Patent application number | Description | Published |
20110078440 | METHOD AND APPARATUS TO IMPLEMENT VALID MOBILE TICKET TRANSFER - Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user. | 03-31-2011 |
20110214076 | METHOD AND APPARATUS FOR OPTIMIZING GENERATION OF USER INTERFACE - An apparatus and method which enable re-developers to perform complicated user interface development in a simple manner by setting extensible elements and loading thereto add-on application programs. In the apparatus and method of the invention, one or more extensible elements are set in a host user interface application. Then, one or more add-on user interface applications are loaded to one or more of the set extensible elements. The apparatus and method according to the invention can adjust the user interface dynamically, in real-time and finely without the need to close and reboot the application program. The apparatus and method of the invention do not limit the development language | 09-01-2011 |
20120222110 | DATA LEAKAGE PROTECTION IN CLOUD APPLICATIONS - A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content. | 08-30-2012 |
20130160105 | CONFIGURING IDENTITY FEDERATION CONFIGURATION - A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties. | 06-20-2013 |