Patent application number | Description | Published |
20130262857 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - A network user is authenticated to another network entity by using a first program to receive user input validation information, and store a user credential. A second program receives information, such as a random number, from the other entity. The first program receives an input transferring the information to it, transmits the information to the authentication server, and receives an identifier of the other entity, other information, and authentication policy requirements from the authentication server. It then transmits the input validation information corresponding to the received authentication policy requirements to the authentication server, and in response receives a request for a user credential. It signs a message, including the transferred information and the received other information, with the stored user credential, and transmits the signed message to the authentication server to authenticate the user. | 10-03-2013 |
20130262858 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The provider server transmits the random number to the device. The random number is transferred to a second user device, which transmits it to the authentication server. The authentication server transmits provider authentication policy requirements and further transmits the other information to the second device. The second device transmits user validation information to the authentication server. The authentication server determines that the transmitted validation information corresponds to the service provider authentication policy requirements, compares the validation information with stored validation information for the user to authenticate the user. The second device transmits a message, including the random number and the other information, signed with a user credential to the authentication server. The authentication server transmits notice of authentication and the signed message to the provider server. | 10-03-2013 |
20130263211 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - An authentication server transmits a random number to and receives a other information from a service provider. Later, the first random number is received from a requester and a provider identifier, the received other information and provider authentication policy requirements are transmitted to the requester. A user identifier and validation information are received from the requester. The received validation information is determined to correspond to the provider authentication policy requirements, and compared with stored user validation information associated with the received user identifier to authenticate the requester. A message, including both the random number and other information, signed with a credential of the requesting user is received and transmitted to the first provider. | 10-03-2013 |
20150237031 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - An authentication server transmits a random number to and receives a other information from a service provider. Later, the first random number is received from a requester and a provider identifier, the received other information and provider authentication policy requirements are transmitted to the requester. A user identifier and validation information are received from the requester. The received validation information is determined to correspond to the provider authentication policy requirements, and compared with stored user validation information associated with the received user identifier to authenticate the requester. A message, including both the random number and other information, signed with a credential of the requesting user is received and transmitted to the first provider. | 08-20-2015 |
20150264050 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The provider server transmits the random number to the device. The random number is transferred to a second user device, which transmits it to the authentication server. The authentication server transmits provider authentication policy requirements and further transmits the other information to the second device. The second device transmits user validation information to the authentication server. The authentication server determines that the transmitted validation information corresponds to the service provider authentication policy requirements, compares the validation information with stored validation information for the user to authenticate the user. The second device transmits a message, including the random number and the other information, signed with a user credential to the authentication server. The authentication server transmits notice of authentication and the signed message to the provider server. | 09-17-2015 |
Patent application number | Description | Published |
20100095075 | ON-DEMAND PAGING-IN OF PAGES WITH READ-ONLY FILE SYSTEM - Disclosed is a computer implemented method and computer program product to resume a process at an arrival machine that is in an identical state to a frozen process on a departure machine. The arrival machine receives checkpoint data for the process from the departure machine. The arrival machine creates the process. The arrival machine updates a page table, wherein the page table comprises a segment, page number, and offset corresponding to a page of the process available from a remote paging device, wherein the remote paging device is remote from the arrival machine. The arrival machine resumes the process. The arrival machine generates a page fault for the page, responsive to resuming the process. The arrival machine looks up the page in the page table, responsive to the page fault. The arrival machine determines whether the page is absent in the arrival machine. The arrival machine transmits a page-in request to the departure machine, responsive to a determination that the page is absent. The arrival machine receives the page from the departure machine. | 04-15-2010 |
20100250493 | USING A SPARSE FILE AS A CLONE OF A FILE - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 09-30-2010 |
20120066189 | CONTROLLING AND RECOVERING LONG-LIVED TRANSACTIONS - Some embodiments of the inventive subject matter are directed to performing sub-transactions of a long-lived transaction (LLT) in a sequence (e.g., according to an LLT flow) and writing a log entry at the performance of each of the sub-transactions that specifies results of the sub-transaction. Some embodiments do not require generating any compensating transactions during performance of the sub-transactions. Some embodiments are further directed to detecting that an interruption occurs to the LLT and repeating, or initiating re-performance of the LLT from the beginning of the sequence following the flow of the LLT from its beginning. During the re-performance of the LLT, some embodiments are further directed to checking the log entry at each sub-transaction to determine whether the sub-transaction was performed successfully before the interruption. If the log indicates that the long-lived transaction completed successfully, some embodiments are further directed to skipping performance of the sub-transaction until reaching a sub-transaction that does not have a valid log entry, then returning an error and recovering the LLT using instructions for compensating transactions that are already written into the LLT flow. | 03-15-2012 |
20120066431 | RECOVERABILITY WHILE ADDING STORAGE TO A REDIRECT-ON-WRITE STORAGE POOL - Embodiments include a method comprising detecting addition of a new nonvolatile machine-readable medium to a data storage pool of nonvolatile machine-readable media. The method includes preventing from being performed a first operation of a file system that requires a first parameter that identifies a logical indication of a location within the nonvolatile machine-readable media for the file system, until logical indications of locations within the new nonvolatile machine-readable medium for the file system have been stored in the data storage pool. The method includes allowing to be performed, prior to logical indications of locations within the new nonvolatile machine-readable medium being stored in the data storage pool, a second operation of the file system that does not require a second parameter that identifies a logical indication of a location within the nonvolatile machine-readable media, wherein the second operation causes data to be written into the new nonvolatile machine-readable medium. | 03-15-2012 |
20120209810 | Using a Sparse File as a Clone of a File - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 08-16-2012 |
20130007409 | ON-DEMAND PAGING-IN OF PAGES WITH READ-ONLY FILE SYSTEM - Disclosed is a computer implemented method to resume a process at an arrival machine that is in an identical state to a frozen process on a departure machine. The arrival machine receives checkpoint data for the process from the departure machine. It creates the process. It updates a page table, wherein the page table comprises a segment, page number, and offset corresponding to a page of the process available from a remote paging device, wherein the remote paging device is remote from the arrival machine. It resumes the process and responsively generates a page fault for the page. It looks up the page in the page table, responsive to the page fault. It determines whether the page is absent in the arrival machine. It transmits a page-in request to the departure machine, responsive to a determination that the page is absent. It receives the page from the departure machine. | 01-03-2013 |
20130031068 | CONTROLLING AND RECOVERING LONG-LIVED TRANSACTIONS - Some embodiments of the inventive subject matter are directed to performing sub-transactions from a long-lived transaction using an identifier, wherein the sub-transactions are required to be completed in a sequence for the long-lived transaction. In some embodiments, the method is further directed to determining that the sub-transactions require a write of a data value to a database, writing in a log, using the identifier, an entry that indicates the data value, detecting an interruption in performing of the write of the data value to the database, and initiating re-performance of the sub-transactions in order of the sequence. Some embodiments are further directed to, during re-performance of the sub-transactions, detecting the data value in the entry of the log using the identifier, and using the data value indicated in the entry of the log to write the data value to the database. | 01-31-2013 |
Patent application number | Description | Published |
20130262857 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - A network user is authenticated to another network entity by using a first program to receive user input validation information, and store a user credential. A second program receives information, such as a random number, from the other entity. The first program receives an input transferring the information to it, transmits the information to the authentication server, and receives an identifier of the other entity, other information, and authentication policy requirements from the authentication server. It then transmits the input validation information corresponding to the received authentication policy requirements to the authentication server, and in response receives a request for a user credential. It signs a message, including the transferred information and the received other information, with the stored user credential, and transmits the signed message to the authentication server to authenticate the user. | 10-03-2013 |
20130262858 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The provider server transmits the random number to the device. The random number is transferred to a second user device, which transmits it to the authentication server. The authentication server transmits provider authentication policy requirements and further transmits the other information to the second device. The second device transmits user validation information to the authentication server. The authentication server determines that the transmitted validation information corresponds to the service provider authentication policy requirements, compares the validation information with stored validation information for the user to authenticate the user. The second device transmits a message, including the random number and the other information, signed with a user credential to the authentication server. The authentication server transmits notice of authentication and the signed message to the provider server. | 10-03-2013 |
20130263211 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - An authentication server transmits a random number to and receives a other information from a service provider. Later, the first random number is received from a requester and a provider identifier, the received other information and provider authentication policy requirements are transmitted to the requester. A user identifier and validation information are received from the requester. The received validation information is determined to correspond to the provider authentication policy requirements, and compared with stored user validation information associated with the received user identifier to authenticate the requester. A message, including both the random number and other information, signed with a credential of the requesting user is received and transmitted to the first provider. | 10-03-2013 |
20150237031 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - An authentication server transmits a random number to and receives a other information from a service provider. Later, the first random number is received from a requester and a provider identifier, the received other information and provider authentication policy requirements are transmitted to the requester. A user identifier and validation information are received from the requester. The received validation information is determined to correspond to the provider authentication policy requirements, and compared with stored user validation information associated with the received user identifier to authenticate the requester. A message, including both the random number and other information, signed with a credential of the requesting user is received and transmitted to the first provider. | 08-20-2015 |
20150264050 | SECURE AUTHENTICATION IN A MULTI-PARTY SYSTEM - A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The provider server transmits the random number to the device. The random number is transferred to a second user device, which transmits it to the authentication server. The authentication server transmits provider authentication policy requirements and further transmits the other information to the second device. The second device transmits user validation information to the authentication server. The authentication server determines that the transmitted validation information corresponds to the service provider authentication policy requirements, compares the validation information with stored validation information for the user to authenticate the user. The second device transmits a message, including the random number and the other information, signed with a user credential to the authentication server. The authentication server transmits notice of authentication and the signed message to the provider server. | 09-17-2015 |
Patent application number | Description | Published |
20120126024 | METHODS AND SYSTEMS TO DELIVER VOLATILE COMPOUNDS - Methods and systems for biological control of pests and pest-borne diseases, such as in agriculture, include vapor delivery systems with (a) a reservoir for holding the volatile compound(s), typically in liquid form, to be released into the atmosphere, (b) a means of supplying the reservoir with volatile compound(s), (c) one or more passive flow control nozzles attached to the reservoir, wherein each nozzle is fitted with a permeable polymeric membrane through which the volatile compound permeates and is emitted from the outer membrane surface into the atmosphere, and wherein the individual nozzles are adapted to deliver a specific predetermined release rate for each intended application, and (d) strategic deployment of nozzles (i.e., number, location, spacing, height, etc.) to achieve performance requirements for intended applications ranging from a single plant to large fields for specific ambient conditions. | 05-24-2012 |
20130255135 | SYSTEMS AND METHODS TO DELIVER AND MAINTAIN VOLATILE COMPOUNDS - Systems and methods to create and maintain desired geometrically shaped volumes of an effective dynamic mixture of volatile compounds encompassing an object of protection for very long times, up to one or more years, for control of pests and pest-borne diseases in open outdoor environments of importance to humans, animals and plants. The systems include a plurality of strategically positioned passive flow control nozzles containing mass-regulating barriers with retaining fixtures, connected to volatile compound-storage structures, for delivering the desired balance of individual and combined release rates of volatile compounds; individual passive flow control nozzles that dispense volatile compounds at continuous, predetermined, substantially constant and sustainable release rates over extended periods of time; means to replenish the volatile compounds; and appurtenances to monitor the biologically active threshold and the dynamic boundary of the geometrically shaped volumes of volatile compounds encompassing the object of protection. | 10-03-2013 |
20140173971 | METHODS TO DELIVER AND MAINTAIN VOLATILE COMPOUNDS - Methods to create and maintain pre-designed geometrically shaped volumes of an effective dynamic mixture of volatile compounds encompassing an object of protection for very long times, up to one or more years, for control of pests and pest-borne diseases in open outdoor environments of importance to humans, animals and plants. The methods include using a plurality of passive flow control nozzles containing mass-regulating barriers with retaining fixtures, strategically positioned and uniquely oriented, connected to volatile compound-storing structures with replenishing connectors, for delivering controlled release of volatile compounds using individual passive flow control nozzles that dispense volatile compounds at continuous, predetermined, substantially constant and sustainable release rates over extended periods of time, appurtenances to protect the mass-regulating barriers while in operation, and sensors to monitor the biologically active threshold and the concentrations of volatile compound within the pre-designed geometrically shaped volumes of volatile compounds. | 06-26-2014 |