Nidd
Michael E. Nidd, Zuerich CH
Patent application number | Description | Published |
---|---|---|
20090059843 | SYSTEMS, METHODS AND COMPUTER PRODUCTS FOR PROVIDING A GRADIENT DRIVEN MESH-NETWORK ESTABLISHMENT - Systems, methods and computer products for establishing a mesh-network consisting of wireless personal area network (WPAN) having a large number of nodes. Exemplary embodiments include a gradient-driven mesh-network establishment method, including switching on a plurality of nodes in a vicinity of the wireless personal area network, detecting an acknowledgment signal via a wireless personal area network signal, querying for at least one or a resource and a physical quantity, selecting a subset of the plurality of nodes and instructing the subset of the plurality of nodes to send out a low power radio transceiver DISCOVER squirt signal to a neighborhood associated with the subset of the plurality of nodes, wherein nodes exclusive of the subset of the plurality of nodes turn off in response to an expiration of a time-out period. | 03-05-2009 |
Michael E. Nidd, Zurich CH
Patent application number | Description | Published |
---|---|---|
20130246606 | Detecting Transparent Network Communication Interception Appliances - Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value. | 09-19-2013 |
20140006671 | Location of Computing Assets within an Organization | 01-02-2014 |
20140006672 | Location of Computing Assets within an Organization | 01-02-2014 |
20140007203 | Web-Based Security Proxy for Computing System Environment Scanning | 01-02-2014 |
20140007204 | Web-Based Security Proxy for Computing System Environment Scanning | 01-02-2014 |
20140025337 | Sensor Virtualization through Cloud Storage and Retrieval Mechanisms - Mechanisms are provided for virtualizing physical sensors and providing sensor data to a requestor using the virtualized physical sensors. The mechanisms obtain sensor data from a plurality of physical sensors and storing the sensor data in a virtual sensor storage system of the data processing system in at least one standardized format. A request from a requestor for a first type of sensor data is received which does not specify a particular physical sensor. A portion of the sensor data stored in the virtual sensor storage system is retrieved in response to receiving the request, the portion of sensor data corresponding to the type of sensor data requested in the request from the requestor. The retrieved portion of the sensor data is returned to the requestor in a format corresponding to a physical sensor configured to provide the requested type of sensor data. | 01-23-2014 |
20140025338 | Sensor Virtualization through Cloud Storage and Retrieval Mechanisms - Mechanisms are provided for virtualizing physical sensors and providing sensor data to a requestor using the virtualized physical sensors. The mechanisms obtain sensor data from a plurality of physical sensors and storing the sensor data in a virtual sensor storage system of the data processing system in at least one standardized format. A request from a requestor for a first type of sensor data is received which does not specify a particular physical sensor. A portion of the sensor data stored in the virtual sensor storage system is retrieved in response to receiving the request, the portion of sensor data corresponding to the type of sensor data requested in the request from the requestor. The retrieved portion of the sensor data is returned to the requestor in a format corresponding to a physical sensor configured to provide the requested type of sensor data. | 01-23-2014 |
Michael E. Nidd, Rueschlikon CH
Patent application number | Description | Published |
---|---|---|
20150312338 | METHOD AND DEVICE FOR DUPLICATING A DATA CENTER - A method and a device for duplicating a data center having an original public address space and an original private address space are proposed. The method comprises the steps of copying the data center for providing at least two copied data centers; to each of the copied data centers, allocating a new public address space and the original private address space of the data center; and providing an address translation component which is configured to re-address traffic such that traffic directed to an address of the original public address space is directed to a corresponding address of one of the new public address spaces of the copied data centers. | 10-29-2015 |
Michael Elton Nidd, Zurich CH
Patent application number | Description | Published |
---|---|---|
20090315916 | ON-THE-FLY CREATION OF VIRTUAL PLACES IN VIRTUAL WORLDS - A specification of a set of objects associated with at least one virtual world is obtained. The objects are laid out in a three-dimensional virtual representation. An on-the-fly virtual place is created in the virtual world, based on the layout. The virtual place depicts the set of objects in the three-dimensional virtual representation and enables navigation and interaction therewith | 12-24-2009 |
20120233669 | METHOD AND APPARATUS FOR SECURE AUTHORIZATION - A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device. | 09-13-2012 |
Micheal Elton Nidd, Zurich CH
Patent application number | Description | Published |
---|---|---|
20090288159 | Method and Apparatus for Secure Authorization - A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device. | 11-19-2009 |