×

Methods and apparatus for mobile computing device security in testing facilities

  • US 9,864,655 B2
  • Filed: 10/30/2015
  • Issued: 01/09/2018
  • Est. Priority Date: 10/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a loading computing device, a request to restore a testing computing device to a known software configuration comprising a plurality of software components for the testing computing device, wherein the testing computing device comprises testing computer-readable storage divisible into a plurality of partitions; and

    after receiving the request to restore the testing computing device to the known software configuration, restoring the testing computing device to the known software configuration by at least;

    obtaining, by the loading computing device, a software image from computer-readable storage, the software image storing at least part of the known software configuration, wherein the software image comprises security-context data having one or more security contexts associated with the plurality of software components, and wherein a particular security context of the one or more security contexts comprises an identity, a role, and a domain,storing, by the loading computing device, at least the plurality of software components of the obtained software image onto the testing computing device by at least;

    determining, by the loading computing device, one or more first partitions of the plurality of partitions to be stored using a first storage technique that comprises a byte-for-byte storage technique;

    storing, by the loading computing device, the one or more first partitions as part of the software image using the first storage technique;

    determining, by the loading computing device, one or more second partitions of the plurality of partitions to be stored using a second storage technique that comprises a file-by-file storage technique; and

    storing the one or more storage partitions as part of the software image using the second storage technique, andafter storing the plurality of software components onto the testing computing device, setting one or more security contexts for the plurality of software components stored on the testing computing device using the security-context data stored with the software image.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×