SPLITTING OF PROCESSING LOGICS ASSOCIATED WITH COMMANDS OF PAGES IN A DISTRIBUTED APPLICATION
    1.
    发明申请
    SPLITTING OF PROCESSING LOGICS ASSOCIATED WITH COMMANDS OF PAGES IN A DISTRIBUTED APPLICATION 审中-公开
    在分布式应用程序中分割与页面命令相关的处理逻辑

    公开(公告)号:WO2014086656A3

    公开(公告)日:2014-12-18

    申请号:PCT/EP2013074956

    申请日:2013-11-28

    Abstract: A solution is proposed for controlling a distributed application. A corresponding method (400) comprises the steps of detecting (404-422) an indication of a computational capability of a client computing machine and/or of a server computing machine, building (424-440) at least part of a page in response to a request received by the server computing machine from the client computing machine, the page comprising a set of commands each one for submitting a next request on the client computing machine, a processing logic for serving each next request being split between a client processing component and/or a server processing component, returning (442-456) the page with the client processing component for each command to the client computing machine for causing the client computing machine to load the page and execute each client processing component in response to the corresponding next request, and executing (458-464,424-440) each server processing component in response to the corresponding next request.

    Abstract translation: 提出了一种解决方案来控制分布式应用程序。 相应的方法(400)包括以下步骤:检测(404-422)客户端计算机器和/或服务器计算机器的计算能力的指示;响应于建立(424-440)页面的至少一部分 服务器计算机器从客户机计算机器接收到的请求,所述页面包括一组命令,每一个命令用于在客户机计算机器上提交下一个请求;处理逻辑,用于服务每个下一个请求被分割在客户机处理组件 和/或服务器处理组件,向客户端计算机器返回(442-456)具有用于每个命令的客户端处理组件的页面,以使得客户端计算机器加载页面并且响应于相应的响应执行每个客户端处理组件 下一个请求,并且响应于相应的下一个请求执行(458-464,424-440)每个服务器处理组件。

    A protected wireless network access point allowing limited access to an affiliated group of mobile stations

    公开(公告)号:GB2507056A

    公开(公告)日:2014-04-23

    申请号:GB201218593

    申请日:2012-10-17

    Applicant: IBM

    Abstract: A protected wireless network access point usually allows access to entitled mobile stations only (fig. 3A). In the invention, if the mobile station 115b is not entitled 115, a check is made to determine whether the mobile station is affiliated to an affiliation group of the access point, the affiliation group comprising several access points and mobile stations. If the mobile station is affiliated then access is granted in a limited access mode e.g. access is bandwidth limited. Access to the network is denied if the non-entitled mobile station is not affiliated. The workload of the access point may be monitored and the bandwidth limitation for affiliated mobile stations updated accordingly. Verification of the affiliation may involve checking an encrypted identifier of the mobile station at an affiliation server. A mobile telephone infrastructure provides each mobile station with a set of affiliated access points associated with their position.

    LOCATION OF UNPROTECTED ACCESS POINTS THROUGH PROTECTED ACCESS POINTS

    公开(公告)号:CA2871862C

    公开(公告)日:2021-03-02

    申请号:CA2871862

    申请日:2013-05-15

    Applicant: IBM

    Abstract: A solution for locating unprotected access points is provided. Particularly, in an embodiment of the invention a wireless network access point (105) providing an access to a network (115) over a wireless connection maintains (602-630) a location structure (530) comprising an indication of a geographical position of each one of a set of unprotected access points (105u) in proximity of the access point, each unprotected access point providing the access to the network at least partially unconditionally. A mobile station (110) submits (636) a request to access the network (115) to the access point when the mobile station is within a transmission range thereof, receives (658-660) the indication of the geographical position of at least part of the unprotected access points (105u) in response to a denial of the access from the access point, and outputs (670-680) directions towards one of the unprotected access points according to the corresponding geographical position.

    Obtaining a geographical position of a mobile device

    公开(公告)号:GB2519078A

    公开(公告)日:2015-04-15

    申请号:GB201317740

    申请日:2013-10-08

    Applicant: IBM

    Abstract: A method for obtaining a geographical position of a mobile device may be provided. The mobile device may comprise a Bluetooth transceiver and a storage unit for storing an offline map. The method may comprise establishing a Bluetooth connection, requesting geographical coordinates using two bits of the Frequency Hopping Synchronization data packet of the Bluetooth protocol, receiving geographical coordinates by the mobile device, and mapping the received geographical coordinates to the offline map for obtaining the geographical position of the mobile device in the map.

    Splitting the processing logic of a distributed application page between client and server

    公开(公告)号:GB2508598A

    公开(公告)日:2014-06-11

    申请号:GB201221754

    申请日:2012-12-04

    Applicant: IBM

    Abstract: At least part of a page 320 of a distributed application, typically a web application 310, is built in response to a request received by a server computer 102 from a client computer 115. The page comprises a set of commands, each command for submitting a next request on the client, the processing logic for which is split between a client processing component 325 and a server processing component 315. The page is returned to the client with the client processing component for each command, causing the client to load the page. In response to a next request the corresponding client and server components are executed. An indication of the computational capability of a client computing machine 115 and/or of a server computing machine 105 is detected, preferably before the page is built and in response to client access to the application. This may be an indication of computational resources such as processor power or memory and may be monitored and updated. In an embodiment, the step of building at least part of a page comprises creating the client and server processing components according to the respective computational capabilities of client and server.

    LOCATION OF UNPROTECTED ACCESS POINTS THROUGH PROTECTED ACCESS POINTS

    公开(公告)号:CA2871862A1

    公开(公告)日:2013-11-28

    申请号:CA2871862

    申请日:2013-05-15

    Applicant: IBM

    Abstract: A solution for locating unprotected access points is provided. Particularly, in an embodiment of the invention a wireless network access point (105) providing an access to a network (115) over a wireless connection maintains (602-630) a location structure (530) comprising an indication of a geographical position of each one of a set of unprotected access points (105u) in proximity of the access point, each unprotected access point providing the access to the network at least partially unconditionally. A mobile station (110) submits (636) a request to access the network (115) to the access point when the mobile station is within a transmission range thereof, receives (658-660) the indication of the geographical position of at least part of the unprotected access points (105u) in response to a denial of the access from the access point, and outputs (670-680) directions towards one of the unprotected access points according to the corresponding geographical position.

    Lokalisieren ungeschützter Zugangspunkte durch geschützte Zugangspunkte

    公开(公告)号:DE112013002629B4

    公开(公告)日:2017-08-31

    申请号:DE112013002629

    申请日:2013-05-15

    Applicant: IBM

    Abstract: Verfahren (600) zum Betreiben eines kabellosen Netzwerkzugangspunktes (105), der einen Zugang zu einem Netzwerk (115) über eine kabellose Verbindung bereitstellt, wobei das Verfahren die Schritte aufweist: Unterhalten (602 bis 630) einer Lokalisierungsstruktur (530), die eine Angabe einer geografischen Position eines jeden von einem Satz von ungeschützten Zugangspunkten (105u) in der Nähe des Zugangspunktes aufweist, wobei jeder ungeschützte Zugangspunkt den Zugang zum Netzwerk zumindest teilweise bedingungsfrei bereitstellt, Empfangen (638) einer Anfrage, auf das Netzwerk von einer Mobilstation (110) innerhalb eines Übertragungsbereichs des Zugangspunktes zuzugreifen, Ablehnen (646 bis 652) des Zugangs zum Netzwerk gegenüber der Mobilstation, und Ausgeben (654 bis 656) der Angabe der geografischen Position zumindest eines Teils des ungeschützten Zugangspunktes an die Mobilstation als Reaktion auf die Ablehnung des Zugangs, wobei der Schritt des Unterhaltens (602 bis 630) einer Lokalisierungsstruktur (530) aufweist: Empfangen (614) einer weiteren Lokalisierungsstruktur von einem weiteren Zugangspunkt innerhalb des Übertragungsbereichs des Zugangspunktes, wobei die weitere Lokalisierungsstruktur eine Angabe einer geografischen Position eines jeden von einem Satz von weiteren ungeschützten Zugangspunkten (105u) in der Nähe des weiteren Zugangspunktes aufweist, Erkennen (602 bis 604) eines jeden von einem Satz noch weiterer ungeschützter Zugangspunkte innerhalb des Übertragungsbereichs des Zugangspunktes, Ermitteln (618) einer Angabe einer geografischen Position jedes noch weiteren ungeschützten Zugangspunktes, und Aktualisieren (622 bis 628) der Lokalisierungsstruktur gemäß jedem noch weiteren ungeschützten Zugangspunkt, wobei die Schritte des Aktualisierens (622 bis 628) der Lokalisierungsstruktur gemäß jedem weiteren ungeschützten Zugangspunkt und des Aktualisierens (622 bis 628) ...

    Method for detecting phishing of a matrix barcode

    公开(公告)号:GB2518443A

    公开(公告)日:2015-03-25

    申请号:GB201316902

    申请日:2013-09-24

    Applicant: IBM

    Abstract: A matrix barcode (e.g. QR code) comprising colored and white squares in rows and columns is analysed, e.g. for the detection of phishing performed by overlaying a barcode with a malicious barcode (see figs. 2-4). The barcode is scanned row by row and column by column resulting in received squares, and a corresponding white color level for each received white square is stored. The white color levels of the received white squares are compared in pairs. A counter may be increased if the white color levels of the pair differentiate by more than a threshold and a notifier (e.g. phishing notifier) is activated after all the comparisons are performed if the counter is greater than a threshold. A web access corresponding to the barcode may be blocked upon activation of the notifier. Shading compensation may also be performed on the barcode, e.g. by applying a dynamic multiplier which is proportional to an intensity of shade on the matrix barcode.

    Location of unprotected access points through protected access points

    公开(公告)号:GB2516407A

    公开(公告)日:2015-01-21

    申请号:GB201421346

    申请日:2013-05-15

    Applicant: IBM

    Abstract: A solution for locating unprotected access points is provided. Particularly, in an embodiment of the invention a wireless network access point (105) providing an access to a network (115) over a wireless connection maintains (602-630) a location structure (530) comprising an indication of a geographical position of each one of a set of unprotected access points (105u) in proximity of the access point, each unprotected access point providing the access to the network at least partially unconditionally. A mobile station (110) submits (636) a request to access the network (115) to the access point when the mobile station is within a transmission range thereof, receives (658-660) the indication of the geographical position of at least part of the unprotected access points (105u) in response to a denial of the access from the access point, and outputs (670-680) directions towards one of the unprotected access points according to the corresponding geographical position.

Patent Agency Ranking