Abstract:
Embodiments of the present invention are directed to generating and delivering data elements out of the context of an application installation. Each data element generated by an application is transmitted to a collection server after a networked computing device has connected back to a network, and even after the application has been removed from the networked computing device. Each data element is associated with a globally unique transaction identifier. Each data element and its corresponding transaction identifier are packaged together for transmission to the collection server via one or more of a plurality of transmission pathways, including a messaging pathway. The collection server uses the transaction identifier to check whether a corresponding data element is already stored by the collection server. The data element is stored by the collection server, if not already stored.
Abstract:
A client device is coupled with a server. The client device prompts a user to enter a number associated with a mobile device, which can be the client device, and generates data including a code. The code is typically hidden from the user when the code is generated and is saved on the client device. The client device transmits the number entered by the user and the code generated by the client device to the server, which sends a message, including the code, to the mobile device associated with the number. The client device prompts the user to enter the code included in the message. Validity of the number is based on one or more factors, including the accuracy of the code entered by the user. In addition, validity of the number can also be based on whether the second user input was entered within a predetermined time limit.
Abstract:
A system and method are disclosed which may include receiving an activation request from a first subscriber device at a communication convergence platform; identifying a service provider associated the first subscriber device; composing a service activation request compatible with a communication protocol for the identified service provider; and transmitting the service activation request from the platform to the identified service provider.
Abstract:
Embodiments of the present invention are directed to a unified messaging proxy and a method thereof. The unified messaging proxy advantageously enables a user to be communicatively coupled with the same account on a messaging platform using multiple end user devices at the same time, allowing the user to read messages on a first end user device and send messages from a second end user device. The unified messaging proxy manages the multiple end user devices and intercepts all messages to and from the multiple end user devices and the messaging platform. From its perspective, the messaging platform only sees a single client messaging application.
Abstract:
A computer implemented method and system for secure initial secret delivery for collocated containers with shared resources techniques is disclosed. The method comprises providing an application type identifier and a token for accessing a secrets management service; creating asynchronously, a plurality of collocated containers with shared resources; initiating a request for a creation for an initial secret; validating the request, requesting an identity for the collocated containers; validating the identity; starting an application instance; and using the initial secret to retrieve other secrets for the application instance.
Abstract:
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed. The method comprises receiving an image; in response to receiving the image, generating a depth map of the image; removing non-geographic features from the depth map; generating a topographic map based on the depth map; modifying the topographic map to represent each pixel by height differential; and comparing the modified topographic map to a modified global topographic map to determine a location of the image.
Abstract:
A method for providing a proof-of-work challenge based on hash mining for reducing spam attacks comprising: receiving an email message from a client device; determining a level of trustworthiness of the client device; generating a challenge message based on the determined trustworthiness of the client device; transmitting the challenge message to the client device; receiving a response to the challenge message from the client device; and forwarding the email to one or more recipients when the response to the challenge message is correct.
Abstract:
A server for providing a generic actor system container application comprising: status and control graphical user interfaces, a listener service, a cluster manager, an actor registry and discovery service, a system configurator, a plurality of handles, a plurality of listeners, and a plurality of generic actors, wherein the generic actor system container application is configured to: receive information associated with a plurality of customized domain specific actors; receive a plurality of domain specific connection information; generate the plurality of domain specific actors based on the information associated with the plurality of customized domain specific actors; register the plurality of domain specific actors; and execute and monitor a domain specific actor system using the domain specific actors based on the domain specific connection information.
Abstract:
Systems and methods for securely provisioning HTTPS pins to a mobile client are provided herein. In some embodiments, the method may comprise receiving, at a mobile client, a digitally signed mobile client configuration file, wherein the mobile client configuration file comprises one or more URLs and one or more key pins associated with services available from the one or more URLs; retrieving a public key from a public key store; verifying a digital signature of the mobile client configuration file using the public key; and storing the key pins on the mobile client when the digital signature is verified.
Abstract:
Embodiments of the present invention relate to an error simulator for a test platform. The test platform includes a test process, a system under test (SUT), the error simulator and at least one downstream system. The error simulator is a transparent proxy that intercepts traffic from/to the SUT. The error simulator forwards only “success” commands from the SUT to the downstream system(s) and forwards actual responses from the downstream system(s) to the SUT. However, when the error simulator receives a “failure” command from the SUT, the error simulator automatically returns a corresponding error message that is obtained from preprogrammed failure information to the SUT. The preprogrammed failure information details one or more “failure” commands and corresponding error messages, and is received from the test process by the error simulator either prior to the start of testing or immediately preceding a failure during a test.