Patent application number | Description | Published |
20080204232 | ENHANCED SYSTEM FOR TRACKING IMPORTANT TRAVEL ITEMS INCLUDING VERIFYING DYNAMIC PROHIBITIONS OF PACKED ITEMS - A system for checking travel bag for important items by applying an RFID tag to each of a plurality of items, each RFID tag having a unique identifier, storing a list of items and associated RFID tag identifiers in a data store, receiving a user selection of important items for a particular trip, transferring a subset of said plurality of items to a portable computing device, using the portable computing device to scan the RFID tags on the user's packed items, determining if any important items are missing, and displaying a warning to the user if any item from the list is not found. Additionally, the containers are each provided an RFID tag to indicate location of each packed item, and the system accesses one or more jurisdictional restrictions lists, verifies proper location of restricted items and absence of prohibited items, and warns the user of any violations. | 08-28-2008 |
20080204233 | SYSTEM FOR TRACKING IMPORTANT TRAVEL ITEMS USING RFID TAGS AND PERVASIVE COMPUTING DEVICES - A system for checking travel bag for important items by applying an RFID tag to each of a plurality of items, each RFID tag having a unique identifier, storing a list of items and associated RFID tag identifiers in a data store, receiving a user selection of important items for a particular trip, transferring a subset of said plurality of items to a portable computing device, using the portable computing device to scan the RFID tags on the user's packed items, determining if any important items are missing, and displaying a warning to the user if any item from the list is not found. | 08-28-2008 |
20080222306 | System and Method for Accessing Multiple Addresses Per Domain Name Using Networked Repository - A system, method, and program product are provided that gather a plurality of IP addresses that each correspond to a common domain name. A list of domain names is provided for gathering corresponding IP addresses. For each of the received domain names, IP addresses are retrieved from a number of DNS tables. The unique IP addresses are identified from the gathered IP addresses retrieved for each of the domain names. The domain names and their associated IP addresses are stored in a domain name repository. | 09-11-2008 |
20080222307 | System and Method for Multiple IP Addresses During Domain Name Resolution - A system, method, and program product are provided that access a network resource by sending, from a client computer system, a first domain name resolution request to a DNS server. The first domain name resolution request includes a first domain name and requests multiple IP addresses. The client computer system receives, from the DNS server, a first multiple IP address response that corresponds to the first domain name resolution request, the first multiple IP address response including a IP addresses that each correspond to the first domain name included in the first domain name resolution request. At the client computer system, one of the plurality of IP addresses is selected by a user. The client computer system sends a request to a server corresponding to the selected IP address. The client computer system then receives responsive data from the server and displays the responsive data on a display screen accessible from the client computer system. | 09-11-2008 |
20080256625 | System and Method for Enhanced Layer of Security to Protect a File System from Malicious Programs - A system and method for providing an enhanced layer of security to protect the file system from malicious programs are provided. An additional layer of security for protecting data and to minimize successful attacks by malicious programs is provided. This additional layer uses the feature of code signing to verify that the code is from a source which the code claims to be from, and also that the code has not been tampered with by a malicious party. The file system provides a feature by which certificates are mapped to portions of a file system, e.g., files/directories, such that only programs that are certified by those certificates are able to read/modify those portions of the file system. | 10-16-2008 |
Patent application number | Description | Published |
20080229396 | ISSUING A COMMAND AND MULTIPLE USER CREDENTIALS TO A REMOTE SYSTEM - A login shell and command access checking supporting multiple user credentials are provided. The login shell receives a request to execute a command from a remote computer including a multi-user credential. The login shell authenticates the command access rights of the multi-user credential. In response to command access rights being granted, the command is executed. | 09-18-2008 |
20080256609 | Multiple User Credentials - A login shell and file/directory access checking supporting multiple user credentials are provided. The login shell receives user input from a particular user including login information for a plurality of user accounts for that particular user. The login shell authenticates the plurality of user accounts using the login information and retrieves a plurality of user credentials corresponding to the plurality of user accounts. This plurality of user credentials forms a multi-user credential. In response to a request for access to a file, the access rights to the file for the user are verified by verifying the access rights of the multi-user credential. | 10-16-2008 |
20090031128 | TRANSPARENT AWARE DATA TRANSFORMATION AT FILE SYSTEM LEVEL FOR EFFICIENT ENCRYPTION AND INTEGRITY VALIDATION OF NETWORK FILES - A mechanism for enabling efficient encryption and integrity validation of network files. When a request to read a file stored in a local network file system is received, the local network file system examines cryptographic attributes associated with the file to determine if the file is encrypted or integrity-verified. If the cryptographic attributes indicate the file is encrypted, the local network file system omits the encryption of the file by the local network file system prior to passing the file to the remote network file system. If the cryptographic attributes indicate the file is integrity-verified, the local network file system omits the integrity-verification of the file by the local network file system prior to passing the file to the remote network file system. The local network file system then transmits the file to the remote network file system. | 01-29-2009 |
20130091446 | CUSTOMIZED MULTI-APPLICATION GRAPHICAL WINDOW - A method, programmed medium and system are disclosed which provide the ability to create a customized executable graphical window (CGW) application by selecting desired regions or modules from different base applications. In one example, the system records the location of a selected region of an RGA, creates a CGW to include the selected region of the base RGA application and saves the CGW as a GUI executable application separate from the RGA. The user is enabled to run the CGW as a separate application without the need to switch among the various RGAs of which regions or modules have been included in the CGW. | 04-11-2013 |