G06F8/62

Methods and apparatus to detect uninstallation of an on-device meter
11500698 · 2022-11-15 · ·

Example methods and apparatus to detect uninstallation of applications on mobile devices. An example apparatus includes means for detecting that an application is to be uninstalled from the mobile device. The apparatus includes means for displaying a prompt indicating whether the means for detecting is to be uninstalled when the application is to be uninstalled. The apparatus includes means for transmitting an uninstallation notification to a remote data collector when the application is to be uninstalled, the uninstallation notification to enable identification of at least one of the mobile device associated with the uninstallation or a user of the mobile device.

FPGA upgrade method based on PCIe interface
11500650 · 2022-11-15 · ·

An FPGA upgrade method is provided, including: delivering, by a host, an upgrade instruction to an FPGA; uninstalling a PCIe driver corresponding to the FPGA to let a status of the PCIe link be changed to link down; continuously monitoring, in a first expiration time, whether the status of the PCIe link is changed to link up; and if yes, reloading the PCIe driver. The method further includes: after the FPGA receives the upgrade instruction, continuously monitoring, in a second expiration time, whether the status of the PCIe link is changed to link down, if yes, loading the configuration data from the FPGA configuration memory for upgrade; and after upgrade is completed, negotiating, by the FPGA, with the host to restore the status of the PCIe link to link up that is used for reloading the PCIe driver upon detection by the host.

METHODS AND APPARATUS TO DETECT UNINSTALLATION OF AN ON-DEVICE METER
20230094809 · 2023-03-30 ·

Example methods and apparatus to detect uninstallation of applications on mobile devices. An example apparatus includes means for detecting that an application is to be uninstalled from the mobile device. The apparatus includes means for displaying a prompt indicating whether the means for detecting is to be uninstalled when the application is to be uninstalled. The apparatus includes means for transmitting an uninstallation notification to a remote data collector when the application is to be uninstalled, the uninstallation notification to enable identification of at least one of the mobile device associated with the uninstallation or a user of the mobile device.

Installable mutable intelligent security package and security system in internet of things networks

Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate report that includes information associated with the anomaly.

User interfaces for managing subscriptions
11481205 · 2022-10-25 · ·

In some embodiments, an electronic device presents a subscription management user interface. The subscription management user interface optionally includes one or more selectable options that, when selected, change the status of a subscription associated with a user account of the user. In some embodiments, the subscription management user interface is presented in response to detecting deletion of an application that utilizes an active subscription associated with the user account of the user.

EXTENDING APPLICATION LIFECYCLE MANAGEMENT TO USER-CREATED APPLICATION PLATFORM COMPONENTS

The examples described herein extend application lifecycle management (ALM) processes (e.g., create, update, delete, retrieve, import, export, uninstall, publish) to user-created application platform components. First and second components are generated within an application platform. The first component is customized at least by indicating whether the first component is subject to localization, defining a layering of the first component, and indicating whether the first component is protected from downstream modification. The second component is customized in accordance with customizing the first component, and is further customized by defining a dependency of the second component on the first component. The components are deployed in a target environment with metadata representing the customizations and enabling the ALM processes.

Identifying un-deployed features of an application

Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.

Automatic application installation based on proximity detection
11474801 · 2022-10-18 · ·

A host application installed on a computing device detects that the computing device is in proximity of a location associated with another application that can be installed onto the computing device. As a result of the computing device being in proximity of the location, the host application obtains, from an application vending server, application code for the application. The host application uses the application code to install the other application onto the computing device. If the host application detects that the computing device is no longer in proximity of the location, the host application uninstalls the other application from the computing device.

Threat control and prevention for android systems

A method is provided that determines whether to allow an application (app) for use or restrict the app on a set top box (STB). The method includes the steps of measuring at the STB, one or more resources used by the app; comparing at the STB, one or more thresholds set by an operator; and determining if the one or more resources used by the app exceed one or more thresholds set by the operator. Another method is provided that monitors applications (apps) that are installed a set top box (STB) for illegal or harmful activity by a policy manager. This method includes downloading and copying an app from an external source; installing or uninstalling the app into an application folder; providing a notification informing the policy manager of the installing or uninstalling of the app; and evaluating the app be installed or uninstalled.

System and method for downgrading applications

A technique for downgrading applications to placeholder applications in order to free up storage space in a user device. Based on a variety of heuristics, a number of installed applications are identified as candidates for a downgrade. The downgrading of the identified applications involves creating a placeholder application for each of the identified applications. The identified applications are temporarily deleted while keeping the user data associated with the identified applications intact and the placeholder applications are installed.