Patents Examined by Ashok B. Patel
-
Patent number: 8745226Abstract: A method includes receiving personalized content from a plurality of content sources. The personalized content is based on user input. The method further includes receiving a personalized advertisement based on user input, and creating a customized publication including the personalized content and the personalized advertisement.Type: GrantFiled: May 2, 2006Date of Patent: June 3, 2014Assignee: Google Inc.Inventors: Jason Harinstein, Karen Roter Davis
-
Patent number: 8543650Abstract: The present invention provides a method for sending o electronic mail messages (emails) via a network such as t internet by a mail processing unit, comprising: —generating by the mail processing unit of a user's electronic mail message to be authorized, wherein the mail message comprises text image and/or sound data; —addressing of the generated unauthorized mail message by the mail processing unit; —temporarily storing the generated unauthorized mail message at the mail processing unit; —showing the unauthorized mail message to a previously specified supervisor associated with the user; —sending the authorized electronic mail message to the addressee over the network only after authorization b the supervisor.Type: GrantFiled: October 18, 2005Date of Patent: September 24, 2013Inventors: Teunis Plooij, Nico Samuel Leons
-
Patent number: 8462952Abstract: A method includes receiving a communication from a management domain associated with managing a cellular communication network. The method also includes determining whether the communication corresponds to a polling signal from the management domain, and generating a first ping for transmission to a data center associated with managing virtual private networks (VPNs) in the cellular network in response to determining that the received signal corresponds to the polling signal. The method may further include generating a second ping for transmission via an encrypted path in the cellular communication network in response to determining that the received signal corresponds to the polling signal and that data is ready to be transmitted via the encrypted path. The first ping and the second ping may be used to ensure that cellular connections through the cellular communication network are operating properly.Type: GrantFiled: August 25, 2009Date of Patent: June 11, 2013Assignee: Verizon Patent and Licensing Inc.Inventors: Scott J. Hoover, Hollitte D. Greene, IV
-
Patent number: 8386636Abstract: A prediction method for predicting a computer-resource usage amount with the use of a service call relation to be extracted from a business process definition. A resource allocation method includes, before adding a new business process to the system, steps of calculating the computer-resource predicted usage amount by using a computer-resource usage amount prediction step and of allocating a computer, as a new service execution computer, to a service execution computer whose computer-resource predicted usage amount has exceeded a predetermined value, the computer being different from the service execution computer.Type: GrantFiled: November 16, 2006Date of Patent: February 26, 2013Assignee: Hitachi, Ltd.Inventors: Katsutoshi Asaki, Nobuyuki Yamamoto, Mitsunobu Tasaka, Jun Yoshida
-
Patent number: 8363826Abstract: A multiplication value decision unit (12) decides a multiplication value which is a positive value or a negative value corresponding to a bit value of each bit contained in a binary bit string constituting a scramble pattern generated in a pattern generation unit (11). A multiplication processing unit (13) multiplies symbol data representing each symbol value in the symbol data string formed by the multinary symbol containing a predetermined pair of a positive value and a negative value having an identical absolute value, in the value area, by the multiplication value decided by the multiplication value decision unit (12). Here, the multiplication processing unit (13) successively executes the multiplication between the symbol data for one symbol and the multiplication value decided corresponding to the bit value of the one bit contained in the scramble pattern until the number of symbols expressed by the symbol data string is reached.Type: GrantFiled: September 29, 2005Date of Patent: January 29, 2013Assignee: Kabushiki Kaisha KenwoodInventor: Taichi Majima
-
Patent number: 8364786Abstract: One embodiment of the present invention provides a method and a system for synthesizing a scalable and incrementally updatable system software infrastructure for sensor networks. During operation, the system receives a specification for an application and a specification for target devices. The system analyzes these specifications in order to identify a set of software components required to support the application, and then proceeds to synthesize a customizable software stack that accommodates the identified set of software components on a specified target device. This process generates a minimal, resource-efficient software stack for a specific application on the specified target device.Type: GrantFiled: January 19, 2006Date of Patent: January 29, 2013Assignee: The Regents of the University of CaliforniaInventors: Raju Pandey, Joel J. Koshy
-
Patent number: 8165293Abstract: A method of providing a stream of data units with scrambling state identifying data and providing a stream of key messages, synchronized with the stream of data units. The scrambling state identifying data includes an identifier value associated with the first decryption key that associates the data units in a third section. Then separating the first and second sections, with scrambling state identifying data lacking an identifier value associated with the decryption key, and providing in a key message coinciding with first or third sections key information. Thereby enabling an authorized decoder to obtain a value of the first decryption key corresponding with the second value of the first encryption key. Encryption of at least part of the clear data units uses the first encryption key is suspended for each data unit in the sequence included in the third section.Type: GrantFiled: February 14, 2007Date of Patent: April 24, 2012Assignee: Irdeto Access B.V.Inventor: Andrew Augustine Wajs
-
Patent number: 8051148Abstract: System and method for determining and/or merging differences between configuration diagrams. First information is received regarding a first configuration diagram comprising a first plurality of nodes and graphically representing a first system, and second information is received regarding a second configuration diagram comprising a first plurality of nodes and graphically representing a second system. At least a portion of the nodes may correspond to hardware devices, programs, and/or configuration data of the respective systems, and may be interconnected. The first and second information is analyzed to determine and/or merge differences between the first configuration diagram and the second configuration diagram, e.g., differences between hardware, software, configuration, and/or connectivity, e.g., by traversing the configuration diagrams or data structures representing the diagrams. An indication of the differences and/or a merged configuration diagram may be displayed on a display device, e.g.Type: GrantFiled: January 10, 2006Date of Patent: November 1, 2011Assignee: National Instruments CorporationInventors: David W Fuller, III, Mohammed Kamran Shah
-
Patent number: 8041826Abstract: An Ajax proxy indirection technique enables a local, front-end proxy server to handle Ajax requests from an Ajax client that must be serviced by an external Ajax server in an external domain, instead of a local Ajax back-end server exposing itself to the external domain. The front-end proxy server accepts the Ajax client's request and forwards it to the local Ajax back-end server. The proxy server asks the local AJAX server for the credentials to be used in the “external” AJAX request. The local Ajax back-end server then responds to the proxy server with meta-data for the external domain request that the proxy will make to the external domain. The proxy server uses the credentials of the “external” AJAX request to make the external request to the external Ajax server in the external domain. The proxy server performs any authentication and necessary domain mapping with the external Ajax server before sending a response from the external Ajax server back to the client.Type: GrantFiled: January 5, 2009Date of Patent: October 18, 2011Assignee: International Business Machines CorporationInventors: John Paul Cammarata, Erik John Burckart, Andrew Ivory, Aaron Kyle Shook
-
Patent number: 8041763Abstract: A system that automatically obtains Web page-specific scripts to save and restore the state of a Web page. When a user bookmarks or copies a Web page URL to the clipboard, a function is called to create a page state file that is stored together with the current URL to create a bookmark. When the bookmark is loaded or pasted into the location bar of the Web browser, the system reads the URL and page state file, and loads but does not yet display the Web page indicated by the URL of the bookmark. The system then locates the Restore Page State function in the loaded Web page's script, and executes the Restore Page State function on the page state file, resulting in modification to the DOM (Document Object Model) representation of the Web page and display of the Web page to the user based on the modified DOM.Type: GrantFiled: June 12, 2007Date of Patent: October 18, 2011Assignee: International Business Machines CorporationInventors: Alexander Kordun, David A. Brooks
-
Patent number: 8037143Abstract: Embodiments of the present invention are directed generally to autocomplete functionality in messaging applications. The autocomplete functionality, for example, generates frequently and/or recently used distribution lists or groups, performs keyword searches to identify recipient identifiers, and provides convenient modification of existing distribution lists or groups.Type: GrantFiled: October 30, 2006Date of Patent: October 11, 2011Assignee: Avaya Inc.Inventors: Richard J. Atkins, Sunny Singh Kalsi, Peggy J. Leisher-Samenfink, Rohan Lenard, David Thambiratnam, Michael J. Thomas, Bradley B. Williams
-
Patent number: 8032588Abstract: A method for hosting one or more versions of a service using a service proxy includes specifying an interface definition of a service which defines and uniquely identifies an interface version for the service, and an implementation definition of the service which uniquely identifies an implementation version for the service; generating one or more service proxies each representing an interface version of a service; providing a proxy configuration that contains entries for a plurality of service implementation versions, wherein each proxy utilizes the proxy configuration to access a certain one or more of the implementation versions which share the same or a compatible interface version of a service, and wherein the proxy configuration contains attributes that include information about each of the implementation versions; and wherein the proxy dynamically selects one of the implementation versions in the proxy configuration to route one or more client service requests to based on the attributes.Type: GrantFiled: June 23, 2008Date of Patent: October 4, 2011Assignee: International Business Machines CorporationInventors: Ru Fang, Liana L. Fong, David C. Frank, Manoj Khangaonkar, Linh H. Lam
-
Patent number: 8024425Abstract: A system and method for Web service archive deployment is describe. An exemplary method includes searching the Web services archive for a metadata descriptor, processing descriptors from the metadata descriptor, and generating a set of objects to serialize and deserialize input parameters.Type: GrantFiled: December 30, 2005Date of Patent: September 20, 2011Assignee: SAP AGInventor: Dimitrina G. Stoyanova
-
Patent number: 8024478Abstract: A method and system for identifying a network path between a source node and a destination node are disclosed. In one embodiment, the method includes generating a proxy trace message at the source node, transmitting the proxy trace message over the network path towards the destination node, and receiving the proxy trace message at the source node. The proxy trace message follows a path taken by application messages transmitted by the source node and the received proxy trace message includes addresses of the destination node and proxies in the network path.Type: GrantFiled: March 28, 2007Date of Patent: September 20, 2011Assignee: Cisco Technology, Inc.Inventor: Alpesh Patel
-
Patent number: 8024412Abstract: Emails modeled as conversations are displayed in a user interface that enables users to read and interact with the emails within a conversation intuitively. Conversation breaks, such as those in an in-reply-to relationship between messages, are presented utilizing extra spaces between displayed message parts, excerpts of parent messages displayed above the message following the break, and/or graphical elements like broken connectors. Relationships between a user selected message and its parent within the conversation defined relationship are illustrated using graphical elements or schemes that focus on the selected message to avoid confusion due to information overload.Type: GrantFiled: February 15, 2008Date of Patent: September 20, 2011Assignee: Microsoft CorporationInventors: Robert E. McCann, Jorge Pereira, Nathan E. Breskin-Auer
-
Patent number: 8015249Abstract: Data usage of a messaging application is mitigated based on a location of the application on the display screen or a mode of a device. If the location of the application is in the foreground of the display, presence update information of a contact is periodically received or requested. If the application is in the background of the display longer than a predetermined interval, the presence update information of the contact is stopped. In some embodiments, if the device is in an OFF or a SUSPEND mode, contact presence updates are not received. When the device is in an ON mode or state, the presence updates are received or requested from a server or presence agent.Type: GrantFiled: October 10, 2006Date of Patent: September 6, 2011Assignee: Microsoft CorporationInventors: Niranjan S. Nayak, Neeraj K. Garg
-
Patent number: 8015294Abstract: A pin-hole firewall network communications device that includes a first port configured to communicate data packets over a packet network and a first counter module in communication with the first port. A pin-hole firewall module may be in communication with the first counter module. A call control module may be in communication with the first counter module and the pin-hole firewall function. A second counter module may be in communication with the pin-hole firewall function and the call control module. A second port may in communication with the second counter module and the packet network and be configured to communicate data packets over a second node segment of the packet network.Type: GrantFiled: May 31, 2007Date of Patent: September 6, 2011Assignee: Embarq Holdings Company, LPInventors: Michael K. Bugenhagen, William L. Wiley
-
Patent number: 8010695Abstract: An Web service (WS) archive is described. The archive includes components that define and describe the deployable WS such as the implementation classes of the WS, the WSDL of the WS, and descriptors that provide more detail than what is described in a normal WSDL that are specific to the WS of the archive.Type: GrantFiled: December 30, 2005Date of Patent: August 30, 2011Assignee: SAP AGInventors: Vladimir S. Savchenko, Dimitrina Stoyanova, Dimitar V. Angelov
-
Patent number: 7987289Abstract: A Totally Stubby Edge (TSE) participates in a cloud under the condition that the TSE may select paths for frames that the TSE introduces to the cloud, but may not transit frames between nodes in the cloud. The edge submits, to an administrator of the cloud, a request to join the cloud. If the administrator allows the request, then the edge is given access to the address tables that define the structure of the cloud, and may insert itself into the structure. The edge may use the address tables to select paths for frames that the edge introduces to the cloud. Normally path decisions are made by devices that the administrator trusts and controls. However, since the TSE selects paths for its own frames but does not transit frames between other nodes in the cloud, the TSE may select paths even if it is untrusted by the administrator.Type: GrantFiled: June 24, 2008Date of Patent: July 26, 2011Assignee: Microsoft CorporationInventors: Kevin Mason, Jeffrey Paul Jensen, Robert Pike, Albert Greenberg, Parantap Lahiri
-
Patent number: 7979533Abstract: A system, method and computer program product for auditing a message in a message stream are disclosed. Messages in a message stream are captured including at least one message in an extensible markup language (XML) format. Each message in the XML format is then extracted from the captured messages and has a timestamp applied thereto. Each timestamped message in the XML format is then stored in a memory.Type: GrantFiled: October 16, 2006Date of Patent: July 12, 2011Assignee: Network Resonance, Inc.Inventors: Kevin Stewart Dick, Eric Kenneth Rescorla