Patent application number | Description | Published |
20080207164 | Traffic Shaping of Cellular Service Consumption Through Modification of Consumer Behavior Encouraged by Cell-based Pricing Advantages - Changes in wireless service user behavior are encouraged and produced to shape utilization patterns among cells within a rate plan region by using shaping rules which define potential discounts from a standard charge rate under certain cell-specific utilization conditions, analyzing the shaping rules and utilization statistics of a cell upon service initiation, generating a discount from the standard rate for underutilized cells. The user is notified of these discount opportunities using text messages, icons, or other means. Over time, the users learn that at certain places and times, significant discounts are offered, and thus changes their behavior to take advantage of those discounts, thereby shaping traffic in a manner desired by the service provider. | 08-28-2008 |
20080215931 | Systems and Methods for Embedded Application Test Suites - Systems, methods and media for testing computer programs m response to a program upgrade or installation are disclosed. In one embodiment, a computer executes software to detect when an upgrade or an installation occurs. When an upgrade or installation occurs the computer initiates a test of one or more applications and/or operating systems. The results of these tests are logged in one or more error logs that can be displayed to a program developer or operating system administrator for diagnosis. | 09-04-2008 |
20080218125 | Battery Charging System - A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with a recommended inactive or storage maximum battery charge level which is obtained from a battery manufacturer or other data source. In one embodiment, the battery charging system accesses a battery manufacturer's website in order to determine the manufacturer's recommended charging characteristics, including a maximum battery charge level for an inactive or storage status, for the particular battery being charged. When connected to a power source, the battery being charged is not permitted to be charged to a fully charged state but rather charged only to the lower storage charge level in order to increase the life span of the battery. | 09-11-2008 |
20080218379 | System and method for electronic road signs with in-car display capabilities - The present invention is method and system for delivering road sign content information to a mobile computing device for display to the driver of a vehicle. The system consists of a wireless communication network in communication with a mobile computing device operationally coupled to a dashboard display device or a vehicle head's up display device. The wireless communication network further comprises a plurality of meshed network sign transmitting devices placed along predetermined intervals along the highway. Each sign-transmitting device is capable of transmitting road sign content information to the mobile computing device for display to the driver. | 09-11-2008 |
20080221783 | Intelligent redirection of vehicular traffic due to congestion and real time performance metrics - An automated traffic control system provides real time alternative traffic flow solutions to address traffic congestion on a roadway. A process will pick routes to scan for real-time statistics on the traffic conditions and calculate an average vehicle speed (AVS) for that route, road, highway, etc. If the AVS drops below a historical threshold, a decision matrix is created, whereby all the real-time data is compared with historical data and provides an ideal or best alternative route for “route X”. The operator is provided this information within seconds and is allowed to make a decision to “accept pr decline” the proposed changes in routes. If the proposed changes are accepted, the changes begin to occur automatically such as but not limited to updating electronic signage, changing traffic control signals (all green to keep traffic moving), moving electronic barriers, etc. | 09-11-2008 |
20080222024 | AUTOMATICALLY DISTRIBUTING A BID REQUEST FOR A GRID JOB TO MULTIPLE GRID PROVIDERS AND ANALYZING RESPONSES TO SELECT A WINNING GRID PROVIDER - A method, system, and program for automatically distributing a bid request for a grid job to multiple grid providers and analyzing responses to select a winning grid provider are provided. A user at a grid client enters at least one bid criteria for a particular grid job intended for submission to an external grid environment. The grid client automatically selects at least one grid provider for the external grid environment to query for availability to process the particular grid job to meet the criteria for the particular grid job. Then, the grid client automatically distributes the criteria in a bid request for the particular grid job to the selected grid providers. The grid client stores bid responses received from the grid providers, and responsive to reaching a deadline for return of responses for the bid request, the grid client selects a winning bid response from the particular grid job from among the received responses. Then, the grid client automatically distributes the particular grid job from the grid client system to the grid provider submitting the winning bid response. | 09-11-2008 |
20080222025 | AUTOMATICALLY DISTRIBUTING A BID REQUEST FOR A GRID JOB TO MULTIPLE GRID PROVIDERS AND ANALYZING RESPONSES TO SELECT A WINNING GRID PROVIDER - A method, system, and program for automatically distributing a bid request for a grid job to multiple grid providers and analyzing responses to select a winning grid provider are provided. A user at a grid client enters at least one bid criteria for a particular grid job intended for submission to an external grid environment. The grid client automatically selects at least one grid provider for the external grid environment to query for availability to process the particular grid job to meet the criteria for the particular grid job. Then, the grid client automatically distributes the criteria in a bid request for the particular grid job to the selected grid providers. The grid client stores bid responses received from the grid providers, and responsive to reaching a deadline for return of responses for the bid request, the grid client selects a winning bid response from the particular grid job from among the received responses. Then, the grid client automatically distributes the particular grid job from the grid client system to the grid provider submitting the winning bid response. | 09-11-2008 |
20080222715 | Enhanced Personal Firewall for Dynamic Computing Environments - An enhanced personal firewall system having an inter-firewall connection listener which binds to a specified communications port and listens for inbound and/or outbound connection requests; and an inter-firewall controller which establishes a trusted communications through a local firewall and a remote firewall by exchanging public keys, a signed trusted computer firewall request, and using the keys to determine if a local key storage indicates previous authorization to trusted communications. If not, then a user of the targeted resource is notified and prompted to authorize the access. If so, then the firewall rules protecting the targeted resource are modified, even if temporarily, to allow the requesting firewall to have trusted access. | 09-11-2008 |
20080225336 | Method and System to Allow Printing Compression of Documents - A print compression method and system reduces the amount of space required to print a document such that less paper is used during the printing of a document. A user defines criteria, which is used to perform document compression. However, the document compression only applies to the form of document being printed. This compression does not affect the document being edited. | 09-18-2008 |
20080235596 | METHOD AND SYSTEM FOR MANAGING A REMOTE CONTROL SESSION - A method and system for managing a remote control session (RCS) during which control of input mechanisms of authorized users for manipulating a shared computer screen is time-sliced among the authorized users. No more than one authorized user has control of the input mechanisms at each time during the RCS. Each authorized user is able to view the shared portion of the computer screen throughout the RCS and has been assigned a priority, a control time slice (CTS), and an inactivity threshold. Sole control of the input mechanisms is provided to a first authorized user who requested control of the input mechanisms. Sole control of the input mechanisms is transferred from the first authorized user to a second authorized user who requested control of the input mechanisms. The first and second authorized user are each scheduled to have sole control of the input mechanisms for a specified time duration. | 09-25-2008 |
20080246584 | Locking digital pen - A locking digital pen system includes memory means which is available for storing user passwords for a plurality of users. When a user wishes to activate the digital pen, the user is enabled to use the digital pen to enter a password. After verification of the password, the pen is unlocked and the system associates the user with a matching digital signature certificate. When the user wishes to lock the pen, the user is enabled to actuate a button on the pen or provide an entry to a coupled computer to initiate a locking sequence. The system then disassociates the user from the digital signature certificates so the pen can no longer be used to digitally sign documents and the pen enters a locked state. In another embodiment, an authorized user may disable the unlocking function of the pen whereby the pen may not be unlocked by entry of a password but rather only when a special code is entered into the system. | 10-09-2008 |
20080246893 | Internal light masking in projection systems - A system and method is provided for masking traditional grey bars which are produced by displaying wide screen images within a full screen native projector and visa versa. This method allows blocking of light for unused portions of the screen thereby producing higher contrast images. In an exemplary embodiment, a physical shutter is positioned inside the projection system so that the light which would otherwise produce a grey bar area is blocked before it reaches a projection screen. Image data are analyzed to identify grey screen areas which are not being utilized for image display and light which would otherwise produce such grey areas is blocked or shuttered by the projector to eliminate the grey areas. | 10-09-2008 |
20080248778 | METHOD AND SYSTEM FOR TRIGGERING A LOCAL EMERGENCY SYSTEM USING WIRELESS MEANS - A method and system for triggering a local emergency system using wireless means. Existing local emergency systems are exploited through an ordinary mobile user device implementing the present invention. Disadvantages of current local emergency system are overcome by facilitating a user to remotely report emergency service request with more accurate location information automatically conveyed by the present invention. A mobile user device is configured to activate an emergency service station of a local emergency system without knowing the location of the emergency service station and without physically accessing and operating the emergency service station. | 10-09-2008 |
20080250242 | Method for Passing Selective Encrypted Attributes of Specific Versions of Objects in a Distributed System - The present invention provides a computer implemented method, system, and computer program product for selective encryption of a data transmission. A data transmission is received. When the data transmission is received, the data transmission is unmarshaled. When the transmission is unmarshaled, objects and a set of sensitive fields within the data transmission are identified by referencing a metadata database. Only the set of sensitive fields within the data transmission are encrypted to form a partially encrypted data transmission. The partially encrypted data transmission is marshaled to form a marshaled data transmission. The marshaled data transmission is transmitted to a recipient. | 10-09-2008 |
20080250335 | Method and Apparatus for Enhancing Instant Messaging Systems - The present invention provides a method, apparatus, and computer instructions for organizing threads in an instant messaging session. Instant messages are received from a list of contacts. Each of these messages are stored in a set of folders, wherein each folders in the set of folders stores messages for a contact in the number of contacts. Each file is linked for access though a graphical user interface. Message threads are handled by displaying a primary dialog window, wherein the primary dialog window includes an ongoing conversation pane and an outgoing message pane. Responsive to a user input identifying a new thread, a secondary dialog window is displayed, wherein the secondary dialog window includes an ongoing conversation pane and an outgoing message pane. Responses to outgoing messages sent from the outgoing message pane are displayed in the primary dialog window in the ongoing conversation pane in the primary dialog window. Responses to outgoing messages sent from the outgoing message pane in the secondary dialog window are displayed in the ongoing conversation pane in the secondary dialog window, wherein the primary dialog window and the secondary dialog window. | 10-09-2008 |
20080250336 | Method and Apparatus for Enhancing Instant Messaging Systems - The present invention provides a method, apparatus, and computer instructions for organizing threads in an instant messaging session. Instant messages are received from a list of contacts. Each of these messages are stored in a set of folders, wherein each folders in the set of folders stores messages for a contact in the number of contacts. Each file is linked for access though a graphical user interface. Message threads are handled by displaying a primary dialog window, wherein the primary dialog window includes an ongoing conversation pane and an outgoing message pane. Responsive to a user input identifying a new thread, a secondary dialog window is displayed, wherein the secondary dialog window includes an ongoing conversation pane and an outgoing message pane. Responses to outgoing messages sent from the outgoing message pane are displayed in the primary dialog window in the ongoing conversation pane in the primary dialog window. Responses to outgoing messages sent from the outgoing message pane in the secondary dialog window are displayed in the ongoing conversation pane in the secondary dialog window, wherein the primary dialog window and the secondary dialog window. | 10-09-2008 |
20080256228 | MINIMIZING COMPLEX DECISIONS TO ALLOCATE ADDITIONAL RESOURCES TO A JOB SUBMITTED TO A GRID ENVIRONMENT - A method, system, and program for minimizing complex decisions to allocate additional resources to a job submitted to a grid environment are provided. First, at least one decision to allocate additional resources to at least one previously submitted job is stored in a decision cache, wherein said the least one decision is stored according to at least one characteristic of the at least one previously submitted job. When another job is submitted to the grid environment needs additional resources, the characteristic of the currently submitted job is compared with the characteristics of previous submitted jobs. If there is a match, then the previously made decision associated with the matching characteristic controls allocation of additional resources for the currently submitted job, such that complex decision making for allocation of additional resources is minimized by reusing previously stored decisions to allocate additional resources. | 10-16-2008 |
20080256618 | METHOD TO APPLY NETWORK ENCRYPTION TO FIREWALL DECISIONS - A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information. | 10-16-2008 |
20080270883 | Method and Apparatus for Selecting Advertising for a Web Page - A computer implemented method, apparatus, and computer usable program code for identifying advertising for a web page. In response to receiving a universal resource locator containing identification information for selected text in the web page, the web page is retrieved to form a retrieved web page. The selected text in the web page is identified. Advertisements for the web page are identified using the selected text to form identified advertisements. The identified advertisements are placed in the web page. | 10-30-2008 |
20080270891 | Method and Apparatus for Selecting and Rendering a Section of a Web Page - A computer implemented method, apparatus, and computer usable program code for processing a web page. A selection of a section of text in a web page is received to form selected text. Identification information for the selected text is generated, wherein the identification information includes an identification of the selected text and a location of the selected text in the web page. The identification information is placed into a universal resource locator for the web page, wherein the universal resource locator is used to present the web page in a browser at the location. | 10-30-2008 |
20090094244 | METHOD FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 04-09-2009 |
20090113446 | METHOD FOR CREATING ADAPTIVE DISTRIBUTIONS - A method to dynamically create an adaptive distribution list through an application of a combination of mathematical, logical and/or programmable operations to existing static distribution lists or user directories. This list is created as part of the information message sent to the entries on the distribution list. In this invention, the user or sender does not need to interface with the Group creation modification tool. Another feature of the invention is that the newly created distribution lists can be temporarily or permanently saved as designed by the sender. This invention eliminates the need to separately create distribution and then send messages to the entries on the distribution list. | 04-30-2009 |
20090119579 | System for Monitoring Personal Computer Documents for Sensitive Data - An apparatus, and a computer program are provided for securing transmitted text. Once text has been produced by an application, the potential exists for an unintended third party to obtain sensitive data transmitted over computer networks. However, a parsing function can then operate either on an individual computer or on a network to scan text at an Open Systems Interconnection (OSI) Layer 1 to assist in the prevention of sensitive data transmission. By utilizing the parsing function, text can be scanned for potentially sensitive data by using a variety of techniques, such as a learning algorithm. The sensitive data can then be verified by a user, bypassed, or autostripped. | 05-07-2009 |
20100332285 | Intellectual Property Component Business Model for Client Services - An embodiment of the invention provides a computerized system for providing an IP framework, including a storage component, a user interface, and a reporting module. The storage component includes a collection of database tables having a capability field and keyword field. The database tables include data from a strategic planning computer module, an invent computer module, an IP creation computer module, an IP administration computer module, a defend computer module, an influence computer module, and a capitalize computer module. The user interface receives as input, an invention disclosure and/or a configuration file for an IP capability. The reporting module processes the input in the storage component and produces the IP framework. | 12-30-2010 |
20110055344 | SYSTEM FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - A system in which an initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the entries in the created distribution list are examined. From this list, features of the entries are identified. From these features, criteria are generated that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 03-03-2011 |