Patent application number | Description | Published |
20090311997 | DYNAMIC USER-TO-USER ADDRESS BOOK SHARING IN A MOBILE STATION - The present invention provides a mobile station implemented method for managing a requested name and phone record. The method comprises steps of the requester associated device receiving a user's identification from a mobile station phonebook owner and a search term. The requester associated device transmits the user identification of the mobile station phonebook owner and the search term. Receiving at least one matching name and phone record, the requester associated device presents the at least one matching name and phone record to a user. The requester associated device receives a user management command to perform an action on the name and phone record. The method may complete when the requester associated device performs the action on the name and phone record. | 12-17-2009 |
20100082816 | VIRTUALIZE, CHECKPOINT, AND RESTART POSIX IPC OBJECTS DURING CHECKPOINTING AND RESTARTING OF A SOFTWARE PARTITION - A WPAR is migrated. Responsive to starting a checkpoint process, data and control information is collected and stored for IPC objects in the WPAR. Responsive to receiving a request to restart the WPAR, a type of IPC object is determined. Responsive to a determination that the IPC object is not an IPC shared memory object, a kernel handle that a process wants to be used for a new IPC object is registered. A request to create a new IPC object comprising a name uniquely associated with the IPC object and a WPAR identifier is issued. An entry that matches the name and WPAR identifier is identified and a virtual kernel handle is retrieved. The new IPC object is created. The virtual kernel handle is mapped to a real kernel handle and returned to the process. Data and control information is retrieved and overlaid onto the new IPC object. | 04-01-2010 |
20100083283 | VIRTUALIZE, CHECKPOINT, AND RESTART SYSTEM V IPC OBJECTS DURING CHECKPOINTING AND RESTARTING OF A SOFTWARE PARTITION - Migrating a workload partition (WPAR) is provided. Responsive to receiving a request to checkpoint the WPAR, a list of virtual identifiers used by the WPAR to refer to IPC objects is generated and stored. Each virtual identifier corresponds to an IPC object and to a real identifier used by a kernel that corresponds to the IPC object. IPC object data and control information is collected and stored. Each process in the WPAR stores per process data. Responsive to receiving a request to restart the WPAR, the virtual identifier that the WPAR wants to be used is registered. A new IPC object is created by a kernel. The kernel maps a real identifier used by the kernel for the new IPC object to the registered virtual identifier. The restart process retrieves IPC data and control information and overlays it on the new IPC object. The per process data is restored. | 04-01-2010 |
Patent application number | Description | Published |
20090119341 | METHOD AND APPARATUS FOR REMOVING ENCRYPTED FILES UNASSOCIATED WITH A USER KEY FROM AN ARCHIVE - The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file. | 05-07-2009 |
20090119783 | METHOD AND APPARATUS FOR MASKING CHILD USER AUTHORIZATIONS FROM ADVERSE USE AGAINST A PARENT USER - The present invention provides a computer implemented method, data processing system, and computer program product to protect a first user from authorization limitation by a second user. The computer may receive an authorization command from the second user, wherein the authorization command targets the first user, and the second user is at least partially authorized to operate the authorization command. The computer determines that the first user is an ancestor user of the second user. In addition, the computer, responsive to a determination that the first user is an ancestor user of the second user, prevents operation of code of the authorization command to change an authorization of the first user. | 05-07-2009 |
20090248474 | MEETING PLANNING ASSISTANCE VIA NETWORK MESSAGES - The present invention provides a computer implemented method and apparatus to invite people by an email system to meetings or events through a scheduling server of a data processing machine. The scheduling server receives a plurality of invitees, where each invitee's vote has weight in the probability of scheduling a meeting at the desired time. The plurality of vote weights is heterogeneous. The scheduling server receives a meeting duration, a meeting option begin-time, and a meeting option end-time. The scheduling server excludes committed time of each invitee between the at least one meeting option begin-time and the at least one meeting option end-time to form a set of meeting times that are divided into a manageable set of meeting options. The scheduling server presents the manageable set of options to each invitee. The scheduling server receives votes from a voting invitee to form collected votes. Each vote is weighted based on the vote weight of the voting invitee. The scheduling server determines a leading option based on the collected votes and commits the leading option as the scheduled time for the meeting. | 10-01-2009 |
20090248812 | COMPOSING, FORWARDING, AND RENDERING EMAIL SYSTEM - The present invention provides a computer implemented method for communicating a signature in a received email. Initially, a server receives a source email from a source client, the source email comprising a signature index entry, and a body. The server determines for a first recipient that a first associated destination client is capable of rendering a signature of the signature index entry in response to a selection of an indexed signature. The server, responsive to a determination that the destination client is capable of rendering the signature index entry, forwards the source email to the first recipient as a delivered email using the body of the source email such that an indexed signature is present in the body of the delivered email. In addition, a method for generating a signature header is shown that provides a many to one correspondence between indexed signatures and a signature index entry. | 10-01-2009 |
20120008757 | Multi-Participant Communication System With Audio Manager Responsive To Mode Change Requests - A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change. | 01-12-2012 |
20120020486 | AUDIO DEVICE VOLUME MANAGER USING MEASURED VOLUME PERCEIVED AT A FIRST AUDIO DEVICE TO CONTROL VOLUME GENERATION BY A SECOND AUDIO DEVICE - An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. | 01-26-2012 |
20120020487 | AUDIO DEVICE VOLUME MANAGER USING MEASURED DISTANCE BETWEEN FIRST AND SECOND AUDIO DEVICES TO CONTROL VOLUME GENERATION BY THE SECOND AUDIO DEVICE - An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices. | 01-26-2012 |
20120201394 | AUDIO DEVICE VOLUME MANAGER USING MEASURED DISTANCE BETWEEN FIRST AND SECOND AUDIO DEVICES TO CONTROL VOLUME GENERATION BY THE SECOND AUDIO DEVICE - An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices. | 08-09-2012 |
20120207329 | AUDIO DEVICE VOLUME MANAGER USING MEASURED VOLUME PERCEIVED AT A FIRST AUDIO DEVICE TO CONTROL VOLUME GENERATION BY A SECOND AUDIO DEVICE - An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The audio system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. | 08-16-2012 |