H04L67/34

Apparatus and methods for real-time rendering of zero-byte customized software on a client station

Apparatus and methods are provided for providing zero- (permanent) byte real-time customized software to a user's client station. A user may request real-time customized software from one channel. The request may be transmitted to a server and analyzed to determine an intent for the customized software. The intent may be matched to one or more features in a feature catalog and an appropriate target output channel may be determined. A feature bundler may extract source code corresponding to the feature(s) and output channel, compile the code and transmit the customized software to the target output channel. The target output channel may execute the customized software within a container and delete the software when a deletion condition is satisfied, such as after the user finishes using the software.

Benchmarking to infer configuration of similar devices

Systems, devices, media, and methods are presented for categorizing unknown devices using benchmark applications. Benchmark applications are distributed to client devices to produce performance metrics for the client devices. Performance metrics of the client devices are used to categorize unknown devices by comparing the performance metrics of these devices to performance metrics of known devices.

SECURE APPROACH FOR PROVIDING COMBINED ENVIRONMENT FOR OWNERS/OPERATORS AND MULTIPLE THIRD PARTIES TO COOPERATIVELY ENGINEER, OPERATE, AND MAINTAIN AN INDUSTRIAL PROCESS CONTROL AND AUTOMATION SYSTEM

A method includes creating, in a secure platform, multiple securely-partitioned system sandboxes under control of at least one user associated with an industrial process control and automation system. Different system sandboxes are associated with different third parties who are not owners or operators of the industrial process control and automation system. The method also includes receiving content from the third parties in the system sandboxes. The method further includes receiving from the at least one user a selective activation of at least some of the content in the system sandboxes in order to place the at least some of the content into use by the industrial process control and automation system. The content could include equipment configurations for equipment associated with the industrial process control and automation system, and the equipment configurations could include control strategies and visualizations for the equipment.

PLATFORM/SYSTEM FOR THE PRICING, BIDDING, AWARD AND MANAGEMENT OF FLEET-BASED INSTALLATION SERVICES
20170351988 · 2017-12-07 ·

A computer-implemented platform and system designed for the pricing, bidding, award, and management of fleet-based installation services and associated goods. More specifically the system and platform is an app-based software-enabled platform and system designed to manage services performed on a fleet of vehicles which includes upgrading and updating a graphical component on the external surface of the vehicles of the fleet. The system also allows for the management of other decorative art to be installed on surfaces and the process associated thereof.

RECOMMENDING APPLICATIONS USING SOCIAL NETWORKING INFORMATION

The present disclosure is directed toward systems and methods for generating application recommendations to provide to a user of a mobile device. For instance, the systems and methods use social networking information to identify applications that may be of interest to the user, and present application recommendations to the user at various contact points on the mobile device. The present disclosure is also directed toward systems and methods for managing the download and installation of selected applications on a mobile device such that a presentation focus on an application does not change during a download and installation process.

SENSORY DATA CAPTURE AND PROCESSING FOR THE INTERNET OF THINGS

The disclosed systems and methods include configuring a model to process incoming sensor data from a multitude of sensors in a custom sensor network—accessing domain-specific, vendor-specific, and technology-specific sub-models and selecting and combining features of the sub-models in an object that accepts incoming data from the sensors. Also included are classifying and selecting a domain-specific sub-model based on the classification; determining a vendor and selecting a vendor-specific sub-model for the sensors; classifying a sensor technology and selecting a technology-specific sub-model based on the classification of the sensor; automatically configuring alerts and basic data handling by a sensor controller; automatically configuring storage objects used by the sensor controller to persist the data from the sensors as it is received and parsed; and testing the alerts, basic data handling and storage object persistence with the sensors or simulated sensors to confirm operable configuration of the sensor controller.

SENSOR-TRIGGERED SOFTWARE DEFINED DEVICE
20170353530 · 2017-12-07 ·

Aspects of the subject disclosure may include, for example, detecting sensor data obtained from a sensor of a device, such as a mobile communication device. An operational capability is determined based on the sensor data, and a determination is made that the operational capability is not available at the device. In response to determining that the operational capability is not available at the device, an application program is identified based on the operational capability and a transfer is facilitated of the application program to the device. Other embodiments are disclosed.

APPLICATION REQUIREMENTS FOR VEHICLE-TO-EVERYTHING APPLICATIONS
20230188964 · 2023-06-15 ·

Apparatuses, methods, and systems are disclosed for obtaining application requirements for vehicle-to-everything applications. One method (900) includes obtaining (902) at least one application requirement from at least one vehicle-to-everything application. The method (900) includes determining (904) at least one provisioning parameter for a plurality of vehicle-to-everything ser equipments based on the at least one application requirement, wherein the plurality of vehicle-to-everything user equipments are serviced by a plurality of communication networks. The method (900) includes transmitting (906) the at least one provisioning parameter to at least one vehicle-to-everything user equipment of the plurality of vehicle-to-everything user equipments, at least one communication network of the plurality of communication networks, or some combination thereof.

INTEGRATED DEVELOPMENT TOOL WITH PREVIEW FUNCTIONALITY FOR AN INTERNET OF THINGS (IOT) SYSTEM
20170351504 · 2017-12-07 ·

A system and method are described for generating an interactive preview for an IoT device. For example, one embodiment of a system comprises: an Internet of Things (IoT) development application comprising a graphical user interface (GUI) through which a user is to specify a configuration for a new IoT device, the development application including a preview GUI component to allow a user to render a mobile UI preview on a mobile client; an IoT service including virtual device generation logic to generate a virtual device responsive to the configuration specified for the new IoT device, the virtual device comprising a virtualized representation of the new IoT device; and the virtual device to establish a communication channel with a mobile app executed on a client, the virtual device to dynamically communicate updates to the mobile app as the user makes changes to IoT device attributes and/or presentation definitions from the preview GUI.

CAN BUS PROTECTION SYSTEMS AND METHODS
20230188553 · 2023-06-15 ·

CAN bus signal format inference includes: extracting candidate signals from training CAN bus message traffic; defining one or more signals, each signal being a candidate signal that matches structural characteristics of a matching data type and each signal being assigned the matching data type; and generating an inferred CAN bus protocol with which the defined one or more signals conform. Signals are extracted from CAN bus message traffic using the inferred CAN bus protocol, an anomaly in an extracted signal is detected, and an alert is generated indicating the detected anomaly. In another aspect, a transport protocol (TP) signal is extracted and analyzed to determine a fraction of the TP signal that matches opcodes of a machine language instruction set, and an anomaly is detected based at least in part on the determined fraction exceeding an opcode anomaly threshold.