Patent classifications
H04L67/34
System and method for managing configuration data of monitoring agents
In one example, a computer implemented method may include determining an application to be monitored in an endpoint, generating a marker with a unique identifier corresponding to the application running in the endpoint, bundling configuration data within the marker. The configuration data may include configuration settings of a monitoring agent installed on the endpoint to monitor the application. Further, the method may include appending the marker bundled with the configuration data to a configuration file of the monitoring agent and enabling the monitoring agent to monitor the application based on the configuration data in the configuration file.
Installable mutable intelligent security package and security system in internet of things networks
Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate report that includes information associated with the anomaly.
Bidirectional bridge for web view
A bidirectional bridge for web view is a technical solution to an engineering challenge associated with presenting external content in a web view. A bidirectional bridge for web view facilitates bidirectional communication between the web view included in the messaging client and the messaging client itself. In response to a user action requesting a web page to be loaded in the web view, the bidirectional bridge initiates a request to messaging client to retrieve external content, receives the requested external content from the messaging client, and displays an image representing the external content in the web view as part of the web page.
SYSTEMS AND METHODS FOR SAFE OVER-THE-AIR UPDATE OF ELECTRONIC CONTROL UNITS IN VEHICLES
System and method for safe over-the-air (OTA) update of electronic control units in vehicles are provided. The method includes checking whether a vehicle condition allows firmware update of an electronic control unit in a vehicle. If the vehicle condition allows the firmware update, the method includes causing a telematics device to complete the firmware update for the electronic control unit.
DECENTRALIZED SOFTWARE UPGRADE IMAGE DISTRIBUTION FOR NETWORK DEVICE UPGRADES
An example method includes receiving, by a control system for a software upgrade image, respective characterization data for network devices of a network; generating, by the control system and based on the characterization data for the network devices, an image map that indicates, for each portion of a plurality of different portions of the software upgrade image, an image proxy network device selected by the control system from among the network devices to store the portion based on the characterization data; and outputting, by the control system, the image map to a network device of the network devices to cause the network device to obtain each portion of the plurality of different portions of the software upgrade image from the corresponding image proxy network device selected by the control system to store the portion.
Agentless access control system for dynamic calibration of software permissions
Systems and methods are provided for efficient and automated control of software permissions and access to network resources across a complex enterprise environment. User access is may be governed by software bundles. Such bundles and bundles may or may not include all programs or access to all systems needed by the user. An access request management tool is provided that includes new process flows and artificial intelligence for automated refining of software access across a complex and large network of computer servers. The management tool may eliminate conventional intermediary systems needed when utilizing centralized access request management. The management tool may check which user has access to a software bundle and may assign the bundle to other users. The management tool may revoke or grant access to a software bundle.
Real-time feature activation in distributed environment
Methods, systems, and devices for data processing are described. According to the techniques described herein, an application server may be used for real-time provisioning for features for a user. The application server may validate requests from the user for feature activation or deactivation and after validation, may communicate with a provisioning server, which may be non-local to the user or the application server, to indicate validation and activation or deactivation of a feature for the user.
SECURED COMMUNICATIONS WITH DISPLAY DEVICE
Techniques are provided herein for secure display device communications. In one example, a video communications device provides, to a display device over a first connection, communication information that enables the display device to contact a server over a second connection. The video communications device further provides, to the display device over the first connection, a command configured to initiate an interaction with the server. The server obtains, from the display device over the second connection, a message initiating the interaction in response to the command based on the communication information.
Associating device with user account and establishing connection to a data network
Techniques for connecting computing devices to a network are described. For example, a computer system receives, from a second device that is associated with an account and connected to a data network, first data indicating an identifier of a first device. The computer system determines that the identifier is unassociated with accounts that include the account. The computer system determines second data associated with the identifier, access to the account, or a device setup request. The computer system determines that the first device is to be associated with the account. The computer system sends, to a third device, third data that causes the third device to output a confirmation request about setting up the first device and receives, from the third device, fourth data indicating a response to the confirmation request. The computer system associates the first device with the account based on the fourth data.
MULTI-TENANCY VIA CODE ENCAPSULATED IN SERVER REQUESTS
A multitenant infrastructure server (MTIS) is configured to provide an environment to execute a computer routine of an arbitrary application. The MTIS receives a request from a webtask server to execute the computer routine in a webtask container. The computer routine is executed in the webtask container at the MTIS. Upon successful execution of the computer routine, a result set is returned to the webtask server. If the execution of the computer routine is unsuccessful, an error notification is returned to the webtask server. The resources consumed during the execution of the computer routine are determined. The webtask container is destroyed to prevent persistent storage of the computer routine on the MTIS.