Matches 1 - 50 out of 388 1 2 3 4 5 6 7 8 >


Match Document Document Title
US20120203798 SECURE MEDICAL RECORD INFORMATION SYSTEM  
A medical records system allows a patient to have control and responsibility over their medical records. The system includes a patient-centric records server that functions as a central repository...
US20110191356 ADVANCED APPLICATION FOR CAPTURING, STORING AND RETRIEVING DIGITAL IMAGES OF A PATIENT CONDITION DURING A REAL-TIME VIRTUAL FACE-TO-FACE ENCOUNTER  
Method and system for real-time capturing of real-time images from the real-time interaction between the medical professionals and patient by using a common interaction platform for e.g. web...
US20150220586 MULTI-TIER COLOR LOOK-UP TABLE (LUT) DATABASE SYSTEM  
A multi-tier color look-up table (LUT) database system is provided. A first LUT can be stored in a database. First and second users can be granted access to the first LUT. The first and second...
US20110119307 Client management system  
This invention relates to permission based collaborative health record system. Specifically, it relates to systems of and methods for creating authorized health records that care givers and...
US20110202566 CREATION OF A VIRTUAL COMMUNITY  
In order to facilitate creation of a community without member-specific registration, one or more sibling identifiers with corresponding units to be distributed to other persons are allocated to a...
US20130097203 SYSTEM AND METHOD FOR PROVIDING THRESHOLD LEVELS ON PRIVILEGED RESOURCE USAGE IN A MOBILE NETWORK ENVIRONMENT  
A system and method in one embodiment includes modules for detecting a request by an application in a mobile device to access a privileged resource, determining a cumulative usage of the...
US20110307518 Medical Record Management Using Fingerprint ID  
Methods and systems for medical record management using fingerprint identification. Fingerprints of patients, medical professionals, health payer or pharmacy personnel and potential customers are...
US20130097115 AUTOMATIC AND SEMI-AUTOMATIC TAGGING FEATURES OF WORK ITEMS IN A SHARED WORKSPACE FOR METADATA TRACKING IN A CLOUD-BASED CONTENT MANAGEMENT SYSTEM WITH SELECTIVE OR OPTIONAL USER CONTRIBUTION  
Systems and methods for supporting metadata for work items stored in a web-based content management system with collaboration environment are disclosed. Users uploading work items to a folder are...
US20140280348 EDUCATIONAL LIBRARY SYSTEM  
Methods, systems and computer readable media for educational library management are described.
US20140025693 METHODS AND SYSTEMS FOR SHARING EMAIL IN A MULTITENANT DATABASE SYSTEM  
A method for sharing an email in an on-demand database system is provided. The method receives, at one or more computer systems associated with the on-demand database system, the email from a...
US20100138902 STANDING ORDER DATABASE SEARCH SYSTEM AND METHOD FOR INTERNET AND INTRANET APPLICATION  
An internet and/or intranet based database search system and method for conducting searches of highly confidential records such as individual patient medical records and to automate the process of...
US20130262515 CONSUMER RIGHTS LOCKER  
Storing, building, managing, and controlling consumer personal information, including: building at least one level of personal information according to a standard; storing the personal information...
US20130013641 INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT  
Embodiments of the invention relate to a method for intelligently providing consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain...
US20150019250 MANAGER-CONTROLLABLE INTEGRATED USER CONTENT AND SERVICES SYSTEM  
The present disclosure presents user content and service systems that are controllable by one or more remote system managers, which may include one or more primary system managers, and utilized by...
US20110178992 FILE MANAGEMENT METHOD OF SERVER  
A file management method of a server is implemented on a Linux operating system of the server. The method includes the steps of determining if there is a file deleted; when the result is yes,...
US20110276584 MULTI-TENANCY IN DATABASE NAMESPACE  
Database systems are presented including: a database; a database instance of the database, where the database instance includes a set of instance database objects, and where the database instance...
US20110072010 SYSTEMS AND METHODS FOR PERSONALIZED SEARCH SOURCING  
The present invention provides a method and system for customized search results in an advanced search results page including vertical searching pivot points for personalizing and refining...
US20140149461 FLEXIBLE PERMISSION MANAGEMENT FRAMEWORK FOR CLOUD ATTACHED FILE SYSTEMS  
A method of managing file permissions in a remote file storage system includes defining permissions for the remote file storage system and controlling access to objects on the remote file storage...
US20120197941 DATABASE ACCESS UNBLOCKER  
Embodiments of the invention provide for a centralized system for database access management. In specific embodiments, the centralized system provides for granting users temporal access to...
US20130218687 Methods, systems and devices for determining a user interest and/or characteristic by employing a personalization engine  
A user interest and/or characteristic may be determined when permission to access personal information associated with a user account stored in a database operated by a third party, such as a...
US20110238482 Digital Profile System of Personal Attributes, Tendencies, Recommended Actions, and Historical Events with Privacy Preserving Controls  
Embodiments of the invention provide a digital profile system for a user and a method for capturing, storing, and updating information about a user's attributes in a personal genome database. The...
US20110282907 MANAGING ENTITLEMENTS IN A MULTI-TENANT DATABASE ENVIRONMENT  
A system and method for managing entitlements in a multi-tenant database system. In one embodiment, a method includes receiving service level definitions for one or more entitlements, and...
US20110145649 Method and a System for Dynamic Probe Authentication for Test and Monitoring of Software  
The present invention is related to a method, a system and a computer readable device for authenticated configuration used for configuration of software probes in software modules to be tested in...
US20110078197 FILE RESHARING MANAGEMENT  
Managing file distribution in an online file sharing system implemented by at least one server includes inviting a first entity to access a shared file hosted by the online file sharing system,...
US20140082023 ASSOCIATING AN IDENTITY TO A CREATOR OF A SET OF VISUAL FILES  
Technologies and implementations for associating a personal identity of a creator to a set of visual files are generally disclosed.
US20110258233 METHODS AND SYSTEMS FOR PROVIDING CUSTOM SETTINGS IN AN ON-DEMAND SERVICE ENVIRONMENT  
In accordance with embodiments, there are provided mechanisms and methods for providing custom settings in an on-demand service environment. In an embodiment and by way of example, a method...
US20110213797 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING A SINGLE INSTANCE OF A DATABASE STORED USING A TENANT OF A MULTI-TENANT ON-DEMAND DATABASE SYSTEM  
In accordance with embodiments, there are provided mechanisms and methods for sharing a single instance of a database stored using a tenant of a multi-tenant on-demand database system. These...
US20110282908 Security Monitoring  
Disclosed are systems, apparatus, methods, and computer readable media for analyzing computing site information. In one embodiment, an analysis tool for analyzing a first site record stored on a...
US20110072039 SYSTEMS, METHODS, AND SOFTWARE APPLICATIONS FOR PROVIDING AN IDENTITY AND AGE-APPROPRIATE VERIFICATION REGISTRY  
Systems, methods and software applications for providing an identity and age-appropriate verification registry. A system for providing an identity and age-sensitive information registry includes...
US20110112886 CRITICAL PARAMETER/REQUIREMENTS MANAGEMENT PROCESS AND ENVIRONMENT  
A critical parameter/requirements management process model for managing a development program for a product and an associated product structure-driven critical parameter/requirements management...
US20120304247 SYSTEM AND PROCESS FOR HIERARCHICAL TAGGING WITH PERMISSIONS  
The invention provides a file sharing system and process for hierarchical tagging with permissions in computer network-based file storage and sharing systems. The file sharing system includes a...
US20110072007 SYSTEM AND METHOD FOR CACHING DATABASE REPORTS  
A method of report caching includes recording a user ID, a timestamp including at least a connection date and at least one SQL query associated with a report requested by a user from the database...
US20140229507 Method To Delay Locking Of Server Files On Edit  
A server is implemented with a modified file open action, which, when a user performs the modified open, initially opens a file without locking the file. When a user indicates (either explicitly...
US20130036141 SATELLITE ADDRESSING CONCEPT  
A method of using latitude and longitude coordinates of a point as a means to specify a unique and unmistakable destination address. These coordinates are not affected by changes in street...
US20110113065 MANAGEMENT OF RESOURCES IN A HOST SYSTEM  
A computer implemented method for managing access to system resources includes receiving a request from a user for write-access to a resource in a host system, the host system including...
US20110314520 ONLINE SERVICE ACCESS CONTROLS USING SCALE OUT DIRECTORY FEATURES  
Embodiments provide application and/or resource access control features of an online computing environment, but are not so limited. In an embodiment, a computer-implemented method provides access...
US20140181148 Distributed Management Framework for Personal Attributes  
A technique for distributed management of attributes includes propagating attributes based upon attribute-granularity permissions. An example of a system according to the technique may include a...
US20100131559 ISOLATING AN EXECUTION CONTAINER IN A SYSTEM WITH MANDATORY ACCESS CONTROL (MAC)  
Preventing a process from traversing back a directory tree through its parent directories is described. In a system with a program executing in a path container, an access permission rule...
US20140095544 COORDINATED ACCESS TO A CLUSTERED FILE SYSTEM'S SHARED STORAGE USING SHARED-LOCK ARCHITECTURE  
Embodiments of the invention relate to coordinated access to a clustered file system's shared storage subsystem using a shared-lock architecture. A particular file server is configured to...
US20150120780 SYSTEM AND METHOD FOR INTEGRATING A DATABASE WITH A SERVICE DEPLOYED ON A CLOUD PLATFORM  
Described herein are systems and methods for integrating a database into a cloud computing environment. In accordance with an embodiment, a system includes a service management engine (SME)...
US20110082887 ENSURING SMALL CELL PRIVACY AT A DATABASE LEVEL  
A request is received for a set of entries that make up a small cell in a database, wherein the small cell is initially described at a fine granular level of detail by a set of descriptors. In...
US20140280347 Managing Digital Files with Shared Locks  
A method for managing the access and use of digital files stored in a file storage networked with multiple servers, including the steps of: a requesting server among the multiple servers that...
US20140330870 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ENABLING ACCESS TO A RESOURCE OF A MULTI-TENANT ON-DEMAND DATABASE SERVICE UTILIZING A TOKEN  
In accordance with embodiments, there are provided mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token. These mechanisms and...
US20130198236 SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ENABLING ACCESS TO A RESOURCE OF A MULTI-TENANT ON-DEMAND DATABASE SERVICE UTILIZING A TOKEN  
In accordance with embodiments, there are provided mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token. These mechanisms and...
US20120330925 OPTIMIZING FINE GRAINED ACCESS CONTROL USING AUTHORIZATION INDEXES  
Architecture that is an index mechanism which optimizes complex queries that result from enforcing fine grained access control. The architecture addresses the problem of efficient query evaluation...
US20150199525 OPERATION TARGET MANAGEMENT APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM  
An operation target management apparatus includes a detector, a determination unit, and a registration unit. The detector detects deletion of a first management-right holder, who has been...
US20140040255 METHOD AND SYSTEM FOR ACCESS TO RESTRICTED RESOURCES  
A method and system of providing a search result to a user based on information indicated in a restricted access resource is described. A search system utilizing the assistance of human searchers...
US20120036162 AUTHORIZATION CHECK OF DATABASE QUERY THROUGH MATCHING OF ACCESS RULE TO ACCESS PATH IN APPLICATION SYSTEMS  
A method is provided to check user authorization to access a database, the method comprising: receiving a database query; producing an execution plan for the query; receiving an access rule...
US20110196866 SMALL TABLE: MULTITENANCY FOR LOTS OF SMALL TABLES ON A CLOUD DATABASE  
Methods and apparatus are described for partitioning native tables in a database cluster into logical tables. Each logical table is mapped into a unique portion of the native table by an...
US20130246470 RULE-BASED ACCESS CONTROL LIST MANAGEMENT  
Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting...

Matches 1 - 50 out of 388 1 2 3 4 5 6 7 8 >