Abstract: Some embodiments of the present invention provide methods, computer media encoding instructions, and systems for receiving write requests directed to non-sequential logical block addresses and writing the write requests to sequential disk block addresses in a storage system. Some embodiments further include overprovisioning a storage system to include an increment of additional storage space such that it is more likely a large enough sequential block of storage will be available to accommodate incoming write requests.
Abstract: A method, system, and program product are provided for updating software deployed on computers in an enterprise computer network wherein each computer has a software update agent installed to enable the computer to receive software patch updates. The method includes determining a required software component and updates based upon a location in a configuration file; determining a version of the agent and updating the agent if required; selecting a server from which required updates are to be downloaded; scanning a plurality of software components on a selected computer and comparing the components with updates available on the server to determine required updates; downloading the required patches from the server; and installing the patches on the selected computer. The system includes components that perform the method steps when operated on a computer in the network. A computer readable medium implements the method for updating software deployed on computers in a network.
Abstract: Disclosed are examples of modifying a current state of a mobile station based on the location of the mobile station with respect to a nearby acquaintance. The method may include detecting a presence of a mobile station in a predefined domain area identified by an application, the predefined domain area being associated with at least one acquaintance, and performing a modification to a current state of the mobile station based on a level associated with the at least one acquaintance.
Abstract: Herein is described a tokenless biometric method for processing electronic transmissions, using at least one user biometric sample, an electronic identicator and an electronic rule module clearinghouse. The steps for processing of the electronic transmissions comprise of a user registration step, wherein a user registers with an electronic identicator at least one registration biometric sample taken directly from the person of the user.
Abstract: A system, method, computer program, and/or computer readable medium for providing hierarchical interception for applications within isolated environments The computer readable medium includes computer-executable instructions for execution by a processing system. The computer-executable instructions may be for installing interceptors, configuring interceptors, preloading shared libraries, using trampoline functions, removal of interceptors, mapping between resources inside and outside the isolated environment, providing an interception database, loading the interception database, redirection of resources, and providing the hierarchy of interceptors.
Abstract: Tokenless biometric authorization of transaction between a consumer and a merchant uses an identicator and an access device. A consumer registers with the identicator a biometric sample taken from the consumer. The consumer and merchant establish communications via the access device. The merchant proposes a transaction to the consumer via the access device. The access device communicates to the merchant associated with the access device. After the consumer and merchant have agreed on the transaction, the consumer and the identicator use the access device to establish communications. The access device communicates to the identicator the code associated with the access device. The identicator compares biometric sample from the consumer with registered biometric sample. Upon successful identification, the identicator forwards information regarding the consumer to the merchant.
Type:
Grant
Filed:
October 28, 2011
Date of Patent:
May 28, 2013
Assignee:
Open Invention Network, LLC
Inventors:
Philip D. Lapsley, Philip J. Gioia, Michael Kleeman
Abstract: A method, system and program product for group policy backup management in a network having a plurality of domains including components and modules for steps of retrieving a list of group policy objects for a domain, generating a configuration initialization file including a domains section identifying a plurality of domains that are to be backed up and a setup section specifying a plurality of values that control the backup of each policy object in each domain, determining a digital signature for each policy object on a list of policies for the domain, comparing the digital signature for each policy object with a corresponding previous digital signature for each policy, determining if a current digital signature for each policy object matches the corresponding previous digital signature for a policy, and backing up a policy object having a current digital signature that does not match the corresponding previous digital signature.
Abstract: A system, method, computer program and/or computer readable medium for providing streaming of one or more applications from streaming servers onto one or more clients. The computer readable medium includes computer-executable instructions for execution by a processing system. The one or more applications are contained within one or move isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
June 29, 2012
Date of Patent:
April 2, 2013
Assignee:
Open Invention Network, LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
July 21, 2011
Date of Patent:
April 2, 2013
Assignee:
Open Invention Network, LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Abstract: A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Abstract: A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy.
Abstract: A method is provided for generating height information for an arbitrary-image point on a rectified image and for generating a representation of the rectified image that includes the height information. According to an exemplary embodiment, height information is generated for an arbitrary-image point on the rectified image from first and second aerial images having respective first and second sets of rational polynomial coefficients (RPCs) and projective geometrical relationships, such that the first and second aerial images and the rectified image include overlapping image locations.
Abstract: A system and method of offering a redemption account that allows users to purchase in advance and subsequently redeem products and services from one or more vendors that are affiliated with the system. The present invention imparts a process by which users enrolled in a biometric authorization system can access a redemption account for advance purchased products and services by submitting their biometric data. Information stored in the user record can then be utilized to enable the fulfillment of the advance purchase.
Type:
Grant
Filed:
December 16, 2008
Date of Patent:
February 5, 2013
Assignee:
Open Invention Network, LLC
Inventors:
Timothy L. Robinson, Bradford R. Schildt, Tennille V. Goff, Daniel J. Corwin, Timothy Neil Watson
Abstract: A method, system and program product for printer driver management in an enterprise network. Each requested printer driver is tested in a controlled environment to determine if the driver is compatible with at least one other driver in a set of drivers. The tested printer driver is conditioned for inclusion in a central repository that stores a plurality of sets of versioned drivers, if the printer driver is determined to be compatible. The tested driver and at least one associated file are packaged and stored in the central repository. The tested driver and associated file are deployed to at least one server hosting a distributed file share. The tested driver and associated file are downloaded to at least one print server. Driver files are touched with a date and time stamp so that workstations will automatically download updated printer drivers from the print server.
Abstract: The present invention relates to devices and methods that coordinate an external conversation process between entities with an internal workflow of one of the entities. More particularly, it relates to devices and methods that are compliant with an inter-enterprise conversation process standard for routing electronic commerce documents between enterprises. Particular aspects of the present invention are described in the claims, specification and drawings.
Abstract: An aspect of the present invention includes a protocol for conveying data during an e-commerce session with a polymorphic response, comprising initiating a session with a message from a buyer application to a broker application and a session identifier assigned by the broker application; conducting the session between the buyer application and a supplier application; and concluding the session with a additional message which includes a schema identifier for the additional message, resolvable in a context of a system identifier; and a polymorphic response comprising a type and a version, wherein the polymorphic response includes additional data elements corresponding to values assigned to the type and version.
Type:
Application
Filed:
September 13, 2012
Publication date:
January 3, 2013
Applicant:
Open Invention Network
Inventors:
Mudita Jain, Jari Koistinen, Charles Boyle, Brian Hayes
Abstract: A method and system of checkpointing single process application groups and multi-process application groups. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. In the exemplary embodiment, each application may use both fork( ) and exec( ) in any combination.
Type:
Grant
Filed:
November 22, 2011
Date of Patent:
January 1, 2013
Assignee:
Open Invention Network LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: The present invention is a system and method of enrolling potential system users for a biometric system for identity verification. Potential system user information is entered into the system, either by the user or a system operator, and is stored as a partially-enabled user record. The user of a partially-enabled user record fully enables the record by presenting information previously stored in the user record and presenting the remainder of user information necessary to complete record activation. Enrollment data is used to authenticate the system user's identity and authorize related transaction accesses in a biometric system for identity verification.
Type:
Grant
Filed:
October 11, 2010
Date of Patent:
December 25, 2012
Assignee:
Open Invention Network LLP
Inventors:
Timothy L. Robinson, Bradford R. Schildt, Tennille V. Gott, Mark B. Robinson