Patent application number | Description | Published |
20080222266 | REDIRECTING CLIENT CONNECTION REQUESTS AMONG SOCKETS PROVIDING A SAME SERVICE - A method, system, and program for redirecting client connection requests among sockets providing a same service are provided. An application requests multiple sockets from a kernel. In addition, the application generates a socket call option to bind the sockets to a particular port number and passes a list of the sockets to the kernel, where the list indicates that the sockets will all provide access to server systems providing the same service. In response, the kernel sets up the sockets, bound to the same port, and set to reference one another. Then, when a connection request is received for a first socket in the list with a queue that is full, the kernel redirects the connection request to a second socket in the list with available queue space. Thus, rather than drop the connection request from the first socket when it lacks available queue space, the connection request is redirected to another socket providing access to the same service. | 09-11-2008 |
20080222479 | Method and apparatus for handling reordered data packets - The present invention provides a method and apparatus for handling reordered data packets. A method comprises receiving a data packet and determining if the data packet is received out of order. The method further comprises delaying transmission of an acknowledgement indicating that a data packet is missing in response to determining that the data packet is received out of order. | 09-11-2008 |
20080235345 | Method, Apparatus, and Program to Forward and Verify Multiple Digital Signatures in Electronic Mail - A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters. | 09-25-2008 |
20080235797 | Method, Apparatus, and Program to Forward and Verify Multiple Digital Signatures in Electronic Mail - A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters. | 09-25-2008 |
20080262951 | Facilitating International Customs Planning - Facilitating customs planning and clearance including creating in an international customs server, in response to a signal communicated through a client device coupled for data communications through at least one internet connection to the international customs server, a master customs planning record; creating a related customs planning record wherein the related customs planning record is related to the master customs planning record; calculating duty on the goods described in the related customs planning record; storing the amount of the calculated duty in the related customs planning record; incrementing the total amount of duty stored in the duty total field in the master customs planning record; submitting, to the destination country, payment of the duty; creating, in dependence upon the related customs planning record, a customs declaration form for a destination country; and submitting the customs declaration form to a customs declaration forms database for the destination country. | 10-23-2008 |
20080294795 | Determining Availability Of A Destination For Computer Network Communications - Determining availability of a destination for computer network communications that include providing on a caching device a destination availability cache comprising at least one cache entry representing availability of a destination and providing, from the caching device to a source, through computer network communications, information indicating the availability of the destination. In typical embodiments, the cache entry comprises a network address of a destination device and a time limitation for the cache entry. | 11-27-2008 |
20090016369 | ACCESSING DATA PROCESSING SYSTEMS BEHIND A NAT ENABLED NETWORK - A method, system, and program for accessing data processing systems behind a NAT enabled network are provided. According to one aspect of the present invention, a NAT data processing system is located behind a NAT enabled network with a NAT device as a gateway to the NAT enabled network. A client system located outside the NAT enabled network queries the NAT device for the address of the NAT data processing system located behind the NAT enabled network. The query is automatically routed through the NAT device to a DNS server. The DNS server then returns an address for the NAT data processing system and source routing for the NAT device. The NAT device forwards the address and source routing to the client system. Then, the client system sends packets to the NAT data processing system at the address with source routing through the NAT device, such that the NAT data processing system behind the NAT enabled network is directly accessed by the client system from outside the NAT enabled network. | 01-15-2009 |
20090094238 | TECHNIQUES FOR IDENTIFYING A MATCHING SEARCH TERM IN AN IMAGE OF AN ELECTRONIC DOCUMENT - A technique for facilitating identification of a matching search term in one or more images includes selecting at least a portion of an image and creating search enriched metadata for a document that includes the image. The search enriched metadata includes a text portion that provides one or more search terms that are associated with the selected portion of the image and a location portion that provides a location of the selected portion of the image. | 04-09-2009 |
20090106348 | METHOD AND SYSTEM FOR LIMITING INSTANCES OF A CLIENT-SERVER PROGRAM WITHIN A RESTRICTED DISTRIBUTED NETWORK - The present invention provides a computer implemented method, data processing system and computer program product for limiting instances of a client-server program within a plurality of platforms in a restricted distributed network. The data processing system receives an invocation of the client-server program. The data processing system assigns a write file to the client-server program wherein the write file has a write file name and the write file is on a distributed file system accessible to the plurality of platforms. The data processing system determines whether the write file is available. Responsive to a determination that the write file is available, the data processing system opens the write file for writing wherein the write file is associated with the client-server program. The data processing system, responsive to a determination that the write file is available, forms an addressing file having addressing information of a first instance of the client-server program. The data processing system responsive to a determination that the write file is available, reports the addressing file by writing addressing information to the addressing file, wherein the addressing file is established at a predetermined logical location in the distributed file system. The data processing system responsive to the determination that the write file is available, executes at least one instruction of the client-server program. | 04-23-2009 |
20090106367 | TRIGGERING A COMMUNICATION SYSTEM TO AUTOMATICALLY REPLY TO COMMUNICATIONS - A communication system which facilitates distribution of electronic communications for a user account includes an emergency auto-reply agent that scans each received communication addressed to the user account for a particular communication sent from at least one emergency address specified for the user account separate from the address of the user account. Responsive to the communication system detecting the particular communication sent from one of the emergency addresses, the emergency auto-reply agent parses the content of the particular communication to detect whether the particular communication comprises a required password. Responsive to detecting the required password within the content of the particular communication, the emergency auto-reply agent directs the communication system to compose and send auto-reply communications from the user account in reply to received communications addressed to the user account. | 04-23-2009 |
20090175167 | Method of Reducing Network Congestion - In a method of reducing network congestion between a source computer and a destination computer, a receiving router receives a source quench message and determines whether originator of the source quench message is the destination computer or an intermediate router. If the receiving router determines the originator to be the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines the originator to be an intermediate router, the receiving computer determines if there is an alternative route from the receiving router to the destination computer. If the receiving router determines there is no alternative route from the receiving router to the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines there is an alternative route to the destination computer, the receiving router does not forward the source quench message to the source computer, and, going forward, routes packets to the destination computer by the alternative route. | 07-09-2009 |
20090276358 | User Alerts For Monitored Transactions At Automatic Teller Machines - An improved method, apparatus, and computer implemented instructions for processing a check in an automatic teller machine in a data processing system. A check is received from a user at the automatic teller machine. The check is scanned to generate an image. A transaction is performed involving the check. The image is transmitted to a mobile device associated with the user, wherein the image is in a format for use with a financial program. | 11-05-2009 |
20100005059 | Cascaded Address Books on Mobile Phones Within a Social Network - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for locating contact information in a mobile phone network within a social network. In one embodiment, the computer implemented method permits reciprocal access between a first user's contact information and a second user's contact information by a first user device and a second user device, and permitting reciprocal access between the second user's contact information and a third user's contact information by the second user device and a third user device. The computer implemented method receives a request from the third user device to contact the first user device, wherein the first user contact information is unknown to the third user and issues a search on the mobile phone network, from the third user device, for the first user contact information. The first user contact information is located at the second user device in the social network, and the first user contact information is returned to the third user device. | 01-07-2010 |
20100011312 | RFID READER INTEGRATION TO VIRTUAL WORLD MONITORING - Disclosed is a virtual world server receives an update signal corresponding to an RFID tag. The virtual world server determines an RFID tag identifier, an RFID reader identifier, and an associated asset name from the update. The virtual world server looks up a virtual area associated with the RFID reader identifier. The virtual world server teleports a virtual asset associated with the RFID tag identifier to a virtual area in the virtual world. The virtual world server renders a model of the asset in a virtual world based on an avatar perspective. | 01-14-2010 |
20100011413 | METHOD FOR AND APPARATUS FOR RETRIEVING USERNAME AND PASSWORD IN AN AUTHENTICATION PROTOCOL - Disclosed is a computer implemented method and apparatus to retrieve authentication records required for user validation and creation of authentication credentials from an authentication sever to be passed to the user. The method is comprised of the authentication server storing a first authentication record, then generating a first authentication credential based on the first authentication record. The authentication server associates the first authentication record with a first credential expiration time. The authentication server stores a second authentication record. The authentication server generates a second authentication credential based on the second authentication record, wherein the second authentication credential is associated with a second credential expiration time. Next, the authentication server associates the second authentication credential with a second credential expiration time. The authentication server determines that the first credential expiration time is earlier than the second credential expiration time and caches the first authentication record to cache. | 01-14-2010 |
20100011414 | MANAGING LOGICAL SOCKETS - Network attacks, such as a denial of service (DoS) attack, attempt to exhaust server resources and can cause a network to be unavailable for significant periods of time. Although a firewall can be utilized to defend a system from network attacks, the number of incoming connections created can be controlled to defend the system against network attacks. An operating system creates connections, known as sockets, on one or more logical ports. Incoming connections are connections whose creation requests originate from a source outside the operating system. Functionality to control socket creation can be implemented within the operating system, thus allowing a system to be placed directly on a network without a firewall. Implementing defense against network attacks within an operating system reduces the additional cost of having firewall products, and can lead to more efficient network configurations. | 01-14-2010 |
20100017404 | Method and Apparatus to Elegantly and Automatically Track Emails and its Attachments for Enhanced User Convenience - An automated, embedded & intelligent E-mail Attachment Document manager automatically tracks email and their associated attachments and assists users in locating an email message (email-chain/thread) that is the original source from where the email attachment document. The present invention can perform the tracking action using the given name of the saved attachment file. | 01-21-2010 |
20100095127 | TUNABLE ENCRYPTION SYSTEM - A method, programmed medium and system are provided for enabling a user to choose a user-preferred encryption type from among a plurality of encryption types listed in a user's Kerberos configuration file. During the ticket granting process in a Kerberos system, a user is requested to select a preferred encryption type to be used in the Kerberos communication from among encryption types contained in the user's Kerberos configuration file. The user-selected encryption type is then implemented for use in encrypting a session ticket (as well as generating the session key of user requested encryption type) for use by the user machine in communicating securely with an Kerberized application server when being communicated by that particular user. Thus, the system allows different users to simultaneously communicate with the same Kerberized application server using a supported encryption type of the user's own choice. | 04-15-2010 |
20100106833 | DYNAMIC EXPIRATION OF DOMAIN NAME SERVICE ENTRIES - Disclosed is a computer implemented method and computer program product for transmitting a resource record to a requesting computer. An authoritative domain name server receives a DNS query from a requesting computer at a name server. The authoritative domain name server looks up the resource record based on the DNS query, wherein the resource record is associated with an epochal time and a time to live. The authoritative domain name server transmits the resource record response based on the epochal time. | 04-29-2010 |
20100156909 | ENHANCED VISIBILITY OF AVATARS SATISFYING A PROFILE - Disclosed is a computer implemented method, computer program product, and apparatus to decorate visible attributes of a rendered avatar. A server may collect a first user profile of a first avatar, the first user profile having at least one interest of a user. Next, the server may receive a location of the first avatar, wherein the location is associated with a view to at least a second avatar. The server can identify the second avatar among a group of avatars visible with respect to the first avatar. Further, the server may read a target profile of the second avatar then determine whether the second user profile satisfies a criterion based on the first user profile and the target profile. In addition, the server may render a modified rendered avatar to a client, responsive to the determination that the target profile satisfies the criterion. | 06-24-2010 |
20110153394 | SERVICE DISCOVERY IN A NETWORK OF AUTOMATIC PRODUCT/SERVICE DISPENSING MACHINES - A method, system, and computer program product for providing products to a user via an automated product dispensing machine is provided. In once embodiment, an automatic product dispensing machine in a micronetwork of proximally located diverse automatic product dispensing machines receives a request for an item. Responsive to a determination that the item is unavailable at a current automatic product dispensing machine, the automatic product dispensing machine provides a user with an alternative redemption product, such as, for example, a coupon that may be redeemed at another automatic product dispensing machine or at a nearby store. | 06-23-2011 |
20110154031 | Secure Kerberized Access of Encrypted File System - A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client. | 06-23-2011 |
20110296183 | AUTHENTICATION IN DATA MANAGEMENT - Systems and methods for authentication in a data management system are provided. In one embodiment, the method comprises identifying a plurality of data ciphers based on a pre-defined set of properties associated with a plurality of data sources; and generating an authentication response having at least a subset of the identified plurality of data ciphers, wherein the authentication response authenticates access to at least some data sources from among the plurality of data sources. | 12-01-2011 |
20120204028 | Secure Kerberized Access of Encrypted File System - A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client. | 08-09-2012 |
20120297072 | MANAGING LOGICAL SOCKETS - A method includes receiving a request from a network source to create a logical socket on a logical port. The method includes accessing a structure that indicates a plurality of logical socket allocation policies to select a first of the plurality of socket allocation policies that corresponds to the logical port. Each of the plurality of logical socket allocation policies governs logical socket allocation for one or more ports, wherein logical allocation policies govern at least one of 1) the number of logical sockets that are allocated to the one or more logical ports, 2) a maximum number of logical sockets shared between a grouping of two or more logical ports, and 3) a maximum number of logical sockets. The method includes determining if the first logical socket allocation policy allows for allocation of the logical socket for the network source to communicate. The method includes allocating a logical socket. | 11-22-2012 |
20140019357 | USER ALERTS FOR MONITORED TRANSACTIONS AT AUTOMATIC TELLER MACHINES - An improved method, apparatus, and computer implemented instructions for processing a check in an automatic teller machine in a data processing system. A check is received from a user at the automatic teller machine. The check is scanned to generate an image. A transaction is performed involving the check. The image is transmitted to a mobile device associated with the user, wherein the image is in a format for use with a financial program. | 01-16-2014 |
20140188724 | USER ALERTS FOR MONITORED TRANSACTIONS AT AUTOMATIC TELLER MACHINES - An improved method, apparatus, and computer implemented instructions for processing a check in an automatic teller machine in a data processing system. A check is received from a user at the automatic teller machine. The check is scanned to generate an image. A transaction is performed involving the check. The image is transmitted to a mobile device associated with the user, wherein the image is in a format for use with a financial program. | 07-03-2014 |