Patent application number | Description | Published |
20080235196 | Confidential Content Search Engine - A security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken. | 09-25-2008 |
20080235345 | Method, Apparatus, and Program to Forward and Verify Multiple Digital Signatures in Electronic Mail - A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters. | 09-25-2008 |
20080235760 | Confidential Content Reporting System and Method with Electronic Mail Verification Functionality - A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages. Automatic modification of the electronic mail message to modify distribution lists and/or content of the electronic mail message may be performed using the mechanisms of the illustrative embodiments. | 09-25-2008 |
20080235797 | Method, Apparatus, and Program to Forward and Verify Multiple Digital Signatures in Electronic Mail - A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters. | 09-25-2008 |
20080273711 | APPARATUS, SYSTEM AND METHOD OF INTEGRATING WIRELESS TELEPHONES IN VEHICLES - A system, apparatus and method of integrating a wireless telephone in a vehicle are provided. The system, apparatus and method consist of installing a parabolic speaker in the vehicle that has a focused listening area at a location where an operator of the vehicle may he situated. The parabolic speaker may further have an integrated microphone. When a wireless telephone is placed in a cradle, that may be available in the vehicle for receiving the telephone, the telephone will be integrated in the vehicle. Consequently, the telephone will interact with the vehicle's on-board computer (OBC). The OBC may then route all in-coming signals from the wireless telephone to the parabolic speaker. Further, the OBC may route all out-going signals from the integrated microphone to the wireless telephone. | 11-06-2008 |
20090083769 | COMMUNICATING WITH REMOTE OBJECTS IN A DATA PROCESSING NETWORK - A method and computer program product for invoking remote objects in a data processing system includes generating a serialized byte stream containing the remote object and its arguments, responsive to executing a remote object call. The serialized byte stream is sent to a server containing the object. Responsive to receiving a second serialized byte stream containing a result produced by the remote object and determining the presence of a second remote object, in the second byte stream, for which no reference can be found, using information contained in second serialized byte stream to determine the class type of the second remote object. A proxy compatible with the second remote object's class type, if not already existing, is automatically generated and compiled on the client or, if the proxy does exist, is loaded at run time to call the second remote object. | 03-26-2009 |
20090193414 | Method and System for a Grid-Enabled Virtual Machine with Movable Objects - A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine. | 07-30-2009 |
20100082570 | CONTEXT AWARE SEARCH DOCUMENT - While creating a document in a document editing application, a user may wish to locate more information on a particular topic to add more detail to the document. For example, a user begins creating an outline of topics for a research paper. Functionality can be implemented in a document editing application to dynamically perform searches on determined keywords, and to automatically associate search results with those keywords. In addition, searches are refined based on document context, and results can be categorized based on prior consumption of the information contained in each result. This allows a user to locate results best pertaining to topics in the document while being able to retrieve resources that have been useful in the past. Automatically performing searches and associating search results with text in a document gives a user instant access to relevant information which allows the user to spend less time researching. | 04-01-2010 |
20120109987 | REMOTE FILE SHARING BASED ON CONTENT FILTERING - Embodiments of the invention include a system, method and computer program product for accessing a remote file system in which files in the remote file system are mapped to a local file system that is coupled to the remote file system by a network, wherein the mapped files meet a filtering criterion and are used in subsequent file operations at the local file system. | 05-03-2012 |
20130174140 | ACCURATELY ESTIMATING INSTALL TIME - Timing parameters that influence an install time interval for installing a product on computing machines in a test environment in accordance with an installation configuration option are identified. A test value of the timing parameter and a test value of the install time are determined for each of the computing machines. The test values of the timing parameter and the install time determined for the sample computing machines are analyzed to determine an install time calculation expression for the installation configuration option. For installation in accordance with the installation configuration option in a normal operating environment, a current value of each of the timing parameters of the predetermined install time calculation expression for the installation configuration option. The install time interval in the normal operating environment is estimated based on the current value of the timing parameters and the install time calculation expression. | 07-04-2013 |
20140007249 | Privacy Control in a Social Network | 01-02-2014 |
20140007255 | Privacy Control in a Social Network | 01-02-2014 |
20140123128 | ACCURATELY ESTIMATING INSTALL TIME - Timing parameters that influence an install time interval for installing a product on computing machines in a test environment in accordance with an installation configuration option are identified. A test value of the timing parameter and a test value of the install time are determined for each of the computing machines. The test values of the timing parameter and the install time determined for the sample computing machines are analyzed to determine an install time calculation expression for the installation configuration option. For installation in accordance with the installation configuration option in a normal operating environment, a current value of each of the timing parameters of the predetermined install time calculation expression for the installation configuration option. The install time interval in the normal operating environment is estimated based on the current value of the timing parameters and the install time calculation expression. | 05-01-2014 |
20140189123 | Dynamically selecting an identity provider for a single sign-on request - An identity provider (IdP) discovery service operative at a service provider (SP) is described. In operation, and as valid requests are received by the SP via normal IdP-initiated flows, the SP builds-up knowledge about the relationship between the IdP (that redirected the request) and the initiator of the request. The IdP instance typically is inferred from an HTTP referrer field, and information about the initiator may be ascertained from client-specific information, such as client system IP address, client DNS domain, a domain of a user e-mail address, a target URL for the incoming request, or the value associated with a particular HTTP header field. This knowledge is maintained in one or more mapping table(s) that associate request attributes-to-IdP instance data. The mappings are then used to facilitate IdP discovery for a new incoming request to the SP that has been determined to originate from other than an IdP. | 07-03-2014 |