COMPOSING, FORWARDING, AND RENDERING EMAIL SYSTEM
    11.
    发明申请
    COMPOSING, FORWARDING, AND RENDERING EMAIL SYSTEM 有权
    组合,前向和渲染电子邮件系统

    公开(公告)号:US20090248812A1

    公开(公告)日:2009-10-01

    申请号:US12059299

    申请日:2008-03-31

    CPC classification number: G06Q10/107

    Abstract: The present invention provides a computer implemented method for communicating a signature in a received email. Initially, a server receives a source email from a source client, the source email comprising a signature index entry, and a body. The server determines for a first recipient that a first associated destination client is capable of rendering a signature of the signature index entry in response to a selection of an indexed signature. The server, responsive to a determination that the destination client is capable of rendering the signature index entry, forwards the source email to the first recipient as a delivered email using the body of the source email such that an indexed signature is present in the body of the delivered email. In addition, a method for generating a signature header is shown that provides a many to one correspondence between indexed signatures and a signature index entry.

    Abstract translation: 本发明提供了一种用于在接收到的电子邮件中传达签名的计算机实现方法。 最初,服务器从源客户端接收源电子邮件,源邮件包括签名索引条目和正文。 服务器针对第一接收者确定响应于索引签名的选择,第一关联目的地客户端能够呈现签名索引条目的签名。 服务器响应于确定目的地客户端能够呈现签名索引条目,将源电子邮件转发到第一收件人作为所发送的电子邮件,使用源电子邮件的正文,使索引签名存在于主体中 发送的电子邮件。 此外,示出了用于生成签名报头的方法,其提供索引签名和签名索引条目之间的多对一对应关系。

    METHOD AND APPARATUS FOR REMOVING ENCRYPTED FILES UNASSOCIATED WITH A USER KEY FROM AN ARCHIVE
    12.
    发明申请
    METHOD AND APPARATUS FOR REMOVING ENCRYPTED FILES UNASSOCIATED WITH A USER KEY FROM AN ARCHIVE 失效
    用于从存档中删除与用户密钥相关联的加密文件的方法和装置

    公开(公告)号:US20090119341A1

    公开(公告)日:2009-05-07

    申请号:US11935743

    申请日:2007-11-06

    Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.

    Abstract translation: 本发明提供了一种计算机实现的方法,数据处理系统和计算机程序产品,用于从归档中选择性地提取压缩加密的文件。 数据处理系统从认证的用户接收预处理归档的命令,其中认证的用户与至少一个指纹相关联。 所述数据处理系统确定所述至少一个指纹未能匹配所述存档中的第一压缩加密文件的元数据中的所有指纹。 数据处理系统响应于指纹未能匹配所有指纹的确定,删除压缩加密的文件。 数据处理系统确定指纹与存档中的第二压缩加密文件的元数据中的第二指纹匹配。 数据处理系统响应于指纹与第二指纹匹配的确定,避免删除第二压缩加密文件。

    Multi-participant communication system with audio manager responsive to mode change requests
    13.
    发明授权
    Multi-participant communication system with audio manager responsive to mode change requests 失效
    具有响应于模式改变请求的音频管理器的多参与者通信系统

    公开(公告)号:US08670556B2

    公开(公告)日:2014-03-11

    申请号:US12830879

    申请日:2010-07-06

    CPC classification number: H04M1/72519 H04M3/42238 H04M3/56

    Abstract: A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change.

    Abstract translation: 通信系统包括经由设备之间的有线或无线通信链路与远程通信设备进行通信的本地通信设备。 响应于模式改变请求,本地通信设备和远程通信设备都能够在多用户模式和单个用户专用模式之间切换。 本地和远程通信设备包括各自的配置文件,其包括定义各个通信设备如何响应于模式改变请求的配置文件属性。 一个通信设备的用户可以向另一个通信设备发送模式改变请求。 响应于模式改变请求,如果该通信设备的配置文件允许模式改变,则另一个通信设备在多个参与者模式和单个参与者模式之间改变模式。

    Method and apparatus for removing encrypted files unassociated with a user key from an archive
    14.
    发明授权
    Method and apparatus for removing encrypted files unassociated with a user key from an archive 失效
    用于从归档中去除与用户密钥无关的加密文件的方法和装置

    公开(公告)号:US08140856B2

    公开(公告)日:2012-03-20

    申请号:US11935743

    申请日:2007-11-06

    Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.

    Abstract translation: 本发明提供了一种计算机实现的方法,数据处理系统和计算机程序产品,用于从归档中选择性地提取压缩加密的文件。 数据处理系统从认证的用户接收预处理归档的命令,其中认证的用户与至少一个指纹相关联。 所述数据处理系统确定所述至少一个指纹未能匹配所述存档中的第一压缩加密文件的元数据中的所有指纹。 数据处理系统响应于指纹未能匹配所有指纹的确定,删除压缩加密的文件。 数据处理系统确定指纹与存档中的第二压缩加密文件的元数据中的第二指纹匹配。 数据处理系统响应于指纹与第二指纹匹配的确定,避免删除第二压缩加密文件。

    HOST TRUST REPORT BASED FILTERING MECHANISM IN A REVERSE FIREWALL
    15.
    发明申请
    HOST TRUST REPORT BASED FILTERING MECHANISM IN A REVERSE FIREWALL 失效
    在反向防火墙中基于托管信息报告的过滤机制

    公开(公告)号:US20100162381A1

    公开(公告)日:2010-06-24

    申请号:US12339542

    申请日:2008-12-19

    CPC classification number: H04L63/02 H04L63/0227

    Abstract: Disclosed is a computer implemented method and computer program product to throttle traffic from a source internet protocol address. The reverse firewall inspects payloads of a plurality of packets each packet having a source address identical to the source internet protocol address and a target address corresponding to a receiver host. Responsive to detecting purported good content within at least one of the plurality of packets, the reverse firewall forwards packets having the source address. The reverse firewall determines whether a count of packets having the source address exceeds a safe threshold. The reverse firewall requests a demanded positive trust report from the receiver host, responsive to a determination that the count of packets having the source address exceeds the safe threshold. The reverse firewall determines whether a positive trust report is received from the receiver host that indicates that the source internet protocol address is good. The reverse firewall analyzes a header of packet having the source address without analyzing a payload of the packet, responsive to a determination that the positive trust report is received from the receiver host.

    Abstract translation: 公开了一种计算机实现的方法和计算机程序产品,用于限制源互联网协议地址的流量。 逆向防火墙检查多个分组的有效载荷,每个分组具有与源互联网协议地址相同的源地址和对应于接收方主机的目标地址。 响应于在多个分组中的至少一个分组中检测到所述的良好内容,反向防火墙转发具有源地址的分组。 反向防火墙确定源数据包的数量是否超过安全阈值。 响应于确定具有源地址的分组的计数超过安全阈值的确定,反向防火墙从接收方主机请求所请求的肯定信任报告。 反向防火墙确定是否从接收者主机接收到指示源互联网协议地址良好的肯定信任报告。 响应于从接收者主机接收到肯定的信任报告的确定,反向防火墙分析具有源地址的分组报头,而不分析分组的有效载荷。

    VIRTUALIZE, CHECKPOINT, AND RESTART POSIX IPC OBJECTS DURING CHECKPOINTING AND RESTARTING OF A SOFTWARE PARTITION
    16.
    发明申请
    VIRTUALIZE, CHECKPOINT, AND RESTART POSIX IPC OBJECTS DURING CHECKPOINTING AND RESTARTING OF A SOFTWARE PARTITION 失效
    在软件分区检查和重新启动过程中的虚拟化,检查点和重启POSIX IPC对象

    公开(公告)号:US20100082816A1

    公开(公告)日:2010-04-01

    申请号:US12242218

    申请日:2008-09-30

    CPC classification number: G06F9/54 G06F9/4856

    Abstract: A WPAR is migrated. Responsive to starting a checkpoint process, data and control information is collected and stored for IPC objects in the WPAR. Responsive to receiving a request to restart the WPAR, a type of IPC object is determined. Responsive to a determination that the IPC object is not an IPC shared memory object, a kernel handle that a process wants to be used for a new IPC object is registered. A request to create a new IPC object comprising a name uniquely associated with the IPC object and a WPAR identifier is issued. An entry that matches the name and WPAR identifier is identified and a virtual kernel handle is retrieved. The new IPC object is created. The virtual kernel handle is mapped to a real kernel handle and returned to the process. Data and control information is retrieved and overlaid onto the new IPC object.

    Abstract translation: WPAR已迁移。 响应启动检查点流程,收集并存储WPAR中IPC对象的数据和控制信息。 响应于接收到重新启动WPAR的请求,确定了一种IPC对象。 注意到IPC对象不是IPC共享内存对象的确定,注册了一个进程想要用于新的IPC对象的内核句柄。 颁布了创建新的IPC对象的请求,该对象包括与IPC对象唯一相关联的名称和WPAR标识符。 识别与名称和WPAR标识符匹配的条目,并检索虚拟内核句柄。 创建新的IPC对象。 虚拟内核句柄被映射到一个真正的内核句柄并返回到该进程。 数据和控制信息被检索并覆盖到新的IPC对象上。

    Method For Virtual Electronic Mail Address Generation and Usage
    17.
    发明申请
    Method For Virtual Electronic Mail Address Generation and Usage 失效
    虚拟电子邮件地址生成和使用方法

    公开(公告)号:US20100070583A1

    公开(公告)日:2010-03-18

    申请号:US12209231

    申请日:2008-09-12

    CPC classification number: G06Q10/107 H04L51/28

    Abstract: A method and system creates virtual email identifications and dynamically map the virtual email-ids to the real email identities. A virtual email identify will be described in a specific fixed syntax that is easy for the users to remember and implement. The virtual email-id is dynamically mapped to one or more real email-ids by using a database of employees or other personnel maintained by the organization. The database can have various configurations that will be a function of the organization of the entity and the relationships of the persons in the entity.

    Abstract translation: 方法和系统创建虚拟电子邮件标识,并将虚拟电子邮件地址动态映射到真正的电子邮件身份。 将以特定的固定语法描述虚拟电子邮件标识,用户可以方便地记住和实现。 虚拟电子邮件ID通过使用员工或组织维护的其他人员的数据库动态映射到一个或多个真实的电子邮件ID。 数据库可以具有各种配置,这将是实体的组织和实体中的人员的关系的功能。

    METHOD AND APPARATUS FOR MASKING CHILD USER AUTHORIZATIONS FROM ADVERSE USE AGAINST A PARENT USER
    18.
    发明申请
    METHOD AND APPARATUS FOR MASKING CHILD USER AUTHORIZATIONS FROM ADVERSE USE AGAINST A PARENT USER 失效
    用于屏蔽儿童用户授权的方法和设备,从不利于父母用户

    公开(公告)号:US20090119783A1

    公开(公告)日:2009-05-07

    申请号:US11935638

    申请日:2007-11-06

    CPC classification number: G06F21/629 G06F2221/2149

    Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to protect a first user from authorization limitation by a second user. The computer may receive an authorization command from the second user, wherein the authorization command targets the first user, and the second user is at least partially authorized to operate the authorization command. The computer determines that the first user is an ancestor user of the second user. In addition, the computer, responsive to a determination that the first user is an ancestor user of the second user, prevents operation of code of the authorization command to change an authorization of the first user.

    Abstract translation: 本发明提供了一种计算机实现的方法,数据处理系统和计算机程序产品,用于保护第一用户免受第二用户的授权限制。 计算机可以从第二用户接收授权命令,其中授权命令针对第一用户,并且第二用户至少部分地被授权操作授权命令。 计算机确定第一用户是第二用户的祖先用户。 此外,计算机响应于第一用户是第二用户的祖先用户的确定,防止授权命令的代码的操作改变第一用户的授权。

    Virtualize, checkpoint, and restart POSIX IPC objects during checkpointing and restarting of a software partition
    20.
    发明授权
    Virtualize, checkpoint, and restart POSIX IPC objects during checkpointing and restarting of a software partition 失效
    在检查点和重新启动软件分区期间虚拟化,检查点并重新启动POSIX IPC对象

    公开(公告)号:US08549543B2

    公开(公告)日:2013-10-01

    申请号:US12242218

    申请日:2008-09-30

    CPC classification number: G06F9/54 G06F9/4856

    Abstract: A WPAR is migrated. Responsive to starting a checkpoint process, data and control information is collected and stored for IPC objects in the WPAR. Responsive to receiving a request to restart the WPAR, a type of IPC object is determined. Responsive to a determination that the IPC object is not an IPC shared memory object, a kernel handle that a process wants to be used for a new IPC object is registered. A request to create a new IPC object comprising a name uniquely associated with the IPC object and a WPAR identifier is issued. An entry that matches the name and WPAR identifier is identified and a virtual kernel handle is retrieved. The new IPC object is created. The virtual kernel handle is mapped to a real kernel handle and returned to the process. Data and control information is retrieved and overlaid onto the new IPC object.

    Abstract translation: WPAR已迁移。 响应启动检查点流程,收集并存储WPAR中IPC对象的数据和控制信息。 响应于接收到重新启动WPAR的请求,确定了一种IPC对象。 注意到IPC对象不是IPC共享内存对象的确定,注册了一个进程想要用于新的IPC对象的内核句柄。 颁布了创建新的IPC对象的请求,该对象包括与IPC对象唯一相关联的名称和WPAR标识符。 识别与名称和WPAR标识符匹配的条目,并检索虚拟内核句柄。 创建新的IPC对象。 虚拟内核句柄被映射到一个真正的内核句柄并返回到该进程。 数据和控制信息被检索并覆盖到新的IPC对象上。

Patent Agency Ranking