Patent application number | Description | Published |
20130054976 | LIGHTWEIGHT DOCUMENT ACCESS CONTROL USING ACCESS CONTROL LISTS IN THE CLOUD STORAGE OR ON THE LOCAL FILE SYSTEM - In a method for controlling access to an encrypted document, a computer receives a request to access the encrypted document, the access request comprising a user ID and a user password. The computer performs a one-way hash function on the user password to generate a hash value. The computer searches an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password. The computer decrypts the document password using the user password. The computer decrypts the encrypted document using the decrypted document password. | 02-28-2013 |
20130265164 | THEFT DETERRENT DEVICE - An apparatus to deter theft of a movable product is provided. In one aspect, the apparatus comprises a housing, a plug connected to the housing to insert into an electrical socket to receive power, a bracket connected to the housing and having an opening to receive a locking cable while the opening of the bracket protrudes from the housing. A switch, within the housing, responsive to protrusion of the opening of the bracket from the housing to receive the locking cable. An electrical circuitry, within the housing, responsive to the switch being in a first state, and absence of power at the plug to sound an alarm, and responsive to the switch being in a second state or the presence of power at the plug to prevent sounding of the alarm. | 10-10-2013 |
20130335223 | ELECTRONICS THEFT DETERRENT SYSTEM - Embodiments of the present invention provide a method and system of deterring theft of an electronic device connected to an external source of charging power. In one aspect, responsive to a user request to arm the electronic device and the electronic device being connected to the source of charging power, the electronic device arming the electronic device. In another aspect, while the electronic device is armed, the electronic device detecting loss of the connection to the source of charging power, and in response, the electronic device activating an alarm or notifying another computing device that the connection of the electronic device has been disconnected from the source of charging power. | 12-19-2013 |
20140184586 | DEPTH OF FIELD VISUALIZATION - In a method for visualizing depth of field, a computing device determines a distance value for each respective pixel of a plurality of pixels of a digital image based on a distance between subject matter depicted in the respective pixel and an imaging device integrated with the computing device. The computing device determines a depth of field of the digital image. The computing device compares the depth of field of the digital image to the distance value for each respective pixel to determine a first set of pixels of the plurality of pixels having distance values outside the depth of field and a second set of pixels of the plurality of pixels having distance values inside the depth of field. The computing device indicates the first set of pixels in a user interface. | 07-03-2014 |
20140215613 | ATTACK RESISTANT COMPUTER SYSTEM - A computer system where a second, dedicated processor (sometimes called an SPU, to distinguish from the central processing unit (CPU)) has logic to manage and control an intrusion detection hardware set and an intrusion response hardware set. The intrusion response hardware detects physical intrusions (for example, cryogenic attacks), and the response hardware set responds in various ways to attempt to protect the sensitive data in a volatile memory from the detected physical intrusion. A dedicated power storage device powers the SPU and the intrusion response hardware set. | 07-31-2014 |
20140253417 | COLONY DESKTOP HIVE DISPLAY: CREATING AN EXTENDED DESKTOP DISPLAY FROM MULTIPLE MOBILE DEVICES USING NEAR-FIELD OR OTHER NETWORKING - Computer-implemented methods, computer program products and computer systems that create a virtual extended display on mobile devices by providing a first device in a first location and at least a second device in a second location, followed by joining together the first and second devices within an aggregation session via a network. Logical data of visual content is shared between the first and second devices, and the viewed output display of the visual content split amongst the first and second device displays within the aggregation session. During the aggregation session, at least one of the devices therein is manipulated by movement or changing device parameters to virtually change the viewed output display of the visual content on such manipulated device. | 09-11-2014 |
20140358595 | PARKING RESERVATION THAT ENCOURAGES CAR-POOLING - A method, system, and computer program product for parking reservation that encourages car-pooling are provided in the illustrative embodiments. A processor, at a first mobile data processing system representing an automobile, receives an input to create a reservation for a parking location. A second mobile data processing system is detected, wherein the second mobile data processing system is within a threshold distance of the first mobile data processing system. A determination is made whether a movement of the second mobile data processing system relative to the first mobile data processing system is less than a threshold measure of the movement. Responsive to the determining being affirmative, a qualifier is applied to the reservation to obtain a benefit in the reservation, wherein the qualifier accrues a benefit to the reservation. | 12-04-2014 |
20140358596 | ENVIRONMENTALLY-FRIENDLY PARKING RESERVATION SYSTEM - A method, system, and computer program product for an environmentally-friendly parking reservation system are provided in the illustrative embodiments. A computer receives a request to make a reservation for parking a vehicle in a parking area. A parking location in the parking area is selected in an application, forming a selection. The computer modifies the selection based on a qualifier in the request, the qualifier indicating an environmentally-friendly aspect of the vehicle. The computer generates a response, the response identifying the parking location. | 12-04-2014 |