RFID READER INTEGRATION TO VIRTUAL WORLD MONITORING
    31.
    发明申请
    RFID READER INTEGRATION TO VIRTUAL WORLD MONITORING 有权
    RFID读写器集成到虚拟世界监控

    公开(公告)号:US20100011312A1

    公开(公告)日:2010-01-14

    申请号:US12171540

    申请日:2008-07-11

    CPC classification number: G06Q10/00 G06Q50/02 G06T15/20

    Abstract: Disclosed is a virtual world server receives an update signal corresponding to an RFID tag. The virtual world server determines an RFID tag identifier, an RFID reader identifier, and an associated asset name from the update. The virtual world server looks up a virtual area associated with the RFID reader identifier. The virtual world server teleports a virtual asset associated with the RFID tag identifier to a virtual area in the virtual world. The virtual world server renders a model of the asset in a virtual world based on an avatar perspective.

    Abstract translation: 公开了一种虚拟世界服务器接收对应于RFID标签的更新信号。 虚拟世界服务器从更新中确定RFID标签标识符,RFID读取器标识符和相关联的资产名称。 虚拟世界服务器查找与RFID读取器标识符相关联的虚拟区域。 虚拟世界服务器将与RFID标签标识符相关联的虚拟资产传送到虚拟世界中的虚拟区域。 虚拟世界服务器基于头像透视图在虚拟世界中呈现资产的模型。

    De-duplicating data in a network with power management
    34.
    发明授权
    De-duplicating data in a network with power management 有权
    用电源管理在网络中取消复制数据

    公开(公告)号:US09489404B2

    公开(公告)日:2016-11-08

    申请号:US12893851

    申请日:2010-09-29

    CPC classification number: G06F17/30303

    Abstract: A method, computer system, and computer program product for managing copies of data objects in a network data processing system. The computer system identifies copies of a data object stored on storage devices. The computer system places the storage devices into groups. Each storage device in a group has a smallest distance from the storage device to a center location for the group as compared to distances to center locations for other groups within the groups. The computer system selects a portion of the copies of the data object for removal from the storage devices based on a management of power for the storage devices such that remaining set of storage devices in each group is capable of handling concurrent requests that have been made historically for the copies of the data object. The computer system removes the portion of the copies of the data object from the storage devices.

    Abstract translation: 一种用于管理网络数据处理系统中数据对象的副本的方法,计算机系统和计算机程序产品。 计算机系统识别存储在存储设备上的数据对象的副本。 计算机系统将存储设备分组。 与组内其他组的中心位置的距离相比,组中的每个存储设备距离存储设备到组的中心位置的距离最小。 计算机系统基于对存储设备的功率的管理从存储设备中选择用于从存储设备中删除的一部分数据对象的副本,使得每组中的剩余存储设备能够处理历史上已经进行的并发请求 用于数据对象的副本。 计算机系统从存储设备中删除数据对象副本的一部分。

    Using different secure erase algorithms to erase chunks from a file associated with different security levels
    37.
    发明授权
    Using different secure erase algorithms to erase chunks from a file associated with different security levels 有权
    使用不同的安全擦除算法从与不同安全级别相关联的文件中擦除块

    公开(公告)号:US09111109B2

    公开(公告)日:2015-08-18

    申请号:US13477991

    申请日:2012-05-22

    CPC classification number: G06F21/6218 G06F2221/2113 G06F2221/2143

    Abstract: Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.

    Abstract translation: 提供了一种用于使用不同安全擦除算法从与不同安全级别相关联的文件中擦除块的计算机程序产品,系统和方法。 接收到请求以安全地擦除存储在至少一个存储设备中的具有多个块的文件。 确定响应于该请求而应用于文件中的第一块的第一安全擦除算法和响应于该请求应用于文件中的第二块的第二安全擦除算法。 应用第一安全擦除算法来擦除第一块,并且应用第二安全擦除算法来擦除第二块。 第一和第二安全擦除算法使用不同的进程来擦除它们被应用到的块。

    Pass-pattern authentication for computer-based security
    38.
    发明授权
    Pass-pattern authentication for computer-based security 有权
    用于基于计算机的安全性的通过模式认证

    公开(公告)号:US09058479B2

    公开(公告)日:2015-06-16

    申请号:US13448814

    申请日:2012-04-17

    CPC classification number: G06F21/36

    Abstract: Implementing security access includes mapping input elements of an input device to a coordinate system. Each of the input elements is assigned to a point on the coordinate system that is defined by respective coordinate values. The security access also includes receiving a number of inputs via corresponding input elements. An input element assigned to a first input of the number of inputs is denoted as a starting point for a sequence. Beginning with an input in the sequence that immediately follows the first input in the sequence, the security access further includes identifying a directional orientation of each of the input elements as compared to an input element immediately preceding the input element in the sequence, creating a directional pattern sequence from the directional orientation identified for each of the input elements, and providing access to an information source using the directional pattern sequence as an authentication mechanism.

    Abstract translation: 实现安全访问包括将输入设备的输入元素映射到坐标系。 每个输入元素被分配给坐标系上由相应坐标值定义的点。 安全访问还包括通过相应的输入元件接收多个输入。 分配给输入数量的第一输入的输入元件被表示为序列的起始点。 与顺序中的第一输入紧密相连的序列中的输入开始,安全访问进一步包括与紧接在序列中的输入元素之前的输入元素相比较,识别每个输入元素的方向取向,从而产生定向 从针对每个输入元件识别的方向取向,以及使用方向图案序列提供对信息源的访问作为认证机制。

    Providing multiple authentications to authenticate users with respect to a system and file systems offered through the system
    39.
    发明授权
    Providing multiple authentications to authenticate users with respect to a system and file systems offered through the system 有权
    提供多个身份验证,以便通过系统提供的系统和文件系统对用户进行身份验证

    公开(公告)号:US08935756B2

    公开(公告)日:2015-01-13

    申请号:US13475862

    申请日:2012-05-18

    Abstract: Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.

    Abstract translation: 提供了一种方法,系统和计算机程序产品,用于提供多个认证以相对于通过系统提供的系统和文件系统认证用户。 从用户接收到访问系统的请求,其中系统提供对多个文件系统的访问。 执行用户相对于系统的第一认证。 响应于关于系统的第一认证的成功,接收到用户的请求以访问所选文件系统中的一个。 相对于所选择的文件系统执行用户的第二认证。 响应于第二认证的成功,允许用户访问所选择的文件系统。

Patent Agency Ranking