Patent application number | Description | Published |
20090019550 | TRUSTED HARDCOPY DOCUMENT - A trusted hardcopy document is generated using a two-part confirmation number including a private part and a public part. A public part of the confirmation number is received at a first party creating the trusted hardcopy document. The private part of the confirmation number is sent to an owner of the trusted hardcopy document by a trusted party and is not sent to the first party creating the trusted hardcopy document. A human-readable form and a machine readable form of the public part of the confirmation number are printed on the trusted hardcopy document. | 01-15-2009 |
20100080391 | Auditing Data Integrity - Various approaches are described for auditing integrity of stored data. In one approach, a data set is provided from a client to a storage provider, and the data set is stored at a first storage arrangement by the storage provider. An auditor determines whether the data set stored at the first storage arrangement is corrupt without reliance on any part of the data set and any derivative of any part of the data set stored by the client. While the auditor is determining whether the data set stored at the first storage arrangement is corrupt, the auditor is prevented from being exposed to information specified by the data set. The auditor outputs data indicative of data corruption in response to determining that the data set stored at the first storage arrangement is corrupt. | 04-01-2010 |
20100198871 | INTUITIVE FILE SHARING WITH TRANSPARENT SECURITY - A file sharing system includes authorization-based security to control access to shared files; and a synchronizer which uses the authorization-based security to monitor the shared files for changes and propagating the changes according to sharing relationships. A method for file sharing includes using authorization-based security to control access to a shared file; and monitoring the shared file for changes using a synchronizer which incorporates the authorization-based security to access the shared file. | 08-05-2010 |
20110270979 | Reducing Propagation Of Message Floods In Computer Networks - A computer network ( | 11-03-2011 |
20130046979 | PROTECTING THE INFORMATION ENCODED IN A BLOOM FILTER USING ENCODED BITS OF DATA - Illustrated is a system and method that includes identifying data stored as an entry in a list. The system and method also includes truncating the entry to create a truncated entry. It further includes transforming the truncated entry into a hash, the hash used to set an index position value within a Bloom filter. The system and method also includes an interface module to transmit the Bloom filter. | 02-21-2013 |
20130086655 | PASSWORD CHANGING - In one example, a computing device generates a new password for accessing a user account and/or computing system and inspires a change of an existing password for the user account and/or computing system to the new password. Thereafter, the computing device detects occurrence of a condition to trigger another change of the password for the user account and/or computing system and, responsively, inspires another change of the password for the user account and/or computing system. | 04-04-2013 |
20130177157 | ENCRYPTION KEY MANAGEMENT - An encryption key fragment is divided into a number of encryption key fragments. Requests to store different ones of the encryption key fragments are transmitted to different computer memory storage systems. An individual request to store an encryption key fragment includes one of the encryption key fragments and bears an access control hallmark for regulating access to the encryption key fragment. | 07-11-2013 |
20130290780 | RECOVERY SEGMENTS - In one example, a method for implementing recovery segments includes sending an application message from a parent process executed by a first computing device to a child process executed by a second computing device and identifying a dependency created by the application message. This identified dependency is included in a dependence set of the child process and saved. A checkpoint is generated by the parent process and a checkpoint message that includes dependency information is sent from the parent process to the child process. The child process modifies the dependence set according to the dependency information and generates a second checkpoint that is saved in nonvolatile memory of the second computing device. Upon occurrence of a failure of the parent process, the child process reverts to a most recent checkpoint generated by the child process that does not include the effects of processing an orphan message. | 10-31-2013 |
20140040898 | DISTRIBUTED TRANSACTION PROCESSING - A system includes an initiator and processing nodes. The initiator distributes portions of a transaction among the processing nodes. Each processing node has at least one downstream neighbor to which the processing node sends commit messages. The commit messages include a commit status of the processing node. The downstream neighbor is also a processing node. | 02-06-2014 |
20140310453 | SHIFTABLE MEMORY SUPPORTING ATOMIC OPERATION - A shiftable memory supporting atomic operation employs built-in shifting capability to shift a contiguous subset of data from a first location to a second location within memory during an atomic operation. The shiftable memory includes the memory to store data. The memory has the built-in shifting capability. The shiftable memory further includes an atomic primitive defined on the memory to operate on the contiguous subset. | 10-16-2014 |
20140359705 | Granting Permission to Use an Object Remotely with a Context Preserving Mechanism - Granting permission to use an object remotely with a context preserving mechanism includes selecting an object stored at a first electronic location based on user input, granting permission to a subject to use the object remotely by selecting the subject based on the user input, and visually depicting a sharing relationship with the subject in response to using the object based on the user input. | 12-04-2014 |
20150046644 | SHIFTABLE MEMORY DEFRAGMENTATION - Shiftable memory that supports defragmentation includes a memory having built-in shifting capability, and a memory defragmenter to shift a page of data representing a contiguous subset of data stored in the memory from a first location to a second location within the memory to be adjacent to another page of stored data. A method of memory defragmentation includes defining an array in memory cells of the shiftable memory and performing a memory defragmentation using the built-in shifting capability of the shiftable memory to shift a data page stored in the array. | 02-12-2015 |