Document | Document Title |
---|---|
US08533860B1 |
Personalized digital media access system—PDMAS part II
The invention is an apparatus that facilitates access to a data source to accept verification and authentication from an enabler using at least one token and at least one reference. The at least one reference could be a device serial number, a networking MAC address, or a membership ID reference from a web service. Access to the data source is also managed with a plurality of secondary enablers. |
US08533858B2 |
Domain management method and domain context of users and devices based domain system
Provided are domain contexts indicating user and device based domain systems for being applied to a new digital content protection/management system, and management methods thereof. A concept of “domain” is introduced in the present invention so that various business models can be obtained in accordance with content use of one home or small-sized group. The domain refers to as a group of user and device SAV and PAV indicating a context for being applied to the domain system includes: a domain identifier for specifying a domain as a region containing at least one content execution device and at least one content user; domain authentication information for guaranteeing authenticity of the domain; a user list containing information of users belonging to the domain; and a device list containing devices belonging to the domain. |
US08533856B2 |
Secure compact flash
Methods and apparatus are provided, such as a memory card with a processor and nonvolatile memory coupled thereto. The nonvolatile memory has a secure area configured to store a user password and a serial number in encrypted form. The card is configured to grant access to the secure area when the card receives a password that matches the stored user password and the card is coupled to a system having the serial number. |
US08533852B2 |
Method and system for securely communicating between a primary service provider and a partner service provider
A method and system for authenticating a partner service provider and a primary service provider includes a network and, a partner service provider generating a request for a first encrypted token from a partner service provider and communicating the request to the network. An authentication web service receives the request for the first encrypted token from the network and generates the first encrypted token. The partner service provider generates a request for data with the first encrypted token and communicates the request for data to the network. A data web service receives the request for data and communicates the request for data from the data web service to the authentication web service. The authentication web service validates the request for data and communicates a validation result to the data web service. The data web service communicates data to the partner service provider from the data web service after validating. |
US08533851B2 |
Systems and methods for secure transaction management and electronic rights protection
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the “electronic highway.” |
US08533846B2 |
Method and system for dynamically associating access rights with a resource
A method for dynamically associating, by a server, access rights with a resource includes the step of receiving, by the server, a request for a resource from a client. The server requests, from a policy engine, an identification of a plurality of access rights to associate with the resource, the plurality of access rights identified responsive to an application of a policy to the client. The server associates the resource with the plurality of access rights via a rights markup language. The server transmits the resource to the client with the identification of the associated plurality of access rights. An application program on the client makes an access control decision responsive to the associated plurality of access rights. The application program provides restricted access to the resource responsive to the access control decision. |
US08533841B2 |
Deriving remediations from security compliance rules
Systems and methods that automatically generate remediation processes such as acts performed as part of a benchmark model, to improve and update compliance of a machine with security policies compliance. A remediation component can automatically determine processes that are required to change and increase compliance of a machine with a security policy, and hence improve security level thereof. |
US08533835B2 |
Method and system for rapid signature search over encrypted content
A method for detecting malware includes dividing data to be scanned for malware into at least a first data segment and a second data segment, dividing a signature corresponding to an indication of malware into at least a first signature segment and a second signature segment, performing a relationship function on the first signature segment and the second signature segment yielding a first result, performing the relationship function on the first data segment and the second data segment yielding a second result, comparing the first result and the second result, and, based on the comparison, determining that the data includes information corresponding to the signature. The relationship function characterizes the relationship between at least two information sets. |
US08533831B2 |
Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing
A computer-implemented method for alternating malware classifiers in an attempt to frustrate brute-force malware testing may include (1) providing a group of heuristic-based classifiers for detecting malware, wherein each classifier within the group differs from all other classifiers within the group but has an accuracy rate that is substantially similar to all other classifiers within the group, (2) including the group of classifiers within a security-software product, and (3) alternating the security-software product's use of the classifiers within the group in an attempt to frustrate brute-force malware testing by (a) randomly selecting and activating an initial classifier from within the group and then, upon completion of a select interval, (b) replacing the initial classifier with an additional classifier randomly selected from within the group. Various other methods, systems, and computer-readable media are also disclosed. |
US08533824B2 |
Resisting the spread of unwanted code and data
A method of processing an electronic file by identifying portions of content data in the electronic file and determining if each portion of content data is passive content data having a fixed purpose or active content data having an associated function. If a portion is passive content data, then a determination is made as to whether the portion of passive content data is to be re-generated. If a portion is active content data, then the portion is analysed to determine whether the portion of active content data is to be re-generated. A re-generated electronic file is then created from the portions of content data which are determined to be re-generated. |
US08533822B2 |
Method and system for propagating network policy
A method for acquiring and disseminating network node characteristics to enable policy decisions including receiving a resolution request from one or more clients in a network environment. Information, for example, network address, is then acquired from one or more sources regarding a specific location in a network, for example, a network node. A list of the network addresses is then generated and ranked based on one or more parameters that merit making traffic handling decisions. The network addresses are then associated with a host name on at least one directory server and then propagated to the one or more clients. |
US08533821B2 |
Detecting and defending against man-in-the-middle attacks
A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that records an incoming IP address, userid, and time of each session occurring with the target server; an activity analysis system that identifies suspect IP addresses by determining if an unacceptable number of sessions are occurring from a single incoming IP address during a predefined time period; and a countermeasure system for taking action against suspect IP addresses. |
US08533820B2 |
Reserved write positions on install media
A storage medium that is one of a compact disk and a digital versatile disk. The storage medium includes a first portion, the first portion being an area of the storage medium that is read-only only. The storage medium includes a second portion, the second portion being another area of the storage medium upon which a second set of data can be written. |
US08533819B2 |
Method and apparatus for detecting compromised host computers
A method and apparatus for detecting compromised host computers (e.g., Bots) are disclosed. For example, the method identifies a plurality of suspicious hosts. Once identified, the method analyzes network traffic of the plurality suspicious hosts to identify a plurality suspicious hub-servers. The method then classifies the plurality of candidate Bots into at least one group. The method then identifies members of each of the at least one group that are connected to a same controller from the plurality suspicious controllers, where the members are identified to be part of a Botnet. |
US08533807B2 |
Methods for accessing content based on a session ticket
A method for accessing content stored on a memory device is provided. In this method, a request to access the content is transmitted and a session ticket is received. The session ticket includes a parameter used to decrypt the content and the session ticket is generated based on a variable that is configured to change at a session. The content may be accessed based on the session ticket. |
US08533804B2 |
User login with redirect to home network
A login browser form allows a user to securely login to an account and access a web-based service at a server or server farm, referred to as a transaction node, without using a separate authentication or single sign-on server. A user is assigned to one of multiple transaction nodes as its home when the user enrolls in the web-based service. In a subsequent attempt to login, the user may land at the home transaction node or at a non-home transaction node. The transaction node serves the login browser form, including code to cause the web browser to transmit the user login id to the transaction node. If the transaction node determines that it is not the user's home, based on its records of user assignments, it identifies the home and configures the web browser to direct future communications to the home. The user's password is not sent to the non-home. |
US08533803B2 |
Method and apparatus for trusted federated identity
A trusted computing environment, such as a smartcard, UICC, Java card, global platform, or the like may be used as a local host trust center and a proxy for a single-sign on (SSO) provider. This may be referred to as a local SSO provider (OP). This may be done, for example, to keep authentication traffic local and to prevent over the air communications, which may burden an operator network. To establish the OP proxy in the trusted environment, the trusted environment may bind to the SSO provider in a number of ways. For example, the SSO provider may interoperate with UICC-based UE authentication or GBA. In this way, user equipment may leverage the trusted environment in order to provide increased security and reduce over the air communications and authentication burden on the OP or operator network. |
US08533802B2 |
Authentication system and related method
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for generating and communicating to the purported authorized user a key string adapted to provide a basis for authenticating the identity of the requester; a means for receiving an authentication credential associated with the request for access; and a means for evaluating the authentication credential to authenticate the identity of the requester. |
US08533801B2 |
System and method for binding a subscription-based computing system to an internet service
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer. |
US08533800B2 |
Secure and usable authentication for health care information access
Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider is logged onto a computer system in a physical area assigned to the patient. Whether the health care provider is logged onto the computer system during working hours of the provider is also ascertained. The health care provider is provided with access to the electronic record of the patient via the computer system if the determining resolves to true and the ascertaining resolves to true. |
US08533796B1 |
Providing application programs with access to secured resources
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for providing access to secured resources. A token providing system stores a primary authentication token that is used to obtain temporary authentication tokens. The token providing system provides, to application programs that are unable to access the primary authentication token, the temporary authentication tokens. The token providing system receives, from a first application program of the application programs, a first request to obtain a first temporary authentication token. The first request does not include the primary authentication token. The token providing system transmits a second request to obtain the first temporary authentication token. The second request includes the primary authentication token. The token providing system receives the first temporary authentication token. The token providing system provides the first temporary authentication token for use by the first application program. |
US08533795B2 |
Information processing apparatus, information processing method, information processing program, and computer-readable medium
An information processing apparatus is disclosed that includes a user authentication unit that identifies a current user, a task acquiring unit that acquires task information of a relevant task associated with a file to be processed by the current user, and a file information storage unit that stores file information of the file to be processed in association with the task information of the relevant task. |
US08533793B2 |
Location-aware security and access system
An invention is afforded for providing security for a protected network resource. The system includes a network access apparatus in communication with a receiver that receives signals from a remote source. The network access apparatus is capable of collecting current microprint data for the receiver, which is a plurality of values based on data values received at the receiver over a predefined period of time, for example, forty-five seconds. The system also includes an authentication computer in communication with the network access apparatus. The authentication computer has access to an LSDF for the receiver, which is a plurality of values based on data values received at the receiver over a predefined period of time, for example, a twenty-four hour period of time. In operation the network access apparatus provides current microprint data for the receiver to the authentication computer, and the authentication computer compares the current microprint data to the LSDF for the receiver to authenticate an access request. |
US08533787B2 |
Automatic resource ownership assignment system and method
A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates. |
US08533785B2 |
Systems and methods for managing the operation of multiple virtual machines among multiple terminal devices
An information processing device includes: a connection monitoring unit performs determining whether a first external device is connected, and determining whether a receiving unit receives the request from the first or second external device, wherein when the connection monitoring unit determines that the first external device is not connected, a usage permission/prohibition determining unit updates the usage permission/prohibition information stored in a management table so that the usage permission/prohibition information indicates that use of a first virtual computer is prohibited, and wherein when the connection monitoring unit determines that the receiving unit receives the request from the second external device and that the first external device is connected, the usage permission/prohibition determining unit transmits, to the first external device, information that instructs the first external device to prohibit use of a second virtual computer. |
US08533782B2 |
Access control
A policy store associated with a policy decision point of an access control system is updated. The policy decision point is arranged to provide, in response to received decision requests, access control decisions in dependence on one or more policies stored in the policy store, each policy specifying a predetermined access control decision to be provided in response to a particular access request made in respect of a particular attribute or combination of attributes. The policy decision point is associated with at least one policy enforcement point arranged to implement access control in accordance with access control decisions provided by the policy decision point in response to decision requests submitted by the policy enforcement point, the policy enforcement point having associated therewith an attribute store providing data relating to attributes in respect of which access requests have previously been made via the policy enforcement point. |
US08533781B2 |
Access method suitable for wireless personal area network
The embodiments of the invention disclose an access method suitable for wireless personal area network (WPAN). After the coordinator broadcasts the beacon frame, according to the beacon frame, the equipment identifies the authentication demand and the authentication mode required by the coordinator to the equipment. If the coordinator has no authentication demand to the equipment, the equipment and the coordinator carry out the association processes directly; otherwise, based on a selected authentication mode and the corresponding authentication mechanism negotiation information, the equipment sends the authentication access request to the coordinator; then based on the authentication mode selected by the equipment, the coordinator carries out the processes of authentication and session key negotiation with the equipment; finally, the coordinator sends the authentication access response to the equipment, when the authentication state in the authentication access response is success, the equipment carries out the association processes with the coordinator. The processes of authentication and the session key negotiation can be based on primitive control, and also can be based on port control. If the equipment is associated with the coordinator successfully, the coordinator distributes a network address to the equipment, and therefore the equipment can communicate with the coordinator normally. The invention solves the technical problems of lower security and lower efficiency in the existing WPAN access methods. |
US08533779B2 |
Method for preventing IP address from unexpected dispersion when using point-to-point protocol
A method for preventing IP address from unexpected dispersion when using point-to-point protocol is disclosed. The method comprises the steps: starting and initializing a PPP session; performing a PPP LCP negotiation, in which times of the successful PPP LCP negotiation is limited; performing a PPP authentication, in which an authentication request to AAA client is sent only once; performing a PPP IPCP negotiation, in which an accounting-start request is sent only once and times of the successful PPP IPCP negotiation is limited; and terminating the PPP session and releasing the IP address. The method of the invention for preventing IP address from unexpected dispersion when using point-to-point protocol effectively avoid excessive oscillation of a LCP state machine and a IPCP state machine by limiting times of the successful PPP LCP negotiation during the period of PPP LCP negotiation and times of the successful PPP IPCP negotiation. In the meantime, the method the invention effectively solves the problem of IP address unexpected dispersion by sending an authentication request to an AAA client only once during the PPP authentication phase and ensuring that the PPP session sends an accounting-start request only once. |
US08533774B2 |
Controlled sharing of information in virtual organizations
In one embodiment, a method for extracting data items for a task requesting a set of data items in a virtual organization including a plurality of members is provided. A set of confidentiality sub-policies associated with the set of data items and an information utility sub-policy associated with the task are retrieved. At least a portion of the set of data items for the task are retrieved based on an analysis that optimally balances confidentiality and information utility using the set of confidentiality sub-policies and the information utility sub-policy. |
US08533763B2 |
In-flight entertainment system
An in-flight entertainment system includes a server and a server/client interface. The server/client interface interfaces with the server and a display unit to retrieve a specified data block requested by the display unit, where the server/client interface sends a command to a storage device controller of the server to retrieve the specified data block from a storage device under the control of the server. The server/client interface operating based on its own control logic. |
US08533762B2 |
Digital broadcasting system and method of processing data in digital broadcasting system
A digital broadcast receiver and a control method thereof are disclosed. The control method of the digital broadcast receiver includes receiving a broadcast signal into which mobile service data and main service data are multiplexed, extracting TPC signaling information and FIC signaling information from a data group in the received mobile service data, acquiring a program table defining a mapping relation between each of all ensembles transmitted at a physical frequency and at least one virtual channel corresponding to the ensemble, using the extracted FIC signaling information, and detecting IP address information required for channel tuning to the at least one virtual channel corresponding to the ensemble, using the acquired program table. |
US08533761B1 |
Aggregating media information
A computer-implemented method includes receiving a search request associated with media-related information, identifying a media-related object responsive to the request, and gathering from a plurality of different corpuses of information a plurality of search results associated with the media-related object. |
US08533757B2 |
Intelligent system and methods of recommending media content items based on user preferences
A system and method for making program recommendations to users of a network-based video recording system utilizes expressed preferences as inputs to collaborative filtering and Bayesian predictive algorithms to rate television programs using a graphical rating system. The predictive algorithms are adaptive, improving in accuracy as more programs are rated. |
US08533752B2 |
Device and method for hierarchical broadcasting
A hierarchical broadcasting device and method are disclosed. In the hierarchical broadcasting method, a broadcast transmitting device may transmit lower layer broadcast data for an existing broadcast to a broadcast receiving device via a first communication network, and may transmit upper layer broadcast data for an improved broadcast to the broadcast receiving device via a second communication network. In this instance, the broadcast receiving device combines the lower layer broadcast data and the upper layer broadcast data in order to display the improved broadcast. |
US08533748B2 |
Contained command invocation framework
An object-oriented middleware framework for use in a network having a plurality of hosts including a first host having an associated first memory and first processor; and a second host having an associated second memory and second processor. The object-oriented middleware framework includes an Originator Command Container instantiating a Command by executing computer programming code stored in the first memory using the first processor. The framework also includes an Invocator Command Container, remote from the Originator Command Container and its associated first host where the instantiated Command is invoked, locally by executing computer programming code stored in the second memory using the second processor. |
US08533747B2 |
Method and system for selecting one or more integrated circuit card interface devices
A method for selecting at least one smart card reader from a list of smart card readers includes receiving a parameter indicative of a reader selection criteria, setting an environment variable that specifies a reader filtering library, executing an application that uses a smart card access library, and interposing the reader filtering library between the application and the smart card access library. |
US08533741B2 |
Methods for launching a program application
A method for launching a program application is provided. Here, configuration instructions are stored in a memory device and the configuration instructions are associated with multiple configurations. A configuration is selected from the multiple configurations when the memory device is coupled to a computing device. Thereafter, a configuration instruction associated with the configuration is retrieved from the memory device. The program application is launched and the configuration instruction is transmitted to the program application. |
US08533736B2 |
System and method for adding local resources for use by a mobile agent object
System and method for importing service objects to a host computing environment. In one embodiment, a method includes the steps of executing a mobile agent object, (called a delivery-mobile agent object) in a mobile-agent runtime environment in a host computing environment and then installing a service object to be executable in the mobile-agent runtime environment. |
US08533734B2 |
Application programming interface for managing time sharing option address space
A method includes receiving a start request from a client at a launcher application programming interface (API), determining whether an existing time sharing option (TSO) address space associated with a user of the client is available, retrieving security environment data associated with the user from a security product responsive to determining that no existing TSO address space associated with a user of the client is available, saving the retrieved security environment data as a security object, generating a message queue, generating a terminal status block (TSB) and saving the terminal status block, creating a TSO address space in a processor, sending an instruction to an operating system to start the TSO address space, and sending a message queue identifier associated with the message queue and an address space token associated with the TSO address space to the client. |
US08533733B2 |
Virtual world subgroup determination and segmentation for performance scalability
A system and method of decreasing server loads and, more particularly, to decrease server load by automatically determining subgroups based on object interactions and computational expenditures. The system includes a plurality of servers; a subgroup optimization module configured to segment a plurality of objects into optimal subgroups; and a server transfer module configured to apportion one or more of the optimal subgroups between the plurality of servers based on a load of each of the plurality of servers. The method includes determining a relationship amongst a plurality of objects; segmenting the objects into optimized subgroups based on the relationships; and apportioning the optimized subgroups amongst a plurality of servers based on server load. |
US08533731B2 |
Apparatus and method for distrubuting complex events based on correlations therebetween
A server calculates correlations between complex event processing processes performed by virtual machines (VMs) so as to detect events from streams using condition expressions for identifying the events. The server obtains the load status of each of the VMs. The server then detects a VM having a processing load exceeding a predetermined level based on the load status thus obtained. When a VM having a processing load exceeding a predetermined level is detected, the server distributes the complex event processing processes to the respective VMs based on the calculated correlations between the complex event processing processes. |
US08533729B2 |
Distributed task system and distributed task management method
A distributed task system has a task transaction server and at least one task server. Instead of being merely passively called by the task transaction server for executing a task, the task server performs self-balancing according to task execution conditions and operation conditions of the task server. The task transaction server receives task requests from the task server, records the execution conditions, and provides feedback to the task server, and the task server executes the task according to the received feedback and the operation conditions of the task server. The task transaction server may determine if the task server can execute the task according to the execution conditions of the task, and feedback to the task server. A self-balancing unit of the task server may further determine whether the task server is busy, and if not busy, trigger a task execution unit of the task server to execute the task. |
US08533728B2 |
Resource tracking method and apparatus
The present invention is directed to a parallel processing infrastructure, which enables the robust design of task scheduler(s) and communication primitive(s). This is achieved, in one embodiment of the present invention, by decomposing the general problem of exploiting parallelism into three parts. First, an infrastructure is provided to track resources. Second, a method is offered by which to expose the tracking of the aforementioned resources to task scheduler(s) and communication primitive(s). Third, a method is established by which task scheduler(s) in turn may enable and/or disable communication primitive(s). In this manner, an improved parallel processing infrastructure is provided. |
US08533726B2 |
Device, system, method, and program for computing resource allocation based on external environment and transition frequency
Provided is a computing resource allocation device capable of allocating computing resources to accommodate changing activity patterns. The device is equipped with an external environment recognition means that analyzes input values from sensors to specify the current environment, a memory means that stores a table in which the sensors required to specify the environment are correlated, a transition frequency computation means that computes the transition frequency at which a transition is made from an environment to another environment, and a computing resource allocation means that computes the amount of allocation of the computing resources to be used for the analysis based on the current environment by referencing the table and the transition frequency, and that allocates the computing resources for the analysis. |
US08533725B2 |
Information processing system and use right collective management method
Disclosed is an information processing system including plural information processing apparatuses that have respective hardware resources including hardware resources to be licensed, each information processing apparatus performing information processing using the licensed hardware resources in which use rights are allocated; and a management apparatus that is connected to the plural information processing apparatuses and manages the hardware resources of the plural information processing apparatuses. The management apparatus includes a use right information holding unit that holds use right information corresponding to the use rights of the hardware resources, and a use right allocation unit that allocates the use rights to the hardware resources on a hardware resource basis in accordance with the held use right information. |
US08533724B1 |
Virtual resource provisioning by assigning colors to virtual resources in multi-tenant resource pool
Virtual resource provisioning may be enhanced by coloring virtual resource instances and/or underlying implementation resources. Particular resource colors may be associated with particular treatments during allocation of implementation resources to virtual resources. There may be different types of colors corresponding to different types of allocation treatment. Exclusory colors may be utilized to reduce clustering of virtual resources with respect to implementation resources. Assignment of exclusory colors to virtual resources can help strike a balance between lower costs through efficient implementation resource utilization and higher fault tolerance through spreading across an available implementation resource pool. Inclusive colors may be utilized to require and/or prefer allocation of virtual resources to implementation resources painted with the inclusive color. Proximity colors may be utilized to enhance a computational performance of a set of virtual resources. Proximity colors may be associated with proximity specifications that define proximity in implementation resource networks. |
US08533722B2 |
Method and apparatus for assigning fractional processing nodes to work in a stream-oriented computer system
An apparatus and method for making fractional assignments of processing elements to processing nodes for stream-based applications in a distributed computer system includes determining an amount of processing power to give to each processing element. Based on a list of acceptable processing nodes, a determination of fractions of which processing nodes will work on each processing element is made. To update allocations of the amount of processing power and the fractions, the process is repeated. |
US08533721B2 |
Method and system of scheduling out-of-order operations without the requirement to execute compare, ready and pick logic in a single cycle
A method and system to schedule out of order operations without the requirement to execute compare, ready and pick logic in a single cycle. A lazy out-of-order scheduler splits each scheduling loop into two consecutive cycles. The scheduling loop includes a compare stage, a ready stage and a pick stage. The compare stage and the ready stage are executed in a first of the two consecutive cycles and the pick stage is executed in a second of the two consecutive cycles. By splitting each scheduling loop into two consecutive cycles, selecting the oldest operation by default and checking the readiness of the oldest operation, it relieves the system of timing requirements and avoids the need for power hungry logic. Every execution of an operation does not appear as one extra cycle longer and the lazy out-of-order scheduler retains most of the performance of a full out-of-order scheduler. |
US08533719B2 |
Cache-aware thread scheduling in multi-threaded systems
The disclosed embodiments provide a system that facilitates scheduling threads in a multi-threaded processor with multiple processor cores. During operation, the system executes a first thread in a processor core that is associated with a shared cache. During this execution, the system measures one or more metrics to characterize the first thread. Then, the system uses the characterization of the first thread and a characterization for a second, second thread to predict a performance impact that would occur if the second thread were to simultaneously execute in a second processor core that is also associated with the cache. If the predicted performance impact indicates that executing the second thread on the second processor core will improve performance for the multi-threaded processor, the system executes the second thread on the second processor core. |
US08533718B2 |
Batch job assignment apparatus, program, and method that balances processing across execution servers based on execution times
A job assignment apparatus includes: a correlation calculation unit to calculate a correlation between an execution time used for processing a program that depends on a computer resource operating at the start of an execution request job and an execution time used for processing a predetermined amount of data in the execution request job which operates immediately after completion of an operation of the program; a resource identification unit to identify the computer resource on which the execution request job depends on the basis of the correlation calculated by the correlation calculation unit; and a job assignment unit to assign the execution request job to one of execution servers connected to the job assignment apparatus so as to exclude simultaneous execution of a job that depends on the same computer resource as the computer resource identified by the resource identification unit and the execution request job. |
US08533714B2 |
Dynamic virtual machine domain configuration and virtual machine relocation management
Dynamic relocation of virtual machines among hypervisors in a domain is provided. A domain management module is executed on a computer processor and is configured to receive a request to add a new hypervisor to a domain. Each hypervisor and each domain comprises an architecture description (ARD). A new canonical ARD is generated for all hypervisors in the domain. A virtual machine executing on a first system is relocated to any other hypervisor in the domain. Virtual machines may also be moved to out-of-domain hypervisors through the use of override masks. In addition, under certain conditions, new hypervisors additions, as well as hypervisor and system updates may be performed without disrupting the virtual machines that are controlled by the hypervisors. |
US08533712B2 |
Virtual machine stage detection
A computer system and computer program product for categorizing a virtual machine stage. A data processing system starts a virtual machine. It sets factor-stage ranges, wherein for each combination factor and stage, a corresponding range is present, and wherein each range is as broad as a reset range. It sets a frequency for sampling virtual machine metrics and samples virtual machine metrics to form a plurality of virtual machine metrics for each factor. It applies a value to each range satisfied by each virtual machine metric, to form a plurality of stage-qualifying values corresponding to a range, and sums all stage-qualifying values for each stage, to form a stage likelihood. The data processing system further selects a stage corresponding a highest stage likelihood. The data processing system determines if the current range is different from a former range. The system expands each range corresponding to the current stage. |
US08533706B2 |
User process object code installer
A computer implemented method of computer implemented method for installing a code object in a user process virtual memory space, while the user process is running is provided. The user process is run in a virtual memory space. A controller process is run in a different virtual memory space than the user process. The control process requests to a kernel module to install the code object into the virtual memory space of the user process. The kernel module installs the code object into the virtual memory space of the user process, while the user process is running. |
US08533701B2 |
Virtual machine image update service
Systems, methods, and computer-readable media for updating a component utilized by an application within a distributed computing environment. An inventory of components relied on by applications within a distributed computing environment is created and maintained to facilitate identifying applications utilizing a particular component. A determination is made from the inventory of applications that utilize the particular component. An indication is received that an update is available for the particular component. An application image for an application utilizing the particular component is booted in an isolated computing environment to allow the component to be updated. A new image of the application is created to reflect the updated component. A user, such as a developer, of the application may be notified that the new image is available for future instantiations of the application. |
US08533699B2 |
System and method for optimizing a code section by forcing a code section to be executed atomically
Systems and methods for optimizing code may use transactional memory to optimize one code section by forcing another code section to execute atomically. Application source code may be analyzed to identify instructions in one code section that only need to be executed if there exists the possibility that another code section (e.g., a critical section) could be partially executed or that its results could be affected by interference. In response to identifying such instructions, alternate code may be generated that forces the critical section to be executed as an atomic transaction, e.g., using best-effort hardware transactional memory. This alternate code may replace the original code or may be included in an alternate execution path that can be conditionally selected for execution at runtime. The alternate code may elide the identified instructions (which are rendered unnecessary by the transaction) by removing them, or by including them in the alternate execution path. |
US08533698B2 |
Optimizing execution of kernels
The present invention extends to methods, systems, and computer program products for optimizing execution of kernels. Embodiments of the invention include an optimization framework for optimizing runtime execution of kernels. During compilation, information about the execution properties of a kernel are identified and stored alongside the executable code for the kernel. At runtime, calling contexts access the information. The calling contexts interpret the information and optimize kernel execution based on the interpretation. |
US08533697B2 |
Graphical processing unit (GPU) arrays providing high computational capabilities in a computing environment
A device initiates a technical computing environment (TCE), and receives, via the TCE, a program command that permits the TCE to access a graphical processing unit that is remote to the device, where the program command permits the TCE to seamlessly transfer data to the remote GPU. The device transforms, via the TCE, the program command into a program command that is executable by the remote GPU, and provides the transformed program command to the remote GPU for execution. The device also receives, from the remote GPU, one or more results associated with execution of the transformed program command by the remote GPU, and utilizes the one or more results via the TCE. |
US08533690B2 |
C-to-java programming language translator
A C-to-Java programming language translator that requires no human intervention, translates literally to preserve both procedure and function in the resulting code, and is independent of the purpose of the source code. The program reads in text from a C file, tokenizes each line for C keywords and punctuation, translates most keywords and expressions, and outputs the result to a Java file. The program is modular so that it is capable of running on multiple operating systems and hardware. The invention implements several methods of translation, including whole-line translation, search/replace translation, context-sensitive translation, idiomatic translation, and second-pass translation. The second-pass translation handles those instances when correct translation of a particular line depends on information in another line. The program of the invention translates a struct into a Java inner class, complete with multiple constructors and private variables, and it translates pointers into their reference equivalents. |
US08533688B2 |
System and method for interfacing with a system monitor
An interface is provided between a running computer application and a system monitor. The system monitor handles notification messages generated by the computer application. The interface includes an import module to scan a source file, extract notification messages from the source file and store the notification messages in a scan file. The interface includes a manager module to display each notification message in the scan file in a table in a graphical user interface to allow modifications to the data in the table. The data is exported to an export stage. The export module performs any translation required to create a file of the notification messages in a format that is acceptable to the system monitor. |
US08533687B1 |
Methods and system for global real-time transaction tracing
Methods and systems for out-of-application bytecode instrumentation and performance monitoring of applications, such as globally-distributed applications, decouple (1) acquiring measurements through sensor execution at applications; (2) instrumenting application bytecode with sensor bytecode and buffering and sending measurements at collector nodes; and (3) controlling instrumentation and correlating measurements at a central monitoring node. Collector nodes and applications may employ secured, high bandwidth network connections (e.g., a typical LAN connection). Collector nodes and the central monitoring node may employ non-secured, lower-bandwidth network connections (e.g., a typical WAN connection) and may use encryption and/or compression without burdening the monitored application. Multiple parallel instrumentation engines in collector nodes eliminate the possible instrumentation bottleneck presented by one centralized instrumentation engine in a single server. Moreover, decentralized buffering of monitoring event data allows management of peak measurement loads on the monitoring node. |
US08533686B2 |
Methods and systems for porting Sysprof
Embodiments of the present invention provide a system profiler that can be used on any processor architecture. In particular, instead of copying an entire stack every time, the stack is divided into blocks of a fixed size. For each block, a hash value is computed. As stack blocks are sent out of the kernel, the hash value and a copy of the block contents is kept in a user space cache. In the kernel, the hash codes of sent stack blocks are tracked in a table. During system profiling, the kernel module sampling the call stack determines if that stack block was previously sent by checking for the hash value in the kernel table. If the hash matches an entry in the kernel table, then only the hash value is sent. If the hash value is not in the table, the entire block and the hash value is sent. |
US08533684B2 |
Source identification of compliance errors in a web page with custom widgets
A mechanism is provided to automate the mapping so that custom widgets that cause compliance errors in the Web page can be identified automatically. The mechanism dynamically creates and inserts debug directives into the HTML code generated from a custom widget in a Web page so that a compliance error found in the generated code can be traced back to the custom widget that caused the error. |
US08533683B2 |
Stack walking enhancements using sensorpoints
A system and method for receiving an image of compiled user code, scanning the image to determine each of a plurality of functions included in the user code and creating a separately compiled executable module corresponding to selected ones of the plurality of functions, wherein the module includes instructions to create a stack trace for the selected ones of the functions. |
US08533682B2 |
Amplification of dynamic checks through concurrency fuzzing
The subject disclosure relates to effective dynamic monitoring of an application executing in a computing system by increasing concurrency coverage. A set of dynamic checks are linked to an application by mechanisms that enable the dynamic checks to monitor behavior of the application at runtime. As additionally described herein, concurrency fuzzing is applied to the application to randomize thread schedules of the application, thus increasing a number of disparate concurrency scenarios of the application observed by the plurality of dynamic checks. |
US08533674B2 |
Method, system and apparatus for providing pay-per-use distributed computing resources
Method, system, apparatus, and computer program and computer program product provide on-demand, scalable computational resources to application providers over a distributed network and system. Resources are made available based on demand for applications. Application providers are charged fees based on the amount of resources utilized to satisfy the needs of the application. In providing compute resources, method and apparatus is capable of rapidly activating a plurality of instances of the applications as demand increases and to halt instances as demand drops. Application providers are charged based on metered amount of computational resources utilized in processing their applications. Application providers access the network to distribute applications onto network to utilize distributed compute resources for processing of the applications. Application providers are further capable of monitoring, updating and replacing distributed applications. Apparatus and system includes plurality of computing resources distributed across a network capable of restoring and snapshotting provisioned applications based on demand. |
US08533673B2 |
Language-level integration of programming models
To enable language-level integration of multiple programming languages into a single programming framework, one or more domain specific languages (DSLs) are specified as incremental extensions to a host programming language. An application created in this framework may include program code written in the host language as well as DSL inset code that is written in any of the DSLs. The extensions to the host language are described in DSL specifications, which define how the DSL inset code is processed. At runtime, DSL inset code in the source code is detected and passed to a DSL inset processor for execution according to an appropriate DSL specification, whereas source code in the host language is executed by a host language processor. |
US08533671B2 |
Assigning type parameters
The present invention extends to methods, systems, and computer program products for assigning type parameters. Embodiments of the invention permit using a visual editor to edit arbitrary object instances in a graphical fashion. Instances of generic types can be manipulated to change the type parameters for that generic (to be able to change a List |
US08533669B2 |
Analysis of dynamic elements in bounded time
A code analysis system is described herein that provides code completion for programming languages that include elements that are not statically discoverable and that provides results in a predictable period that is acceptable for an interactive user interface. The system compiles each file into an intermediate state that can be stored and cached to speed later analysis of files. In addition, when executing a particular file, the system monitors a time-based threshold and/or a recursion depth so that if the compilation time is exceeding the threshold or a function is exceeding the recursion depth the system can stop the execution and use the intermediate results obtained up to that point to provide as much information as possible within a bounded execution time. When dynamic analysis fails, the system falls back to static analysis. |
US08533664B2 |
Method and system to automatically generate GUI object addressing queries
One embodiment of the present invention provides a system that automatically generates addressing queries for objects rendered on a graphical user interface (GUI). During operation, the system receives a request for GUI object-addressing query for an application to be tested. The system first identifies the application context, and retrieves a rule document describing GUI object-addressing query rules according to the identified application context. Next, the system parses the rule document to generate an applicable query rule set for the application. Based on the applicable query rule set, the system generates a set of query candidates and determines a unique query for each GUI object. |
US08533663B2 |
System and method for utilizing available best effort hardware mechanisms for supporting transactional memory
Systems and methods for managing divergence of best effort transactional support mechanisms in various transactional memory implementations using a portable transaction interface are described. This interface may be implemented by various combinations of best effort hardware features, including none at all. Because the features offered by this interface may be best effort, a default (e.g., software) implementation may always be possible without the need for special hardware support. Software may be written to the interface, and may be executable on a variety of platforms, taking advantage of best effort hardware features included on each one, while not depending on any particular mechanism. Multiple implementations of each operation defined by the interface may be included in one or more portable transaction interface libraries. Systems and/or application software may be written as platform-independent and/or portable, and may call functions of these libraries to implement the operations for a targeted execution environment. |
US08533659B2 |
Efficient extraction of software dependencies from program code
Calls to stop functions are identified in a computer program file. The stop functions are functions that interact with external resources. Parameters of the calls to the stop functions that are references to the external resources are identified. An analysis is performed over the computer program file to find out possible values of the parameters of the calls. |
US08533655B1 |
Method and apparatus for capturing data samples with test circuitry
A method is provided for testing a circuit design in a programmable IC. The circuit design and a sampling circuit are implemented in the programmable IC. A first routing circuit is implemented in the programmable IC to route signals from the designated locations of a first subset of a set of test nodes of the circuit design to a set of input nodes of the sampling circuit. Signals are sampled from the first subset of test nodes using the sampling circuit. The programmable IC is partially reconfigured to implement a second routing circuit that replaces the first routing circuit. The second routing circuit is configured to route signals from a second subset of the set of test nodes to the set of input nodes of the sampling circuit. Signals from the second subset of test nodes are sampled using the sampling circuit. |
US08533651B1 |
Providing conversion of a planar design to a FinFET design
An approach for providing conversion of a planar design to a FinFET design is disclosed. Embodiments include: receiving a planar design having a plurality of diffusion regions; overlapping a plurality of parallel fin mandrels with a plurality of evenly-spaced parallel lines of a grid; snapping the diffusion regions to the grid based on the parallel lines; and generating a FinFET design based on the overlapping and the snapping. Embodiments include the parallel lines and the parallel fin mandrels being perpendicular to a poly orientation associated with the planar design, and determining a spacing length between the parallel lines; determining a plurality of edges of the diffusion regions that are parallel to the poly orientation; and cropping the diffusion regions until each of the edges has a length that is a multiple of the spacing length. |
US08533650B2 |
Annotation management for hierarchical designs of integrated circuits
A method is provided to produce a persistent representation of a annotation to a circuit design comprising: providing a block hierarchy that corresponds to the circuit design; displaying in a computer user interface display a first elaborated view of the circuit design that corresponds to the first instance of a block hierarchy; receiving user input to associate the annotation with a component of the elaborated view of the design; providing in a mirrored block hierarchy; and associating the annotation with the mirrored block hierarchy in computer readable storage media. |
US08533648B2 |
Automatic clock-gating propagation technique
Embodiments of the present invention provide a method and system for clock-gating a circuit. During operation, the system receives a description of a circuit that includes clocked memory elements, some of which are clock-gated. Next, the system identifies a sender memory element by identifying a sender path from an output of the sender memory element to a data input for a seed memory element. Then, the system identifies an enable-generating memory element by identifying an enable-signal path from an output of the enable-generating memory element to an enable signal which is used to gate a clock signal input for the seed memory element. Next, the system provides clock-gating for the sender memory element by generating an enable signal using a data input for the enable-generating memory element. Finally, the system gates a clock signal for the sender memory element using this generated enable signal. |
US08533644B1 |
Multi-CCC current source models and static timing analysis methods for integrated circuit designs
In one embodiment of the invention, a multi-CCC current source model is disclosed to perform statistical timing analysis of an integrated circuit design. The multi-CCC current source model includes a voltage waveform transfer function, a voltage dependent current source, and an output capacitor. The voltage waveform transfer function receives an input voltage waveform and transforms it into an intermediate voltage waveform. The voltage dependent current source generates an output current in response to the intermediate voltage waveform. The output capacitor is coupled in parallel to the voltage dependent current source to generate an output voltage waveform for computation of a timing delay. |
US08533641B2 |
Gate array architecture with multiple programmable regions
Systems and methods are disclosed for forming a custom integrated circuit (IC) with a first fixed (non-programmable) region on a wafer with non-customizable mask layers, wherein the first fixed region includes multiplicities of transistors and a first interconnect layer and a second interconnect layer above the first interconnect layer which form base cells; and a programmable region above the first fixed region with customizable mask layers, wherein at least one mask layer in the programmable region is coupled to the second interconnect layer which provides electrical access to all transistor nodes of the base cells and wherein the programmable region comprises a third interconnect layer coupled to the customizable mask layers to customize the IC. A second fixed region may be formed above the programmable region to provide multiple fixed regions and reduce the number of required masks in customizing the custom IC. |
US08533638B2 |
Post-optical proximity correction photoresist pattern collapse rule
A model of defining a photoresist pattern collapse rule is provided. A portion of the photoresist pattern which corresponds to a second line pattern of a photomask layout is defined as non-collapse patterns if d≧5a and c≧1.5b or if 5a>d≧3a and c≧1.2b, wherein b is the widths of two first line patterns, c is the width of a second line pattern of the photomask layout, and a and d are distances between the second line pattern and the two first line patterns. Accordingly, a photomask layout, a semiconductor substrate and a method for improving photoresist pattern collapse for post-optical proximity correction are also provided. |
US08533637B2 |
Retargeting based on process window simulation
Aspects of the invention relate to retargeting based on process window simulation to fix hotspots. The process window simulation is performed to generate process window information. Edge fragments are selected for retargeting. Based on the process window information, the selected edge fragments are retargeted in a balanced way. |
US08533632B2 |
Systems and methods for immersive advertising
The invention is directed to systems and Methods for immersive advertising on a wide area network, such as the Internet or World Wide Web. Immersive advertisements are customized presentations developed and imbedded within the body of web content. They can take the form of non-static images imbedded within a configurable primary image model or they can be a non-configurable, highly stylized, and animated component imbedded within the content of a web page. |
US08533624B2 |
Method and apparatus for displaying a window for a user interface
Methods and apparatuses to display windows. In more than one embodiments of the invention, a window is closed automatically (e.g., after a timer expires, or when a condition or criterion is met, or a system input is received) without user input. In some examples, the window is translucent so that the portion of another window, when present, is visible under the window. In some examples, the image of the window is faded out before the window is closed and destroyed. In some examples, the window does not close in response to any input from a user input device. In some examples, the window is repositioned (or hidden) automatically when another translucent window is displayed. The degree of translucency, the speed for fading out, the discrete levels of translucency for fading out, the time to expire, and/or other parameters for controlling the display of the window may be set by the user or adjusted by the system (or application software programs) automatically according to system conditions or other criteria. |
US08533620B2 |
Monitoring and tracking athletic activity
Tracking and monitoring athletic activity offers individuals with additional motivation to continue such behavior. An individual may track his or her athletic activity by completing goals. These goals may be represented by real-world objects such as food items, landmarks, buildings, statues, other physical structures, toys and the like. Each object may correspond to an athletic activity goal and require an amount of athletic activity to complete the goal. For example, a donut goal object may correspond to an athletic activity goal of burning 350 calories. The user may progress from goal object to goal object. Goal objects may increase in difficulty (e.g., amount of athletic activity required) and might only be available for selection upon completing an immediately previous goal object, a number of goal objects, an amount of athletic activity and the like. |
US08533617B2 |
Method and computer system for displaying a weighted tree based on hyperbolic geometry
The invention discloses a method for displaying a weighted tree based on hyperbolic geometry, comprising: obtaining weighted tree data defining a weighted tree structure; positioning the root node in a negatively curved space as a center, based on the weighted tree defining data; based on the weighted tree defining data, performing layout processing for each parent node and all its direct child nodes from top to bottom recursively, until all the nodes in the tree have been laid out in the negatively curved space, wherein the higher the weight of an edge connecting the parent node and each of its direct child nodes is, the shorter the distance between the parent node and the child node is; mapping the layout data from the negative curved space to an Euclidean plane; and displaying the mapped data in display. |
US08533616B2 |
Time support for service adaptation
A computer-implemented method and computer program product for adapting enterprise services to specific requirements of an enterprise. A graphical representation of a plurality of service elements is generated on a computer. Each service element includes an input and an output. A link is generated between an output of a first service element of the plurality of service elements and an input of a second service element of the plurality of service elements. The first and second service elements are concatenated via the link to form an adapted service element. |
US08533614B2 |
Screen editing device, screen editing method, and computer program product
An image editing device configured to edit the contents of an operations screen to be displayed on a display and store a result of editing, the image editing device includes a keyword storing part configured to store at least one keyword corresponding to each screen structural element which can be arranged on the operations screen; a selection receiving part configured to select the screen structural element of an editing subject; a display setting part configured to determine whether the screen structural element selected by the selection receiving part is to be displayed on the operations screen; a keyword receiving part configured to receive an input of the keyword; and a first extraction part configured to extract the screen structural element corresponding to the keyword received by the keyword receiving part and display the screen structural element as a candidate screen structural element for display-setting. |
US08533612B2 |
User interface for emergency alert system
A user interface for interacting with an emergency notification system. The user interface comprises at least one software module installed on a computer readable medium and containing instructions for operating a computer processor. The instructions comprise first instructions for causing the processor to display on a computing device display an alert selection window configured to receive a user entered alert message; second instructions for causing the processor to display on the computing device display a group selection window configured to receive a user selection of one or more notification units to receive the alert message; and third instructions for causing the processor to display on the computer device display a selection button for instructing the processor, upon selection, to transmit the alert message to the selected one or more notification units. |
US08533611B2 |
Browser enabled communication device for conducting conversations in either a real-time mode, a time-shifted mode, and with the ability to seamlessly shift the conversation between the two modes
A browser enabled communication device capable of conducting conversations, including multiple media types, in either a real-time or a time-shifted mode, with the ability to seamlessly transition between the two modes. |
US08533606B2 |
System and method for personalized hold
Disclosed herein are systems, methods, and computer readable-media for contextual adaptive advertising. The method for personalized hold comprises collecting a set of data elements about a user, generating a user profile based on the set of data elements, selecting media content from one or more content repositories based on the user profile, and delivering selected media content to a device for playback to the user during noncommunicative gaps. One aspect provides further for recording a playback order of delivered media content in order to avoid playing the same media content back to back. |
US08533604B1 |
Techniques for user interface selection
Described are techniques for user interface selection. A plurality of user interface sets is provided. Each of the plurality of user interface sets includes a plurality of user interfaces corresponding to a plurality of user levels of interaction. Each of the plurality of user levels of interaction is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing a request. First user information associated with the user is provided. The first user information identifies one of said plurality of user levels for at least one of the plurality of user interface sets. A user interface is selected for display in connection with interactions with the user in accordance with the first user information. The selected user interface is displayed. |
US08533601B2 |
System and method for monitoring servers of a data center
A system and method for monitoring devices such as servers in one or more data centers. In one embodiment of the method a first graphical user interface is displayed on a computer system such as a desktop computer system. The first graphical user interface may include first and second graphical elements corresponding to first and second system racks, respectively, within a data center. The first system rack may include a plurality of computer systems such as servers. The second system rack may also include a plurality of computer systems such as servers. The first graphical element may include first visual information identifying a location of the first system rack on a floor within the data center, and the second graphical element may include second visual information identifying a location of the second system rack on the floor within the data center. |
US08533594B2 |
Hierarchical display and navigation of document revision histories
A system and technique for displaying a document's workflow history are disclosed. The system includes a graphical user interface for displaying one or more graphical representations of events generated by an application configured to edit a document. Each of the events generated by the application may be stored in a data structure that is associated with one or more portions of the document. The data structure may also be associated with a digital image that reflects the state of the document at the time the event was generated and one or more frames of digital video captured substantially simultaneously with the generation of the event. The system may display the stored events via graphical representations in the graphical user interface that represent a portion of the total document workflow history. A user may navigate through the graphical events based on a hierarchical algorithm for clustering events. |
US08533590B2 |
Information processing apparatus and layout processing method
An information processing apparatus includes a simple layout generation unit configured to generate a simple layout that exemplifies layout results based on document components and a layout template used in a layout of the document components, a presentation unit configured to present the simple layout generated by the simple layout generation unit, a selection unit configured to select the simple layout according to a user operation from the simple layout presented by the presentation unit, and a layout result generation unit configured to execute the layout based on the simple layout selected by the selection unit to generate the layout result. |
US08533583B2 |
Application software generation device, computer program product and application software generation system
Disclosed is an application software generation device to generate an application software for a data collection device having a reading unit to read discrimination information to carry out collection of data based on the discrimination information including a table data generation unit to generate table data for defining arbitrary items, an application software generation unit to generate an application software which is executed by the data collection device in order to collect the data based on the item which is defined in the table data and a transfer unit to transfer the generated application software to the data collection device. |
US08533579B2 |
Data loss detection method for handling fuzziness in sensitive keywords
A method and apparatus for handling fuzziness in sensitive keywords from data loss prevention (DLP) policies. In one embodiment, the method includes identifying a keyword included in a DLP policy, generating multiple permutations of the keyword, and adding the multiple permutations to the DLP policy. The method further includes causing information content to be searched for the keyword permutations to detect a violation of the DLP policy in the information content. |
US08533576B1 |
Data independent error computation and usage with decision directed error computation
A signal error is determined by obtaining a known property of an expected signal. A signal is received and a signal error is determined based at least in part on the received signal and the known property of the expected signal. |
US08533572B2 |
Error correcting code logic for processor caches that uses a common set of check bits
A processor or other apparatus of an aspect may include a first cache, a first error correction code (ECC) logic for the first cache, a second cache, and a second ECC logic for the second cache. The apparatus may also include an interconnect coupled with or between the first cache and the second cache. The interconnect is operable to transmit data and also check bits corresponding to the data between the first cache and the second cache. A method of an aspect may include accessing data, and check bits corresponding to the data, from a first cache. The data and the check bits may be transmitted over an interconnect from the first cache to a second cache. The data and the check bits may be stored in the second cache. Other methods, apparatus, and systems are also disclosed. |
US08533571B2 |
Lossy coding of signals
A method is described for packing variable-length entropy coded data into a fixed rate data stream along with resolution enhancement data, the method providing tightly constrained propagation of transmission channel errors and graceful degradation of signal resolution as entropy-coded data rate increases. An application to a multiband ADPCM audio codec is also described. |
US08533569B2 |
Apparatus, system, and method for managing data using a data pipeline
An apparatus, system, and method are disclosed for managing data in a solid-state storage device. A solid-state storage and solid-state controller are included. The solid-state storage controller includes a write data pipeline and a read data pipeline The write data pipeline includes a packetizer and an ECC generator. The packetizer receives a data segment and creates one or more data packets sized for the solid-state storage. The ECC generator generates one or more error-correcting codes (“ECC”) for the data packets received from the packetizer. The read data pipeline includes an ECC correction module, a depacketizer, and an alignment module. The ECC correction module reads a data packet from solid-state storage, determines if a data error exists using corresponding ECC and corrects errors. The depacketizer checks and removes one or more packet headers. The alignment module removes unwanted data, and re-formats the data as data segments of an object. |
US08533568B2 |
LDPC encoding methods and apparatus
A flexible and relatively hardware efficient LDPC encoder is described. The encoder can be implemented with a level of parallelism which is less than the full parallelism of the code structure used to control the encoding process. Each command of a relatively simple microcode used to describe the code structure can be stored and executed multiple times to complete the encoding of a codeword. Different codeword lengths can be supported using the same set of microcode instructions but with the code being implemented a different number of times depending on the lifting factor selected to be used. The LDPC encoder can switch between encoding codewords of different lengths, without the need to change the stored code description information, by simply changing a code lifting factor used to control the encoding processes. When coding codewords shorter than the maximum supported codeword length some block storage locations and/or registers may go unused. |
US08533564B2 |
System and method of error correction of control data at a memory device
A controller coupled to a memory array includes an error correction coding (ECC) engine and an ECC enhancement compression module coupled to the ECC engine. The ECC enhancement compression module is configured to receive and compress control data to be provided to the ECC engine to be encoded. Compressed encoded control data generated at the ECC engine is stored as a codeword at the memory array. |
US08533561B2 |
Method and apparatus for applying forward error correction in 66b systems
A method and apparatus for applying Forward Error Correction (FEC) in 66b systems. For a user data, the apparatus uses a method comprising the steps of generating one or more data blocks using a 66b code format and the user data; generating one or more FEC parity blocks using the 66b code format, wherein the parity is calculated over the data blocks; and generating an FEC codeword using the data blocks and the FEC parity blocks. |
US08533560B2 |
Controller, data storage device and program product
According to an embodiment of a controller, a bit string manipulating unit manipulates a bit string of manipulation target data based on a predetermined rule. A special data setting unit generates a magic number based on a special data setting request from a host interface, obtains an error detecting code for the magic number, and sends the magic number and the error detecting code as manipulation target data to the bit string manipulating unit to obtain a manipulated manipulation target data. The special data setting unit also extracts logical block address information from the special data setting request, and instructs an access unit to write the magic number in the manipulated manipulation target data to a user data storage area and to write the error detecting code in the manipulated manipulation target data to a redundant area in a storage area located by the logical block address information. |
US08533559B2 |
Semiconductor recording device with error recovery
An error correction code of (N+M) words is configured by adding an ECC parity of M word (M is a natural number) to N words extracted at an interval of A words with respect to data of (A*N) words (A and N are natural numbers) inputted via an interface. A data distributor distributes (N+M) words to the respective (N+M) physical blocks to record by A words. In a case where a writing error has occurred, data recorded in a cell sharing page of the page and in a page of another physical block configuring the error correction code is read. A disappearing correction is carried out to the data of the cell sharing page by using the data, and thus the data of the cell sharing page is recovered and written. In this manner, in the multi-level nonvolatile memory, an error in writing of a certain page can be prevented from propagating to a written page sharing a cell. |
US08533558B2 |
System and method of error correction of control data at a memory device
A method includes initiating a compression operation to compress data to be stored in a group of storage elements at a memory device that includes an error correction coding (ECC) engine. The method includes selecting one of a first mode of the ECC engine to generate a first number of parity bits and a second mode of the ECC engine to generate a second number of parity bits based on an extent of compression of the data. The method also includes encoding the compressed data to generate parity bits corresponding to the compressed data and storing the compressed data and the parity bits to the group of storage elements according to a page format that includes a data portion and a parity portion. The compressed data is stored in the data portion and at least some of the parity bits are stored in the parity portion. |
US08533557B2 |
Device and method for error correction and protection against data corruption
A device for protecting a data word against data corruption includes first and second determiners. The first determiner is configured to determine an error correction code cvA associated with a data word a so that cvA=aAT, with A being a generator matrix of a linear systematic base correction code, the columns of which enable performance of an x-bit error correction on replica of the data word a and the associated error correction code cvA. The second determiner is configured to determine an extended error correction code cvE so that (cvA|cvE)=aFT, with F being an extended generator matrix F = ( A E ) of an extended linear systematic correction code, the columns of which enable, using the extension error correction code cvE, performance of an y-bit error correction, with y>x, on a replica of the data word a and the associated error correction code cvA. |
US08533555B2 |
Efficient encoding and decoding methods for representing schedules and processing forward error correction codes
A sequence of symbol operations (a “schedule representation”) within a data storage device, wherein the operations are those used to process encoding or decoding operations of a forward error correction code (an “FEC code”) upon an arbitrary block of data of a given size (where size can be measured in numbers of symbols). The method is such that the schedule representation can be used to direct the processing of these operations upon a block of data in a way that is computationally efficient. Preferably, the same method can be applied to represent schedules derived from multiple different algorithms for the encoding or decoding of a code or for multiple different codes. |
US08533553B2 |
Method for transmitting information of ACK/NACK sequence in wireless communication system and apparatus therefor
A method for transmitting information of ACK/NACK (Acknowledgement/Negative ACK) sequence from a receiver in a wireless communication system is disclosed. A receiver receives a plurality of data from a transmitter, and determines one ACK/NACK sequence including ACKs/NACKs corresponding to each of the plurality of data. If two or more ACKs are included in the ACK/NACK sequence, the receiver selects a combination of a first HARQ (Hybrid Automatic Repeat reQuest) transmission resource and a first modulation symbol corresponding to a certain ACK of the two or more ACKs, and selects a combination of a second HARQ transmission resource and a second modulation symbol corresponding to ACKs other than the certain ACK of the two or more ACKs. Thus, the receiver transmits each of the first modulation symbol and the second modulation symbol to the transmitter using the first HARQ transmission resource and the second HARQ transmission resource, respectively. |
US08533550B2 |
Method and system to improve the performance and/or reliability of a solid-state drive
A method and system to improve the performance and/or reliability of a solid-state drive (SSD). In one embodiment of the invention, the SSD has logic compress a block of data to be stored in the SSD. If it is not possible to compress the block of data below the threshold, the SSD stores the block of data without any compression. If it is possible to compress the block of data below the threshold, the SSD compresses the block of data and stores the compressed data in the SSD. In one embodiment of the invention, the SSD has logic to dynamically adjust or select the strength of the error correcting code of the data that is stored in the SSD. In another embodiment of the invention, the SSD has logic to provide intra-page XOR protection of the data in the page. |
US08533547B2 |
Continuous application and decompression of test patterns and selective compaction of test responses
A method for applying test patterns to scan chains in a circuit-under-test. The method includes providing a compressed test pattern of bits; decompressing the compressed test pattern into a decompressed test pattern of bits as the compressed test pattern is being provided; and applying the decompressed test pattern to scan chains of the circuit-under-test. The actions of providing the compressed test pattern, decompressing the compressed test pattern, and applying the decompressed pattern are performed synchronously at the same or different clock rates, depending on the way in which the decompressed bits are to be generated. A circuit that performs the decompression includes a decompressor such as a linear finite state machine adapted to receive a compressed test pattern of bits. The decompressor decompresses the test pattern into a decompressed test pattern of bits as the compressed test pattern is being received. |
US08533541B2 |
Verification support of circuit blocks having independent clock domains
A computer-readable, non-transitory medium stores a program that causes a computer to execute detecting in a circuit-under-test, a change in a signal output from each circuit element on a transmission-side, during one clock cycle on a reception-side at an asynchronous location; inputting to each circuit element on the reception-side, a signal for which a change is not detected at a detection time among detection times when a signal change is detected at the detecting and replacing with a random logic value, a signal for which a change has been detected at a detection time among the detection times and inputting the random logic value to each circuit element on the reception-side, in an action triggered by a rising edge of an operation clock on the reception-side after the one clock cycle; and outputting for each circuit element on the reception-side, an operation result obtained based on input at the inputting. |
US08533536B2 |
Monitoring data categorization and module-based health correlations
Architecture for aggregating health alerts from a number of related components into a single aggregated health state that can be analyzed to isolate the component responsible for the fault condition. In a hierarchy of related components within various component groups in a computer system, a number of health indicators can indicate alerts occurring in one or more of the related components whereas the fault condition occurs in only one component upon which the other components depend. The health indicators of related components are aggregated into an aggregated health state for each component group. These aggregated health states are analyzed to identify the related component associated with a root cause of the alert condition for an affected component group. |
US08533534B2 |
Information generating apparatus and information generating method
An information generating apparatus, includes: a process executing part that executes at least one process using a battery as a power source; a power detecting part that detects power consumption of the battery; a consumption determining part that determines whether the power consumption is equal to or more than a specified threshold; an acquisition part that specifies a process executed by the process executing part when the power consumption is equal to or more than the specified threshold; and a generating part that generates execution state information about the specified process. |
US08533533B2 |
Monitoring processes via autocorrelation
A method and apparatus including a monitoring and correction module that monitors process metrics to identify a steady-state for a process, detects a deviation from the steady-state for the process, and executes a corrective measure automatically to reduce an impact of the process in response to the deviation by a monitoring and correction module. The monitoring and correction module also analyzes the deviation to determine whether the deviation is negatively impact in performance for other processes. |
US08533531B2 |
Multimedia hardware emulation for application testing
A multimedia testing system is described herein that uses a virtual hardware driver to test software application behavior using virtual hardware in place of physical hardware devices. The virtual hardware driver receives customized input patterns that emulate behavior and formatting of data from a wide variety of hardware devices. For webcams, the system can send a steady stream of frames like those that would be provided as output from a physical webcam. A test environment can observe software interaction with the received customized input patterns to determine how the software will interact with various physical hardware devices. Thus, the multimedia testing system allows automated testing of a software application that interacts with multimedia hardware without physically buying and installing hardware devices. |
US08533529B2 |
System and method for supporting compensation work using a process execution engine
A system and method can support a compensation work. The system includes one or more compensation functions that use a process state to realize the compensation work associated with a forward work, wherein the compensation work is executed at a different runtime from an execution time of the forward work, and wherein the process state contains data needed to execute the compensation work. The system also includes a process execution engine that can dynamically manage process state to make the state available to the compensation functions. The process state is retrieved based on a closure data structure that holds an expression and an environment of variable bindings, in which the expression is to be evaluated. |
US08533523B2 |
Data recovery in a cross domain environment
A method for recovering data when corrupted data from a source is detected includes identifying data corrupted as a result of using the corrupted data by tracing propagation of the corrupted data to provide identified corrupted data, and repairing the identified corrupted data to provide repaired data. The propagation of the corrupted data is traced from one domain to another. Data in both domains is repaired. A wrapper is provided for the source. Calls into and out of the source are intercepted by the wrapper. Calls of a plurality of different domains are intercepted by the wrapper. A wrapper is provided for a process. External service calls of the process are intercepted by the wrapper. The wrapper recreates a process flow followed by the process in accordance with the corrupted data. A wrapper is provided for a database. Accesses of the database are intercepted by the wrapper. |
US08533521B2 |
Method for adjusting phase of a clock in a host based upon comparison of first and second pattern signals from a memory and the first and the second pattern signals pre-stored in the host
A memory card includes a memory controller configured to perform control for sending and receiving a command signal, a response signal, a data signal, and a status signal in synchronization with a clock signal, and a memory-side pattern signal storage unit configured to store a tuning pattern signal to be sent to a host device. The tuning pattern signal is used by the host device to adjust the phase of the clock signal for use as a sampling clock signal. The memory card sends a first tuning pattern signal through a command line and a second tuning pattern signal through a data line concurrently. |
US08533520B2 |
Electronic device, method for controlling electronic device, and recording medium
When a user presses down an extension directing button, a control unit of an image forming apparatus detects the press-down of the extension directing button and executes a setting process of new mode set time. In this case, the control unit calculates the new mode set time by adding extension time extracted from an extension time data storage unit to basic set time acquired from a basic set time data storage unit and records the new mode set time in a mode set time data storage unit. Then, when start of a sleep mode is detected, the control unit of the image forming apparatus records the basic set time, which is extracted from the basic set time data storage unit, in the mode set time data storage unit as new mode set time when the mode set time is extended. |
US08533510B2 |
Power management method for a multi-microprocessor system
A power management method for a multi-microprocessor system is provided. The multi-microprocessor system comprises a first microprocessor and a second microprocessor. The power management method comprises steps of receiving a power down instruction; transmitting a power down notice signal to the first microprocessor from the second microprocessor, transmitting a reply signal from the first microprocessor to the second microprocessor in response to the power down notice signal, and turning off power of the first microprocessor by the second microprocessor. |
US08533508B2 |
Apparatus and method for reducing the standby power consumption of a display, and display with low standby power consumption
A display includes a power supply system using a power controller to switch a power switch to control power delivery, and an image scalar receiving a supply voltage and a supply current from the power supply system. An apparatus and method are proposed to determine a control signal in a standby mode by monitoring the supply voltage or the supply current, to wake up or turn off the power controller to reduce the switching times of the power switch in the standby mode, thereby reducing the switching loss of the power switch and the standby power consumption of the display. |
US08533506B2 |
System wakeup on wireless network messages
While an information handling device is in a reduced power state, the information handling device transitions from the reduced power state to a higher power state in response to receiving a message over an established wireless network connection that maintains a presence on a wireless network. In turn, the information handling device processes the message accordingly in the higher power state. |
US08533505B2 |
Data processing apparatus and method for transferring workload between source and destination processing circuitry
In response to a transfer stimulus, performance of a processing workload is transferred from a source processing circuitry to a destination processing circuitry, in preparation for the source processing circuitry to be placed in a power saving condition following the transfer. To reduce the number of memory fetches required by the destination processing circuitry following the transfer, a cache of the source processing circuitry is maintained in a powered state for a snooping period. During the snooping period, cache snooping circuitry snoops data values in the source cache and retrieves the snoop data values for the destination processing circuitry. |
US08533503B2 |
Managing power consumption in a multicore processor
A method and computer-usable medium including instructions for performing a method of managing power consumption in a multicore processor comprising a plurality of processor elements with at least one power saving mode. The method includes listing, using at least one distribution queue, a portion of the executable transactions in order of eligibility for execution. A plurality of executable transaction schedulers are provided. The executable transaction schedulers are linked together to provide a multilevel scheduler. The most eligible executable transaction is output from the multilevel scheduler to the at least one distribution queue. One or more of the plurality of processor elements are placed into a first power saving mode when a number of executable transactions allocated to the plurality of processor elements is such that only a portion of available processor elements are used to execute executable transactions. |
US08533501B2 |
Information processing apparatus and control method of information processing apparatus
An information processing apparatus includes a processing device configured to process data, a first line connecting device configured to be connected to the processing device, a second line connecting device configured to be connected to the processing device, a first input and output port configured to be connected to a first end device via a first line, a second input and output port configured to be connected to a second end device via a second line, a first selecting unit that includes a first terminal, and a second terminal and a third terminal, the first terminal being connected to the first line connecting device and either the second terminal or the third terminal. |
US08533499B2 |
Power usage method and device that receives power from host
A power usage method is provided for using power supplied from a first device at a second device. The power usage method includes causing the second device to perform an initialization process to obtain a value of a current used when consuming the power at a voltage that is a minimum prerequisite for the second device to perform a predetermined process; and causing the second device to execute the predetermined process while consuming the power in a manner that the current does not exceed the obtained value. |
US08533498B2 |
Power control system of a baseboard management controller and method thereof
A method controls power of a baseboard management controller (BMC). A power control signal of the BMC is generated for powering up or powering down the BMC. An enabling signal is generated according to the power control signal. A power supply device is directed to output one or more voltages to the BMC. |
US08533496B1 |
Power management of iterative data processing systems
An integrated circuit (IC) includes a decoding module configured to decode information units by performing T or less decoding iterations on each of the information units, where a maximum value of T is R, and where T is an integer greater than or equal to 1, and R is an integer greater than or equal to T. An iteration control module is configured to adjust a value of T based on a condition of the IC. |
US08533495B2 |
Power supply circuit for video card chipset
A power supply circuit is capable of providing power to a video card chipset. The video card chipset includes a first power supply pin and a second power supply pin. The power supply circuit includes a power input, a first filtering circuit, and a second filtering circuit. The first filtering circuit is connected between the power source and the first power supply pin to filter the power provided to first power supply pin of the video card chipset. The second filtering circuit is connected between the power source and the second power supply pin to filter the power provided to second power supply pin of the video card chipset. |
US08533494B2 |
Storage system to which removable encryption/decryption module is connected
A storage system comprises a connector to which a removable module is connected. The removable module comprises a storage section for storing encryption/decryption information related to encryption and decryption of data, and/or an encryption/decryption engine for encrypting/decryption data by a predetermined encryption/decryption scheme. A control section and/or a module of the storage system encrypts data using the encryption/decryption information, or decrypts encrypted data using the encryption/decryption information. Alternatively the encryption/decryption engine encrypts data or decrypts encrypted data. |
US08533487B2 |
Secure logical vector clocks
Embodiments include a system for processing logical clock values according to a secure maximum operation. The system may include a communication unit and a processing unit. The communication unit may be configured to receive an encrypted first value of a logical clock, send an encrypted blinded difference, receive an encrypted blinded maximum value, and receive a maximum value. The processing unit may be configured to access an encrypted second value of the logical clock, generate the encrypted blinded difference between the first value and the second value, provide an encrypted blinded first value and an encrypted blinded second value in an oblivious transfer protocol, and generate an encrypted maximum value from the encrypted blinded maximum value. |
US08533486B1 |
Incorporating false reject data into a template for user authentication
Access to a resource may be denied in response to a score value being below a threshold value. The score value may be based on timing information of key-press and key-release events. After denying access to the resource, the timing information of key-press and key-release events may be incorporated into the keystroke dynamics template. |
US08533484B2 |
Password-protected physical transfer of password-protected devices
A method for password-protected physical transfer of password-protected devices including at a receiving location, generating at least one security file including an encrypted element generated using a one-way encryption function utilizing at least one secure code, transmitting the at least one security file to a shipping location at which the password-protected devices are located, at the shipping location, using at least one shipping location password, loading the at least one security file into at least one password-protected device, shipping the at least one password-protected device to the receiving location and at the receiving location, employing the at least one secure code to supply an input to the at least one password-protected device and employing the at least one security file to enable establishment of at least one receiving location password for the at least one password-protected device which replaces the at least one shipping location password. |
US08533483B2 |
Data processing apparatus and digital signature method
A data processing apparatus includes, an input unit to accept information on one or more deletion-target data blocks specified from a plurality of data blocks, a hash generating unit to calculate a hash value of each of the plurality of data blocks, an auxiliary data generating unit to calculate auxiliary data β=gH1(mod N) of a signer based on predetermined values g and N and a product H1 of the hash values of one or more deletion-target data blocks, a digital signature generating unit to calculate intermediate data α=gH2(mod N) based on the predetermined values g and N and a product H2 of the hash values of one or more remaining data blocks to generate a digital signature for a combination of the intermediate data α and position data of one or more deletion-target data blocks with a signing key of a modifier. |
US08533479B2 |
Translating information between computing devices having different security management
A system and method for communicating a document between multiple locations is disclosed. A computing device receives, via a network, multiple portions of a document signed and/or encrypted at a first location in accordance with a first signing and encryption methodology along with a trailer manifest specifying an order the portions need to be assembled to reconstruct the document. Each of the portions and the manifest is individually decrypted and validated using the first signing and/or encrypting methodology. The portions and manifest are re-signed and/or re-encrypted with a second signing and encryption methodology such that the information can be decrypted, the signatures can be validated and the document can be reassembled at a second location. |
US08533478B2 |
System for and method of writing and reading redundant data
In accordance with an embodiment of the invention, a method of writing and reading redundant data is provided. Data is written by storing a copy of the data along with a timestamp and a signature at each of a set of storage devices. The data is read by retrieving the copy of the data, the timestamp and the signature from each of a plurality of the set of data storage devices. One of the copies of the data is selected to be provided to a requestor of the data. Each of the storage devices of the set is requested to certify the selected copy of the data. Provided that a proof of certification of the selected copy of the data is valid, the storage devices of the set are instructed to store the selected copy of the data along with a new timestamp. |
US08533474B2 |
Generating session keys
A method and apparatus for generating shared session keys. The method and apparatus does not rely on strong random number generation. The first node sends a timestamp and random sequence to the second node. The second node generates a message authentication code (MAC) using this data and a shared secret key. The MAC is then used to encrypt a reply containing a second timestamp and second random sequence from the second node. The first node receives this message and decrypts it by generating the same MAC. Both nodes then generate a session key using the shared set of timestamps and random sequences. |
US08533470B2 |
Segmented mapping
Described are methods and apparatus, including computer program products for masking data. The inventions involves receiving a mapping scheme with a number of segments and a different cryptographic algorithm for each segment and then receiving a target value to be masked. The target value is then split into a number of segments based on the number of segments of the mapping scheme and the cryptographic algorithm is applied for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value. Then, the encrypted segments are concatenated to create a masked value. |
US08533469B2 |
Method and apparatus for sharing documents
A method for securely sharing electronic documents on a document storage system. The method includes receiving an electronic document from a creating user, generating an encryption key unique to the electronic document, encrypting the electronic document using the encryption key to create an encrypted electronic document, and communicating the encrypted electronic document to a document repository for storage/ The method also includes identifying a resource locator for uniquely identifying the storage location of the encrypted electronic document and communicating the encryption key and the resource locator to the creating user. The method also includes receiving the encryption key and the resource locator from a requesting user, retrieving the encrypted electronic document from the document repository using the resource locator, decrypting the encrypted electronic document using the encryption key, and communicating the decrypted electronic document to the requesting user. |
US08533465B2 |
System and method of encrypting network address for anonymity and preventing data exfiltration
A method is provided for sending a data packet from a client through a network and to a server. The data packet is a data structure having an originating address portion and destination address portion. The network includes a first mix router and a second mix router. The client has a client address, whereas the first mix router has a first mix router address, the second mix router has a second mix router address and the server has a server address. The method includes encrypting the originating address portion of the data packet and encrypting the destination portion of the data packet, transmitting the encrypted data packet, decrypting the originating address portion of the encrypted data packet and the destination portion of the encrypted data packet, providing a first data packet and providing a second data packet. Specifically, the encrypting the originating address portion of the data packet is based on the client address and the encrypting the destination portion of the data packet is based on one of the first mix router address and the second mix router address. The encrypting generates an encrypted data packet. The encrypted data packet is transmitted to the one of the first mix router and the second mix router, wherein it is decrypted to generate a decrypted data packet. The first data packet is based on the decrypted data packet and is provided to the other of the first mix router and the second mix router. The second data packet is provided to the server. |
US08533464B2 |
Revocation of credentials in secret handshake protocols
According to a general aspect, a computer-implemented method for a first user to verify an association with a second user through a secret handshake protocol includes maintaining information about a reusable identification handle for the first user, where the information about the reusable identification handle is provided by a trusted third party, maintaining information about a reusable credential for the first user, where the information about the reusable credential is provided by a trusted third party, and maintaining information about a matching reference for verifying an association with another user, where the information about the matching reference is provided by a trusted third party. Information based on the reusable identification handle and based on the reusable credential is transmitted to a potential peer. First information based on a reusable identification handle for the second user is received, and second information based on a reusable credential for the second user is received. A first comparison of a combination of the first information and the second information is performed with the matching reference to determine whether the second user's credentials match the first users matching reference. A second comparison of the first information with information published on a revocation list is performed to determine whether the second user's credentials have been revoked from usage. Based on the first comparison and the second comparison, a determination is made whether or not to verify the association of second user with the first user. |
US08533463B2 |
Reduced computation for generation of certificate revocation information
A method and apparatus for propagating certificate revocation information. A first query is received regarding a revocation status of a first digital certificate. One or more additional queries are received regarding revocation statuses of one or more additional digital certificates. A response to the first query and the one or more additional queries is generated, the response including the revocation status of the first digital certificate and the revocation statuses of the one or more additional digital certificates. |
US08533462B2 |
Verifying cryptographic identity during media session initialization
An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify certain fields in the message after a signature is inserted. The originating endpoint's agent may create the signature over some fields of the message using an enterprise network's private key. The agent may insert the signature into the message and send the message to a recipient endpoint's authentication agent. The recipient agent may verify the signature, receive a certificate including a second public key, and challenge the identity of the originating endpoint in order to confirm that identity. This challenge may request a confirmation that the originating endpoint knows the private key corresponding to the second public key and may occur while running encrypted media at the endpoints. After the originating endpoint is authenticated, the endpoints may exchange encrypted and/or unencrypted media. |
US08533457B2 |
Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the disclosure describes retaining compatibility with conventional Secure Sockets Layer (SSL) and SOCKS protocols, such that secure UDP datagrams can be transmitted between a proxy server and a client computer in a manner analogous to conventional SOCKS processing. Further, the disclosure describes a network arrangement that employs a cache having copies distributed among a plurality of different locations. SSL/TLS session information for a session with each of the proxy servers is stored in the cache so that it is accessible to at least one other proxy server. Using this arrangement, cached SSL/TLS communication session information may be retrieved and used by a second proxy server to accept a session with the client device when the client device switches proxy servers. |
US08533454B2 |
Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway
Disclosed is a method for efficient transport of packets between a mobile station and a secure gateway over a wireless local area network for accessing home services. In the method, a first encryption security association is established for transporting first-type packets from the secure gateway to the mobile station, and a second encryption security association is established for transporting first-type packets from the mobile station to the secure gateway. Next, a first null-encryption security association is established for transporting second-type packets from the secure gateway to the mobile station, and a second null-encryption security association is established for transporting second-type packets from the mobile station to the secure gateway. Second-type packets are selected for transport using the second null-encryption security association based on a traffic selector. Also, second-type packets may be selected for transport using the first null-encryption security association based on a traffic selector. The traffic selector may be preconfigured. |
US08533452B2 |
System and method for securing wireless data
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a data channel with an external security information source. User identification information is received from the external security information source which identifies a user of the device. The device, based upon the received user identification information, determines whether the secure data stored on the device is to be accessed by a user of the device. |
US08533451B2 |
Method of encrypted communication with limited number of stored encryption key retrievals
A method of encrypted communication between entities in a manner that frustrates side channel attacks attempting to determine an encryption key. The method involves providing a device with an encryption key stored in memory, providing an external entity with identity data for transmission to the device, applying a one way function to the encryption key and the identity data to generate a variant key, authenticating communications between the device and the external entity with the variant key and limiting the number of times the encryption key is retrieved from the first memory to a pre-determined threshold. |
US08533448B2 |
Retrieving boot instructions from nonvolatile memory
Systems and processes for booting a device can be implemented by detecting a reset signal associated with the device and retrieving a predetermined page of data from a nonvolatile memory location into a register associated with the nonvolatile memory. The nonvolatile memory may be designed and implemented such that each page of data is retrieved from the nonvolatile memory as a unit, and the page of data includes instructions for use in booting the device. A command to read data stored in the register is received, and the command can include an address identifying a location of one or more instructions within the register. In response, the one or more instructions are retrieved from the register for execution by a processor. |
US08533444B2 |
Booting system, image forming apparatus having the system and control method thereof
A booting system including a boot code transmission control unit to sequentially execute a booting operation concurrently with storing boot codes stored in a NAND flash memory in an internal memory. The boot code transmission control unit includes storage units to store addresses of the boot codes stored in the internal memory and an address of a boot code to be accessed by a CPU core for the execution of the booting operation, respectively. These addresses are checked by monitoring a memory interface and a bus interface. When the boot code addresses are the same, the boot code transmission control unit transmits a boot code corresponding to the same address, among the boot codes stored in the internal memory, to the CPU core so that the CPU core can sequentially execute the booting operation. |
US08533437B2 |
Guaranteed prefetch instruction
A microprocessor includes a cache memory, an instruction set having first and second prefetch instructions each configured to instruct the microprocessor to prefetch a cache line of data from a system memory into the cache memory, and a memory subsystem configured to execute the first and second prefetch instructions. For the first prefetch instruction the memory subsystem is configured to forego prefetching the cache line of data from the system memory into the cache memory in response to a predetermined set of conditions. For the second prefetch instruction the memory subsystem is configured to complete prefetching the cache line of data from the system memory into the cache memory in response to the predetermined set of conditions. |
US08533436B2 |
Adaptively handling remote atomic execution based upon contention prediction
In one embodiment, a method includes receiving an instruction for decoding in a processor core and dynamically handling the instruction with one of multiple behaviors based on whether contention is predicted. If no contention is predicted, the instruction is executed in the core, and if contention is predicted data associated with the instruction is marshaled and sent to a selected remote agent for execution. Other embodiments are described and claimed. |
US08533434B2 |
Apparatus for efficiently determining instruction length instruction within a stream of x86 instruction bytes
An apparatus efficiently determines the length of an instruction within a stream of instruction bytes processed by a microprocessor having a variable instruction length instruction set architecture. The apparatus includes combinatorial logic associated with each instruction byte of the stream, each configured to receive the associated instruction byte and the next instruction byte of the stream and to generate in response thereto a first length, a second length, and a select control. A multiplexor associated with each of the combinatorial logic selects and outputs one of the following inputs based on the select control received from the combinatorial logic: a zero input and the second length received from the combinatorial logic associated with each of the next three instruction bytes of the stream. An adder associated with each of the combinatorial logic and multiplexor adds the first length and the output of the multiplexor to generate the length of the instruction. |
US08533433B2 |
Microprocessor for executing byte compiled java code
A microprocessor architecture for executing byte compiled Java programs directly in hardware. The microprocessor targets the lower end of the embedded systems domain and features two orthogonal programming models, a Java model and a RISC model. The entities share a common data path and operate independently, although not in parallel. The microprocessor includes a combined register file in which the Java module sees the elements in the register file as a circular operand stack and the RISC module sees the elements as a conventional register file. The integrated microprocessor architecture facilitates access to hardware-near instructions and provides powerful interrupt and instruction trapping capabilities. |
US08533430B2 |
Memory hashing for stride access
An apparatus and method in a computer system allows a software application to specify an intended stride access when writing data elements into a memory. A memory control in the computer system writes data in a manner that provides improved access performance when accesses to the data elements are performed using the intended stride. The memory system uses a hashing mechanism that uses the intended stride to store the data elements in such a way that accessing the data elements at the intended stride will ensure that consecutive accesses are not to the same group or bank of memory. Sequential accesses of the data elements also are ensured not to be directed to the same group or bank of memory. The memory can be divided into memory portions; different memory portions of the computer storage can have different intended strides. |
US08533428B2 |
Translating a guest virtual address to a host physical address as guest software executes on a virtual machine
A processor including a virtualization system of the processor with a memory virtualization support system to map a reference to guest-physical memory made by guest software executable on a virtual machine which in turn is executable on a host machine in which the processor is operable to a reference to host-physical memory of the host machine. |
US08533423B2 |
Systems and methods for performing parallel multi-level data computations
Systems and methods for performing parallel multi-level data computations in a storage system are provided. One system includes a memory storing data, multiple caches, and a processor. The processor is configured to perform the method below. One method includes determining the total amount of data in the memory, dividing the amount of data by each cache capacity to determine the number of nodes needed for processing the data in the memory, and automatically creating the nodes. Here, the nodes form a tree structure including multiple levels where the lowest level includes a first number of nodes equal to the amount of data divided by the cache memory capacity. Also, each lowest level node is configured to process an amount of data equal to the cache memory capacity and each level above the lowest level is configured to include one or more nodes for receiving an input from lower level nodes. |
US08533419B2 |
Method for controlling data write to virtual logical volume conforming to thin provisioning, and storage apparatus
The virtual volume is a virtual logical volume that conforms to Thin Provisioning, and is a logical volume configured from a plurality of virtual areas and used by a plurality of applications. In a case where the storage apparatus receives a write request comprising write-destination information for identifying a write-destination virtual area in the virtual volume, and, in addition, the write-destination virtual area is an unallocated virtual area, the storage apparatus selects a medium, which corresponds to the write to the write-destination virtual area and/or the identification information of the source of this write, from a plurality of media, which have different performances and which are each configured from two or more real areas, and allocates a real area from the selected medium to the write-destination virtual area. |
US08533413B2 |
Content modification control using read-only type definitions
Disclosed are methods, systems and products, including a method that includes establishing in a computing environment, implemented using at least one processor-based device, a non-immutable object as being a read-only object, the computing environment not allowing performance of operations that cause modification of the read-only non-immutable object. The method also includes preventing by the at least one processor-based device performance of an operation on the read-only non-immutable object that would cause the read-only non-immutable object to be modified. |
US08533412B2 |
Synchronization of replicated sequential access storage components
A replication synchronization table (RST) is configured for the source instance. The RST is adapted for recording compacted information for at least one of a truncate and an erase operation applied on the source instance. The RST of the source instance is updated at a source component with the compacted information. The updated RST is transmitted from the source instance to the replicated instance. Based on the RST of the source instance and the RST of the replicated instance, data representative of a most recent position on the source component from which data should be transmitted to a replicated component to achieve a full synchronization is determined. |
US08533408B1 |
Consolidating N-storage arrays into one storage array using virtual array non-disruptive data migration
Described are a system and method of migrating data stored in logical units of storage (LUNs) at a plurality of source storage arrays into one destination storage array transparently with respect to a host in communication with the source storage arrays through a switch. First and second source storage arrays and a destination storage array are each partitioned into a plurality of source virtual arrays. The destination virtual arrays include a first destination virtual array and a second destination virtual array. Data stored in a LUN of a first source virtual array of the first source storage array are copied to a corresponding LUN of the first destination virtual array of the destination storage array, and data stored in a LUN of a second source virtual array of the second source storage array are copied to a corresponding LUN of the second destination virtual array of the destination storage array. |
US08533403B1 |
Arbitration unit for memory system
Techniques are disclosed relating to maximizing utilization of memory systems within power constraints of the memory systems. In one embodiment, an integrated circuit may include multiple memory controllers and an arbitration unit. Each memory controller may be configured to generate requests to perform memory operations on one or more portions of memory. The arbitration unit may be configured to grant no more than a specified number of requests during a time window TW. In some embodiments, a voltage converter that supplies power to the memory system may be configured to supply power to perform no more than the specified number of requests during the time window TW. The arbitration unit may thus be used, in some embodiments, to ensure that the greatest possible number of the specified number of memory requests are granted during a given time window TW (without exceeding the specified number). |
US08533391B2 |
Storage device and user device including the same
A storage device includes a host interface, a buffer memory, a storage medium, and a controller. The host interface is configured to receive storage data and an invalidation command, where the invalidation command is indicative of invalid data among the storage data received by the host interface. The buffer memory is configured to temporarily store the storage data received by the host interface. The controller is configured to execute a transcribe operation in which the storage data temporarily stored in the buffer memory is selectively stored in the storage medium. Further, the controller is responsive to receipt of the invalidation command to execute a logging process when a memory capacity of the invalid data indicated by the invalidation command is equal to or greater than a reference capacity. |
US08533389B1 |
Multi-client content addressable memory access control method
A method and system for controlling multiple client access to cache memory and a single CAM device. Each client has a corresponding integrity controller in communication with the CAM device and all the other integrity controllers associated with the other clients in the system. Each integrity controller monitors states of the other clients, and inhibits its respective client from executing any operation when a common lookup index is detected during a co-pending operation with a first client. Once the operations of the first client are completed, its integrity controller signals the integrity controller of other clients to exit their inhibit or hold states, thereby allowing the other clients to resume their operations. Another advantage of the integrity controller is that its algorithms also prevents multiple host memory fetches of the same key, thereby saving time and improving system performance. |
US08533386B1 |
Modifying data stored in flash memory
Flash memory stored data modification is described. In embodiments, a flash memory system includes flash memory and a memory controller that manages data write and erase operations to the flash memory. The flash memory includes a first flash memory region of single-write flash memory cells that are each configured for a data write operation and a corresponding erase operation before a subsequent data write operation. The flash memory also includes a second flash memory region of multiple-write flash memory cells that are each configured for multiple data write operations before an erase operation. |
US08533385B2 |
Method for preventing read-disturb happened in non-volatile memory and controller thereof
A method for preventing read-disturb happened in non-volatile memory and a controller thereof are disclosed. The non-volatile memory includes a plurality of blocks, and each block includes a plurality of pages. The method includes storing a program code executed by a controller of the non-volatile memory storage device for controlling the non-volatile memory storage device into at least a first block of the blocks; and copying the program code stored in the first block into at least a second block of the blocks when power is supplied to the non-volatile memory storage device. |
US08533384B2 |
Flash memory controller garbage collection operations performed independently in multiple flash memory groups
A flash memory controller connected to multiple flash memory groups performs independent garbage collection operations in each group. For each group, the controller independently determines the amount of free space and performs garbage collection operations if the amount falls below a threshold. |
US08533381B2 |
Computer system, method of managing PCI switch, and management server
It is provided a computer system including computers, PCI switches each having first and second ports, a switch management module and a power control module. The switch management module includes an identifying module for identifying a first port coupled to the computer to be booted up, and notifying the PCI switch of the first port, an instruction module for instructing the power control module to boot up the computer, and an allocation management module for managing allocation of one of the I/O device to the computer and notifying the one of the PCI switches of the allocation after the computer is booted up. The PCI switches includes a preventing control module for preventing the computer from detecting a configuration of the first port, and a virtual switch generating module for generating a virtual switch that couples the first port and the second port based on the notification. |
US08533378B2 |
Information processing device, data transfer circuit, and control method of information processing device
Cross bar control circuits are connected to each other by two buses, which are a broadcast bus for transmitting a broadcast packet from a system board to all system boards other than the system board and a point-to-point bus for transmitting a unicast packet from a system board to another system board. When unicast packets passing through the point-to-point bus are too many, the unicast packets are output by using the broadcast bus in addition to the point-to-point bus if the broadcast bus is not used. In this way, the unicast packets can be output quickly and efficiently, so that use efficiency of the broadcast bus and the point-to-point bus can be increased as a whole. |
US08533370B2 |
Device and method for enabling a host apparatus to access a peripheral device
There is provided a radio communication device including: a host connection interface which is connected to a host apparatus and receives commands input from the host apparatus; a radio communication interface which performs radio communication with another radio communication device; and a controlling unit which controls operation of the host connection interface and the radio communication interface, wherein the controlling unit controls the host connection interface to output device information indicating that the device itself is a peripheral device capable of accessing a storage medium to the host apparatus in response to a command indicating inquiry about information regarding the device. |
US08533368B2 |
Buffering device and buffering method
A buffering device buffers data to be subjected to any one of a first process that necessitates a sequential guarantee and a second process that does not necessitate the sequential guarantee, and includes a storage unit that stores therein plurality of target data to be processed; a reading unit that reads the target data from the storage unit one-by-one based on a waiting flag set corresponding to the target data; and a control unit that sets a waiting flag for each of the target data, the waiting flag of a specific target data indicating preceding target data that must be processed before the reading unit reads the specific target data. |
US08533366B2 |
Method of determining image transmission method, image supplying system, image supplying device, image display device, program and computer-readable recording medium
In at least one embodiment of the disclosure, a method of transmitting image data from an image supplying device to an image display device includes transmitting information indicating a resolution of the image display device from the image display device to the image supplying device; scaling the image data, by the image supplying device, to decrease an amount of the image data by reducing an image based on the information indicating the resolution of the image display device; and transmitting the scaled image data from the image supplying device to the image display device. |
US08533365B2 |
Program use system, program use method and program
Of an existing macro for controlling one or more first devices, device designation information for designating each electronic device in the first devices in the macro is converted to category designation information for designating a category of the electronic device based on device information of the electronic device, and the converted existing macro is recorded. A macro usable for controlling one or more second devices is selected from recorded existing macros based on device information of a controller and the first and second devices. Category designation information in the selected macro is converted to device designation information for designating the electronic device in the second electronic devices, belonging to the category designated by the category designation information, based on the device information of the controller and the first and second devices. |
US08533364B2 |
Apparatus that prevent a malfunction of the circuit and reduce power consumption
An interface circuit provided with a first input/output unit and a second input/output unit which respectively access external apparatuses to which electric power is supplied from power sources via different electric power supply lines includes an acquisition unit configured to acquire information whether electric power is supplied to the respective external apparatuses based on a command from the outside; a selection circuit configured to select an input/output unit corresponding to an external apparatus to which electric power is supplied, from the first input/output unit and the second input/output unit based on the information acquired by the acquisition unit; and a control circuit configured to output an instruction corresponding to the command, to the external apparatus to which electric power is supplied, via the input/output unit selected by the selection circuit. |
US08533356B2 |
Shaping virtual machine communication traffic
Cloud computing platforms having computer-readable media that perform methods to shape virtual machine communication traffic. The cloud computing platform includes virtual machines and a controller. The controller limits the traffic associated with the virtual machines to enable the virtual machines to achieve desired communication rates, especially when a network servicing the virtual machines is congested. The controller may drop communication messages associated with the virtual machines based on a drop probability evaluated for the virtual machines. |
US08533354B1 |
Initiating media presentation prior to receiving seek index data
Systems and methods for initiating presentation of media content prior to receiving seek index data associated with the media content. In particular, if necessary, the seek index data can be received after playback and/or presentation of the media content begins. Thus, delays associated with obtaining or otherwise processing seek index data can be reduced or postponed or in cases of adaptive streaming, higher quality presentation of the media content can be achieved. |
US08533351B2 |
Data reception processing apparatus, image forming apparatus, and data reception processing method
A data reception processing apparatus includes: a data receiving section configured to receive processing target data; plural data acquiring sections configured to respectively acquire only data received by communication employing acquisition target protocols separately set in advance for the data acquiring sections; a data-acquisition control section configured to control the plural data acquiring sections to cause the data acquiring section corresponding to the acquisition target protocol used for reception of data received by the data receiving section to more preferentially receive the data than data received by using the acquisition target protocol corresponding to priority lower than priority associated with the acquisition target protocol used for the reception of the data; and a data output section configured to acquire the data from the data acquiring section and sequentially output the data to a processing section configured to process the data. |
US08533346B2 |
SIP-based network video surveillance system and method
The present invention provides a SIP-based network video surveillance system and method, which relates to the application field of network video surveillance. The network video surveillance method comprises the steps of: receiving a request message from a client by a call control server (CCS), the request message comprising an ID of a Premises Unit (PU) and a channel ID; forwarding the request message to a center management server (CMS) by the CCS for access authentication; transmitting the request message to the PU by the CCS after the request message passes the access authentication; responding by the PU an acknowledgement message containing video codec information to the CMS via the CCS; forwarding the acknowledgement message containing the video codec information and an access path to the client by the CMS, then establishing, by the client, a video stream connection with a network element directed by the access path on the basis of the acknowledge message. The present invention uses SIP in conjunction with other protocols to build a complete video surveillance architecture, improving the extensibility of a platform and makes the whole system more stable and reliable. |
US08533339B2 |
Discovering security devices located on a call path and extending bindings at those discovered security devices
In one embodiment, an endpoint elicits a pattern of STUN responses to identify security devices located on a call path. The endpoint then uses address information from the identified security devices to establish an efficient media flow with a remote endpoint. The endpoint can optimize the number of network devices and network paths that process the endpoint's keepalive message. Additionally, the endpoint may request custom inactivity timeouts with each of the identified security devices for reducing bandwidth consumed by keepalive traffic. |
US08533338B2 |
Systems and methods for providing secure communications for transactions
Embodiments of the present invention provide systems and methods for providing secure communications. One aspect of an embodiment of the invention creates a virtual private connection to a remote server or network utilizing a connection server and at least one direct connection between a client device and the remote server, without utilizing the Internet. In another aspect of an embodiment of the present invention, a client operating system is taken over by a vertical function operating system to service the communication with the remote server. Still another aspect of an embodiment of the present invention comprises a client device establishing a connection with a remote server through a connection server and at least one direct connection, shutting down a first operating system, starting up a second secure operating system, and launching an interface application with the second operating system to conduct electronic transactions with the remote server. |
US08533334B2 |
Message binding processing technique
An apparatus has a unit that receives plural messages, which belong to plural transactions and respectively have a pertinent transaction identifier, in an indefinite order; plural processors each having a queue storing the messages belonging to a transaction in charge, and outputting, after the messages belonging to one of the transactions in charge have become complete, the complete messages in the queue to a message processing unit; an allocation unit that outputs the received message to one of the plural processors, wherein one of the processors is identified based on the transaction identifier of the received message and an allocation rule predetermined for the transaction identifier; and a change unit that changes the allocation rule when activating or stopping the processor. When the change unit changes the allocation rule, each of the processors outputs at least messages for which re-allocation is necessary to the allocation unit. |
US08533333B2 |
Shared hosting using host name affinity
The routing of requests in a shared hosting environment. The shared hosting environment includes a network farm of servers, each capable of processing the request corresponding to the host name. When a request is received, a router determines whether or not there is already a host name affinitization of subset of the servers to the host name corresponding to the request. If so, the message is dispatched to one of those affinitized servers. If not, one or more of the servers are affinitized to the host name to create a subset of affinitized server(s) for that host name. Different host names may have different subsets of servers that they are affinitized to. Over time, the affinitization may be terminated as appropriate. |
US08533332B1 |
Systems and methods for obtaining exclusive access to a computing resource
A method for obtaining exclusive access to a computing resource utilizing a network is disclosed. A discovery request is sent by a sending node within a network segment to one or more recipient nodes within the network segment. The discovery request is configured to determine whether each recipient node is accessing a specified computing resource. One or more replies to their request or an absence of replies from the recipient nodes are analyzed to determine whether any of the recipient nodes are accessing the specified computing resource. If the replies or the absence of replies indicate that none of the recipient nodes are accessing the specified resource, exclusive access is obtained on usage of the specified computing resource by the sending node. |
US08533331B1 |
Method and apparatus for preventing concurrency violation among resources
Method and apparatus for preventing concurrency violations among resources in a clustered computer system is described. In one example, a system call is intercepted at a node in the clustered computer system. The system call identifies a target resource. An assigned state of the target resource with respect to the node is determined. The system call is handled at the node based on the assigned state. For example, the system call may be intended to bring the target resource online. The system call is handled by failing the system call at the node if the assigned state indicates that the target resource should be offline at the node. The target resource is allowed to be brought online if the assigned state indicates that the target resource can be online. |
US08533330B2 |
Relay server and relay communication system arranged to share resources between networks
A relay server which is connected to a LAN and which can communicate with a relay server in a different LAN, includes: an account information registering unit that stores information on client terminals connected to the LAN; a relay group information registering unit that stores relay group information; a shared resource information registering unit that stores shared resource information; a check unit that checks whether the client terminals stored in the account information registering unit can be accessed; a relay group information notifying unit that updates the relay group information and transmits a change notification of the relay group information to the relevant relay server; and a shared resource information notifying unit that updates the relevant shared resource information and transmits a change notification of the shared resource information to the relevant client terminal which is stored in the account information registering unit. |
US08533329B2 |
Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices
An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm. |
US08533326B2 |
Method for managing, routing, and controlling devices and inter-device connections
A system and method for managing, routing and controlling devices and inter-device connections located within an environment to manage and control the environment using a control client is presented. A user provides commands via the control client to a server that maintains a representation of the environment and the devices within the environment. The server provides commands to devices present within the environment in response to user commands and other events, including events from the environment. The commands cause the devices in the environment to adopt specific desired states thereby causing the environment and the devices within the environment to create desired connections by and between the devices and to otherwise control and effect the environment. |
US08533323B2 |
Determining operational status of a mobile device capable of executing server-side applications
To determine the operational status of a wireless communication device capable of executing server-side applications, a message is sent to the device requesting operational status of the device. The message may be may be triggered by a system administrator at a middleware server. The wireless communication device may receive the message, compose a response message indicative of the operational status of the device, and send the response message back to the middleware server. The messages may be extensible markup language (XML) messages. Composition of the response message may entail verifying that a textual operational status description forming part of the response message omits illegal XML characters, e.g., by passing the description through an XML formatter for removal of any illegal XML characters. |
US08533322B2 |
Service for associating network users with profiles
A system is disclosed that maps user IDs (such as IP addresses) and geographic regions to particular categories or “segments” reflective of user profiles. The mappings may be based on behavioral data reflective of user browsing activities, offline data (e.g., survey data or demographic data), or a combination thereof. In one embodiment, the mappings are generated using data collected by a plurality of Internet Service Providers (ISPs) regarding their subscribers. The system also includes a query interface that enables content providers to retrieve segment data associated with particular user IDs. |
US08533321B2 |
Method and system for tracking a cumulative number of identifiable visitors to different objects
A method for tracking a cumulative number of unique visitors to different to objects. The method includes maintaining a data structure that allows for a direct determination of the cumulative number of different visitors exposed to the different objects; establishing a connection with a visitor when the visitor requests to visit an object; examining a cookie stored in the visitor during the established connection to determine whether the visitor previously visited the currently requested object; and updating the data structure in the database and an overlap code contained in the cookie based on the examination results, wherein objects are different websites displaying a same set of advertisements of a same campaign. |
US08533320B2 |
Coalescing network notifications for live migration
A method and system for managing network notifications when a guest migrates in a virtual machine system. A guest hosted by a computer system migrates from a source hypervisor to a target hypervisor in the computer system. The computer system packetizes multiple network addresses of the guest into a network packet. The target hypervisor then transmits the network packet to network devices coupled to the computer system. |
US08533317B2 |
Systems and methods for monitor distribution in a multi-core system
The present invention is directed towards systems and methods for monitoring services in a multi-core system. The systems and methods distribute the monitors for a service and the ownership of a service across the cores of the multi-core device. The greater resources of the multi-core device process the workload of the monitors for the services and the workload for monitoring the states of the services more efficiently than a single packet engine on a core. |
US08533314B2 |
Method and system for content categorization
Embodiments of the present invention disclose a method for content categorization, where the method comprises transmitting, by a content categorization request entity, a categorization ability negotiation request to a content categorization providing entity to request the categorization ability of the content categorization providing entity; receiving the categorization capability of the content categorization providing entity returned by the content categorization providing entity. Furthermore, embodiments of the present invention disclose a system for content categorization, content categorization request entity and content categorization providing entity. Categorization ability negotiation or subscription helps to learn the content categorization ability so that the content categorization request entity or content categorization providing entity may mutually and accurately acquire content categorization capability information without delay. |
US08533312B2 |
Systems and methods for server initiated connection management in a multi-core system
The present application is directed towards systems and methods for managing server initiated connections via a multi-core system that provides VPN access between clients and servers. The solution described herein provides a mechanism by which server and client communications via the multi-core system for a server initiated connection may be received on different cores and for the system to manage these communications across different cores to provide an end-to-end connectivity between the client and the server. |
US08533307B2 |
Method and device for monitoring a data transmission
A method for monitoring a data transmission between at least two network users, in particular according to the ISO 15765-2 transmission protocol, is described, at least one sender transmitting data to at least one receiver in the form of data telegrams, a data transmission taking place via at least one data telegram and the receiver transmitting at least one flow control telegram to the sender when the data of a data transmission is transmitted in a segmented manner in a first data telegram and at least one subsequent data telegram, an additional flow control telegram being transmitted from the receiver to the sender after the last data telegram of a data transmission. |
US08533306B2 |
Personal presentity presence subsystem
A personal presentity presence service provides support for heterogeneous presentities. Presentity types including personal presentities are registered with a presentity manifest store that includes information such as type names, addresses of applications associated with actions related to the presentity type, application parameters, icons for watcher application, and the like. Personal presentity service identifies the personal presentity types associated with the user and automatically organizes these into a personal presence group for management and presentation purposes. Users (watchers) can then register for different groups of personal presentities, which are devices and systems personally associated with the user, based on a type of presentity and receive updated presence information. |
US08533301B2 |
Method for controlling proxy binding of a mobile node
A method for controlling proxy binding of a mobile node in a network that supports network-based mobility management, wherein the mobile node includes at least one network interface that is employed for attaching to the network via an access router, wherein a mobile node's binding for a network interface is initiated by a binding request, is characterized in that the mobile node's binding for a new network interface is qualified as a preliminary binding, which is not employed for downlink data transmission, and that the mobile node's preliminary binding is activated, after the mobile node's new network interface has been configured. |
US08533296B2 |
Schema-based feed generation for media syndication
Systems, methods, and machine-readable media are described for providing output feeds having information associated with at least one file. Embodiments include generating an output feed schema used to determine the content of the output feed using information from at least one data object, where each data object comprises a data structure having information, including a universal resource indicator (URI) regarding the at least one file. The output feed schema and the at least one data object can then be used to generate the output feed, which can then be stored. |
US08533291B1 |
Method and system for protecting publicly viewable web client reference to server resources and business logic
A method and system for protecting publicly viewable web client reference to network accessible data includes receiving a request for a server side resource from a client. The request is triggered upon loading of a page having a component that needs to access server side resource, at the client. A token for the server side resource is generated at the server using a resource-mapper, the resource-mapper identifying the server side resource that is to service the request from the client. The generated token and contents for the component are returned to the client, the generated token identifying an arbitrary path identifier to the server side resource that is viewable to the client, the arbitrary path identifier being interpreted by the resource-mapper to enable rendering of the content for the component at the client, such that the arbitrary path identifier protects identification information associated with the server side resource. |
US08533286B2 |
Method and apparatus for aggregating user data and providing recommendations
A method and system for aggregating user data and providing recommendations for digital content or in conjunction with a social network is disclosed. |
US08533283B2 |
Redirection method for electronic content
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. In response to a request for the web page, the second locator is obtained. Access to the second locator may be secured. The second locator may be swapped with the first locator to cause the web browser application to obtain the second content instead of the first content. In the alternative, the second content may be obtained and provided to the web browser instead of, or in addition to, the first content. |
US08533281B2 |
Centralized management of mobile assets—push based management of corporate assets
An embodiment of the invention provides a method for the centralized management of mobile assets. A central repository of assets is built, wherein the central repository includes a private asset section and a public asset section. The private asset section is only accessible to subscribers of the private asset section. A processor automatically pushes at least one base asset from the central repository onto a mobile device of the subscriber. The base assets are selected by an administrator of the central repository of assets, an employer of the subscriber, and/or an employee of subscriber's company. The base assets are selected based on attributes of the subscriber, the mobile device of the subscriber, and/or popularity of assets. In response to a search query for a requested asset by a user, the processor pushes the requested asset from the central repository onto the mobile device of the user. |
US08533278B2 |
Mobile computing device based communication systems and methods
A bifurcated interface for integrated use in a fax-to-email system provides an alternative or additional method for command entry a fax-to-email system preferably through a remote, commercially available, personal digital assistant or like device modified by software to perform the command entry functions. Delivery of commands, and other data, from the PDA is made, preferably, via infrared signals, but, alternatively, by direct cable syncing and other techniques. Thus, the interface is bifurcated having a portable traveler portion and a host portion in a more permanent connection with the fax function of the fax-to-email system. The PDA functions as the interface traveler portion, and becomes (at least temporarily) a specially programmed data entry tool with command communicating ability and a protocol shared by (or matched to) the interface host portion. The system can also be used in cooperation with Internet Web service for reporting, accounting, information services, and user interaction. |
US08533275B2 |
Synchronizing conversation structures in web-based email systems
Web-based email systems are enabled to synchronize conversations and conversation properties. Conversations are enumerated to new clients providing folder-specific and global conversation information. After receiving the initial conversation information, clients maintain a conversation state, which is used in updating clients from a web service store through a conversation synchronization command employing an internal application programming interface within the email service. |
US08533271B2 |
Electronic mail recovery utilizing recorded mapping table
A method for retrieving deleted data is described. The present method includes receiving a request to locate deleted data. The request includes criteria for approximating said deleted data. The deleted data is stored in a recovery log. The method also includes receiving an affirmation that the located deleted data is the deleted data being requested. The affirmation is by the requester of said deleted data. The method further includes transmitting the recovered data to the requester upon receiving the affirmation. |
US08533270B2 |
Advanced spam detection techniques
The subject invention provides for an advanced and robust system and method that facilitates detecting spam. The system and method include components as well as other operations which enhance or promote finding characteristics that are difficult or the spammer to avoid and finding characteristics in non-spam that are difficult for spammers to duplicate. Exemplary characteristics include examining origination features in pairs, analyzing character and/or number sequences, strings, and sub-strings, detecting various entropy levels of one or more character sequences, strings and/or sub-strings as well as analyzing message and/or feature sizes. |
US08533268B1 |
Methods and apparatus for providing a live history in a multimedia collaboration session
A multimedia collaboration system comprises client devices that include user interfaces that comprise private workspaces that can be used to display a live history of a multimedia collaboration session. The private workspaces can be configured to display information representative of media elements that can be shared within the multimedia collaboration session, but that are only viewable to a participant associated with a particular client device. The private workspaces can be used to preview information before publishing it to other participants or to view a live history of the multimedia collaboration session. |
US08533264B2 |
Client device and associated methodology of accessing networked services
A system makes it possible to use services offered by a plurality of servers different from one another is realized with the use of a common API. The system includes a plurality of service-offering servers, a client that uses services offered by the plurality of service-offering servers, and an interchange server that performs intermediary processing when the client uses a service. The client performs communication with the interchange server while using a common API when using any service among a plurality of services offered by the plurality of service-offering servers. The interchange server uses a unique API, which is unique to the service-offering server that offers the service selected by the client, to execute a processing sequence that is unique to the service-offering server. The client may use any service among services offered by the plurality of service-offering servers with the use of a common API without any need to use a unique API, which is unique to each of the plurality of service-offering servers. |
US08533258B2 |
Bidirectional synchronization with CRM applications
Synchronization between email, contact management, scheduling (ECS) and customer relationship management (CRM) applications is facilitated through a synchronization module on the ECS side using an Extensible Markup Language (XML) file for keeping track of synchronization states. The CRM server version of an item is compared with the XML file to detect changes and the same performed for the ECS item. The changes are then pushed to the corresponding item for the columns that have changed. Last updated item is selected in case of a conflict. |
US08533257B2 |
System and method for interfacing with an enterprise resource planning system
Present embodiments are directed to a system and method for facilitating communication between an external application stored on an external computer and an Enterprise Resource Planning (ERP) system component without utilizing a format of the ERP system. Present embodiments function to receive configurable material in a first data format from the external application into a user control stored on the external computer and convert the configurable material into a second data format with the user control. Additionally, present embodiments operate to make the configurable material available in the second data format to a server-side scripting component of an ERP system. Further, present embodiments function to receive a response object from the server-side scripting component in a third data format and convert the response object into configuration data in the first data format with the user control, and transmit the configuration data in the first data format to the external application with the user control. |
US08533256B2 |
Object interface to a dispersed data storage network
A data object interface to a dispersed data storage network is disclosed. The disclosed interface accepts read and write commands from a client computer and generates network commands that are forwarded to slice servers that form the storage component of the dispersed data storage network. The slice servers then fulfill the read and write commands. |
US08533255B2 |
Systems and methods for handling failover in a distributed routing environment
A computing device configured to implement a method for binding negotiation is disclosed. The computing device includes a processor and memory in electronic communication with the processor. A first binding has a first binding ID. Instructions are stored in the memory to implement a method for binding negotiation. The first binding is advertised on a network. A second provider is discovered to also provide the first binding with a second binding ID on the network. The computing device then determines whether it is to provide the first binding by evaluating a collision function (F). Based on the result of the collision function, either the addition of the first binding with the second binding ID is halted, or the first binding with the first binding ID is canceled. |
US08533252B2 |
Broad-band active delay line
A broad-band active delay line includes a plurality of broad-band active delay cells configured in a cascade topology. Each broad-band active delay cell includes a feedback loop and a feedforward path to achieve a high bandwidth. |
US08533250B1 |
Multiplier with built-in accumulator
Circuits for a multiplier with a built-in accumulator and a method of performing multiplication with accumulation are disclosed. An embodiment of the disclosed circuits includes a logic circuit coupled to receive two inputs. The logic circuit is capable of generating a plurality of value bits from the inputs received. In one embodiment, the logic circuit includes a Booth recoder circuit that generates a plurality of partial products. A block of adders is coupled to logic circuit to receive and sum up the value bits. An adder adds the summation result from the block of adders to a previous accumulated value to generate intermediate sum and carry values. An accumulator, coupled to the adder, receives and stores the intermediate values. |
US08533246B2 |
Carry bucket-aware multiplication having bits with most significant bits set to zero
An apparatus comprising an integrated circuit configured to accept a plurality of operands; multiply the operands producing an result in a first binary format; and distribute the result in the first binary format over a plurality of data units in a second binary format, each unit having W bits with k>0 most significant bits set to zero. |
US08533239B2 |
Data packaging system and method
A method for communicating data includes selecting a portion of data for communication to a remote computer with the data portion in device-dependent format and comprising at least an integer, a real number, or a binary value. A portable buffer is generated based on the selected data portion, the portable buffer comprising at least one device-independent data representation. The portable buffer is communicated to the remote computer for processing the data portion in a second device-dependent format. |
US08533238B2 |
Sharing information about a document across a private computer network
Technologies are described herein for providing an improved interface for interacting with a document within a private computer network. A flag interface, a tag interface, and a comment interface are provided within a document viewer. The flag interface enables a user of the private computer network to flag a document as the document is displayed by the document viewer. The tag interface enables the user to associate a tag with the document as the document is displayed by the document viewer. The comment interface enables the user to share comments about the document with other users of the private computer network as the document is displayed by the document viewer. |
US08533237B2 |
Data structure partitioning in product data management systems
Methods for product data management and corresponding systems and computer-readable mediums. A method includes maintaining a hierarchical data structure for a complex item. The data structure includes a root node representing the complex item, at least one assembly node associated with a the partition node, and a plurality of part nodes each associated with the assembly node. The method includes defining at least two occurrences associated with the root node and corresponding to at least the root node and assembly node. The method includes defining at least one partition node representing a partition of the complex item, the partition node representing an organizational division of the occurrences of the associated with the root node that can be referenced in queries and navigation. The method includes associating at least two of the plurality of occurrences with the at least one partition node. |
US08533236B1 |
Video-related recommendations using link structure
The subject matter of this specification can be embodied in, among other things, a method that includes inferring labels for videos, users, advertisements, groups of users, and other entities included in a social network system. The inferred labels can be used to generate recommendations such as videos or advertisements in which a user may be interested. Inferred labels can be generated based on social or other relationships derived from, for example, profiles or activities of social network users. Inferred labels can be advantageous when explicit information about these entities is not available. For example, a particular user may not have clicked on any online advertisements, so the user is not explicitly linked to any advertisements. |
US08533235B2 |
Infrastructure and architecture for development and execution of predictive models
A system that enables development and execution of predictive models comprises a centralized data management system, a data extraction tool a model validation tool and a model execution tool. In embodiments, a data management system includes a data management server that can be accessed via a web browser that stores data. An extraction tool includes a data filter adapted to filter data based on, for example, a population criteria, a sample size, and a date range criteria. A model validation tool validates the model. A model execution tool allows a user to score the model. |
US08533234B2 |
Custom data display
Method and system for providing an open-ended and modifiable ability to customize the display of data for current viewing of the display for purposes such as, but not limited to, Contact Center administration and management. |
US08533232B1 |
Method and system for defining relationships among labels
In a content system where labels are used to organize content, relationships between labels may be defined. A relationship may be unidirectional or bidirectional. A label may have multiple relationships to or from other labels. When the user selects a first label, information corresponding to a second label may be displayed in accordance with the relationship between the first and second labels. Relationships between labels may also be inferred by examining the labels and the content associated with the labels. |
US08533229B2 |
Soap-based web services in a multi-tenant database system
Systems and methods for generating dynamic communication contracts in a multi-tenant database system based on the datamodel of the user using the service. The communication contract contains objects, e.g., SOAP-objects, custom to the specific user's datamodel, including standard objects customized to the user's own security model and business purpose as well as entirely unique custom objects that are created by the user and available to only the user's organization. A database server queries the database for all objects available to that user (standard and custom), and all the fields on all those objects that are available to that user. The server iterates over the set of objects and each of their sets of fields and generates a contract that is specifically tailored to the user's own datamodel and field level security. The unique contract can be used to communicate with the server to access information in the user's own schema. For server-side implementation, all SOAP-objects—standard or custom—are translated across all users into a singular programmatic object on the server, which acts as a datamodel dictionary and which is used for looking up datamodel information for any given user and for any given object available to that user. With this datamodel information, the Web service performs access checking of the SOAP object against the given customer making a request, ensuring both the object and the fields on that object are defined and accessible to the user. |
US08533228B2 |
Limiting notification template modification based on user access levels
Methods for modifying a notification template based on user access levels are provided. In one aspect, a method includes receiving a first request, from a first user having a first level of access, to modify a first parameter from a first state to a second state in a notification template, and receiving a second request, from a second user having a second level of access, to modify a second parameter in the notification template from a first state to a second state. The method also includes storing the modified notification template. When the modified notification template is retrieved from storage, the first parameter is in the second state for both the first user and the second user, and the second parameter is in the first state for the first user and the second state for the second user. Systems and machine-readable media are also provided. |
US08533227B2 |
Managing website blacklists
A method and system for managing website blacklists to control website access of a user. In one embodiment, a client queries a database regarding a location of a website before the client fetches a resource from the website. The database includes a list of websites based on which access by the client is controlled. If the location of the website in the query exists in the database, the client displays a warning dialog and receives a user input. The client determines whether to continue fetching the resource based on the user input to the warning dialog. |
US08533225B2 |
Representing and processing inter-slot constraints on component selection for dynamic ads
Systems, methods, and computer-readable media for representing and processing inter-slot co-occurrence constraints on component selection for dynamically generated content items are disclosed. Components available for constructing the content items are organized into a hierarchy of categories. Co-occurrence constraints are specified in terms of categories in the hierarchy rather than explicit enumerated black-lists or white-lists at the component-to-component level. A set of processing rules based on the hierarchical taxonomy are used to expand a set of co-occurrence constraints specified in terms of categories into explicit enumerations of allowed component combinations, and to resolve potential conflicts in the set of co-occurrence constraints in a predictable manner. The explicit enumerations of allowed component combinations can be stored in a relational data table. When constructing a content item, candidate components can be obtained by querying the relational data table. |
US08533223B2 |
Disambiguation and tagging of entities
Tagging of content items and entities identified therein may include a matching process, a classification process and a disambiguation process. Matching may include the identification of potential matching candidate entities in a content item whereas the classification process may categorize or group identified candidate entities according to known entities to which they are likely a match. In some instances, a candidate entity may be categorized with multiple known entities. Accordingly, a disambiguation process may be used to reduce the potential matches to a single known entity. In one example, the disambiguation process may include ranking potentially matching known entities according to a hierarchy of criteria. |
US08533221B2 |
Provision of targeted content
Methods of providing services using a web marketing platform are described. The web marketing platform acts as a proxy associated with a host company and can intercept traffic passing to and from the host company. In an embodiment, an interface is provided which enables clients to easily request services. One example service is the provision of targeted content to users within web pages from sites hosted by the host company and in such an example, the actual content can be analyzed in real time to provide improved targeting based on the content, user behavior or any other criteria. |
US08533218B2 |
Debugging system for multidimensional database query expressions on a processing server
The present invention relates to data processing systems and methods to facilitate debugging, development and execution of multidimensional database queries, such as MDX (Multi-Dimensional eXpressions), for a multidimensional database structure on a computer architecture running on a server, such as an OnLine Analytical Processing Server (OLAP). The expression or query can be broken down and executed incrementally and associated with contextual information which can be viewed by an end-user via an understandable user interface. The advantage is the drastic simplification of very complex computations, giving the user a perspective not available till now. This allows users to better understand multidimensional queries, find errors that occur in the execution and correct such errors. |
US08533217B2 |
System and method for dynamically retrieving data specific to a region of a layer
A method for retrieving data from a data source by querying the data source with data points of a layer. The data points may be encompassed within a determined region of the layer. The steps of the method may include: determining the region of the layer, dynamically querying the data source with one or more data points of the layer encompassed within the region upon determining the region, and receiving the data from the data source. |
US08533216B2 |
Database system workload management method and system
An improved workload management system and method for a database system. The improved workload management system evaluates certain workload management rules dynamically at key points during database query execution rather than relying on enforcement prior to query activation. In the case of product join operations, the workload management system evaluates the potential impact on system performance by the product join operation after input tables have been populated, but prior to the execution of the join operation. Delaying workload management enforcement to this point ensures that the sizes of inputs and outputs are reliably known and improves system performance impact estimates at a point early enough to prevent any serious performance degradation from an inefficient product join. |
US08533214B2 |
System and method for assessing quality of address information for physical locations
An approach is provided for providing a user with a ranked list of possible physical addresses in response to an address submitted by the user. An address submitted by a user is parsed and a number of possible candidate addresses are generated from the user provided address. The quality of the candidate addresses is ranked according to the quality of their individual address elements and factors applied to these elements. An overall quality score for each candidate address is thereby derived. The list of candidate address is displayed to the user according to overall quality score ranking. |
US08533210B2 |
Index of locally recorded content
A method includes generating index data from media events that include video content, the event index data being generated by a server, generating locator code data for the event index data, the locator code data being generated by the server, providing the generated event index data and the locator code data from the server to a memory device for storage, searching the generated event index data to identify a segment of the media events in response to receiving a search request, determining segment locator code data from the locator code data based on the identified segment, and transmitting over a network to the end user media device the segment locator code data that corresponds to the identified at least one segment to enable the end user media device to extract an image from a recorded media event for generating an index display using the extracted image. |
US08533203B2 |
Identifying synonyms of entities using a document collection
Identifying synonyms of entities using a collection of documents is disclosed herein. In some aspects, a document from a collection of documents may be analyzed to identify hit sequences that include one or more tokens (e.g., words, number, etc.). The hit sequences may then be used to generate discriminating token sets (DTS's) that are subsets of both the hit sequences and the entity names. The DTS's are matched with corresponding entity names, and then used to create DTS phrases by selecting adjacent text in the document that is proximate to the DTS. The DTS phrases may be analyzed to determine whether the corresponding DTS is synonyms of the entity name. In various aspects, the tokens of an associated entity name that are present in the DTS phrases are used to generate a score for the DTS. When the score at least reaches a threshold, the DTS may be designated as a synonym. A list of synonyms may be generated for each entity name. |
US08533201B2 |
Extension of write anywhere file layout write allocation
A plurality of storage devices is organized into a physical volume called an aggregate, and the aggregate is organized into a global storage space, and a data block is resident on one of the storage devices of the plurality of storage devices. A plurality of virtual volumes is organized within the aggregate and he data block is allocated to a virtual volume. A physical volume block number (pvbn) is selected for the data block from a pvbn space of the aggregate, and virtual volume block number (vvbn) for the data block is selected from a vvbn space of the selected vvol. Both the selected pvbn and the selected vvbn are inserted in a parent block as block pointers to point to the allocated data block on the storage device. |
US08533189B2 |
Method and system for synthetic backup and restore
A method and system for backing up and restoring data. First, a full backup is performed to create a full dataset. Thereafter, incremental or differential datasets may be created by incremental or differential backups, respectively. When a new full dataset is needed, instead of performing a full backup, a previous full dataset may be combined with subsequent incremental or differential datasets to create the new full dataset. The new full dataset may be created on a computer other than the computer which hosts the data of the previous full dataset. The new full dataset may be used for offsite storage or to quickly restore data in the event of a failure or corruption of a computer's file system. |
US08533188B2 |
Indexing semantic user profiles for targeted advertising
Embodiments facilitate greater flexibility in definition of user segments for targeted advertising, by employing indexed semantic user profiles. Semantic user profiles are built through extraction of online user behavior data such as user search queries and page views, and include user interest information that is inferred based on user behavior. Semantic user profiles are then indexed to facilitate search for a set of users that fit specified semantic search terms. Search results for semantic profiles are ranked according to a ranking model developed through machine learning. In some embodiments, building and indexing of semantic profiles and learning of the ranking model is performed offline to facilitate more efficient online processing of queries. |
US08533185B2 |
Search engine graphical interface using maps of search terms and images
A system, method and computer program product for visualization of search results includes a map displayed to a user on a screen. The map shows search query terms and optionally other terms related to the search query terms. The display of the terms corresponds to relationship between the terms. A graphical image is displayed next to at least one of the search query terms. The graphical image is associated with a URL that corresponds to a search result. The graphical image is a favorite icon that is derived from the HTML script associated with a webpage at the URL, or an animated image, or a video, or a cycling GIF. A plurality of graphical images can be displayed in proximity to the search query term. The graphical image can be a logo or a paid advertisement. A plurality of graphical images are offered for sale in association with the query search term, and a size and/or placement of each graphical image corresponds to a price paid by each purchaser, or multiple images can be displayed at the same location on the screen, and a duration of display of each graphical image corresponds to a price paid by each purchaser. |
US08533184B2 |
Numerical analysis data creating method and apparatus, and computer-readable program
A numerical analysis data creating method creates numerical analysis data that are obtained by analyzing an analyzing target. The method judges whether or not to create the numerical analysis data of the analyzing target using data that have been stored in a database part, searches the database part based on information related to the analyzing target and displaying a search result if the numerical analysis data of the analyzing target are to be created using the stored data, and creates and stores in the database part the numerical analysis data of the analyzing target by modifying usable data if necessary, when the usable data exist in the search result. The data that have been stored in the database part include numerical analysis data, analysis model data, material characteristic data and attribute data with respect to targets that have been analyzed. |
US08533179B2 |
Avoiding three-valued logic in predicates on dictionary-encoded data
According to one embodiment of the present invention, a method for dictionary encoding data without using three-valued logic is provided. According to one embodiment of the invention, a method includes encoding data in a database table using a dictionary, wherein the data includes values representing NULLs. A query having a predicate is received and the predicate is evaluated on the encoded data, whereby the predicate is evaluated on both the encoded data and on the encoded NULLs. |
US08533178B1 |
Collecting information about suggestions provided to users
A system includes a plurality of client devices and a server system. Each of the client devices is configured to implement at least one web browser and a panel application. The web browser is configured to access a plurality of different web pages that each provide search capability and are each configured to display search suggestions in response to character sequences entered by a user when using the search capability. The panel application is configured to send indications of displayed search suggestions and corresponding character sequences to a server system. The server system is configured to generate, based on the received indications, a data structure that correlates character sequences to lists of phrases. |
US08533177B2 |
Multi-database query system and method
A system for retrieving data from a plurality of data sources is provided. The system includes a first data source for storing first data, a second data source for storing second data, and a server computer in communication with the first and second data sources. The server is programmed to receive a query execution request including a query definition reference and a query parameter definition wherein the query definition reference corresponds to a query definition that includes a first query block and a second query block, create a first executable query based on the first query block and the query parameter definition, create a second executable query based on the second query block and the query parameter definition, execute the first executable query at the first data source to create first query results, and execute the second executable query at the second data source to create second query results. |
US08533169B1 |
Transactional replication
Writing data in a distributed database having a plurality of nodes is disclosed. Writing includes receiving a write request at a node, wherein the write request is associated with one or more operations to define an atomic transaction and performing the atomic transaction based on the request. The atomic transaction includes writing to a first version of the database in the node and writing to an entity representative of a state of the first version of the database. |
US08533168B2 |
Automatic policy generation based on role entitlements and identity attributes
Policies defining the entitlements to be assigned to a new identity joining a role are automatically generated. An automatic policy assigns a new identity the entitlements commonly owned by a predetermined number of identities in the role, which may be all of the role identities. A conditional policy recommends that a new identity be assigned the non-commonly-owned entitlements associated with the role identity whose non-entitlement attributes most closely match the non-entitlement attributes of the new identity. This may be automatically determined by iterating through a vector that maps the non-commonly-owned entitlements with the non-entitlement attributes of each role identity, comparing the non-entitlement attributes of the new identity to find the closest match. The non-commonly-owned entitlements of that identity are then recommended to be assigned to the new identity, upon approval. |
US08533166B1 |
Methods and systems for encoding/decoding files and transmission thereof
In one embodiment, the instant invention includes a computer system that includes at least the following components: a) a first computer that performs, in concurrent manner, at least the following tasks: dividing a computer file into a plurality of segments, compressing segments, and sending the compressed segments to a second computer over a network; b) the second computer that performs, in concurrent manner, at least the following tasks: decompressing the compressed segments and assembling the decompressed segment to reconstruct the computer file, where the compressing task performed by the first computer and the decompressing task performed by the second computer are synchronized and performed concurrently. |
US08533164B2 |
Method and tool to overcome VIOS configuration validation and restoration failure due to DRC name mismatch
In a Virtual Input/Output (I/O) Server (VIOS) partition, a method comprises a cluster aware (CA) operating system (OS) of a VIOS partition performing the functions of: responsive to a restore command: retrieving a configuration backup file from storage; comparing a DRC name from the retrieved file with a DRC name of the current VIOS partition performing the restore operation; in response to an occurrence of a DRC name mismatch: retrieving an initial UUID of the VIOS from the configuration backup file; accessing a UUID table within a management tool; locating a matching UUID to the initial UUID within the UUID table; and in response to locating the matching UUID: verifying that the configuration data file belongs to the current VIOS initiating the restore operation; and performing the restore operation to restore the configurations of the hardware, logical and virtual devices of the first VIOS to an earlier configuration state. |
US08533160B2 |
NAS system and remote copy method
The present invention relates to a system that includes one or more logical volumes for storing data; a snapshot producing section for producing snapshots for the logical volumes based on a pre-scheduled snapshot acquisition time; a remote copy section for remote copying difference data for the snapshots based on pre-scheduled remote copy start times; and a scheduling section for re-scheduling the time of one or more of an Nth snapshot acquisition time, an remote copy start time, and an (N+1)th remote copy start time, in such a manner that remote copying starting at the Nth remote copy start time finishes by the (N+1)th remote copy start time. |
US08533157B2 |
Snapshot management apparatus and method, and storage system
A high-performance and highly-reliable snapshot management apparatus and method, and a storage system are provided that can prevent the adverse influence of overhead when they retain a multiplicity of snapshots. An operational volume is set in a storage area provided by a first storage apparatus and a plurality difference volumes are set in a storage area provided by a second storage apparatus. In response to data writing to the operational volume, difference data is saved in the difference volumes and management tables for it are created, with each snapshot being managed according to the management tables. Each management table is divided according to one or more snapshots in accordance with the snapshot creation time. The second and any following management tables store specified inheritance information to inherit the content of the preceding management tables. |
US08533156B2 |
Abstraction for representing an object irrespective of characteristics of the object
Methods and systems for providing easy access to information and sharing are provided. Embodiments of the present invention enable a host to grant access to published content to one or more users in a manner in which the user(s) can scan small portions of information to decide which information is desired. The embodiments described herein enable, for example, a user to see a library of content that is larger than the storage capacity of the computing unit used by the user. The sharing of information is also secured through the use of auto-lock keys and the creation of abstract identities for the host and each user. |
US08533155B2 |
Fixed content storage within a partitioned content platform, with replication
A content platform (or “cluster”) that comprises a redundant array of independent nodes is logically partitioned. Using a web-based interface, an administrator defines one or more “tenants” within the cluster, wherein a tenant has a set of attributes: namespaces, administrative accounts, data access accounts, and a permission mask. A namespace is a logical partition of the cluster that serves as a collection of objects typically associated with at least one defined application. Each namespace has a private file system with respect to other namespaces. This approach enables a user to segregate cluster data into logical partitions. According to this disclosure, tenant information, including all associated namespaces, in the cluster (the “source cluster”) is replicated to at least one target cluster over a replication link. Preferably, replication is available for multiple tenants in the source cluster, and a replication algorithm ensures that a particular tenant can be added to the replication link without stalling the progress of other tenants. |
US08533149B2 |
Batch management systems and methods
Example systems and methods of managing product genealogy data across distributed systems are described. In one implementation, a method identifies a material associated with a product that is part of a product batch. Usage information associated with the material is accessed, and a handling unit associated with the product batch is identified. Delivery information associated with the product batch is also accessed. A genealogy is generated for the product batch based on the material, the usage information, the handling unit, and the delivery information. |
US08533148B1 |
Document relevancy analysis within machine learning systems including determining closest cosine distances of training examples
Systems and methods that quantify document relevance for a document relative to a training corpus and select a best match or best matches are provided herein. Methods may include generating an example-based explanation for relevancy of a document to a training corpus by executing a support vector machine classifier, the support vector machine classifier performing a centroid classification of a relevant document in a term frequency-inverse document frequency features space relative to training examples in a training corpus, and generating an example-based explanation by selecting a best match for the relevant document from the training examples based upon the centroid classification. Determining the training example having the closest cosine distance to the relevant document includes ranking the training examples by stretching the internal best match scores for the training examples linearly to cover a complete unit interval. |
US08533147B2 |
Method and system for creating a dynamic systems based hybrid model for reasoning systems
A method for creating a dynamic systems based hybrid model for reasoning systems is described. The method receives, at a server, a plurality of expert identified deal attributes. The method presents a conjoint analysis questionnaire for input by one or more respondents. The conjoint analysis questionnaire includes questions based on the plurality of expert identified deal attributes. The method receives responses of the one or more respondents to the conjoint analysis questionnaire. The method then defines an expert reasoning model based on the responses of the one or more respondents to the conjoint analysis questionnaire. The method accesses historical deal information of one or more deals, the historical deal information including one or more deals, each deal including a plurality of expert identified deal attributes and a part-worth associated with each of the deal attributes. Finally, the method validates the expert reasoning model based on the historical deal information. |
US08533143B2 |
Rule-based content handling
An embodiment of a method includes receiving a content request including a first set of attribute values, using at least one of the attribute values from the first set of attribute values to determine a second set of attribute values, traversing a hierarchy of decision nodes, wherein each decision node implements business logic based on one of the attribute values from the first set of attribute values or the second set of attribute values, and generating a decision from a last node in the hierarchy, wherein the decision dictates how to respond to the content request. |
US08533142B2 |
Product lifecycle management system using partial solve
Systems, methods, and computer readable mediums. A method includes receiving an input expression including a set of options joined using logical operators. The method includes converting the input expression into an order string. The method includes receiving at least one rule that defines relationships between variants of different option families and receiving a configuration expression that specifies values for some but not all variants of the option families. The method includes producing a conjunctive normal form (CNF) order expression corresponding to the order string, at least one rule, and configuration expression. The method includes performing a partial solve of the order expression, the partial solve producing a result set that describes all possible configurations that correspond to the configuration expression. |
US08533139B2 |
Optimizing computation of minimum cut in graphs with grid topology
Approaches for optimizing computation of minimum cut or maximum flow on graphs comprising a plurality of nodes and edges with grid-like topologies are disclosed. Embodiments exploit the regular structure of input graphs to reduce the memory bandwidth—a main bottleneck of popular max-flow/min-cut algorithms based on finding augmenting paths on a residual graph (such as Ford-Fulkerson [1956] or Boykov-Kolmogorov [2004]). Disclosed embodiments allow more than 200% speed-up without sacrificing optimality of the final solution, which is crucial for many computer vision and graphics applications. Method and system embodiments replace standard linked list representation of general graphs with a set of compact data structures with blocked memory layout that enables fixed ordering of edges and implicit branchless addressing of nodes. The embodiments are orthogonal to other optimizations such as parallel processing or hierarchical methods and can be readily plugged into existing min-cut/max-flow computation systems to further improve their performance. |
US08533137B2 |
Position resolved measurement apparatus and a method for acquiring space coordinates of a quantum beam incident thereon
The position calculation of prior art position sensitive detector systems relies on a known geometry pattern of individual electrodes and the distribution of the charge parts. A heuristic estimation is made in order to calculate an initial coordinate of irradiation. In contrast, the present invention allows one to calculate the position of an incident particle in terms of direct mapping of the measured detector response into position coordinates detector surface. The device for estimating the space coordinates of an irradiation position onto a detector comprises a position sensitive detector; an irradiation source; means for measuring the response of detector generated upon irradiation by irradiation source; and an artificial neural network structure provided such that the measured detector response is the input to the artificial neural network structure and the initial space coordinates of irradiation are the output of the artificial neural network structure. |
US08533135B2 |
Model generating device and model generating method
A model generating device acquires event information including a time when execution of an event is started, a time when execution of the event is finished, and the type of the event. The model generating device assumes model candidates each showing a relationship between an event and another event triggered by the former event on the basis of the acquired event information, and makes a combination of the assumed model candidates. The model generating device searches the assumed model candidates to find a candidate that matches an existing model. The model generating device withdraws the model candidate searched for from the combination of the model candidates, and withdraws a candidate that is to be withdrawn from the combination of the model candidates in association with withdrawal of the model candidate found as a result of the search, thereby updating the combination of the model candidates. The model generating device thereafter generates a new model on the basis of the updated combination of the model candidates. |
US08533130B2 |
Use of neural networks for annotating search results
A system for generating annotations of a document, including a plurality of neurons connected as a neural network, the neurons being associated with words, sentences and documents. An activity regulator regulates a minimum and/or maximum number of neurons of the neural network that are excited at any given time. The neurons are displayed to a user and identify the neurons that correspond to sentences containing a predetermined percentage of document meaning. The annotations can be also based on a context of the user's search query. The query can include keywords, documents considered relevant by the user, or both. Positions of the neurons relative to each other can be changed on a display device, based on input from the user, with the change in position of one neuron changing the resulting annotations. The input from the user can also include changing a relevance of neurons relative to each other, or indicating relevance or irrelevance of a document or sentence. |
US08533129B2 |
Efficient data layout techniques for fast machine learning-based document ranking
A computer readable medium stores a program for optimization for a search, and has sets of instructions for receiving a first decision tree. The first decision tree includes several nodes, and each node is for comparing a feature value to a threshold value. The instructions are for weighting the nodes within the first decision tree, determining the weighted frequency of a first feature within the first decision tree, and determining the weighted frequency of a second feature within the first decision tree. The instructions order the features based on the determined weighted frequencies, and store the ordering such that values of features having higher weighted frequencies are retrieved more often than values of features having lower weighted frequencies within the first decision tree. |
US08533128B1 |
Temperature retention and weatherization blanket system
A multi-layered, dual purpose thermal blanket constructed from materials rendering a first blanket side heat reflective and a second blanket side wind resistant. Blanket may be utilized in temperature retention and weatherizing systems for storage units, lockers and bins. System for units having roll up doors comprises blanket support assembly to retain blanket across doorway and insulated enclosure around roll up door assembly. System optionally further includes a sensor interface in association with the blanket to receive data including an open or closed position of the blanket. A graphics generator presents the data as correlated to mappings and calculates time periods during which the blanket is left in an open position. Associated fees may be calculated as a penalty for leaving blanket open while storage unit is unattended. |
US08533127B2 |
Device alerting to expiration in a franking system
This invention relates to a device alerting to the expiration of tariffs for a franking system, comprising a random access memory (RAM) for recording postal data including a first table of postal tariffs relative to postal products and services and a processing unit for updating these postal tariffs, this RAM further comprising a second table of postal tariffs and the processing unit comprising means for comparing the postal tariffs of the first and second tables and for emitting a message alerting to the expiration of tariffs when a date of application of the postal tariffs of said second table is identical to or earlier than a desired date of franking and when one of these compared postal tariffs has been changed. |
US08533124B2 |
Digital material management method, digital material management system, and workflow management system
An aspect of the present invention provides a digital material management method including a verification step of automatically verifying, in manufacturing of a product in which digital materials are used, digital materials that should be used and digital materials that are actually used in the product. According to the digital material management method of the present invention, whether the entire digital materials that should be used in the product manufactured using the digital materials are arranged and used is automatically checked, and the result is displayed. Therefore, the use of the digital materials that should be used in the product can be automatically checked. The efficiency is improved, and the power can be saved. |
US08533122B2 |
Wireless payment with a portable device
A portable device transmits a payment card number to a merchant machine. The portable device generates an encrypted first message comprising a request to get information about a financial transaction. A packet filter maps the encrypted first message to a pre-established non-GBR bearer. The portable device generates a fourth message by encrypting the encrypted first message and transmits the fourth message. The portable device receives and decrypts a second encrypted message. The portable device decrypts the decrypted second message and sends financial transaction information to a display. |
US08533121B1 |
Method and apparatus for phase identification in a three-phase power distribution network
A remote phase identification system identifies the unknown phase attribute of any energized conductor within a three-phase power distribution network. A field probe at a remote location obtains an instantaneous phase measurement at a precise GPS second and communicates this phase, GPS second, and GPS coordinates to a field client. Either wireless Internet or satellite modem communications is used by the field client to retrieve the reference phase taken by a base station at the same GPS second. Field client tagging reference phase configuration files are automatically created for any circuit and applied to the base station reference phase. Configuration files can be named, saved, and loaded and are used by the field client to identify and display the unknown phase attribute. A field client can be any personal computer, smartphone, or personal digital assistant. |
US08533119B2 |
Value transfer with identity database
A value transfer system and methods are disclosed. A sending entity may initiate a cross-border value transfer by authenticating with an authentication system, where the authentication system communicates with an identity database populated with profiles for the sending entity and a recipient entity that contain government data, where the government data is used in the authentication process. |
US08533117B2 |
Methods and apparatus for providing currency at an airline check-in machine
The present disclosure provides methods and apparatus for providing currency at an airline check-in machine. In general, the improved airline check-in machine dispenses one or more currencies for the user. Preferably, the currency(s) are selected from a database of currency based on the geographic location of the airline check-in machine and/or the user's flight destination. For example, the airline check-in machine may offer Euros based on a determination the user is traveling to Italy. In addition, the user may choose to pay for the currency using the same debit or credit card the user inserted into the airline check-in machine for identification or in any other suitable manner. |
US08533114B2 |
Method and system for flexible payment processing
A system and method are provided that include determining eligibility of customers for flexible payment status and allowing the customers to implement the flexible payment status. The determination for eligibility is based on customer identity, payment date, and payment due date. Flex accrual is calculated if the customer is eligible for flexible payment status. The flex accrual is based on the payment amount, payment date, and payment due date. The system communicates the flex accrual to the customer and the customer is able to utilize the flex accrual by making a late payment without penalty. |
US08533111B1 |
System and method for providing promotional pricing
A system and method for providing promotional pricing is disclosed. One or more pricing offers may be provided to a plurality of credit accounts, wherein the pricing offers may be directed to transactions associated with particular products and/or merchants. It may be determined whether a transaction associated with a credit account qualifies for certain pricing offers based on predetermined criteria. A balance incurred through a transaction may be assigned to a promotional bucket associated with a particular pricing offer if the transaction qualifies for the particular pricing offer, or the balance may be assigned to a default bucket if the transaction does not qualify for any pricing offer, thereby causing a total balance to be distributed among the default bucket and the promotional buckets. Payments associated with the credit account may be allocated to the default bucket and the one or more promotional buckets according to a payment hierarchy. |
US08533105B1 |
Order centric tracking system and protocol for communications with handheld trading units
A computerized method and system for tracking orders implemented on a trading floor exchange is disclosed. The system is order-centric and is configured to route orders to a booth and floor broker in accordance with a symbol associated with the particular security being traded. Floor brokers communicate with the trading system through handheld devices connected to a handheld server via a wireless interface. A specific protocol for messaging protocol for communications between the handheld devices and the handheld server is also disclosed. |
US08533103B1 |
Maintaining latency guarantees for shared resources
Usage of shared resources can be managed by enabling users to obtain different types of guarantees at different times for various types and/or levels of resource capacity. A user can select to have an amount or rate of capacity dedicated to that user. A user can also select reserved capacity for at least a portion of the requests, tasks, or program execution for that user, where the user has priority to that capacity but other users can utilize the excess capacity during other periods. Users can alternatively specify to use the excess capacity or other variable, non-guaranteed capacity. The capacity can be for any appropriate functional aspect of a resource, such as computational capacity, throughput, latency, bandwidth, and storage. Users can submit bids for various types and combinations of excess capacity, and winning bids can receive dedicated use of the excess capacity for at least a period of time. |
US08533101B2 |
Systems and methods for compression of trade-related records
In certain embodiments, a computer system and process for use in a trading system are provided that allow trading entities to compress trade records while simplifying the reconciliation process. Advantageously, compressed trade records are processed by a custodian firm, while uncompressed reconciliation data are processed by a central counterparty. In some embodiments, a computer system and process are provided that allows trading entities to compress trade records across markets. Advantageously, compression across markets provides a larger pool of eligible trade records for compression, increasing the number of compressible trades, and thus reducing fees paid by the trading firm and the amount of data transmitted. |
US08533099B2 |
System and method for electronically trading derivatives and other financial instruments
A computerized electronic trading system and method permits a customer using a customer computer to electronically request a market from a dealer using a dealer computer for a financial instrument through a network. The centralized computer system includes one or more computers and at least one message server for communicating electronic messages between the customer computer and the dealer computer, and a database system including at least one storage device, the database system storing at least information related to a plurality of financial instruments and to a trade executed between the customer and dealer. The computerized electronic trading system is programmed with a request for market module programmed with a trade negotiation sub-component to handle the exchange of messages related to the negotiation of trades, and a trade execution module to negotiate pricing for the financial instrument, including an ability to counter a price quote for the financial instrument are transmitted through the computerized electronic trading system, and execute a trade upon agreement between the customer and the dealer on the price quote. |
US08533093B1 |
General obligation bonds for short asset life equipment
A new type of general obligation bond, called Ed-Tech bonds, is structured to provide on-going funding for a district's technology needs, match the term of the underlying bonds to the useful short-term life of technology assets to be purchased with bond proceeds, and address federal restrictions regarding use of bond proceeds. Further, techniques are described for determining the appropriate financing parameters for the Ed-Tech bonds. |
US08533086B1 |
Variable rate payment card
A method of arranging for payment of a purchase includes receiving, from a supplier, agreement to accept a payment from a buyer via use of a payment card having variable payment terms; after a purchase by the buyer from the supplier, assessing the supplier a standard interchange rate; receiving, from the buyer, approval to pay the invoice; and issuing, to the supplier, a rebate, based upon when the approval to pay the invoice was received. the variable payment terms are calculated by: determining a first early payment date; determining a second standard payment date; assessing against the supplier a first percentage of the standard interchange rate if the invoice is approved by the first early payment date; and assessing against the supplier a second percentage of the standard interchange rate if the invoice is approved on or after the second standard payment date. |
US08533083B2 |
Method and systems for generating dynamic rewards currency values
Systems and methods are disclosed for generating payment values of goods and services (rewards). The disclosed systems and methods may include receiving an input. Furthermore, the disclosed systems and methods may include dynamic calculating, based upon the received input, a plurality of payment pairs, each of the plurality of payment pairs comprising any (including a plurality of) non-monetary currency value and/or any monetary currency value (between 0% and 100% respectively 100% and 0%). |
US08533082B1 |
Consumer leverage modeling
Embodiments of the present invention relate to systems, methods and computer program products that model consumer leverage and provide a leading indicator that predicts increases or decreases in consumer net non-collectibles. To do so, for example, the present invention determines the growth of consumers' spending and borrowing, and tracks a relationship between the value of a ratio that compares consumers' spending and borrowing and the value of the equilibrium of the ratio that compares consumers' spending and borrowing. This relationship is then applied to predict changes in consumers' ability to repay borrowed funds and consumer net non-collectibles. |
US08533079B2 |
Integrated systems for electronic bill presentment and payment
The present invention relates generally to electronic commerce, and more particularly to methods and systems for integrating electronic bill presentment and payment among billers, consumers, banks and other financial institutions, electronic payment facilitators, and web portals and other spaces able to support an interface for presentment and/or payment of bills. |
US08533075B1 |
Systems and methods for biomedical track and trace
The present invention describes a biomedical track-and-trace solution based on unique item-level QR codes printed on product packaging and encoding unique URLs to enable granular, item-level product management. In some embodiments of the invention, the information presented to users who access these unique URLs is tailored based on the role of the user in the supply chain. Embodiments of the invention may be used for the purposes of item authentication, anti-counterfeiting measures, product recall management, and the efficient distribution of supplementary product information. |
US08533068B2 |
Distributing products from suppliers to consumers in a network environment
Systems and methods enabling suppliers to control the distribution of products to consumers in a network environment while accommodating the concerns of its brick and mortar distribution channels are described. Consumer orders for products are received, and consumer product orders are routed in accordance with fulfillment policies respectively selected by the supplier(s). The system includes a graphical consumer interface configured to receive consumer orders for products, and an order flow controller configured to route consumer product orders in accordance with fulfillment policies respectively selected by the supplier(s). The system also includes a graphical consumer interface that is accessible over the Internet and is configured to display price and availability information for the products of each of the suppliers organized by product category and is configured to receive consumer orders for products. A consumer may search through displayable product information within a given category by supplier, by product type, by product feature, or by a combination of two or more of these identifiers using a search engine. |
US08533066B2 |
Method and apparatus for recommending media programs based on correlated user feedback
A method and apparatus for recommending a media program of a set of media programs to a user of a set of users is disclosed. The method and apparatus computes a measure wij of the implied similarity of a first media program (i) and a second media program (j) that corrects for the popularity of the media programs, thus resulting in a more accurate indication of the relatedness of the media programs. |
US08533065B2 |
Customer-specific merchandising program
The invention is directed to facilitating the planning and ordering of a merchandising unit and associated products. A merchandising unit planning screen is presented that displays a representation of a merchandising unit having holders for holding and displaying the products. A product menu is provided for each holder to allow selection of a product from a set of products for each respective holder. Available choices in the product menu of at least one holder are constraining to a subset of the set of products based on predetermined criteria. For each holder for which a product has been selected, a product quantity is determined based on a capacity of the respective holder. An order is generated based on the selected products. |
US08533063B2 |
Methods and system for making a project available for bidding to a plurality of qualified potential bidders
A bid processing system receives a project description and a baseline estimate for the project. The project is opened for bidding to multiple potential bidders. Each of the potential bidders have access to the project description and the baseline estimate for the project. The bid processing system receives multiple bids for the project and calculates a bid value associated with each of the multiple bids. The system then determines a best bid value from the plurality of received bids and awards the project to the bidder associated with the best bid value. |
US08533062B2 |
System and method for operating a pawn shop
The invention relates to a computer-implemented data processing system which comprises a database, an offering module comprising an offering user interface for a pawner to enter an indication of an item to be pawned into the database, a bidding module comprising a bidding user interface for at least one bidder to enter at least one bid into the database, a selection module for selecting one of the at least one bid as a winning bid and the bidder of the winning bid as a pawnee, a release declaration module for declaring a release of the item if the release declaration module receives a release remark, and a release notification module for notifying the pawnee that the item was released if the release declaration module declares a release of the item. |
US08533061B2 |
Systems and methods for automated internet-based auctions
The present invention relates to systems and 5 methods for implementing an automated auction process that is held at a designated time on the Internet, and that ends after bidding has been completed. In accordance with these systems and methods, a server connected to a plurality of workstations may establish 10 several auctions that allow for efficient trading of multiple goods, while simulating the live and dynamic setting of traditional auctions. |
US08533058B1 |
Method and computer-readable medium for automated dynamic pricing of products with parameter-driven state transitions
The pricing of a product is programmatically managed by defining a plurality of pricing states for the product. Each pricing state has a pricing mechanism associated therewith. A pricing mechanism can be a variable pricing mechanism such as an auction. It can also be a fixed pricing mechanism for the sale, rental, or subscription of the product. One or more triggers are defined, each of which may include one or more trigger parameters, to enable the pricing of the product to transition from one pricing state to another pricing state. In this manner, an automated, systematic approach to pricing management is provided. |
US08533054B1 |
Buyer global search
Embodiments for implementing a buyer global search in electronic commerce include a method of detecting, by a computing device, that a search query for a product item within a first marketplace is unsuccessful and in response to the unsuccessful search query, executing the search query for the product item within a second marketplace. The method further includes detecting that the search query for the product item within the second marketplace is successful; and in response to the successful search query in the second marketplace, offering a user that submitted the search query in the first marketplace to purchase the product item being sold by a seller. |
US08533053B2 |
Inventory pooling for multiple merchants
Disclosed are various embodiments for implementing inventory pooling for multiple merchants. A first inventory of an item held at a first fulfillment center on behalf of a first merchant is contributed to a common pool of inventory. A second inventory of the item held at a second fulfillment center on behalf of a second merchant is contributed to the common pool of inventory. Fulfillment of an order placed by a customer of the first merchant is initiated from the second inventory of the item that was contributed by the second merchant to the common pool of inventory. |
US08533052B1 |
Method for exposing research note data based upon user activity data
Comparative decision systems and methods are disclosed for gathering and mining data representative of purchase decisions. One disclosed comparative decision system detects when a user is comparing items and provides the user with the ability to create a research note storing comparative information for the alternative items. The system displays information about items according to a variety of factors. The user can customize the factors and enter information for each alternative item according to the various factors. Some information may be pre-populated by the system. The research note may be made visible to other users, and may be suggested to another user based on the note's expected helpfulness and relevance to that user. One disclosed method for mining data stored within research notes identifies which factors are given higher relative priorities by users considering a purchase. Another mining method analyzes the effects of price changes on item popularity. |
US08533049B2 |
Value add broker for federated advertising exchange
For a multi-party advertising exchange, including publishing entities and advertising entities from disparate advertising networks, which facilitates transactions for publishing inventory, a value add broker is provided to aggregate information from third parties having valuable information for input to the exchange or to perform services that are valuable to transactions in the exchange. The valuable information or services further facilitate the transactions for the publishing inventory automatically generating a benefit for the third parties providing the valuable information or services commensurate with the value added to the transactions. |
US08533046B2 |
Advertisement server, user terminal, advertisement method, and advertisement viewing program
When a user accesses an advertisement site by a browser unit and requests transmission of the advertisement moving image, an advertisement server requests the user to connect an electronic money card to a reader/writer. The advertisement server can communicate with the electronic money card via the browser unit. Thus, the advertisement server reads an electronic money functional unit ID which is ID information of the electronic money card from the electronic money card to store it therein, and further transmits to the user terminal moving image data of the advertisement moving image stored in the advertisement moving image database. While the user terminal is reproducing the advertisement moving image, the advertisement server accesses the electronic money card through the browser unit for every given interval, and confirms that the electronic money card is connected to the reader/writer. |
US08533042B2 |
Neuro-response stimulus and stimulus attribute resonance estimator
A system determines neuro-response stimulus and stimulus attribute resonance. Stimulus material and stimulus material attributes such as communication, concept, experience, message, images, audio, pricing, and packaging are evaluated using neuro-response data collected with mechanisms such as Event Related Potential (ERP), Electroencephalography (EEG), Galvanic Skin Response (GSR), Electrocardiograms (EKG), Electrooculography (EOG), eye tracking, and facial emotion encoding. Neuro-response data is analyzed to determine stimulus and stimulus attribute resonance. |
US08533033B2 |
System and method for providing a discount
Systems and methods are provided for delivering a discount using a partner-issued currency or a combination of virtual currency and partner-issued currency, offering a high-perceived savings value to an end-user while maintaining the perception of product value. An embodiment of an inventive method includes presenting a display of a price paid by a consumer without access to the virtual currency along with a display of an amount payable by the end-user in actual currency in combination with an amount payable in virtual currency. The end-user perceives a benefit to using the virtual currency and since the price paid in actual currency is less than the displayed price to be paid by a consumer without access to the virtual currency. |
US08533032B2 |
Method of generating and redeeming coupons
A method of generating and redeeming a plurality of coupons includes generating a first coupon, generating a second coupon, distributing the first coupon to the first consumer, and distributing the second coupon to the second consumer. Generating a first coupon includes selecting a first group of offers from a plurality of offers such that the first group of offers is individually customized to the first consumer, and printing a first bar code identifying a first account and indicating that the first coupon relates to the first group of offers. Generating a second coupon includes selecting a second group of offers, and printing a second bar. Each of the plurality of offers is redeemable for a discount on a corresponding one of a plurality of products offered for sale, and the first group of offers differs from the second group of offers. |
US08533030B1 |
In-bound telemarketing system for processing customer offers
A computer-implemented system and method for processing applications for products or services based on solicited offers made to consumers are provided. A plurality of offers are communicated to a plurality of consumer recipients using a computer, each offer being identified by a solicitation identifier and an offer identifier. Offer information of said offers is stored in an offer database that further includes consumer identification information associated with the consumer recipients. A response to a specific offer is received from a specific consumer recipient at a VRU via a communication link with the specific consumer recipient. At least some offer identification data and consumer identification data is received from the specific consumer recipient at the VRU. Data received at the VRU is used to query the offer database to identify other targeted offers targeted to the specific consumer recipient and data associated with those other targeted offers, including consumer identity verification data. The identity of the specific consumer recipient is verified based on the consumer identification data and the consumer identity verification data. The communication link is transferred from the VRU to a live agent. The live agent is provided with (a) information received from the specific consumer at the VRU and (b) data from the query of the offer database including data regarding other targeted offers. |
US08533028B2 |
Method for supporting accreditation of employee based on training
Methods, computer-readable media, and apparatuses support the accreditation of an employee based on training provided to the employee. Different employment areas are supported, including services and manufacturing. The employee's experience level and performance rating are compared with a predetermined experience duration and an acceptable performance rating, respectively, in order to determine a number of training modules and an allowed time frame to complete the number of training modules. The number of training modules is selected from a collection of training modules based on a performance indicator that is associated with the employee. When the employee has completed the number of training modules in the allowed time frame, the employee is accredited. If an employee's performance is less than a satisfactory performance rating, the employee may forfeit accreditation. Consequently, the employee must repeat the accreditation process in order to regain accreditation. |
US08533027B1 |
User interface enabling approval/disappoval of revised contract performance indicators
A user interface and processes are provided to monitor contracts for the delivery of products and/or services to different customers. The user interface provides a comprehensive visual display such that a user can view multiple contracts and a variety of performance information for each contract. The user interface also enables a user to update performance indicators for a contract and to identify contracts that require heightened scrutiny or action to mitigate current problems or potential issues. |
US08533025B2 |
Method and apparatus for management of sales activity information
Systems and methods are described for management of sales activity information. In an embodiment, a system comprises a client system; and a server system, communicatively coupled to the client system, wherein the server system comprises: a client interface to receive sales activity data from the client system, wherein the sales activity is associated with a sales process and arranged using a multi-dimensional matrix; and a data storage system to store the sales activity data using a coordinate system that corresponds with the multi-dimensional matrix. Other embodiments are disclosed. |
US08533024B2 |
System and method for managing users of a gym facility
The present invention relates to a method for managing users of a gym facility. The method comprises the steps of: analyzing a population of users or possible users of a gym facility by means of statistical tools in order to detect desires of attaining mean term objectives, or “ASPIRATIONS”, of the population being analyzed; determining, by means of statistical tools, a limited number of ASPIRATIONS present in the population being analyzed; subdividing the population being analyzed, by means of statistical tools, into homogeneous groups each belonging to a given ASPIRATION included in a limited number of ASPIRATIONS; and assigning a user to at least one of the homogeneous groups based on responses to a closed-response questionnaire. The invention also relates to a system for managing users of a gym facility and to an information technology product for managing a gym facility and the users of a gym facility. |
US08533019B2 |
System and method for a household services marketplace
A system and method are disclosed for the operation of an In-home Assistant Service. The service provides a marketplace to connect households with assistants for frequent and specialized jobs. The service collects profile data of potential assistants including multiple skills the assistant can provide. It also enables the household to provide detailed request criteria. A locate process is then performed to determine, which assistants best meet the identified criteria. |
US08533015B2 |
Method and system for creating electronic business referrals with cloud computing
A method and system for creating electronic business referrals with cloud computing. Existing clients, customers or patient of a provider of professional services request a unique referral identifier tracking code (e.g., a unique QR code, etc.). The unique referral identifier tracking code is used by others as an automatic referral method to automatically schedule and appointment at a provider of the professional services, automatically record a referral discount for fee charged by the provider of the professional services and automatically record a referral credit for the existing client, customer or patient at provider of the professional services. The automatic referral method is completed with an electronic referral application in a cloud computing application when the unique referral identifier tracking code is received anywhere on a cloud computing network using less bandwidth and less processing cycles via the cloud communications network than via a non-cloud communications network. |
US08533013B2 |
Content management
A content management system can have one or more of an aggregation engine, a survey engine, a polling engine, an apparent-interest engine, an explicit-interest engine, and a results processing engine. |
US08533011B2 |
Systems and methods for queuing access to network resources
One embodiment of the present invention provides apparatus and methods for queuing access by large numbers of Internet or other network-based users to networked systems and resources with limited capacity. In one example embodiment, a queuing system provides user access to network resources, such as that of a ticketing system. A ticket queue queues a request received from a client system. A request processing module causes the client system to repeatedly transmit messages to the system during a first period, and in response to determining that the client system has ceased transmitting messages during the first period, the request is remove from the queue and/or cause the request goes unfulfilled. |
US08533009B2 |
Method and system for managing appeals
A system and method for managing insurance claim denials. The system and method reviews a denial of claim from an insurer and a patient medical record received from a healthcare provider to determine if an appeal should be filed for the denial. It prepares an appeal to the denial comprising an appeals overturn letter and supporting document and submits the appeal to the insurer if it determines that an appeal should be filed. The system then tracks and monitors the progress of the appeal and process the appeal determination received from the insurer. The system utilizes these tracking and monitoring information to streamline and improve the insurance claim process of the healthcare provider, such as developing and implementing claim denial reduction program. |
US08533008B2 |
Clinical trials management system and method
Meta-models are made available to clinical trial protocol designers. A meta-model includes a list of preliminary patient eligibility attributes appropriate for a particular disease category. The protocol designer chooses the appropriate meta-model, and encodes the clinical trial protocol, including eligibility and patient workflow, within the selected meta-model in a protocol database. The resulting protocol database is stored together with databases of other protocols in a library of protocol databases. Sponsors and individual clinical sites have controlled access to the protocols. Study sites make reference to the protocol database in order to perform patient eligibility screening. Once a patient is enrolled into a study, the protocol database indicates to the clinician what workflow tasks are to be performed at each patient visit. |
US08533007B2 |
Chronic illness goal management
A health management system includes a plurality of goal modules (14). Each goal module includes one or more content sessions (16, 18, 71, 72, 73, 74, 120, 122, 126, 140, 148) cooperatively directed toward achieving a health management goal. A user interface (30) is configured for presenting content sessions. At least one feedback path (30, 32, 36, 38) provides at least one input indicative of a user response to a content session presented by the user interface. A content flow engine (42) is configured to control an order of presentation of content sessions based on the at least one input and on content flow rules (44, 46, 48). |
US08533003B2 |
Method and apparatus for selecting a supplemental product to offer for sale during a transaction
According to some embodiments, a supplemental product or service may be offered to a user during a transaction, either in addition to products and/or services the user is purchasing, or as a replacement to one or more of the products and/or services that the user is purchasing. The functionality may be implemented, for example, in a retail embodiment where a user is purchasing products and/or services at a cash register or other point-of-sale terminal. One or more embodiments may be implemented online where a user is purchasing products and/or services using a computer, terminal, telephone or other client or user device and accessing a World Wide Web site, online catalog, interactive voice response unit or system, etc. |
US08532998B2 |
Selective bandwidth extension for encoding/decoding audio/speech signal
A method of receiving an audio signal includes measuring a periodicity of the audio signal to determine a checked periodicity. At least one best available subband is determined. At least one extended subband is composed, wherein composing includes reducing a ratio of composed harmonic components to composed noise components if the checked periodicity is lower than a threshold, and scaling a magnitude of the at least one extended subband based on a spectral envelope on the audio signal. |
US08532990B2 |
Speech recognition of a list entry
The present invention relates to a method of generating a candidate list from a list of entries in accordance with a string of subword units corresponding to a speech input in a speech recognition system, the list of entries including plural list entries each comprising at least one fragment having one or more subword units. For each list entry, the fragments of the list entry are compared with the string of subword units. A matching score for each of the compared fragments based on the comparison is determined. The matching score for a fragment is further based on a comparison of at least one other fragment of the same list entry with the string of subword units. A total score for each list entry is determined based on the matching scores for the compared fragments of the respective list entry. A candidate list with the best matching entries from the list of entries based on the total scores of the list entries is generated. |
US08532989B2 |
Command recognition device, command recognition method, and command recognition robot
A command recognition device includes: an utterance understanding unit that determines or selects word sequence information from speech information; speech confidence degree calculating unit that calculates degree of speech confidence based on the speech information and the word sequence information; a phrase confidence degree calculating unit that calculates a degree of phrase confidence based on image information and phrase information included in the word sequence information; and a motion control instructing unit that determines whether a command of the word sequence information should be executed based on the degree of speech confidence and the degree of phrase confidence. |
US08532979B2 |
Information processing apparatus, information processing method, and program for presenting data based upon a detection of a photographic subject
An information processing apparatus includes a holding unit configured to hold, in advance, presentation data to be presented to a person; a detection unit configured to detect, in a captured image obtained by capturing an image of a photographic subject, the photographic subject; a reading unit configured to read presentation data associated with a detection result of the photographic subject from among items of presentation data held in advance; and an output unit configured to output the read presentation data. |
US08532978B1 |
Natural language interface, compiler and de-compiler for security policies
A method and system for enabling non-programmers to create certifiable Extensible Access Control Markup Language (XACML) policies. The graphical user interface (GUI) presents a form to the security policy author using a natural language such as English, as specified by a context-free grammar. The compiler software translates the GUI's filled-in form—representing a human-readable natural language policy—into XACML code. A reverse compiler or de-compiler provides a certification of the XACML code to render the original policy in a natural language format such as English. Optionally, a tokenized intermediate form, a set of policy-specific data sets and a graph theory-based intermediate representation can be configured. Logic checks and code validation checks can be also preferably configured. Apparatus and medium claims are also provided. |
US08532975B2 |
System and method implementing a simulation acceleration capture buffer
A system and method for capturing and delivering emulation data from a hardware emulation system to a simulator running on a host workstation without considerably sacrificing emulation speed or sacrificing the emulation capacity available for a user's logic design. According to one embodiment, a system, comprises a logic software simulator running on a host workstation; a hardware emulation system having a system bus and an emulator chip, the emulator chip includes: an emulation processor cluster, and a capture buffer connected to the system bus; and a high-speed interface connecting the host workstation to the system bus of the hardware emulator, wherein the capture buffer captures a select output of the emulation processor cluster. |
US08532970B2 |
Systems and methods for network monitoring and analysis of a simulated network
Systems and methods for monitoring and analyzing components and operation of a simulated network environment including a module configured for storing a predetermined baseline for the simulated network environment, monitoring the simulated network environment during one or more operations, analyzing the monitored operations and the impact of the operations on one or more components of the simulated network environment, and comparing at least one of the monitored operations and impacts of the operations against the predetermined baseline. |
US08532968B2 |
Method of improving the production of a mature gas or oil field
A method of improving the production of a mature gas or oil field, the field comprising a plurality of existing wells, the method comprising the steps of providing a field simulator capable of predicting a production of the field in function of a given scenario, a scenario being a set of data comprising production parameters of the existing wells and, the case may be, location and production parameters of one or more new wells, determining drainage areas of the existing wells using the field simulator, determining locations of candidate new wells such that drainage areas of the candidate new wells, determined using the field simulator, do not overlap with the drainage areas of the existing wells, optimizing the value of a gain function which depends on the field production by determining a set of wells out of a plurality of sets of wells, which optimize the value of said gain function, each set of wells of said plurality of sets of wells comprising the existing wells and new wells selected among the candidate new wells. |
US08532967B2 |
Executing a utility in a distributed computing system based on an integrated model
An integrated model based on plural underlying models relating to corresponding aspects of subterranean formation development is provided. A utility is created to perform a function using the integrated model. The utility is assigned to execute in a distributed computing system having a plurality of computer node. Computations performed by the utility are distributed across the plurality of computer nodes, where the computations are related to simulations using the integrated model. |
US08532964B2 |
Computer simulation of photolithographic processing
Methods, systems, and related computer program products for photolithographic process simulation are disclosed. In one preferred embodiment, a resist processing system is simulated according to a Wiener nonlinear model thereof in which a plurality of precomputed optical intensity distributions corresponding to a respective plurality of distinct elevations in an optically exposed resist film are received, each optical intensity distribution is convolved with each of a plurality of predetermined Wiener kernels to generate a plurality of convolution results, and at least two of the convolution results are multiplied to produce at least one cross-product. A weighted summation of the plurality of convolution results and the at least one cross-product is computed using a respective plurality of predetermined Wiener coefficients to generate a Wiener output, and a resist processing system simulation result is generated based at least in part on the Wiener output. |
US08532962B2 |
Approach for planning, designing and observing building systems
A system which may enable users to plan, design and observe various building systems in an abstract and intuitive view, such as with a map view. In this view, virtually all facility information and objects may be displayed as simple shapes (e.g., rectangles). Just by some drag-and-drop, a user may provide shapes and rearrange positions of these shapes quickly to reflect a desired space relationship. Objects (e.g., components, devices, controllers, and the like) may be placed, moved around, and associated with each other on a facility layer or floor. Further, the map view may be used together with a tree view and a list view to provide alternative design ways. Changes made in any of the views may be synchronized with the other views. Various presentations of the facility may be provided. |
US08532960B2 |
Remotely collecting and managing diagnostic information
The present invention extends to methods, systems, and computer program products for remote collection and management of diagnostic information. Embodiments of the invention facilitate remote configuration, management, and collection of diagnostic results. A remote diagnostic system connects to the local diagnostics of a service or computer system in a non-invasive way to collect diagnostic information. Filter and subscription requests are used to guide the collection and retention of diagnostic information. A diagnostic user connects to the remote diagnostic system to dynamically change the filter and subscription requests as part of a diagnostic process. The collected diagnostic information can then be transmitted to interested system operators using either syndication subscriptions or push subscriptions. |
US08532955B2 |
Minimization of false trigger in a mobile electronic system
Preventative actions normally performed in response to detecting a trigger event triggered by an accelerometer attached to a portable device may be bypassed during a quiet period. The quiet period may be initiated in response to detecting at least one repeated trigger event within a time window encompassing the first trigger event, and may be terminated based on an expiration criterion. |
US08532950B2 |
Method for calibrating a stage-camera system, and a stage-camera system
In a method for calibrating a stage-camera system, a travel distance of a stage is determined in a first coordinate system and an object displacement distance of at least one object is determined in a second coordinate system. A calibration measure for calibrating the coordinate systems is computed from the travel distance and the object displacement distance. The object displacement distance is determined by registering a calibration image with a reference image based on the at least one object. The method enables an automatic and accurate calibration of the stage-camera system. |
US08532949B2 |
Computer-implemented methods and systems for classifying defects on a specimen
Various computer-implemented methods for classifying defects on a specimen are provided. One method includes assigning individual defects detected on the specimen to defect groups based on one or more characteristics of the individual defects. The method also includes displaying information about the defect groups to a user. In addition, the method includes allowing the user to assign a classification to each of the defect groups. Systems configured to classify defects on a specimen are also provided. One system includes program instructions executable on a processor for assigning individual defects detected on the specimen to defect groups based on one or more characteristics of the individual defects. The system also includes a user interface configured for displaying information about the defect groups to a user and allowing the user to assign a classification to each of the defect groups. |
US08532945B2 |
Method of estimating the non-measurable characteristics of an electrochemical system
The present invention relates to a method of estimating the internal state of an electrochemical system using mathematical models which allow management of an electrochemical battery during operation, and notably estimation of the characteristics of the battery that are not directly measurable. For applications relating to hybrid and electric vehicles, the most significant internal characteristics are the state of charge (SoC), the state of health (SoH) and the thermal state. Reconstruction of the internal characteristics is achieved using mathematical models of the battery. The method can be used synchronously with the operation of the battery itself (real time) with a reduced or off-line mathematical model, for calibration, optimization or validation of management and estimation strategies. The method is useful for battery sizing, which has to be optimized according to the energy and thermal management strategies. |
US08532938B2 |
Testing-dependent administration of a nutraceutical
A method, system, and computer program product are described for receiving a test result of a state of a subject and indicating an amount of a nutraceutical partly based on the test result and partly based on a regimen. |
US08532935B2 |
Method and device for providing offset model based calibration for analyte sensor
Methods and devices to detect analyte in body fluid are provided. Embodiments include processing sampled data from analyte sensor, determining a single, fixed, normal sensitivity value associated with the analyte sensor, estimating a windowed offset value associated with the analyte sensor for each available sampled data cluster, computing a time varying offset based on the estimated windowed offset value, and applying the time varying offset and the determined normal sensitivity value to the processed sampled data to estimate an analyte level for the sensor. |
US08532933B2 |
Insulin optimization systems and testing methods with adjusted exit criterion accounting for system noise associated with biomarkers
Embodiments of a testing method for optimizing a therapy to a diabetic patient comprise collecting at least one sampling set of biomarker data, computing a probability distribution function, a hazard function, a risk function, and a risk value for the sampling set of biomarker data wherein, wherein the probability distribution function is calculated to approximate the probability distribution of the biomarker data, the hazard function is a function which yields higher hazard values for biomarker readings in the sampling set indicative of higher risk of complications, the risk function is the product of the probability distribution function and the hazard function, and the risk value is calculated by the integral of the risk function, minimizing the risk value by adjusting the diabetic patient's therapy, and exiting the testing method when the risk value for at least one sampling set is minimized to an optimal risk level. |
US08532931B2 |
Calculating sample size for clinical trial
A method for calculating a sample size for a clinical trial of a first treatment can be provided. The method can include reading a survival curve from a clinical trial for a second treatment, wherein the clinical trial may be selected by a user interacting with a user interface. The method can further include selecting a plurality of points on the survival curve and storing coordinates for each of the plurality of points, wherein the plurality of points are selected so as to capture substantial features of the survival curve. Then, a hazard curve is generated based on the coordinates that were stored, wherein the hazard curve may be a step function. The method can further include calculating a sample size for the clinical trial of the first treatment using a Markov model based on the hazard curve. |
US08532930B2 |
Method for determining the number of copies of a chromosome in the genome of a target individual using genetic data from genetically related individuals
A system and method for determining the genetic data for one or a small set of cells, or from fragmentary DNA, where a limited quantity of genetic data is available. Genetic data for the target individual is acquired and amplified using known methods, and poorly measured base pairs, missing alleles and missing regions are reconstructed using expected similarities between the target genome and the genome of genetically related subjects. In accordance with one embodiment of the invention, incomplete genetic data from an embryonic cell is reconstructed using the more complete genetic data from a larger sample of diploid cells from one or both parents, with or without genetic data from haploid cells from one or both parents, and/or genetic data taken from other related individuals. In accordance with another embodiment of the invention, incomplete genetic data from a fetus is acquired from fetal cells, or cell-free fetal DNA isolated from the mother's blood, and the incomplete genetic data is reconstructed using the more complete genetic data from a larger sample diploid cells from one or both parents, with or without genetic data from haploid cells from one or both parents, and/or genetic data taken from other related individuals. In one embodiment, the genetic data can be reconstructed for the purposes of making phenotypic predictions. In another embodiment, the genetic data can be used to detect for aneuploides and uniparental disomy. |
US08532909B2 |
Procedure and control unit for operating a self-igniting Otto engine
Suggested is a procedure for operating a self-igniting Otto engine (OM) with at least one inlet valve (14), with one or several variably controllable outlet valves (15), with a sensor (21) for a continuous detection of an air-fuel-ratio (λ) of the Otto engine (OM) and with a sensor (22) for detecting an engine speed n of the Otto engine (OM), whereby the fuel is directly injected into at least one combustion chamber (10) and whereby the Otto engine (OM) is operated in such a way, that a desired combustion focus (MFB50%set) is adjusted. The procedure is thereby characterized, in that the self-igniting moment of the fuel is influenced by an injection moment depending on a combustion focus (MFB50%set). An independent claim relates to a control unit that is customized for controlling the process of the procedure. |
US08532907B2 |
Cruise control system and cruise control method
A cruise control system includes: a traffic condition acquisition unit that acquires a traffic condition that includes a vehicle density on a road on which a vehicle runs; and a cruise control unit that performs cruise control on the vehicle so that a following distance has a less tendency to decrease as the road gets busier. |
US08532903B2 |
Control system for internal combustion engine
A control system for an internal combustion engine having at least one fuel injection valve for injecting fuel in a combustion chamber of the engine. A main injection and a pilot injection are performed through the at least one fuel injection valve, the pilot injection being performed before the main injection. A demand output of the engine is temporarily reduced upon a request for reducing an output of the engine. The output of the engine is reduced when the demand output is reduced. A control of the pilot injection corresponding to a state where the demand output is not reduced is performed when the demand output is reduced. |
US08532902B2 |
Method for controlling at least one electromechanical parking brake unit of an electromechanical parking brake system
In a method for controlling at least one electromechanical parking brake unit in a vehicle, the current vehicle speed is detected by a speed sensor system in the form of a speed measuring signal, and a deceleration measuring signal displaying the current vehicle deceleration is detected by at least one acceleration sensor system. In the event of a defective speed signal or a failure of the speed sensor system, the electromechanical parking brake system is operated in an emergency operation mode wherein, at the beginning of a braking, a dynamic braking function is provided by the electromechanical parking brake unit. Advantageously, the current vehicle deceleration is determined from the deceleration measuring signal and compared with a pre-determined minimum deceleration value, and if the determined current vehicle deceleration falls short of the pre-determined value in the emergency operation mode, a static brake function is provided by the electromechanical parking brake unit. |
US08532897B2 |
Controller and method for detecting vehicle pull
Various embodiments of a controller for a vehicle braking system capable of determining vehicle pull during automated braking, are disclosed. The controller comprises a yaw rate input for receiving a yaw rate signal indicative of a yaw rate of the vehicle; a stability input for receiving a stability signal from a stability sensor of the vehicle; a deceleration input for receiving a deceleration signal indicative of an automated deceleration request and a brake output for transmitting a brake control signal. The controller includes control logic to determine vehicle pull based on the yaw rate signal and the stability signal. |
US08532895B2 |
Power-assistance device for a vehicle
An assist device for a vehicle including a power train connected to drive wheels by a clutch, a bus, and a power-assist parking brake. The device includes sensors that transmit signals to the bus and a mechanism for learning-based estimation of a clutch curve on the basis of the signals, the curve connecting the position of the clutch pedal and a maximum torque range that can be transmitted by the corresponding clutch and a mechanism phasing the delivered signals to reduce an influence of noise on the sensors associated with the signals. |
US08532892B2 |
Method and system for determining an accumulator pre-charge pressure in a fluid circuit
A system includes a pump, accumulator, a sensor which measures line pressure in a fluid circuit, and a controller. The controller plots and calculates respective slopes of first and second sets of measured pressure values from the sensor, calculates a slope ratio, and compares the slope ratio to a threshold. The controller also records the pre-charge pressure as the point of intersection of lines representing the slopes when the ratio exceeds the threshold. A control action is executed when the pre-charge pressure drops below a calibrated minimum threshold. A method includes measuring the pressure values, calculating the respective slopes and the slope ratio, comparing the slope ratio to a ratio threshold, recording the point of intersection of lines representing the slopes as an interpolated pre-charge pressure value when the ratio exceeds the threshold, and executing the control action. |
US08532885B1 |
Automatic GNSS signal allocation between remote and base receivers
A differential global navigation satellite system (DGNSS)-based guidance system which is capable of utilizing satellites from multiple GNSS networks, for example in a real time kinematic (RTK) system. The remote rover receiver and the base station transceiver periodically synchronize to ensure that the satellites being tracked by the rover receiver correspond with those tracked by the base station transceiver. This ensures that redundant position data is filtered out and an accurate GNSS position of the rover unit can be determined. The ability to use satellites from different GNSS networks increases the accuracy of the positioning system and increases the chance of multiple satellites being available to a receiver under a greater number of circumstances. |
US08532884B2 |
Engine-driven machine, control device for engine-driven machine, and method for controlling maximum output characteristic of engine
An engine-driven machine having plural kinds of load devices driven by an engine is provided with a load torque calculation unit that calculates a present load torque applied to the engine from a load device of at least one kind, and a control unit that performs variable control of a maximum output characteristic of the engine in accordance with the calculated load torque, such that a maximum output torque that can be outputted by the engine at the present engine revolution speed becomes a maximum output torque that is equal to or greater than the calculated load torque. |
US08532883B2 |
Device for detecting the characteristics of an impact into a motor vehicle
A device for the detection of the characteristics of an impact into a motor vehicle includes at least one signal generating unit for generating a defined acoustic impulse sequence depending on the speed of the impact, particularly a structure-borne acoustic impulse sequence due to a deformation of a chassis component of the motor vehicle. The acoustic impulse sequence is generated by way of a mechanical activation of the signal generating device caused by the deformation. A sensor system is disposed to detect the defined acoustic impulse sequence. An analysis unit analyzes the signals supplied by the sensor system such that information can be supplied on the characteristics of the impact. |
US08532882B2 |
Occupant restraint device control device
An occupant restraint device controller, including an electronic circuit substrate incorporating therein a control circuit that determines whether or not a vehicle has collided based on a detection output of a sensor detecting acceleration/deceleration of the vehicle and outputs a control signal for activating an occupant restraint tool. The electronic circuit substrate is accommodated inside a resin case provided with a structure for leading out a ground electrode from the inside to the outside of the resin case. The structure for leading out a ground electrode is configured such that a fixing leg, for fixing the electronic circuit substrate, is provided inside the case. This fixing leg is connected to a mounting portion, to be mounted to the vehicle, via a ground lead-out member that includes a first spring structure held between the fixing leg and the electronic circuit substrate, a ground terminal held between the case and part of the vehicle, and a second spring structure connecting the first spring structure to the ground terminal.As a result, grounding and sensor performance similar to that of conventional counterparts is achieved while a resin case is employed. |
US08532880B2 |
Steering assist apparatus in response to lane departure direction and vehicle in neighboring lane
A steering assist apparatus of a vehicle includes: a lane set unit to recognize an environment of ahead the vehicle; a deviation determination unit to determine whether the vehicle has a deviation tendency from a traveling lane; a steering control unit to apply steering force in a deviation avoiding direction to the steering mechanism when it is determined that the vehicle has a deviation tendency; a neighboring vehicle detection unit to detect a neighboring vehicle, which travels ahead of the vehicle in a lane next to the traveling lane of the vehicle; and an approach degree calculation unit to calculate an approach degree of the neighboring vehicle toward the vehicle. When the vehicle has a deviation tendency in a direction away from the traveling lane of the neighboring vehicle, the steering control unit reduces the steering force in the deviation avoiding direction according to an increase of the approach degree. |
US08532879B2 |
Information providing device for vehicle
An information providing device includes: a vehicle condition detector for detecting a vehicle condition; a support information generating element for generating support information for a driver; and a tactile sensibility notification element in a steering wheel for notifying the support information to the driver. The steering wheel includes a wheel element having a base, a movable portion and a driving unit. The movable portion is relatively movable with respect to the base. The driving unit drives the movable portion according to the support information. The movable portion and the driving unit provide the tactile sensibility notification element. Movement of the movable portion provides notification of the support information. |
US08532872B2 |
Tire pressure adjustment
A tire pressure adjustment method and system is provided. The method includes receiving from a plurality of sensors in a vehicle, tread depth data associated with tread depths at multiple points on a tire tread comprised by a tire on the vehicle. The tread depth data is analyzed. A tire pressure value for an internal portion of the tire is determined based on results of the analysis. The tire pressure value is associated with modifying a group of tread depths during operation of the vehicle. In response, a command signal is generated. The command signal is configured to command a tire pressure modification device to adjust a current tire pressure value of the internal portion of the tire to the determined tire pressure value. The command signal is transmitted to the tire pressure modification device resulting in the current tire pressure value being adjusted to determined tire pressure value. |
US08532871B2 |
Multi-modal vehicle operating device
A vehicle operating device includes: a voice operation unit (3) for recognizing an uttered voice and outputting a voice recognition result; a spatial operation unit (2) for recognizing a movement performed within a predetermined space and outputting a spatial recognition result; a main processing unit (4) for executing a processing corresponding to the voice recognition result and the spatial recognition result; and a display unit (5) for displaying an image generated in accordance with an instruction from the main processing unit, the image being superimposed on an actual scene that can be viewed through a windshield. |
US08532870B2 |
Driver assistance system for motor vehicle/trailer combinations
A driver assistance system for motor vehicle/trailer combinations having a towing vehicle and at least one trailer, having a sensor unit for detecting the dynamics of the trailer, an electronic analysis unit for analyzing the data of the sensor unit, and an output unit for outputting an instability signal, which indicates a dynamic instability of the trailer established by the analysis unit, and having at least one assistance function which automatically triggers and controls a braking operation under specific conditions, the assistance function being designed to limit the absolute value of the deceleration of the vehicle during the braking operation to a value as a function of the instability signal. |
US08532863B2 |
Audio based robot control and navigation
A computer implemented method for unattended detection of a current terrain to be traversed by a mobile device is disclosed. Visual input of the current terrain is received for a plurality of positions. Audio input corresponding to the current terrain is received for the plurality of positions. The video input is fused with the audio input using a classifier. The type of the current terrain is classified with the classifier. The classifier may also be employed to predict the type of terrain proximal to the current terrain. The classifier is constructed using an expectation-maximization (EM) method. |
US08532862B2 |
Driverless vehicle
Each respective vehicle of a plurality of vehicles transports a vehicle navigation system. A position determining system determines a position and a velocity of the respective vehicle and an information acquisition system is operable to determine a displacement and velocity between the respective vehicle and a vehicle adjacent to the respective vehicle. An information communication system of a respective vehicle is operable to transmit first information (that vehicle's velocity and position) to other vehicles and to receive information from other vehicles regarding their velocities and positions. A vehicle routing system can determine a target routing and target velocity for moving the respective vehicle over a path including the roadway. Based on the received or determined information, the velocity of the respective vehicle can be controlled. |
US08532855B2 |
Hybrid construction machine
A hybrid construction machine includes an engine, a hydraulic pump configured to be driven by the engine, a hydraulic actuator configured to be driven with a hydraulic pressure from the hydraulic pump, an electric motor configured to assist the driving of the engine, and a generator configured to be driven by the engine to generate power. The number of revolutions of the engine is caused to vary in accordance with the size of a load on the engine. In response to a decrease in the load requested of the engine, the engine is decelerated by causing the generator to generate power. In response to an increase in the load requested of the engine, the engine is accelerated by assisting the engine by driving the electric motor. |
US08532850B2 |
System and method for communicating data in locomotive consist or other vehicle consist
A locomotive consist includes a lead locomotive, one or more trail locomotives, and a multiple unit (MU) cable bus interconnecting the first locomotive and the trail locomotives, which is used in the locomotive consist for transferring non-network control information between the lead vehicle and the trail locomotives. In a system and method for communicating data in the locomotive consist, network data is transmitted from the lead locomotive in the locomotive consist to one or more of the trail locomotives in the locomotive consist. The network data is transmitted over the MU cable bus. Each locomotive may include a computer unit or other electronic component, which along with the MU cable bus form a network in the train, e.g., an Ethernet network. |
US08532849B1 |
System, device, and method for presenting course deviation information on an aircraft display unit
A present novel and non-trivial system, device, and method for presenting course deviation information on an aircraft display unit are disclosed. Lateral/vertical boundaries are established based upon lateral/vertical navigation data provided by one or more navigation data sources. Lateral/vertical deviation symbology data set(s) representative of lateral/vertical deviation scale(s) are generated and adapted to the lateral/vertical navigation data. The adapted lateral/vertical deviation symbology data set(s) representative of adapted lateral/vertical deviation scale(s) are provided to a display unit, whereby symbology(ies) of such adapted scale(s) are presented on a screen of the display unit. Each adapted scale is comprised of a desired course indicator and at least one deviation indicator, where the desired course indicator corresponds to a desired course and each deviation indicator corresponds to one navigation boundary. In response to changes of aircraft deviation, all indicators move together in unison within their respective, adapted deviation scale. |
US08532848B2 |
Systems and methods for alerting potential tailstrike during landing
Systems and methods for alerting for potential tailstrike during landing. A processing device located onboard an aircraft determines whether the aircraft is in a landing operational mode. If the aircraft is determined within the landing operational mode, the processing device determines whether aircraft speed is less than a previously defined threshold speed and generates an alert signal if it is determined that the aircraft's speed is less than the previously defined threshold speed. An output device located onboard the aircraft, outputs an alert based on the generated alert signal. |
US08532847B1 |
Vibration suppressing device for spacecraft
A vibration suppressing device for a spacecraft. A plurality of spacecraft deflection sensors measure a plurality of spacecraft deflections at specified locations on a spacecraft structure. A spacecraft modal coordinate calculation unit calculates a plurality of spacecraft modal coordinates. A high pass filter extracts a plurality of fluctuations of spacecraft modal coordinates. A cost function calculation unit calculates a cost function as a function of the plurality of fluctuations of spacecraft modal coordinates. A payload position calculation unit calculates an optimal payload position minimizing the cost function. A payload position adjustment device generates a control input suppressing a vibration transmitted to the payload system, and adjusts the payload position to the optimal payload position. |
US08532845B2 |
Method of monitoring the effectiveness of a damper, and a device for implementing said method
The present invention relates to a method of monitoring the effectiveness of a damper system, wherein the method consists in measuring the relative movements of two strength members, in filtering the measurements in order to isolate those that relate to the lead-lag resonant frequency of the blade, in rectifying the signal, in recording the signal, in comparing the rectified signal (S) with a threshold value (SL), in determining an initial time interval (T0) as soon as the rectified signal exceeds the threshold value (SL), in calculating the integrals of the signal from T0 to T0+δ and from T0 to T0+pδ, in calculating the ratio R of the integrals, and in comparing the ratio R with a limit value RL, and in activating and delivering an alert signal (V1) if the ratio R is greater than or equal to the limit value RL. |
US08532843B2 |
Engine automatic control system
A roadside communicator in a roadside around an intersection transmits, to vehicles around the intersection, traffic light information on traffic light at the intersection and mobile object information on vehicles and pedestrians around the intersection. An in-vehicle communicator mounted in a subject vehicle acquires the traffic light information and the mobile object information. An in-vehicle engine start determination section mounted in the subject vehicle determines a permission or prohibition of a start of an engine of the subject vehicle based on the traffic light information and mobile object information. The engine start determination section determines an engine start time in consideration of a display of the traffic light, and states of mobile objects that pass through the intersection. An in-vehicle engine control section in the subject vehicle starts the engine when the engine start determination section permits the start of the engine. |
US08532838B2 |
System, method, and computer program product for controlling energy consumption in data centers
System and method for controlling energy consumption in a data center. An embodiment includes: segregating hot air from cold air by preventing hot air exhausted from hot aisles from flowing into cold aisles; measuring temperature and relative humidity values of the segregated hot and cold air; detecting temperature and relative humidity values of outside air; mixing the segregated hot air with a volume of the outside air, the volume of the outside air depending on a result of the measuring and the detecting; measuring temperature and relative humidity values of the mixed air; comparing the temperature and relative humidity values of the mixed air and the temperature and relative humidity values of the segregated cold air to IT specifications; cooling the mixed air based on a result of the comparison; and providing the cooled mixed air in the cold aisles. |
US08532837B2 |
Household appliance
The present invention relates to a household appliance (1) comprising a control unit (4) that maintains to execute the selected program as much as possible within the discounted rate interval when the user enters the end time (tf) for the selected program, by evaluating the clock (2) data and the momentary energy tariff signal received from the sensing means (3) within the time passing until the end time (tf) and guarantees completion of the program to be executed before the selected end time (tf). |
US08532834B2 |
Method for integrating controls for captive power generation facilities with controls for metallurgical facilities
A control system for a combined power generation and metallurgical plant facility integrates generator-side and load-side control to provide coordinated operation of the two processes. The power generation facility includes one or more generator units and the metallurgical plant facility includes one or more controllable loads. Operating characteristics of the one or more loads are fed back to the one or generator units through a master controller to determine input control parameters for the one or more generator units. Similarly control signals and operating characteristics of the one or more generators are fed forward to the one or more loads through the master controller to determine input control parameters for the one or more loads. Using feed-forward as well as feed-back loops to exchange generator output and load set-point information, power balance between the generator units and controlled loads is maintained within an operating envelope. |
US08532830B2 |
Method and apparatus for controlling a compressor and method of cooling a hydrocarbon stream
Method and apparatus for controlling one or more first compressors (12), through which a compressor feed stream (10) is passed. At least one throttling valve (32) is provided downstream of a compressor recycle line (22), which is provided around the or each first compressor (12) and includes an in-line first recycle valve (24). Sometimes, at least a fraction of the compressor feed stream (10) is selectively allowed to bypass the or each first compressor (12) and the at least one throttling valve, via a bypass line (60). At least one of the throttling valves (32) is automatically controlled using the measurement values of at least one pressure and at least one flow of the group consisting of: the pressure (P1) of the compressor feed stream (10), the flow (F1) of the compressor feed stream (10), the pressure (P2) of the first compressed stream (20) and the flow (F2) of the first compressed stream (20). A first compressor controlled this way may be used in a method of cooling an initial hydrocarbon stream (100). |
US08532829B2 |
Controller for water treatment
A controller for water treatment in a cooling system includes a processor, a user interface, a plurality of relays, at least one network port, and at least one communication port. The processor is configured to monitor cooling fluid in the cooling system and cause the system to drain fluid when an amount of dissolved solid in the fluid exceeds a predetermined threshold. The plurality of relays are configured for both wet operation and dry operation. The controller is accessed using a web server on the controller through a communication port. The controller is controller and control parameters are modified via the web server. A relay of the plurality of relays in the controller is configured for either wet operation or dry operation. The configuration of the relay of the plurality of relays is dynamically changed to the other of wet operation or dry operation. |
US08532827B2 |
Prospective determination of processor wake-up conditions in energy buffered HVAC control unit
A thermostat includes at least a housing, a user interface, a memory, an environmental sensor, and a processing system. The processing system may be configured to operate in a wake state and a sleep state by determining wake-up conditions upon which the processor is to enter into the wake state from the sleep state that includes a threshold value associated with an environmental condition sensed by the environmental sensor, causing the wake-up conditions to be stored in the memory, operating in the sleep state during a time interval subsequent to causing the wake-up conditions to be stored in the memory, determining whether at least one of the wake-up conditions has been met, and operating in the wake state upon a determination that the at least one wake-up condition has been met. |
US08532824B2 |
Control device for robot
A control device for a robot determines, as a desired driving force to be imparted to a joint, a component value corresponding to the displacement amount of each joint out of a desired generalized force vector τcmd that satisfies the relationship indicated by expression 01 given below by using basic parameter group of M, N, and G, Jacobian matrixes Jc and Js, a desired value ↑C of the motion acceleration of a contact portion representative element representing a motion of a contact portion of a robot 1, generalized variable observation information, and a desired value ↑S′ of a first-order differential value of a predetermine type of state amount, and then controls the operation of an actuator of the robot 1 on the basis of the determined desired driving force. S′+(Js*M−1*Tc−Js′)*q′=(Js*M−1*Pc)*(τcmd−τcmpn) Expression 01 |
US08532821B2 |
Automatic veering structure for floor cleaning apparatus
An automatic veering structure for a floor cleaning apparatus comprises a driving wheel set to control moving direction of the floor cleaning apparatus, an auxiliary wheel set and a buffer module. It also has a detection module to detect whether the auxiliary wheel set is suspended in the air and whether the buffer module bumps into an obstacle, then output a first detection signal and a second detection signal to a control module to determine whether to trigger the driving wheel set to drive the floor cleaning apparatus to veer to prevent the floor cleaning apparatus from suspending and falling, or stopping moving when encounters the obstacle. Thus the lifespan of the floor cleaning apparatus is lengthened and cleaning efficiency improves. |
US08532819B2 |
Manipulator with camera
Provided is a manipulator with at least one camera capable of observing an end effector from a direction suitable for work. A rotating portion rotatable coaxially with the end effector is provided to a link adjacent to a link located at a manipulator tip end. At least one camera for recognizing a work piece as an object is arranged on the rotating portion through a camera platform. An actuator for controlling a rotation angle of the rotating portion is driven according to a rotation angle of the link located at the manipulator tip end, and thus the camera is arranged in a direction perpendicular to a plane where the end effector can move when the end effector performs a grip work. In an assembly work, the rotating portion is rotated such that the camera is arranged in a direction parallel to the plane where the end effector can move. |
US08532816B2 |
Truck restraint for loading dock
A device for restraining a horizontal bar at the rear of a vehicle to a stationary support adjacent a loading dock, the device having: a frame having a vertical track and a mounting bracket for securing the frame to the stationary support; a suspended carriage mounted to the track for vertical movement relative to the track, the suspended carriage having a forwardly and upwardly extending member. |
US08532813B2 |
Method of controlling thread cutting
A method includes: (a) transferring a tool to where thread cutting is to start; (b) cutting threads in work with the tool; (c) performing tool deceleration along the Z-axis and acceleration along the X-axis during a predetermined acceleration/deceleration time Ta to retract the tool along the X-axis; and (d) returning the tool to a reference point. In Step (c), to shorten the incomplete thread portion, a command is issued concurrently with the start of the acceleration/deceleration time Ta to realize a pullout speed Ve along the X-axis that exceeds an allowable maximum speed Vmax to increase the acceleration along the X-axis. The speed command for moving the tool along the X-axis is maintained at the value of zero from the elapse of command time Te until the acceleration/deceleration time Ta expires to maintain the actual speed of the tool along the X-axis at or below the allowable maximum speed Vmax. |
US08532812B2 |
System and method for identifying defects of surfaces due to machining processes
Embodiments of the invention disclose a method for determining defects of a surface of a model of an object generated from a model of an original object by a simulation of a machining process. The method determines orientations and rate of change in the orientation of the surface based on normal vectors to the surface and identifies the defects of the surface based on the rate of change and a threshold. The threshold is determined based on the machining process. |
US08532811B2 |
Apparatus for and method of measuring workpiece on machine tool
A workpiece measuring apparatus has an external module provided outside an NC device to acquire position data of one or more movable axes of a movable unit having a measuring head attached thereto. The position data of the measuring head is acquired at the same time interval as that for the distance measurement by the measuring head. The position of the workpiece is acquired by calculation from the acquired distance measurement data and the position data of the measuring head. The continuous shape of the workpiece can be measured by performing continuous measurement while moving the measuring head. Therefore, no modification or change is required such as adding a new function to the NC device. In addition, the present invention is applicable to any machine tool equipped with an NC device of any configuration, without being restricted by constraints of the NC device. |
US08532809B2 |
Network of fully automatic self-service key duplicating kiosks
A self-service, fully-automatic kiosk for duplicating keys includes a kiosk housing having a customer interface for receiving payment from a customer for the purchase of at least one duplicate of the customer's key. A key analysis system within the housing analyzes the blade of a key inserted in the key-receiving entry to determine whether the inserted key matches one of a group of preselected key types and, if so, which preselected key type is matched. A key blank extraction system extracts from a magazine within the kiosk a key blank for the preselected key type matched by the blade of the key inserted in the key-receiving entry. Then a key duplicating system within the kiosk replicates the tooth pattern of the blade of the key inserted in the key-receiving entry, on the blade of the extracted key blank. |
US08532808B2 |
Systems and methods for measuring and verifying energy savings in buildings
A computer system for use with a building management system in a building includes a processing circuit configured to use historical data received from the building management system to automatically select a set of variables estimated to be significant to energy usage in the building. The processing circuit is further configured to apply a regression analysis to the selected set of variables to generate a baseline model for predicting energy usage in the building. |
US08532807B2 |
Pre-operative planning and manufacturing method for orthopedic procedure
A pre-operative planning and manufacturing method for orthopedic surgery includes obtaining pre-operative medical image data representing a joint portion of a patient. The method also includes constructing a three-dimensional digital model of the joint portion and manufacturing a patient-specific alignment guide for the joint portion from the three-dimensional digital model of the joint portion when the image data is sufficient to construct the three-dimensional digital model of the joint portion. The patient-specific alignment guide has a three-dimensional patient-specific surface pre-operatively configured to nest and closely conform to a corresponding surface of the joint portion of the patient in only one position relative to the joint portion. The method further includes determining, from the image data, a size of a non-custom implant to be implanted in the patient and manufacturing the non-custom implant when there is insufficient image data to construct the patient-specific alignment guide therefrom. |
US08532806B1 |
Process for manufacture of joint implants
An implant and process for manufacturing the implant for a joint of a patient comprises determining a dimension of a bone in the joint, generating a three-dimensional image of the bone, converting the image into a CAD model, determining a three-dimensional design for the implant according to the dimension of the bone, activating an electron beam melter, and additive-manufacturing the implant with the electron beam melter, the implant having a dimension equal to the dimension of the bone, the implant comprising a porous material. The porous material can be an osteoconductive material or an osteoinductive material or a combination thereof. |
US08532805B2 |
System and method for controlling a manufacturing process
A method and a system control a manufacturing process of a plant via a MES system. The MES system is provided with a catalogue of a tool model, the catalogue of the tool model contains tool entities and tool methods on the tool entities. The tool entities contain engineering-time tool entities and run-time tool entities and the tool methods contain engineering-time tool methods and run-time tool methods. At engineering time or at run time, via a tool manager, the tool model catalogue is exposed and information on the tool model data is stored in a database. At engineering time, the specific engineering-time tool entities are defined by invoking engineering-time tool methods. At run time the specific tool entities are instantiated into run-time tool objects and the manufacturing process is controlled relative to physical plant tools by invoking the run-time tool methods on the run-time tool objects. |
US08532804B2 |
Predictive resampler scheduler algorithm
A predictive resampler scheduler algorithm may be provided. An audio frame may be received from a producer. The audio frame may be transmitted to a consumer and a delay between receiving the audio frame and transmitting the audio frame may be calculated. In response to determining that the delay comprises a value not within a threshold time range, the size of the audio frame may be modified prior to transmitting the frame to the consumer. |
US08532797B2 |
Mechanism for constructing generic control logic including versions in various protocols
A mechanism for constructing generic control logic with versions of the logic automatically generated and stored for one or more protocols. The complexity of the one or more protocols may be hidden under a hood of the mechanism from the view of engineers, programmers and users so as to improve their productivity relative to control logic designs and applications. |
US08532791B2 |
Medical pacing wires
A medical pacing wire comprising a clamp that is adapted to be moved between an open position and a closed position and further adapted to allow a user to attach an electrode to a living tissue. In particular embodiments, the medical pacing wire may include a memory shape alloy having a memory state, which is adapted to cause the clamp to move from the closed position toward the open position when the memory shape alloy is caused to move from a non-memory state to the memory state. Also, in some embodiments, the clamp may comprise a superelastic material, and the medical pacing wire may be adapted to allow a user to remotely cause the clamp to substantially release the living tissue that has been closed within the clamp without substantially damaging the living tissue. |
US08532790B2 |
Slidable fixation device for securing a medical implant
A fixation device for retaining a leadless medical implant to tissue includes an annular collar and an array of self-expanding tines extending from the collar. When deployed, the annular collar encircles the implant and the tines are preset to splay outwardly from the implant to grab body tissue and anchor the implant at a treatment site. The implant and fixation device are contained within a sheath for delivery to the treatment site and a pushing force is applied to a pusher of the delivery system to distally advance the fixation device relative to the implant and deploy the tines. A distal end of the implant having an electrode may form a distal tip of the delivery system, and a potential implantation site may be tested prior to deployment of the fixation device to allow for easy repositioning of the implant if the potential implantation site is determined to be unacceptable. |
US08532784B2 |
Direct memory access (DMA) controlled stimulation
An implantable stimulation system (e.g., an implantable neurostimulation system (INS)) comprises memory including a first table and a second table. The first table stores blocks of stimulation event data corresponding to stimulation events that are to be performed during a period of time (e.g., a 0.5 sec. or 1 sec. period of time). The second table stores blocks of next stimulation event time data corresponding to the period of time. The implantable stimulation system also includes a direct memory access (DMA) controller including a first DMA channel and a second DMA channel. The first DMA channel selectively transfers one of the blocks stimulation event data from the first table to one or more registers that are used to control stimulation events. The second DMA channel selectively transfers one of the blocks of next stimulation event time data from the second table to a timer that is used to control timing associated with the stimulation events. In this manner, the DMA controller is able to control stimulation. |
US08532783B2 |
Impact protection for implants
An implantable device includes an implantable housing having an outer surface and providing a hermetically sealed interior volume. A flexible electric lead is mechanically connected to the housing and electrically connected to circuitry within the interior volume. An impact protector overlies at least a portion of the outer surface of the housing and shields the underlying housing surface from the force of a mechanical impact. At least a portion of the impact protector may include an electrode electrically connected to the circuitry within the interior volume. |
US08532781B1 |
Methods and systems of generating a graphical representation of an intracochlear trajectory of electrodes
Exemplary methods and systems of generating a graphical representation of an intracochlear trajectory of electrodes include using electrical field imaging to generate an electrical field spread curve for each of a plurality of electrodes contained within an electrode array at least partially inserted within a cochlear implant patient and generating a graphical representation of an intracochlear trajectory of the electrodes based on the electrical field spread curves. |
US08532776B2 |
Package for an implantable neural stimulation device
The present invention is an improved hermetic package for implantation in the human body. The implantable device of the present invention includes an eclectically non-conductive bass including electrically conductive vias through the substrate. A circuit is flip-chip bonded to a subset of the vias. A second circuit is wire bonded to another subset of the vias. Finally, a cover is bonded to the substrate such that the cover, substrate and vias form a hermetic package. |
US08532775B2 |
Modular medical device programmer
A medical device programmer comprises a medical device module and a computer module. The medical device module comprises a telemetry module that wirelessly communicates with an implantable medical device (IMD) and a medical device module processor communicates with the IMD via the telemetry module. The computer module housing mates with the medical device module housing to form a congruent external surface of the programmer. The computer module comprises a user interface including a touchscreen that displays data received from the IMD and receives input from a user, a memory that stores selectable patient therapy parameters for the IMD, a computer module interface in electrical communication with the medical device module interface, and a computer module processor that communicates with the medical device module. The medical device module processor forwards communications between the computer module processor and the IMD via the medical device module interface and the telemetry module. |
US08532772B2 |
Method and apparatus for post-processing of episodes detected by a medical device
A method and system of post-processing of sensing data generated by a medical device that includes transmitting a plurality of stored sensing data generated by the medical device to an access device, the stored sensing data including sensed atrial events and sensed ventricular events. The access device determines, in response to the transmitted data, instances where the medical device identified a cardiac event being detected in response to the sensing data, and determines, in response to the transmitted sensing data, whether one of the sensed ventricular events and the sensed atrial events is initiating conduction of a heart associated with the stored sensing data. |
US08532771B2 |
Maximum pacing rate limiter system
A maximum pacing rate limiter for use in adaptive rate pacing in conjunction with a cardiac rhythm management system for a heart. The maximum pacing rate limiter may function to measure an interval, termed the ERT interval, between a paced ventricular evoked response and a T-wave. The maximum pacing rate limiter may further function to maintain the ERT interval at less than a certain percentage of the total cardiac cycle. In one disclosed embodiment, a maximum pacing rate limiter calculates an ERT rate based on the detected paced ventricular evoked response and the T-wave, and the pacing rate limiter module further communicates the minimum of the ERT rate and an adaptive-rate sensor indicated rate to a pacemaker. |
US08532768B2 |
Electrotherapy device for treating tachycardiac arrhythmias of a heart
An electrotherapy system, particularly an implantable heart stimulator, is configured as an electronic implant for electrical anti-tachycardia therapy of the heart, and includes at least one programmable therapy sequence (i.e. a sequence of several therapies that are delivered, one after the other, to treat a VT/VF episode). The implant has a therapy success memory for storing therapy success statistics for each therapy, as well as a therapy control unit that is configured to automatically undertake adaptation of the order of the therapies within a therapy sequence as a function of currently stored therapy success statistics. |
US08532762B2 |
Discriminating polymorphic and monomorphic cardiac rhythms using template generation
Cardiac arrhythmias are classified based on the morphology of the arrhythmia episode beats. Templates are formed using morphological features of the cardiac beats of the episode. The arrhythmia episode is classified as a monomorphic tachyarrhythmia or polymorphic tachyarrhythmia based on the one or more templates. The arrhythmia episode may be classified based on a number templates formed from the arrhythmia episode. The templates are formed by determining a measure of similarity between morphological features of a cardiac beat to a template. The similarities can be determined based on a pairing rule that determines which beat morphologies are compared. Selection of therapy for treating the arrhythmia episode may depend on the historical success of a therapy at mitigating previous arrhythmias of the same type as the arrhythmia episode. |
US08532759B2 |
Sensor signal alignment
Methods and systems, including computer readable mediums, are provided for transforming a measurement made relative to a first reference frame into a corresponding measurement relative to a second reference frame. Sensor signals that are produced by sensors in response to the sensors' motion relative to the first reference frame are transformed using a transformation matrix. The transformation generates corrected sensor signals that are relative to the axes of the second reference frame. |
US08532756B2 |
Method for analyzing function of the brain and other complex systems
A method and system are provided for analyzing electromagnetic brain signals such as EEG and ECoG signals in a subject in real time and which avoids the need for time-intensive retrospective analysis of brain activity in the subject. This can be applied to all complex systems with multiple fluctuating signals to identify and predict significant events. |
US08532755B2 |
ECG electrode and electrode support
An electrically non-conductive back plate for supporting the back of a patient in a supine position comprises on its front face facing the back of the patient a pair or more of ECG electrodes capable of maintaining electrically conductive skin contact with the patient's back. The pair of ECG electrodes is disposed at a sharp angle with the mean heart vector, in particular so as to form an angle β of about 45°±25° with the projection S of the patient's spine on the back plate. Also disclosed is an ECG electrode for mounting in a recess of the back plate and an apparatus for treating cardiac arrest by compression of the sternum comprising the back plate. |
US08532752B2 |
Biosignal amplifying device
A biosignal amplifying device includes: an operational amplifier (op-amp); a capacitor load including a first capacitor connected with a first input terminal of the op-amp, and in which a first voltage is inputted from a first electrode, and a second capacitor which is connected with a second input terminal of the op-amp, and in which a second voltage is inputted from a second electrode; a feedback capacitor load including a first feedback capacitor connected with the first input terminal and an output terminal, and a second feedback capacitor connected with the second input terminal; and a feedback resistor load including a first feedback resistor connected with the first input terminal and the output terminal, and a second feedback resistor connected with the second input terminal. |
US08532748B2 |
Devices useful in imaging
Biopsy devices and methods useful with Positron Emission Tomography (PET) and Breast Specific Gamma Imaging (BSGI) are disclosed. A biopsy device including a flexible tube having a side aperture, and a PET or BSGI imageable material disposed within the flexible tube is disclosed. A biopsy method is disclosed that includes advancing a flexible tube having a PET or BSGI imageable material distally through the biopsy device. Various other embodiments and applications are disclosed. |
US08532745B2 |
Breast biopsy and needle localization using tomosynthesis systems
Methods, devices, apparatuses and systems are disclosed for performing mammography, such as utilizing tomosynthesis in combination with breast biopsy. |
US08532744B2 |
Method and system for design of spectral filter to classify tissue and material from multi-energy images
A method, system and apparatus for filtering multi-energy images using spectral filtering technique is described. In one embodiment, the method includes obtaining a first image of an anatomical object corresponding to a first radiation energy. In addition, the method includes obtaining at least one additional image, herein called a second image of the anatomical object corresponding to at least one second radiation energy. The at least one second radiation energy is distinct from the first radiation energy. The method also includes determining joint attenuation characteristics of each tissue at the first radiation energy and at the second radiation energy or their derivatives. The method also includes selectively filtering attenuation value in a multi-energy space due to at least one tissue to generate a filtered image from a reference image. The reference image is one of the first image or the second image or their derivatives. |
US08532733B2 |
Mapping guidelet
The medical lead delivery device more easily and quickly delivers a lead to or through the coronary vein of a patient's heart. The medical lead delivery device includes an elongated body, a controller, a first and second spring, and a sleeve. The elongated body includes a proximal end and a distal end. The controller is disposed at the proximal end and provides enhanced control of the distal tip of the elongated body. |
US08532731B2 |
Methods of determining analyte concentration
A region of skin, other than the fingertips, is stimulated. After stimulation, an opening is created in the skin (e.g., by lancing the skin) to cause a flow of body fluid from the region. At least a portion of this body fluid is transported to a testing device where the concentration of analyte (e.g., glucose) in the body fluid is then determined. It is found that the stimulation of the skin provides results that are generally closer to the results of measurements from the fingertips, the traditional site for obtaining body fluid for analyte testing. |
US08532729B2 |
Moldable ear sensor
The present disclosure relates to sensors for use on a patient's ear. The sensors as provided may include a moldable member, such as a putty. The moldable member may be molded in place to affix the optical components of the sensor to a patient's ear tissue. For example, the moldable member may be sculpted around a curvature of a patient's earlobe. In particular embodiments, the moldable member may be activated, e.g., hardened, by exposure to particular temperatures or by exposure to light. |
US08532726B2 |
Invasive chemometry
The invention relates to methods and devices for assessing one or more components of a selected tissue in an animal. The present invention permits non-invasive assessment of tissue components in a body structure containing multiple tissue types by assessing multiple regions of the animal's body for an optical characteristic of the tissue of interest and separately assessing one or more optical (e.g., Raman or NIR) characteristics of the tissue component for one or more regions that exhibit the optical characteristic of the tissue of interest. |
US08532725B2 |
Parallel connected HTS utility device and method of using same
A method of controlling fault currents within a utility power grid is provided. The method may include coupling a superconducting electrical path between a first and a second node within the utility power grid and coupling a non-superconducting electrical path between the first and second nodes within the utility power grid. The superconducting electrical path and the non-superconducting electrical path may be electrically connected in parallel. The superconducting electrical path may have a lower series impedance, when operated below a critical current level, than the non-superconducting electrical path. The superconducting electrical path may have a higher series impedance, when operated at or above the critical current level, than the non-superconductor electrical path. |
US08532721B2 |
Portable electronic device having sliding display providing event notification
A handheld electronic device comprises a housing having a keyboard support member on a front thereof and a base defining a cavity therebetween, wherein light generated within the cavity can be viewed from a front of the housing; a display assembly slidably mounted to the housing and comprising a display screen on a front face thereof, the display assembly being slidable between a retracted position and an extended position, wherein in the retracted position a lower portion of the display screen is received within the cavity underlying the keyboard support member and an upper portion of the display screen is viewable outside of the cavity, and in the extended position the lower portion and the upper portion of the display screen are viewable outside of the cavity, wherein the display screen is a light emitting diode display screen comprising a plurality of pixels that are selectively illuminatable to display an image; a processor configured to control operation of the display screen; and a position sensor for indicating to the processor when the display assembly is in the retracted position. When the position sensor indicates the display assembly is in the retracted position, and upon an occurrence of one or more predetermined events, the processor is configured to generate an event notification by illuminating pixels in the lower portion of the display screen. |
US08532719B2 |
Methods and systems for application procedure management
Methods and systems for application procedure management are provided. First, an event is received, wherein the event defines a normal procedure and a specific procedure. In response to the event, a sensor is activated to detect a presence of at least one object. If the presence of the object is not detected, the normal procedure for the event is performed. If the presence of the object is detected, the specific procedure for the event is performed. In some embodiments, the executed specific procedure includes inactivating a display unit. |
US08532715B2 |
Method for generating audible location alarm from ear level device
An audible location alarm is generated from an ear-level device of a type comprising a memory, a microphone and a speaker, each coupled to a processor. Communication is established between the ear-level device and a companion device, the companion device having an interface, a display associated with the user interface, and an audible location alarm program stored therein. The audible location alarm program is initiated. An audible location alarm signal is transmitted to the ear-level device, thereby providing instruction to the ear-level device to broadcast an audible location alarm through the speaker of the ear level device until detection of an end event. |
US08532711B2 |
Mobile terminal device, and program used in mobile terminal device
A mobile terminal device, which is provided with the plurality of keys, includes: a touch detection interface for detecting that a user has touched a key; a press detection interface for detecting that the user has pressed the key; a controller for switching the mode in response to whether or not the user has touched a side key, in order to execute a first function assigned to the key in a case where the key is pressed by the user in a “shift mode,” and to execute a second function assigned to the key in a case where the key is pressed by the user in a “normal mode”; and a display unit for displaying an explanation on the first function assigned to the key in a case where it is detected in the “shift mode” that the user has touched the key. |
US08532710B2 |
Integrated dialing
Call initiation on a device with potential for a large number of stored telephone numbers is simplified through the use of an integrated field for entry of an ambiguous filter string. As it is not clear, a priori, whether the user is manually specifying, in the integrated field, a telephone number or providing a filter string for filtering contacts, filtering is performed based on at least one filter string. Among the contacts that are part of a filtering result list, a default contact is selected for quick access. |
US08532709B2 |
Method and apparatus for automatically converting phone number while roaming
Provided are a method of automatically converting a phone number while roaming using a mobile communication terminal, and a mobile communication terminal using the method. The mobile communication terminal sets an automatic conversion mode, stores at least one phone number, reads a phone number selected by a user from among the at least one stored phone number, converts the read phone number to be suitable for an international phone system of a visited country for connection to a home country if the set automatic conversion mode is ON upon when a calling command is input, and controls every module of the mobile communication terminal such that a call can be made to the converted phone number. |
US08532704B2 |
Terminal of supporting enhanced near field communication and its processing method
The present invention provides a terminal supporting eNFC and its processing method, in which a card emulation mode is disabled when a user card does not support SWP, and NFC in non card emulation modes can further be supported. A mobile terminal disabling/enabling the NFC function is implemented by the interaction of the mobile terminal with a NFC emulation front end chip therein. When the terminal determines that the user card does not support the SWP interface, it disables the NFC function. If the terminal is required to work in a non card emulation mode, the terminal starts a NFC application in the non card emulation, mode, and enables the NFC function when determining that the NFC function is in a disabled state; after the NFC ends, the terminal disables the NFC function when determining that the user card does not support the SWP interface. |
US08532702B2 |
Mobile electronic device with sound output function
According to one embodiment, a mobile electronic device includes a heat source unit that generates heat, a housing for holding the heat source unit; a temperature detection unit for detecting the temperature of the housing, a communication unit for performing communications, a sound output unit for outputting sound relating to the communications, and a control unit for controlling the heat source unit and the communication unit. The control unit changes sound output from the sound output unit depending on the temperature detected by the temperature detection unit and a set temperature. |
US08532700B2 |
Method and apparatus for accessing a network service
A method and apparatus for initiating a call are disclosed. For example, the method receives via a tri-mode mobile endpoint device a request for initiating a call and a selection of an access mode from a user, wherein the tri-mode mobile endpoint device is capable of operating in a cellular mode, a Wi-Fi mode, and a wire-based mode for initiating the call. The method then provides the call using the selection of the access mode. |
US08532695B2 |
Mobile telephone, telephone number managing server, telephone number changing system, telephone number requesting method, and telephone number requesting program
It is desired from the viewpoints of accessory and economy to make common use of one telephone number among a plurality of mobile telephones. A server makes an ID intrinsic to a mobile telephone and a telephone number correspond to each other thereby to relay communications between the mobile telephones made to correspond. A mobile telephone requests the server managing the telephone number and the ID of the mobile telephone from itself via the Internet, to change the correspondence between the telephone number and the mobile telephone ID. In response to this request, the server changes the correspondence between the telephone number and the mobile telephone ID. |
US08532694B2 |
Interface authorization scheme
An authorization scheme controls whether an interface is established between communication nodes. Such a scheme may be used, for example, to determine whether to establish a direct interface (e.g., an X2 interface) between a pair of access points. A decision to establish a direct interface between nodes may be based on a node type of one or both of the nodes. A decision to establish a direct interface between nodes may be based on whether the nodes belong to the same group. |
US08532691B2 |
Method and device for controlling a transmit power in a radio communications system
A method for controlling a transmit power in a radio communications system includes receiving a request to increase a transmit power of an uplink channel and determining whether the transmit power was at a maximum upon receipt of a previous request to increase the transmit power preceding the received request. If the transmit power was not at the maximum upon receipt of the previous request, the transmit power is increased by a first step size and if the transmit power was at the maximum upon receipt of the previous request, the transmit power is increased by a second step size greater than the first step size. |
US08532690B2 |
Uplink control channel transit power control based on received transmission
A method and device are configured to receive, in simultaneous communication with stations via a wireless interface power control, commands from the stations. The method and device are configured to receive from a control unit further control information associated with a transmission parameter for use by the device for one or more transmissions to one of the stations other than the station that received transmissions from the device with a best quality parameter. The method and device are also configured to control one or more transmissions from the device to the one of the stations on the basis of a power control command from the station that receives transmissions from the device with the best quality parameter, and on the basis of the further control information received from the control unit. The further control information comprises a control command selected from control commands by the control unit. |
US08532684B2 |
Interference reduction apparatus and interference reduction method thereof
The present invention relates to an interference reduction apparatus, an interference reduction method and a computer storage medium. The interference reduction apparatus can estimates the channel of the cells comprehensively to obtain the combination information and the interference power level information. The combination information and the interference power level information is used to combine at least one precoding matrix of he codebook with each other to generate a combined precoding matrix which acts as the strongest signal power from the interference reduction apparatus and the weakest interference from the neighboring cells. |
US08532680B2 |
Apparatus and method for compressing and restoring SMS message
An apparatus and method for compressing and restoring a Short Message Service (SMS) are provided. The apparatus includes an input unit through characters are input by a user; a display unit displays the characters input by a user; a control unit which compares the characters input by the user with a stored sentence table of recommended sentences to determine whether there is at least one recommended sentence in the sentence table that corresponds to the input characters, and if it is determined that there is the at least one recommended sentence that corresponds to the input characters, controls the display unit to display the at least one recommended sentence; a converting unit which converts a recommended sentence selected by the user from among the at least one recommended sentence into a compression code; and a transmission unit which transmits an SMS message that includes the recommended sentence converted into the compression code. |
US08532679B2 |
System and method for providing a single telephone number for use with a plurality of telephone handsets
Systems and methods providing integrated voice and data services utilizing wired cordless access with unlicensed/unregulated connectivity sources and wireless access with licensed/regulated connectivity sources. A single telephone directory number is assigned for use with both a mobile wireless telephone and for use with a cordless wired Internet Protocol (IP) telephone. The mobile wireless telephone operates via a conventional licensed spectrum wireless network, and the IP telephone operates over voice over Internet protocol (VoIP) over a broadband packet data network service. Incoming calls simultaneously ring the user's mobile wireless telephone and IP telephone. The user may be provided a personal voice mailbox that may be accessed from their mobile wireless telephone or from their IP telephone. The user may be provided a single services bill associated with use of both telephones. |
US08532678B2 |
Portable GPS navigation device
A portable GPS navigation device displays map information and navigation instructions; the device (a) includes a two-way wireless transceiver operable to connect to a mobile telephone; (b) is operable to enable a user to control one or more functions of the mobile telephone and (c) includes an audio output and a microphone to enable a voice call to be made using the mobile telephone. |
US08532677B2 |
Model based channel state information feedback
The proposed methods and devices provide a new technique for feeding back CSI information of a channel between a network element and a user equipment to the network element by feeding back a location of the user equipment. The new technique opens completely new options for multi user scheduling and channel prediction. According to embodiments, a proposed user equipment configuration is indicated to the user by the user equipment. |
US08532664B2 |
Method and apparatus to improve CDMA reverse link performance
Reverse link reception and reverse link capacity are improved at a multi-sector radio base station (RBS) by forcing always-softer reverse link handoff conditions for mobile stations served by the RBS. Whenever a serving sector reverse link is assigned to a mobile station at the RBS, one or more additional reverse links are assigned to it from remaining sectors of the RBS. Such assignments are made irrespective of whether those sectors are, or could be, used to serve the mobile station on the forward link. The RBS improves its reception of the mobile station's reverse link transmissions by combining signals from all of the assigned reverse links. With improved reception, mobile stations can be commanded or configured to reduce their reverse link transmit power, thereby reducing reverse link interference and increasing reverse link capacity. Always-softer handoff may not be forced unless the mobile station has a reverse supplemental channel, since the use of such channels makes interference reduction particularly beneficial. |
US08532663B2 |
Configuring a base station to act as a regional mobility agent
Described herein are mechanisms and methods that facilitate utilizing a base station as a regional mobility agent (e.g., regional home agent, regional foreign agent, and/or the like). Thus, a base station can have functionality embedded therein that enables the base station to create tunnels with other base stations and selectively direct data intended for a wireless terminal to those base stations. Such base stations can then transmit the data to the wireless terminal. |
US08532660B2 |
Method and apparatus for directing traffic between overlying macrocells and microcells
The present invention provides embodiments of methods for directing traffic between cells of different sizes. One embodiment of the method includes determining, at a mobile unit, whether to hand off from a source cell to a target cell based on information indicating sizes of coverage areas of the source cell and the target cell. |
US08532658B2 |
Neighbor list provision in a communication network
Techniques for neighbor list provision in a communication network are described. From an access terminal, a query for potential access points within communication range of the access terminal is received; and neighbor list information is provided to the access terminal. The neighbor list information is associated with available access points capable of providing the access terminal with access to a network. |
US08532657B2 |
System, method, and computer-readable medium for user equipment registration and authentication processing by a femtocell system
A system, method, and computer readable medium for processing registration and authentication procedures by an IP-based femtocell system are provided. The femtocell system includes a base transceiver station and a Session Initiation Protocol to Internet Operating System adapter. The femtocell system receives a registration message from a user equipment, issues a location update request on behalf of the user equipment, transmits a register message to a core network, receives an authentication request from the core network, and transmits an authentication challenge to the user equipment. |
US08532656B2 |
System, method, and computer-readable medium for short message service termination processing by a femtocell system
A system, method, and computer readable medium for processing short message service terminations in a communication system featuring an IP-based femtocell system are provided. The femtocell system includes a base transceiver station and a Session Initiation Protocol to Internet Operating System adapter. The femtocell system receives message content from a core network over a packet interface that is to be delivered to a user equipment serviced by the femtocell system and depacketizes the message content. The Session Initiation Protocol to Internet Operating System adapter conveys the depacketized message content to the base transceiver station which transmits the message content to the user equipment via a data burst. |
US08532654B2 |
Detecting subscriber input via a wireless communication device for initiating network provisioning of such device
Methods, systems, and apparatus for detecting subscriber input via a wireless communication device for initiating network provisioning of the wireless communication device are presented herein. A method can include receiving, via an interface of a wireless communication device, a first input from a subscriber of a wireless service associated with the wireless communication device; sending, by the wireless communication device based on the first input from the subscriber, a request for provisioning the wireless communication device via a wireless network associated with the wireless service; and outputting, via the interface of the wireless communication device, a first message including a condition for the provisioning the wireless communication device via the wireless network based on the request. In an example, the method can further include receiving, based on the request, the condition from a component of the wireless network. |
US08532653B2 |
Managing control signalling over different radio access technologies (RATS) using different types of spectrum
A wireless multimedia point-to-multipoint network using different radio access technologies (RATs) is disclosed. Paired and unpaired frequency division duplexing (FDD) cellular spectrum may be used by the RATs. Controlling signaling and traffic may be sent using different RATs. |
US08532647B2 |
Method and apparatus for determining downlink beamforming vectors in hierarchical cell communication system
Provided is a method and apparatus for determining a downlink beamforming vector in a hierarchical cell communication system. Small base stations may determine transmit beamforming vectors of the small base stations so that interference from the small base stations may be reduced in a macro terminal. A macro terminal and small terminals may determine receive beamforming vectors based on the transmit beamforming vectors of the small base stations. A macro base station may determine a transmit beamforming vector based on effective channels to terminals using the receive beamforming vectors of the terminals. |
US08532644B2 |
System effective to modulate a code and provide content to a user
A system and method effective to provide content to a user. The system may include a sound device, a smart phone, and a processor. The sound device may modulate a code where a first set of frequencies represents a logic 0 and a second set of frequencies represents a logic 1. The smart phone may demodulate the modulated code to reproduce the code. The smart phone may send the code as a query to a processor. The processor may receive the query, determine content associated with the code, and send the content over the network to the smart phone. The smart phone may further receive the content and display the content on a display. |
US08532643B2 |
Mobile phone comprising a streaming server with activation means for activating downloading of a file for streaming thereof
A mobile phone is provided. The mobile phone includes a first buffer memory, a downloader for downloading a data file from a web server in the first buffer memory, the file being accessible at a web address on the web server, the downloader being connected to the first buffer memory, and a streaming server for streaming data to a remote client equipment according to a predetermined network protocol, the streaming server being connected to the first buffer memory. The streaming server is adapted to be connected to the remote client equipment via a data link and is adapted to receive, from the remote client equipment, a data streaming request. The streaming server includes an activater for activating the downloader, the activater being adapted to activate the downloading of the data file. |
US08532642B2 |
Autonomous, non-interactive, context-based services for cellular phone
Embodiments include but are not limited to cellular phones, methods practice thereon, for autonomously servicing a call or a message, on behalf of the user, without interacting with the user, are disclosed herein. In various embodiments, data about a user of the cellular phone, internal conditions of the cellular phone, or external environment of the cellular phone are locally collected and from a wireless communication network. In various embodiments, multiple agents are provided to the cellular phone, wherein each agent is configured to determine, on receipt of a received call or message, a current service context based at least in part on some of the data stored, and autonomously servicing the received call or message based on the results of the determination. Other embodiments may be described and claimed. |
US08532641B2 |
System and method for managing media
A music enabled communication system includes a wireless telephone device with a display, a wireless communication module, a rechargeable power supply, a memory system, and a collection of instructions operable to utilize the wireless communication module to stream a signal representing a song to a recipient device using a given asynchronous wireless channel of a localized communications signaling network, to recognize receipt of an incoming call, and to alter the signal in connection with recognizing receipt of the call. |
US08532635B2 |
System and method for providing short message targeted advertisements over a wireless communications network
A method and system for providing targeted advertisement information to consumers over a wireless communications network. In one embodiment, local advertisers register to advertise on wireless communications devices that are in close proximity to the advertiser. As a consumer enters a cell site that is near the location of the advertiser, the wireless network delivers a message to the wireless device specified by the local advertiser. An acknowledgement signal is then received by the network, and the local advertiser's account is charged for transmission of the advertisement. In a further embodiment, each of the messages stored in the database is also associated with one or more demographic codes, and users of wireless communications device select from one more demographic codes to describe their advertisement preferences. Messages to be transmitted to particular wireless communications devices are selected based upon both the location information and the demographic codes associated with the messages. |
US08532634B2 |
System for targeting advertising content to a plurality of mobile communication facilities
A system for targeting advertising content includes the steps of: (a) receiving respective requests for advertising content corresponding to a plurality of mobile communication facilities operated by a group of users, wherein the plurality includes first and second types of mobile communication facilities with different rendering capabilities; (b) receiving a datum corresponding to the group; (c) selecting from a first and second sponsor respective content based on a relevancy to the datum, wherein each content includes a first and second item requiring respective rendering capabilities; (d) receiving bids from the first and second sponsors; (e) attributing a priority to the content of the first sponsor based upon a determination that a yield associated with the first sponsor is greater than a yield associated with the second sponsor; and (f) transmitting the first and second items of the first sponsor to the first and second types of mobile communication facilities respectively. |
US08532633B2 |
System for targeting advertising content to a plurality of mobile communication facilities
A system for targeting advertising content includes the steps of: (a) receiving respective requests for advertising content corresponding to a plurality of mobile communication facilities operated by a group of users, wherein the plurality includes first and second types of mobile communication facilities with different rendering capabilities; (b) receiving a datum corresponding to the group; (c) selecting from a first and second sponsor respective content based on a relevancy to the datum, wherein each content includes a first and second item requiring respective rendering capabilities; (d) receiving bids from the first and second sponsors; (e) attributing a priority to the content of the first sponsor based upon a determination that a yield associated with the first sponsor is greater than a yield associated with the second sponsor; and (f) transmitting the first and second items of the first sponsor to the first and second types of mobile communication facilities respectively. |
US08532632B2 |
Cellphone changing an electronic display that contains a barcode
A cellphone with a camera takes a photo of a barcode in a screen that can show different images. The barcode is decoded into a URL, and the cellphone uses wireless Internet access to visit the website of the URL. The website then makes a different image, that also has a barcode of a URL, and sends it to the screen for display. This can increase the interactivity of the screen and its value to advertisers. Several users with cellphones might simultaneously interact with the screen in this manner. |
US08532629B2 |
Unstructured supplementary service data call control manager within a wireless network
A system and apparatus for call control management using the Unstructured Supplementary Service Data (USSD) protocol. The system and apparatus uses USSD messages between the wireless private network subscriber and a wireless network to provide subscribers with information about callers and routing options of the call. The subscriber can also inform the system using USSD messages how to proceed with the call. The system provides USSD messages such as but not limited to, transferring the call to another subscriber with canned messages, transferring the call to a subscriber's voice mail, establishing a conference call, swapping to other call, creating new call, consulting with other person, transferring to specific predefined person, hold, consulting with other person via canned message, etc. The system and apparatus also exchanges device status information using USSD messages. |
US08532628B2 |
Registering actionable alerts
Described are methods and systems, including computer program products, for registering, configuring, and invoking actionable alerts. For example, an alert action is determined based on an alert. The alert is sent to a device based on an alert logic and the alert action is sent to the device based on a device capability. A received communication is identified as a response from the first device based on the alert requesting performance of the alert action. |
US08532627B1 |
Methods and systems for dynamic treatment of callers
Methods and systems for dynamic treatment of callers are described. Optionally, a communication system may include an application installed on a user communication device. The communication system may be utilized to receive and screen calls, enable a user to specify which calling parties may bypass a low indication mode and/or a non-indication mode, challenge callers, and/or identify urgent calls. |
US08532624B2 |
System and method for storing and retrieving multimedia messages on low-cost tags in order to facilitate contextual communications
Systems, methods and computer program products for storing and retrieving of multimedia messages onto tags in order to facilitate contextual communications are disclosed. Such tags can be attached or affixed to physical, real-world objects thus allowing multimedia messages associated with the tags to be retrieved with the real-world objects in a time-shifted and space-shifted manner from when and where they were recorded. The present invention uses low-cost (metal, paper or plastic) tags—encoded using barcodes or RFID—as virtual message storage units and commercially-available terminals equipped with appropriate software and sensors, such as mobile telephones, as recording and reading devices. |
US08532619B2 |
System for authorizing the use of communication devices by proximity
The present invention relates to the use of a transponder for wireless communication with the mobile phone, replacing the process of inserting the SIM card inside the device.The object of this patent is to provide a system that allows a plurality of communication devices, whether mobile, portable or fixed, with a second device which has as main feature the validation of user identity with the network of telecomunication providers. In this system, the device A comprises a SIM card that is activated when a device B is in a radius of less than 1 meter. The communication between two devices is done via radio frequency. Device B will make a periodic transmission of data within this radius to determine the continued presence of the device A. The device A containing the SIM card has a passive role, i.e., it only responds to requests from the device B, when receiving a transmission from the same. |
US08532618B2 |
System and method for communications device and network component operation
A system and method for communications device and network component operation in an ID/Locator Split Based heterogeneous network is provided. A method for control node operation includes receiving an attach request, and attempting to authenticate/authorize the communications node. The attach request is a request from a communications node to attach to a heterogeneous network. The method also includes if the communications node authenticated/authorized successfully, causing an identification and a location to be assigned for the communications node, completing an attachment for the communications node, and transmitting information to the communications node. The method further includes if the communications node did not authenticate/authorize successfully, sending an attach reject message to the communications node. The identification and the location are separate values. |
US08532612B1 |
Obtaining mobile information for networked transactions
A computer-implemented method of identifying a mobile device for carrying out a transaction includes receiving from a mobile device a purchase request, providing to the mobile device a redirect message to direct the mobile device to a device number identification service, and obtaining an identifier for conducting commerce with the device and using the identifier to request a transaction authorization from a billing service associated with the device. |
US08532607B2 |
Integration of emergency alert information
A subscriber of the Emergency Alert System (EAS) receiving an EAS alert message can obtain additional multimedia information in based upon the location of the subscriber. The additional multimedia information can include information pertaining to available shelter, medical facilities, the location of emergency supplies, a plume map, evacuation routes, or the like. In an example embodiment, the Global Positioning System or other device location systems is utilized to determine the location of the subscriber. The location information along with EAS alert information is used to query a database to obtain the additional information. |
US08532603B2 |
Transponder power supply, a transponder and a method for providing a transponder power supply current
A transponder power supply for providing a supply current based on an antenna input signal. The transponder power supply comprises an emergency circuit comprising a charging circuit, an emergency capacitor, and an output stage. The charging circuit is configured to charge the emergency capacitor based on the antenna input signal to a maximum voltage which is higher than a voltage of the antenna input signal. The output stage is configured to provide a contribution to the supply current using a charge of the emergency capacitor. |
US08532601B2 |
Integrated low-IF terrestrial audio broadcast receiver and associated method
An integrated low-IF (low intermediate frequency) terrestrial broadcast receiver and associated method are disclosed that provide an advantageous and cost-efficient solution. The integrated receiver includes a mixer, local oscillator generation circuitry, low-IF conversion circuitry, and DSP circuitry. And the integrated receiver is particularly suited for small, portable devices and the reception of terrestrial audio broadcasts, such as FM and AM terrestrial audio broadcast, in such portable devices. |
US08532600B2 |
System and transceiver clocking to minimize required number of reference sources in multi-function cellular applications including GPS
A system includes a first clock module, a global positioning system (GPS) module, a phase-locked loop (PLL) module, a cellular transceiver, and a baseband module. The first clock module generates a first clock reference. The GPS module operates in response to the first clock reference. The WLAN module operates in response to the first clock reference. The PLL module generates a second clock reference by performing automatic frequency correction (AFC) on the first clock reference in response to an AFC signal. The cellular transceiver receives radio frequency signals from a wireless medium and generates baseband signals in response to the received radio frequency signals. The baseband module receives the baseband signals, operates in response to a selected one of the first clock reference and the second clock reference, and generates the AFC signal in response to the baseband signals. |
US08532595B1 |
Optimized power amplifier and switching power supply topology
The present disclosure relates to a single switching power supply that may either provide envelope power to a first RF power amplifier during a first operating mode, or simultaneously provide envelope power to the first RF power amplifier and to a second RF power amplifier during a second operating mode. In one embodiment, the single switching power supply and the first and second RF power amplifiers may be used in a multiple-input multiple-output (MIMO) RF communications system. As such, during the first operating mode, the first RF power amplifier may transmit a first RF output signal to a first antenna, and during the second operating mode, the first RF power amplifier may transmit the first RF output signal to the first antenna and the second RF power amplifier may transmit a second RF output signal to a second antenna, which may provide diversity. |
US08532590B2 |
Digital phase feedback for determining phase distortion
A feedback loop is used to determine phase distortion created in a signal by directly extracting the phase distortion information from a feedback signal using original frequency modulation information. |
US08532589B2 |
Beam-hopping in a radio communications system
A radio communications system has at least one base station and subscriber station. To transmit messages to a subscriber stations, the base station uses successive emission directions that differ from one another. The base station transmits information concerning the sequence of the use of said emission directions to subscriber stations. |
US08532584B2 |
RF switches
RF switching devices are provided that alternatively couple an antenna to either a transmitter amplifier or a receiver amplifier. An exemplary RF switching device comprises two valves, one for a receiver transmission line between the antenna and the receiver amplifier, the other for a transmitter transmission line between the antenna and the power amplifier. Each valve is switchably coupled between ground and its transmission line. When coupled to ground, current flowing through the valve increases the impedance of the transmission line thereby attenuating signals on the transmission line. When decoupled from ground, the impedance of the transmission line is essentially unaffected. The pair of valves is controlled such that when one valve is on the other valve is off, and vice versa, so that the antenna is either receiving signals from the power amplifier or the receiver amplifier is receiving signals from the antenna. |
US08532583B2 |
Semiconductor device, wireless communication device and method for generating a synthesized frequency signal
A semiconductor device comprises synthesized frequency generation logic arranged to receive a reference signal, and to generate a synthesized frequency signal from the reference signal. The synthesized frequency generation logic comprises programmable divider logic arranged to receive the reference signal and to generate a divided signal comprising a frequency with a period substantially equal to N times that of the reference signal, where N comprises a programmable integer value. The synthesizer frequency generation logic is arranged to generate the synthesized frequency signal comprising a frequency with a period substantially equal to 1/M that of the divided signal, where M comprises a further programmable integer value. |
US08532578B2 |
Method and system for spectrum management in communication networks, corresponding network and computer program product
Spectrum usage in a radio cognitive transmission system may be monitored in a distributed manner in space and time through a first set of monitoring apparatuses and a second set of monitoring apparatuses. The first set of monitoring apparatuses may be associated to apparatuses, such as base stations, having a monitoring precision level, for example, linked to the spectrum sampling frequency, greater with respect to the monitoring precision of the monitoring apparatus of the second set. The later may be suitable to be represented by a low-cost “sniffer” associated to consumer electronics devices. |
US08532577B2 |
Method and system for compensating for estimated distortion in a transmitter by utilizing a digital predistortion scheme with a quadrature feedback mixer configuration
Aspects of a method and system for compensating for estimated distortion in a transmitter by utilizing a digital predistortion scheme with a quadrature feedback mixer configuration are presented. Aspects of the system may include an RF transmitter that enables generation of an RF output signal in response to one or more generated input signals. One or more feedback signals may be generated by performing frequency downconversion on the RF output signal within a corresponding one or more feedback mixer circuits. The generated one or more feedback signals may be inserted at a corresponding one or more insertion points in an RF receiver. Each insertion point may be between a receiver mixer circuit and corresponding circuits that generate a baseband signal based on the corresponding one of the feedback signals. |
US08532575B2 |
System, method and apparatus for inter-vehicle communication
An application for a two-way communication system for communicating with a person who is within a second vehicle includes a short-range radio transmitter within a first vehicle to transmit audio to a radio within the second vehicle. Communication from the person in the second vehicle to a person in the first vehicle is performed by aiming a light beam from the first vehicle at the second vehicle and receiving reflections of the light beam at the first vehicle. The light beam is modulated by vibration of the second vehicle caused by the person speaking in the second vehicle. The received light beam is then processed to reproduce the sound of the person's voice. |
US08532574B2 |
Destination information sharing for the automobile environment
An in-vehicle system may detect an occurrence of a triggering event, detect a short-range communication connection between the in-vehicle system and a mobile communication device, send a prompt, including a request for information, to the mobile communication device, and receive a response, including the requested information, from the mobile communication device via the short-range communication module. In some embodiments, a business review, an advertisement, or a redeemable electronic coupon may be sent to the mobile communication device after the requested information is provided. Furthermore, destination information may be shared between the in-vehicle system and the mobile communication device in response to the triggering event. |
US08532573B2 |
Information terminal device and method of controlling the same
An information terminal device is disclosed that performs communication via a communication network. The information terminal device includes a short-range wireless communication unit that performs short-range wireless communication with an electronic device, a storing unit that stores information about communication via the communication network while the short-range wireless communication with the electronic device is disconnected, and a control unit that causes, upon restoration of the short-range wireless communication with the electronic device, the short-range wireless communication unit to transmit to the electronic device the information about the communication via the communication network if the information about the communication via the communication network is stored in the storing unit. |
US08532572B2 |
Mobile integrated distribution and transaction system and method for NFC services, and a mobile electronic device thereof
A mobile distribution system includes a widget generator for creating a widget having a certificate and a communication interface for distributing the widget to a mobile electronic device with a transaction terminal having at least one secure element for storing a plurality of secure applications; and retrieving the widget information from the mobile electronic device on NFC transactions in use of the transaction terminal. |
US08532565B2 |
Transparent commodity trading networks and methods of facilitating transactions among buyers and sellers of products and services
A transparent commodity trading network facilitates transactions among parties. A plurality of mobile communications devices are each configured to broadcast product/service needs and/or product/service offerings of a party associated with the respective mobile communications device. Each mobile communications device is configured to receive product/service needs and/or product/service offerings broadcast by other mobile communications devices when respective mobile communications devices pass within a predetermined distance of each other. Each mobile communications device is configured to identify when a product/service need or product/service offering broadcast by another mobile communications device matches a corresponding product/service offering or broadcast product/service need broadcast by the respective mobile communications device. A transaction service that is accessible by each mobile communications device is configured to allow two parties that have a matching broadcast product/service need and offering to identify and communicate with each other. |
US08532562B2 |
Method and system for selectively broadcasting media during dayparts
A method and apparatus for broadcasting media events, the method including the steps of providing a sequence of media events in a first server, the sequence of media events including at least one media event and a plurality of advertisement spots; playing the sequence from the first server to a second server prior to a predetermined broadcast time; and storing at the second server at least a part of the sequence received from the first server. The method may further include the steps of skipping, at the second server, spots during the broadcast of a sequence of media events during a spot-free daypart, inserting preferred content media events in the broadcast sequence, and inserting markers indicating whether a media event has been played during a spot-free daypart are to be played in the sequence of media events. |
US08532558B2 |
Printing machine
A printing machine includes: a reception unit configured to receive image data; a printing unit configured to print on a print medium based on the image data received by the reception unit; a first paper feeding unit configured to take out and convey a print medium on a paper feed tray one by one; a second paper feeding unit configured to convey a print medium conveyed by the first paper feeding unit to the printing unit; and a print control unit configured to drive the first paper feeding unit to start conveyance of a print medium upon start of reception of the image data by the reception unit. |
US08532556B2 |
Toner collecting apparatus, cartridge, and image forming apparatus
A toner collecting apparatus which transports collected toner through a discharge pipe to discharge the collected toner from a discharge port of the discharge pipe, the toner collecting apparatus including: a cover pipe having an open window and being rotatable around the discharge pipe in a substantially concentric fashion; a protective wall covering at least apart of the cover pipe; and a rotation member which rotates the cover pipe, wherein the cover pipe is rotated by the rotation member between an open position in which the open window is aligned with the discharge port and a closed position in which the open window is shifted from the discharge port so that at least the open window is covered with the protective wall. |
US08532552B2 |
Fixing device including reflecting plate with tilted ends
A fixing device includes a heating element disposed inside a flexible fusing member, a nip member disposed to contact with a surface of the flexible fusing member and to allow the flexible fusing member to slide along the nip member, a reflecting plate for reflecting radiant heat from the heating element toward the nip member, and a backup member for nipping the flexible fusing member with the nip member. The reflecting plate includes a central reflecting portion extending along a longitudinal direction of the heating element at least in a region corresponding to along a heat generating portion of the heating element, and end reflecting portions stationarily provided on both ends of the central reflecting portion. The end reflecting portions are disposed in positions longitudinally outward of the heat generating portion and each has a reflecting surface tilted with respect to the longitudinal direction of the heating element. |
US08532549B2 |
Image forming apparatus featuring a rotatable supporting member for a transfer belt
An image forming apparatus includes a movable belt; a transfer member opposed to the image bearing member with the belt therebetween; wherein the transfer member has a contact surface substantially parallel with a surface of the belt and contacted to the belt, and wherein when the belt is moving, the belt rubs the contact surface, and a toner image is transferred from such a part of image bearing member as is opposed to the contact surface; and a supporting member for supporting the transfer member, the supporting member being swingable. |
US08532546B2 |
Developer supply device and image forming apparatus having the same
A developer supply device is provided, which includes a transfer board including an activating section and an always-transferring section. The activating section is disposed in a position close to a developer holding member and lower than a position where development agent is transferred onto the developer holding member. The activating section is supplied with an activating voltage for making the development agent leave a developer transfer path and drop into the developer storage section during an activating process performed at an initial stage of a developer transferring operation while supplied with the transfer bias voltage after the activating process. The always-transferring section is disposed across a position facing the developer storage section to a position lower than and adjacent to the activating section, and always supplied with a transfer bias voltage during the developer transferring operation. |
US08532544B2 |
Developer container, developing apparatus and process cartridge
A developer container for an image forming apparatus includes a developer accommodating chamber, provided with an opening, for accommodating a developer to be supplied to the opening; a feeding member, provided in the developer accommodating chamber and having an elasticity, for feeding the developer by rotation thereof; a deforming portion, provided in the developer accommodating chamber and contactable to the feeding member, for deforming the feeding member against the elasticity with the rotation of the feeding member; and a restoration portion for permitting the feeding member deformed by the deformed portion to restore elastically, thereby to throw the developer toward the opening, wherein a boundary portion between the deformed portion the restoration portion is disposed below a lower end of the opening. |
US08532540B2 |
Image forming apparatus and toner container
An image forming apparatus includes: a feed portion that is fed with toner from above; a transport path that includes an inlet through which the toner fed to the feed portion enters, that allows the toner to be transported therethrough, and that is in a cylindrical shape; and a transporting member provided to continuously extend from the feed portion to the transport path, the transporting member transporting along the transport path the toner fed to the feed portion, wherein an amount of transportation of the toner per unit of time at a part of the transporting member located in the transport path is larger than an amount of transportation of the toner per unit of time at a part of the transporting member located in the feed portion. |
US08532537B2 |
Image forming apparatus and image forming method
The image forming apparatus includes a latent image carrier that holds a latent image thereon, a developer carrier that develops the latent image on the latent image carrier by using a liquid developer including a toner and a carrier liquid, a squeeze roller being in contact with the latent image carrier, that holds an image developed by the developer carrier, to squeeze the liquid developer on the latent image, and a control unit that applies a first bias to the squeeze roller, when a first position of the latent image carrier that does not hold the latent image is in contact with the squeeze roller, and that applies a second bias being different from the first bias to the squeeze roller, when a second position of the latent image carrier that holds the latent image is in contact with the squeeze roller. |
US08532530B2 |
Fixing device for fixing on a recording material a toner image formed on the recording material including a fixing roller and heating and pressing members
A fixing device fixes on a recording material a toner image formed on the recording material and includes a fixing roller, a heating member for heating the fixing roller in contact with an outer surface of the fixing roller, and a pressing member for forming a fixing nip between itself and the fixing roller. When the recording material which has been jammed so that its leading end passes through the fixing nip to reach a contact portion between the heating member and the fixing roller, a force for drawing the recording material upstream when nipped in the fixing nip is at least equal to the drawing force of the recording material, toward the upstream side with respect to the rotational direction of the fixing roller, nipped between the fixing roller in the rest state and the heating member. |
US08532526B2 |
Image forming apparatus and image forming method
An image forming apparatus and an image forming method are provided that realize both the use of a decolorizing toner and a non-decolorizing toner and miniaturization of the apparatus. |
US08532524B2 |
Image formation device having first frame for supporting image formation unit and second frame of lower flexure rigidity
An image formation device is provided with an image formation unit configured to form an image on a recording sheet, a first frame arranged to support the image formation unit, a second frame connected to the first frame, flexure rigidity of the second frame being smaller than flexure rigidity of the first frame, an electric substrate electrically connected with the image formation unit. With the above configuration, the electric substrate is arranged to extend from the first frame to the second frame and is secured onto the first frame with the position on the first frame being adjusted. |
US08532522B2 |
Toner cartridge
A toner cartridge contains a toner container including an opening and configured to contain a toner. An engaging member includes a ring-shaped seal member disposed on a seal member installation surface. The engaging member is engaged with the toner container to cover the opening and rotatably mounted to the toner container while an edge of the opening is frictionally slid on a surface of the seal member. The toner container is configured to convey the toner into the engage member through the opening and discharge the toner therefrom as the toner container is rotated. The seal member includes a non-contact portion at a surface thereof facing the installation surface and being free from any contact with the installation surface so that the engage member includes a space extending from the surface of the seal member where the edge of the opening is frictionally slid to the non-contact portion. |
US08532521B2 |
Image forming apparatus having waste toner box
An image forming apparatus includes: an image forming unit including a plurality of photoconductor drums arranged in tandem; a conveyor belt arranged opposite to the photoconductor drums and configured to convey a recording sheet; and a cleaning unit including a cleaning member positioned in contact with the conveyor belt and configured to collect substance adhering to the conveyor belt, and a receptacle configured to store the substance collected by the cleaning member. The cleaning member is arranged on the same side as the image forming unit with respect to the conveyor belt and upstream from the image forming unit as viewed in a sheet conveyance direction along which the recording sheet is conveyed on the conveyor belt, and the image forming unit and the cleaning unit are pulled out together from a main body of the image forming apparatus toward an upstream side of the sheet conveyance direction. |
US08532520B2 |
Image forming apparatus having cleaning unit with collecting member and bias control
An endless belt circularly moves to convey a recording medium placed thereon in a conveying direction. A plurality of photosensitive bodies is juxtaposed in the conveying direction with confronting the endless belt. A plurality of process units supplies developer to the plurality of photosensitive bodies to form a developer image thereon, respectively. A first collecting member contacts the endless belt to collect the developer on the endless belt. A second collecting member is capable of collecting from the first collecting member the developer collected on the first collecting member. A control unit applies a bias between the first collecting member and the second collecting member to inhibit the developer collected on the first collecting member from being transferred to the second collecting member when the first collecting member rubs the endless belt with the toner collected on the first collecting member. |
US08532518B2 |
Image forming apparatus
An image forming apparatus includes an image bearing member; an image forming portion for forming a toner image on the image bearing member, the image forming portion being capable of forming an image to be formed on a recording material and forming a control image for controlling an image density at a position adjacent to the image to be formed on the recording material; an intermediary transfer member rotatable while carrying the toner image transferred from the image bearing member; a transfer member for forming a transfer portion where the toner image is to be transferred from the intermediary transfer member onto the recording material; an electrostatic cleaning member for electrostatically removing the toner deposited on the transfer member; a density detecting portion, provided upstream of the transfer member with respect to a rotational direction of the intermediary transfer member, for detecting a density of the control image transferred on the intermediary transfer member; an adjusting portion for adjusting an image forming condition of the image forming portion depending on an output of the density detecting portion; and a charge amount changing portion for adjusting a charge amount of the control image transferred onto the intermediary transfer member. |
US08532517B2 |
Power control method and apparatus to heat a heating roller
A power control apparatus and an image forming apparatus include a non-heating control unit to control non-heating control components according to a power-on signal, and a heating control unit to increase a level of a source power supplied as roller power and to supply the increased level of the roller power to a heating roller according to phases of current of the source power such that heating the roller reaches a temperature before a power-on process of the non-heating control unit is completed. |
US08532514B2 |
Image forming apparatus
An image forming apparatus includes an image bearing member; a transfer member for transferring a toner image from the image bearing member onto a transfer material at a transfer portion; a control portion for controlling a voltage to be applied to the transfer member; a current detecting portion for detecting a value of a current passing through the transfer portion; a calculating portion for calculating a relationship between values of the voltage and the current obtained by applying voltages of different values at different intervals between adjacent images during execution of a continuous image forming mode in which the images are continuously formed on recording materials; a determining portion for determining the voltage value for a target current from the calculated relationship; and a switching portion for switching the voltage value to the voltage value determined by the determining portion during the execution of the continuous image forming mode. |
US08532512B2 |
Image forming apparatus
An image forming apparatus includes: a charging unit which charges a surface of an image bearing member by contacting the image bearing member with a charging member to which a charging bias is applied, the charging bias being a voltage obtained by superimposing an AC voltage on a DC voltage; an electrostatic latent image forming unit which forms an electrostatic latent image on the surface of the image bearing member which is charged by the charging unit; a developing unit which develops the electrostatic latent image by using a developing bias formed by the voltage obtained by superimposing the AC voltage on the DC voltage; and a control unit which performs changing control of an AC frequency of the charging bias while maintaining a frequency ratio of an AC frequency of the developing bias to be an integral multiple of the AC frequency of the charging bias. |
US08532500B1 |
System and method for receiving optical signals
A stream of wavelength division multiplexed optical signals can be converted into the electrical domain and processed electrically to discriminate the information on each optical signal. An optical medium can transmit multiple optical communication signals, each having a different wavelength and each imprinted with different information. Detectors can receive the optical communication signals, with each detector receiving some of each communication signal. Thus, any one of the detectors can output an electrical signal according to a composite of multiple optical communication signals. Accordingly, each output electrical signal can include features or energy of each of the optical communication signals. An electrical circuit can process the electrical signals output by the detectors. The processing can remove from each electrical signal contributions from all but one of the optical communication signals, so that each processed electrical signal carries the information of a single wavelength division multiplexed optical signal. |
US08532499B2 |
Optical transmitter with adaptively controlled optically linearized modulator
An optical transmitter for generating a modulated optical signal to be transmitted over fiber optical link. The transmitter includes: an optical source for producing an optical signal; an optically linearized modulator (OLM) as external modulator for modulating the optical signal produced by the optical source with an information carrying signal. The external modulator includes a first input port for receiving a first DC bias signal, and a second input port for receiving a second DC bias signal. The optical transmitter further includes a pilot tone generator for generating a first pilot signal to be applied to the first input port and a second pilot signal to be applied to the second input port. The first and second pilot signals are capable of producing distortion products in the modulated optical signal. A differential modulation signal is imposed onto either the first pilot signal or the second pilot signal so as to generate a first control signal that alternately adjusts the first DC bias signal and the second DC bias signal in order to minimize the distortion products. The optical transmitter may include a digital based control system that is adapted to reduce composite even and odd order distortions in the OLM. |
US08532496B2 |
Path establishment
A path is established through an optical communications network. One or more partial paths are evaluated according to a first criterion, and candidate end-to-end paths are then evaluated according to a second criterion. The end-to-end path evaluation disregards candidate end-to-end paths that include partial paths not meeting the first criterion. A path is established by selecting one of the candidate end-to-end paths on the basis of the second criterion. |
US08532491B2 |
Optical multiplexing terminating device, passive optical network system and method for allocating wavelength
A passive optical network system such that the power consumption can be reduced as much as possible according to the end-user traffic. An OLT uses the DBA function thereof and sequentially uses frequencies in ascending order of transmission rate in order to sequentially allocate bands to ONUs in ascending order of the requested bandwidth. At this time, a frequency to be allocated is selected so that the bandwidth allocated to each ONU is narrower than a maximum bandwidth through which transmission using the allocated wavelength is enabled. An OLT uses a grant area to specify the transmission timing of the secondary station and to inform the specified transmission timing to the secondary station. In addition, an area is set for storing information used to inform the secondary station of a new frequency to be used. |
US08532489B2 |
Multi-fiber ten gigabit passive optical network optical line terminal for optical distribution network coexistence with gigabit passive optical network
An apparatus comprising a wavelength division multiplexing (WDM) coupler configured to couple an optical line terminal (OLT) comprising a transmitter and a receiver, wherein the WDM coupler is coupled to the transmitter via a first fiber and to the receiver via a second fiber. An apparatus comprising a WDM coupler for a passive optical network (PON) comprising a plurality of filters and a plurality of ports, wherein the WDM coupler comprises fewer filters than ports. A method comprising receiving a downstream optical signal intended for an optical network terminal (ONT) via a first fiber, and transmitting an upstream optical signal received from the ONT via a second fiber. |
US08532485B2 |
System and method for operating transparent node for WDM shared “virtual ring” networks
A system and method for a transparent WDM metro ring architecture in which optics enables simultaneous provisioning of dedicated wavelengths for high-end user terminals, while low-end user terminals share wavelengths on “virtual rings”. All wavelengths are sourced by the network and remotely modulated at customer “End Stations” by low cost semiconductor optical amplifiers, which also serve as transmission amplifiers. The transparent WDM metro ring architecture permits the communication of information and comprises a fiber optical feeder ring, at least one fiber optical distribution ring, a network node (NN), at least one access node (AN) said network node and said at least one access node connected via said fiber optical feeder ring and at least one end station (ES) connected via said fiber optical distribution ring to said at least one access node, wherein said user is attached to said at least one end station. |
US08532480B2 |
Electronic device, cover and method
A cover part for an electronic device, an electronic device and a method. The cover structure (2) for an electronic device provides a cavity (3) into which an electronic part of the electronic device (1) may be arranged. The cover structure (2) includes an enclosing structure (5), which is tubular in shape and at least one end (6a, 6b) of which enclosing structure (5) is open, the end (6a, 6b) including a receiving structure (7a, 7b) for fitting an end element (8a, 8b), which closes the end, into the enclosing structure (5). |
US08532479B2 |
Electronic appliance and camera device
An electronic appliance which can be a camera device includes a resin case containing electronic components for taking a camera images, and a metal shield member attachable to the inside of the case. The shield member is provided with two staking holes, and three staking tabs which protrude inwardly are provided around each of the staking holes. The case is provided with a boss in a position corresponding to each of the staking holes. When the shield member is attached to the case, each boss is pushed into the staking hole and fastened by the three deformed staking tabs, so that the shield member is fixed to the case. |
US08532477B2 |
Lens control device having lens position control function for bringing, method of controlling the same, and storage medium
A lens control device which is capable of controlling lens positions such that an in-focus state of an object image can be maintained even when a variable power lens is positioned outside a normal zoom range from a wide-angle end to a telephoto end. A flash memory stores a positional relationship between the variable power lens and a focus lens, on an object distance-by-object distance basis. A system controller controls the movement of the focus lens by calculating the in-focus position of the focus lens with respect to the position of the variable power lens based on the positional relationship stored in the flash memory when the variable power lens is moved to a position outside the normal zoom range defined in the positional relationship stored in the flash memory. |
US08532473B2 |
Reproduction control method, reproduction apparatus, and television set
A reproduction control method includes steps of converting first program data accumulated in a first apparatus into second program data reproducible in a second apparatus, transferring the converted second program data to the second apparatus, and converting the first program data accumulated in the first apparatus into reconstructable reproduction-disabled data. |
US08532470B2 |
Picture editing device, picture editing method, integrated circuit, and recording medium
An electronic device (100) capable of editing, with greater focus on story configuration, a group of pictures to be successively displayed includes: a time information obtainment unit (111) which obtains time information (111a) of a video in which one or more of the pictures are successively displayed; a template reading unit (113) which reads template data (104d) for specifying (i) the number of repetitions of each of units of repetition made up of one or more switching effects used in switching between two of the pictures included in the video, and (ii) a unit time of each of the one or more switching effects of the unit of repetition; an adjustment unit (114) which adjusts the number of repetitions of the unit of repetition, based on the obtained reproduction time information (111a) and each of the unit times specified in the read template data (104d). |
US08532467B2 |
Transmitting device, receiving device and transmitting/receiving device
A transmitting device, a receiving device and a transmitting and receiving device includes multiple devices connected. When these devices have duplicate functions for processing video signals or audio signals, these signals are processed using optimal circuits by comparing functions for processing video signals or audio signals in the devices. |
US08532466B2 |
Video recorder having user extended and automatically extended time slots
The present invention is directed to a video recorder having user extended and automatically extended time slots. An embodiment of the present invention includes a set top box having an internal storage device, such as a hard drive where broadcasts are transferred from a broadcast input source to the storage device. The set top box is connected to an output device such as a television, which displays a graphical user interface (GUI) and an interactive program guide (IPG). The user has the option to extend a chosen time slot, in which a show is scheduled to be transferred to the storage device. The time slot may be extended before the show, after the show, or both. The system also implements an automatic extension of the time slot by default, which is used to ensure that the data is completely captured to the system, in case the broadcast and the set top box are slightly out of sync, the broadcaster unexpectedly begins a show's broadcast slightly early or late, or the show unexpectedly runs longer than the IPG indicates. |
US08532462B2 |
Non-destructive file based mastering for multiple languages and versions
A method, system, apparatus, article of manufacture, and computer program product provide the ability to non-destructively generate a file based master. A domestic source (having domestic audio and video content) with textless content (have portions of the domestic source that is devoid of text) is obtained. A localized source (e.g., localized audio-video) based on the domestic source is received. The localized video is compared to the domestic source to determine differences. The localized video is bladed and realigned with the domestic source. Metadata (of the differences) is transposed onto the domestic source. Texted portions in the domestic source are obscured with corresponding portions of the textless content. Texted material (based on the localized video and texted portions) is created. The localized video content and the textless content are discarded. The domestic source, localized audio content, created texted material; and metadata are combined into a playlist that represents a localized file based master. |
US08532458B2 |
Picture search method and apparatus for digital reproduction
A picture search method and apparatus for digital reproduction are provided. The picture search method includes, generating a multiple image screen by configuring one or more pictures provided before a reproduction start time selected by a user during a high-speed search to a screen or a plurality of screens, outputting the multiple image screen, and sequentially reproducing following pictures starting from a picture selected by the user among one or more pictures included in the output multiple image screen. Therefore, it is possible to allow a user to exactly select a desired reproduction start time during the high-speed search. |
US08532453B2 |
High voltage cabtire cable
A high voltage cabtire cable 10 includes power cores 20 each of which has an inner semi-conductive layer 22, an insulation 23, and an outer semi-conductive layer 24 successively provided in this order around a copper conductor 21, and other cores 25, 30 stranded together with the power core 20, an inner sheath 11 and an outer sheath 13 successively provided in this order around peripheries of the power core 20 and the other cores 25, 30 stranded together, in which an adhesion force between the other cores 25, 30 and the inner sheath 11 is greater than an adhesion force between the power cores 20 and the inner sheath 11. |
US08532448B1 |
Light emitting pixel structure using tapered light waveguides, and devices using same
A pixel structure, displays, and display panels comprising a plurality of pixel structures, are provided. The pixel structure comprising: a Continuous Resonant Trap Refractor waveguide having a tapered core with an aperture for emitting the light and a narrower end or tip, the tapered core having cladding disposed thereabout, the core and the cladding both being transmissive of light; and a plurality of light sources disposed for coupling light into the core via the cladding. Preferably the light sources are disposed within layers of substrate, which may form lateral waveguides. An optional plurality of light sources disposed at an angle offers emitting a simultaneous plurality of images, each having a different polarization, for 3D viewing, and other desired emissions at varying polarizations. |
US08532447B1 |
Multi-mode interference splitter/combiner with adjustable splitting ratio
A multimode interference splitter/combiner that includes a monolithic device for photonically coupling an input optical waveguide to first and second output optical waveguides. The input waveguide may be optically coupled to a first end of a MMI portion, while the first and second output waveguides may be optically coupled to a second end of the MMI portion. The input waveguide is coupled to a planar facet of the MMI portion so that the input waveguide may have a propagation axis that is oriented at an angle with respect to the planar facet of the MMI portion. A desired splitting ratio may be achieved by adjusting the angle between the input waveguide and the MMI portion. |
US08532440B2 |
Silicon-based electro-optic device
In an electro-optic device, a stack structure including a first silicon layer of a first conductivity type and a second silicon layer of a second conductivity type has a rib waveguide shape so as to form an optical confinement area, and a slab portion of a rib waveguide includes an area to which a metal electrode is connected. The slab portion in the area to which the metal electrode is connected is thicker than a surrounding slab portion. The area to which the metal electrode is connected is set so that a range of a distance from the rib waveguide to the area to which the metal electrode is connected is such that when the distance is changed, an effective refractive index of the rib waveguide in a zeroth-order mode does not change. |
US08532439B2 |
Reproduction apparatus and reproduction method
A reproduction apparatus includes an attribute information recording unit for recording image attribute information in which an attribute value representing an image attribute is set for each of image, a target image selector for selecting an image of interest from among the images, a search condition setting unit for setting, as a search condition, an attribute value related to the image of interest set in the image attribute information, a reproduction information generator for generating reproduction information by setting one of pieces of image attribute information that satisfies the search condition, a search condition selector for selecting the search condition as a reproduction search condition, and a search result reproducing unit for, when the reproduction search condition is selected by the search condition selector, reproducing a search result with respect to the image of interest by displaying, on a display unit, an image whose image attribute information is designated with the reproduction information as a reproduction object. |
US08532437B2 |
Systems and methods for block recomposition for compound image compression
A new approach is proposed that contemplates systems and methods to support block-based compression of a compound image by skipping “don't care” blocks in the layers of the image while neither introducing significant overhead nor requiring changes to the compression method used. The block-based compression approach first segments a compound image into multiple layers and then recomposes a new set of image layers, possibly with new dimensions, from only the non-“don't care” blocks in the layers of the original image. The approach may later decompress the compressed image layers and restore the image by copying the decompressed blocks to their respective positions in the original image. |
US08532433B2 |
Image marker attaching apparatus and method
A marker attaching apparatus attaches to an image a positioning marker for detecting a specific area in the image, and includes: an area size detection unit detecting a size of an area to which the positioning marker is attached; a marker adjustment unit adjusting the positioning marker depending on the detected size of the area; and a marker attaching unit attaching the adjusted positioning marker to the image. |
US08532432B2 |
Mobile communication terminal having image conversion function and method
A mobile communication terminal having an image conversion function arranges and displays area-specific images in a three-dimensional (3D) space on the basis of distance information of the area-specific images of a two-dimensional (2D) image. |
US08532427B2 |
System and method for image enhancement
A method and system for forming an improved image from a series of frames comprising inputting a pixel value array for each image frame; summing the pixel values in each frame to obtain the frame intensity for each frame; multiplying the pixels in pixel value array by the frame intensity; summing the frame intensity multiplied pixel value arrays together and dividing by the number of frames to obtain an average of the frame intensity multiplied pixel value arrays; then, using the inputted pixel value arrays, creating an array of average pixel values; multiplying the array of average pixel values by the average frame intensity for all of the inputted frames; and subtracting the array of average pixel values multiplied by average frame intensity from the average of the frame intensity multiplied pixel value arrays to provide an array of modified pixel values to form an improved image. |
US08532425B2 |
Method and apparatus for generating a dense depth map using an adaptive joint bilateral filter
A method and apparatus for generating a dense depth map. In one embodiment, the method includes applying a joint bilateral filter to a first depth map to generate a second depth map, where at least one filter weight of the joint bilateral filter is adapted based upon content of an image represented by the first depth map, and the second depth map has a higher resolution than the first depth map. |
US08532424B2 |
Method and system for filtering image data
A device that includes at least one memory unit adapted to store image data; the device is characterized by including a configurable filter adapted to apply de-ringing filtering and de-blocking filtering such as to filter image data retrieved from the at least one memory unit, whereas the device is adapted to repetitively determine a configuration of the configurable filter in response to received image data and to at least one mode selection rule and to configure the configurable filter in response to the determination. A method for filtering image data, the method includes receiving or defining filtering mode selection rules; and receiving image data; whereas the method is characterized by including repeating the stages of: determining a configuration of a configurable filter that is adapted to perform de-ringing and de-blocking filtering, in response to the received image data and to at least one mode selection rule; configuring the configurable filter in response to the determination; and filtering, by the configurable filter, image data. |
US08532419B2 |
Automatic image capture
A method of automatically capturing images with precision uses an intelligent mobile device having a camera loaded with an appropriate image capture application. When a user initializes the application, the camera starts taking images of the object. Each image is qualified to determine whether it is in focus and entirely within the field of view of the camera. Two or more qualified images are captured and stored for subsequent processing. The qualified images are aligned with each other by an appropriate perspective transformation so they each fill a common frame. Averaging of the aligned images reduces noise and a sharpening filter enhances edges, which produces a sharper image. The processed image is then converted into a two-level, black and white image which may be presented to the user for approval prior to submission via wireless or WiFi to a remote location. |
US08532418B2 |
Image processing apparatus and image processing method
A main memory stores M-bit gradation image data (M is a natural number). A correction function generating unit generates a correction function in N-bit gradation (N is a natural number, N>M) from image data. A display image generating unit generates display image data using a correction function generated by the correction function generating unit. The display image generating unit uses a correction function so as to generate display image data resulting from correcting image data obtained by decoding compressed image data in M-bit gradation with the restriction of M-bit quantization. |
US08532417B2 |
Optimization of image encoding using perceptual weighting
A method, system and computer program product for optimal encoding for an image defined by image data. The quantization table, run-length coding and Huffman codebook are selected to minimize a Lagrangian cost function, wherein the minimization includes iteratively determining the optimal run-size pairs and in-category indices for minimizing a rate-distortion cost function, and wherein the rate-distortion cost function includes a perceptual weighting factor applied to a quantization error. The perceptual weighting factor adjusts the rate-distortion cost function to apply greater weight to lower frequency quantization error than to higher frequency quantization error. |