H04L67/34

SECURITY MODEL FOR LIVE APPLICATIONS IN A CLOUD COLLABORATION PLATFORM

Disclosed herein are system, method, and computer program product embodiments for providing a security model to customizable live applications in a cloud collaboration platform. The security approach may dedicate a frame to each live application, serving the frame from a different domain than a document in which the live application is embedded. This approach ensures that more stringent security requirements may be required of the live application and allows the data presented to the live application to be narrowly tailored. The security model may further leverage sandbox attributes and content-security policies to restrict the behavior of sandboxed and non-sandboxed live applications in accordance with best security practices.

METHOD AND APPARATUS FOR PROVIDING SECURE SHORT-LIVED DOWNLOADABLE DEBUGGING TOOLS
20230061506 · 2023-03-02 ·

A system and method for providing remote access to a device is disclosed. The method comprises receiving an automatically expiring authentication token having encrypted authentication token data including a session key from the device, transmitting the authentication token to secure facility, receiving the decrypted authentication token data from the secure facility, signing a tool package with a package verification key derived at least in part from the session key, the tool package comprising processor instructions providing remote access to the device when executed by the processor, providing the signed tool package to the device. The device verifies the signed tool package using the package verification key and executes the tool package only if the signature of the tool package is verified.

SYSTEMS AND METHODS FOR SAFE OVER-THE-AIR UPDATE OF ELECTRONIC CONTROL UNITS IN VEHICLES

Systems and method for safe over-the-air (OTA) update of electronic control units in vehicles are provided. The OTA server determines whether an operator terminal is close to a vehicle and if so, sends a request to the operator terminal requesting confirmation for proceeding with completing a firmware update for an electronic control unit in the vehicle. In response to receiving the confirmation, the OTA server sends a request to a telematics device coupled to the vehicle to complete the firmware update.

INTEGRATING DATA WITH DIFFERENT CONFIGURATION MODELS
20230123011 · 2023-04-20 ·

Example methods and systems automatically convert configuration data from one format to another, allowing data objects to be used by multiple application servers even though those application servers use different configuration models. In an embedded configuration model, configuration data is embedded in the data object to which the configuration data applies. In a referential configuration model, each data object includes an identifier for the corresponding configuration data. Accessing the configuration data for the data object is achieved by using the identifier to look up the configuration data from another location (e.g., in a database). To support transferring a data object between applications using different configuration models, the configuration model for the data object is changed to match the configuration model expected by the application receiving the data object.

TRANSPARENT RELOCATION OF MEC APPLICATION INSTANCES BETWEEN 5G DEVICES AND MEC HOSTS

Method, systems, and devices for transparent relocatable application instance deployment are described. A method performed by a Wireless Transmit/Receive Unit may comprise transmitting, to a Multi-access Edge Computing (MEC) system, a first message including a request to deploy the relocatable application instance at a target. The method may comprise receiving a second message including an indication to establish communication with the application instance and a Transparent Instance Relocation Session Identifier (TIRSI) and establishing, based on the second message, communication with the relocatable application instance at the target. The method may comprise transmitting a third message including a request for relocation of the application instance to another target. The method may comprise receiving a fourth message including an indication to establish communication with a relocated application instance at the another target and the TIRSI and establishing, based on the fourth message, communication with the relocated application instance at the another target.

MOBILE DIGITAL LOCKING TECHNOLOGY
20220327877 · 2022-10-13 ·

The invention relates to methods and systems where a mobile phone is used to open doors of buildings and vehicles instead of a dedicated physical key. In the invention, the mobile station is configured to provide the operating power to the lock without a power chord. A mobile station app is then configured to communicate with the lock via a short-range wireless communication connection, and open and close the lock. The object of the invention is to provide an electronic software-based key and lock system that is cheaper and easier to use than the physical key.

SERVICE DATA MANAGEMENT METHOD AND APPARATUS FOR SBB, DEVICE AND STORAGE MEDIUM
20220329496 · 2022-10-13 ·

A service data management method and apparatus for service building blocks (SBB), a device and a storage medium are provided, and a service data setting interface is extended. When service data needs to be set, the service data is received through the service data setting interface, and service data to be set is added into a service data set of a service corresponding to service identification information according to the service identification information and the service data to be set in the service data setting instruction. When it is detected that an SBB needs to be configured with the service data, service data corresponding to the SBB in the service data set corresponding to the SBB is directly configured for the SBB, i.e., the set service data takes effect immediately and is able to be called by the corresponding the SBB in real time.

OBSERVATION STREAMLINING APPARATUS, OBSERVATION STREAMLINING METHOD AND PROGRAM

An observation streamlining apparatus includes one or more computers each including a mempry and a processor configured to discriminate between an observation-necessary time slot and an observation-unnecessary time slot with an intervention measure including at least a time when a predetermined intervention is performed on a user as an input, the observation-necessary time slot indicating a time slot when a user’s action or state needs to be observed, and the observation-unnecessary time slot indicating a time slot when the user’s action or state does not need to be observed; and execute predetermined processing for observing the user’s action or state when the observation-necessary time slot arrives.

DISTRIBUTED ZERO TRUST NETWORK ACCESS

In order to use zero trust network resources distributed across multiple gateways, an agent is deployed on an endpoint of an enterprise network. The agent maps requests for specific applications to corresponding gateways. The agent may also multiplex or otherwise aggregate communications among different network applications and gateways in order to provide seamless, transparent access to the distributed resources at a single endpoint, and/or within a single interface.

METHOD FOR TRANSMITTING METROLOGICAL DATA AND DEVICE IMPLEMENTING THE METHOD
20230064062 · 2023-03-02 · ·

A method for transmitting metrological data from a measuring device and to a collecting server, implemented in the measuring device configured for converting a physical quantity into metrological data, includes: detecting a modification of the configuration of the measuring device, in relation to metrological data to be transmitted; determining a series of information representing a transmission format of said metrological data to be transmitted; determining a hash code of the information representing the transmission format; sending, to the collecting device, the hash code and then the metrological data to be transmitted.