G06F8/62

PROGRAM ACQUISITION METHOD, AND INFORMATION PROCESSING TERMINAL

A program acquisition method performed by an information processing terminal, includes calculating a degree of matching a first condition that authorizes access to a predetermined program with respect to a condition detected in relation to the information processing terminal, acquiring the predetermined program and storing the acquired predetermined program in a storage in response to the degree of matching being within a predetermined range from a first value indicating that the degree of matching satisfies the first condition, and restricting the access to the predetermined program stored in the storage until the degree of matching indicates the first value.

THREAT CONTROL AND PREVENTION FOR ANDROID SYSTEMS

A method is provided that determines whether to allow an application (app) for use or restrict the app on a set top box (STB). The method includes the steps of measuring at the STB, one or more resources used by the app; comparing at the STB, one or more thresholds set by an operator; and determining if the one or more resources used by the app exceed one or more thresholds set by the operator. Another method is provided that monitors applications (apps) that are installed a set top box (STB) for illegal or harmful activity by a policy manager. This method includes downloading and copying an app from an external source; installing or uninstalling the app into an application folder; providing a notification informing the policy manager of the installing or uninstalling of the app; and evaluating the app be installed or uninstalled.

Methods for performing a rollback-capable software update at a device
11556326 · 2023-01-17 · ·

Methods are described herein for creating and installing software updates which may be rolled back, without requiring large processing capabilities and/or large storage capacity at a device. Delta software updates are determined comprising differences, on a bit-level, between a first version of the software and a second, updated, version of the software, and metadata defining how to apply the differences. Methods of performing a rollback-capable update at a device are also described herein.

Systems and methods for detecting inter-personal attack applications
11556653 · 2023-01-17 · ·

The disclosed computer-implemented method for detecting inter-personal attack applications may include (i) receiving application marketplace information describing application feature information, (ii) creating, by performing natural language processing on the feature information, a feature vector identifying a potentially malicious functionality of the application, (iii) creating a profiling vector that is a categorical feature representation of installation information from an application installation file, and (iv) performing a security action including (A) mapping, using a machine learning model, the feature vector and the profiling vector to a multi-dimensional output vector having element corresponding to a malware category and (B) determining a malicious extent of the application by combining the categories identified by the multi-dimensional output vector with bi-partite graph information identifying (I) relations between a plurality of applications and (II) relations between a plurality of computing devices hosting the plurality of applications. Various other methods, systems, and computer-readable media are also disclosed.

Device, method, and graphical user interface for managing data stored on a device

A method includes, while an application is installed on a device and a representation of the application has a designated location in a respective portion of an application launching user interface, detecting an application-demotion request to delete the application from the device without deleting associated data for the application. In response to detecting the application-demotion request, deleting the application from the device without deleting the associated data for the application. After deleting the application from the device, detecting a request to display the respective portion of the application launching user interface and, in response to detecting the request to display the respective portion of the application launching user interface, displaying the respective portion of the application launching user interface, including displaying the representation of the application in the designated location in the respective portion of the application launching user interface.

Deployment of new versions of event consumers in an event-driven system
11693647 · 2023-07-04 · ·

In some implementations, a system may receive, in a state event store, a deployment state event notification based on deployment of a new event consumer in the system. An old event consumer of the system may retrieve the deployment state event notification from the state event store. The system may deactivate an old event consumer based on retrieving the deployment state event notification, wherein the old event consumer refrains from processing topic event notifications after deactivation and continues to monitor the state event store for state event notifications. The old event consumer may publish a deactivation state event notification to the state event store based on deactivating the old event consumer. The new event consumer may retrieve the deactivation state event notification from the state event store. The system may activate the new event consumer based on retrieving the deactivation state event notification.

Cancel and rollback update stack requests

At a time after receiving a request to cancel and rollback an update request for a computer system, one or more computer resources within a computer system invoke one or more computer system capabilities at least to cancel computer system operations to update the computer. When the computer system operations to update the computer system are cancelled, one or more computer resources within a computer system invoke one or more computer system capabilities at least to roll back the computer system to a previous good state.

Management system and control method
11526468 · 2022-12-13 · ·

A management system gives an instruction to assign a value of an attribute corresponding to an environment where a processing system including a virtual machine started using a system image file is constructed, to the system image file, determines, based on a condition according to the value of the attribute assigned to the system image file in response to the instruction, whether the system image file is to be deleted, and gives an instruction to delete, from a storage device, the system image file that has been determined to be deleted.

Automatic hydration of feature file batches

A computing device saves storage space by foregoing writing the payloads for batches of feature files to local storage and then automatically downloading payloads for individual batches of feature files as associated features are called upon. In various embodiments, an operating system (OS) that includes both frequently used and infrequently used features is executing on the computing device. Batches of feature files for the frequently used features of the OS may be hydrated on the computing device whereas batches of feature files for the infrequently used features of the OS may be left dehydrated on the computing device. When an infrequently used feature is requested, the computing device automatically downloads a corresponding batch of feature files. Then, the computing device may fulfill the request by implementing the infrequently used feature. Thus, predetermined batches of feature files remain immediately accessible at the computing device without consuming storage space unless called upon.

SYSTEMS AND METHODS FOR IN-PLACE APPLICATION UPGRADES
20230059134 · 2023-02-23 ·

The present disclosure provides new and innovative systems and methods for in-place upgrades of applications. In an example, a computer-implemented method includes obtaining source code, obtaining automated tests, generating a software application based on the source code, the software application validated based on the automated tests and the software application includes the automated tests, deploying the software application to a production environment, obtaining update data, generating an updated application based on the update data, automatically validating the updated application based on the automated tests included in the software application, and deploying, based on the automatic validation, the updated application to the production environment.