H04L67/025

SCREEN SHARING SESSION PRIVACY MANAGER

A screen sharing privacy manager performs method in response to initiating a screen sharing session on a computer network, in which the screen sharing session is of a first desktop environment of an operating system. A second desktop environment is generated with the operating system. The second desktop environment inaccessible to the screen sharing session. A selected item in the first desktop environment is moved to the second desktop environment based on a user profile.

Onboarding of Monitoring Tools
20220414187 · 2022-12-29 ·

A system, process, and computer-readable medium for configuring agents for monitoring deployed applications is described. A system, process, and computer-readable medium for configuring monitoring user interfaces, e.g., monitoring dashboards, that use information made available from the agents is also described. Through using application data available during creation of the agents, the agents may be configured using the user interface as modified by selections and displaying subsequent choices from the received application data. Using knowledge of the generated agents, monitoring dashboards may be generated via developers interacting with a user interface providing a list of available metrics accessible by the generated agents. Using the one or more user interfaces, developers may generate agents and/or monitoring dashboards with greater efficiency.

OPERATING ENVIRONMENT PERSONALIZATIONS
20220413882 · 2022-12-29 ·

In some examples, a method includes receiving a personalization setting from a first agent on a first device. In some examples, the first device provides a local operating environment. In some examples, the method includes sending the personalization setting to a second agent on a second device that provides a virtualized operating environment, to coordinate a behavior or appearance of the virtualized operating environment with a personalized behavior or appearance of the local operating environment.

CONSTANT-TIME CASCADING DELETION OF RESOURCES
20220414678 · 2022-12-29 ·

A method and apparatus for deleting resources are described. In one embodiment, the method comprises: detecting, by a network commerce system, a deletion request in a first message sent over a network as an electronic communication to delete a first resource; identifying one or more additional resources that have a hierarchical relationship to the first resource, including identifying one or more child resources related the first resource, the one or more child resources being in a parent-child relationship with the first resource as the parent; causing a module of the network commerce system to perform a delete action with respect to the first resource, where the delete action deletes the first resource and causes the one or more child resources to be deleted in the future and to appear deleted when receiving access requests prior to deletion of the one or more child resources; detecting, by the network commerce system, an access request in a second message sent over the network as an electronic communication to access one child resource of the one or more child resources after deletion of the first resource but prior to deletion of the one child resource; determining, in response to the access request, if the first resource has been deleted; and denying access to the one child resource if the first resource is determined to have been deleted.

SYSTEMS AND METHODS FOR TRACKING USER ACCESS ACROSS WEB DOMAINS
20220417334 · 2022-12-29 ·

Systems and methods for cross-domain tracking of users are disclosed. Embodiments provide mechanism for a unique identifier generated for a first domain (also referred to as a cross domain identifier) and stored at the user device to be made available to a second domain via a cross domain identifier system (XID system) such that the second domain can also use the same unique identifier for the user. This way, a user is identified at multiple domains of the organization using a single unique identifier. Further, in case a user identifier cannot be provided from the first domain to the second, the unique identifier can be created based on a fingerprint of the user's browser.

Federated identity management with decentralized computing platforms
11539685 · 2022-12-27 · ·

Provided is a process that establishes user identities within a decentralized data store, like a blockchain. A user's mobile device may establish credential values within a trusted execution environment of the mobile device. Representations of those credentials may be generated on the mobile device and transmitted for storage in association with an identity of the user established on the blockchain. Similarly, one or more key-pairs may be generated or otherwise used by the mobile device for signatures and signature verification. Private keys may remain resident on the device (or known and input by the user) while corresponding public keys may be stored in associated with the user identity on the blockchain. A private key is used to sign representations of credentials and other values as a proof of knowledge of the private key and credential values for authentication of the user to the user identity on the blockchain.

Controlling can communication in a vehicle using shifting can message reference

A method for controlling controller area network (CAN) communication in a vehicle including a plurality of electronic control units (ECUs) and a plurality of CAN databases accessible by the plurality of ECUs can include: storing CAN message information in the plurality of CAN databases such that each CAN database stores a unique configuration of the CAN message information; establishing a plurality of periodic intervals; and when a subsequent interval among the plurality of periodic intervals begins: receiving a plurality of measurement values deriving from a plurality of sensors equipped in the vehicle, calculating a database reference number based upon the plurality of measurement values, the database reference number newly identifying a particular CAN database among the plurality of CAN databases, and performing CAN communication, by each ECU, based upon the uniquely configured CAN message information stored in the newly identified CAN database.

Controlling can communication in a vehicle using shifting can message reference

A method for controlling controller area network (CAN) communication in a vehicle including a plurality of electronic control units (ECUs) and a plurality of CAN databases accessible by the plurality of ECUs can include: storing CAN message information in the plurality of CAN databases such that each CAN database stores a unique configuration of the CAN message information; establishing a plurality of periodic intervals; and when a subsequent interval among the plurality of periodic intervals begins: receiving a plurality of measurement values deriving from a plurality of sensors equipped in the vehicle, calculating a database reference number based upon the plurality of measurement values, the database reference number newly identifying a particular CAN database among the plurality of CAN databases, and performing CAN communication, by each ECU, based upon the uniquely configured CAN message information stored in the newly identified CAN database.

SOFTWARE DEFINED CONTROL SYSTEM INCLUDING I/O SERVER SERVICES THAT COMMUNICATE WITH CONTAINERIZED SERVICES
20220404813 · 2022-12-22 ·

An I/O server service interacts with multiple containerized controller services each implementing the same control routine to control the same portion of the same plant. The I/O server service may provide the same controller inputs to each of the containerized controller services (e.g., representing measurements obtained by field devices and transmitted by the field devices to the I/O server service). Each containerized controller service executes the same control routine to generate a set of controller outputs. The I/O server service receives each set of controller outputs and forwards an “active” set to the appropriate field devices. The I/O server service and other services, such as an orchestrator service, may continuously evaluate performance and resource utilization in the control system, and may dynamically activate and deactivate controller services as appropriate. The I/O server service may interact with other containerized services, such as containerized historian services or workstation services, to facilitate control in the plant.

METHOD FOR PERFORMING SETTING CONTROL FOR A PLURALITY OF DEVICES THROUGH A WEB UI AND APPARATUS FOR SUPPORTING THE SAME
20220407908 · 2022-12-22 · ·

A method including: requesting a web resource from a plurality of devices for setting a web UI for the plurality of devices; receiving the web resource from the plurality of devices; requesting device attribute information related to a device attribute from the plurality of devices; receiving the device attribute information from the plurality of devices; checking whether a web resource corresponding to the received device attribute information is stored in a memory of the server; configuring a common setting web UI for a common device attribute and configuring an individual setting web UI for an individual device attribute based on the web resource; and mashing up the common setting web UI and the individual setting web UI and rendering the mashed common setting web UI and individual setting web UI to a single web page of the server.