Abstract:
A system and method are disclosed which may include receiving an activation request from a first subscriber device at a communication convergence platform; identifying a service provider associated the first subscriber device; composing a service activation request compatible with a communication protocol for the identified service provider; and transmitting the service activation request from the platform to the identified service provider.
Abstract:
Embodiments of the present invention are directed to a unified messaging proxy and a method thereof. The unified messaging proxy advantageously enables a user to be communicatively coupled with the same account on a messaging platform using multiple end user devices at the same time, allowing the user to read messages on a first end user device and send messages from a second end user device. The unified messaging proxy manages the multiple end user devices and intercepts all messages to and from the multiple end user devices and the messaging platform. From its perspective, the messaging platform only sees a single client messaging application.
Abstract:
A computer implemented method and system for secure initial secret delivery for collocated containers with shared resources techniques is disclosed. The method comprises providing an application type identifier and a token for accessing a secrets management service; creating asynchronously, a plurality of collocated containers with shared resources; initiating a request for a creation for an initial secret; validating the request, requesting an identity for the collocated containers; validating the identity; starting an application instance; and using the initial secret to retrieve other secrets for the application instance.
Abstract:
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed. The method comprises receiving an image; in response to receiving the image, generating a depth map of the image; removing non-geographic features from the depth map; generating a topographic map based on the depth map; modifying the topographic map to represent each pixel by height differential; and comparing the modified topographic map to a modified global topographic map to determine a location of the image.
Abstract:
A method for providing a proof-of-work challenge based on hash mining for reducing spam attacks comprising: receiving an email message from a client device; determining a level of trustworthiness of the client device; generating a challenge message based on the determined trustworthiness of the client device; transmitting the challenge message to the client device; receiving a response to the challenge message from the client device; and forwarding the email to one or more recipients when the response to the challenge message is correct.
Abstract:
A server for providing a generic actor system container application comprising: status and control graphical user interfaces, a listener service, a cluster manager, an actor registry and discovery service, a system configurator, a plurality of handles, a plurality of listeners, and a plurality of generic actors, wherein the generic actor system container application is configured to: receive information associated with a plurality of customized domain specific actors; receive a plurality of domain specific connection information; generate the plurality of domain specific actors based on the information associated with the plurality of customized domain specific actors; register the plurality of domain specific actors; and execute and monitor a domain specific actor system using the domain specific actors based on the domain specific connection information.
Abstract:
Systems and methods for securely provisioning HTTPS pins to a mobile client are provided herein. In some embodiments, the method may comprise receiving, at a mobile client, a digitally signed mobile client configuration file, wherein the mobile client configuration file comprises one or more URLs and one or more key pins associated with services available from the one or more URLs; retrieving a public key from a public key store; verifying a digital signature of the mobile client configuration file using the public key; and storing the key pins on the mobile client when the digital signature is verified.
Abstract:
Embodiments of the present invention relate to an error simulator for a test platform. The test platform includes a test process, a system under test (SUT), the error simulator and at least one downstream system. The error simulator is a transparent proxy that intercepts traffic from/to the SUT. The error simulator forwards only “success” commands from the SUT to the downstream system(s) and forwards actual responses from the downstream system(s) to the SUT. However, when the error simulator receives a “failure” command from the SUT, the error simulator automatically returns a corresponding error message that is obtained from preprogrammed failure information to the SUT. The preprogrammed failure information details one or more “failure” commands and corresponding error messages, and is received from the test process by the error simulator either prior to the start of testing or immediately preceding a failure during a test.
Abstract:
A living address book allows subscribers to define their own personas as collections of information which define the users. Subscribers can then publish their persona(s) to their friends' and associates' mobile phones and update the others' address books with the subscriber's contact information. Users can also specify different personas to be presented to different users. The living address book graphical user interface allows more efficient and easier access to data.
Abstract:
A method of remote correction of invalid contact file syntax is disclosed. The method comprising receiving a file comprising information associated with one or more contacts; attempting to import the received file on a target device; in response to an import failure: depersonalizing the received file of contact information; identifying a location within one or more contacts the depersonalized file which caused the import failure, wherein the location is stored as metadata; transmitting the depersonalized file and the metadata to a remote server for repair; and receiving a repaired depersonalized file; repairing the received file of contacts based on the repaired depersonalized file; and importing the file of contacts on the target device.