G06F21/305

Managing virtual computing testing

Systems, methods, and interfaces for the management of virtual machine instances and other programmatically controlled networks are provided. The hosted virtual networks are configured in a manner such that a virtual machine manager of the virtual network may monitor activity such as user requests, network traffic, and the status and execution of various virtual machine instances to determine possible security assessments. Aspects of the virtual network may be assessed for vulnerabilities at varying levels of granularity and sophistication when a suspicious event or triggering activity is detected. Illustrative embodiments of the systems and methods may be implemented on a virtual network overlaid on one or more intermediate physical networks that are used as a substrate network.

Facility management systems and methods thereof

A facility management system comprises a server, a biometric identification unit, and a processing circuit. The server is configured to store a list of registered users, and biometric information and access rights pertaining to each registered users. The biometric identification unit is associated with the building equipment. The biometric identification unit is enabled to facilitate a user desiring access to the associated building equipment to scan at least one biometric parameter, and subsequent to scanning of the biometric parameter the biometric identification unit is configured to generate a scanned biometric information. The processing circuit is communicatively coupled with the server and the biometric identification unit, and is configured to: authenticate the user based on the biometric information and the scanned biometric information; determine the access rights for the authenticated user; and subsequently provide access to the authenticated user to operate the associated building equipment based on the determined access rights.

BLOCKCHAIN-IMPLEMENTED METHOD AND SYSTEM
20230231711 · 2023-07-20 ·

This invention relates generally to distributed ledger technology (including blockchain related technologies), particularly a method and corresponding system for providing a blockchain transaction comprising a redeem script for an output that comprises: i) a plurality of public keys, each associated with a corresponding private key, wherein each public key is uniquely associated with a potential state of at least one data source; and ii) logic arranged to provide a result based on: A) a determination of which of the plurality of associated private key(s) is/are used to sign the unlocking script, so as to provide an interim result: and B) a comparison of a parameter supplied via the unlocking script against the interim result, and further attempting to spend the transaction output more than once, each attempt supplying a different parameter.

DELIVERY VEHICLE

A delivery vehicle includes: a main body portion equipped with a moving mechanism; and a control section provided at the main body portion, wherein the control section includes: an autonomous driving executing section that controls the moving mechanism and makes it possible for the main body portion to travel autonomously; a destination information acquiring section that acquires information relating to a delivery destination or a collection destination of a package; a data transmitting section transmitting predetermined data for authentication to a management system that manages a secure area on a delivery path; and a data acquiring section that, in a case in which the data for authentication is authenticated by the management system, acquires area information including map information of the secure area from the management system.

System and Method for a Workload Management and Scheduling Module to Manage Access to a Compute Environment According to Local and Non-Local User Identity Information
20230222003 · 2023-07-13 · ·

A system, method and computer-readable media for managing a compute environment are disclosed. The method includes importing identity information from an identity manager into a module performs workload management and scheduling for a compute environment and, unless a conflict exists, modifying the behavior of the workload management and scheduling module to incorporate the imported identity information such that access to and use of the compute environment occurs according to the imported identity information. The compute environment may be a cluster or a grid wherein multiple compute environments communicate with multiple identity managers.

System and method to securely execute datacenter management operations remotely

Disclosed in various examples are methods, systems, and machine-readable media for exposing a Representational State Transfer (RESTful) interface to users whereby management commands on a datacenter may be issued remotely from the users' workstations for secure, remote management of the datacenter. An application task automation command (e.g., a POWERSHELL® command) is executed remotely by creating a proxy command (e.g., based on a POWERSHELL® cmdlet code) to cause the application task automation command to be executed when the proxy command is remotely invoked and deploying the proxy command to a remote computer, such as the user's workstation. The remote computer issues a request including a user identifier and any parameters for the application task automation command when the corresponding proxy command has been invoked by the remote computer. The datacenter determines whether the user is authorized to execute the application task automation command invoked by the proxy command, and upon authorization of the user, the datacenter computer runs the application task automation command with any parameters provided in the request to control configuration of, or data stored on, at least one computer in the datacenter.

Blood glucose control system switching without interruption of therapy delivery

Systems and methods are disclosed herein for switching an application executing on an ambulatory medical device to a new application without interrupting therapy provided by the ambulatory medical device to a subject. The ambulatory medical device may receive an indication that an update to an application executing on the ambulatory insulin pump is available, establish a communication connection to a host computing system, download and install the application update, while a prior version of the application continues to run. The disclosed systems and methods can confirm successful installation of the application update on the ambulatory medical device and switch control of the ambulatory medical device from the prior version to the new version of the application without interrupting therapy provided to the subject.

Access control apparatus and method for controlling configuration of automation apparatus
11693942 · 2023-07-04 · ·

An access control apparatus and method for controlling a configuration of an automation apparatus. The method includes: reading authentication information from an electronic tag; transmitting the authentication information to a networked service; receiving access rights from the networked service; and controlling the configuration of the automation apparatus according to the access rights.

Electronic device functionality in low power mode

Embodiments disclosed herein relate to reducing a power consumption of an electronic device while maintaining some functionality of the electronic device while the electronic device is in a low power mode. The device may be in the low power mode due to a battery level being below a threshold. If the battery level is below the threshold, the electronic device may enter the low power mode. However, before entering the low power mode, some functionality of an application processor may be transferred to a communication controller. Once the functionality is transferred, the application processor may be disabled to reduce power consumption while maintaining functionality of the application processor. The electronic device may also utilize various communication protocols to communicate with a peripheral device. Even though the electronic device may be in the low power mode, the communication controller may be used to cause the peripheral device to perform various actions.

CREDENTIALS MANAGEMENT AND USAGE IN APPLICATION MODERNIZATION

Credentials management and usage in application modernization can be implemented as computer-readable methods, media and systems. A notification identifying an application modernization operation is received. The operation is to be performed on an application deployed by multiple resources arranged in multiple hierarchical levels. A resource residing at a hierarchical level of the multiple hierarchical levels is identified. The application modernization operation is to be performed on the identified resource which has a resource type. A search for a credential is performed. The credential grants access to the resource to enable performing the application modernization operation. In response to the searching, a credential included in the multiple credentials is identified. The identified credential grants access either to the resource or to resources of the resource type. In response to receiving the notification, the identified credential is provided.