Patent classifications
G06F21/12
Container certificate injection
Methods, systems, and apparatus, including computer programs encoded on computer storage media for using certificate injection tasks to generate containers having corresponding digital certificates. One of the methods includes receiving, by the distributed computing system, a source container image. A certificate injection task is executed, including: launching a container instance from the source container image and executing injection code within an execution environment of the launched container instance that writes one or more digital certificates to one or more corresponding locations within a file system of the execution environment. An output container image having the one or more digital certificates is then generated.
Systems and methods for authentication
The present disclosure provides systems and methods for parameterized application installation. A client device may provide authentication credentials of a user to an authentication server, which may store an association between the user and a content item linking to an application and identifying a parameter for use by the application. The client device may download and install the application via an application server or application store. Once installed, the application may re-provide the authentication credentials to the authentication server, which may retrieve the association, and provide the parameter for use by the application. Thus, the application server or application store may continue to discard referrer information or parameters for the application, but the application may still receive and utilize the parameters without further user intervention.
METHOD AND APPARATUS FOR PREVENTING ROLLBACK OF FIRMWARE OF DATA PROCESSING DEVICE, AND DATA PROCESSING DEVICE
Implementations of the present application propose a method and apparatus for preventing rollback of firmware of a data processing device, and a data processing device. The method includes: enabling a boot loader (BootLoader) to read a current value of a predetermined bit in a one-time programmable memory (eFuse); determining whether the current value and a legal value written into the one-time programmable memory after the latest updating of the firmware of the data processing device satisfy a preset relationship; in response to determining that the current value and the legal value satisfy the preset relationship, enabling the boot loader to call an operating system kernel of the data processing device, and in response to determining that the current value and the legal value do not satisfy the preset relationship, enabling the boot loader not to call the operating system kernel of the data processing device. According to the implementations of the present application, rollback of the firmware can be prevented based on a variety of ways in a link-by-link mode.
METHOD FOR SIGNING KEY MANAGEMENT BY ELECTRONIC DEVICE, AND ELECTRONIC DEVICE THEREFOR
Disclosed is an electronic device comprising: a memory in which instructions are stored; and a processor electrically connected to the memory. The processor, when the instructions stored in the memory are executed: acquires a command for installation of a first application signed with a first key; checks information relating to the first key in a key storage of the electronic device; if the first key is determined to be valid, installs the first application; and if the first key is determined to have been revoked, controls to prohibit installation of the first application.
Onboarding of Monitoring Tools
A system, process, and computer-readable medium for configuring agents for monitoring deployed applications is described. A system, process, and computer-readable medium for configuring monitoring user interfaces, e.g., monitoring dashboards, that use information made available from the agents is also described. Through using application data available during creation of the agents, the agents may be configured using the user interface as modified by selections and displaying subsequent choices from the received application data. Using knowledge of the generated agents, monitoring dashboards may be generated via developers interacting with a user interface providing a list of available metrics accessible by the generated agents. Using the one or more user interfaces, developers may generate agents and/or monitoring dashboards with greater efficiency.
DELIVERING APPLICATIONS OVER-THE-AIR WHILE SUPPORTING ORIGINAL EQUIPMENT MANUFACTURER MARKERS
An information handling system retrieves entitlement associated with installing a software application, and downloads the software application associated with a version number. If the software application requires a marker associated with an original equipment manufacturer of the information handling system, then the marker may be copied from the original equipment manufacturer to the information handling system and associated with the software application. The software application may then be installed on the information handling system at a customer site.
DELIVERING APPLICATIONS OVER-THE-AIR WHILE SUPPORTING ORIGINAL EQUIPMENT MANUFACTURER MARKERS
An information handling system retrieves entitlement associated with installing a software application, and downloads the software application associated with a version number. If the software application requires a marker associated with an original equipment manufacturer of the information handling system, then the marker may be copied from the original equipment manufacturer to the information handling system and associated with the software application. The software application may then be installed on the information handling system at a customer site.
Display driver integrated circuit and display system having the same
Systems and methods are described for a display driver integrated circuit that is configured to certify whether an application processor and the display driver integrated circuit are genuine products. The display driver integrated circuit includes: an encryptor for generating first encrypted data by encrypting first data; a data converter for converting the first data into a first converted signal expressed with four or more voltage levels; an interface for providing the first converted signal to a host processor, and receiving, from the host processor, a second converted signal corresponding to second encrypted data generated by the host processor; and a determiner for controlling a display panel by comparing the first encrypted data with converted data corresponding to the second encrypted data. The second converted signal transferred through the interface is expressed with the voltage levels.
VEHICLE CONTROL DEVICE AND VEHICLE CONTROL SYSTEM
Provided is a vehicle control device that ensures normal control even when a program including an error is distributed. A vehicle control device includes a calculation unit and a memory, and updates software stored in the memory, and the vehicle control device includes a communication unit which receives encrypted software, a decrypting unit which decrypts the encrypted software into a plaintext, a rewriting unit which is set in the memory and stores the decrypted software, and a determination unit which collates first collation information set in advance in the memory, second collation information given to the software, and the first collation information, determines whether or not to store the decrypted software based on a collation result, and selects the decrypted software as software for next activation when the decrypted software is stored.
System and Method for Managing Secure Files in Memory
A data access manager is provided on a computing device to manage access to secure files stored in memory. The data access manager intercepts function calls from applications to the memory management unit and determines whether an application is allowed to access secure data stored in the memory of the computing device. When an initial request to map the data is received, the data access manager maps both secure data and clear data, obtaining pointers to both secure and clear data. When an application has permission to access the requested data, the data access manager returns the pointer to the clear data. When an application does not have permission to access the requested data, the data access manager returns the pointer to the secure data.