Patent application number | Description | Published |
20090177646 | Plug-In for Health Monitoring System - A monitoring and management system may use a plugin mechanism to add or update an interface to a managed service or device. The plugin may have capability to interface with the managed service or device, as well as an interface to a status database that may be populated by the managed service or device as well as other services or devices. The plugin may have rules that may be used to determine a status for the monitored service or device based on the statuses of several services or devices, and may also have rules that define a multi level query into the database to determine those services and devices. | 07-09-2009 |
20140351330 | SERVICE PROFILE MAINTENANCE - One or more techniques and/or systems are provided for dynamically maintaining a service profile. That is, a user may be associated with a variety of services, such as an email service, a social network service, a photo sharing service, etc. An operating system may dynamically provide support for services by maintaining service profiles. For example, a service provider application may specify a service definition defining a service not yet supported (e.g., a social network app may describe functionality and/or information about a new social network service). A service profile may be generated for the service based upon the service definition. The service profile may be exposed to system components and/or applications that may utilize the service profile to access information and/or functionality provided by service (e.g., a camera system component may allow a user to upload a photo to the new social network service utilizing the service profile). | 11-27-2014 |
20140359604 | BUNDLE PACKAGE GENERATION - One or more techniques and/or systems are provided for generating a bundle package, digitally signing the bundle package, selectively disturbing the bundle package, and/or indexing one or more resource packages retrieved from the bundle package. That is, a bundle package (e.g., an application or game bundle package) comprises one or more app packages comprising application code configured to execute on various computing environments (e.g., operating systems, processors, etc.). The bundle package may comprise one or more resource packages comprising supplemental data used to provide optional user experience functionality for the application (e.g., French language support, high resolution textures, a gaming pad support, etc.). In this way, a client device may selectively download portions of the bundle package that may be relevant, which may mitigate download bandwidth, storage space, or resources otherwise used to obtain unnecessary portions of the bundle package (e.g., a tablet device may merely download low resolution textures). | 12-04-2014 |
20140359605 | BUNDLE PACKAGE SIGNING - One or more techniques and/or systems are provided for generating a bundle package, digitally signing the bundle package, selectively disturbing the bundle package, and/or indexing one or more resource packages retrieved from the bundle package. That is, a bundle package (e.g., an application or game bundle package) comprises one or more app packages comprising application code configured to execute on various computing environments (e.g., operating systems, processors, etc.). The bundle package may comprise one or more resource packages comprising supplemental data used to provide optional user experience functionality for the application (e.g., French language support, high resolution textures, a gaming pad support, etc.). In this way, a client device may selectively download portions of the bundle package that may be relevant, which may mitigate download bandwidth, storage space, or resources otherwise used to obtain unnecessary portions of the bundle package (e.g., a tablet device may merely download low resolution textures). | 12-04-2014 |
Patent application number | Description | Published |
20130067180 | RETAINING VERIFIABILITY OF EXTRACTED DATA FROM SIGNED ARCHIVES - The objects of an archive may be verified with a cryptographic signature stored in the archive. However, when an object is extracted, the authentication involves re-authenticating the entire archive, re-extracting the object, and comparing the extracted object with the current object, which is inefficient or unachievable if the archive is unavailable. Instead, the archive may include a block map signed with the signature and comprising hashcodes for respective blocks of the objects of the archive. When an object is extracted, the signature and block map may also be extracted and stored as objects outside of the archive. The extracted signature and block map may later be verified by authenticating the signature, verifying the block map with the signature, and matching the hashcodes of the block map with those of the blocks of the extracted objects, thus enabling a more efficient and portable verification of extracted object with extracted authentication credentials. | 03-14-2013 |
20130067237 | PROVIDING RANDOM ACCESS TO ARCHIVES WITH BLOCK MAPS - Objects of an object set stored in an archive may be randomly accessed using the addresses of the objects stored in the archive. However, archives often fail to enable random access to the data within an object, without accessing other portions of the object, due to the variable compression of respective segments of the object. Random-access capabilities within the objects may be provided by segmenting the object into segments of a segment size, generating a block map specifying the block sizes of respective blocks corresponding to respective segments of the objects, and storing the block map in the archive as an object of the object set. Additionally, hashcodes may be calculated respective blocks and included in the block map in order to expose alterations of respective blocks, and/or to update an archive to an updated version of the archive by comparing the hashcodes and retrieving and substituting the updated blocks. | 03-14-2013 |
20130067587 | PROTECTING ARCHIVE STRUCTURE WITH DIRECTORY VERIFIERS - An archive of an object set may include various security features that enable a detection of alterations of the contents of the objects. However, the security measures of an archive may fail to detect an inadvertent or intentional alteration of the structure of the object set, including the addition of new objects, changes to the metadata (e.g., the name, position within the object set, and location and size within the archive) of respective objects of the object set, and the deletion of directory entries for the objects. Therefore, an archive may be generated with verifiers (e.g., hashcodes) calculated not only for the contents of objects, but for the directory of the archive, and may be included in the signature of the archive. This verification may extend the detecting of alteration of the archive to include the structure of the archive as well as the contents of the objects contained therein. | 03-14-2013 |