Abstract: The present invention includes a method of providing users with formatted access to XML and similar documents received from trading partners using a general purpose viewer or browser. Particular aspects of the present invention are described in the claims, specification and drawings.
Type:
Grant
Filed:
February 11, 2016
Date of Patent:
October 10, 2017
Assignee:
Open Invention Network, LLC
Inventors:
Andrew Everett Davidson, Kelly Lane Schwarzhoff, Gunawan Herri, Changyi Zhu, Ari Krish, Muljadi Sulistio, Sun Keun Lee
Abstract: A system and method for receiving and tracking a plurality of transactions and distributing the transactions to at least two replication queues over a network. The system and method comprise a global queue for storing a number of the received transactions in a first predetermined order. The system and method also comprise a sequencer coupled to the global queue for creating a copy of each of the transactions for each of said at least two replication queues and for distributing in a second predetermined order each said copy to each of said at least two replication queues respectively, said copy containing one or more of the received transactions.
Abstract: In order to determine the location of wireless network devices without inherent location capabilities, a wireless network device such as an access point can receive geolocation information from transient data sources such as mobile devices requiring network access from the access point. The access point stores geolocation records including location coordinates received from the transient data sources. The geolocation records can be processed to determine the position and movement of the access point. The geolocation records and/or location information can be passed to other transient clients that do not have inherent location capability.
Abstract: A method and system for checkpointing at least one application in an application group. At least one full checkpoint and at least one incremental checkpoint are created for the application in the application group. The at least one incremental application checkpoint is merged against the at least one full application checkpoint, and checkpointing across all applications in the application group is synchronized. A storage checkpoint is taken for at least one of the full checkpoint and the incremental checkpoint, and memory and storage checkpoints are synchronized and consistent.
Type:
Grant
Filed:
October 20, 2015
Date of Patent:
October 3, 2017
Assignee:
Open Invention Network LLC
Inventors:
Allan Havemose, Keith Richard Backensto
Abstract: Embodiments of the present invention generally provide for multi-dimensional disk arrays and methods for managing same and can be used in video surveillance systems for the management of real-time video data, image data, or combinations thereof.
Abstract: A system, method, and computer readable medium for providing application isolation to one or more applications. The system may include an isolated environment including application files and executables, and an interception layer intercepting access to system resources and interfaces. The system may further include an interception database maintaining mapping between the system resources inside the isolated environment and outside, and a host operating system, wherein the isolated environments are saved on at least one of a local and remote storage.
Abstract: A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy.
Abstract: Systems, apparatuses, methods, and computer programs for overprovisioning resources are disclosed. Resource usage statistics may be gathered for a plurality of client virtual machines (“VMs”). Statistical characteristics of resource usage by the plurality of client VMs may be calculated. It may also be determined which of the plurality of client VMs requesting resources to allocate resources to, as well as an amount of the resources to allocate, in a given time slot based on the calculated statistical characteristics.
Abstract: Disclosed are an apparatus and method of managing network elements operating on a network. One example method may include transmitting a request to receive at least one activity parameter of a network element operating on the network and monitoring the at least one activity parameter of the network element. The method may include determining whether a usage value of the at least one activity parameter exceeds a predetermined threshold usage value and transmitting a corrective function message to the network element responsive to determining that the usage value of the at least one activity parameter exceeds the predetermined threshold value. The method may further include performing a corrective function to reduce the usage value of the at least one activity parameter.
Abstract: The instant application discloses receiving a command via a processor to initiate a window creation operation on a client computing device, retrieving at least one image tile pre-allocated in a memory of the client computing device, performing a draw operation that places at least one image overplayed onto the at least one image tile and displaying the image overplayed onto the at least one image tile on a display of the client computing device.
Abstract: To enable tracking of a document's history, each time an electronic document is opened, an embedding module obtains one or more document history parameters. The document history parameters may include a MAC address or the computer used to open the document, an operating system, a file size of the document, time of opening the document, a user ID, etc. The embedding module encrypts the document history parameters and embeds them into the document, for example using steganography techniques.
Abstract: The disclosed embodiments provide a system that processes data. During operation, the system uses a first key to protect a write operation on the data. Next, the system uses a second key to protect a read operation on the data.
Type:
Grant
Filed:
February 3, 2017
Date of Patent:
September 5, 2017
Assignee:
Open Invention Network, LLC
Inventors:
Geoffrey G. Thomas, John Whaley, Thomas Joseph Purtell, II
Abstract: Disclosed are an apparatus and method of verifying an application installation procedure. One example method of operation may include receiving an application at a computer device and initiating the installation of the application on the computer device. The method may also provide executing the application during the installation procedure and creating a hash value corresponding to the executed application data. The method may further provide storing the hash value in memory and comparing the hash value to a pre-stored hash value to determine whether to continue the installation of the application.
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
January 4, 2017
Date of Patent:
September 5, 2017
Assignee:
Open Invention Network LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A system, method, and computer readable medium for consistent and transparent replication of multi process multi threaded applications. The computer readable medium includes computer-executable instructions for execution by a processing system. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. Replica consistency between primary application and its replicas is provided by imposing the execution ordering of the primary on all its replicas. The execution ordering on a primary is captured by intercepting calls to the operating system and libraries, sending replication messages to its replicas, and using interception on the replicas to enforce said captured primary execution order. Replication consistency is provided without requiring modifications to the application, operating system or libraries.
Abstract: The present invention provides a module or system and a method that includes: 1) a transparent screen assembly containing an actuator layer lying between two layers of transparent multiple line electrodes, where one electrode layer of forms lines in the x-direction layer and the other electrode layer forms lines in the y-direction; and 2) a controller that is connected to these electrodes. The system and method of the present invention provides: 1) multiple touch sensing on or near a surface of the transparent screen and 2) simultaneous high resolution tactile feedback across the same surface.
Abstract: Certain aspects of the present disclosure relate to a technique to configure a data source name (DSN) for use during a data source access. A driver is selected. An identifier is provided that identifies a class, and a library or an application that implements a driver interface for accessing the data source. A connection string is forwarded with the identifier from an implementation of the driver interface to the driver. The connection string is forwarded from the driver to a driver manager managing a client.
Abstract: An apparatus, method, and a computer program are provided to secure one or more sections of a document. For example, one or more sections of the document may be converted into secured content. The secured content may then be removed from the document, and replaced with replacement content in the document. This may prevent a viewer with no privileges from viewing secured content.
Abstract: The present invention includes a method and device for updating a self-describing, structured document. A further aspect of the present invention is enabling client-based modification of the document. Additional aspects of the present invention are described in the claims, specification and drawings.
Type:
Grant
Filed:
September 14, 2015
Date of Patent:
August 8, 2017
Assignee:
Open Invention Networks, LLC
Inventors:
Muljadi Sulistio, Yang Wei, Kelly Lane Schwarzhoff, Yuan Ding
Abstract: A system dependencies tracking application for large scale Information Technology (IT) systems is provided. In one embodiment, a computing system may capture information related to components of an information technology system and relationship information between each component of the information technology system. The computing system may also store the information related to the components and the relationship information in a database.