Patents Assigned to Open Invention Networks
-
Patent number: 7721202Abstract: The present invention includes devices and methods to specify a document transformation. A template specifies a transformation that is applied to a document in a streaming mode, without building a full object tree in memory representing the document.Type: GrantFiled: August 16, 2002Date of Patent: May 18, 2010Assignee: Open Invention Network, LLCInventors: Matthew Fuchs, Changyi Zhu
-
Publication number: 20100100814Abstract: A market making node in a network routes machine readable documents to connect businesses with customers, suppliers and trading partners. The self defining electronic documents, such as XML based documents, can be easily understood amongst the partners. Definitions of these electronic business documents, called business interface definitions, are posted on the Internet, or otherwise communicated to members of the network. The business interface definitions tell potential trading partners the services the company offers and the documents to use when communicating with such services. Thus, a typical business interface definition allows a customer to place an order by submitting a purchase order or a supplier checks availability by downloading an inventory status report.Type: ApplicationFiled: December 23, 2009Publication date: April 22, 2010Applicant: Open Invention Networks, LLCInventors: Bart Alan Meltzer, Terry Allen, Matthew Daniel Fuchs, Robert John Glushko, Murray Maloney
-
Patent number: 7703008Abstract: The present invention relates to systems and methods for registry driven transformation of a document exchanged between businesses or applications. More particularly, it relates to systems and protocols for using one or more commonly accessible registries to transform electronic commerce documents among dissimilar interfaces, preferably XML documents. Particular aspects of the present invention are described in the claims, specification and drawings.Type: GrantFiled: March 7, 2006Date of Patent: April 20, 2010Assignee: Open Invention Network, LLCInventors: Christopher Todd Ingersoll, Jayaram Rajan Kasi, Alexander Holmes, Michael Clark, Ashok Aletty, Sathish Babu K. Senathi, Helen S. Yuen
-
Patent number: 7681075Abstract: Method, system, apparatus and/or computer program for achieving transparent integration of high-availability services for distributed application programs. Loss-less migration of sub-programs from their respective primary nodes to backup nodes is performed transparently to a client which is connected to the primary node. Migration is performed by high-availability services which are configured for injecting registration codes, registering distributed applications, detecting execution failures, executing from backup nodes in response to failure, and other services. High-availability application services can be utilized by distributed applications having any desired number of sub-programs without the need of modifying or recompiling the application program and without the need of a custom loader. In one example embodiment, a transport driver is responsible for receiving messages, halting and flushing of messages, and for issuing messages directing sub-programs to continue after checkpointing.Type: GrantFiled: April 27, 2007Date of Patent: March 16, 2010Assignee: Open Invention Network LLCInventors: Allan Havemose, Ching-Yuk Paul Ngan
-
Patent number: 7660874Abstract: A market making node in a network routes machine readable documents to connect businesses with customers, suppliers and trading partners. The self defining electronic documents, such as XML based documents, can be easily understood amongst the partners. Definitions of these electronic business documents, called business interface definitions, are posted on the Internet, or otherwise communicated to members of the network. The business interface definitions tell potential trading partners the services the company offers and the documents to use when communicating with such services. Thus, a typical business interface definition allows a customer to place an order by submitting a purchase order or a supplier checks availability by downloading an inventory status report.Type: GrantFiled: August 7, 2000Date of Patent: February 9, 2010Assignee: Open Invention Network, LLCInventors: Bart Alan Meltzer, Terry Allen, Matthew Daniel Fuchs, Robert John Glushko, Murray Maloney
-
Publication number: 20090327485Abstract: A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file.Type: ApplicationFiled: March 30, 2009Publication date: December 31, 2009Applicant: OPEN INVENTION NETWORK, LLCInventor: Roy Mongiovi
-
Patent number: 7631075Abstract: A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file.Type: GrantFiled: August 21, 2007Date of Patent: December 8, 2009Assignee: Open Invention Network, LLCInventor: Roy Mongiovi
-
Publication number: 20090300746Abstract: A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy.Type: ApplicationFiled: May 27, 2009Publication date: December 3, 2009Applicant: Open Invention Network LLCInventor: Gail-Joon Ahn
-
Publication number: 20090300747Abstract: A user-portable computing device configured as a smart card enables a user to carry identification information and to generate security tokens for use in authenticating the user to a service provider. The device includes memory for storing user identities as information cards that are exported to a host computer, presented to a user in visual form, and then selected for use in the authentication process. A security token service installed on the device issues a security token in response to a token request sent from the host computer that references the selected user identity. The security token service uses user attribute information stored on the user device to compose the claim assertions needed to issue the security token. The token is returned to the host computer and used to facilitate the authentication process.Type: ApplicationFiled: May 27, 2009Publication date: December 3, 2009Applicant: Open Invention Network L.L.CInventor: Gail-Joon Ahn
-
Publication number: 20090300716Abstract: A client-side user agent operates in conjunction with an identity selector to institute and exercise privacy control management over user identities managed by the identity selector. The user agent includes the combination of a privacy enforcement engine, a storage of rulesets expressing user privacy preferences, and a preference editor. The editor enables the user to direct the composition of privacy preferences relative to user identities. The preferences can be applied to individual cards and to categorized groups of attributes. The engine evaluates the proper rulesets against the privacy policy of a service provider. The privacy preferences used by the engine are determined on the basis of specifications in a security policy indicating the attribute requirements for claims that purport to satisfy the security policy.Type: ApplicationFiled: May 27, 2009Publication date: December 3, 2009Applicant: Open Invention Network LLCInventor: Gail-Joon Ahn
-
Publication number: 20090300715Abstract: An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity information within the context of an authentication process. A combination includes an identity selector, a privacy engine, and a ruleset. The identity selector directs the release of a user identity in the form of a security token to satisfy the requirements dictated by a security policy. Prior to release of the user identity, the engine conducts a privacy enforcement process that examines the privacy policy of the service provider and determines if it is acceptable. The engine evaluates a ruleset against the privacy policy. A preference editor enables the user to construct, in advance, the ruleset, which embodies the user's privacy preferences regarding the disclosure of identity information.Type: ApplicationFiled: May 27, 2009Publication date: December 3, 2009Applicant: Open Invention Network LLCInventor: Gail-Joon Ahn
-
Publication number: 20090300714Abstract: A privacy enforcement engine conducts a process that evaluates user privacy preferences against the privacy policy of a service provider. The engine works in conjunction with an identity selector. The identity selector filters user identity information cards to determine which ones satisfy the requirements of a security policy. The engine identifies privacy preferences that are relevant to the user identity information specified by the successfully filtered cards. The engine evaluates these privacy preferences against the privacy policy, to provide its own filtering operation relative to the exercise of privacy controls. The cards that pass the filtering operation conducted by the engine are deemed available for disclosure.Type: ApplicationFiled: May 27, 2009Publication date: December 3, 2009Applicant: Open Invention Network LLCInventor: Gail-Joon Ahn
-
Publication number: 20090300512Abstract: A privacy preference editor enables a user to institute privacy preferences relative to user identity information on a card-based and category-based basis. An identity selector furnishes information cards representative of user identities. The editor allows the user to set a privacy preference for each information card. Any proposed disclosure of an information card invokes its corresponding privacy preference. In turn, an agent engine evaluates the invoked privacy preference against the privacy policy of a relying party seeking the card information. The editor also permits the user to create information categories, populate the categories with a group of relevant user identity attributes, and set a privacy preference to the category. In this way, a category-specific privacy preference can be invoked by using the attribute required by the security policy as an index to the appropriate categorized group where the required attribute resides.Type: ApplicationFiled: May 27, 2009Publication date: December 3, 2009Applicant: Open Invention Network LLCInventor: Gail-Joon Ahn
-
Publication number: 20090300742Abstract: An identity selector manages the identity requirements of an online interaction between a user and a service provider environment. The identity selector is adapted for interoperable use with a user-portable computing device. The user device enables a user to carry identification information and to generate security tokens for use in authenticating the user to a service provider. The identity selector includes an agent module that facilitates communication with the user device. The identity selector imports the user identities from the user device and determines which user identities satisfy a security policy of a relying party. After the user selects one of the eligible user identities, the identity selector generates a token request based on the selected identity and forwards it to the user device, which in response issues a security token. The security token is returned to the identity selector and used to facilitate the authentication process.Type: ApplicationFiled: May 27, 2009Publication date: December 3, 2009Applicant: Open Invention Network LLCInventor: Gail-Joon Ahn
-
Publication number: 20090292985Abstract: A method and computer system are described for conducting commercial transactions. An enhanced type of XML schema may be used which supports integrity constraints and polymorphism. Schemas are identified by the use of Uniform Resource Names. XML processors residing on transaction servers or trading partner servers parse document instances by retrieving the URNs corresponding to the schemas used to interpret the document. The URNs are converted to location-dependent URIs in order to locate the schemas. URNs are resolved to location-dependent URIs by use of the LDAP protocol. URNs may be converted to LDAP URLs which are used to search LDAP compliant directories. The directories serve as registries for the URI values corresponding to the URNs.Type: ApplicationFiled: July 29, 2009Publication date: November 26, 2009Applicant: Open Invention Network, LLCInventors: Matthew Fuchs, Jari Koistinen, Davidson Andrew
-
Patent number: 7624161Abstract: A method of building and assembling programs across computer networks that is dictated by the user to perform logical work without the user using a compiler. Users are able to assemble programs over a network by defining or re-defining which logical components are bound into the overall program without the use of a compiler. Logical components are called and bound into the program at run time, allowing dynamic programming which may be modified at any time without re-compiling the entire program. Each logical component can act independently of other logical components or work in concert with each other. This allows assembly of a program, even though some components may be created using totally different methodologies and/or are constructed by different programmers.Type: GrantFiled: January 2, 2007Date of Patent: November 24, 2009Assignee: Open Invention Network, LLCInventor: Jimmy J. Jenkins
-
Patent number: 7594167Abstract: A method and computer system are described for conducting commercial transactions. An enhanced type of XML schema may be used which supports integrity constraints and polymorphism. Schemas are identified by the use of Uniform Resource Names. XML processors residing on transaction servers or trading partner servers parse document instances by retrieving the URNs corresponding to the schemas used to interpret the document. The URNs are converted to location-dependent URIs in order to locate the schemas. URNs are resolved to location-dependent URIs by use of the LDAP protocol. URNs may be converted to LDAP URLs which are used to search LDAP compliant directories. The directories serve as registries for the URI values corresponding to the URNs.Type: GrantFiled: January 28, 2000Date of Patent: September 22, 2009Assignee: Open Invention Network, LLCInventors: Matthew Fuchs, Jari Koistinen, Davidson Andrew
-
Publication number: 20090186641Abstract: The invention relates to an electronic short messaging and advertising method where minimal initiative is required from the consumer. Some embodiments of the invention may also be applied to an electronic sales method. The invention may also be applied for normal short messaging. The electronic short messaging method for collect calling may send transmissions to at least one subscriber terminal via the Internet and/or the telephony network. The method may include sending a first transmission to a recipient subscriber terminal for display, wherein the first transmission defines one or more active alternatives including at least one of initiating a collect call and deleting the transmission. In some embodiments, unless the collect call is initiated, the first transmission is automatically deleted after reception after a predefined time period.Type: ApplicationFiled: March 10, 2009Publication date: July 23, 2009Applicant: OPEN INVENTION NETWORK LLCInventor: Mikko Kalervo Vaananen
-
Publication number: 20090181704Abstract: The invention relates to an electronic short messaging and advertising method where minimal initiative is required from the consumer. Some embodiments of the invention may also be applied to an electronic sales method. The invention may also be applied for normal short messaging. The electronic short messaging method for collect calling may send transmissions to at least one subscriber terminal via the Internet and/or the telephony network. The method may include sending a first transmission to a recipient subscriber terminal for display, wherein the first transmission defines one or more active alternatives including at least one of initiating a collect call and deleting the first transmission. The method may also include calculating costs associated with at least one of the first transmission and the one or more active alternatives.Type: ApplicationFiled: March 10, 2009Publication date: July 16, 2009Applicant: OPEN INVENTION NETWORK LLCInventor: Mikko Kalervo Vaananen
-
Patent number: 7542930Abstract: A scenario manager allows users to define document-based choreography and simulate the behavior of a trading partner in a computer system. Rules are utilized to orchestrate the transaction sequence to test the functionalities and performances of the system as a whole and trading partners that participate in a scenario. Each scenario is defined with one or more steps, each of the steps having a condition and/or an action, wherein the condition defines prerequisites for the step to be executed and the action defines what happens if the step is executed. All the steps that have no conditions are executed first, resulting in one or more responses being received from trading partners. Then all steps having conditions that are satisfied in light of any responses received are performed. This is then repeated until no more conditions are satisfied or there are no steps left to perform.Type: GrantFiled: March 22, 2002Date of Patent: June 2, 2009Assignee: Open Invention NetworkInventors: Mark O'Leary, Chandra Srivastava, Sen Zhang, Natovian Ward