Patents Examined by Krista Zele
-
Patent number: 9742884Abstract: A method and system of retrying to load data from a data source to a cloud target system are disclosed. A server receives a first data packet from a device via a communication network. The first data packet comprises first data. The server stores the first data in one or more databases. The server receives a second data packet from the device. The second data packet comprises second data and is marked with a retry flag. The server determines that the second data packet has been marked with the retry flag, and performs an upsert operation with the second data in the second data packet based on the determining that the second data packet has been marked with the retry flag.Type: GrantFiled: March 24, 2016Date of Patent: August 22, 2017Assignee: SAP SEInventors: Anil Samudrala, Wu Cao, Vikram Kunniyur, YunKei Tsang
-
Patent number: 9736680Abstract: A method can include receiving, at a first computing device having one or more processors, a command to transfer a data payload to a second computing device and information from the second computing device using a near-field communication (NFC) protocol. The information can be indicative of a plurality of communication protocols capable of being received at the second computing device, including the NFC communication protocol. Additionally, the method can include estimating a transfer time corresponding to each of the plurality of communication protocols. Each of the transfer times can be indicative of an amount of time to transfer the data payload between the first and second computing devices using its corresponding communication protocol. The method can also include selecting a specific communication protocol based on the estimated transfer times and transmitting the data payload using the specific communication protocol.Type: GrantFiled: May 30, 2013Date of Patent: August 15, 2017Assignee: GOOGLE INC.Inventors: Jeffrey William Hamilton, Nicholas J. Pelly, Benjamin J. Dodson
-
Patent number: 9728107Abstract: Systems and methods which prevent or limit access to protected content (e.g., value bearing indicia (VBI)) by a general purpose user interface application (e.g., web browser) are shown. Embodiments implement techniques to avoid displaying protected content by a general purpose user interface application, or displaying protected content during a time in which a user does not have access to particular functions of the general purpose user interface application, to protect the content from various operations, such as repeated printing, electronic copying, etc. Data presentation formatting control in the form of style sheets may be utilized to control access to content. Additionally or alternatively, executable code or an executable object may be implemented within a page or other content to control access to content. Similarly, separate areas, such as windows or pages, may be utilized to control access to content.Type: GrantFiled: April 15, 2008Date of Patent: August 8, 2017Assignee: Stamps.com Inc.Inventor: Geoffrey C. Begen
-
Patent number: 9721071Abstract: Systems and methods for binding of cryptographic content using unique device characteristics with server heuristics in accordance with embodiments of the invention are disclosed. One embodiment includes a processor and memory includes collecting a combination of device characteristics that uniquely identify the device using information stored on the device and accessible to the device using the device processor, generating device match data based upon the collected combination of device characteristics using the device processor, generating a device protection key using the device match data, encrypting the cryptographic data using the device protection key, and storing the encrypted cryptographic data in device memory using the device processor.Type: GrantFiled: December 28, 2011Date of Patent: August 1, 2017Assignee: Sonic IP, Inc.Inventors: Francis Yee-Dug Chan, Eric William Grab, Michael George Kiefer
-
Patent number: 9693390Abstract: Techniques to manage a mobile device based on network density are described. An apparatus may comprise a mobile computing device having a radio module operative to receive radio signals, a resource detector operative to collect a sample for one or more wireless resources based on the received radio signals, a network density module operative to estimate a network density for an operating environment of the mobile computing device based on the sample and a probability density function, and a parameter management module operative to manage one or more operational parameters of the mobile computing device based on the estimated network density. Other embodiments are described and claimed.Type: GrantFiled: December 18, 2009Date of Patent: June 27, 2017Assignee: QUALCOMM IncorporatedInventors: James Beninghaus, William Ngo, Welly Kasten, Neil Hendin
-
Patent number: 9686286Abstract: To prevent a transfer of an authority from being useless as much as possible, an authority transfer unit includes a decision unit for making a decision that an authority of a user with respect to a management unit is transferred to a processing request unit.Type: GrantFiled: May 2, 2014Date of Patent: June 20, 2017Assignee: CANON KABUSHIKI KAISHAInventor: Hayato Matsugashita
-
Patent number: 9628576Abstract: A system and method for suggesting to a first user about a second user who is available to have social interactions with the first user at a specific time based at least in part on user context for activities associated with habits of users. A habit engine determines habits of the first user and the second user to identify when each user is available for the social interactions. A context engine determines user context for a group of activities performed by the first user and the second user. A suggestion module identifies a time when the first user and the second user are available for the social interactions associated with a first activity having a matching context. The suggestion module provides a first suggestion that the first user join the second user in the first activity in a social network.Type: GrantFiled: February 5, 2014Date of Patent: April 18, 2017Assignee: Google Inc.Inventors: Ayush Agarwal, Francis Ma, Seth Sternberg
-
Patent number: 9614772Abstract: A method, apparatus, and system are directed to managing traffic towards a tunnel in a network. The invention enables a network device, to extract data from a received packet. A deep packet inspection is employed that enables examination of the extracted data at virtually any layer of an OSI layered protocol of the packet. If the extracted data does not satisfy the flow criteria, a second packet may be inspected at a deep packet level to determine whether the data of the first and second packet satisfies the flow criteria. If the extracted data satisfies the flow criteria a tunnel is determined based, in part, on the flow criteria. The packet is associated with and forwarded towards the determined tunnel.Type: GrantFiled: November 21, 2003Date of Patent: April 4, 2017Assignee: F5 Networks, Inc.Inventor: Christopher James Bradfield
-
Patent number: 9614924Abstract: A network attached storage device for performing network attached storage operations with cloud storage services. The device comprises at least one network controller for communicating with a plurality of clients over a local area network (LAN) and with a cloud storage service (CSS) over a wide area network (WAN); a plurality of storage devices for locally storing data in the device; a CSS module for at least synchronizing between data locally stored in the plurality of storage devices and data stored in the CSS; and a processor for enabling the plurality of clients to perform file-based operations on the device using a file sharing protocol.Type: GrantFiled: December 18, 2009Date of Patent: April 4, 2017Assignee: Ctera Networks Ltd.Inventor: Aron Brand
-
Patent number: 9600421Abstract: Encrypted storage often introduces unwanted latency in access. This delay can result in a processor having to wait for critical data thus slowing performance. Generally speaking, the latency is at most an issue when reading from encrypted storage, since the processor may need the information read from encrypted storage to proceed. During a write operation, there typically is not an issue because the processor does not need to wait for the end of the write operation to proceed. A variant of counter (CTR) mode for a block cipher can be used to perform the majority of the decryption operation without knowledge of the ciphertext, therefore the majority of the decryption operation can be performed concurrently with the retrieval of the ciphertext from memory. In order to further secure the encrypted storage, a light encryption can be performed to further obfuscate the ciphertext.Type: GrantFiled: May 20, 2009Date of Patent: March 21, 2017Assignee: Conexant Systems, Inc.Inventor: Mark E. Miller
-
Patent number: 9576062Abstract: Systems and methods are disclosed for management of resource objects (“resources”) within a computing environment. Resources may be stored in a number of resource spaces, each including service endpoints configured to facilitate access to resources. On creation of a resource, an identifier may be assigned to the resource. Thereafter, the identifier may be used to determine an appropriate service endpoint for accessing the resource. For example, each resource space may submit a set of resolution rules to a resolution server. Each set of resolution rules may be used to identify an appropriate endpoint for accessing a resource. Thereafter, a request for a resource may first retrieve the set of resolution rules, and use such rules to determine an appropriate service endpoint. Illustratively, utilization of resource resolution rules may enable the service endpoint to be modified without requiring modification of client devices.Type: GrantFiled: July 30, 2012Date of Patent: February 21, 2017Assignee: Amazon Technologies, Inc.Inventor: Bradford W. Siemssen
-
Patent number: 9565556Abstract: A system and method for maintaining privacy of a user's telephone number is disclosed. The method provides a means by which a user A may prefer to exchange her contact number with another user B. The contact number is encrypted by user A and passed on to the mobile phone of user B. In the phonebook of user B, the contact number of user A is stored in encrypted format. Further, when user B initiates a call to user A, the encrypted number is sent to the network. At the MSC of user B, the number is decrypted and a call is established with user A. When user A calls user B, user A's number is encrypted at user B's MSC. This is transmitted to user B, where it is compared with the already encrypted number in the phonebook. The matching name of user A is then displayed.Type: GrantFiled: June 28, 2012Date of Patent: February 7, 2017Inventor: Viswanatha Rao Thumparthy
-
Patent number: 9563480Abstract: A cloud computing system includes a physical resource pool that includes a number of information processing devices. Each information processing device includes a processor, a computer-readable medium, and a network interface. The system further includes a first cloud controller to manage a first cloud infrastructure, the first cloud infrastructure operating a first set of virtualized resources, the first set of virtualized resources having access to the physical resource pool through the first cloud controller. The system further includes a second cloud controller to manage a second cloud infrastructure, the second cloud infrastructure utilizing the first set of virtual resources to operate a second set of virtual resources, the second set of virtual resources being provided access to the physical resource pool through the second cloud controller and the first cloud controller.Type: GrantFiled: August 21, 2012Date of Patent: February 7, 2017Assignee: Rackspace US, Inc.Inventors: Antony Joel Messerli, Paul Voccio, John Carlisle Hincher
-
Patent number: 9558474Abstract: Provided are techniques for the specification of templates for the orchestration of workflows such as, but not limited to, computer system server, storage, network, virtualization and cloud infrastructure management operations and tasks. The disclosed techniques support non-scripted native representations of the workflows, the addition of new object types or operation sets or services, atomicity, transactional semantics of workflows and the ability to configure parameters for execution of workflow.Type: GrantFiled: July 24, 2012Date of Patent: January 31, 2017Assignee: International Business Machines CorporationInventor: Sudhir Gurunandan Rao
-
Patent number: 9553983Abstract: A system and method for determining an order in which to communicate with a list of numbers and/or addresses for a particular contact is disclosed. Each caller that communicates with the contact may specify a different order for the contact's various phone numbers and other addresses. A communication management system may then automatically dial the numbers or use messaging addresses to initiate data communications in the specified order when the initiating party attempts to communicate with the contact. The order may specify simultaneous and/or sequential use of numbers or addresses. Alternatively or additionally, the communication management system may dynamically and/or automatically determine the communication order or a portion thereof. The automatic determination of the order may be based on a communication history or communication receiving of the initiating party. In some arrangements, the order may be partially manually defined and partially automatically defined.Type: GrantFiled: October 5, 2010Date of Patent: January 24, 2017Assignee: Comcast Cable Communications, LLCInventors: Franklyn Athias, Samuel H. Schwartz
-
Patent number: 9544332Abstract: A non-transitory computer readable medium includes instructions which, when executed by one or more network devices, causes performance of operations. The operations include sending, to shared devices, one or more status queries regarding one or more device conditions for each of the shared devices, obtaining responses to the one or more status queries from each of the plurality of shared devices, the responses including the one or more device conditions for each of the shared devices, filtering the shared devices based on the one or more device conditions to obtain a subset of the shared devices, identifying the subset of the shared devices as a set of available shared devices, and transmitting information identifying the set of available shared devices to a client device.Type: GrantFiled: October 31, 2013Date of Patent: January 10, 2017Assignee: Aruba Networks, Inc.Inventors: Sandip Kumar Devnath, Santashil PalChaudhuri, Sudeepto Kumar Roy
-
Patent number: 9531695Abstract: Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.Type: GrantFiled: June 12, 2009Date of Patent: December 27, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Lokesh Srinivas Koppolu, Amritansh Raghav, Anton W. Krantz
-
Patent number: 9531580Abstract: A method of routing data that is part of a grid job including steps of: receiving a data packet at a routing device; determining whether the data packet is identified as part of a grid job; and routing the data packet that is identified as part of a grid job through the Internet to an external node.Type: GrantFiled: December 6, 2006Date of Patent: December 27, 2016Assignee: FEDERAL HOME LOAN MORTGAGE CORPORATION (Freddie Mac)Inventors: James W. Seaman, Elizabeth M. Charboneau
-
Patent number: 9525680Abstract: A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an SSL connector, for performing an SSL handshake with the client computer using the signed certificate created by said certificate creator, and a second security computer communicatively coupled with a server computer via an SSL connection, and communicatively coupled with the first security computer via a non-SSL connection, including an SSL connector, for performing an SSL handshake with the server computer using a signed certificate provided by the server computer, and a protocol appender, for appending attributes of the signed certificate provided by the server computer within a message communicated to the first security computer. A method is also described and claimed.Type: GrantFiled: October 2, 2013Date of Patent: December 20, 2016Assignee: Finjan, Inc.Inventors: Yuval Ben-Itzhak, Shay Lang, Dmitry Rubinstein
-
Patent number: 9525554Abstract: A device and method associates a certificate with a first recipient identity. The method comprises receiving the first recipient identity of a user. The method comprises associating the first recipient identity of the user with a second recipient identity of the user. The second recipient identity is associated with a certificate so that subsequent transmissions of data to the first recipient identity encrypts the data according to specifications of the certificate.Type: GrantFiled: September 10, 2008Date of Patent: December 20, 2016Assignee: Google Inc.Inventors: Sanjiv Maurya, Jack Cai