Abstract: A system for allowing multiple users to access and unlock shared electronic documents in a computer system. A group of users are defined as potential “lock-breaker” users for a document, such that they are automatically contacted in the event that a user wishes to unlock the document after it has been locked by another user. The lock-breaker users defined for a document are given access rights to the document that allow them to break a current lock on the document, so that it can be opened for editing, and accordingly re-locked. The lock-breaker users for a document may be organized in a hierarchy, such as a hierarchy matching the relationships of employees of an organization. The lock-breaker hierarchy may define the order in which the lock-breaker users are automatically contacted when a user wishes to access a locked document (e.g. an LDAP directory tree or social network).
Type:
Application
Filed:
October 23, 2007
Publication date:
April 23, 2009
Inventors:
Chenita D. Daughtry, Carol S. Zimmet, Robert C. Weir, Mohamed Bachiri
Abstract: Methods, systems, and computer-readable media provide for lawfully intercepting broadband data traffic. According to one method, a request to retrieve a network address associated with a login identifier is received. An Authentication, Authorization and Accounting (AAA) server is queried based on the login identifier to retrieve the network address associated with the login identifier. Relevant data traffic and AAA information associated with the relevant data traffic is filtered at a network element. The relevant data traffic and the AAA information is forwarded to a law enforcement agency (LEA) system.
Type:
Application
Filed:
April 3, 2008
Publication date:
April 16, 2009
Inventors:
Scott Sheppard, Stephen Cersosimo, James R. Pennington
Abstract: A method and system for multifaceted scanning, the method having the steps of receiving a data source; processing the data source for a plurality of scanning aspects, the processing step utilizing rules and policies for the plurality of scanning aspects to provide transformed, modified or adapted content; and outputting the transformed, modified or adapted content.
Type:
Application
Filed:
October 5, 2007
Publication date:
April 9, 2009
Applicant:
RESEARCH IN MOTION LIMITED
Inventors:
Brian McColgan, Gaelle Martin-Cocher, Michael Shenfield
Abstract: A system and a computer readable medium for estimating the first access time of a plurality of currently active transactions accessing at least one database object is disclosed. According to varying embodiments of the system and computer readable medium disclosed herein, the present invention may provide an efficient mechanism for tracking the earliest first access time of the set of all currently active transactions accessing an object in a database system.
Type:
Application
Filed:
November 19, 2008
Publication date:
March 19, 2009
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: An information processing apparatus includes a processor and a memory unit connected to the processor. The memory unit stores a setting value and an web application. The web application causes the processor to change the setting value according to a request message from a client. The web application causes the processor to update the setting value stored in the memory unit with a setting value contained in a query string if the request message indicates a request for changing the setting value and the request message is transmitted from the client by a user with administrator privilege, and the web application causes the processor to insert a cookie having the setting value contained in the query string to a response header if the request message is transmitted from the client by a user without administrator privilege.
Abstract: An information management and distribution system is disclosed. The information management and distribution system includes a client-side application and a server application that interact to facilitate the controlled exchange of contact information over a network. The client-side application can provide creation and design, rolodex, exchange, and update features. The information management and distribution system can also include a corporate administrator application. Still another aspect of the invention is that contact information can be distributed to registered users in a common format.
Abstract: A apparatus and method for contact expiration management that includes identifying a contact as temporary, setting an expiration date for the temporary contact, and removing the temporary contact on the expiration date. The apparatus may be a mobile device such as a mobile phone. A user of the mobile device may respond to a prompt and select removing the temporary contacts or the temporary contacts may be removed automatically. A cleanup routine operating on the mobile device monitors time stamps on contacts and expiration dates of contacts to determine when a contact might be removed.
Abstract: A system for providing background check information to consumers diversifies a search vector by iteratively searching databases to obtain comprehensive identifying information while eliminating redundancies. Fuzzy expansion operators based on phonetics, misspellings, and other factors may be employed. The self-background check is intended to be used by consumers to safeguard against identify theft.
Abstract: A system for managing data and communications over a network for an institution having a defined organizational structure is disclosed. A collaboration space includes interconnected collaboration points having an accessible object, a history log, and digital rights management controls. Mappings extend from access profiles associated with individuals within the defined organizational structure to appropriate collaboration points that include the digital rights management controls permitting access to the corresponding accessible objects by the access profiles. The mappings enable different individuals to have different perspectives of the collaboration space as well as view the collaboration space from a third-party perspective providing details of the access of third-party to an individual's mapping or omniscient perspective providing details of the access of a particular collaboration point.
Abstract: One or more parameters such as time is reported to a center using a portable access device. The center then automatically receives data from the access device and populates an electronic form and converts the data for storage and subsequent processing or review. The invention allows other parties, upon proper authentication, to annotate received data, to indicate acceptance or rejection of the reported data. Depending on the relationship of the various parties and business rules stored with the center, parties other than the sender and center may also download reported data for subsequent processing, even where they have different hardware and software platforms. The invention is particularly suitable for senders such as employees who need to submit time sheets, expense reports, and the like to an employer, or for automatic analysis of submitted inventory reports, product orders, etc.
Abstract: The present invention discloses a user personalized operating method and operating apparatus for use in a Chemistry analyzer, said method comprises following steps: initiating the operating software of the Chemistry analyzer; loading a profile, said profile comprising at least a database containing combinations of controls for respective users; retrieving configuration information of the function components from the database; and setting display interface and function components by the Chemistry analyzer according to the configuration information. The present invention realizes different combinations of controls and display interface by use of the profile and thus operating software of different versions can be provided.
Abstract: A system for searching data over a network includes a server connected to the network adapted as an interface to users accessing the sever over the network using a computerized appliance, a data repository associated with the server adapted for storing and managing data, and a software interface for accepting a search request from a user. Privately held data managed by third-party content providers is accessed by the system and categorized, summarized, and indexed for search along with publically accessible data normally indexed for data searching and wherein the content providers provide user data to the system including authentication data of users authorized to access the privately held data, the users enabled by the software interface to request search results relative to privately held data the private search results served to the requesting users according to match of authentication data submitted with the request.
Type:
Application
Filed:
June 13, 2008
Publication date:
October 9, 2008
Inventors:
Donald Robert Martin Boys, Susan Araiza-Boys
Abstract: This invention relates to a method for providing a superior file storage system which utilizes the Internet and which has security as well as a superior user experience as foremost goals. The invention is ideal for the secure storage of critical documents, combining the security of a safe deposit box with the advantages of online file storage. Furthermore, the invention is designed to minimize time spent by an end user on organization, security, and file format issues.
Abstract: A system includes an active node and a standby node and zero or more replica nodes. Each of the nodes includes a database system, such as an in-memory database system. Client updates applied to the active node are written through to the standby node, and the standby node writes the updates through to a primary database and updates the replica nodes. Commit ticket numbers tag entries in transaction logs and are used to facilitate recovery if either of the active node or the standby node fails. Updates applied to the primary database are autorefreshed to the active node and written through by the active node to the standby node which propagates the updates to the replica nodes. Bookmarks are used to track updated records of the primary database and are used to facilitate recovery if either of the active node or the standby node fails.
Type:
Application
Filed:
February 12, 2008
Publication date:
September 11, 2008
Applicant:
Oracle International Corporation
Inventors:
Rohan Aranha, Paul Tuck, John Ernest Miller, Chih-Ping Wang, Marie-Anne Neimat, Susan Sokeng Cheung
Abstract: The present invention is directed towards systems and methods for generating recommendations in response to one or more users based on user search queries. The method of the present invention comprises generating a recommendation model based on aggregate activity generated though use of a network resource. A user profile is generated based on an individual user's interaction with said network resource. A user query is received and the previously generated recommendation model in combination with the previously generated user profile are utilized to provide a recommendation relevant to the user search query and global statistics.
Type:
Application
Filed:
March 7, 2007
Publication date:
September 11, 2008
Inventors:
Jiangyi Pan, Wei Du, Joydeep Sen Serma, Shyam Kapur
Abstract: A method and apparatus that enables specification of what search documents have to contain, where specification can have almost unlimited precision. The method allows specification directly using the proposed information location in information space or using other formats such as list of keywords or natural text, while method will translate it to information location in information space allowing user to easily check system understanding of his search specification and correct it. When matching documents are displayed, their information location is displayed and user might correct it according to his knowledge, allowing system to influence information about documents basing it on information from several users.
Type:
Application
Filed:
January 16, 2008
Publication date:
July 17, 2008
Inventors:
Wojciech Czyz, Miguel Morales Angel Rubio, Elmer Ivan Wong Samaniego
Abstract: A system and method for linking information of one user to other users via a data aggregation server is provided. Various security settings govern the linking of information. Various methodologies for initiating a link of PIM data are also provided including automatic linking, targeted linking and requested linking. Implementations utilizing group profiles are also provided.
Abstract: A method, apparatus, and system for providing role-based access control (RBAC) for storage management are described herein. Resource-identifying information is stored in a role-based access database for a network storage system, in association with role-identifying information for each of a plurality of roles and operation-identifying information. The operation-identifying information indicates one or more authorized operations for each of the plurality of roles and the resource-identifying information identifies specific resources maintained by the network storage system. The role-identifying information, data indicating one or more authorized operations for at least one of the roles, and resource-specific identifying information in the role-based access database are used to determine whether to allow or deny a request from a network storage client to access a resource maintained by the network storage system.
Type:
Application
Filed:
November 17, 2006
Publication date:
May 22, 2008
Inventors:
Timothy J. Thompson, James Hartwell Holl, William Raoul Durant
Abstract: Methods and apparatus for a recommendation system based on collaborative filtering is provided. Explicit and implicit ratings of items by network users are used to create a contextual model. The explicit ratings comprise different rating types regarding different item attributes. The implicit ratings comprise different rating types derived from different user events and may include recency, intensity, or frequency ratings. The contextual model may be optimized for a specific objective function, such as click-through-rate or conversion rate. In other embodiments, item information is used to produce a content model where item information for an item is encoded as metadata into a document that represents the item. The contextual or content model is used to recommend one or more items to a current user. The basic unit of the recommendation system may be an item set of two or more items or a particular sequence of two or more items.
Type:
Application
Filed:
November 17, 2006
Publication date:
May 22, 2008
Inventors:
Wei Guan, Christina Yip Chung, Long-Ji Lin
Abstract: Methods and apparatus for a recommendation system based on collaborative filtering is provided. Explicit and implicit ratings of items by network users are used to create a contextual model. The explicit ratings comprise different rating types regarding different item attributes. The implicit ratings comprise different rating types derived from different user events and may include recency, intensity, or frequency ratings. The contextual model may be optimized for a specific objective function, such as click-through-rate or conversion rate. In other embodiments, item information is used to produce a content model where item information for an item is encoded as metadata into a document that represents the item. The contextual or content model is used to recommend one or more items to a current user. The basic unit of the recommendation system may be an item set of two or more items or a particular sequence of two or more items.
Type:
Application
Filed:
November 17, 2006
Publication date:
May 22, 2008
Inventors:
Wei Guan, Christina Yip Chung, Long-Ji Lin
Abstract: A computer server hosting a website wherein the computer server executes program instructions, the programming instructions comprising: authenticating a valid customer; entering survey data and comments about a service provider by the valid customer from a computer system coupled to the server; adding survey score and comments to a database of the service provider; post survey score and comments on the website; filtering survey data and comments for triggers indicating potential liability for the service provider; and notifying the service provider of the potential liability.