Patent application number | Description | Published |
20080228770 | Method for Performing Recoverable Live Context Migration in a Stacked File System - A method, system and program are provided for selectively managing data migration in a stacked filesystem that receives a request to migrate a data file to a destination context, where the data file is divided into a plurality of sub-regions such that data stored in different sub-regions may have different contexts. In response to the migration request, file data is sequentially migrated, one sub-region at a time, to the destination context by maintaining context status information for each sub-region in a metadata portion of the data file, where the context status information prevents another application from accessing any sub-region in the data file that is being migrated, but allows access to other sub-regions in the data file. | 09-18-2008 |
20090072030 | SYSTEM FOR PAPER-FREE VERIFIABLE ELECTRONIC VOTING - An apparatus for a paper-free, verifiable, electronic voting system, comprising an electronic voting machine including at least one direct recording electronic device, at least one ballot summary, where each of the ballot summaries representing selections of a voter, at least one ballot verification subsystem that creates, displays, and stores said ballot summaries, at least one ballot summary storage repository for storing said ballot summaries as saved ballot summaries, and an optional network for communication among components of the electronic voting system. | 03-19-2009 |
20090072031 | METHOD FOR PAPER-FREE VERIFIABLE ELECTRONIC VOTING - A method for a paper-free, verifiable, electronic voting system, the method comprising the steps of submitting votes by a voter using a direct-recording electronic voting machine, requesting a ballot summary from the direct-recording electronic voting machine, creating a ballot summary in a verification subsystem, displaying the ballot summary by the voting machine, casting a ballot by the voter, tallying votes by the electronic voting system, requesting the ballot summary be saved by the voting machine, saving the ballot summary securely by the verification subsystem, and displaying a cast ballot message on the voting machine. | 03-19-2009 |
20090072032 | METHOD FOR ELECTRONIC VOTING USING A TRUSTED COMPUTING PLATFORM - A method for voting in a trusted electronic voting system under the control of an election authority, the method comprising: casting a ballot having ballot information, the ballot information representing votes by a voter; receiving a request to cast the ballot by a voting machine, the voting machine running as a trusted computing platform; tallying the votes in a tally module; displaying the status of the vote tallying on the voting machine. | 03-19-2009 |
20090076891 | SYSTEM FOR ELECTRONIC VOTING USING A TRUSTED COMPUTING PLATFORM - An apparatus for executing a trusted electronic voting system under the control of an election authority comprising: at least one electronic voting machine; an election configuration for the voting machine in the electronic voting system; and a trusted computing platform for the voting machine in the electronic voting system. | 03-19-2009 |
20090094701 | On-Demand Physically Secure Data Storage - Safe deposit boxes, services, and methods for physically secure data storage are provided that include securing a network-enabled computer within a safe deposit box, receiving, in the network-enabled computer, data transmitted from a remote computer coupled for data communications with the network-enabled computer; and storing the data in the memory of the network-enabled computer. Securing a network-enabled computer within a safe deposit box may be carried out by providing a locked safe deposit box having the networked enabled computer stored within. Securing a network-enabled computer within a safe deposit box may be carried out by providing a lockable safe deposit box having the networked enabled computer integrated within. | 04-09-2009 |
20090193509 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR GENERATING ANONYMOUS ASSERTIONS - Systems, methods and computer program products for generating anonymous assertions. Exemplary embodiments include a method for generating anonymous assertions, the method comprising engaging anonymous role authentication via one or more authenticator services, generating an assertion token on a trusted assertion device that is booted into a trusted configuration, and processing the assertion and validating a right of the user to make the assertion for the event. | 07-30-2009 |
20120130977 | DYNAMIC LANGUAGE CHECKING - Dynamic language checking includes identifying questionable language usage; creating a query in dependence upon the questionable language usage; querying a search engine with the query; receiving from the search engine search result statistics describing the search results for the query; and determining, in dependence upon search results statistics returned by the search engine, whether the questionable language usage is proper language usage. | 05-24-2012 |
Patent application number | Description | Published |
20090024850 | USER CONTROLLED ANONYMITY WHEN EVALUATING INTO A ROLE - A method, system, and program for user controlled anonymity when evaluating into a role are provided. An anonymous authentication controller enables a user to control anonymity of the user's identity for role based network accesses to resources, without requiring reliance on any single third party to maintain user anonymity. First, a role authentication certificate is received from a role authenticator, wherein the role authentication certificate certifies that the holder of the role authentication certificate is a member of a particular role without allowing the role authenticator issuing the role authentication certificate the ability to track an identity of a user holding the role authentication certificate. Next, an anonymous channel is established for anonymously presenting the role authentication certificate to a resource protector, wherein the resource protector requires the user to authenticate into the particular role to access a resource, wherein the role authentication certificate authenticates the user into the particular role without enabling the resource protector to ascertain the identity of the user, such that the user is in control of maintaining user anonymity for authenticated role-based accesses. | 01-22-2009 |
20090030812 | Method and Apparatus for Bidding on Broadcast Service Requests and Offers From Nearby Devices - An improved method, apparatus, and computer instructions in a portable device for obtaining bids for a task. Access to a task in a set of tasks for bidding is provided through a wireless network. The access to the task includes a specification of a selected distance between a bidding entity and a location of the portable device that the bidding entity is required to be located within for generating bids. A bid for the task is received from an entity through the wireless network if the entity is within a selected distance of a location of the portable device. The bid may be accepted for completing the task. | 01-29-2009 |
20090031128 | TRANSPARENT AWARE DATA TRANSFORMATION AT FILE SYSTEM LEVEL FOR EFFICIENT ENCRYPTION AND INTEGRITY VALIDATION OF NETWORK FILES - A mechanism for enabling efficient encryption and integrity validation of network files. When a request to read a file stored in a local network file system is received, the local network file system examines cryptographic attributes associated with the file to determine if the file is encrypted or integrity-verified. If the cryptographic attributes indicate the file is encrypted, the local network file system omits the encryption of the file by the local network file system prior to passing the file to the remote network file system. If the cryptographic attributes indicate the file is integrity-verified, the local network file system omits the integrity-verification of the file by the local network file system prior to passing the file to the remote network file system. The local network file system then transmits the file to the remote network file system. | 01-29-2009 |
20100025466 | Method and System for Verifying Election Results - The invention pertains to a method and system for verifying election results, in association with an election process and a particular election. One useful embodiment of the invention is directed to a method, wherein a plurality of voters are each authorized to cast a ballot by using a specified voting device of a voting system, wherein the specified device may have one of a number of states, and the process is under the supervision of an Election Authority (EA). The method includes the step of publishing a number of certificates, wherein each certificate corresponds to one of the specified device, and contains one or more public keys associate with its corresponding device and also contains an Election Configuration (EC) that indicates the expected state of its corresponding device during the election process. The method further includes generating a voter authorization token (VAT) for each authorized voter, wherein each VAT enables one of the authorized voters to anonymously cast only one of the ballots in the particular election. A set of voting results is generated in response to the use of a given one of the VATs to cast a given ballot, wherein the set of voting results includes the given VAT, the cast given ballot, and the state of the voting device when the given ballot was cast. The set of voting results is also signed by a unique private key that corresponds to one of the public keys that is associated with the specified voting device. A further step of a method comprises publishing a set of items that include at least lists of all VATs and all sets of voting results that are respectively generated in connection with the particular contest, wherein the published items are available, together with the published certificates, for use by members of the public to verify election results. | 02-04-2010 |