Resources usage for fuzz testing applications

    公开(公告)号:US10831646B2

    公开(公告)日:2020-11-10

    申请号:US16238297

    申请日:2019-01-02

    Abstract: Improved utilization of spare resources for fuzz testing is provided. A production environment that includes a plurality of running applications having a plurality of user input fields is monitored over a period of time for consumer use. Actual usage data for the plurality of user input fields are determined during the period of time. Each user input field in the plurality of user input fields is ranked for fuzz testing based on, at least in part, the actual usage data corresponding to each respective user input field during the period of time. The fuzz testing is selectively performed on a portion of the plurality of user input fields based on user input field rankings.

    Selective retention of forensic information

    公开(公告)号:US10395331B2

    公开(公告)日:2019-08-27

    申请号:US14959491

    申请日:2015-12-04

    Abstract: Embodiments include method, systems and computer program products for selective retention of data in a computational system. Aspects include receiving a monitored data element. Aspects also include assigning an initial storage ranking to the monitored data element to create a ranked data element. Aspects also include determining a threshold storage ranking. Aspects also include comparing the initial storage ranking to the threshold storage ranking. Aspects also include, based on the comparison indicating that the initial storage ranking is greater than the threshold storage ranking, storing the ranked data element in a long-term storage. Aspects also include based upon the comparison indicating that the initial storage ranking is less than the threshold storage ranking, discarding the ranked data element.

    Route navigation for optimal mobile coverage

    公开(公告)号:US09998910B2

    公开(公告)日:2018-06-12

    申请号:US14631933

    申请日:2015-02-26

    CPC classification number: H04W8/08 G01C21/3461 H04W48/16

    Abstract: A method and system for determining measures of cell phone coverage along a travel route. Received are: a specification of a travel destination by a road vehicle, a projected starting time for a user to begin travel along the travel route from a starting location of the vehicle to the travel destination, and a telephone carrier service for the cell phone. Measures of cell phone coverage along the travel route are determined and include: (i) amounts of dropped calls by the telephone carrier service in areas along the travel route in which the telephone carrier service provides cell phone coverage, (ii) a quality of cell phone service by the telephone carrier service, correlated to time of day, along the travel route, or (iii) both the amounts of dropped calls and the quality of cell phone service. The measures of cell phone coverage along the travel route are displayed.

    TRUST LEVEL MODIFIER
    5.
    发明申请

    公开(公告)号:US20170149834A1

    公开(公告)日:2017-05-25

    申请号:US15343420

    申请日:2016-11-04

    CPC classification number: H04L63/20 H04L63/08 H04L63/10 H04L63/105 H04L63/1433

    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.

    Controlling application access to applications and resources via graphical representation and manipulation
    7.
    发明授权
    Controlling application access to applications and resources via graphical representation and manipulation 有权
    通过图形表示和操纵控制应用程序和资源的访问

    公开(公告)号:US09591489B2

    公开(公告)日:2017-03-07

    申请号:US14795073

    申请日:2015-07-09

    Abstract: An approach is provided for controlling a first application's access of a second application of a mobile device. Attributes are assigned to a graphical element displayed by the mobile device. Manipulations of first and second icons representing first and second applications, respectively, are detected as placing the first and second icons into the graphical element. One of the assigned attributes specifying an exchange of information permitted between the first and second applications is obtained. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.

    Abstract translation: 提供了一种用于控制第一应用程序访问移动设备的第二应用的方法。 属性被分配给移动设备显示的图形元素。 检测分别表示第一和第二应用的第一和第二图标的操作,以将第一和第二图标放置在图形元素中。 获得指定在第一和第二应用之间允许的信息交换的分配属性之一。 如果第一个应用程序的访问控制设置可以自动配置,访问控制设置将根据获取的属性进行自动配置; 否则,通过利用移动设备操作系统的资源控制将获得的属性应用于第一应用。 基于配置的访问控制设置或应用于第一应用的属性,控制第一应用的第二应用的访问。

    Trust level modifier
    8.
    发明授权
    Trust level modifier 有权
    信任级别修饰符

    公开(公告)号:US09565196B1

    公开(公告)日:2017-02-07

    申请号:US15210969

    申请日:2016-07-15

    CPC classification number: H04L63/20 H04L63/08 H04L63/10 H04L63/105 H04L63/1433

    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.

    Abstract translation: 计算机建立与应用程序,系统,网络或计算环境相关联的因素的正常活动级别。 计算机接收规则,规定在因子所表现的正常和异常活动水平期间分配给用户或设备的信任级别。 计算机监控因子所表现的活动水平,并确定活动是否正常或异常。 如果计算机确定该因素表现出异常活动,则计算机根据规则修改关联用户和设备的信任级别。 计算机继续监视该因素的活动,直到计算机确定该因子的正常活动级别已返回为止,此时计算机根据规则修改关联用户或设备的信任级别。

    CONTROLLING APPLICATION ACCESS TO APPLICATIONS AND RESOURCES VIA GRAPHICAL REPRESENTATION AND MANIPULATION
    9.
    发明申请
    CONTROLLING APPLICATION ACCESS TO APPLICATIONS AND RESOURCES VIA GRAPHICAL REPRESENTATION AND MANIPULATION 有权
    通过图形表示和操作来控制应用程序访问应用程序和资源

    公开(公告)号:US20170013460A1

    公开(公告)日:2017-01-12

    申请号:US14795073

    申请日:2015-07-09

    Abstract: An approach is provided for controlling a first application's access of a second application of a mobile device. Attributes are assigned to a graphical element displayed by the mobile device. Manipulations of first and second icons representing first and second applications, respectively, are detected as placing the first and second icons into the graphical element. One of the assigned attributes specifying an exchange of information permitted between the first and second applications is obtained. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.

    Abstract translation: 提供了一种用于控制第一应用程序访问移动设备的第二应用的方法。 属性被分配给移动设备显示的图形元素。 检测分别表示第一和第二应用的第一和第二图标的操作,以将第一和第二图标放置在图形元素中。 获得指定在第一和第二应用之间允许的信息交换的分配属性之一。 如果第一个应用程序的访问控制设置可以自动配置,访问控制设置将根据获取的属性进行自动配置; 否则,通过利用移动设备操作系统的资源控制将获得的属性应用于第一应用。 基于配置的访问控制设置或应用于第一应用的属性,控制第一应用的第二应用的访问。

Patent Agency Ranking