Patent application number | Description | Published |
20090121929 | METHOD FOR TRACKING CONTAINERS USING A LOW-RATE WIRELESS PERSONAL AREA NETWORK SYSTEM - A method for tracking a plurality of containers each joined to an electronic tracking device having routing capabilities and a WPAN-enabled radio receiver/transmitter configured to attempt to connect to a pre-configured WPAN upon being activated comprises activating the radio receiver/transmitter of each tracking device joined to a container being loaded onto a cargo vessel; receiving an indication from each tracking device that fails to connect to the WPAN; intermittently performing a network scan to locate each WPAN-connected tracking device; intermittently configuring the WPAN to include each WPAN-connected tracking device in a hybrid tree-mesh network topology; intermittently configuring routing information stored on each WPAN-connected tracking device to maintain mutual communication with each WPAN-connected tracking device and enable mutual communication between each WPAN-connected tracking device; receiving transport-related data from each WPAN-connected tracking device; transmitting the transport-related data to a control station through a LAN on the vessel; broadcasting a request to be routed between the WPAN-connected tracking devices in a depth-first traversal of the network topology that directs each WPAN-connected tracking device to enter a low-power mode when the depth-first traversal backtracks from the tracking device; and receiving an acknowledgment of the request communicated from each WPAN-connected tracking device when the tracking device enters the low-power mode. | 05-14-2009 |
20090254747 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING E-TOKEN BASED ACCESS CONTROL FOR VIRTUAL WORLD SPACES - A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list. | 10-08-2009 |
20090288159 | Method and Apparatus for Secure Authorization - A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device. | 11-19-2009 |
20090315916 | ON-THE-FLY CREATION OF VIRTUAL PLACES IN VIRTUAL WORLDS - A specification of a set of objects associated with at least one virtual world is obtained. The objects are laid out in a three-dimensional virtual representation. An on-the-fly virtual place is created in the virtual world, based on the layout. The virtual place depicts the set of objects in the three-dimensional virtual representation and enables navigation and interaction therewith | 12-24-2009 |
20100040293 | Kinematic Based Authentication - In one embodiment, a computer-implemented method for authentication by kinematic pattern match is provided. The computer implemented method prompts a user for a kinematic input, receives an element of a kinematic pattern to form a set of received elements, and determines whether there are additional elements of the kinematic pattern. Responsive to a determination that there are no additional elements of the kinematic pattern, forms a kinematic pattern from the set of received elements and computes a signature from the set of received elements. The computer implemented method further determines whether the signature matches a predetermined value, and responsive to a determination that the signature matches a predetermined value, sends an authentication signal. | 02-18-2010 |
20100058443 | Confidential Presentations in Virtual World Infrastructure - Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture. | 03-04-2010 |
20110029885 | Confidential Presentations in Virtual Worlds - Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation. | 02-03-2011 |
20120233669 | METHOD AND APPARATUS FOR SECURE AUTHORIZATION - A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device. | 09-13-2012 |
20120240199 | CONFIDENTIAL PRESENTATIONS IN VIRTUAL WORLD INFRASTRUCTURE - Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture. | 09-20-2012 |