Abstract: A system, method, and computer readable medium for providing application isolation to one or more applications and their associated resources. The system may include one or more isolated environments including application files and executables, and one or more interception layers intercepting access to system resources and interfaces. Further, the system may include an interception database maintaining mapping between the system resources inside the one or more isolated environments and outside, and a host operating system. The one or more applications may be isolated from other applications and the host operating system while running within the one or more isolated environments.
Abstract: A method, system and program product for customization of a plurality of servers in a computer network. A server customizer module is generated that includes a server customizer initialization file containing a plurality of arguments for populating and running a plurality of standardized applications, scripts and utilities on each server. The server customizer module is installed on each of the plurality of servers for subsequent execution as part of the server build/customization process. A server unattended install launch module, cooperative with the server customizer module is generated that includes an unattended install launch initialization file for launching a plurality of standardized processes on each server. The server unattended install launch module is installed on each of the plurality of servers for subsequent execution as part of the server build/customization process.
Abstract: A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation configuration file is created for the computer system. A maintenance service utility is configured to launch a compliance validation executable file at a specified time during operation of the computer system. A digital hash is generated for the compliance validation executable file and for the compliance validation configuration file. A determination is made if the computer system or a computer system user is a member of a configured restricted group. If the computer system or the computer system user is a member of a configured restricted group, a determination is made if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site.
Type:
Grant
Filed:
May 18, 2011
Date of Patent:
October 30, 2012
Assignee:
Open Invention Network LLC
Inventors:
Colin Lee Feeser, Anthony William Ondrus, Mark Jackson Canup
Abstract: A system for event-driven live migration of applications between two or more servers. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. Event driven live migration is provided through a combination of process replication, logging, barrier synchronization, reliable messaging and message playback. The event driven live migration is transparent to the application and requires no modification to the application, operating system, networking stack or libraries.
Abstract: The present invention relates to devices and methods that coordinate an external conversation process between entities with an internal workflow of one of the entities. More particularly, it relates to devices and methods that are compliant with an inter-enterprise conversation process standard for routing electronic commerce documents between enterprises. Particular aspects of the present invention are described in the claims, specification and drawings.
Abstract: An aspect of the present invention includes a protocol for conveying data during an e-commerce session with a polymorphic response, comprising initiating a session with a message from a buyer application to a broker application and a session identifier assigned by the broker application; conducting the session between the buyer application and a supplier application; and concluding the session with a additional message which includes a schema identifier for the additional message, resolvable in a context of a system identifier; and a polymorphic response comprising a type and a version, wherein the polymorphic response includes additional data elements corresponding to values assigned to the type and version.
Type:
Grant
Filed:
February 18, 2011
Date of Patent:
October 30, 2012
Assignee:
Open Invention Network
Inventors:
Mudita Jain, Jari Koistinen, Charles Boyle, Brian Hayes
Abstract: A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file.
Abstract: A system, method, and computer readable medium for facilitating user interaction with numerous product suppliers to determine which supplier to utilize for ordering a product based on various parameters are provided. A user may interact with one or more suppliers using similar or different parameters for each supplier within the same application without having to switch to another external application. Results are provided in a visually appealing and logical manner and automate the ordering of an item if that item is found at a particular supplier within predefined thresholds specified by the user. In this manner, orders may be submitted at the moment order thresholds are met, and decisions may be made automatically by one or more of the system, the user, or on an interaction by the user and another individual.
Abstract: A system, method, and computer readable medium for reliable messaging between two or more servers. The computer readable medium includes computer-executable instructions for execution by a processing system. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. The reliable messaging ensures consistent ordered delivery of messages in the event that messages are lost; arrive out of order, or in duplicate. The messaging layer operates over TCP or UDP with our without multi-cast and broad-cast and requires no modification to applications, operating system or libraries.
Abstract: A computer readable medium and method for providing checkpointing to Windows application groups. The checkpointing may be triggered asynchronously using Asynchronous Procedure Calls. The computer readable medium includes computer-executable instructions for execution by a processing system. The computer-executable instructions may be for reviewing one or more command line arguments to determine whether to start at least one of the application groups, and when determining to start the at least one of the application groups, creating a process table in a shared memory to store information about each process of the at least one of the application groups. Further, the instructions may be for registering with a kernel module to create an application group barrier, creating a named pipe for applications of the application group to register and unregister, triggering a checkpoint thread to initiate an application group checkpoint; and launching an initial application of the applications of the application group.
Type:
Grant
Filed:
December 15, 2008
Date of Patent:
October 2, 2012
Assignee:
Open Invention Network LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: Herein is described a tokenless biometric method for processing electronic transmissions, using at least one user biometric sample, an electronic identicator and an electronic rule module clearinghouse. The steps for processing of the electronic transmissions comprise of a user registration step, wherein a user registers with an electronic identicator at least one registration biometric sample taken directly from the person of the user. A formation of a rule module customized to the user in a rule module clearinghouse, wherein at least one pattern data of a user is associated with at least one execution command of the user. A user identification step, wherein the electronic identicator compares a bid biometric sample taken directly from the person of the user with at least one previously registered biometric sample for producing either a successful or failed identification of the user.
Abstract: The present invention includes a method and device for updating a self-describing, structured document. A further aspect of the present invention is enabling client-based modification of the document. Additional aspects of the present invention are described in the claims, specification and drawings.
Type:
Application
Filed:
April 30, 2012
Publication date:
August 23, 2012
Applicant:
Open Invention Networks, LLC
Inventors:
Muljadi Sulistio, Yang Wei, Kelly Lane Schwarzhoff, Yuan Ding
Abstract: A method, system, and computer program product for maintaining a web session data spanning multiple servers. A web session is initiated for a web-based application via a client browser. A unique session key is generated for the web session and the web-based application. The session key is stored in the client browser. A web session page-level object is initialized. Session data is then loaded into a memory-mapped cache. Requests for session data from the client browser are received and responded to via a plurality of servers. The modified session data generated during the session is stored into a session database. The web session object is then flushed at the end of the session.
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
April 28, 2008
Date of Patent:
July 10, 2012
Assignee:
Open Invention Network LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A system and method for enrolling in a biometric authorization system. A system user may be authorized to enroll by providing biometric data from both his person and a third party token.
Type:
Grant
Filed:
June 7, 2004
Date of Patent:
June 12, 2012
Assignee:
Open Invention Network, LLC
Inventors:
Timothy L. Robinson, Bradford R. Schildt, Tennille V. Goff, Daniel J. Corwin
Abstract: A method and system for storage checkpointing of an independent computer application. The independent computer application is launched by a coordinator; and the coordinator installs at least one of an exec interceptor and a fork interceptor. The coordinator also installs at least one file operations interceptor for all file operations and registers the independent computer application with the coordinator. The independent computer application is run and the at least one file operations interceptor is called upon encountering a file operation. The file operations interceptor logs a file event in a file operations database and passes the operation to at least one of a file system, an operating system, at least one or more device drivers, and a storage disk via a storage interface. The file operations interceptor also verifies that the file operation has been issued.
Type:
Grant
Filed:
December 15, 2008
Date of Patent:
June 5, 2012
Assignee:
Open Invention Network, LLC
Inventors:
Allan Havemose, Keith Richard Backensto
Abstract: A system and method for assigning application specific IP addresses to individual applications. The system may be operable to assign a unique IP address to an application, and alias the application IP address to a NIC IP address on the host where the application is running. In an exemplary embodiment, the system may be further operable to migrate the application IP address to a new host as part of a migration, and alias the application IP address to a NIC in the new host as part of the migration.
Abstract: The present invention includes a method and device for updating a self-describing, structured document. A further aspect of the present invention is enabling client-based modification of the document. Additional aspects of the present invention are described in the claims, specification and drawings.
Type:
Grant
Filed:
October 1, 2007
Date of Patent:
May 1, 2012
Assignee:
Open Invention Network, LLC
Inventors:
Muljadi Sulistio, Yang Wei, Kelly Lane Schwarzhoff, Yuan Ding
Abstract: A method is provided for generating height information for an arbitrary-image point on a rectified image and for generating a representation of the rectified image that includes the height information. According to an exemplary embodiment, height information is generated for an arbitrary-image point on the rectified image from first and second aerial images having respective first and second sets of rational polynomial coefficients (RPCs) and projective geometrical relationships, such that the first and second aerial images and the rectified image include overlapping image locations.
Abstract: A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file.