Patent classifications
H04L67/34
ON-PREMISES AGENT FOR MOBILE CLOUD SERVICE
Systems, devices, and methods are disclosed for an agent device within a company's network firewall to initiate an HTTP connection with a cloud-based gateway and then upgrade the connection to a WebSockets protocol in order to have an interactive session. Over this interactive session, a mobile device, which connects to the cloud-based intermediary, can request data from servers inside the company's firewalls. Because the firewall is traversed using HTTP protocols (with WebSockets), it can be as safe as letting employees browse the web from inside the company's network.
METHODS AND APPARATUSES FOR CONFIGURING A BLE ADVERTISING BEACON
A method, apparatus, and computer program product are provided in order to provide improvements in the configuring of Bluetooth low energy (BLE) advertising beacons. Embodiments of the present invention are directed to conveniently and reliably configuring or updating the configuration of a BLE beacon, while limiting the amount of technical information and/or tools required. A method is provided comprising: receiving a data stream encoded in a flickering barcode from a programming device; decoding, using a processor, the received data stream; and configuring a BLE beacon advertisement using the decoded data stream. The method may further include transmitting the configured BLE beacon advertisement. A corresponding apparatus and a computer program product are also provided.
APPLICATION CUSTOMIZATION USING A CUSTOMIZATION FILE
Techniques and systems for receiving and using a customization file are provided, including a computing device, a method, or a computer-program product. For example, a method may include receiving a customization file that includes customized content for customizing a communication interface overlay. The method may further include accessing native application code and executing the native application code to run a native application. The method may further include accessing a compiled set of code that is separate from the native application code. The compiled set of code is accessible by the native application code. The method may further include executing the compiled set of code, wherein a default file of the compiled set of code provides a native communication interface overlay, wherein the native communication interface overlay is overlaid over a graphical interface of the native application, and wherein the native communication interface overlay allows communication with a resource of a third-party. The method may further include executing the received customization file, wherein executing the received customization file customizes the compiled set of code, and wherein the customized compiled set of code customizes the native communication interface overlay to provide a customized communication interface overlay.
ANOMALY AND MALWARE DETECTION USING SIDE CHANNEL ANALYSIS
The present disclosure describes systems and methods for detecting malware. More particularly, the system includes a monitoring device that monitors side-channel activity of a target device. The monitoring device that can work in conjunction with (or independently of) a cloud-based security analytics engine to perform anomaly detection and classification on the side-channel activity. For example, the monitoring device can calculate a first set of features that are then transmitted to the security analytics engine for anomaly detection and classification.
METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
A method for processing, by a processing entity, of an authorization to implement a service and/or access an item. The method includes: reception, from a requesting device, of a request for implementing a service and/or accessing an item; searching for an indicator of dependency from at least one piece of data of said request for implementation; when an indicator of dependency is present, obtaining an authorization from a verification device to implement said service and/or access said item.
Secure Boot and Software Upgrade of A Device
A method of securely resetting a first device comprising a UICC, the method comprising providing a secure reset control application to a secure element of the UICC of the first device wherein the secure reset control application is capable of commanding the UICC to provide notification indicative of a secure reset of the first device being requested if a corresponding signal is received from a remote management server; and/or communication between the secure reset control application and a remote management server cannot be established for a predetermined period of time and upon the next first device reset, determine whether a secure reset has been requested.
SYSTEM PERFORMANCE LOGGING OF COMPLEX REMOTE QUERY PROCESSOR QUERY OPERATIONS
Described are methods, systems and computer readable media for performance logging of complex query operations.
Data Processing Method and Apparatus for Performing Protocol Parsing in a Cloud
The present application discloses a data processing method and apparatus for performing protocol parsing in the cloud. A specific implementation of the method includes: acquiring a slave station data reading rule table that is configured by a user in the cloud; downloading the slave station data reading rule table to a gateway in a slave station; receiving slave station data that is associated with the slave station and that is read by the gateway according to the slave station data reading rule table; parsing the slave station data according to a parsing table in the cloud preset by the user; and processing the parsed slave station data. This implementation implements the processing of data of different communication protocols in the cloud.
FAULT-TOLERANT VARIABLE REGION REPAVING DURING FIRMWARE OVER THE AIR UPDATE
Variables utilized in device firmware that provides various boot and runtime services are repaved in a fault-tolerant manner within a secure store in a durable, non-volatile device memory during an FOTA update process. A spare region in the secure store is utilized to temporarily hold a back-up of a primary region in which the firmware variables are written. Using a transaction-based fault-tolerant write (FTW) process, the variables in the primary region can be repaved with variables contained in a firmware update payload that is delivered from a remote service. In the event of a fault in the variable region repaving process, either the primary or spare region will remain valid so that firmware in a known good state can be utilized to enable the device to boot successfully and the variable region repaving in the FOTA update process may be restarted.
FAULT-TOLERANT VARIABLE REGION REPAVING DURING FIRMWARE OVER THE AIR UPDATE
Variables utilized in device firmware that provides various boot and runtime services are repaved in a fault-tolerant manner within a secure store in a durable, non-volatile device memory during an FOTA update process. A spare region in the secure store is utilized to temporarily hold a back-up of a primary region in which the firmware variables are written. Using a transaction-based fault-tolerant write (FTW) process, the variables in the primary region can be repaved with variables contained in a firmware update payload that is delivered from a remote service. In the event of a fault in the variable region repaving process, either the primary or spare region will remain valid so that firmware in a known good state can be utilized to enable the device to boot successfully and the variable region repaving in the FOTA update process may be restarted.