G06F9/445

SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS
20180004957 · 2018-01-04 ·

A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device.

RANGE PROGRAMMING USING A SEARCH QUERY
20180004853 · 2018-01-04 ·

Systems and methods for range programming using a search query are disclosed. A method for range programming using a search query includes determining whether the search query comprises a range operation and identifying a target application to launch using a search application which is separate from the target application and based on the search query. A range of results to process with the target application can be identified using the search application and based on the search query. The results can be separately within the range in the context of the target application.

RANGE PROGRAMMING USING A SEARCH QUERY
20180004853 · 2018-01-04 ·

Systems and methods for range programming using a search query are disclosed. A method for range programming using a search query includes determining whether the search query comprises a range operation and identifying a target application to launch using a search application which is separate from the target application and based on the search query. A range of results to process with the target application can be identified using the search application and based on the search query. The results can be separately within the range in the context of the target application.

MANAGEMENT OF DEVICE FIRMWARE UPDATE EFFECTS AS SEEN BY A HOST
20180004504 · 2018-01-04 ·

The present disclosure relates to systems and methods of device firmware update effects as seen by a computing host. In one example implementation according to aspects of the present disclosure, a method includes executing a first firmware received from a computing host, the first firmware including a first firmware revision identifier, executing a second firmware received from the computing host, and returning the first firmware revision identifier to the computing host during the execution of the second firmware and before an event occurs. The returning the first firmware revision identifier enables the computing host to continue executing without detecting an error in response to a change in a value of a returned firmware revision identifier throughout the execution of the first firmware and during execution of the second firmware.

MANAGEMENT OF DEVICE FIRMWARE UPDATE EFFECTS AS SEEN BY A HOST
20180004504 · 2018-01-04 ·

The present disclosure relates to systems and methods of device firmware update effects as seen by a computing host. In one example implementation according to aspects of the present disclosure, a method includes executing a first firmware received from a computing host, the first firmware including a first firmware revision identifier, executing a second firmware received from the computing host, and returning the first firmware revision identifier to the computing host during the execution of the second firmware and before an event occurs. The returning the first firmware revision identifier enables the computing host to continue executing without detecting an error in response to a change in a value of a returned firmware revision identifier throughout the execution of the first firmware and during execution of the second firmware.

EFFICIENT SHARING OF ARTIFACTS BETWEEN COLLABORATION APPLICATIONS
20180004538 · 2018-01-04 ·

A method can include evaluating each of a plurality of collaborative systems, using a processor, for suitability hosting an artifact according to at least one attribute of the artifact. A first collaborative system can be selected from the plurality of collaborative systems according to the evaluation. The artifact can be stored in the first collaborative system.

EFFICIENT SHARING OF ARTIFACTS BETWEEN COLLABORATION APPLICATIONS
20180004538 · 2018-01-04 ·

A method can include evaluating each of a plurality of collaborative systems, using a processor, for suitability hosting an artifact according to at least one attribute of the artifact. A first collaborative system can be selected from the plurality of collaborative systems according to the evaluation. The artifact can be stored in the first collaborative system.

ON-PREMISES AGENT FOR MOBILE CLOUD SERVICE

Systems, devices, and methods are disclosed for an agent device within a company's network firewall to initiate an HTTP connection with a cloud-based gateway and then upgrade the connection to a WebSockets protocol in order to have an interactive session. Over this interactive session, a mobile device, which connects to the cloud-based intermediary, can request data from servers inside the company's firewalls. Because the firewall is traversed using HTTP protocols (with WebSockets), it can be as safe as letting employees browse the web from inside the company's network.

WEBPAGE LOADING METHOD AND SYSTEM
20180004857 · 2018-01-04 ·

Webpage loading method and system. While browsing a webpage, a user can uninterruptedly browse subsequent contents without waiting for page loading since whether subsequent pages need to be loaded is determined by the prediction of remaining page browsing time. The method comprises: in response to a page loading completion event, recording a current page end scroll bar value, a current page initial scroll bar value and a current page loading completion moment; in response to a scroll bar scrolling event, recording a present scroll bar triggering moment and a present scroll bar value; calculating a page browsing speed and a remaining page browsing time; and when the remaining page browsing time meets a preset condition, sending to a server a page acquisition request related to subsequent pages of the current page and loading and updating page data about the subsequent pages to the end of the current page.

SYSTEMS AND METHODS FOR SHORT RANGE WIRELESS DATA TRANSFER
20180004500 · 2018-01-04 · ·

Systems and methods for application level authentication are provided for use with the low energy Bluetooth device and accessory. This includes receiving accessory credentials from a server, establishing a Bluetooth low energy connection with the accessory, authenticating with the accessory, and lastly transferring data to the accessory. The transferring of the data may be either a bulk transfer, or a data stream. The authenticating may be an application layer authentication between a device and the accessory using a shared secret key and using a hash function. Additional embodiments include methods for over-the-air firmware updates, and device control of a low energy Bluetooth accessory.