-
公开(公告)号:US09412095B2
公开(公告)日:2016-08-09
申请号:US11971737
申请日:2008-01-09
申请人: James G. McLean , William G. Pagan
发明人: James G. McLean , William G. Pagan
CPC分类号: H04L51/046 , G06Q10/107 , G06Q10/109 , H04L51/02 , H04L51/04 , H04L51/12 , H04L51/18 , H04L51/26 , H04L67/24
摘要: Embodiments of the present invention address deficiencies of the art in respect to unattended status and time-based messaging in an instant messaging (IM) environment and provide a method, system and computer program product for unattended status and time-based messaging in an instant messaging (IM) environment. In an embodiment of the invention, a method for unattended status and time-based messaging in an instant messaging (IM) environment can be provided. The method can include receiving a request from an IM user to queue an unattended status and time-based message, retrieving a recovery trigger for the unattended status and time-based message, and assigning the unattended status and time-based message to a message queue.
摘要翻译: 本发明的实施例解决了在即时消息收发(IM)环境中关于无人值守状态和基于时间的消息传递的本领域的缺陷,并提供用于在即时消息传递(IM)环境中无人值守状态和基于时间的消息传递的方法,系统和计算机程序产品 (IM)环境。 在本发明的实施例中,可以提供在即时消息(IM)环境中的无人值守状态和基于时间的消息传递的方法。 该方法可以包括接收来自IM用户的请求以排队无人值守状态和基于时间的消息,检索用于无人值守状态的恢复触发和基于时间的消息,以及将无人值守状态和基于时间的消息分配给消息队列 。
-
公开(公告)号:US09009846B2
公开(公告)日:2015-04-14
申请号:US13364163
申请日:2012-02-01
CPC分类号: H04L63/08 , G06F21/445 , H04L63/102
摘要: In one general embodiment, a method for determining a controlling entity of a first avatar in a virtual world includes: receiving a request for access to a resource via a first avatar; providing a challenge to the first avatar in response to receiving the request; receiving a challenge response via the first avatar in response to the challenge; determining an identity confidence level based on the challenge response; making an identity determination for a controlling entity of the first avatar based on the identity confidence level; and providing or denying access to the resource based on the identity determination.
摘要翻译: 在一个一般实施例中,一种用于确定虚拟世界中的第一化身的控制实体的方法包括:经由第一头像接收对资源的访问请求; 响应于接收到请求而向第一化身提供挑战; 响应挑战,通过第一化身接收挑战响应; 基于所述挑战响应确定身份置信水平; 基于身份置信度对第一化身的控制实体进行身份确定; 并基于身份确定提供或拒绝对资源的访问。
-
公开(公告)号:US20130198861A1
公开(公告)日:2013-08-01
申请号:US13364163
申请日:2012-02-01
IPC分类号: G06F21/24
CPC分类号: H04L63/08 , G06F21/445 , H04L63/102
摘要: In one general embodiment, a method for determining a controlling entity of a first avatar in a virtual world includes: receiving a request for access to a resource via a first avatar; providing a challenge to the first avatar in response to receiving the request; receiving a challenge response via the first avatar in response to the challenge; determining an identity confidence level based on the challenge response; making an identity determination for a controlling entity of the first avatar based on the identity confidence level; and providing or denying access to the resource based on the identity determination.
-
公开(公告)号:US20100005494A1
公开(公告)日:2010-01-07
申请号:US12165683
申请日:2008-07-01
申请人: James G. McLean
发明人: James G. McLean
IPC分类号: G06F3/00
CPC分类号: H04N21/4532 , G11B27/3027 , H04L65/4084 , H04N5/781 , H04N9/804 , H04N21/4325 , H04N21/4331 , H04N21/482 , H04N21/8455 , H04N21/8456
摘要: Methods, apparatus, and products for administering digital media streams by a media display device including: receiving from a digital media provider a digital media stream including content of a plurality of channels, identifying among the plurality of channels one or more channels for caching; caching content of the one or more identified channels, the content of each of the identified channels including a marker identifying a beginning location of a segment of content; and responsive to a user's selection of a first one of the cached channels, displaying the content of the first channel beginning at the location identified by the marker.
摘要翻译: 用于由媒体显示设备管理数字媒体流的方法,装置和产品包括:从数字媒体提供商接收包括多个频道的内容的数字媒体流,在多个频道中标识一个或多个频道用于高速缓存; 缓存所述一个或多个所识别的频道的内容,所识别的频道中的每一个的内容包括标识内容片段的起始位置的标记; 并且响应于用户对所述缓存的频道中的第一个频道的选择,在由所述标记识别的位置处开始显示所述第一频道的内容。
-
公开(公告)号:US20090177749A1
公开(公告)日:2009-07-09
申请号:US11971737
申请日:2008-01-09
申请人: James G. McLean , William G. Pagan
发明人: James G. McLean , William G. Pagan
IPC分类号: G06F15/16
CPC分类号: H04L51/046 , G06Q10/107 , G06Q10/109 , H04L51/02 , H04L51/04 , H04L51/12 , H04L51/18 , H04L51/26 , H04L67/24
摘要: Embodiments of the present invention address deficiencies of the art in respect to unattended status and time-based messaging in an instant messaging (IM) environment and provide a method, system and computer program product for unattended status and time-based messaging in an instant messaging (IM) environment. In an embodiment of the invention, a method for unattended status and time-based messaging in an instant messaging (IM) environment can be provided. The method can include receiving a request from an IM user to queue an unattended status and time-based message, retrieving a recovery trigger for the unattended status and time-based message, and assigning the unattended status and time-based message to a message queue.
摘要翻译: 本发明的实施例解决了在即时消息收发(IM)环境中关于无人值守状态和基于时间的消息传递的本领域的缺陷,并提供用于在即时消息传递(IM)环境中无人值守状态和基于时间的消息传递的方法,系统和计算机程序产品 (IM)环境。 在本发明的实施例中,可以提供在即时消息(IM)环境中的无人值守状态和基于时间的消息传递的方法。 该方法可以包括接收来自IM用户的请求以排队无人值守状态和基于时间的消息,检索用于无人值守状态的恢复触发和基于时间的消息,以及将无人值守状态和基于时间的消息分配给消息队列 。
-
公开(公告)号:US20090064338A1
公开(公告)日:2009-03-05
申请号:US11846553
申请日:2007-08-29
申请人: Keith M. Campbell , Raymond T. Greggs , James G. McLean , Caroline M. Metry , Edward S. Suffern
发明人: Keith M. Campbell , Raymond T. Greggs , James G. McLean , Caroline M. Metry , Edward S. Suffern
IPC分类号: G06F7/04
CPC分类号: G06F21/35 , G06F11/3058
摘要: Embodiments of the present invention address deficiencies of the art in respect to blade server security and provide a method, system and computer program product for proximity sensitive blade server security. In one embodiment of the invention, a method for proximity sensitive blade server security can be provided. The method can include sensing proximity of a systems administrator relative to a blade center, detecting a loss of proximity of the systems administrator, and triggering automated securing of at least one blade server in the blade server in response to detecting the loss of proximity. For example, sensing proximity of a systems administrator relative to a blade center can include establishing a wireless radio connection with a personal article associated with the systems administrator, and determining a loss of proximity when the connection is lost.
摘要翻译: 本发明的实施例解决了相关刀片服务器安全性方面的缺陷,并提供了用于接近敏感刀片服务器安全性的方法,系统和计算机程序产品。 在本发明的一个实施例中,可以提供用于接近敏感的刀片服务器安全性的方法。 该方法可以包括感测系统管理员相对于刀片中心的接近度,检测系统管理员的接近度的损失,以及响应于检测到接近度的损失而触发刀片服务器中的至少一个刀片服务器的自动保护。 例如,感测系统管理员相对于刀片中心的接近度可以包括建立与系统管理员相关联的个人物品的无线无线电连接,以及当连接丢失时确定接近丧失。
-
公开(公告)号:US20080256370A1
公开(公告)日:2008-10-16
申请号:US11733354
申请日:2007-04-10
申请人: Keith M. Campbell , Raymond T. Greggs , James G. McLean , Caroline M. Metry , Edward S. Suffern
发明人: Keith M. Campbell , Raymond T. Greggs , James G. McLean , Caroline M. Metry , Edward S. Suffern
IPC分类号: G06F1/00
CPC分类号: G06F11/0793 , G06F11/0709 , G06F21/554
摘要: Receiving, by a blade management module from a client blade, notification of a loss of communications between a remote desktop apparatus and the client blade; responsive to the notification, accepting, by the blade management module from the remote desktop apparatus, an instruction to alter a power setting of the client blade; and; responsive to the instruction, altering, by the blade management module, the power setting of the client blade.
摘要翻译: 通过来自客户端刀片的刀片管理模块接收远程桌面设备和客户机刀片之间的通信丢失的通知; 响应所述通知,由所述刀片管理模块从所述远程桌面装置接受改变所述客户机刀片的功率设置的指令; 和; 响应于该指令,由刀片管理模块改变客户机刀片的功率设置。
-
8.
公开(公告)号:US07299327B2
公开(公告)日:2007-11-20
申请号:US11061205
申请日:2005-02-18
IPC分类号: G06F12/00
CPC分类号: G06F21/10 , G06F12/1458 , G06F21/78 , G06F21/86
摘要: A method, system and apparatus for identifying unauthorized access to memory locations in a multi-element data storage device. The invention includes a restrictive key that is physically coupled to at least one inaccessible memory element in the data storage device. The key prevents the user from accessing the data in that element. A securing device connects the restrictive key to the data storage device's housing. When the key is altered from its initial position, the securing device is broken. Because the securing device is at least partially located on the outside of the device housing, it is readily visible. Therefore, if the securing device has been broken, the key to which the securing device was coupled was necessarily moved. This provides visual evidence that there has been an attempt to access one or more data memory areas that had been previously been rendered inaccessible by the restrictive key.
摘要翻译: 一种用于识别对多元素数据存储设备中的存储器位置的未授权访问的方法,系统和装置。 本发明包括物理耦合到数据存储设备中的至少一个不可访问的存储器元件的限制密钥。 密钥防止用户访问该元素中的数据。 固定装置将限制密钥连接到数据存储设备的外壳。 当钥匙从其初始位置改变时,固定装置损坏。 因为固定装置至少部分地位于装置壳体的外侧上,所以容易可见。 因此,如果固定装置已被破坏,固定装置所连接的钥匙必然移动。 这提供了视觉证据,证明已经尝试访问先前已被限制性密钥无法访问的一个或多个数据存储区域。
-
公开(公告)号:US09047190B2
公开(公告)日:2015-06-02
申请号:US11733354
申请日:2007-04-10
申请人: Keith M. Campbell , Raymond T. Greggs , James G. McLean , Caroline M. Metry , Edward S. Suffern
发明人: Keith M. Campbell , Raymond T. Greggs , James G. McLean , Caroline M. Metry , Edward S. Suffern
CPC分类号: G06F11/0793 , G06F11/0709 , G06F21/554
摘要: Receiving, by a blade management module from a client blade, notification of a loss of communications between a remote desktop apparatus and the client blade; responsive to the notification, accepting, by the blade management module from the remote desktop apparatus, an instruction to alter a power setting of the client blade; and; responsive to the instruction, altering, by the blade management module, the power setting of the client blade.
摘要翻译: 通过来自客户端刀片的刀片管理模块接收远程桌面设备和客户机刀片之间的通信丢失的通知; 响应所述通知,由所述刀片管理模块从所述远程桌面装置接受改变所述客户机刀片的功率设置的指令; 和; 响应于该指令,由刀片管理模块改变客户机刀片的功率设置。
-
公开(公告)号:US20140019813A1
公开(公告)日:2014-01-16
申请号:US13545823
申请日:2012-07-10
IPC分类号: G06F11/00
CPC分类号: G06F11/1096 , G06F11/008 , G06F11/1076 , G06F11/2071 , G06F11/2094 , G06F11/3409 , G06F17/30306 , G06F17/30575 , G06F2211/1059 , G06F2211/1061
摘要: Re-arranging data handling in a computer-implemented system that comprises a plurality of existing physical entities. At least one reliability rating is assigned to each of various existing physical entities of the computer-implemented system; and in response to change. Reverse predictive failure analysis uses the assigned reliability ratings to determine cumulative reliability rating(s) for at least one arrangement of the system. Data handling is re-arranged with respect to at least a portion of the existing computer-implemented system to provide a designated cumulative reliability rating.
-
-
-
-
-
-
-
-
-