A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.
Differential Client-Side Encryption Of Information Originating From A Client
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.
- Columbus OH, US Daniel Craig Manges - Powell OH, US Michael A. Panetta - Grandview Heights OH, US
International Classification:
G06F 9/54
Abstract:
An Application Programming Interface (API) call that is directed from a first application to a second application is intercepted. A first version number is identified for the first application and a second version number is identified for the second application. One or more transformations are processed on the API call to produce a compatible API call that is compatible with the second application. The compatible API call is provided to the second application for processing on behalf of the first application.
Michael A. Panetta - Grandview Heights OH, US James Wilbert Devine - Columbus OH, US Daniel Craig Manges - Powell OH, US
International Classification:
G06F 16/242 G06F 16/21 G06F 40/205
Abstract:
Structured data comprising primary data is transformed into object-based data comprising the primary data and at least one search function. The object-based data when loaded into memory provides the search function as executable instructions for an object instance. When an application calls the object instance with search terms as input, the search terms are located within the primary data (which is loaded into memory) by the search function, and the object instance returns corresponding field values from the primary data associated with the search terms to the application.
- Columbus OH, US Daniel Craig Manges - Powell OH, US
International Classification:
G06F 9/48 G06F 16/22 G06F 16/2458 G06F 16/21
Abstract:
Input records are obtained based on a request to process an application. References to the input records are stored as entries in a queue. A total thread number for threads and a total server number for servers are determined. The threads are initiated on the servers and are asynchronously processed in parallel on the servers. Each thread obtains a reference from a unique entry of the queue, marks that entry as being addressed, processes the input record corresponding to the entry using values provided with a request to process the application, stores results associated with processing the input record in a data store, and iterates back to obtain a next unique entry from the queue until every entry of the queue is marked as having been addressed. When every entry of the queue is marked, a reference is returned to the data store as application results for processing the application.
- Columbus OH, US James Wilbert Devine - Columbus OH, US Daniel Craig Manges - Powell OH, US
International Classification:
G06F 16/242 G06F 16/21 G06F 17/27
Abstract:
Structured data comprising primary data is transformed into object-based data comprising the primary data and at least one search function. The object-based data when loaded into memory provides the search function as executable instructions for an object instance. When an application calls the object instance with search terms as input, the search terms are located within the primary data (which is loaded into memory) by the search function, and the object instance returns corresponding field values from the primary data associated with the search terms to the application.
Passively Capturing And Monitoring Device Behaviors
- Columbus OH, US Daniel Craig Manges - Powell OH, US
International Classification:
H04W 4/02 B60W 40/09 H04W 4/029
Abstract:
A determination is made that a mobile device is associated with a reference activity of a user based on motion, orientation, rotational, magnetic field, and/or location data provided by sensors of the device. Activity data associated with the reference activity is obtained from the sensor-provided data. The activity data is recorded on the device for a configured period of time after which it is determined that the device is no longer performing the reference activity. The retained activity data for the reference activity is sent from the device to a network-based behavior analyzer when a network connection is available from the device. The network-based behavior analyzer derives user behaviors for the reference activity based on the activity data.
- Columbus OH, US Daniel C. Manges - Powell OH, US Michael A. Panetta - Grandview Heights OH, US
International Classification:
G06F 9/54
Abstract:
An Application Programming Interface (API) call that is directed from a first application to a second application is intercepted. A first version number is identified for the first application and a second version number is identified for the second application. One or more transformations are processed on the API call to produce a compatible API call that is compatible with the second application. The compatible API call is provided to the second application for processing on behalf of the first application.