Methods and apparatus for mobile computing device security in testing facilities
First Claim
1. A method, comprising:
- receiving, by a loading computing device, a request to restore a testing computing device to a known software configuration comprising a plurality of software components for the testing computing device, wherein the testing computing device comprises testing computer-readable storage divisible into a plurality of partitions; and
after receiving the request to restore the testing computing device to the known software configuration, restoring the testing computing device to the known software configuration by at least;
obtaining, by the loading computing device, a software image from computer-readable storage, the software image storing at least part of the known software configuration, wherein the software image comprises security-context data having one or more security contexts associated with the plurality of software components, and wherein a particular security context of the one or more security contexts comprises an identity, a role, and a domain,storing, by the loading computing device, at least the plurality of software components of the obtained software image onto the testing computing device by at least;
determining, by the loading computing device, one or more first partitions of the plurality of partitions to be stored using a first storage technique that comprises a byte-for-byte storage technique;
storing, by the loading computing device, the one or more first partitions as part of the software image using the first storage technique;
determining, by the loading computing device, one or more second partitions of the plurality of partitions to be stored using a second storage technique that comprises a file-by-file storage technique; and
storing the one or more storage partitions as part of the software image using the second storage technique, andafter storing the plurality of software components onto the testing computing device, setting one or more security contexts for the plurality of software components stored on the testing computing device using the security-context data stored with the software image.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are provided for providing testing as a service. A loading computing device can receive a request to restore a testing computing device to a known software configuration. The loading computing device, after receiving the request to restore the testing computing device, can restore the testing computing device by at least: obtaining a software image storing the known software configuration, where the software image includes security-context data having security contexts associated with the plurality of software components, and where a particular security context can have an identity, a role, and a domain or type; storing at least part of the obtained software image onto the testing computing device, and after storing at least part of the obtained software image onto the testing computing device, setting security contexts for the obtained software image stored on the testing computing device using the security-context data.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a loading computing device, a request to restore a testing computing device to a known software configuration comprising a plurality of software components for the testing computing device, wherein the testing computing device comprises testing computer-readable storage divisible into a plurality of partitions; and after receiving the request to restore the testing computing device to the known software configuration, restoring the testing computing device to the known software configuration by at least; obtaining, by the loading computing device, a software image from computer-readable storage, the software image storing at least part of the known software configuration, wherein the software image comprises security-context data having one or more security contexts associated with the plurality of software components, and wherein a particular security context of the one or more security contexts comprises an identity, a role, and a domain, storing, by the loading computing device, at least the plurality of software components of the obtained software image onto the testing computing device by at least; determining, by the loading computing device, one or more first partitions of the plurality of partitions to be stored using a first storage technique that comprises a byte-for-byte storage technique; storing, by the loading computing device, the one or more first partitions as part of the software image using the first storage technique; determining, by the loading computing device, one or more second partitions of the plurality of partitions to be stored using a second storage technique that comprises a file-by-file storage technique; and storing the one or more storage partitions as part of the software image using the second storage technique, and after storing the plurality of software components onto the testing computing device, setting one or more security contexts for the plurality of software components stored on the testing computing device using the security-context data stored with the software image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device, comprising:
-
one or more processors; and data storage configured to store at least a software image and executable instructions, wherein the executable instructions, when executed by the one or more processors, cause the computing device to perform functions comprising; receiving a request to restore a testing computing device to a known software configuration comprising a plurality of software components for the testing computing device, wherein the testing computing device comprises testing computer-readable storage divisible into a plurality of partitions; and after receiving the request to restore the testing computing device to the known software configuration, restoring the testing computing device to the known software configuration by at least; obtaining the software image from the computer-readable storage, the software image storing the known software configuration, wherein the software image comprises security-context data having one or more security contexts associated with the plurality of software components, and wherein a particular security context of the one or more security contexts comprises an identity, a role, and a domain, storing at least the plurality of software components of the obtained software image onto the testing computing device by at least; determining, by the loading computing device, one or more first partitions of the plurality of partitions to be stored using a first storage technique that comprises a byte-for-byte storage technique; storing, by the loading computing device, the one or more first partitions as part of the software image using the first storage technique; determining, by the loading computing device, one or more second partitions of the plurality of partitions to be stored using a second storage technique that comprises a file-by-file storage technique; and storing the one or more storage partitions as part of the software image using the second storage technique, and after storing the plurality of software components onto the testing computing device, setting one or more security contexts for the plurality of software components stored on the testing computing device using the security-context data stored with the software image. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. An article of manufacture including a tangible computer-readable storage medium having instructions stored thereon that, in response to execution by one or more processors of a computing device, cause the computing device to perform functions comprising:
-
receiving a request to restore a testing computing device to a known software configuration comprising a plurality of software components for the testing computing device wherein the testing computing device comprises testing computer-readable storage divisible into a plurality of partitions; and after receiving the request to restore the testing computing device to the known software configuration, restoring the testing computing device to the known software configuration by at least; obtaining the software image from the computer-readable storage, the software image storing the known software configuration, wherein the software image comprises security-context data having one or more security contexts associated with the plurality of software components, and wherein a particular security context of the one or more security contexts comprises an identity, a role, and a domain, storing at least the plurality of software components of the obtained software image onto the testing computing device by at least; determining, by the loading computing device, one or more first partitions of the plurality of partitions to be stored using a first storage technique that comprises a byte-for-byte storage technique; storing, by the loading computing device, the one or more first partitions as part of the software image using the first storage technique; determining, by the loading computing device, one or more second partitions of the plurality of partitions to be stored using a second storage technique that comprises a file-by-file storage technique; and storing the one or more storage partitions as part of the software image using the second storage technique, and after storing the plurality of software components onto the testing computing device, setting one or more security contexts for the plurality of software components stored on the testing computing device using the security-context data stored with the software image. - View Dependent Claims (20)
-
Specification