Abstract: A digital imaging system is described that provides techniques for reducing the amount of processing power required by a given digital camera device and for reducing the bandwidth required for transmitting image information to a target platform. The system defers and/or distributes the processing between the digital imager (i.e., digital camera itself) and the target platform that the digital imager will ultimately be connected to. In this manner, the system is able to decrease the actual computation that occurs at the digital imager. Instead, the system only performs a partial computation at the digital imager device and completes the computation somewhere else, such as at a target computing device (e.g., desktop computer) where time and size are not an issue (relative to the imager). By deferring resource-intensive computations, the present invention substantially reduces the processor requirements and concomitant battery requirements for digital cameras.
Type:
Grant
Filed:
May 12, 2008
Date of Patent:
July 3, 2012
Assignee:
Verisign, Inc.
Inventors:
Eric O. Bodnar, Shekhar Kirani, Venkat V. Easwar, Philippe R. Kahn, Sonia Lee Kahn
Abstract: This invention provides tools and methods for debugging a stored procedure in a database. The methods allow for debugging of the stored procedure even when it is invoked over a normal connection to a database management system, for example using ODBC. The developer can debug the stored procedure using an integrated development environment, including viewing the values of variables and the position of the execution pointer as the stored procedure executes. The invention also provides methods for allowing the developer for changing the source code of the stored procedure during debugging.
Abstract: The present subject matter is directed to systems and methods for automating the testing of multi-function systems, such as naming registration systems and the like. A method of testing a registry, and the like, may include providing a command phrase including an add command and at least one function that includes an artificial attribute for a domain added by the add command. The command phrase may specify an operation, a protocol, and an object. The operation may include at least one of add, delete, or update domain. The protocol may include at least one of RRP and EPP. One or more parameters associated with the command phrase may be provided and may include an expected response code and/or a variable. One or more additional parameters that are associated with the command phrase may be determined and a database may be accessed to provide the one or more additional parameters.
Type:
Application
Filed:
November 9, 2010
Publication date:
May 10, 2012
Applicant:
VeriSign, Inc.
Inventors:
Omkarnath R. Chavvakula, Rick Vankeuren, Vijay Simha Atmavilas, Chandra S. Kandimalla
Abstract: A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine ifs desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee.
Abstract: A system and method for managing a route cache to reduce the risk of disruption from denial of service attacks. All traffic arriving on a front interface from local (on-link) nodes (e.g., neighbor nodes) can be treated normally. However, for packets arriving from remote (off-link) sources addressed to a given destination IP address, a single, shared route cache entry can be used. The source-address field in this entry can be zeroed-out since it will not be used for traffic coming from any one source. Similarly, for all packets going to off-link destinations through the front-interface, another single shared route cache entry can be created and used. The destination-address field in this entry can be zeroed out since it will not be used for traffic going to any one destination.
Type:
Grant
Filed:
August 27, 2009
Date of Patent:
May 8, 2012
Assignee:
Verisign, Inc.
Inventors:
Suresh Kumar Bhogavilli, Glen Stuart Wiley
Abstract: Embodiments of the present invention provide a method and system for processing query messages over a network. Specifically, a plurality of queries may be extracted from a plurality of query messages received from a plurality of users over a network. A number of queries, included in the plurality of queries, may be determined, and a current sequence number may be associated with the plurality of queries. A request message may be created including the plurality of queries, a first sequence number equal to the current sequence number and a first message count equal to the number of queries. The request message may be sent to a search engine and a response message may be received from the search engine. The response message may include a plurality of replies, a second sequence number, a second message count, a third sequence number and a third message count. A plurality of reply messages may be created from the plurality of replies and sent to the plurality of users over the network.
Abstract: Systems and methods for verifying data in a distributed database using different automated check operations at different times during the database read and update cycles. Various functions may be performed including executing a first check during update operations of the database. A second check may also be executed during the update operation of the database, and be implemented as an execution thread of an update daemon. A third check may be executed at a time interval between update functions of the update daemon. A fourth check may be executed during a time that the database is not being updated. Integrity of data in the database may be verified by a computer processor based on the first, second, third, and fourth checks.
Type:
Application
Filed:
October 18, 2010
Publication date:
April 19, 2012
Applicant:
VeriSign, Inc.
Inventors:
Michael Bentkofsky, Patrick Quaid, Bradley McMillen
Abstract: A method and apparatus for of storing data comprising monitoring a plurality of storage units within a mass storage area and detecting when a storage unit within the mass storage area is overloaded. The method further comprising randomly distributing the data on the overloaded storage unit to the other storage units within the mass storage area.
Type:
Application
Filed:
December 20, 2011
Publication date:
April 19, 2012
Applicant:
VeriSign, Inc.
Inventors:
Brian Bodrner, Eric Bodgar, Mark Tarantino, Jonah Kai Fleming, Devdutt Sheth
Abstract: A method of triggering crawling of a domain includes receiving information related to a domain from a registrar and processing the information related to the domain. The method also includes storing the processed information in a registry zone file and forming a list of registry data based on the processed information. The list of registry data comprises a subset of the registry zone file. The method further includes crawling one or more of the domains in the list of registry data.
Type:
Application
Filed:
September 17, 2010
Publication date:
March 22, 2012
Applicant:
VeriSign, Inc.
Inventors:
Karthik Shyamsunder, Srinivas Sunkara, Alexander Durych Holmes, Andrew Simpson, Phani Pattappu
Abstract: Some embodiments of efficient time-based memory counters have been presented. In one embodiment, a set of arrays of counters is arranged in layers to associate the set of arrays with a set of predefined time intervals. Furthermore, a set of pointers may be used to reference the set of arrays of counters. An index is maintained to provide time-based management of the arrays of counters. The index includes a timestamp and the set of pointers. Each pointer logically points to a distinct one of the set of arrays.
Abstract: Methods and systems provide tracking or logging requests to resolve non-existent textual identifiers and classifying the textual identifier into a predefined set of taxonomical categories to support the detection of machine generated textual identifiers. Detection includes calculating a measure of probability based on the analysis and classification of prior textual identifier requests from a set of requests for a specific textual identifier.
Abstract: Methods and systems provide tracking or logging requests to resolve non-existent textual identifiers and classifying the textual identifier into a predefined set of taxonomical categories to support the detection of requestors of machine generated requests to resolve textual identifiers. Detection includes calculating a measure of probability based on the analysis and classification of prior textual identifier requests from a requestor.
Abstract: A method for controlling a message from a sender. A referee can evaluate a credential associated with a message to determine ifs desirability to the intended recipient, and take an action based upon the results of the determination. A sender that includes a trusted component can send a credential with the message, and the message can be controlled without a referee.
Abstract: Methods and systems are provided for maintaining and accessing a whois database. In one embodiment, modifications to a registrar database that includes information about domain names are tracked, and based on the tracked modifications, one or more records that include modified information about the domain names are identified. Unique identifiers for the identified one or more records are determined and are used to reflect the modifications in the whois database. The modifications are tracked on a real-time basis and are reflected in the whois database on an hourly or a real-time basis.
Abstract: A method and apparatus for of storing data comprising monitoring a plurality of storage units within a mass storage area and detecting when a storage unit within the mass storage area is overloaded. The method further comprising randomly distributing the data on the overloaded storage unit to the other storage units within the mass storage area.
Type:
Grant
Filed:
May 4, 2010
Date of Patent:
December 20, 2011
Assignee:
VeriSign, Inc.
Inventors:
Brian Bodmer, Eric Bodnar, Mark Tarantino, Jonah Kaj Fleming, Devdutt Sheth
Abstract: A method of providing web site verification information to a user can include receiving a DNS query including a host name and a seal verification site name, parsing the DNS query, and extracting the host name from the DNS query. The method also can include accessing a DNS zone file including a list of Trust Services customers and determining if the host name is associated with a Trust Services customer in the list of Trust Services customers. The method further can include transmitting a positive identifier to the requester if the host name is associated with a Trust Services customer and transmitting a negative identifier to the requester if the host name is not associated with a Trust Services customer. In a specific embodiment, the Trust Services include issuance of digital certificates.
Abstract: Methods and systems provide tracking or logging requests to resolve non-existent domain (NXDomains) and organizing the NXDomains to support searching of the domain names including ranking the NXDomains based on popularity, e.g, number of hits or potential traffic based on the number of requests made for the NXDomain. NXDomain logs may be organized so that it supports searching by creating an inverted index including n-grams of the NXDomains. Searching includes identifying a target substring in one or more of the indexes, selecting those matching NXDomains satisfying some threshold criteria, and displaying the NXDomains in a selected order such as by demand or popularity associated with, for example, a selected geographical location from which resolution requests targeting respective NXDomains originate.
Abstract: Exemplary embodiments are directed to a device and a computer-readable storage medium for creating and editing documents or messages by dynamically loading the required data on the computing device as the documents or messages are being created or edited. These exemplary embodiments have relevance for creating or editing documents or messages in non-English languages using a computing device that is pre-configured to create English documents or messages, but not non-English documents or messages. Further, these embodiments allow a user to create and edit documents and messages on a computing device that may not have been configured a priori or have limited storage capability to support the entire data set required for creating the documents or messages in a specific language. The computing device is required to communicate with a data storage device to dynamically load the required data from therein.
Abstract: A system and method for providing a high reliability network. Context servers store information about calls in a telecommunications system. Network control elements can obtain call information from the context servers to help make call control and reporting decisions.
Abstract: The enrollment process for purchasing multiple digital certificates configured using different cryptographic algorithms or hashing algorithms is streamlined. A certificate purchaser wishing to purchase two or more certificates is prompted to provide answers to common enrollment questions, such as the purchaser's contact information, payment details, web sever software, and the like, using a simplified and streamlined enrollment process. Each certificate is optionally configured using a different hashing algorithm.