Abstract: The present invention includes a method and device for updating a self-describing, structured document. A further aspect of the present invention is enabling client-based modification of the document. Additional aspects of the present invention are described in the claims, specification and drawings.
Type:
Application
Filed:
June 8, 2017
Publication date:
December 7, 2017
Applicant:
Open Invention Networks, LLC
Inventors:
Muljadi Sulistio, Yang Wei, Kelly Lane Schwarzhoff, Yuan Ding
Abstract: A system, method, and computer-readable medium that facilitate software configuration of assistive computer devices by automatically assessing a user's capabilities through questions and tasks are provided. The analysis results of the user's capabilities are then available to assistive computer software applications which may subsequently update their interfaces accordingly. A mapping mechanism from an external input device into a target software application is facilitated for software applications that do not include assistive technology features.
Abstract: Providing streaming of applications from streaming servers onto clients. The applications are contained within isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include the option of running both in on-line and off-line. When on-line, the system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. When off-line, the system may include the ability to run already installed isolated environments without requiring credentialing. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
Abstract: A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging protocol for checkpointing of the distributed system. Processes participating in a distributed computation on the distributed system may be migrated from one compute node to another compute node in the distributed system by re-mapping of hardware addresses using the checkpoint library.
Abstract: A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of information stored in the carrier, and more specifically to limit the amount of information available to a potential defrauder, electronic components such as circuits, I/O, cryptographic, memory and dummy objects are built, modified or influenced on demand from physical characteristics of an eligible person or device. Digitized unique biometric or hardware identifiers are read upon start-up and runtime of the device and, in case of an eligible person or device, subsequently supply all values necessary for determination of the characteristics of the user specific virtual smart cards objects, their placement and connections. By multi-factor authentication, the end-user or device will retain sole control of its keys and use them for authentication, signature or encryption purposes as if he had a physical smart card in his hand.
Abstract: A peripheral device connected to a local electronic device which is connected to at least one communication network can communicate with a peripheral device attached to a remote electronic device as if the remote peripheral device was locally attached. Data designated for the remote peripheral device is received by a local virtual device object and transmitted to the remote electronic device via at least one of the electronic devices communication interfaces or peripheral devices. Data received by the remote electronic device's communication interface or peripheral device is written to the peripheral device at the remote electronic device by a virtual device object. For compensation of different transfer speeds or outages between the peripheral device and the communication interface or another peripheral device the virtual device provides the ability to utilize the virtual devices emulation driver that is attached to the virtual device object as an I/O buffer.
Abstract: Femtocell coverage can be extended across a coverage area by providing a cluster of femtocell access points (FAPs). Each FAP is independently registered with a core network and provisioned with a location area code common to each FAP. At hand-in from the macrocell network, an association is made between the mobile station and the hand-in FAP, which becomes an anchor FAP for the duration of the mobile station's presence within the cluster. Calls between the mobile station and the core network are routed via a servicing FAP of the cluster and the anchor FAP.
Abstract: A source communication device comprises a cluster manager to group destination device connections into a plurality of performance clusters. The cluster manager then causes a synchronization mechanism to be generated for each performance cluster. Each synchronization cluster can then allow data to be optimally shared between the source device and destination devices within a given cluster.
Abstract: A method, system, and program product for generating and processing application settings for a software application using an application configuration component operating on a computer system. An application settings object containing a plurality of application settings is generated for the software application. The application settings object are serialized and stored into an Extensible Markup Language (XML) application settings file on the computer system. A new instance of the application configuration component is generated. A request is received from the software application for an application settings object for a specific environment and module. If located on the computer system, the XML application settings file is deserialized into the application settings object. Each property of the application settings object is then processed and the application settings object is returned to the software application.
Abstract: Performing a user initiated search query is disclosed and comprises receiving user input comprising description details of at least one desired object, retrieving a plurality of objects from a database sharing one or more of the description details of the user input, constructing a tree data structure based on the description details of the plurality of objects, the tree data structure comprising one or more attributes related to each of the plurality of objects retrieved, displaying visual images associated with the retrieved plurality of objects, the visual images matching at least one of the attributes related to the plurality of objects, and receiving a user selection of one or more of the visual images.
Abstract: The present application describes performing a user initiated search query comprising receiving user input comprising description details of at least one desired object, retrieving a plurality of objects from a database sharing one or more of the description details of the user input, retrieving an image of the at least one desired object based on one or more of the plurality of objects, generating a contour of the image and comparing the generated contour with other related contours of other images stored in the database, displaying all of the available contours of all of the images that match the generated contour, receiving a selection of one of the available contours from the user and performing the search query based on the user selected contour.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid sequence of touch events on a touch sensitive device. A first sequence of touch events is received, a proximity between any two touch events of the first sequence of touch events being greater than a proximity threshold. A second sequence of touch events is received. The touch events from the first and the second sequence are combined if a time difference between the first and the second sequence of touch events is below a time threshold and a proximity between the first and the second sequence of touch events is less than the proximity threshold. A valid sequence of touch events is determined if a combined pressure of the first and the second sequence of touch events is greater than a pressure threshold.
Abstract: Disclosed are an apparatus and method of performing a data file migration to a cloud source. One example method of operation may include establishing via a transmitter an application programming interface (API) connection to an enterprise network, identifying via a processor one or more present allocation parameters being utilized by one or more virtual machines operating on the enterprise network. The method may also provide requesting via the transmitter a directory file structure and identifying via the processor at least one data file for data migration to a remote cloud storage server based on predetermined criteria.
Abstract: Disclosed are an apparatus and method of remotely communicating with a managed machine. One example method may include identifying the managed machine operating in a communication network, transmitting a connection establishment message to the managed machine over the communication network, and receiving an acceptance message from the managed machine. The method may also include requesting a screen capture of present operating conditions of the managed machine, and receiving the screen capture formatted in a compressed format. The administrator may be able to receive and view the screen capture via a compressed thumbnail format.
Abstract: Some embodiments provide a system that provides a filesystem in a computer system. During operation, the system obtains a policy for the filesystem and separates the filesystem into a set of layers based on the policy. Next, the system processes input/output (I/O) operations to the filesystem by directing each of the I/O operations to one of the layers based on the policy. Finally, the system periodically maintains the layers using a master image of the filesystem.
Abstract: The present invention provides a system and method for processing a database query between one or more clients and one or more databases. The database query, which is formatted using a first protocol, is received from one of the clients. One of the databases is selected to process the database query and the database query is translated from the first protocol to a second protocol. The translated database query is then sent to the selected database for processing. A response to the database query, which is formatted using the second protocol, is received from the selected database and the response is translated from the second protocol to the first protocol. The present invention determines which of the clients sent the database query and sends the translated response to the client that sent the database query. This method can be implemented as a computer program embodied on a computer readable medium.
Abstract: Certain aspects of the present disclosure relate to a technique for processing data based on touch events on a touch sensitive device. A first touch event is detected indicating a selection of a value for an attribute using a touch input device from a first portion of a touch sensitive display screen of the touch sensitive device. A second touch event is detected indicating a change in position of the touch input device from the first portion to a second portion of the touch sensitive display screen of the touch sensitive device. In response to detecting the second touch event, a query is determined for searching a database based on the value for the attribute.
Abstract: Wireless device application interaction via external control detection comprises identifying a first position of a wireless device and identifying a first change in the wireless device's position. The method may also provide calculating a first distance vector. The method may also perform comparing the first distance vector to a first threshold distance and calculating a second distance vector based on a distance between the second position and a third position and comparing the second distance vector to a second threshold distance, and changing a current operating state of the wireless device to a different operating state if the first distance vector exceeds the first minimum distance and the second distance vector does not exceed the first maximum distance.
Abstract: A client-side user agent operates in conjunction with an identity selector to institute and exercise privacy control management over user identities managed by the identity selector. The user agent includes the combination of a privacy enforcement engine, a storage of rulesets expressing user privacy preferences, and a preference editor. The editor enables the user to direct the composition of privacy preferences relative to user identities. The preferences can be applied to individual cards and to categorized groups of attributes. The engine evaluates the proper rulesets against the privacy policy of a service provider. The privacy preferences used by the engine are determined on the basis of specifications in a security policy indicating the attribute requirements for claims that purport to satisfy the security policy.
Abstract: In developing applications for a plurality of node types, a meta-data definition of the application can be captured into an application definition module. The meta-data definition can describe the application for the plurality of node types. A code generation module can then automatically generate the application code for the plurality of node types. The code can be compiled per node type and the packaging necessary to deploy the application to the plurality of node types can also be automatically generated.
Type:
Grant
Filed:
February 2, 2016
Date of Patent:
October 17, 2017
Assignee:
Open Invention Network, LLC
Inventors:
Robert DeAnna, Robert W. Peterson, Thomas T. Wheeler, Qin Ye