Abstract: A method and apparatus may be configured to create setup information, and perform the initialization and performance of an installation of a peripheral device of an electronic device. One example method may include storing a device identification (ID) of the peripheral device, extracting data and creating a data structure from existent setup information. The method may also include replacing a device ID in the data structure with the device ID of the peripheral device, and creating and storing a setup information file from content of the data structure. The method may also include creating and passing a request to at least one of a device driver of an interface of the peripheral device and a bus that initiates the installation of the peripheral device. The peripheral device may not be connected to the electronic device.
Abstract: Disclosed are an apparatus and method of verifying an application installation procedure. One example method of operation may include receiving an application at a computer device and initiating the installation of the application on the computer device. The method may also provide executing the application during the installation procedure and creating a hash value corresponding to the executed application data. The method may further provide storing the hash value in memory and comparing the hash value to a pre-stored hash value to determine whether to continue the installation of the application.
Abstract: A multimedia collaboration system that facilitates more efficient, free-flowing collaboration sessions. The role of the presenter can be exchanged among participants in a collaboration session. The multimedia collaboration system is configured so that control of a collaboration session can be exchanged freely between participants in the collaboration session. The multimedia collaboration system enables participants in the collaboration session to determine the pace and course of the session.
Abstract: A client-side user agent operates in conjunction with an identity selector to institute and exercise privacy control management over user identities managed by the identity selector. The user agent includes the combination of a privacy enforcement engine, a storage of rulesets expressing user privacy preferences, and a preference editor. The editor enables the user to direct the composition of privacy preferences relative to user identities. The preferences can be applied to individual cards and to categorized groups of attributes. The engine evaluates the proper rulesets against the privacy policy of a service provider. The privacy preferences used by the engine are determined on the basis of specifications in a security policy indicating the attribute requirements for claims that purport to satisfy the security policy.
Abstract: Disclosed is an electrical device and method of automatically searching for and connecting to known or unknown available public communication infrastructure and/or devices in the vicinity using a multi-layer communication model. Each layer may include binding information for local available communication methods and shareable hardware devices, a routing table, and, if applicable, one or more logon profiles for service providers. Communication layers may be built by searching for available public communication infrastructure and/or devices in the vicinity by actively sending out connection requests to all addressable destinations along the available transport medium. Each node is able to access and use the communication infrastructure of each other node. Switching between layers as they become inoperable and/or become available without any user interaction required is also possible.
Abstract: A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Abstract: An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity information within the context of an authentication process. A combination includes an identity selector, a privacy engine, and a ruleset. The identity selector directs the release of a user identity in the form of a security token to satisfy the requirements dictated by a security policy. Prior to release of the user identity, the engine conducts a privacy enforcement process that examines the privacy policy of the service provider and determines if it is acceptable. The engine evaluates a ruleset against the privacy policy. A preference editor enables the user to construct, in advance, the ruleset, which embodies the user's privacy preferences regarding the disclosure of identity information.
Abstract: Wireless device gesture detection and operational control comprises identifying a first position of the device based on a sensor reading of at least one sensor operating as part of the device. The method may also include identifying a change in the device's position to a second position that is different from the first position, and receiving a specific pattern of touch input data on a touch pad of the device, the specific pattern of touch input data identified as a predefined object which corresponds to dimensions of a human ear being pressed against the touch pad and changing a current operating state of the device to a different operating state based on a comparison and detection operation.
Abstract: Mobile agents can be deployed to mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. The region of interest may be a mobile and/or dynamic region of interest defined by, for example, a proximity to one or more mobile wireless access points or by an overlapping peer-to-peer communication range of a plurality of mobile devices that are configured to support the agent.
Abstract: A method and apparatus of detecting user initiated movement by an input element handled by a user is disclosed. The method may include performing a calibration procedure that is initiated by the user via a physical movement performed by the user. The method may also include positioning at least one sensor to dynamically adjust a size of an effective workspace range capable of detecting the user's movement of the input element.
Abstract: To provide proxy address neutrality, in particular for mobile server devices, a server application can register its network address with a discovery application. Whenever the server application acquires a new network address, the server application updates the discovery application. A client application providing proxy services for the server application can invoke calls to the server client using the network address for the server application that is currently stored in the client device. If the current network address is invalid, the client application obtains an updated network address from the discovery application.
Type:
Grant
Filed:
April 2, 2011
Date of Patent:
July 22, 2014
Assignee:
Open Invention Network, LLC
Inventors:
Thomas T. Wheeler, Robert W. Peterson, Qin Ye
Abstract: The illustrative embodiments described herein provide systems and methods for printing a document from a mobile communication device. In one embodiment, the method includes receiving a print job sent from the mobile communication device and determining a location of the mobile communication device. The method also includes identifying a printer proximate the mobile communication device and initiating execution of the print job at the identified printer.
Abstract: Certain aspects of the present disclosure relate to a technique for determining a valid sequence of touch events on a touch sensitive device. A first sequence of touch events is received, a proximity between any two touch events of the first sequence of touch events being greater than a proximity threshold. A second sequence of touch events is received. The touch events from the first and the second sequence are combined if a time difference between the first and the second sequence of touch events is below a time threshold and a proximity between the first and the second sequence of touch events is less than the proximity threshold. A valid sequence of touch events is determined if a combined pressure of the first and the second sequence of touch events is greater than a pressure threshold.
Abstract: Embodiments of the present invention generally provide for multi-dimensional disk arrays and methods for managing same and can be used in video surveillance systems for the management of real-time video data, image data, or combinations thereof.
Abstract: A system, method, and computer readable medium for providing application isolation to one or more applications. The system may include an isolated environment including application files and executables, and an interception layer intercepting access to system resources and interfaces. The system may further include an interception database maintaining mapping between the system resources inside the isolated environment and outside, and a host operating system, wherein the isolated environments are saved on at least one of a local and remote storage.
Abstract: A multimedia collaboration system that facilitates more efficient, free-flowing collaboration sessions. In order to make addition of new participants, media components, and or network access device to a collaboration session more efficient, client devices associated with each participant can store endpoint address information that can be automatically obtained by the multimedia collaboration system. The endpoint address information can then be used to add the new participants, media components, and or network access device.
Abstract: In order to optimize efficiency of deserialization, a serialization cache is maintained at an object server. The serialization cache is maintained in conjunction with an object cache and stores serialized forms of objects cached within the object cache. When an inbound request is received, a serialized object received in the request is compared to the serialization cache. If the serialized byte stream is present in the serialization cache, then the equivalent object is retrieved from the object cache, thereby avoiding deserialization of the received serialized object. If the serialized byte stream is not present in the serialization cache, then the serialized byte stream is deserialized, the deserialized object is cached in the object cache, and the serialized object is cached in the serialization cache.
Abstract: The present invention includes devices and methods to specify a document transformation. A template specifies a transformation that is applied to a document in a streaming mode, without building a full object tree in memory representing the document.
Abstract: The present invention relates to systems and methods for registry driven transformation of a document exchanged between businesses or applications. More particularly, it relates to systems and protocols for using one or more commonly accessible registries to transform electronic commerce documents among dissimilar interfaces, preferably XML documents. Particular aspects of the present invention are described in the claims, specification and drawings.
Type:
Application
Filed:
February 18, 2014
Publication date:
June 12, 2014
Applicant:
Open Invention Network, LLC
Inventors:
Christopher Todd INGERSOLL, Jayaram Rajan KASI, Alexander HOLMES, Michael CLARK, Ashok ALETTY, Sathish Babu K. SENATHI, Helen S. YUEN
Abstract: A computer readable medium and method providing checkpointing to Windows application groups, the computer readable medium having computer-executable instructions for execution by a processing system. The computer-executable instructions may be for launching an application and creating one or more application threads, receiving a checkpoint signal by an application thread, and entering a checkpoint Asynchronous Procedure Call (APC) handler at IRQL APC_LEVEL, the APC handler disposed in a kernel module, acquiring an ETHREAD block and user-mode context for the application thread, and examining an execution state of the one or more application threads at a time of the checkpoint signal.
Type:
Grant
Filed:
December 15, 2008
Date of Patent:
June 10, 2014
Assignee:
Open Invention Network, LLC
Inventors:
Keith Richard Backensto, Allan Havemose