Patent classifications
H04L69/329
System and method for usage billing of hosted applications
A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Incident review interface for a service monitoring system
A computing machine performs a correlation search against KPI data for one or more services using a selection criteria and a triggering condition. When the triggering condition is satisfied a notable event or incident is created and information about the notable event is presented using a user interface that may have interactive elements.
Incident review interface for a service monitoring system
A computing machine performs a correlation search against KPI data for one or more services using a selection criteria and a triggering condition. When the triggering condition is satisfied a notable event or incident is created and information about the notable event is presented using a user interface that may have interactive elements.
Roaming hub for secure interconnect in roaming scenarios
Systems, methods, and software for inter-PLMN communications. In one embodiment, a roaming hub receives a message from a sending entity across an N32 interface, and determines whether the message includes an HTTP custom header that indicates a PLMN that is validated. When the message as received does not include the HTTP custom header, the roaming hub adds the HTTP custom header to the message that indicates the PLMN of the sending entity, integrity protects the HTTP custom header, and forwards the message toward a receiving entity.
Method, apparatus and system for management of information content for enhanced accessibility over wireless communication networks
A method comprises providing an interface permitting a first user to control activation of a mobile information channel through which the first user can share access to content with a plurality of additional users, activating the mobile information channel responsive to input received from the first user via the interface, inserting content provided by the first user into the mobile information channel, receiving additional content relating to the mobile information channel from one or more of said additional users via one or more respective mobile devices associated with at least one wireless network, inserting at least a portion of the additional content into the mobile information channel, and integrating into the mobile information channel information associated with at least one wireless networking functionality of said at least one wireless network.
Method, apparatus, and system for pushing application program, and device
A method for pushing an application program includes: receiving a connection request for establishing a connection to a wireless network device that is sent by a terminal; sending a specified webpage address to the terminal, and the terminal acquires a system type of the terminal according to webpage content corresponding to the received specified webpage address and sends the system type to the wireless network device; receiving the system type sent by the terminal; and sending, to the terminal, a push address that is provided for the terminal to download an application program and is corresponding to the system type. In the present invention, when a push condition is met, a wireless network device pushes a specified application program corresponding to a system type of a terminal to the terminal.
Method, apparatus, and system for pushing application program, and device
A method for pushing an application program includes: receiving a connection request for establishing a connection to a wireless network device that is sent by a terminal; sending a specified webpage address to the terminal, and the terminal acquires a system type of the terminal according to webpage content corresponding to the received specified webpage address and sends the system type to the wireless network device; receiving the system type sent by the terminal; and sending, to the terminal, a push address that is provided for the terminal to download an application program and is corresponding to the system type. In the present invention, when a push condition is met, a wireless network device pushes a specified application program corresponding to a system type of a terminal to the terminal.
System and method for controlling electronic communications
Example embodiments include a controlled content repository, wherein the controlled content repository is accessible according to an access protocol, wherein the access protocol comprises at least one set of access rules, wherein the access protocol enables determining if first data associated with a first object and second data associated with a second object can be made available to a first computing device; a data structure for storing a first object and a second object; and a controlling computing device, in communication with the controlled content repository, for providing the first data associated with the first object and the second data associated with the second object to the first computing device after determining that the first data associated with the first object and the second data associated with the second object is authorized to be made available to the first computing device in accordance with the access protocol.
Efficiently authenticating an application during I/O request handling
A security client can efficiently authenticate an application during I/O request handling by maintaining a white list that identifies processes that have been created for authenticated applications. The security client can register to be notified when a process is being created. When such a notification is received, the security client can authenticate the application for which the process is being created and then add an entry to the white list that includes the process identifier of the process being created. Then, when the process subsequently generates I/O requests, the security client can use the white list to quickly determine that the process pertains to an authenticated application and allow the I/O requests to modify protected artifacts.
Efficiently authenticating an application during I/O request handling
A security client can efficiently authenticate an application during I/O request handling by maintaining a white list that identifies processes that have been created for authenticated applications. The security client can register to be notified when a process is being created. When such a notification is received, the security client can authenticate the application for which the process is being created and then add an entry to the white list that includes the process identifier of the process being created. Then, when the process subsequently generates I/O requests, the security client can use the white list to quickly determine that the process pertains to an authenticated application and allow the I/O requests to modify protected artifacts.