Patent application number | Description | Published |
20080228879 | CONSISTENT SNAPSHOTS OF DYNAMIC HETEROGENEOUSLY MANAGED DATA - A system and method for providing a consistent view of data stored therein, which can change dynamically in an uncoordinated way, includes a client program and a snapshot server program. The snapshot server program permits one or more client programs to request snapshots of data from the snapshot server program such that the data included in or referenced by a snapshot originates from one or more host server programs and the data is accessible to the snapshot server program, but is managed independently of the snapshot server program. | 09-18-2008 |
20090307373 | CONSISTENT SNAPSHOTS OF DYNAMIC HETEROGENEOUSLY MANAGED DATA - A system and method for providing a consistent view of data stored therein, which can change dynamically in an uncoordinated way, includes a client program and a snapshot server program. The snapshot server program permits one or more client programs to request snapshots of data from the snapshot server program such that the data included in or referenced by a snapshot originates from one or more host server programs and the data is accessible to the snapshot server program, but is managed independently of the snapshot server program. | 12-10-2009 |
20100125729 | SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS - A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received. | 05-20-2010 |
20100235912 | Integrity Verification Using a Peripheral Device - A peripheral device includes an interface configured to communicate with a computer, the peripheral device; logic configured to perform an integrity verification of an operating system of the computer; and a display configured to display a result of the integrity verification. A method for integrity verification of a computer using a peripheral device includes connecting the peripheral device to the computer; sending a challenge from the device to the computer; computing attestation data using the challenge and information stored in the computer, retrieving the attestation data from the computer by a client program running on the computer; sending the attestation data to the peripheral device; and verifying the attestation data by the peripheral device. | 09-16-2010 |
20140165145 | SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS - A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received. | 06-12-2014 |
Patent application number | Description | Published |
20090059843 | SYSTEMS, METHODS AND COMPUTER PRODUCTS FOR PROVIDING A GRADIENT DRIVEN MESH-NETWORK ESTABLISHMENT - Systems, methods and computer products for establishing a mesh-network consisting of wireless personal area network (WPAN) having a large number of nodes. Exemplary embodiments include a gradient-driven mesh-network establishment method, including switching on a plurality of nodes in a vicinity of the wireless personal area network, detecting an acknowledgment signal via a wireless personal area network signal, querying for at least one or a resource and a physical quantity, selecting a subset of the plurality of nodes and instructing the subset of the plurality of nodes to send out a low power radio transceiver DISCOVER squirt signal to a neighborhood associated with the subset of the plurality of nodes, wherein nodes exclusive of the subset of the plurality of nodes turn off in response to an expiration of a time-out period. | 03-05-2009 |
20090121929 | METHOD FOR TRACKING CONTAINERS USING A LOW-RATE WIRELESS PERSONAL AREA NETWORK SYSTEM - A method for tracking a plurality of containers each joined to an electronic tracking device having routing capabilities and a WPAN-enabled radio receiver/transmitter configured to attempt to connect to a pre-configured WPAN upon being activated comprises activating the radio receiver/transmitter of each tracking device joined to a container being loaded onto a cargo vessel; receiving an indication from each tracking device that fails to connect to the WPAN; intermittently performing a network scan to locate each WPAN-connected tracking device; intermittently configuring the WPAN to include each WPAN-connected tracking device in a hybrid tree-mesh network topology; intermittently configuring routing information stored on each WPAN-connected tracking device to maintain mutual communication with each WPAN-connected tracking device and enable mutual communication between each WPAN-connected tracking device; receiving transport-related data from each WPAN-connected tracking device; transmitting the transport-related data to a control station through a LAN on the vessel; broadcasting a request to be routed between the WPAN-connected tracking devices in a depth-first traversal of the network topology that directs each WPAN-connected tracking device to enter a low-power mode when the depth-first traversal backtracks from the tracking device; and receiving an acknowledgment of the request communicated from each WPAN-connected tracking device when the tracking device enters the low-power mode. | 05-14-2009 |
20130232584 | METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING FILES - A method, a secure device and a computer program product for securely managing files. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server via a host, the host connected to the server through a telecommunication network, upon receiving a request for using a file stored on the secure device, processing the request at the secure device according to an updated use permission associated to the file, where the updated use permission is obtained by instructing at the secure device to establish a connection between the secure device and the server via the host and updating at the device the use permission associated to the file, according to permission data sent from the server through the established connection. | 09-05-2013 |
20130282762 | METHOD, SECURE DEVICE, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SECURELY MANAGING USER ACCESS TO A FILE SYSTEM - A method, a secure device, a system and a computer program product for securely managing user access to a file system. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server through a telecommunication network establishing a connection between the secure device and the server, receiving at the secure device, through the established connection, data pertaining to a file system identifying files which are at least partly stored outside the secure device, exposing at the secure device the file system to a user, based on the data received from the server, the file system navigable by the user. | 10-24-2013 |
Patent application number | Description | Published |
20080243535 | METHOD AND APPARATUS FOR A CONTEXT-BASED SERVICE LOOK UP - The present invention relates to a context-based service look up, wherein a service instance, having a scope includes at least one service instance data set having a hierarchy of levels. A service consumer data set, having a hierarchy of levels is received from a service consumer, having a situation. Comparisons are made of each service consumer data set with each service instance data set, for the same level. Dependent on results of the comparisons, it is determined whether said situation of said service consumer matches said scope of said service instance. | 10-02-2008 |
20090132808 | SYSTEM AND METHOD OF PERFORMING ELECTRONIC TRANSACTIONS - A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received. | 05-21-2009 |
20100040293 | Kinematic Based Authentication - In one embodiment, a computer-implemented method for authentication by kinematic pattern match is provided. The computer implemented method prompts a user for a kinematic input, receives an element of a kinematic pattern to form a set of received elements, and determines whether there are additional elements of the kinematic pattern. Responsive to a determination that there are no additional elements of the kinematic pattern, forms a kinematic pattern from the set of received elements and computes a signature from the set of received elements. The computer implemented method further determines whether the signature matches a predetermined value, and responsive to a determination that the signature matches a predetermined value, sends an authentication signal. | 02-18-2010 |
20100318798 | MESSAGE HANDLING AT A MOBILE DEVICE - A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with a challenge, a response step for receiving a response to the challenge, an equality check step for determining whether the received response corresponds to an expected response, a signature step for providing a signature for the message, using a cryptographic key and the result of the equality check step, and a send step for sending the signed message via the first application from the mobile device to a backend system. | 12-16-2010 |