Patent application number | Description | Published |
20120158468 | Method Of Providing Access Management In An Electronic Apparatus - A method of providing access management in an apparatus is disclosed. The apparatus includes a platform for running an application; an access manager for handling access of a user to the application; and a set of access permissions stored in the apparatus and used by the access manager for controlling access of the user to applications. The method includes linking the entry permissions to the application, apparatus or device administrator, and allowing the user access to the application only after predetermined access permissions are satisfied. A method of providing reward management by means of an apparatus is disclosed. The apparatus may include a platform for running an application; a reward manager maintaining a reward account for the user; and a set of reward opportunities stored in the apparatus and used by the reward manager to provide incentives to the user. The method may include linking the reward opportunities to the application, and crediting the reward account only after a reward opportunity is satisfied. A method for providing reward management for an apparatus is disclosed. The method may include linking a reward manager to an application residing on the apparatus, providing the reward manager with a reward account, wherein the reward account accumulates reward opportunities plus reward credits, and crediting the reward account only after a reward opportunity is satisfied. | 06-21-2012 |
20130304564 | METHOD OF PROVIDING ACCESS MANAGEMENT IN AN ELECTRONIC APPARATUS - In one embodiment of the present invention, a method for providing reward management for an apparatus is provided. The method includes linking a reward manager to an application residing on the apparatus; providing the reward manager with a reward account which accumulates reward opportunities and reward credits; and crediting the reward account only after a reward opportunity is satisfied, wherein the user is uses reward opportunities or reward credits to gain access to the application. The credits in the reward account may be used for commercial transaction. The credits in the reward account may be used to obtain the rights to a predetermined number of one or more of the following: text messages, telephone talking time, music time, video time, camera access, or video game time. The set of reward opportunities may comprise one or more questions, and wherein the reward opportunities are satisfied when the questions are answered correctly. | 11-14-2013 |
20130305349 | METHOD OF PROVIDING ACCESS MANAGEMENT IN AN ELECTRONIC APPARATUS - In one embodiment of the present invention, a method of providing access management to a user is provided. This method includes running an application on a platform; linking a set of access permissions to the application by means of an apparatus; providing a user access to the application by means of an access manager; and allowing the user access to the application only after a predetermined number of access permissions from the set are satisfied. The apparatus may be a pager, a mobile phone, a feature phone, or a smart phone. The set of access permissions may comprise one or more questions that must be answered correctly. The questions may be selected to assist in the learning of an academic subject. The questions may be selected to assist in preparing the user for a standardized test. | 11-14-2013 |
Patent application number | Description | Published |
20110085175 | SURFACE MEASUREMENT, SELECTION, AND MACHINING - Systems, processes, articles of manufacture, and techniques may be used to measure a surface to be machined. In particular implementations, a representation of a surface to be machined may be determined. Measuring the surface may include measuring a plurality of surface points at each of a plurality of surface measurement locations with a measurement system moving over a surface and measuring the position of the measurement system. Determining a representation of the surface to be machined may include determining an estimated shape for the surface based on the surface measurements at the surface measurement locations. The surface measurements, the surface measurement locations, and the estimated shape may be stored in computer memory for future retrieval and use. | 04-14-2011 |
20110087363 | SURFACE MEASUREMENT, SELECTION, AND MACHINING - Systems, processes, articles of manufacture, and techniques may be used to facilitate the machining of a surface. In particular implementations, machining a surface may include machining a first surface location with an end effector that is part of a cart movable over the surface. Machining the surface may also include measuring the position of the end effector with a laser tracking system and generating commands for an actuator that positions the end effector. The commands may be based on the position of the end effector and a stored representation of a shape to be achieved by machining. | 04-14-2011 |
20110087457 | SURFACE MEASUREMENT, SELECTION, AND MACHINING - Systems, processes, articles of manufacture, and techniques may be used to determine a machining shape for a surface to be machined. In particular implementations, determining a machining shape may include retrieving stored surface measurements for a surface to be machined, the measurements representing the surface at a plurality of points for each of a number of measurement locations on the surface, and analyzing the measurements to determine a shape to which the surface should be machined. Determining a machining shape may also include determining the surface that may be achieved by machining to the determined shape, analyzing the determined surface to determine whether it is acceptable, and storing the determined shape based on whether the determined surface is acceptable. | 04-14-2011 |
Patent application number | Description | Published |
20100018707 | METHOD OF FRACTURING USING ULTRA LIGHTWEIGHT PROPPANT SUSPENSIONS AND GASEOUS STREAMS - In a method of hydraulically fracturing a hydrocarbon-bearing subterranean formation, a proppant stage is introduced into the fracture which contains a gaseous fluid and an ultra lightweight proppant suspended in a viscosified aqueous fluid. The gaseous fluid of the proppant stage contains at least about 90 volume percent of the combination of gaseous fluid and aqueous fluid. A pad fluid may first be introduced into the formation, the pad fluid containing a gaseous fluid and, optionally, an aqueous fluid. The gaseous fluid of the pad fluid mixture typically contains at least 70 volume percent of the mixture. | 01-28-2010 |
20100144560 | METHODS AND COMPOSITIONS FOR REDUCING FLUID LOSS DURING TREATMENT WITH VISCOELASTIC SURFACTANT GELS - Methods and compositions of treating formations using viscoelastic treatment fluids are provided that reduce the amount of fluid loss to the formations due to the lack of polymer backbone in the viscoelastic treatment fluids. The methods and compositions of treating formations include a fluid loss additive that includes a copolymer that includes a hydrophilic monomeric unit and a first anchoring monomeric unit. | 06-10-2010 |
20110168396 | METHOD OF FRACTURING USING ULTRA LIGHTWEIGHT PROPPANT SUSPENSIONS AND GASEOUS STREAMS - In a method of hydraulically fracturing a hydrocarbon-bearing subterranean formation, a proppant stage is introduced into the fracture which contains a gaseous fluid and an ultra lightweight proppant suspended in a viscosified aqueous fluid. The gaseous fluid of the proppant stage contains at least about 90 volume percent of the combination of gaseous fluid and aqueous fluid. A pad fluid may first be introduced into the formation, the pad fluid containing a gaseous fluid and, optionally, an aqueous fluid. The gaseous fluid of the pad fluid mixture typically contains at least 70 volume percent of the mixture. | 07-14-2011 |
20120231982 | WELL TREATMENT METHODS AND SYSTEMS - A well treatment method includes drawing a solvent to a first pump, drawing a wetting liquid to a second pump, pumping the wetting liquid through a polymer mixer using the second pump, combining polymer with the wetting liquid to produce a slurry containing undissolved polymer, and combining the slurry with the solvent upstream from the first pump. Another well treatment method includes increasing dissolution time of the polymer by providing a buffering agent in the wetting liquid before combining the wetting liquid and the polymer. A well treatment system includes a polymer mixing subsystem with a mix loop having a mix loop inlet line from a first pump feed line and a mix loop outlet line back to the first pump feed line, the mix loop outlet line containing a polymer mixer. | 09-13-2012 |
20130032346 | METHOD OF FRACTURING USING ULTRA LIGHTWEIGHT PROPPANT SUSPENSIONS AND GASEOUS STREAMS - In a method of hydraulically fracturing a hydrocarbon-bearing subterranean formation, a proppant stage is introduced into the fracture which contains a gaseous fluid and an ultra lightweight proppant suspended in a viscosified aqueous fluid. The gaseous fluid of the proppant stage contains at least about 90 volume percent of the combination of gaseous fluid and aqueous fluid. A pad fluid may first be introduced into the formation, the pad fluid containing a gaseous fluid and, optionally, an aqueous fluid. The gaseous fluid of the pad fluid mixture typically contains at least 70 volume percent of the mixture. | 02-07-2013 |
20150075795 | Well Treatment Methods and Fluids Containing Synthetic Polymer - A well treatment fluid uses ingredients that include an aqueous base, a non-associative, ionic, synthetic polymer, and optionally, at least one metal crosslinker. The polymer contains a backbone and a functional group that hinders hydrolysis of the backbone. The functional group is distributed at intervals on the backbone. A well treatment method includes forming a well treatment fluid by combining ingredients including a non-associative, ionic, synthetic polymer and a first aqueous base. The first fluid exhibits a first viscosity greater than a viscosity of the first aqueous base. The method includes treating a well during a stage using the first fluid exhibiting the first viscosity. A second well treatment fluid is formed by combining ingredients including the polymer, a second aqueous base, and at least one crosslinker and by crosslinking the synthetic polymer. The method includes treating the well during another stage using the second fluid exhibiting the second viscosity. | 03-19-2015 |
Patent application number | Description | Published |
20110136511 | METHOD, APPARATUS AND COMPUTER PROGRAM TO PERFORM LOCATION SPECIFIC INFORMATION RETRIEVAL USING A GESTURE-CONTROLLED HANDHELD MOBILE DEVICE - A method and apparatus are disclosed that calculate an area-of-interest based on a user request for location specific data. The operations may include transmitting initial location data of the mobile terminal and user initiated gesture data to a server. The server may then perform initiating a request to receive the requested location data, and calculating a geographical area-of-interest based on the initial location data and the user initiated gesture data. The location specific data related to the area-of-interest may then be retrieved and transmitted to the mobile terminal. The area-of-interest may be defined based on the initial position of the mobile terminal and information provided by a gesture made by the user of the mobile terminal. | 06-09-2011 |
20110138243 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR COMMUNICATION OF ENCODED MESSAGES - A message encoding specification and implementation where a receiver of an encoded message determines if the message can be decoded. If the receiver can decode the message, it does so and continues processing the message. If the receiver cannot decode the message, it returns a distinguished failure message to the sender, expecting the sender to resend the message using a different encoding scheme. When a sender receives the distinguished failure message that the receiver cannot decode the message, the sender encodes the message using an alternate encoding scheme, if one is available, and resends the message. The process continues until the sender has tried all available encoding schemes. If a sender exhausts the collection of available encoding schemes without finding one the receiver can successfully decode, the sender treats the failure as an error. | 06-09-2011 |
20110138460 | SYSTEM AND METHOD FOR LOADING APPLICATION CLASSES - In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the application's security permissions, e.g. by decoding a security token. The class is then retrieved from a repository that stores class variants matching the required security level. The retrieved class variant, which may have a full or a reduced functionality as appropriate for the security permission may then by loaded. | 06-09-2011 |
20140143895 | SYSTEM AND METHOD FOR LOADING APPLICATION CLASSES - In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the application's security permissions, e.g. by decoding a security token. The class is then retrieved from a repository that stores class variants matching the required security level. The retrieved class variant, which may have a full or a reduced functionality as appropriate for the security permission may then by loaded. | 05-22-2014 |
Patent application number | Description | Published |
20100235459 | Proxy Object - Embodiments are discussed for methods, systems, and computer readable media for creating a proxy object, comprising calling a second functionality in a proxy class, creating a proxy object by the second functionality, calling a third functionality by the second functionality, calling a fourth functionality by the third functionality, creating a reference object by the fourth functionality, returning the reference object to the third functionality, associating the reference object to the proxy object by the third functionality, and returning the associated proxy object by the second functionality to a first functionality. | 09-16-2010 |
20130081067 | PROXY OBJECT CREATION AND USE - Embodiments are discussed for methods, systems, and computer readable media for creating a proxy object, comprising calling a second functionality in a proxy class, creating a proxy object by the second functionality, calling a third functionality by the second functionality, calling a fourth functionality by the third functionality, creating a reference object by the fourth functionality, returning the reference object to the third functionality, associating the reference object to the proxy object by the third functionality, and returning the associated proxy object by the second functionality to a first functionality. | 03-28-2013 |
Patent application number | Description | Published |
20110136461 | SYSTEM AND METHOD FOR APPLICATIONS ON MOBILE COMMUNICATIONS DEVICES - The functionality of smartphone applications may be extended to a basic phone, i.e., a phone lacking a particular smartphone capability, by providing a data synthesizer in the basic phone that synthesizers required data points. The data synthesizer may communicate with nearby smartphones to collect relevant data points such as location or motion data. Data points for the basic phone may be calculated from the collected data points. When an application on the basic phone requests data, a data provider proxy may retrieve a synthesized data point from the data synthesizer. In one example, a basic phone without a GPS or similar location module may execute a mapping application by averaging location data from nearby smartphones. | 06-09-2011 |
20110136507 | SYSTEM AND METHOD FOR APPLICATIONS ON MOBILE COMMUNICATIONS DEVICES - The functionality of smartphone applications may be extended to a basic phone, i.e., a phone lacking a particular smartphone capability, by providing a data synthesizer in the basic phone that synthesizers required data points. The data synthesizer may communicate with nearby smartphones to collect relevant data points such as location or motion data. Data points for the basic phone may be calculated from the collected data points. When an application on the basic phone requests data, a data provider proxy may retrieve a synthesized data point from the data synthesizer. In one example, a basic phone without a GPS or similar location module may execute a mapping application by averaging location data from nearby smartphones. | 06-09-2011 |
20110136532 | SYSTEM AND METHOD FOR PROVIDING A COMMUNITY OF MOBILE DEVICES - In a community of mobile devices, a non-participating device can be joined to the community if the non-participating device meets location dependent criteria. The device's location can be determined, e.g. be an onboard GPS, from which it can be determined if the device is within a geospatial boundary of the community. The geospatial boundary may be calculated from the locations of community member devices. Only devices that meet the location dependent criteria will be eligible for participation in the community. | 06-09-2011 |
20110137614 | SYSTEM AND METHOD FOR OPERATING A NETWORK OF SENSORS - In a network of sensor nodes, operational efficiency may be increased by configuring the sensor nodes so that sensor agents may be transferred to alternative sensor nodes to process sensor node data, such as when the host sensor node is in a low-power mode. A processing node of the network may be configured to retrieve real-time data from a sensor node, but if real-time data is not available, the processing node may perform calculations on cached data retrieved from a processor node cache or data of a nearby sensor node. | 06-09-2011 |
20110138168 | METHOD, APPARATUS AND COMPUTER PROGRAM TO PERFORM DYNAMIC SELECTION OF SERIALIZATION PROCESSING SCHEMES - The present application is directed to a method, apparatus a computer program product configured to perform certain operations of dynamic serialization. In one example, a message is received which includes at least one message element requiring serialization. A first message element of the message is examined. A serialization scheme from a serialization scheme library is selected based on the at least one examined attribute of the first message element. Then, at least the first message element is encoded using the serialization scheme selected. | 06-09-2011 |
20110138382 | SYSTEM AND METHOD FOR LOADING RESOURCES INTO A VIRTUAL MACHINE - In a heterogeneous environment of virtual machines, an agent can migrate between virtual machines of different types. During migration, classes of the mobile agent may need to be instantiated on the new virtual machine. To support classes across all virtual machine types, a resource server is provided that can provide virtual machine type specific instances of the classfile. The resource server receives a resource request from a resource loader of a virtual machine. The resource request specifies the resource and the virtual machine type, thereby enabling the resource server to retrieve the correct instance of the classfile to return to the resource loader. | 06-09-2011 |
20120185826 | SURVIVAL RULE USAGE BY SOFTWARE AGENTS - A method for determining the lifespan of an agent utilizing a rule engine and a set of canonical survival rules, in an execution environment comprising collecting a survival rule, asserting a survival data into a working memory and executing the rule engine with the set of survival rules and the working memory. | 07-19-2012 |
20120250688 | SYSTEM AND METHOD FOR UNMARSHALLED ROUTING - In distributed object computing, messages from a source node to a destination node are often required to be routed via one or more intermediate nodes. In order to enhance efficiency of the relay process, a message envelope of a message may include a node list field that specifies the routing path of the message. The communication protocol for communicating the message may specify that when a message is received into a particular node, the node analyzes the node list field. If the identity of the node is last in the node list field, then the node is the destination node and thus the node unmarshals the message. Otherwise, the node forwards the message to the next node in the field list without unmarshalling the message. | 10-04-2012 |
20120254129 | SYSTEM AND METHOD FOR MANAGING SENSITIVE DATA USING INTELLIGENT MOBILE AGENTS ON A NETWORK - In order to manage stale data on a network of computer systems, a file harvester agent may be configured with a list of stale data files to be deleted. The file harvester agent may be deployed to the computer systems of a network. When executed in a computer system, the file harvester agent searches the file system of the computer system to locate any files or data indicated in the file list. Any located data files are deleted. Once the agent has finished processing the file list on a computer system, the agent can copy or replicate itself to other computer systems of the network in accordance with a pre-configured itinerary. | 10-04-2012 |
20120254279 | SYSTEM AND METHOD FOR SERVICE MOBILITY - When service requirements require moving of services registered with an object request broker (ORB) at a source server, continuity of service to service requests from clients may be provided by queuing the service requests at the source server. A server context with the same GUID as a source server context may be established at a destination server. URLs for the moved services may be registered with a destination ORB which may then begin receiving service requests. The source server may then respond to the queued service requests with respective URLs for the services registered at the destination ORB. Endpoints at the clients may be updated with the new URLs prior to resending the service requests. The movement of the ORB to the destination server may thus be transparent to the client application. | 10-04-2012 |
20120254319 | SYSTEM AND METHOD FOR COMMUNICATION BETWEEN NETWORKED APPLICATIONS - During communication of a large data message from a client application to a server application, requirements to communicate smaller control messages can arise. To facilitate timely communication of control messages, a client application may include a chunking module that divides a data message into chunks that can be sent as a sequence of individual data message packets. When a control message needs to be sent, the sequence of data message packets can be interrupted to send a control message packet. At the server application, the sequence of message packets is processed so that data message packets are appended to a data message and control messages are extracted for immediate processing. | 10-04-2012 |
20120254374 | SYSTEM AND METHOD FOR PROXY ADDRESS NEUTRALITY - To provide proxy address neutrality, in particular for mobile server devices, a server application can register its network address with a discovery application. Whenever the server application acquires a new network address, the server application updates the discovery application. A client application providing proxy services for the server application can invoke calls to the server client using the network address for the server application that is currently stored in the client device. If the current network address is invalid, the client application obtains an updated network address from the discovery application. | 10-04-2012 |
20120254448 | SYSTEM AND METHOD FOR SELECTION OF NETWORK TRANSPORT WITHIN A MOBILE DEVICE - In a mobile device, one of a plurality of network transports may be used for a connection request. The ideal network transport may be selected by executing a connection selection policy that is stored within the device. The connection selection policy may include one or more network transport evaluators that are each configured to weight the available network transports according to various criteria. Examples of network transport evaluators include evaluators that are dependent on geolocation, security levels, or battery status. | 10-04-2012 |
20120254460 | SYSTEM AND METHOD FOR IMPROVED HANDSHAKE PROTOCOL - In order to enable a dynamic handshake procedure, a client device is configured with a list of handshake contributors. The client device initiates a handshake by determining the handshake contributors and writing properties of the handshake contributors in a client handshake, which is then sent to a server device. The client handshake is processed at the server device by invoking an appropriate handler, which handles the handshake result. The server can also send its contributors and their properties to the client. Once the client receives the properties, the client can call an appropriate handler to handle the properties. Connections may be created based on the exchanged properties. New contributors and contributor handlers may be added to both the client and server devices. | 10-04-2012 |
20120254461 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A HANDSHAKE PROTOCOL - In order to enable a dynamic handshake procedure, a device may be configured with a list of handshake contributors. Contributors with connection handshake properties may be added to the contributor list. To perform handshake, the contributor list is processed to extract the connection handshake properties of each contributor to the handshake. Handlers for handling the connection handshake properties may also be dynamically added and invoked when a handshake is received. | 10-04-2012 |
20120311016 | SYSTEM AND METHOD FOR PROVIDING SELF-HEALING CAPABILITES IN A DISTRIBUTED KNOWLEGDE NETWORK/INTELLIGENT SENSOR NETWORK - To provide self-healing capabilities in a distributed knowledge network/intelligent sensor network, a node monitoring task agent can be deployed to a node to determine operating parameters of the node or of other task agents executing on the node. The operating parameters can be passed to a node monitoring data analysis engine which can analyze the data by referencing a rule-set. The analyzed data can be passed to a management application which can determine whether any self-healing actions need to be performed, such as moving the task agents to other healthier nodes of the DKN-ISN. | 12-06-2012 |
20120311526 | SYSTEM AND METHOD FOR PERVASIVE SOFTWARE PLATFORM-BASED MODEL DRIVEN ARCHITECTURE APPLICATION GENERATOR - In developing applications for a plurality of node types, a meta-data definition of the application can be captured into an application definition module. The meta-data definition can describe the application for the plurality of node types. A code generation module can then automatically generate the application code for the plurality of node types. The code can be compiled per node type and the packaging necessary to deploy the application to the plurality of node types can also be automatically generated. | 12-06-2012 |
20120311547 | SYSTEM AND METHOD FOR PERVASIVE SOFTWARE PLATFORM-BASED MODEL DRIVEN ARCHITECTURE TRANSACTION AWARE APPLICATION GENERATOR - In developing applications for a plurality of node types, a meta-data definition of the application can be captured into an application definition module. The meta-data definition can describe the application for the plurality of node types. A code generation module can then automatically generate the application code for the plurality of node types, including transaction aware code. The code can be compiled per node type and the packaging necessary to deploy the application to the plurality of node types can also be automatically generated. | 12-06-2012 |
20120311614 | ARCHITECTURE FOR PERVASIVE SOFTWARE PLATFORM-BASED DISTRIBUTED KNOWLEDGE NETWORK (DKN) AND INTELLIGENT SENSOR NETWORK (ISN) - A device API Abstraction layer is provided that is configured to operate as an interface between one or more applications operating on a device and an operating platform of the device. The device API abstraction layer comprises a universal set of APIs that enables the applications to execute irrespective of the operating system and software platform of the host device. | 12-06-2012 |
20120316838 | SYSTEM AND METHOD FOR OPERATING A NETWORK OF SENSORS - In a network of sensor nodes, operational efficiency may be increased by configuring the sensor nodes so that sensor agents may be transferred to alternative sensor nodes to process sensor node data, such as when the host sensor node is in a low-power mode. A processing node of the network may be configured to retrieve real-time data from a sensor node, but if real-time data is not available, the processing node may perform calculations on cached data retrieved from a processor node cache or data of a nearby sensor node. | 12-13-2012 |