Patent classifications
H04L67/30
DATA UPDATE METHOD, APPARATUS, AND EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD
The present invention provides a data update method, an apparatus, and an eUICC. The method is applied to an eUICC in which a management apparatus and at least one SE are disposed, where the at least one SE is configured to store an application corresponding to at least one profile. The management apparatus receives a profile enabling request, where the enabling request is used to switch a source profile to a target profile, the enabling request includes identifier information of the target profile, and the source profile is a profile that is in an enabled state before the switching; and updates a first correspondence to a second correspondence according to the enabling request; and the second correspondence is a correspondence between a second application set and the target profile, and the second application set includes at least one application in the first application set.
Systems and methods for device-anonymous performance monitoring in a wireless network
An application, executed by a User Equipment (“UE”), may receive an identifier, which may be used to monitor Key Performance Indicators (“KPIs”) associated with the UE. Such KPIs may be monitored in conjunction with execution of the application, such as at times that the application sends and/or receives traffic. The KPIs may be associated with sensor data, resources, and/or other features or functionality of the UE. The UE may obtain an identifier associated with the application and/or the UE from a KPI monitoring system of some embodiments, may obtain user consent to monitor and/or report KPIs associated with the application, and may provide such KPIs to the KPI monitoring system in conjunction with the identifier. The KPI monitoring system may generate aggregated KPI information, associated with the application, based on the KPIs received from the UE and/or KPIs received from one or more other sources.
Systems and methods for device-anonymous performance monitoring in a wireless network
An application, executed by a User Equipment (“UE”), may receive an identifier, which may be used to monitor Key Performance Indicators (“KPIs”) associated with the UE. Such KPIs may be monitored in conjunction with execution of the application, such as at times that the application sends and/or receives traffic. The KPIs may be associated with sensor data, resources, and/or other features or functionality of the UE. The UE may obtain an identifier associated with the application and/or the UE from a KPI monitoring system of some embodiments, may obtain user consent to monitor and/or report KPIs associated with the application, and may provide such KPIs to the KPI monitoring system in conjunction with the identifier. The KPI monitoring system may generate aggregated KPI information, associated with the application, based on the KPIs received from the UE and/or KPIs received from one or more other sources.
Profile based content and services
Profile based services and content can assist with the backward and forward compatibility of conventional service layers or the like. Using a profile to manage content and access to services offered may reduce the overhead or processing associated with providing those value added services by service layers.
Profile based content and services
Profile based services and content can assist with the backward and forward compatibility of conventional service layers or the like. Using a profile to manage content and access to services offered may reduce the overhead or processing associated with providing those value added services by service layers.
Data collection configuration file generation
A network monitoring system may receive a configuration request to generate a configuration file associated with collecting feature or debug data associated with a feature, hardware, or software associated with a network device. The network monitoring system may determine a command profile associated with the feature, hardware, or software that identifies a set of commands associated with obtaining the feature or debug data from the network device. The network monitoring system may determine respective parameters of one or more commands of the set of commands. The network monitoring system may determine, based on the respective parameters, respective arguments of the one or more commands. The network monitoring system may generate the configuration file based on the respective arguments and may perform an action associated with the configuration file to permit the configuration file to be used to collect the feature or debug data from the network device.
Data collection configuration file generation
A network monitoring system may receive a configuration request to generate a configuration file associated with collecting feature or debug data associated with a feature, hardware, or software associated with a network device. The network monitoring system may determine a command profile associated with the feature, hardware, or software that identifies a set of commands associated with obtaining the feature or debug data from the network device. The network monitoring system may determine respective parameters of one or more commands of the set of commands. The network monitoring system may determine, based on the respective parameters, respective arguments of the one or more commands. The network monitoring system may generate the configuration file based on the respective arguments and may perform an action associated with the configuration file to permit the configuration file to be used to collect the feature or debug data from the network device.
Filesystem view separation for data confidentiality and integrity using lattice-based security domains
A stackable filesystem architecture that curtails data theft and ensures file integrity protection. In this architecture, processes are grouped into ranked filesystem views, or “security domains.” Preferably, an order theory algorithm is utilized to determine a proper domain in which an application is run. In particular, a root domain provides a single view of the filesystem enabling transparent filesystem operations. Each security domain transparently creates multiple levels of stacking to protect the base filesystem, and to monitor file accesses without incurring significant performance overhead. By combining its layered architecture with view separation via security domains, the filesystem maintains data integrity and confidentiality.
Filesystem view separation for data confidentiality and integrity using lattice-based security domains
A stackable filesystem architecture that curtails data theft and ensures file integrity protection. In this architecture, processes are grouped into ranked filesystem views, or “security domains.” Preferably, an order theory algorithm is utilized to determine a proper domain in which an application is run. In particular, a root domain provides a single view of the filesystem enabling transparent filesystem operations. Each security domain transparently creates multiple levels of stacking to protect the base filesystem, and to monitor file accesses without incurring significant performance overhead. By combining its layered architecture with view separation via security domains, the filesystem maintains data integrity and confidentiality.
Scenario oriented information broadcasting system based on Internet of Things
A scenario oriented information broadcasting system based on an Internet of Things is provided. A first electronic device provides first broadcast channels on an application and provides different first broadcast information respectively in the first broadcast channels via the Internet of Things. All or parts of contents of the first broadcast information are selected on the first electronic device based on a teaching scenario. The first electronic device identifies the second electronic device on which a user is logged into the application. After the second electronic device is successfully identified, the second electronic device can subscribe the first broadcast channel on the application, and then obtain and broadcast the first broadcast information via the Internet of Things. The first electronic device issues a subscription instruction to subscribe each of the second electronic devices, and receives a learning command from each of the second electronic devices.