Patent application number | Description | Published |
20080229431 | System and Method to Manage Device Access in a Software Partition - A system and method to manage device access in a software partition are provided. The illustrative embodiments provide a mechanism for exporting resources/devices from an administrator partition to a software partition in its purview. A trusted device list data structure is provided that identifies which devices are permitted to be exported into a software partition from an administrative partition. This trusted device list data structure also identifies which of the devices in the list of devices should be exported by default when exporting devices to a software partition, i.e. if no overrides are specified. In addition, a user-specifiable mechanism to override the entries in the trusted device list data structure is provided. For security purposes, this mechanism may not be used to export devices not listed in the trusted device list data structure. The mechanism may also be used to prevent the exporting of devices which are exported by default. | 09-18-2008 |
20080294756 | RESOLUTION OF CONFLICTING NETWORK SETTINGS ON A SOFTWARE PARITITION SERVER - A method, system and computer-readable medium for resolving conflicting network settings on a software partition server. In one embodiment, the method clones a software partition of a data processing system to obtain a second software partition. The method detects a conflict between a network configuration of the second software partition and an existing network configuration of an existing software partition on the data processing system. The method then dynamically resolves the conflict between the network configuration of the second software partition and the existing network configuration of the existing software partition without additional input from the user. | 11-27-2008 |
20090119341 | METHOD AND APPARATUS FOR REMOVING ENCRYPTED FILES UNASSOCIATED WITH A USER KEY FROM AN ARCHIVE - The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file. | 05-07-2009 |
20090119783 | METHOD AND APPARATUS FOR MASKING CHILD USER AUTHORIZATIONS FROM ADVERSE USE AGAINST A PARENT USER - The present invention provides a computer implemented method, data processing system, and computer program product to protect a first user from authorization limitation by a second user. The computer may receive an authorization command from the second user, wherein the authorization command targets the first user, and the second user is at least partially authorized to operate the authorization command. The computer determines that the first user is an ancestor user of the second user. In addition, the computer, responsive to a determination that the first user is an ancestor user of the second user, prevents operation of code of the authorization command to change an authorization of the first user. | 05-07-2009 |
20090234824 | Browser Use of Directory Listing for Predictive Type-Ahead - A system and method for providing a predictive browser type-ahead that performs server queries of computer file directory listings in order to locate and present matching Universal Resources Locator (URL) extensions as the URL is entered into the browser. The predictive type-ahead provides matching URL entries into the browser for user selection. The predictive type-ahead also continually validates the browser entries as they are made. | 09-17-2009 |
20090234851 | Browser Use of Directory Listing for Predictive Type-Ahead - A system and method for providing a predictive browser type-ahead that performs server queries of computer file directory listings in order to locate and present matching Universal Resources Locator (URL) extensions as the URL is entered into the browser. The predictive type-ahead provides matching URL entries into the browser for user selection. The predictive type-ahead also continually validates the browser entries as they are made. | 09-17-2009 |
20090311997 | DYNAMIC USER-TO-USER ADDRESS BOOK SHARING IN A MOBILE STATION - The present invention provides a mobile station implemented method for managing a requested name and phone record. The method comprises steps of the requester associated device receiving a user's identification from a mobile station phonebook owner and a search term. The requester associated device transmits the user identification of the mobile station phonebook owner and the search term. Receiving at least one matching name and phone record, the requester associated device presents the at least one matching name and phone record to a user. The requester associated device receives a user management command to perform an action on the name and phone record. The method may complete when the requester associated device performs the action on the name and phone record. | 12-17-2009 |
20100162381 | HOST TRUST REPORT BASED FILTERING MECHANISM IN A REVERSE FIREWALL - Disclosed is a computer implemented method and computer program product to throttle traffic from a source internet protocol address. The reverse firewall inspects payloads of a plurality of packets each packet having a source address identical to the source internet protocol address and a target address corresponding to a receiver host. Responsive to detecting purported good content within at least one of the plurality of packets, the reverse firewall forwards packets having the source address. The reverse firewall determines whether a count of packets having the source address exceeds a safe threshold. The reverse firewall requests a demanded positive trust report from the receiver host, responsive to a determination that the count of packets having the source address exceeds the safe threshold. The reverse firewall determines whether a positive trust report is received from the receiver host that indicates that the source internet protocol address is good. The reverse firewall analyzes a header of packet having the source address without analyzing a payload of the packet, responsive to a determination that the positive trust report is received from the receiver host. | 06-24-2010 |
20100312868 | Logically Partitioned System Having Subpartitions with Flexible Network Connectivity Configuration - A method of configuring a data processing system for facilitating network communications involves creating a primary logical partition (LPAR) in the data processing system, the LPAR configured to host a specified operating system. The method further includes creating a first virtual network adapter within the LPAR, associating the first virtual network adapter with a first network address, and binding the first virtual network adapter to the LPAR. The method additionally involves creating a first logical subpartition (LSPAR) within the LPAR, the first LSPAR configured to employ said specified operating system and no other. The method also includes creating a second virtual network adapter within the LPAR, associating the second virtual network adapter with a second network address, wherein the second network address is not an alias network address of the first network address, and binding the second virtual network adapter to the first LSPAR. | 12-09-2010 |
20110113406 | SYMMETRIC MULTI-PROCESSOR LOCK TRACING - A symmetric multi-processor SMP system includes an SMP processor and operating system OS software that performs automatic SMP lock tracing analysis on an executing application program. System administrators, users or other entities initiate an automatic SMP lock tracing analysis. A particular thread of the executing application program requests and obtains a lock for a memory address pointer. A subsequent thread requests the same memory address pointer lock prior to the particular thread release of that lock. The subsequent thread begins to spin waiting for the release of that address pointer lock. When the subsequent thread reaches a predetermined maximum amount of wait time, MAXSPIN, a lock testing tool in the kernel of the OS detects the MAXSPIN condition. The OS performs a test to determine if the subsequent thread and address pointer lock meet the list of criteria set during initiation of the automatic lock trace method. The OS initiates an SMP lock trace capture automatically if all criteria or the arguments of the lock trace method are met. System administrators, software programmers, users or other entities interpret the results of the SMP lock tracing method that the OS stores in a trace table to determine performance improvements for the executing application program. | 05-12-2011 |
20120008757 | Multi-Participant Communication System With Audio Manager Responsive To Mode Change Requests - A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change. | 01-12-2012 |
20120020486 | AUDIO DEVICE VOLUME MANAGER USING MEASURED VOLUME PERCEIVED AT A FIRST AUDIO DEVICE TO CONTROL VOLUME GENERATION BY A SECOND AUDIO DEVICE - An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. | 01-26-2012 |
20120020487 | AUDIO DEVICE VOLUME MANAGER USING MEASURED DISTANCE BETWEEN FIRST AND SECOND AUDIO DEVICES TO CONTROL VOLUME GENERATION BY THE SECOND AUDIO DEVICE - An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices. | 01-26-2012 |
20120042017 | Techniques for Reclassifying Email Based on Interests of a Computer System User - A technique for reclassifying email includes receiving, by an agent executing on a data processing system, a first input from an email filter. In this case, the first input provides a first indication of whether a received email is a junk email. The agent also receives a second input from an application. In this case, the second input provides a second indication of information of interest to a user of the data processing system. The agent then reclassifies the received email based on the first and second indications. | 02-16-2012 |
20120143829 | NOTIFICATION OF CONFIGURATION UPDATES IN A CLUSTER SYSTEM - A second node receives a message from a first node in a cluster environment. The message includes a unique identifier of a shared data storage device including a cluster configuration database that defines membership of nodes in a cluster. In response to receiving the message, the second node attempts to find the shared data storage device. In response to finding the shared data storage device, the second node locates and reads the cluster configuration database on the shared data storage device. The second node then assimilates a cluster configuration update indicated by the cluster configuration database. | 06-07-2012 |
20120143836 | VALIDATION OF ACCESS TO A SHARED DATA RECORD SUBJECT TO READ AND WRITE ACCESS BY MULTIPLE REQUESTERS - According to a method of access to a shared data record subject to contemporaneous read and write access by multiple requesters, a requester reads a shared data record including a payload and a first checksum. The requester calculates a second checksum of the payload of the data record. If the first and second checksums are not equal, the requester again reads the shared data record, including a third checksum, and calculates a fourth checksum of the payload of the shared data record. If the third and fourth checksums are equal, the requester processes the shared data record as valid, and if the second and fourth checksums are equal, the requester handles the shared data record as corrupt. | 06-07-2012 |
20120143887 | SELF-ASSIGNMENT OF NODE IDENTIFIER IN A CLUSTER SYSTEM - In response to a stimulus indicating configuration of a node into a cluster of a plurality of nodes including the node, the node determines whether or not the node has a universally unique identifier (UUID), and if not, the node provides its own persistent self-assigned UUID. The node searches a cluster configuration database for a temporary identifier associated with the node. In response to the node locating the temporary identifier of the node in the cluster configuration database, the node writes its self-assigned UUID into the cluster configuration database and joins the cluster. | 06-07-2012 |
20120143892 | PROPAGATION OF UNIQUE DEVICE NAMES IN A CLUSTER SYSTEM - A unique device name is assigned to each of a plurality of shared storage devices in a cluster configuration database defining membership of nodes in a cluster. A particular node among the nodes defined by the cluster configuration database as a member of the cluster searches the cluster configuration database for a device identifier matching a device identifier of a shared storage device hosted by the particular node. In response to finding a matching device identifier in the cluster configuration database, the particular node renames, in a local configuration maintained at the particular node, a storage device associated with the matching device identifier with the unique name assigned to that storage device in the cluster configuration database. | 06-07-2012 |
20120144018 | Dynamic Rate Heartbeating for Inter-Node Status Updating - A scheme for monitoring node operational status according to communications transmits messages periodically according to a heartbeat rate among the nodes. The messages may be gossip messages containing the status of the other nodes in the pairs, are received at the nodes and indications of the communications delays of the received messages are stored, which are used to compute statistics of the stored communications delays. Parameters of the node status monitoring, which are used for determining operational status of the nodes, are adjusted according to the statistics, which may include adjusting the heartbeat rate, the maximum wait time before a message is considered missed, and/or the maximum number of missed messages, e.g., the sequence number deviation, before the node is considered non-operational (down). | 06-07-2012 |
20120201394 | AUDIO DEVICE VOLUME MANAGER USING MEASURED DISTANCE BETWEEN FIRST AND SECOND AUDIO DEVICES TO CONTROL VOLUME GENERATION BY THE SECOND AUDIO DEVICE - An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices. | 08-09-2012 |
20120203898 | DYNAMIC RATE HEARTBEATING FOR INTER-NODE STATUS UPDATING - A scheme for monitoring node operational status according to communications transmits messages periodically according to a heartbeat rate among the nodes. The messages may be gossip messages containing the status of the other nodes in the pairs, are received at the nodes and indications of the communications delays of the received messages are stored, which are used to compute statistics of the stored communications delays. Parameters of the node status monitoring, which are used for determining operational status of the nodes, are adjusted according to the statistics, which may include adjusting the heartbeat rate, the maximum wait time before a message is considered missed, and/or the maximum number of missed messages, e.g., the sequence number deviation, before the node is considered non-operational (down). | 08-09-2012 |
20120207329 | AUDIO DEVICE VOLUME MANAGER USING MEASURED VOLUME PERCEIVED AT A FIRST AUDIO DEVICE TO CONTROL VOLUME GENERATION BY A SECOND AUDIO DEVICE - An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The audio system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. | 08-16-2012 |
20120209821 | VALIDATION OF ACCESS TO A SHARED DATA RECORD SUBJECT TO READ AND WRITE ACCESS BY MULTIPLE REQUESTERS - According to a method of access to a shared data record subject to contemporaneous read and write access by multiple requesters, a requester reads a shared data record including a payload and a first checksum. The requester calculates a second checksum of the payload of the data record. If the first and second checksums are not equal, the requester again reads the shared data record, including a third checksum, and calculates a fourth checksum of the payload of the shared data record. If the third and fourth checksums are equal, the requester processes the shared data record as valid, and if the second and fourth checksums are equal, the requester handles the shared data record as corrupt. | 08-16-2012 |
20120246474 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PRODUCT LICENSE MANAGEMENT - According to one aspect of the present disclosure, a method and technique for product license management for a clustered environment having a plurality of nodes is disclosed. The method includes unlocking a product on a first node of the plurality of clustered nodes; responsive to unlocking the product on the first node, indicating an unlocked status of the product on a shared storage device accessible to the plurality of clustered nodes; and transmitting a self-unlock message from the first node to remaining nodes of the cluster to enable the remaining nodes of the cluster to self-unlock the product on the respective remaining nodes based on the status indication of the shared storage device. | 09-27-2012 |
20130124847 | EXTERNAL EVIRONMENT SENSITIVE PREDICTIVE APPLICATION AND MEMORY INITIATION - An input tracker learns relationships between end user inputs made at a computer and external environment conditions sensed at the computer by external environment sensors integrated in the computer, such as a camera, microphone, hard disk drive motion detector, display ambient light sensor and display orientation accelerometer. An input predictor interfaced with the input tracker applies current external environment conditions sensed by the external environment sensors to the relationships defined by the input tracker to predict future user input and initiates actions by the computer responsive to the predicted future user input before the input is detected to have results responsive to the input prepared for the user upon detection of the input. | 05-16-2013 |
20130124848 | EXTERNAL EVIRONMENT SENSITIVE PREDICTIVE APPLICATION AND MEMORY INITIATION - An input tracker learns relationships between end user inputs made at a computer and external environment conditions sensed at the computer by external environment sensors integrated in the computer, such as a camera, microphone, hard disk drive motion detector, display ambient light sensor and display orientation accelerometer. An input predictor interfaced with the input tracker applies current external environment conditions sensed by the external environment sensors to the relationships defined by the input tracker to predict future user input and initiates actions by the computer responsive to the predicted future user input before the input is detected to have results responsive to the input prepared for the user upon detection of the input. | 05-16-2013 |
20130247170 | HOST TRUST REPORT BASED FILTERING MECHANISM IN A REVERSE FIREWALL - Disclosed is a computer implemented method to report a bad host. A receiver host receives a packet from a sender host. The receiver host detects that the packet contains suspect hostile content. The receiver host transmits a negative trust report. | 09-19-2013 |