Abstract: Disclosed are examples of modifying a current state of a mobile station based on the location of the mobile station with respect to a nearby acquaintance. The method may include detecting a presence of a mobile station in a predefined domain area identified by an application, the predefined domain area being associated with at least one acquaintance, and performing a modification to a current state of the mobile station based on a level associated with the at least one acquaintance.
Abstract: Some embodiments of the present invention provide methods, computer media encoding instructions, and systems for receiving write requests directed to non-sequential logical block addresses and writing the write requests to sequential disk block addresses in a storage system. Some embodiments further include overprovisioning a storage system to include an increment of additional storage space such that it is more likely a large enough sequential block of storage will be available to accommodate incoming write requests.
Abstract: Herein is described a tokenless biometric method for processing electronic transmissions, using at least one user biometric sample, an electronic identicator and an electronic rule module clearinghouse. The steps for processing of the electronic transmissions comprise of a user registration step, wherein a user registers with an electronic identicator at least one registration biometric sample taken directly from the person of the user.
Abstract: A system, method, computer program, and/or computer readable medium for providing hierarchical interception for applications within isolated environments The computer readable medium includes computer-executable instructions for execution by a processing system. The computer-executable instructions may be for installing interceptors, configuring interceptors, preloading shared libraries, using trampoline functions, removal of interceptors, mapping between resources inside and outside the isolated environment, providing an interception database, loading the interception database, redirection of resources, and providing the hierarchy of interceptors.
Abstract: Tokenless biometric authorization of transaction between a consumer and a merchant uses an identicator and an access device. A consumer registers with the identicator a biometric sample taken from the consumer. The consumer and merchant establish communications via the access device. The merchant proposes a transaction to the consumer via the access device. The access device communicates to the merchant associated with the access device. After the consumer and merchant have agreed on the transaction, the consumer and the identicator use the access device to establish communications. The access device communicates to the identicator the code associated with the access device. The identicator compares biometric sample from the consumer with registered biometric sample. Upon successful identification, the identicator forwards information regarding the consumer to the merchant.
Type:
Grant
Filed:
October 28, 2011
Date of Patent:
May 28, 2013
Assignee:
Open Invention Network, LLC
Inventors:
Philip D. Lapsley, Philip J. Gioia, Michael Kleeman
Abstract: A method, system and program product for group policy backup management in a network having a plurality of domains including components and modules for steps of retrieving a list of group policy objects for a domain, generating a configuration initialization file including a domains section identifying a plurality of domains that are to be backed up and a setup section specifying a plurality of values that control the backup of each policy object in each domain, determining a digital signature for each policy object on a list of policies for the domain, comparing the digital signature for each policy object with a corresponding previous digital signature for each policy, determining if a current digital signature for each policy object matches the corresponding previous digital signature for a policy, and backing up a policy object having a current digital signature that does not match the corresponding previous digital signature.
Abstract: A system, method, computer program and/or computer readable medium for providing streaming of one or more applications from streaming servers onto one or more clients. The computer readable medium includes computer-executable instructions for execution by a processing system. The one or more applications are contained within one or move isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
July 21, 2011
Date of Patent:
April 2, 2013
Assignee:
Open Invention Network, LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
June 29, 2012
Date of Patent:
April 2, 2013
Assignee:
Open Invention Network, LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Abstract: A method is provided for generating height information for an arbitrary-image point on a rectified image and for generating a representation of the rectified image that includes the height information. According to an exemplary embodiment, height information is generated for an arbitrary-image point on the rectified image from first and second aerial images having respective first and second sets of rational polynomial coefficients (RPCs) and projective geometrical relationships, such that the first and second aerial images and the rectified image include overlapping image locations.
Abstract: A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy.
Abstract: A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Abstract: A method, system and program product for printer driver management in an enterprise network. Each requested printer driver is tested in a controlled environment to determine if the driver is compatible with at least one other driver in a set of drivers. The tested printer driver is conditioned for inclusion in a central repository that stores a plurality of sets of versioned drivers, if the printer driver is determined to be compatible. The tested driver and at least one associated file are packaged and stored in the central repository. The tested driver and associated file are deployed to at least one server hosting a distributed file share. The tested driver and associated file are downloaded to at least one print server. Driver files are touched with a date and time stamp so that workstations will automatically download updated printer drivers from the print server.
Abstract: A system and method of offering a redemption account that allows users to purchase in advance and subsequently redeem products and services from one or more vendors that are affiliated with the system. The present invention imparts a process by which users enrolled in a biometric authorization system can access a redemption account for advance purchased products and services by submitting their biometric data. Information stored in the user record can then be utilized to enable the fulfillment of the advance purchase.
Type:
Grant
Filed:
December 16, 2008
Date of Patent:
February 5, 2013
Assignee:
Open Invention Network, LLC
Inventors:
Timothy L. Robinson, Bradford R. Schildt, Tennille V. Goff, Daniel J. Corwin, Timothy Neil Watson
Abstract: The present invention relates to devices and methods that coordinate an external conversation process between entities with an internal workflow of one of the entities. More particularly, it relates to devices and methods that are compliant with an inter-enterprise conversation process standard for routing electronic commerce documents between enterprises. Particular aspects of the present invention are described in the claims, specification and drawings.
Abstract: A method and system of checkpointing single process application groups and multi-process application groups. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. In the exemplary embodiment, each application may use both fork( ) and exec( ) in any combination.
Type:
Grant
Filed:
November 22, 2011
Date of Patent:
January 1, 2013
Assignee:
Open Invention Network LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: A system, method, and computer readable medium for providing application isolation to one or more applications and their associated resources. The system may include one or more isolated environments including application files and executables, and one or more interception layers intercepting access to system resources and interfaces. Further, the system may include an interception database maintaining mapping between the system resources inside the one or more isolated environments and outside, and a host operating system. The one or more applications may be isolated from other applications and the host operating system while running within the one or more isolated environments.
Abstract: A method, system and program product for customization of a plurality of servers in a computer network. A server customizer module is generated that includes a server customizer initialization file containing a plurality of arguments for populating and running a plurality of standardized applications, scripts and utilities on each server. The server customizer module is installed on each of the plurality of servers for subsequent execution as part of the server build/customization process. A server unattended install launch module, cooperative with the server customizer module is generated that includes an unattended install launch initialization file for launching a plurality of standardized processes on each server. The server unattended install launch module is installed on each of the plurality of servers for subsequent execution as part of the server build/customization process.
Abstract: A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation configuration file is created for the computer system. A maintenance service utility is configured to launch a compliance validation executable file at a specified time during operation of the computer system. A digital hash is generated for the compliance validation executable file and for the compliance validation configuration file. A determination is made if the computer system or a computer system user is a member of a configured restricted group. If the computer system or the computer system user is a member of a configured restricted group, a determination is made if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site.
Type:
Grant
Filed:
May 18, 2011
Date of Patent:
October 30, 2012
Assignee:
Open Invention Network LLC
Inventors:
Colin Lee Feeser, Anthony William Ondrus, Mark Jackson Canup