Abstract: Content such as advertisements received into a mobile device may be more appropriately displayed on an alternative device remote from the mobile device. When ad content is received into the mobile device, the user may perform a physical gesture such as movement of the device or an associated motion sensor. The physical gesture is analyzed in the mobile device and causes the ad content to be redirected to the remote device. Additional physical gestures by the user can be interpreted in the mobile device to manipulate the content on the remote device.
Abstract: The present invention includes devices and methods to specify a document transformation. A template specifies a transformation that is applied to a document in a streaming mode, without building a full object tree in memory representing the document.
Abstract: Example embodiments of the present invention may include an example method of performing steganography. The example method may include processing a data message into multiple message blocks each representing a portion of the data message, and assigning the multiple message blocks to a corresponding set of multiple data files. The method may also include storing the multiple data files in at least one memory location.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid touch event on a touch sensitive device. At least two touch events are received from a touch interface. The at least two touch events are combined if a time difference between each of the at least two touch events is less than a time threshold and a proximity between each of the at least two touch events is less than a proximity threshold. A valid touch event is determined if a combined pressure indicator of a combined touch event is greater than a pressure threshold.
Abstract: The illustrative embodiments described herein provide systems and methods for managing the execution of processing jobs. In one embodiment, a method includes receiving a processing job associated with a set of processing job parameters. The processing job is sent from a user interfacing device associated with a user. The method also includes determining a processing job priority for the processing job using the set of processing job parameters, identifying a destination processing device capable of executing the processing job using the set of processing job parameters, and initiating execution of the processing job at the destination processing device to form processed data in response to determining to execute the processing job based on the processing job priority.
Abstract: A system, method, and computer readable medium that facilitates delivery of mobile-terminated short message service messages to a mobile station attached with a femtocell system are provided. A convergence server deployed in a core network receives a short message for short message service delivery to a mobile station attached with a femtocell system. If there is no active traffic channel with the mobile station, or if the short message is to be delivered to the mobile station via a paging channel, the femtocell system triggers an authentication process. The convergence server constructs a short message service delivery request message, transmits the short message service delivery request message to the femtocell system, and receives one of an acknowledgement and a negative acknowledgment regarding delivery of the short message to the mobile station. The convergence server thereafter notifies the message center of the acknowledgment or negative acknowledgement received thereby.
Abstract: Accessing a security enabled application may require certain access privileges that are not readily available or associated with the application at the time a user is seeking access via a login operation. In operation, an access attempt to a security enabled application may include identifying user credentials associated with the access attempt, generating a query based on the user credentials to identify whether the user credentials are associated with a predetermined group membership. A response to the query may be received that includes group information corresponding to the user and the group information may be compared to a set of predetermined rules to determine whether the group information includes privilege rules used to grant access to the access attempt.
Abstract: A method and apparatus of organizing user requested data is disclosed. One example method may include transmitting a query message to a remote site to obtain the user requested data, receiving a response data based on the query message, the response data may include at least a portion of the user requested data. The method may also include storing the response data in a temporary data file memory location, processing the response data in the temporary data file, storing said at least a portion of the user requested data in a permanent data file, and presenting the permanent data file contents to the user. The user may have the capability of receiving numerous messages in a single interface and expanding those messages of interest to review the original message information.
Abstract: During communication of a large data message from a client application to a server application, requirements to communicate smaller control messages can arise. To facilitate timely communication of control messages, a client application may include a chunking module that divides a data message into chunks that can be sent as a sequence of individual data message packets. When a control message needs to be sent, the sequence of data message packets can be interrupted to send a control message packet. At the server application, the sequence of message packets is processed so that data message packets are appended to a data message and control messages are extracted for immediate processing.
Abstract: A method, system and program product for remote scheduling of at least one job to run on a plurality of computers in a computer network. The job scheduler enables selection of a domain that includes at least a subset of the computers on which the job is to run. A list of computers in the selected domain is automatically generated. The computers on which the job is to run can be selected from the generated list of computers. A configuration file is created for storing an identification of the selected domain and the job to be run on the selected computers in the domain.
Abstract: Embodiments of the present invention generally provide for multi-dimensional disk arrays and methods for managing same and can be used in video surveillance systems for the management of real-time video data, image data, or combinations thereof.
Abstract: The disclosed embodiments provide a system that facilitates the use of a computer system with virtualization software. During operation, the system obtains a set of hardware attributes from the computer system and a hardware compatibility list (HCL) for the virtualization software. Next, the system uses the hardware attributes and the HCL to predict a compatibility of a hardware component in the computer system with the virtualization software. The system then uses the predicted compatibility to manage use of the computer system with the virtualization software.
Type:
Grant
Filed:
December 31, 2013
Date of Patent:
March 21, 2017
Assignee:
Open Invention Network, LLC
Inventors:
Geoffrey G. Thomas, John Whaley, Umesh Agashe
Abstract: A user-portable computing device configured as a smart card enables a user to carry identification information and to generate security tokens for use in authenticating the user to a service provider. The device includes memory for storing user identities as information cards that are exported to a host computer, presented to a user in visual form, and then selected for use in the authentication process. A security token service installed on the device issues a security token in response to a token request sent from the host computer that references the selected user identity. The security token service uses user attribute information stored on the user device to compose the claim assertions needed to issue the security token. The token is returned to the host computer and used to facilitate the authentication process.
Abstract: A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of information stored in the carrier, and more specifically to limit the amount of information available to a potential defrauder, electronic components such as circuits, I/O, cryptographic, memory and dummy objects are built, modified or influenced on demand from physical characteristics of an eligible person or device. Digitized unique biometric or hardware identifiers are read upon start-up and runtime of the device and, in case of an eligible person or device, subsequently supply all values necessary for determination of the characteristics of the user specific virtual smart cards objects, their placement and connections. By multi-factor authentication, the end-user or device will retain sole control of its keys and use them for authentication, signature or encryption purposes as if he had a physical smart card in his hand.
Abstract: Wireless device gesture detection and operational control comprises identifying a first position of the device based on a sensor reading of at least one sensor operating as part of the device. The method may also include identifying a change in the device's position to a second position that is different from the first position, and receiving a specific pattern of touch input data on a touch pad of the device, the specific pattern of touch input data identified as a predefined object which corresponds to dimensions of a human ear being pressed against the touch pad and changing a current operating state of the device to a different operating state based on a comparison and detection operation.
Abstract: The disclosed embodiments provide a system that processes data. The system includes a first client that encrypts a first set of data, uploads the encrypted first set of data to a volume on a cloud storage system, and creates a commit record of the upload. The system also includes a synchronization server that verifies access to the volume by the first client and includes the commit record in a change set containing a set of commit records associated with the volume. The synchronization server also signs the change set and provides the change set for use in synchronizing the upload with a second client.
Type:
Grant
Filed:
July 12, 2016
Date of Patent:
March 21, 2017
Assignee:
Open Invention Network, LLC
Inventors:
John Whaley, Thomas Joseph Purtell, II, Geoffrey G. Thomas
Abstract: A method and system for storage checkpointing of an independent computer application. The independent computer application is launched by a coordinator; and the coordinator installs at least one of an exec interceptor and a fork interceptor. The coordinator also installs at least one file operations interceptor for all file operations and registers the independent computer application with the coordinator. The independent computer application is run and the at least one file operations interceptor is called upon encountering a file operation. The file operations interceptor logs a file event in a file operations database and passes the operation to at least one of a file system, an operating system, at least one or more device drivers, and a storage disk via a storage interface. The file operations interceptor also verifies that the file operation has been issued.
Type:
Grant
Filed:
September 30, 2015
Date of Patent:
March 21, 2017
Assignee:
Open Invention Network LLC
Inventors:
Allan Havemose, Keith Richard Backensto
Abstract: An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity information within the context of an authentication process. A combination includes an identity selector, a privacy engine, and a ruleset. The identity selector directs the release of a user identity as a security token to satisfy the requirements dictated by a security policy. Prior to release of the user identity, the engine conducts a privacy enforcement process that examines the privacy policy of the service provider and determines its acceptability. The engine evaluates a ruleset against the privacy policy. A preference editor enables the user to construct, in advance, the ruleset embodying the user's privacy preferences regarding the disclosure of identity information. Based on the evaluation results, the user can either approve or disapprove the privacy policy, and decide whether to proceed with disclosure of the user identity.
Abstract: A system, method, and computer-readable medium that facilitate software configuration of assistive computer devices by automatically assessing a user's capabilities through questions and tasks are provided. The analysis results of the user's capabilities are then available to assistive computer software applications which may subsequently update their interfaces accordingly. A mapping mechanism from an external input device into a target software application is facilitated for software applications that do not include assistive technology features.