Patents Examined by Tariq Najee-Ullah
-
Patent number: 8738778Abstract: Transfer policy management methods in a peer-to-peer networking environment such as BitTorrent are provided. A download TPM maximizes the usage of available bandwidth, while focusing on as few torrents as possible. For a given list of torrents, a peer in accordance with the present invention determines how many download connections to maintain at a given time in order to maximize usage of bandwidth. If the variance of per-connection bandwidths exceeds a threshold, more connections are added until either variance does not exceed the threshold or a maximum number of connections are established. A seeding peer determines when to reduce the number of files being seeded by monitoring its average upload rate per torrent. If its average rate falls below a threshold, then the peer stops seeding a file. The file that the peer stops seeding is one to which the peer is making the smallest overall contribution.Type: GrantFiled: April 26, 2007Date of Patent: May 27, 2014Assignee: BitTorrent, Inc.Inventors: Bram Cohen, Steven Hazel, Gregory Hazel, David Harrison
-
Patent number: 8738914Abstract: The embodiments of the present disclosure disclose a method and apparatus for reducing the parameter transmission bandwidth. The parameter sender reduces the values of the parameters before sending the parameters to the parameter receiver. This scheme reduces the bandwidth consumed during parameter transmission, thus makes the transmission more efficient. The embodiment of the present disclosure also discloses a method for key exchange. This method reduces the values of the transmission parameters before sending the transmission parameters. This saves the bandwidth compared with the protocol in the prior art. Besides, the embodiment of the present disclosure discloses a system for key exchange. The parameter sender sends the transmission parameters to the bandwidth processing unit.Type: GrantFiled: June 11, 2009Date of Patent: May 27, 2014Assignees: Huawei Technologies Co., Ltd., Shanghai Jiaotong UniversityInventors: Zhenfu Cao, Xiaolei Dong, Jun Shao, Jiwei Wei
-
Patent number: 8719391Abstract: A system, server, method, and computer program product are disclosed for facilitating the creation of push messages pertaining to context dependent services and managing their delivery to mobile wireless devices having diverse routing, scheduling, and context or event-triggering requirements. A web-based interface is presented on an administrator console for defining profiles specifying content delivery characteristics for a plurality of mobile wireless devices. The profiles can include a recipient characteristic, a message delivery mode characteristic, and a bearer characteristic. A Service Manager is coupled to the web-based interface and to a plurality of access points, for pushing a message via a specified bearer, using a specified delivery mode, to one of the plurality of mobile wireless devices of a specified recipient satisfying one of the defined profiles of content delivery characteristics when the one device is located within a coverage area of one of the plurality of access points.Type: GrantFiled: March 7, 2006Date of Patent: May 6, 2014Assignee: Nokia CorporationInventors: Mikko Hämäläinen, Timo Helander
-
Patent number: 8713190Abstract: A method and apparatus for anomaly detection in a data stream are disclosed. In one embodiment, the present method detects an anomalous condition in a data stream, by calculating at least one expected base event count for at least one event in the data stream for a time interval, obtaining an actual event count for the at least one event in the data stream, applying at least one shrinkage factor to the at least one expected base event count to obtain at least one actual estimated event count and detecting the anomalous condition in accordance with the actual event count and the at least one actual estimated event count.Type: GrantFiled: September 8, 2006Date of Patent: April 29, 2014Assignee: AT&T Intellectual Property II, L.P.Inventors: Colin Goodall, William H. DuMouchel, Deepak Agarwal
-
Patent number: 8671136Abstract: A data retrieval method for sensing data for retrieving, from user terminals, data transmitted from a plurality of sensor nodes, the data retrieval method including: a step for storing in distributed servers the data sent from the plurality of sensor nodes, a step for setting information link pointers for indicating model names previously set and link pointers of data corresponding to the model names, a step for a management server connected through a network with the distributed servers and the user terminal to accept the reference requests for data acquired from the user terminals, and a step for the management server to acquire data from the distributed servers set as the information link pointers based on the data reference request from among the data stored in the distributed servers and to respond to the user terminal.Type: GrantFiled: March 23, 2007Date of Patent: March 11, 2014Assignee: Hitachi, Ltd.Inventors: Norihiko Moriwaki, Toshiyuki Odaka
-
Patent number: 8649508Abstract: A system and method for implementing the Elliptic Curve scalar multiplication method in cryptography, where the Double Base Number System is expressed in decreasing order of exponents and further on using it to determine Elliptic curve scalar multiplication over a finite elliptic curve.Type: GrantFiled: September 29, 2008Date of Patent: February 11, 2014Assignee: Tata Consultancy Services Ltd.Inventor: Natarajan Vijayarangan
-
Patent number: 8650500Abstract: A network system includes a reconfigurable network and a network management system. The network management system can represent the network in the form of a network image. Network image objects, corresponding to network objects, can be selected as copy sources and paste targets. A copy-and-paste operation modifies the network image to indicate a potential modification of the actual network in which the configuration of the network object corresponding to the selected copy source object is applied to the network object corresponding to the selected image object. In addition, the copy-and-paste operation can automatically represent a common connection of a source object input and a target object input to a common data source. Furthermore, the copy-and-paste operation can automatically connect outputs of source and target objects to a comparison function so that the implementation of the copy-and-paste operation on the actual network can be validated.Type: GrantFiled: March 5, 2004Date of Patent: February 11, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Eric Martin Soderberg, Jonathan Paul Patrizio, Daniel W. Hepner
-
Patent number: 8554889Abstract: Embodiments of the present invention provide the ability to accurately match a particular computing device within a networked computing environment with an identity of that computing device. According to one aspect, a method for identifying a client computing device in a networked computing environment is provided. The method receives a discovery data record that includes a hardware identification and a logical identification, and in response, queries a plurality of client records for a matching client record. If a matching client record is identified by the query it is compared with the received discovery data record to identify the client computing device.Type: GrantFiled: August 26, 2004Date of Patent: October 8, 2013Assignee: Microsoft CorporationInventors: Eric Holtz, David James, Michael Healy
-
Patent number: 8533319Abstract: Methods and systems for restoring networks to normal behavior are disclosed. For example, in various embodiments an apparatus for addressing device abnormalities in a network may include node monitoring circuitry configured to monitor device abnormalities in the network, and ranking circuitry that may receive information from the node monitoring device and, upon receiving information from the monitoring circuitry that multiple devices in the network are compromised, may provide ranking information as to which of the multiple compromised devices in the network is to be attended to first.Type: GrantFiled: June 2, 2010Date of Patent: September 10, 2013Assignee: Lockheed Martin CorporationInventor: Michael Draugelis
-
Patent number: 8533843Abstract: A device, method, and program product are disclosed which are configured to receive, at a risk analysis engine, one or more business service models from a configuration management database, wherein the one or more business service models each comprises a set of configuration items, and wherein the one or more business service models each indicate a type of configuration item and a connectivity of the configuration item; send the set of configuration items to a vulnerability assessment tool; receive, from the vulnerability assessment tool, one or more vulnerability assessment scores for each configuration item within the set of configuration items; determine an overall business service vulnerability score for each of one or more business services based on the one or more business service models and the vulnerability assessment scores received from the vulnerability assessment tool; and output electronically the overall business service vulnerability score.Type: GrantFiled: October 13, 2008Date of Patent: September 10, 2013Assignee: Hewlett-Packard Development Company, L. P.Inventor: Eliav Levi
-
Patent number: 8484213Abstract: A heterogeneous high availability cluster manager implements a method involving a reception of a first cluster management command in a first cluster management protocol, a conversion of the first cluster management command to a second cluster management command in a second cluster management protocol, and a sending of the second cluster management command to a first node in a heterogeneous cluster management group. To facilitate the conversion of the first cluster management command to the second cluster management command, the second cluster management protocol is registered with the manager whereby the first cluster management command is mapped to the second management command.Type: GrantFiled: August 31, 2005Date of Patent: July 9, 2013Assignee: International Business Machines CorporationInventors: Rainer Wolafka, Maria Savarimuthu Rajakannimariayn
-
Patent number: 8438235Abstract: Disclosed are apparatus and techniques for escalating an instant messaging (IM) session between two or more users to an audio session so that a communication device (by one or more users) that will optimize the audio session is selectively and intelligently utilized. In one embodiment, if an IP (Internet Protocol) phone is connected to the computer on which an IM session is being escalated, the IP telephone may be used instead of the computer device's own soft telephone so as to maximize audio clarity and quality. In another embodiment, a user's cell phone may be utilized for a mobile user who is using a laptop that is not coupled to an IP telephone or who is communicating from a hotel room in which a telephone call is typically more expensive than a cell phone call. Numerous embodiments for optimizing such audio sessions are described herein.Type: GrantFiled: August 25, 2005Date of Patent: May 7, 2013Assignee: Cisco Technology, Inc.Inventors: Daniel Shaffer, Labhesh Patel, Shmuel Shaffer, Cullen F. Jennings
-
Patent number: 8423613Abstract: A messaging system and associated computer program product. The messaging system includes a plurality of browsers connected through a common server. The server includes a message engine for receiving from a first user browser a request to enter chat mode with a second user browser; then receiving asynchronously from the second user browser a request to download any content from the common server or any other intranet or Internet server; and responding to the request from the second user browser with content modified to instantiate a chat session between the first and second user browsers.Type: GrantFiled: January 15, 2010Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Dmitrii Andreev, Gregory Vilshansky
-
Patent number: 8386634Abstract: A communication system includes a communication device provided with an accessing system capable of accessing web pages. At least one operation member which is operable with being attached to the communication system is provided. The operation member has a data storage containing first access data which is used by the communication device to access a first predetermined web page. The system includes a transmitting system that transmits the first access data contained in the data storage to the accessing system when the at least one operation member is operated while it is attached to the communication device. In this configuration, the accessing system accesses the first predetermined web page based on the first access data transmitted from the data storage of the at least one operation member.Type: GrantFiled: February 5, 2004Date of Patent: February 26, 2013Assignee: Brother Kogyo Kabushiki KaishaInventors: Kazuma Aoki, Yoshiyuki Kondo, Yuji Sato
-
Patent number: 8386272Abstract: A system, method and apparatus for autonomically assisting in the creation of an administrative policy. The method can include detecting a stimuli in a system under study and monitoring a response by a systems administrator to the stimuli. The stimuli and the response can be forwarded to a policy maker suited to analyze the stimuli and the response. Also, the policy maker can be queried for a preferred response to the stimuli. Based upon the preferred response to the stimuli, a policy for responding to the stimuli can be formulated. As such, the policy can be enforced in managing the system under study. Moreover, the policy can be forwarded for future consideration to the systems administrator.Type: GrantFiled: August 6, 2003Date of Patent: February 26, 2013Assignee: International Business Machines CorporationInventors: David Louis Kaminsky, David M. Ogle
-
Patent number: 8307109Abstract: Methods and systems for enterprise data integration are described. The methods and systems take elements of a data integration process typically operating in a batch-mode, transform the elements in real time, and expose the results as a service that can be accessed by a business enterprise in real time, and optionally also in batch mode. The service can be accessed through a graphical user interface, providing automatic data integration in real time without additional coding. The service can also operate with mobile devices.Type: GrantFiled: August 24, 2004Date of Patent: November 6, 2012Assignee: International Business Machines CorporationInventors: Jean-Claude Mamou, Thomas Cherel, Brian Tinnel, Christophe Toum, Cassio Dos Santos, David T. Meeks, Lee Scheffler
-
Patent number: 8275881Abstract: A method, system, and program for managing escalating resource needs within a grid environment are provided. A job is submitted into a first selection of resources in a grid environment from among a hierarchy of discrete sets of resources accessible in the grid environment. Discrete sets of resources may include locally accessible resources, enterprise accessible resources, capacity on demand resources, and grid resources. The performance of the first selection of resources is monitored and compared with a required performance level for the job. If the required performance level is not met, then the discrete sets of resources are queried for available resources to meet the required performance level in an order designated by said hierarchy. Available resources in a next discrete set of resource from the hierarchy of discrete sets of resources are added to a virtual organization of resources handling the job within the grid environment.Type: GrantFiled: May 4, 2009Date of Patent: September 25, 2012Assignee: International Business Machines CorporationInventors: Craig Fellenstein, Rick Allen Hamilton, II, Joshy Joseph, James Seaman
-
Patent number: 8275865Abstract: Methods, systems, and computer program products for selecting among a plurality of alert conditions for processing by a resource management system. A priority indication is associated with at least some resources in a computer system. Resources that are associated with the alert conditions are identified. An alert condition is selected from among the alert conditions based on the priority indication that is associated with the identified resources.Type: GrantFiled: February 5, 2004Date of Patent: September 25, 2012Assignee: International Business Machines CorporationInventor: Robert Thomas Uthe
-
Patent number: 8260874Abstract: A system and method in accordance with the present disclosure provide collateral information to a user receiving primary information via a first user interface. The system and method receives a user request for the collateral information. A context is defined from the primary information. A user's probable collateral information needs are derived from the context. The system and method then map the needs to one or more information repositories, and query the information repositories and retrieve collateral information satisfying the needs. The collateral information is presented via at least one user interface, which may include the first user interface. The system and method provide user controls via the at least one user interface to facilitate exploration of the collateral information by the user.Type: GrantFiled: January 12, 2004Date of Patent: September 4, 2012Assignee: Northwestern UniversityInventors: Kristian Hammond, Jerome Budzik, Lawrence Birnbaum, Kevin Livingston, Mark Dredze
-
Patent number: 8224966Abstract: A method is disclosed for reproxying connections. According to one aspect, a first connection is established between a client and a proxy device. A second connection is established between the proxy device and a server. The first connection comprises a first endpoint at the client and a second endpoint at the proxy device. The second connection comprises a third endpoint at the proxy device and a fourth endpoint at the server. The first and second connections are unproxied by dissolving the second and third endpoints while maintaining the first and fourth endpoints. After the connections have been unproxied, a packet is received at the proxy device. In response, the first and second connections are reproxied by creating fifth and sixth endpoints at the proxy device, so that the first connection comprises the fifth endpoint and the second connection comprises the sixth endpoint.Type: GrantFiled: August 24, 2004Date of Patent: July 17, 2012Assignee: Cisco Technology, Inc.Inventors: Patrick Darrell Tate, Alexander S. Waterman, Martin David Grimm, Anurag Kahol