|| List of recent Provisioning-related patents
| System and method for dynamic security provisioning of computing resources|
The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system and method for dynamically provisioning and de-provisioning computing resources based on multi-dimensional decision criteria.
| Dynamic load calculation and predictive scaling|
A system, apparatus, method, and computer program product for dynamically loading it products and scaling those loads in a predictive manner are disclosed. Dynamic loading and scaling is performed by generating a load on a computing product with one or more first load generators, increasing the load over time until the first load generators reach their capacity for generating load, monitoring the capacity of the first load generators as the load is increased, provisioning one or more second load generators to generate additional load as any of the first load generators approaches its capacity, increasing the load generated by the second load generators over time until the one or more second load generators reach their capacity for generating load or the computing product reaches a performance goal, and continuing to provision second load generators until the computing product reaches the performance goal..
| System and method for secure provisioning of an information handling system|
Systems and methods for reducing problems and disadvantages associated with provisioning of information handling systems, including without limitation those associated with bare metal provisioning of information handling systems, are disclosed. A system may include a processor, and a memory and an access controller each communicatively coupled to the processor.
| Learning a new peripheral using a security provisioning manifest|
A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to learn about a new peripheral not authorized to be attached to the computer and possibly gain authorization for the peripheral. A secure i/o module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to authenticate and establish a secure encrypted session for communicating with each peripheral authorized to be attached to the computer.
| Circuit for secure provisioning in an untrusted environment|
Embodiments of electronic circuits enable security of sensitive data in a design and manufacturing process that includes multiple parties. An embodiment of an electronic circuit can include a private key embedded within the electronic circuit that is derived from a plurality of components including at least one component known only to the electronic circuit and at least one immutable value cryptographically bound into messages and residing on the electronic circuit, public key generation logic that generates a public key to match the private key, and message signing logic that signs messages with the private key..
| Thin provisioning|
A mechanism is provided for thin provisioning. An original time-domain sequence of a load parameter of storage resources already allocated to an application program is collected.
| Method and apparatus for accelerated virtual image provisioning in distributed cloud environments|
Systems, methods and/or software where a separate image repository server (irs) is created and maintained in each and every network and/or subnet segment that includes a destination server associated with the managed pool. Also, when a given virtual image is provisioned to a given destination server then the present invention preferably ensures that the irs used as a source of the given virtual image is an irs located in the same subnet and same network as the given destination server..
| Managing network configurations|
Provided are systems, methods and computer program products that proactively manage configurations that enable a service. Configurations that are critical to enabling a particular service are automatically captured, for example as part of a provisioning activity, and/or tracked in association with that service.
| Movie finding|
A method for provisioning of media is disclosed and may include detecting a plurality of users located at a common location. A personal profile for each of the plurality of users may be accessed.
| Daas manager and daas client for daas system|
Disclosed herein are a desktop as a service (daas) manager and daas client for a daas system. The daas manager includes a connection broker module, a provisioning module, a management module, and a web server module.
| Method and apparatus for provisioning a price-differentiated product while deterring piracy|
A method and apparatus for provisioning price-differentiated products while deterring piracy comprising creating a plurality of triples, wherein each triple comprises a first component, a second component, and a third component, wherein each triple uniquely identifies a price-differentiated product; providing to a vendor of the product a plurality of pairs, wherein each pair in the plurality of pairs comprises the first component and the second component of the triple for each price-differentiated product provided to the vendor; receiving the pair from the vendor when the product is sold; providing to a purchaser identification verifier the pair for the product that was sold; receiving from the purchaser identification verifier the second component of the triple upon verification of an identity of a purchaser; and providing product activation information to the identity verified purchaser in response to receiving the second component, wherein the activation information enables use of the product.. .
| Methods and apparatuses for automatic provisioning of external identifiers used for machine type devices in a 3gpp network|
In one aspect, the teachings herein propose a procedure provided by an appropriately configured 3gpp core network (cn), which allows external identifiers to be provisioned dynamically by the 3gpp operator or an mtc service provider, using the existing 3gpp m2m architecture. As such, these teachings can be understood as providing for automatic activation, modification, deactivation, etc., of mtc service subscriptions or services, using protocol-based signaling between the involved entities, e.g., between a 3gpp hss and an mtc server (a services capability server or scs) and/or an mtc bootstrapping server that provides for mtc subscription activations, modifications, cancellations, etc..
| Secure provisioning in an untrusted environment|
Embodiments of methods of provisioning an electronic circuit enable security of sensitive data in a design and manufacturing process that includes multiple parties. In an illustrative embodiment, a method of provisioning an electronic circuit includes generating at least one secret value, embedding the at least one secret value into the electronic circuit, programming into the electronic circuit a private key derivation function that derives the private key from the at least one secret value and a trust anchor, and programming into the electronic circuit a public key generation function that generates a public key matching the private key.
|Switch management system and method|
Methods and systems for managing a service provider switch are provided. According to one embodiment, a method is provided for provisioning a switch with a network-based managed internet protocol (ip) service.
|Management of database deployment|
Apparatuses, computer readable media, methods, and systems are described for provisioning of databases, which may include processing a request to generate a database, wherein the request comprises a database parameter; determining a lease term for the database; generating the database based on the database parameter; and communicating a notification containing information regarding the database and the lease term.. .
|Extended reach xfp transceiver with integrated forward error correction|
Integrated performance monitoring (pm); optical layer operations, administration, maintenance, and provisioning (oam&p); alarming; amplification, or the like is described in optical transceivers, such as multi-source agreement (msa)-defined modules. An optical transceiver defined by an msa agreement can include advanced integrated functions for carrier-grade operation which preserves the existing msa specifications allowing the optical transceiver to operate with any compliant msa host device with advanced features and functionality.
|Resource provisioning using predictive modeling in a networked computing environment|
An approach is provided for allowing a network computing (e.g., cloud computing) infrastructure to modify its resource allocation plan (e.g., an instance count) by using a kth derivative vector plot, which may be generated using historical logs. Among other things, this approach enables an infrastructure to project an allocation forecast for a specified duration and adapt to changes in network traffic..
|Method and apparatus for provisioning subscription products|
A method and apparatus for provisioning a subscription product is disclosed. The method comprises receiving a request for a subscription product; retrieving a profile and at least one subscription associated with the profile, wherein the at least one subscription comprises a plurality of subscription details; validating the plurality of subscription details; retrieving product data for the subscription product based on the validated subscription details; determining a dominant subscription product when there are at least two subscriptions associated with the profile; and sending the product data for the dominant subscription product, wherein the product data enables activation of a product license..
A method and system of provisioning a set-top box (stb) with a stb provisioning system are provided which include storing stb profile information in a provisioning datastore, receiving a customer order at a service provisioning system, notifying a billing system of the customer order, and notifying a conditional access system of the customer order. The method and system further include storing information from the customer order in a provisioning datastore, notifying a video device manager about the stb, and delivering a cable operator configuration message from the video device manager to the stb, the configuration message being based on information from the provisioning datastore, thereby provisioning the stb without essential involvement of the conditional access system..
|User initiated discovery of content through an augmented reality service provisioning system|
Methods for enabling discovery of content through an augmented reality service provisioning system. A first augmented reality client running on user equipment is provided, wherein the first augmented reality client is embedded in a third-party application, and is configured to allow a user to view at least part of the content offered by the augmented reality service provisioning system.
|Method and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters|
Conventional network technology is based on processing metadata in the head part of a network packet (e.g., addresses and context tags). In cloud computing, resources have dynamic properties of on-demand elasticity, trans-datacenter distribution, location motion, and tenant-defining arbitrary network topology.
|System and method for provisioning user access to web site components in a portal framework|
A site in a portal management framework may have a set of site objects given a single identity. The site may be created in the portal management framework by a console object.
|Legal text distribution and processing in mobile broadcasting|
Systems and methods for processing and distributing legal text information allow content providers to distribute legal text to terminals receiving broadcast content. The legal text may include terms and conditions associated with content that a user may want to purchase or subscribe.
|Systems and methods for communicating music indicia|
Systems and methods for providing a menu permanently stored on a mobile device. The menu provides a ranked music indicia option to review a ranked list of music indicia over a cellular network.
|Method and apparatus for joint association and address provisioning|
In accordance with an example embodiment of the present invention, there is provided an apparatus receiving or storing an indicator relating to an access point, the indicator indicating whether the first access point supports joint association and address provisioning. The apparatus is configured to transmit a request for joint association and address provisioning toward the access point, and to receive from the access point a response to the request for joint association and address provisioning..
|Selective provisioning of online media content|
Providing for client-selected user authentication in relation to accessing or acquiring online media content is described herein. In response to an access request transmitted by a client device, a server can determine a type of request employed by the client device and identify a type of media playback device associated with the client.
|Systems and methods for provisioning and using multiple trusted security zones on an electronic device|
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key.
|Identity management on a wireless device|
A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local openid provider (op) associated with the wireless device.
|Management method for a virtual volume across a plurality of storages|
A first storage system includes a plurality of first storage devices and is coupled to a computer. A second storage system includes a plurality of second storage devices and is coupled to the first storage system.
|Ontology based resource provisioning and management for services|
Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services.
|Device-to-device communication among customer premise equipment devices|
A method of initializing, provisioning, and managing a cable modem and a customer premise equipment device includes sending a customized configuration file to the cable modem. The configuration file contains service provisioning information and further includes information indicative of a device-to-device communication configuration.
|Provisioning-free memberless group communication sessions|
Systems, methods, and devices of the various embodiments enable dynamically creating and joining group communication sessions without (i.e., “free of”) operator-controlled or operator-assisted provisioning. By encoding group call provisioning information in a bar code, such as a quick response code (“qr code”), that participants can scan using their mobile communication devices (e.g., smart phones), a group call may be created and provisioned on communication devices.
|System and method for managing tracking area identity lists in a mobile network environment|
A method is provided in one example embodiment and includes communicating a plurality of queries associated with common tracking areas in a wireless network; identifying a set of serving gateways that serve the common tracking areas; generating a tracking area identity (tai) list to be used in provisioning network resources for user equipment; and selecting a first serving gateway from the set of serving gateways for the user equipment, wherein the first serving gateway is selected based on the common tracking areas served by the set of serving gateways. In more specific embodiments, the queries are domain name system (dns) queries that are supported by a network element and that have no cached dns response..
|System and method for provisioning flows in a mobile network environment|
An example method is provided and includes receiving a request from a mobile node for an internet protocol (ip) address and establishing a point-to-point (ppp) link for the mobile node. The method also includes provisioning a first tunnel associated with a first communication flow for the mobile node, and provisioning a sub-tunnel with the first tunnel for a second communication flow.
|Method and system for controlling hs-nmos power switches with slew-rate limitation|
A method and system for limiting the slew rate of the output voltage of one or more high side (hs) nmos power switches is disclosed. A circuit arrangement configured to control a first nmos switch is described.
|Selecting provisioning targets for new virtual machine instances|
One embodiment of a system for provisioning a new virtual machine instance on a target host based on an image of the new virtual machine instance includes a local storage for storing images of virtual machine instances currently running on the target host and a virtual machine creator coupled to the local storage for constructing the image of the new virtual machine instance at least in part using the images of virtual machine instances currently running on the target host.. .
|Selecting provisioning targets for new virtual machine instances|
One embodiment of a method for provisioning a new virtual machine instance based on the content of an image of the new virtual machine instance includes identifying, from among a plurality of host machines, the host machine having the highest percentage of the content available in local storage, and provisioning the new virtual machine instance on the host machine having the highest percentage of the content available in local storage. Another embodiment of a method for provisioning a new virtual machine instance based on an image of the new virtual machine instance includes constructing at least a portion of the image using data stored locally on a target machine hosting the new virtual machine instance, and completing the image using data obtained over a network from remote storage..
|Method and system to determine a work distribution model for an application deployed on a cloud|
A system is described to determine a work distribution model for a computing application deployed on a cloud. In one embodiment, the system comprises a launch request detector, a provisioning module, and a work distribution module.
|Remote provisioning of virtual appliances for access to virtualized storage|
Systems and methods for remotely provisioning software to process data stored in a virtualized storage environment are provided. In one embodiment, the method comprises receiving a request, at a first location, for processing data using a software application, wherein the data is stored in a virtualized storage space at a second location and the software application is invoked in a virtualized computing environment at a third location; using a service at the first location to remotely invoke one or more instances of the software application over the virtualized computing environment at the third location; and using the service at the first location to remotely manage transfer of data stored in the virtualized storage space at the second location to the third location..
|Systems and methods for extraction of vehicle operational data and sharing data with authorized computer networks|
Systems, methods, and related computer programs are provided wherein vehicle operation data is extracted from an internal automotive network. A system for enabling the generation and sharing of vehicle operation data via a computer network includes a data harvesting device connected to an information system of a vehicle, the data harvesting device capturing vehicle information from the vehicle and processing the vehicle information to generate current vehicle operation data; and a computer system in communication with the data harvesting device, the computer system including one or more server computers connected to a computer network.
|Method for calling up a media file in a telecommunication system, computer program product for executing the method, and telecommunication system for calling up the media file|
A method for calling up a media file wherein the content of the called up media file is presented unrequested to the user of one of the multiple telecommunication terminals via a connection established with a telecommunication terminal includes provisioning of an interface in the telecommunication control unit such that the media file stored outside a telecommunication system can be accessed via the interface. The establishment of the connection can also include installation of a media assignment target in the telecommunication control unit central to the telecommunication system, selection of the media assignment target by one of the multiple telecommunication terminals and placement of a link to the media file in the telecommunication control unit by means of which the media file is assigned, and call-up of the media file by the telecommunication control unit via the interface using the link placed in the telecommunication control unit..
|System for provisioning, allocating, and managing virtual and physical desktop computers in a network computing environment|
A system for provisioning, allocating, and managing virtual and physical desktop computers in an enterprise network computing environment allows for these physical and desktop computers to be grouped logically based on personnel, organizational, or networking efficiencies without regard to the hardware or server that will ultimately run the virtual machine terminal once it is accessed. A connection broker connects incoming connections to one desktop in a desktop group, based on information relating to that incoming connection..
|Repository including exclusion list|
Systems and methods of executing and/or provisioning an application in an application specific runtime environment or general runtime environment are disclosed. The application specific runtime environment or general runtime environment are optionally defined by an application environment specification to include a minimal or reduced set of software resources required for execution of the application.
|Method and system for providing data access via a common access manager configured to support security for multiple database management system types|
An approach for providing data access via a common access manager configured to support security for multiple database management system types is described. A request specifying access for a user to a feature associated with one of a plurality of database management system types is determined by a common access manager configured to support the database management system types.
|Method of provisioning h-vpls services in a multi-domain mpls network|
A method is disclosed for provisioning loop free h-vpls traffic service in a multi-domain mpls network having interconnected domains. The method comprises: provisioning pseudo wires (pws) for mptmp services in each domain of the mpls network; defining multiple split horizon groups (shgs) in the network, wherein each shg corresponds to a domain, for the h-vpls service traffic and for each specific node of the mpls network, automatically assigning indications to shg and the pseudo wires connected to the specific node, wherein the same indication is assigned to all pseudo wires belonging to the same group (shg-n), and wherein the step of assigning is characterized in that when traffic belonging to h-vpls service crosses a border network node located between two interconnected domains, the shg-n indication of pws remains the same within a vpls domain thereby preventing the service traffic from returning to the domain of origin..
|Systems and methods for enhanced engagement|
In some embodiments, a method comprises displaying a pre-registration invitation on a first digital device connected to a wireless network, determining one or more wireless network identifiers associated with the wireless network, generating a pre-registration code request, the request including the one or more wireless network identifiers, providing the pre-registration code request to a virtual network server, the server generating a pre-registration code in response to the pre-registration code request, the pre-registration code associated with the one or more wireless network identifiers, receiving the pre-registration code, providing a registration request from a second digital device, the registration request comprising the pre-registration code, and provisioning an account based on the registration request and the wireless network identifiers, the wireless network identifiers identified based on the pre-registration code.. .
|Program modeling tool|
Method, device, and non-transitory storage medium to receive peak viewership parameters that indicate one or more program channels to be modeled; query a device that stores viewership data based on the peak viewership parameters; determine a peak viewership for the one or more program channels; query another device that stores network configuration data pertaining to a program delivery network; obtain channel path information pertaining to the one or more program channels; generate peak channel delivery data based on the channel path information and the peak viewership data; and simulate, based on the peak channel delivery data, resource utilization of the program delivery network stemming from a provisioning of the one or more program channels according to a delivery channel format that is different from another delivery channel format that was used to deliver the one or more program channels to subscribers.. .
|Multi-tenant queue controller|
Novel tools and techniques for controlling workloads in a multi-tenant environment. Some such tools provide a queue controller that can control workflow processing across systems, work (provisioning engines, computing clusters, and/or physical data centers.
|Background services launcher for dynamic service provisioning|
A background service launcher is disclosed that provides dynamic access to services required by clients. Clients access services by a single unified pathname space and interface environment.
|Method and system to provision and manage a computing application hosted by a virtual instance of a machine|
A system and method are described for provisioning and managing virtual instances of a computing application running within a public virtualization space (referred to as a hosted service system). A hosted service system may be configured to provide automated administration of the computing application, replacing the administration tasks that would otherwise be performed by the customer when running in an on-premise production deployment and to provide encrypted networking and other services that are specific to the public virtualization environment and are designed to provide a secure integration fabric between a customer's own private data center and virtual instances of the computing application running within an insecure public virtualization service..
|Model-based virtual system provisioning|
Model-based virtual system provisioning includes accessing a model of a workload to be installed on a virtual machine of a system as well as a model of the system. A workload refers to some computing that is to be performed, and includes an application to be executed to perform the computing, and optionally includes the operating system on which the application is to be installed.
|Secure virtual machine provisioning|
A device and method in a provisioning unit of secure provisioning of a virtual machine on a target platform having a specific configuration is provided. The method comprising: receiving (404) a public binding key from the target platform (107), the public binding key being bound to the specific configuration, encrypting (410) a virtual machine provisioning command using the public binding key, and sending (412) the encrypted virtual machine provisioning command, to the target platform (107).
|Automated capacity provisioning method using historical performance data|
The method may include collecting performance data relating to processing nodes of a computer system which provide services via one or more applications, analyzing the performance data to generate an operational profile characterizing resource usage of the processing nodes, receiving a set of attributes characterizing expected performance goals in which the services are expected to be provided, and generating at least one provisioning policy based on an analysis of the operational profile in conjunction with the set of attributes. The at least one provisioning policy may specify a condition for re-allocating resources associated with at least one processing node in a manner that satisfies the performance goals of the set of attributes.
|Provisioning resources in a federated cloud environment|
A measure of performance may be calculated for a composite cloud service of a particular cloud in a federated cloud environment. A determination may be made as to whether the measure of performance indicates breaching of a performance policy associated with the composite cloud service..
|Method and apparatus of redundant path validation before provisioning|
Exemplary embodiments of the invention provide a technique to validate physical cabling and logical path before provisioning volume. In accordance with an aspect, a computer comprises a memory storing a software and a processor executing the software.
|Optimized database content provisioning|
Database content provisioning includes a broad base shipment as an initial release of database content. The database content may then be incrementally enriched with specific enhancements, which may be delivered as updates.
|System and method for provisioning and load balancing user accounts on server clusters|
Providers of internet based services must handle requests from many different customers. However, to make the experience simple and effective, a system for allowing a user to enter a simple uniform resource locator based upon the user's identifier is provided that re-directs the user to a server cluster allocated to that user.
|Method and system for activating a software application while provisioning services for the application|
Methods and systems for activating a software application while provisioning a web service to operate with the software application are described. Consistent with some embodiments, a product activation procedure is performed during a workflow to provision a web service to operate with a software application.
|System, method and computer program product for predicting value of lead|
Embodiments disclosed herein provide a solution in determining a lead value and making an introduction accordingly. In some embodiments, in response to a consumer's search request for a retail item within a geographical area, a decision system may obtain from a local database a list of dealers capable of provisioning the retail item—such as a new or used vehicle—at various locations within the geographical area.
|Method and system for providing controllable trusted service manager|
Techniques for realizing or providing controllable trusted service management are disclosed. The techniques are related to empowering a service provider with application provisioning and applet and secure element (se) management capabilities.
|Using access technology and location information to smartly initiate bearer independent protocol sessions|
A user identity module (uim) is incorporated in user equipment such as a mobile phone or mobile device. The uim is configured to provision itself while roaming away from a home network as follows.
|Single-ssid and dual-ssid enhancements|
A wireless local area network system establishes a passpoint™ connection between a mobile station and a hotspot using an enhanced single ssid method or an enhanced dual ssid method. In the dual ssid method, an access point associates and authenticates a mobile device to a secondary ssid of the access point during enrollment and provisioning.
|Automatic deployment of software applications to meet regulatory compliance requirements|
A method, system, and computer program product for cloud-based deployments of software applications that are monitored for compliance with regulatory requirements. One exemplary method commences upon receiving an indication of a compliance corpus such as hippa or sox, then mapping the compliance corpus to one or more predetermined configurations of a virtual compliance platform.
|Methods and systems for dynamically provisioning resources for on-demand courses|
A method for creating a course for dynamic provisioning includes receiving, by a creation engine, from a second computing device associated with a user, a request to create a course. The creation engine receives, from the second computing device, an identification of a type of computing resource for use during the course.
|Method and apparatus of cloud computing subsystem|
Example embodiments described herein are directed to providing cloud computing subsystems for computing resource provisioning with various service levels on specific network isolated areas. Example embodiments described herein may also provide protocols for controlling the flow of a frame from and to each tenant in a cloud computing subsystem..
|Devices, systems, and methods for enabling reconfiguration of services supported by a network of devices|
Systems, devices, and methods are disclosed for enabling the reconfiguration of services supported by a network of devices. Such reconfiguration can be realized dynamically and in real time without compromising the security of the overall system from external threats or internal malfunctions.
|Methods and systems for dynamically provisioning resources for on-demand courses|
A method for providing access to dynamically provisioned resources and on-demand courses includes receiving, by an instantiation engine executing on a first computing device, from a second computing device associated with a user, an indication that the user has purchased access to the course at a scheduled time. A type of computing resource is identified for use during the course at the scheduled time.
|System and method for embedding financial-value account provisioning and management functionality within a database account management system|
A method and system are provided for integrating a the generation and communication of digitized data associated with a monetary credit account, such as a gift card account, with an account management suite, such as a sales automation system or a customer relationship management system. The invented method allows a user of an electronically accessible data base to create an assigned-value account that is pre-authorized for use with at least one designated merchant, credit card network, debit card network or financial services provider.
|Client authentication during network boot|
A secure mechanism for performing a network boot sequence and provisioning a remote device may use a private key of a public key/private key encryption mechanism to generate a command by a server and have the command executed by the device. The command may be used to verify the authenticity of the remote device, and may be used to establish ownership of the device.