Patent classifications
H04L51/00
Game apparatus and storage medium storing a game program for conducting data communications with a network
A game apparatus includes an input-output processor, and by following an instruction from the input-output processor, messages are transmitted and received with other game apparatus 12 connected via a network. The messages are transmitted and received in an electronic mail format, and has identification information of an application being a creation source of the message as well as general information, such as a transmission source, a destination and a subject as header information.
Targeted notification of content availability to a mobile device
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.
Targeted venue message distribution
An application server may receive, from an administrative console, a message and a targeting specification. The targeting specification identifies at least one trait (e.g., ticket type, age, gender) shared by a group of targeted venue guests. The group of targeted venue guests is a subset of the plurality of venue guests of a venue. The application server then uses information obtained from venue guest devices corresponding to venue guests to identify who belongs to the group targeted venue guests as well as their corresponding targeted venue guest devices. The application server then transmits a message to the targeted venue guest devices. The message may further be transmitted according to a schedule set or triggers by the administrator console. The schedule may identify dates and times within which messages should be sent, while the triggers may identify locations that may trigger messages.
Hardened VoIP system
A hardened VoIP system is presented that includes secure push-to-talk voice functionality. Through the addition of encryption, authentication, user filtering, and integration with the new and existing LMR systems, a secure voice platform ensures malicious software, unauthorized access and brute force security attacks will not compromise the voice communications of the system. The VoIP system is engineered to ensure graceful system degradation in the event of maintenance activities, natural disasters and failure modes. The hardened VoIP system offers the functions a LMR trunking system while utilizing broadband connections. Private calls, group calls, Emergency Alarms with covert monitoring capability, scanning and priority scanning may be incorporated into the system. The system includes a VoIP controller that serves as a trunking controller, manages available VoIP based conference bridges, and assigns them as needed to the parties involved in each voice call.
Authenticating and confidence marking e-mail messages
Methods and systems for authenticating and confidence marking e-mail messages are described. One embodiment describes a method of authenticating an e-mail message. This method involves extracting a plurality of e-mail headers associated with the e-mail message, and identifying a sending edge mail transfer agent (MTA). The method then calls for determining if the sending edge MTA is authorized to send the e-mail message.
Managing Assets
A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.
CALCULATING STRUCTURAL DIFFERENCES FROM BINARY DIFFERENCES IN PUBLISH SUBSCRIBE SYSTEM
A method for more efficient structural parsing of binary representations of text based objects within a data distribution system. Clients subscribe to a topic maintained by the data distribution system server that publishers can publish to. Clients receive an original binary representation of a text based object describing the state of the topic to which the client is subscribed. In response to the state of the topic changing at the data distribution system server, clients receive a binary delta representing the change N of the state of the topic. Based on the received binary representation and the binary delta, clients calculate an updated binary representation of the text based object. Using the original binary representation, the updated binary representation, and the binary delta, the client generates a structural delta representing the structural differences between data structures of the original text based object and data structures of the updated text based object.
Systems and methods for data encryption and decryption
A computer-implemented method is provided for encrypting a message using a plurality of keys and a plurality of encryption algorithms. The method includes mapping, by the computing device, each of the plurality of keys to an encryption algorithm randomly selected from the plurality of encryption algorithms, and storing, by the computing device, in an index table the plurality of keys correlated to their respective encryption algorithms. The method also includes decomposing, by the computing device, the message into one or more message segments and encrypting, by the computing device, each of the one or more message segments using the index table. The method further includes transmitting, by the computing device, at least one of the index table or the one or more encrypted message segments to a receiving computing device over the electronic network.
MANAGING EMAIL CONTENT IN AN ACTIVITY STREAM
Managing email content in an activity stream includes receiving a selection of a number of criteria that indicate content to be presented in an activity stream, retrieving email content based on the number of criteria, and displaying the email content in an activity stream by referencing email data related to the metadata.
SETTING PERMISSIONS FOR LINKS FORWARDED IN ELECTRONIC MESSAGES
A permission manager detects when the message including the link is forwarded and sends a notification to the author indicating that the message was forwarded to another recipient. A notification may also be sent to the recipient who received the forwarded message indicating that the author has been notified that the recipient is not authorized to access the linked content within the forwarded message. The author may set the permissions for accessing the linked content from permission options that are displayed with the notification message sent by the permission manager. Once the permissions are set, the permission manager may send a notification to the recipient of the forwarded message with information relating to the set permissions.