Patent application number | Description | Published |
20090073912 | METHOD AND SYSTEM FOR DIGITAL COMMUNICATION THROUGH INFRASTRUCTURE NETWORK WITH RECEIVING STATIONS ACCORDING TO THEIR GEOGRAPHICAL STATUS - The present invention relates to a method and system of computer communication through an infrastructure multicast IP network, between one or several determined central stations and undetermined groups of receiving stations, especially mobile stations. According to the invention, every mobile station sends its geographical status, e.g. its position, in an IP unicast message to the central station. In response, the mobile station receives an IP unicast message comprising one or more IP multicast addresses corresponding to the transmitted geographical status. The central station also has the necessary routers subscribed or unsubscribed to these multicast addresses, according to the local presence of such receiving stations. Receiving stations may then subscribe such localized multicast addresses, and receive the corresponding multicast messages. | 03-19-2009 |
20100057765 | EMAIL ATTACHMENT STORAGE METHOD AND SYSTEM - An email method and system. The method includes receiving by a computing system, an email addressed to a recipient. The computing system retrieves from an internal table of files, a file link and an ID associated with an attached file attached to the email. The file link points to a location within the computing system for the attached file. The computing system removed the attached file from the email. The computing system generates a copy of the email and places the file link and the ID in the copy of the email. The computing system retrieves and stores identification data for the recipient. The computing system determines a total file size for all files being accessed by the recipient. The computing system determines if the file total size exceeds a file size threshold. The computing system transmits the copy of the email comprising the file link and the ID. | 03-04-2010 |
20120257580 | COMMUNICATION WITH RECEIVING STATIONS ACCORDING TO THEIR GEOGRAPHICAL STATUS - A method for communicating with a receiving station and a system for implementing the method. The system includes the receiving station. A geographical area is divided into at least two geographical cells. Each cell is a unique geographical region within the geographical area. Each cell is associated with one and only one unique joining address of at least two joining addresses. A totality of joining addresses in a joining message consisting of the one and only one unique joining address to which each cell is associated. The joining message is an IP unicast message including the at least two joining addresses. | 10-11-2012 |
20130121339 | SPLITTING AND SHARING ROUTING INFORMATION AMONG SEVERAL ROUTERS ACTING AS A SINGLE BORDER ROUTER - Routers split and share routing information among several routers within a group of routers acting as a single border router in an Internet protocol (IP) network, each router comprising a routing table. A router of the group selects routes in the routing table of the router; requests other routers of the group to replace, in their routing tables, each selected route with the router as next hop; associates parts of-non selected routes, each one with another router of the group; and removes and replaces, in the routing table, each-non selected route associated with a router of the group by the associated router as next hop. | 05-16-2013 |
20130124086 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - An approach for generating optimal itineraries based on network connectivity is presented. A computer receives a first message from which a current position of a vehicle on a trip, destination, a service being requested for a mobile device in the vehicle, service providers and network(s) are extracted. Network connectivity measures are retrieved and signal qualities in respective cells are determined based on the network connectivity measures. Based on the signal qualities, an itinerary is determined as paths and a hop indicating a position on one of the paths at which a connectivity change from a first to a second service provider is to occur. A response to the first message indicates the itinerary. Sending the response results in the mobile device making the connectivity change when the vehicle reaches the position indicated by the hop. | 05-16-2013 |
20130124087 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - An approach for generating optimal itineraries is presented. As a response to a first message sent to a remote computer system by a global positioning device transported by a vehicle on a trip, the device receives a second message indicating optimal itineraries of the trip. The device receives a selection of an optimal itinerary indicating a path, a hop, an updated service provider to provide a service to a mobile device transported by the vehicle, and an updated network for providing the service. The device detects the vehicle at a position indicated by the hop, and in response, generates a third message indicating the updated service provider and the updated network. The global positioning device sends the third message to the mobile device and as a result, the mobile device makes a connectivity change to the updated service provider and/or to the updated network. | 05-16-2013 |
Patent application number | Description | Published |
20100023455 | DYNAMIC ITINERARY-DRIVEN PROFILING FOR PREVENTING UNAUTHORIZED CARD TRANSACTIONS - A method and system for preventing unauthorized card transactions via dynamic itinerary-driven profiling. Authorization record(s) including authorized geographic locations and authorized periods of time are received from a travel reservation system (TRS). The authorization record(s) identify an itinerary specified by a travel booking(s) purchased via the TRS using a debit or credit card. The itinerary specifies that the cardholder is scheduled to be in the authorized geographic locations for the authorized periods of time. In response to receiving a request for an authorization of a card transaction, a location and date associated with the card transaction are retrieved from the request. The card transaction is rejected based on a determination that the retrieved location is not within the authorized geographic locations and/or the retrieved date is not within the authorized periods of time. A notification of the retrieved location and retrieved date is logged and displayed. | 01-28-2010 |
20100151840 | GENERATING ALERTS BASED ON PREDICTED WIRELESS CONNECTION LOSSES - A method and system for generating alerts based on predicted wireless connection losses. A message is received that includes a first position of a mobile device, an indication of a service being provided to the mobile device via a wireless connection provided by a first bearer, and an mobile device identifier. A direction and speed of the mobile device is received. An amount of time elapsing before the mobile device moves to a second position at which the mobile device experiences a loss of the wireless connection via the first bearer is predicted. An alert that indicates that the loss is occurring in the amount of time is generated. The alert is sent to the mobile device as a response to the message. | 06-17-2010 |
20100153001 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - A method and system for generating optimal itineraries based on network connectivity. A computer receives a first message from which a current position of a vehicle on a trip, destination, service(s) being provided to mobile device(s) in the vehicle, service provider(s) and network(s) are extracted. Optimal itineraries are generated by generating sets of optimal parameters that include paths for which connectivity measures satisfy predefined criteria and hops that indicate positions associated with connectivity changes. A response to the first message indicates the optimal itineraries and the associated sets of optimal parameters and is sent to a vehicle-based device. Sending the response results in the mobile device(s) making the connectivity changes when the vehicle is detected at the hops. | 06-17-2010 |
20120245967 | PREVENTING AN UNAUTHORIZED CARD TRANSACTION - An approach for preventing unauthorized card transactions is presented. An authorization record including an authorized geographic location and an authorized period of time is received from a travel reservation system (TRS) and stored to dynamically update a profile table that stores other authorization records. The authorization record identifies an itinerary specified by travel booking(s) purchased via the TRS using a debit or credit card. The itinerary specifies that the cardholder is scheduled to be in the authorized geographic location for the authorized period of time. In response to receiving a request for an authorization of a card transaction, a location and date associated with the card transaction are retrieved from the request. The card transaction is rejected based on a determination that the retrieved location is not within authorized geographic locations included in the stored authorization records that have authorized time periods that include the retrieved date. | 09-27-2012 |
Patent application number | Description | Published |
20120253810 | COMPUTER PROGRAM, METHOD, AND SYSTEM FOR VOICE AUTHENTICATION OF A USER TO ACCESS A SECURE RESOURCE - Authenticating a purported user attempting to access a secure resource includes enrolling a user's voice sample by requiring the user to orally speak preselected enrollment utterances, generating prompts and respective predetermined correct responses where each question has only one correct response, presenting a prompt to the user in real time, and analyzing the user's real time live response to determine if the live response matches the predetermined correct response and if voice characteristics of the user's live voice sample match characteristics of the enrolled voice sample. | 10-04-2012 |
20130185775 | MULTI FACTOR AUTHENTICATION - In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when executed by the processor, configure the processor to receive, via a first communication channel, a primary authentication request transmitted from a user from a first device, process the primary authentication request to determine whether the user is authorized to access one or more resources, in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request, and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel. | 07-18-2013 |
20130239173 | COMPUTER PROGRAM AND METHOD FOR ADMINISTERING SECURE TRANSACTIONS USING SECONDARY AUTHENTICATION - Administering secure transactions using secondary authentication includes receiving a transaction request from a user using a first client device, determining whether the requested transaction is a type of transaction that is already approved, determining whether one or more current parameters of the transaction are within limits that are already established if the type of transaction is already approved, transmitting a secondary authentication request to the user to approve the transaction if the current parameters are outside of already established limits or if the type of transaction is not already approved, receiving a response to the secondary authentication request from the user, determining from the response whether the user approved the transaction, aborting the transaction if the user denies the transaction, and performing the transaction if the user approves the transaction or if the type of transaction is already approved and the current parameters are within already established limits. | 09-12-2013 |
Patent application number | Description | Published |
20090300745 | ENHANCED MULTI FACTOR AUTHENTICATION - In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when executed by the processor, configure the processor to receive, via a first communication channel, a primary authentication request transmitted from a user from a first device, process the primary authentication request to determine whether the user is authorized to access one or more resources, in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request, and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel. | 12-03-2009 |
20120017268 | ENHANCED MULTI FACTOR AUTHENTICATION - In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when executed by the processor, configure the processor to receive, via a first communication channel, a primary authentication request transmitted from a user from a first device, process the primary authentication request to determine whether the user is authorized to access one or more resources, in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request, and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel. | 01-19-2012 |