Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


19th week of 2009 patent applcation highlights part 58
Patent application numberTitlePublished
20090119308METHOD AND SYSTEM FOR TRANSLATING TEXT INTO VISUAL IMAGERY CONTENT - A method, system, and computer program product are provided for translating text into visual imagery content. A request is received to identify at least one image associated with a text value. At least one association category from a plurality of association categories is identified with which to perform a search. A data structure is searched, using the at least one association category, for an identification of the at least one image that is associated with the text value. The at least one image is a visual representation of the text value. At least one image is retrieved in response to identifying at least one image associated with the text value. The at least one image is presented in a graphical user interface to a user.2009-05-07
20090119309SYSTEM AND METHOD FOR ANALYZING DATA IN A REPORT - A method and a system for analyzing a data value of interest in a multidimensional database. The data value of interest is first identified in a structured report. The data source for the structured report is retrieved. A context for the data value of interest in the data source is collected, for example, by extracting a slicer from the structured report, by extracting members of master-detail pages, or by extracting a default measure from the structured report. An analysis specification based on the collected context is then built, and the data value of interest is analyzed using the analysis specification. The result from analyzing the data value of interest may be presented in an analysis view.2009-05-07
20090119310SAVING AND RESTARTING DISCRETE EVENT SIMULATIONS - Method, system, and computer program product for saving and restarting discrete event simulations are provided. A discrete event simulation of a scenario is performed via a process executing on a system. The process includes one or more application threads. A checkpoint of the process is created at a point in time when a command to save the discrete event simulation of the scenario is received. The checkpoint includes data elements of the process and the one or more application threads of the process that are stored in components of the system at the point in time. These data elements reflect a state of the process and the one or more application threads of the process at the point in time. The checkpoint is saved to one or more files in the system that are usable to later restart the discrete event simulation of the scenario from the point in time.2009-05-07
20090119311SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR IN-PLACE MODEL ATTRIBUTE COMPARISON - Systems, methods and computer products for comparing computer models to show differences. Exemplary embodiments include a method for examining changes to a data model in a computer system having a keyboard and a display, the method including examining a computer model having a plurality of model attributes, identifying each model attribute and assigning a unique identifier to each model attribute, storing information about each uniquely identified model attribute, collecting data related to edits performed on of each of the uniquely identified model attributes, providing a user selectable comparison for each of the uniquely identified model attributes such that when a model attribute is selected, data particular to the model attribute is extracted using the unique identifier from a previous iteration of the model attribute and presenting the extracted data next to the current iteration of the model attribute to allow a visual comparison of the two iterations.2009-05-07
20090119312Taxonomy tool - In one general aspect, the present disclosure is directed to a system for describing information. This system may comprise at least one processor. The at least one processor may be configured to receive a taxonomy that may comprising a metric hierarchy and a plurality of entity hierarchies. The at least one processor may also be configured to display an indication of a metric selected from the metric hierarchy. In addition, the at least one processor may be configured to display a representation of at least a portion of a second hierarchy selected from the plurality of entity hierarchies. The representation may comprise an indication of a branch of the second hierarchy and an indication of a relationship between the branch of the second hierarchy and the metric.2009-05-07
20090119313Determining structure of binary data using alignment algorithms - Systems and methods for determining structure of two or more binary data strings. The method may comprise the steps of: (1) sorting the data strings by similarity; (2) recursively aligning the data strings; and (3) creating a length-based schema map of similar segments in the data strings. Global and/or local recursive alignment algorithms may be used to align the data strings. The Needleman-Wunsch algorithm could be used for the global alignment and the Smith-Waterman algorithm could be used for the local alignment. A Bayesian classifier could be used to sort the data strings by similarity. Also, the sorted data strings could be scored for similarity prior to the recursive alignment. The length-based schema map of similar segments may be created following the recursive alignment based on: (1) a gap fielding analysis that determines the size of gaps in the data strings detected in the recursive alignment; (2) a gap variance analysis that determines the variance in the size of the gaps; and (3) a data type detection analysis that detects the type of data represented by the segments.2009-05-07
20090119314Method for Storing Individual Data Elements of a Scalable Bit Stream in File, and Associated Device - Data elements of a scalable data flow are individually stored in at least one file with quality levels of the scalable data flow described by at least one scaling feature in respective scaling levels and at least one data element is associated with every scaling level of the scaling features. A processing index is allocated to each data element so that only data element(s) having a value lower than that processing index must be taken into consideration for processing. At least one descriptive list, containing descriptive elements associated with the data element, namely the scaling level of the respective scaling features, the time index and/or the processing index, is stored in one of the files.2009-05-07
20090119315SYSTEM AND METHOD FOR PAIRING IDENTIFICATION DATA - Embodiments of the present invention relate to a system and method for linking at least two unique identifying data points together for the purpose of simplifying a search or data entry process. In one embodiment of the present invention, a method of pairing identification data comprising providing a database for storing a first data set having individual source data and a second data set having individual destination data correlating to individual source data in the first data set, accessible via a global computer network, providing a data entry portal for entering input data, accessible from a user's computer via the global computer network, comparing input data to specific individual source data in the first data set, and supplying the user's computer with specific individual destination data, correlating to the specific individual source data, wherein the specific individual destination data comprises a specific uniform resource locator.2009-05-07
20090119316Schema Indication System and Method in a Network Environment Including IMS - In one embodiment, a scheme is disclosed for indicating schema information relating to one or more content types of a message body comprised within a message of a communication protocol. A communication protocol message such as a SIP or HTTP message is generated by a sender towards a recipient, wherein the message includes at least one message body part according to a variation of a media type. An indication is included in the communication protocol message to indicate one or more variations of a media type applicable to the message body part.2009-05-07
20090119317CATCH PHRASE GENERATION DEVICE - A catch phrase generation device stores keywords in association with each other. Each keyword indicates a characteristic of a user, and a property to which each of keywords belongs. A plurality of templates are also stored. Each template has an insertion section for which a keyword property that should be inserted is determined in advance. A template corresponding to guidance information based on a predetermined condition is selected. A keyword acquisition unit analyzes an access history, which has been created by the user or to which the user has made reference, and acquires, based on an analyzed result, a stored keyword.2009-05-07
20090119318INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information processing apparatus capable of collecting electronic data efficiently and avoiding sharing highly confidential and secure electronic data with an indefinite number of users. The information processing apparatus is connected to an external apparatus through a network. The information processing apparatus receives electronic data from the external apparatus, registers attribute information related to the received electronic data in association with the received electronic data so that the received electronic data can be retrieved by using the attribute information, and controls the registering unit so as to register the attribute information related to the received electronic data when the received electronic data is not confidential data, and so as not to register the attribute information related to the received electronic data when the received electronic data is confidential data.2009-05-07
20090119319SYSTEM FOR DETECTING MIGRATION DIFFERENCES OF A CUSTOMIZED DATABASE SCHEMA - Provided is a database schema migration difference detecting technique for detecting differences of a customized database schema before and after database migration by using XML technology, including: extracting a first database schema from a fresh database of a release and saving the first database schema in a first XML file; extracting a customized database schema from a customized database of the release and saving the customized database schema in a second XML file; comparing the first and second XML files, filtering the identical content in the first and second XML files and saving differences in a delta XML file; and comparing the delta XML file with a new database to detect a state of the customized database schema after migration. The detecting state indicates whether there is any loss or change in the customized database schema after migration, as well as, conflicts with the database schema in a database of a new release.2009-05-07
20090119320METHOD AND SYSTEM FOR ENCODING DATA - A method and system for encoding the output data created by a simulator is provided. The method and system may generate smaller output data files or output databases than those created by known techniques. The method and system may also allow for accessing and manipulating the compressed data. The method and system may also significantly increase the speed for manipulating the output data utilizing various calculations.2009-05-07
20090119321METHODS AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING LOW-COST POINTER COMPRESSION AND DECOMPRESSION - Prior art attempts to provide 32-bit addressing within a 64-bit computing environment lead to other complications. Hardware solutions result in more complicated hardware which, in turn, increases costs and may reduce the functionality of 64-bit computing and significant changes to commercially available 64-bit processors. Alternatively, previous software solutions are computationally expensive, requiring add and subtract routines convert between 32-bit addresses and 64-bit addresses. An additional problem, specific to IBM™ zSeries hardware, is that the only way to provide a heap size larger than 2 GB, even if less than 4 GB, is to employ the 64-bit addressing in combination with a computationally expensive software patch to emulate 32-bit addressing. By contrast, provided by aspects of the present invention there are systems, methods and computer program products for implementing low-cost pointer compression and decompression. In accordance with more specific aspects of the invention, the systems, methods and computer program products for implementing low-cost point compression and decompression can be specifically adapted to compress 64-bit pointers to 32-bit pointers, and conversely convert 32-bit pointers to 64-bit pointers.2009-05-07
20090119322SYSTEM AND METHOD FOR MANAGING CONTENT - A system for managing media files having different format characteristics includes a transcoder, a content store, and a plurality of clients. The content store is capable of storing a media file in a first format. The clients are each associated with one or more media file formats and capable of playing media files to users. The transcoder is capable of receiving a request identifying a media file from a first client and, in response to receiving the request, retrieving the media file from the content store in a first format. The transcoder is also operable of modifying the media file from the first format to a second format associated with the first client and, while modifying the media file from the first format to the second format, transmitting a modified portion of the media file to the first client.2009-05-07
20090119323Method and system for reducing a data set - System and methods are provided for applying a dimensionality reduction process to a data set. The method includes obtaining a data set including a first set of variables and identifying collections of the first set of variables for replacement by a second set of variables. The method also includes replacing the collections of the first set of variables with the second set of variables and eliminating the first set of variables from the data set.2009-05-07
20090119324INTELLIGENT AND PAPERLESS OFFICE - The claimed subject matter provides a system and/or a method that facilitates collecting and organizing electronic documents. An interface component can receive a document. A manager component can automatically file the document into a category based at least in part upon a portion of static metadata associated with the document and a portion of metadata dynamically generated from an inference related to the portion of static metadata associated with the document.2009-05-07
20090119325AUTOMATED METHOD FOR DETECTING AND REPAIRING CONFIGURATION CONFLICTS IN A CONTENT MANAGEMENT SYSTEM - Embodiments of the invention provide for detecting and (in at least some cases) repairing XML configuration conflicts in a content management system (CMS). One method allows a CMS to evaluate various configuration components and determine when those components may conflict with one another. If a conflict is detected, the CMS may be configured to notify an administrator of the problem, and in some cases, correct the problem. As a result, administrators may not have to carefully evaluate each configuration file associated with a document type definition for a given document type before creating or modifying a content processing rule.2009-05-07
20090119326MESSAGE CONTROLLER WITH DYNAMICALLY LOADABLE MESSAGE DESCRIPTOR - A dynamic message controller is provided. The message provider includes a plurality of message descriptors and a message parser. Each message descriptor includes a unique pattern for a message that corresponds to a specific type of message received by the message controller. The message parser module is configured to match incoming messages with a select one of the message descriptors based on matched message patterns. The message parser module is further configured to load the matched message descriptor and parse an associated incoming message based on the matched message descriptor.2009-05-07
20090119327R-SMART PERSON-CENTRIC NETWORKING - Implementations related to r-smart person-centric networks are disclosed.2009-05-07
20090119328Bookmarks for program note information - Systems and methods for saving information related to selected media content are provided. The user may select a particular media item (e.g., a television program) and view information associated with the selected media. In response to a user request to save or bookmark the information associated with the media for future retrieval, the interactive media guidance application may save the viewed information (e.g., set a flag or setting to prevent the information from being deleted from a source). The user may later view listings of bookmarked information, select a listing, and display again the saved information. In some embodiments, the user may direct the interactive media guidance application to perform an interactive media guidance application operation (e.g., view, record, reminder or purchase) on a program related to the saved information or on a listing of bookmarked information (e.g., move, delete, copy, or set priority).2009-05-07
20090119329SYSTEM AND METHOD FOR PROVIDING VISIBILITY FOR DYNAMIC WEBPAGES - A system and method for providing visibility to dynamic webpages may include a static content database and a processor configured to, responsive to a request from a terminal for a dynamic webpage: generate the dynamic webpage; provide a static copy of the dynamic webpage for storage in the static content database; and transmit the dynamic webpage to the terminal. The processor is further configured to provide the static copy of the dynamic webpage to a webcrawler.2009-05-07
20090119330SYSTEMS AND METHODS FOR STORING, ANALYZING, AND RETRIEVING MEDICAL DATA - Physiological information obtained from a medical patient can be stored in a dynamic round-robin database. Parameter descriptors may be used to identify parameter values in the records. The parameter values can be dynamically updated by changing the parameter descriptors to provide for a flexible database. In addition, the size of files used in the database can be dynamically adjusted to account for patient condition. In certain implementations, the round-robin database can be adaptive, such that an amount of data stored in the database is adapted based on patient condition and/or signal condition. Additionally, medical data obtained from a clinical network of physiological monitors can be stored in a journal database. The medical data can include device events that occurred in response to clinician interactions with one or more medical devices and device-initiated events, such as alarms and the like. The journal database can be analyzed to derive statistics, which may be used to improve clinician and/or hospital performance.2009-05-07
20090119331DATA CONVERSION SYSTEM - A data conversion system and method are provided. Specifically, under the present invention, a collection of data records is received from a first application. The data records include data fields for storing data entries, with at least one of the data fields including multiple data entries. Each data entry is tagged with a corresponding data header (meta data) and individually arranged, along with a corresponding record identifier, into a separate row of a table. This eliminates any multiple value data fields so that the data can be more accurately manipulated and reported by a second application.2009-05-07
20090119332Method And System For Providing A Media Transition Having A Temporal Link To Presentable Media Available From A Remote Content Provider - Methods and systems are described for providing a media transition having a temporal link to presentable media available from a remote content provider. One method includes receiving user input for presenting a media grouping comprising a plurality of media objects including stored media files and a media transition. When the media grouping is presented, the stored media files and the media transition are presented in an interleaved manner. The method further includes receiving an indication that presentable media associated with the media transition is available from a remote content provider, and in response to receiving such an indication, providing in the media transition a temporal link to the presentable media available from the remote content provider. The temporal link is enabled for activation via a user interface only while the media transition is presented so that the associated presentable media is presented when the temporal link is activated.2009-05-07
20090119333Methods, Systems, And Computer Readable Media For Associating Information With A Digital Image - The subject matter described herein includes methods, systems, and computer readable media for associating information with a digital image. According to one method, a digital image having associated metadata that corresponds to a first entity in a dataset that includes hierarchical relationships between entities is received. A subject perspective is identified for the digital image for a subject corresponding to a second entity in the dataset. Information for the digital images retrieved from the dataset based on a hierarchical relationship between the first and second entities in the dataset. The retrieved information is associated with the digital image.2009-05-07
20090119334Interleaving Ad Hoc and Structured Business Processes - A system and method are provided for managing a workflow for a document. An electronic form is created for receiving data pertaining to a workflow. A content integration template locates and exposes data fields in the electronic form. A document workflow defines states of the document, transitions between states, and actions for each state.2009-05-07
20090119335ACTIVE BUTTON - Provided is an active button including a contents output unit for outputting contents, and a button for acting, when selected, as a trigger to make access to a specific information source registered. Further included is means for acquiring button recommending information indicating that the specific information source can provide information relating to the contents. In case the button recommending information is acquired, a button mode is changed to inform a viewer of that acquisition.2009-05-07
20090119336APPARATUS AND METHOD FOR CATEGORIZING ENTITIES BASED ON TIME-SERIES RELATION GRAPHS - The present invention provides an apparatus and a method for categorizing entities based on time-series relation graphs. In each of the time-series relation graphs within a prescribed time period, nodes represent entities, and links between the nodes represent entity relations in a corresponding time unit. The inventive apparatus for categorizing entities based on time-series relation graphs comprises: a time-series relation graph categorizing means for categorizing the nodes in each of the time-series relation graphs to generate a node category result for the corresponding time unit in time sequence; and a category result post-processing means for post-processing all the node category results for the corresponding time units in time sequence generated by the time-series relation graph categorizing means to generate finally categorized nodes.2009-05-07
20090119337INDIVIDUAL ASSESSMENT AND CLASSIFICATION OF COMPLEX DISEASES BY A DATA-BASED CLINICAL DISEASE PROFILE - An tool and method is disclosed to assess disease activity and to classify complex diseases using basic clinical data. The tools and methods allow identifying and consulting affected individuals based on comprehensive bedside examinations and thus provide a basis for the personalized management of complex diseases.2009-05-07
20090119338Computerized hazardous material response tool - A computer-based method and apparatus for identifying hazardous materials based on observable physical properties and signs and systems of exposure to the hazardous materials. The observable physical properties are obtained by preprocessing plain language data to obtain normalized descriptors and modifiers pertaining to a plurality of properties and signs and symptoms. The normalized descriptors and signs and symptoms are presented to a user in lists for comparison with a sample in the field. Once a material is identified, information can be obtained from the apparatus which is necessary for response to an incident involving the hazardous material. The preferred embodiments of the invention are particularly useful to responders to a hazardous waste incident.2009-05-07
20090119339PHONE TO PHONE DATA EXCHANGE - An information management system for operation over a network includes a first mobile device having a first application module, the first mobile device operating over the network and in communication with a second mobile device having a second application module, a first operating system residing on the first mobile device configured to detect a communication event between the first mobile device and the second mobile device, and an address book module residing on the second mobile device. The first application module is configured to send information associated with the first mobile device to the second mobile device in association with a detection of the communication event.2009-05-07
20090119340FEDERATED INFORMATION MANAGEMENT - A method for management of federated information in associated knowledge systems. The method includes maintaining a data structure, the data structure including associative metadata that correlates a plurality of substantive knowledge entities from a plurality of disparate knowledge bases; monitoring the substantive knowledge entities for an access-limiting event; determining the access-limiting event on at least one of the substantive knowledge entities; and responsive to determining the access-limiting event, adding to the associative metadata a persistent audit enhancement indicative of the access-limiting event, the persistent audit enhancement including a timestamp. The access-limiting event may include deletion of a substantive knowledge entity, enacting more restrictive access permissions for a substantive knowledge entity, and copying of a substantive knowledge entity to a more restrictive access area.2009-05-07
20090119341METHOD AND APPARATUS FOR REMOVING ENCRYPTED FILES UNASSOCIATED WITH A USER KEY FROM AN ARCHIVE - The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.2009-05-07
20090119342Computer enabled method and apparatus to inhibit content and other copying - Provided here is a copy protection method and apparatus to confuse currently available personal computer software (and other content) copying packages by use of unexpected (“illegal”) special characters in the volume (or directory) name for the software or other content or data subject to being copied. This method can be used alone or with a broad range of other known copy protection technologies such as RipGuard (available from Macrovision Corp.). Also provided here is a method and apparatus to defeat the confusion method, thereby allowing copying of such copy protected software.2009-05-07
20090119343Dynamic reduction of dimensions of a document vector in a document search and retrieval system - The method and system of the invention involves processing each new document (2009-05-07
20090119344METHOD AND APPARATUS FOR SPLITTING A REPLICATED VOLUME - At least two replicated instances of a source volume are split while allowing clients to access data moved during the split. Clients are redirected to the first replicated instance of the source volume. The first replicated instance is split by first moving files in a split path from the first replicated instance to the target volume. Then, after the files in the split path have been successfully moved to the target volume, a junction is inserted at the split directory to redirect clients to the target volume. After the first replicated instance is split, a second junction replaces the split path on the replicated instance of the first replicated instance.2009-05-07
20090119345RESOLVING CONFLICTS WHEN IMPORTING AN APPLICATION CUSTOMIZATION - A conflict resolution system allows an end user to export customizations to an application program so that the customizations can be imported by another end user. The conflict resolution system may export a customization by outputting metadata describing the customization. When the customization is a custom property, the metadata may include the name of the entity with which the property is associated, the name of the property, the type of the property, a globally unique identifier for the property, the location on the user interface for the input field for the custom property, and so on. End users may want to share not only their customizations but also the underlying data associated with a customization. When a conflict occurs during import of a customization alone without the data, then the conflict resolution system resolves the conflict in favor of the imported property. When a conflict occurs during import of a customization with data, the conflict resolution system resolves the conflict in favor of the existing property.2009-05-07
20090119346AUTOMATIC ERROR CORRECTION FOR REPLICATION AND INSTANTANEOUS INSTANTIATION - An approach is provided to automatically resolve conflict between instantiation and ongoing data replication operations. In an embodiment, incremental change records that describe one or more database operations are received at a sink entity. Here, all of the one or more database operations have occurred in a second database after a particular time. A first database operation in the one or more database operations to a particular row in the first database is applied. When a conflict with a second database operation that operates on the particular row is detected, one or more compensating actions, which may, but are not limited to, be a different database operation and/or an operation that creates a conflict log entry, may be performed. Here, the second database operation has occurred in the second database prior to the particular time. When the second database operation is to be performed, an appropriate operation may be performed.2009-05-07
20090119347Data replication method - To ensure data consistency for a new data replica created for a computing system, the transmission and receipt of messages altering the data are monitored and replication of the data is permitted when all changes to the data that have been transmitted to the data have been received.2009-05-07
20090119348DATA STRUCTURE VERSIONING FOR DATA MANAGEMENT SYSTEMS AND METHODS - In one of many possible implementations, an exemplary system includes a data integration subsystem configured to maintain a baseline data structure representing a base set of data relationships. The data integration subsystem in further configure to maintain a mapping of the baseline data structure to local data maintained by a plurality of local data subsystems. The system further includes a portal subsystem configured to provide a first customizable data structure associated with the baseline data structure for user access, create a copy of at least a subset of the baseline data structure, and provide a second customizable data structure associated with the copy of the baseline data structure for user access. The first and second customizable data structures are independently customizable to represent different custom sets of data relationships.2009-05-07
20090119349Methods and Computer Program Products for Efficient Conflict Detection in a Replicated Hierarchical Content Repository Using Replication Anchors - Exemplary embodiments of the present invention relate to a methodology for using replication anchors to detect conflicts within replicated hierarchical content repository. The method comprises locking a data object in the event that an operation applied on the data object is replicated from a first server to a second server, reading a transaction identifier that is associated with the data object, retrieving a transaction sequence value that is associated with the transaction identifier, and determining if a conflict situation exist by comparing the retrieved transaction sequence value with an operation synchronization anchor value, the operation synchronization value being the transaction sequence value of a last transaction from the second server to the first server, wherein a conflict situation is determined to exist in the event that the transaction sequence value is greater than the operation synchronization anchor value.2009-05-07
20090119350FILE RECORDING DEVICE AND IMAGING DEVICE - A file recording device includes a control unit (2009-05-07
20090119351Methods and Computer Program Products for Transaction Consistent Content Replication - Exemplary embodiments of the present invention relate to methodologies, computer program products and systems for the support of content replication, wherein transaction-level data replication consistency is guaranteed. Further, the exemplary methodologies of the present invention can be implemented while incurring little or no additional I/O overhead.2009-05-07
20090119352Method for Optimizing Generational Garbage Collection Through Object Life Heuristics - A method and apparatus to determine if an object should be instantiated in a nursery space or in a long lived space. Information as to real or estimated longevity of an object instantiated from a class is used to cause instantiation in the long lived space if the object instantiated is likely to be relatively long lived. Otherwise, default instantiation is made to a nursery space in which frequent garbage collection is performed to free up space by eliminating objects that are no longer used.2009-05-07
20090119353SOLID STATE MEMORY (SSM), COMPUTER SYSTEM INCLUDING AN SSM, AND METHOD OF OPERATING AN SSM - In one aspect, a determination is made as whether partition metadata of a solid state memory has changed, and if so, the partition metadata is analyzed to locate invalid data stored in the solid state memory. This analysis may include determining that a file system type of a partition has changed, and invalidating data in response to the changed file system type. Alternately, or in addition, the analysis may include determining that a partition has changed, and invalidating data in response to the changed partition.2009-05-07
20090119354METHOD, SYSTEM, AND PROGRAM IMPLEMENTING RETENTION POLICIES TO ARCHIVE RECORDS - Provided are a method, system, and program for receiving a request to remove a record. A determination is made as to whether a state associated with the record includes at least one hold state and whether the state associated with the record includes at least a retention period that has not expired. The request to remove the record is denied in response to determining that the state associated with the record includes at least one of at least one hold state and one retention period that has not expired.2009-05-07
20090119355ARITHMETIC LOGICAL UNIT, COMPUTATION METHOD AND COMPUTER SYSTEM - This arithmetic logical unit outputs data to be used in checking the final result of an AES unit that encrypts a plain text block into an encrypted text block based on AES operation, and includes an arithmetic unit for computing parity data created based on XOR operation from an encryption key to be used as a key during AES encryption, parity data created based on XOR operation from a plain text block, and an AES operation halfway result output from the AES unit, and outputting a value that is equivalent to parity data created based on XOR operation from the final result of the AES unit.2009-05-07
20090119356METHOD FOR REDUCING DIGITAL FILTER COEFFICIENT WORD SIZE AND APPARATUS THEREFOR - Electronic component resource utilization for certain digital filters may be significantly reduced by using a method for determining a set of coefficient words using a smaller word size. The disclosed method and/or apparatus may be used to determine an initial set of coefficient words for a digital filter for a predetermined frequency, a predetermined quality factor (“Q”), and a predetermined sampling frequency, and determining a gain error value for the digital filter for the set of coefficient words. If the determined gain error value is greater than a predetermined threshold, the quality factor may be modified by multiple predetermined amounts. The set of coefficient words may be redetermined using the modified quality factors as often as necessary until the gain error drops below the predetermined threshold.2009-05-07
20090119357ADVANCED CORRELATION AND PROCESS WINDOW EVALUATION APPLICATION - A method only has the user input (or select) a data type, a report key, a dependent variable table, and/or filtering restrictions. Using this information, the method automatically locates independent variable data based on the data type and the report key. This independent variable data can be in the form of a table and comprises independent variables. The method automatically joins the dependent variable table and the independent variable data to create a joint table. Then, the method can automatically perform a statistical analysis of the joint table to find correlations between the dependent variables and the independent variables and output the correlations, without requiring the user to input or identify the independent variables.2009-05-07
20090119358Computational method, system, and apparatus - A method, system, and apparatus for performing computations.2009-05-07
20090119359Server, computerized network including same, and method for increasing level of efficiency of a network - A data access engine 2009-05-07
20090119360CONDITION CONTROL SYSTEM, DEVICE AND PROCESS FOR MESSAGE TRANSMISSION - The invention concerns in particular a system comprising: a first terminal (2009-05-07
20090119361CACHE MANAGEMENT FOR PARALLEL ASYNCHRONOUS REQUESTS IN A CONTENT DELIVERY SYSTEM - Embodiments of the present invention provide a method, system and computer program product for cache management in handling parallel asynchronous requests for content in a content distribution system. In an embodiment of the invention, a method for cache management method for handling parallel asynchronous requests for content in a content distribution system can include servicing multiple parallel asynchronous requests from different requesting clients for a page before all fragments in the page have been retrieved by returning previously cached ones of the fragments to the requesting clients and returning remaining ones of the fragments in the page to the requesting clients as retrieved from non-cached storage. The method further can include assembling the page once all fragments in the page have been retrieved from non-cached storage. Finally, the method can include caching the assembled page to subsequently service requests for the page.2009-05-07
20090119362APPLICATION/DATA TRANSACTION MANAGEMENT SYSTEM AND PROGRAM FOR THE SAME - The present invention serves to produce good performances of the server side regardless of the increase or decrease in the data amount and enables to intercommunicate regardless of the difference in the data format of each client.2009-05-07
20090119363WEB SHARING SYSTEM, CLIENT DEVICE, AND WEB SHARING METHOD USED FOR THE SAME - Multiple client devices which enable operation of a Web browser thereon each include a relaying client for rewriting, between the Web browser and a network, the URL of a Web page requested by the Web browser to description for obtaining the Web page via a Web sharing server. A web sharing server for causing a Web page to be shared by the client devices via the network retrieves the Web page requested by the Web browser based on the URL rewritten by the relaying client, and delivers the retrieved Web page to the Web browsers of the client devices that belong to the same group.2009-05-07
20090119364METHOD AND SYSTEM FOR EXCHANGE OF DATA BETWEEN REMOTE SERVERS - A method and a system for exchanging data between a first server (2009-05-07
20090119365Method and apparatus for display synchronization using image compression - Methods and apparatuses for synchronizing displays of a local and a remote device using image compression to achieve efficiency gains are disclosed. A local device requests an update for a particular requested region of a remote device's display, receives an update region which is a portion of the requested region, and updates a stored local representation of the remote display based on the update region. A remote device compares, upon a request from a local device for an update, portions of the old and new stored images corresponding to the requested region. Compared pixels are then encoded to yield an update region and transmitted to the local device. In the encoding, pixels which changed between the old image and the new image are encoded opaque and with the color corresponding to the pixels in the new image, and at least one pixel which did not change between the old image and the new image is encoded transparent.2009-05-07
20090119366Routing incoming call requests - A storage medium and computer system that in an embodiment dynamically allocate client requests to target servers based on prepare messages sent by the target servers. The addresses of target servers are added to a queue in response to the prepare messages from the target servers. A network interface is then prepared to receive an incoming call request from a client. After the call request arrives from a client, one of the addresses is selected from the queue. The call request is then sent through a tunnel to the target server associated with the selected address.2009-05-07
20090119367METHOD AND SYSTEM FOR PROVIDING SERVICE FUNCTIONS - A method for providing service functions includes: the service provider side receives a service request from the service requestor side, screens service functions requested by the service request and forms a service request result, and sends the service request result to the service provider side. A system for providing service functions includes: a service server on the service provider side, adapted to return the requested service to the service requestor side, according to the service request of the service requestor side; a function screener, connected to the service server on the service provider side and adapted to screen service functions requested by the service request and send the after-screening result to the service server on the service provider side. With the present invention, it is possible to control and screen functions of a service dynamically in real time without affecting the network performance.2009-05-07
20090119368SYSTEM AND METHOD FOR GATHERING CONVERSATION INFORMATION - A method and computer program product for receiving a request for conversation information, from a requester, concerning an online user of an instant messaging system. The conversation information concerning the online user is obtained and provided to the requestor.2009-05-07
20090119369Collaborative editing in a video editing system - Included are embodiments of a method for collaborative editing. At least one embodiment includes receiving an indication to include at least one media effect with at least one media segment and sending at least one media attribute associated with the at least one media segment to a remote server. Some embodiments include receiving data related to at least one determined media effect, the at least one determined media effect being determined from the at least one media attribute.2009-05-07
20090119370SYSTEM AND METHOD FOR DYNAMIC TAGGING IN EMAIL - A method and computer program product for dynamically sharing tags associated with an email including associating one or more tags with an email after the email has been sent. The one or more tags are made accessible to at least a portion of one or more email users.2009-05-07
20090119371SYNCHRONIZATION OF QUESTIONS AND ANSWERS IN A COLLABORATIVE MESSAGING ENVIRONMENT - Embodiments of the present invention address deficiencies of the art in respect to question and answer management in a collaborative environment, and provide a novel and non-obvious method, system and apparatus for synchronizing questions and answers in an instant messaging session. In one embodiment of the invention, a method of synchronizing questions and answers in an instant messaging session can be provided. The method can include maintaining an instant messaging session between first and second participants, identifying questions and answers in the instant messaging text, matching each of the answers to a corresponding one of the questions, and displaying the matched questions and answers supplementally to the displaying of the chat transcript, ensuring that a participant does not overlook a question where response on their part is required.2009-05-07
20090119372SYSTEM AND METHOD FOR PROVIDING EMAIL WARNINGS - A system and method for providing an email warning including analyzing one or more communication activities of a user. A pattern of communication activity may be defined based upon, at least in part, the analyzed one or more communication activities of the user. An attempted communication activity may be compared to the pattern of communication activity. A notification may be provided to the user if the attempted communication activity is inconsistent with the pattern of communication activity.2009-05-07
20090119373SYSTEM AND METHOD FOR CONTROLLING INSTANT MESSAGING STATUS - A method and computer program product or managing instant messaging status include identifying an instant messaging unavailable status for a user, and identifying a point-in-time collaborative intersection between the user and one or more collaborative users. The instant messaging unavailable status of the user is penetrated to allow instant messaging communications from at least a portion of the one or more collaborative users during the point-in-time collaborative intersection.2009-05-07
20090119374ADAPTIVE INSTANT MESSAGING AWARENESS - Embodiments of the present invention address deficiencies of the art in respect to presence awareness for instant messaging and provide a novel and non-obvious method, system and computer program product for adaptive instant messaging awareness. In an embodiment of the invention, a method for adaptive instant messaging awareness can be provided. The method can include overriding an instant messaging system presence awareness do not disturb state for a user of an instant messenger in the instant messaging system in response to determining a contemporaneously calendared event for the user.2009-05-07
20090119375METHOD AND SYSTEM FOR OPTIMIZING DELIVERY OF MOBILE CONTENT USING DIFFERENTIAL METADATA UPDATES - A method of and system of optimizing content delivery within a content delivery channel at a processing element in a dynamic content delivery architecture, the content delivery channel having a plurality of logical or physical content types or a plurality of sub-channels, the method: receiving an envelope at the processing element, the envelope containing one or both of content and metadata; checking any received metadata to determine whether the received metadata comprises metadata for a subset of the plurality of logical or physical content types or plurality of sub-channels for the content delivery channel at the processing element; if the received metadata contains or refers to metadata for a subset of the plurality of logical or physical content types or plurality of sub-channels for the content delivery channel at the processing element, extracting the metadata; and applying the extracted metadata to any received content belonging to the subset of the plurality of logical or physical content types or a plurality of sub-channels for the content delivery channel at the processing element.2009-05-07
20090119376Hint-Based Email Address Construction - Methods, apparatus, and products are disclosed for hint-based email address construction that include: receiving, in an email address constructor, an email address hint specified by a user, the email address hint representing an email address for an email recipient; parsing, by the email address constructor, the email address hint for a plurality of hint tokens, each of the hint tokens specifying a user attribute for the email recipient, and at least one of the hint tokens specifying an attribute other than the email recipient's name; and determining, by the email address constructor, the email address for the email recipient in dependence upon the plurality of hint tokens.2009-05-07
20090119377MANAGING COMMUNICATIONS ON AN R-SMART NETWORK - Implementations related to managing communications on r-smart networks are disclosed.2009-05-07
20090119378CONTROLLING ACCESS TO AN R-SMART NETWORK - Implementations related to controlling access to r-smart person-centric networks are disclosed.2009-05-07
20090119379Rendering of multi-media content to near bit accuracy by contractual obligation - An embodiment of the present invention includes a technique to identify a piece of content. A content identifier is embedded into the piece of content in a pre-determined format. The content identifier identifies the content. The content embedded with the content identifier is encoded into a packaged content to be transmitted from a content provider to a content delivery operator via a transmission medium. The packaged content is delivered to a subscriber by the content delivery operator free of obfuscation according to a contractual agreement between the content provider and the content delivery operator such that the content identifier is preserved for identification of the content.2009-05-07
20090119380Schema Negotiation for Versioned Documents Transmitted in a Distributed Environment - In one embodiment, a scheme is disclosed for negotiating schema information relating to one or more content types of a message body comprised within a message of a communication protocol. A communication protocol message such as a SIP or HTTP message is generated by a sender towards a recipient, wherein the message includes a message body. A schema indicator is provided in the communication protocol message to indicate acceptability of variations of a content type of a message body or body part in a response from the recipient.2009-05-07
20090119381System and Method of Responding to a Request in a Network Environment Including IMS - In one embodiment, a scheme is disclosed for facilitating responding to a request in a network environment including IMS. A component associated with a recipient is configured to receive an incoming message from a sender, wherein the incoming message is substantially free of an indication of acceptance by the sender of a body of a particular content type. A component associated with the recipient is configured to provide an outgoing message including at least one body of the particular content type.2009-05-07
20090119382Content Disposition System and Method for Processing Message Content in a Distributed Environment - In one embodiment, a scheme is disclosed for interpreting contents of at least one message body per message, e.g., a SIP or HTTP message, wherein the message body contents correspond to a content type. A communication protocol message such as a SIP or HTTP message is generated by a sender towards a recipient, wherein the message includes at least one message body content in the message's body. A component associated with the recipient is configured to examine whether at least one indicator is associated with the message. A component, operable responsive to the examination, is configured to inhibit a treatment of the message body content and to apply an alternative treatment with respect thereto.2009-05-07
20090119383END TO END DATA TRANSFER - A method, apparatus and system for data transfer is disclosed. For example, settings from multiple entities arranged in a multi-tier control plane are used to set data transfer policies. The policies are use to govern data transfers such as between end users or from an origin server.2009-05-07
20090119384Multi-Path Gateway Communications Device - Methods, systems, and apparatuses are disclosed for enabling a virtual personalized network. Communications are established with a personal digital gateway to control access, sharing, security, and/or management of up-to-date personalized data exchanged between or among a plurality of associated communications devices and/or communications networks. The associated communications devices are owned, operated, and/or accessed by a common user.2009-05-07
20090119385INTEGRATION OF A COMPUTER-BASED MESSAGE PRIORITY SYSTEM WITH MOBILE ELECTRONIC DEVICES - Methods for integrating mobile electronic devices with computational methods for assigning priorities to documents are disclosed. In one embodiment, a computer-implemented method first receives a new document such as an electronic mail message. The method assigns a priority to the document, based on a text classifier such as a Bayesian classifier or a support-vector machine classifier. The method then alerts a user on an electronic device, such as a pager or a cellular phone, based on an alert criteria that can be made sensitive to information about the location, inferred task, and focus of attention of the user. Such information can be inferred under uncertainty or can be accessed directly from online information sources. One embodiment makes use of information from an online calendar to control the criteria used to make decisions about relaying information to a mobile device.2009-05-07
20090119386METHOD AND ARRANGEMENT FOR DATA TRANSMISSION BETWEEN PEER-TO-PEER NETWORKS - A method for data transmission between a first peer device (P2009-05-07
20090119387SYSTEM OF HANDLING A WEB SERVICE CALL - A system for handling a web service call by clients in a communication network is disclosed. The system comprises a client requester for issuing client requests. The client requests may comprise at least one client request to call a web service. The system also comprises a callback web Service that is coupled to the client requester for registering the at least one client request to call a web service and for invoking the called web service. A response web service is coupled to the callback web service for receiving a response to the at least one client request to call a web service and is also coupled to the client requester for delivering the response when a client request to obtain the response is issued from the client requester.2009-05-07
20090119388CONTENT RELAYING DEVICE AND CONTENT RELAYING METHOD - A content relay apparatus and content relay method are provided as an apparatus and method capable of effectively reducing an access time to a content server even in a case where a content is provided to a lot of terminals as receivers.2009-05-07
20090119389METHOD FOR TRANSFERRING FILE IN CONFERENCE SYSTEM, FILE TRANSFER SYSTEM AND CONFERENCE SERVER - A method for transferring a file in a conference system is provided, which includes the following steps. A file sending UE sends a conference identification of the conference to the file receiving UE through a conference server; and sends the file to the file receiving UE through the conference server. A conference server, and a file sending and receiving UE are also provided. In the present invention, when a user sends a file to another user in a conference, a conference identification of the conference, together with the file, is sent to the file receiving user, so that the file receiving user can get to know the conference associated with the file when receiving the file, thereby enhancing the experience enjoyed by the file receiving user.2009-05-07
20090119390Adaptive Resource Management Method and System - A resource management method (2009-05-07
20090119391TARGETED WEB PAGE REDIRECTION - The present invention provides redirection for a web page request for an old URL received at a web server. In an embodiment, a web page request from an end-user is redirected to a Common Gateway Interface (“CGI”) script for handling the web page redirection. In an embodiment, the CGI script includes a routine for matching an old URL to a new URL provided in a lookup table. In an embodiment, each web page of an old URL has a corresponding new URL such that an end-user trying to access a web page using an old URL is always directed to a corresponding new web page, or to a relevant page if a corresponding new page does not exist. In another embodiment, a customized message may be associated with a match between an old URL and a new URL, and the customized message may be displayed prior to redirection.2009-05-07
20090119392METHOD FOR MANAGING DECISIONS, METHOD FOR CONSTRUCTING A DECISION TREE, CENTRAL MANAGER, INTERMEDIATE MANAGER, TERMINAL AND CORRESPONDING COMPUTER PROGRAM PRODUCTS - A method is provided for managing decisions between a central manager and at least one terminal in an architecture of networks distributed and prioritized according to N levels, with N≧2. The central manager is included in a level of rank N. The terminal is included in a level of rank 1. The method includes a step of distributing a decision tree constructed by the central manager and supported by the architecture.2009-05-07
20090119393SYSTEM AND ARCHITECTURE FOR SUPPORTING MOBILITY AND MULTIPATH PACKET DELIVERY IN IP NETWORK STACKS - A communication system is provided. The system has at least two nodes communicating with each other with each nodes associated with an operating system, wherein the operating system comprising a costack adapted to generate a unique or a low probability of overlap CID and intercept packets going down or up the main stack at one or more point of interception; and a subspace of a plurality of connections each connection within the subspace having a unique CID in relation to other connections.2009-05-07
20090119394METHOD AND SYSTEM FOR DETERMINING THE GEOGRAPHIC LOCATION OF A NETWORK BLOCK - Described herein are a method and a system to assign geographic locations to network blocks. A particular embodiment of the system includes a set of intermediate assignment generators, each intermediate assignment generator being associated with at least one of a plurality of network data sources, each intermediate assignment generator being configured to generate an intermediate assignment for at least one of the plurality of network data sources, a set of classifiers each coupled to at least one of the intermediate assignment generators, each classifier being associated with at least one of the plurality of network data sources, each classifier being configured to generate at least one classification based on at least one of the intermediate assignments and corresponding training data, and an intermediate assignment selector to select a best intermediate assignment based on the classifications generated by the set of classifiers, the best intermediate assignment corresponding to a geographic location of a network block.2009-05-07
20090119395Information processing system and data management method - The server device includes: an allocation unit for allocating a unique identifier to each of first data and second data; a management unit for managing a correspondence between the identifier and a method for accessing the first data or second data identified by the identifier; a presentation unit for presenting the identifier managed by the management unit to the client device; a conversion unit for converting an identifier-specifying request for access to the first data or second data from the client device into a method for accessing the first data or second data corresponding to the identifier using an access method associated by the management unit with the identifier; and a data access unit for requesting access to the first data or second data using the access method converted to by the conversion unit, and sending an access result to the client device.2009-05-07
20090119396WORKLOAD MANAGEMENT WITH NETWORK DYNAMICS - A workload management system identifies a first source device and first destination device which can be used to perform a job function. The system further communicates information about the first source device and destination device to one or more switches, and receives a set of network parameters along a data path from the first source device to the first destination device. The system then determines resources available on the first source device and/or first destination device. In addition, the system determines whether the first source device and first destination device, if used for the job function, can satisfy a set of SLAs for that job function based on the network parameters along a data path from the first source device to the first destination device and the determined resources available on the first source device and/or first destination device.2009-05-07
20090119397Using virtual domain name service (DNS) zones for enterprise content delivery - A domain to be published to an enterprise ECDN is associated (either by static configuration or dynamically) with a set of one or more enterprise zones configurable in a hierarchy. When a DNS query arrives for a hostname known to be associated with given content within the control of the ECDN, a DNS server preferably responds in one of three (3) ways: (a) handing back an IP address, e.g., for an ECDN intelligent node that knows how to obtain the requested content from a surrogate or origin server; (b) executing a zone referral to a next (lower) level name server in a zone hierarchy, or (c) CNAMing to another hostname, thereby essentially restarting the lookup procedure. In the latter case, this new CNAME causes the resolution process to start back at the root and resolve a new path, probably along a different path in the hierarchy. At any particular level in the zone hierarchy, preferably there is an associated zone server. That server preferably executes logic that applies the requested hostname against a map, which, using known techniques, may be generated from given (static, dynamic, internally-generated or third party-sourced) performance metrics. Thus, a given name query to ECDN-managed content may be serviced in coordination with various sources of distributed network intelligence. As a result, the invention provides for a distributed, dynamic globally load balanced name service.2009-05-07
20090119398SYSTEM AND METHOD FOR AUTOMATICALLY MANAGING A NETNWORK PORT BASED ON A CALENDAR FUNCTION - Embodiments of the invention provide a system and method for automatically managing a network port based on a calendar function. In one embodiment, a discovery protocol is provided for automatically discovering at least one port of at least one switch in a network. Furthermore, a management protocol is provided. The management protocol is configured to automatically manage the at least one port of the at least one switch in the network based on a programmable calendar function. In addition, a reconfiguration protocol is also provided. The reconfiguration protocol is configured to reconfigure the calendar function of the automatic management of the at least one port of the at least one switch in the network.2009-05-07
20090119399Intelligent graph walking - An apparatus, and corresponding method, for performing a search for a match of at least one expression in an input stream is presented. A graph including a number of interconnected nodes is generated. A compiler may assign at least one starting node and at least one ending node. The starting node includes a location table with node position information of an ending node and a sub-string value associated with the ending node. Using the node position information and a string comparison function, intermediate nodes located between the starting and ending nodes may be bypassed. The node bypassing may reduce the number of memory accesses required to read the graph.2009-05-07
20090119400Presence Management System - According to one embodiment a presence management system including: a first presence server that controls a first network; a plurality of presentities that belong to the first network; a second presence server that controls a second network, the second network connected to the first network via a communication channel; and a plurality of watchers belonging to the second network; wherein the first presence server includes: a first watcher list that registers a given presentity under the first network associated with one of the watchers that requests presence information of the given presentity; and an external notification section that sends the presence information of the given presentity to the second presence server, and wherein the second presence server includes: a second watcher list that registers the one of watchers associated with the given presentity; and an internal notification section that sends the presence information to the one of watchers registered correspondingly to the given presentity.2009-05-07
20090119401CONTENT PROVIDING SYSTEM, MONITORING SERVER, AND SIP PROXY SERVER - A content providing system that provides content to a user terminal via a network includes a content providing server that is connected to the network and provides content, an SIP proxy server that is connected to the network and relays transmission and reception between the user terminal and the content providing server, and a monitoring server that is connected to the network and stores monitoring information regarding transmission and reception between the user terminal and the content providing server, the monitoring information being transmitted from the SIP proxy server.2009-05-07
20090119402DOMAIN NAME OWNERSHIP VALIDATION - Embodiments of the invention provide systems and methods for validating ownership of a domain name. According to one embodiment, a validating ownership of a domain name can comprise retrieving one or more domain name ownership records. For example, the one or more domain name ownership records comprise Who Is records. Validity of the one or more domain name records can be confirmed with a designated domain manager. According to one embodiment, confirming validity of the one or more domain name records with the designated domain manager can comprise authenticating the designated domain manager based on a certificate provided by the designated domain manager.2009-05-07
20090119403Composite Resource Models - A mechanism and model are provided for representing and managing composite resource models. When a resource monitor is deployed for a resource, the resource monitor scans for information that indicates that the resource under monitoring is part of a cluster, grid, or other composite configuration. The resource monitor then determines whether monitoring information for the resource should be reported differently because of the composite configuration. If monitoring information for the resource is to be reported differently, the resource monitor alters the reporting format to reflect the composite resource model. The resource manager may then receive the monitoring information and apply this information to individual resources and aggregates the monitoring information for composite resources.2009-05-07
20090119404Method for Improving Subscriber Data Integrity in an IMS Network - An IMS system including a Home Subscriber Server including data for terminals connecting to the IMS. The Home Subscriber Server being arranged to transmit a reset message to components such as application servers and S-CSCF in the IMS when it undergoes a reset. The receipt of a reset message causing the component to mark the terminals that the HSS stores the data for as not confirmed. The component then, either automatically or in response to a message, transmits a message to the Home Subscriber Server to request user profile data for a user terminal connecting to the IMS or accessing services from the IMS.2009-05-07
20090119405Combining UNIX commands with uniform resource locators - A computer command processor to prepare a data processing pipeline where an output of a first process is provided as an input of a second process, wherein the first process and the second process execute at different computer systems. Systems (and the processes that are to occur there) are identified by Uniform Resource Locators (“URLs”).2009-05-07
20090119406METHOD FOR DATA COMMUNICATION AND SYSTEM THEREOF - The present invention discloses a system and method for data communication. In the system and method for data communication, a part of communication peers in the communication system are assigned as super peers, and each super peer forwards message according to its route table. When a communication peer logs in the system, network information of the logged communication peer is saved in a super peer which is logically closest to the logged communication peer through messages forwarded among every super peer. And when an origination communication peer searches for a destination communication peer, the network information of the destination communication peer is saved in a super peer which is logically closest to the destination communication peer through the message forwarded among every super peer in super peer layer. The origination communication peer establishes connection with the destination communication peer based on the network information of the destination communication peer, and implements the data communication through the connection established.2009-05-07
20090119407SECURE NEIGHBOR DISCOVERY BETWEEN HOSTS CONNECTED THROUGH A PROXY - A method, a proxy and a host are provided for securing neighbor discovery (ND) signaling between hosts when the hosts are connected through the proxy. A first host sends an original ND message comprising a first signature based on an address of the first host. The proxy removes the address of the first host and substitutes its own address in a modified ND message. The proxy then places a copy of the address of the first host in a new field and builds a proxy signature based on the own address of the proxy and on the new field. The new field and the proxy signature are added to the modified ND message. A second host receives the modified ND message from the proxy and verifies the proxy signature. The second host reconstructs the original ND message content and then verifies the first signature.2009-05-07
Website © 2025 Advameg, Inc.