Patent application number | Description | Published |
20100020727 | SYSTEM AND METHOD OF USING DIAMETER BASED SIGNALING TO ACTIVATE AND DEACTIVATE SUBSCRIBER CENTRIC, VISUALLY RENDERED, SERVICES - A system and method is provided for providing using Diameter based signaling to activate and deactivate subscriber centric, visually rendered, services. The system is implemented in a computer infrastructure which includes computer executable code tangibly embodied on a computer readable medium. The executable code is operable to activate and deactivate subscriber centric, visually rendered, services using a Diameter based signaling protocol and support home subscriber server (HSS) based subscriber profiles that pertain to visual characteristics. | 01-28-2010 |
20100250299 | SELECTING A SERVICE ORIENTED ARCHITECTURE SERVICE - An approach that selects a service oriented architecture (SOA) service is provided. In one embodiment, there is a service selection tool, including an identification component configured to identify a process that affects a business objective, and identify a set of functional capabilities of the process. A selection component is configured to select a set of candidate SOA services based on the set of functional capabilities of the process. | 09-30-2010 |
20120136907 | VIRTUAL NODE SUBPOOL MANAGEMENT - Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module. | 05-31-2012 |
Patent application number | Description | Published |
20120221415 | METHOD FOR PERSONALIZING MESSAGES DELIVERED TO A COMMUNICATION TERMINAL THAT PRESERVES THE PRIVACY OF THE RECIPIENT OF THE MESSAGE - A method for enhancing the privacy of recipients of personalizing text messages such as advertisements delivered to communication terminals such as cellular telephones. A common carrier such as a cellular telephone service provider gathers personal information from a subscriber at the time the subscriber signs on for service and receives a communication terminal. The carrier loads the terminal with a table that assigns variables to elements of personal information. The carrier accepts messages such as advertisements for distribution to subscribers. These messages use the variables that the carrier has loaded into the subscribers' terminals. When such a message is received, a subscriber's terminal replaces the variables with the elements of personal information by referring to the table. | 08-30-2012 |
20120222100 | ADVANCED CAPTCHA USING INTEGRATED IMAGES - An embodiment of the invention is a CAPTCHA program to determine if a user of a computer is a human or a computer program. The program sends to the computer an image and a portion of the image for display. The program receives from the user an indication of where the portion is located within the image. The portion, as displayed, may be altered in various ways. In response to the user properly indicating the location, the program determines that the user of the computer is a human. In response to the user not properly indicating the location, the program determines that the user of the computer is a computer program. In response to determining that the user of the computer is a human, the program grants the user access to information (database, application, program). In response to determining that the user is a computer program, the program denies access. | 08-30-2012 |
20120291133 | SECURITY COMPLIANT DATA STORAGE MANAGEMENT - An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level. | 11-15-2012 |
20130013833 | LOCK WAIT TIME REDUCTION IN A DISTRIBUTED PROCESSING ENVIRONMENT - Aspects of the present invention reduce a lock wait time in a distributed processing environment. A plurality of wait-for dependencies between a first plurality of transactions and a second plurality of transactions in a distributed processing environment is identified. The first plurality of transactions waits for the second plurality of transactions to release a plurality of locks on a plurality of shared resources. An amount of time the first plurality of transactions will wait for the second plurality of transactions in the distributed processing environment is determined based on the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions. Historical transaction data related to the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions is analyzed. The amount of time the first plurality of transactions will wait for the second plurality of transactions is reduced based on the historical transaction data. | 01-10-2013 |
20130031640 | ADVANCED CAPTCHA USING IMAGES IN SEQUENCE - A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents a set of images. At least a portion of the set of images suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program. | 01-31-2013 |
20130031641 | ADVANCED AUDIO CAPTCHA - A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents to the user a set of audio clips. At least a portion of the set of audio clips suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program. | 01-31-2013 |