WO2015121418A2 - Procédé de déploiement d'un ensemble d'application(s) logicielle(s) - Google Patents
Procédé de déploiement d'un ensemble d'application(s) logicielle(s) Download PDFInfo
- Publication number
- WO2015121418A2 WO2015121418A2 PCT/EP2015/053098 EP2015053098W WO2015121418A2 WO 2015121418 A2 WO2015121418 A2 WO 2015121418A2 EP 2015053098 W EP2015053098 W EP 2015053098W WO 2015121418 A2 WO2015121418 A2 WO 2015121418A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- terminal
- server
- operating system
- list
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/62—Uninstallation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
Definitions
- the present invention relates to a method of deploying a set of software application (s) software (s) in a telecommunication network comprising at least one server of telecommunications terminals and telecommunications means between said server and said terminals, and including the following steps implemented by the server:
- the terminals include for example mobile or fixed equipment, smart phones, tablets, laptops or fixed, multimedia equipment.
- the central management entity knows the list of applications and operating system version implemented in each terminal and, for each of these terminals, it performs calculations. from this information to generate a dedicated deployment order to the terminal, indicating the installations, deletions and updates of applications that this terminal must perform to comply with the set of applications defined by the administrator. The terminal then applies the own deployment order.
- Solutions are based on the principle that the central entity sends a notification to the terminals to signify that a deployment order or an update is available. This principle requires the central entity to know the availability of the terminals to ensure that all have received the notification, thereby causing additional workload for that entity.
- the invention proposes a method of deploying a set of software application (s) of the aforementioned type characterized in that said data intended for the terminals comprises a deployment list determined by the server by implementing the following steps:
- the method of deploying a set of software application (s) according to the invention further comprises one or more of the following characteristics:
- the server determines whether the installation or the uninstallation of the application is dependent on another application and that in the positive case, the server adds the identifier of said other application in said sub-list associated with the operating system, with an indication of dependence between said application and said other application;
- the applications and the operating systems being associated with respective security levels: the comparison between the security level of the application and the level of security of the operating system;
- each operating system is associated with a mandatory security application and the applications and operating systems are associated with respective security levels: the determination of the mandatory security application associated with the operating system, and the comparison between the security levels of the given application and the specified mandatory security application.
- the present invention proposes a method of deploying a set of software application (s) in a telecommunications network comprising at least one server, telecommunication terminals and telecommunication means. between said server and said terminals, said method comprising the steps of:
- a terminal obtains, from the server, via the telecommunication means, a deployment list listing sub-lists indicating identifiers applications and each associated with a respective terminal operating system of a set of terminal operating system (s);
- the terminal determines the applications and the operating system then installed on the terminal, compares said determined applications and the sub-list associated with said determined operating system, and according to this comparison:
- the terminal uninstalls said application
- the terminal performs the following steps:
- the terminal determines if said application is already installed on the terminal
- the terminal downloads from the server (Serv d ) said application and installs it;
- the deployment method further comprises the steps of the deployment method according to the first aspect of the invention.
- this method of deploying a set of software application (s) according to the invention further comprises one or more of the following characteristics:
- the sub-list associated with each operating system indicates application identifiers each associated with an application version number, and according to which the following steps are implemented:
- the terminal determines that the application is already installed on the terminal, it compares the version number of the installed application to that associated with the identifier of said application in the sub-list;
- the terminal 10 downloads from the server the version of the application indicated by the version number indicated in the sub-list and installs the downloaded software application;
- an identifier of an application is mapped to an identifier of another application, indicating that the installation or the uninstallation of said application is dependent on said other application and according to which the terminal installs , or uninstalls, said applications in an order according to said indication.
- the present invention proposes a computer program to be installed in a server intended to be implemented in a network of computers. telecommunication further comprising telecommunication terminals and telecommunication means between said server and said terminals, said program comprising instructions for implementing the steps of a method according to the first aspect of the invention during execution of the program by server processing means.
- the present invention proposes a computer program to be installed in a telecommunication terminal intended to be implemented in a telecommunication network comprising at least one server, a plurality of telecommunication terminals and telecommunication means between said server and said terminals, said program comprising instructions for implementing the steps of a method according to the second aspect of the invention during execution of the program by means of processing the terminal.
- the present invention provides a server for a telecommunication network further comprising telecommunication terminals, said server comprising telecommunication means between said server and said terminals;
- said server being adapted to receive a set of software application (s) to be deployed on the terminals, for determining, based on said set of software application (s) received, deployment data for the terminals;
- said server being characterized in that it is adapted, when determining the deployment data, to select, for each operating system of a group of operating systems implemented on the terminals, software applications among said set of software application (s) to be deployed according to criteria relating to the compatibility between said applications and said operating system; and to determine a deployment sub-list associated with said operating system and including the identifiers of said selected applications;
- said server being adapted to insert, in a deployment list, sub-lists determined for the application systems of the group and to provide terminals said deployment list.
- the present invention proposes a telecommunication terminal intended for a telecommunication network comprising at least one server, telecommunication terminals and telecommunication means between said server and said terminals,
- said terminal being adapted to obtain, from the server, via the telecommunication means, a deployment list listing sub-lists indicating application identifiers each associated with a respective terminal operating system of a set of terminal operating system (s);
- said terminal being adapted to determine the applications and the operating system then installed on the terminal, comparing said determined applications and the sub-list associated with said determined operating system, and according to this comparison:
- FIG. 1 represents a view of a telecommunication system in one embodiment of the invention
- FIG. 2 represents steps implemented in one embodiment of the invention
- FIG. 3 represents steps implemented in one embodiment of the invention
- FIG. 4 is a view of part of a content of a deployment file F2 in one embodiment of the invention.
- Figure 1 is a view of a system 100 embodying an embodiment of the invention.
- the telecommunication system 100 comprises a plurality of user terminals 10. These terminals 10 are connected by telecommunications links 11 (wired or not) to a telecommunications network R1.
- a distribution server, Serv d is also connected to the network R1 by a telecommunications link 1 1.
- the terminals 10 comprise, for example, smart mobile telephones connected to the network R1 by wireless links 11. Terminals include for example fixed or portable computers etc.
- the distribution server, Serv d , and a generation server Serv g are connected by a respective telecommunication link 12 to a telecommunications network R2.
- the network R1 is a public network, for example the Internet
- the network R2 is a private network, for example an enterprise network.
- Each terminal 10 notably comprises a memory 11 and a microprocessor 12.
- the memory 11 is particularly adapted to store an operating system and software applications, and to implement them using the microprocessor 12.
- the system 100 implements a secure environment, called a security strain, implemented using mandatory security software applications.
- a terminal 10 in which a mandatory security software application is installed is adapted so that any software application installed on the terminal 10 and compatible security strain, is secured, for example as follows: the data generated by the software application and / or exchanged by the software application with the network R1 are encrypted, the application is protected from fraudulent intrusion by means of software partitioning. This partitioning controls the input and output of the secure application to prevent an unsecure third-party application from interacting in a dangerous way with the secure application. .
- FIG. 2 represents steps implemented in the system 100 in one embodiment of the invention.
- each server Serv g , Serv d is performed following the execution, on server computing means, of corresponding software instructions stored in a memory of the server.
- the server Ser g imports a configuration file F1, for example protected cryptographically integrity and authenticated.
- This file is for example provided by the editor of the solution and inserted by the administrator U of the server Serv g .
- this configuration file F1 indicates:
- a list of the dependencies comprising the identifiers of the applications whose installation in a terminal, or the uninstallation, makes use of other applications; in the list of dependencies, each application identifier being associated with the identifiers of said other applications; - the list of security application identifiers that must imperatively be installed on the terminals on which applications are to be deployed, in accordance with the security strain considered in the system 1.
- This F1 file is stored in the Servg server memory.
- a step 102 instructions are provided to the server Serv g , for example by the administrator U requiring the importation of software applications A, each associated with an application identifier and a version number.
- the Servg server When receiving an import instruction from an application A, the Servg server imports the software application A (through the network R2, other networks or media), and then requires its storage in the distribution server. Serv. D. In a step 103, the server Serv g analyzes the contents of this software application A and extracts data from the application, for example metadata present in its source code or in a manifest file present in the application indicating:
- the operating systems for example the type (s) of operating system (for example Android, Windows, Linux etc.) and the version or versions of the operating system (for example V4.0, V3.2 etc.) whose application is compatible,
- This information is stored in the memory of the server Serv g , in correspondence with the identifier of the application A and its version number.
- a step 104 the administrator U selects at least some imported applications A (including one or more mandatory security applications, this selection possibly being made by default) and indicates this selection to the server Serv g .
- These selected applications A define the software package that the administrator wishes to deploy on a set T of terminals 10.
- the server Serv g determines the contents of a deployment list corresponding to the defined software package, according to the selected applications and associated information stored in its memory, and further according to the configuration information of the file. F1.
- the software package may contain more applications than those selected by the administrator U, because depending on the information in F1, the server Serv g may need to add applications if it is necessary the operation of the selected applications.
- This deployment list includes in the embodiment considered, a file F2 shown schematically in FIG.
- the deployment list F2 as determined by the generation server Serv g comprises successive sections S os, each section S os being associated with a respective operating system.
- a SOSX section is associated with the operating system X.
- each operating system is characterized by the type of operating system (Windows, Linus, Android) and its version.
- Each section associated with an operating system S os comprises a list of application identifiers A2 elements of the software package defined above and for each of these application identifiers, furthermore includes, associated with said application identifier A2, a version code indicating a version number of the application, the size of the application, an integrity word allowing the terminal to perform an integrity check of the application that he uploaded, and a list of dependencies.
- Step 105 implemented by the generation server Serv g is now described in more detail with reference to FIG.
- the server Serv g extracts from its memory:
- the server Serv g For each of these information systems indicated as compatible with the application A2 and considered successively, the server Serv g , in a step 105_2, extracted from its memory (according to the stored data from the configuration file F1 and data extracted from the mandatory applications) the version of the security strain of the mandatory security application compatible with this information system.
- This information system is referenced below as follows: operating system OS version X.
- the server Serv g compares the security strain version of the application A2 and the security strain version of the mandatory security application compatible with this information system.
- step 105_4 the application A2 in the version in question is not added to the section of the file F2 associated with the operating system OS version X (step 105_4) and the operating system indicated as next compatible (s) is then considered.
- the application having a most recent version ie a higher version code
- the server Serv g will be automatically selected by the server Serv g and added to the section in F2 associated with the operating system version X.
- the server Serv g verifies in the list of dependencies stored in its memory and from the configuration file F1, if the application A2 is indicated as dependent on other applications.
- step 105_7 the fields relating to the application A2 are filled in the section of the file F2 associated with the operating system OS version X: application identifier, version code, size, integrity word.
- the identifiers of said other applications of which A2 depends are indicated in the field "list of dependencies" associated with the application A2 in the Sosx section of the file F2 associated with the system.
- OS version X operation, and the other fields relating to the application A2 are indicated in the Sosx section of the file F2 are also filled.
- step 105 is stopped in a step 105_8.
- the deployment list F2 is transmitted by the generation server Serv g to the distribution server Serv d via the links 12 and the network R2 for provision to the terminals 10.
- information defining the set T of the terminals 10 are also transmitted (to the server Serv d ) in correspondence with the list of Deployment F2.
- the generation server Serv g provides the deployment list F2 for a given set T or for a single terminal 10.
- the server Serv g provides the definition of the set T or sets to the distribution server Serv d . which results in the creation of folders (directories) for storing generic data to each set T and folders specific to each terminal 10.
- the distribution server Serv d then stores this new deployment list F2 associated with the terminals 10, where appropriate with the information defining the set T of the terminals 10.
- the generation server Serv g incorporated in the file F2 generated the applications of the software package defined by the administrator U and which fulfilled the following 2 criteria, according to which such an application must be:
- the deployment list includes sub-lists respectively associated with each operating system managed by the system 100 according to the invention. Each sublist lists by package application identifiers selected for the operating system and associated data.
- Each terminal 10 is adapted for, regularly (for example once a day), via the telecommunications links 1 1 and the network R 1, to authenticate, and to establish a communication with the distribution server Serv d so as to download a new F2 deployment list that would be available on the server and then carry out actions based on this new deployment list.
- the terminal 10 via the telecommunications links 1 1 and the network R1, establishes a communication with the server Serv d and requires a connection to the distribution server Serv d .
- secure mutual authentication for example cryptographic authentication.
- the terminal 10 exchanges with the distribution server Serv d and determines, as a function of these exchanges, whether the deployment list F2 then made available on the server Serv d to the terminals 10 has already been downloaded by the terminal 10.
- the deployment list F2 is downloaded by the terminal 10 from the distribution server Serv d (if necessary this download is authorized only after it has been, moreover, verified by the server Serv d that said terminal 10 is part of the set T terminals 10 corresponding to this deployment list F2).
- the terminal 10 exploits the downloaded F2 deployment list. It implements in particular the following treatments: for each software application, hereinafter referred to as A 10 , installed on the terminal 10: if A 10 is not listed in the SOSX section of the deployment list F2 (X indicating the version and the type of the system; exploitation) which corresponds to the operating system X implemented by the terminal 10, then the terminal 10 uninstalls the software application A 10 ;
- the terminal performs the actions i / to Ni /:
- the terminal 10 determines whether the application A2 is already installed on the terminal 10.
- the terminal compares the version of the application A2 installed and that indicated by the version code of A2 indicated in the section Sosx- Following this comparison: if these compared versions are identical, there is no action relating to A2 to be carried out by the terminal 10; and if these compared versions of A2 are different, the terminal 10 downloads from the server Serv of the version of A2 indicated by the version code of A2 indicated in the section Sosx and replaces the software application A2 installed by the downloaded one (via conventionally a software update procedure).
- the terminal 10 downloads from the server Serv of the application A2 in the version indicated in the section Sosx, and it installs it while respecting the software dependencies of A2 indicated in the list of dependencies of the application A2 in the section Sosx: if the application A3 is identified in the list of dependencies of the application A2, the application A3 is downloaded and installed by the terminal 10 before A2.
- the terminals 10 are adapted to periodically query the Serv D server for the existence of a new deployment file F2. In another embodiment, the terminals 10 are notified of the existence of a new deployment file F2 to download by a message, or such a new deployment file F2 is sent to them directly.
- the deployment list (file F2) thus comprises for each type of operating system considered, in each version considered, a list of applications extracted from the set of applications E indicated by the administrator.
- the list of applications determined for the first version of the operating system may differ from that determined for the second version of the operating system for the following reasons:
- an application chosen by the administrator is not compatible with one of the two versions of the operating system
- the deployment list (file F2) in the embodiment considered, does not include any command. It gives the list of applications defined by the administrator in the set of applications E.
- the F2 deployment list has been constituted by the server Serv g consistently, ie the incompatible applications of the security strain of the mandatory security applications are not present.
- the invention also makes it possible to increase the performances and to reduce the necessary processing resources.
- the processes are indeed distributed between a central entity (above the generation server Serv g ) and the mobile terminals.
- the server Serv g is in charge of the listing of applications, consistency checks and the production of the generated deployment list (in the case above, the file F2) while each terminal, from the common file F2, performs processing to deduce the actions necessary to achieve according to the state of the terminal.
- the deployment list generated via the F2 file is unique (the server Serv g generates only one file F2 for a set of terminals and not one file per terminal).
- the file F2 that a terminal exploits has not been established by the server according to the state of this particular terminal, in particular has been established independently of the applications and operating system specifically implemented on this particular terminal.
- the embodiment described with reference to the figures above uses two servers Serv g and Serv d connected via a network R2. This is only one embodiment of the invention among others. In other embodiments, for example, only one server is used to perform the operations performed by these servers Serv g and Serv d .
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020167025578A KR20160122254A (ko) | 2014-02-17 | 2015-02-13 | 소프트웨어 애플리케이션의 세트의 구축 방법 |
CN201580019121.3A CN106164861A (zh) | 2014-02-17 | 2015-02-13 | 用于部署一组软件应用的方法 |
EP15704785.3A EP3108361A2 (fr) | 2014-02-17 | 2015-02-13 | Procédé de déploiement d'un ensemble d'application(s) logicielle(s) |
US15/119,409 US20170068531A1 (en) | 2014-02-17 | 2015-02-13 | Method of deploying a set of software application(s) |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1400428A FR3017725A1 (fr) | 2014-02-17 | 2014-02-17 | Procede de deploiement d'un ensemble d'application (s) logicielle (s) |
FR14/00428 | 2014-02-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2015121418A2 true WO2015121418A2 (fr) | 2015-08-20 |
WO2015121418A3 WO2015121418A3 (fr) | 2015-11-19 |
Family
ID=51564677
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2015/053098 WO2015121418A2 (fr) | 2014-02-17 | 2015-02-13 | Procédé de déploiement d'un ensemble d'application(s) logicielle(s) |
Country Status (6)
Country | Link |
---|---|
US (1) | US20170068531A1 (fr) |
EP (1) | EP3108361A2 (fr) |
KR (1) | KR20160122254A (fr) |
CN (1) | CN106164861A (fr) |
FR (1) | FR3017725A1 (fr) |
WO (1) | WO2015121418A2 (fr) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10846749B1 (en) * | 2014-03-12 | 2020-11-24 | Groupon, Inc. | Method and system for offering promotion impressions using application programs |
US11042904B1 (en) * | 2014-03-12 | 2021-06-22 | Groupon, Inc. | Method and system for detecting application programs on mobile computing device |
US11010793B1 (en) * | 2014-03-12 | 2021-05-18 | Groupon, Inc. | Method and system for determining user profile data for promotion and marketing service using mobile application program information |
US10891651B1 (en) * | 2014-03-12 | 2021-01-12 | Groupon, Inc. | Method and system for launching application programs using promotion impressions |
US10937062B1 (en) * | 2014-03-12 | 2021-03-02 | Groupon, Inc. | Method and system for facilitating download of application programs on mobile computing device |
FR3021147B1 (fr) * | 2014-05-16 | 2017-12-22 | Thales Sa | Dispositif de controle des donnees portees par un equipement embarque, systeme de collecte de taxe et procede associes |
EP3238051A1 (fr) * | 2014-12-23 | 2017-11-01 | Fluidra S.A. | Mise à jour de paquets logiciels dans un appareil de commande d'installation d'eau |
ES2880959T3 (es) | 2016-04-06 | 2021-11-26 | Fluidra S A | Operación de dispositivos proteicos de instalación de agua |
JP7010005B2 (ja) * | 2018-01-11 | 2022-01-26 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置及びプログラム |
CN108376076A (zh) * | 2018-05-28 | 2018-08-07 | 郑州云海信息技术有限公司 | 一种安装软件的方法和装置 |
CN109491673A (zh) * | 2018-11-01 | 2019-03-19 | 郑州云海信息技术有限公司 | 一种自动验证软件部署完整性的方法和系统 |
US10871956B2 (en) * | 2019-02-12 | 2020-12-22 | Open Text Corporation | Methods and systems for packaging and deployment of applications in a multitenant platform |
CN112148351B (zh) * | 2020-09-16 | 2024-05-28 | 杭州安恒信息技术股份有限公司 | 一种应用软件跨版本兼容的方法和系统 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7062765B1 (en) * | 1999-05-25 | 2006-06-13 | Realnetworks, Inc. | System and method for updating information via a network |
JP4168338B2 (ja) * | 2003-09-18 | 2008-10-22 | ブラザー工業株式会社 | インストールプログラム、コンピュータ読取可能な記録媒体、及びインストール方法 |
EP1739552A1 (fr) * | 2005-06-21 | 2007-01-03 | Hewlett-Packard Development Company, L.P. | Procédé et système d'informatique pour l'installation de logiciel |
US20080040455A1 (en) * | 2006-08-08 | 2008-02-14 | Microsoft Corporation | Model-based deployment and configuration of software in a distributed environment |
US20110029881A1 (en) * | 2010-10-11 | 2011-02-03 | Nevolution Digital, Llc | Devices and methods for providing software programs compatible with a computer system for download by a user |
US8646100B2 (en) * | 2011-06-03 | 2014-02-04 | Apple Inc. | Method for executing an application in a restricted operating environment |
-
2014
- 2014-02-17 FR FR1400428A patent/FR3017725A1/fr not_active Withdrawn
-
2015
- 2015-02-13 EP EP15704785.3A patent/EP3108361A2/fr not_active Withdrawn
- 2015-02-13 US US15/119,409 patent/US20170068531A1/en not_active Abandoned
- 2015-02-13 WO PCT/EP2015/053098 patent/WO2015121418A2/fr active Application Filing
- 2015-02-13 CN CN201580019121.3A patent/CN106164861A/zh active Pending
- 2015-02-13 KR KR1020167025578A patent/KR20160122254A/ko unknown
Also Published As
Publication number | Publication date |
---|---|
FR3017725A1 (fr) | 2015-08-21 |
WO2015121418A3 (fr) | 2015-11-19 |
US20170068531A1 (en) | 2017-03-09 |
KR20160122254A (ko) | 2016-10-21 |
EP3108361A2 (fr) | 2016-12-28 |
CN106164861A (zh) | 2016-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015121418A2 (fr) | Procédé de déploiement d'un ensemble d'application(s) logicielle(s) | |
US9294550B2 (en) | Efficient data transfer for cloud storage by centralized management of access tokens | |
EP3123387B1 (fr) | Sécurisation du chargement de données dans une mémoire non-volatile d'un élément sécurisé | |
US9727352B2 (en) | Utilizing history of changes associated with software packages to manage computing systems | |
CN104219198B (zh) | 一种WebApp的防篡改方法 | |
EP2696532A2 (fr) | Procédé, serveur et système de démarrage d'application | |
US9158902B2 (en) | Software modification for partial secure memory processing | |
CN104683409A (zh) | 终端间应用共享的方法和终端 | |
AU2008208768A1 (en) | Method of loading software in mobile and desktop environments | |
EP3313041B1 (fr) | Procédé et dispositif de téléchargement d'application | |
CN110390184B (zh) | 用于在云中执行应用的方法、装置和计算机程序产品 | |
CN107360254A (zh) | 一种文件下载方法、装置、服务器及终端 | |
US20090300603A1 (en) | Image install of a network appliance | |
CN112860282B (zh) | 集群插件的升级方法、装置和服务器 | |
FR2972821A1 (fr) | Procede et dispositif d'installation/desinstallation de modules logiciels, avec resolution centralisee de contraintes, dans des equipements d'aeronef | |
FR3013541A1 (fr) | Procede et dispositif pour la connexion a un service distant | |
CN113568643A (zh) | 一种资源获取方法、装置、电子设备及计算机可读介质 | |
WO2005008509A2 (fr) | Procede de gestion des composants logiciels integres dans un systeme embarque | |
EP2737686B1 (fr) | Procédé de gestion de l'accès à un ensemble de ressources délivrées par un dispositif électronique | |
WO2015092307A1 (fr) | Procédé de test et de mise à jour du système d'un terminal par un module d'identité de souscripteur et dispositifs associés | |
WO2015150689A1 (fr) | Procede de configuration securisee d'une application dans un terminal utilisateur | |
FR3036819A1 (fr) | Procede de mise a jour d'une application embarquee dans un equipement electronique | |
CN104484198A (zh) | 一种安装应用程序的方法和装置 | |
EP2912598A1 (fr) | Procédé de téléchargement d'au moins un composant logiciel dans un appareil informatique, produit programme d'ordinateur, appareil informatique et système informatique associés | |
EP3080706B1 (fr) | Procédé de sauvegarde de données stockées sur un terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15704785 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015704785 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15119409 Country of ref document: US Ref document number: 2015704785 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20167025578 Country of ref document: KR Kind code of ref document: A |