Patent application number | Description | Published |
20120167196 | Automatic Virtual Private Network - An embodiment of the invention provides a method for secure access to data a VPN. Parameters for connecting to the VPN are established by a VPN manager connected to a local network and a user connected to a remote network, wherein an automatic VPN identification number is generated based on the parameters. A remote IP address is installed on an automatic VPN device of the user. The automatic VPN identification number is tied to an access list; and, the access list is attached to the automatic VPN device of the user. A request to access the VPN is received from the user. Access to the VPN is provided through a secure encryption tunnel if the request includes the automatic VPN identification number. The secure encryption tunnel provides automatic access to multiple sites within the VPN without the user having to re-enter the automatic VPN identification number. | 06-28-2012 |
20120172100 | Virtual Lesson Plan Integration - A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determine whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student. | 07-05-2012 |
20130254275 | DYNAMIC MESSAGE RETRIEVAL - Methods and systems for dynamically changing a message retrieval scheme during runtime include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme. | 09-26-2013 |
20130254318 | DYNAMIC MESSAGE RETRIEVAL - Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme. | 09-26-2013 |
20140101324 | DYNAMIC VIRTUAL PRIVATE NETWORK - Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information. | 04-10-2014 |
20140101325 | DYNAMIC VIRTUAL PRIVATE NETWORK - Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information. | 04-10-2014 |
20140178852 | Virtual Lesson Plan Integration - A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determines whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student. | 06-26-2014 |
20140201826 | ID USAGE TRACKER - There is provided a system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the user to enter a shared credential associated with the multi-user operating system and an individual credential of the user. The system verifies the entered shared credential and the entered individual credential. The system grants the access to the user if both the entered shared credential and the entered individual credential are verified. The system tracks commands entered by the user granted the access via the entered shared credential while the user is using the multi-user operating system. The tracked commands indicate the entered individual credential. | 07-17-2014 |