Patent application number | Description | Published |
20160034723 | TEST AUTOMATION FOR AUTOMATED FARE MANAGEMENT SYSTEMS - A test robot may receive a test scenario for testing a fare management system. The test robot may program a fare card to store card information based on the test scenario. The test robot may provide an instruction to an actuator component to cause the actuator component to move the fare card within communicative proximity of a card reader device. The fare card, when moved within communicative proximity of the card reader device, may cause the card reader device to read the stored card information from the fare card and to provide updated card information, based on the stored card information, for storage by the fare card. The test robot may read the updated card information from the fare card. The test robot may provide test result information, based on the updated card information, to a test management device. | 02-04-2016 |
20160055428 | SECURE SHORT-DISTANCE-BASED COMMUNICATION AND ENFORCEMENT SYSTEM - A secure short-distance-based communication and enforcement system validates users in a validation and enforcement area and can check if users in the validation and enforcement area have been validated. Run-time IDs and keys that may be location-specific and device-specific may be generated and utilized for secure communication between mobile devices and zone computers and enforcement computers that execute validation and inspection. | 02-25-2016 |
20160055689 | SECURE SHORT-DISTANCE-BASED COMMUNICATION AND ACCESS CONTROL SYSTEM - A secure short-distance-based communication and access control system controls access to a restricted area. A run-time mobile device identifier and keys that may be location-specific, device-specific and time-specific are generated and utilized for secure communication between mobile devices and zone computers. The zone computers can validate users via their mobile devices to allow or deny access to the restricted area. | 02-25-2016 |
20160055690 | SECURE SHORT-DISTANCE-BASED COMMUNICATION AND VALIDATION SYSTEM FOR ZONE-BASED VALIDATION - A secure short-distance-based communication and validation system validates users in a validation area. The system may include multiple zones in the validation area and beacons in each zone. A run-time mobile device identifier and keys that may be location-specific, device-specific and time-specific are generated and utilized for secure communication between mobile devices and a zone computer in a zone. The validation area may be in a vehicle, and validation may include deducting a fare. | 02-25-2016 |
20160055693 | VALIDATION IN SECURE SHORT-DISTANCE-BASED COMMUNICATION AND ENFORCEMENT SYSTEM ACCORDING TO VISUAL OBJECTS - A secure short-distance-based communication and enforcement system validates users in a validation and enforcement area and can check if users in the validation and enforcement area have been validated. A visual object can be displayed on an enforcement computer and a mobile device of a user in the in the validation and enforcement area to determine if a user is validated. The visual object may be periodically changed. | 02-25-2016 |
20160055697 | RESTRICTED AREA ACCESS CONTROL SYSTEM - An access control system controls access to a restricted area. A mobile device exchanges messages with a backend server to validate a user and to control an actuator for a physical barrier responsive to validation. Beacon-based unique identifiers are calculated at validation time for the current location to facilitate the validation. | 02-25-2016 |
Patent application number | Description | Published |
20110113062 | SYSTEM AND METHOD FOR SEARCHING DISPARATE DATASTORES VIA A REMOTE DEVICE - A system and method are provided for searching the contents of a network system connected to data storage devices from a remote terminal over a wired or wireless link. This system formulates search requests, and dispatches the requests, A variety of search engines and services are invoked to find the requested contents. A summary is formed in a format brief enough for transmission over a wireless link. The search summary information is indexed the remote terminal to subsequently request all or part of a document referenced in the search summary, allows formation of requests of all or part of a referenced document in its original form or in a form transcoded appropriately for transmission over a wireless link and presented on the remote terminal. | 05-12-2011 |
20120210415 | METHOD, APPARATUS AND SYSTEM FOR PROVISIONING A PUSH NOTIFICATION SESSION - A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session. | 08-16-2012 |
20120284786 | SYSTEM AND METHOD FOR PROVIDING ACCESS CREDENTIALS - Embodiments of the invention are concerned with providing access credentials associated with a user of a service to a server hosting the service, e.g. enabling single sign on by the user to a number of servers. | 11-08-2012 |
20130104118 | APPLICATION INSTALLATION SYSTEM - A method, system and computer program product for controlling the installation of applications on a user terminal is disclosed. In one aspect, a catalogue server identifies a first and a second installation control setting corresponding to a first and a second application on the basis of user identification data from a data store comprising entries for a plurality of applications and their corresponding installation control settings. Subsequently, the catalogue server determines installation control data for at least one of the first and second application on the basis of the first and the second installation control setting. The determined installation control data is transmitted to the user terminal for controlling installation of at least one of the first and the second application | 04-25-2013 |
20130227279 | METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM - Data is stored on a computing device in an encrypted form using a control application. A data access application requests access to the data. It is determined whether the data access application has available a shared encryption key that is available to the control application. If a shared encryption key is available, the shared encryption key is used to encrypt a request for access to the data. If a shared encryption key is not available, a shared encryption key is negotiated with the control application, and the negotiated shared encryption key is used to encrypt the request for access to the data. The control application receives the encrypted request, decrypts the encrypted request using the shared encryption key, and makes the data stored on the computing device in encrypted form available to the data access application in response to the decrypted request. | 08-29-2013 |
20130227280 | METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM - A data access application key is generated. The data access application key is for use by a data access application to enable decryption of data that is stored in encrypted form on a computing device using the data access application key. The data access application key is generated using an identifier of the data access application and an application key that is specific to at least one of the computing device and/or a user of the computing device. | 08-29-2013 |
20130227287 | METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM - Data is stored on a computing device in encrypted form in respective digital containers. At least one data access application is stored on the computing device. A control application of the computing device connects to a remote control center. A command from the remote control center is received at the connected control application. The command contains an action to be taken in respect of at least one of the at least one data access application and the containers stored on the computing device. The command is passed from the connected control application to the data access application or container, and the data access application or container carries out the command. | 08-29-2013 |
20130238763 | METHOD, APPARATUS AND SYSTEM FOR PROVISIONING A PUSH NOTIFICATION SESSION - A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session. | 09-12-2013 |
20140208088 | METHODS FOR REMOTE CONFIGURATION OF SOFTWARE APPLICATIONS - Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described. | 07-24-2014 |
20150127708 | SYSTEMS AND METHODS FOR FACILITATING SERVICE PROVISION BETWEEN APPLICATIONS - Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. In response to determining that the first service is to be executed on behalf of the first service, a request message is sent to a data store including an identifier of the first service. The data store comprising entries indicating applications held on one or more user terminals, and indicating one or more services that may be executed, on request, by a corresponding application. The first user terminal receives a response message from the data store identifying one or more applications to which execution of the first service may be delegated. | 05-07-2015 |
20150261515 | APPLICATION INSTALLATION SYSTEM - A method, system and computer program product for generating a list of applications available for installation on a user terminal is disclosed. In one aspect, a catalogue server identifies a first and a second installation control setting corresponding to an application on the basis of user identification data from a data store comprising entries for a plurality of applications and their corresponding installation control settings. Subsequently, the catalogue server determines installation control data for at least one of the first and second application on the basis of the first and the second installation control setting. The determined installation control data is used to generate the list of application available for installation on the user terminal. | 09-17-2015 |
20150334105 | METHODS FOR ACTIVATION OF AN APPLICATION ON A USER DEVICE - Methods for activating a second application on a user device using a first application already installed and activated on the user device are described. In one embodiment the second application requests activation from the first application. The first application then authenticates a user before providing an activation response. The activation response can be requested from a remote server by the first application on behalf of the second application. The methods improve the ease of activating new software on a user device. | 11-19-2015 |
20160105522 | METHOD, APPARATUS AND SYSTEM FOR PROVISIONING A PUSH NOTIFICATION SESSION - A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session. | 04-14-2016 |
Patent application number | Description | Published |
20110158252 | OUTGOING COMMUNICATIONS INVENTORY - Systems and methods for generating and accessing a communications inventory are provided. To generate the inventory in one embodiment, a plurality of outgoing communications is received. The outgoing communications may have been auto-generated or generated as part of a batch process. Next, a determination is made that a first outgoing communication of the plurality of outgoing communications is unique relative to other outgoing communications to avoid storing duplicate messages. Lastly, a user may access a display of the first outgoing communication. | 06-30-2011 |
20110246553 | VALIDATION OF INTERNAL DATA IN BATCH APPLICATIONS - A method and a system provide validated internal data about a running batch application. The validated internal data may be accessed via administrative interface for batch application for monitoring and management. The system comprises a batch host to host an instance of a running batch application. The running batch application comprises an interface to a batch agent. A controller is in communication with the batch agent and requests validated internal data about the running batch application via the batch agent. The controller further receives the validated internal data about the running batch application from the batch agent. | 10-06-2011 |
20110246640 | METHOD AND SYSTEM FOR SYNCHRONOUS AND ASYNCHRONOUS MONITORING - A system and method for synchronous and asynchronous monitoring of network resources is provided. In an example system, an asynchronous monitoring engine is in communication with the network resources and receives asynchronous data from a portion of the network resources. The asynchronous data is collected at an application layer or at an end-user application layer. A synchronous monitoring engine is also in communication with the network resources and accesses synchronous data in the application layer in response to receiving a request from the asynchronous monitoring engine. The system further identifies an anomaly corresponding to the asynchronous characteristic and the synchronous characteristic. | 10-06-2011 |
20120324417 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received, in response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 12-20-2012 |
20120324435 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEPLOYMENT - Methods and systems for facilitating incremental software deployment are disclosed. For example, a method can include receiving a command to deploy a second version of software to a computing system for execution on the computing system in response to the command, differences between the second version of the software and a first version of the software being executed on the computing system are determined. Code changes to be made to the first version of the software to produce the second version of the software are determined based on the differences. The code changes to be made to the first version of the software are transmitted to the computing system. | 12-20-2012 |
20140380271 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received. In response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 12-25-2014 |
20150207771 | OUTGOING COMMUNICATIONS INVENTORY - Systems and methods for generating and accessing a communications inventory are provided. To generate the inventory in one embodiment, a plurality of outgoing communications is received. The outgoing communications may have been auto-generated or generated as part of a batch process. Next, a determination is made that a first outgoing communication of the plurality of outgoing communications is unique relative to other outgoing communications to avoid storing duplicate messages. Lastly, a user may access a display of the first outgoing communication. | 07-23-2015 |
20160048391 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received. In response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 02-18-2016 |
20160127208 | METHOD AND SYSTEM FOR SYNCHRONOUS AND ASYNCHRONOUS MONITORING - A system and method for synchronous and asynchronous monitoring of network resources is provided. In an example system, an asynchronous monitoring engine is in communication with the network resources and receives asynchronous data from a portion of the network resources. The asynchronous data is collected at an application layer or at an end-user application layer. A synchronous monitoring engine is also in communication with the network resources and accesses synchronous data in the application layer in response to receiving a request from the asynchronous monitoring engine. The system further identifies an anomaly corresponding to the asynchronous characteristic and the synchronous characteristic. | 05-05-2016 |
20160139913 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEPLOYMENT - Methods and systems for facilitating incremental software deployment are disclosed. For example, a method can include receiving a command to deploy a second version of software to a computing system for execution on the computing system. In response to the command, differences between the second version of the software and a first version of the software being executed on the computing system are determined. Code changes to be made to the first version of the software to produce the second version of the software are determined based on the differences. The code changes to be made to the first version of the software are transmitted to the computing system. | 05-19-2016 |
Patent application number | Description | Published |
20080311033 | PROCESS FOR PREPARING DETERGENT BUILDER ZEOLITE-A FROM KIMBERLITE TAILINGS - The present invention provides a process for the preparation of detergent builder Zeolite-A from Kimberlite tailing generated as solid waste during diamond mining is disclosed. The process comprises, reacting an acid treated Kimberlite tailing with alkali solution to obtain sodium silicate and reacting it with alkaline aluminum source at room temperature and crystallizing at higher temperature to obtain Zeolite-A. The product is useful as builder in detergent formulation. | 12-18-2008 |
20090010832 | PROCESS FOR THE PREPARATION OF FINELY DIVIDED PRECIPITATED SILICA - The present invention provides a process for the preparation of finely divided precipitated silica. Finely divided precipitated silica is prepared by neutralization of alkali silicate solution, under continuous stirring, at 60° to 90° C. in presence of alkali metal salt as coagulating agent, in various neutralization steps during which neutralization is interrupted for specific time. Further acidic silica sol, is added until 60 to 80% of total alkali is neutralized. The reaction mixture is then aged at least for 3 minute under continuous agitation, followed by circulation through centrifugal pump at an appropriate rate. | 01-08-2009 |
20140018238 | ACTIVATED CARBON-METAL ORGANIC FRAMEWORK COMPOSITE MATERIALS WITH ENHANCED GAS ADSORPTION CAPACITY AND PROCESS FOR THE PREPARATION THEREOF - The present invention discloses activated carbon-metal organic framework composite materials (AC@MOF) with enhanced gas adsorption capacity. The present invention also discloses a process for the preparation of carbon-metal organic framework composite materials (AC@MOF). The present invention involves the use of “void space filling method” in metal organic frameworks (MOFs), which have been accomplished by in-situ addition of selected type and appropriate amount of activated carbon during the synthesis of MOF such as Cu-BTC, in the storage of gases such as methane. The gas adsorption capacity of these AC@MOF composite materials is significantly increased through this method. | 01-16-2014 |
20150093309 | Method Of Recycling Of By-Products For The Production Of Soda Ash And Ammonium Sulphate - A method of producing soda ash and ammonium sulphate by recycling by-products of Merseberg and Solvay processes includes treating brine with soda ash distiller waste for desulphatation of the brine to obtain gypsum, recovering pure salt from the desulphated brine and utilizing it in manufacture of soda ash in a Solvay process, washing the gypsum and reacting it with liquor ammonia and carbon dioxide to obtain CaCO | 04-02-2015 |
Patent application number | Description | Published |
20100103114 | METHOD OF USING VISUAL SEPARATORS TO INDICATE ADDITIONAL CHARACTER COMBINATION CHOICES ON A HANDHELD ELECTRONIC DEVICE AND ASSOCIATED APPARATUS - A method and associated apparatus for using visual separators to indicate additional character combination choices from a disambiguation function on a handheld electronic device. | 04-29-2010 |
20110025600 | METHOD OF INDICATING ADDITIONAL CHARACTER COMBINATION CHOICES ON A HANDHELD ELECTRONIC DEVICE AND ASSOCIATED APPARATUS - A method and associated apparatus for indicating additional character combination choices from a disambiguation function on a handheld electronic device. | 02-03-2011 |
20110235624 | Handling Virtual Private Network Connections over a Wireless Local Area Network - A wireless local area network ‘WLAN’ client device has one or more virtual private network ‘VPN’ profiles defined therein. In response to the WLAN client device connecting to a WLAN, a user of the WLAN client device is able to indicate whether to attempt to establish a VPN connection over the WLAN. | 09-29-2011 |
20110238824 | Wireless Local Area Network Hotspot Registration - A wireless local area network ‘WLAN’ client device that has just connected to a WLAN detects that the WLAN is offered by a hotspot, where access to a public network is provided by the WLAN via a gateway. A browser application of the WLAN client device is launched, either automatically or in response to receiving an indication via a user input element of the WLAN client device to register at the hotspot. The browser application is launched with an Internet Protocol address that ought to trigger an Internet Protocol filtering rule of the gateway. | 09-29-2011 |
20110238847 | Saving a Connection Profile when Unable to Connect to a Wireless Local Area Network - Various connection parameters of a wireless local area network ‘WLAN’ may be saved in a WLAN client device in a connection profile, even if the WLAN client device is unable to connect to the WLAN. | 09-29-2011 |
20110264445 | METHOD OF USING VISUAL SEPARATORS TO INDICATE ADDITIONAL CHARACTER COMBINATION CHOICES ON A HANDHELD ELECTRONIC DEVICE AND ASSOCIATED APPARATUS - A method and associated apparatus for using visual separators to indicate additional character combination choices from a disambiguation function on a handheld electronic device. | 10-27-2011 |
20120041755 | HANDHELD ELECTRONIC DEVICE HAVING SELECTABLE LANGUAGE INDICATOR FOR LANGUAGE SELECTION AND METHOD THEREFOR - A method of enabling the selection of a language to be employed as a method input language by a disambiguation routine of a handheld electronic device having stored therein a plurality of method input languages and disambiguation routine number, includes detecting a selection of a language, detecting as an ambiguous input an actuation of one or more input members, outputting at least a plurality of the language objects that corresponds to the ambiguous input, outputting an indicator which one of the method input languages is currently employed by the disambiguation function, and enabling an alternate one of the input language methods to be selected in response to a selection of the indicator in lieu of one of the plurality of language objects. | 02-16-2012 |
20120268383 | METHOD OF INDICATING ADDITIONAL CHARACTER COMBINATION CHOICES ON A HANDHELD ELECTRONIC DEVICE AND ASSOCIATED APPARATUS - A method and associated apparatus for indicating additional character combination choices from a disambiguation function on a handheld electronic device. | 10-25-2012 |
20120271628 | METHOD OF USING VISUAL SEPARATORS TO INDICATE ADDITIONAL CHARACTER COMBINATIONS ON A HANDHELD ELECTRONIC DEVICE AND ASSOCIATED APPARATUS - A method and associated apparatus for using visual separators to indicate additional character combination choices from a disambiguation function on a handheld electronic device. | 10-25-2012 |
20130006606 | HANDHELD ELECTRONIC DEVICE HAVING SELECTABLE LANGUAGE INDICATOR FOR LANGUAGE SELECTION AND METHOD THEREFOR - A method of enabling the selection of a language to be employed as a method input language by a disambiguation routine of a handheld electronic device having stored therein a plurality of method input languages and disambiguation routine number, includes detecting a selection of a language, detecting as an ambiguous input an actuation of one or more input members, outputting at least a plurality of the language objects that corresponds to the ambiguous input, outputting an indicator which one of the method input languages is currently employed by the disambiguation function, and enabling an alternate one of the input language methods to be selected in response to a selection of the indicator in lieu of one of the plurality of language objects. | 01-03-2013 |
20130144601 | HANDHELD ELECTRONIC DEVICE HAVING SELECTABLE LANGUAGE INDICATOR FOR LANGUAGE SELECTION AND METHOD THEREFOR - A method of enabling the selection of a language to be employed as a method input language by a disambiguation routine of a handheld electronic device having stored therein a plurality of method input languages and disambiguation routine number, includes detecting a selection of a language, detecting as an ambiguous input an actuation of one or more input members, outputting at least a plurality of the language objects that corresponds to the ambiguous input, outputting an indicator which one of the method input languages is currently employed by the disambiguation function, and enabling an alternate one of the input language methods to be selected in response to a selection of the indicator in lieu of one of the plurality of language objects. | 06-06-2013 |
20130231915 | METHOD OF USING VISUAL SEPARATORS TO INDICATE ADDITIONAL CHARACTER COMBINATIONS ON A HANDHELD ELECTRONIC DEVICE AND ASSOCIATED APPARATUS - A method and associated apparatus for using visual separators to indicate additional character combination choices from a disambiguation function on a handheld electronic device. | 09-05-2013 |