Abstract: An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity information within the context of an authentication process. A combination includes an identity selector, a privacy engine, and a ruleset. The identity selector directs the release of a user identity in the form of a security token to satisfy the requirements dictated by a security policy. Prior to release of the user identity, the engine conducts a privacy enforcement process that examines the privacy policy of the service provider and determines if it is acceptable. The engine evaluates a ruleset against the privacy policy. A preference editor enables the user to construct, in advance, the ruleset, which embodies the user's privacy preferences regarding the disclosure of identity information.
Abstract: Managing the execution of print jobs may provide, in one example method of operation, receiving a print job associated with a set of print job parameters. The print job is sent from a computing device associated with a user. The method also includes accessing a set of user parameters associated with the user, and determining a print job priority for the print job using the set of print job parameters and the set of user parameters. The method further includes identifying a destination printer capable of executing the print job using the set of print job parameters. The method still also includes initiating execution of the print job at the destination printer in response to determining to execute the print job based on the print job priority.
Abstract: The present application includes various information retrieval and query creation procedures. One example provides identifying a most recent interest from user device submitted data, searching a database for instances of the most recent interest, creating a new category based on the most recent interest, storing the new category in memory, combining the new category with query search terms and submitting a combined query, receiving combined query results, and creating a modified user interface based on the results of the combined query. The result may provide optimized results in subsequent search operations.
Abstract: A peripheral device connected to a local electronic device which is connected to at least one communication network can communicate with a peripheral device attached to a remote electronic device as if the remote peripheral device was locally attached. Data designated for the remote peripheral device is received by a local virtual device object and transmitted to the remote electronic device via at least one of the electronic devices communication interfaces or peripheral devices. Data received by the remote electronic device's communication interface or peripheral device is written to the peripheral device at the remote electronic device by a virtual device object. For compensation of different transfer speeds or outages between the peripheral device and the communication interface or another peripheral device the virtual device provides the ability to utilize the virtual devices emulation driver that is attached to the virtual device object as an I/O buffer.
Abstract: A touch sensitive device is configured to determine commands based on a plurality of touch events on the touch sensitive device. At least a first predetermined number of touch events is detected on the touch sensitive device. At least a second predetermined number of control points is determined based on the detected at least first predetermined number of touch events. A command is determined based on a change in value of at least one parameter related to at least two of the control points. A first data object and a second data object are processed based on a preselected common attribute tag using the determined command.
Abstract: In one aspect, the invention provides a method for generating a sales lead for the sale of a CVR system. The method comprises initiating a call in which a human calls an organization and interacts with an interactive voice response (IVR) system that defines an interface to a database for an organization in order to obtain information from the database; generating a first audio file comprising a recording of the interaction; generating a second audio file comprising a recording of an interaction of the caller with a CVR system in order to obtain the same information from the database; presenting the first and second audio files to a decision maker in the organization who has some influence on a decision to purchase the CVR system; tracking when the decision maker accesses the audio files; and initiating contact with the decision maker once access of the audio files is established.
Abstract: Certain aspects of the present disclosure relate to a technique to access a data source from a client using a driver. A data source name (DSN) is provided to connect to the data source using the driver. The driver is used to interface between the client and an implementation of a driver interface to access the data source based on the DSN.
Abstract: A collaborative communication system that includes a plurality of endpoints and interconnecting nodes configured to communicate via messages over interconnecting channels. Each of the plurality of endpoints and/or interconnecting nodes can determine whether to apply protection to the messages on a per message basis and/or base on the interconnecting channel being used. Thus, a balance between adequate protection and use of system resources and bandwidth can be maintained.
Abstract: A system, method, and computer readable medium for statistical application-agnostic fault detection of multi-process applications. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on a host. Interceptors collect statistical events and sends said events to a statistical fault detector. The statistical fault detector creates one or more distributions and compares recent statistical event data to historical statistical event data and uses deviation from historical norm for fault detection. The present invention detects faults both within the application and within the environment wherein the application executes, if conditions within the environment cause impaired application performance. The invention also teaches consensus fault detection and elimination of cascading fault notifications based on a hierarchy of events and event groups.
Abstract: The last known location of a lost or stolen device can be determined based on the device's last communication with a data network. A portable device can be set up to communicate its location to or through a server to a second client after the portable device after at least one of the portable device obtains a wireless connection to a data network and registers a most recent location with the server. A device location based on data network router IP address or GPS. A location can be stored until a subsequent location and/or wireless connection is obtained. The server can be programmed to send at least one of “lost” message, ringtone, lock code and wipe command to a lost or stolen portable device. The server or lost device can be programmed to provide map location information to the second client for last known location of the lost portable device.
Abstract: Certain aspects of the present disclosure relates to processing functionality of a Configuration Manager Computer Association Tool (CMCA) to an Operating System Deployment (OSD) computer association process. The disclosure includes processing the Operating System Deployment (OSD) functionality of a Microsoft System Center Configuration Manager (SCCM) to configure a server, wherein the OSD causes the server to a Pre-boot Execution Environment (PXE Boot). The SCCM may be launched for the PXE boot process to be associated with the server and configure the SCCM to associate with a specific OSD Task Sequence. Boot from a Network Interface Card (NIC) that has an associated MAC address, using the PXE, wherein the PXE boot process then hands the operation over to the designated OSD Task Sequencer (TS) which handles the configuration process according to at least one variable.
Type:
Grant
Filed:
May 10, 2016
Date of Patent:
October 16, 2018
Assignee:
Open Invention Network LLC
Inventors:
Colin Lee Feeser, Robert Moore Gilbert, Richard A. Paul, Jr., Robert Keith Cahoon
Abstract: Methods, articles, signals, and systems are provided for adaptively shrinking software. The software includes one or more adaptive features. A tracking facility tracks use of the adaptive features, and when it is determined that a given feature is unwanted or unnecessary in the software configuration preferred by a given user, a separation facility separates the feature from the rest of the software. The feature is then archived or deleted. In this manner, resources such as disk space are conserved, program load time and memory requirements are reduced, and user interfaces and supporting code are tailored to meet the needs of particular users.
Abstract: A method and system for checkpointing at least one application in an application group. At least one full checkpoint and at least one incremental checkpoint are created for the application in the application group. The at least one incremental application checkpoint is merged against the at least one full application checkpoint, and checkpointing across all applications in the application group is synchronized. A storage checkpoint is taken for at least one of the full checkpoint and the incremental checkpoint, and memory and storage checkpoints are synchronized and consistent.
Type:
Grant
Filed:
April 2, 2018
Date of Patent:
October 16, 2018
Assignee:
Open Invention Network LLC
Inventors:
Allan Havemose, Keith Richard Backensto
Abstract: Disclosed is an electrical device and method of automatically searching for and connecting to known or unknown available public communication infrastructure and/or devices in the vicinity using a multi-layer communication model. Each layer may include binding information for local available communication methods and shareable hardware devices, a routing table, and, if applicable, one or more logon profiles for service providers. Communication layers may be built by searching for available public communication infrastructure and/or devices in the vicinity by actively sending out connection requests to all addressable destinations along the available transport medium. Each node is able to access and use the communication infrastructure of each other node. Switching between layers as they become inoperable and/or become available without any user interaction required is also possible.
Abstract: A system, method, and computer-readable medium that facilitate software configuration of assistive computer devices by automatically assessing a user's capabilities through questions and tasks are provided. The analysis results of the user's capabilities are then available to assistive computer software applications which may subsequently update their interfaces accordingly. A mapping mechanism from an external input device into a target software application is facilitated for software applications that do not include assistive technology features.
Abstract: Embodiments of the present invention generally provide for multi-dimensional disk arrays and methods for managing same and can be used in video surveillance systems for the management of real-time video data, image data, or combinations thereof.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid touch event on a touch sensitive device. At least two touch events are received from a touch interface. The at least two touch events are combined if a time difference between each of the at least two touch events is less than a time threshold and a proximity between each of the at least two touch events is less than a proximity threshold. A valid touch event is determined if a combined pressure indicator of a combined touch event is greater than a pressure threshold.
Abstract: Navigation applications may utilize various input data to determine various navigation routes. One example method of operating may include providing at least one navigation instruction to a navigation device via a navigation application, detecting the at least one instruction via a detection application, obtaining an image of a physical object, performing a holo-acoustic object manipulation of the physical object, and providing a visual display of the holo-acoustic manipulation as an additional navigation instruction.
Abstract: The present invention is a system and method of enrolling potential system users for a biometric system for identity verification. Potential system user information is entered into the system, either by the user or a system operator, and is stored as a partially-enabled user record. The user of a partially-enabled user record fully enables the record by presenting information previously stored in the user record and presenting the remainder of user information necessary to complete record activation. Enrollment data is used to authenticate the system user's identity and authorize related transaction accesses in a biometric system for identity verification.
Type:
Grant
Filed:
June 28, 2016
Date of Patent:
October 2, 2018
Assignee:
Open Invention Network, LLC
Inventors:
Timothy L. Robinson, Bradford R. Schildt, Tennille V. Goff, Mark B. Robinson