Patent application number | Description | Published |
20080258936 | System and method for tracking and billing vehicle users based on when and in which road lanes their vehicles have been driven - A system includes one or more transponders, a number of sensors, a tracking sub-system, and a billing sub-system. Each transponder is located in a vehicle capable of being driven on a road having at least a first lane and a second lane in which vehicles move in a same direction. Each sensor is movably located at a point along the road to detect the transponder of each vehicle that has changed between the first and the second lanes at the point. The tracking system is communicatively coupled to the sensors to track when and at which of the points the vehicles have changed between the first and the second lanes. The billing system is to periodically bill users of the vehicles based on when and where the vehicles are driven in the second lane of the road. | 10-23-2008 |
20090300760 | Grid Security Intrusion Detection Configuration Mechanism - A method, apparatus, and article of manufacture are provided to support security in a distributed gird computer cluster. Each non-node root node in the cluster is configured with a local security agent, and the root node is configured with a security controller to manage each of the security agents of each non-root node. The security agent of each non-root node is in communication with an associated configuration file that contains data private to the respective non-root node, to allow the security agent to manage security local to the node. The security controller of the root node is in communication with a controller configuration file that contains data that applies to all security agents in the grid cluster, to allow the controller to manager the security agents. | 12-03-2009 |
20100011440 | Computer Security Intrusion Detection System For Remote, On-Demand Users - An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events. An intrusion detection system controller is associated with one of the data processing hosts. It is adapted to manage and monitor the intrusion detection system agent(s), process agent reports of intrusion activity, and communicate intrusion-related information to the on-demand user (or security provider). The responses to intrusion events can be implemented by the intrusion detection system controller in combination with the intrusion detection system agents, or by any such entity alone. | 01-14-2010 |
Patent application number | Description | Published |
20090003362 | Event notification control based on data about a user's communication device stored in a user notification profile - An exemplary method is implemented in a communication system in which periodically updated data for respective end-users is stored in a notification profile at a communication infrastructure node. The updated data is based on conditions associated with each end-user's communication device and its network context, where the data is not presence status. Predetermined rules are stored at the communication infrastructure node and generate respective results based on factors such as network contextual data and corresponding values contained in the notification profile data for each end-user. An event is detected by the communication infrastructure node where the event is intended to cause communication with all the communication devices that are interested in that event. The communication infrastructure node determines an action to be taken in response to the event based on the results of the rules for data associated with the first end-user. The communication infrastructure node implements the action related to the first end-user. | 01-01-2009 |
20090006528 | AVAILABILITY DETERMINATION OF A PARTY TO RECEIVE A CALL PRIOR TO CALL SETUP - Presence servers, communication devices, and methods are disclosed for determining the availability of a target party to receive a call prior to call setup. Upon initiation of a call to a target party, the communication device of a subscriber transmits an availability request message to a presence server requesting the availability of the target party to receive the call. Responsive to the availability request message, the presence server determines the availability of the target party to receive the call and transmits an availability response message indicating the availability of the target party to receive the call to the subscriber's communication device. The subscriber's communication device receives the availability response message from the presence server, displays the availability of the target party to receive the call from the subscriber, and may talk other associated actions such as setting up the call to the target party if it is available. | 01-01-2009 |
20090006885 | Heartbeat distribution that facilitates recovery in the event of a server failure during a user dialog - An exemplary method facilitates automatic recovery upon failure of a server in a network responsible for replying to user requests. Periodic heartbeat information is generated by a first group of servers responsible for replying to user requests. The heartbeat information provides an indication of the current operational functionality of the first group of servers. A second group of servers determines that one of the first servers has failed based on the periodic heartbeat information. The second group of servers is disposed in communication channels between users and the first group of servers. One of the second group of servers receives a message containing a request from a first user having the one of the first group of servers as a destination. One of the second group of servers determines that the message is part of an ongoing dialog of messages between the first user and the one of the first group of servers. Stored dialog information contained in previous communications between the first user and the one of the first group of servers associated with the ongoing dialog is retrieved. Another message is transmitted from the one of the second group of servers to another of the first group of servers. The another message includes the request contained in the message and the retrieved dialog information. This enables the another server to process the request based on the retrieved dialog information without requiring the first user to have to retransmit previously transmitted information that was part of the dialog information. | 01-01-2009 |
20090276653 | Presence server for discrete time updates - A presence server of an apparatus in one example is configured to receive at least one event message from a network entity in continuous time. The presence server is configured to determine at discrete time intervals if an update message should be sent for the network entity. The discrete time intervals comprise instances of an epoch. The presence server is configured to determine if the update message should be sent upon an epoch boundary. The presence server is configured to dynamically determine a duration of the epoch. | 11-05-2009 |
20130124641 | System for Interacting with a Web Visitor - A system for interacting with a person browsing a web site has an Internet-connected server and a connected data repository, and software executing on the server from a non-transitory physical medium. The software provides an identity function identifying the person, a selection function checking the data repository for stored information regarding the identified person, including any tracking rules associated with the identified person, and one or more tracking functions monitoring and recording behavior of the person browsing the web site. The one or more tracking functions follow the tracking rules, if any, associated with the identified person in monitoring and recording behavior of the browsing person. | 05-16-2013 |