摘要:
A system and method of performing cooperative non-repudiated message exchange from a first system to a second system in a computer network comprises checking for discrepancies between a current system time in the second system with an actual time; performing a time synchronization process to match the current system time with the actual time; exchanging public encryption keys between the first and second systems; sending a digitally signed message from the first system to the second system; decoding the digitally signed message; sending a digitally signed acknowledgment message from the second system to the first system; decoding the digitally signed acknowledgment message; and committing text of the digitally signed message to an official transcript on the first system.
摘要:
A context enhanced messaging and collaboration system in which resources related to the context of text messages may be automatically identified and exchanged between users in association with the text messages, is provided. A graphical user interface (GUI) is provided for instant messaging between client devices. The GUI operates in conjunction with a context analysis engine that automatically analyzes the context of the textual messages being exchanged between the users and retrieves resources that correspond to the detected context. Representations of these automatically identified resources may be presented to the user via the GUI. The user of the GUI may enter text messages into the GUI and may select individual ones of the retrieved resources for transmission in association with the text messages. Furthermore, an automated mechanism may be used to select resources to attach to individual text messages entered by the user.
摘要:
A first Instant Message is published to a group of subscribing clients. The message is received by an application at a first client. A response message is created at the first client, the response message comprising information provided by the first client, the first message and information about the first client. The response message is returned to the originator of the published first message.
摘要:
Embodiments of the present invention provide a flexible approach to construct/create instances of cloud computing environments. Specifically, under embodiments of the present invention, an image of a virtual machine instance is created from the following components: image bits; content such as the liner notes, manual, metadata, etc.; end user information (so that the image can be customized for one or more specific end users); values provided to an installer; and cloud based values (e.g., IP address, hostname, etc.). By constructing the virtual machine using this approach, dynamic aspects of the image are managed external to the static binary representation of the image. This would include artifacts such as documentation, install scripts, binary files, etc. Additionally, user supplied data can be captured dynamically and copied to customize the image at the time of instance creation. Still yet, embodiments of the present invention provides system level configuration to construct the virtual machine.
摘要:
Systems and methods record graphical marks input through a graphic user interface of a computerized device. The graphical marks comprise input other than keyboard button input. The recording includes recording different input times when the graphical marks are input and recording whether the graphic marks are uninterrupted graphic marks, using a processor of the computerized device. An uninterrupted graphical mark is one of the graphical marks that is input through a discrete and continuous user input action, and is made without the user pausing such discrete and continuous user input action. The systems and methods also display the graphical marks, and provide an erasure option on the graphic user interface. The erasure option allows the user to distinguish which of the graphical marks are erased based on the different input times and/or by distinguishing between erasure of different ones of the uninterrupted graphic marks.
摘要:
A peer-to-peer network has a server that maintains a list of addresses of clients connected to the peer-to-peer network. The server generates seed lists for each of the clients connected to the network from the server maintained list. The clients conduct peer-to-peer searches using the seed list provided by the server. The seed lists may be either randomly generated or generated to facilitate network objectives. The clients may periodically request seed list refreshing. The peer-to-peer network may further include authentication and authorization search security checks.
摘要:
Verifiable authentication credentials are provided to foreign systems without passing an id and password to the protected resource. A user wishing to access a secure remote site is prompted for credentials, the credentials are authenticated locally and a digitally signed token is created. The token is redirected to the secure remote site by the user's browser using HTTP redirection. The digital signature is verified by the secure remote site preferably by a digital signature web service. The remote site establishes communications with the user if the digital signature is valid.
摘要:
An unsolicited dynamic interactive message is created wherein the message defines any graphical user interface elements to be displayed, the rules associated with the message, the appropriate methods and functions which can be performed and specific contextual interactions supported. The message definition can originate from a local or remote computer and can be pre and post processed as specified by the computing environment and the message definition itself.
摘要:
An embodiment of the invention includes a method for centralized URL commenting, wherein user-generated comment data is extracted from web pages on a plurality of web sites. Access control parameters are also obtained from the web sites. The comment data is tagged with identifiers indicating the web sites that the comment data was extracted from, URLs indicating the web pages that the comment data are on, and authors of the comment data. The comment data is stored in a repository. Keywords are extracted from the comment data; and, the keywords are normalized. The normalizing of the keywords includes creating a single normalized keyword for multiple keywords related to the same topic, and tagging comment data that include at least one of the multiple keywords with the normalized keyword. Read access and/or write access to the repository is controlled based on the access control parameters.
摘要:
Embodiments of the present invention provide a flexible approach to construct/create instances of cloud computing environments. Specifically, under embodiments of the present invention, an image of a virtual machine instance is created from the following components: image bits; content such as the liner notes, manual, metadata, etc.; end user information (so that the image can be customized for one or more specific end users); values provided to an installer; and cloud based values (e.g., IP address, hostname, etc.). By constructing the virtual machine using this approach, dynamic aspects of the image are managed external to the static binary representation of the image. This would include artifacts such as documentation, install scripts, binary files, etc. Additionally, user supplied data can be captured dynamically and copied to customize the image at the time of instance creation. Still yet, embodiments of the present invention provides system level configuration to construct the virtual machine.