H04L67/34

Searching SaaS virtual applications

Methods and systems for searching SaaS virtual applications are disclosed. One method includes receiving a set of search terms for a search of a virtual application, the search of the virtual application being executable without having the virtual application open on a computing device. The search request is provided to a source of the virtual application, the request including the set of search terms for the virtual application. At least one response is received from the source of the virtual application based on the set of search terms. A list of search results is provided to the computing device to enable selection of the virtual application from a plurality of other virtual applications accessible via the computing device, the list of search results including the received at least one response.

Rapid install of IoT devices
11695635 · 2023-07-04 · ·

Devices, systems, and processes for rapid installation of numerous Internet-of-Things (IoT) devices are described. For at least one embodiment, a system for installing multiple Internet-of-Things (IoT) devices may include a multi-device hub communicatively coupled to each of multiple IoT devices. One or more gateways are coupled to the multi-device hub. One or more IoT servers are coupled to at least one of the one or more gateways. The multi-device hub is configured to facilitate a bulk installation of the multiple IoT devices by executing non-transient computer instructions for registering and activating each of the IoT devices with use with one or more IoT servers.

Techniques for preventing concurrent execution of declarative infrastructure provisioners

Techniques for preventing concurrent execution of an infrastructure orchestration service are described. Worker nodes can receive instructions, or tasks, for deploying infrastructure resources and can provide heartbeat notifications to scheduler nodes, also considered a lease. A signing proxy can track the heartbeat notifications sent from the worker nodes to the scheduler node. The signing proxy can receive requests corresponding to a performance of the tasks assigned to the worker nodes. The signing proxy can determine whether the lease between each worker node and the scheduler is valid. If the lease is valid, the signing proxy may make a call to services on behalf of the worker node, and if the lease is not valid, the signing proxy may not make a call to services on behalf of the worker node. Instead, the signing proxy may cut off all outgoing network traffic, blocking access of the worker node to services.

Systems and methods for network authentication with a shared secret

A computing system can associate a customer device of a customer with a financial transaction record and the merchant, the financial transaction record indicative of a first purchase from the merchant by the customer, transmit a first query to the customer device prompting the customer to input information regarding an aspect of the first purchase, the first query including a description of a predetermined product parameter of the financial transaction record indicative of the first purchase from the merchant by the customer, authenticating, by the computing system, the first request by determining that the customer-input response to the first query corresponds to the established aspect of the first purchase in accordance with a predetermined accuracy threshold, and authorizing, by the computing system, connection of the customer device to the network provided by the merchant based at least in part on the first request being authenticated.

Dynamically routing code for executing

Code may be dynamically routed to computing resources for execution. Code may be received for execution on behalf of a client. Execution criteria for the code may be determined and computing resources that satisfy the execution criteria may be identified. The identified computing resources may then be procured for executing the code and then the code may be routed to the procured computing resources for execution. Permissions or authorization to execute the code may be shared to ensure that computing resources executing the code have the same permissions or authorization when executing the code.

Network-based solution module deployment platform

The present invention provides a deployment platform that enables solution modules to be created and deployed without writing new code. The solution modules may include existing solutions, solution components, connectors, and the like selected from a solution library. The deployment platform includes a development engine providing functionality for generating deployment information for the solution module. The deployment information may include a blueprint or other information for deploying the solution module to target infrastructure. The deployment platform also includes a deployment engine providing functionality for deploying the solution module to the target infrastructure automatically. During deployment, the deployment engine pushes components of the solution module to the target infrastructure in accordance with the deployment information. During and after deployment, information may be captured and recorded to a distributed ledger to provide end-to-end visibility into the deployed solution over the deployment lifecycle (e.g., including initial deployment, updates/upgrades, and decommissioning).

Deploying schematically enriched document content as representational state transfer application programming interfaces

Deploying schematically enriched document content as Representational State Transfer (REST) Application Programming Interfaces (APIs) is provided. Nouns corresponding to topics in a parent-child topic hierarchy of a table of contents of a document are utilized to generate a REST API for each topic in the parent-child topic hierarchy. A REST resource model is generated that contains each generated REST API corresponding to each topic in the parent-child topic hierarchy of the table of contents of the document. The REST resource model corresponding to the parent-child topic hierarchy of the table of contents of the document is deployed to subscribing client applications via a network.

LOCAL EDGE AUTHORITY PLATFORM

Systems and methods providing a local edge authority platform that enables localized control of managed devices with selective cloud and occasional cloud connectivity are provided. The method includes receiving first configuration instructions from a first configuration authority for configuring a managed device; receiving second configuration instructions from a second configuration authority for configuring the managed device, wherein the first configuration authority is different than the second configuration authority; determining a conflict exists between the first configuration instructions and the second configuration instructions; resolving the conflict; and configuring the managed device based on the resolved conflict.

CENTER, OTA MASTER, METHOD, NON-TRANSITORY STORAGE MEDIUM, AND VEHICLE

A center configured to communicate with an OTA master configured to control software update for electronic control units mounted on a vehicle includes one or more processors. The one or more processors are configured to store security information in which security levels required for the software update are associated with the electronic control units mounted on the vehicle, respectively, and generate a distribution package applied encryption at the security level associated with a target electronic control unit based on the security information. The target electronic control unit is an electronic control unit that is a target of the software update.

METHODS AND APPARATUS FOR COMMUNICATING VECTOR DATA

A method of communicating time correlated vector data within a network includes reading, by a transmitting node, a first vector data including a plurality of elements, selecting, by the transmitting node, a subset of elements of the plurality of elements based on a criteria and sending, by the transmitting node, the subset of elements to a receiving node. The receiving node receives the subset of elements and estimates a plurality of elements not included in the subset of elements based on a previously received subset of element based on a second vector data. The first vector data and the second vector data are part of a time series of vectors.