Entries |
Document | Title | Date |
20100082681 | METHOD AND APPARATUS FOR ORGANIZING AND BOOKMARKING CONTENT - An approach is provided for creating user-defined folders for organizing content accessible through a set-top box and for creating multiple bookmarks per set-top box program for use during programming playback. | 04-01-2010 |
20100082682 | WEB CONTENTS ARCHIVE SYSTEM AND METHOD - System and method for archiving web content. The Intranet Web Contents Archive System incorporates one or more of the following modules: ID Management System for managing authentication and authorization information of each user; Data Archive Storage configured to directly access a web service and capture a web page using identification information of a certain user or a group; and a Web Service configured to communicate with ID management system and validate a request from the Data Archive Storage. In one implementation, the Data Archive Storage creates and stores additional information for the captured web page including the identification information of the user. | 04-01-2010 |
20100082683 | VISITOR-ASSISTED USER PROFILE CREATION - A visitor to a profile page is invited to modify a user profile associated with the profile page. If the visitor elects to provide a suggested modification to the profile page, a message is transmitted to the user that owns the profile page requesting authorization to perform the suggested modification. In response to the message, the user can accept the suggested modification to the user profile, decline the suggested modification to the user profile, or edit the suggested modification to the user profile. If the user accepts or edits the suggested modification to the user profile, the user profile is modified accordingly. In this manner, a visitor to a profile page can assist in the creation of a user profile. | 04-01-2010 |
20100082684 | METHOD AND SYSTEM FOR PROVIDING PERSONALIZED WEB EXPERIENCE - A system and method which may generate and/or maintain a signature profile for a user. The signature profile may be a representation or a symbol of a user which may yield to different kinds of searches. A signature processor server may generate an initial signature profile with user-supplied materials, including but not limited to: audio clips, video clips, and images. A crawler server may use the initial signature profile to mine the Internet, obtain web content relevant to the initial signature profile, and present the relevant web content to the user. The signature processor server may receive the user's feedback on the relevant web content so as to update and refine the signature profile. | 04-01-2010 |
20100100566 | Methods and Systems for Identifying the Fantasies of Users Based on Image Tagging - Systems and methods for receiving uploaded images from users depicting people. Users are allowed to tag the images as depicting certain attribute(s). Users are allowed to share the user uploaded content with other users, which may search and/or filter based on the provided tags. A preference profile is maintained for users, and preference values related to the image tags provided for uploaded images are maintained. A user's preference profile may be modified based on the tags associated with images uploaded by the user. A user's preference profile may be modified based on which images, uploaded by other users, are viewed by the user. | 04-22-2010 |
20100114965 | SYSTEM AND METHOD FOR IMPROMPTU SHARED COMMUNICATION SPACES - Communications between entities who may share common interests. For entities determined to be sharing common interests (e.g., searching using the same terms or topics, browsing a page, a site or a groups of topically related sites), options for communication among the entities are provided. For example, a chat room may be dynamically created for persons who are currently searching or browsing the same or related information. As another example, a “homepage” may be created for each query and contain various types of information related to the query. A permission module controls which entities may participate, what types of information (and from what sources) an entity can (or desires to) receive, what types of information the entity may (or desires to) share. | 05-06-2010 |
20100125604 | SYSTEM AND METHOD FOR URL BASED QUERY FOR RETRIEVING DATA RELATED TO A CONTEXT - A system and method for URL based query for retrieving data related to a context. A request is received over a network from a user for data related to a context, wherein the request is a URL comprising a context query comprising at least one context criteria. The context criteria are parsed and translated and disambiguated. A network data query is formulated based on the context criteria so as to search, via the network, for user profile data, social network data, spatial data, temporal data and topical data that is available via the network and relates to the context query so as to identify at least one data object that relates to context criteria. Permissions relating to the identified data objects are checked and references to the data objects are transmitted over the network to the user. | 05-20-2010 |
20100125605 | SYSTEM AND METHOD FOR DATA PRIVACY IN URL BASED CONTEXT QUERIES - A system and method for data privacy in URL based context queries. A reference to a data object is received from a user. At least one entity that controls the data object is identified via the network. At least one permission for the data object is retrieved via the network, wherein the permission is associated with the entity that controls the data object. It is then determined, via the network, if the user is permitted to access to the data object using the permission for the data object and spatial data, temporal data social data and logical data available to the network that relates to the user and to the permission for the data object. If the user is permitted access to the data object, access is granted to the data object, and if the user is nor permitted access to the data object, access is denied to the data object. | 05-20-2010 |
20100145998 | DYNAMIC INTERACTIVE PERSONAL INFORMATION AND RATING SYSTEM - A dynamic personal rating system is disclosed for soliciting, collecting, managing, summarizing, reviewing, censoring, indexing, linking, and displaying information regarding individuals. | 06-10-2010 |
20100153453 | COMMUNICATION METHOD, SYSTEM AND PRODUCTS - The present invention provides a communication method and/or system ( | 06-17-2010 |
20100174751 | METHOD AND APPARATUS FOR MANAGEING FILE - A method for managing a file includes: acquiring at least one personal ID for identifying a person associated with the right to access a file; setting a file operation method depending on whether or not a combination of the acquired personal ID satisfies a condition set for each type of operation for the file; and controlling a file operation based on the set file operation method. | 07-08-2010 |
20100185677 | AGGREGATED SUBSCRIBER PROFILE BASED ON STATIC AND DYNAMIC INFORMATION - Static user information such as address, title, phone number(s), email address(es) and dynamic user information such as location, calendar, current phone number(s), etc. are combined in a dynamically updateable subscriber contact card for publishing to other applications. The subscriber contact card also includes user defined access controls for restricting access to portions of the information by select users. Other applications provide services such as communication services based on up-to-date information through the subscriber contact card. | 07-22-2010 |
20100185678 | QUERY CONDITIONS-BASED SECURITY - A method, system and article of manufacture for managing access to queries and, more particularly, for managing access by multiple users to persistently stored queries. One embodiment provides a method of managing access by multiple users to a predefined query against data in a database. The method comprises associating one or more access rights with at least some portion of the predefined query. When a request to access the predefined query by a first user is received, access to the predefined query by the first user is limited on the basis of the access rights. | 07-22-2010 |
20100198872 | System for the Management of Files - The invention concerns a system and a procedure for the administration of files by using electronical data processing equipment that are connected with each other by a network. In order to provide a unitary system to solve all modern office- and communication tasks instead of using a multitude of programs, systems and devices, it is suggested with the invention that at least one data processing installation features a user-related container file system whose function is based on the fact that the files of a particular user are collected into one single data file, wherein the access to the files of the data file occurs depending on access rights and wherein an automatic comparison of the data files with a replica existent within the system is being performed. | 08-05-2010 |
20100198873 | METHOD FOR PROTECTING PRODUCT DATA FROM UNAUTHORIZED ACCESS - In a method for protecting at least parts of product data, which are stored on at least one server and/or in at least one database and associated with a product identified by an RFID tag, from unauthorized access, an authentication and authorization check of an accessing party is performed upon access to a server and/or database, additionally proof being required upon access that the product is located within the discretionary area of the accessing party, the proof being provided by the RFID tag upon detection by an RFID reader by an access token in the form of a data structure, by which the RFID tag authorizes the accessing party to access at least parts of the product data associated with the product identified by the RFID tag, and stored on the server and/or in the database, wherein the product data can be queried and/or changed depending on the application. | 08-05-2010 |
20100198874 | DATA MANAGEMENT METHOD AND APPARATUS - In a data management method using a hierarchical folder structure where an item such as data or a folder can be registered in multiple folders, attribute information is appended to each relational data piece that represents a pair of a child item that is either data or a folder registered in a folder and a parent folder in which the child item has been registered. This attribute information is referred to when a single child item has been registered in multiple parent folders, in order to select one of the multiple parent folders. By selecting a relational data piece based on the attribute information so that each child item can be registered in a single parent folder, at least part of the hierarchical folder structure is converted into a tree structure where a single child item belongs to a single folder. | 08-05-2010 |
20100205217 | Web-Enabled Database Access Tools - This description provides tools and techniques for Web-enabled database access tools. These tools may provide systems that include database access tools that provide at least one level of abstraction between external databases and users of the access tools. The systems may also include one or more internal databases maintained by the tool, with the internal database storing respective login information associated with the users. The login information may enable the users to access the tool without providing direct access to the external databases. | 08-12-2010 |
20100217779 | USING A CALCULATION EXPRESSION TO DEFINE AND CONTROL ACCESS RIGHTS FOR RECORDS IN A DATABASE - Techniques for providing limited access to data stored in records of databases are disclosed. The techniques can be implemented in a database program operating on a computer system. The database program can provide a Graphical User Interface that can be used to conveniently define calculation expressions that limit operations on the records of the database. The calculation expression can be defined for a user or group of users with respect to a particular operation that can be requested to be performed on the records of the database. The calculation expression can be defined based on fields of the records, as well as other information, for example, various state variables of the database (e.g., date, time, number of records, etc.) The calculation expression can, in turn, be evaluated with respect to each record to determine whether a request to perform an operation on that particular record should be granted or denied. | 08-26-2010 |
20100228780 | METHOD FOR IMPLEMENTING USER-SPECIFIC CALLING PREFERENCES - A method and system of establishing calling preferences for a user are provided. The method includes: defining a user profile containing an association between the user and two or more communication devices, each device having an associated device type; assigning the user to at least one group; obtaining group preferences associated with one or more of the user's groups; determining user preferences for the user based on the group preferences and the device types of the communication devices associated with the user; and storing the user specific preferences in a user profile associated with the user. | 09-09-2010 |
20100235396 | Distributed File System Access - A system and method for providing access in a distributed filesystem. The disclosure describes systems and methods for providing access to filesystem objects in a distributed filesystem (DFS). In one implementation, access to filesystem objects in the DFS can he restricted to only authenticated users and client devices. To this end, the client devices of the DFS can be divided into trusted and non-trusted clients, and further access can be denied to non-trusted clients. Concepts of trusted computing can be utilized to obtain trusted clients. New clients added to the system can be added as non-trusted clients. Further, access can be restricted by extending the file access permissions to include additional bits that can control access to non-trusted clients. In certain situations, the owner of the object can be allowed access to the object from a non-trusted client. | 09-16-2010 |
20100241668 | Local Computer Account Management at Domain Level - A domain level database containing domain user permission settings may contain local device permission settings for domain users. For each of the local devices attached to the domain, a client service may periodically query the domain database and receive local permission settings for individual domain users. The local permission settings may affect access and availability of certain local resources and actions to the domain users. The client service may update a locally maintained database that may be used by a local security management system to permit or deny access to local resources and local actions to individual users when those users are logged onto the local device. | 09-23-2010 |
20100268741 | CALENDAR SYSTEM - A calendar system displays event data via an electronic calendar form that is accessible over a network by a user of a client computer. The system stores event data for multiple events and selectively displays event data based on whether a calendar access request is received from a guest user or an authenticated user. The system displays event data via a default calendar to guest users and displays event data via a customized calendar to authenticated users. The default calendar displays event data for related events based on a contextual relationship that is derived by examining event data for each the multiple events to determine a position separation and/or a frequency of a user supplied keyword in the event data. The customized calendar displays events based on contextual relationships and based on the viewing history of the user and other input data from user. | 10-21-2010 |
20100281059 | ENHANCED USER PROFILE - A method and a system to generate a user profile and an associated profile manager are described. The user profile, in one embodiment, may comprise identity data such as static information about a user and behavior data comprising dynamic information about the user. The profile manager may be configured to monitor the activities of the user through an interface to collect behavior indicators, and to update the behavior data using the collected behavior indicators. In one embodiment, the user profile also comprises reputation data. The method and system may also be configured to receive an access request from a user and selectively grant the access based on the user profile. | 11-04-2010 |
20100293198 | MOBILE PHOTO SHARING - A photo sharing system includes a database including a user account, a mobile device for sending and receiving a digital image, wherein the digital image has a source identification associated with the user account, and a management server for receiving the digital image, analyzing the source identification associated with the digital image, and automatically storing the digital image on the database in response to the analysis of the source identification. | 11-18-2010 |
20100318571 | Selective Content Accessibility in a Social Network - A social networking service encourages users to post content to a communication channel with varying levels of accessibility to other users. Users may select how content will be published and control the accessibility of uploaded content using a privacy setting for each content item that the user posts. The privacy setting defines, or identifies, the set of connections who may view the posted content item. The posted content item is placed in a particular communication channel in the social networking service, such as a newsfeed or stream, where the content item can be viewed by those who are permitted to view it according to its associated privacy setting. Varying granularities of privacy settings provide flexibility for content accessibility on a social networking service. | 12-16-2010 |
20110029567 | TAG CREATION SYSTEM - A system to create tags for tag cloud displays includes an authentication service to authenticate a user. The system includes a set of valid resources stored in a database system. A tag creation tool permits the authenticated user to create at least one tag that serves to identify a selected resource within the set of valid resources. Each tag includes a weighted value. Each tag may include a public attribute that indicates that the tag is accessible to authenticated users and non-authenticated users. Alternatively, each tag may include a private attribute that indicates that the tag is only accessible to the authenticated user. A user interface displays tags in a tag cloud in accordance with attributes of the tags and weighted values of the tags. | 02-03-2011 |
20110040793 | Administration Groups - Methods, program products, and systems for managing database access privileges using administration groups are described. Administrative functions for managing a database server and administrative functions for managing collections of databases can be separated. Groups of databases can be created on the database server. Tasks for adding and managing multiple databases can be delegated from a server administrator to one or more group administrators who can manage one or more groups of databases. The groups of databases can be stored in various home folders, each home folder corresponding to a group. Management rights on the databases can be determined by the home folders in which the databases are located. | 02-17-2011 |
20110055276 | SYSTEMS AND METHODS FOR AUTOMATIC INCLUSION OF ENTITIES INTO MANAGEMENT RESOURCE GROUPS - Systems and methods for the automatic inclusion of entities into one or more management resource groups are described herein. Some embodiments include processing logic and memory coupled to the processing logic and including a database. The processing logic stores within the database a grouping representative of at least one network element, a role defined for a user, and a grouping-role pair associated with the user. The processing logic further automatically adds a new element as a grouping member upon its identification and automatically authorizes the user to perform the role with the new network element. | 03-03-2011 |
20110082888 | METHOD FOR EARLY CAREER SERVICES FOR COMMUNICATING WITH A WEB BASED DATABASE AND SOCIAL NETWORK - A method system and computer readable storage medium for providing information to users of an electronic device in a social network environment may include storing maintaining and organizing information pertaining to registered users of an electronic database, receiving an access request from a registered user and generating a user interface to allow access to the database. A computer program product including a computer-usable medium having computer-usable program code that, when executed, causes a machine to perform the various steps and/or functions described herein. | 04-07-2011 |
20110113068 | SYSTEM AND METHOD FOR MANAGING MULTIPLE USER REGISTRATIONS - The present invention represents system and method for managing multiple user registrations. An exemplary system comprises a user registration management tool and a service provider registration information system. The user registration management tool allows an Internet user to manage his or her user registrations. The service provider registration information system hosted to at least one server provides interfaces for managing registration information of a plurality of service providers, for managing user registration requests and for sharing registration information with other service provider registration information systems via a Network. An exemplary method for processing a user registration in an integration process comprises receiving a request of user registration to a service provider from an Internet user, sending a registration request document at the user registration management tool, transmitting the registration request document at the service provider registration information system, and receiving the registration request document and processing a user registration at the service provider. | 05-12-2011 |
20110137946 | INDIVIDUALIZED DATA SHARING - Granting permissions for attributes in a distributed data store involves implementing a federated control system. The system can include dynamic permissions granted to content blobs. Acknowledgment of dynamic permissions facilitates identification of users that receive content to enable restoring data on a machine following data loss. Acceptance of dynamic permissions can further facilitate automatic updates to data, or providing content blobs in response to changes in user attributes. | 06-09-2011 |
20110145292 | DELEGATED AND RESTRICTED ASSET-BASED PERMISSIONS MANAGEMENT FOR CO-LOCATION FACILITIES - At least one user is designated to manage assets including management delegations, access restrictions, and access permissions. Management responsibilities are applied based on business rules and based on a hierarchical model. The hierarchical model enables a well-defined logical flow of delegations and restrictions with pruning capability. User groups, asset groups, asset trees and asset permissions may be defined. The designated user can manage a single asset or all assets or a subset of assets. An asset may belong to one or more asset groups. | 06-16-2011 |
20110153669 | ONLINE DATING WITH PRIVATE SUPPORT GROUPS - Various embodiments of computer systems, methods, and computer programs are disclosed for sharing information in an online dating platform. One embodiment is an online dating computer system comprising a server, an online dating matching component, and a dater support component. The server is configured to communicate with one or more computing devices via a communication network. The server comprises a processor and a memory. The online dating matching component and the dater support component are embodied in the memory and executed by the processor. The online dating matching component is configured to provide a matching service for online dater data and further configured to enable communications among online dater profiles established in memory. The dater support component is configured to provide dating assistance to profiles of online daters, via the online dating computer system, from messages originating from a dater support group associated with the online dater, the dater support group comprising one or more invited supporters. | 06-23-2011 |
20110173234 | PRESENTING EVIDENTIARY INFORMATION - The invention concerns the presentation of evidentiary information on computer generated interfaces within secure user groups. For example presenting evidence a courtroom to the judge, witness and legal representatives of the plaintiff and defendant simultaneously on computer display screens. All presenting of evidence is done using a website interface where each user logs in and their log in provides them with functionalities that reflect their role in the legal proceedings. The invention makes presenting evidence easier by allowing evidence to be ordered, facilitating private data, being able to hold on to evidence or to cause evidence to be presented to a particular user or team of users. Aspects of the invention include a set of interfaces, computer systems, methods and application software. | 07-14-2011 |
20110184989 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEMS AND METHODS - An automatic resource ownership assignment system, the system including resource ownership indicators definition functionality operative to allow an operator of the system to define resource ownership indicators, automatic resource ownership recommendation functionality operative to provide, to at least one user of the system, a recommendation to assign ownership of at least one resource to a potential owner, based on the resource ownership indicators, and automatic resource ownership assignment functionality which, responsive to predetermined at least partial approval of the at least one recommendation by the at least one user and approval of said at least one recommendation by the potential owner, is operative to automatically assign ownership of the at least one resource to the potential owner. | 07-28-2011 |
20110202567 | APPARATUS AND METHOD FOR GENERATING A COLLECTION PROFILE AND FOR COMMUNICATING BASED ON THE COLLECTION PROFILE - An apparatus for generating a collection profile of a collection of different media data items has a feature extractor for extracting at least two different features describing a content of a media data item for a plurality of media data items of the collection, and a profile creator for creating the collection profile by combining the extracted features or weighted extracted features so that the collection profile represents a quantitative fingerprint of a content of the media data collection. This collection profile or music DNA can be used for transmitting information, which is based on this collection profile, to the entity itself or to a remote entity. | 08-18-2011 |
20110208780 | METHOD FOR IMPLEMENTING FINE-GRAINED ACCESS CONTROL USING ACCESS RESTRICTIONS - Disclosed is a data processing system-implemented method, a data processing system and an article of manufacture for controlling access to data stored on a database having relational objects for which access restrictions are defined for elements of the relational objects The data processing system-implemented method includes receiving a user request to access one or more relational objects of the database, identifying any access restrictions defined for the one or more relational objects, determining whether any identified access restrictions are applicable to the user request, determining whether any determined applicable access restrictions are to be enforced for the user request, and allowing access to the one or more relational objects based on the determined enforceable access restrictions. | 08-25-2011 |
20110213806 | Method for providing alias folders in a document management system - Interactive collaboration within a secure, server-based social community integrated with a secured document management system that includes at least one of a plurality of professional functionalities and a plurality of integrative functionalities to members having a member virtual identity within the community. Members of the community may create a personalized custom set of folders within the document management system, which customized arrangement allows the members to view documents, files, and folders as they desire. By creating these personalized custom “alias” folders, the members rearrange folders to be more accessible to themselves, while leaving the actual files and folders unchanged as viewed by every other member of the community. Members or a network administrator may also grant permission to other members of the network to access alias folders of each other member. | 09-01-2011 |
20110219035 | DATABASE SECURITY VIA DATA FLOW PROCESSING - An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. | 09-08-2011 |
20110246526 | SERVICE LEVEL AGREEMENT BASED STORAGE ACCESS - A method and a system implementing a service level agreement based storage access system. A service level agreement based storage access system presents a single interface for data storage consumers and translates generic data operation requests to data operation request specific to a storage server. The SLA based storage access system also monitors storage server performance and may throttle processes to ensure service level agreements are not violated. | 10-06-2011 |
20110246527 | System, method and computer program product for associating a permission set with one or more users - In accordance with embodiments, there are provided mechanisms and methods for associating a permission set with one or more users. These mechanisms and methods for associating a permission set with one or more users can enable improved access management, increased efficiency, enhanced security, reduced risk, greater governance, least privilege access, greater auditability, etc. | 10-06-2011 |
20110276602 | BUSINESS CARD EXCHANGE INFORMATION PROCESSING APPARATUS, BUSINESS CARD EXCHANGE INFORMATION PROCESSING METHOD, AND PROGRAM - A business card exchange information processing apparatus includes: a personal user information storage unit in which at least two sets of personal user information, each personal user information including a user identifier, user information, and business card image of a user, can be stored; a business card exchange information storage unit in which at least one set of business card exchange information associating a user identifier with a business card image of a user with whom business cards are exchanged can be stored; an another user contact information accepting unit that accepts, from one user, another user contact information that includes the user identifier of the one user and other user's information relating to another user; and a business card exchange processing unit that, when the another user contact information has been accepted, searches the personal user information storage unit by using the another user contact information, and accumulates, in the business card exchange information storage unit, business card exchange information associating a business card image paired with user information matching the other user's information with the user identifier included in the another user contact information. | 11-10-2011 |
20110282909 | SECREGATING ANONYMOUS ACCESS TO DYNAMIC CONTENT ON A WEB SERVER, WITH CACHED LOGONS - A system and method are provided for segregating access to dynamic content on multiple websites hosted by a web server. When a request is received for dynamic content from a website, a UserRetriever module identifies a path to the content and retrieves a username and password corresponding to the website, from a database that is separate from the web server and used for other purposes (e.g., billing). A UserImpersonator module requests a logon handle for that username from a logon cache manager. The logon handle is used to associate the request with the impersonated user account instead of the default anonymous user account with which the request was initially associated. The dynamic content is retrieved and served under the context of the restricted impersonated user account session, after which the applied logon handle is stripped off and the request is re-associated with the default anonymous user account. | 11-17-2011 |
20110295899 | Systems And Methods For Permissions-Based Profile Repository Service - In some embodiments, provided is a method that includes storing, by a profile repository service, respective profile information for one or more users. The method includes receiving, by the profile repository service, permissions input from a particular one of the one or more users specifying content of the particular user's profile information accessible to content providers. Further, the method included receiving, by the profile repository service, a request from a content provider for profile information for the particular user, wherein the content provider is distinct from the profile repository service. The method also includes providing, by the profile repository service in response to the request, profile information for the particular user to the content provider, wherein the profile information is provided according to the permissions input from the particular user, and wherein the profile information is used to generate content delivered to the particular user remotely from the profile repository service. | 12-01-2011 |
20110302210 | System and methods for keeping information and data for proving authorship and priority of ideas, creations, inventions, explanations, declarations, factual assertions and others; for keeping personal documents securely and confidentially; for securing evidence for legal proceedings; and for delivering messages and documents to parties. - We propose a system and a method for providing a confidential secure information, data, evidence and documents holding docket system service where various parties can store information by means such as uploading documents and data files on a computer server. The administrator of the service is legally and contractually bound to securely and confidentially hold the stored documents in trust for the customers and to truthfully certify, at the customer request, that a certain document or file has been created by the said customer on a certain date. Upon contractual agreement between the service provider and the customer the service provider takes on the contractual duty to deliver messages and documents to the customer and to third parties at various times and contingent upon various events according to customer's specifications. Upon contractual agreement the service provider takes on the contractual duty to deliver documents, files and messages anonymously. The administrator also offers to customers the option to publish (e.g. on a website) the documents, the files, the certifications stored on the docket and other information that customer chooses. | 12-08-2011 |
20120011160 | STORAGE MANAGEMENT - A user may select a profile to serve as an active profile on a device, and content objects associated with the active profile may be stored on the device responsive to the selection. Content objects that are not associated with the active profile may be transferred to one or more additional devices based on a prioritization scheme. Content object download operations may take advantage of the prioritization scheme to determine a storage device for a downloaded content object. | 01-12-2012 |
20120023139 | INTELLIGENT ATTACHED STORAGE - An intelligent storage device for providing authentication services and secure access to files is provided. The intelligent storage device includes a storage unit for storing a plurality of files, a communication unit for connecting the intelligent storage device to the external device via a wired or wireless connection, and a processor for controlling access to the files by an external device connected to the intelligent storage device, according to input from a user via the intelligent storage device. | 01-26-2012 |
20120041982 | METHOD AND SYSTEM FOR ASSOCIATING CO-PRESENCE INFORMATION WITH A MEDIA ITEM - Computer-implemented methods and systems for associating co-presence information with a media item comprise creating a media identification (ID) for the media item in response to a media device acquiring a media item. The media ID is broadcast to at least one peer device co-present with the media device. A transmission is received from a registered user of the peer device reporting receipt of the media record ID, and an arbitrary ID for the registered user is created. The arbitrary ID of the registered user of the peer device that reported receipt of the media record ID is then associated with the media item. | 02-16-2012 |
20120041983 | SYSTEM AND METHOD FOR INFORMATION GATEKEEPER BASED ON AGGREGATE PROFILE DATA - Systems and methods are provided for controlling access to sharable items. In general, a computing device of a user stores a sharable item. A sharing rule is configured for the sharable item, where the sharing rule is based on an element of aggregate profile data for a current location of the user, a crowd characteristic of one or more crowds that are currently relevant to the current location of the user, or both. Depending on the embodiment, the element of the aggregate profile data, the crowd characteristic of the one or more crowds, or both are obtained and the sharing rule for the sharable item is resolved. Sharing of the sharable item is then provided according to a result of the resolution of the sharing rule for the sharable item. | 02-16-2012 |
20120066262 | User-Controlled Management and Distribution of User Information - A first portal is configured to receive user information that includes at least one of contact data or biographical data associated with a particular user. The first portal is further configured to receive user selected information that includes at least a subset of the user information associated with the particular user and identifies a particular database operator to receive the subset of user information. A core system includes a server and a database to store the user information and the user selected information. A first data connection is configured to transfer the user information and the user selected information received through the first portal to the core system. A second portal is configured to provide the particular database operator with access to a first data feed. The first data feed includes the subset of user information associated with the particular user and is accessible only by the particular database operator and the second portal is further configured to provide a second different database operator with access to a second data feed. The second data feed is accessible only by the second different database operator. | 03-15-2012 |
20120072460 | USER ACCESSIBILITY TO DATA ANALYTICS - A computer implemented method, system, and/or computer program product performs an appropriate type of data analysis for a user. A preliminary request for a data analysis is received from a user having a user profile. The preliminary request fails to identify an appropriate data source for the data analysis, and fails to identify an appropriate type of data analysis. Thus, a customized request, that identifies the appropriate data source for analysis, is created from the preliminary request based on the user's profile. The customized request is mapped, based on the user's profile, to a specific data constrained analytic algorithm that performs the appropriate type of data analysis. This specific data constrained analytic algorithm performs the appropriate type of data analysis on the appropriate data source in order to generate an analytic result, which is transmitted to the user. | 03-22-2012 |
20120078964 | SYSTEM FOR STORING AND DISEMINATING PATIENT DATA AND RELATED INFORMATION - The system described has many advantages and provides safeguards for the patients. More specifically, if some information from any source is suspect or potentially dangerous, the primary health care provider and/or other entities such as local emergency services are notified in real time. | 03-29-2012 |
20120084324 | POWER MONITORING DEVICE SIMULATION USING A DATABASE PROFILE GENERATED FROM REAL TIME-VALUE DATA - A system and methods for using data from an external database compiled from real device used for testing and simulation of a system. The system includes an external database interface to access an external database. The external database includes a plurality of categories of time-value data collected from an electrical device. An importer converts one of plurality of categories of time-value data to a corresponding topic of a common data format. A device profiler is coupled to the importer to create a device profile including the converted topic. A database profiler creates a database profile representing a system including a device defined by the device profile and including the category of time-value data. | 04-05-2012 |
20120096037 | Managing Information about Relationships in a Social Network via a Social Timeline - A system, method, and computer program for generating a social timeline is provided. A plurality of data items associated with at least one relationship between users associated with a social network is received, each data item having an associated time. The data items are ordered according to the at least one relationship. A social timeline is generated according to the ordered data items. | 04-19-2012 |
20120096038 | Managing Information about Relationships in a Social Network via a Social Timeline - A system, method, and computer program for generating a social timeline is provided. A plurality of data items associated with at least one relationship between users associated with a social network is received, each data item having an associated time. The data items are ordered according to the at least one relationship. A social timeline is generated according to the ordered data items. | 04-19-2012 |
20120136900 | SYSTEM AND METHOD FOR MANAGING DYNAMIC DIGITAL COMMUNITY BASED ON LOCATION AND SOCIAL RELATION - A system for managing a dynamic digital community based on location and social relations includes a user location information collecting block configured to analyze user location information and provide a location searching function of searching for where the user terminal is. Further, the system includes a community lifecycle management block configured to provide a service for creating and deleting a digital community, a service for joining a digital community as a member and withdrawing from the digital community, and a community execution service to user terminals; and a digital community profile database configured to store community profiles about respective digital communities. Furthermore, the system includes a user profile database configured to store user profiles of respective members who join the respective digital communities and creators of the respective digital communities; and a member management block configured to manage information of the respective members who join the respective digital communities. | 05-31-2012 |
20120143917 | SOCIAL FILES - Disclosed are systems, apparatus, methods, and computer readable media for creating and sharing social files in a feed system. In one embodiment, a request is received to perform an action related to a social file. The social file may provide access to a first document file within a social networking system. The first document file may be capable of being displayed on a display device. A determination may be made as to whether the requested action complies with a permission configuration record associated with the social file. The permission configuration record may identify one or more user accounts permitted to access the social file. | 06-07-2012 |
20120158787 | Enterprise Security Management System Using Hierarchical Organization and Multiple Ownership Structure - A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group. | 06-21-2012 |
20120185509 | LIMITED SUBSCRIPTION THROTTLING - Embodiments are directed to providing a plurality of data provisioning tiers for datasets and to throttling access to dataset data based on the dataset's data provisioning tiers. In an embodiment, a computer system receives an input that specifies a maximum number of queries that a user is allowed to perform on a given dataset over a specified period of time. The computer system generates data provisioning tiers for the dataset based on the received input. Each data provisioning tier indicates a maximum number of queries that the user is allowed to perform on a given dataset over a specified period of time. The computer system also applies the generated data provisioning tiers to the dataset so that the user is limited to the maximum number of queries specified in the data provisioning tier. | 07-19-2012 |
20120191758 | PROGRAMMATICALLY ENABLING USER ACCESS TO CRM SECURED FIELD INSTANCES BASED ON SECURED FIELD INSTANCE SETTINGS - Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to be executed in order to enable access to fields. A client application's user privileges are inherited to enable access to secured fields. Such access through a granted privilege is provided through an API intermediating inheritance of user's privileges from client application. | 07-26-2012 |
20120203799 | SYSTEM TO AUGMENT A VISUAL DATA STREAM WITH USER-SPECIFIC CONTENT - User profile information for many users may be stored in a user profile database associated with a server computer connected to a network. Based on information received from a mobile computing device, the server computer selects augment information from an augment information database coupled with the user profile database. The information received from the mobile computing device is related to frames of a video stream being captured by the mobile computing device and geographical information associated with these frames. The augment information is also selected based on the user profile associated with the mobile computing device. The augment information is to be transmitted from the server computer to the mobile computing device using wireless communication and is used by the mobile computing device to overlay the frames of the video stream being captured by the mobile computing device. | 08-09-2012 |
20120203800 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PORTAL USER DATA ACCESS IN A MULTI-TENANT ON-DEMAND DATABASE SYSTEM - In accordance with embodiments, there are provided mechanisms and methods for portal user data access in a multi-tenant on-demand database system. These mechanisms and methods for portal user data access in a multi-tenant on-demand database system can enable embodiments to provide portal-specific user accounts to the multi-tenant on-demand database system which have reduced configuration requirements than users directly accessing the multi-tenant on-demand database system. The ability of embodiments to provide portal-specific user accounts can reduce processing requirements of the database system. | 08-09-2012 |
20120209885 | Allowing External Access to Private Information of a Local Data Store - Techniques provided for allowing external access by other users to private information that is maintained on local storage of a computer and owned by an information owner. The private information is uploaded from the local storage to an externally accessible information source that is accessible by the other users. A request from a user to access the private information is received by the owner, who determines whether to allow access the private information. If so, the owner sends a private information sharing authorization to a collaboration orchestrator, which retrieves the private information from the external source and provides the private information to the user. The owner optionally requests to collaborate with the user before deciding whether to allow access to the private information. One or both of the identities of the owner and user can remain anonymous until agreeing on revealing identities. A system and program product is also provided. | 08-16-2012 |
20120215813 | DATA BACKUP, STORAGE, TRANSFER AND RETRIEVAL SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT - A data storage system including a virtual server on a network managing a plurality of user accounts, each user account including one or more files; the virtual server adapted to verify user access information for a particular user account; the virtual server transferring over the network information relating to files stored on the virtual server in the particular user account to a verified user on a user computer; the virtual server further adapted to transfer files associated with the particular user account to and from the user computer. | 08-23-2012 |
20120215814 | Client Integrated Artwork/File Repository System - Systems and methods for controlling file access. A data structure is provided which includes a set of files (artwork for a promotional products ordering system in some embodiments) and a set of user accounts. Each file and each account has associated arbitrary classifiers associated therewith. When account classifier(s) match file classifier(s), the corresponding users (salespersons in some embodiments) may access the files. The matching files may be listed for the users. The arbitrary classifiers can be nominal key:value pairs. A system is provided which includes a network, computers, and memory which contains such a data structure. The system may include a Web based file access interface. A method is provided in which arbitrary classifiers are associated with files and users. Users with classifiers which match a file classifier are allowed access to the corresponding file. An administrator may upload files to a shared repository in the memory. | 08-23-2012 |
20120254247 | COMPUTER PRODUCT AND DESTINATION DETERMINING METHOD - A computer-readable medium stores therein a program that causes a computer having access to a database that stores therein identification information that is for each user among multiple users and is associated with a destination of each user, to execute a process. The process includes receiving from a first portable terminal of a given user, the identification information of the given user and receiving from each second portable terminal within a communication range of the first portable terminal, the identification information of each user of the second portable terminals; identifying, by referring to the database, the destination of each user of the second portable terminals, stored associated with the identification information received for each user of the second portable terminals; determining the destination of the given user, based on the identified destinations; and outputting associated with the received identification information of the given user, results obtained at the determining. | 10-04-2012 |
20120259891 | METHOD, SYSTEM AND PROGRAM FOR ANALYTICS DATA DELIVERING - Provided are computer-implemented methods and computer systems for interactive data delivery to a user and for setting up a user profile. An interactive data delivery method involves retrieving generic data, which may be web analytics or some other forms of data, and processing this retrieved data based on various user specific rules. As such, the processed data provided to the user is more focused and has elements of business intelligence needed by a particular user. User requirements may depend on industry, business objectives, website objectives, the user's role in the organization, and other factors. Data may be requested and provided in an interactive form that includes voice recognition and voice output features. | 10-11-2012 |
20120317146 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR VALIDATING ONE OR MORE METADATA OBJECTS - In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment. | 12-13-2012 |
20130018921 | NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISKAANM JIN; HongxiaAACI San JoseAAST CAAACO USAAGP JIN; Hongxia San Jose CA USAANM WANG; QihuaAACI San JoseAAST CAAACO USAAGP WANG; Qihua San Jose CA US - Embodiments of the invention related to access control to sensitive data records, and in particular need-to-know information access using quantified risk. In one aspect of the invention access control includes retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users. A warning is issued if the aggregated total risk score for any of the plurality of users exceeds a risk-tolerance threshold. | 01-17-2013 |
20130024477 | METHOD AND APPARATUS FOR SLA PROFILING IN PROCESS MODEL IMPLEMENTATION - A method and system memory to store a logical process model defining a logically structured series of process activities in a process, and Service Level Agreement (SLA) profile information defining a pre-defined plurality of SLA profiles which are potentially applicable to respective process instances. Each SLA profile comprises at least one performance metric with respect to the process and/or at least one of the process activities. A rules engine queries case data with respect to a particular process instance, and automatically determines an applicable SLA profile based on the case data. The applicable SLA profile is then applied to the particular process instance, and may be altered during performance of the process instance in response to case data changes. | 01-24-2013 |
20130091171 | JUST-IN-TIME USER PROVISIONING FRAMEWORK IN A MULTITENANT ENVIRONMENT - A method of provisioning organization users in a multi-tenant database system includes receiving a request via a single sign-on protocol from an organization user to create a new multi-tenant database user account for access to the multi-tenant database system. The method retrieves rules that specify how to derive user permissions for access to the multi-tenant database system from stored user attributes of the organization user. The method continues with applying the rules to the stored user attributes to determine permissions for the users to access particular objects in the multi-tenant database system, and creating the new user account with the determined user permissions for access to the multi-tenant database system. | 04-11-2013 |
20130097204 | Multi-Tenant Agile Database Connector - A module provides an interface between a multi-tenant database and a non-tenant-specific application instance such that the application instance sends data access commands to the module as if it is communicating with a single-tenant database. The module translates the non-tenant-specific data access command from the non-tenant-aware application into a multi-tenant data access command, as needed, without needing to alter the non-tenant specific application instance in any way. In this manner, a single-tenant application could be used by multiple tenants in a multi-tenant environment. | 04-18-2013 |
20130117315 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD - A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates. | 05-09-2013 |
20130132439 | ORGANIZING VERSIONING ACCORDING TO PERMISSIONS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data according to permissions. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of identifying a version of a data item to be stored; determining permissions associated with the version of the data item; and storing the version of the data item at a storage location that is based on the determined permissions. | 05-23-2013 |
20130138693 | METHOD AND APPARATUS FOR PROVIDING CONTEXT-BASED OBFUSCATION OF MEDIA - An approach for sharing and/or viewing one or more remixes of content based on the preferences of a user is described. A segmentation platform causes, at least in part, a segmentation of content into one or more segments, wherein the one or more segments are associated with one or more content labels. The segmentation platform also causes, at least in part, a rendering and/or sharing of one or more remixes of the content based, at least in part, on at least one subset of the one or more segments based, at least in part, on profile information, context information, or a combination thereof associated with one or more viewers of the content, one or more owners of the content, one or more sharers of the content. | 05-30-2013 |
20130144914 | ACQUIRING STATISTICAL ACCESS MODELS - The present disclosure provides methods, devices, and computer-readable media for acquiring statistical access models. One or more embodiments include collecting data associated with a first access profile, collecting data associated with a second access profile, determining whether the data associated with the first access profile has a particular number of characteristics in common with the data associated with the second access profile, assigning a statistical access model associated with the second access profile to the first access profile based on the particular number of characteristics that the data associated with first access profile has in common with the data associated with the second access profile, and detecting an anomalous access event based on the statistical access model. | 06-06-2013 |
20130159350 | Sensor Fusion Interface for Multiple Sensor Input - The subject disclosure is directed towards a sensor fusion interface that enables interaction between one or more entities of a physical environment and a computerized device component. A plurality of sensor modules generate multiple sensor input data associated with one or more entities in an environment and store such data in a shared library in accordance with a uniform and common schema. The multiple sensor input data is refined until a certain level of accuracy is achieved. Using the sensor fusion interface, entity state data is extracted from the shared library and exposed to the computerized device component. | 06-20-2013 |
20130179469 | DATA BACKUP, STORAGE, TRANSFER AND RETRIEVAL SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT - A data storage system including a virtual server on a network managing a plurality of user accounts, each user account including one or more files; the virtual server adapted to verify user access information for a particular user account; the virtual server transferring over the network information relating to files stored on the virtual server in the particular user account to a verified user on a user computer; the virtual server further adapted to transfer files associated with the particular user account to and from the user computer. | 07-11-2013 |
20130185333 | System and Method for Secure Reciprocal Exchange of Data - A system for transmission of data between a first device operated by a first user and a second device operated by a second user comprises a database that is in network communication with the first device and the second device. The database receives a first set of data input by the first user and a second set of data input by the second user. Additionally, the database allows the second user to access a first portion of the first set of data only after the second user authorizes the first user via the database to access a first portion of the second set of data. The database can be configured so that the first user is authorized by the second user once the first user inputs a user-specific identifier of the second user into the database. | 07-18-2013 |
20130238661 | Personal Profile Data Repository - A personal profile data repository is disclosed. The personal profile data repository stores information about a user. The user has complete control over the content of the profile and over what third parties may access information stored in the repository. | 09-12-2013 |
20130246473 | METHODS AND SYSTEMS FOR ACCESSING REMOTE USER FILES ASSOCIATED WITH LOCAL RESOURCES - A system for accessing, by a resource, a setting in a virtualized user profile includes an isolation environment, a resource, and a filter driver. The resource executes outside an isolation environment on a local machine and requests access to a setting in a user profile. The filter driver intercepts the request for access and identifies one of the isolation environment and a remote machine, responsive to an application of a rule to the request. The filter driver redirects the request to the one of the isolation environment and the remote machine. A method includes intercepting an instruction from a resource to modify a setting on a local machine, the resource provided by a local machine and executing outside of an isolation environment. The method includes identifying the isolation environment, responsive to an application of a rule to the instruction. The method includes redirecting the instruction to the isolation environment. | 09-19-2013 |
20130275472 | INDIVIDUALIZED DATA SHARING - A method may include: maintaining one or more attributes of a first user; maintaining a risk profile scheme configured by the first user, the risk profile scheme comprising a passive permission table indicating whether a second user has permission to the one or more attributes; allowing the first user to grant dynamic permissions to the second user to access the one or more attributes in accordance with the risk profile scheme; allowing the first user to perform content blobulation of the one or more attributes; and allowing the first user to perform content reblobulation of the one or more attributes in accordance with the risk profile scheme. | 10-17-2013 |
20130304764 | METHOD AND APPARATUS FOR PROVIDING FILE ACCESS USING APPLICATION-PRIVATE STORAGE - An approach is provided for determining one or more social networks. A processor may then process and/or facilitate a processing of access information associated with one or more files, wherein access to the one or more files is based, at least in part, on the one or more social networks. | 11-14-2013 |
20140006451 | Remote-Controllable Kiosk | 01-02-2014 |
20140006452 | METHOD AND APPARATUS FOR CONSTRUCTING AND MAINTAINING A USER KNOWLEDGE PROFILE | 01-02-2014 |
20140006453 | AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD | 01-02-2014 |
20140019488 | METHODS AND SYSTEMS FOR REGULATING DATABASE ACTIVITY - Methods and systems are provided for regulating access to a database by a server. One exemplary method involves the server receiving one or more requests for an activity with respect to the database and determining an attempted usage for the activity over a monitoring period by a source of the requests. When the attempted usage exceeds an allowed usage of the activity for the monitoring period, the server provides a human verification test to the source and thereafter initiates the activity with respect to the database in response to receiving a satisfactory human verification response to the human verification test from the source. | 01-16-2014 |
20140032602 | In-Memory Database Interface To Respect Assigned Authorization Profiles - A system, method, and a computer program product for checking in-memory authorization profiles are disclosed. An authorization profile of a user in an enterprise resource planning system can be determined. An access to an in-memory database system can be requested based on the determined authorization profile. Based on the access request, an authorization check of the determined authorization profile of the user can be performed to determine whether the user can access the in-memory database system using the determined authorization profile. An access to the in-memory database system to the user can be granted based on the performed authorization check. | 01-30-2014 |
20140074890 | METHOD OF SYNCHRONOUSLY PROVIDING DATA FROM SOFTWARE AND WEBSITE - A method of synchronously providing data from software and a website is applied in the software installed to the website, and the software creates a database, and the method includes the following steps: a user end enters into the website via a network to login the software; the user end applies for an access of the software; the software sets an authorization level of the user end; the user end obtains the access of the software; the user end creates one or more records of data in the database by the software; the user end sets an authorization level for retrieving and storing the data by the software; and the software retrieves the retrievable data from the database according to the authorization level of each user end and produces a webpage to output the retrieved data. | 03-13-2014 |
20140095546 | COMMON USERS, COMMON ROLES, AND COMMONLY GRANTED PRIVILEGES AND ROLES IN CONTAINER DATABASES - Techniques for common users and roles, and commonly-granted privileges and roles are described. In one approach, the DBMS of a container database allows for the creation of common roles and common users that are shared across the container database. Thus, when a common role or a common user is established, the common role or common user is propagated to each database of the container database. In another approach, the DBMS of a container database allows privileges and roles to be granted commonly or locally. When a privilege or role is granted commonly, the privilege applies in each of the databases of a container database. When a privilege or role is granted locally, the privilege applies only in the database to which the grantor of the privilege or role established a connection. | 04-03-2014 |
20140115003 | METHODS AND SYSTEMS FOR MANAGING ACCESS TO DATA IN AN ON-DEMAND SYSTEM - Data category visibility are defined at the permission set and profile levels so that users who may not be assigned a role can have the data filtered by data category access rules. In an embodiment, data is filtered based on products or projects so that the products or project can be used as a data category group, once the product or project as been assigned to the user, the user may be granted access, via a data category visibility in a permission set, regardless of the user's role or position in the user hierarchy. | 04-24-2014 |
20140115004 | SYSTEMS AND METHODS OF AUDIT TRAILING OF DATA INCORPORATION - The technology disclosed relates to creating an audit trail of data incorporation in user profiles. In particular, it relates to linking trust objects to fields of the user profiles. | 04-24-2014 |
20140164437 | SELECTIVE MANAGEMENT OF MOBILE DEVICE DATA IN AN ENTERPRISE ENVIRONMENT - In various embodiments, a method is described that includes registering a mobile device with an enterprise by storing registration data for the mobile device in a device management database; designating one or more group designations for the mobile device; storing the one or more group designations in the device management database; determining one or more policies for the mobile device based at least in part on the one or more group designations; and selectively taking action on selected data from the mobile device in the device management database based on the one or more policies. | 06-12-2014 |
20140181149 | SYSTEMS AND METHODS FOR PROVIDING MULTIMEDIA - Exemplary embodiments of methods and systems for providing multimedia are provided. A method for providing multimedia can include receiving one or more data files containing multimedia from a first user, storing the one or more data files containing the multimedia, and providing at least one of the one or more data files based on access granted by the first user and at a future time set by the first user. A trustee service can be provided to provide the one or more data files to a user at a future time based on predetermined criteria, such as a data, condition or future event. | 06-26-2014 |
20140181150 | METHODS FOR MANAGING, SEARCHING, AND PROVIDING BRAND RELATED CONTENT - Systems and methods are provided for a brand search ecosystem accessed via a network including a database of brands and branded products, locations, features, and services with input on business rules, algorithms, and information from brandholders and/or providing economic incentive payments to participants in the brand search ecosystem. The brand search ecosystem includes a brand name database including a plurality of brands and brandholders and brandbidders associated with respective brands. A search engine communicates with brandholders and the brand name database via a network for accessing information of brandholders and the brand name database to identify brandholders and brandbidders associated with brands. The search engine receives search requests from users, accesses the brand name database, and provides search results to the users. A clearing house processes economic incentive payments to brandholders and/or brandbidders associated with brands in the database. | 06-26-2014 |
20140188939 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING A SINGLE INSTANCE OF A DATABASE STORED USING A TENANT OF A MULTI-TENANT ON-DEMAND DATABASE SYSTEM - In accordance with embodiments, there are provided mechanisms and methods for sharing a single instance of a database stored using a tenant of a multi-tenant on-demand database system. These mechanisms and methods for sharing a single instance of a database stored using a tenant of a multi-tenant on-demand database system can provide a single instance of a database that is shared amongst tenants of a multi-tenant on-demand database system. The ability to provide a single instance of a database that is shared amongst tenants of a multi-tenant on-demand database system can enable the database to be managed or otherwise maintained in a central location. | 07-03-2014 |
20140244689 | SOCIAL FILES - Disclosed are systems, apparatus, methods, and computer readable media for creating and sharing social files in a feed system. In one embodiment, a request is received to perform an action related to a social file. The social file may provide access to a first document file within a social networking system. The first document file may be capable of being displayed on a display device. A determination may be made as to whether the requested action complies with a permission configuration record associated with the social file. The permission configuration record may identify one or more user accounts permitted to access the social file. | 08-28-2014 |
20140317144 | CONTEXTUAL INFORMATION - Methods, systems, and products provide contextual information for communications. A call, for example, is processed from an origination address to a destination address. A query is made for a brand of device associated with the origination address making the call. The brand of device is announced during the call. | 10-23-2014 |
20140365526 | CONTENT MANAGEMENT APPARATUS AND CONTENT MANAGEMENT METHOD - A content management apparatus as an embodiment of the present invention associates content information on content with group information on a user participation group in a posting management service that approves control for the content, and stores the associated information. The apparatus then acquires group information on the user participation group from the posting management service, upon receipt of a content control request. The apparatus determines whether or not the requested control is to be approved, based on the acquired group information and the group information stored in association with the content information on the content. This configuration allows the content management apparatus for managing the content to control access authorization according to setting of the group in the posting management service. | 12-11-2014 |
20140372485 | SYSTEM AND METHOD FOR MANAGING PERSONAL AND PROFESSIONAL CONTACT INFORMATION - The present invention encompasses a system and method for managing and sharing personal and professional contact information. The present invention allows users to exchange distinct and complete information profiles that are tied to an individual user ID and allows users to manage themselves and contacts as relationships, information and points of contact change. | 12-18-2014 |
20150026215 | AUTONOMOUS ROLE-BASED SECURITY FOR DATABASE MANAGEMENT SYSTEMS - Embodiments described herein generally relate to creating an autonomous role-based security system for a database management system, wherein a super user may not always be required. A computer-implemented method is described. The method includes establishing one or more privileges in a database system, each privilege controlling access to an administrative function for the database system. Each privilege is assigned to one or more roles. Each role may always have a minimum set of users with only administrative rights over the role. A request is received from a first user to grant a role to a second user. A database management system determines whether the first user has administrative privileges over the role. If the first user has administrative privileges over the role, the role is granted to the second user. The database system may satisfy the principles of least privilege and separation of duties. | 01-22-2015 |
20150088935 | ACCESSING AND PROVIDING ACCESS TO COMPUTER FILES OVER A COMPUTER NETWORK - Methods, systems and computer program products are provided that may relate to controlling access to or accessing computer files over a computer network. A file server may execute on a first computer system and a client may execute on a second computer system. The client may be configured to send a first communication to the file server relating to a first computer file stored on the first computer system. The first communication may include first access control data associated with the first computer file. The file server may be configured to receive the first communication and extract the first access control data from the first communication. The file server may then store the extracted first access control data in extended attributes of the first computer file on the first computer system. | 03-26-2015 |
20150095376 | MESSAGING ADMINISTRATION BASED ON DIGITAL RIGHTS MANAGEMENT SERVICES - A method for servicing messages with digital documents accessed and displayed by a client application, including the steps of establishing a database of message queues each associated with one or more digital documents and containing one or more messages, and upon authorizing a user's request for accessing and using a digital document, providing a message queue associated with the digital document. | 04-02-2015 |
20150095377 | Database Virtualization - Aspects of the subject matter described herein relate database virtualization. In aspects, clusters of database servers may be located at various locations of the Internet. When a client seeks to access a logical database, the client may send a logical server and logical database name in a data structure. These names may be used to find a physical server(s) and database(s) that correspond to the logical database. Once the location is determined, a proxy component is used to intercept and/or forward communications between the client and the physical server(s) and database(s) corresponding to the logical database. Using this system, a client may access data from a logical database without knowing the physical address of the logical user database. | 04-02-2015 |
20150127683 | VEHICLE-END DATABASE MANAGEMENT SYSTEM - A vehicle-end database management system is revealed. The vehicle-end database management system includes a read/write controller and a vehicle-end database manager. Data related to vehicles is written into the vehicle-end database manager by the read/write controller. Or data related to vehicles is read from the vehicle-end database manager by the read/write controller. Thus end-users can get the data related to vehicles timely so as to manage vehicles conveniently. | 05-07-2015 |
20150347452 | FILE MANAGEMENT SERVER, AND SYSTEM AND METHOD FOR FILE MANAGEMENT - Provided are a file management server and a system and method for managing a file. The system includes a user terminal configured to request a unique file number for a file when the file is generated, and a file management server configured to generate the unique file number corresponding to the file and transmit the unique file number to the user terminal upon the request, track a usage history of the file through the unique file number, and manage a right to use the file according to a user status related to the file when a user terminal inquires about whether the file is usable. | 12-03-2015 |
20150347518 | ASSOCIATE COMMUNICATION ANALYSIS TOOL - Embodiments of the present invention help users (e.g., associates, customers, or the like) utilize communications to take actions with respect to systems or applications that do not directly allow for users to take actions using the communications. In some embodiments the communications are voice communications (e.g., phone calls, voice activation, voice services through the Internet, or the like) or written communications (e.g., e-mail communications, text communications, or the like) or other like voice communications or written communications. The present invention identifies keywords in the communications to determine the application for which the user wants to take an action, and the action that the user wants to take. The present invention takes the action within the application based on the keywords, or requests additional information from the user through the communication channel (or another communication channel). | 12-03-2015 |
20150347967 | Support System, Support Method, and Recording Medium for Promoting Usage - A support system includes a function execution circuit, a customer-information managing circuit, and a usage-availability setting circuit. The function execution circuit uses customer information indicative of a specific content related to a customer to execute a specific function. The customer-information managing circuit manages the customer information for each dealer. The usage-availability setting circuit sets availability for use of the customer information from a person having authority to manage the dealer for each of the dealers. The customer-information managing circuit determines the availability for use based on setting by the usage-availability setting circuit. | 12-03-2015 |
20150363610 | COMMON USERS, COMMON ROLES, AND COMMONLY GRANTED PRIVILEGES AND ROLES IN CONTAINER DATABASES - Techniques for common users and roles, and commonly-granted privileges and roles are described. In one approach, the DBMS of a container database allows for the creation of common roles and common users that are shared across the container database. Thus, when a common role or a common user is established, the common role or common user is propagated to each database of the container database. In another approach, the DBMS of a container database allows privileges and roles to be granted commonly or locally. When a privilege or role is granted commonly, the privilege applies in each of the databases of a container database. When a privilege or role is granted locally, the privilege applies only in the database to which the grantor of the privilege or role established a connection. | 12-17-2015 |
20160125190 | MANAGING SHARED INVENTORY IN A VIRTUAL UNIVERSE - A method and system for managing shared inventory in a virtual universe. A received owner request from an owner of an inventory item designates the inventory item as a shared inventory item. The owner request specifies terms and conditions under which the inventory item may be shared for use by users other than the owner. In response to receiving the owner request, metadata comprising the terms and conditions is generated. It is ascertained that the terms and conditions in the received metadata permit use of the shared inventory item by a particular user from whom a user request to use the shared inventory item had been received and in response, the shared inventory item for use of the shared inventory item by the particular user is rendered, The particular user is not the owner. | 05-05-2016 |
20160164873 | ACCESS CONTROL FOR EVENT DATA STORED IN CLOUD-BASED DATA STORES - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 06-09-2016 |
20160171235 | INTELLIGENT DATABASE WITH SECURE TABLES | 06-16-2016 |
20160171236 | INTELLIGENT DATABASE WITH SECURE TABLES | 06-16-2016 |
20160188901 | Database Virtualization - Aspects of the subject matter described herein relate database virtualization. In aspects, clusters of database servers may be located at various locations of the Internet. When a client seeks to access a logical database, the client may send a logical server and logical database name in a data structure. These names may be used to find a physical server(s) and database(s) that correspond to the logical database. Once the location is determined, a proxy component is used to intercept and/or forward communications between the client and the physical server(s) and database(s) corresponding to the logical database. Using this system, a client may access data from a logical database without knowing the physical address of the logical user database. | 06-30-2016 |