Patent classifications
H04L41/0293
HEALTH MONITORING FOR CLOUD COMPUTING PLATFORMS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a health monitoring system for a cloud application platform. One of the methods includes deploying, by a health monitoring application of a cloud application platform that provisions resources from an underlying cloud infrastructure system, probes for testing components of the cloud application platform. Each probe is configured to perform tests that measure performance of a component of the cloud application platform. A probe can attempt to provision resources from the underlying cloud infrastructure system by launching a test application on the cloud application platform and determine whether the test application launched successfully using resources from the underlying cloud infrastructure system. The health monitoring application receives results of the tests and provides, for display in a graphical user interface, a representation of a history of the results of the tests for at least one of the components.
Optimized browser rendering service
Implementations optimize a browser render process by identifying content neutral embedded items and rendering a web page without fetching the content neutral items. An example method includes identifying a URL pattern common to a plurality of URLs stored in fetch records and selecting a sample of URLs from the plurality. The method also includes, for each URL in the sample, determining whether the URL is optional by generating a first rendering result using content for the URL and a second rendering result without using the content for the URL and calculating a similarity score for the URL by comparing the first rendering result and the second rendering result, the URL being optional when the similarity score is greater than a similarity threshold. The method may also include storing the URL pattern in a data store of optional resource patterns when a majority of the URLs in the sample are optional.
Method and apparatus for recording videos
A method for recording videos includes receiving first network connection information sent from a mobile terminal and acquiring second network connection information of a bound monitoring device according to the first network connection information. The bound monitoring device is bound with the mobile terminal. The method further includes, when the first network connection information matches the second network connection information, sending a stop instruction to the monitoring device to stop recording.
SYSTEMS AND METHODS FOR DYNAMIC DEVICE CONFIGURATION USING MACHINE-READABLE OPTICAL LABELS
Example implementations include a method, apparatus and computer-readable medium for generating deployment capabilities of a device, comprising generating a machine-readable optical label that is specific to the device during manufacturing, wherein the device is a new device that is to be added to a network comprising a plurality of devices. The implementations further include configuring a firmware of the device to create a web server that provides a webpage, wherein the webpage includes a user interface that receives and provides configuration information. Additionally, the implementations further include linking the machine-readable optical label to the webpage such that when the machine-readable optical label is scanned by a different device, the webpage is generated on the different device.
METHOD AND SYSTEM FOR ENHANCING THE SECURITY OF A TRANSACTION
This invention concerns a method and system for improving the security of transaction in an emulated Integrated Circuit. Methods and devices for pre-generating session keys for securing transactions are provided. The generated session key is obfuscated with a preventing data for unauthorized use and/or access of the session cryptographic and encrypted. This encrypted obfuscated key is provisioned from a remote computer to the communication device. The mobile application is configured to decrypt and de-obfuscate the received encrypted obfuscated session cryptographic key, during a transaction. The method may also include generating, by the communication device, a transaction cryptogram using the decrypted and de-obfuscated session cryptographic key, and sending by the communication device to the remote system the transaction cryptogram to conduct the transaction. The transaction can be authorized based on at least whether the decrypted and de-obfuscated session cryptographic key is the expected one. With the invention, the session cryptographic key is keep unveiled from the moment they are provisioned to until the very last moment when the session cryptographic key is used to compute the cryptogram.
METHOD FOR PERFORMING CONNECTIVITY CHECK AND APPARATUS
This application provides a method for performing a connectivity check and an apparatus, so as to improve network reliability. The method includes: obtaining, by a first virtual proxy module, identification information, where the identification information is used to identify a VNF module set to which a first VNF module belongs; obtaining, by the first virtual proxy module, address information of the first VNF module based on the identification information and a VNF module list, where the VNF module list includes a correspondence between the identification information and the address information of the first VNF module; and performing, by the first virtual proxy module, a connectivity check on the first VNF module based on the address information of the first VNF module.
Session-based matching of mutable browser identifiers
Systems and methods for session-based matching of mutable browser identifiers are provided. Information may be stored regarding a plurality of mutable browser identifiers each unique to an associated website and one or more maps each associating a immutable browser identifier to one or more mutable browser identifiers. Such a immutable browser identifier may be unique to an associated browser. Further, information may be received from a computing device that has used a browser to download a website. Such downloaded website may include a reference to a mutable browser identifier specific to the downloaded website. The referenced mutable browser identifier may be identified as corresponding to one of the stored mutable browser identifiers. The session information of the referenced mutable browser identifier in the received information may be compared to the session information of the corresponding stored mutable browser identifier. Stored information associated with the corresponding stored mutable browser identifier may be updated based on the comparison.
Transfer of breathing assistance apparatus data
A medical apparatus is adapted to facilitate a transfer of data to a computer system using a mobile device. The apparatus has a store of data, a display and a controller that generates a barcode encoding an access address for the computer system and the data, and displaying the barcode on the display.
Terminal apparatus, control method therefor, computer-readable recording medium, and application system
A terminal apparatus includes an inquiry unit that sends an inquiry, from a game used in the terminal apparatus among at least two games provided by an application system, about an invitation to another game, to an invitation information management unit of a management apparatus; an invitation information receiving unit that receives invitation information corresponding to the inquiry; and a display control unit that displays, on a display unit, details of the invitation according to the invitation information.
Internet of things (IoT) API platform
A first network device receives a token request from an application and, in response, generates a token that includes a time-stamp and a server identifier. The server identifier indicates a particular proxy server, of a group of proxy servers, in an API management layer. A second network device receives, from an application, an API call that includes the token and validates the token. The second network device routes the API call to the particular proxy server indicated by the token in response to successfully validating the token. The first network device or second network device provides a bypass uniform resource locator (URL), to the application, to bypass the API management layer, for one or more types of designated API calls.