Patent application number | Description | Published |
20100312827 | METHOD AND APPARATUS TO ENABLE PROTOCOL VERIFICATION - After a client device issues a request, a verification stub component receives the request. Then, the verification stub component obtains a current state of the client device from a client state table. The verification stub component evaluates whether the request is valid or not by analyzing a content and context of the request and checking the request against a protocol matrix. If the request is valid, the verification stub component updates the current state of the client device in the current state table, and forwards the request to a server device. Otherwise, the verification stub component creates a report describing the request is invalid, and evaluates whether the server can process the request. If the server cannot process the request, the verification stub component interrupts the request and forwards the report to the client device. Otherwise, the verification stub component provides the request to the server device. | 12-09-2010 |
20120023359 | METHOD, APPARATUS AND COMPUTER PROGRAM FOR PROCESSING INVALID DATA - A method, system and computer program for processing invalid data. Data is received at a shared component for processing. A shared component is a component that is capable of being shared by multiple entities. The shared component has a plurality of threads. An attempt is made to process the data using one of the threads from the plurality of threads. The data is invalid and therefore the attempt at processing the invalid data results in the shared component and its plurality of threads failing. In response to the failure of the shared component, at least two instances of the shared component are created. At least one thread is assigned to each component instance, where the number of threads assigned to each component instance is restricted to a maximum number that is less than the original number of the plurality of threads. | 01-26-2012 |
20120174205 | USER PROFILE AND USAGE PATTERN BASED USER IDENTIFICATION PREDICTION - Embodiments of the present invention provide method, system and computer program product for user profile and usage pattern based user ID prediction. In accordance with an embodiment of the invention, a user can request a user ID to access a portion of a computing system. One or more characteristics of the user, such as a role or location can be determined and correlated to one or more different additional user ID options. In this regard, the additional user ID options can be a suggested alternative user ID for use by the user commensurate with the role or location of the user, or with past patterns of other users considered similar to the user based upon the characteristics of the user. In this way, the predictive nature of the foregoing methodology can assist the user in requesting a most appropriate user ID based upon the characteristics of the user and also in requesting a user ID which may be required in the future by the user based upon predictive patterns of system usage of other like users so as to save time and improve work efficiency. | 07-05-2012 |
20120216277 | USER PROFILE AND USAGE PATTERN BASED USER IDENTIFICATION PREDICTION - Embodiments of the present invention provide method, system and computer program product for user profile and usage pattern based user ID prediction. In accordance with an embodiment of the invention, a user can request a user ID to access a portion of a computing system. One or more characteristics of the user, such as a role or location can be determined and correlated to one or more different additional user ID options. In this regard, the additional user ID options can be a suggested alternative user ID for use by the user commensurate with the role or location of the user, or with past patterns of other users considered similar to the user based upon the characteristics of the user. | 08-23-2012 |
20140164386 | INTELLIGENT SOFTWARE INSTALLATION - A computer system determines a category of users to which a user of a computer belongs. The computer system determines a relationship between the category of users and at least one program available for installation from the computer system. Based on the determined relationship, the computer system determines that at least one feature of the at least one program are of potential interest to the user of the computer. The computer system notifies the user of the at least one feature of the at least one program of potential interest. | 06-12-2014 |