Abstract: A method and apparatus may be configured to create setup information, and perform the initialization and performance of an installation of a peripheral device of an electronic device. One example method may include storing a device identification (ID) of the peripheral device, extracting data and creating a data structure from existent setup information. The method may also include replacing a device ID in the data structure with the device ID of the peripheral device, and creating and storing a setup information file from content of the data structure. The method may also include creating and passing a request to at least one of a device driver of an interface of the peripheral device and a bus that initiates the installation of the peripheral device. The peripheral device may not be connected to the electronic device.
Abstract: A system, method, and computer readable medium for providing streaming of one or more applications from streaming servers onto one or more clients. The one or more applications are contained within one or move isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include the option of running both in on-line and off-line. When on-line, the system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. When off-line, the system may include the ability to run already installed isolated environments without requiring credentialing. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
Abstract: A system, method, computer program, and/or computer readable medium for providing application isolation and live migration to one or more applications and their associated resources. The computer readable medium includes computer-executable instructions for execution by a processing system. The computer-executable instructions may be for creating a new isolated environment, for creating a copy of an isolated environment, live migrating applications within and between isolated environments, and for deploying an isolated environment Further, the instructions may be for launching one or more applications within one or more isolated environment, for terminating one or more applications within one or more isolated environments, for configuring resource mappings, exceptions and policies, for triggering a live migrate, and for delivery of one or more applications within isolated environments over the network.
Abstract: A method, system, and a program product for managing updates to executable programming code on a computer system in a computer network. A maintenance service utility is configured to launch a maintenance procedure at a specified time during operation of the computer system. Operation of a maintenance timer utility is activated during startup of the computer system to track and monitor the amount of time the computer system has been operating since startup. The maintenance service utility determines if there any updates to the executable programming code that require installation. The maintenance procedure is launched after a specified time if there are updates to the executable programming code. The computer system is automatically rebooted to install the updates to the executable programming code. A maintenance service editor utility enables the maintenance service utility to be configured to launch the maintenance procedure after a specified time if there are updates to the executable programming code.
Abstract: A system and method thereof for performing loss-less migration of an application group. In an exemplary embodiment, the system may include a high-availability services module structured for execution in conjunction with an operating system, and one or more computer nodes of a distributed system upon which at least one independent application can be executed upon. The high-availability services module may be structured to be executable on the one or more computer nodes for loss-less migration of the one or more independent applications, and is operable to perform checkpointing of all state in a transport connection.
Type:
Grant
Filed:
November 22, 2011
Date of Patent:
September 3, 2013
Assignee:
Open Invention Network, LLC
Inventors:
Keith Richard Backensto, Allan Havemose
Abstract: Example embodiments of the present invention may include an example method of performing steganography. The example method may include processing a data message into multiple message blocks each representing a portion of the data message, and assigning the multiple message blocks to a corresponding set of multiple data files. The method may also include storing the multiple data files in at least one memory location.
Abstract: Methods, systems, and products are disclosed for locking and unlocking a lock. A lock service manager module stores in memory, and a processor communicates with the memory. The lock service manager module includes executable code for receiving a communication from a calling telephone number. A database is queried for at least one of i) a called telephone number and ii) a calling telephone number. The database stores telephone numbers of subscribers to a lock service. The lock service allows remote locking and unlocking of the lock. If the query is successful, the communication is processed.
Abstract: A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging protocol for checkpointing of the distributed system. Processes participating in a distributed computation on the distributed system may be migrated from one compute node to another compute node in the distributed system by re-mapping of hardware addresses using the checkpoint library.
Abstract: A method, system, and program product are provided for updating software deployed on computers in an enterprise computer network wherein each computer has a software update agent installed to enable the computer to receive software patch updates. The method includes determining a required software component and updates based upon a location in a configuration file; determining a version of the agent and updating the agent if required; selecting a server from which required updates are to be downloaded; scanning a plurality of software components on a selected computer and comparing the components with updates available on the server to determine required updates; downloading the required patches from the server; and installing the patches on the selected computer. The system includes components that perform the method steps when operated on a computer in the network. A computer readable medium implements the method for updating software deployed on computers in a network.
Abstract: Disclosed are examples of modifying a current state of a mobile station based on the location of the mobile station with respect to a nearby acquaintance. The method may include detecting a presence of a mobile station in a predefined domain area identified by an application, the predefined domain area being associated with at least one acquaintance, and performing a modification to a current state of the mobile station based on a level associated with the at least one acquaintance.
Abstract: Some embodiments of the present invention provide methods, computer media encoding instructions, and systems for receiving write requests directed to non-sequential logical block addresses and writing the write requests to sequential disk block addresses in a storage system. Some embodiments further include overprovisioning a storage system to include an increment of additional storage space such that it is more likely a large enough sequential block of storage will be available to accommodate incoming write requests.
Abstract: Herein is described a tokenless biometric method for processing electronic transmissions, using at least one user biometric sample, an electronic identicator and an electronic rule module clearinghouse. The steps for processing of the electronic transmissions comprise of a user registration step, wherein a user registers with an electronic identicator at least one registration biometric sample taken directly from the person of the user.
Abstract: A system, method, computer program, and/or computer readable medium for providing hierarchical interception for applications within isolated environments The computer readable medium includes computer-executable instructions for execution by a processing system. The computer-executable instructions may be for installing interceptors, configuring interceptors, preloading shared libraries, using trampoline functions, removal of interceptors, mapping between resources inside and outside the isolated environment, providing an interception database, loading the interception database, redirection of resources, and providing the hierarchy of interceptors.
Abstract: Tokenless biometric authorization of transaction between a consumer and a merchant uses an identicator and an access device. A consumer registers with the identicator a biometric sample taken from the consumer. The consumer and merchant establish communications via the access device. The merchant proposes a transaction to the consumer via the access device. The access device communicates to the merchant associated with the access device. After the consumer and merchant have agreed on the transaction, the consumer and the identicator use the access device to establish communications. The access device communicates to the identicator the code associated with the access device. The identicator compares biometric sample from the consumer with registered biometric sample. Upon successful identification, the identicator forwards information regarding the consumer to the merchant.
Type:
Grant
Filed:
October 28, 2011
Date of Patent:
May 28, 2013
Assignee:
Open Invention Network, LLC
Inventors:
Philip D. Lapsley, Philip J. Gioia, Michael Kleeman
Abstract: A method, system and program product for group policy backup management in a network having a plurality of domains including components and modules for steps of retrieving a list of group policy objects for a domain, generating a configuration initialization file including a domains section identifying a plurality of domains that are to be backed up and a setup section specifying a plurality of values that control the backup of each policy object in each domain, determining a digital signature for each policy object on a list of policies for the domain, comparing the digital signature for each policy object with a corresponding previous digital signature for each policy, determining if a current digital signature for each policy object matches the corresponding previous digital signature for a policy, and backing up a policy object having a current digital signature that does not match the corresponding previous digital signature.
Abstract: A system, method, computer program and/or computer readable medium for providing streaming of one or more applications from streaming servers onto one or more clients. The computer readable medium includes computer-executable instructions for execution by a processing system. The one or more applications are contained within one or move isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
July 21, 2011
Date of Patent:
April 2, 2013
Assignee:
Open Invention Network, LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location.
Type:
Grant
Filed:
June 29, 2012
Date of Patent:
April 2, 2013
Assignee:
Open Invention Network, LLC
Inventors:
James N. White, Monica Rose Martino, M. Gregory Smith
Abstract: A method is provided for generating height information for an arbitrary-image point on a rectified image and for generating a representation of the rectified image that includes the height information. According to an exemplary embodiment, height information is generated for an arbitrary-image point on the rectified image from first and second aerial images having respective first and second sets of rational polynomial coefficients (RPCs) and projective geometrical relationships, such that the first and second aerial images and the rectified image include overlapping image locations.
Abstract: A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy.