Abstract:
Systems and methods for providing secure offline file access utilizing information rights management (IRM) are provided herein. In some embodiments, the method may comprise storing one or more IRM-protected documents in a secure local storage on a user device; storing one or more consumption licenses associated with the one or more IRM-protected documents in the secure local storage on the user device, wherein the one or more consumption licenses is required to access one or more IRM-protected documents; detecting a loss of network connectivity on the user device; writing the one or more consumption licenses to an IRM location in memory on the user device; receiving a request to open a document of the one or more IRM-protected documents; reading the consumption license from the IRM location in memory; and enabling access to the requested IRM-protected document based on the consumption license.
Abstract:
A method for the reorganization of messages in queuing systems is disclosed. The method comprising receiving a statement to reorganize one or more messages within an ordered data structure; translating the statement into a first set of instructions for identifying one or more messages on which to perform one or more operations, a second set of instructions for performing the one or more operations on the identified one or more messages, and a third set of instructions for storing, in a memory, the identified one or more messages after the one or more operations have been performed; executing the first set of instructions, the second set of instructions, and the third set of instructions on each message in the ordered data structure; and transmitting the operated upon messages.
Abstract:
Network analysis including dynamic smoothing, isolating non-optimally performing systems and downstream aware transactional workflows is described herein. Each of the implementations, separately or together, is able to improve network functionality.
Abstract:
Embodiments of the present invention are directed to generating and delivering data elements out of the context of an application installation. Each data element generated by an application is transmitted to a collection server after a networked computing device has connected back to a network, and even after the application has been removed from the networked computing device. Each data element is associated with a globally unique transaction identifier. Each data element and its corresponding transaction identifier are packaged together for transmission to the collection server via one or more of a plurality of transmission pathways, including a messaging pathway. The collection server uses the transaction identifier to check whether a corresponding data element is already stored by the collection server. The data element is stored by the collection server, if not already stored.
Abstract:
A method and system for managing email or other messaging and attachments to messages which are forwarded to devices having limited processing and memory capacity. The method includes the steps of: receiving a user configuration categorizing messages for the user by elements of the message; accessing the user message datastore upon receipt of at least one new message for the user to a user data store; comparing said at least one new message to a set of user specific rules; rendering a message summary including at least one link accessible by the processing device, the link enabling action with respect to the message when selected by the user; and outputting the message summary to a user device.
Abstract:
A computer implemented system and method for distributed replication locks. The method comprises receiving at a first data center of a plurality of data centers, a request to perform an operation on data associated with a user; creating a lock on all of the data centers in the plurality of data centers; performing the operation associated with the request on the user data; determining that the user data is replicated across all data centers of the plurality of data centers; and purging the lock when it is determined the operation is complete on all of the data centers in the plurality of data centers.
Abstract:
A computer implemented method and apparatus for generating smart albums. The method comprises performing image analysis on a plurality of media files on a first user device, wherein each of the plurality of media files includes metadata; updating metadata associated with each of the plurality of media files based on the image analysis; transmitting the plurality of media files and updated metadata to a media sharing server; receiving, in response to transmitting the plurality of media files, one or more media files created by other users, wherein the metadata associated with the received media files is similar to the metadata associated with the transmitted media files; and generating a plurality of albums based on a comparison of metadata of the transmitted and received media files.
Abstract:
Embodiments of the present invention relate to a media processing engine that produces an age progression video of a person by using photos of the person. The processing engine sequences and manipulates the photos such that the focus in each chronological photo is on the person. The processing engine uses a sliding window for facial recognition across a wide age range such that pictures of the person at a younger age (e.g., infancy) are positively associated with pictures of the person at an older age (e.g., teenager). In some embodiments, the processing engine is implemented on a remote server that provides a backup or storage service to its members. The photos are located at the remote server. The age progression video can be downloaded and/or shared by a member with others. In some embodiment, the age progression video includes a text caption, such as a message promoting the service.
Abstract:
Embodiments of the present invention are directed to multiple-factor authentication for accessing a cloud service from end-user devices. Authentication can be account-based, carrier-based or a combination thereof. Upon a first activation of a client application on an end-user device, the application first takes the user through a multiple-factor authentication process. Thereafter, upon each subsequent activation of the client application, the client application automatically obtains an identifier from the device and provides at least the obtained identifier to a server providing the cloud service. The server determines whether the identifier matches one of previously stored identifiers in the user's account. A previously stored identifier can be a unique device identifier of an “allowed” device or can be a carrier supplied identifier of a user. Based on the determination, the server automatically allows the device access to the cloud service without other user input.
Abstract:
An integrated access provisioning system provides an integrated approach to the ordering, design, provisioning, testing and acceptance of access. The system is designed to assist service providers to streamline the delivery of access services to their customers. Specifically, the system: presents an intuitive front end for ordering access, performs access validation, stores customer circuit inventory to assist in circuit design, provides work flow management with dynamic work queues to support major access delivery functions, supports manual Local Exchange Carrier (LEC) interfaces and provides a reporting engine based on testing.