Abstract: A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Abstract: Mobile agents can be deployed to mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. The region of interest may be a mobile and/or dynamic region of interest defined by, for example, a proximity to one or more mobile wireless access points or by an overlapping peer-to-peer communication range of a plurality of mobile devices that are configured to support the agent.
Abstract: A method and apparatus of detecting user initiated movement by an input element handled by a user is disclosed. The method may include performing a calibration procedure that is initiated by the user via a physical movement performed by the user. The method may also include positioning at least one sensor to dynamically adjust a size of an effective workspace range capable of detecting the user's movement of the input element.
Abstract: Wireless device gesture detection and operational control comprises identifying a first position of the device based on a sensor reading of at least one sensor operating as part of the device. The method may also include identifying a change in the device's position to a second position that is different from the first position, and receiving a specific pattern of touch input data on a touch pad of the device, the specific pattern of touch input data identified as a predefined object which corresponds to dimensions of a human ear being pressed against the touch pad and changing a current operating state of the device to a different operating state based on a comparison and detection operation.
Abstract: An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity information within the context of an authentication process. A combination includes an identity selector, a privacy engine, and a ruleset. The identity selector directs the release of a user identity in the form of a security token to satisfy the requirements dictated by a security policy. Prior to release of the user identity, the engine conducts a privacy enforcement process that examines the privacy policy of the service provider and determines if it is acceptable. The engine evaluates a ruleset against the privacy policy. A preference editor enables the user to construct, in advance, the ruleset, which embodies the user's privacy preferences regarding the disclosure of identity information.
Abstract: To provide proxy address neutrality, in particular for mobile server devices, a server application can register its network address with a discovery application. Whenever the server application acquires a new network address, the server application updates the discovery application. A client application providing proxy services for the server application can invoke calls to the server client using the network address for the server application that is currently stored in the client device. If the current network address is invalid, the client application obtains an updated network address from the discovery application.
Type:
Grant
Filed:
April 2, 2011
Date of Patent:
July 22, 2014
Assignee:
Open Invention Network, LLC
Inventors:
Thomas T. Wheeler, Robert W. Peterson, Qin Ye
Abstract: The illustrative embodiments described herein provide systems and methods for printing a document from a mobile communication device. In one embodiment, the method includes receiving a print job sent from the mobile communication device and determining a location of the mobile communication device. The method also includes identifying a printer proximate the mobile communication device and initiating execution of the print job at the identified printer.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid sequence of touch events on a touch sensitive device. A first sequence of touch events is received, a proximity between any two touch events of the first sequence of touch events being greater than a proximity threshold. A second sequence of touch events is received. The touch events from the first and the second sequence are combined if a time difference between the first and the second sequence of touch events is below a time threshold and a proximity between the first and the second sequence of touch events is less than the proximity threshold. A valid sequence of touch events is determined if a combined pressure of the first and the second sequence of touch events is greater than a pressure threshold.
Abstract: Embodiments of the present invention generally provide for multi-dimensional disk arrays and methods for managing same and can be used in video surveillance systems for the management of real-time video data, image data, or combinations thereof.
Abstract: A system, method, and computer readable medium for providing application isolation to one or more applications. The system may include an isolated environment including application files and executables, and an interception layer intercepting access to system resources and interfaces. The system may further include an interception database maintaining mapping between the system resources inside the isolated environment and outside, and a host operating system, wherein the isolated environments are saved on at least one of a local and remote storage.
Abstract: A multimedia collaboration system that facilitates more efficient, free-flowing collaboration sessions. In order to make addition of new participants, media components, and or network access device to a collaboration session more efficient, client devices associated with each participant can store endpoint address information that can be automatically obtained by the multimedia collaboration system. The endpoint address information can then be used to add the new participants, media components, and or network access device.
Abstract: In order to optimize efficiency of deserialization, a serialization cache is maintained at an object server. The serialization cache is maintained in conjunction with an object cache and stores serialized forms of objects cached within the object cache. When an inbound request is received, a serialized object received in the request is compared to the serialization cache. If the serialized byte stream is present in the serialization cache, then the equivalent object is retrieved from the object cache, thereby avoiding deserialization of the received serialized object. If the serialized byte stream is not present in the serialization cache, then the serialized byte stream is deserialized, the deserialized object is cached in the object cache, and the serialized object is cached in the serialization cache.
Abstract: The present invention relates to systems and methods for registry driven transformation of a document exchanged between businesses or applications. More particularly, it relates to systems and protocols for using one or more commonly accessible registries to transform electronic commerce documents among dissimilar interfaces, preferably XML documents. Particular aspects of the present invention are described in the claims, specification and drawings.
Type:
Application
Filed:
February 18, 2014
Publication date:
June 12, 2014
Applicant:
Open Invention Network, LLC
Inventors:
Christopher Todd INGERSOLL, Jayaram Rajan KASI, Alexander HOLMES, Michael CLARK, Ashok ALETTY, Sathish Babu K. SENATHI, Helen S. YUEN
Abstract: A method for changing configuration settings of a telephony system comprises initiating a telephony configuration service, establishing service rights associated with a telephone number, a step for presenting one or more selectable options consistent with the service rights, at least one of which corresponds to a configuration setting change for a call-forwarding task. Additionally, the method includes a step for presenting one or more call-forwarding task options, a step for receiving a selection of at least one of the call-forwarding task options, a step for confirming the selection of at least one of the call-forwarding task options, and changing at least one configuration setting of a telephony system based at least in part upon a received selection of at least one of the call-forwarding task options.
Abstract: A computer readable medium and method providing checkpointing to Windows application groups, the computer readable medium having computer-executable instructions for execution by a processing system. The computer-executable instructions may be for launching an application and creating one or more application threads, receiving a checkpoint signal by an application thread, and entering a checkpoint Asynchronous Procedure Call (APC) handler at IRQL APC_LEVEL, the APC handler disposed in a kernel module, acquiring an ETHREAD block and user-mode context for the application thread, and examining an execution state of the one or more application threads at a time of the checkpoint signal.
Type:
Grant
Filed:
December 15, 2008
Date of Patent:
June 10, 2014
Assignee:
Open Invention Network, LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: A method and system of checkpointing multi-threaded applications, and multi-process application groups on Windows operating systems. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. Further, checkpointing may be configured to perform live migration. In the exemplary embodiment, checkpoints are triggered asynchronously using Asynchronous Procedure Calls (APC).
Type:
Grant
Filed:
December 15, 2008
Date of Patent:
June 10, 2014
Assignee:
Open Invention Network, LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: A method and system for storage checkpointing of an independent computer application. The independent computer application is launched by a coordinator; and the coordinator installs at least one of an exec interceptor and a fork interceptor. The coordinator also installs at least one file operations interceptor for all file operations and registers the independent computer application with the coordinator. The independent computer application is run and the at least one file operations interceptor is called upon encountering a file operation. The file operations interceptor logs a file event in a file operations database and passes the operation to at least one of a file system, an operating system, at least one or more device drivers, and a storage disk via a storage interface. The file operations interceptor also verifies that the file operation has been issued.
Type:
Grant
Filed:
April 24, 2012
Date of Patent:
June 3, 2014
Assignee:
Open Invention Network, LLC
Inventors:
Allan Havemose, Keith Richard Backensto
Abstract: A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Abstract: Systems and methods for dynamically configuring and optimizing a multimedia conference session. An exemplary method of the invention may include providing a plurality of services to be used in the multimedia conference session, wherein each of the plurality of services may be hosted by and independently executable through at least one service endpoint in a communications network. Further, a plurality of users may be enabled to participate in the multimedia conference session. In particular, each user may participate in the conference session through a respective user endpoint in the communications network, where the respective user endpoint may be hosted by and independently executable through at least one service endpoint. Each service endpoint is configurable as an authentication service and a presence service such that the at least one service endpoint is operable to authenticate and publish a presence of each user endpoint.
Type:
Grant
Filed:
February 28, 2013
Date of Patent:
May 27, 2014
Assignee:
Open Invention Network, LLC
Inventors:
Dan Jones, Todd Vernon, Emmanuel Puentes, Charles Wanek, William Marcum
Abstract: A method, system, and computer program product for maintaining a web session data spanning multiple servers. A web session is initiated for a web-based application via a client browser. A unique session key is generated for the web session and the web-based application. The session key is stored in the client browser. A web session page-level object is initialized. Session data is then loaded into a memory-mapped cache. Requests for session data from the client browser are received and responded to via a plurality of servers. The modified session data generated during the session is stored into a session database. The web session object is then flushed at the end of the session.