RECURSION SOFTWARE, INC. Patent applications |
Patent application number | Title | Published |
20140068188 | SYSTEM AND METHOD FOR MANAGING AN OBJECT CACHE - In order to optimize efficiency of deserialization, a serialization cache is maintained at an object server. The serialization cache is maintained in conjunction with an object cache and stores serialized forms of objects cached within the object cache. When an inbound request is received, a serialized object received in the request is compared to the serialization cache. If the serialized byte stream is present in the serialization cache, then the equivalent object is retrieved from the object cache, thereby avoiding deserialization of the received serialized object. If the serialized byte stream is not present in the serialization cache, then the serialized byte stream is deserialized, the deserialized object is cached in the object cache, and the serialized object is cached in the serialization cache. | 03-06-2014 |
20130117510 | SYSTEM AND METHOD FOR MANAGING AN OBJECT CACHE - In order to optimize efficiency of deserialization, a serialization cache is maintained at an object server. The serialization cache is maintained in conjunction with an object cache and stores serialized forms of objects cached within the object cache. When an inbound request is received, a serialized object received in the request is compared to the serialization cache. If the serialized byte stream is present in the serialization cache, then the equivalent object is retrieved from the object cache, thereby avoiding deserialization of the received serialized object. If the serialized byte stream is not present in the serialization cache, then the serialized byte stream is deserialized, the deserialized object is cached in the object cache, and the serialized object is cached in the serialization cache. | 05-09-2013 |
20130117405 | SYSTEM AND METHOD FOR MANAGING AN OBJECT CACHE - In order to optimize efficiency of serialization, a serialization cache is maintained at an object server. The serialization cache is maintained in conjunction with an object cache and stores serialized forms of objects cached within the object cache. When an object is to be sent from the server to the client, a serialization module determines if a serialized form of the object is stored in the serialization cache. If the object is already serialized within the serialization cache, the serialized form is retrieved and provided to the client. Otherwise, the object is serialized, the object is cached in the object cache and the serialized form of the object is cached in the serialization cache. | 05-09-2013 |
20130046893 | SYSTEM AND METHOD FOR TRANSFER OF AN APPLICATION STATE BETWEEN DEVICES - To enable continuous execution of an application, a system and method for transferring an application state is provided. A gesture corresponding to a transfer act is detected by a gesture detection module in a first device executing the application. The first device communicates with a registration and relay server to determine eligible transfer recipients based on criteria such as location and/or devices that are currently executing the application. A transfer recipient is selected and platform independent application state Data Transfer Objects are generated that describe the state of execution on the first device. The application state DTOs are transferred via the server to the recipient device which enacts the application state DTOs to continue the execution of the application on the recipient device. Because the application state DTOs are platform independent, the application state can be transferred to almost any device that is able to execute the application. | 02-21-2013 |
20130046591 | SYSTEM AND METHOD FOR COLLABORATIVE BUDGET TRACKING - To enable collaborative budget tracking, a budget tracker application can be downloaded and installed on a plurality of mobile devices that communicate on a peer-to-peer network. The budget tracker application comprises a master budget control module that enables a budget administrator to create a budget plan and advertise the budget plan to potential subscribers. The budget tracker application also includes an expense recording module that enables subscribers to enter expense data and submit the expense data to the master budget control module which records the expense data, updates the budget plan, and publishes any relevant updates to the subscriber devices. | 02-21-2013 |
20120311614 | ARCHITECTURE FOR PERVASIVE SOFTWARE PLATFORM-BASED DISTRIBUTED KNOWLEDGE NETWORK (DKN) AND INTELLIGENT SENSOR NETWORK (ISN) - A device API Abstraction layer is provided that is configured to operate as an interface between one or more applications operating on a device and an operating platform of the device. The device API abstraction layer comprises a universal set of APIs that enables the applications to execute irrespective of the operating system and software platform of the host device. | 12-06-2012 |
20120311547 | SYSTEM AND METHOD FOR PERVASIVE SOFTWARE PLATFORM-BASED MODEL DRIVEN ARCHITECTURE TRANSACTION AWARE APPLICATION GENERATOR - In developing applications for a plurality of node types, a meta-data definition of the application can be captured into an application definition module. The meta-data definition can describe the application for the plurality of node types. A code generation module can then automatically generate the application code for the plurality of node types, including transaction aware code. The code can be compiled per node type and the packaging necessary to deploy the application to the plurality of node types can also be automatically generated. | 12-06-2012 |
20120311526 | SYSTEM AND METHOD FOR PERVASIVE SOFTWARE PLATFORM-BASED MODEL DRIVEN ARCHITECTURE APPLICATION GENERATOR - In developing applications for a plurality of node types, a meta-data definition of the application can be captured into an application definition module. The meta-data definition can describe the application for the plurality of node types. A code generation module can then automatically generate the application code for the plurality of node types. The code can be compiled per node type and the packaging necessary to deploy the application to the plurality of node types can also be automatically generated. | 12-06-2012 |
20120311016 | SYSTEM AND METHOD FOR PROVIDING SELF-HEALING CAPABILITES IN A DISTRIBUTED KNOWLEGDE NETWORK/INTELLIGENT SENSOR NETWORK - To provide self-healing capabilities in a distributed knowledge network/intelligent sensor network, a node monitoring task agent can be deployed to a node to determine operating parameters of the node or of other task agents executing on the node. The operating parameters can be passed to a node monitoring data analysis engine which can analyze the data by referencing a rule-set. The analyzed data can be passed to a management application which can determine whether any self-healing actions need to be performed, such as moving the task agents to other healthier nodes of the DKN-ISN. | 12-06-2012 |
20120254463 | SYSTEM AND METHOD FOR REDIRECTING CONTENT BASED ON GESTURES - Content such as advertisements received into a mobile device may be more appropriately displayed on an alternative device remote from the mobile device. When ad content is received into the mobile device, the user may perform a physical gesture such as movement of the device or an associated motion sensor. The physical gesture is analyzed in the mobile device and causes the ad content to be redirected to the remote device. Additional physical gestures by the user can be interpreted in the mobile device to manipulate the content on the remote device. | 10-04-2012 |
20120254461 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A HANDSHAKE PROTOCOL - In order to enable a dynamic handshake procedure, a device may be configured with a list of handshake contributors. Contributors with connection handshake properties may be added to the contributor list. To perform handshake, the contributor list is processed to extract the connection handshake properties of each contributor to the handshake. Handlers for handling the connection handshake properties may also be dynamically added and invoked when a handshake is received. | 10-04-2012 |
20120254460 | SYSTEM AND METHOD FOR IMPROVED HANDSHAKE PROTOCOL - In order to enable a dynamic handshake procedure, a client device is configured with a list of handshake contributors. The client device initiates a handshake by determining the handshake contributors and writing properties of the handshake contributors in a client handshake, which is then sent to a server device. The client handshake is processed at the server device by invoking an appropriate handler, which handles the handshake result. The server can also send its contributors and their properties to the client. Once the client receives the properties, the client can call an appropriate handler to handle the properties. Connections may be created based on the exchanged properties. New contributors and contributor handlers may be added to both the client and server devices. | 10-04-2012 |
20120254448 | SYSTEM AND METHOD FOR SELECTION OF NETWORK TRANSPORT WITHIN A MOBILE DEVICE - In a mobile device, one of a plurality of network transports may be used for a connection request. The ideal network transport may be selected by executing a connection selection policy that is stored within the device. The connection selection policy may include one or more network transport evaluators that are each configured to weight the available network transports according to various criteria. Examples of network transport evaluators include evaluators that are dependent on geolocation, security levels, or battery status. | 10-04-2012 |
20120254375 | SYSTEM AND METHOD FOR CONNECTION EFFICIENCY - In a distributed object computing system, a server application may create multiple, uniquely identified, server contexts that each provide one or more services to a service consumer (client). Instead of creating a connection to a client for each server context, a single connection can be used. A service request handler may be configured to handle service requests for each server context. Service requests may be generated in the client with a service context identity. When a service request is received by the server application, the service request handler resolves the service context identity and forwards the service request to the appropriate server context. | 10-04-2012 |
20120254374 | SYSTEM AND METHOD FOR PROXY ADDRESS NEUTRALITY - To provide proxy address neutrality, in particular for mobile server devices, a server application can register its network address with a discovery application. Whenever the server application acquires a new network address, the server application updates the discovery application. A client application providing proxy services for the server application can invoke calls to the server client using the network address for the server application that is currently stored in the client device. If the current network address is invalid, the client application obtains an updated network address from the discovery application. | 10-04-2012 |
20120254319 | SYSTEM AND METHOD FOR COMMUNICATION BETWEEN NETWORKED APPLICATIONS - During communication of a large data message from a client application to a server application, requirements to communicate smaller control messages can arise. To facilitate timely communication of control messages, a client application may include a chunking module that divides a data message into chunks that can be sent as a sequence of individual data message packets. When a control message needs to be sent, the sequence of data message packets can be interrupted to send a control message packet. At the server application, the sequence of message packets is processed so that data message packets are appended to a data message and control messages are extracted for immediate processing. | 10-04-2012 |
20120254283 | SYSTEM AND METHOD FOR PERSISTING MOBILE AGENTS WITHIN A MOBILE REGION OF INTEREST - Mobile agents can be deployed to mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. The region of interest may be a mobile and/or dynamic region of interest defined by, for example, a proximity to one or more mobile wireless access points or by an overlapping peer-to-peer communication range of a plurality of mobile devices that are configured to support the agent. | 10-04-2012 |
20120254279 | SYSTEM AND METHOD FOR SERVICE MOBILITY - When service requirements require moving of services registered with an object request broker (ORB) at a source server, continuity of service to service requests from clients may be provided by queuing the service requests at the source server. A server context with the same GUID as a source server context may be established at a destination server. URLs for the moved services may be registered with a destination ORB which may then begin receiving service requests. The source server may then respond to the queued service requests with respective URLs for the services registered at the destination ORB. Endpoints at the clients may be updated with the new URLs prior to resending the service requests. The movement of the ORB to the destination server may thus be transparent to the client application. | 10-04-2012 |
20120254228 | SYSTEM AND METHOD FOR FILTERING CONTENT BASED ON GESTURES - In order to provide filtering of content to be presented on a mobile device, a gesture-based preferencing system and method may be employed. When content is presented to a user, the user may indicate a positive or negative preference toward that content by making a gesture. The gesture may be detected by a motion sensor and the preference of the content indicated by the gesture may be stored in a preference datastore. The preference may be used to subsequently filter content that is to be presented to the user. | 10-04-2012 |
20120254129 | SYSTEM AND METHOD FOR MANAGING SENSITIVE DATA USING INTELLIGENT MOBILE AGENTS ON A NETWORK - In order to manage stale data on a network of computer systems, a file harvester agent may be configured with a list of stale data files to be deleted. The file harvester agent may be deployed to the computer systems of a network. When executed in a computer system, the file harvester agent searches the file system of the computer system to locate any files or data indicated in the file list. Any located data files are deleted. Once the agent has finished processing the file list on a computer system, the agent can copy or replicate itself to other computer systems of the network in accordance with a pre-configured itinerary. | 10-04-2012 |
20120252482 | SYSTEM AND METHOD FOR DETERMINING GEOLOCATION OF WIRELESS ACCESS POINT OR WIRELESS DEVICE - In order to determine the location of wireless network devices without inherent location capabilities, a wireless network device such as an access point can receive geolocation information from transient data sources such as mobile devices requiring network access from the access point. The access point stores geolocation records including location coordinates received from the transient data sources. The geolocation records can be processed to determine the position and movement of the access point. The geolocation records and/or location information can be passed to other transient clients that do not have inherent location capability. | 10-04-2012 |
20120252439 | SYSTEM AND METHOD FOR ESTIMATING CASUALTIES - To estimate the number of casualties at an event, a query may be sent to mobile device history database(s) associated with one or more mobile base stations that provide service coverage to an area that encompasses the event. The query determines the number of abnormal disconnects from the base station in a time interval immediately after the event. From the query response, a calculation may be performed of the number of casualties, with some or all of these abnormal disconnects being considered to indicate a casualty. Additional parameters can be applied to a casualty calculation, such as the percentage of persons in an area who would normally carry a mobile device that is connected to the one or more base stations. | 10-04-2012 |
20120250688 | SYSTEM AND METHOD FOR UNMARSHALLED ROUTING - In distributed object computing, messages from a source node to a destination node are often required to be routed via one or more intermediate nodes. In order to enhance efficiency of the relay process, a message envelope of a message may include a node list field that specifies the routing path of the message. The communication protocol for communicating the message may specify that when a message is received into a particular node, the node analyzes the node list field. If the identity of the node is last in the node list field, then the node is the destination node and thus the node unmarshals the message. Otherwise, the node forwards the message to the next node in the field list without unmarshalling the message. | 10-04-2012 |
20110138469 | SYSTEM AND METHOD FOR RESOLVING VULNERABILITIES IN A COMPUTER NETWORK - In a computer network, a remedy server may be provided that controls vulnerability scans of the computer nodes. The remedy server determines a security level of a computer node and dispatches an agent to the node with a scan matching the security level. The agent executes the scan and reports the scan results to the remedy server. The remedy server collates scan results from a plurality of the network computers and determines which computers have a common vulnerability. A fix for the vulnerability, such as an executable patch file, is retrieved and multicast to those relevant computers. | 06-09-2011 |
20110138460 | SYSTEM AND METHOD FOR LOADING APPLICATION CLASSES - In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the application's security permissions, e.g. by decoding a security token. The class is then retrieved from a repository that stores class variants matching the required security level. The retrieved class variant, which may have a full or a reduced functionality as appropriate for the security permission may then by loaded. | 06-09-2011 |
20110138443 | SYSTEM AND METHOD FOR VALIDATING A LOCATION OF AN UNTRUSTED DEVICE - In a system of mobile agents operating in a region of interest, it may be necessary to validate the position of an untrusted device prior to allowing the untrusted device to perform agent functions within the region of interest. Trusted mobile agents within the region of interest may activate wireless access points with randomly generated identifiers. The untrusted device may be instructed to provide a list of identifiers of visible wireless access points to confirm that the untrusted device is within the ROI. | 06-09-2011 |
20110138382 | SYSTEM AND METHOD FOR LOADING RESOURCES INTO A VIRTUAL MACHINE - In a heterogeneous environment of virtual machines, an agent can migrate between virtual machines of different types. During migration, classes of the mobile agent may need to be instantiated on the new virtual machine. To support classes across all virtual machine types, a resource server is provided that can provide virtual machine type specific instances of the classfile. The resource server receives a resource request from a resource loader of a virtual machine. The resource request specifies the resource and the virtual machine type, thereby enabling the resource server to retrieve the correct instance of the classfile to return to the resource loader. | 06-09-2011 |
20110138381 | SYSTEM AND METHOD FOR REQUESTING RESOURCES INTO A VIRTUAL MACHINE USING CONNECTION INFORMATION - In a heterogeneous environment of virtual machines, an agent can migrate between virtual machines of different virtual machine types. During migration, objects of the serialized stream, e.g. representing a mobile agent, may need to be instantiated on the new virtual machine. Where the resources required to instantiate an object are missing on the virtual machine, the virtual machine may use connection information recorded when the serialized stream was received to connect to the source machine and request the required resources (e.g. the type for the object) from the source machine. A resource request to the source machine may specify a virtual machine type of the requesting virtual machine, thereby enabling the source machine to retrieve the correct instance of the type to return to the virtual machine. | 06-09-2011 |
20110138243 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR COMMUNICATION OF ENCODED MESSAGES - A message encoding specification and implementation where a receiver of an encoded message determines if the message can be decoded. If the receiver can decode the message, it does so and continues processing the message. If the receiver cannot decode the message, it returns a distinguished failure message to the sender, expecting the sender to resend the message using a different encoding scheme. When a sender receives the distinguished failure message that the receiver cannot decode the message, the sender encodes the message using an alternate encoding scheme, if one is available, and resends the message. The process continues until the sender has tried all available encoding schemes. If a sender exhausts the collection of available encoding schemes without finding one the receiver can successfully decode, the sender treats the failure as an error. | 06-09-2011 |
20110138168 | METHOD, APPARATUS AND COMPUTER PROGRAM TO PERFORM DYNAMIC SELECTION OF SERIALIZATION PROCESSING SCHEMES - The present application is directed to a method, apparatus a computer program product configured to perform certain operations of dynamic serialization. In one example, a message is received which includes at least one message element requiring serialization. A first message element of the message is examined. A serialization scheme from a serialization scheme library is selected based on the at least one examined attribute of the first message element. Then, at least the first message element is encoded using the serialization scheme selected. | 06-09-2011 |
20110137972 | SYSTEM AND METHOD FOR AGENT NETWORKS - In a network of mobile agents, data integrity can be improved by providing an agent server that can migrate between devices operating in the region of interest (ROI). The agent server distributes agent clients onto devices in the ROI and provides agent server services to the agent clients, including receiving and storing data from the agents. When the agent server device is to leave the ROI, the agent server can migrate to any device executing an agent client and continue to provide the agent server services, including data collection and aggregation, from the device to which the agent server has migrated. | 06-09-2011 |
20110137804 | SYSTEM AND METHOD FOR APPROVING TRANSACTIONS - In a transaction between a merchant and a payer, approval of the transaction may be provided by a payment processing system using authentication information provided from a mobile device of the payer. The authentication information may include a location of the payer mobile device which may be compared to a location of a merchant payment device such that the transaction is approved if the payer mobile device is within a defined distance of the merchant payment device. | 06-09-2011 |
20110137614 | SYSTEM AND METHOD FOR OPERATING A NETWORK OF SENSORS - In a network of sensor nodes, operational efficiency may be increased by configuring the sensor nodes so that sensor agents may be transferred to alternative sensor nodes to process sensor node data, such as when the host sensor node is in a low-power mode. A processing node of the network may be configured to retrieve real-time data from a sensor node, but if real-time data is not available, the processing node may perform calculations on cached data retrieved from a processor node cache or data of a nearby sensor node. | 06-09-2011 |
20110136532 | SYSTEM AND METHOD FOR PROVIDING A COMMUNITY OF MOBILE DEVICES - In a community of mobile devices, a non-participating device can be joined to the community if the non-participating device meets location dependent criteria. The device's location can be determined, e.g. be an onboard GPS, from which it can be determined if the device is within a geospatial boundary of the community. The geospatial boundary may be calculated from the locations of community member devices. Only devices that meet the location dependent criteria will be eligible for participation in the community. | 06-09-2011 |
20110136511 | METHOD, APPARATUS AND COMPUTER PROGRAM TO PERFORM LOCATION SPECIFIC INFORMATION RETRIEVAL USING A GESTURE-CONTROLLED HANDHELD MOBILE DEVICE - A method and apparatus are disclosed that calculate an area-of-interest based on a user request for location specific data. The operations may include transmitting initial location data of the mobile terminal and user initiated gesture data to a server. The server may then perform initiating a request to receive the requested location data, and calculating a geographical area-of-interest based on the initial location data and the user initiated gesture data. The location specific data related to the area-of-interest may then be retrieved and transmitted to the mobile terminal. The area-of-interest may be defined based on the initial position of the mobile terminal and information provided by a gesture made by the user of the mobile terminal. | 06-09-2011 |
20110136510 | SYSTEM AND METHOD FOR MIGRATING AGENTS BETWEEN MOBILE DEVICES - Mobile agents can be deployed to location aware mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. When a device hosting the agent exits the region of interest, the agent is terminated, thereby freeing device resources. | 06-09-2011 |
20110136507 | SYSTEM AND METHOD FOR APPLICATIONS ON MOBILE COMMUNICATIONS DEVICES - The functionality of smartphone applications may be extended to a basic phone, i.e., a phone lacking a particular smartphone capability, by providing a data synthesizer in the basic phone that synthesizers required data points. The data synthesizer may communicate with nearby smartphones to collect relevant data points such as location or motion data. Data points for the basic phone may be calculated from the collected data points. When an application on the basic phone requests data, a data provider proxy may retrieve a synthesized data point from the data synthesizer. In one example, a basic phone without a GPS or similar location module may execute a mapping application by averaging location data from nearby smartphones. | 06-09-2011 |
20110136463 | SYSTEM AND METHOD FOR CONTROLLING AN EMERGENCY EVENT IN A REGION OF INTEREST - An emergency response system of a premises uses an egress agent or application installed on mobile communications devices of users to provide evacuation instructions that are specific to the location of the user. The egress agents determine the location of their device and may determine an evacuation route from premises plans stored in the device or by transmitting their location to a server and receiving evacuation instructions from the server. Tracking of the devices along the evacuation route provides continual updates as to the relevant safety of an evacuation route. | 06-09-2011 |