Patent application number | Description | Published |
20130067180 | RETAINING VERIFIABILITY OF EXTRACTED DATA FROM SIGNED ARCHIVES - The objects of an archive may be verified with a cryptographic signature stored in the archive. However, when an object is extracted, the authentication involves re-authenticating the entire archive, re-extracting the object, and comparing the extracted object with the current object, which is inefficient or unachievable if the archive is unavailable. Instead, the archive may include a block map signed with the signature and comprising hashcodes for respective blocks of the objects of the archive. When an object is extracted, the signature and block map may also be extracted and stored as objects outside of the archive. The extracted signature and block map may later be verified by authenticating the signature, verifying the block map with the signature, and matching the hashcodes of the block map with those of the blocks of the extracted objects, thus enabling a more efficient and portable verification of extracted object with extracted authentication credentials. | 03-14-2013 |
20130067587 | PROTECTING ARCHIVE STRUCTURE WITH DIRECTORY VERIFIERS - An archive of an object set may include various security features that enable a detection of alterations of the contents of the objects. However, the security measures of an archive may fail to detect an inadvertent or intentional alteration of the structure of the object set, including the addition of new objects, changes to the metadata (e.g., the name, position within the object set, and location and size within the archive) of respective objects of the object set, and the deletion of directory entries for the objects. Therefore, an archive may be generated with verifiers (e.g., hashcodes) calculated not only for the contents of objects, but for the directory of the archive, and may be included in the signature of the archive. This verification may extend the detecting of alteration of the archive to include the structure of the archive as well as the contents of the objects contained therein. | 03-14-2013 |
20140359605 | BUNDLE PACKAGE SIGNING - One or more techniques and/or systems are provided for generating a bundle package, digitally signing the bundle package, selectively disturbing the bundle package, and/or indexing one or more resource packages retrieved from the bundle package. That is, a bundle package (e.g., an application or game bundle package) comprises one or more app packages comprising application code configured to execute on various computing environments (e.g., operating systems, processors, etc.). The bundle package may comprise one or more resource packages comprising supplemental data used to provide optional user experience functionality for the application (e.g., French language support, high resolution textures, a gaming pad support, etc.). In this way, a client device may selectively download portions of the bundle package that may be relevant, which may mitigate download bandwidth, storage space, or resources otherwise used to obtain unnecessary portions of the bundle package (e.g., a tablet device may merely download low resolution textures). | 12-04-2014 |
Patent application number | Description | Published |
20150288541 | Network Functions Virtualization Interconnection Gateway - Novel tools and techniques might provide for implementing interconnection gateway and/or hub functionalities between two or more network functions virtualization (“NFV”) entities that are located in different networks. In some embodiments, a NFV interconnection gateway (“NFVIG”) might receive a set of network interconnection information from each of two or more sets of NFV entities, each set of NFV entities being located within a network separate from the networks in which the other sets of NFV entities are located. The NFVIG might be located in one of these networks. The NFVIG might abstract each set of network interconnection information, and might establish one or more links between the two or more sets of NFV entities, based at least in part on the abstracted sets of network interconnection information. The NFVIG might provide access to one or more virtualized network functions (“VNFs”) via the one or more links. | 10-08-2015 |
20150288622 | Customer Environment Network Functions Virtualization (NFV) - Novel tools and techniques might provide for implementing interconnection gateway and/or hub functionalities. In some embodiments, a network functions virtualization (“NFV”) interconnection gateway or hub (“NFVIG” or “NFVIH”) might receive a set of network interconnection information from each of one or more sets of NFV entities and/or one or more sets of NFV-based customer devices, each set being located within a network separate from the networks in which the other sets are located. The NFVIG or NFVIH might be located within one of these networks or within a separate external network. The NFVIG or NFVIH might abstract each set of network interconnection information, and might establish one or more links among the sets of NFV entities and/or the sets of NFV-based customer devices based on such abstraction. The NFVIG or NFVIH might provide access to one or more virtualized network functions (“VNFs”) via the one or more links. | 10-08-2015 |
20150288767 | Network Functions Virtualization Interconnection Hub - Novel tools and techniques might provide for implementing interconnection gateway and/or hub functionalities between or among two or more network functions virtualization (“NFV”) entities that are located in different networks. In some embodiments, a NFV interconnection hub (“NFVIH”) might receive a set of network interconnection information from each of three or more sets of NFV entities, each set of NFV entities being located within a network separate from the networks in which the other sets of NFV entities are located. The NFVIH might be located within a separate external network. The NFVIH might abstract each set of network interconnection information, and might establish one or more links among the three or more sets of NFV entities, based at least in part on the abstracted sets of network interconnection information. The NFVIH might provide access to one or more virtualized network functions (“VNFs”) via the one or more links. | 10-08-2015 |