OPEN INVENTION NETWORK LLC Patent applications |
Patent application number | Title | Published |
20140316831 | DYNAMIC INTERFACE BETWEEN BPSS CONVERSATION MANAGEMENT AND LOCAL BUSINESS MANAGEMENT - The present invention relates to devices and methods that coordinate an external conversation process between entities with an internal workflow of one of the entities. More particularly, it relates to devices and methods that are compliant with an inter-enterprise conversation process standard for routing electronic commerce documents between enterprises. Particular aspects of the present invention are described in the claims, specification and drawings. | 10-23-2014 |
20140164898 | REGISTRY DRIVEN INTEROPERABILITY AND EXCHANGE OF DOCUMENTS - The present invention relates to systems and methods for registry driven transformation of a document exchanged between businesses or applications. More particularly, it relates to systems and protocols for using one or more commonly accessible registries to transform electronic commerce documents among dissimilar interfaces, preferably XML documents. Particular aspects of the present invention are described in the claims, specification and drawings. | 06-12-2014 |
20140113602 | APPARATUS AND METHOD FOR SENDING VIDEO CONTENT TO A MOBILE DEVICE - An apparatus and method for sending video content to a mobile device is described. According to one embodiment, a computer-implemented method comprising embedding a widget in a website, the widget generating a form. The form is provided when a user visits the website so as to execute the widget. The form includes a first field to enter a recipient phone number, a send selector, and one or more non-visible fields, the non-visible fields containing a content service provider identifier, and a video URL. A data packet is generated with the widget when the user selects the send selector, the data packet including the recipient phone number, the video URL, and the content service provider identifier. An encoded version of the data packet is sent to the content service provider and a video link message is sent to the recipient phone number. | 04-24-2014 |
20140108173 | SYSTEM AND ARCHITECTURE FOR MERCHANT INTEGRATION OF A BIOMETRIC PAYMENT SYSTEM - A system and method for performing authentication are disclosed. The system may include a shared central processing server, a plurality of software components each residing in a corresponding point-of-sale (POS) workstation and an identity provider service. The server may reside at a merchant location and communicate with multiple POS workstations at the merchant location. The server may be configured to receive biometric information from each POS workstation. Each software component may communicate with a biometric sensor in communication with the corresponding POS workstation to receive biometric information. The identity provider service may be configured to communicate with the server, store registered biometric information and compare biometric information received from the server with one or more of the stored registered biometric information. One of the biometric sensor, a POS workstation and the server may convert a biometric image into a biometric template for comparison with the stored registered biometric information. | 04-17-2014 |
20140082112 | APPARATUS AND METHOD FOR DYNAMICALLY PROVIDING WEB-BASED MULTIMEDIA TO A MOBILE PHONE - An apparatus and method for dynamically providing web-based multimedia to a mobile phone are described. According to one embodiment, an RSS feed is received that references multimedia files meeting one or more criteria. A playlist is generated dynamically from the multimedia files. The playlist is a single virtual multimedia file. An updated RSS feed is received that references one or more additional multimedia files meeting the one or more criteria. A second playlist is generated dynamically from the multimedia files and the one or more additional multimedia files. | 03-20-2014 |
20130013360 | DYNAMIC INTERFACE BETWEEN BPSS CONVERSATION MANAGEMENT AND LOCAL BUSINESS MANAGEMENT - The present invention relates to devices and methods that coordinate an external conversation process between entities with an internal workflow of one of the entities. More particularly, it relates to devices and methods that are compliant with an inter-enterprise conversation process standard for routing electronic commerce documents between enterprises. Particular aspects of the present invention are described in the claims, specification and drawings. | 01-10-2013 |
20110320234 | System, Method, and Computer Readable Medium for Management of an Electronic Calendar - A system, method, and computer readable medium for providing management of electronic calendar appointments are provided. A database stores records of scheduled appointments of one or more users. The scheduled appointments may be displayed in a calendar view that includes scheduled appointments of the one or more users. A user may designate scheduled appointments associated with the user as private. The calendar system may then hide the scheduled appointments designated as private such that the private appointments are not displayed for view by other users. In another embodiment, a user may select multiple days for printing of scheduled events. In still another embodiment, a user may specify an interval for searching for a period of consecutive days during which the user does not have any scheduled appointments. | 12-29-2011 |
20110269487 | ELECTRONIC SHORT MESSAGING AND ADVERTISING METHOD AND DEVICE - The invention relates to an electronic short messaging and advertising method where minimal initiative is required from the consumer. Some embodiments of the invention may also be applied to an electronic sales method. The invention may also be applied for normal short messaging. The electronic short messaging method for collect calling may send transmissions to at least one subscriber terminal via the Internet and/or the telephony network. The method may include sending a first transmission to a recipient subscriber terminal for display, wherein the first transmission defines one or more active alternatives including at least one of initiating a collect call and deleting the first transmission. The method may also include calculating costs associated with at least one of the first transmission and the one or more active alternatives. | 11-03-2011 |
20110185030 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR COLLECTING SNMP BANDWIDTH DATA - A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file. | 07-28-2011 |
20110010646 | SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR FACILITATING ADAPTIVE TECHNOLOGIES - A system, method, and computer-readable medium that facilitate software configuration of assistive computer devices by automatically assessing a user's capabilities through questions and tasks are provided. The analysis results of the user's capabilities are then available to assistive computer software applications which may subsequently update their interfaces accordingly. A mapping mechanism from an external input device into a target software application is facilitated for software applications that do not include assistive technology features. | 01-13-2011 |
20110008023 | METHOD AND APPARATUS OF CREATING MEDIA CONTENT - A method and apparatus of processing content, such as, video and/or audio are disclosed. The operations of processing content may include receiving user input, such as, a content file, a type of content format, and a content destination. Other operations include determining necessary operations needed to complete the content processing and determining the applications available to the user on a local machine used by the user. The operations further include determining whether the user's local machine includes the necessary applications to perform the content processing, and determining a codec that will be used to process the content, and formatting the content using the codec and distributing the content to the content destination. | 01-13-2011 |
20100262977 | System and Method for Application Isolation - A system, method, and computer readable medium for providing application isolation to one or more applications. The system may include an isolated environment including application files and executables, and an interception layer intercepting access to system resources and interfaces. The system may further include an interception database maintaining mapping between the system resources inside the isolated environment and outside, and a host operating system, wherein the isolated environments are saved on at least one of a local and remote storage. | 10-14-2010 |
20100262970 | System and Method for Application Isolation - A system, method, and computer readable medium for providing application isolation to one or more applications and their associated resources. The system may include one or more isolated environments including application files and executables, and one or more interception layers intercepting access to system resources and interfaces. Further, the system may include an interception database maintaining mapping between the system resources inside the one or more isolated environments and outside, and a host operating system. The one or more applications may be isolated from other applications and the host operating system while running within the one or more isolated environments. | 10-14-2010 |
20100262694 | System and Method for Application Isolation - A system, method, and computer readable medium for maintaining mappings between resources inside an isolated environment and outside the isolated environment for one or more applications. The system may include a plurality of lists of resources requested by the one or more applications during installation and while executing, and a corresponding lists of resources inside the isolated environment. The system may also include a list of resource exceptions, wherein the mappings between resources as requested by the applications and their corresponding values in the isolated environment are maintained subject to the list of exceptions. | 10-14-2010 |
20100205522 | REGISTRY DRIVEN INTEROPERABILITY AND EXCHANGE OF DOCUMENTS - The present invention relates to systems and methods for registry driven transformation of a document exchanged between businesses or applications. More particularly, it relates to systems and protocols for using one or more commonly accessible registries to transform electronic commerce documents among dissimilar interfaces, preferably XML documents. Particular aspects of the present invention are described in the claims, specification and drawings. | 08-12-2010 |
20090327485 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR COLLECTING SNMP BANDWIDTH DATA - A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file. | 12-31-2009 |
20090300747 | USER-PORTABLE DEVICE AND METHOD OF USE IN A USER-CENTRIC IDENTITY MANAGEMENT SYSTEM - A user-portable computing device configured as a smart card enables a user to carry identification information and to generate security tokens for use in authenticating the user to a service provider. The device includes memory for storing user identities as information cards that are exported to a host computer, presented to a user in visual form, and then selected for use in the authentication process. A security token service installed on the device issues a security token in response to a token request sent from the host computer that references the selected user identity. The security token service uses user attribute information stored on the user device to compose the claim assertions needed to issue the security token. The token is returned to the host computer and used to facilitate the authentication process. | 12-03-2009 |
20090300746 | SYSTEM INTEGRATING AN IDENTITY SELECTOR AND USER-PORTABLE DEVICE AND METHOD OF USE IN A USER-CENTRIC IDENTITY MANAGEMENT SYSTEM - A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy. | 12-03-2009 |
20090300742 | IDENTITY SELECTOR FOR USE WITH A USER-PORTABLE DEVICE AND METHOD OF USE IN A USER-CENTRIC IDENTITY MANAGEMENT SYSTEM - An identity selector manages the identity requirements of an online interaction between a user and a service provider environment. The identity selector is adapted for interoperable use with a user-portable computing device. The user device enables a user to carry identification information and to generate security tokens for use in authenticating the user to a service provider. The identity selector includes an agent module that facilitates communication with the user device. The identity selector imports the user identities from the user device and determines which user identities satisfy a security policy of a relying party. After the user selects one of the eligible user identities, the identity selector generates a token request based on the selected identity and forwards it to the user device, which in response issues a security token. The security token is returned to the identity selector and used to facilitate the authentication process. | 12-03-2009 |
20090300716 | USER AGENT TO EXERCISE PRIVACY CONTROL MANAGEMENT IN A USER-CENTRIC IDENTITY MANAGEMENT SYSTEM - A client-side user agent operates in conjunction with an identity selector to institute and exercise privacy control management over user identities managed by the identity selector. The user agent includes the combination of a privacy enforcement engine, a storage of rulesets expressing user privacy preferences, and a preference editor. The editor enables the user to direct the composition of privacy preferences relative to user identities. The preferences can be applied to individual cards and to categorized groups of attributes. The engine evaluates the proper rulesets against the privacy policy of a service provider. The privacy preferences used by the engine are determined on the basis of specifications in a security policy indicating the attribute requirements for claims that purport to satisfy the security policy. | 12-03-2009 |
20090300715 | USER-DIRECTED PRIVACY CONTROL IN A USER-CENTRIC IDENTITY MANAGEMENT SYSTEM - An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity information within the context of an authentication process. A combination includes an identity selector, a privacy engine, and a ruleset. The identity selector directs the release of a user identity in the form of a security token to satisfy the requirements dictated by a security policy. Prior to release of the user identity, the engine conducts a privacy enforcement process that examines the privacy policy of the service provider and determines if it is acceptable. The engine evaluates a ruleset against the privacy policy. A preference editor enables the user to construct, in advance, the ruleset, which embodies the user's privacy preferences regarding the disclosure of identity information. Based on the evaluation results, the user can either approve or disapprove the privacy policy, and so decide whether to proceed with disclosure of the user identity. | 12-03-2009 |
20090300714 | PRIVACY ENGINE AND METHOD OF USE IN A USER-CENTRIC IDENTITY MANAGEMENT SYSTEM - A privacy enforcement engine conducts a process that evaluates user privacy preferences against the privacy policy of a service provider. The engine works in conjunction with an identity selector. The identity selector filters user identity information cards to determine which ones satisfy the requirements of a security policy. The engine identifies privacy preferences that are relevant to the user identity information specified by the successfully filtered cards. The engine evaluates these privacy preferences against the privacy policy, to provide its own filtering operation relative to the exercise of privacy controls. The cards that pass the filtering operation conducted by the engine are deemed available for disclosure. | 12-03-2009 |
20090300512 | PREFERENCE EDITOR TO FACILITATE PRIVACY CONTROLS OVER USER IDENTITIES - A privacy preference editor enables a user to institute privacy preferences relative to user identity information on a card-based and category-based basis. An identity selector furnishes information cards representative of user identities. The editor allows the user to set a privacy preference for each information card. Any proposed disclosure of an information card invokes its corresponding privacy preference. In turn, an agent engine evaluates the invoked privacy preference against the privacy policy of a relying party seeking the card information. The editor also permits the user to create information categories, populate the categories with a group of relevant user identity attributes, and set a privacy preference to the category. In this way, a category-specific privacy preference can be invoked by using the attribute required by the security policy as an index to the appropriate categorized group where the required attribute resides. | 12-03-2009 |
20090292985 | SYSTEM AND METHOD FOR SCHEMA EVOLUTION IN AN E-COMMERCE NETWORK - A method and computer system are described for conducting commercial transactions. An enhanced type of XML schema may be used which supports integrity constraints and polymorphism. Schemas are identified by the use of Uniform Resource Names. XML processors residing on transaction servers or trading partner servers parse document instances by retrieving the URNs corresponding to the schemas used to interpret the document. The URNs are converted to location-dependent URIs in order to locate the schemas. URNs are resolved to location-dependent URIs by use of the LDAP protocol. URNs may be converted to LDAP URLs which are used to search LDAP compliant directories. The directories serve as registries for the URI values corresponding to the URNs. | 11-26-2009 |
20090186641 | ELECTRONIC SHORT MESSAGING AND ADVERTISING METHOD AND DEVICE - The invention relates to an electronic short messaging and advertising method where minimal initiative is required from the consumer. Some embodiments of the invention may also be applied to an electronic sales method. The invention may also be applied for normal short messaging. The electronic short messaging method for collect calling may send transmissions to at least one subscriber terminal via the Internet and/or the telephony network. The method may include sending a first transmission to a recipient subscriber terminal for display, wherein the first transmission defines one or more active alternatives including at least one of initiating a collect call and deleting the transmission. In some embodiments, unless the collect call is initiated, the first transmission is automatically deleted after reception after a predefined time period. | 07-23-2009 |
20090070489 | CONTENT-AWARE APPLICATION SWITCH AND METHODS THEREOF - The content-aware application switch and methods thereof intelligently switch client packets to one server among a group of servers in a server farm. The switch uses Layer 7 or application content parsed from a packet to help select the server and to schedule the transmitting of the packet to the server. This enables refined load-balancing and Quality of-Service control tailored to the application being switched. In another aspect of the invention, a slow-start server selection method assigned an initially boosted server load metric to a server newly added to the group of servers under load balancing. This alleviates the problem of the new server being swamped initially due to a very low load metric compared to that of others. In yet another aspect of the invention, a switching method dependent on Layer 7 content avoids delayed binding in a new TCP session. Layer 7 content is not available during the initial handshaking phase of a new TCP session. The method uses the Layer 7 content from a previous session as an estimate to help select the server and uses a default priority to scheduling the transmitting of the handshaking packets. Updated Layer 7 content available after the handshaking phase is then used to reset the priority for the transmit schedule and becomes available for use in load balancing of the next TCP session. | 03-12-2009 |
20090067736 | Enhanced Image Compression Utilizing Hilbert Curve Scanning of Quantized Discrete Cosine Transform Coefficients - A method for compressing images, the method including the steps of partitioning image information for an image into partitioned information, transforming the partitioned information into transformed information using a discrete cosine transform (“DCT”), and quantizing the transformed information into quantized information. The method further includes the steps of sequencing the quantized information into sequenced information using a Hilbert curve scan, encoding the sequenced information into encoded information, and storing the encoded information. The DCT is a JPEG DCT. | 03-12-2009 |
20090067589 | Creating automated voice response menus for telecommunications services - A method for changing configuration settings of a telephony system comprises initiating a telephony configuration service, establishing service rights associated with a telephone number. a step for presenting one or more selectable options consistent with the service rights, at least one of which corresponds to a configuration setting change for a call-forwarding task. Additionally, the method includes a step for presenting one or more call-forwarding task options, a step for receiving a selection of at least one of the call-forwarding task options, a step for confirming the selection of at least one of the call-forwarding task options, and changing at least one configuration setting of a telephony system based at least in part upon a received selection of at least one of the call-forwarding task options. | 03-12-2009 |