Document | Document Title |
---|---|
US08757075B2 |
Hook system for a sewing machine
For the continuous drive of a hook of a sewing machine, two drive cams (17) alternately engage in the back of the hook. During the passing of the upper thread loop, the respective drive cam (17) on which the thread would get hung up is out of engagement. The hook is situated in a conical hook race guide and is held therein by magnets. |
US08757073B2 |
Metering assembly for an air seeder
A metering assembly is provided for use with an air seeding system for delivering one or more particulate materials to an air seeding apparatus, the air seeding system comprising a product tank, configured to hold a particulate material and having an outlet, the metering assembly comprising at least one metering device, the metering device having a housing, an inlet positioned in the housing to receive particulate material from the outlet of the product tank, a first loading zone and a second loading zone, and a flow controller provided beneath the inlet and operative to route particulate material that has entered the metering device through the inlet in a first direction towards the first loading zone and in a second direction towards the second loading zone. |
US08757071B2 |
Solid fuel skewer suspension burning system
A skewer system comprises a skewer rod that holds tires in suspension during an incineration process where the tires are burned for fuel in a kiln such as a cement kiln or a lime kiln. In certain implementations, the skewer system also comprises a fuel advancing system to advance tires loaded onto the skewer rod into the heated gas in a stationary heat transfer station of the kiln. In further exemplary implementations, the skewer system comprises a mechanism to recover wire remnants from incinerated tires, the wire can be cut off the skewer and dropped into the kiln, or the wire itself can be burned off. |
US08757069B2 |
Table with nesting table top
A table may be sized and configured to nest with another table to reduce a height of a plurality of stacked tables in a nested configuration. The table may include a nesting portion formed in an upper surface and sidewall of the table top. The table may also include a frame with one or more engaging portions sized and configured to be disposed in the nesting portion of an adjacent table when the tables are nested together. In addition, the table top may include a compression edge sized and configured to be disposed in a nesting portion of an adjacent table when the tables are nested together. The compression edge and engaging portions may be sized and configured to be simultaneously disposed in the nesting portion of the adjacent table when the table is nested with the adjacent table. |
US08757065B2 |
Methods and apparatus for integrated locked thruster mechanism
A component separation system for separating a load from an external structure according to various aspects of the present invention comprises a sleeve slidingly engaged with the external structure. The sleeve includes an opening and an interior. A locking mechanism, such as a ball or latch, is movably disposed through the sleeve opening between a locked position engaging the external structure and an unlocked position not engaging the external structure. A mover slidingly disposed within the hollow interior of the sleeve controls the movement of the locking mechanism through the opening. Energy excess beyond that required for unlocking the mechanism may provide a thrust to forcibly eject the load from the external structure. |
US08757060B2 |
Method and apparatus for loading and unloading flexographic plates for computer-to-plate imaging including separate loading and unloading areas
An apparatus for and a method of loading and unloading of plates to and from an imager. The apparatus includes a loading area holding one single or a plurality of plates and an unloading area holding a single plate, the areas arranged vertically. The plate includes ultraviolet curable material. The apparatus includes a control system configured when in operation to control the automated loading and unloading and the apparatus elements therefor. One fully automatic version includes automatic loading from a stack or set of plate magazines and in the case that the plate includes a protective sheet thereon, includes removing the protective sheet from the plate. Some versions also include one or more ultraviolet sources to irradiate the flexographic plates with ultraviolet radiation during the automated loading and/or unloading. The ultraviolet sources are controlled by the same control system. |
US08757058B2 |
Process for perforating a web
Methods for perforating web products are disclosed that include forming selected perforation designs and patterns. The perforation designs and patterns can be formed in linear or nonlinear fashion, can extend in the cross direction or the machine direction and can be formed to complement or match an embossed or printed design on the web. The perforation designs and patterns can be formed utilizing various mechanical perforating techniques. |
US08757050B2 |
Hot beverage making device comprising a boiler and connecting means for connecting the boiler to a housing of the device
A hot beverage making device includes a boiler for heating water; a housing for accommodating the boiler and connecting element for connecting the boiler to the housing. During operation of the boiler, water is heated and water vapor bubbles are created inside the boiler. Formation of the bubbles causes varying moments about the center of mass of the boiler. The connecting element is adapted to prevent transmittal to the housing of at least a portion of the moment variations. This keeps the noise produced as a result of vibrations of the housing at an acceptable level. In particular, the connecting element is adapted to let the boiler have at least one rotational degree of freedom. |
US08757048B2 |
Beverage glass with internal decanting, filtering, mixing and aerating cell
A drinking container for decanting, filtering, mixing and/or aerating a beverage. The drinking container comprises a bowl having an upper opening and an aerating cell having a wall, an upper opening along the top of the cell and a plurality of openings or perforations through the wall. The cup-shaped cell has an upwardly facing hollow or concave configuration, optionally with a central upwardly extending protrusion, and is attached to and within the bowl, to decant, filter, mix and/or aerate a beverage that is poured through the bowl upper opening and into the cell upper opening, and subsequently flows through the at least one perforation into the bowl. Preferably, the drinking container is a wine glass having a base and stem supporting the bowl and the beverage is wine. |
US08757040B1 |
Gun gripping assisting assembly
A gun gripping assisting assembly includes a panel that has a top side, a bottom side, a front edge, a rear edge, a first lateral edge and a second lateral edge. A coupler is attached to the panel and is attached to a gun stock. A grip is attached to and extends downwardly from the bottom side of the panel. The grip has a first end and a second end. The first end abuts the panel. The grip is arcuate from the first end to the second end such that the grip has an upper surface that is concavely arcuate and faces the bottom side and a lower surface that is convexly arcuate and faces away from the panel. |
US08757037B2 |
Punch form and method of die-cutting with it
A method of feeding packaging material (5, 11) between a punch form (1) and an anvil (12) and bringing the punch form (1) and the anvil (12) together so that the packaging material (5, 11) is die-cut in such a manner that a relative sliding (9) occurs between the packaging material (5, 11) and the actual sheet material (4) of the election rubber (3) during the die-cutting course, even when the clamping pressure (8) is applied. |
US08757036B2 |
Jig for measuring dimensions of workpiece
A jig 20 that is installed on a device for measuring dimensions of a workpiece 10 based on images obtained by taking pictures of the workpiece 10 with a camera K includes a chuck mechanism 50 holding the workpiece K, a first rotation drive mechanism 80 that rotates the chuck mechanism 50 around a predetermined first rotation axis A, a first base 30 holding the first rotation drive mechanism 80, a second rotation drive mechanism 40 that rotates the first base 30 around a second rotation axis B orthogonal to the first rotation axis A, and a second base 21 holding the second rotation drive mechanism 40. The first base 30 has an opening 31A in the area around the first rotation axis A such that the workpiece 10 held by the chuck mechanism 50 is seen from the back of the first base 30 through the opening 31A. |
US08757035B2 |
Torque limiting ratchet device
A ratchet tool, including a shaft defining a longitudinal axis; a handle coaxial to the shaft; a first gear immovably fixed to the shaft and disposed in the handle; a second gear rotatably and longitudinally movable with respect to the shaft, where the second gear engages the first gear to limit torque transfer from the handle to the shaft in a first direction and provides substantially zero torque transfer in a second direction; a first spring disposed between the second gear and the handle; a third gear rotatably and longitudinally movable with respect to the shaft, where the third gear engages the first gear to limit torque transfer from the handle to the shaft in the second direction and provides substantially zero torque transfer in the first direction; and a second spring disposed between the third gear and the handle. |
US08757030B2 |
Bottle cap opener
The invention provides a bottle cap opener capable of sliding into an adjustable position along the bill of a cap with minimal peripheral vision of the opener. The bottle cap opener may be removed by a user to engage a bottle cap for removal from an associated bottle, then slidably replaced on the cap bill. The bottle cap opener comprises a contoured profile to match the contoured profile of the cap bill to minimize peripheral vision involvement and a curved shaping that is complementary with the curved shaping of the cap bill to maximize closeness of fit between the opener and the surface of the cap bill. The opener further comprises a space for individualized customization. |
US08757026B2 |
Clean transfer robot
A robot with improved cleanliness for use in a clean environment is disclosed, having a uniform flow through the open interface between the clean environment and the interior of the robot housing, passing the particle generation area to an exhaust port, keeping the particles from the clean environment. The uniform flow reduces or eliminates the back flow, and further allows the scalability of the open interface to prevent particles generated from moving mechanisms within the robot housing to contaminate the clean environment. The uniform flow can be established by designing the flow dynamic, centering the exhaust port, or by restricting the flow along the elongated slot, for example, by uniformly restricting the flow along the elongated slot, or by implementing a restrictor along the elongated slot. |
US08757021B2 |
Eight speed dual clutch transmission
A transmission is connectable to an input member and includes an output transfer gear, first and second transmission input shaft members, first, second and third countershaft members, a plurality of co-planar gear sets, and a plurality of torque transmitting devices. The torque transmitting devices include a plurality of gears, synchronizer assemblies and a dual clutch assembly. The transmission is operable to provide at least one reverse speed ratio and a plurality of forward speed ratios between the input member and the output member. |
US08757012B2 |
Torque sensor
A torque sensor comprises a freewheel with a first rotating element for transferring a torque to be determined to a second rotating element which is coaxial to the first rotating element, the transfer occurring in one rotational direction, and devices for determining a rotation of the first rotating element relative to the second rotating element in said rotational direction and for determining the torque using the determined relative rotation. |
US08757011B2 |
Flow meter apparatus including two polarized magnets in opposite direction and magnetic field sensors to sense direction and intensity of magnetic field
A flow meter apparatus comprising: at least two magnets polarized in substantially opposite directions, mechanically coupled to a mechanical element mounted in a flow conduit and movable by a substance flowing through the flow conduit, for imparting movement from the mechanical element to the magnets, and at least two magnetic field sensors, each of the sensors deployed in a respective position next to the magnets, configured to sense a direction of a magnetic field in the position and to generate a signal indicative of the direction. |
US08757010B2 |
Fuel dispenser flow meter fraud detection and prevention
A fuel flow meter assembly for detecting fraud caused by tampering. The fuel flow meter assembly includes a fuel flow meter comprising a shaft and a displacement sensor operatively connected to the fuel flow meter shaft for generating information representative of an amount of fuel delivered through the fuel flow meter. At least one transponder is coupled with one of the fuel flow meter shaft and the displacement sensor. At least one interrogator electronics is coupled with the other of the fuel flow meter shaft and the displacement sensor. The at least one interrogator electronics is configured for remote electronic communication with the at least one transponder. |
US08757006B2 |
Method and measuring system for determining and/or monitoring the flow of a measured medium through a measuring tube
A measuring system for determining and/or monitoring flow of a measured medium through a measuring tube, wherein the measuring system includes: at least one control/evaluation unit, which, based on ultrasonic measurement signals, or based on measurement data derived from the ultrasonic measurement signals, ascertains volume, and/or mass, flow of the measured medium flowing in the measuring tube; and a sensor housing, which surrounds a first ultrasonic sensor and at least a second ultrasonic sensor. At least the first ultrasonic sensor is seated shiftably in the sensor housing; wherein the measuring system further includes a sensor holder, which is securable on the measuring tube and includes a securement mechanism for the releasable securement of the sensor housing on the sensor holder. The sensor housing forms with the ultrasonic sensors a unit securable on the sensor holder and releasable from the sensor holder. |
US08756999B2 |
Ultrasonic probe
The invention relates to an ultrasonic probe for the non-destructive testing of metal work pieces, particularly pipes, for transverse defects, comprising a row-shaped arrangement of oscillator elements located on a lead wedge for coupling to the work piece. According to the invention, the lead wedge is designed as a wedge-shaped hollow body, which is filled with fluid and the wedge angle of which is a maximum of 24, and which is arranged on the work piece such that the intromission angle into the work piece is a maximum of 70. |
US08756996B2 |
Micromechanical system
In a micromechanical system having a substrate and an electrode situated over the substrate, the electrode is connected to the substrate via a vertical spring. The vertical spring is sectionally provided in a first conductive layer and sectionally provided in a second conductive layer, the second conductive layer being situated over the first conductive layer and the first conductive layer being situated over the substrate. The electrode is provided in a third conductive layer, which is situated over the second conductive layer. |
US08756995B2 |
Device and method for combining samples from an inertial measurement sensor cluster
Device and method for providing inertial indications with high accuracy using micro inertial sensors with inherent very small size and low accuracy. The device and method of the invention disclose use of the cluster of multiple micro inertial sensors to receive from the multiple sensors an equivalent single inertial indication with high accuracy based on the multiple independent indications and mathematical manipulations for averaging the plurality of single readings and for eliminating common deviations based, for example, on measurements of the deviation of the single readings. |
US08756994B2 |
Vibrating gyro device and manufacturing method therefor
A vibrating gyro device includes a piezoelectric substrate, an upper main surface electrode, a lower main surface electrode, and a support substrate. The piezoelectric substrate is provided with inner open holes and outer open holes. Side edge surfaces of a frame-shaped region in the X-Y plane are exposed to the interior of the frame through the inner open holes. Side edge surfaces of the frame-shaped region are exposed to the exterior of the frame through the outer open holes. Drive detection electrodes arranged within the upper main surface electrode are bonded to the upper main surface of the frame-shaped region and together with the lower main surface electrode are electromechanically coupled with deformation of the frame-shaped region in the Z-axis direction and deformation of the frame-shaped region in a direction parallel or substantially parallel to the X-Y plane. The support substrate provides a vibration space for the frame-shaped region and supports the piezoelectric substrate. The vibration space prevents interference between the frame-shaped region and the support substrate and connects the inner open holes and the outer open holes. |
US08756992B2 |
Level detector for measuring foam and aerated slurry level in a wet flue gas desulfurization absorber tower
A level detector 100 includes a sleeve 210 mountable to a vessel and extendable through a wall 212 defined by the vessel 212A and into an interior area 214 defined by the vessel. The sleeve 210 is mountable at an angle A of less than forty-five degrees relative to the vessel wall 212. The level detector 100 includes a level sensing probe 230 extending into a bore defined by an inside surface 218 of the sleeve 210. The level sensing probe 230 is configured to measure a plurality of foam and aerated slurry levels in the vessel 212A. One or more connectors 232, 244 are positioned outside 212B of the vessel 212A to removably support the level sensing probe 230 within the bore. The level sensing probe 230 is in communication with the interior area 214 via one or more openings 254, 258 extending into the bore. |
US08756990B2 |
Molded flow restrictor
The present disclosure relates generally to flow sensors, and more particularly, to devices and methods for providing a pressure drop through a flow sensor at a given flow rate. In one illustrative embodiment, a sensor assembly includes a housing with a first flow port and a second flow port. The housing may define a fluid channel extending between the first flow port and the second flow port, with a sensor positioned in the housing and exposed to the fluid channel. The illustrative sensor may be configured to sense a measure related to the flow rate of a fluid flowing through the fluid channel. A flow restrictor may be situated in and integrally molded with at least one of the first flow port and the second flow port. The flow restrictor may be configured to accurately provide a pressure drop through the flow sensor at a given flow rate. |
US08756989B2 |
Flow measuring device
A flow measuring device includes a housing, a support, and a flow measurement element. The housing defines a passage therein and includes a passage narrowing part, which reduces a cross-sectional area of the passage, in a predetermined part of the passage. The support has a platy shape and is disposed along a flow direction of fluid flowing in the passage. The flow measurement element is located inside the passage narrowing part and is disposed on a surface of the support. The flow measurement element detects a flow rate of fluid flowing in the passage. The passage narrowing part has an inner wall surface that gradually reduces a width of the passage from a center side to both end sides of the passage in a height direction of the passage, which is perpendicular to a direction of the width of the passage. |
US08756984B2 |
Abnormality diagnosis apparatus for engine control system
In a condition where an engine is running, a fuel injector injects no fuel, and a fuel pump discharges no fuel so that a fuel pressure in a common-rail is kept constant, an ECU computes an actual torque based on a current engine speed and determines whether the actual torque is increased or decreased relative to a predetermined reference torque. Moreover, in the same condition as above, a fuel pressure in the common-rail is detected. Based on variations of the actual torque and the fuel pressure in the common-rail, the ECU determines whether an abnormality occurs and identifies a type of the abnormality. |
US08756981B2 |
Measurement device with resonator
The invention relates to a measurement device with at least one resonator, comprising a measurement chamber with a fluidic input and a fluidic output wherein the measurement chamber is delimited, at its bottom surface, by a resonator, and wherein the resonator surface is configured to be electrically conducting, and the resonator surface forms the working electrode for an electrochemical measurement, and wherein electrodes are provided at the fluidic input and/or output at the transition to the measurement chamber. The invention is characterized in that the electrodes are exchangeable and allow the reception of a fluidic connection. |
US08756980B2 |
Method for determining and/or monitoring viscosity and corresponding apparatus
A method for determining and/or monitoring the viscosity of a medium, wherein a mechanically oscillatable unit is excited to execute oscillations based on an exciter signal, and wherein oscillations are received from the mechanically oscillatable unit and transduced into a received signal. The eigenfrequency and/or resonance frequency of the mechanically oscillatable unit and/or phase relationship between the exciter signal and the received signal are/is ascertained and/or monitored, and, from changes in the eigenfrequency and/or resonance frequency and/or phase relationship, a change in viscosity is deduced and/or, based on dependencies of the oscillations on the viscosity of the medium, from the eigenfrequency and/or resonance frequency and/or phase relationship, viscosity is ascertained. In a second variant of the method, decay behavior of the mechanically oscillatable unit is evaluated. An apparatus for determining and/or monitoring viscosity is also presented. |
US08756978B2 |
Leak detector with optical tracer gas detection
A leak detector comprises a cell provided with a tracer gas inlet preferably permeable to a tracer gas. In the cell, the tracer gas is caused to assume an energetically higher metastable state. By means of laser spectroscopy the absorption spectrum of the metastable tracer gas is sampled in an optical measuring section, whereby the presence of tracer gas is detected. |
US08756977B2 |
Developments in or relating to a condensate recovery system
A condensate recovery system may comprise a plurality of drain lines for draining condensate from an associated steam plant. Each drain line may incorporate a steam trap and feeds into a common condensate return line running between the drain lines and a condensate receiver tank. The system further may comprise an acoustic sensor positioned along the common condensate return line, upstream of the receiver tank, for providing an acoustic output indicative of the collective steam loss through steam traps upstream of the sensor. |
US08756973B2 |
Surface sensor offset
A method of operating a coordinate positioning apparatus having a surface sensor that is rotatable about at least a first axis. The method comprises obtaining a first measurement with the surface sensor at a first angular orientation and obtaining a at least a second measurement with the surface sensor at a second angular orientation. The first and second angular orientations are different to each other such that any offset of the surface sensor from an expected position will have at least a partially opposing affect on the first and second measurements. The method then compensates and/or establishes for the offset using the first and second measurements. |
US08756962B2 |
Key interlock device
A key interlock device includes a solenoid that holds a plunger when the solenoid is excited, and a link member that includes a shaft around which the link member is rotatable, and engages with the plunger so as to transmit a restraining force opposing an operation force of a key when the solenoid is excited. The shaft of the link member is disposed on a virtual line extending from a line of force of the operation force of the key. The key interlock device may include an engaging part through which the key interlock device is attached to a body of a steering lock device and which is disposed behind the shaft to which the operation force of the key applies. |
US08756958B2 |
Impulse type shock wave flash dyeing machine
An impulse type shock wave flash dyeing machine is disclosed. A row of joint nozzles can send out high-speed air flows to prompt fibrous fabric to spread out and move in the dyeing machine through the effect of impulse. Dyes or processing agents may be converted into fine mist and is carried by the high-speed air flows to blast the fibrous fabric (3). Therefore, the dyes or processing agents can enter the fibrous fabric (3) quickly and can diffuse or spread out in the fibrous fabric (3) swiftly through strong elastic and inelastic collisions as well as the effect of shock wave. Such collisions and effect can impart enough energy to the dyes or processing agents and convert non-activated molecules into activated molecules. In addition, the effect of corona discharge may be used to generate high-energy particles and hence the goals of clean and swift processes may be achieved. |
US08756949B2 |
Cooling device
Cooling device with a cooling unit connected to a cooling means for providing cooled air to the surroundings and which is located over an area for arranging merchandise to be refrigerated. The device includes a frame structure to be suspended freely over a merchandising area, with the cooling unit being arranged in the frame structure together with the further parts of a refrigerating unit. |
US08756948B2 |
System and method for conditioning air
A system for conditioning air in a structure includes a first conditioning system and a second conditioning system. The first conditioning system is capable of supplying conditioned air to a first space of the structure. The first space is enclosed, at least in part, by one or more external walls. The second conditioning system is capable of supplying conditioned air to a second space of the structure that is located above the first space. The second space is enclosed, at least in part, by a roof that is sealed to prevent a flow of air between the second space and an outside environment. The first space and the second space are separated by a ceiling that permits thermal energy to pass between the first space and the second space. |
US08756944B2 |
Means, method and system for heat exchange
A heat transfer device and its manufacturing method are provided. The heat transfer device has a heat transfer member defining a heat exchange surface with which a heat transportable medium contact in use and via which heat is transferable between the heat transportable medium and a working medium, and a device body for containing the heat transportable medium. The body of the device defines a first chamber, a second chamber and a third chamber which are in fluid communicable relationship. The body is configured to allow the heat transportable medium fluid to pass from the second chamber to the first chamber and then to the third chamber, or from the third chamber to the first chamber and then to the second chamber, and the second chamber is sandwiched or positioned between the first chamber and the third chamber in the body. |
US08756942B2 |
Refrigerator and method for controlling the same
The present invention relates to refrigerators, and a method for controlling the same. The refrigerator includes a body, a door rotatably coupled to the body, a storage space in the body for storing goods therein, a camera unit mounted in the storage space for sensing an infrared ray from the stored goods to visualize a surface temperature distribution of the stored goods, a memory unit for storing the surface temperature distribution of the stored goods visualized thus by the camera unit therein, and a control unit for determining whether the stored goods are damaged or not with reference to a difference of the surface temperature distributions of the stored goods stored in the memory unit. |
US08756938B2 |
Gas compressor operating method and gas turbine equipped with gas compressor
In a method for operating a gas compressor which compresses gas whose supply conditions change and which is equipped with an intake-flow regulating mechanism, a limit pressure ratio that defines the operational upper limit of the pressure ratio relative to the intake flow rate of the gas compressor or the degree of opening of the intake-flow regulating mechanism to prevent surging in the gas compressor is corrected by multiplying a reference limit pressure ratio calculated from the design conditions of the gas compressor by a first correction factor calculated depending on a detected operating-state value of the gas compressor. |
US08756937B2 |
Fuel system of gas turbine engines
A method for purging fuel from a fuel system of a gas turbine engine on shutdown of the engine comprises, in one aspect, terminating a fuel supply to the fuel system and using the residual compressed air to create a reversed pressure differential in the fuel system relative to a forward pressure differential of the fuel system used to maintain fuel supply for engine operation, and under the reversed pressure differential substantially purging the fuel remaining in the system therefrom to a fuel source. |
US08756936B2 |
Exhaust diffuser adjustment system for a gas turbine engine
A turbine exhaust diffuser adjustment system for a gas turbine engine capable of altering the flow of turbine exhaust gases is disclosed. The turbine exhaust diffuser adjustment system may be formed from one or more flow ramps positioned in a flowpath. The flow ramp may include a downstream, radially outward point that extends radially outward further from the ID flowpath boundary than an upstream, radially outward point that is positioned upstream from the downstream, radially outward point. The flow ramp may be adjustable such that an angular position of a radially outer surface of the flow ramp may be adjusted relative to the ID flowpath boundary, thereby enabling the flowpath to be changed during turbine operation to enhance the efficiency of the turbine engine throughout its range of operation. |
US08756935B2 |
Gas turbine engine combustion chamber comprising CMC deflectors
A gas turbine engine combustion chamber including at least one deflector mounted on the chamber end wall and including an opening for a carburetted air supply device. The deflector includes an opening, corresponding to the chamber end wall opening, with an annular cylindrical part for attachment to the wall, the cylindrical part including a mechanical attachment mechanism collaborating with a complementary attachment mechanism on a metal sleeve secured to the wall and a cylindrical centering cup fixed by one end to the sleeve and housed inside the cylindrical part of the deflector. |
US08756931B2 |
Device for adjusting the stroke volume of hydraulic piston machines
A device for adjusting the swept volume of a first piston machine (1), of transverse axis design, and a second piston machine (2), of transverse axis design. The device including a common component (4), via which the swept volumes can be adjusted, and a valve (12) which, when a maximum pressure level in the working lines (3) is exceeded, can be rerouted in such a way that the common component (4) reroutes the swept volume in a direction toward the lower power input. |
US08756930B2 |
Hydraulic system having implement and steering flow sharing
A hydraulic system for a machine is disclosed. The hydraulic system may have a first pump with variable displacement and being load-sense controlled, and a first hydraulic circuit associated with the first pump. The hydraulic system may also have a second pump with variable displacement and being electro-hydraulically controlled, and a second hydraulic circuit associated with the second pump. The hydraulic system may further have a flow-sharing valve arrangement configured to selectively share fluid flow between the first and second hydraulic circuits. |
US08756928B2 |
Compressed air energy storage system utilizing two-phase flow to facilitate heat exchange
A compressed-air energy storage system according to embodiments of the present invention comprises a reversible mechanism to compress and expand air, one or more compressed air storage tanks, a control system, one or more heat exchangers, and, in certain embodiments of the invention, a motor-generator. The reversible air compressor-expander uses mechanical power to compress air (when it is acting as a compressor) and converts the energy stored in compressed air to mechanical power (when it is acting as an expander). In certain embodiments, the compressor-expander comprises one or more stages, each stage consisting of pressure vessel (the “pressure cell”) partially filled with water or other liquid. In some embodiments, the pressure vessel communicates with one or more cylinder devices to exchange air and liquid with the cylinder chamber(s) thereof. Suitable valving allows air to enter and leave the pressure cell and cylinder device, if present, under electronic control. |
US08756919B2 |
Device for providing liquid reducing agent, method for thawing frozen reducing agent and motor vehicle having the device
A device for providing a liquid reducing agent includes a reducing agent tank for storing the liquid reducing agent. The reducing agent tank has at least one heater disposed in a movable manner in the reducing agent tank and constructed as an active heater. A method for thawing frozen reducing agent and a motor vehicle having the device are also provided. |
US08756918B2 |
Dosing module for dosing an urea based reducing agent into a gas exhaust stream
The present invention relates to a dosing module (1) for dosing an urea-based reducing agent into a exhaust gas stream of combustion engine and addressed to an after-treatment system, (30) e.g. SCR or SCRT system. The module (1) comprises an housing (20) which develops along a longitudinal axis (X) and an inlet opening (19) for conveying the exhaust gas. Dosage means (55) are provided for dosing the reducing agent. According to the invention, the inlet opening is annular and inclined with respect to the axis (X) of the housing (20) so as to generate an exhaust gas inlet jet (AJ). Moreover the dosage means are designed so as to generate, inside the housing (20), an urea-based reducing agent spray (UWS) coaxial to the axis (X) of the housing (20). |
US08756915B2 |
Integrated fuel catalyst monitor
A method is provided for monitoring an emission device coupled to an engine. In one example approach, the method comprises: following a deceleration fuel shut-off duration, indicating degradation of the emission device based on an amount of rich products required to cause a sensor to become richer than a threshold. The amount of rich products required may be correlated to an amount of oxygen stored in the emission device. The indication of emission device degradation may be further based on air mass and temperature during delivery of the required rich products. |
US08756907B2 |
Chain and coupling links
A coupling link for connecting two parts together includes link components (which each form a partial link) that are joined together with a removable support. The support and link components are coupled together to withstand high loads and/or adverse wear conditions. The inventive construction is strong, durable, efficient, cost effective and easy to use. Wear caps are provided to facilitate extended usable chain life. |
US08756899B2 |
Resilient floor
A method of assembling resilient floorboards is disclosed that includes the step of bending an edge of a floorboard during the assembling. The bending reduces the force required for connection of the edge to another edge of a juxtaposed floorboard. |
US08756897B1 |
Cost effective method for manufacturing retainers and inserts incorporated into a garage door panel
A method for forming garage door components, the method including: (a) vacuum forming a combination of a retainer combined with the formation of a decorative insert vacuum formed within the retainer, the decorative insert removed from the retainer to provide a separate retainer and a separate decorative insert, by forming them together, the interior of the vacuum formed piece is used as the decorative insert instead of being thrown away as in prior art vacuum forming processes thereby saving wasting the interior vacuum formed material. There is also a garage door panel including an interior retainer retaining a glass plate on its rear surface, and inserted into an opening in a garage door panel and a window frame inserted into the garage door panel on its opposite side to retain the glass plate by its front surface. A decorative insert is retained between the glass plate and the window frame. |
US08756891B2 |
Insulated fiber cement siding
Disclosed herein are embodiments of foam backing panels for use with lap siding and configured for mounting on a building. Also disclosed are lap siding assemblies and products of lap sidings. One such embodiment of the foam backing panel comprises a rear face configured to contact the building, a front face configured for attachment to the lap siding, alignment means for aligning the lap siding relative to the building, means for providing a shadow line, opposing vertical side edges, a top face extending between a top edge of the front face and rear face and a bottom face extending between a bottom edge of the front face and rear face. |
US08756889B2 |
Metal stud building panel with foam block core
A building panel using spacer blocks that fit between channels wherein the spacer blocks interlock and slid together between the support channels. The spacer blocks interlock horizontally and vertically using a means of forming a tongue and groove connection between the spacer blocks and between the framing members. Various interlocking tongue and groove connections form different wall structures and horizontal bracing channels along with the horizontal tongue and trough add flexibility. Metal channels and wood are used as framing members and the structural insulating core assembly can form structural insulated panels (SIP's). A coupling is used to connect vertical framing members and brackets are shown connecting spacer blocks than full height framing members. |
US08756887B2 |
Thermal insulation element with ventilation ducts
An element for thermal insulation of a building, which is provided for attachment to an exterior wall of the building on the outside. The element includes at least one duct which is surrounded by portions of the element on all sides except for in edge areas of the element. In one or more individual areas of the element the at least one duct extends towards an edge of the element such that, when the element is attached to the exterior wall, at least one connection of the at least one duct to the exterior wall is formed at at least one desired location, through which air can be guided into the building or out of the building. |
US08756884B2 |
Mulling and sealing system for compound fenestration units
A method is provided for coupling individual fenestration units together and sealing the gaps between them so as to form a sealed compound fenestration unit. The individual fenestration units include mating channels and tabs, or other connectors, that are attached to outside frame surfaces of the individual fenestration units. When the connectors are coupled together, they attach the frames of the individual fenestration units securely together in such a way that gaps are formed between the units along their joined frame surfaces. The gaps are sealed by resilient sealing strips that are configured to be inserted into the gaps, and that are formed with seals that bear against the walls of the gaps to form impervious moisture seals. |
US08756882B1 |
Tile for use in a modular flooring system
The tile includes a monolithic support grid structure having a rectangular configuration with four peripheral edges. The support grid structure includes a lattice framework of elongated rib members crisscrossing at right angle on the underside of the support grid structure and defining a network of cells. The support grid structure also includes a plurality of support members, each downwardly projecting from a corresponding intersection between the crisscrossing elongated rib members and having a ground-engaging distal end with a tip that is coincident with a common bottom plane. The tile includes a plurality of tile edge connectors that are positioned on the underside and made integral with the support grid structure. |
US08756881B2 |
Solar panel attachment system
A method, system and apparatus are disclosed regarding an attachment system for solar equipment, sometimes referred to as a flashing device allowing quick and easy assembling of the solar equipment into an array or other combination in a sturdy and durable manner. In examples of the present technology, a flashing device may include a flashing plate which may contain one or more raised features to further direct and control the flow of liquid over the flashing plate. The flashing device may also contain a fluid restrictor such as a seal or part of a seal usually held within an aperture of a block having a skyward facing essentially or substantially flat surface. One or more various items of solar equipment may be attached to the essentially flat surface of the block. Also disclosed are adjustable mounting feet which may be installed in connection with other solar equipment. |
US08756879B2 |
Spacer profile and insulating pane unit having such a spacer profile
A spacer profile for a spacer frame of an insulating pane unit includes a hollow profile body made of plastic with a chamber defined therein. The hollow profile body extends in a longitudinal direction and includes an inner wall, an outer wall, a first side wall and a second side wall, which are connected to the inner and outer walls to form the chamber. First and second reinforcing layers made of a metallic material respectively extend on the first and second side walls and partially on the outer wall so as to be spaced apart by a first distance. A diffusion barrier layer is formed directly on the outer wall between the first and second reinforcing layers and is connected thereto in a diffusion-proof manner in order to form a heat-insulating diffusion barrier. An insulating pane unit includes at least two panes with such a spacer frame disposed therebetween. |
US08756877B2 |
Ground anchor
A ground anchor system shaped and dimensioned for secure attachment within a support surface. The ground anchor system includes a primary anchor body extending along a longitudinal axis and including a first end and a second end. A coupling member is associated with the first end of the anchor body. A fastening assembling extends from the second end of the anchor body, the fastening assembly being composed of a plurality of downwardly extending facets, wherein each facet includes a first end and a second end. The first end of each facet is secured to the second end of the anchor body and the second end extends away from the anchor body. The second end of each facet includes a tip end having a facing surface cut at an obliquely oriented angle relative to the longitudinal axis of the anchor body such that upon installation into the support surface the second end of each of the plurality of facets is forced outwardly from the longitudinal axis as a result of the outward force generated by the interaction of the tip end with the support surface. |
US08756873B1 |
Transforming awning
An awning configured to transform and can be opened, closed, or partially open. The awning attaches to the side of a building or structure and is supported with posts. The awning includes rectangular rafters with a J cross-sectional shape formed at the edge of one of the long sides, rectangular rafters with an L cross-sectional shape formed at the edge of one of the long sides, two ledgers which are each functionally connected to opposing short sides of the rectangular rafters at the face of the ledgers, and means to axially rotate the rafters about the length of the rafters up to 90 degrees. |
US08756867B2 |
System and method for constructing a stage
An interchangeable kit for scenery having: a first wall unit and a second wall unit, each wall unit having: a first face to simulate a first surface, a second face to simulate a second surface different than the first surface and a plurality of first connector elements; an aperture unit comprising: a first face to simulate a first door or window, or having an operable first door or window; a second face to simulate a second door or window, or having an operable second door or window different than the first door or window and a plurality of second connector elements; and wherein the first plurality of connector elements connect a given wall unit to at least one other wall unit or aperture unit, and the second plurality of connector elements connect a given aperture unit to at least one other aperture or wall unit. |
US08756865B2 |
Door systems and methods
A door system can have a door that can both slide and pivot open. The door can be positioned in a door frame. The door can slide within the door frame using tracks, rollers, and/or guides. The door can be prevented from swinging open while the door is sliding along the doorframe. The door can swing open along a pivot point when a side of the door substantially abuts a side of the doorframe. The door can be prevented from sliding while door is swung open. |
US08756859B2 |
Stackable elevated planter
A stackable elevated planter has a rectangular or oval body that holds potting soil. Two or four legs sockets are attached to and extend away from the bottom of the planter body to define a rectangle. Legs are provided such that each leg has one end sized to fit within one of the leg sockets. The legs have a length less that the length of the rectangle and an average width which is less than one fourth of the width of the rectangle such that the four legs can be laid next to one another within the planter body and a similar second planter will fit within that planter. The body of the second planter may be positioned over the four legs such that the leg sockets of the second planter body extend beyond the four legs and the leg sockets of the second planter may rest on the top surface of the base of the first planter. An optional shelf that fits within the planter body for storage and is attached to the legs when the planter is assembled may also be provided. In another embodiment the legs can be filled with water and a wick may extend from each leg into the planter body. |
US08756855B2 |
Slip bobber rig
The invention relates to a stem guide that is configured to receive a replaceable cartridge. The stem guide includes a cartridge receiving end having a cartridge attachment means for attaching the cartridge to the stem guide in a manner that the cartridge can be removed from the stem guide without causing an amount of damage to either the cartridge or the stem guide which prevents either the cartridge or stem guide from being used again. The stem guide may be provided in a kit form with a variety of replaceable floats, scent sticks and light sticks. |
US08756852B2 |
Non-lethal/lethal projectile launcher ranging and sighting system
A ranging and sighting system for a lethal and non-lethal projectile launcher having an housing and a eyepiece positioned on an end of the housing and one or more reticles in the eyepiece having separate indicia for sighting a target and ranging a target and a switch for selecting between the indicia for sighting and the indicia for ranging the target. |
US08756851B2 |
Firearm multi-purpose tool
A multi-purpose firearm servicing tool has an elongated tool body having a first end portion and a second end portion. A bit engaging socket is provided at the first end portion of the elongated tool body. A plurality of deposit scraping structures are positioned around a longitudinal centerline axis of the tool body at the second end portion thereof. A gas tube clamp is provided at a position between the first and second end portions of the elongated tool body. Opposing tube clamp surfaces of the gas tube clamp are selectively movable between a tube clamping configuration and a tube receiving configuration. |
US08756849B2 |
Reinforced extendable butt stock
An extendable butt stock includes a housing having a forward end, an open rearward end, an opening at the forward end and a buffer tube of a firearm received therethrough. A hinge plate pivotally attaches a butt plate to the rearward end of the housing, movable between an open position and a closed position. A spine reinforcing member having a rearward end and a forward end extends from the rearward end of the housing to proximate the forward end of the housing and cradles the buffer tube. The butt plate contacts the rearward end of the spine reinforcing member when the butt plate is in the closed position. An engagement mechanism is carried by the housing and releasably attaches the buffer tube to the spine reinforcing member. |
US08756848B2 |
Rifle chassis having interchangable stocks
A rifle chassis is able to convert the M1A rifle to have a modular stock system. The chassis may be designed to permit attachment of a shotgun stock to the M1A chassis. For example, a particular model's modular stock system, such as a Mossberg® model 500 shotgun stock, may be attached to the chassis of the present invention to permit interchangeability of stocks on the rifle. |
US08756847B2 |
Firearm fire control selector
In accordance with the first exemplary embodiment a semi-automatic M-4 type firearm is provided. The firearm comprises a receiver and a reversible safety selector. The receiver has a right side and a left side. The reversible safety selector is rotatably coupled to the receiver and comprises a shaft with a user selector member at one end. The user selector member is adapted to allow a user to move the reversible safety selector relative to the receiver. The reversible safety selector is adapted to be mounted to the receiver in a first position with the user selector member located on the right side of the receiver. The reversible safety selector may be mounted to the receiver in a second position different from the first position with the user selector member located on the left side of the receiver. |
US08756844B2 |
Closure for break-action firearms
A closure for break-action firearms which includes a barrel assembly which is hinged to a break-action assembly so as to form a closed position and an open position of the firearm; the barrel assembly has a breech end which is opposite with respect to a breech face of the break-action assembly when the firearm is in the closed position. The structure is characterized in that it includes a plate which is associated with the break-action assembly and is interposed between the breech end of the barrel assembly and the breech face of the break-action assembly in the closed position, in which the plate closes the breech end by virtue of a means for the temporary locking of the plate on the barrel assembly. |
US08756843B1 |
Handheld firearms with indexed magazine and compact firing mechanism
New handgun configurations are enabled by a multiple cartridge magazine that includes the firing chamber for each cartridge. The magazine is indexed mechanically through the stock, with full index on trigger pull or full index on trigger release or part of the index period on trigger release and the remainder on trigger pull, thus aligning each successive cartridge with the barrel for firing. A sliding trigger mechanism with an index finger pull portion actuates both the magazine indexing and the firing mechanism. The firing mechanism employs a trigger actuated spring-loaded hammer with a wedge portion, which impacts a corresponding wedge shaped anvil which may contain an eccentric adjustable firing pin for firing center fire or rim fire cartridges. |
US08756841B2 |
Channel letter and trim cap retaining clip therefor
A channel letter has a rear surface for mounting against a raceway, wall, or a structure for supporting the signage, and sheet metal sides defining the figuration of the letter or shape to be depicted. A lighting element is positioned against the rear surface of the enclosure, and a lens is retained to the open front of the enclosure. The lens is retained by a plurality of retainer clips. Each of the retainer clips has a first and a second side extending from an arched back with the sides spaced a distance sufficient for the sides to fit around the end of the walls. |
US08756835B1 |
Footwear having air-controlled active element
A clothing article for a foot including a sole including a sealed collapsible air cavity having disposed therein a return support for expanding a collapsed air cavity wherein the air cavity includes an outlet permitting a quantity of air to exit when the air cavity is collapsed; an upper, coupled to the sole, for covering a portion of the foot; an air-actuated active element coupled to the upper, the active element including a first mode and a second mode, the active element biased to the first mode and responsive to the quantity of air to transition from the first mode to the second mode; and a communication channel, coupled to the outlet and to the active element, for transferring the quantity of air from the air cavity to the active element. |
US08756832B2 |
Article of footwear with multi-layered support assembly
An article of footwear including an upper and a sole assembly secured to the upper and including a support assembly having an upper member and a lower member spaced from the upper member. A first layer is positioned beneath and in contact with the upper member and has a wave shaped profile with a plurality of first wave crests and first wave troughs. A second layer is positioned above the lower member and has a wave shaped profile with a plurality of second wave crests and second wave troughs. |
US08756831B2 |
Article of footwear
A method of making a sole for an article of footwear is disclosed. The method includes steps of attaching a double sided acrylic adhesive film to a composite plate. The composite plate is then attached to an outer member of the article of footwear using the acrylic adhesive film. |
US08756825B2 |
Removing moistening liquid using heating-liquid barrier
A method for removing a moistening liquid from a moistened medium includes providing a liquid-blocking barrier having a first surface and a second surface that is impermeable to a heating liquid. A surface of the moistened medium is brought into contact with the first surface of the liquid-blocking barrier. The heating liquid is brought into contact with the second surface of the liquid-blocking barrier, the heating liquid being at a temperature greater than a moistening-liquid boiling point. Heat is thus transferred through the liquid-blocking barrier from the heating liquid to the moistening liquid, vaporizing the moistening liquid and removing it from the moistened medium. |
US08756822B2 |
Systems and methods for sailboat mast alignment
Systems and methods for sailboat mast alignment are provided. In some embodiments, a system for alignment of a sailboat mast comprises a mounting bracket configured for attachment to the mast, and one or more lasers pivotally connected to the mounting bracket to enable the one or more lasers to be positioned at an index angle relative to the mast on both sides of the mast. |
US08756819B2 |
Power operated rotary knife with disposable blade support assembly
A power operated rotary knife having a reusable handle assembly and disposable blade support assembly including a head portion and a blade support portion extending from the head portion, wherein upon completion of a tissue debriding operation on a donor, the used blade support assembly is removed from the handle assembly and disposed of, the handle assembly is autoclaved/sterilized and a new, sterilized blade support assembly is affixed to the handle assembly prior to a subsequent use. The knife includes an attachment assembly to releasably attach the disposable blade support assembly to the handle assembly and a retainer structure positioned in an annular groove formed in a bottom surface of the blade housing portion, the retainer structure bearing against an annular rotary knife blade and the blade housing portion to permanently retain an annular body section of the blade in the annular groove. |
US08756814B2 |
Method of manufacturing a bicycle rim
A bicycle rim is basically provided with an outer rim portion and an inner rim portion. The outer rim portion has a ring shape of a first material. The inner rim portion is joined to the outer rim portion. The inner rim portion has a ring shape of a second material with an internal residual stress distribution resulting from the ring shape being formed by spinning of the second material. |
US08756812B2 |
Air cooled heat shield
A heat shield is disclosed comprising a formed sheet having a thickness, an exterior shielding surface, and an interior shielded surface, wherein the exterior shielding surface comprises a multiplicity of protruding perforations. The protruding perforations comprise protrusions increasing surface area and generating turbulent flow, and small openings through the shield to allow convection air flow to pass through. |
US08756811B2 |
Heat sink having heat-dissipating fins capable of increasing heat-dissipating area
A heat sink having heat-dissipating fins capable of increasing heat-dissipating area-includes a heat pipe and the heat-dissipating fins. The heat pipe has a heat-absorbing section and a heat-releasing section. The heat-dissipating fin has a lower plate and an upper plate. The upper plate is bent to be overlapped on the lower plate, thereby forming a heat-dissipating path (b) therebetween. The lower plate and the upper plate are provided with a through-hole respectively in such a manner that these two through-holes correspond to each other. The heat-releasing section of the heat pipe penetrates the through-holes of the heat-dissipating fins successively. In this way, the heat-dissipating area in the same height can be increased, thereby improving the heat-dissipating efficiency of the heat sink. |
US08756807B2 |
Method of forming connector with isolated conductive paths
An apparatus includes a connector with isolated conductive paths In various embodiments, a method includes assembling, at least partially, the connector using a groove of the connector. A flexible member can be secured in the groove and solder can be flowed into the flexible member in the groove. Additional apparatus, systems, and methods are disclosed. |
US08756805B2 |
Method of manufacturing multilayer printed wiring board
A method of manufacturing a multilayer board, including: forming a hole through a pre-preg by laser, filling the hole with conductive paste containing a resin component and metal powder, and arranging copper layer portions of patterned boards on and under the filled conductive paste and pressing the same, wherein in the conductive paste at least surface layers of the different metal powders are melted and alloyed, the pre-preg has a ratio A/B of at least 10 before being subjected to preheating, where A is a storage modulus at an inflection point where the storage modulus changes from increasing to decreasing and B is a storage modulus at an inflection point where the storage modulus changes from decreasing to increasing in a temperature rising from 60 to 200 degree C., and preheating the pre-preg before the drilling step to reduce the ratio A/B to below 10. |
US08756804B2 |
Method of manufacturing printed circuit board
Disclosed is a printed circuit board, including a base member, an insulating layer formed on each of both surfaces of the base member so that the surfaces of the base member are flattened, a circuit layer formed on the insulating layer, and a via for connecting the circuit layer formed on one surface of the base member with the circuit layer formed on the other surface of the base member. A method of manufacturing the printed circuit board is also provided. |
US08756791B2 |
Tampon applicator
A tampon applicator is provided having a barrel and/or a plunger molded from a pulp-based material. The barrel can be molded such that it includes a molded fingergrip area having a textured surface, at least one gripping structure, or any combination thereof. Petals may be molded on the pledget ejection end of the barrel. In addition, the exterior surface of the barrel is molded such that it is textured, smooth, or any combinations thereof. The molded tampon applicator exhibits superior flushability and compostability characteristics, without compromising the strength of the barrel or plunger. |
US08756788B2 |
Method for manufacturing rigid tubular pipes having double casing, and facility dedicated to manufacture of said pipes
A method and a facility for manufacturing rigid tubular pipes having a double casing for hydrocarbon transport. The pipes include an inner rigid tube (42, 242, 342, 442) that is inserted into an outer rigid tube (16, 216, 316, 416). The facility includes a supporting frame (12, 212, 312, 412) for an inlet end of the outer rigid tube and a movable apron (22, 222, 322, 422). The apron includes a catch (38, 238, 338, 438) for catching the rigid tube and inserting it in the outer rigid tube. The apron includes storage members (68, 268, 368, 468) for receiving stored heating cables (69, 269, 369, 469) and the driving force of the apron makes it possible to deploy a portion having the length of the stored heating cables (69, 269, 369, 469) so as to be able to apply the deployed portion, having the length of the heating cables, along the inner rigid tube (42, 242, 342, 442). |
US08756786B1 |
Method of fastening corks
A method of interconnecting multiple bottle cork closure elements to form a variety of useful integrated constructions. The method uses one or more string strands of flexible yielding material to be passed through custom configured passageways within each cork in continuous pass through patterns defined by similar and varied passageways in adjacent abutting corks. The interconnecting pattern path of the strands defines intermediate points of applied tension and selective securing in a defined assembly step process to form the respective article of construction. |
US08756780B2 |
Tube applicator
Apparatus to connect a flexible tube to a spigot on bio-disposable systems. The apparatus comprises a support for a spigot and jaws for gripping and holding a flexible tube. The jaws open and close for insertion of the flexible tube either under manual or pneumatic force. The jaws also include a front section that is openable against a resistance. In use, the end of the spigot is place inside the end of the flexible tube, the spigot is then positioned on the support, and the tube clamped into the jaws. Either on manual or pneumatic action, the spigot is advanced into the flexible tube within the jaws. The front section of the jaw opening slightly to accommodate the spigot, while the back section of the jaw holds the tube firmly in position. |
US08756779B2 |
Tool for attaching a stud to a surface
A tool for applying a fastener, such as a stud, is disclosed herein. In one embodiment, the tool applies the fastener assembled with an applicator. The applicator has at least two legs. The tool includes a housing portion configured to releasably receive the fastener and the applicator. The tool further includes an actuating portion slidingly connected to the housing portion and having one or more projections. Movement of the actuating portion towards the contact surface presses the fastener against the contact surface and bends the at least two legs of the applicator towards the contact surface. |
US08756774B2 |
Casket and ornament therefore
A casket comprises a casket shell adapted to receive the remains of a deceased having a pair of side walls, a pair of end walls, and a bottom wall, and a casket cap closable on the casket shell. A dish assembly is mounted to an underside of the cap. The dish assembly includes a cap panel comprising a sheet of magnetic material. At least one medallion having text and/or graphics representing a life aspect of the deceased is removably mounted on the cap panel. The medallion comprises a medallion blank having at least one magnet on a rear side thereof and having a recess on a front side thereof, a two-dimensional image positioned in the recess of the medallion blank, and a transparent layer of material overlying the two-dimensional image. The transparent layer of material is dome-shaped in cross section such that a peripheral outer edge of the layer is thinner than a central portion of the layer. The magnet removably secures the medallion blank to the magnetic material of the cap panel. |
US08756772B2 |
Adjustable clip
A clip 10 is provided for the retention of cables or wiring 44 in electrical installation trunking 46. The clip 10 has a first member 12 and a second member 14, which are coupled together in a sliding relationship. In use, the clip 10 slides apart, extending across the open face 50 of the trunking 46 until the lateral ends of the clip abut against an internal side wall 52 of the trunking 46. Cooperating locking strips (26, 40, see FIGS. 3 and 4) act to lock the relative positions of the first 12 and second 14 members and to prevent the clip 10 from falling out of the trunking 46. |
US08756770B2 |
Touch fastening product face configuration
A fastening product, in the form of a flexible, sheet-form substrate (102) having a surface (108); a plurality of walls (104) extending from the surface (108) and defining therebetween an array (114) of cells (116) bounded by the walls (104) such that the walls separate adjacent cells of the array, the substrate (102) forming a floor (122) of each cell; and a plurality of fastener elements (106) extending from the surface (108) and interspersed among the cells (116). The fastener elements having heads (130) spaced above the surface (108) to define loop engagement overhangs (134) disposed within the cells. The cells (116) of the array (114) are arranged in columns (124) and rows (126), each column and each row comprising at least three of the cells, such that there exists at least one closed path (136) within the substrate (102) that fully circumscribes at least one of the cells. |
US08756768B2 |
Waterproof slide fastener
A waterproof slide fastener is provided. A pair of tapes has coupling elements attached thereto. A coating of polymeric material is provided on at least one surface of the tape and extends continuously therealong. The coating includes in cross-section a fin with a bulbous region. The coating is not extendable beyond the coupling elements when the slide fastener is in an open arrangement. |
US08756765B2 |
Molded integral joint
A method is provided for molding an integral joint including a stationary member and an enclosure rotatable about the stationary member. The method utilizes a joint formation assembly defining an inner cavity, a first passageway connected to the inner cavity, an outer cavity surrounding the inner cavity, and a second passageway connected to the outer cavity. The method includes the steps of: introducing moldable material into the inner cavity from the first passageway to form the stationary member; introducing moldable material into the outer cavity from the second passageway to form the enclosure; and divorcing the inner cavity from the outer cavity for separately and independently forming the enclosure around the stationary member to allow rotatable movement of the enclosure about the stationary member. |
US08756763B1 |
Vertical door conversion kit
A vehicle door hinge for a passenger or driver side vehicle door. The hinge has a chassis mounting plate securely fastenable to the vehicle frame, a swingarm securely fastenable to the vehicle door, a bi-directional rotation mechanism connecting the chassis mounting plate to the swingarm and allowing rotation of the swingarm in a substantially horizontal plane and in a substantially vertical plane, first and second bearing surfaces positioned to rotate with the bi-directional rotation mechanism and to bear against each other when the swingarm is rotated in the substantially horizontal plane, and not to bear against each other when the swingarm is rotated in the substantially vertical plane, and a spring attached at one end to the swingarm and at the other end to the vehicle frame or to the chassis mounting plate, for counter-balancing the weight of the vehicle door when the swingarm is rotated in the vertical plane. |
US08756761B2 |
Hinge and method of assembling the same
A hinge (100) including a first flange (102) having a first sleeve segment and a portioned sleeve segment is disclosed. The hinge also includes a second flange (104) having a second sleeve segment. The second flange is configured to mate with the first flange such that the first sleeve segment, the second sleeve segment, and the portioned sleeve segment are substantially aligned. A pin (106) is configured to be removably inserted into the first sleeve segment and the second sleeve segment. Also disclosed are a method for assembling a hinge and a container assembly including a hinge. |
US08756754B2 |
Anti-vibration cantilevered handle for a blowing apparatus
A hand carried power tool (100) is presented which includes a vibration-producing power unit (15) interconnected with an elongate handle (20). The handle (20) has a base end (24) coupled to the power unit (15) and an opposite free end (28) configured for manual gripping. Additionally a vibration damping member (50), which permits vibration-induced movement between the base end (24) of the handle (20) and the power unit (15), interstitially located between the base end (24) of the handle (20) and the power unit (15). Furthermore, a resilient biasing member (40) is coupled between the elongate handle (20) and the power unit (15). The biasing member (40) connects to the handle (20) at a location distant from the base end (24) of the handle (20) and the biasing member (40) is configured to dampen vibration-induced relative movement between the base end (24) of the handle (20) and the power unit (15). |
US08756751B2 |
Robot cleaner, maintenance station, and cleaning system having the same
In a cleaning system, dust stored in a dust box is suspended in air introduced into the dust box through a first opening formed through a robot cleaner, and is then discharged to a second opening formed through a maintenance station through the first opening of the robot cleaner. |
US08756748B2 |
Windscreen wiper device
A windscreen wiper device comprising an elastic, elongated carrier element, as well as an elongated wiper blade of a flexible material, which wiper blade includes opposing longitudinal grooves on its longitudinal sides, in which grooves spaced-apart longitudinal strips of the carrier element are disposed, which windscreen wiper device comprises a connecting device for a oscillating arm comprising two longitudinal arm sections connected to each other by means of a curved intermediate section, wherein said oscillating arm is pivotally connected to the connecting device about a pivot axis, with the special feature that the oscillating arm is pivotally connected to the connecting device about the pivot axis, with the interposition of a joint part, wherein the joint part comprises a resilient tongue engaging in a correspondingly shaped hole provided in the oscillating arm, and wherein the joint part and the connecting device are pivotally connected to each other by mutually cooperating protrusion/hole means, the protrusion/hole means, the protrusion/hole means being located below the longitudinal center plane between the two longitudinal arm sections. |
US08756747B2 |
Twin bladed scraper tool
A scraper tool of a one piece construction is conformable for use in scraping various surfaces and is made up of a pair of scraper blades (13,13′) with their junction along the length of the tool, under its handle (12). The blades extend in opposite directions under the handle (12), in line with it, at a set angle forming an open bottom, with the handle (12) above the blades (13,13′) and the surface to be scraped. The application of force and direction of travel will allow the forward blade to “cut” substrates from a surface, the rear blade will maintain a cutting angle for the forward blade, the device will operate in a similar fashion on its reverse stroke. |
US08756743B2 |
Toothbrush head
A toothbrush has a removable end cap at its free end area directed away from the bristles, which end cap closes off an inner space of a grip element. The end cap accommodates an electrical control element, in particular a potentiometer, which can be adjusted via an adjustment element arranged rotatably on the end cap. The toothbrush also comprises an electrical power consumption unit, in particular an electric motor, which is designed to set the bristles in vibration. The energy supply from an energy reservoir arranged in the interior to the electrical power consumption unit can be adjusted continuously by means of the control element, as a result of which the vibration intensity of the bristles can be steplessly adjusted. |
US08756742B1 |
Golf towel
A sports towel constructed in the form of bag having an interior surface and an exterior surface wherein soil on the interior surface is prevented from transfer to the exterior surface is provided. The towel includes a bag-shaped body constructed of a fabric material. The body has opposing first and second ends and a continuous peripheral wall extending between said first and said second ends. The first end being closed and together with said peripheral wall defining an interior space within said body. The second end being open and providing access into said interior space. The peripheral wall including an interior surface that includes two areas of dissimilar surfaces. |
US08756738B2 |
Wash cycle for oxidizing agents
A wash cycle for a clothes washer with a wash zone defined within a rotating drum having an outer wall, for receiving a fabric load. The steps include dispensing a volume of a first wash liquor to the wash zone, rotating the drum to move the fabric load toward the outer wall and recirculating the first wash liquor through the fabric load and wash zone, all during a first time period. The fabric load is flexed during a second time period. The cycle continues with dispensing a volume of a second, different wash liquor to the wash zone, rotating the drum to move the fabric load toward the outer wall and recirculating the second liquor through the fabric load and wash zone during a third time period. One of the two wash liquors is an oxidizing agent wash liquor. Then the remainder of the wash cycle is completed. |
US08756737B2 |
Air tool with modularized air pad
An air tool with a modularized air pad includes several air pad units, each of which has one pad body whose top surface is formed with an accommodating recess and whose one side has an air opening; two air bags disposed at the bottom of the accommodating recess, each of the air bags having two air chambers and connecting to the air opening via an air pipe; and one buffer pad accommodated in the accommodating recess on the air bags. When the air opening is selected to inflate the air chamber of one air bag, the buffer pad undergoes an upward swing motion according to the inflated air bags. |
US08756724B1 |
Universal tub overflow cover assembly and kit
An overflow cover assembly and kit for making same comprising at least a cover piece including a snap on section and a hanger which is configured to engage a bracket crossing and engaged over a port of an overflow system, the hanger mounting to the overflow port bracket using screws from the previous hanger engaged thereto and the cover piece being engaged to the hanger by two screws provided in the kit, the cover assembly accommodating replacement of either one or two screw cover embodiments and being provided in various finishes and in regular size or being oversized. |
US08756723B2 |
Spa jet with side-mounted light well
A water jet suitable for use in a water recreational apparatus has (a) a body defining a body interior passageway between a body inlet opening and a body outlet opening, the body having (a) a light well with an open external end and a closed transparent internal end, and (b) an insert disposed largely within the body, the insert defining an insert interior passageway between an insert inlet opening and an insert outlet opening, the insert defining a flange cover at the proximal end of the insert. The insert is moveable within the body between a water open position and a water closed position. The insert is also moveable within the body between a light on position and a light off position. |
US08756722B2 |
Flushing device for flushing a toilet bowl, water closet having such a flushing device, and toilet bowl
The flushing device has a flushing tank (28), from which a quantity of flushing water can be fed to the toilet bowl (6). This flushing water quantity is divided into a part-quantity for cleaning an upper region of the toilet bowl (6) and a further part-quantity for moving water which is present in the toilet bowl (6). Means (30) are provided, with which the flushing water quantity is divided into at least three part-quantities. With a first part-quantity at least an upper region (A) of the inner side of the toilet bowl (6), and with a second part-quantity a middle region (B) of the inner side of the toilet bowl (6) is cleanable, and with a third part-quantity a siphon trap (12) of the toilet bowl (6) can be flushed and cleaned. The flushing device enables a more thorough cleaning of the toilet bowl with comparatively little water. |
US08756720B2 |
Multiple lens geometries for safety glasses
A family of eye protectors for use with a variety of shapes and sizes of heads includes a plurality of different lenses with each lens having a selected curvature and selected height and profile parameters; and a manually adjustable nose engaging element carried on each lens. The nose engaging element can include a substantially U-shaped frame which has first and second deflectable, spaced apart members joined by a third member. A plurality of identical mounting elements can be proved wherein each mounting element holds one of said plurality of different lenses. |
US08756718B2 |
Undergarment for use with protective vest
An undergarment to be worn beneath a protective vest or uniform permits escape of perspiration and heat, and ventilation so that the wearer can remain reasonably comfortable while wearing the vest. The undergarment has vertically elongated ribs or bars space the vest away from the torso to create ventilation channels. Heat and perspiration vapor escape at the neck of the vest. The ribs or bars can each comprise a cloth strip or pocket sewn onto the garment, to contain a lightweight rod of open-cell or closed-cell polyethylene foam. Three or more of these ribs can be sewn onto the front, and two or more sewn onto the back. |
US08756713B2 |
Hoodie with three groups of connectors on an opening edge of the hood
A garment with a hood, wherein three groups of connectors are installed on and around the opening edge of the hood surrounding the face of the wearer. Each group of the three groups of connectors are positioned at a vertex of a triangle shape. When the hood has been put on the head of the wearer, the exposure area of the wearer's face is to be adjusted to be smaller or larger, by tightening or untightening one pair, or more than one pair of the connectors. When tightened, the hood forms better thermo-insulation, and provides better protection for the user against severe weather including cold, wind and snow. |
US08763159B1 |
System and method for application license management in virtual environments
A system and method for managing licensing of virtual environment applications. A licensing module of a first installed virtual environment application detects installation of affiliated applications and gives them a group licensing key for passing it to the licensing server. The licensing server derives licensing parameters of the affiliated applications from the group key and gives the licenses to the affiliated applications, in case of successful validation. The licensing system provides protection from un-authorized copying of the applications. If an affiliated virtual environment application is copied (or moved) to another hardware node without its virtual environment, the licensing server will not give the license activation key to this virtual environment application. |
US08763155B1 |
Tag based views for role based access control
A method of controlling access to a client over a computer network includes associating a user interface element with at least one tag and defining an access permission rule for a client, as a function of one or more tags, the function including at least one OR, NOT or inequality condition. The method further includes receiving a request of the client to access the user interface element and allowing the client to access the user interface element only if the tags of the user interface element meet the condition of the access permission rule. |
US08763148B2 |
Systems and methods for preventing data remanence in memory
A system for preventing data remanence in memory is provided. The system includes a computing device, a memory chip coupled to the computing device and including memory, and a heater, the heater configured to prevent data remanence in a memory by providing heat to at least a portion of the memory. The memory includes a plurality of bits configured to electronically store data. |
US08763142B2 |
Tokenized payment processing schemes
A payment processing system for accepting manually-entered payment-card numbers. Rather than entering a payment-card account number into an application module, the card number is instead captured and stored within a tokenizer prior to being sent to the application module. The tokenizer then returns a random token to the calling application as a pointer to the original payment-card number. The token has no algorithmic relationship with the original payment-card number, so that the payment-card number cannot be derived based on the token itself. Since the token is not considered cardholder data, the token may be used in an application module without the module or its connected hardware from being subject to regulatory standards compliance. Some embodiments involve browser-based schemes, and some embodiments involve PIN-entry device-based schemes. |
US08763139B2 |
Origin and custody of copies from a stored electronic record verified page by page
A method of authenticating a copy of a multi-page document, which includes digitizing a said multi-page document to generate one or more digitized files that together comprise a digitized transcript. A mark that is unique to the preparer of the document, such as a signature, is prepared and digitized. The preparer of the document is allowed to deposit the digitized transcript on an online repository. The operator of the online repository immediately establishes a verification process for the deposited digitized transcript. This verification process includes associating the digitized preparer mark with the deposited digitized transcript, and freezing the transcript, by encrypting it and deriving a checksum. The verification process also include associating a repository mark with the transcript. The operator of the online repository defines, under the direction of at least the preparer of the document, security rights to limit or otherwise control access to the deposited digitized transcript. The digitized preparer mark and the digitized repository mark are allowed to appear on substantially all copies of the pages of the document only if the pages have not been altered. If carrying out the verification process verifies that the deposited digitized transcript has not been changed since the verification process was established the marks are displayed with the unaltered page. This display whether the pages are displayed on a monitor or printed in paper form. Each page with this display is thus authenticated as to origin and custody apart from the other pages or the transcript as a whole. |
US08763132B2 |
Open source security monitoring
Systems, methods, and devices for open source security monitoring are described herein. For example, one or more embodiments include searching open source data for data posing a security vulnerability to an entity, associating a risk level with the data posing the security vulnerability to the entity, and determining whether to perform a remedial action based on the risk level. |
US08763129B2 |
Vulnerability shield system
Security against computer software attacks is provided by blocking the use of known software vulnerabilities by attackers. Rather than merely discovering attacking software after it has installed itself into a computer system as in the prior art, software with a known vulnerability is monitored so that when it takes a potentially dangerous action, such as creating new attack software, that new attack software is marked and then prevented from loading. If the newly attack software cannot load, it cannot execute thus thwarting use of the newly written software to perform whatever nefarious act was intended by the attacker. |
US08763128B2 |
Apparatus and method for detecting malicious files
An apparatus for detecting a malicious file, includes a program driving unit configured to output an execution address of a command executed by driving a program corresponding to a non-executable file; and an address storage unit configured to store normal address range information in accordance with the driving of the program.Further, the apparatus includes a maliciousness determination unit configured to determine whether the non-executable file is malicious depending on whether the execution address is not within the normal address range information. |
US08763127B2 |
Systems and method for malware detection
A system and method for distinguishing human input events from malware-generated events includes one or more central processing units (CPUs), one or more input devices and memory. The memory includes program code that when executed by the CPU causes the CPU to obtain a first set of input events from a user utilizing the input device. The first input events are used to obtain or derive a feature indicative of the user, such as a multi-dimensional feature vector as provided by a support vector machine. Second input events are then obtained, and the second input events are classified against the feature to determine if either the user or malware initiated the second input events. |
US08763126B2 |
Devices, systems, and methods for detecting proximity-based mobile propagation
Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network. |
US08763124B2 |
Information processing apparatus and method, recording medium and program
An electronic device that shares a secret key between the electronic device and another electronic device; receives a first response request transmitted from the another electronic device; generates a first response message based on the first response request; receives a second response request transmitted from the another electronic device after the another electronic device receives the first response message; and generates a second response message based on the second response request, the second response message transmitted to the another electronic device. The electronic device is authorized to receive data from the another electronic when authentication is performed between the electronic device and the another electronic device, and a predetermined time elapsed from a transmission of the second response request does not expire before the second response message is received by the another electronic device. |
US08763122B2 |
Active computer system defense technology
Active computer system defense techniques can include sending disruptive communications to attackers, where the disruptive communications include random data elements which could potentially interfere with the operation of an attacking system. Such computer system defense techniques can also be augmented to automatically optimize the disruptive communications sent to the attackers. |
US08763117B2 |
Systems and methods of DNS grey listing
To circumvent being blacklisted by an ISP, some viruses use a domain name generator algorithm or a domain generator algorithm (DGA). In an example, the DGA may use the current date and time to generate a random domain name based on the date. So for a given date, the botnet registers a particular domain in order to control the Trojan horse virus. The domain name that the botnet uses typically changes every day, which helps circumvent blacklisting. To counteract that, the disclosed systems and methods of DNS greylisting place a domain name in a grey list for a time period, for example a day, that the domain is resolved by the ISP. The first time the ISP experiences a customer trying to contact a particular domain, the ISP prevents the domain from resolving. After the time period (for example, 24 hours) expires, the domain is allowed to resolve normally. |
US08763113B2 |
Method and system for processing a stream of information from a computer network using node based reputation characteristics
A method for processing information from a variety of submitters, e.g., forensic sources. The method includes receiving information about one or more nodes from a submitter from a plurality of submitters numbered from 1 through N. In a specific embodiment, the one or more nodes are associated respectively with one or more IP addresses on a world wide network of computers. The method includes identifying a submitter reputation of the submitter from a knowledge base and associating a node reputation of the node based upon at least the reputation of the submitter and submitted information from the submitter. The method also transfers the node reputation. |
US08763110B2 |
Apparatuses for binding content to a separate memory device
A memory device is provided. The memory device includes a memory configured to store information. The memory device also includes a memory controller in communication with the memory. The memory controller is configured to encrypt the information to define a parameter and access an account on a second memory device based on the parameter to gain access to content. The content is stored in the second memory device and the memory device and the second memory device are configured to be removably coupled to a computing device. |
US08763109B2 |
Seamless data networking
A roaming client in communication with an enterprise site through a virtual private network (VPN) gateway maintains an address for a virtual network interface upon becoming a resident client at the enterprise site. A physical interface for the resident includes two valid addresses. Seamless data networking is achieved while promoting routing efficiency by reducing the amount of local traffic addressed to and from the virtual address that is unnecessarily routed through VPN gateways. |
US08763108B2 |
Flow classification for encrypted and tunneled packet streams
Methods and systems for solving the problem of special processing required by various communication network subsystems (e.g., QOS, security, tunneling, etc). In some cases the processing by one communication subsystem may result in modified IP data packets which may affect the application of additional processing of such packets. The methods and systems solve problem by translating filters and setting up additional tunnels or other procedures based on the use case so that all the end and intermediate nodes can do the required processing on modified packets. The methods and systems may take into consideration an overlap or intersection of two or more different types of packet filters. A first set of packet filters is translated to provide the desired packet classification for modified packets. The second set of packet filters may be translated based upon the translation applied to the first set of packet filters. |
US08763106B2 |
Application state sharing in a firewall cluster
A firewall cluster system comprises a first node operable to receive a connection in a firewall cluster having three or more nodes, monitor packets of the received connection and determining application state data associated with the connection from the monitored packets in the first node, and share application state data with at least another node in the firewall cluster. |
US08763102B2 |
Single sign on infrastructure
One embodiment is a method that uses a Single Sign On (SSO) infrastructure in an application for creating a security context that identifies a user. The application then passes the security context to a second application and to the user as a cookie. The cookie is passed back to applications to enable SSO access to resources. |
US08763096B1 |
Methods and systems for managing authentication
A computer-implemented method for managing authentication may include identifying authentication-capabilities information of an online service. The computer-implemented method may also include identifying, within the authentication-capabilities information, a specification indicating how a remote computing agent may interact with the online service to perform an authentication function supported by the online service. The computer-implemented method may further include using the specification to interact with the online service to perform the authentication function. Various other methods, systems, and computer-readable media are also disclosed. |
US08763095B2 |
Authorization sharing
A method relates to access control of shared resources on computer systems that have diverse system policies for access rights to resources. The method includes, on a source computer system with which a target computer system shares a resource, preparing user-authorization data for the shared resource in a flat file format as data tuples, line records or tables. This format makes the user-authorization data usable in computer systems with diverse system policies for access rights to resources. The method further includes authorizing user access to the shared resource on the target computer system based on the user-authorization data prepared in flat file format by the source computer system. |
US08763091B1 |
Method and system for user authentication offload in a transparent database load balancer
Roughly described, a database accelerator is installed in a network between database client and server systems. Connection requests from a client system are received and authenticated by the accelerator itself, which is pre-configured with user authentication information, by emulating the authentication process on behalf of the server. An authenticated connection from the accelerator to a database server is established only if and when needed. Involving the server for authentication can be avoided for example if the accelerator maintains a pool of such authenticated server connections for re-use as needed, and/or if the accelerator maintains a cache of query responses previously received and can respond to new queries from the cache. By installing the accelerator transparently in the network, no modification of software in either the client application or the database servers is required in order to add authentication offload functionality to an existing client/server database arrangement. |
US08763089B2 |
Flexible authentication and authorization mechanism
Techniques and tools for flexible authentication and authorization of services on a push framework. For example, a push notification framework allows services (social networking web services, etc.) to use either an authenticated access mode or an unauthenticated access mode, in order to push information to client devices (e.g., mobile devices). In the authenticated mode, the push framework requires registration of the service with the push framework before allowing the service to push notifications to client devices. Different authenticated modes are provided for third-party and first-party services. In the unauthenticated mode, registration is not required, but notifications are throttled, thereby limiting risk of abuse by unauthenticated services. This allows flexibility for services that use the push framework. |
US08763088B2 |
Distributed authentication, authorization and accounting
In some embodiments, computer systems, storage mediums, and methods are provided for controlling a connecting device's access to a plurality of computer networks. In other embodiments, the provided computer systems, storage mediums, and methods may provide for authentication, authorization, and accounting of connecting devices connecting to a plurality of computer networks. In other embodiments, the provided computer systems, storage mediums, and methods may provide for the distribution of authentication routing data and authorization policies among a plurality of computer networks. In yet other embodiments, the provided computer systems, storage mediums, and methods may provide for the distribution of accounting among a plurality of computer networks. |
US08763084B2 |
Networking as a service
Networking as a Service (NaaS) delivers network services using remote appliances controlled by a hosted, multi-tenant management system. The system may include a heartbeating process for communication between a web-based server and appliances, in which the appliances periodically contact the management system on the server. The heartbeating process allows the appliances to maintain a completely up-to-date configuration. Furthermore, heartbeating allows for comprehensive monitoring of appliances and for software distribution. The system may also include means for authenticating appliances, without the need for pre-installed PSKs or certificates. |
US08763076B1 |
Endpoint management using trust rating data
Techniques are disclosed for implementing dynamic endpoint management. In accordance with one embodiment, whenever an endpoint joins a managed network for the first time, or rejoins that network, a local security module submits a list of applications (e.g., all or incremental) to a security server. The server validates the list and sends back a rule set (e.g., allow/block rules and/or required application security settings) for those applications. If the server has no information for a given application, it may further subscribe to content from a content provider or service. When the server is queried regarding an unknown application, the server sends a query to the service provider to obtain a trust rating for that unknown application. The trust rating can then be used to generate a rule set for the unknown application. Functionality can be shifted from server to client, and vice-versa if so desired. |
US08763074B2 |
Scalable firewall policy management platform
Securing large networks having heterogeneous computing resources including provision of multiple services both to clients within and outside of the network, multiple sites, security zones, and other characteristics is provided using access control functionality implemented at hosts within the network. The access control functionality includes respective access control policies for indicating to each host from which other computers it can accept connections. Content of the access control policies can be determined based on application data flow needs, and can draw information from databases including DNS and security zone information for hosts to which the access control policies will be applied. Access control policies can be formatted automatically for different host with different characteristics from the same base logical rule set. Other aspects include using more permissive and/or access control rules provided on network equipment to block known bad data, while providing host-based access control focused on application data flow. |
US08763071B2 |
Systems and methods for mobile application security classification and enforcement
The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate. |
US08763070B2 |
Electronic transactions system
A system for processing electronic transactions according to policies is disclosed. The system includes a user module configured to store computer-readable information related to a user, and a policy module configured to store a plurality of policies for electronic transactions. Each policy for an electronic transaction includes a permission to access a physical space or item by a user. The system also includes a processor configured to receive a request to complete an electronic transaction by the user, and configured to dynamically apply, upon receipt of the request by the processor, the plurality of policies to the user based on the request to complete the electronic transaction. Methods and machine-readable mediums are also disclosed. |
US08763069B2 |
Dynamic entitlement manager
Embodiments of the invention relate to systems, methods, and computer program products for monitoring and/or controlling access to entitlements. For example, in one embodiment a computer program product is configured to periodically examine the members of a particular community in an organization and automatically identify members in the community that have access to software applications, datasets, or other organizational resources that are uncommon in the community, which may indicate that the member should not have access to the such resources. The computer program product of embodiments of the invention is also configured to automatically and periodically determine the resources that members of the same community should all probably have access to. As such, embodiments of the present invention allow an organization to more efficiently monitor and control access to its resources and other entitlements. |
US08763061B2 |
Correlation of tuned channel information with internet web addresses
An auxiliary display device, capable of remotely controlling a set-top box (STB) and/or television to select a program channel, is used to navigate a web browser in the auxiliary display device to a web site associated with the selected channel. A web page associated with the selected channel is presented on a display of the auxiliary display device. When the channel is selected, current tuned channel information is transmitted by the set-top box (STB) and/or television to the auxiliary display device, irrespective of whether the auxiliary display device was used to select the channel. In an alternate embodiment, the STB and/or television forward channel information to the auxiliary display device via a cable head-end. |
US08763058B2 |
Selective data downloading and presentation based on user interaction
Some embodiments of the invention are directed to, among other things, systems, computer readable media, methods and any other means for using a handheld device to present information to a user. The handheld device and server(s) can be configured to differentiate among inexpensive and expensive information. For example, the handheld device can be configured to present media listings that represent media stored on the server(s). Each media listing can include text (inexpensive information) and thumbnails (expensive information). While the user scrolls through the media listings, the new listings can only include text. Once the scrolling stops, the missing thumbnails can be downloaded and integrated into their corresponding listings. In response to a listing being selected, the corresponding media file can be downloaded and/or played back to the user by the handheld device. |
US08763053B1 |
File system for a file server of a video-on-demand system
A file system that integrates trick play and standard play video information (movies or other video assets) into a single file. The single file for the video information contains a standard play track, a fast forward track, and a reverse play track that is striped onto a storage medium. |
US08763051B2 |
Method and apparatus for receiving signal
A method of controlling devices, and which includes converting, via a transmitting apparatus, a signal including at least one of the video/audio and data into a first definition wireless signal, transmitting, via the transmitting apparatus, the converted first definition wireless signal to a receiving apparatus, receiving, via the receiving apparatus, the first definition wireless signal, extracting, via the receiving apparatus, the at least one of the video/audio and data included in the first definition wireless signal, detecting, via a detector on the receiving apparatus, a quality of the received first definition wireless signal, and comparing, via a processor on the receiving apparatus, the detected quality of the received first definition wireless signal with a predetermined value, and transmitting a first command to the transmitting apparatus to transmit a second definition wireless signal including the at least one of the video/audio and data to the receiving apparatus, when the detected quality of the received first definition wireless signal is lower than the predetermined value, the first and second definition wireless signals using different wireless communication standards. |
US08763049B2 |
Server apparatus, video image quality measurement system, video image quality measurement method and program
A server apparatus includes: a compression and encoding unit that compresses and encodes screen information or image information downloaded from a Web serve on the Internet in response to an instruction from a mobile terminal; a packet transmission unit that stores an output signal from the compression and encoding unit into a packet and transmits the packet to the mobile terminal via a packet forwarding apparatus(es); and a video image quality measurement unit that measures video image quality by referring to an input signal to the compression and encoding unit, a signal decoded from the output signal of the compression and encoding unit, a transmission timing of the packets, and a timing at which the mobile terminal receives the packet. |
US08763043B2 |
Digital TV and method for controlling same
Disclosed are a digital TV and a method for controlling same. The method for controlling a digital TV according to one embodiment of the present invention includes: displaying a user interface (UI) capable of selecting the standby mode for a power-off operation; and disconnecting the power source for a display panel so as to enter the standby mode when the standby mode is set through the UI in the power-off operation, and a power-off command is received. The standby mode includes a lower standby mode based on the operation of the digital TV and a network function, and the digital TV in the standby mode stops AV channel communication and performs SI channel communication. |
US08763041B2 |
Enhancing video content with extrinsic data
Disclosed are various embodiments for enhancing video content with extrinsic data. A video content feature is rendered on a display. A user interface is rendered on top of the video content feature on the display. The user interface presents cast member images, each of which corresponds to a cast member in the video content feature. A selection of a cast member image is obtained through the user interface. The user interface is updated to present additional information regarding the respective cast member corresponding to the selected image. |
US08763040B2 |
Method of processing transmit streams independently to display multiple broadcasts at the same time and a receiver for implementing the same
Disclosed are devices for receiving broadcast signal. More specifically, one of the devices includes at least two tuners (102, 103) configured to synchronize at least two transmit stream independently, at least two transmit stream processors (104, 105) each configured to convert the at least one transmit stream into a plurality of audio signals, a plurality of displayable video signals, and a plurality of displayable data signals, a controller (100) configured to provide switching control signal and display control signal based on channel selected by a user, a switching unit (135) configured to output a data broadcast associated with a first broadcast channel and the video and the audio associated with a second broadcast channel, a display module (138) configured to display a video of the first broadcast channel in a first display area and a data of the second broadcast channel in a second display area, and at least one speaker configured to audio output of at least two different broadcast channels. Method for using the device is also disclosed. |
US08763039B2 |
Program guide apparatus
A method acquires program guide information in an image signal receiver, and program guide method and apparatus using the same. In the program guide apparatus, information immediately required by a user is obtained first, and information of less preferential channels is obtained next, thus presenting a smooth interface to the user. The method of acquiring program guide information for channels includes acquiring the program guide information for each channel by scanning accessible channels while a received program is not displayed. The program guide apparatus includes a tuner tuning a channel, a program guide information detector, a memory, a key input, a microprocessor, and a character signal generator. |
US08763038B2 |
Capture of stylized TV table data via OCR
In certain implementations consistent with the present invention, a method of detecting text in a television video display table involves saving a frame of video to a memory device; determining that the frame of video contains a table having cells containing text; storing a working copy of the frame of video to a memory; isolating text in the table by: removing any table boundaries from the image; removing any cell boundaries from the image; determining if the image has three dimensional or shadow attributes and removing any three dimensional or shadow attributes identified; thereby producing text isolated against a contrasting color background; and processing the isolated text using an optical character recognition (OCR) engine to extract the text as data. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. |
US08763030B2 |
Method and apparatus for presenting and aggregating information related to the sale of multiple goods and services
A computer-implemented method can automatically present a plurality of selectable rich media video clips associated with goods and/or services offered for sale via an interactive networked communication system including at least one client and at least one server. A request to the server can be initiated at the client via the interactive networked communication system to select a plurality of rich media video clips from a database of rich media video clips associated with corresponding goods and/or services. A static descriptor can be displayed on the client for each of the plurality of rich media video clips as selected and received from the server. The plurality of rich media video clips can automatically be presented on the client in a concatenated sequence in a continuous rich media video stream. |
US08763027B2 |
Recording additional channels of a shared multi-channel transmitter
A method for recording multiple pieces of content with a single tuner. A content delivery network can include multiple channels organized into bands with several channels per band. These bands can be transmitted on an up-link such as to a satellite. The bands can be relayed to receivers at the end user locations. The end user receivers can tune to one, two, or some other fraction of the total number of transmitted bands. When a user selects a program to view and/or record, a tuner of the receiver tunes to the band that includes the channel that includes the program. The method prompts the user regarding the other channels that form the set of channels on that band, and solicits input for recording one or more concurrent programs of the band, which can all be recorded on the single receiving tuner. |
US08763026B2 |
Flexible interface for secure input of pin code
The present invention concerns a system (10) and a process for authenticating a PIN code of a user in an interactive information system in order to run an application. It comprises input means (15) for PIN code entry, security manager means (13) for comparing the PIN code of the user upon a request for user authentication from the application, with a registered PIN code, and giving authorization to run said application if the PIN code of the user matches with the registered PIN code, and display means (17) for displaying any graphics including a PIN entry field. The request for user authentication is provided on the display means via the Pin entry field with the look and feel of said application. The system further comprises emitting means for entering crypted digits, the security manager means (13) being arranged to give authorization to run the application after full entry of said crypted digits and if the PIN code of the user is identical to the registered PIN code. |
US08763025B2 |
Increasing pay-per-use media credit associated with guest room in response to notification message tracking usage of service offered by hospitality establishment
A hospitality establishment includes guest rooms having media devices installed therein. Each guest room has one or more in-room media devices for providing a pay-per-use media function. A media system controller dynamically associates a credit corresponding to a monetary value with a particular guest room in response to an occurrence of a first event, configures an in-room media device of the particular guest room to indicate the credit associated with the particular guest room and allow a guest of the particular guest room to utilize at least an amount of the credit toward an order of the pay-per-use media function, activates the pay-per-use media function on at least one of the in-room media devices of the particular guest room in response to a received order, and decreases the credit associated with the particular guest room according to the amount of the credit utilized toward the received order. |
US08763022B2 |
Systems and methods to wirelessly meter audio/visual devices
Example systems and methods to wirelessly meter audio/visual (A/V) devices are disclosed. A disclosed example method receives media content from an A/V source device, embeds a video overlay in the wirelessly received media content, and wirelessly transmits the media content and the video overlay to the wireless A/V device. The example method wirelessly receives audience identification information in response to the transmitted video overlay, and wirelessly receives audience behavior information. |
US08763020B2 |
Determining user attention level during video presentation by monitoring user inputs at user premises
In one embodiment, a method comprises identifying, by an apparatus at a user premises, a presentation of an addressable video stream to a user; detecting by the apparatus whether the user has supplied a user input, relative to the presentation, to at least one user input device; the apparatus selectively associating each user input detected relative to the presentation with a corresponding identified position of the addressable video stream; and generating, by the apparatus, a data structure enabling identification of an attention level by the user toward at least a portion of the addressable video stream, the data structure specifying an identifier for the addressable video stream and specifying whether the user supplied any user input relative to the presentation, including selectively adding to the data structure at least one user input and the corresponding identified position. |
US08763019B2 |
System and method for distribution of picture objects
A method for data communication is provided and may include transmitting picture objects and/or video objects from a media center for display on a communications terminal. The media center may receive, from an eye tracker at the communications terminal, direction of view information (DoV) of at least one eye of a user of the terminal with respect to the displayed objects. The DoV may be determined by detecting a position of a pupil based on light reflected off of the pupil. Subsequent picture objects and/or video objects may be transmitted for display by the communications terminal based on user interests determined from the received DoV information. The DoV information may be determined using: a beam splitter, a lens, and a position sensing diode which receives light from the lens which has been received from the beam splitter, wherein the position sensing diode outputs a signal to the eye tracker. |
US08763018B2 |
Modifying application behaviour
A data processing system comprising: an operating system providing an application programming interface; an application supported by the operating system and operable to make calls to the application programming interface; an intercept library configured to intercept calls of a predetermined set of call types made by the application to the application programming interface; and a configuration data structure defining at least one action to be performed for each of a plurality of sequences of one or more calls having predefined characteristics, the one or more calls being of the predetermined set of call types; wherein the intercept library is configured to, on intercepting a sequence of one or more calls defined in the configuration data structure, perform the corresponding action(s) defined by the configuration data structure. |
US08763014B2 |
Program generated notification control
A method is disclosed that comprises a control program receiving a notification control request from a user (the notification control request specifying whether to enable or disable the generation of notifications by a first user application program); identifying a software interface associated with the first user application program and used to enable and disable the generation of notifications by the first user application program; and using the identified software interface and based upon the control request received (selectively enabling and disabling generation of notifications by the first user application program). |
US08763008B2 |
System and method for processing messages using native data serialization/deserialization in a service-oriented pipeline architecture
A computer-implemented system and method for processing messages using native data serialization/deserialization without any transformation, in a service-oriented pipeline architecture is disclosed. The method in an example embodiment that includes serializing or deserializing the request/response message directly into the format (specific on-the-wire data format or a java object) the recipient expects (either a service implementation or a service consumer or the framework), without first converting into an intermediate format. This provides an efficient mechanism for the same service implementation to be accessed by exchanging messages using different data formats. |
US08763007B1 |
Open application interface for complex systems
A method and apparatus is disclosed for using an open application interface to enable communications between the components and sub-components of a complex system, such as an OSS system. In a first embodiment, one or more Intelligent Flow Engines (IFEs) are used to register all applications and/or components in the system. Once the applications have been registered, then a component requiring service from another application/component sends a request for service to an IFE. The IFE then determines which provider application can best provide the requested service and binds the requesting application with that provider application. In accordance with another embodiment, when a provider component is taken offline, e.g., for maintenance or to replace that component with a new or upgraded component, the applications of that component are un-registered and any applications that were bound to that component are seamlessly rerouted and are bound with another application if one is available. |
US08763001B2 |
Technique for efficient parallelization of software analysis in a distributed computing environment through intelligent dynamic load balancing
A method for verifying software includes monitoring a resource queue and a job queue, determining whether the resource queue and the job queue contain entries, and if both the resource queue and the job queue contain entries, then applying a scheduling policy to select a job, selecting a worker node as a best match for the characteristics of the job among the resource queue entries, assigning the job to the worker node, assigning parameters to the worker node for a job creation policy for creating new jobs in the job queue while executing the job, and assigning parameters to the worker node for a termination policy for halting execution of the job. The resource queue indicates worker nodes available to verify a portion of code. The job queue indicates one or more jobs to be executed by a worker node. A job includes a portion of code to be verified. |
US08762999B2 |
Guest-initiated resource allocation request based on comparison of host hardware information and projected workload requirement
In general, embodiments of the invention relates to a method for conveying hardware resources from a host (OS) executing on a computer system. The method includes obtaining host hardware information by the host OS, wherein the host hardware information specifies a plurality of physical hardware components of the computer system, sending the host hardware information to a guest OS executing within the host OS, generating, by the guest OS, a resource request using the host hardware information, sending, by the guest OS, the resource request to the host OS, and in response to receiving the resource request, allocating, by the host OS, guest hardware resources, where the guest hardware resources include at least one of the physical hardware components in the resource request. |
US08762998B2 |
Computing job management based on priority and quota
In one embodiment, the invention provides a method of managing a computing job based on a job priority and a submitter quota, the method including determining whether a declared priority of a computing job exceeds a predetermined declared priority quota of a submitter; in the case that the declared priority of the computing job exceeds the predetermined declared priority of the submitter, substituting a reduced priority for the declared priority of the computing job; determining whether the reduced priority of the computing job exceeds a predetermined reduced priority quota for the submitter; and in the case that the reduced priority of the computing job does not exceed the predetermined reduced priority quota of the submitter, assigning the computing job to at least one computer resource at the reduced priority. |
US08762992B2 |
Systems and methods for protecting virtual machines during physical-to-virtual conversions
A computer-implemented method for safely migrating to virtualized platforms may include (1) identifying a virtual machine that is a target of a physical-to-virtual conversion from a physical server, (2) determining that the physical-to-virtual conversion includes at least one future step before the physical-to-virtual conversion is complete, (3) based on determining that the physical-to-virtual conversion includes the future step, creating a snapshot of the virtual machine before the future step, and (4) reverting the virtual machine to the snapshot before the future step. Various other methods, systems, and computer-readable media are also disclosed. |
US08762991B2 |
Framework for domain-specific run-time environment acceleration using virtualization technology
In some embodiments, the invention involves a framework for using virtualization technology to efficiently support a domain-specific run-time environment. In at least one embodiment, a framework is utilized to take advantage of virtualization technology (VT) to partition performance critical and non-performance critical tasks of the same domain-specific application. An embodiment of the invention utilizes a general-purpose operating system to execute non-performance critical aspects of a domain, and uses a privileged VT-root mode to execute performance critical aspects of the domain. Another embodiment uses one or more guest VMs to execute the performance critical aspects of the domain-specific run-time environment. Other embodiments are described and claimed. |
US08762990B2 |
Virtual machines for aircraft network data processing systems
A method and apparatus are provided for operating a network data processing system on an aircraft. A number of operations are performed in a virtual machine on the aircraft. The virtual machine runs on a processor unit in the network data processing system on the aircraft to create a simulated computer environment. The virtual machine accesses resources of the processor unit for performing the number of operations using a host operating system on the processor unit. A current state of the aircraft is identified by the network data processing system. Running of the virtual machine is managed based on the current state of the aircraft and a policy for managing the virtual machine for different states of the aircraft. |
US08762989B2 |
Application runtime expert for deployment of an application on multiple computer systems
An application Runtime Expert (ARE) manages deployment of application software on multiple computer systems. The ARE assists the user in verifying and fixing configuration and environment details of an application deployed on multiple computer systems. The ARE creates a user configurable XML template that contains configuration and environment details based on information collected from a master system that has a known good deployment. The ARE allows a user to edit the XML logic in the template and add plug-ins to the template. The XML template with the added plug-ins are sent to a target system and used to verify the deployment on the target system compared to the master system and to make fixes to the target system's configuration. |
US08762987B1 |
Systems and methods for determining and quantifying the impact of an application on the health of a system
A computer-implemented method for determining whether an application impacts the health of a system may comprise detecting an application, performing a first system-health evaluation, allowing the application to install on the system, performing a second system-health evaluation after the application is installed on the system, and comparing the second system-health evaluation with the first system-health evaluation to determine whether the application impacted the health of the system. Exemplary methods for determining the potential impact of an application on the health of a system and for calculating a system-health-impact score for an application based on information gathered from a plurality of systems are also disclosed. Corresponding systems and computer-readable media are also disclosed. |
US08762986B2 |
Advanced packaging and deployment of virtual appliances
Methods and apparatus, including computer program products, are provided for deploying virtual appliances. In one aspect, there is provided a computer-implemented method. The method may include receiving information representative of one or more requirements of virtual appliances and one or more resources available to host the virtual appliances. A download manager may be used to install the virtual appliances. The installation may be configured based on the received information. The start of the virtual appliances may be initiated based on a dependency description. The dependency description includes a sequence for starting the virtual appliances including the network configuration. Related apparatus, systems, methods, and articles are also described. |
US08762978B2 |
Content receiver having a low-power mode
A method, system and apparatus for interacting with scheduling data and primary data. A content receiver may receive scheduling data and extract, from the scheduling data, a time at which primary data is available. The content receiver may enter a de-powered state until the time, at which point it powers up. The content receiver may receive the primary data at the time and process it as necessary. Following processing, the content receiver may again power down. |
US08762977B2 |
Mobile device software management method and apparatus
Mobile device software is managed by providing an interface between a plurality of software module handlers and a plurality of software modules. The interface is invoked responsive to a software module event such as the installation, removal, activation or modification of a software module. The interface identifies the software module and a corresponding attribute list associated with the software module event. The attribute list specifies one or more actions to be taken by at least one of the software module handlers that enable the identified software module to provide one or more functions when invoked. The attribute list is provided to each software module handler identified in the list and each action specified in the list is taken by the corresponding software module handler. This way, the interface reliably manages the different software modules without being aware of the particular functions provided by the modules or the specific actions taken by the handlers. |
US08762976B2 |
Static extensibility models with dynamic languages and scripts
Various technologies and techniques are disclosed for generating add-in bridges that allow hosts to be extended using a dynamic language. The system programmatically determines static requirements that an add-in is required to implement in order to integrate with a particular host. The system programmatically generates the add-in bridge to conform to the requirements of the particular host and to operate like a compiled add-in while actually calling dynamic language script files that are executed by a scripting engine. The add-in bridge is generated by generating a component for the add-in that contains at least one class to conform to the host requirements. A constructor is then generated for the class. For each method the add-in is required to implement, a respective method is generated in the class that provides a stub implementation but that calls dynamic-language script files to perform a desired functionality. |
US08762972B2 |
Methods and apparatuses for facilitating execution of applications requiring runtime compilation
Methods and apparatuses are provided for facilitating execution of kernels requiring runtime compilation. A method may include implementing a driver for a framework for handling kernels requiring runtime compilation. The method may further include receiving, by the driver, code for a kernel requiring at least partial runtime compilation for execution using the framework. The method may additionally include obtaining, by the driver, a compiled executable version of the kernel. The obtained compiled executable version of the kernel may not have been locally compiled. The method may also include causing, by the driver, the compiled executable version of the kernel to be provided for execution. Corresponding apparatuses are also provided. |
US08762969B2 |
Immutable parsing
Immutable structures are employed to effect immutable parsing. In particular, an immutable parsing configuration, comprising a stack and lookahead buffer, is utilized by a parser to perform lexical and syntactical analysis of an input stream and optionally output an immutable parse tree or the like. Performance with respect to the immutable structures can be optimized utilizing sharing and lazy computation. In turn, immutability benefits are afforded with respect to parsing including safe sharing amongst services and/or across multiple threads as well as history preservation, among other things. |
US08762968B2 |
Prefetching irregular data references for software controlled caches
Prefetching irregular memory references into a software controlled cache is provided. A compiler analyzes source code to identify at least one of a plurality of loops that contain an irregular memory reference. The compiler determines if the irregular memory reference within the at least one loop is a candidate for optimization. Responsive to an indication that the irregular memory reference may be optimized, the compiler determines if the irregular memory reference is valid for prefetching. Responsive to an indication that the irregular memory reference is valid for prefetching, a store statement for an address of the irregular memory reference is inserted into the at least one loop. A runtime library call is inserted into a prefetch runtime library for the irregular memory reference. Data associated with the irregular memory reference is prefetched into the software controlled cache when the runtime library call is invoked. |
US08762967B2 |
Program compiler, program installer, and program install method
A program installation apparatus may install a program in an immediately executable form using a snapshot image. The snapshot image may store a partially executed result of the program. A snapshot point at which the snapshot image is created may be decided by analyzing dependency on a system execution environment of the program. The program installation apparatus may, in advance, execute a part of the program having no dependency on the system execution environment to create a snapshot image and then execute the remaining part of the program based on the snapshot image, reducing a start-up time of the program. |
US08762962B2 |
Methods and apparatus for automatic translation of a computer program language code
Embodiments of the methods and apparatus for automatic cross language program code translation are provided. One or more characters of a source programming language code are tokenized to generate a list of tokens. Thereafter, the list of tokens is parsed to generate a grammatical data structure comprising one or more data nodes. The grammatical data structure may be an abstract syntax tree. The one or more data nodes of the grammatical data structure are processed to generate a document object model comprising one or more portable data nodes. Subsequently, the one or more portable data nodes in the document object model are analyzed to generate one or more characters of a target programming language code. |
US08762956B1 |
Generating a report document from code
Exemplary embodiments enable the generation of a report document. Exemplary embodiments identify a section of code for evaluation and insert at least one command for generating a report document into the section of code. An evaluation of the section of code is initiated and data is collected that is related to the evaluation of the section of code when the at least one command for generating a report document is evaluated. |
US08762955B2 |
Event management in a non-stop debugging environment
Event management in a non-stop debugging environment that includes a debugger configured to debug a debuggee, the debuggee including a number of threads of execution, where encountering an event by one of threads stops execution of only the one thread without concurrently stopping execution of other threads and event management includes: encountering, by a first thread, an event that stops execution of the first thread; while execution of the first thread is stopped, encountering, by each of one or more other threads, an event stopping execution of the other thread; queuing, by the debugger, the events stopping execution of the other threads; receiving, by the debugger from a user, an indication to flush one or more events from the queue; and flushing, by the debugger, the one or more events from the queue. |
US08762952B2 |
Recording method calls that led to an unforeseen problem
A technique assists in resolving problems by aiding in the determination of the root cause of the problem. The technique allows recording of information about methods of executing applications that encounter problems, even if the method was not previously marked for recording. Upon detection of a problem, the method and all other methods on the current execution stack may be marked for retrospective recording. When each method exits, information about entry conditions and exit conditions of each method may be recorded for presentation to a user of the application for problem resolution. |
US08762951B1 |
Apparatus and method for profiling system events in a fine grain multi-threaded multi-core processor
A system and method for profiling runtime system events of a computer system may include associating a data source type with detected system events. The system events may be detected dependent on information included in a reply message received by a processor in response to a data request or other transaction request message. The reply message may include information characterizing a source type of a source of data included in the reply message. The source type information may indicate that the source is remote or local; that it is a shared or a private storage location; that the data is supplied via a cache-to-cache transfer; or that the data is sourced from a coherency domain other than that of the requesting process. Instructions, events, messages, and replies may be sampled, and extended address information corresponding to the samples may be stored in an event set database for performance analysis. |
US08762946B2 |
Method for automatic extraction of designs from standard source code
A system and method for automatic code-design and file/database-design association. Existing source code is analyzed for process and control elements. The control elements are encapsulated as augmented state machines and the process elements are encapsulated as kernels. The new elements can then have meta-data attached (including, a name, I/O method, and test procedures), allowing software code sharing and automatic code/file/database upgrading, as well as allowing sub-subroutine level code blocks to be accessed directly. |
US08762942B2 |
Bidirectional type checking for declarative data scripting language
An efficient, logical and expressive type system supports the combination of refinement types and type membership expressions, as well as a top type that encompasses all valid values as members. A bidirectional type checking algorithm is provided for the type system including synthesis and checking steps to statically verify types of code based on the type system. |
US08762938B2 |
Object-oriented system for creating and managing websites and their content
The invention teaches a method for creating and managing a website as an object oriented system, comprising: providing on a system server a plurality of hierarchical classes of objects, each of the classes representing one aspect of the storage, presentation and logic of a website; providing on a web server an interface operable to present representations of objects instantiating the plurality of hierarchical classes and receive commands meant to one of: instantiate a new object, destroy a presented object, and change a property of a presented object; and storing on a database server objects as a traversable tree in accordance with the plurality of hierarchical classes. |
US08762937B2 |
Model driven deployment of composite applications
Embodiments of the present invention provide a method, system and computer program product for model driven deployment of component based applications. In an embodiment of the invention, a method for model driven deployment of component based applications can include selecting units representative of corresponding programmatic objects to be deployed into a target environment and specifying a deployment topology for the target environment. The method also can include matching portions of the units to different automation signatures and filtering the different automation signatures to a set of automation signatures based upon the deployment topology. The set of automation signatures can be ordered according to known dependencies of a corresponding deployment model and the ordered set of automation signatures can be bundled into an automation workflow and published to an automation engine for execution to deploy the programmatic objects into the target environment. |
US08762936B2 |
Dynamic design-time extensions support in an integrated development environment
An Integrated Development Environment (IDE) is provided which comprises a visual designer that supports at least two avenues of extension. First, the visual designer may be extended with entirely new features by adding a visual designer extension. The visual designer extension is a deriving class of an extension server object. The extension server object may be provided along with the IDE. The visual designer extension manages a list of extension objects, and exposes a service provider to such extension objects. The visual designer extension can request and publish services through the service provider. Second, the visual designer may be extended with new variations of existing features by adding additional extension objects that derive from, and are managed by, an existing visual designer extension. These two modes of extension are supported by a novel visual designer framework described herein. |
US08762934B2 |
Method of extensible business object modeling and generation of system artifacts from the models
A method for defining XML-based models of logical type hierarchies, business objects and sub-objects, business object operations, enumerations and reusable structures and field-sets. The method defines an optimal, yet extensible, structure of the object models to simplify the modeling process by capturing the most essential elements of the model and inferring any additional information, such as relationship between objects, during the process of generating code, database scripts or other system artifacts from the model. Methods of generating a relational model and a presentation data model from such a business object model. |
US08762933B2 |
Converting business process models to component models in a service oriented architecture domain
Process artifacts and elements in a business process model, such as a Business Process Modeling Notation (BPMN) compliant model, may be analyzed, converted into component model building blocks for developing applications, and enriched with technical metadata. The component model building blocks may be Service Component Architecture (SCA) Assembly Model building blocks, which may include artifacts, components, composites, and other elements. The building blocks may be structured in an output file, which may be a Simple Capabilities Description Language (SCDL) file, according to the Service Component Architecture (SCA) Assembly Model based on an order provided in the business process model. Business process model elements may be mapped to corresponding component model building blocks, such as SCA artifacts, composites, or components, through a lookup table or database. |
US08762930B2 |
Post facto identification and prioritization of causes of buffer consumption
Some embodiments of the present invention provide systems and techniques for determining a start delay and an execution delay for a task. During operation, the system can receive a status update for the task which indicates that the task has started execution. Next, the system can receive a second status update for the task which indicates that the task has completed execution. The system can then determine the start delay for the task by: determining an actual start time using the first status update; and determining a difference between the actual start time and the task's suggested start time. Next, the system can determine the execution delay for the task by: determining an actual execution duration using the first status update and the second status update; and determining a difference between the actual execution duration and the task's planned execution duration. |
US08762919B2 |
Circuit macro placement using macro aspect ratio based on ports
Fixed outline shaped and modifiable outline shaped random logic macros of an electronic circuit design are manipulated by modifying an outline of a modifiable outline shape macro based on criteria consisting of any one of a macro port weight value, a macro port ordering; a macro rapport constraint or a macro logic depth and placing resulting macros at locations on an integrated circuit (chip). |
US08762917B2 |
Automatically modifying a circuit layout to perform electromagnetic simulation
Automatically modifying a layout to perform circuit simulation. Initially, a first layout of the electronic system may be received or stored. A second layout of the electronic system may be automatically generated based on the first layout. The automatic generation may involve automatically simplifying the first layout using a set of rules for electromagnetic (EM) simulation. The second layout may then be used to perform EM simulation of the electronic system, e.g., to perform verification. |
US08762915B1 |
System and method for integrated circuit die size reduction
A circuit analysis tool is provided for die size reduction analysis. A processor determines a first initial output slack time. If the first initial output slack time is greater than zero, a first circuit element is modeled with a second die area, less than the first die area. The second die area is associated with a third delay greater than the first delay. Then, the second data signal is modeled equal to the first data signal with the third delay. If a first modified output slack time is greater than or equal to zero, the first circuit element first die can be replaced with the second die. If the first modified output slack time is a first value less than zero, a first delay is added to the clock signal that is greater than or equal to the first value. |
US08762914B2 |
Methods, systems, and articles of manufacture for constraint verification for implementing electronic circuit designs with electrical awareness
Disclosed are methods, systems, and articles of manufacture for constraint verification for implementing electronic circuit designs with electrical awareness. Some embodiments identify or set parasitic constraint(s) and compare the electrical parasitic(s) with corresponding parasitic constraint(s) to determine whether the parasitic constraints are met. Some embodiments first identify, determine, or update the physical data of a component of a partial layout and characterize the electrical parasitics associated with the physical data of the component. Some embodiments identify or determine some schematic level performance constraints and estimate parasitic constraints based on schematic simulation results and the performance constraints; the estimated parasitic constraints are then compared with the corresponding electrical parasitics to determine whether the constraints are satisfied. Some embodiments further map schematic level parasitic constraints to a physical design representation and then compares the mapped parasitic constraints with corresponding electrical constraints to determine whether the mapped constraints are met. |
US08762912B2 |
Tiered schematic-driven layout synchronization in electronic design automation
Some embodiments provide a system that facilitates the creation of a layout from a schematic in an electronic design automation (EDA) application. During operation, the system performs a tiered comparison of the schematic and the layout. The tiered comparison includes a first tier that compares labels in the schematic and the layout. The tiered comparison also includes a second tier that compares first-level connectivity in the schematic and the layout. The tiered comparison further includes a third tier that determines a graph isomorphism between the schematic and the layout. After the tiered comparison is completed, the system provides a result of the tiered comparison to a user of the EDA application. Finally, the system enables repairs of mismatches in the result by the user through a graphical user interface (GUI) associated with the EDA application. |
US08762904B2 |
Optimizing logic synthesis for environmental insensitivity
Roughly described, a method for synthesizing a circuit design from a logic design includes developing candidate solutions for a particular signal path, a first candidate solution identifying a first library cells followed immediately downstream thereof by a first set of zero or more buffers, and a second candidate solution identifying a second library cell followed immediately downstream thereof by a second set of zero or more buffers, the first library cell and first set of buffers in combination being different from the second library cell and second set of buffers in combination. The computer system selects among the candidate solutions at least in part in dependence upon sensitivity of the solution to load capacitance in the particular path, and stores the selected solution in the storage for subsequent use in further developing and fabricating an integrated circuit device. |
US08762903B2 |
Automated circuit design for generation of stability constraints for generically defined electronic system with feedback
A method is described that involves accepting a description of an electronic system having feedback. The method further includes expressing a real root of the electronic system's transfer function and expressing a real part of a complex root of the electronic system's transfer function. The method further includes expressing a time parameter as a maximum of the real root and the real part of a complex root. The method further involves expressing a settling time of the electronic system with the time parameter and using the settling time to automatically generate a design for the electronic system. |
US08762902B2 |
System and method for detecting one or more winding paths for patterns on a reticle for the manufacture of semiconductor integrated circuits
A system and method for detecting an invalid winding path in a layout design file includes generating a first reticle pattern file using a first path generation program, generating a second reticle pattern file using a second path generation program, comparing the first and second reticle patterns files to detect the invalid winding path. The invalid winding path includes one or more overlapping polygons. |
US08762897B2 |
Semiconductor device design system and method of using the same
A circuit design system includes a schematic design tool configured to generate schematic information and pre-coloring information for a circuit. The circuit design system also includes a netlist file configured to store the schematic information and the pre-coloring information on a non-transitory computer readable medium and an extraction tool configured to extract the pre-coloring information from the netlist file. A layout design tool, included in the circuit design system, is configured to design at least one mask based on the schematic information and the pre-coloring information. The circuit design system further includes a layout versus schematic comparison tool configured to compare the at least one mask to the schematic information and the pre-coloring information. |
US08762896B2 |
Mobile terminal and method of displaying information in mobile terminal
A mobile terminal comprises a first touch screen and a controller. The controller provides the first touch screen with an information region that includes at least one information item and first and second control regions for controlling a display of the information region. The controller also controls a viewing perspective of the information region in response to a first touch input for the first control region, and controls at least one of the number or type of the at least one information item in response to a second touch input for the second control region. The controller may also control the information region to have a two-dimensional or three-dimensional viewing perspective in response to the first touch input. |
US08762890B2 |
System and method for interactive projection and playback of relevant media segments onto the facets of three-dimensional shapes
A system for interactive media skimming and search on a device comprises a scene manager building a model of a 3D scene of a multimedia segment of the media visible on a screen of the device, facets of scene objects in the 3D scene are used to dynamically convey visual imagery as a texture from a multimedia source and maintaining a logical navigable relationship between the scene objects, the object facets and the multimedia segments, and further comprising an interaction manager, a user manager securely storing user information and preferences, a playback component initiating rough or high definition playback, a texturizer creating a 2D texture artifact from a set of the multimedia segments in the media for a 3D facet, a transformer transforming and modifying pixels, a cache and scene heuristics maintaining a set of 3D scenes comprising objects, object facets, a virtual camera, and positions of the objects. |
US08762888B2 |
Information processing apparatus, information processing system, and storage medium having stored thereon information processing program
When an information processing apparatus is started, reception of data indicative of presence of a connection point apparatus is attempted. A plurality of objects respectively corresponding to a plurality of application programs is displayed on a display device, and upon reception of an operation performed by a user, an application program corresponding to one of the objects selected by the operation performed by the user is launched. When the data is received, a display form of an object, which relates to a connection application program including a program for executing a procedural step of connecting to the connection point apparatus, is changed. |
US08762886B2 |
Emulating fundamental forces of physics on a virtual, touchable object
An approach is provided that receives a gesture from a user with the gesture being directed at a graphical user interface element. The gesture is received by the user at a touch-enabled display screen. Emulated physics properties are retrieved that correspond to the selected graphical user interface element. The system detects a speed and a direction from the received gesture and, based on this information, determines an initial trajectory of the selected graphical user interface element. The initial trajectory is adjusted based on the retrieved emulated physics properties with the movement of the element being rendered on the display screen based upon the adjusted trajectory. |
US08762884B2 |
System and method for personalized fast navigation
A system for personalized navigation of computer screens. The system can comprise one or more electronic data processors. The system can also include a module configured to execute on the more or more electronic data processors, where the module can be configured to display a plurality of icons retained in a file associated with a particular user on a computer screen. The icons can comprise one or more assigned icons from an assigned icons list and candidate icons from a candidate icons list, where both the assigned and candidate icons are derived from a pool of icons. Also, the module can be configured to assign an icon to a currently displayed screen by utilizing a selection tool and placing the icon in the assigned icons list, where the icon is selected from the candidate icons list. The module can be further configured to return to the assigned screen when the assigned icon is selected. |
US08762883B2 |
Manipulation of window controls in a popup window
Systems and methods are provided that manipulating popup window controls. A popup window includes a presentation applet running in the popup window that collects data regarding the presentation. In order to save data collected by the applet before the popup window is closed, a control container embedded in the popup window disables the close window button of the popup window. The control container also maximizes the popup window to full screen for a more functional user interface. |
US08762882B2 |
Information processing apparatus, control method for use therein, and computer program
Disclosed herein is an information processing apparatus including: operation accepting means for accept an operation input; image storing means for storing a plurality of images; management information storing means for storing management information corresponding to the plurality of images stored in the image storing means; image drawing means for drawing, in a display area including at least an image display area, at least one of images stored in the image storing means onto the image display area in a predetermined sequence; and controlling means for, when an operation input commanding selection of an image included in the image display area has been accepted by the operation accepting means, controlling recording of the selection of the image to management information stored in the management information storing means in correspondence with the image. |
US08762859B2 |
Content recommendation using third party profiles
A method includes identifying one or more features of a short term profile of a user that are not included in a long term profile of the user, using the one or more features to identify one or more third party profiles having features that substantially match the one or more features of the user's short term profile, accessing the identified one or more third party profiles, and providing one or more content items included in the third party profile to the user, the one or more content items having associated features that match the one or more features of the short term profile. An alternative method includes accessing one or more third party profiles that are not a profile of the user, and using the accessed third party profile to identify a plurality of content items for recommendation based on a feature set of the third party profile. |
US08762853B2 |
Method and apparatus for annotating a document
To facilitate the use of audio files for annotation purposes, an audio file format, which includes audio data for playback purposes, is augmented with a parallel data channel of line identifiers, or with a map associating time codes for the audio data with line numbers on the original document. The line number-time code information in the audio file is used to navigate within the audio file, and also to associate bookmark links and captured audio annotation files with line numbers of the original text document. An annotation device may provide an output document wherein links to audio and/or text annotation files are embedded at corresponding line numbers. Also, a navigation index may be generated, having links to annotation files and associated document line numbers, as well as bookmark links to selected document line numbers. |
US08762852B2 |
Smartphone-based methods and systems
Methods and arrangements involving portable devices, such as smartphones and tablet computers, are disclosed. One arrangement enables a creator of content to select software with which that creator's content should be rendered—assuring continuity between artistic intention and delivery. Another arrangement utilizes the camera of a smartphone to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some of the detailed technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in connection with shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use of linked data in portable devices—some of which exploit GPU capabilities. Still other technologies concern computational photography. A great variety of other features and arrangements are also detailed. |
US08762851B1 |
Graphical user interface for creating content for a voice-user interface
In one embodiment, the invention provides a method for creating a voice application, the method being implemented by a computer system and comprising generating a graphical user interface comprising a text-to-topic button; receiving first input identifying a location of a text file; receiving second input selecting the text-to-topic button; partitioning content associated with the text file into subjects in response to receiving the second input; and storing information on the partitioning. |
US08762841B2 |
Contextual alert bubbles for alert management
Embodiments of the present invention address deficiencies of the art in respect to alert bubbles for alert management and provide a novel and non-obvious method, system and computer program product for contextual alerts for alert management. In an embodiment of the invention, an alert management data processing system can be provided. The system can include an alert bubble configured to display alert text for an associated alert, and contextual information disposed in the alert bubble interface along with the alert text. In particular, the contextual information can provide context for the associated alert. |
US08762840B1 |
Elastic canvas visual effects in user interface
A user interface method is provided for use in a device having a touchscreen. The method includes maintaining the state of content displayed on the device, determining a display image, applying a transformation to at least a portion of the display image based on the maintained state of the displayed content on the device, and displaying the transformed image on the device. The user interface detects transitions, such as, for example, page transitions, and the like, and updates the state based on detected transitions. |
US08762836B1 |
Application of a system font mapping to a design
Embodiments of the present invention provide for the efficient application of a system font mapping to a design. Specific embodiments of the invention involve creating a design environment for a user that is configured to display a design. The design environment allows a user to apply a design font to text in the design. The user is also allowed to define a mapping from the design font to a target font. These embodiments also include generating a markup language representation of the design and applying the mapping to the design. The text is linked to the design font using an encoding prior to the generating step, and the text is linked to fonts in the markup language representation using a different encoding. |
US08762833B2 |
Information processing apparatus for displaying document information, its processing method, and storage medium
An information processing apparatus displays document information obtained from a storing unit for storing document time/date information at which document data is processed and the document information including storing time/date information at which the document data is stored. The apparatus obtains displaying order information for deciding order of displaying the document information when the document information is displayed, sorts the document information in accordance with the obtained displaying order information, displays the sorted document information. The displaying order information is displaying order based on the storing time/date information. The document information is sorted in accordance with the storing time/date information in order from the old storing time/date information. on the basis of the storing time/date information of the document information, the document information in which a predetermined time has elapsed is displayed distinguishably from the document information in which the predetermined time has not elapsed. |
US08762829B2 |
Robust wrappers for web extraction
A computer-implemented method to determine a robust wrapper includes developing a model indicative of the temporal history of a document, such as a web document written in a markup language. Based on the developed model, robustness characteristics are determined for a plurality of different wrappers representing associated paths to the data item in a representation of the document. Based on a result of the determining operation, a result wrapper of the plurality of wrappers is provided. The result wrapper has a desired robustness characteristic. |
US08762828B2 |
Tracing an electronic document in an electronic publication by modifying the electronic page description of the electronic document
A system is disclosed which allows for tracing an electronic document within an electronic publication. A message identifier is associated with the electronic document. The message identifier is transformed into a binary format. Drawing instructions are provided in the electronic page description of the electronic document to encode each bit of the binary format as a unique geometrical shape. The plurality of geometrical shapes for all the bits define a mark. The drawing instructions are provided such that the geometrical shapes are invisible and/or overlaid/overlapped. The modified electronic document is then added to the electronic publication. To trace the electronic document, the electronic page description of the electronic publication is sent to an interpreter to extract the geometrical shapes and/or their positions and decode the message identifier. |
US08762823B2 |
Method for performing data shaping, and associated memory device and controller thereof
A method for performing data shaping is applied to a controller of a Flash memory, where the Flash memory includes a plurality of blocks. The method includes: performing a program optimization operation according to original data and a plurality of shaping codes, in order to generate trace back information corresponding to a Trellis diagram and utilize the trace back information as side information; and dynamically selecting at least one shaping code from the shaping codes according to the side information to perform data shaping on the original data. |
US08762822B2 |
Tail-biting convolutional decoder and decoding method
Techniques are provided for decoding tail-biting convolutional codes by using information within the received data stream that traditionally has not been used or been available to the convolutional decoder, e.g., cyclic redundancy check (CRC) and bit information known by both the transmitter and receiver. Further, a single parallel trace-back is used that reduces implementation complexity. In addition, the least reliable decisions made during forward processing may be reversed in order to generate additional possible codeword candidates. These techniques can be used to reduce false detection rates (FDRs) and/or detection error rates (DERs). |
US08762821B2 |
Method of correcting adjacent errors by using BCH-based error correction coding
An apparatus is provided that comprises a processor. The processor comprises a cache to store data, a decoder, an error classification module, and an error correction module. The cache stores data, the data encoded as a codeword. The decoder reads the codeword from cache and calculates a syndrome of the codeword using an H-matrix. The error classification module determines an error type of the syndrome. The H-matrix is redesigned such that the columns form a geometrical sequence, and as a result not only t-bit random errors but also (t+1) bit adjacent errors can be corrected. The error correction module, triggered by the enhanced error classification module, takes one of two sets of inputs depending on error type (either random error or adjacent error) and produces corrected data from the syndrome when the syndrome comprises a detectable and correctable error. |
US08762820B1 |
Data communications via power line
Aspects are directed to communicating data over power distribution lines carrying alternating current, using a communication protocol for communicating data between endpoint devices and an upstream data-collecting device. From first symbols having a plurality of bits, at least two second symbols are generated, the second symbols respectively including different subsets of the bits in the first symbol. Each first symbol is split into second symbols having a predefined bit size for an encoding operation that operates on entire symbols having the predefined bit size (e.g., smaller than the bit size of the first symbols). The second symbols are encoded and combined according to the communication protocol. The encoded symbols are communicated over the power distribution lines based on timing indicated at least in part by the alternating current. |
US08762818B1 |
System and methods for performing decoding error detection in a storage device
System and methods for performing decoding error detection in a storage device are provided. Data bits of a data polynomial may be retrieved from a storage device. The data bits may be arranged in a first order. Error correction may be performed on the retrieved data bits of the data polynomial to produce an error polynomial based on error correction parity information encoded in the data polynomial. Bits of the error polynomial are arranged in a second order that is reverse to the first order. A first remainder of the error polynomial may be computed based on data bits corresponding to the data polynomial arranged in the second order. An error in the error polynomial may be detected based on the computed first remainder. |
US08762817B1 |
Method and apparatus for determining the start of a data field in a data frame
A system including a padding field generator and an encoder. The padding field generator is configured to generate a first padding field for a frame. The frame includes (i) a preamble field, (ii) a syncmark field, and (iii) a data field. The first padding field is located between (i) the preamble field and (ii) the syncmark field. The preamble field, the first padding field, and the syncmark field precede the data field. The encoder is configured to encode, using an error-correcting code, (i) the first padding field, (ii) the syncmark field, and (iii) the data field; and to generate, based on the encoding performed using the error-correcting code, one or more parity bits. The one or more parity bits are stored in a parity field of the frame. The parity field is located subsequent to the data field in the frame. |
US08762808B2 |
Multi-processing architecture for an LTE turbo decoder (TD)
An apparatus comprising a decoder circuit and a memory. The decoder circuit may be configured to generate a single address signal to read a first parity data signal, a second parity data signal and read and/or write systematic information data, a first a-priori-information signal and a second a-priori-information signal. The decoder circuit (i) reads the first parity data signal, the systematic information data and the first a-priori-information during even half-iterations of a decoding operation and (ii) reads the second parity data, the systematic information data and the second a-priori-information during odd half-iterations of the decoding operation. The memory may be configured to store the systematic information data and the first and second a-priori-information signals such that each are accessible by the single address signal. |
US08762802B2 |
Code checking method for a memory of a printed circuit board
A code checking method for a memory of a printed circuit board is disclosed, and is used to firstly add a check code to a data end of codes, after the codes is written in a memory, then use a timing controller to calculate a checksum of the data of the part of the primary codes and further compare the calculated checksum with the check code, and then output to a probe via a testing pin to display the result of comparison, so as to accomplish an object of checking if the written codes are correct. Thus, work efficiency of checking the codes written in the memory is enhanced. |
US08762801B1 |
Method and system for detecting and repairing defective memory cells without reporting a defective memory cell
A system includes a first device, a first storage element, a comparator and a second device. The first device is configured to test memory cells in an array of memory cells to detect defective memory cells. The defective memory cells include a first memory cell and a second memory cell. The first storage element is configured to store a first address of the first memory cell. The comparator is configured to compare a second address of the second memory cell to the first address. The second device is configured to (i) in response to the second address matching the first address, direct the first device to continue the testing of the memory cells in the array of memory cells without reporting the second memory cell as defective, (ii) during the testing of the memory cells, record a number of times the first address is matched with one or more addresses of the memory cells in the array of memory cells, and (iii) based on the number of times the first address is matched, repair a row of the array of memory cells or a column of the array of memory cells. |
US08762800B1 |
Systems and methods for handling immediate data errors in flash memory
A system that includes a multiplicity of flash memory cells; a reading apparatus; a writing apparatus for writing logical data from temporary memory into individual flash memory cells from among said multiplicity of flash memory cells, thereby to generate a physical representation of the logical data including a plurality of physical levels at least some of which represent, to said reading apparatus, at least one bit-worth of said logical data; and a special cell marking apparatus operative to store an earmark in at least an individual one of said multiplicity of flash memory cells for subsequent special treatment. |
US08762789B2 |
Processing diagnostic requests for direct block access storage devices
Described embodiments provide a media controller for processing a diagnostic request received from a diagnostic source. The received diagnostic request is parsed by a corresponding request handling module of the media controller, where each diagnostic source type has a corresponding request handling module. If the received diagnostic request requires allocation of buffer space, a common diagnostic handling module of the media controller allocates buffer space in a buffer for the received diagnostic request. The common diagnostic handling module is common for all diagnostic source types. The common diagnostic handling module provides the received diagnostic request to a corresponding one of a plurality of end diagnostic handling modules. The end diagnostic handling module performs the diagnostic tasks. If the received diagnostic request requires a transfer of data to the diagnostic source, the common diagnostic handling module performs the data transfer between the media controller and the diagnostic source. |
US08762787B2 |
Facilitating large-scale testing using virtualization technology in a multi-tenant database environment
A system and method for testing in a database system. In one embodiment, a method includes receiving an indication of one or more changes to a software application, wherein each change corresponds to a different version of the software application. The method further includes generating one or more virtual machines for a version of the software application in response to the indication, wherein the one or more virtual machines test the version of the software application. |
US08762786B2 |
Server throttled client debugging
Systems and methods of debugging client applications may provide for detecting a runtime error in a first version of a client application, and obtaining a second version of the client application server in response to the runtime error. The second version of the client application may be used to conduct a diagnosis of the runtime error. |
US08762784B1 |
Viewing multi-dimensional metric data from multiple test cases
A viewer is disclosed for viewing a multi-dimensional data set. The viewer may be coupled to or included in a test environment and receive data generated in the test environment. The test environment may generate metric data from the multiple test cases of a UUT. The viewer may display the cumulative metric data generated from multiple test cases. The viewer may display the cumulative metric data in a fashion that the user can gain insight into the UUT's characteristics. |
US08762783B2 |
Error identification
A method of identifying errors in a computing system operation is provided and includes identifying that a certain record of interest in system trace information has a number of entries that exceeds a predefined number and inferring from the excessive number of entries that a work unit associated with the certain record of interest is affected by an error. |
US08762782B2 |
Basic input-output system circuit and method for using the same
A BIOS circuit for a computer includes a baseboard management controller (BMC), a central processing unit (CPU), a main basic input-output system (BIOS) storage, and a subsidiary BIOS storage. Both the main BIOS storage and the subsidiary BIOS storage store programs for controlling the computer. The CPU executes the programs stored in the main BIOS storage to control the computer. When data of the programs stored in the main BIOS storage is missing or corrupted, the BMC copies data of the programs stored in the subsidiary BIOS storage to the main BIOS storage to recover the missing or corrupted data in the main BIOS storage. |
US08762781B2 |
Method and apparatus useful in manufacturing test case operations
The incorporation of a simulation mode into existing manufacturing code test cases that communicate with a service processor. While in simulation mode, the test cases are able to run independently of system hardware or network connection. Test case code paths are exercised through the modification of simulated output, without change to the original code. |
US08762778B2 |
Firmware assisted error handling scheme
A firmware assisted error handling scheme in a computer system has been disclosed. In one embodiment, firmware is used to access one or more hardware-specific error registers within the computer system in response to a system management interrupt (SMI) trap. Using the firmware, an error record in a common error record format is constructed. The error record is made available to an operating system (OS) within the computer system. |
US08762773B2 |
Processing apparatus, data migration method, and computer-readable recording medium having data migration program recorded thereon
By providing a unit storage area usage information calculation unit that calculates, during copy of data by a data copy control unit, usage information of a unit storage area in a storage unit that stores the data transferred from a migration source apparatus, as unit storage area usage information, and a comparison unit that compares data stored in the storage unit related to a unit storage area to be verified, selected based on the unit storage area usage information calculated, with data in the migration source apparatus related to the area to be verified, efficient and reliable data compare can be performed. |
US08762769B2 |
Downloading a disk image from a server with a reduced corruption window
Example embodiments relate to downloading a disk image from a server while reducing the corruption window. In example embodiments, a computing device writes a recovery image to a portion of a primary storage device. The computing device may then write the disk image to the primary storage device until a portion of the disk image corresponding to the recovery image remains. Next, the computing device may write the remaining portion of the disk image to a secondary storage location. Finally, the computing device may overwrite the recovery image using the remaining portion of the disk image from the secondary storage location. |
US08762767B2 |
Match server for a financial exchange having fault tolerant operation
Fault tolerant operation is disclosed for a primary match server of a financial exchange using an active copy-cat instance, a.k.a. backup match server, that mirrors operations in the primary match server, but only after those operations have successfully completed in the primary match server. Fault tolerant logic monitors inputs and outputs of the primary match server and gates those inputs to the backup match server once a given input has been processed. The outputs of the backup match server are then compared with the outputs of the primary match server to ensure correct operation. The disclosed embodiments further relate to fault tolerant failover mechanism allowing the backup match server to take over for the primary match server in a fault situation wherein the primary and backup match servers are loosely coupled, i.e. they need not be aware that they are operating in a fault tolerant environment. |
US08762765B2 |
Electronic apparatus, clock apparatus, and clock control apparatus
An electronic apparatus input and/or output a signal from and/or an external apparatus. The electronic apparatus includes: a clock section in which a frequency is set and which gives a clock signal having the set frequency; an input-output section which inputs and/or outputs the signal according to the clock signal given from the clock section; a frequency detecting section which detects a frequency of a signal given from the external apparatus; and a frequency setting section which determines the frequency of the clock signal based on the frequency detected by the frequency detecting section, and sets the frequency in the clock section.Since the frequency of the clock signal is automatically set based on the frequency given from the external apparatus, it is possible to diminish a cumbersome maintenance work or reduce the cost. |
US08762762B2 |
Distributed synchronization and timing system for generating local clock signal based on a desired clock signal embedded in USB data stream
A method and apparatus for controlling the phase and frequency of the local clock of a USB device, the apparatus comprising circuitry for observing USB traffic and decoding from the USB traffic a periodic data structure containing information about the frequency and phase of a distributed clock frequency, and phase and circuitry for receiving the periodic data structure and generating from at least the periodic data structure a local clock signal locked in both frequency and phase to the periodic data structure. The circuitry for receiving the periodic data structure and generating the local clock signal can generate the local clock signal with a frequency that is a non-integral multiple of a frequency of the periodic data structure. |
US08762761B2 |
Engine level power gating arbitration techniques
An integrated circuit, in accordance with embodiments of the present technology, includes a plurality of engines, a plurality of engine level power gating (ELPG) controllers, and a power gating arbiter for implementing engine level power gating arbitration techniques. The power gating arbiter may receive requests from one or more ELPG controllers to turn on their respective engines or portions therein. The power gating arbiter prioritizes the request and sends an acknowledgment to a given ELPG controller to turn on or off its corresponding engine according to the prioritized predetermined order. After receiving the acknowledgement, the given ELPG controller turns on or off its corresponding engine and returns an indication to the power gating arbiter that the corresponding engine is turned on or off. The process may be iteratively repeated for each received request after receiving the indication from the previously serviced ELPG controller that its corresponding engine is turned on or off. |
US08762759B2 |
Responding to interrupts while in a reduced power state
To reduce power consumption, a processor can be placed into a reduced power state. Before doing so, interrupt events can be designated as wakeup events. While the processor is in the reduced power state, if an event designated as a wakeup event occurs, then a signal is directed to a wakeup event handler instead of to an interrupt handler. In response to the signal, the wakeup event handler causes power to be restored to the processor, so that the event can be subsequently serviced. |
US08762757B2 |
Power management method and device thereof
A power management method for a mobile device including a basic input output system (BIOS) and an embedded controller (EC) includes determining whether the mobile device is operated in a direct current (DC) mode, determining whether a loading of an operating system of the mobile device exceeds a predetermined value, adding a flag associated with the embedded controller in a physical memory of the mobile device when the mobile device is operated in the DC mode and the loading of the operating system exceeds the predetermined value, and reading the flag in the physical memory via the basic input output system, to notify the embedded controller to perform a power management process corresponding to the flag. |
US08762754B2 |
Access point rotation for sharing power load
Aspects of the disclosure provide a method for sharing power load in a network. The method includes identifying a first device to serve as an AP of the network in a next time interval, providing network information from a second device that presently serves as the AP to the first device. When the first device starts to serve as the AP of the network, the second device can be configured to enter into a power save state in order to reduce power consumption by the second device in the next time interval. |
US08762752B2 |
System and method for remotely managing electric power usage of target computers
In one aspect, a system for remotely managing electric power usage of a plurality of target computers is disclosed. In one embodiment, the system includes a plurality of target computers arranged in a group, each using electric power at a rate associated with a corresponding duty cycle and power rating. A remote management computer is communicatively connected to the group of target computers and operative to receive user input data including a total group power usage limit and a priority assignment, minimum duty cycle setting, and/or power zone setting for at least one of the target computers. A power controller is operative to remotely control the power usage of the target computers according to the corresponding user input data, to cause the total group power usage to be at or below the group power usage limit. |
US08762749B2 |
Inductive receivers for electrical devices
A power providing system for an electrical device includes a secondary inductor, wired to the electrical device, for inductively coupling with a primary inductor hardwired to a power supply. The secondary inductor is incorporated into an accessory of the electrical device. |
US08762747B2 |
Inductive charging and data transfer for mobile computing devices organized into a mesh network
Illustrated is a system and method to receive a data packet at a first mobile computing device that is part of a plurality of mobile computing devices organized as a mesh network, the data packet including a power up command and device identifier identifying a second mobile computing device requesting power. The system and method also include identifying a path from the first mobile computing device to the second mobile computing device, the path composed of at least the first and second mobile computing devices and including inductive links. Further, the system and method include transmitting electrical power, based upon the inductive links, from the first mobile computing device to a third mobile computing device, the third mobile computing device residing on the path from the first mobile computing device to the second mobile computing device. |
US08762744B2 |
Energy management system configured to generate energy management information indicative of an energy state of processing elements
A data processing apparatus and methods are disclosed. The data processing apparatus comprises: data processing elements operable to process data; an energy management unit operable to generate energy management information indicative of an energy state of at least one of the data processing elements when processing said data; and logic operable to receive said energy management information and to generate energy management information items associating said energy state with the processing of said data. The information items can provide visibility of how the Energy State of the data processing elements vary in response to the processing of data. Providing this visibility of the Energy State can advantageously enable more detailed the energy management to be performed and the Energy State of the data processing elements to be optimized. |
US08762742B2 |
Security architecture for using host memory in the design of a secure element
Embodiments of a security architecture for securely storing applications, such as Near Field Communication (NFC) applications, in host memory of a mobile device are provided. The mobile device includes a host application processor, a non-volatile memory, a NFC controller, and an embedded Secure Element (eSE). The eSE is configured to encrypt code and state data associated with a NFC application; store the code and the state data, after having been encrypted, in the non-volatile memory as a binary large object (blob); load the blob from the non-volatile memory in response to an action performed by the host application processor or the NFC controller; decrypt and authenticate the code and the state data; and execute the code to exchange data with a contactless communication device via the NFC controller. The non-volatile memory is external to the eSE. |
US08762740B2 |
Information processing system and information processing method
An information processing system has a power supply section which detects a predetermined potential applied to a USB terminal and supplying the potential as a source potential, an information detection section which detects the predetermined information supplied to the USB terminal, and a processing section which executes, subsequent to the detection of the predetermined potential, the encoding process or the decoding process in accordance with at least the operating information supplied from the operation key arranged on the body and in accordance with the predetermined information supplied to the USB terminal after detection of the predetermined information. The recording and reproducing operation can be performed with the operating key on the body with power supplied only from the USB terminal. |
US08762737B2 |
Method and system for secure hardware provisioning
A method including the steps of manufacturing a product at a product manufacturing entity; maintaining a product control database at product authenticity responsible entity; assigning a first identifier to the product for the purpose of establishing a boot integrity identity of the product; storing a copy of the public part of said first identifier in a memory of the product; assigning a second identifier to the product for the purpose of establishing a logistics identity of the product, the second identifier comprising manufacturing information; storing the second identifier indicating the logistics identity in the product control database; assigning a third identifier for the product for the purpose of establishing a production identity of the product; extracting and storing a copy of the public part of the third identifier indicating a production identity in the product control database; and maintaining the private part of the third identifier indicating a production identity. |
US08762733B2 |
System and method for identity confirmation using physiologic biometrics to determine a physiologic fingerprint
The invention provides a method for verifying a person's identity, which includes obtaining a password and/or random key from a person, and comparing the obtained password and/or random key to a plurality of known passwords and/or random keys to determine a likely identity of the person. The method further includes measuring a specific biometric of the person, the specific biometric comprising a respiratory, cardiac, or other physiologic biometric, and comparing the measured specific biometric to the known specific biometric of the person that is associated with the obtained password and/or random key to verify the likely identity of the person. |
US08762732B2 |
Security method and apparatus
A method and apparatus for providing password security to an electronic device. Access rights to an electronic device are determined by decrypting and decoding an encrypted password given to one or more individuals. When an individual enters a given encrypted password into the electronic device, a decrypting function decrypts the password to generate an decrypted password. The decrypted password contains information as to whether access should be granted to the individual, and if so, to what extent. For example, the decrypted password may comprise a time and date field which indicates a date and time at which access will not be granted. |
US08762731B2 |
Multi-system security integration
In accordance with aspects of the disclosure, a system and methods are provided for managing multi-system security integration by performing state change calls to one or more backend systems by combining a multi-system protection token with a message component for transporting from a user agent to the one or more backend systems for validation by generating an authentication code for proving authenticity of a combined data structure generated by combining a secret cryptographic data key with a portion of the message component and generating a hash code of the combined data structure, generating an arbitrary random number to bind the multi-system protection token to the user agent, and generating the multi-system protection token by combining the authentication code and the arbitrary random number with the message component for transporting from the user agent to the one or more backend systems for validation. |
US08762729B2 |
Group signature system and method providing controllable linkability
A group signature system includes: a key issuer server for generating a first parameter of a group public key, generating a corresponding master issuing key, and issuing a signature key to a user when a user device joins; an opener server for generating a second parameter of the group public key, and a corresponding master opening key and master linking key; and a linker server for checking whether two valid signatures have been linked by using the master linking key when the two signatures corresponding to a group public key are given. The group signature system further includes: a signature verifying unit for confirming a validity of the given signatures and a signer information confirming unit for confirming a validity of singer confirming information generated by the opener server. |
US08762725B2 |
Secure machine-to-machine communication protocol
A task list server supports secure asynchronous communications between both a workstation and one or more machines. The task list server stores requests and responses initiated by either side and establishes secure communication channels used to forward the data between parties. The communication between workstation and machine may be delayed by hours or even days, depending on the work schedule and network access of both the workstation operator and machine. The machine may process requests in order from highest priority to lowest priority and from oldest to newest. Public key encryption may be used to establish secure channels between the task list server and the workstation or the one or more machines using a combination of certificate authorities including both manufacturers and owner/operators. |
US08762722B2 |
Secure information distribution between nodes (network devices)
In an embodiment, a method of secure information distribution between nodes, includes: performing a handshake process with an adjacent node to determine membership in a secure group; and distributing secure information to the adjacent node, if the adjacent node is a member of the secure group. In another embodiment, an apparatus for secure information distribution between nodes, includes: a node configured to performing a handshake process with an adjacent node to determine membership in a secure group, and distribute secure information to the adjacent node, if the adjacent node is a member of the secure group. |
US08762720B2 |
Method of mutual authentication between a communication interface and a host processor of an NFC chipset
An authentication method between a secure host processor and a controller of an NFC system, the controller being equipped with an NFC interface circuit sending and receiving contactless data, includes connecting the host processor to the controller and checking that there is a predefined relation between a first secret data stored by the host processor and a second secret data stored by the controller. The method further includes transmitting the second secret data to the controller and storing of the second secret data by the controller. The host processor may be removably associated with a contactless component storing the second secret data which is contactlessly transmitted to the controller. |
US08762718B2 |
Broadcast deduplication for satellite broadband
A headend gateway can receive a data stream to forward to a client device of a broadcast network, and can determine whether the data stream includes a data block that has been recently broadcasted to any device of the broadcast network. The system can generate a new data stream that includes an identifier to any data block that has been broadcasted recently, and includes an encrypted block-decryption key that allows the recipient of the data stream to decrypt the data block. A client device of the broadcast network can receive a plurality of encrypted data blocks from the broadcast network, and can cache a subset of these encrypted data block regardless of whether or not they are intended for the local client device. The client device can access a cached data block when it receives an identifier and a block-decryption key for the data block. |
US08762717B2 |
Authentication device
According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded. |
US08762712B1 |
Methods and system for person-to-person secure file transfer
A person-to-person secure file transfer system includes an originating computer that receives a public key of a recipient from a cloud computing system. The originating computer encrypts a file using a message key, and encrypts the message key using the public key of the recipient. The encrypted file is stored in the cloud computing system. In response to a request from a receiving computer, the cloud computing system decrypts the encrypted message key using a private key of the recipient, decrypts the encrypted file using the message key, and provides the now decrypted file to the receiving computer. In another example, the cloud computing system provides the private key of the recipient and the encrypted file to the receiving computer, which decrypts the encrypted message key using the private key of the recipient and decrypts the encrypted file using the message key. |
US08762711B2 |
Systems and methods for authenticating and protecting the integrity of data streams and other data
Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain. The hierarchy culminates with a signed hash that can be used to verify the integrity of other hash values in the hierarchy, and these other hash values can, in turn, be used to efficiently verify the authenticity of arbitrary portions of the content file. |
US08762708B2 |
Secure content distribution system
In accordance with one aspect of the invention, a system is provided that includes a database configured to store data according to a first encryption protocol such as an FDE HDD protocol. The data provided to the database is encrypted according to a second encryption protocol such as an AES protocol. A user selects a desired video through a server coupled to the database. Upon payment and selection by the user, a manager provides the a first key to the database so that the first encryption may be stripped from the selected video. The server couples to a remote content key server to obtain a second key to remove the second type of encryption. The resulting decrypted digitized video may then be burned to a DVD disc for distribution to the user. |
US08762701B2 |
Process for installing a computer image and joining a computer to a directory based on a unique identifier associated with an end-user
A user-friendly system, method, and program product for installing an image on a computer, the method comprising: booting the computer (400) from an image source; receiving first information from an end-user of the computer (400), wherein the first information is at least one unique identifier associated with the end-user; obtaining automatically second information associated with the end-user based on the first information; determining automatically if there is an existing record associated with the computer based on the second information; renewing automatically, if there is an existing record associated with the computer, a computer account in a directory service based on the existing record; creating automatically, if there is not an existing record associated with the computer, a new computer account in the directory service; installing automatically the image to the computer; and joining automatically the computer to directory service domain based on the newly created computer account or based on the renewed computer account. |
US08762700B2 |
Storage processing device and program
The NAS 20 to which the removable hard disks 251 and 252 each storing an operating system are connected, assumes that the removable hard disk storing the signature of the NAS 20 stores an operating system executable on the NAS 20. Thus, the NAS 20 selects as a boot drive the removable hard disk storing the signature of the NAS 20 and then boots up the operating system stored in the boot drive thus selected. |
US08762698B2 |
Virtual bus device using management engine
A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is corrupted or non-functional. |
US08762697B2 |
Precluding a device from being selected to boot a system
A method comprises receiving user input during a boot process requesting a list of selectable boot devices to be provided from which the user can select one of the devices to boot a system. The method further comprises precluding a function from being performed, the function otherwise permitting a user to select the device to be used to boot the system. |
US08762691B2 |
Memory access consolidation for SIMD processing elements using transaction identifiers
A data processing apparatus includes a plurality of processing elements arranged in a single instruction multiple data array. The apparatus includes an instruction controller operable to receive instructions from a plurality of instructions streams, and to transfer instructions from those instructions streams to the processing elements in the array, such that the data processing apparatus is operable to process a plurality of processing threads substantially in parallel with one another. A data transfer controller is provided which is operable to control transfer of data between the internal memory units associated with the processing elements, and memory external to the array. |
US08762690B2 |
Increment-propagate and decrement-propagate instructions for processing vectors
The described embodiments provide a processor for generating a result vector with incremented or decremented values from an input vector. During operation, the processor receives an input vector and a control vector. The processor then copies a value contained in a selected element of the input vector. The processor next generates the result vector, which involves writing an incremented or decremented value to the result vector, depending on the value of the control vector and the embodiment. In addition, a predicate vector can be used to control the values that are written to the result vector. |
US08762687B2 |
Microprocessor providing isolated timers and counters for execution of secure code
An apparatus providing for a secure execution environment is presented. The apparatus includes a microprocessor and a secure non-volatile memory. The a microprocessor is configured to execute non-secure application programs and a secure application program, where the non-secure application programs are accessed from a system memory via a system bus. The microprocessor has a plurality of timers which are visible and accessible only by the secure application program when executing in a secure execution mode. The secure non-volatile memory is coupled to the microprocessor via a private bus and is configured to store the secure application program in encrypted form. Transactions over the private bus between the microprocessor and the secure non-volatile memory are isolated from the system bus, the system memory, and corresponding system bus resources within the microprocessor. |
US08762685B2 |
Data writing method, memory controller and memory storage apparatus
A data writing method for writing updated data from a host into a memory module is provided. Herein, some physical units of the memory module are gotten to be global random physical units for storing data from the host. The method includes determining whether the updated data is sequential data and determining whether a logical page corresponding to the updated data is a start logical page. The method further includes getting a blank physical unit from the physical units as a new global random physical unit and writing the updated data into the new global random physical unit when the updated data is the sequential data and the logical page corresponding to the updated data is the start logical page. Accordingly, the method can write updated data belonging to the same logical unit into the same physical unit, thereby shortening the time for executing write commands. |
US08762683B2 |
Device and method for memory addressing
An addressing device and method is provided to enable an electronic system having a less addressing capability to address a memory device having a larger storage space, thereby reducing the manufacture cost of the electronic system. The addressing device includes an address decoder and an address translator. The address decoder receives a first access address belonging to a smaller address space, and determines whether to map the first access address to the larger storage space of the memory device. The address translator is coupled to the address decoder. When the first access address is mapped to the storage space of the memory device, the address translator translates the first access address into a second access address of the larger storage space according to an adjustable base address. |
US08762681B2 |
Blocked based end-to-end data protection for extended count key data (ECKD)
For block based end-to-end data protection for extended count key data (ECKD) in a computing environment, information units (IU's) are aligned in a block boundary format. Block protection trailer data is added to each one of the IU's. |
US08762680B2 |
Scaling energy use in a virtualized environment
A set of physical input/output adapters (PIOAs) is configured such that each PIOAs in the set of PIOAs is a functional equivalent of another PIOAs in the set of PIOAs. A utilization of each PIOA in the set of PIOAs is measured. A number of PIOAs needed to service a workload is determined. A first subset of PIOAs from the set of PIOAs is powered down if the number of PIOAs needed to service the workload is smaller than a number of operational PIOAs. The I/O operations associated with the first subset of PIOAs are transferred to a second subset of PIOAs remaining operational in the set of PIOAs. |
US08762675B2 |
Memory system for synchronous data transmission
One embodiment of the present invention sets forth an interface circuit configured to combine time staggered data bursts returned by multiple memory devices into a larger contiguous data burst. As a result, an accurate timing reference for data transmission that retains the use of data (DQ) and data strobe (DQS) signals in an infrastructure-compatible system while eliminating the cost of the idle cycles required for data bus turnarounds to switch from reading from one memory device to reading from another memory device, or from writing to one memory device to writing to another memory device may be obtained, thereby increasing memory system bandwidth relative to the prior art approaches. |
US08762671B2 |
Storage apparatus and its control method
To provide a storage apparatus and its control method capable of preventing degradation of sequential performance by making the page size of pages allocated to a duplicate of a logical volume an appropriate size.A storage apparatus including a controller connected to a host system and a storage device connected to the controller, wherein the controller provides the host system with a logical volume, a duplicated volume which is a duplicate of the logical volume, and a snapshot volume for storing data to be saved by a snapshot; and a page(s) is allocated in a stripe unit of data size that can be read in response to one read command to the storage device when allocating the page(s) to the duplicated volume. |
US08762667B2 |
Optimization of data migration between storage mediums
In one embodiment, pursuant to migrating the data from the first to the second storage medium, the data is allocated to the second storage medium while retaining an allocation of the data in the first storage medium. If the data is migrated from the second storage medium back to the first storage medium, the data is pointed to the allocation of the data in the first storage medium to alleviate data movement from the second storage medium to the first storage medium. If the allocation of the data in the first storage medium is determined to be needed for other data, the allocation of the data in the first storage medium is freed. |
US08762664B2 |
Replicating cache nodes in a cluster
A method and apparatus for replicating instances of cache nodes in a cluster is described. In one embodiment, the number of available cache nodes in the cluster is determined. Available cache nodes from the cluster are selected based on a parameter. An instance of a cache node is replicated to only one of the selected cache nodes in the cluster. |
US08762662B1 |
Method and apparatus for application migration validation
Example embodiments of the present invention provide a method, apparatus and computer-program product for application migration validation. In short, example embodiments of the present invention provide a tool to be run by an administrator prior to migration to determine a pre-migration policy. The administrator then performs the migration. After the migration is complete, the administrator runs to tool again to determine a post-migration policy. The tool then validates the post-migration policy. For example, the tool may compare the pre-migration policy and the post-migration police to determine whether there are differences between the pre-migration policy and the post-migration policy. Alternatively, the tool may compare the post-migration policy against a changed policy, different from the pre-migration policy, deliberately implemented by the administrator. The tool may alert on differences between the pre-migration policy and the desired post-migration policy (i.e., a properly migrated pre-migration policy or a new policy different than the pre-migration policy). |
US08762659B2 |
Storage apparatus and method, program, and playback apparatus and method
A storage apparatus and method, a program, and a playback apparatus and method, capable of quickly reading a specific part of data among metadata including metadata associated with faces. A storage controller controls storing face metadata in a storage medium, wherein the face metadata includes a content data set added for each content, content data storage location information indicating the storage location of the content data set, a detected face data set associated with each of face images detected from a content, and detected face data storage location information indicating the storage location of the detected face data set, and wherein the face metadata is configured such that the content data storage location information and face block storage location information indicating the storage location of the detected face data storage location information are described in a single data set. The present invention is applicable to a digital camera. |
US08762649B2 |
Bounding box prefetcher
A data prefetcher in a microprocessor having a cache memory receives memory accesses each to an address within a memory block. The access addresses are non-monotonically increasing or decreasing as a function of time. As the accesses are received, the prefetcher maintains a largest address and a smallest address of the accesses and counts of changes to the largest and smallest addresses and maintains a history of recently accessed cache lines implicated by the access addresses within the memory block. The prefetcher also determines a predominant access direction based on the counts and determines a predominant access pattern based on the history. The prefetcher also prefetches into the cache memory, in the predominant access direction according to the predominant access pattern, cache lines of the memory block which the history indicates have not been recently accessed. |
US08762648B2 |
Storage system, control apparatus and control method therefor
In a storage system, a first reboot controller in a first control apparatus causes a second control apparatus to reboot, when it is detected that a second control apparatus has stopped access operations. The first reboot controller also places a boot event record in a non-volatile storage device of the second control apparatus to indicate that the rebooting of the second control apparatus has been caused by the first control apparatus. After that, a second reboot controller in the second control apparatus causes at least the first control apparatus to reboot while keeping intact the cache data stored in a cache memory of the first control apparatus, when the access controller of the first control apparatus is stopped while the second control apparatus is rebooted, and when a boot event record is found in the non-volatile storage device of the second control apparatus. |
US08762646B2 |
Destaging of write ahead data set tracks
Exemplary methods, computer systems, and computer program products for efficient destaging of a write ahead data set (WADS) track in a volume of a computing storage environment are provided. In one embodiment, the computer environment is configured for preventing destage of a plurality of tracks in cache selected for writing to a storage device. For a track N in a stride Z of the selected plurality of tracks, if the track N is a first WADS track in the stride Z, clearing at least one temporal bit for each track in the cache for the stride Z minus 2 (Z−2), and if the track N is a sequential track, clearing the at least one temporal bit for the track N minus a variable X (N−X). |
US08762645B2 |
Destaging of write ahead data set tracks
Exemplary computer systems and computer program products for efficient destaging of a write ahead data set (WADS) track in a volume of a computing storage environment are provided. In one embodiment, the computer environment is configured for preventing destage of a plurality of tracks in cache selected for writing to a storage device. For a track N in a stride Z of the selected plurality of tracks, if the track N is a first WADS track in the stride Z, clearing at least one temporal bit for each track in the cache for the stride Z minus 2 (Z−2), and if the track N is a sequential track, clearing the at least one temporal bit for the track N minus a variable X (N−X). |
US08762644B2 |
Low-power audio decoding and playback using cached images
A particular method includes loading one or more memory images into a multi-way cache. The memory images are associated with an audio decoder, and the multi-way cache is accessible to a processor. Each of the memory images is sized not to exceed a page size of the multi-way cache. |
US08762634B2 |
Efficiently restoring data from a sequential-access backup archive
A method for efficiently restoring data from a sequential-access backup archive includes receiving a candidate list identifying data sets that are potentially contained within a sequential-access backup archive. The method further receives a filter list identifying data sets that are desired to be restored from the backup archive. Using the candidate list and filter list, the method generates a search list identifying data sets that are to be ignored when searching the backup archive. The method then sequentially performs multiple searches of the backup archive such that the multiple searches collectively perform a single pass through the backup archive. When performing these searches, each search begins from the last accessed portion of the backup archive and stops upon encountering a data set not explicitly ignored by the search list. A corresponding system, apparatus, and computer program product are also disclosed herein. |
US08762631B2 |
Memory system
A memory system according to an embodiment of the present invention comprises: speed of processing for searching through management tables is increased by providing a forward lookup table for searching for, respectively in track and cluster units, from a logical address, a storage device position where data corresponding to the logical address and a reverse lookup table for searching for, from a position of the storage device, a logical address stored in the position and linking these tables. |
US08762629B2 |
Data conditioning to improve flash memory reliability
Methods and apparatus for managing data storage in memory devices utilizing memory arrays of varying density memory cells. Data can be initially stored in lower density memory. Data can be further read, compacted, conditioned and written to higher density memory as background operations. Methods of data conditioning to improve data reliability during storage to higher density memory and methods for managing data across multiple memory arrays are also disclosed. |
US08762627B2 |
Memory logical defragmentation during garbage collection
A method and system defragments data during garbage collection. Garbage collection may be more efficient when the valid data that is aggregated together is related or logically linked. In particular, data from the same file or that is statistically correlated may be combined in the same blocks during garbage collection. |
US08762622B2 |
Enhanced MLC solid state device
Flash memory drives and related methods are disclosed that operate to keep frequently written data, which results in frequently erased blocks, in SLC-mimicking MLC flash, and relatively static data in normal MLC flash. A flash drive according to the present disclosure keeps track of the number of times that data for each logical block address (LBA) has been written to the flash memory, and determines whether to store newly received data associated with a particular LBA in SLC-mimicking MLC flash or in normal MLC flash depending on the number of writes that have occurred for that particular LBA. Dynamic allocation can occur between the two types of MLC. Related methods and software are also described. |
US08762619B2 |
Display with multiple video inputs and peripheral attachments
A display device that has multiple inputs for receiving video data and peripheral data from multiple computing devices, and an output for attaching a peripheral. The display is operable in one of two states, to provide both a video and peripheral signal paths between a selected one of the interconnected computing devices and the display's panel and attached peripherals. At any given time only one of the computing devices may utilize both the display and any attached peripherals. Exemplary embodiments may handle video and peripheral data streams received from a computing device over a single physical link. |
US08762618B2 |
Apparatus and methods to communicatively couple field devices to controllers in a process control system
A disclosed example system includes a termination panel, and a shared bus on the termination panel. The shared bus is to removably receive a plurality of bases that removably receive modules to communicate with field devices, and communicatively couple the modules to an input/output card to exchange communications between the modules and a controller that is in communication with the input/output card via a second bus. |
US08762614B2 |
Analog-to-digital converter with early interrupt capability
An early interrupt feature enables generation of interrupts prior to completion of an analog-to-digital conversion to be used in a processor PID calculation. Even though an analog-to-digital conversion is still in process, the PID application software can use the early interrupt time to begin execution of an interrupt service routine (ISR). The early interrupt can improve the throughput and response time of the PID control loop by overlapping the completion of the ADC conversion with the processor overhead associated with the interrupt request. A plurality of pipelined registers, each having substantially the same delay time as the pipelined stages of the ADC, are selectable to provided a delay time that may be used to generate an early interrupt, wherein the latency time between an ADC conversion and processing of an interrupt relating to that ADC conversion may thereby be shortened. |
US08762613B2 |
Method for managing a processor, lock contention management apparatus, and computer system
A method for managing a processor includes: obtaining an online request of a processor of a computer system; collecting lock contention information of the computer system if a lock contention status flag indicates a non-lock thrashing status; determining whether the computer system is in a lock thrashing status according to the lock contention information; and accepting the online request if it is determined that the computer system is in a non-lock thrashing status. By using the management method according to embodiments of the present application, processor performance degradation and a waste of idle processor resources that are caused by the case that the computer system is in a lock thrashing status are prevented, thereby improving utilization efficiency of processor resources and promoting overall performance of the computer system. |
US08762610B2 |
Processing method for reprioritizing software application tasks
A method for processing messages sent from software applications in a vehicle: Messages are received from an application, a user, or a sensor. The method generates outgoing messages based on message type received, and associates software applications with communication managers configured to attach message labels to messages, with the message label having at least a destination address. The outgoing message is transmitted through communication managers associated with software applications, arriving at a priority manager within the network. The priority manager receives outgoing message and ranks the priority value for the messages, and reassigns new priority values to messages that relate to collision circumstances. The priority manager sends the message with the new priority value to its destination address based on the message label. The message is received as an incoming message to be processed in the real-time vehicle applications according to the message labels. |
US08762606B2 |
Signal processing apparatus and control method thereof
A signal processing apparatus and a control method thereof are provided. The signal processing apparatus includes a signal processor which processes a video signal and/or an audio signal; a power supply which generates a power signal; a first connector configured to be connected with an external second connector; and a control circuit which outputs the video signal and/or audio signal and the power signal if the external second connector is connected to the first connector, and performs a shutoff operation to not output the power signal if the first connector is not connected to the external second connector. |
US08762605B2 |
Adapter for electronic devices
An adapter for connecting an accessory to a portable electronic device includes a first connector compatible with a connector of the portable electronic device and a second connector compatible with a connector of the accessory. The connectors of the accessory and the portable electronic device are otherwise incompatible with each other. The adapter provides two levels of authentication. First, the adapter authenticates itself to the portable electronic device. If this first authentication is successful, then the adapter authenticates the accessory to the adapter. |
US08762604B2 |
Managing buffer conditions through sorting
Systems and techniques include, in some implementations, a computer implemented method storing a portion of data elements present in a first buffer in a second buffer in response to detecting an overflow condition of the first buffer, wherein the data elements in the first buffer are sorted according to a predetermined order, and inserting a proxy data element in the first buffer to represent the portion of data elements stored to the second buffer. |
US08762600B2 |
Digital delay buffers and related methods
A digital delay buffer may be provided with both a fast processing, small capacity memory section and a slow processing, large capacity memory section. The use of two memory sections allows the buffer to generate an aligned data stream with n-bit block level latencies from a plurality of delayed data portions, even if one of the portions is subjected to an undue delay. |
US08762599B2 |
Delegating a poll operation to another device
In one embodiment, the present invention includes a method for handling a registration message received from a host processor, where the registration message delegates a poll operation with respect to a device from the host processor to another component. Information from the message may be stored in a poll table, and the component may send a read request to poll the device and report a result of the poll to the host processor based on a state of the device. Other embodiments are described and claimed. |
US08762598B2 |
Arrangement with a superordinated control unit and at least one intelligent field device connectable with the control unit
An arrangement with a superordinated control unit and at least one intelligent field device connectable with the control unit, wherein associated with the control unit is at least one interface with a connection element for accommodating a corresponding connection counterpart. The connection counterpart is associable with an interface module, wherein associated with the interface module is a software protection system securing accessing of the field device. The interface module permits communication between the corresponding field device and the superordinated control unit, wherein associated with the superordinated control unit is a software-protected processing program for the field device, and wherein the processing program is started or enabled via the software protection system, when the connection counterpart of the interface module of the field device is connected with the connection element of the control unit. |
US08762597B2 |
Method and apparatus for switching the main/standby single board
The present invention discloses a method and apparatus for switching an active board and a standby board, and the active board and the standby board respectively are one of the first working state board and the second working state board. The method disclosed in present invention includes: switching a first type function module on said first working state board into a second working state; switching the first type function module on said second working state board into said first working state; switching a second type function module on said second working state board into said first working state; and switching the second type function module on said first working state board into said second working state. |
US08762596B2 |
Direct memory access controller with multiple transaction functionality
A direct memory access controller is set forth. The direct memory access controller includes first and second registers storing various values that are used to set the parameters of DMA transfers that take place during a single data transaction. The first register stores a start address location value used to define a start address at which direct memory access transfers for the transaction are to begin. The second register stores a value used to end data transfers of the data transaction. The DMA controller also includes transfer control circuitry for executing the data transaction. The transfer control circuitry is adapted to automatically execute multiple, consecutive data transactions using the values stored in the first and second registers. |
US08762594B2 |
Detection of USB attachment
A change is managed in the attachment state between a first device and a second device which are connected via an interface. The first device comprises a high frequency clock. The first device is in a sleep state in which the high frequency clock is deactivated. A detection of a change in the attachment state of the second device is periodically triggered on said interface, on the basis of a low frequency clock. Upon detection of a change in the attachment state, the sleep mode is exited by activating the high frequency clock. |
US08762589B2 |
Data transfer between devices maintaining state data
Transferring data between devices utilizing state data. The devices may include a writer device and a reader device, each coupled to a common bus. A host device may create a transfer session between the devices. Each of the host device, the writer device, and the reader device may maintain state data of the transfer session. The host device may notify at least one of the reader device or the writer device of a state change from a disabled state to an enabled state. After enabling, data may be transferred directly between the writer device and the reader device without involving the host device. Finally, the host device may notify at least one of the reader device or the writer device of a state change from the enabled state to the disabled state. After disabling, the direct transfer of data between the writer device and the reader device may be stopped. |
US08762588B2 |
Output module for an industrial controller
An output module for an industrial controller configurable to simplify setup and commissioning is disclosed. The output module includes configurable PWM outputs that may be scheduled to start at different times within the PWM period, that may be configured to generate a fixed number of PWM pulses, and that may have an extendable PWM period. The output terminals are configurable to enter a first state upon generation of a fault and further configurable to enter a second state after a configurable time delay following the fault being generated. The output module may receive inputs signals directly from another module and set output signals at the terminals responsive to these signals. |
US08762583B1 |
Application aware intelligent storage system
This invention is a system and a method for operating a storage server that provides read or write access to a data in a data network using a new architecture. The method of processing I/Os in response to a request by a client of the storage server executes one or more services communicated by a policy engine. The I/Os received from the application are tagged and catalogued to create co-related I/O patterns. The policy engine is then updated with the results of processing the I/Os after executing services on those I/Os. |
US08762582B2 |
Data processing apparatus capable of communicating with external device via a plurality of logical lines, data processing system, data processing device storing data processing program, and device driver
A data processing apparatus includes a data processing unit, a communication unit communicating with an external device via at least two logical lines including a first logical line and a second logical line having priority higher than the first logical line, a storage unit including a first buffer area storing data received by the communication unit via the first logical line and a second buffer area storing data received by the communication unit via the second logical line, and a control unit determining if the second buffer area stores data. According to determination that the second buffer area stores data, the control unit reads data from the second buffer area and controls the data processing unit to process the data read from the second buffer area, and according to determination that the second buffer area stores no data, the control unit determines if the first buffer area stores data. |
US08762579B2 |
Verifiable date stamp across multiple time zones
A verifiable date stamp for use in portable electronic devices automatically and transparently determines within the portable device or devices the correct date and time that a document or image is created. By keeping periodic records of tests for accuracy of the date and time of the device(s), it will be possible to provide admissible evidence of the date stamps generated by the portable devices. The date stamp provided by the invention includes not only date and time but, in addition, GPS location (latitude, longitude and altitude) and time zone. In some embodiments which involve the use of video, the date stamp includes beginning and ending time and, optionally, average velocity, if any, for the time duration of the video clip. |
US08762577B2 |
Method and system for providing network synchronization with a unified messaging system
A method for providing network synchronization with a unified messaging system is provided. The method includes receiving and storing message data, such as voice data, for a specified recipient. An enhanced e-mail message is generated for the recipient. The message, which is in hypertext mark-up language (HTML) format, includes the message data and a synchronization link that points to a web server. The message is sent to the recipient through an e-mail server corresponding to an e-mail client associated with the recipient. When the client downloads the message from the server and renders the HTML, the synchronization link is fetched. As a result, the web server receives a hypertext transfer protocol (HTTP) request from the client based on the message and provides network synchronization based on that HTTP request. |
US08762575B2 |
Inserting advertising content
Content may be inserted at a duplicating device by inserting advertising content into a duplicated feed, and transmitting the duplicated feed to the terminal. The transmission of the duplicated feed is performed in response to a state of the terminal. |
US08762574B2 |
Establishing unique sessions for DNS subscribers
A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server. |
US08762572B2 |
Communication device
A communication device including a registration unit that registers an IP address of the communication device and a method information including a first method information indicating a first setting method for setting a dynamic IP address and a second method information indicating a second setting method for setting a static IP address. The registration unit includes a change unit that changes registered contents of a memory in accordance with a user's instruction. When the first method information and a first IP address are registered in the memory, the change unit does not change the method information in the memory from the first method information to the second method information when a method change instruction for changing the first setting method to the second setting method is given under a state where the first IP address has not been changed to another IP address. |
US08762565B2 |
Information-provision control method, information reproduction system, information-provision apparatus, information reproduction apparatus and information-presentation control program
When the information-provision apparatus is providing an audio signal to the specific information reproduction apparatus, the user enters an operation input to the specific information reproduction apparatus to switch processing to reproduce an audio content from the specific information reproduction apparatus to another information reproduction apparatus. In this case, the specific information reproduction apparatus requests the information-provision apparatus to start an operation of providing the audio content to the other information reproduction apparatus specified in the operation input as an apparatus to newly reproduce the audio content. Then, the specific information reproduction apparatus requests the information-provision apparatus to end an operation of providing the audio content to the specific information reproduction apparatus specified in the operation input as an apparatus to terminate an operation of reproducing the audio content. |
US08762563B2 |
Method and apparatus for improving the adaptive bit rate behavior of a streaming media player
A method and apparatus for improving the adaptive bit rate behavior of a streaming media player comprises receiving a media stream from a first media content provider; assessing whether the streaming media player can benefit from the use of a media stream having a higher bit rate than the stream currently being received; selecting a higher bit rate stream from a second media content provider when the player can benefit from the use of a higher bit rate stream; requesting the higher bit rate stream from the second media content provider; receiving the higher bit rate stream; and rendering the media content using the higher bit rate stream. |
US08762561B2 |
System, method or apparatus for combining multiple streams of media data
Embodiments of methods, apparatuses, devices and systems associated with combining or mixing digital media streams are disclosed. |
US08762557B2 |
Signaling gateway and its signaling processing method
A signaling gateway (SG) and a method for the SG to process signaling. The method comprises: after a SG which is configured with SCCP protocol, one or more SCCP service related subsystems, and GT translation function receives a connectionless-oriented SCCP service message in MTP3 protocol, the SG determining whether the message is a local office message according to a destination signaling point code carried in the message or a signaling point code generated by translating a GT carried in the message; and if the message is a local office message, the SG forwarding the message to a corresponding SCCP service related subsystem configured in the SG according to a subsystem number carried in the message, or forwarding the message to a corresponding SCCP service related subsystem configured in a MGC; the MGC and SG having the same signaling point code and being connected in the M3UA protocol. By configuring the SG with SCCP, management subsystem as well as service related subsystems, the present invention reduces the message interaction between the SG and the MGC without increasing the signaling point codes, thus improving the message forwarding efficiency. |
US08762555B1 |
System and method for providing filtered geospatial assets
A computer-implemented method for providing filtered geospatial assets may include providing access to a reference geospatial asset including geospatial data and receiving a filter request to associate a filter with the reference geospatial asset. The filter request may include at least one filter parameter associated with limiting access to a portion of the geospatial data. In addition, the method may include receiving an access request to access a filtered version of the reference geospatial asset using an access point associated with the filter and applying the filter to the reference geospatial asset to generate the filtered version of the reference geospatial asset. The filtered version may provide access to only a portion of the geospatial data contained within the reference geospatial asset. |
US08762553B2 |
Message handling in an IP multimedia subsystem
A method and apparatus for handling a Session Initiation Protocol communication in an IP Multimedia Subsystem (IMS) network. A Proxy Call Session Control Function (3) receives a Session Initiation Protocol message sent from a trusted remote network. The P-CSCF (3) adds to the message a further header, which identifies a Public User Identity of a trusted entity located in the remote network served by a Serving Call Session Control Function (7) in the IMS network. The message is then sent to the S-CSCF (7). The S-CSCF (7), and any other node that the message is sent to, knows from the presence of the furtherheader to use the Public User Identity of the trusted entity to determine the served user rather than the P-Asserted Identity contained in the SIP message. |
US08762552B2 |
Fine granularity access control for a storage area network
A SAN management software program controls access to resources in the SAN by associating individual users with one or more administration domains. A user that is associated with an administration domain that includes a port of a SAN switch can configure or otherwise access the port but is restricted from accessing ports outside of that administration domain. Likewise, access to other sub-fabric resources can be restricted and allowed to individual users and users in specific roles or groups. In this manner, the SAN administrative user has very specific control over which users can access which SAN resources and what level of access these users are granted. |
US08762551B2 |
Point coordinator delegation in a wireless network
A point coordinator in a wireless network, such as a wireless local area network (WLAN), may have the authority to control access to a channel by nodes in the network. The point coordinator may delegate the authority to a node in the network which requests access. The point coordinator may limit the extent of the delegation to a certain transaction or a predetermined amount of time. |
US08762549B2 |
System and method for IPTV node recovery
A system and method for failure recovery for a node in an IPTV network makes use of the ability of an IMS Gateway, an Open IPTV Terminal Function, and an IPTV Control Server to provide each other with information about a session to be recovered in a manner which allows the control session state to be reconstructed without impacting the user's viewing experience. |
US08762548B1 |
Wireless networking selection techniques
Electronic devices may find and test wireless networks present at a location, and may display available networks to a user for selection and use. The finding and testing may vary based upon the location of the device, including such factors as previously determined networks for the area, time at the location, and so forth. |
US08762544B2 |
Selectively communicating data of a peripheral device to plural sending computers
A network arrangemen includes a receiving computer connected over a network to plural sending computers. A first session is established between the receiving computer and a first of the plural sending computers, where the first session involves providing data of a peripheral device attached to the receiving computer to the first sending computer, and where the data of the peripheral device is provided to a first device driver of the peripheral device in the first sending computer. A second session is established between the receiving computer and a second of the plural sending computers, where the second session involves providing the data of the peripheral device attached to the receiving computer to the second sending computer, and where the data of the peripheral device is provided to a second device driver of the peripheral device in the second sending computer. |
US08762540B2 |
Managing multiple remote computing sessions displayed on a client device
A method manages, at a client device, a plurality of remote computing sessions. The method comprises executing a session manager application on the client device. The session manager application comprises a user interface in which configuration information about the plurality of remote computing sessions is displayed. Each of the plurality of remote computing sessions is executed on at least one of a set of remote computers. The method further comprises receiving, via the user interface of the session manager application, an event associated with an operation and performing the operation on at least one of the plurality of remote computing sessions in response to receiving the event. |
US08762538B2 |
Workload-aware placement in private heterogeneous clouds
Methods determine workload resource usage patterns of a computerized workload, using a computerized device. Such methods use the computerized device to place the computerized workload with a computer server cluster within a private cloud computing environment. Also, methods herein place the computerized workload on a selected computer server within the computer server cluster that has a resource usage pattern complementary to the workload resource usage profile, also using the computerized device. The complementary resource usage pattern peaks at different times from the workload resource usage patterns. |
US08762535B2 |
Managing TCP anycast requests
Managing TCP anycast requests at content delivery network nodes is disclosed. In some embodiments, serving a request includes receiving a request at a node of a plurality of nodes comprising a content delivery network, wherein each of the plurality of nodes share a same anycast IP address to which the request is directed and servicing the request at the node. |
US08762533B2 |
Moving a project in a complex event processing cluster
System, method, computer program product embodiments and combinations and sub-combinations thereof for moving a project in a complex event processing cluster are provided. In an embodiment, project movement in a complex event processing cluster initiates once project persistence capability exists. A handoff of the project from a source node to a destination node in the complex event processing cluster is coordinated by a manager without losing messages and without relying on a message guarantee delivery protocol. |
US08762531B1 |
Managing resources in virtualization systems
Methods, systems, and apparatus, including computer program products, for managing resources in virtualization systems, including multi-cloud systems. The use of supply chain economics alone and in combination with other techniques offers a unified platform to integrate, optimize or improve, and automate resource management in a virtualization system. These techniques may be used to monitor and control the delivery of service level agreements and software licenses. They may also be used to monitor and control contention of computing resources in a virtualization system, and to suspend or terminate computing resources. |
US08762527B2 |
Method and system for conducting secure transactions
A system for conducting secure on-line transactions includes a user communication device, a third party server, and one or more merchant servers. The user communication device can communicate with one or more preapproved merchants from within a virtualized environment using a custom browser. The custom browser supports only a single connection at any given time and only if the connection is to one of the preapproved merchants. The merchant website includes a custom markup language that can be parsed by the custom browser to render web pages on the user communication device. |
US08762526B2 |
Optimizing content management
A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a CDN service provider for alternatively hosting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative CDN service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of CDN service providers with respect to specific resource requests are also provided. |
US08762523B2 |
Media transfer to a renderer in a local network from a server in a second local network
A method and arrangement in a first device present in a first local network enables the transfer of media from a media server in a second local network to a media renderer in the first local network. A connection is established between the first device and a gateway in the second local network, and the first device creates a port mapping in the gateway for the media server. The first device creates a URL including the created port mapping and a reference to media content stored in the media server and sends the created URL to the media renderer. The media renderer is able to pull the media content from the media server using that URL. |
US08762522B2 |
Coordinating data center compute and thermal load based on environmental data forecasts
The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time. |
US08762520B2 |
Method and system to detect a predictive network signature
A method and system for monitoring a multimedia content distribution network (MCDN) includes receiving an indication that a network impairment has been detected at an MCDN node. MCDN clients associated with the MCDN node may be analyzed to detect an impairment signature, representing correlated impairments among the MCDN clients. Subsequent incoming service requests for the MCDN node may be bundled into a master service ticket. Users of the MCDN clients may be notified of the detected network impairment and of a status of ongoing remediation efforts. |
US08762519B2 |
System and method for providing location services for multiple access networks from a single location server
A system and method for determining the location of a target device attached to an access network connected to a location server, the location server having a plurality of access networks connected thereto. A location request may be received for a target device whereby the target device is identified as a function of one or more parameters. An access network may be identified from the plurality of access networks to which the target device is attached as a function of the one or more parameters. Each access network in the plurality of access networks connected to the location server may be assigned one or more logical identifiers by which an individual location request may be allocated to the respective access network. An estimated location of the target device may then be determined as a function of the one or more logical identifiers using a location algorithm appropriate for the identified access network. |
US08762517B2 |
System and method for managing a broadband network
A process for managing usage on a broadband network, said process comprising: (a) monitoring a subscriber's broadband usage; (b) determining if said usage rises to a level indicative of an event; (c) determining if said event is consistent with heavy usage or with a security incident; (d) if said event is consistent with heavy usage, offering said subscriber at least one of a plan for an upgraded subscription, or an incentive to concentrate usage in nonpeak time; and (e) if said event is consistent with a security incident, exercising security measures to minimize unintended usage. |
US08762516B2 |
Verifiable online usage monitoring
In the present invention, observed online CPD or CE activities must be within a designated envelope of acceptable behavior for accredited activity to be recorded in a session log for that user. When a watcher program detects one or more loss of user focus on the activity, it alerts the user and gives them a short opportunity to rectify the situation, otherwise a session timer is stopped and no further credits are added or verified to the user's session log. When a session is ended by a user or the watcher program, only the verified activity that can be accredited to CPD is itemised and catalogued cumulatively in the user's session log. |
US08762514B2 |
Load-testing device and load-testing method
The performances of computers having various configurations are compared by putting a common load on the computers. Servers (2-1 to 2-n) provide a simulator (4) with a common interface for accepting a processing request. The simulator (4) sequentially sends a processing request in which the contents of the processing is specified to each of the servers (2-1 to 2-n). According to the processing requests, the servers (2-1 to 2-n) perform the processings and send processing responses to the simulator (4). The simulator (4) receives the processing responses, compiles the processing times each from the sending of a processing request to the reception of the processing responses corresponding to the processing request, the usage rates of various resources in the servers (2), etc., and displays the compiled results to the user. |
US08762512B1 |
Providing dynamically shared cloud accounts
A computing system identifies shared cloud accounts of a cloud that are created for an entity. The computing system resides outside of the cloud. The number of shared cloud accounts is less than a number of entity users that use the cloud. The computing system determines that one of the users is authorized to use any of the shared cloud accounts in response to a determination that identity information of the user is valid. The computing system receives a request from the user to access the cloud and determines whether one of the shared cloud accounts is available to be assigned to the user. The computing system adds the request to a queue based on a determination that none of the shared cloud accounts is available and assigns one of the cloud accounts to the user based on a determination that one of the shared cloud accounts is available. |
US08762509B2 |
Digital data processing methods and systems for cultivating and providing guest feedback on rental accommodations
The invention provides, in some aspects, methods and systems for cultivating and providing guest feedback on rental accommodations that comprise a plurality of modules that execute on a digital data processor, including, a first module that obtains email addresses, a second module that validates those e-mail addresses, a third module that generates and delivers invitations to authorized email addresses, a fourth module that authenticates users that respond to those invitations, a fifth module that validates content entered by users in response to the invitations, a sixth module that stores the validated content, and a seventh module that accepts input from managers in regard to that content. Method and systems according to the invention cultivate user feedback and reviews to substantiate accurate vacation home rental and alternative lodging (refers to small lodging services, such as bed and breakfasts, cabins, etc.) accommodations through a closed cultivation system. |
US08762501B2 |
Implementing a 3G packet core in a cloud computer with openflow data and control planes
A method for implementing a general packet radio service (GPRS) tunnel protocol (GTP) in a packet core (PC) of a third generation (3G) network having a split architecture where a control plane of the PC of the 3G network is in a cloud computing system, the cloud computing system including a controller, the controller to execute a plurality of control plane modules, the control plane to communicate with the data plane of the PC through a control plane protocol, the data plane implemented in a plurality of network elements of the 3G network by configuring switches implementing a data plane of the SGSN and GGSN and intermediate switches to establish a first and second GTP tunnel endpoint. |
US08762499B2 |
Systems and methods for handling a registration storm
Systems and methods for user device registration are disclosed. In certain embodiments, at least a first edge device in a group of edge devices enters a mass-restart mode. The first edge device receives a request for registration from a user device and determines whether the user device is currently registered through the first edge device. The first edge device generates a notification associated with the user device if the user device is not currently registered through the first edge device. A second edge device in the group of edge devices receives the notification and determines whether the user device is currently registered through the second edge device based on the notification. Registration information about the user device is deleted from the second edge device if the user device is currently registered through the second edge device. |
US08762498B2 |
Apparatus, system, and method for communicating to a network through a virtual domain
The present invention is an apparatus, system and method for communicating to a network through an ad hoc virtual domain. The present invention contains a deceiver, a controller, and a forwarder through which a client communicates through. The deceiver, controller, and forwarder collectively establish the domain in which the ad hoc virtual namespace will exist. This invention allows clients to interact over a network in a fashion that is anonymous and unique to the session which the client is engaging in. |
US08762493B1 |
Hierarchical spatial data structure and 3D index data versioning for generating packet data
The disclosed implementations are related to hierarchical spatial data structures with 3D data versioning for generating packet data. The packet data can be used by a client application to determine the availability of data at certain levels of a hierarchical spatial data structure. A 3D index table storing data version information can be used to support data updates and to ensure that a consistent view of data is provided to clients without suffering interruptions in service. |
US08762487B2 |
Method of performing a service group discovery procedure in a communication system and related communication device
A method of performing a Service Group (SG) Discovery procedure in a communication system is disclosed. The method comprises transmitting a Request message from a first personal network element (PNE) to a personal network (PN) gateway (GW) or the PN GW to a Converged Personal Network Service (CPNS) Server; and transmitting a Response message from the PN GW to the first PNE or the CPNS Server to the PN GW according to the Request message. The Request message comprises at least one of an OriginEntityID, and a first SGInfo which comprises a keyword, or the Response message comprises a second SGInfo. |
US08762486B1 |
Replicating user requests to a network service
Disclosed are various embodiments for replicating service requests. A service request is obtained from a client. A primary service and a secondary service are determined based at least in part on the service request and a routing configuration. The secondary service corresponds to another version of the primary service. The service request is routed to the primary service and potentially replicated to the secondary service. A service response to the service request is obtained from the primary service and then sent to the client. |
US08762474B2 |
Notification of waiting voicemail messages between different types of communication networks
Systems and methods are disclosed that provide notification of waiting voicemail messages between different types of communication networks. A first communication network as described herein includes a voicemail server to store voicemail messages for a user of a communication device. A second communication network provides phone service to the communication device but uses a different signaling protocol than the first communication network. In order to notify the user of the waiting voicemail message in the voicemail server, a subscriber server (e.g., an HLR) in the first communication network receives a voicemail waiting indicator in the signaling protocol of the first communication network, identifies the signaling protocol of the second communication network, and converts the voicemail waiting indicator to the signaling protocol of the second communication network. The second communication network may then provide notification of the waiting voicemail message to the user. |
US08762471B2 |
Social networking system capable of providing location-based notifications
A networked computer system provides various services for assisting users in locating, and establishing contact relationships with, other users. For example, in one embodiment, users can identify other users based on their affiliations with particular schools or other organizations. The system also provides a mechanism for a user to selectively establish contact relationships or connections with other users, and to grant permissions for such other users to view personal information of the user. The system may also be capable of detecting, and notifying a user of, an event in which the user and a contact of the user are concurrently in a common location. |
US08762470B1 |
Method and system for content driven electronic messaging
A system and method for intelligent electronic message routing. An Informant server transmits an electronic message to be routed to a destination and stores a plurality of stylesheets containing routing information for the electronic message. The electronic message includes a reference to the plurality of stylesheets, and a service provider server receives the electronic message from the Informant server, processes the reference to the plurality of stylesheets included in the electronic message, and routes the electronic message to the destination based on the routing information contained in the plurality of stylesheets. A communications device, which defines the destination of the electronic message, receives the routed electronic message from the service provider server. |
US08762466B2 |
Method and apparatus for notifying converged address book service information
A method and an apparatus for notifying Converged Address Book (CAB) service information are disclosed. The method includes: receiving a request message from a second CAB user; judging whether to notify a first CAB user according to the request message and/or instruction information of the first CAB user; and sending the notification message to the first CAB user if determining to notify the first CAB user. With the present invention, the CAB service information can be notified, and the user experience is improved. |
US08762459B2 |
Selectable mode based social networking interaction systems and methods
In an exemplary method, data representative of a user profile associated with a user is maintained, a social networking interaction between the user and at least one other user is facilitated, and the social networking interaction between the user and the at least one other user is controlled based on information contained within the user profile and in accordance with a selectable mode. |
US08762455B2 |
Transaction accelerator for client-server communications systems
For an accelerated transaction, a client directs a request to a client-side transaction handler that forwards the request to a server-side transaction handler, which in turn provides the request, or a representation thereof, to a server for responding to the request. The server sends the response to the client via the server-side transaction handler and the client-side transaction handler. When data is to be sent between handlers, the sending transaction handler compares data segments with segments stored in its persistent segment storage and replaces segments with references to entries in its persistent segment storage that match or closely match the segments to be replaced. The transaction accelerators could handle multiple clients and/or multiple servers and the segments stored in the persistent segment stores can relate to different transactions, different clients and/or different servers. Persistent segment stores can be prepopulated with segment data from other transaction accelerators. |
US08762450B2 |
Apparatus and method for reducing frequent server messages
An apparatus and method for reducing frequent server messages including receiving a server request from a network server intended for a mobile station; determining whether to forward the server request to the mobile station; and transmitting a server response to the network server based at least in part on the server request on behalf of the mobile station. |
US08762448B2 |
Implementing asynchronous processes on a mobile client
Systems and methods are provided perform an asynchronous process in a mobile client when not connected to an enterprise server. An application on a mobile client receives a request from a user to perform a task that is ordinarily performed by the enterprise server, such as decompressing a large data file. The mobile client determines, however, that it is not connected to the enterprise server. Instead, the application spawns a thread to complete the task asynchronously. Accordingly, the task need not be performed synchronously, thus making the user wait, when the mobile client is disconnected from the enterprise server. |
US08762440B2 |
Systems and methods for area efficient noise predictive filter calibration
Various embodiments of the present invention provide systems and methods for data processing. As an example, a data processing circuit is discussed that includes: a noise predictive filter circuit, a mean calculation circuit, a summation circuit, and a filter tap adaptation circuit. The noise predictive filter circuit is operable to perform a noise predictive filtering process on a data input based upon a selector input to yield a noise predictive output. The selector input is derived from a data detector output. The mean calculation circuit is operable to average two or more instances of the noise predictive output to yield a mean output. The summation circuit is operable to subtract the mean output from the noise predictive output to yield a sum output. The filter tap adaptation circuit is operable to adaptively calculate a filter tap based at least in part on a value derived from the data input and a value derived from the sum output. |
US08762439B2 |
System and method for random number generation using asynchronous boundaries and phase locked loops
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating random data at an early stage in a boot process. A system practicing the method performs, by a processor based on a first clock, a group of reads of a counter running on a second clock to yield entropy words. In order to produce words with entropy, the system introduces a progressively increasing delay between each of the group of reads of the counter. The system generates entropy words by filling the buffer with successive reads of the least significant bit of the counter and then generates random data by applying a hash algorithm to the entropy words stored in the buffer. |
US08762438B2 |
Composition of decimal floating point data
A decimal floating point finite number in a decimal floating point format is composed from the number in a different format. A decimal floating point format includes fields to hold information relating to the sign, exponent and significand of the decimal floating point finite number. Other decimal floating point data, including infinities and NaNs (not a number), are also composed. Decimal floating point data are also decomposed from the decimal floating point format to a different format. |
US08762436B1 |
Frequency synthesis with low resolution rational division
A method is provided for synthesizing signal frequencies using low resolution rational division. A reference frequency value and synthesized frequency value are accepted. In response to dividing the synthesized frequency value by the reference frequency value, an integer value numerator (n) and an integer value denominator (d) are determined, with n/d=I(N/D)=I+N/D=(I+1)−(D−N)/D), and where N/D<1. An accumulator creates a sum of (D−N) and a count from a previous cycle, and creates a difference between the sum and the denominator. The sum is compared with the denominator, and a first carry bit is generated. The complement of the first carry bit is added to a first binary sequence, and the first binary sequence is used to generate a k-bit quotient. The k-bit quotient is subtracted from (I+1) to generate a divisor. |
US08762433B1 |
Integration architecture for software and hardware development
A workflow integration architecture for improving the coordination of software, hardware, and firmware developments leading to shorter product development schedules and thus reduced cost is presented. The workflow integration architecture has a product structure module that includes a hardware design application component, a software design application component, a firmware design application component, a product requirements component, and a design documents component. The architecture further includes a revision control repository database for permanently storing development tree or subtree including file system objects such as directories, files, symbolic links and hardware links, an external repository database for storing files, path-to-file information, and URL link information relating to product design related documents at a remote location connected to the product structure module via a communications network, a requirements system database for storing product requirements data, an external documents file database for storing technical documents, and a plurality of connector components for linking the components of the product structure module to the databases, whereby any change to one of the databases are propagated to the other databases. |
US08762426B2 |
Method and system of adapting a data model to a user interface component
A display of a source data model on a user interface component being associated with a target data model is provided. The source data model and the target data model comprise a collection of data types (class/object), each including a set of name and type attributes. For each source data type of the source data model, a matching target data type is determined among said target data types in the target data model. Said source data type is linked to said matching target data type. A display of said source data model using said link between a source data type and a target data type. |
US08762424B2 |
Generating views of subsets of nodes of a schema
Provided are a computer program product, system, and method for processing schemas in a storage system. A presentation of a schema in a graphical user interface (GUI) is comprised of multiple type nodes in a tree structure. Each type node comprises a hierarchical arrangement of a plurality of nodes including group nodes including a plurality of nodes and content nodes providing values. First user input selects one of the type nodes in the schema for a view. Second user input selects one of the nodes in the selected type node in the schema for a view. Third user input selects a node in the schema to indicate a root node of the schema for the view. The view includes the root node and at least one sub node of the root node and is added as a child to the selected type node. |
US08762423B2 |
Shuffling playback content based on multiple criteria
Each of one or more songs in a song list is analyzed to determine whether the song satisfies a set of criteria at its current location. For each of the one or more songs that satisfies the set of criteria, the song is kept at its current location in the song list. For each of the one or more songs that does not satisfy the set of criteria, an attempt is made to select (e.g., randomly) another song in an unprocessed portion of the song list that satisfies the set of criteria. If a selected song satisfies the set of criteria then the song and the selected song are swapped. However, if greater than a threshold number of attempts to select a song that satisfies the set of criteria are made, then the song is kept at its current location in the song list. |
US08762421B2 |
Accessing entities of data access layer
A method and system for entities of a data access layer, the data access layer following an entity-relationship model in which data are depicted in term of entities and relationships between them and the entities are provided with a CRUD interface. The method includes the steps of: defining a meta-entity being a virtual entity, resulting as a composition of parts of one or more entities; describing the virtual entity, via a virtual entity descriptor, as a hierarchical structure in which entities are connected in a parent-child structure via a link; in the virtual entity descriptor, specifying which properties are taken from each entity to form partial entities of the virtual entity; providing a CRUD interface on the virtual entity; and at run time, accessing the virtual entity via its CRUD interface. The accessing is implemented as a set of calls to CRUD methods accessing the entities composing the virtual entity. |
US08762416B1 |
System and method for specifying batch execution ordering of requests in a storage system cluster
A method for operating a computer data storage system is described. A plurality of requests are received from a client, each request of the plurality of requests having assigned a unique sequence number, each request being an input/output request to a data storage device. The plurality of requests is divided into a plurality of subsets of requests. A unique batch number is assigned to each subset of requests so that each subset of requests is assigned a unique batch number. A first subset of requests having a first batch number is executed in arbitrary order with respect to the sequence number of each request. A second subset of requests is executed in response to a second batch number after execution of all of the first subset of requests has completed. |
US08762415B2 |
Modeling of order data
An order class is defined which includes multiple data elements that are common to various order types. The order class identifies relationships of an order with various entities related to the order. |
US08762414B2 |
Process for organizing multimedia data
A multimedia data organization process, i.e. creation, of a photo album or slideshow, said multimedia data being represented by contingent individuals (14a, 14b, 14c, 14d, 14e, 14f) of an instantiated ontology that in addition to generic individuals (EC, C, F, M, T, A) comprises semantic links between individuals, comprising: —the presentation to the user of the choice of at least one individual from the instantiated ontology, and in response to a user-prompted choice, —the selection and organization of a subset of multimedia data corresponding to the contingent individuals of the instantiated ontology according to at least one selection and/or organization rule engaging the user-chosen individual and the related semantic links. |
US08762412B2 |
Preventing conflicts of interests between two or more groups using applications
To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information. |
US08762411B2 |
Progressive exploration of data relationships
Parental dependency information for various data fields may be analyzed to create a data field hierarchy. Each of the data fields may be presented in a selectable list through an interface. Once a data field is selected, any immediate parent(s) and/or child(ren) field(s) of the active data element may be demarcated in the list according to the hierarchy. Additional data entry fields relating to the selected data field and its familial fields may also be displayed. Data in each of data fields may also be analyzed to identify fields with incomplete data. Systems and methods are provided. |
US08762408B2 |
Optimizing software applications
Techniques for optimizing a software application include receiving, at a local computing system, a query from an application for data stored on a database table, the query including a context defined by a name of the database table; comparing the context of the query to a context of a predefined query scenario; based on the context of the query matching the context of the predefined query scenario, retrieving data stored on a secondary database replicated from data stored on a main database; and passing the retrieved data from the secondary database to the application. |
US08762407B2 |
Concurrent OLAP-oriented database query processing method
A concurrent on-line analytical processing (OLAP)-oriented database query processing method is described, for performing, on the basis of predicate vector-based memory OLAP star-join optimization, concurrent OLAP query processing based on a batch query predicate vector bit operation. The concurrent query processing optimization technology is implemented for I/O performance and parallel OLAP processing performance in a database management system, and setting of concurrent OLAP processing load in an optimized way catering to the I/O performance is supported, thereby improving predictable processing performance oriented to diversified OLAP queries and implementing concurrent query star-join bitmap filtering processing based on predicate vector arrays. |
US08762406B2 |
Real-time data redaction in a database management system
A database server receives a data request from a client. In response to the data request, the database server selects, from a database, actual data that satisfies criteria specified by the data request. The database server retrieves the selected actual data from the database. Also in response to the data request, the database server redacts the retrieved data in real time without modifying the actual data contained within the database. This may be accomplished by the prior insertion of masking operators into a top SELECT clause of a query representation generated during semantic analysis. The database server returns the redacted data to the client as a reply to the data request. |
US08762404B2 |
Information search system, method, and program, and information search service providing method
A dialogical information search system is realized by comprehensively utilizing different kinds of ontologies: a library classification system and a Wikipedia category.A new information search infrastructure is thus realized by comprehensively utilizing the different ontologies of library classification system and Wikipedia category. By virtue of this, a new information search paradigm can be promoted to the world: an in-depth search is realized by utilizing a library with the Web as a clue. This, as a result, contributes to improving literacy of the whole society, and conduces to rediscovering the significance of existence of libraries and further to realizing electronic libraries. |
US08762401B2 |
System and method for automated data retrieval based on data placed in clipboard memory
A data retrieval system and method of the invention provide automatic retrieval of information based on data placed into, for example, a Windows™ clipboard. A user highlights and cuts (or pastes) data into the clipboard during execution of an application program. A data retriever program periodically reads the clipboard to determine whether new data has been placed therein. Upon finding new data in the clipboard, the data retriever program determines whether the data or a variation thereof satisfies a predetermined criterion. If the criterion is satisfied, the data retriever program initiates a data-retrieval operation, such as a Web-based search, based on the data. If the criterion is not satisfied, the data retriever program does not perform any data-retrieval action. The data retrieval program does not interfere with the clipboard; any application program sharing the clipboard can use data placed therein, e.g., by a paste operation. |
US08762400B2 |
Method of collecting data
Data storage method for storing a subblock of a block of data. The block of data is distributed, in a number of subblocks of data, over a set of devices. The set of devices comprises at least two devices, and the method comprises the steps of: collecting a subblock of data using the device, storing the subblock of data on the device; and storing metadata identifying the data comprised in the subblock of data. |
US08762399B2 |
Hash collision reduction system
An improved computer system that can include a controller having a computer processor, the controller to reduce insertion times and/or collisions when interfacing with new components introduced to the controller. The system may also include a collision avoidance apparatus that reduces hashing collisions by using a plurality of tables and a plurality of keys per bucket. The system may further include a hash apparatus in communication with the controller to map the plurality of keys to the plurality of tables where the hash apparatus uses a single hash logic to provide an avalanche effect when one key is changed which results in nearly half of bits changing in the plurality of tables. |
US08762397B2 |
Method and apparatus for staged content analysis
A system that incorporates teachings of the present disclosure may include, for example network device having a controller to receive multiple streams of content for portions of a multimedia work, perform a high level analysis for features in each of the streams for the multimedia work, perform a specialized analysis on the portion having a detected general feature to generate a content analysis output, correlate the content analysis output with other content analysis of the multimedia work, and output a weighted content description based on the correlation function. Other embodiments are disclosed. |
US08762392B1 |
Query suggestions for a document based on user history
Methods, systems, and apparatus, including computer program products, for presenting search query suggestions. In an aspect, content of a resource that is determined to be responsive to a search query is received, and a candidate set of search query suggestions for the search query is suggested based, in part, on search history data associated with the search query. A final set of search query suggestions based on the search history data and the content of the resource and provided for display on a client device. |
US08762391B2 |
Method and system of information matching in electronic commerce website
Techniques for sorting search results using user characteristic data are described. These techniques may include receiving a query from a user device. A search may be performed based on the query to obtain multiple results. User responses corresponding to the multiple results may be obtained and then grouped to determine multiple users based on similarities among the multiple users. Based on user responses associated with the multiple users, the multiple results may then be ranked. |
US08762389B1 |
Synonym identification based on search quality
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining one or more first search results that were generated for a search query; determining a score associated with the first search results; revising the search query using a query revision rule; obtaining one or more second search results that were generated for the revised search query; determining a score associated with the second search results; and evaluating the query revision rule by comparing the score associated with the first search results with the score associated with the second search results. |
US08762379B2 |
Method and apparatus for predicting object properties and events using similarity-based information retrieval and modeling
Method and apparatus for predicting properties of a target object comprise application of a search manager for analyzing parameters of a plurality of databases for a plurality of objects, the databases comprising an electrical, electromagnetic, acoustic spectral database (ESD), a micro-body assemblage database (MAD) and a database of image data whereby the databases store data objects containing identifying features, source information and information on site properties and context including time and frequency varying data. The method comprises application of multivariate statistical analysis and principal component analysis in combination with content-based image retrieval for providing two-dimensional attributes of three dimensional objects, for example, via preferential image segmentation using a tree of shapes and to predict further properties of objects by means of k-means clustering and related methods. By way of example, one of a criminal activity and a fraudulent activity event, an intrusion event and a fire event and residual objects may be predicted and located and qualified such that, for example, properties of the residual objects may be qualified, for example, via black body radiation and micro-body databases including charcoal assemblages. |
US08762378B2 |
Independent table nodes in parallelized database environments
A recipient node of a multi-node data partitioning landscape can receive, directly from a requesting machine without being handled by a master node, a first data request related to a table. A target node of a plurality of processing nodes can be identified to handle the data request. The determining can include the recipient node applying partitioning information to determine a target data partition of the plurality of data partitions to which the data request should be directed and mapping information associating each data partition of the plurality of data partitions with an assigned node of the plurality of processing nodes. The recipient node can redirect the data request to the target node so that the target node can act on the target data partition in response to the data request. |
US08762376B2 |
Financial-service structured content manager
A financial-service system that manages content objects includes a chronicles platform with a chronicle associated with a loan request. A content manager determines a set of content objects to be associated with the chronicle and generates a bucket for each content object of the set of content objects. Each bucket is associated with a name and is configured to receive an associated content object. The chronicle is populated with the generated buckets. An interface that detects a user action and that thereafter receives or generates a content object, which is detected by the content manager and associated with a bucket. The content manager causes the bucket to receive the content object and presents representations of the buckets to a user. Representations of one or more buckets that have received a content object differ from representations of one or more other buckets that have not received a content object. |
US08762375B2 |
Method for calculating entity similarities
One embodiment of the present invention provides a system for estimating a similarity level between semantic entities. During operation, the system selects two or more semantic entities associated with a number documents. The system subsequently parses the documents into sub-parts, and calculates the similarity level between the semantic entities based on occurrences of the semantic entities within the sub-parts of the documents. |
US08762372B2 |
Search over structured data
A user can refine a search over structured data by specifying that a label or an attribute value be used to further filter the results of a query. |
US08762371B1 |
System and methods and user interface for searching documents based on conceptual association
A system and methods and user interface are disclosed for searching documents based on conceptual association, and for ranking documents based on content characteristics. A computer processing system receives a query containing a word or phrase that is a name of an object or concept, and can also receive a value for a customized ranking parameter. A computer storage device stores a dataset related to the object or concept name, wherein the dataset includes a plurality of property names and can also include association-strength values. A computer processing system can count a first frequency of a first property name and count a second frequency of a second property name in a document containing text in a natural language, calculate a relevance score as a function of the first frequency and the second frequency, and rank the plurality of documents using their respective relevance scores, and return one or more documents to the user based on the ranking of the plurality of documents. The function is in part defined by the customized ranking parameter. |
US08762362B1 |
System and method for updating a data structure
System and method for updating a data structure are disclosed. In one embodiment, the method includes providing a data structure that includes a hierarchically arranged set of nodes and branches, and each node has two or less branches, retrieving a first data entry in the data structure via a first node in response to a first data access request, modifying the data structure to generate a first intermediate data structure that keeps the first node and creates a duplicate of the first node, and retrieving a second data entry in the data structure via the duplicate of first node in response to a second data access request. By maintaining at least the first node or a duplicate of the first node during a rebalancing operation of the data structure, the disclosed method supports accessing data entries associated with the first node during the rebalancing operation and therefore improves system performance. |
US08762360B2 |
Integrating applications within search results
Computer-readable media, computer systems, and computing methods are provided for implicitly discovering applications using a query or search results, where the query does not explicitly target a particular application. A search engine is used to receive a user-initiated query and to employ a keyword of the query to generate an initial set of search results. Characteristics of the search results are identified and applications that are relevant to the characteristics are determined. The determination of relevant applications include: accessing an application manifest that manages a mapping between applications and predefined characteristics; comparing the characteristics of the search results against the predefined characteristics of the application manifest to determine a match; and, when a match exists between the search-result characteristics and the predefined characteristics, identifying applications mapped to the matched characteristics as being relevant to the search results. These identified applications are presented in response to the query. |
US08762359B2 |
Method of analyzing data traffic in a telecommunication network
The invention relates to a method of analyzing data traffic in at least one telecommunication network, said method comprising the steps of: achieving a plurality of call detail records related to said data traffic in said at least one telecommunication network, aggregating the plurality of call detail records into a call detail record representation comprising at least one pre-search results and storing said call detail record representation in a database, and performing an analysis of said data traffic by means of a query in said call detail record representation. |
US08762356B1 |
Detecting change in rate of input reception
Methods, systems, and apparatus including computer programs encoded on a computer storage medium for detecting change in rate of input reception. In one aspect, a series of keystrokes input by a user is received. A baseline time interval is determined for the user. A time interval between receiving a particular keystroke and receiving a preceding keystroke is determined. It is determined that the time interval exceeds the baseline time interval by a predetermined amount. Then, characters that correspond to one or more of the keystrokes, are transmitted to a search engine. |
US08762352B2 |
Data depulication using short term history
Exemplary embodiments for data deduplication using short term history in a computing environment are provided. In one embodiment, by way of example only, a hash value is calculated on data chunks for a read operation. The calculated hash value is stored in a storage media. The calculated hash value is looked up in the storage media to verify if a current write operation was previously written and/or read. Additional system and computer program product embodiments are disclosed and provide related advantages. |
US08762350B2 |
Methods and systems for providing data objects on a token
A computer system, method and/or computer-readable medium provide independent data objects to a token in compressed form. The independent data objects are representative of security information associated with the token. The system includes an interface operable to communicate with a token, and a processor cooperatively operable with the interface. The processor is configured to determine a set of independent data objects that are associated with the token, and to aggregate the set of independent data objects associated with the token into a group. Also, the processor is configured for compressing the group into a unit of contiguous data, and writing the unit of contiguous data to the token via the interface. |
US08762348B2 |
Segment deduplication system with compression of segments
A system for storing compressed data comprises a processor and a memory. The processor is configured to receive a compressed segment. The compressed segment is determined by breaking a data stream, a data block, or a data file into one or more segments and compressing each of the one or more segments. The processor is further configured to determine whether the compressed segment has been previously stored, and in the event that the compressed segment has not been previously stored, store the compressed segment. The memory is coupled to the processor and configured to provide the processor with instructions. |
US08762347B1 |
Method and apparatus for processing transactional file system operations to enable point in time consistent file data recreation
A method and apparatus for processing transactional file system operations to enable point in time consistent file data recreation and recovery from transactional file systems is described. In one embodiment, the method includes processing input/output activity associated with file data that is used in a computing environment to identify at least one transaction and segregating the input/output activity based upon the at least one transaction to enable point in time consistent data recreation for the file data. |
US08762346B2 |
Data de-duplication in a dispersed storage network utilizing data characterization
A computing device includes a processing module and an interface. The processing module is operable to receive, from a requesting device via the interface, a data storage request that includes data for storage. The processing module then determines whether substantially identical data is currently stored in a dispersed storage network (DSN) memory. When the substantially identical data is stored in the DSN memory, the processing module generates, for the requesting device, a second unique retrieval matrix of a plurality of sets of encoded data slices corresponding to the already stored substantially identical data, wherein the requesting device can recover at least a portion of the data based on the second unique retrieval matrix of the plurality of sets of encoded data slices. |
US08762345B2 |
System and method for accelerating anchor point detection
A sampling based technique for eliminating duplicate data (de-duplication) stored on storage resources, is provided. According to the invention, when a new data set, e.g., a backup data stream, is received by a server, e.g., a storage system or virtual tape library (VTL) system implementing the invention, one or more anchors are identified within the new data set. The anchors are identified using a novel anchor detection circuitry in accordance with an illustrative embodiment of the present invention. Upon receipt of the new data set by, for example, a network adapter of a VTL system, the data set is transferred using direct memory access (DMA) operations to a memory associated with an anchor detection hardware card that is operatively interconnected with the storage system. The anchor detection hardware card may be implemented as, for example, a FPGA is to quickly identify anchors within the data set. As the anchor detection process is performed using a hardware assist, the load on a main processor of the system is reduced, thereby enabling line speed de-duplication. |
US08762342B1 |
Method of inserting a validated time-image on the primary CDP subsystem in a continuous data protection and replication (CDP/R) subsystem
A method for inserting a validated time-image on a primary CDP subsystem in a continuous data protection and replication (CDP/R) subsystem. In one embodiment, the method includes processing data of RI1 at a secondary system in accordance with a recovery process, wherein RI1 is a first image of a replication of a data object. First data is generated in response to processing the data of RI1 in accordance with the recovery process, wherein the first data relates to processing the data of RI1 in accordance with the recovery process. Once the first data is generated, a copy of the first data is transmitted to a primary system that stores the data object. |
US08762338B2 |
Analyzing backup objects maintained by a de-duplication storage system
Analyzing backup objects maintained by a de-duplication server. A plurality of first objects may be maintained. Each first object may refer to second object(s) and each second object may refer back to at least one first object. For each respective first object, the respective first object may be analyzed to determine the one or more second objects referred to by the respective first object. Correspondingly, a command may be generated for each respective second object of the determined second object(s), thereby generating a plurality of commands. Each command may be used to verify that the respective second object refers back to the respective first object. The plurality of commands may be sorted into a disk access order. The commands may be used to verify that each second object refers back to first objects that refer to the second object. |
US08762337B2 |
Storage replication systems and methods
Systems and methods for information storage replication are presented. In one embodiment a replication method includes performing an intelligent synchronization process of selected portions of a primary image and intelligent verification of the accuracy of the replication. The intelligent synchronization process can include forwarding information if the information is in use (e.g., has been altered, written to, etc.) and the intelligent verification can be performed on the information in use. |
US08762335B2 |
System and method for storage operation access security
A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a system to inform the proper access control that should be applied to data stored outside of its original location, such as a data backup. The storage access control system may place similar access control restrictions on the backup files that existed on the original files. In this way, the backed up data is given similar protection as that of the original data. |
US08762332B2 |
Systems and method for facilitating the synchronization of data on multiple user computers
Methods and systems for facilitating the synchronization of data on two or more user computers, where the data is maintained in a data structure as objects. The system assigns an index to one or more objects maintained in the data structure, wherein each index provides an address for an object within the data structure. The system detects at least one modification to the data, wherein said modification is initiated on a user computer. The system updates one or more objects in the data structure based on the modification. The system creates a representation of the at least one modification, wherein the representation comprises a reference to one or more indexes assigned to the one or more updated objects. The system transmits the representation, wherein the representation is for use in generating a corresponding modification to the data on other user computers. |
US08762330B1 |
System, method and computer program product for partially synchronous and partially asynchronous mounts/unmounts in a media library
Systems, methods and computer program products for determining completion of asynchronous commands in a library system and providing an indication of the completion to a synchronous component of the media library system so that commands which are dependent upon the completion can be efficiently issued and executed. In one embodiment, a tape is mounted in a drive of the library and a command is issued to initiate an asynchronous filesystem mount operation. Diagnostic information generated by the operating system for this operation is communicated to the media library management application via a pipe. When the filesystem mount process is completed, a corresponding diagnostic message is communicated to the media library management application through the pipe. Until this message is received by the media library management application, commands that are dependent upon the completion of the filesystem mount process are inhibited, and afterward these dependent commands are allowed to be issued. |
US08762329B2 |
Method and system for synchronizing a server and an on-demand database service
In accordance with embodiments, there are provided mechanisms and methods for synchronizing a server and an on-demand database service. These mechanisms and methods for synchronizing a server and an on-demand database service can enable embodiments to synchronize a larger amount of data. The ability of embodiments to provide such feature can enable more effective synchronization of a user-level sharing entity database with a multi-user on-demand database service. |
US08762326B1 |
Personalized hot topics
A server device receives a user request and retrieves, based on the user request, a list of popular topics, a generic ranking score for each topic in the list of popular topics, and a topic profile for a first topic in the list of popular topics. The server device identifies a user profile for the user and determines a personalization score for the first topic in the list of popular topics, where the personalization score for the first topic is based on one or more similarities between the user profile and the topic profile for the first topic. The server device determines a revised ranking score for the first topic in the list of popular topics based on the personalization score and the generic ranking score for the first topic; and ranks the topics in the list of popular topics, using the revised ranking score for the first topic. |
US08762324B2 |
Multi-dimensional query expansion employing semantics and usage statistics
Embodiments relate to systems and methods employing personalized query expansion to suggest measures and dimensions allowing iterative building of consistent queries over a data warehouse. Embodiments may leverage one or more of: semantics defined in multi-dimensional domain models, user profiles defining preferences, and collaborative usage statistics derived from existing repositories of Business Intelligence (BI) documents (e.g. dashboards, reports). Embodiments may utilize a collaborative co-occurrence value derived from profiles of users or social network information of a user. |
US08762323B2 |
Replica based load balancing in multitenant databases
A swap-based multitenant database load balancing (SWAT) invention finds an optimal swap set that eliminates hotspots, and finds a sequencing and parallelization of swap executions for the multitenant database. |
US08762322B2 |
Distributed order orchestration system with extensible flex field support
A distributed order orchestration system publishes one or more newly generated artifacts that are generated as a result of generating one or more extensible flex fields to a rule dictionary. The distributed order orchestration system then imports the one or more newly generated artifacts within the rule dictionary as one or more facts. The distributed order orchestration system then creates one or more rules for the rule dictionary that references the one or more facts. |
US08762321B2 |
Method, system and computer program product for automatic generation of Bayesian networks from system reliability models
A method, apparatus and computer program product for the conversion of at least one reliability model of a technical system to a Bayesian network model for assisting in the system's failure diagnostics, has the steps of creating a structure of a Bayesian network using information from at least one reliability model of the technical system, creating parameters of the Bayesian network using information from the reliability model of the technical system, the Bayesian network model having a plurality of observation nodes, obtaining information about the plurality of observation nodes from a list of observations that augments information contained in the reliability model of the technical system, and inserting the observation nodes into the created structure of the Bayesian network. |
US08762320B2 |
State machine with out-of-order processing functionality and method thereof
According to one embodiment of the invention, software operating as a state machine may be implemented within a digital device to support out-of-ordering processing of events by the state machine. Upon execution of the software by a processor, the following operations are performed. First, a determination is made if an incoming event is a transition, and if so, if the transition is not a transition associated with the current state of the state machine, but rather, is out-of-order from a predetermined order of transitions supported by the state machine. Upon determining that the transition is out-of-order, a determination is made whether the transition is to a reachable state such as a state prior to the current state of the state machine or to a future state from the current state. If so, the transition is allowed to be undertaken. |
US08762318B2 |
Supplementing a trained model using incremental data in making item recommendations
Incremental training data is used to supplement a trained model to provide personalized recommendations for a user. The personalized recommendations can be made by taking into account the user's behavior, such as, without limitation, the user's short and long term web page interactions, to identify item recommendations. A trained model is generated from training data indicative of the web page interaction data collected from a plurality of users. Incremental training data indicative of other web page interaction data can be used to supplement the trained model, or in place of the trained model. Incremental training data can be indicative of user behavior collected more recently than the data used to train the model, for example. |
US08762313B2 |
Method and system for creating a predictive model for targeting web-page to a surfer
A system and a method for creating a predictive model to select an object from a group of objects that can be associated with a requested web-page, wherein a configuration of the requested web-page defines a subgroup of one or more selected objects from the group of objects. Each web-page can include one or more links to be associated with content objects from the group. For each content object presented over a requested web-page, one or more predictive model with relevant predictive factors is processed such that the predicted objective, the probability of success for example, is calculated. A success is defined as a surfer responding to the presented content according to the preferences of the site owner. Each predicted model can be associated with a key-performance indicator (KPI). Further, a predictive model can reflect the number of times the surfer requested the web page during the surfer's visit. |
US08762310B2 |
Evaluating recommendations
Generally described, embodiments of the present disclosure are directed toward the identification of items for inclusion in a recommendations list that may be displayed concurrently with an item selected by a user or users. The recommended items may be items that are of potential interest to the user and/or may be items that are related to the selected item. More specifically, embodiments of the present disclosure provide a method and system for generating one or more recommendations lists, providing those lists to users, evaluating users' interactions with those lists, and modifying the engines or techniques used to identify items that are to be included in the recommendations lists. |
US08762309B2 |
Storage policy evaluation in a computing environment
Systems and methods for generating a storage policy for a storage system are provided. The method comprises receiving a target function applicable to a storage system having one or more data storage mediums, wherein the target function represents values for storage parameters associated with productivity or loss tolerance in the storage system; implementing one or more simulation rules according to the received target function; generating one or more storage operation requests to access data on said one or more data storage mediums based on said one or more simulation rules; submitting said one or more storage operation requests to the storage system for processing; analyzing simulation results obtained for the storage system, in response to the storage system processing said one or more storage operation requests; and generating one or more storage policies, by a machine learning entity, in response to analyzing the simulation results. |
US08762308B2 |
Combining predictive capabilities of Transcranial Doppler (TCD) with Electrocardiogram (ECG) to predict hemorrhagic shock
A real-time decision-support system predicts hemorrhagic shock of a patient by analysis of electrocardiogram (ECG) signals and transcranial Doppler (TCD) signals from the patient. These signals are subject to signal decomposition using Discrete Wavelet Transform (DWT) to sets of wavelet coefficients and selecting significant signal features. Machine learning is applied to the significant features to evaluate and classify hypovolemia severity based on the input ECG and TCD signals from the patient. The classification of blood loss severity is displayed in real-time. An extension of the decision-support system integrates Arterial Blood Pressure (ABP) signals and thoracic electrical bio-impedance (DZT) signals with the ECG and TCD signals from the patient to evaluate severity of hypovolemia. |
US08762307B2 |
Control system for plant
A control system for a plant e.g. as a non-linear system, which is capable of properly suppressing interaction occurring between a plurality of control inputs and a plurality of controlled variables, thereby making it possible to properly control the controlled variables and easily design the control system. In the control system, each of a plurality of interaction suppression parameters for correcting the control inputs, respectively, such that the interaction is suppressed is calculated using a neural network constructed by using, out of the plurality of control inputs, a control input other than a control input corrected by a calculated interaction suppression parameter, as an input, and the interaction suppression parameter as an output. |
US08762306B2 |
Neural network for glucose therapy recommendation
A multifunctional neural network system for prediction which includes memory components to store previous values of data within a network. The memory components provide the system with the ability to learn relationships/patterns existent in the data over time. |
US08762304B2 |
Policy scheduling
A policy scheduler scheduling a policy is provided. The policy scheduler receives the policy for a system and information of a current state of the system. The policy scheduler evaluates one or more rules based on the current state of the system and generates a new rule via an evolutionary algorithm based on the information of the current state of the system. The policy scheduler adds the newly generated rule into the one or more rules and schedules the policy based on the one or more rules including the newly generated rule. |
US08762301B1 |
Automated determination of root cause
An exemplary embodiment includes a diagnostic which can identify the source, or “root cause” of variability of process and process control parameters. A plurality of correlations is provided, each representing a possible cause of variation. One of the correlations is identified as the most likely root cause of variation. The remaining possible root causes are also listed, in sequence, from most likely to least likely. The method applies to both normal and abnormal operating conditions. |
US08762294B2 |
Method and system for dynamic pricing
A computer system and method for dynamic pricing is described. The system includes at least one dynamic calculator, which performs calculations based upon conditional rules. |
US08762291B2 |
Robust optimization of bulk gas distribution
Techniques are disclosed for increasing the robustness of optimization solutions for bulk gas distribution, relative to uncertain events such as unexpected plant outages. The techniques actively consider different assumptions regarding unexpected plant outages while searching for a solution (i.e., when generating a delivery schedule). A robust solution (delivery schedule) is one on which a plant outage only has a limited impact. A computer-implemented delivery scheduling application may identify a robust solution that performs well with respect to a range of uncertain future conditions (e.g., a variety of plant outages), at the lowest additional cost to the producer/distributor relative to other solutions. |
US08762289B2 |
Method, apparatus, and computer readable storage for training human searchers
A method for enhancing search skills of human searchers in an information search system. The invention allows human searchers to be trained when they are not particularly busy fielding search queries from information seekers. The training can allow the searcher to increase their performance rating, thereby allowing greater effectiveness in fielding search queries for information seekers. The method can include determining whether a searcher is eligible to receive or provide training; and training an idle searcher with training queries, and/or search results. |
US08762288B2 |
Methods and systems for establishing an identity confidence database
The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile. |
US08762284B2 |
Systems and methods for facilitating secure transactions
Various embodiments are directed to methods for generating proxy account data for a financial account and authorizing payment from an account of a customer based on proxy account data. Example methods may comprise selecting a serial number for a first customer and storing an association between the serial number and an account of the first customer. The methods may further comprise encrypting the serial number and consolidating the encrypted serial number with checkable data. An association between the encrypted serial number and the checkable data may be stored and the consolidated encrypted serial number and checkable data may be encrypted to generate proxy account data. |
US08762283B2 |
Multiple party benefit from an online authentication service
An account authentication service where a trusted party verifies an account holder's identity for the benefit of a requestor during an online transaction. The account authentication involves requesting a password from the account holder, verifying the password, and notifying the requestor whether the account holder's authenticity has been verified. An alternative embodiment of the account authentication service includes a value-adding component where information about a customer is shared with a value-adding party. The customer information is rich in detail about the customer since it is collected by each of the parties in the account authentication process. The value-adding party can then use this information in various manners. All of the parties involved can benefit from sharing the customer information. The value-adding party can be, for example, a merchant, a shipper, a security organization, or a governmental organization. A transaction identifier identifies a specific transaction between a customer, a merchant, and the customer information. |
US08762278B2 |
Dual-activation financial products
A system operating in conjunction with a financial account permits joint activation of a virtual card associated with the financial account. An event-detection module detects an event related to the virtual card and an authorization component for permitting certain individuals to use the virtual card. A messaging module generates account-related messages and transmitting these messages to individuals associated with the financial account. |
US08762277B1 |
Overdraft protection and forgiveness
Various aspects relate to systems, methods or devices for processing overdrafts made by customers. A particular embodiment is directed towards a system that is configured to receive transaction data from customer-oriented terminals. The transaction data includes requests for monetary transfers on behalf of customers that hold a checking or savings account at a financial institution. In response to receiving the transaction data, the system accesses customer account information, which can include the amount of funds in the checking or savings accounts. The system determines whether sufficient funds exist in the accounts to cover the financial transactions. In response to a potential overdraft of one or more customer accounts, stored customer information is accessed to determine and authorize overdraft deferment eligibility of the customer based upon the stored customer information. The system defers an overdraft fee by providing a grace period during which funds can be transferred to cover the overdraft. |
US08762274B2 |
Remote currency dispensation systems and methods
A currency dispense and control system (CDCS) for securely dispensing paper currency in multiple modes: (1) an ATM system and (2) a currency control system that allows a merchant or merchant-approved employee to withdraw cash from the CDCS independent of a standard ATM electronic fund transfer (EFT) network. The CDCS may be on-site and implemented using standard ATM hardware or may be located remotely. The CDCS may also include one or more of the following functionalities: a duress dispensation system that allows the CDCS to activate an alarm and/or otherwise communicate with local police or security services during a robbery, a time-release system that effects a time-delayed dispensation functionality, and a user identification and authentication system for authenticating a user identity and determining eligibility of the user to access the currency control system. |
US08762272B1 |
Management of emails containing payments
An email payment system and method to provide users with the ability to initiate and send payments to one more recipients via email messaging. A user interface is provided in an email client that allows a user to insert payment with the email. Payment details are collected through one or more payment modals displayed in the email client. A payment object is inserted into the body of the email and is displayed to both the sender and recipient. The payment details captured in the payment object are communicated to a payment processor. The payment processor uses electronic payment accounts associated with the corresponding sender and recipient email addresses to identify the relevant electronic payment accounts and transfer the payment between said accounts. A status of the payment transaction is tracked and displayed within the payment object of the emails residing in both the sender and recipient email client. |
US08762270B1 |
System and method for providing supplemental payment or transaction information
A system and method for providing supplemental payment or transaction information. The method comprising the steps of receiving at least one payment file from at least one payor; receiving at least one supplemental payment information file from the at least one payor or at least one provider; associating the at least one supplemental payment information file with the corresponding at least one payment file; determining whether there is a payment discrepancy based on the at least one supplemental information file and the corresponding at least one payment file; and preparing at least one payment explanation file, wherein the payment explanation file comprises data or information based on the payment file and an explanation. |
US08762269B1 |
Systems and methods for providing a user interface for facilitating personal payment transactions
Systems and processes are disclosed for providing customized user interfaces for facilitating personal payment transactions. In certain embodiments, disclosed embodiments may generate a dynamic and customized interface for effecting the personal payment transaction by, for example, providing one or more options for the payer to fund the payment. The disclosed embodiments may provide an interface that includes one or more suggested recipients for identifying the payee associated with the payment transaction. The disclosed embodiments may also provide an interface that includes one or more routing options to route the payment. The disclosed embodiments may also provide an interface that provides one or more communication channel options for parties associated with the personal payment transaction to communicate. |
US08762268B2 |
Electronic commerce network with transactions analytics
A system that processes transactions, in response to a transaction using a financial instrument, receives an identity of a financial instrument, such as a card hash. The system creates an anonymous account that corresponds to the financial instrument, and stores line level data associated with the transaction in the anonymous account. Future transactions that use the same financial instrument are also stored in the anonymous account. As a result, all transactions can be linked to the same user. |
US08762266B2 |
Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
Systems, mechanisms and processes are provided to allow law-enforcement officials, when encountering the potential use of prepaid payment cards in the furtherance of a crime or in relation to criminal activities, to (1) attempt to check the balances on such prepaid payment cards, including the ability to perform aggregate balance checks on a group of such prepaid cards, (2) attempt to freeze the funds on such prepaid payment cards, and/or (3) attempt to seize the funds on such prepaid payment cards. |
US08762265B2 |
Method for collecting and disbursing electronic gratuities
The present invention relates to systems and methods for collecting and disbursing electronic gratuities. According to one embodiment, a device for submitting gratuities by credit card is provided at a place of business or other appropriate location. A method of using this device is disclosed, whereby consumers pay a predetermined or adjustable gratuity amount by inserting a credit card into the device. According to another embodiment, technological infrastructure is provided to transmit encrypted payment information such that the acquiring bank of the device provider obtains authorization for gratuity transactions conducted using the device. The acquiring bank is thus enabled to credit the device provider's merchant account or disbursal accounts with electronic gratuity payments less acquisition fees. According to another embodiment, a method of disbursing gratuity shares to employees of the business is provided, wherein processing fees are collected by the device provider. |
US08762263B2 |
System and method for secured account numbers in proximity devices
A method and system for using a secured account number for processing proximity types of wireless financial transactions associated with portable consumer proximity devices is disclosed. In one embodiment, the method includes receiving a proximity type of wireless financial transaction request along with a secured account number from a portable proximity consumer device such as a contactless smart card, converting the secured account number to the user's real account number, and transmitting the financial transaction request along with the user's real account number to the issuer of the user's real account number for authorization and processing. |
US08762257B2 |
System and method for coalescing market data at a client device
A client device coalesces data received from an exchange, and provides a client application such as a graphical user interface with the opportunity to process fewer, but up-to-date, data updates from an exchange when a large volume of prices becomes available. Accordingly, the trader can be assured of receiving updated information that are fed to the client applications at a rate that is cohesive with that client device's processing speed. |
US08762256B1 |
System and method for providing workup trading without exclusive trading privileges
A system and method are provided that preserve many of the advantages of traditional workups, including the ability to create a single deal extended in time, while avoiding aspects of prior art workup protocols that can be disadvantageous in particular trading environments and, particularly, avoiding the trading delays sometimes created by providing certain traders with exclusive trading privileges in highly-liquid, fast-moving trading environments. In a preferred embodiment, the present system comprises a distributed computer processing system programmed to provide a structured trading protocol that enhances trading efficiency and fairly distributes market opportunity to system users. More specifically, in a preferred embodiment, the present system is adapted to provide a plurality of workup phases each of which is designated a “public” phase and during which all trading is conducted on a first-come-first-served basis. |
US08762248B2 |
Purchasing system on internet and method thereof
The present invention relates to a technology for purchasing an item to purchase automatically and jointly by using the internet, in particular to a purchasing system and a method thereof on the internet which is capable of economizing human and material resources and lowering the unit cost of an item by performing all processes from a notice of tender to an ordering automatically on the internet and purchasing an item required for many companies and establishments jointly. |
US08762246B2 |
System and method for optimizing collateral management
A computer-implemented system and method for managing collateral allocations associated with Tri-Party repurchasing agreements and a collateral allocation system includes one or more processors and memory/database configured to store user-definable rulesets and collateral characteristics relating to the Tri-Party repurchasing agreements. A collateral allocation module recalls collateral from the Tri-Party repurchasing agreements to a common Dealer Box, and reallocates the collateral to the Tri-Party repurchasing agreements utilizing a self organizing map, so as to minimize margins to reduce over-collateralization and/or undercollateralization. Other considerations, such as basket identifiers and cost of carry considerations may be weighed in the reallocation as well. |
US08762240B2 |
Electronic value exchange system, terminal device, recovery device and method of exchanging electronic value adoptable thereto
An electronic value exchange system which includes first and second terminals (1d), (1e) which at least execute electronic value exchange with each other, and an authentication device (110), each of the first and second terminals has a value storage unit (13) which stores the electronic value; an exchange contract data storage unit (17) which stores exchange contract data representing contents of the electronic value exchange; an exchange state storage unit (16) which represents a state of the electronic value exchange; a commit order storage unit (14) which stores a commit order which indicates that which of the first terminal and the second terminal is the first to execute; an identification information storage unit (15) which stores identification information assigned to every process of transmission/reception of the exchange contract data; and a first exchange execution unit (12) which executes transmission/reception of the exchange contract data with respect to each of the first and second terminals and stores it into the exchange contract data storage unit (17), wherein the authentication device (110) has a second exchange execution unit (114) which acquires the exchange contract data from either one of the first and second terminals, and operates the value storage unit (13) of such one terminal to execute the electronic value exchange. |
US08762238B2 |
Recurring transaction processing system and approach
Transaction-based interactions are facilitated using recurring transaction processing approaches. According to an example embodiment of the present invention, recurring transactions are managed using rules applicable to parties to the transactions (e.g., as can be automatically associated with the recurring transactions based on information in the transactions and the rules). In this regard, transaction information is processed in accordance with rules characterizing the recurring nature of the transaction to which the information applies. Such transaction recurrence may be implemented, for example, using a cyclic, event-driven or other recurring type of condition. Payment related aspects of the transaction are also carried out based on the transaction processing and related recurring characteristics. |
US08762237B2 |
Establishing, modifying, and customizing account-based products
Providing an account-based product. A communications portal is provided and consumer data is received via the portal. At least one derived characteristic, e.g., qualification, is determined contemporaneously from the consumer data. A product set is presented, via the portal, including at least one product determined at least in part by the derived characteristic. A selection from the product set is received via the portal, and at least one product feature, e.g., balance transfer, of at least one selected product is activated contemporaneous with the product selection. |
US08762235B2 |
Apparatus, methods and computer programs for metering and accounting for services accessed over a network
Apparatus, methods and computer programs provided for metering and accounting in a commercial e-services infrastructure address the requirement for handling composite services in which higher-level services are built using simpler underlying services, each of which may be autonomously owned and operated. Metering records for each service underlying a composite service are correlated by a process associated with the composite service, and then sent to an accounting service where they can be aggregated. The correlation is performed in a distributed manner with correlated usage data provided on a per-request basis. Accounting services can take account of the usage and charges associated with the underlying services to provide accounting and billing on a per-request basis or per customer-provider pair for a billing period. |
US08762233B2 |
Single or multi-company business accounting system and method for same including account number maintenance
A computer implemented method for account number maintenance used within a single or multi-company accounting system is provided. The method comprises at a processor, performing the account number maintenance on at least one of a plurality of accounts. Each of the accounts has a plurality of account segments. Performing the account number maintenance includes at least one of i) renaming the account segment of at least one of the accounts; ii) changing a length the account segment of at least one of the accounts from a first defined length having a first number of characters to a new defined length having a second number of characters; iii) changing the account segment of at least one of the accounts; iv) merging two or more of the accounts into one of the accounts; and v) splitting one of the accounts into two different accounts. |
US08762231B2 |
Merchandise and geographic information matching system, associate apparatus and method
Geographic merchandise matching system, associated apparatus and method are provided. In an embodiment, a hand-held apparatus integrates user geographic location and a merchandise matching condition, and queries a merchandise service platform. An information matching module of the merchandise service platform accesses a merchandise database, a geography database and a comment database for sorting to form a matching result, and sends the matching result back to the handheld apparatus. |
US08762229B1 |
Parental policy based online wish lists
A parental policy is enforced for online purchases. A parent enters a parental policy indicating items that are prohibited for a child. When the child attempts to add an item to a wish list, it is determined whether the item is permitted according to the policy. If so, the addition of the item to the wish list is allowed to proceed. If the policy prohibits the item, the addition of the item to the wish list is blocked. Additionally, the parent can be informed (via email, telephone, etc.) of the attempt to add the item to the wish list. The same logic can be applied to attempts to purchase items for children, or attempts to purchase items by children. |
US08762228B2 |
Recommendations based on an adoption curve
Methods and apparatus, including computer program products, for recommendations based on adoption curve. A method includes tracking over a period of time user popularity of a media content using a web service residing in a server, the popularity and period of time representing a life cycle of each of the media content. The method tracks over the period of time users enrolled in the web service and when in the period of time each of the users adopted the tracked media content and associates adopted media content with user profiles representing the users. The method recommends media content associated with a first user who adopted the tracked media content earlier in the period of time to a second user who may want to adopt the tracked media content subsequently in the period of time. |
US08762227B1 |
Automatic product groupings for merchandising
Disclosed are various embodiments for defining subcategories of product items to be used in merchandising. The subcategories may be defined on the basis of product data and/or sales data for the product items. Based on a distribution of the product items in accordance with one or more of the product and/or sales data, implicit groups or subcategories can be identified and selected for merchandising purposes. |
US08762221B2 |
Implementing auctions on social network platforms
A system platform and associated methods are provided for implementing online reverse auctions in a social network platform (SNP). A fully-automated, live, reverse-auction based system is integrated into an SNP to enable buyers to initiate desired transactions and take advantage of a subscribers' network of friends, colleagues, co-workers, family members and connections by connecting buyers and sellers in a non-intrusive, targeted fashion. Sellers compete for buyers' business by providing dynamic, real-time seller-specific pricing while simultaneously optimizing the seller's target parameters such as price, inventory levels, profit, revenue and volume. |
US08762217B2 |
Systems and methods for searching in an electronic commerce environment
A method of searching an electronic commerce website includes searching a plurality of user profiles based upon a user-supplied search query for an item, establishing an interactive online session between the user and the at least one search facilitator, and providing for the at least one search facilitator to present one or more suggested item listings to a user through the electronic commerce website. The searching identifies at least one search facilitator profile among the plurality of user profiles. The search facilitator profile represents a search facilitator who can assist the user in locating the item within the electronic commerce website. |
US08762214B1 |
Configuration based hierarchical product selection and product e-commerce agent management
A method for hierarchical product selection and purchasing from a server. The method includes accessing a plurality of products from a plurality of component subareas, wherein the products are for an assembly of a computer system, and wherein each of the component subareas have corresponding compatibility constraints with respect to other component subareas. A hierarchical presentation of the products is generated, wherein the presentation proceeds from a parent product out of the plurality of products to a child product out of the plurality of products. The hierarchical presentation of the products are provided to a client computer system via a Web browser hosted on the client computer system, wherein the presentation is configured to show child component subareas that satisfy compatibility restraints with parent component subareas. An order for the at least one product is accepted and implemented with a corresponding e-commerce agent for the product. |
US08762213B1 |
Electronic processing of invoices using assigned users and supplier groups
A portal is provided by the system. The portal has respective views for a supplier submitting electronic invoices and an administrator of an enterprise submitting and/or reviewing electronic invoices. An administrator of the enterprise can create and maintain supplier groups in the portal, assign security permissions to the supplier groups in the portal; and assign users to the supplier groups in said portal. The users thereby receive security permission assigned to the supplier group to which they are assigned. The processing of electronic invoices by users is controlled in accordance with the assignments of security permissions to the supplier groups. |
US08762208B2 |
Mobile computing based centralized menu system
Systems and methods related to an individualized menu system for use by customers in a retail environment. Multiple mobile computing devices are in communication with a database server from which the mobile computing devices retrieve menu related data items. The menu related data items are then used to present a menu to the customer by way of the mobile computing devices. The mobile computing devices are authenticated by the database server and communicate with the database server using a secure communications protocol. Each menu related data item in the database server is individually editable by an administrative user and edits are not propagated to the mobile computing devices until they are committed as such by the administrative user. |
US08762202B2 |
Intracluster content management using neuro-response priming data
A system uses neuro-response information to evaluate content within a cluster, such as commercials in a pod, advertisements in a frame, or products on a shelf, to determine priming characteristics associated with each pieces of content within the cluster. The priming characteristics and other data are combined to obtain blended attributes. The blended attributes are correlated with each piece of intracluster content to allow intelligent management including selection, arrangement, ordering, presentation, and/or scheduling of intracluster content. Intracluster content may also use priming characteristics associated with extracluster content to further improve management. |
US08762200B2 |
System and method of selecting advertising content
A method includes receiving data for an object at a computing device. The method includes sending a representation of the object from the computing device to a display device coupled to the computing device. The object includes a first display element in a featured position and a second display element. The method includes selecting advertising content with a processor of the computing device based on first information retrieved from the data that is associated with the first display element, based on second information retrieved from the data that is associated with the second display element, and based on a first location in the representation of the first display element relative to a second location in the representation of the second display element. The method also includes sending the advertising content from the computing device to the display device for display in an advertising window. |
US08762199B2 |
Method and apparatus for placement of a product or service in a gaming system
There is described herein methods and apparatuses for the placement of offerings in gaming systems. According to an embodiment of a method, a game on a gaming system is operated by at least one processor, where the game includes one or more generic elements. A branded element is dynamically substituted for a selected one of the generic elements of the game during operation of the gaming system, where the branded element serves to advertise a product or service of a third party. Systems for establishing and tracking and controlling placements are also described. |
US08762197B2 |
Social enablement of mobile casual games enabling mobile users to connect within and outside games with other mobile users, brands, game developers, and others online, on mobile devices, and in social networks
A gamer engagement platform within games and social networks to engage gamers in novel ways during the game play and during interstitial periods between game level transitions to promote loyalty to games while exposing them gracefully the rewards and advertisements of brands and location based service providers with whom they are likely to have high affinity on just-in-time and just-in-location basis, whether the games are being played online or offline. Gamer can invite friends in platform and social networks for social game challenge across heterogeneous games. Brands, location based service providers, and game developers can conduct and track campaigns using the optimized points conversion engine and offer recommendation engine of the platform. Software code embedded in the games conducts campaigns during game play and interstitial times during game level transitions to convert game points earned into platform points that can be exchanged by gamer to redeem rewards in-game or later. |
US08762195B1 |
Dynamically generating pricing information for digital content
A method, system, and medium are provided for dynamically generating pricing information for digital content. In exemplary aspects, the technology includes receiving a request for digital content from a mobile device. In addition, attributes associated with the mobile device and digital content are identified, and a purchase-prediction score associated with the mobile device and request for digital content is received. The purchase-prediction score is used to dynamically generate pricing information of the digital content. The purchase-prediction score is derived from values assigned to the attributes, the values quantifying a correlation between purchase trends and the attributes. |
US08762191B2 |
Systems, methods, apparatus, and schema for storing, managing and retrieving information
An amount of risk associated with a transaction may be determined by transforming collected information into a searchable database where the collected information may be assessed for relevancy and redundancy, parsed into categories of relevancy based on at least one risk, stored in a database, and outputted into a graphical user interface. Information may also be collected from a plurality of sources, translated into at least one standardized format, parsed into a plurality of portions, assessed based on a risk-relevancy metric, tagged based on the risk-relevancy metric, filtered based on redundancy, stored within the data structure, and outputted into a data storage structure to a graphical user interface. Unstructured information may be obtained from a large variety of sources, which may allow users to make decisions—regarding, for example, transactions, relationships, or the like—from a risk perspective. |
US08762186B2 |
Analogy based workflow identification
A method of creating an analogous workflow is provided. A first workflow is received at a first device, the first workflow including a plurality of first modules that are connected. A second workflow is received at the first device, the second workflow including a plurality of second modules that are connected. A third workflow is received at the first device, the third workflow including a plurality of third modules that are connected. An analogy workflow is determined based on a difference between the received first workflow and the received second workflow. The determined analogy workflow is applied to the received third workflow to define a fourth workflow. A method of identifying a workflow of a plurality of workflows is provided. A query workflow includes a plurality of modules that are connected. A workflow is identified that at least partially matches the received query workflow. |
US08762185B2 |
Travel expense automation
A method of monitoring the expenses of a traveller during the progress of an itinerary utilises NFC for carrying out the financial transactions associated with the itinerary and updates a corporate ERP or similar financial database with the financial transactions as they occur allowing rapid allocation to cost centres. The itinerary may be laid out in terms of itinerary events, each of which may be tracked by an NFC connection with an NFC device at an expected location and date for the itinerary event. |
US08762184B2 |
System and method for presenting pricing information for online travel products and services
The disclosure pertains to a computer-implemented method for presenting search results for airfares. One or more processors prompt a user to enter travel criteria for airfares on a calendar start interface to identify (i) the point of departure and (ii) the destination. The processor(s) display a sequenced calendar interface including a departure calendar, which includes a plurality of departure dates, each of which include pricing information indicating a lowest price roundtrip fare available on that departure date between the point of departure and the destination. A return calendar is displayed that includes a plurality of return dates that span multiple weeks, each of the plurality of return dates being displayed with pricing information indicating a lowest price roundtrip fare that departs on the selected departure date and returns on that return date. |
US08762182B2 |
Independent annuity placement system and method
A system and method for facilitating annuity transactions between annuity purchasers and providers via an annuities placement program accessible to the purchasers and providers. Purchasers enter quote solicitation information used by the annuity providers to establish a quote for an annuity. Annuity providers enter a quote in response to the quote solicitation information, and the quote is provided to the purchaser via the annuities placement program. The quote is customized to the annuity purchaser's quote solicitation information. Multiple quotes from multiple providers may be presented to the purchaser for ease of quote comparison. To facilitate such transactions, a discretionary group is established to be a contract holder for each participating annuity provider. A master group contract is established for each of the participating providers, each of which is written by a respective one of the participating annuity providers to the discretionary group to allow the discretionary group to be the contract holder for annuities purchased by the annuity purchasers. In response to an annuity purchase, a certificate of participation is issued to the purchaser from the provider under the terms of the master group contract of that annuity provider, which reflects annuity terms customized to the annuity purchaser. |
US08762181B1 |
Systems and methods for evaluating healthcare claim transactions for medicare eligibility
Systems and methods for evaluating healthcare claim transactions for Medicare eligibility are described. A healthcare claim transaction designating a payor other than a Medicare Part B payor may be received from a healthcare provider computer, and a product or service associated with the transaction may be identified as a product or service that is eligible for Medicare Part B coverage. Based at least in part on the identification, a determination may be made as to whether a patient associated with the transaction is eligible for Medicare Part B coverage. The transaction may be routed to a claims processor computer if it is determined that the patient is not eligible for Medicare Part B coverage. However, if it is determined that the patient is eligible for Medicare Part B coverage, then a message indicating that the transaction is rejected may be communicated to the healthcare provider computer. |
US08762179B2 |
Automated insurance enrollment, underwriting, and claims adjusting
An insurance enrollment and underwriting method includes providing a first user interface with one or more controls for enabling a user to specify one or more health conditions in an enrollment application for pet health insurance. Data representing one or more health conditions specified through the first user interface is received. That data is electronically processed. Each condition is electronically flagged as a condition that is acceptable, precluded, or for manual review. A dollar limit of coverage for each of a plurality of diagnoses in lieu of one or more exclusions is calculated. The plurality of diagnoses include one or more diagnoses related to one or more of the health conditions. Where all conditions are and flagged as acceptable or determined to be acceptable following a manual review, an active policy is packaged to include coverage for each of the plurality of diagnoses up to each diagnosis' corresponding dollar limit of coverage. |
US08762175B1 |
Methods and systems for promoting mobile awareness
Methods and systems for promoting mobile awareness are described. In an embodiment, a location associated with a member of a drug benefit plan is accessed. A drug benefit plan action is determined based on the location associated with the member. The drug benefit plan action is an action at least partially at the direction of a pharmacy benefit manager that administers the drug benefit plan. A drug benefit notification is generated based on the drug benefit plan action. The pharmacy notification benefit is associated with the drug benefit plan. Additional methods and systems are disclosed. |
US08762167B2 |
Methods and systems for generation of personalized health plans
Personalized, health and performance programs are generated for individuals based on various biomarkers and performance and lifestyle assessments. In one embodiment, a diagnostic test of blood or other biological specimen(s) is used to determine key biological marker levels. Information and assessments of the user's physical performance, life style and health and wellness goals is also collected and provided to an expert system that matches the biomarker levels and assessments to a knowledgebase of scientific knowledge about biomarker levels and health and fitness outcomes. Personal recommendations and advice on nutrition and exercise is then generated, which may be used to help individuals reach their diet, fitness, and wellness goals and improve their physical and mental performance and well being in measurable ways. |
US08762154B1 |
Method and apparatus of estimating optimum dialog state timeout settings in a spoken dialog system
Example embodiments of the present invention may include a method that includes collecting caller response timings to each of a plurality of dialog states conducted during a call, and estimating a plurality of parameters based on the caller response timings. The method may also include selecting a response completeness value responsive to the estimated plurality of parameters, the response completeness value is used to calculate at least one optimal timeout value. The method may also include selecting the at least one optimal timeout value, and setting the at least one optimal timeout value for each of the corresponding dialog states. The timeout value(s) may be used for subsequent calls to provide optimal user satisfaction and call success rates. |
US08762151B2 |
Speech recognition for premature enunciation
Methods of automatic speech recognition for premature enunciation. In one method, a) a user is prompted to input speech, then b) a listening period is initiated to monitor audio via a microphone, such that there is no pause between the end of step a) and the beginning of step b), and then the begin-speaking audible indicator is communicated to the user during the listening period. In another method, a) at least one audio file is played including both a prompt for a user to input speech and a begin-speaking audible indicator to the user, b) a microphone is activated to monitor audio, after playing the prompt but before playing the begin-speaking audible indicator in step a), and c) speech is received from the user via the microphone. |
US08762148B2 |
Reference pattern adaptation apparatus, reference pattern adaptation method and reference pattern adaptation program
A method and apparatus for carrying out adaptation using input speech data information even at a low reference pattern recognition performance. A reference pattern adaptation device 2 includes a speech recognition section 18, an adaptation data calculating section 19 and a reference pattern adaptation section 20. The speech recognition section 18 calculates a recognition result teacher label from the input speech data and the reference pattern. The adaptation data calculating section 19 calculates adaptation data composed of a teacher label and speech data. The adaptation data is composed of the input speech data and the recognition result teacher label corrected for adaptation by the recognition error knowledge which is the statistical information of the tendency towards recognition errors of the reference pattern. The reference pattern adaptation section 20 adapts the reference pattern using the adaptation data to generate an adaptation pattern. |
US08762138B2 |
Method of editing a noise-database and computer device
The present invention relates to a method as well as to a computing device (20) for editing a noise-database (13) containing noise information, said noise information being derived from noise signals within an audio stream (19). In order to enhance possibilities to create and utilize context information which emerge from tracking noise signals from an audio stream, for example a telephone call, the above method is characterized by the following steps: A) in a localizing step (14), determining geographical data of the location the noise signals origin from; B) in an analyzing step (15), analyzing the noise signals with reference to the noise content; C) in a linking step, linking the analyzed noise signals to said geographical data to create noise information; D) in a storing step, storing said noise information within said noise-database (13). The present invention further relates to a method of treating noise signals within an audio stream (18), said audio stream comprising noise signals and additional audio signals, preferably voice signals. |
US08762132B2 |
Textual entailment recognition apparatus, textual entailment recognition method, and computer-readable recording medium
A textual entailment recognition apparatus (2) includes a vector generation unit (21) that generates, for each of first and second texts, a vector for each predicate-argument structure by using a word other than a word indicating a type of argument of a predicate in the predicate-argument structure; a combination identification (22) unit that compares the vector generated for each predicate-argument structure for the first text and the vector generated for each predicate-argument structure for the second text, and identifies combinations of the predicate-argument structures of the first text and the predicate-argument structure of the second text based on a result of the comparison; and an entailment determination unit (23) that obtains a feature amount for each of the identified combinations, and determines whether the first text entails the second text based on the obtained feature amounts. |
US08762131B1 |
Systems and methods for managing a complex lexicon comprising multiword expressions and multiword inflection templates
In some embodiments, linguistic knowledge bases including multiword lexicon entries belonging to various natural languages are generated and maintained. Multiword lexicon entries include representations of multiword expressions (e.g. composite words such as “expectation value”, verbal phrases such as “to stumble upon”, and idiomatic phrases such as “to hit the nail on the head”), and multiword inflection templates (e.g. “more adjective” as a symbolic representation for the comparative form of adjectives). A representation of a multiword lexicon entry, including a dependency tree and/or an attribute-value tree, is displayed within a graphical user interface, allowing a user to verify, update, and correct lexical data. Computer-readable encodings (e.g. XML) of dependency tree and/or attribute-value tree data are saved as part of each lexicon entry. |
US08762130B1 |
Systems and methods for natural language processing including morphological analysis, lemmatizing, spell checking and grammar checking
In some embodiments, a linguistic application exploits a linguistic knowledgebase (LKB) including, among others, lexicon data, inflection form data, and syntax data for a natural language such as English or Romanian. The application employs a set modules including a word retriever, a form generator, and a syntax checker, which are interconnected to perform a number of higher-level text-processing operations such as synthetic and analytic annotation, lemmatizing, spell checking, and grammar checking. |
US08762126B2 |
Analyzing simulated operation of a computer
Analyzing simulated operation of a computer including loading user-defined dynamically linked analysis libraries that each include specifications of events to be traced for analysis, including: executing, in separate hardware threads, one trace buffer handler for each analysis library, and associating, with each trace buffer handler, one or more analysis functions; translating static binary instructions for the simulated computer into binary instructions for the executing computer, including: inserting, into the translation, implementing code for each specification of an event to be traced and inserting, into the translation for each static instruction, a memory address of a separate static instruction buffer; executing the translation, including executing the implementing code and generating, in a trace buffer, one or more trace records for each specified event; and processing the trace buffer, including calling analysis functions and associating by the analysis functions through the separate static instruction buffers event analysis data with static instructions. |
US08762123B2 |
Method and system for implementing circuit simulators
A system and method for performing circuit simulation is described. The present approach provides methods and systems that create reusable and independent measurements for use with circuit simulators. Also disclosed are parallelizable measurements having looping constructs that can be run without interference between parallel iterations. Reusability is enhanced by having parameterized measurements. Revisions and history of the operating parameters of circuit designs subject to simulation are tracked. Mechanisms are provided that allow for viewing, measurement or other manipulation of signals at specific locations in a circuit design for simulation, such as parameters that include observation points which are implemented using probes. One approach to executing a measurement is via a controllable and flexible control statement, which in one embodiment is the “run” statement. Improved interfaces for viewing, controlling, and manipulating simulations and simulation results are also provided. |
US08762122B1 |
Methods for synchronized transient-envelope and event-driven simulation of electronic circuits
In one embodiment of the invention, a method of simulating a circuit is disclosed including simulating an analog component of the circuit over a first simulation time period with a first envelope simulation; adaptively switching from simulating the analog component with the first envelope simulation to simulating the analog component with a transient simulation over a second simulation time period; and adaptively switching from simulating the analog component with the transient simulation to simulating the analog component with a second envelope simulation over a third simulation time period. The adaptive switching from the first envelope simulation to the transient simulation may be in response to the envelope simulation accuracy falling below a predetermined level of accuracy in comparison with a transient simulation or in response to the second simulation time period including expected digital transitions where one or more digital events may occur to change the analog input signals to the analog component. |
US08762121B2 |
Optimization-based simulated annealing for integrated circuit placement
Generating of the initial temperature value for a simulated annealing process in the placement of circuit components in the physical design of integrated circuit (IC) is based on previous partitioning, if any, of the IC components into bins. An iteration limit value is then assigned equal to the initial temperature value. The simulated annealing process is then performed on a current partitioning of the IC components into bins according to the iteration limit value. The IC components are partitioned further into an exponentially larger total number of smaller bins compared to a previous number of bins. The process is then repeated starting with the operation of generating an initial temperature value for the simulated annealing process until the number of circuit components in each bin is below a specified number. |
US08762117B2 |
Method, an apparatus and computer program product for simulating dynamic fluids
The invention relates to a method for simulating dynamic fluids comprising a plurality of pseudo particles. The method comprising the steps of: defining a fluid mass density of the pseudo particle masses; defining a mass density constraint such that the mass density on each pseudo particle is constrained to a reference mass density of a real fluid, whereby an instant propagation of density fluctuations through the entire fluid system is enabled; performing constraint stabilization on said mass density constraint using a time stepping function, wherein said time stepping function is arranged to conserve global physical symmetries and is stable for violations of said mass density constraint; solving a linear system of equations for said mass density constraint in order to calculate density constraint forces; calculating new time discrete pseudo particle velocities from previous pseudo particle velocities with addition of velocity increments calculated from said density constraint forces; and calculating new time discrete pseudo particle positions from the previous pseudo particle positions with additions of the position increments calculated from said new pseudo particle velocities. The invention also relates to an apparatus for simulating dynamic fluids and a computer program product for the same. |
US08762116B2 |
Vehicle motor temperature determination
Methods and systems are provided for determining a temperature of a motor of a vehicle having an ignition when the ignition is turned on following a period of time in which the ignition had been turned off. An amount of time for which the vehicle had been turned off is determined. A motor temperature model is run using a time step to simulate the amount of time for which the vehicle had been turned off to determine an initial value of the temperature of the motor. |
US08762113B2 |
Method and apparatus for load testing online server systems
A method includes capturing data that is representative of actions performed by each of a plurality of human user operated clients as they interact with an online software application, loading at least one or more portions of the captured data into one or more automated simulation clients, and using the one or more automated simulation clients to perform load testing of an online server system. A system includes a data capturing stage, one or more automated simulation clients, and a configuration stage. A computer readable storage medium stores one or more computer programs that will cause a processor based system to execute steps including receiving data that was captured during a running of an online software application and that is representative of actions performed by each of a plurality of human user operated clients as they interacted with the online software application, and loading at least one or more portions of the data into one or more automated simulation clients that are configured to perform load testing of an online server system. |
US08762110B2 |
Interactive truss objects in computer-aided design models
Embodiments of the invention provide a computer-aided design (CAD) application configured for generating interactive truss objects in a CAD model. In one embodiment, a truss creation tool allows the user to select a truss family and the endpoints of the truss. Based on these selections, the truss creation tool generates a layout and structural members of a truss. The truss may be maintained as an interactive object within the CAD model. Thus, a user may edit the truss object, resulting in the regeneration of the truss layout and the regeneration of the structural elements of the truss. |
US08762106B2 |
Abnormal situation prevention in a heat exchanger
A system and method to facilitate the monitoring and diagnosis of a process control system and any elements thereof is disclosed with a specific premise of abnormal situation prevention in a heat exchanger. Monitoring and diagnosis of faults in a heat exchanger includes statistical analysis techniques, such as regression and load following. In particular, on-line process data is collected from an operating heat exchanger. A statistical analysis is used to develop a regression model of the process. The output may use a variety of parameters from the model and may include normalized process variables based on the training data, and process variable limits or model components. Each of the outputs may be used to generate visualizations for process monitoring and diagnostics and perform alarm diagnostics to detect abnormal situations in the heat exchanger. |
US08762105B2 |
Device management method, analysis system used for the device management method, data structure used in management database, and maintenance inspection support apparatus used for the device management method
Either a complete overhaul for replacing with recommended devices the entire number of devices in a large group of managed devices T, or a partial overhaul for repairing or replacing with recommended devices only those managed devices T that are malfunctioning is selectively performed as an initial overhaul. A complete test involving the entire number of the managed devices T is then periodically performed to determine whether the devices are operating normally or have a malfunction. Any devices found to be malfunctioning during any complete test are repaired or replaced with recommended devices. |
US08762104B2 |
Method and apparatus for analysing the condition of a machine having a rotating part
A method for analyzing a machine having a rotating shaft includes: generating an electric measurement signal dependent on vibrations emanating from the shaft; sampling the measurement signal at a sampling frequency to generate a digital measurement data signal; performing a decimation of the digital measurement data signal to achieve a digital signal having a reduced sampling frequency, the decimation including controlling the reduced sampling frequency such that the number of sample values per revolution of the shaft is kept at a substantially constant value; receiving the digital signal at an enhancer input; performing a correlation in the enhancer so as to produce an output signal sequence wherein repetitive signals amplitude components are amplified in relation to stochastic signal components; and performing a condition analysis function for analyzing the condition of the machine dependent on the digital signal having a reduced sampling frequency. |
US08762101B2 |
Methods and systems for identification of event data having combined activity and location information of portable monitoring devices
Systems and methods for segmenting a period of time into identification of locations of a user who performs activities are described. One of the methods includes detecting activity of a monitoring device worn by the user. The activity includes an amount of movement of the monitoring device. The activity is performed for a period of time. The method further includes obtaining geo-location data for the monitoring device and storing, during the period of time, the detected activity and corresponding geo-location data. The method also includes analyzing the detected activity and the corresponding geo-location data to identify one or more events. Each event is associated with a group of activity data and one or more of the groups of activity data is associated with an identifier, which is obtained using the geo-location data. |
US08762100B1 |
Numerical aperture integration for optical critical dimension (OCD) metrology
Provided are techniques for numerically integrating an intensity distribution function over a numerical aperture in a manner dependent on a determination of whether the numerical aperture spans a Rayleigh singularity. Where a singularity exists, Gaussian quadrature (cubature) is performed using a set of weights and points (nodes) that account for the effect of the Wood anomaly present within the aperture space. The numerical aperture may be divided into subregions separated by curves where the Wood anomaly condition is satisfied. Each subregion is then numerically integrated and a weighted sum of the subregion contributions is the estimate of the integral. Alternatively, generalized Gaussian quadrature (cubature) is performed where an analytical polynomial function which accounts for the effect of the Wood anomaly present within the aperture space is integrated. Points and nodes generated from a fit of the analytical polynomial function are then used for integration of the intensity distribution function. |
US08762096B2 |
Trigger generation for digital modulation signal analysis
A modulation error is detected every symbol data to generate a trigger signal. The present invention focuses that there are limited patterns of shifts from one symbol data to the next one of the digital modulation signal. Measured values of amplitude, phase and/or frequency of symbol data are latched and then values at the next symbol timing are predicted from the latched measured values using said feature. The predicted and measured values are compared at the following symbol timing. If the difference (error) is over an acceptable range, a trigger signal is provided which allows acquiring a modulation error by symbol data. |
US08762095B2 |
System for concurrent test of semiconductor devices
A tool to aid a test engineer in creating a concurrent test plan. The tool may quickly map test system resources to specific pins to satisfy the requirements of a concurrent test. The tool may project test time when such a mapping is possible. When a mapping is not possible, the tool may inform its user, including making suggestions of additional resources that could allow the test system to perform the test or suggestions for other variations in input parameters that would allow a mapping. The tool employs an assignment process in which groups of associated pins are identified, along with associated resource requirements for each group. Groups of test system resources that collectively fulfill a higher level requirement are identified and the assignment is made by mapping resource sets to resource groups, using ordering and matching heuristics to reduce processing time. |
US08762085B2 |
Method of estimating short circuit current available by analysis of DC charging circuit
A system and method of dynamically estimating the short circuit current availability (SCCA) at a node in an alternating current electrical distribution system by examining the spectral composition of current drawn by a direct current charging circuit connected to the node. A correlative relationship between the total harmonic current distortion (THDi) in the current drawn by the charging circuit and the SCCA at the node is established for a particular charging circuit. An estimation of the SCCA at the node is accomplished by taking current measurements of current drawn by the charging circuit, analyzing those current measurements to determine the THDi, and estimating a corresponding value of SCCA based on the determined THDi. A method is also provided for calibrating a particular charging circuit to have a reactance and resistance suitable for use in estimating SCCA. |
US08762078B2 |
Cylinder intake air amount calculating apparatus for internal combustion engine
A cylinder intake air amount calculating apparatus for an internal combustion engine for calculating a cylinder intake air amount which is an amount of fresh air sucked into a cylinder of the engine, is provided. An intake air flow rate, which is a flow rate of fresh air passing through an intake air passage of the engine, is obtained, and an intake pressure and an intake air temperature of the engine are detected. A theoretical cylinder intake air amount is calculated based on the intake pressure, the intake air temperature, and a volume of the cylinder. A volumetric efficiency of the engine is calculated by dividing a preceding calculated value of the cylinder intake air amount by the theoretical cylinder intake air amount. The cylinder intake air amount is calculated using the volumetric efficiency, the intake air flow rate, and the preceding calculated value of the cylinder intake air amount. |
US08762076B2 |
System and method for selective distribution of measurement device configuration in a loosely coupled autonomous system
Probe configuration is achieved in a measurement system in which probes are given possible configuration data depending upon conditions in an area relevant to the area of the probe. The possible probe configurations include global boundaries, such as time, and each probe then, based upon the possible configurations, selects a configuration. In one embodiment, the probe may interact with a central processor to further define the probe configuration. In one embodiment, probes may communicate with other probes, both to help define their operating environment and to optionally provide configuration data to another probe. |
US08762074B2 |
Optimizing culture medium for CD34<+> hematopoietic cell expansion
The present invention provides a method of determining the optimal composition of a serum-free, eukaryotic cell culture medium supplement, using 2-level factorial design and the steepest ascent method. The invention further provides a method of making a serum-free eukaryotic cell culture medium supplement and the generated thereof. The invention further provides a method of making a serum-free, eukaryotic cell culture medium and the medium generated thereof. The invention further provides a kit containing the medium of the invention. The invention also provides a method of expanding CD34<+> hematopoietic cells and a composition comprising CD34<+> hematopoietic cells in a serum-free, eukaryotic cell culture medium of the invention. |
US08762073B2 |
Transcript mapping method
A transcript mapping method according to an embodiment of the invention is described hereinafter and combines short tag based (SAGE and MPSS) efficiency with the accuracy of full-length cDNA (flcDNA) for comprehensive characterization of transcriptomes. This method is also referred to as Gene Identification Signature (GIS) analysis. In this method, the 5′ and 3′ ends of full-length cDNA clones are initially extracted into a ditag structure, with the ditag concatemers of the ditag being subsequently sequenced in an efficient manner, and finally mapped to the genome for defining the gene structure. As a GIS ditag represents the 5′ and 3′ ends of a transcript, it is more informative than SAGE and MPSS tags. Segment lengths between 5′ and 3′ tag pairs are obtainable including orientation, ordering and chromosome family for efficient transcript mapping and gene location identification. Furthermore, a compressed suffix array (CSA) is used for indexing the genome sequence for improve mapping speed and to reduce computational memory requirements. |
US08762072B2 |
Method of determining a reliability indicator for signatures obtained from clinical data and use of the reliability indicator for favoring one signature over the other
This invention relates to a method and an apparatus for determining a reliability indicator for at least one set of signatures obtained from clinical data collected from a group of samples. The signatures are obtained by detecting characteristics in the clinical data from the group of sample sand each of the signatures generate a first set of stratification values that stratify the group of samples. At least one additional and parallel stratification source to the signatures obtained from group of sample sis provided, the at least one additional and parallel stratification source to the signatures being independent from the signatures and generates a second set of stratification values. A comparison is done for each respective sample, where the first stratification values are compared with a true reference stratification values, and where the second stratification values are compared with the true reference stratification values. The signatures are assigned with similarity measure indicators indicating whether the first and the second stratification values match with the true reference stratification values. These are then implementing as input in determining the reliability of the signatures. |
US08762070B2 |
Systems, devices and methods to deliver biological factors or drugs to a subject
A method, computer implemented method and associated apparatus for the management of diabetes comprises utilizing zone model predictive control (Zone-MPC) to control delivery of an insulin or insulin analog within a zone of desired values. |
US08762068B2 |
Methods for threshold determination in multiplexed assays
Methods for determination of threshold values of signatures comprised in an assay are described. Each signature enables detection of a target. The methods determine a probability density function of negative samples and a corresponding false positive rate curve. A false positive criterion is established and a threshold for that signature is determined as a point at which the false positive rate curve intersects the false positive criterion. A method for quantitative analysis and interpretation of assay results together with a method for determination of a desired limit of detection of a signature in an assay are also described. |
US08762067B2 |
Methods and systems for ablation or abrasion with frozen particles and comparing tissue surface ablation or abrasion data to clinical outcome data
Certain embodiments disclosed herein relate to compositions, methods, devices, systems, and products regarding frozen particles. In certain embodiments, the frozen particles include materials at low temperatures. In certain embodiments, the frozen particles provide vehicles for delivery of particular agents. In certain embodiments, the frozen particles are administered to at least one biological tissue. |
US08762065B2 |
Closed-loop feedback-driven neuromodulation
A neurological control system for modulating activity of any component or structure comprising the entirety or portion of the nervous system, or any structure interfaced thereto, generally referred to herein as a “nervous system component.” The neurological control system generates neural modulation signals delivered to a nervous system component through one or more neuromodulators, comprising intracranial (IC) stimulating electrodes and other actuators, in accordance with treatment parameters. Such treatment parameters may be derived from a neural response to previously delivered neural modulation signals sensed by one or more sensors, each configured to sense a particular characteristic indicative of a neurological or psychiatric condition. |
US08762064B2 |
Seismic image filtering machine to generate a filtered seismic image, program products, and related methods
Seismic image filtering machines, systems, program products, and computer implemented methods are provided to generate a filtered seismic image responsive to filtered seismic image data generated by attenuating coherent seismic noise from surface waves of an unfiltered wavefield constructed from unfiltered seismic image data through a single downward extrapolation of the unfiltered wavefield using a plurality of nonstationary convolution operators to perform localized filtering at each of a plurality of spatial locations of the unfiltered wavefield. Various embodiments, for example, can beneficially handle strong lateral velocity variations thus making various embodiments effective tools to remove complicated coherent seismic noise which is typically in the form of exponentially decaying evanescent waves. Embodiments of the present invention, for example, can use, as a part of the filtering mechanism, specially designed nonstationary convolution operators that are implemented in the space-frequency domain as nonstationary filters. |
US08762063B2 |
Analyzing fluid within a context
A processor accepts sensor data about a geological formation from a sensor. The sensor data is such that processing the sensor data using a processing technique to estimate a parameter of the geological formation without a constraint, whose value is not yet known, produces a plurality of non-unique estimates of the parameter. The processor accepts more than two time-displaced images of fluid sampled from the geological formation. The time displacements between the images are substantially defined by a mathematical series. The processor processes the images to determine the constraint. The processor processes the sensor data using the processing technique constrained by the constraint to estimate the parameter of the geological formation. The processor uses the estimated parameter to affect the drilling of a well through the geological formation. |
US08762056B2 |
Route reference
A user input is received on a wireless device specifying a starting location. The position of the wireless device is tracked from the starting location in response to the user input. A user input is received on the wireless device specifying an ending location, and a route is generated from the tracking of the wireless device from the starting location to the ending location. A first reference is associated with the route, wherein the route is retrievable by a selection of the first reference. |