- Reset

Defensive Publications are a method for the open source community to prevent the issuance of low quality software patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are effective in protecting the freedom to create, invent and operate.

Publication Date Title Tags
January 12, 2015 System for designing and creating computer programs using finite state machines
The methods commonly used to develop computer software are very difficult, time consuming and error prone. Many software projects are canceled due to cost and time overruns. It is common for projects to fail to deliver all of the anticipated benefits.
database software development Computer Programming Object Oriented Programming Transaction Processing Finite State Machine Publish and Subscribe Internet of Things Eclipse Rich Client Plugin RCP
November 10, 2012 Feature to create melody from lyrics on smart phone / computer
One musical note is created for each syllable with the note duration computed from the number of vocals and consonants in the syllable. By doing this the combination of lyrical and melodic phrases sounds very natural and gives the composer a melody ready for final touches.
database lyics music
April 01, 2009 Maintaining sums in a hierarchy
Using a system inspired by a makefile for fast hierarchical summing up of inventories and maintaining of such sums. The inspiration comes from the makefile representing dependencies between objects that need to be updated.
database file system
March 11, 2009 Method of Providing Anonymous Secure User Access Tokens
While passwords provide some protection, a skilled individual can intercept data such as usernames and passwords and gain access to the data.
authentication database access
February 24, 2009 Process for Implementing a Single Login Process for Internal Computer Services
With so many passwords, users tend to create the same password for every computer service or, worse, leave a printed list of this information in plain sight.
authentication database
February 10, 2009 Method for Customizing Queries Based on User Preferences for Searching Online Content and Returning Customized Results
Search engines interpret identical queries the same way, even though the users who submit these queries might be looking for different results. Users would be better served if their queries could be intelligently interpreted from the results of past search sessions
February 10, 2009 A Single Login Process for External, Internet-based Online Services
Many computer services are available online through the Internet, requiring various levels of security and login information.
database password