Patent classifications
G06F11/0742
Dynamic interface intervention to improve sensor performance
A computer-implemented method comprises obtaining a physical location of a sensor on a device; determining that quality of data captured by the sensor physically located on the device is degraded based on a comparison of the captured data to a quality threshold; and, in response to determining that the quality of the data captured by the sensor is degraded, displaying a visual indicator on a display of the device. The visual indicator includes at least one non-textual component that directs a user to the physical location of the sensor on the device.
Screen freezing processing method and terminal
A screen freezing processing method and a terminal are provided. The method includes: displaying a user interface of an application, and receiving an operation on the user interface, where the operation on the user interface is used to implement a first function; skipping responding to, by the terminal within first duration, the operation on the user interface, and skipping implementing the first function; and after the first duration, responding to, by the terminal, the operation on the user interface, and implementing the first function. This technical solution can automatically restore implementation of the first function, thereby improving user experience.
Detecting and analyzing performance anomalies of client-server based applications
An approach is provided for detecting and analyzing an anomaly in application performance in a client-server connection via a network. A status code of a response sent by a server to a client, a round trip latency time (RTT) of the response, and a time out of a connection between client and server are determined. Using a k-means clustering algorithm, buckets of RTT values clustered into lower and higher values, and running counts and means for the RTT values in each bucket, an RTT value is determined to exceed a threshold value. Based on the status code, the RTT value exceeding the threshold, and the connection time out, the anomaly is detected. Based on temporal and textual analyses of log entries and an environment analysis, candidate root causes of a failure that resulted in the anomaly are determined.
Techniques for repairing an inoperable auxiliary device using another device
The embodiments set forth a technique for enabling a computing device to cure a configuration issue associated with an auxiliary computing device. According to some embodiments, the technique can include the steps of (1) receiving, from the auxiliary computing device, a request to repair the configuration issue, where the request includes device information associated with the auxiliary computing device, and (2) in response to determining, based on the device information, that the auxiliary computing device is known to the computing device: (i) establishing a secure communication link with the auxiliary computing device, (ii) identifying at least one problem associated with the configuration issue, (iii) generating repair information based on the at least one problem, and (iv) transmitting the repair information to the auxiliary computing device over the secure communication link to cause the auxiliary computing device to cure the at least one problem.
Method and System to Automate Troubleshooting and Resolution of Customer Device Issues
Aspects of the subject disclosure may include, for example, a method in which a processing system installs on a controlling device user interface automation software provided by a customer care server separated from the controlling device; the controlling device communicates with the customer care server over a communication network. The system receives information from equipment of a customer care agent regarding a customer care issue associated with a communication device coupled to the controlling device by a communication link separate from the communication network. The method includes effecting, responsive to the information and without action by a user of the communication device, an input to the user interface via the communication link to initiate a resolution procedure for the customer care issue; the resolution procedure can include resetting network settings, enabling a network service, collecting information regarding the network settings, and/or providing new network settings. Other embodiments are disclosed.
Monitoring circuit including cascaded s-boxes for fault injection attack protection
Systems on a chip (SoCs) include security logic configured to increase resistance to fault injection attacks (FIAs). The security logic includes a monitoring circuit and a cascaded series of substitution-boxes (S-Boxes) having a circuit delay that is designed to match (or most closely match) the computing device critical path length. The monitoring circuit monitors the number of iterations required for the cascaded series of S-Boxes to return to an initial value and generates an error signal if the monitored loop length is different from the expected loop length. In some examples, the error signal is received by a mitigation processor that executes one or more processes aimed at mitigating the attack.
SYSTEM FOR DEFINING AND TRACKING TRANSACTIONS OF MOBILE DEVICES
In some examples, transaction data is received in relation to transactions performed by an application on a mobile device. The transactions include interactions between the mobile device and at least one server. The transaction data is aggregated for a time period according to different time increments. The transaction data for the time period is stored in a first table aggregated into time intervals according to a first time increment, and the transaction data for the time period is also stored in a second table aggregated into time intervals according to a second time increment. A user interface can be generated to include transaction information generated using the transaction data aggregated for the time period.
Detection and repair of failed hardware components
A portable handheld device receives from a central repository, information on a failed hardware component of a computational device, wherein the information includes an authentication code to permit access to the failed hardware component and a time window in which the failed hardware component is permitted to be accessed. The portable handheld device uses the authentication code to access the failed hardware component for repair or replacement during the time window.
Recovery Method for Terminal Device Startup Failure and Terminal Device
Embodiments of this application provide a recovery method for a terminal device startup failure and a terminal device. The method includes: determining that a failure indication event occurs in a startup process, where the failure indication event is used to indicate a startup failure; determining at least one recovery policy based on a type of the failure indication event and/or a cause of the failure indication event; and performing startup recovery based on the at least one recovery policy.
MOBILE PHONE HAVING FLASH MEMORY RESET FUNCTION AND FLASH MEMORY CONTROL APPARATUS THEREOF
A mobile phone having a flash memory reset function, which solves a malfunction of the mobile phone due to an abnormal state of a flash memory, and a flash memory control apparatus thereof. The flash memory control apparatus includes an application processor configured to provide the hold signal and the chip select signal for resetting when it is determined, on the basis of error information due to a read error of an integrated circuit operating by reading flash data, that an abnormal case due to a read error for the flash data has occurred more than a predetermined number of times; and a flash memory configured to reset the flash data when the hold signal and the chip select signal for resetting are received.