Patent classifications
H04L67/34
SYSTEMS AND METHODS FOR REMOTE FORENSICS AND DATA SECURITY SERVICES OVER PUBLIC AND PRIVATE NETWORKS
Provided are systems and methods for employing remote forensics and data security services over public and private networks by obtaining full access to digital data from the non-transitory computer-readable media of geographically dispersed computing devices such that the entire physical or logical media from each device is fully accessible to one or more user computers over the network. This is achieved via WebSocket technology implemented in point-to-point connection configurations, WebSocket technology implemented in network based digital data software switch configurations, and in combinations thereof. Application of these systems and methods are generally employed for the purpose of conducting remote examinations and remediation efforts upon electronic data comprising non-transitory computer-readable media on a network accessible computing device. As a few examples, the application of these systems and methods may be applied for the purposes of data sharing, remote computer support, data recovery, data loss prevention, data backup, eDiscovery (electronic discovery), digital forensics, remote monitoring, audit compliance, incident response, security incident remediation, and mobile device data management purposes. Examples of computing devices include, but are not limited to, workstations, laptops, tablets, smart phones, network routers, network switches, mobile computing devices, electronic sensors, and any device comprising the Internet of Things (IoT).
SYSTEMS AND METHODS FOR MANAGING CONTAINERS IN A NETWORK OF MOVING THINGS
Communication network architectures, systems, and methods for supporting a network of mobile nodes. Various aspects of this disclosure provide non-limiting examples of communication network architectures, systems, and methods for supporting a dynamically configurable communication network comprising a complex array of both static and moving communication nodes (e.g., an Internet of moving things). More specifically, systems and methods for managing containers in a network of moving things.
PLUGIN FOR SOFTWARE DEPLOYMENT
A plugin for a website browser can enable a user to deploy software onto a computing device quickly and easily. For example, the plugin can automatically detect that a user is visiting a website on which program code for a software application is shared or hosted. The website may be an open-source website, a program-code repository, or a program-code review platform. The plugin can automatically analyze the program code, an installation file provided with the program code, software and hardware characteristics of the specific computing device on which the software application is to be deployed, and other data to determine how to deploy the software application on the specific computing device. The plugin can then deploy the software application on the computing device in response to the user clicking a button, allowing for the software application to be easily deployed on the computing device with minimal user interaction or skill.
REMOTE PROVIDISIONING AND ENROLLMENT OF ENTERPRISE DEVICES WITH ON-PREMISES DOMAIN CONTROLLERS
An agent application executing on a client device retrieves an execute command from a command queue managed by a server and retrieves certificates and configuration settings for establishing a virtual private network (VPN) connection. An enrollment application resident on the client device executes in response to the execute command to modify a network setting of a network interface card (NIC) of the client device and establish a VPN connection with a domain controller located within the corporate domain using the certificate and configuration settings. The enrollment application further transmits a request over the VPN connection to the domain controller to join the corporate domain, wherein a corporate account in a directory service is established for the client device; reverts back to the prior network setting of the NIC and terminates the VPN connection and reboots the client device.
FLEET MANAGEMENT SYSTEM FOR PORTABLE MAINTENANCE TOOLS
An industrial service device fleet management system implements an organized and easy to use methodology to manage the digital content stored on each of a plurality of portable or stationary devices used in a plant, such as portable maintenance devices, to assure that each of the portable devices receives or implements only the content that it is supposed to have and is upgraded at the appropriate time to include new content, features, etc. The fleet management system includes a memory for storing information related to the fleet of portable or stationary devices including device identifications, device descriptions, end user names and privileges, the current content of each of the portable devices, and templates defining configuration parameters for the portable or stationary devices. The system also includes a content downloader that obtains, stores, and downloads content (such as software and firmware upgrades, additional features, applications, drivers, knowledge articles, etc.) for execution or display in various ones of the portable or stationary devices, includes a content decider module that analyzes when and if various ones of the portable or stationary devices should be provided additional or new content, and includes a notification system that notifies users of the portable or stationary devices of the need to upgrade or provide new content to the portable or stationary devices.
PERMISSION DELEGATION FRAMEWORK
A mobile device includes a memory having at least one delegated administrator stored thereon, the delegated administrator is configured to apply a policy to the mobile device based on at least one permission a delegated administrator configured to apply a policy to the mobile device based on the at least one permission. The mobile device also includes at least one processor having a mobile device management (MDM) framework. The MDM framework receives the at least one permission from the device administrator, delegates the at least one permission to the delegated administrator, and enforces the policy on the mobile device.
SYSTEMS AND APPARATUS FOR DISTRIBUTION OF PROCESS CONTROL DATA TO REMOTE DEVICES
A system for securely disseminating information relating to a process control plant includes a process control node and a controller that is coupled to a plurality of process control devices. The process control node includes a communicator module operable to transmit, via a first network, information of the process plant received from the controller. The system also includes a data services module operable to receive from the communicator module, via the first network, the information of the process plant and to transmit some or all of that information via a second network, and a mobile server, coupled to the second network and to a third network, and operable to receive data from the data services module. The mobile server is operable to communicate with a plurality of mobile computing devices via the third network.
SINGLE INTERFACE FOR ACTIVATING IOT DEVICES TO NETWORK DATA PLANS
Systems and methods are described herein for activating internet of things (IoT) devices, and other non-carrier provided devices, to data and other communication plans associated with a subscriber of a telecommunications carrier. The systems and methods may generate and publish a single API that, when called by an IoT device (e.g., an associated activation client for the IoT device) receives information associated with the IoT device and activates the IoT device to the subscriber's plan.
Apparatus and Method for Remotely Managing Devices, and Program Therefor
A method for remotely managing a device involving receiving an initial setting request including a device ID of a device together with an identification number for connecting to a cellular network or a corresponding ID via the cellular network from the device on which the identification number is stored, obtaining a customer ID corresponding to the identification number based on the identification number or the corresponding ID, generating a credential for the device using the customer ID and the device ID, and transmitting initial setting information including the credential or corresponding authentication information to the device.
CONSTRAINT-BASED UPGRADE AND DEPLOYMENT
One or more software products/services may be installed on a cloud deployment. Product versions of such services can be upgraded (or rolled back) based on a deployment plan comprising tasks adapted to reach a target deployment state. A central upgrade server can forward tasks to an upgrade agent for execution, the tasks being based on a current operational state of the cloud deployment (obtained by the upgrade agent) and one or more constraints. In multiple node deployments, some nodes may be upgraded to a new product version, while other nodes are kept at a current product version until stability of the new product version is determined. Traffic across nodes can be shaped to ensure a deployment is healthy before upgrading other nodes/deployments. If the health of a node/deployment does not meet specified criteria, an upgrade can be stopped, an alert can be triggered, and the node/deployment can be rolled back.