[ { "title": "Real-time attendance reporting", "publication_date": "2010/30/12", "number": "08671001", "url": "/2010/12/30/realtime-attendance-reporting/", "abstract": "In one embodiment, a method includes periodically receiving from multiple mobile client systems multiple event attendee list updates, updating an event attendee list database based on the event attendee list updates, and periodically generating an attendance report based the event attendee list and the event attendee list updates.", "owner": "Eventbrite, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Local SQL files for mobile clients", "publication_date": "2010/30/12", "number": "08812525", "url": "/2010/12/30/local-sql-files-for-mobile-clients/", "abstract": "In one embodiment, a method includes receiving a request from a mobile client system for an event attendee list and transmitting a request to a data store for the event attendee list. If the event attendee list is available on the data store, then receiving the event attendee list from the data store, else transmitting a request to a data store for the event attendee list and receiving the event attendee list from a module. After receiving the event attendee list, the method includes transmitting the event attendee list to the mobile client system.", "owner": "Eventbrite, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Derived simulations for planning systems", "publication_date": "2010/28/12", "number": "08612190", "url": "/2010/12/28/derived-simulations-for-planning-systems/", "abstract": "Baseline data may be generated, including copying selected data from a planning database. Modifying requests associated with changes to a derived simulation may be received, and affected entries within the baseline data that are affected by the modifying requests may be determined. Simulation entries may be stored within a derived simulation dataset, the simulation entries corresponding to the affected entries within the baseline data. A mapping may be provided between the simulation entries within the derived simulation dataset and the affected entries within the baseline data. The derived simulation may be provided in response to the modifying requests and based on the mapping.", "owner": "SAP AG", "owner_city": "Walldorf", "owner_country": "DE" }, { "title": "Solidifying the executable software set of a computer", "publication_date": "2010/22/12", "number": "08561051", "url": "/2010/12/22/solidifying-the-executable-software-set-of-a-computer/", "abstract": "System and method for solidifying (or “freezing”) the set of software and configuration data available for execution on a computer. Any additional software installed on the computer after the solidification process will not execute, regardless of whether the installation is initiated or otherwise performed by a person with administrative privilege. The ability to allow new or modified software to execute on the computer rests with an integrity server separate from and outside of the solidified computer. The solidification of software and configuration data proceeds on a level of granularity selectable by the integrity server and any operators thereof.", "owner": "McAfee, Inc.", "owner_city": "Santa Clara", "owner_country": "US" }, { "title": "Methods and systems for detecting skewed data in a multitenant database environment", "publication_date": "2010/22/12", "number": "08768963", "url": "/2010/12/22/methods-and-systems-for-detecting-skewed-data-in-a-multitenant-database-environment/", "abstract": "Detection of skew in an on-demand database services environment is provided. A request is generated to scan a multitenant database for skew indicated by relationship depth exceeding an expected limit. A database crawler calculates skew for tenant identifier for a particular table in the database. Any skew that is detected is identified for later resolution.", "owner": "salesforce.com, inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Synchronization of form fields in a client-server environment", "publication_date": "2010/11/11", "number": "09449063", "url": "/2010/11/11/synchronization-of-form-fields-in-a-clientserver-environment/", "abstract": "A database tier maintains and provides access to a database. An application tier receives and responds to requests for a form. The form includes data defining a first UI control for displaying a first value from the database and a second UI control for displaying a second value from the database that is dependent upon the first value. A client tier renders the form to show the first value in the first UI control and to show the second value in the second UI control. The client tier also detects a modification to the first value and causes an updated second value to be generated in response to detecting the modification to the first value. The updated second value is displayed by way of the second UI control. The updated second value is generated at the client tier, the application tier, the database tier, or at a combined application/database tier.", "owner": "Microsoft Technology Licensing, LLC", "owner_city": "Redmond", "owner_country": "US" }, { "title": "System and method for internet security", "publication_date": "2010/04/11", "number": "08578487", "url": "/2010/11/04/system-and-method-for-internet-security/", "abstract": "A computer implemented method for preventing SQL injection attacks comprises intercepting a web request associated with a web service at a first software hook in a first web service execution context, persisting at least a portion of the intercepted web request in a storage location associated with the first software hook and accessible to at least one additional execution context, intercepting a database query generated by at least one web service processing operation at a second software hook associated with the execution of the query, wherein the query is generated in response to the intercepted web request and the second hook retrieves the persisted portion of the intercepted web request, comparing a portion of the persisted portion of the intercepted web request with at least a portion of the intercepted database query, and determining, prior to the query being executed, whether the query corresponds to a potential SQL injection attack.", "owner": "Cylance Inc.", "owner_city": "Irvine", "owner_country": "US" }, { "title": "Secure Communication of payment information to merchants using a verification token", "publication_date": "2010/09/09", "number": "08893967", "url": "/2010/09/09/secure-communication-of-payment-information-to-merchants-using-a-verification-token/", "abstract": "Disclosed are apparatuses, systems, and methods pertaining to the secure communication of payment information from portable consumer devices, such as credit cards, to online merchants using verification tokens.", "owner": "Visa International Service Association", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "System and method for code signing", "publication_date": "2010/02/09", "number": "08452970", "url": "/2010/09/02/system-and-method-for-code-signing/", "abstract": "A system and method for code signing. The entities may be software application developers or other individuals or entities that wish to have applications digitally signed. Signing of the applications may be required in order to enable the applications to access sensitive APIs and associated resources of a computing device when the applications are executed on the computing device.", "owner": "Research In Motion Limited", "owner_city": "Waterloo, Ontario", "owner_country": "CA" }, { "title": "Methods and apparatus for modifying a backup data stream including logical partitions of data blocks to be provided to a fixed position delta reduction backup application", "publication_date": "2010/19/07", "number": "08078930", "url": "/2010/07/19/methods-and-apparatus-for-modifying-a-backup-data-stream-including-logical-partitions-of-data-blocks-to-be-provided-to-a-fixed-position-delta-reductio/", "abstract": "In accordance with one embodiment, a backup data stream is modified to be provided to a fixed position delta reduction backup method. When a data stream is received, the data stream may be parsed into a plurality of logical components, where each of the logical components includes one or more data blocks. Missing data blocks may also be detected in the data stream, and therefore may be detected in each of the plurality of logical components. For instance, each of the logical components may be separated into a separate data stream for which missing data blocks may be detected. A temporary data block is then inserted where each missing data block is detected (e.g., in each of the plurality of logical components). In this manner, inefficiencies introduced into a fixed position delta reduction backup process as a result of new or deleted data in a system implementing a plurality of data blocks which may be stored in the form of logical components are eliminated.", "owner": "i365 Inc.", "owner_city": "Santa Clara", "owner_country": "US" }, { "title": "System and a method for generating database model for analysis of applications", "publication_date": "2010/07/07", "number": "09069804", "url": "/2010/07/07/system-and-a-method-for-generating-database-model-for-analysis-of-applications/", "abstract": "In accordance with a particular embodiment of the present invention, a method for generating a database model may include analyzing database configuration data for a database. The method may further include analyzing one or more database application programming interfaces for accessing the database. The method may also include generating one or more stubs based on the analyses, the one or more stubs configured to, when executed, model the database as if the database were populated with data.", "owner": "Fujitsu Limited", "owner_city": "Kawasaki-shi", "owner_country": "JP" }, { "title": "Verification of portable consumer devices", "publication_date": "2010/14/05", "number": "09038886", "url": "/2010/05/14/verification-of-portable-consumer-devices/", "abstract": "Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.", "owner": "Visa International Service Association", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Method and system for obtaining operational data and service information for a building site", "publication_date": "2010/11/05", "number": "08893006", "url": "/2010/05/11/method-and-system-for-obtaining-operational-data-and-service-information-for-a-building-site/", "abstract": "A method and system is disclosed for providing information about operational data from a plurality of building systems and service and maintenance information for a plurality of building sites. A customer web portal is provided with a database for storing the operational data and the service information allowing users to more readily generate reports and obtain service related information for a plurality of sites without having to maintain separate database systems at remote locations.", "owner": "Siemens Industry, Inc.", "owner_city": "Alpharetta", "owner_country": "US" }, { "title": "Verification of portable consumer devices", "publication_date": "2010/24/02", "number": "07891560", "url": "/2010/02/24/verification-of-portable-consumer-devices/", "abstract": "Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.", "owner": "Visa International Service Assocation", "owner_city": "San Francisco", "owner_country": "US" } ]