Abstract: A method of accessing a first computing device from a second computing device using a remote desktop service is disclosed. The first and second device register are authenticated and registered with a remote access gateway. In some embodiments, the remote access gateway stores a copy of the first computer and changes made to the copy are synchronized with the actual first computer when it access the remote access gateway. A virtual operating system experience on the second computer is virtually the same as the real operating system experience on the first computer.
Type:
Grant
Filed:
March 13, 2008
Date of Patent:
July 8, 2014
Assignee:
Microsoft Corporation
Inventors:
Todd R. Manion, Ryan Y. Kim, Kestutis Patiejunas
Abstract: A system and method in accordance with exemplary embodiments may include receiving a message from a location-aware mobile device associated with a user, receiving content delivery information from the user, formulating a content package at least based on the content delivery information, and sending a content message associated with the content package to the location-aware mobile device via a network.
Abstract: A device receives compliance content from a user device, determines requirements associated with the compliance content, and matches the requirements with compliance questions provided in a compliance library associated with the device. The device also automatically generates a compliance questionnaire based on the compliance questions matching the requirements, and provides the compliance questionnaire to the user device. The compliance questionnaire includes a minimum set of compliance questions needed to determine compliance.
Abstract: Methods, systems, and computer program products for modifying a resource by an authenticated user impersonating another user. In one embodiment of the invention, a lock may be acquired on the resource to be modified, storing the identity of the authenticated user and the identity of the impersonated user inside the lock object, and generating a message indicating that the lock was acquired successfully by the authenticated user impersonating another user.
Type:
Grant
Filed:
June 10, 2009
Date of Patent:
June 17, 2014
Assignee:
International Business Machines Corporation
Abstract: In one embodiment, a multi-stakeholder environment is controlled by first assigning a first domain to a first stakeholder and a second domain to a second stakeholder. Then a first access policy is defined for the first domain and access is restricted to the first domain for the second stakeholder according to the first access policy. In another embodiment, an access request is handled in a multi-stakeholder environment by first receiving parameters forwarded by hooks in system call functions in a kernel of the multi-stakeholder environment, wherein the parameters contain information about a first stakeholder requesting access to a domain corresponding to a second stakeholder. Then it is determined whether to allow the first stakeholder to access the domain based at least partially upon security settings corresponding to the domain.
Abstract: A web server utility executes on a server and provides the following functions: determining when a web page profile also includes an assignment of additional content; dynamically retrieving the additional content; and generating the web page with the additional content either appended to, prepended to, or wholly replacing one or more sections of the baseline content. When the utility detects assignment of additional content, the utility checks a specific location within the filesystem for the additional content. When the additional content is not found at the specific location, the utility automatically checks the temporary directory (for static content) then the centralized administrative and/or content (CAC) server for the additional content. When the additional content is dynamic, the CAC server retrieves and executes the file at the CAC server to generate the dynamic content, which is transmitted back to the web server for rendering within or as the whole-page output.
Abstract: The present invention relates generally to intelligence virtualization system and method to support social media cloud service and more particularly to multi agent structure automatically performing intelligent virtualization method for service resource for a user's access and allocation of virtualized resources and more particularly to a intelligence virtualization system and method to support social media cloud service that automates learning process of multi agents for distribution of new social media service resources and service resource management of additional component of social media cloud computing.
Type:
Grant
Filed:
December 19, 2011
Date of Patent:
June 3, 2014
Assignee:
Konkuk University Industrial Cooperation Corp.
Abstract: The present invention is aimed to provide a mechanism whereby a Public Service Identity identifying a service, which runs in an application service, may be created in a network both dynamically by the application server and statically by an O & M system, the means and method for the dynamic creation harmonizing with those for the static creation, and allowing a similar behavior of the network with minimum impact when the service is invoked. Therefore, the present invention provides a new method, a new central entity in the network, and enhanced Home Subscriber Server and application server, all co-operating to carry out the different embodiments for the invention.
Type:
Grant
Filed:
August 10, 2005
Date of Patent:
June 3, 2014
Assignee:
Optis Wireless Technology, LLC
Inventors:
Juan Antonio Sanchez Herrero, John Michael Walker, Maria Esther Terrero Diaz-Chiron
Abstract: A first support node and a third node provide online collaborative support to a customer node over a computer network. An online support session facilitating, at least in part, bi-directional communication between the customer node and the first support node is established. The third node is also connected to the online support session and receives support session information from the customer node. In addition, information is communicated bi-directionally between the first support node and the third node.
Type:
Grant
Filed:
October 17, 2006
Date of Patent:
May 27, 2014
Assignee:
Citrix Systems, Inc.
Inventors:
Anthony Spataro, Vishal Mittal, Shadi Muklashy
Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.
Type:
Grant
Filed:
August 18, 2006
Date of Patent:
May 20, 2014
Assignee:
Cisco Technology, Inc.
Inventors:
Plamen Nedeltchev, Robert T. Bell, Max Pritikin
Abstract: As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first device and a portable storage device. A connection is initiated between a second computing device (e.g., remote device), connected to an untrusted network, and the first computing device, comprising initiating a proxy server protocol from the portable storage device (e.g., attached to the second device), using the second computing device. A secure connection between the first and second devices is created using the encryption keys.
Abstract: A system may include reception of a request from a user to start a report associated with a node of a business object object model, where the node of the business object object model is associated with an access control list associating instances of the node with at least one access context restriction, determination of a first access context restriction associated with the user, retrieval of the at least one instance of the node based on the first access context restriction and on the access control list associated with the node, and presentation of an instance of the report to the user, the instance of the report populated with the at least one instance.
Type:
Grant
Filed:
December 29, 2010
Date of Patent:
May 13, 2014
Assignee:
SAP AG
Inventors:
Stefan Girsig, Stefan Biedenstein, Karl-Peter Nos, Juergen Alfred Seyfried, Martin Osterloh
Abstract: A system, server, method, and computer program product are disclosed for facilitating the creation of push messages pertaining to context dependent services and managing their delivery to mobile wireless devices having diverse routing, scheduling, and context or event-triggering requirements. A web-based interface is presented on an administrator console for defining profiles specifying content delivery characteristics for a plurality of mobile wireless devices. The profiles can include a recipient characteristic, a message delivery mode characteristic, and a bearer characteristic. A Service Manager is coupled to the web-based interface and to a plurality of access points, for pushing a message via a specified bearer, using a specified delivery mode, to one of the plurality of mobile wireless devices of a specified recipient satisfying one of the defined profiles of content delivery characteristics when the one device is located within a coverage area of one of the plurality of access points.
Abstract: In a first data compression process, a compressed code of an input symbol is generated in accordance with a compression dictionary selected on the basis of P symbols immediately preceding the input symbol, and a (P+1)K+1-th compressed code is encrypted to generate a compressed and encrypted code. Then, compressed and encrypted data comprising compressed and encrypted codes and other compressed codes is output. In a second data compression process, a bit string is added to the head of compression target data, and a compressed code of an input symbol is generated in accordance with a compression dictionary selected on the basis of a bit string or a symbol immediately preceding the input symbol. Then, a plurality of compressed codes are alternately output to different output destinations.
Abstract: A telecommunications architecture processes telecommunications service requests received from third parties through a secure access gateway. The third parties may be other telecommunications service providers which employ the services to support their own products and services or may be or individual subscribers. The service broker provides a flexible and efficient layer in the telecommunications architecture for processing the service request. The service broker also overcomes the technical problems associated with third party service request processing. In addition to providing technical solutions for efficient and secure processing of service requests for exposed services, the architecture also provides an additional revenue channel for existing telecommunication service providers.
Type:
Grant
Filed:
December 13, 2005
Date of Patent:
April 8, 2014
Assignee:
Accenture Global Services Limited
Inventors:
Marco Millefiorini, Giuseppe Guerrisi, Alessandro Urbani
Abstract: The invention relates to a method of notifying an Application Function (AF) in a communications network of resource restrictions relating to a communication session. The network includes a Policy and Charging Rules Function (PCRF) for authorising and controlling flows of data in the session. In the method the AF sends an authorisation request to the PCRF for establishing the communication session. The authorisation request includes an indication that the AF is to be notified of resource restrictions for the data flows in the session. The PCRF notifies the AF of the resource restrictions.
Type:
Grant
Filed:
October 19, 2007
Date of Patent:
April 1, 2014
Assignee:
Telefonaktiebolaget L M Ericsson (Publ)
Inventors:
Hubert Przybysz, David Castellanos, Susana Fernandez Alonso
Abstract: Systems and methods are presented to prevent denial of service attacks through the use of an interleaved pseudo-random sequence that is generated from two or more pseudo-random codes. Portions of the pseudo-random codes are interleaved with each other using a pre-determined instruction pattern. A message incorporating the interleaved sequence is transmitted to a receiver, which identifies the interleaved bit sequence in the message and, if the interleaved bit sequence is identified in the message, allows access to the service.
Abstract: An authentication method in a system having a display and a storage device is provided. The authentication method includes the steps of registering an object selected for each user from among a plurality of visually distinguishable objects prepared in advance as a key object in the storage device; and presenting the plurality of objects to the display, accepting selection of an object by a user to be authenticated, and performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user. The step of registering includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in the storage device.
Abstract: A network device includes a content requesting interface for adding desired selected content to a queue associated with a remote content provider. Memory stores received selected content that is received from the remote content provider. A network interface provides at least one of usage and storage status data relating to the received selected content stored in the memory to the remote content provider, receives additional ones of the desired selected content in the queue from the remote content provider based on the at least one of the usage and the storage status data of the received selected content in the memory, and stores the desired selected content received from the remote content provider as the received selected content in the memory. The storage status includes at least one of a hidden status, an erased status, and an amount of the received selected content stored in the memory.
Abstract: A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection, the client transmits a request and the server performs or responds accordingly. A network management system and environment where this protocol can be used is also described and claimed.