Abstract: A method and system for checkpointing at least one application in an application group. At least one full checkpoint and at least one incremental checkpoint are created for the application in the application group. The at least one incremental application checkpoint is merged against the at least one full application checkpoint, and checkpointing across all applications in the application group is synchronized. A storage checkpoint is taken for at least one of the full checkpoint and the incremental checkpoint, and memory and storage checkpoints are synchronized and consistent.
Type:
Grant
Filed:
October 16, 2018
Date of Patent:
June 4, 2019
Assignee:
Open Invention Network LLC
Inventors:
Allan Havemose, Keith Richard Backensto
Abstract: Managing large amounts of third party client data may require sorting through files for patterns and extracting data to create a customized user interface for the third party client. One example method of operation may include examining file names for data files stored in a database, parsing specified names and specified dates from the file names, categorizing the data files according to the specified names and specified dates, tagging the data files, and transforming content of the data files into a customized data table format associated with known client requirements.
Abstract: In distributed object computing, messages from a source node to a destination node are often required to be routed via one or more intermediate nodes. In order to enhance efficiency of the relay process, a message envelope of a message may include a node list field that specifies the routing path of the message. The communication protocol for communicating the message may specify that when a message is received into a particular node, the node analyzes the node list field. If the identity of the node is last in the node list field, then the node is the destination node and thus the node unmarshals the message. Otherwise, the node forwards the message to the next node in the field list without unmarshalling the message.
Type:
Grant
Filed:
July 18, 2017
Date of Patent:
June 4, 2019
Assignee:
OPEN INVENTION NETWORKS LLC
Inventors:
Qin Ye, Robert W. Peterson, Thomas T. Wheeler
Abstract: A system, method, and program for the processing of large amounts of email based on user-configurable criteria in close to real-time. The invention enables filtering of all journaled emails in an organization for the duration of a regulatory proceeding, or for audit purposes, thus greatly reducing the manual effort required to produce a targeted set of emails. The journaling feature copies all unique emails coming through the distributed email server farm to a smaller set of email mailboxes. The filtering application could run as a batch operation on each of those “journaling” mailboxes at periodic intervals or could run interactively. The user-defined filter criteria are applied to the emails filling up the “journaling” mailboxes, and matches are separated from the non-matches for analysis. The invention can be executed on offline data, such as personal message stores or individual compound message files.
Abstract: Log-Based Rollback Recovery for system failures. The system includes a storage medium, and a component configured to transition through a series of states. The component is further configured to record in the storage medium the state of the component every time the component communicates with another component in the system, the system being configured to recover the most recent state recorded in the storage medium following a failure of the component.
Abstract: A method and apparatus for distribution of applications amongst a number of servers, ensuring that changes to application data on a master for that application are asynchronously replicated to a number of slaves for that application. Servers may be located in geographically diverse locations; the invention permits data replication over high-latency and lossy network connections and failure-tolerance under hardware and network failure conditions. Access to applications is mediated by a distributed protocol handler which allows any request for any application to be addressed to any server, and which, when working in tandem with the replication system, pauses connections momentarily to allow seamless, consistent live-migration of applications and their state between servers.
Abstract: A system, method, and computer readable medium for establishing communication between two devices comprises connecting, by a first computer, to an open source Private Branch Exchange (PBX) platform via a port, receiving a phone number sent by a first one of the two devices at the open source PBX platform, invoking an interface module by the open source PBX platform, where the interface module resides on the open source PBX platform, and building a Calling Name request by the interface module related to the received phone number.
Abstract: A hosting system is provided. The hosting system includes a grid of hardware nodes for provisioning virtual servers including a first virtual server for a first user and a second virtual server for a second user. The hosting system further includes dedicated servers including a first dedicated server for the first user and a second dedicated server for the second user. A switch, in response to the first virtual server and the second virtual server having overlapping virtual local area network (VLAN) identifications (IDs), defines a first broadcast domain for the first user and a second broadcast domain for the second user, places the first virtual server and the first dedicated server in the first broadcast domain, and places the second virtual server and the second dedicated server in the second broadcast domain.
Type:
Grant
Filed:
March 15, 2016
Date of Patent:
May 28, 2019
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Yogesh Angrish, Yueqin Lin, Martin A. Berryman, Justin M. Kitagawa, Paul Lappas
Abstract: A method and system for storage checkpointing of an independent computer application. The independent computer application is launched by a coordinator; and the coordinator installs at least one of an exec interceptor and a fork interceptor. The coordinator also installs at least one file operations interceptor for all file operations and registers the independent computer application with the coordinator. The independent computer application is run and the at least one file operations interceptor is called upon encountering a file operation. The file operations interceptor logs a file event in a file operations database and passes the operation to at least one of a file system, an operating system, at least one or more device drivers, and a storage disk via a storage interface. The file operations interceptor also verifies that the file operation has been issued.
Type:
Grant
Filed:
March 8, 2017
Date of Patent:
May 28, 2019
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Allan Havemose, Keith Richard Backensto
Abstract: An application programming interface (API) may provide accessing an active directory and searching for a native active directory object to identify data stored in the active directory. The procedure may also include retrieving schema information associated with the active directory applying the schema information to an application and overriding the application configuration based on the schema information. The procedure may also include translating the native object into a different language dictionary than a current language dictionary.
Abstract: A method, apparatus, system, and non-transitory computer program product configured to process user call responses and assign caller specific preferences to the user based on the caller's feedback. One example being a method of processing spoken words from a user of a calling platform. This may include operations such as calling a user via a call processing device and/or sending a call prompt message to the user after the user has answered the call, wherein the call prompt message solicits a user response. Other operations may include recording the spoken call greeting and determining whether the spoken call greeting is indicative of a language preference. The system may process the user's word(s) or utterances and assign language preferences to the user based on the user provided information.
Type:
Grant
Filed:
May 14, 2018
Date of Patent:
May 28, 2019
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
James K. Boutcher, David Scheet, Jeffrey William Cordell, Daniel E. Smith
Abstract: Navigation applications may utilize various input data to determine various navigation routes. One example method of operating may include providing at least one navigation instruction to a navigation device via a navigation application, detecting the at least one instruction via a detection application, obtaining an image of a physical object, performing a holo-acoustic object manipulation of the physical object, and providing a visual display of the holo-acoustic manipulation as an additional navigation instruction.
Abstract: A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy.
Abstract: Providing streaming of applications from streaming servers onto clients. The applications are contained within isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include the option of running both in on-line and off-line. When on-line, the system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. When off-line, the system may include the ability to run already installed isolated environments without requiring credentialing. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
Abstract: A method and apparatus of processing caller experiences is disclosed. One example method may include determining a call event type occurring during a call and assigning a weight to the call event type via a processing device. The method may also include calculating a caller experience metric value representing a caller's current call status responsive to determining the at least one call event type, the caller experience metric being a function of the current event type weight and a discounting variable that discounts a value of past events. The method may also provide comparing the caller experience metric to a predefined threshold value and determining whether to perform at least one of transferring the call to a live agent and switching from a current caller modality to a different caller modality.
Abstract: Some embodiments provide a method for extracting and adapting system configuration. The method extracts a first configuration from a first node of a first hosting system. The first node includes several resources for hosting the first configuration. The method analyzes the first configuration in order to determine attributes of the first configuration. The determined attributes may be relevant to hosting the first configuration on a second node of a second hosting system having several nodes. The method generates a second configuration based on the determined attributes. The method then hosts the second configuration at the second node of the second hosting system.
Type:
Grant
Filed:
October 23, 2017
Date of Patent:
May 14, 2019
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
John M. Keagy, Jeffrey Carr, Paul Lappas
Abstract: Mobile agents can be deployed to mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. The region of interest may be a mobile and/or dynamic region of interest defined by, for example, a proximity to one or more mobile wireless access points or by an overlapping peer-to-peer communication range of a plurality of mobile devices that are configured to support the agent.
Abstract: Search queries may be received and optimized prior to performing the search and returning results. One example method of operation includes receiving a search query input from a user device including at least one search term, querying a database to access a user account associated with the user device, retrieving at least one pre-stored search criteria from the user account, combining the pre-stored search criteria with the search query input to create a modified search query input, and transmitting the query to a search application.
Abstract: A system and method for event-driven live migration of applications between two or more servers. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. Event driven live migration is provided through a combination of process replication, logging, barrier synchronization, reliable messaging and message playback. The event driven live migration is transparent to the application and requires no modification to the application, operating system, networking stack or libraries.
Abstract: A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer network through a plurality of inspections. A remote access configuration file is created for the remote access client. A digital hash of the configuration file is then generated. The digital hash is compared with a configuration file stored at a predefined web location. If the comparison results in a match between the digital hash and the stored configuration file, a digital hash comparison is performed between an encrypted remote access configuration file and an encrypted configuration file stored at the predefined web location. If the plurality of inspections are passed, the remote access client is released from a quarantine state and a virtual private network (VPN) connection to the remote access server is established.
Type:
Grant
Filed:
June 13, 2017
Date of Patent:
May 14, 2019
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Colin Lee Feeser, Anthony W. Ondrus, Steven J. Sanders