Patent application number | Description | Published |
20100042945 | APPLICATION WINDOW AREA CHANGE SURVEILLANCE - A method and system for monitoring a computer program window define an area of a computer program window and compute a hash value for the defined area. The computed hash value is stored and the hash value is recomputed for the defined area after a predetermined time period. The recomputed hash value is compared with the stored. If the stored hash value and the recomputed hash value are different, the method and system overwrite the stored hash value with the recomputed hash value, and generate a notification. Recomputing, comparing, overwriting and generating are performed periodically to monitor the changes in the defined area. | 02-18-2010 |
20100057866 | DELIVERING AND REPLYING TO EMAIL USING HIDDEN ADDRESS - A method for use when an original email is sent from an originator to a receiver, having a real email address, at a destination email address, which includes a concatenation of an alias and a magic number, is provided and includes replacing the destination email address with the real email address of the receiver, adding a new header field to the original email indicating that the destination email address was an original destination of the original email and forwarding the original email to the receiver at the real email address. If the receiver replies with a reply email, the method further includes setting a from header field in the reply email with a new header field indicating that the destination email address was an original destination of the original email, and if the original email is appended, removing the new header field from the original email. | 03-04-2010 |
20100074420 | PHONE CALL MANAGEMENT - A method of operating a phone is provided and includes receiving input to set a phone in a do-not disturb mode and to set a time period during which the do-not-disturb mode is activated and setting the phone accordingly, upon reception of an incoming call from a caller during the time period, activating a caller ID function of the phone, detecting a caller ID of the caller and searching for the caller ID in black- and white-lists. In an event the caller ID of the caller is stored in the blacklist, the voicemail function is activated or the incoming call is ended. In an event the caller ID of the caller is stored in the whitelist, an input of the password associated with the caller ID is requested, and, in an event the caller inputs the password, the ringing function is activated. | 03-25-2010 |
20100099398 | CALL MANAGEMENT SYSTEM - A system, method and program product for managing inbound calls on a mobile device. A system is provided that includes: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information. | 04-22-2010 |
20100117797 | CLOSURE WITH PASSIVE ELECTRONIC SENSOR FOR TAMPER DETECTION AND RELATED METHOD - A closure includes a closing member for sealing an opening of a pressurized container. The closing member may include a passive electronic sensor coupled thereto that includes a status register that may be readable by, for example, a RFID reader. The status register is responsive to a pressure change in the pressurized container caused by an insertion of the closing member into the opening or an extraction of the closing member from the opening. The status value in the status register indicates whether the pressurized container has been tampered with. An identification register may include a pressurized container identification encrypted with the private key of the manufacturer, which can be decrypted for comparing to identification on the pressurized container to identify tampering. | 05-13-2010 |
20100153644 | ON DEMAND JAVA APPLICATION MANAGER - A system, method and program product for providing an on demand Java application manager. A system is provided that includes: a bootstrap system for setting up a cache within a local storage and pointing to at least one application at a network resource; a class loader that loads class files for a selected application into the JVM in an on demand fashion, wherein the class loader searches for a requested class file initially in the cache and if not present downloads the requested class file from the network resource to the cache; and a disk management system that manages storage space in the cache, wherein the disk management system includes a facility for discarding class files from the cache. | 06-17-2010 |
20130111015 | SERVER CLUSTER MONITORING | 05-02-2013 |
20130322984 | ANTI-TAMPER SYSTEM - An anti-tamper system including: a fixing device and an anti-tamper detection device; the fixing device comprising a body and a head whereby the head having a larger cross section then the body for enabling a tool to engage and drive the body into a first material layer thereby makes a firm connection with the anti-tamper detection device between the head and the first material layer; the fixing device further comprising a lock wherein the head is locked to the body by the lock where there is no external magnetic field and wherein the head becomes disengaged from the body when the lock is unlocked by an external magnetic field; and whereby the anti-tamper detection device detects and records a change the connection when the head becomes disengaged. | 12-05-2013 |
20140030041 | ANTI-TAMPER SYSTEM - An anti-tamper system including: a fixing device and an anti-tamper detection device; the fixing device comprising a body and a head whereby the head having a larger cross section then the body for enabling a tool to engage and drive the body into a first material layer thereby makes a firm connection with the anti-tamper detection device between the head and the first material layer; the fixing device further comprising a lock wherein the head is locked to the body by the lock where there is no external magnetic field and wherein the head becomes disengaged from the body when the lock is unlocked by an external magnetic field; and whereby the anti-tamper detection device detects and records a change the connection when the head becomes disengaged. | 01-30-2014 |
20140330965 | SERVER CLUSTER MONITORING - A master monitor spawns a local monitor in each node of a server cluster. Each local monitor, responsive to a database event, determines a metric of a performance-related variable. A maximum period between measurements may be imposed to reduce irrelevant results, as may a minimum period. The metric may be stored in a measurement file on the respective node and/or may be reported to the master monitor. The master monitor may make any reported metrics available to a user via a front end. | 11-06-2014 |