application in the list: selecting a corresponding golden parameter master list from the set of golden parameter master lists and comparing each of the parameter values of the golden parameter master list to a corresponding set of parameter values of the application to generate a set of discrepancies.
Techniques for large-scale functional testing in cloud-computing environments
Techniques are disclosed for generating an execution plan for performing functional tests in a cloud-computing environment. Infrastructure resources and capabilities (e.g., system requirements) may be defined within an infrastructure object (e.g., a resource of a declarative infrastructure provisioner) that stores a code segment that implements the resource or capability. Metadata may be maintained that indicates what particular capabilities are applicable to each infrastructure resource. Using the metadata, the system can generate an execution plan by combining code segments for each resource with code segments defining each capability in accordance with the metadata. The execution plan may include programmatic instructions that, when executed, generate a set of test results. The system can execute instructions that cause the set of test results to be presented at a user device.
Data processing systems for orphaned data identification and deletion and related methods
In particular embodiments, an Orphaned Data Action System is configured to analyze one or more data systems (e.g., data assets), identify one or more pieces of personal data that are one or more pieces of personal data that are not associated with one or more privacy campaigns of the particular organization, and notify one or more individuals of the particular organization of the one or more pieces of personal data that are one or more pieces of personal data that are not associated with one or more privacy campaigns of the particular organization.
System and method for responsive process security classification and optimization
A system and method for the storage within one or more virtual execution context registers private code representative of processes or other information requiring an enhanced degree of security. The storage of the private code can be performed as a function of the type of code or in response to one or more markers embedded within the code. The time-variant nature of the virtual execution context registers affords a high degree of inherent security for the private code data stored within.
Auto-intrusive data pattern and test case generation for system validation
Techniques for auto-intrusive data pattern and test case generation for negative service testing are described. A test engine obtains negative test information specifying negative test input examples or schemas associated with tests that are expected to fail. A test generator generates multiple test cases based on the negative test information. A test execution orchestrator splits each test case up into actions that are inserted into queues, where workflow execution agents perform the tests by reading from the queues and interacting with services. The tests may also include adjusting a rate of transactions allowed between top-level services and/or downstream services. Results from the testing are analyzed by a test analysis engine and used to inform the services or the test originator of test cases where the expected failures did not arise.
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM
An information processing apparatus capable of simultaneously executing a reproduction function of content data and a communication function with an external apparatus includes a reproduction section configured to execute the reproduction function, a communication control section configured to execute the communication function using a communication section, an operation input allocation section configured to allocate an operation input from a first operation section to the reproduction function or the communication function, an operation input acquisition section configured to acquire an operation input from a second operation section, and a display control section configured to cause a display section to display information relating to the reproduction function or information relating to the communication function.
PROTEINS, POOLS, AND SLAWX IN PROCESSING ENVIRONMENTS
Embodiments described herein include mechanisms for encapsulating data that needs to be shared between or across processes. These mechanisms include slawx (plural of “slaw”), proteins, and pools. Generally, slawx provide the lowest-level of data definition for inter-process exchange, proteins provide mid-level structure and hooks for querying and filtering, and pools provide for high-level organization and access semantics. Slawx includes a mechanism for efficient, platform-independent data representation and access. Proteins provide a data encapsulation and transport scheme using slawx as the payload. Pools provide structured and flexible aggregation, ordering, filtering, and distribution of proteins within a process, among local processes, across a network between remote or distributed processes, and via longer term (e.g. on-disk, etc.) storage.
SYSTEMS AND METHODS FOR PROGRAMMING MOBILE DEVICES
Embodiments of a system and method are described for generating and distributing programming to mobile devices over a network. Devices are provided with Players specific to each device and Applications that are device independent. Embodiments include a full-featured WYSIWYG authoring environment, including the ability to bind web components to objects.
INFORMATION PROCESSING APPARATUS DISPLAY CONTROL METHOD AND PROGRAM
There is provided an information processing apparatus including a display control unit that displays a list screen of thumbnails associated with content, an execution unit that executes any application using the content associated with the thumbnails, and an image generation unit that generates an execution state image showing an execution state of the application by the execution unit, wherein the display control unit displays the execution state image generated by the image generation unit in at least a portion of an area where the list screen is displayed.
SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS
A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device.