Patent application number | Description | Published |
20100050259 | SYSTEM AND METHOD FOR RADIO FREQUENCY INTRUSION DETECTION - A system to detect and analyze RF signals utilizes a data structure storing RF signatures indicating characteristics of known authorized and/or unauthorized RF transmissions. When an RF signal is detected, certain analysis characteristics are extracted from the RF signal and analyzed with respect to the stored RF signatures to determine whether the RF transmission is authorized or unauthorized. In the event of an unauthorized RF transmission, the system generates an alarm condition to alert the user to an RF intrusion and may further log data related to the intruder transmission. Known techniques may be used to determine the location of the RF intrusion within a defined area of operations. | 02-25-2010 |
20100170947 | SYSTEM AND METHOD FOR ELECTRONIC TICKET VERIFICATION, IDENTIFICATION, AND AUTHORIZATION WITH A WIRELESS COMMUNICATION DEVICE - An enhanced security system utilizes a consumer wireless device and independent secure servers to enhance identification and authentication of the electronic ticketing. The consumer may make an eTicket purchase using a network, such as the Internet, in a conventional manner. The server involved in the purchase may send an eTicket confirmation to a consumer wireless device. However, master records of the transaction are sent via a secure link to a vendor server, typically associated with a wireless service provider. At a point just-in-time, the vendor server transmits symbology to the consumer wireless device and transmits additional data related to the symbology to a security server. When the consumer arrives with the eTicket, the consumer also uses the displayed symbology on the consumer wireless device. The symbology is scanned and compared with data transmitted from the vendor server to the security server. If authenticated, the eTicket may be authenticated. In addition, a near field communicator in the consumer wireless device may be programmed to provide additional security. The programmed NFC may be scanned to provide additional authentication. | 07-08-2010 |
20130171942 | System and Method for Radio Frequency Intrusion Detection - A system to detect and analyze RF signals utilizes a data structure storing RF signatures indicating characteristics of known authorized and/or unauthorized RF transmissions. When an RF signal is detected, certain analysis characteristics are extracted from the RF signal and analyzed with respect to the stored RF signatures to determine whether the RF transmission is authorized or unauthorized. In the event of an unauthorized RF transmission, the system generates an alarm condition to alert the user to an RF intrusion and may further log data related to the intruder transmission. Known techniques may be used to determine the location of the RF intrusion within a defined area of operations. | 07-04-2013 |
Patent application number | Description | Published |
20100088286 | DEPLOYMENT MANAGER FOR MASTER DATA MANAGEMENT - A method, apparatus, and article of manufacture provide the ability to deploy a data management application to a target computer system. Metadata for a master data management (MDM) application is stored in a deployment database. The metadata is representative of business rules and process workflows that manage business data from multiple sources and a model definition for a model for a central business database. Configuration settings for the MDM application are stored in the deployment database. The metadata and configuration settings are retrieved from the deployment database. Installation instructions of the MDM application are confirmed based on input into a graphical user interface. The master data management application is installed on the target computer system based on the installation instructions, metadata, and configuration settings. | 04-08-2010 |
20100088334 | HIERARCHY MANAGER FOR MASTER DATA MANAGEMENT - A method, apparatus, and article of manufacture is configured to define a structured view of data in a computer system. A relational database management system (RDBMS) stores information in the computer system. As part of a process and framework, a series of business rules and process workflows that manage data (that is hierarchical in nature) that resides in one or more RDBMS tables are maintained. User input is accepted that defines a hierarchical structure that is projected onto the data. The hierarchical structure is stored as metadata in the RDBMS. The hierarchical structure is utilized to graphically visualize, manage, and manipulate the data. | 04-08-2010 |
20110078201 | RAGGED AND UNBALANCED HIERARCHY MANAGEMENT AND VISUALIZATION - A method, apparatus, and article of manufacture provide the ability to define a view of data in a computer system A relational database management system (RDBMS) executes and stores the information in the computer system. As part of a process and framework, a series of business rules and process workflows are maintained to manage hierarchical data that resides in RDBMS tables. User input is accepted that defines a hierarchy that is projected onto the data. The hierarchy may be parent-child relationships with no level consistency. Alternatively, the hierarchy may have branches and levels, with each of the levels having a consistent meaning but inconsistent depths due to one level of a branch being unpopulated. The hierarchy is stored as metadata in the RDBMS and utilized to graphically visualize, manage, and manipulate the data. | 03-31-2011 |
20110078607 | WORKFLOW INTEGRATION WITH ADOBE.TM.FLEX.TM.USER INTERFACE - A method, system, apparatus, and article of manufacture provides the ability to visualize master data management (MDM) data as part of a MDM workflow user interface (UI) in a computer system. MDM data resides in one or more tables of a relational database management system. An MDM system maintains, as part of a process and framework, a first process workflow to manage relationship data. The relationship data is data required to manage an association of one piece of MDM data to another piece of MDM data. A first process workflow provides a UI node that contains a link to a file that describes UI components to display when the first process workflow is executed. A first component of the UI component identifies an Adobe™ Flex™ based UI component. The Adobe™ Flex™ based UI component enables the representation and viewing of the MDM data in a hierarchy. | 03-31-2011 |
Patent application number | Description | Published |
20080199276 | COVER APPLIER SYSTEM - A system for positioning a cover relative to a book block. The system comprises a drive unit to cause movement of at least one of the book block and the cover and a position sensor operable to detect at least one of a position of the book block and the cover. The position sensor is operable to generate a position signal indicative of the position. The system also comprises a controller in communication with the position sensor and the drive unit. The controller is operable to receive the position signal and to control the drive unit based on the position signal to adjust a relative position of the cover and the book block. | 08-21-2008 |
20090000440 | ADJUSTABLE TRIMMING ASSEMBLY - A method of trimming printed media comprises selecting printed media to be positioned on a conveyor based on predetermined delivery sequence data, positioning the printed media on the conveyor, receiving size data representative of at least one dimension of the printed media to be trimmed, and electronically controlling a trimmer based on the received size data to adjust a location at which the printed media is to be trimmed. | 01-01-2009 |
20100269651 | ADJUSTABLE TRIMMING ASSEMBLY - A method of trimming printed media, having a first dimension, a first edge parallel to the direction of the first dimension, and a second dimension substantially perpendicular to the first dimension, includes selecting printed media to be positioned on a conveyor based on predetermined delivery sequence data, positioning the printed media along a path on the conveyor, abutting the printed media with a stop to position the first edge of the printed media at a location along the path, receiving size data representative of the second dimension of the printed media to be trimmed, and electronically controlling at least one of the stop and a trimming device to adjust a distance between the stop and the trimming device, in a direction substantially parallel with the path, based on the received size data to adjust a location along the second dimension at which the printed media is to be trimmed. | 10-28-2010 |
20110037214 | IN-LINE SHELL PROCESSING - A system is provided for printing and assembling printed products. The system includes a binding line and a plurality of pockets for delivering signatures to the binding line. A personalization line is associated with one of the plurality of pockets. The personalization line includes a printer configured to print variable information on a substrate and a converter positioned downstream of the printer and configured to convert the substrate into a variable signature including the variable information | 02-17-2011 |
20140001694 | IN-LINE SHELL PROCESSING | 01-02-2014 |
Patent application number | Description | Published |
20140279926 | ACTIVE ARCHIVE BRIDGE - A primary data storage system is connected with a separate and external active archive storage system to consolidate data and allow active archive data to be managed based on primary storage system events. The primary data storage system may be managed and maintained by an external entity, and may include a manager module such as a resource manager. The active archive system may include several tiers of storage in a hierarchical storage system and logic for moving data between and among the tiers. As data processing milestones are completed or the state of data changes, in projects stored in the primary data storage system, task milestone or state change events are detected. Event detection can trigger data movement in the active archive solution. One or more software modules implementing the present invention may detect the events and trigger active archive operations based on the events. | 09-18-2014 |
20140281301 | ELASTIC HIERARCHICAL DATA STORAGE BACKEND - A multi-tiered data management system utilizes vertical storage tiers, each with one or more horizontal data storage elements, to provide a dynamic and configurable system for managing the storing, archiving and retrieval of data. The system provides an ability to automatically copy data in parallel to multiple types of storage systems horizontally within a tier and vertically between tiers transparently from the host system or user perspective. Users may decide how many backend systems would be utilized and managed, and provide information to define rules or policies for the movement of data into, and among, and from the backend systems and tiers of storage devices. Data is managed by these set policies and determines how long the data will stay in each medium, be migrated between mediums, and otherwise managed. When a user retrieves data, the present system determines which data storage source would best suit the user's request. | 09-18-2014 |