Document | Document Title |
---|---|
US08776260B2 |
Mesh grid protection system
A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines. The system also includes transformation logic coupled to the grid lines and configured to receive the first set of signals and transform the first set of signals to generate a second set of signals and transmit the second set of signals on a second set of grid lines. The system further includes verification logic coupled to the transformation logic and configured to compare the second set of signals to an expected set of signals. |
US08776257B2 |
Session-controlled-access of client data by support personnel
A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted. |
US08776249B1 |
Privacy-protective data transfer
A method is performed at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors. The method includes generating a document, including marking one or more portions of the document as private; and sending the document to an intermediary system for transmission to a destination system. Prior to the document being transmitted to the destination system, the marked portions of the document are encrypted by the intermediary system using a key that is unavailable to the destination system. |
US08776247B2 |
Verification of process integrity
A system implements a secure transaction of data between a server and a remote device. The remote device comprises: processing means adapted to process input data according to a security process; data storage means adapted to store verification information derived from the input data according to an encryption algorithm; and communication means for communicating the input data which has been processed by the security process to the server. The server is adapted to transmit a verification request to the remote device, and to verify the integrity of the security process based on verification information received from the communication means of the remote device in response to the verification request. |
US08776239B2 |
In-development vulnerability response management
In-development vulnerability response management, in one aspect, may detect a code instance that matches a vulnerability pattern; generate one or more hints associated with the code instance in response to the detecting; retrieve an action response to the code instance that matches a vulnerability pattern; and associate the retrieved action response with the code instance. |
US08776237B2 |
Method and apparatus for end-to-end security in a heterogeneous network
Methods and apparatus are provided for end-to-end security in heterogeneous networks. Hop-by-hop protection techniques ensure that each hop of a signaling path is satisfying one or more predefined security criteria. An end-to-end path is secured at each node by identifying a next hop in the end-to-end path; determining, in response to a received call setup request, if a vendor associated with the next hop in the end-to-end path has satisfied one or more predefined security criteria; and routing the call to the next hop if the vendor has satisfied the one or more predefined criteria. A look-up table can be used to determine whether a vendor has satisfied the one or more predefined security criteria. The look-up table can identify one or more of: (i) vendors that have achieved a predefined security rating; (ii) members in a predefined consortium or business group; and (iii) signatories to a predefined contract or technical specification. |
US08776236B2 |
System and method for providing storage device-based advanced persistent threat (APT) protection
An embodiment of a system and method for providing storage device-based advanced persistent threat (APT) protection receives a file write request of a file object, writes the file object to a temporary storage device, computes a hash value of the file object in the temporary storage device, and compares the hash value of the file object to hash values stored in an APT database to determine if the hash value of the file object exists in the APT database. If the hash value of the file object exists in the APT database, an embodiment writes the file object to a quarantine storage location and clears the file object from the temporary storage device. If the hash value of the file object does not exist in the APT database, an embodiment executes an APT analysis on the file object to determine if the file object presents an APT. |
US08776232B2 |
Controller capable of preventing spread of computer viruses and storage system and method thereof
A controller capable of preventing spread of computer viruses is provided. The controller includes a microprocessor unit, and a first interface unit, a second interface unit, a comparing unit and a filter unit which are coupled to the microprocessor unit. The first interface unit is coupled to a storage medium, and the second interface unit is coupled to a computer host. The comparing unit determines whether data read form the storage medium by the computer host is an automatic executing file. And, the filter unit replaces the read data with a predetermined data and transmit the predetermined data to the computer host when the read data is the automatic executing file. Accordingly, the controller is capable of preventing the spread of the computer viruses designed in an automatic executing file. |
US08776227B1 |
User interface based malware detection
Malware with fake or misleading anti-malware user interfaces (UIs) are detected. Processes running on a computer system are monitored and their window creation events are detected. The structures of the created windows are retrieved to detect presence of UI features that are commonly presented in known fake or misleading anti-malware UIs (“fakeAVUIs”). If a window includes a UI feature commonly presented in known fakeAVUIs, that window is determined suspicious and additional tests are applied to determine the validity of information in the window. If the information in the window is determined invalid, then the process that created the window is determined to be malware and a remediating action is applied to the process. |
US08776226B2 |
Method and apparatus for detecting SSH login attacks
A digital filter correlation engine, wherein the correlation engine combines N arbitrary digital filter states based on the weights and along with a threshold generate a network incident. This network incident in turn can be feedback to another digital filter. This multi-layering capability allows the creation of higher level event detections that are time-based for a cyber security analyst to analyze, thereby reducing the amount of manual work the analyst has to do in inspecting behaviors within the network. |
US08776225B2 |
Network security and fraud detection system and method
A system and method to detect and prevent fraud in a system is provided. The system may uniquely identify physical devices connecting to a network, register unique devices, track end-user logins, associate end-user accounts with specific devices, and share information with multiple network service providers is described. |
US08776222B2 |
Message screening system
A message screening system includes routing to a supervisory recipient an electronic message directed to an intended recipient. The supervisory recipient then is allowed to screen the electronic message by approving or rejecting the electronic message. The electronic message then is forwarded to the intended recipient if the electronic message is approved by the supervisory recipient. |
US08776220B2 |
Phishing detecting system and method operative to compare web page images to a snapshot of a requested web page
A phishing detecting method includes: a web-page accessing request for accessing a target web page at a target address is received; the target web page from the target address is obtained; the target web page is snapshotted to obtain a present page snapshot; the present page snapshot is compared with several pre-stored page snapshots stored in a database, wherein each of the pre-stored page snapshots corresponds to a pre-stored address; if the present page snapshot matches one of the pre-stored page snapshots, the target address is compared with the pre-stored address, corresponding pre-stored page snapshot of which matches the present page snapshot; if the target address does not match the pre-stored address, the corresponding pre-stored page snapshot of which matches the present page snapshot, it is determined that the target web page is a phishing web page. |
US08776219B2 |
Application selection using current detection intelligence
Selecting one or more applications from the plurality of similar or near redundant applications to activate. A method includes retrieving information about current characteristics of one or more applications. The method further includes retrieving information about a current computing operational landscape. Based on the information about current characteristics of one or more applications and the information about a current computing operational landscape, the method further includes creating a ranking of applications. The rankings are made available to a system with a plurality of applications with similar or near redundant functionality. At the system, one or more of the applications in the plurality of applications are selected to activate based on the ranking of applications. |
US08776218B2 |
Behavioral-based host intrusion prevention system
In embodiments of the present invention improved capabilities are described for behavioral-based threat detection. An executing computer process is monitored for an indication of malicious behavior, wherein the indication of the malicious behavior is a result of comparing an operation with a predetermined behavior, referred to as a gene. A plurality of malicious behavior indications observed for the executing process are compared to a predetermined collection of malicious behaviors, referred to as a phenotype, which comprises a grouping of specific genes that are typically present in a type of malicious code. Upon matching the malicious behavior indications with a phenotype, an action may be caused, where the action is based on a prediction that the executing computer process is the type of malicious code as indicated by the phenotype. Related user interfaces, applications, and computer program products are disclosed. |
US08776216B2 |
Digital rights management engine systems and methods
Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. In some embodiments, the licenses contain control programs that are executable by the digital rights management engine. |
US08776215B2 |
Credential device pairing
In one or more implementations, a computing device receives an indication that a device is attempting to pair with the computing device. If a user is not currently authenticated with respect to the computing device, inputs received by the device are restricted from being used by the computing device for uses other than authenticating the user. |
US08776214B1 |
Authentication manager
Disclosed are various embodiments for an authentication manager. A security credential is generated based at least in part on a security credential specification associated with a network site. The security credential and a domain name associated with the network site are stored. The security credential is provided to the network site when a domain name associated with a trusted certificate provided by the network site matches the stored domain name. |
US08776213B2 |
Mobile application security system and method
A system for authenticating the user of a computing device comprises an authorized user directory. Each record is uniquely associated with an authorized user and includes at least a computing device ID value that is a globally unique value assigned to the authorized user's computing device, a group of unique depictions such as photographs, an identification of a key depiction. Portions of each image form fiducials recognizable by the user. The record further includes trace pattern verification data representing continuous trace strokes between pairs of the fiducials within the key depiction. To authenticate, the group of images are displayed to the user. The user must first select the key image and secondly trace continuous trace strokes between the pairs of fiducials to match the trace pattern verification data. |
US08776208B2 |
Incorporating network connection security levels into firewall rules
Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security levels for a connection between devices. A firewall may thus provide greater granularity of security and integrate more closely with other security methods to provide better overall security with fewer conflicts. |
US08776200B2 |
Method for inputting a password into an electronic terminal
The present invention relates to a method for inputting a password into an electronic terminal, wherein the method comprises: a step of saving a password character string inputted by the user through an input unit in a storage unit; a step of randomly placing adjacent characters from within the password character string into adjacent input buttons—defined as any two input buttons connected in a straight line without passing another input button—which are arranged in a two-dimensional field by a control unit, wherein the total number of input buttons is greater than the number of characters included in the password character string; a step in which the control unit places a character not included in the password character string into an input button in which a character included in the password character string has not been placed; a step in which a display unit displays each input button displaying a placed character; a step in which an input unit receives the input character string from the user; and a step in which the control unit completes the user authentication procedure when the password character string and the input character string are the same. |
US08776198B2 |
Techniques for non-unique identity establishment
Techniques for non-unique identity establishment are presented. A plurality of biometric data associated with a user is acquired from a plurality of biometric devices. The intersection of the biometric data is registered or a vector for the biometric data is registered. This information is also registered along with answers to questions provided by the user. When a user attempts to subsequently access a secure resource of a network, the retained information is compared against user-supplied biometric data and in some cases where appropriate user-supplied answers to establish an identity of the user and to authenticate the user for access to the secure resource. |
US08776191B2 |
Techniques for reducing storage space and detecting corruption in hash-based application
Techniques for reducing storage space and detecting corruption in hash-based applications are presented. Data strings are hashed or transformed into numerically represented strings. Groupings of the numeric strings form a set. Each numeric string of a particular set is associated with a unique co-prime number. All the numeric strings and their corresponding co-prime numbers for a particular set are processed using a Chinese Remainder Theorem algorithm (CRT) to produce a single storage value. The single storage value is retained in place of the original numeric strings. The original numeric strings can be subsequently reproduced and verified using the single storage value and the co-prime numbers. |
US08776186B2 |
Obtaining a signed certificate for a dispersed storage network
A method begins by a dispersed storage (DS) processing module generating a certificate signing request (CSR) that includes a certificate and a certificate extension, wherein the certificate includes information regarding a requesting device and wherein the certificate extension includes information regarding an accessible dispersed storage network (DSN) address range for the requesting device. The method continues with the DS processing module outputting the CSR to a certificate authority of a DSN and receiving a signed certificate from the certificate authority, wherein the signed certificate includes a certification signature of the certificate authority authenticating the certificate and the certificate extension. The method continues with the DS processing module storing the signed certificate for use when generating a DSN access request, wherein the DSN access request is requesting access to dispersed storage error encoded data in the DSN at an address within the accessible DSN address range. |
US08776175B1 |
Method and system for managing global network access
An access management system provides tiered access to a global communications network. A default level of access to the global communications network, for example the Internet, is provided free for all users with a compatible communications device, and at least one subscription level of service is provided to users for a fee. Access to the communications network is monitored and restricted based on user content and resource privileges. |
US08776173B2 |
Method for generating a human likeness score
One embodiment of the invention is a method utilizing a CAPTCHA to generate a human likeness score including blocks: a) receiving a user solution to the CAPTCHA; b) receiving a user interaction pattern descriptive of an interaction undertaken by the user, through a graphical interface of the CAPTCHA, to achieve the user solution; c) determining the accuracy of the user solution; d) comparing the user interaction pattern against an interaction model generated from interaction patterns of previous users; e) calculating the human likeness score based upon the determination of block c) and the comparison of block d), wherein the human likeness score lies within a continuum of human likeness scores. |
US08776166B1 |
Plug-in based policy evaluation
A device may include an interface to send authentication information to a plug-in, where the authentication information is related to a client device. The interface may send a policy identifier to the plug-in, where the policy identifier identifies a policy, and may receive a policy result from the plug-in, where the policy result is produced using the authentication information and a policy requirement identified by the policy identifier, and where the policy result identifies whether the client device complies with the policy. |
US08776164B2 |
Distributed presentation software for multiple instantiations in home network
One and only instance of a video service model component (for example, an electronic program guide (EPG) model description) is executed in a home network gateway, with multiple instantiations of a view/controller module associated with the model module being generated, one for each display device seeking to simultaneously display the video service. In this way the functionality of a single video service model is shared in the network without requiring the underlying model module itself to be replicated. |
US08776160B2 |
Systems and methods of differentiated requests for network access
Methods and systems of handling channel changes in a digital home communication terminal are disclosed. An exemplary method comprises: receiving a request for access to a downstream network connected to the DHCT; determining a source of the request for access; and setting at least one parameter to a value based on the determined source; and performing a channel change using the at least one parameter having the set value An exemplary system comprises: a channel acquisition component, memory, and a processor. The processor is programmed by code, stored in memory, to: receive a channel change request; determine whether the channel change request is user-initiated; and instruct the channel acquisition component to perform a channel change using at least one parameter. The parameter has a value that is based on the determination. |
US08776156B2 |
Content receiving apparatus, data processing apparatus, content reception method
According to one exemplary embodiment, a content receiving apparatus includes: a first receiver which receives a first identifier of first content from a first external apparatus; a generator which employs the first identifier to generate a second identifier of second content that corresponds to the first content but has different quality from the first content; a transmitter which transmits a content request including the second identifier to a second external apparatus different from the first external apparatus; and a second receiver which receives data of the second content transmitted from the second external apparatus in response to the content request. |
US08776155B2 |
Adaptive tilt compensation of upstream channel in high speed data networks
Embodiments provide solutions to reduce power utilization (either at individual cable modems or in the overall network) in future cable networks. Particularly, embodiments seek to reduce power utilization at individual cable modems and in the overall network, by pre-compensating upstream transmissions according to feedback channel characteristics received from the headend. According to embodiments, pre-compensation is performed using power filtering/amplification and/or bit loading. Pre-compensation can be performed individually per cable modem. Further, pre-compensation can be performed over the entire upstream frequency spectrum and/or over particular sub-hands of the frequency spectrum as appropriate for each cable modem. |
US08776148B2 |
Inherited communication management apparatus and method of managing inherited communication
In an inherited communication management apparatus, a storage unit stores viewing information relating to the content viewing state of a user of a terminal. On a request from the user of the terminal for content viewing, a requesting unit requests another inherited communication management apparatus to examine whether or not the other inherited communication management apparatus stores viewing information including information relating to interruption of the content viewing by the user. A receiving unit receives a result of the examination requested by the requesting unit. When the examination result received by the receiving unit includes the viewing information including information relating to the interruption of the content viewing, a transmitting unit transmits information relating to interrupted content based on the viewing information to the terminal of the user that has requested the content viewing. |
US08776141B2 |
Searching method and mobile device using the method
A method of controlling a mobile device and which includes wirelessly communicating, via a wireless communication unit of the mobile terminal, with an external reproduction device reproducing content on a display of the reproduction device; inputting, via an input unit of the mobile terminal, a search request requesting information about at least one item identifiable in the reproducing content; searching, via a controller of the mobile terminal, the information about said at least one item; and displaying, on a display unit of the mobile terminal, the information found during the search. |
US08776139B2 |
Scheduling content to be rendered
A method and network connected rendering apparatus (130) are described. The network connected rendering apparatus (130) receives a command to play a content item and/or the content item to be played from another network connected device (110). Instead of automatically interrupting the current rendering activities of the rendering apparatus for playing the content item, the content item is added to a list of scheduled content items (140). |
US08776137B2 |
System and methods for digital video recorder backup and recovery
A system that incorporates teachings of the present disclosure may include, for example, a method for receiving a user input identifying a video signal, recording the video signal to the video data file and sending an instruction to a backup server. The instruction causes the backup server to concurrently record the video signal to a second video data file. The backup server can also record a second video signal to a second video data file based on a second instruction. Other embodiments are disclosed. |
US08776136B2 |
Information processing system, recording apparatus, communication apparatus, information processing method, and program
In a DVR recording apparatus, a program and EPG data are received, and the EPG data and a reservation list, which relates to a reservation status of program recording, are stored. In addition, reserved recording, for recording a program in accordance with the reservation list, is carried out. Further, in the DVR, EPG data or the reservation list is transmitted in accordance with a request from a portable telephone. On one hand, in the portable telephone, in accordance with an operation of a user, a request of the EPG data or reservation list is transmitted, and in accordance with the request, the EPG data or reservation list transmitted from the DVR is received. Then, the EPG data or reservation list is presented in the portable telephone to a user. |
US08776134B2 |
Context sensitive television menu
A television menu system generates a television menu that is context sensitive based upon a service currently being provided to a user. In one implementation, a type of television service currently being viewed by a user determines whether particular menu items are presented to the user. In another implementations, determining which channel is being provided dictates whether particular menu options are included. |
US08776128B2 |
Differentiated PSIP table update interval technology
An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. |
US08776125B2 |
Method and system for displaying advertisements in an electronic program guide
A system and method for displaying an electronic program schedule guide is provided. The system has areas for displaying program schedule information. In addition, the system also has areas that may be used for advertising programs, products or services. In another embodiment, the system has areas for displaying messages to the user. |
US08776124B2 |
Thumbnail publication
A video service provider system may include one or more devices. The one or more device may receive thumbnails of programs that are currently airing on a group of television channels and match the received thumbnails with metadata. The metadata may include information relating to at least one of the television channels or the programs. The one or more devices may further provide, to a remote device, a set of thumbnails, of the captured thumbnails, and the metadata matching the set of thumbnails. The remote device may make the set of thumbnails and the metadata available to a user. |
US08776123B2 |
Television apparatus and control method thereof
A television apparatus includes a plurality of receiving units. The television apparatus includes a first receiving unit configured to receive a channel which broadcasts a program whose video image is displayed on a display unit, a second receiving unit configured to receive a plurality of channels while the video image is being displayed, a program information management unit configured to store genre information about programs broadcasted on the plurality of channels, and a control unit configured to determine a periodic check order of receiving the plurality of channels based on the genre information about the programs read by the program information management unit and to control the second receiving unit to periodically check and receive the plurality of channels according to the periodic check order. |
US08776116B2 |
Systems, methods, apparatus, and articles of manufacture to identify times at which live media events are distributed
Systems, methods, apparatus, and articles of manufacture to identify times at which live media events are distributed are disclosed. An example method includes collecting feed data representative of source feeds associated with respective live media events, collecting distribution data representative of a plurality of distributions of the source feeds, and comparing, using a processor, the distribution data to the feed data to generate a list identifying times at which the live media events were distributed via corresponding distributions. |
US08776115B2 |
National insertion of targeted advertisement
Systems and methods are disclosed that allow for providing targeted asset/advertisements for broadcast-wide programming feeds. The systems and methods allow network platforms to select among asset options provided with a content stream and/or replace assets in the content stream. In one arrangement, after selecting an asset, the asset is inserted into the content stream and the content stream is disseminated to subsequent network platforms (e.g., local platforms). At this time, the local platforms may insert local assets into the content stream in predetermined local asset insertion spots. |
US08776113B2 |
Data boundary manager for addressable advertising
A server receives a source signal stream comprising metadata and an advertisement space. The server extracts from the metadata a channel identifier, a private client identifier, and personal identifiable information about an intended audience of interest to advertisers. The server identifies at least one anonymous statistic of a national market and a placement opportunity including an owner of the advertisement space, the at least one anonymous statistic of a national market based in part on the channel identifier and the personal identifiable information. The server purges the personal identifiable information about the intended audience when the owner of the advertisement space is identified as a national network. The server targets an advertisement decision to the intended audience based on the at least one anonymous statistic of a national market. |
US08776110B1 |
Video slate device
A terminal device includes a reproducing circuit for audio and video, an input device, a minimum storage medium storing a video slate program, and a network interface. The terminal device receives the audio and video through the network and provides appropriate outputs. The terminal device operates an application program through the network and displays operations of the application program on the display. The terminal device lacks a hard disk drive, large memories, internet browser software and a typical operating system. The video slate program, when executed, causes the terminal device to display one or more content frames on the display. The content frames include an OS frame that shows an image of operations of the application program, a phone frame that shows an image of remotely executing phone operation, a television frame that shows the video, and an advertisement frame that shows an image containing an advertisement. |
US08776109B2 |
Handling disruption in content streams received at a player from a content retransmitter
A player receives encoded content of a first resolution level from a content retransmitter and monitors bandwidth of the communication connection utilized to receive the content. When the bandwidth changes with respect to various threshold values corresponding to various resolution levels, the player signals the content retransmitter to increase or decrease the encoding resolution for future portions. The player also locates related substitute content. When the player signals the content retransmitter to decrease the resolution below a minimum, the player plays the substitute content instead of the received content. Subsequently when the bandwidth is again such that player signals the content retransmitter to increase the resolution to the minimum or above, the player plays the received content instead of the substitute content. In various implementations, the player may obtain substitute content prior to or at the time the player determines to play substitute content. |
US08776106B2 |
System and method for a household mosaic viewer
A method of monitoring video streams currently being displayed at a customer premises of an Internet Protocol television network. A plurality of Internet Protocol television video streams each currently being displayed by a respective one of a plurality of set-top box devices located at a customer premises and a universal resource locator being accessed at the customer premises are identified. The plurality of Internet Protocol television video streams currently being displayed by the respective set-top box devices are displayed together with the universal resource locator on a display device. |
US08776100B2 |
Method and apparatus for logging and reporting television viewing
A multimedia logging and reporting system and method involves first obtaining some viewing information about a multimedia presentation such as a television program. The viewing information may be a name of the program and the time it was being watched on the television or may include other information depending on the multimedia, the device used for viewing the multimedia as well as other factors. The viewing information is recorded and then used to generate a viewing report, an example being a display on a television screen that lists a particular user, the time and name of the programs watched on any given day. |
US08776099B2 |
Disk drive having a rotatable lid and a disk insertion opening
There is provided a disk device that prevents entering of foreign matters, and that forms an opening/closing lid using an inclined surface of a front wall so that the disk device has a design according to which the thickness is not noticeable. A front wall 1a of an outer case 1 includes an inclined surface whose front part is inclined downward. An opening portion 1b is provided to the front wall 1a of the outer case 1, and a lid 2 that covers the opening portion 1b while allowing it to be opened or closed is provided. The lid 2 is configured to move, by rotating about a rotation shaft provided in a direction crossing a disk conveyance direction, between a closed lid position 2A in which the lid is flush with the inclined surface such that a disk insertion opening 1c is not exposed to the outside and an open lid position 2B in which the disk insertion opening 1c is exposed to the outside and a disk 200 is guided to the disk insertion opening 1c. |
US08776095B2 |
Screen locking method and mobile terminal
The present invention discloses a screen locking method and a mobile terminal, wherein the screen locking method comprises the steps that: a mobile terminal enters into a screen locked state; an interface identifier (ID) of an application interface of an application service set in the mobile terminal is obtained; the application interface indicated by the interface ID is called as a screen locked interface. By the invention, the requirements of a user for the richness and diversity of screen locked interface is satisfied, the availability and friendliness of the mobile terminal device in terms of the screen locked interface is improved and the user experience is improved. |
US08776091B2 |
Reducing feedback latency
A latency between an input and its corresponding feedback can be reduced by generating the feedback in a lower-layer software component instead of in an upper-layer software component. The lower-layer component generates the feedback based on one or more parameters associated with a given input type. The parameters were previously created based on, for example, one or more previous inputs. Generating feedback in a lower-layer component reduces the number of software layer boundaries that the input and feedback pass through, thus reducing the latency between the feedback and input. |
US08776083B2 |
API method and system for providing access to an external service via an application services platform
In accordance with embodiments, there are provided mechanisms and methods for providing access to an external service via an application services platform, utilizing an application program interface (API). These mechanisms and methods for providing access to an external service via an application services platform can enable embodiments to provide an effective way of allowing access to such external service without necessarily forcing access to the external service separately with respect to the application services platform. The ability of embodiments to provide such effective technique can enable the integration of an external service with an application services platform, thus allowing access to the external service in a more time effective manner. |
US08776078B2 |
Method for dynamically freeing computer resources
A method dynamically frees computer resources in a multitasking and windowing environment by activating a GUI widget to initiate pausing of an application, pausing CPU processing of the application code, maintaining data of the application in main memory, storing state information for the application code and a process of the application in mass storage, removing the application code from main memory to mass storage, when another application requires additional memory, activating another GUI widget to resume running of the application, restoring the state information for the code and the process to main memory before the application resumes running, and resuming the CPU processing of the application. |
US08776077B2 |
Method for multithreading an application using partitioning to allocate work to threads
A method for assigning work to a plurality of threads using a primitive data element to partition a work load into a plurality of partitions. A first partition is assigned to a first thread and a second partition is assigned to a second thread of the plurality of threads. A method for improving the concurrency of a multithreaded program by replacing a queue structure storing a plurality of tasks to be performed by a plurality of threads with a partition function. A computer system including a processor unit configured to run a plurality of threads and a system memory coupled to the processor unit that stores a multithreaded program. The multithreaded program workload is partitioned into a plurality of partitions using a primitive data element and a first partition of the plurality of partitions is assigned to a first thread of the plurality of threads for execution. |
US08776076B2 |
Highly scalable cost based SLA-aware scheduling for cloud services
An efficient cost-based scheduling method called incremental cost-based scheduling, iCBS, maps each job, based on its arrival time and SLA function, to a fixed point in the dual space of linear functions. Due to this mapping, in the dual space, the job will not change their locations over time. Instead, at the time of selecting the next job with the highest priority to execute, a line with appropriate angle in the query space is used to locate the current job with the highest CBS score in logarithmic time. Because only those points that are located on the convex hull in the dual space can be chosen, a dynamic convex hull maintaining method incrementally maintains the job with the highest CBS score over time. |
US08776074B1 |
Methods, devices and systems for coordinating and optimizing resources
A representative method for coordinating and optimizing resources in the completion of a set of tasks includes providing multiple task types defined for a scenario and task priorities; combining multiple solutions of the respective multiple task types into multiple candidate decisions; determining candidate scores for the respective multiple candidate decisions based on the combined multiple solutions of the respective multiple task types; determining an optimal candidate score based on the candidate scores from the respective multiple candidate decisions and task priorities; and selecting an optimal response to a given scenario based on the candidate decision based on having the determined optimal candidate score. |
US08776070B2 |
Method and apparatus having resistance to forced termination attack on monitoring program for monitoring a predetermined resource
Exemplary embodiments include a method and system having resistance to a forced termination attack on a monitoring program for monitoring a predetermined resource. Aspects of the exemplary embodiment include a device that executes a predetermined process including a monitoring program that monitors a predetermined resource, wherein the predetermined process is a process for which the predetermined resource becomes unavailable in response to termination of the predetermined process; a program starting unit for starting the monitoring program in response to an execution of the predetermined process; and a terminator for terminating the predetermined process in the case where the monitoring program is forcibly terminated from the outside. |
US08776068B2 |
Operating method for a computer with performance optimization by grouping applications
In at least one embodiment, if the pre-start level has the value empty container, the computer creates a container within the framework of the pre-start but does not load any application into the container. If the pre-start level has the value application, the computer creates a respective container within the framework of the pre-start for each application. If the pre-start level has a higher value, the computer determines within the framework of the pre-start a degree of grouping for the applications assigned to the respective pre-started unit, and groups the applications in accordance with the degree of grouping determined into at least one container group. Within the framework of the processing of the complex tasks, the computer terminates on switching from one application to another application, the application still being executed only if the application involves an application not able to be suspended. |
US08776065B2 |
Real time monitoring and tracing of scheduler decisions
A system, apparatus, and method are directed to enabling a user to analyze real-time scheduling decisions of resources in a computing environment. A scheduler component maps jobs to resources, and schedule jobs for execution. In one embodiment, the scheduler component continually iterates, based on job characteristics, available resources, required resources, policies, or other constraints. While the scheduler component performs its tasks, a scheduling trace interface (STI) component may perform a trace of decisions made by the scheduler component, as well as collect static and/or dynamic state information used by the scheduler component. In one embodiment, the STI component may generate a snapshot of the scheduling decisions, and state information. A user interface may be employed to query the scheduling snapshots to monitor and analyze the scheduling decisions, and state information. In one embodiment, the user may then modify a job, the job's requirements, or the like, based on the analysis. |
US08776062B2 |
Determining desired job plan based on previous inquiries in a stream processing framework
A data stream processing system is provided that utilizes independent sites to process user-defined inquires over dynamic, continuous streams of data. A mechanism is provided for processing these inquiries over the continuous streams of data by matching new inquiries to previously submitted inquiries. The job plans containing sets of processing elements that were created for both the new inquiry and the previous inquiries are compared for consistency in input and output formatting and commonality of processing elements used. In accordance with the comparison, the new job plan, previous job plans or a combination of the new and previous job plans are used to process the new inquiry. Based on the results of processing the new inquiry, a determination is made regarding which job plans are used for future inquiries. |
US08776056B2 |
Maintenance system, maintenance method and program for maintenance
A maintenance system in which a user work made during a maintenance work is not lost is provided. Specifically, a user computing machine includes: a user data determination section determining, in a case that a name of a file received from a software update service is the same as a name of a file included in a VM that a user uses, whether the file included in the VM that the user uses is data created by the user; and a VM merge section copying a file except user data into the VM that the user uses in the received files by calling the user data determination section. |
US08776052B2 |
Method, an apparatus and a system for managing a distributed compression system
Some embodiments of the invention relate to a method of managing a distributed compression system comprised of a plurality of compression modules. According to some embodiments of the invention, a method of managing a distributed compression system comprised of a plurality of compression modules may include implementing a load balancing distribution scheme in respect of a plurality of currently active compression modules, providing a reference key for each of a plurality of data units which are intended for being compressed, the reference key of each data unit being based upon at least a portion of the content of the data unit, and applying the load balancing distribution scheme in respect the reference key of each of the plurality of data units so as to designate for each data unit a compression module from amongst the plurality of compression modules to which the data unit is to be assigned, thereby giving rise to a substantially balanced distribution of the data units across the plurality of currently active compression modules. |
US08776047B2 |
Apparatus and method for managing a plurality of software dependency maps and software installation using the same
A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. |
US08776044B1 |
Systems and methods for providing computer cluster policies for implementation in computer cluster environments
A computer-implemented method for providing computer cluster policies for implementation in computer cluster environments may include (1) identifying a computer cluster environment capable of executing a plurality of applications, (2) creating a computer cluster policy that (a) identifies, within the plurality of applications, at least one dependent application that is dependent upon at least one other application and (b) identifying at least one platform-agnostic action to be performed on the dependent application in response to detection of at least one event associated with the other application, and then (3) providing the computer cluster policy to high-availability software installed in the computer cluster environment to enable the high-availability software to implement the computer cluster policy in the computer cluster environment. Various other systems, methods, and computer-readable media are also disclosed. |
US08776041B2 |
Updating a virtual machine monitor from a guest partition
Mechanisms are disclosed for updating a virtual machine monitor (“VMM”). Facilities of a guest operating system running in a guest virtual machine managed by the VMM are leveraged to facilitate receiving an update package. The update package may contain updates for guest operating systems extensions in addition to a VMM update. An updater process, running in a guest operating system, extracts the VMM update and transfers it down to the VMM. Upon successful transfer, the updater process applies any necessary updates to guest operating systems extensions and then signals the VMM to commit the transferred VMM update. |
US08776038B2 |
Method and system for configuration of virtualized software applications
A method of virtualizing an application to execute on a plurality of operating systems without installation. The method includes creating an input configuration file for each operating system. The templates each include a collection of configurations that were made by the application during installation on a computing device executing the operating system. The templates are combined into a single application template having a layer including the collection of configurations for each operating system. The collection of configurations includes files and registry entries. The collections also identifies and configures environmental variables, systems, and the like. Files in the collection of configurations and references to those files may be replaced with references to files stored on installation media. The application template is used to build an executable of the virtualized application. The application template may be incorporated into a manifest listing other application templates and made available to users from a website. |
US08776034B2 |
Dynamically maintaining coherency within live ranges of direct buffers
Reducing coherency problems in a data processing system is provided. Source code that is to be compiled is received and analyzed to identify at least one of a plurality of loops that contain a memory reference. A determination is made as to whether the memory reference is an access to a global memory that should be handled by a direct buffer. Responsive to an indication that the memory reference is an access to the global memory that should be handled by the direct buffer, the memory reference is marked for direct buffer transformation. The direct buffer transformation is then applied to the memory reference. |
US08776033B2 |
Batch dispatch of java native interface calls
A batching mechanism is provided that batches multiple Java Native Interface calls together such that the batch crosses the Java Native Interface boundary in a single transition. The batching mechanism operates by identifying a sequence of Java Native Interface calls to be made by native code, by encapsulating the identified sequence of Java Native Interface calls into a batch, and by communicating the batch as a single transition across the Java Native Interface boundary. In this manner, each call of the batch is encapsulated by iteratively performing for each call to be made, processes including identifying the Java Native Interface function to call, identifying the arguments to pass into the Java Native Interface function, dispatching to the Java Native Interface function and capturing the return value. |
US08776026B2 |
System and method for in-vivo multi-path analysis of binary software
A system and method for in-vivo multi-path analysis and testing of binary software including binary device drivers is disclosed. The system and method may be used to test a binary software system and may comprise a virtual machine, a symbolic execution engine and a modular plugin architecture. In addition, a device driver testing system is also disclosed wherein symbolic execution may be used to explore the device driver's execution paths and check for device driver behavior. |
US08776023B2 |
Software testing
In one general aspect, a computer-based software testing method is disclosed that includes presenting to a user an interactive visual user interface of an application under test that includes a plurality of user interface controls, with each of the presented user interface controls having a predefined native interaction mode. The method also includes intercepting normative pointing-device-based user interaction with each of a plurality of the user interface controls, with the normative pointing-device-based user interaction mode being different from the native interaction mode. Interface definitions are built for the application based on results of the steps of intercepting for the plurality of interface controls. |
US08776022B2 |
Delta compression using multiple pointers
Encoding a new version of a data module includes constructing a delta data module having data for providing the new version of the data module. The delta data module may indicate an encoding for copying data at an offset from one of a number of pointers into different versions of the data module. Decoding a delta data module to provide a new version of a data module includes copying, to the new version of the data module, data relative to a target pointer when an encoding in the delta data module indicates a matching pattern relative to the target pointer, and copying, to the new version of the data module, data relative to at least one other pointer when an encoding in the delta data module indicates a matching pattern relative to the at least one other pointer. |
US08776021B1 |
Application experiment system
Examples of an application experiment system are provided that can manage and run experiments for software applications. In one embodiment, the application experiment system receives definitions for experiments and treatments for an application, runs experiments in response to requests from users of the system, automatically allocates treatments to users of the application, logs experiment data and treatment allocation data, and/or reports experiment results data. The application experiment system enables application developers to test changes or features in a precise, controlled environment on a limited user base before deciding whether to deploy changes or features to all users of an application. |
US08776015B1 |
Pattern modeling methods and systems
A list of constructs is displayed on a user interface screen for a user to select a desired construct. A construct selected by the user is determined. Computing environments are presented on the user interface screen for the user to place the selected construct. The computing environments include at least one textual and at least one graphical computing environment. A selected computing environment into which the selected construct is being placed is identified. A position of the placed construct in the selected computing environment is determined. A template based on the selected computing environment is selected. The selected template is inserted into the selected computing environment. |
US08776012B2 |
Automatic scheduling of review meetings
A tool for scheduling a project review meeting based on monitoring of one or more documents required for the project review meeting. The documents/files are identified along with criteria that the documents must meet prior to scheduling the review meeting. The criteria can be default criteria or specifically defined and entered by a user. The tool monitors the documents and in response to finding that the criteria has been met, determines meeting participants, generally collaborators working on the documents, determines the meeting participants' individual schedules, and determines a meeting time based on the meeting participants' individual schedules. |
US08776010B2 |
Data type provider for a data store
A system and method for facilitating development of a computer program that interfaces with a data store. A system queries the data store to retrieve interface information, including schema information corresponding to a portion of data in the data store relevant to a user application. The system uses the retrieved information to provide an integrated development environment (IDE) to a user. The IDE may include one or more features such as completion lists, tool tips, and quick info. The schema information may be used to create synthetic types for use in the target program. The interface information may be used to create synthetic elements to be inserted into a target program. The synthetic types may be used to perform static type checking during an editing session or a program compilation, or to provide the IDE services. During a build, the synthetic elements may be removed and replaced with data store access code, which is subsequently used during program runtime to access the store. The system enables a user to work with the data store as they would for built-in parts of their program. |
US08776003B2 |
System and method for employing side transition times from signoff-quality timing analysis information to reduce leakage power in an electronic circuit and an electronic design automation tool incorporating the same
The disclosure provides leakage power recovery that considers side transition times of multi-input cells. In one embodiment, a leakage power recovery system is disclosed that includes: (1) a power recovery module that considers side transitions when making a first conditional replacement of a cell in a path of a circuit design with a lower leakage cell and estimates delays and slack of the at least one path of the circuit design, and (2) a speed recovery module that makes a second conditional replacement of a slower lower leakage cell of the path with a higher leakage cell when there is a timing violation with respect to the path, determines if any other cells of the at least one path has a slower input transition and makes a third conditional replacement of a driver thereof to a higher leakage cell when the driver is one of the slower lower leakage cells. |
US08776002B2 |
Variable Z0 antenna device design system and method
A variable Z0 impedance method (“Variable Z0”) for designing and/or optimizing antenna systems. The method provides that the value of an antenna's feed system characteristic impedance or apparatus internal impedance (Z0) changes as a true variable quantity during the antenna system design or optimization methodology. The value is allowed to be determined by the methodology, because different values of Z0 result in different antenna system performance. It is applied to any set of performance objectives on any antenna system wherein apparatus internal or transmission line characteristic impedance is an explicit or implicit parameter. Variable Z0 is applied to any design or optimization methodology. Structures include Yagi-Uda arrays, Meander Monopoles, and transmission line Multi-Stub Matching Networks, and can incorporate Central Force Optimization or Biogeography Based Optimization or other optimization algorithms. |
US08776000B2 |
Method of implementing timing engineering change order
A method of implementing timing ECO in a circuit includes the steps of performing a static timing analysis on the circuit so as to determine at least one timing violating path of the circuit, decomposing the timing violating path into at least one violating path segment, determining a smooth curve from each timing violating path and determining a plurality of reference points along the smooth curve, computing a fixability parameter of each gate on the violating path segment, extracting at least one gate according to the fixability parameters, and selecting one spare cell and disposing the selected spare cell on the violating path segment. |
US08775999B2 |
Standard cell placement method to exercise placement permutations of standard cell libraries
A method for validating standard cells stored in a standard cell library and for use in design of an integrated circuit device is described. Each standard cell of the standard cells is iteratively placed adjacent to each side and corner of itself and each other standard cell of the standard cells to produce an interim test layout comprising a first plurality of cell pair permutations. The cell pair permutations are reduced by identifying at least one of: illegal or redundant left-right and top-bottom boundaries, and removing any cell pair permutations using the identified boundaries to generate a final test layout comprising a second plurality of cell pair permutations. |
US08775995B2 |
Method and apparatus of core timing prediction of core logic in the chip-level implementation process through an over-core window on a chip-level routing layer
A method and/or an apparatus of core timing prediction is disclosed. In one embodiment, a method may include generating a core timing model of a core logic that is accurately transferable to any chip-level integration process. The method may reduce performance degradation and/or performance variation of the core logic caused by a number of interactions between core logic components and chip-level components in the chip-level integration process. In addition, the core timing model of the core logic may be generated by filling un-wired tracks with metal in any of an outermost layer of the core logic after a core logic routing and constructing a layer at least an area of and adjacent to any of the outermost layer of the core logic with grounded metal that is orthogonal to those of the metal used in the outermost layer of the core logic. |
US08775993B2 |
Integrated circuit design flow with layout-dependent effects
A design system for designing an integrated circuit that includes a processor, a memory coupled to the processor, and instructions to generate and edit a schematic of the integrated circuit, generate at least one recommended layout parameter of an integrated circuit device within the integrated circuit, extract the at least one recommended layout parameter during a layout stage of the integrated circuit, and calculate a circuit performance parameter of the integrated circuit using the at least one recommended layout parameter, and a user interface configured to display at least one of the circuit performance parameter and layout constraints of the integrated circuit device of the integrated circuit. |
US08775992B2 |
Designing photonic switching systems utilizing equalized drivers
Designing a photonics switching system is provided. A photonic switch diode is designed to attain each performance metric in a plurality of performance metrics associated with a photonic switching system based on a weighted value corresponding to each of the plurality of performance metrics. A switch driver circuit is selected from a plurality of switch driver circuits for the photonic switching system. It is determined whether each performance metric associated with the photonic switching system meets or exceeds a threshold value corresponding to each of the plurality of performance metrics based on the photonic switch diode designed and the switch driver circuit selected. In response to determining that each performance metric associated with the photonic switching system meets or exceeds the threshold value corresponding to each of the performance metrics, the photonic switching system is designed using the photonic switch diode designed and the switch driver circuit selected. |
US08775991B2 |
Interchangeable connection arrays for double-sided DIMM placement
A memory module has an array of connections. The array of connections is arranged in rows and columns such that there are first and second outer columns. Connections in the first and second outer columns can be interchanged to optimize double-side module placement on a substrate. Other embodiments are also disclosed and claimed. |
US08775989B2 |
Computer-aided design system and methods thereof for merging design constraint files across operational modes
In the field of integrated circuit (IC) design it is common to use a plurality of design constraints files to provide the appropriate operational mode when checking the design. Designers typically use the Synopsis® design constraint (SDC) format to describe the constraints in each operational mode. Each time an operational mode is tested a corresponding SDC is used. By merging a plurality of SDCs into a single most pessimistic SDC, designers are able to ensure that the device will properly operate in all the defined operational modes. Only a single run of the merged SDC in the hypothetical mode is required thereby saving time as well as avoiding potential errors from conflicting constraints in different operational modes. |
US08775988B2 |
Decentralized dynamically scheduled parallel static timing analysis
A method for performing a parallel static timing analysis in which multiple processes independently update a timing graph without requiring communication through a central coordinator module. Local processing queues are used to reduce locking overhead without causing excessive load imbalance. A parallel analysis is conducted on a circuit design represented by a timing graph formed by a plurality of interconnected nodes, the method including: using a computer for creating a shared work queue of ready to process independent nodes; assigning the independent nodes from the work queue to at least two parallel computation processes, simultaneously performing node analysis computations thereof; and modifying the circuit design by updating values of the processed independent nodes obtained from the node analysis, the at least two parallel computation processes independently updating the shared work queue to process a new plurality of independent nodes. |
US08775984B2 |
Phase coherent differential structures
Phase-coherent differential structures contain a phase-coherent transformer having two pairs of phase-coherent coupled differential inductors. |
US08775983B1 |
Layout fixing guideline system for double patterning odd cycle violations
Some embodiments of the invention provide a method for identifying and displaying odd loops and hints for resolution of the odd loops in an IC design layout for printing on multiple masks. The method of some embodiments identifies the hints by evaluating the effectiveness and feasibility of different potential resolutions, ensuring that hints do not create additional odd loops. The method of some embodiments also displays indications of the odd loops and the hints which a user can use to troubleshoot an odd loop violation. The method of some embodiments also prioritizes or scores the resolution hints to facilitate efficient troubleshooting of odd loop violations. |
US08775980B2 |
Trench silicide mask generation using designated trench transfer and trench block regions
A method for designating TT and TB regions utilizing designated TS regions, without fully generating TT and TB features, and thereafter fabricating TS regions utilizing the designated TT and TB regions, is disclosed. Embodiments include: determining a TS having a placement and shape, the TS shape having a first horizontal dimension and a first vertical dimension; determining an active region including the TS; determining an extended TS including the TS and an extension portion in the horizontal and vertical directions, adjacent each edge of the TS; and determining a TB region based on the active region and the extended TS. |
US08775978B2 |
Selective shielding for multiple exposure masks
A system for preparing mask data to create a desired layout pattern on a wafer with a multiple exposure photolithographic printing system. In one embodiment, boundaries of features are expanded to create shields for those features, or portions thereof, that are not oriented in a direction that are printed with greater fidelity by an illumination pattern used in the multiple exposure printing system. |
US08775976B2 |
Method for setting background screen and mobile terminal using the same
An apparatus and method of setting a background screen of a mobile terminal are provided. The method includes receiving a selection of background screen set menu, generating a tag information list by using at least one tag information which classifies a plurality of images stored in the mobile terminal by related image, displaying the generated tag information list, receiving a selection of at least one tag information from among the displayed tag information list, and configuring a background screen with at least one image classified as the at least one selected tag information. |
US08775970B2 |
Method and system for selecting a button in a Blu-ray Disc Java menu
In one embodiment, a button mapping method comprising comparing an image difference between images before and after a keyboard event, the images including a first and second version of buttons in a menu, respectively; constructing by the processor a button map based on the comparison, the button map comprising button information for at least two buttons in the menu; receiving one or more selection signals corresponding to one or more non-keyboard events; and translating the one or more selection signals into one or more keyboard events based on the button map, wherein the button in the menu is selected based on the translation. |
US08775969B2 |
Contact searching method and apparatus, and applied mobile terminal
The present invention provides a contact searching method, including: receiving first input of a user; selecting a first grapheme from a first graphemes sequence according to the first input, the first graphemes sequence being displayed on a display; where the first graphemes sequence is associated with an initial unit of characters in multiple contact labels; receiving second input of the user; selecting a second grapheme from a second graphemes sequence according to the second input, the second graphemes sequence being displayed on the display, and the second graphemes sequence being associated with a secondary unit of characters in the multiple contact labels; where each of the contact labels comprises at least two units of characters, and a unit character is formed or represented by at least one grapheme; and searching for and displaying a contact label on the display, where contact label is matched with the first grapheme and the second grapheme. |
US08775966B2 |
Electronic device and method with dual mode rear TouchPad
A method is provided in a user interface of an electronic device with a touch screen display with a first touch-sensitive surface on a first side and a second touch-sensitive surface on a second side. The method includes operating the device in a default mode; receiving a predetermined first touch input while in the default mode; enabling a navigation mode on the second touch-sensitive surface based on the receiving the predetermined first touch input; navigating through an image on the a touch screen display based on a further touch input on the second touch-sensitive surface while in the navigation mode; and disabling the navigation mode on the second touch-sensitive surface and operating the electronic device in the default mode based on a predetermined second touch input. |
US08775965B1 |
Immersive mode for a web browser
Various aspects of the subject technology relate to systems, methods, and machine-readable media for providing a light bar for a web browser in an immersive mode. A system is configured to display a web browser in a first browsing mode, wherein the browser in the first browsing mode comprises one or more tabs and receive, from a user, an indication to enter a second browsing mode for the web browser. In response to receiving the indication, the web browser may be displayed in the second browsing mode in which the one or more tabs are not shown. One or more light bars may also be displayed in a display area of the web browser at locations corresponding with the one or more tabs. Each of the one or more light bars is associated with one of the one or more tabs. |
US08775960B1 |
Systems and methods for geographic mapping and review
The present disclosure describes systems and methods for geographic mapping and review. One or more embodiments include a project template provided within a geographic information system (GIS) application, the project template associated with an actuarial review process and including: a number of selectable workspace pages configured to display a map content associated with a particular geographic region based on activation of one or more selectable map attributes associated with each of the number of selectable workspace pages; and a number of selectable layout pages configured to display the map content of a particular one of the number of selectable workspace pages along with other map information in a particular arrangement upon selection. One or more embodiments can include opening a project within the GIS application using the project template and preparing the project for actuarial review. |
US08775956B2 |
Preferred contact group centric interface
A preferred contact group centric interface for a communication device can be used to facilitate communications by a user. The user interface can be arranged to activate from a user's “home page” on the display, from an idle screen that is accessed after a timeout period expires, or any other appropriate mechanism that activates the preferred contact group centric experience. A user selects the preferred contact group from among an array of the user's contacts. Once the contact group is configured, a minimal number of navigation/selection features is necessary to activate any number of communication modes available to the contacts. The contact group is configured such that simple and quick navigation between the contact members is achieved. The contact group can be presented in 2D and 3D arrangements, in any number of list or geometric configurations. A pricing plan can optionally be tied to each member of the contact group. |
US08775954B2 |
Mobile terminal to display a plurality of graphic user interfaces
The present invention relates to a mobile terminal, which displays at least one graphic user interface (hereinafter abbreviated GUI) on a standby picture. The present invention includes a display unit configured to display a plurality of graphic user interfaces and a controller, when a state of a specific one of a plurality of the graphic user interfaces is changed, the controller controlling at least one of a display type, a applied visual effect, a play content and an arranged position of at least one of the rest of the graphic user interfaces except the specific graphic user interface to be changed to correspond to the changed state, wherein the arranged position indicates a position of the corresponding graphic user interface displayed on the display unit. |
US08775952B2 |
Intelligent roadmap navigation in a graphical user interface
Systems and methods for intelligent information navigation in a graphical user interface (GUI) where a sequence of items is generated and stored in a memory of a computer system. A number of graphical elements are displayed on a screen of a GUI, wherein each graphical element corresponds to an item of the sequence of items, and wherein the graphical elements are ordered according to the sequence. When requested, the graphical elements scroll in a chosen direction to gradually include a new graphical element into the screen at the direction of scrolling. Respectively, the scrolling could gradually exclude from the screen a graphical element at opposite direction. An item of the sequence of items could be selected as a currently active item. The displayed graphical elements are automatically scrolled to move the graphical element corresponding to the currently active item at a focal position within the screen. |
US08775949B2 |
Event scheduling
In one aspect, the invention is a computer program product residing on a computer readable medium having a plurality of instructions stored thereon. The instructions when executed by the processor, cause that processor to schedule a network-based media event; and to invite an attendee to attend the network-based media event. Other aspects of the invention includes a process and a method. |
US08775948B2 |
Method for capturing collaborative, real-time feedback on socio-technical interactions in a virtual environment and graphically displaying the interaction patterns for later review
A method provides users with a simple way to give real-time feedback during a collaborative activity in a virtual environment, which can then be captured and synchronized with other aspects of the interactions such as verbal communication, text messaging, and the activity they were completing for later review. The patterns of activity can then be displayed graphically to easily visualize the patterns of interactions that occurred during the collaboration. Comments by reviewers can be inserted into the record of the interaction after looking over the graphical display. |
US08775946B2 |
Resolving information in a multitenant database environment
Disclosed herein are techniques for providing a user interface component. In some implementations, a request for the user interface component may be received at a computing device. The user interface component may have a default visual presentation. A branding override may be selected from a plurality of available branding overrides. The branding override may define a modification to the default visual presentation of the user interface component. The branding override may be selected based on one or more contextual variables associated with the request for the user interface component. The user interface component may be modified in accordance with the selected branding override. The user interface component may be displayed on a display device. |
US08775940B2 |
Situational workspaces
A workspace container provides data content in a generic way with interfaces and tools common to data of different types. The container has an owner, and may include one or more activities, which each have an objective and are associated with various resources to accomplish the objective. User interaction in the container transforms the container contents and is persisted with the container. Different data types are represented uniformly from the perspective of data input, data access, and display rendering. Additionally, common tools can be embedded within the container, which receive content items and user-generated content as input to transform the container contents at a runtime of the container. The container may also be collaborative, with multiple users having access to the data content simultaneously (except for actual content collisions). The container may be exposed to another user through request-to-perform techniques as passed through a work package. |
US08775938B2 |
Presentation of user interface content via media player
The presentation of user interface content via a media player is disclosed. In one embodiment, a media player detects a triggering event, and, upon detecting the triggering event, requests and receives a user interface content slide deck comprising one or more user interface content slides. The media player then retrieves user interface content for a slide in the slide deck, and displays the user interface content for the slide in the slide deck to a user along with media content. |
US08775937B2 |
User interfaces and systems and methods for user interfaces
Various user interface systems and methods are disclosed. A primary software application has one or more primary user interfaces that include a data output region. Some primary user interfaces may also have primary input regions. A control application has one or more control interfaces in which control regions are provided. A user may use the input controls using a preferred input modality such as touch input. A primary user interface and a corresponding control interface are displayed in registration on a display screen of a computing system such that the data output region of the primary user interface and the control region of the control interface a simultaneously visible to a user. A software or hardware component within or coupled to the computing system may be controlled using the control interface. Data relating to the component is displayed in the output region. |
US08775936B2 |
Displaying dynamic and shareable help data for images a distance from a pointed-to location
A controller is provided that provides help for applications, wherein the controller is different from all of the applications. The controller receives a command and identifies a location that a user was pointing to on a display device when the command was received. The controller finds on the display device, a first image within a predefined distance of the location where the user was pointing to on the display device when the command was received. The controller determines an identity of an application that generated the first image. The controller searches for help data based upon the identity of the application that generated the first image and based on the first image. The controller displays the help data if the searching finds the help data assigned to the first image and the application that generated the first image. |
US08775931B2 |
Spell check function that applies a preference to a spell check algorithm based upon extensive user selection of spell check results generated by the algorithm, and associated handheld electronic device
An improved spell check function and handheld electronic device provide a spell checking feature that includes provides a preference to a spell check algorithm that based upon extensive selection by the user of spell check results generated by the algorithm. |
US08775925B2 |
Systems and methods for hosted applications
Systems and methods for locally managing a user's interaction with content derived from web pages within the user interface of an application executing within a runtime provided by an application platform on a computing device in accordance with embodiments of the invention are disclosed. In many embodiments, a runtime provided by an application platform enables the execution of a non-natively implemented hosted application in which executing instructions in a scripting language within a background page control the downloading and modification of web content to create user interface pages for the hosted application. |
US08775922B2 |
Annotation framework for video
A system and method for transferring annotations associated with a media file. An annotation associated with a media file is indexed to a first instance of that media file. By comparing features of the two instances, a mapping is created between the first instance of the media file and a second instance of the media file. The annotation can be indexed to the second instance using the mapping between the first and second instances. The annotation can be processed (displayed, stored, or modified) based on the index to the second instance. |
US08775920B2 |
System and methods for displaying user modifiable server-rendered images
A system and method permits design of customized items on a client device using a web page. The client device receives a web page from a web server that includes, among other things, a design document encoding graphic elements that completely characterize a design image. The client device receives edits to the graphic elements, and sends a modified design document back to the server. The server then uses the design document to render an image, and sends to the client the server-rendered image for display in the web page. The web page may define an area in which to display the server-rendered image. The server may use a database to store the rendered image and use it in completing a customer order. |
US08775916B2 |
Validation analysis of human target
Technology for testing a target recognition, analysis, and tracking system is provided. A searchable repository of recorded and synthesized depth clips and associated ground truth tracking data is provided. Data in the repository is used by one or more processing devices each including at least one instance of a target recognition, analysis, and tracking pipeline to analyze performance of the tracking pipeline. An analysis engine provides at least a subset of the searchable set responsive to a request to test the pipeline and receives tracking data output from the pipeline on the at least subset of the searchable set. A report generator outputs an analysis of the tracking data relative to the ground truth in the at least subset to provide an output of the error relative to the ground truth. |
US08775915B2 |
Apparatus and method for a dual mode standard and layered belief propagation LDPC decoder
An apparatus for a dual mode low density parity check (LDPC) decoder including edge random access memory (RAM), last-in-first-out/first-in-first-out (LIFO/FIFO) RAM, channel RAM, and parallel datapath engines, where the datapath engines include a standard belief propagation decoding (SBD) datapath and a layered belief propagation decoding (LBD) datapath, where the SBD datapath includes a shifter, an accumulator, multiplexers, and a g( )_sbd calculator, and where the LBD datapath includes the shifter, the multiplexers, and a g′( )_lbd calculator. |
US08775914B2 |
Radix-4 viterbi forward error correction decoding
A method for forward error correction decoding. The method generally includes steps (A) to (D). Step (A) may calculate a plurality of metrics of a codeword using a forward error correction process on a trellis having a plurality of stages. Step (B) may update the metrics over each of the stages. Step (C) may permute the metrics in each of the stages. Step (D) may generate a signal carrying a plurality of decoded bits of the codeword. |
US08775908B2 |
Receiver and receiving method for receiving data in a broadcast system using incremental redundancy received through a unicast system
A receiver includes: a broadcast receiver receiving a receiver input data stream segmented into frames, wherein basic codeword portions of codewords are mapped onto the frames, a codeword including at least a basic codeword portion generated from an input data word according to a first code; a data demapper demapping the basic codeword portions; a decoder error correction code decoding the codewords into output data words of at least one output data stream in a regular decoding using the basic codeword portion in a codeword; a check unit checking if the regular decoding of a codeword is erroneous; a unicast request unit requesting, if the regular decoding of a codeword is erroneous, an auxiliary codeword portion of the erroneously decoded codeword for incremental redundancy in an additional decoding; a unicast receiver unit receiving an auxiliary codeword portion of the erroneously decoded codeword. |
US08775906B2 |
Efficient storage of meta-bits within a system memory
Mechanisms are provided for efficient storage of meta-bits within a system memory. The mechanisms combine an L/G bit and an SUE bit to form meta-bits. The mechanisms then determine the local/global state of a cache line on the first cycle of data. The mechanisms forward the data to the requesting cache, and the requesting cache may reissue the request globally based on the local/global state of the cache line. The mechanisms then determine the special uncorrectable error state of the cache line on the second or subsequent cycle of data. The mechanisms perform error processing regardless of whether the request was reissued globally. |
US08775901B2 |
Data recovery for defective word lines during programming of non-volatile memory arrays
The recovery of data during programming, such as in the case of a broken word-line, is considered. The arrangement described assumes that k pages may be corrupted when the system finishes programming a block. Then these corrupted pages can be recovered using an erasure code. In order to recover any k pages, the system will compute and temporarily store k parity pages in the controller. These k parity pages may be computed on-the-fly as the data pages are received from the host. After programming the block if a problem is detected in a post-write read, and data in up to k pages is corrupt on some bad word-lines, then the missing data is recovered using the k parity pages that are stored in the controller and using the other non-corrupted pages that are read from the block of the memory array and decoded. |
US08775900B2 |
Variable interleave data transmission
In cable modem termination systems (CMTS) and other information transmission systems, a method for changing the interleave depth associated with each data stream is provided. This may be done dynamically, and for any subset of downstream devices such as modems. The interleave depth may be set on an individual device level. Embodiments may decrease data receiving latency on devices that do not suffer from error rates, such as caused by burst noise, while maintaining throughput on devices with high error rates. |
US08775896B2 |
Non-binary LDPC decoder with low latency scheduling
Various embodiments of the present invention provide systems and methods for decoding of non-binary LDPC codes. For example, a low density parity check data decoder is disclosed that includes a variable node processor operable to perform variable node updates based at least in part on check node to variable node message vectors, a check node processor operable to perform check node updates and to generate the check node to variable node message vectors, and a scheduler operable to cause the variable node processor to use check node to variable node message vectors from multiple decoding iterations when performing the variable node updates for a given decoding iteration. |
US08775890B2 |
Automatic retransmission request control system and retransmission method in MIMO-OFDM system
An automatic retransmission request control system in an OFDM-MIMO communication system includes a retransmission mode selection part which selects a retransmission mode from among (a) a mode in which to transmit the data, which are to be retransmitted, via the same antenna as in the previous transmission, while transmitting, at the same time, new data by use of an antenna via which no data retransmission is requested; (b) a mode in which to transmit the data, which are to be retransmitted, via an antenna via which no retransmission is requested, while transmitting new data via another antenna at the same time; (c) a mode in which to use STBC to retransmit the data via an antenna via which no retransmission is requested; and (d) a mode in which to use STBC to retransmit the data via all the available antennas. |
US08775889B2 |
Adaptive error resilience for packet transmission over a network
Adaptive error resilience for packet transmission over a network is provided. In one embodiment, a method comprises encoding a plurality of video packets using a first encoder into a set of encoded video packets, wherein the set of encoded video packets encapsulates the plurality of video packets using a first header; transmitting the set of encoded video packets; encoding the plurality of video packets using a second encoder into a set of repair packets, wherein the set of repair packets encapsulates at least a portion of the plurality of packets using a second header; and transmitting the set of repair packets. |
US08775878B2 |
Information processing apparatus, communication system, communication control method, and storage medium
An information processing apparatus which make it possible to confirm an error recovery event. A device proxy server as an information processing apparatus is connected to a printer and a client PC via a network. The device proxy server receives an event message indicative of an event having occurred in a printer. The received event message is transferred to a client PC. When the event message transferred to the client PC is related to an error event indicative of an error having occurred in the printer, the device proxy server monitors whether or not the error event has been eliminated in the printer. When the error event is eliminated in the printer, the device proxy server sends an error recovery message indicative of elimination of the error event to the client PC. |
US08775876B2 |
Method to improve I/O reliability on a degraded wide port connection
A method and system for controller level identification and isolation of a degraded physical link (PHY) in a serial attached small computer system interface (SA-SCSI) or SAS domain. The method and system uses computer readable code embodied within the controller level of an SAS domain to monitor a plurality of PHY pairs associated as connecting through a wide port. The invention compares a history of PHY pair errors to a tunable timer to determine if PHY errors reach a threshold. Should the threshold be exceeded, the controller disables the error prone PHY pair and delivers a notification. The controller may then re-enable the disabled PHY after user action or port power up. |
US08775873B2 |
Data processing apparatus that performs test validation and computer-readable storage medium
In a data processing apparatus, when an instruction for starting validation is provided, or when definition information is updated, data input from a data source is collected, and a process for narrowing down of the collected data is executed. In the data narrowing process, by extracting records and items as process targets according to the definition information that defines the operation of the apparatus, the number of data items used for validation is reduced. Then, the operation is validated using the narrowed data. In the operation validation process, a virtual transfer destination of output of data is provided within the apparatus, and the data is output to the virtual transfer destination, for comparison with the output data, whereby the validation of the operation is performed. |
US08775872B2 |
Diagnostic data set component
Various embodiments for retaining diagnostic information for data in a computing storage environment are provided. In one such embodiment, a diagnostic component, apart from a volume table of contents (VTOC), associated with an integrated catalog facility (ICF) catalog and with a base data set from data sets via a catalog association record is initialized. The diagnostic component configured to retain base data set-specific diagnostic information retrievable by the computing storage environment to assist in error diagnosis and the ICF catalog is one of the data sets storing information about the data sets for facilitating a retrieval of a name of the base data set and assists with retaining and retrieval of the base data set-specific diagnostic information. The base data set-specific diagnostic information is stored pursuant to at least one event associated with the base data set. |
US08775868B2 |
Adaptive RAID for an SSD environment
A system and method for adaptive RAID geometries. A computer system comprises client computers and data storage arrays coupled to one another via a network. A data storage array utilizes solid-state drives and Flash memory cells for data storage. A storage controller within a data storage array is configured to determine a first RAID layout for use in storing data, and write a first RAID stripe to the device group according to the first RAID layout. In response to detecting a first condition, the controller is configured to determine a second RAID layout which is different from the first RAID layout, and write a second RAID stripe to the device group according to the second layout, whereby the device group concurrently stores data according to both the first RAID layout and the second RAID layout. |
US08775866B2 |
Method and device for reading and writing a memory card
The present invention discloses a method and device for reading a memory card comprising a primary partition and at least one backup partition. The method comprises the following steps that: after writing a first file into the primary partition of the memory card, a read/write device writes the first file into the at least one back partition; and when reading a second file from the memory card, the read/write device reads the second file from the at least one backup partition or from the primary partition if an error occurs in the reading of the second file from the backup partition. The method and device provided herein address the problems existing in the prior art that an embedded system is unstable because of the low error tolerance of a memory card. |
US08775860B2 |
System and method for exact regeneration of a failed node in a distributed storage system
The invention relates to a method and a system for regenerating a failed storage node from one or more storage nodes storing an original file and also reconstructing the said original file. The method involves encoding the file segments using a XOR operation, decoding the encoded file segment using the XOR operation and regenerating the failed node by using the storage nodes which are in active position. The regenerated file segments are further written to a new storage node. |
US08775856B1 |
System and method for generating clock signal for a plurality of communication ports by selectively dividing a reference clock signal with a plurality of ratios
Various techniques are provided to generate a plurality of reference clock signals using a single reference clock signal generator. In one example, a clock signal generation system includes a reference clock signal generator adapted to provide a reference clock signal. The system also includes a plurality of dividers adapted to divide the reference clock signal using different ratios to provide a plurality of communication port clock signals. The system also includes a plurality of different communication ports adapted to receive the communication port clock signals and adapted to operate in accordance with different communication protocols using the communication port clock signals. |
US08775855B2 |
Reducing memory used to store totals in static timing analysis
A system and a method are disclosed for reducing memory used in storing totals during static timing analysis. Totals are stored at various points along paths analyzed in static timing analysis. Some totals may not be merged for reasons including differing clock re-convergence pessimism removal (CRPR) dominators, exceptions, or clocks. Totals at a point may be stored in a super-tag mapping table and replaced at the point with a super-tag. The super-tag includes a super-tag ID referencing the totals stored in the super-tag mapping table. The super-tag also includes a time delay value. The time delay value allows the super-tag ID to be reused in other super-tags at other points while still storing total time delays at the other points. Therefore, the memory used to store totals is reduced in many situations. |
US08775854B2 |
Clock turn-on strategy for power management
A system includes a voltage sensing module and a frequency adjustment module. The voltage sensing module is configured to sense a supply voltage of a circuit block, generate a first control signal when the supply voltage is less than or equal to a first voltage, and generate a second control signal when the supply voltage is within a predetermined range of a second voltage. The frequency adjustment module is configured to set a frequency of a clock signal supplied to the circuit block to less than a normal operating frequency of the circuit block when the supply voltage is initially supplied to the circuit block after a power on reset operation and the first control signal or the second control signal is received. |
US08775846B2 |
Portable power manager having one or more device ports for connecting with external power loads
A portable DC power manager (400) includes an internal power bus (410) and a plurality of device ports (1150, 1160, 1170, 1180, 1190, 1200) for connecting with external power and energy sources, external power loads and other external power managers. Each device port is isolated for the internal power bus by controllable switches (A, B, C, D). Power converters (440, 442, 510) may be disposed between device ports and the internal power bus to convert voltages and attenuate current amplitude. Energy management schema operating on the power manager sums available power and allocates the available power to connected power loads according to power priority settings. A hot-change-over circuit (1300) connects additional sources to the internal bus in response to a voltage drop on the internal power bus. A compact and lightweight package (1100) enables a portability. |
US08775843B2 |
Power management with dynamic frequency adjustments
A central processing unit (CPU) can specify an initial (e.g., baseline) frequency for a clock signal used by a device to perform a task. The CPU is then placed in a reduced power mode. The device performs the task after the CPU is placed in the reduced power mode until a triggering event causes the device to send an interrupt to the CPU. In response to the interrupt, the CPU awakens to dynamically adjust the clock frequency. If the clock frequency is reset to the baseline value, then the CPU is again placed in the reduced power mode. |
US08775840B2 |
Virtualization in a multi-core processor (MCP)
This invention describes an apparatus, computer architecture, method, operating system, compiler, and application program products for MPEs as well as virtualization in a symmetric MCP. The disclosure is applied to a generic microprocessor architecture with a set (e.g., one or more) of controlling elements (e.g., MPEs) and a set of groups of sub-processing elements (e.g., SPEs). Under this arrangement, MPEs and SPEs are organized in a way that a smaller number MPEs control the behavior of a group of SPEs. The apparatus enables virtualized control threads within MPEs to be assigned to different groups of SPEs for controlling the same. The apparatus further includes a MCP coupled to a power supply coupled with cores to provide a supply voltage to each core (or core group) and controlling-digital elements and multiple instances of sub-processing elements. |
US08775839B2 |
Global hardware supervised power transition management circuits, processes and systems
An electronic circuit including a bus (3521), a peripheral (3510.i/3552.1) coupled to the bus (3521), the peripheral having a storing circuit (3620.i, 3625.i) for a succession-presetting and a parameter setting currently-effective for peripheral operation on the bus (3521); and a power management circuit (3570) operable in response to a power management transition request (GO_bit) to send a first signal (START_bit_i) to the peripheral, and to initiate a bus frequency transition, and to send a second signal (PER_ENABLE_i) to the peripheral after the bus frequency transition; and the peripheral is responsive to the first signal (START_bit_i) to stall peripheral operation on the bus (3521), the peripheral operable to automatically promote the succession pre-setting to currently-effective status for the peripheral after peripheral operations on the bus (3521) are stalled and responsive to the second signal (PER_ENABLE_i) to re-enable peripheral operation on the bus (3521). Other circuits, devices, systems, apparatus, and processes are disclosed. |
US08775838B2 |
Limiting the number of unexpected wakeups in a computer system implementing a power-saving preemptive wakeup method from historical data
Dynamically reducing power consumption by a processor in a computer system by determining a maximum number of times (token count) that the processor can incur a start-up delay after being placed into a low-power mode during a token period of time when executing a task for a token period of time. The processor may be placed into the low-power mode while executing the task in response to an idle indicator only if a current value of the token count assigned to the task is greater than zero. The current value of the token count is decremented each time the processor incurs a start-up delay in response to being awakened from the low-power mode. The current token count is reset to match the assigned token count at the end of each token period. Furthermore, wakeup may be anticipated to allow the processor to be awakened preemptively. |
US08775834B2 |
Methods and apparatuses for controlling thread contention
An apparatus comprises a plurality of cores and a controller coupled to the cores. The controller is to lower an operating point of a first core if a first number based on processor clock cycles per instruction (CPI) associated with a second core is higher than a first threshold. The controller is operable to increase the operating point of the first core if the first number is lower than a second threshold. |
US08775833B2 |
Dynamically allocating a power budget over multiple domains of a processor
In one embodiment, the present invention includes a method for determining a power budget for a multi-domain processor for a current time interval, determining a portion of the power budget to be allocated to first and second domains of the processor, and controlling a frequency of the domains based on the allocated portions. Such determinations and allocations can be dynamically performed during runtime of the processor. Other embodiments are described and claimed. |
US08775832B2 |
Method and system for managing the power consumption of an information handling system
A method for managing the power consumption of an information handling system including a processor and an associated cooling system. The method may include providing power to the cooling system based on a performance/power balance setting, accepting a user input to adjust the performance/power balance setting, and adjusting the power provided to the cooling system based on the adjusted performance/power balance setting. The performance/power balance setting may define a balance between performance of the processor and power consumption of the associated cooling system. |
US08775829B2 |
Single phase line switch
A single phase line switch having a phase line input connected to a phase line of the electric network and a phase line output connected to a negative line of the electric network via resistive loads or capacitive loads. The single phase line includes a first power supply unit connected between the phase line input and the phase line output, a second power supply unit, a controlled switch configured to control the second power unit to be on or off, and a micro control unit (MCU) configured to control the controlled switch to be switched on or off. The first power supply unit is configured to provide a power supply to the MCU when the controlled switch is off. The second power unit is configured to provide a power supply to the MCU and the controlled switch when the controlled switch is on, the second power supply unit being serially connected with the controlled switch, the second power supply and the controlled switch being parallel connected with the first power supply unit. The first power supply unit and the second power supply unit each comprises a voltage output terminal connected to a power supply end of the MCU. |
US08775822B2 |
Computer-implemented method and system for protecting a software installation after certification
A computer-implemented system and method for protecting a software installation after certification are disclosed. The system includes components to determine if a cryptographic value of a digital content set matches with a stored cryptographic value of a validated digital content set, to determine if a cryptographic value of a validation rule set matches with a stored cryptographic value corresponding to a validation requirement, and to display a certification message if the cryptographic value of the digital content set matches with a stored cryptographic value of a validated digital content set and the cryptographic value of the validation rule set matches with a stored cryptographic value corresponding to a validation requirement. |
US08775820B1 |
System and method of enterprise administrative password generation and control
A system for password generation and control is provided. The system includes a client and a server system. A password component is operable on the client system for automatically on a re-occurring basis generating a password for an application operable by the client system based upon at least two inputs accessible from the client system. A password manager component is operable on the server system to generate the password using the at least two inputs to enable access to the application the client system. |
US08775818B2 |
Multifactor validation of requests to thwart dynamic cross-site attacks
An apparatus and a method for validating requests to thwart cross-site attacks is described. A user identifier token, a request identifier token, and a timestamp, are generated at a web application of a server. A Message Authentication Code (MAC) value is formed based on the user identifier token, the request identifier token, and the timestamp using a secret key of the web application. Names of the form elements are enciphered. Fake form elements can also be added to the dynamic form. The entire page also can be enciphered. The dynamic form is sent with the MAC value and the time stamp to a client. A completed form comprising a returned MAC value and a returned timestamp is received from the client. The completed form is validated at the server based on the returned MAC value and the returned timestamp. |
US08775816B2 |
Method and apparatus to enhance security and/or surveillance information in a communication network
Existing video surveillance security approaches enhanced with suitable functionality of the telecommunications wireless network are provided. Security personnel are equipped with hand-held devices capable of recording video, photos, audio, and text. This data is geo-tagged and time-stamped by the application and uploaded to the telecommunications network and stored in the network. As such, the geo-tagged, time-stamped information is immediately available to other investigators who are in the same geographic vicinity through access controls administered by a secure social network. The information may also be accessible from remote locations via the internet. All wireless and Internet communications may be protected using end-to-end secure transport layer communications protocols. |
US08775809B2 |
Fuzzy biometrics based signatures
A method and a device of verifying the validity a digital signature based on biometric data. A verifier attains a first biometric template of the individual to be verified, for instance by having the individual provide her fingerprint via an appropriate sensor device. Then, the verifier receives a digital signature and a second biometric template. The verifier then verifies the digital signature by using either the first or the second biometric template as a public key. The attained (first) biometric template of the individual is compared with the received (second) biometric template associated with the signature and if a match occurs, the verifier can be confident that the digital signature and the associated (second) biometric template have not been manipulated by an attacker for impersonation purposes. |
US08775806B2 |
System and method for providing unique encryption key
A system and method for providing a unique encryption key including a receiver, at a Voice over Internet Protocol (VoIP) adapter, configured to receive a configuration file, a processor, at the VoIP adapter, configured to decrypt the configuration file using a default key stored in the VoIP adapter, update one or more profile parameters of the configuration file, and install an encryption key at the VoIP adapter using the configuration file, and a transmitter, at the VoIP adapter, configured to register, with a network element, for network service using the updated configuration file such that the receiver is configured to receive network service from the network element when the updated configuration file is authenticated by the network element. |
US08775804B2 |
Matching authentication method, device and system for wireless communication
A matching authentication method for wireless communication equipment comprises that: a device at the transmitting end sends a matching request (S101) to a device at the receiving end; the device at the transmitting end receives the response messages feedback from the device at the receiving end, and the response message carry with feature codes (S102); the device at the transmitting end obtains the feature codes and takes the feature codes as the authentication and authorization codes communicating with the receiving end. The invention also provides a wireless communication device with the function of matching authentication correspondingly. The wireless communication device comprises a memory unit, a communication unit, and an authentication and authorization unit and a feature code updating unit. The invention also provides a wireless communication system with the function of matching authentication correspondingly. |
US08775803B2 |
High security display of private data
A device, method, and computer-readable medium are disclosed. In one embodiment, the device includes an inbound port to receive information from an information retrieval peripheral. The device also includes an outbound port to send information to a local computing device. The device includes masking logic to cause the local computing device to recognize the portable security device as at least one of a plurality of endpoint devices. The device also includes data obfuscation logic that is capable of obfuscating simple data format data, received from the information retrieval peripheral, obfuscating that data into a non-simple data format, and sending the obfuscated data to the local computing device. The non-simple data format includes at least one frame of video. |
US08775800B2 |
Event-driven provision of protected files
A system may include reception of a request for an encryption key pair including a first private encryption key and a first public encryption key, the encryption key pair associated with a future event, generation of the encryption key pair, transmission of the first public encryption key to a second device, reception, from the second device, of a file encrypted using the first public encryption key and using a second public encryption key of an intended recipient, transmission of the file to a third device associated with the intended recipient, detection of the future event, and, in response to the detection of the future event, transmission of the first private encryption key to the third device. |
US08775798B2 |
System and method for retrieving certificates associated with senders of digitally signed messages
A system and method for retrieving certificates and/or verifying the revocation status of certificates. In one embodiment, when a user opens a digitally signed message, a certificate that is required to verify the digital signature on the message may be automatically retrieved if it is not stored on the user's computing device (e.g. a mobile device), eliminating the need for users to initiate the task manually. Verification of the digital signature may also be automatically performed by the application after the certificate is retrieved. Verification of the revocation status of a certificate may also be automatically performed if it is determined that the time that has elapsed since the status was last updated exceeds a pre-specified limit. |
US08775796B2 |
Certificate authenticating method, certificate issuing device, and authentication device
A terminal device 4 transmits a certificate issue request including a communication ID thereof and a sub ID to a certificate issuing device 7 via a NW1 (a first network). The certificate issuing device 7 inquires of a communication ID (identifier) checking device 5 whether or not the communication ID included in the certificate issue request is in use or not and inquires of a communication ID/sub ID checking device 6 whether or not the communication ID and the sub ID are associated with each other. If both the check results are OK, the certificate issuing device 7 generates a certificate including the ID of the certificate issuing device 7, the communication ID, the sub ID and a validity period and transmits the certificate to the terminal device 4. In this way, a certificate with a short validity period can be issued only based on the access to the NW1 using the communication ID and the sub ID. |
US08775795B2 |
Authenticating method and mobile terminal for code division multiple access (CDMA) evolution to packet data optimized (EVDO) network
The successful authenticating of a Network Access Identifier (NAI) process is enabled by an authenticating method and a mobile terminal for a Code Division Multiple Access (CDMA) EVolution to packet Data Optimized (EVDO) network. The authenticating method for the EVDO network includes an NAI authenticating and a Challenge Handshake Authentication Protocol (CHAP) authenticating, in which the NAI authenticating method includes: when it is determined that the identifier supporting a Message-Digest 5 (MD5) authenticating method is stored in a User Identity Model (UIM) (S101), the NAI of a user is read from the UIM (S102); a judgment is made whether the NAI is correct when the NAI of the user is read from the UIM (S103); if the result of the judgment is yes, the read NAI is transmitted to an authentication server to perform an authentication (S104); if the result of the judgment is no, the International Mobile Subscriber Identity (IMSI) of the user is read from the UIM; and the NAI of the user is obtained according to the IMSI and the obtained NAI is transmitted to the authentication server to perform the authentication (S105). |
US08775794B2 |
System and method for end to end encryption
Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a user password from a user; (2) using the computer processor, the application combining the user password and a password extension; (3) using the computer processor, the application cryptographically processing the combined user password and password extension, resulting cryptographic public information; and (4) providing the cryptographic public information to a server. The user password is not provided to the server. In another embodiment, a method for user authentication includes (1) using a computer processor, receiving a login page from a server; (2) sending a Hash-based Message Authentication Code to the server; and (3) receiving an authentication from the server. In one embodiment, the login page may include a transkey and a value B. |
US08775793B2 |
Flexible node identity for telecom nodes
Features of a node (800) is enabled/disabled under a license between a node vendor and a service provider. A license manager (810) enforces the license to appropriately enable and disable the node features. The license, which includes credentials for authorizing the features and a logical name of the node, is encrypted with an encryption CHWID upon node installation. The secret encryption CHWID is generated based on the components (820) that make up the node (800) at installation using an algorithm. To activate the features, an activation CHWID is generated using a same or similar algorithm and compared against the encryption CHWID. If they are equal, the credentials are decrypted and the features are activated. If they are not equal but the difference is small, the credentials are decrypted, and optionally, the encryption CHWID is reset based on the activation CHWID. If the difference is large, the entire node license is reinstalled. |
US08775785B2 |
Program management method for performing start-up process for programs during start-up of device based on the previous start-up status to prevent occurrence of an out of memory condition
A device includes a storage unit configured to store programs; a start-up status storing unit; and a start-up management unit configured to perform a start-up process for each of the programs during start-up of the device, and record information indicating status of the start-up process in the start-up status storing unit in association with identification information of each of the programs. If information indicating that the start-up process has not been previously completed is present in the start-up status storing unit, the start-up management unit limits the programs to be started. |
US08775784B2 |
Secure boot up of a computer based on a hardware based root of trust
A method includes performing a boot up of a computer having a system on-chip having multiple processors and a nonvolatile read-only machine-readable medium. The boot up includes enabling a first processor of the multiple processors, while maintaining others of the multiple processors in a disabled state. The boot up includes retrieving initial stage instructions from the nonvolatile read-only machine-readable medium. The boot up also includes executing the initial stage instructions and validating multiple stages of firmware separately. The boot up includes, in response to validating the multiple stages of firmware, executing the multiple stages of firmware in consecutive stages of the boot up, wherein executing of each stage of the multiple stages of firmware enables a different set of disabled hardware components of the computer. The boot up also includes validating an operating system and, in response to validation, transferring control of the computer to the operating system. |
US08775782B2 |
Network system, method of controlling access to storage device, administration server, storage device, log-in control method, network boot system, and method of accessing individual storage unit
A network boot system including one or more client terminals, a DHCP (Dynamic Host Configuration Protocol) server, a PXE (Preboot Execution Environment) server, a TFTP (Trivial File Transfer Protocol) server, a database administration server, one or more storage devices, and an authentification server (such as a Radius server) connected to each other via a TCP/IP (Transmission Control Protocol)/Internet Protocol) network. A plurality of LU provided in the storage devices as separated into a system area LU and a user area LU prepared per user. |
US08775774B2 |
Management system and methods for object storage system
The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. To facilitate creation and management of logical storage volumes, special application programming interfaces (APIs) have been developed. The special APIs include commands to create a logical storage volume, bind, unbind, and rebind the logical storage volume, extend the size of the logical storage volume, clone the logical storage volume, and move the logical storage volume. |
US08775771B2 |
Block management method for a flash memory and flash memory controller and storage system using the same
A block management method for managing a plurality of physical blocks of a flash memory chip is provided. The block management method includes configuring a plurality of logical addresses; mapping the logical addresses to a plurality of logical blocks; and mapping the logical blocks to the physical blocks. Additionally, the block management method also includes obtaining deleting records related to a plurality of deleted logical addresses from a host system, wherein data stored in the deleted logical addresses is recognized as invalid by the host system. And, the block management method further includes obtaining a deleted logical block, marking each of the logical addresses mapped to the deleted logical block as a bad logical address, and linking the physical block mapped to the deleted logical block to a spare area. Accordingly, the block management method can effectively prolong the lifespan of a flash memory chip. |
US08775767B2 |
Method and system for allocating memory to a pipeline
A method, and associated system, for allocating memory to a first pipeline that includes a sequence of filters. Each filter is configured to execute a process specific to each filter, receive input data, and generate output data. The output data from each filter, except the last filter in the sequence, serves as the input data to the next filter in the sequence. An optimum memory capacity is allocated to the first pipeline if possible. Otherwise, a guaranteed memory bandwidth is allocated to the first pipeline if possible. Otherwise, extra memory currently allocated to a second pipeline is currently released if the second pipeline not currently performing processing or subsequently released when the second pipeline subsequently completes performing processing that is currently being performed, followed by allocating the extra memory to the first pipeline. |
US08775762B2 |
Method and apparatus for batching memory requests
A memory controller includes a batch unit, a batch scheduler, and a memory command scheduler. The batch unit includes a plurality of source queues for receiving memory requests from a plurality of sources. Each source is associated with a selected one of the source queues. The batch unit is operable to generate batches of memory requests in the source queues. The batch scheduler is operable to select a batch from one of the source queues. The memory command scheduler is operable to receive the selected batch from the batch scheduler and issue the memory requests in the selected batch to a memory interfacing with the memory controller. |
US08775760B2 |
Modifying a host interface setting for a non-volatile memory module
A system operation method for controlling a rewritable non-volatile memory module is provided. The rewritable non-volatile memory module includes a plurality of physical blocks. The system operation method includes following steps. A first signal is received from a host system through a host interface. Whether a system setting of the host interface is to be modified is determined. If the system setting is to be modified, a system parameter is read from the physical blocks, and the system setting is modified according to the system parameter. A second signal is transmitted to the host system to establish a connection recognition between the rewritable non-volatile memory module and the host system. Thereby, the settings of transmission between the host system and the rewritable non-volatile memory module are made more flexible. |
US08775755B2 |
Peer-to-peer transcendent memory
Various arrangements for utilizing memory of a remote computer system are presented. Two computer systems may allocate a portion of RAM accessible to a memory-access API. A first set of data from the first portion of the first memory of a first computer system may be determined to be moved to memory of another computer system. The first set of data from the first portion of the first memory may be transmitted for storage in the second portion of the second memory of a second computer system. Using the second memory-access API, the set of data may be stored in the second portion of the second memory. Using the first memory-access API, the set of data from the first portion of the first memory may be deleted. |
US08775748B2 |
Method and system for tracking data correspondences
One embodiment is a method for tracking data correspondences in a computer system including a host hardware platform, virtualization software running on the host hardware platform, and a virtual machine running on the virtualization software, the method including: (a) monitoring one or more data movement operations of the computer system; and (b) storing information regarding the one or more data movement operations in a data correspondence structure, which information provides a correspondence between data before one of the one or more data movement operations and data after the one of the one or more data movement operations. The “monitoring” may comprise monitoring data movement at one or more of an interface between the host hardware platform and the virtualization software, and an interface between the virtual machine and the virtualization software. |
US08775747B2 |
Write data mask method and system
A method and system for performing byte-writes are described, where byte-writes involve writing only particular bytes of a multiple byte write operation. Embodiments include mask data that indicates which bytes are to be written in a byte-write operation. No dedicated mask pin(s) or dedicated mask line(s) are used. In one embodiment, the mask data is transmitted on data lines and store in response to a write_mask command. In one embodiment, the mask data is transmitted as part of the write command. |
US08775745B2 |
Process variation tolerant bank collision detection circuit
A process variation tolerant collision detection apparatus for use in detecting collisions in a multibank memory. The apparatus may receive a plurality of memory commands for execution at the multibank memory. The plurality of memory commands may be compared by an index address comparator and a bank address comparator to generate an index match signal and a bank match signal. The index match signal and the bank match signal may be analyzed by a timing correction module such that errors associated with process variation of the signals used in the system may be eliminated. Accordingly, a corrected index match signal and a corrected bank match signal may be provided to a collision detection circuit to determine whether a collision exits. |
US08775744B2 |
Simultaneous switching of multiple time slots in an optical network node
A switching frame buffer is described in which data units within a sequence of time slots, of a frame, may be simultaneously input and output at ports of the switching frame buffer. In one implementation, a write port may receive data units within a single cycle of the switch. A number of memories may be provided, where first selected ones of the memories constitute memory groups and second selected ones of the memories constitute a memory subsets, each of the memory groups including a corresponding one of the memory subsets. The write port may supply each of a number of copies of the data units to a corresponding one of the memory subsets. Multiplexers may be associated with the groups of the memories and a read port may receive one of the copies of a number of the data units from different ones of the multiplexers. |
US08775741B1 |
Using temporal access patterns for determining prefetch suitability
A storage control system includes a prefetch controller that identifies memory regions for prefetching according to temporal memory access patterns. The memory access patterns identify a number of sequential memory accesses within different time ranges and a highest number of memory accesses to the different memory regions within a predetermine time period. |
US08775738B2 |
Reading or writing to memory
To increase the efficiency of a running application, it is determined whether using a cache or directly a storage is more efficient block size-specifically; and the determined memory type is used for a data stream having a corresponding block size. |
US08775734B2 |
Virtual disks constructed from unused distributed storage
A virtual disk is comprised of segments of unused capacity of physical computer-readable storage media co-located with computing devices that are communicationally coupled to one another through network communications. The computing devices execute one or more of a client process, a storage process and a controller process. The controller processes manage the metadata of the virtual disk, including a virtual disk topology that defines the relationships between certain ones of the physical computer-readable storage media and a particular virtual disk. The client process provide data for storage to certain ones of the computing devices executing the storage processes, as defined by a virtual disk topology, and also read data from storage from those computing devices. The client process additionally expose the virtual disk in the same manner as any other computer-readable medium. |
US08775733B2 |
Distribution design for fast raid rebuild architecture based on load to limit number of redundant storage devices
Exemplary embodiments of the invention provide a distribution design for fast RAID rebuild architecture that avoids the deterioration of the availability/reliability in the distribution architecture. According to one aspect of the invention, a storage system comprises: a data storage unit including a plurality of storage devices; a storage controller including a processor, a memory, and a controller for controlling data transfer between the memory and corresponding storage devices in the data storage unit; and an internal network coupled between the storage controller and the storage devices. Based on loads of the processor of the storage controller and the internal network, the storage controller controls to limit a number of redundant storage devices over which to distribute a write data. |
US08775728B2 |
Extended address volume (EAV) allocation verification
In one embodiment, a system includes a first storage including track-managed storage and cylinder-managed storage, logic adapted for receiving a request to allocate a target data set on the first storage, logic adapted for determining a size of a source data set on a second storage, wherein data from the source data set will be copied to the target data set, logic adapted for comparing the determined size of the source data set to a break point value to determine if the target data set is to be stored to the track-managed storage or the cylinder-managed storage of the first storage, logic adapted for receiving the data from the source data set, and logic adapted for storing the data from the source data set to the target data set in either track-managed storage or cylinder-managed storage of the first storage based on the comparison. |
US08775726B2 |
TCAM extended search function
A range determination module determines a search range of TCAM content values and a search criteria module creates a TCAM search value from a search range by combining common higher order bits with don't care lower order bits that change within the search range. A match module searches TCAM using the search value to determine a match count. A division module creates upper/lower sub-ranges by creating upper/lower midpoint content values within the search range. Upper sub-range is between an upper content value and the upper midpoint content value and lower sub-range is between the lower midpoint content value and a lower content value. The upper midpoint content value includes changing a most significant don't care bit to a 1 and remaining don't care bits to 0. The lower midpoint content value includes changing a most significant don't care bit to 0 and remaining don't care bits to 1. |
US08775725B2 |
Memory device refresh commands on the fly
On the fly switching from one memory device refresh rate to another is provided. Control logic associated with the memory device detects a condition to switch from a currently-applied refresh rate to a different refresh rate. In response to the condition, the refresh rate is dynamically switched. The switching does not require a change of a mode register. Thus, a refresh rate for the memory device can be dynamically changed on the fly. |
US08775713B2 |
Multi-protocol tunneling over an I/O interconnect
Described are embodiments of methods, apparatuses, and systems for multi-protocol tunneling across a multi-protocol I/O interconnect of computer apparatus. A method for multi-protocol tunneling may include establishing a first communication path between ports of a switching fabric of a multi-protocol interconnect of a computer apparatus in response to a peripheral device being connected to the computer apparatus, establishing a second communication path between the switching fabric and a protocol-specific controller, and routing, by the multi-protocol interconnect, packets of a protocol of the peripheral device from the peripheral device to the protocol-specific controller over the first and second communication paths. Other embodiments may be described and claimed. |
US08775709B2 |
Method for recognizing a card reader with multiple card holders and method for communicating between a host and the card reader and system thereof
The present invention discloses a method, related to smart card reader field, for recognizing a card reader with multiple card holders. The method includes connecting, by the card reader with multiple card readers, to a host and loading, by the host, card reader device bus driver; obtaining, by the card reader device bus driver, the device information of the card reader with multiple card readers and creating physical device object according to the device information; installing and loading, by the host, smart card function driver for each physical device object and registering a standard smart card driver library for every smart card function driver; creating, by the smart card service of the host, a new smart card device record in the resource manager of the smart card service according to the smart card function driver loaded and the smart card driver library registered and recognizing the card reader with multiple card readers as a plurality of smart card devices. The invention further discloses a method for communicating between the host and the card reader with multiple card holders based on the recognizing method described above and a system thereof. |
US08775707B2 |
Single wire bus system
There is provided a single wire bus architecture comprising a single wire bus; a master device coupled to the single wire bus; at least one slave device coupled to the single wire bus; a communication protocol implemented over the single wire bus and employed by the master device and the at least one slave device; wherein when one of the at least one slave devices wishes to communicate with the master device, the one of the at least one slave devices discharges the clock signal during a tri-state stage of the clock signal; and wherein the single wire bus transmits a clock signal, power and data between the master device and the one of the at least one slave device in communication with the master device. |
US08775706B2 |
Main electronic device for communicating within a network and method for operating a main electronic device for communicating within the network
The present invention relates to a main electronic device for communicating within a network comprising an interface for enabling communication within the network and a controller for sending polling messages via the network to logical addresses via said interface in order to request information from at least one further electronic device.The present invention further relates to a method for operating a main electronic device for communicating within a network. |
US08775704B2 |
Method and system for communication between a secondary processor and an auxiliary display subsystem of a notebook
A method for communication over an SMB, I2C bus, or other serial bus between an auxiliary display subsystem and a secondary processor of a notebook including the auxiliary display subsystem, and systems, circuits and notebooks configured to perform the method. Typically, communication over the serial bus between the auxiliary display subsystem and secondary processor can occur when the notebook is in a standby or other low-power state (e.g., to obtain system status data or cause the notebook to wake up) or a fully-powered normal operating state. Typically, the auxiliary display subsystem is coupled not only to the notebook's secondary processor by the serial bus but also to the notebook's central processing unit by another link (e.g., a USB). |
US08775702B2 |
System and method for recognizing a keystroke in an electronic device
The disclosure provides a system and a method of processing keystrokes entered on an electronic device. The method comprises: monitoring for activation of two or more keys on the keyboard; evaluating whether the activation of those keys occurs within a set window of time; evaluating locations of those keys. After these evaluations, if the keystroke conflict is determined to not have been produced, then characters for those keys are generated in order of their activations. If the keystroke conflict is determined to have been produced, then the method arbitrates between those keys to select a key utilizing a dictionary to automatically determine the key to be selected. In the dictionary, its entries are related to each of those keys combined with any previously entered keystrokes. The method then processes the selected key to generate on a display one character, which is associated with the selected key. |
US08775697B2 |
Verification of data read in memory
A method and a circuit for checking data transferred between a circuit and a processing unit, in which: the data originating from the circuit transit through a first buffer element having a size which is a multiple of the size of data to be subsequently delivered over a bus of the processing unit; an address provided by the processing unit for the circuit is temporarily stored in a second element; and the content of the first element is compared with current data originating from the circuit, at least when they correspond to an address of data already present in this first element. |
US08775696B2 |
Storage area network access for virtual machines
Techniques for enabling a virtual machine (VM) executing on a physical node to access a partition of a storage system are described. One embodiment associates an identifier with the VM for use when communicating with the storage system, wherein the identifier differs from a default identifier of a host bust adapter (HBA) usable by the physical node to communicate with the storage system. |
US08775694B2 |
ADC sequencing
A device comprises a central processing unit (CPU) and a memory configured for storing memory descriptors. The device also includes an analog-to-digital converter controller (ADC controller) configured for managing an analog-to-digital converter (ADC) using the memory descriptors. In addition, the device includes a direct memory access system (DMA system) configured for autonomously sequencing conversion operations performed by the ADC without CPU intervention by transferring the memory descriptors directly between the memory and the ADC controller for controlling the conversion operations performed by the ADC. |
US08775692B2 |
USB 3.0 device and control method thereof
A control unit of a USB 3.0 device controls the USB 3.0 device that has entered an SS.Disabled state to transition to an Rx.Detect state when a USB 2.0 connection is not established after a predetermined time, in which the USB 2.0 connection is one of an HS (High Speed) connection, an FS (Full Speed) connection, and an LS (Low Speed) connection. This enables quick return to the Rx.Detect state for the USB 3.0 device that entered the SS.Disabled state due to an error in the host. |
US08775690B2 |
Control apparatus, switch, optical transmission apparatus, and control method
A control apparatus includes a first processor that is operative to perform outputting first data including control data, a first input/output interface that receives the first data, a second input/output interface that receives and outputs data, a third input/output interface that receives and outputs data using a second communication method, in which transmission speed is lower than transmission speed in the first communication method, and a second processor that is operable to perform controlling the second input/output interface outputs third data, which is obtained by replacing the control data included in the first data received by the first input/output interface with second data received by the third input/output interface, to a control target apparatus, controlling the control target apparatus outputs the third data received from the second input/output interface, and controlling the third input/output interface outputs response data in response to the third data received from the control target apparatus. |
US08775689B2 |
Electronic modules with automatic configuration
A first slave electronic module and a second slave electronic module are adapted for communicating over the data bus. The first slave electronic module has a first resistor coupled in series with a main power line. The second electronic module has a second resistor coupled in series with the main power line. A master electronic module has a master current measurement circuit for determining an aggregate current level indicative of the total number of slave electronic modules on the main power line. A first current measurement circuits is capable of measuring a node current indicative of a number of other active slaves connected to the main power line and data bus. A master data processor in the master electronic module is arranged to assign a unique module identifier to a first slave electronic module based on the first node current and the aggregate current level, the unique module identifier indicating a respective position of the first slave electronic module on the data bus. |
US08775685B1 |
Parallel processing of network packets
A network packet processor includes a plurality of processing pipelines and a scheduling circuit. Each processing pipeline is configured and arranged to process packets having sizes less than or equal to an associated processing size of the processing pipeline. The respective processing size of one of the processing pipelines is different from the processing size of at least one other of the processing pipelines. The scheduling circuit is coupled to the plurality of processing pipelines and is configured and arranged to determine respective packet sizes of packets input from a bus. The scheduling circuit assigns each packet of the one or more packets for processing by one of the processing pipelines as a function of the respective packet size of the packet and the processing size associated with the one of the processing pipelines. |
US08775682B1 |
Data synchronization with eventual consistency
Computer-implemented methods for synchronizing data between a server and a client are provided. In one aspect, a method includes receiving a request from a client to synchronize data. The request includes a synchronization token that includes client recent synchronization signatures, each client recent synchronization signature representing a state of data synchronization on the client for a certain time period. The method also includes comparing each client recent synchronization signature with a corresponding server recent synchronization signature representing data on a server for the same time period. When the comparison indicates that the data on the client for the time period represented by the client recent synchronization signature is not synchronized with corresponding data on the server for the time period, then the method includes sending the data on the server for the time period to the client. Systems and machine-readable media are also provided. |
US08775678B1 |
Automated wireless synchronization and transformation
An automated wireless synchronization platform allows users to synchronize files and folders between devices, while transparently providing content transformation services. The content transformation services ensure that content is synchronized to target devices in the appropriate format, at a proper balance of size and quality to be ideally output on the target devices. |
US08775677B2 |
Transportable web application
The claimed subject matter provides a system and/or a method that facilitates re-locating a web application associated with a network service utilizing a portion of serialized data. The network service can be any collection of resources that are maintained by a party (e.g., third-party, off-site, etc.) and accessible by an identified user over a network (e.g., WAN, Internet, etc.). An interface component can receive a portion of serialized data with transparent structure related to an application specification. A hydrate component can create a web application independent of a network service based at least in part upon the serialized data, the web application has state within the network service. |
US08775674B2 |
Systems and methods for seamless communications recovery and backup using networked communication devices
A recovery network may provide communication recovery and backup services to an organization. The organization may comprise an internal network, such as Internet Protocol (IP) network. An alternative communication path communicatively couples communication devices of the organization to a public communication network. A recovery application operates on devices of the organization. The recovery network receives periodic availability indicators from devices within the organization. The recovery network identifies a communication endpoint of the intended recipient of a communication request using the availability indicators. |
US08775673B2 |
Routing a session initiation protocol (SIP) message in a communication system
An approach that provides routing a SIP message to a proxy server of a called party in a communication network is provided. In one embodiment, there is a routing tool that assists in routing a session initiation protocol (SIP) message to a called party. The routing tool, including a receiving component, receives a SIP message of a user making a call in the network. The routing tool further includes a parsing component configured to parse the message to determine the domain of the called party and performs a table lookup using the domain of the called party in order to: retrieve a destination code; embed the destination code into the message; and route the message based on the destination code. |
US08775670B2 |
Network rotameter station and service
Methods and systems for controlling network traffic in a network are disclosed herein and may include monitoring network traffic characteristics for a plurality of communication channels in a home network, by at least one processor within the home network. The at least one processor may re-route network traffic for at least a portion of the plurality of communication channels in the home network, based on analysis by the at least one processor of at least the monitored network traffic characteristics. Network traffic can be estimated for at least a portion of the plurality of communication channels in the home network by the at least one processor within the home network, based on the monitored network traffic characteristics. The at least one processor may re-route network traffic for a portion of the plurality of communication channels in the home network, based on the estimated network traffic. |
US08775669B2 |
Data communication systems and methods
Various embodiments of the present invention are directed to systems and methods for enabling software applications running on separate devices to exchange data via multiple data communication methods. In various embodiments, a data communication system is provided comprising multiple data communication devices running one or more software applications and communication manager middleware. In various embodiments, the data communication system permits the software applications to exchange data without knowledge of the actual method and/or protocol used to exchange a given set of data, and intelligently manage the exchange of data between software applications by, among other things, transmitting sets of data using a preferred communication method selected based on one or more message attributes or communication method attributes. |
US08775663B1 |
Data replication network traffic compression
An apparatus and method improving effective system throughput for replication of data over a network in a storage computing environment by using software components to perform data compression is disclosed. Software compression support is determined between applications in a data storage computing environment. If supported, compression parameters are negotiated for a communication session between storage systems over a network. Effective system throughput is improved since the size of a compressed lost data packet is less than the size of an uncompressed data packet when a lost packet needs to be retransmitted in a transmission window. |
US08775657B2 |
System and methods of streamlining media files from a dispersed peer network to maintain quality of service
Media content, including content suitable for streaming, is distributed to and accessible over a communications network by computer nodes within a peer storage network of computer nodes hosting respective content stores. Discrete portions of a content file are multiply distributed to and persisted in a distributed set of the content stores existing within the storage network such that various content stores persist subsets of the content file portions. A computer node retrieves the discrete portions of the content file from the various distributed content stores, depending on node availability, the particular discrete portions there available, and node and network performance factors sufficient to maintain a minimum quality of service, thereby enabling streaming presentation of the content file on the requesting computer node. |
US08775656B2 |
Strategies for integrating plural modes of content delivery
A hybrid system is described which allows an Internet Protocol (IP) set-top box to receive broadcast media content from a broadcast delivery infrastructure and on-demand media content from an IP delivery infrastructure. The broadcast delivery infrastructure can generate a quadrature amplitude modulated (QAM) signal, while the IP delivery infrastructure can generate an IP-based signal. The system uses a format converter to convert the QAM signal into a rights-protected signal expressed in an IP-compatible format. The format converter can be implemented as an OpenCable Unidirectional Receiver (OCUR) device. |
US08775646B2 |
Method and apparatus for WS-policy based web service controlling
Apparatus and method for WS-Policy based web service controlling. The apparatus includes: a service policy repository for storing a plurality of Web Service policies; a service policy agent for receiving a request for a Web Service policy from a service consumer and for obtaining conditioning information that influences the Web Service policy; and a service policy conditioner for selecting corresponding Web Service policy from the service policy repository in accordance with the conditioning information. The service policy agent sends the Web Service policy to the service consumer. The Web Service policy-based service differentiation method decouples the service differentiation mechanism from the service provision and service invocation mechanism and can provide policy support in accordance with other nonfunctional conditions besides service functions. |
US08775645B2 |
System and method for generating policies for a communication network
According to a broad aspect of a preferred embodiment of the invention, a network optimization method is provided. First, a set of input parameters describing a network and the users accessing it is analyzed. Input parameters may include such network-related information as network element inventory and topography, bandwidth capacity, routing information, etc. Customer-related inputs may include contact revenue, cost of service, non-performance penalties, and pattern-based customer importance profile and customer relationship management. Other inputs may include additional complex network and customer related business rules. Demands are estimated (530), graphed (530), and then the graph is pruned (580). |
US08775643B2 |
Realizing method of emergency call registration
A realizing method of emergency registration is disclosed. When the user equipment in the visited network initiates an emergency registration request, the method comprises the following steps: after P-CSCF of the visited network receives the emergency registration request sent from the user equipment, it forwards the message to S-CSCF of the home network. The S-CSCF sets the emergency registration expiration time according to the setting policy for emergency registration expiration time, includes it into the emergency registration response sent to the P-CSCF which retrieves the emergency registration expiration time from the emergency registration response and sends the message to the user equipment, which in turn retrieves the emergency registration expiration time from the emergency registration response. The factors of the setting policy for the emergency registration expiration time comprise: a type of the emergency call, the location information of the visited network and the location information of the user equipment. |
US08775633B2 |
Service information exchange in wireless network
Method, apparatus, and computer program product embodiments of the invention are disclosed to automatically advertise a change in service offering of a wireless first device in wireless networks. In an example embodiment of the invention, if there is a change in service offering of the first device that is connected to a wireless second device, the first device automatically generates a reassociation request frame and transmits it to the second device. In addition to the standard processing of the reassociation request frame, the second device considers the received reassociation request frame as a trigger to respond by transmitting a generic advertisement service request to the first device. The first device will then have an opportunity to transmit its updated and up-to-date service description to the second device in a generic advertisement service response frame. The second device buffers the first device's updated service description and makes it available to other wireless devices searching the network for services, to facilitate network selection. |
US08775631B2 |
Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
System and method of dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications are disclosed. One embodiment includes mobile device which throttles radio use based on user habit. The mobile device is able to throttle the radio between high and lowered power states based on the user habit of a user using the mobile device in mobile usage sessions relating to, for example, browsing activity or content streaming activity, where, the radio can be throttled among three power states when connected to a 3G wireless network or throttled among two power states when connected to a 4G or LTE network/pre-LTE. |
US08775630B2 |
Execution allocation cost assessment for computing systems and environments including elastic computing systems and environments
Techniques for assessing the cost of allocation of execution and affecting the allocation of execution are disclosed. The cost of allocation of execution between a first computing device (e.g., mobile device) and one or more computing resource providers (e.g., Clouds) can be determined during runtime of the code. A computing system can operate independently of the first computing device and a computing resource provider and provide execution allocation cost assessment. Execution allocation cost can be assessed based on execution allocation data pertaining to the first computing device and computing resource providers. Power consumption of a mobile device can be used as a factor in determining how to allocate individual components of an application program between a mobile phone and a Cloud. In an Elastic computing environment, external computing resources can be used to extend the computing capabilities beyond that which can be provided by internal computing resources. |
US08775624B2 |
Load-balancing and technology sharing using Lempel-Ziv complexity to select optimal client-sets
Optimal assignment of clients to client-sets, resources to resource-sets, and client-sets to resource-sets in a server farm allows for periodic re-balancing of the load as client usership and concurrent-user activity fluctuate. Unique combinations of clients are generated as candidate client-sets, and historical load measurements for clients in each candidate client-set are summed. Summed loads for the candidate client-sets are compared against available resources of resource-sets. An objective function is employed to identify optimal assignment of clients to client-sets, resources to resource-sets, and client-sets to resource-sets. |
US08775622B2 |
Computer-based cluster management system and method
There is provided a network system capable of effectively executing a process of submitted jobs, the size, the type, and the number of which are expected to change every moment. A management computer manages connection enabled/disabled information indicating whether a computer under its control can be connected to another computer and easiness information indicating the easiness of the connection with the another computer. The management computer searches for a computer whose latest connection enabled/disabled information managed by a local and another management computer indicates the connection enabled state and according to the easiness information on the computer specified, forms a cluster including the specified computer. The management computer updates the connection enabled/disabled information on the computer clustered, to the connection disabled state and upon completion of execution of the job, returns the connection enabled/disabled information on all the computers belonging to the cluster to the state before formation of the cluster. |
US08775618B2 |
Application platform with flexible permissioning
Systems and methods are provided for an application platform with flexible permissioning according to one or more embodiments. In one embodiment, an application platform with flexible permissioning comprises: a service provider server adapted to interact with an application development server and a client device over a network, wherein the service provider server is adapted to implement at least one application programming interface (API); one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the application platform with flexible permissioning to: maintain, at the service provider server, a profile associated with at least one application developer using the application development server; receive an API call from the application developer; authenticate the application developer and authorize the API call; assign an access level to the application developer based on the profile associated with the application developer; and control permissions given to the application developer to perform operations available based on the assigned access level. |
US08775616B2 |
Diagnostic tool for broadband networks
A local pre-transfer agent, that can be run on a local computer including RAM, one central processing unit, and one interface communicating with a data exchange network connected to the RAM by a communication bus. The agent includes a first function establishing a first predictive value of the data transmission or reception bandwidth limit from configuration data on the memory, a second function establishing a second predictive value of bandwidth limit from configuration data of the processing unit, a third function establishing a third predictive value of bandwidth limit from bus configuration data, a fourth function establishing a fourth predictive value of bandwidth limit from configuration data of the communication interface, and a hardware diagnostic function invoking each one these functions and establishing, from the resulting predictive values, a bandwidth reference value in accordance with predefined comparison rules for said predictive values. |
US08775614B2 |
Monitoring remote access to an enterprise network
Techniques to provide an improved representation of remote network access for a network administrator managing and controlling access to resources on an enterprise network. The representation indicates resources accessed by a remote computer or by a user of that computer and provides associated information useful for managing remote network access. To create the representation, multiple security associations formed between a remote client computer and resources on the enterprise network are associated with entity sessions, based on identical session identifiers generated for each security association within an entity session. The entity sessions may be aggregated into a to DirectAccess “connection” between the remote client computer and the enterprise network, based on an identity of the remote client computer. Resources accessed over the connection may be identified using a session identifier of each entity session so that security associations in that entity session may be matched with the resources. |
US08775613B2 |
Method and system for providing network monitoring, security event collection apparatus and service abnormality detection apparatus for network monitoring
A network monitoring system includes: a traffic information generating apparatus for generating traffic information. Further, the network monitoring system includes a security event collecting apparatus for collecting the traffic information generated by the traffic information generating apparatus by referring to pre-stored traffic information, grouping the collected traffic information, and then extracting service information. Furthermore, the network monitoring system includes a service abnormal condition detecting apparatus for detecting a port number of a transport layer of service information extracted from the security event collecting apparatus and the occurrence frequency of the transport layer, determining the continuity of the port number and the uniformity of the occurrence frequency, and displaying a service abnormal condition. |
US08775612B2 |
Instruction system, method, and recording control apparatus
A system including a first apparatus including a first processor, a first storage device, and a first communication interface and a second apparatus including a second processor and a second communication interface is provided. The first processor measures traffic of data communicated via a predetermined communication path in each of a plurality of time ranges, stores the data communicated in each of the plurality of time ranges in the first storage device, and performs a control processing to cause the first communication interface to transmit the measured data traffic to the second apparatus, and when the second processor receives the measured data, the second processor performs control processing to cause the second communication interface to transmit to the first apparatus designation information designating one of the plurality of time ranges in which protection target data not to be deleted from the first storage device has been communicated. |
US08775608B2 |
Accessing information from an internet user's web session
A pre-existing reference number on a legacy website provided by a legacy website provider may be supplemented with an enhanced reference number capable of identifying an internet user engaged in a web session on the legacy website. A check may be made to establish whether the internet user's computing device has a state object, including a web user ID (wUID) unique to the internet user's computing device. A processor may create an enhanced reference number based on the pre-existing reference number upon receipt of a request, and an association between the wUID and the enhanced reference number may be stored in a database accessible by the website provider. The enhanced reference number may be made available to the user by displaying it in place of the pre-existing reference number on the legacy website via the web session. |
US08775600B2 |
Storage system and data management method in storage system
Provided is a storage center including a storage subsystem for storing content data to be used by the user's home server, and a center server for controlling the storage subsystem. The center server aggregates the content recording reservation requests sent from several home servers, obtains content data from a content server and stores the content data in the storage subsystem at a designated recording start time, and notifies the user's home server that the recording reservation is complete. |
US08775594B2 |
Distributed network control system with a distributed hash table
A network control system that includes several controllers for managing several switching elements and a distributed hash table (DHT) formed across the controllers for storing data regarding the switching elements that is accessible by the controllers. Each hash table serves as a DHT instance. In some embodiments, the DHT instances of all controller instances collectively store one set of records that is indexed based on hashed indices for quick access. These records are distributed across the different controller instances to minimize the size of the records within each instance and to allow for the size of the DHT to be increased by adding other DHT instances. According to this scheme, each DHT record is not stored in each controller instance. In fact, in some embodiments, each DHT record is stored in at most one controller instance. |
US08775593B2 |
Managing organizational computing resources in accordance with computing environment entitlement contracts
Mechanisms for reserving computing resources of a data processing system are provided. These mechanisms generate one or more computing environment entitlement contract (CEEC) data structures, each CEEC data structure defining terms of a business level agreement between a contracting party and a provider of the data processing system. These mechanisms associate a set of computing resources with a CEEC data structure. The mechanisms then manage the set of one or more computing resources in accordance with the associated CEEC. Such management includes, in response to a contracting party failing to utilize the computing resources in the selected computing resource cohort for a specified purpose at approximately a specified level and pattern of intensity during approximately a specified period of time, all of which are identified in the CEEC data structure, then the CEEC data structure is invalidated or nullified. |
US08775591B2 |
Real-time information technology environments
Real-time data of business applications of an Information Technology environment is monitored to obtain information to be used in managing the environment. A business application includes processing collectively performed by a plurality of components of the environment. A component includes one or more resources, and therefore, in one example, the real-time data being monitored is associated with those resources. |
US08775589B2 |
Distributed network management system and method
A system and method for method of managing a network. Each of a plurality of servers includes an element management system (EMS) function for managing network elements within the network and a network management system (NMS) function for managing ones of the plurality of servers running the EMS function. An NMS function is activated on one of the servers when the plurality of servers shares a one network domain. When the network domain is divided into multiple domains, e.g. by a network failure, an NMS function is activated on at least one other one of the plurality of servers whereby each of the multiple network domains has at least one associated active NMS function. |
US08775588B2 |
Method and apparatus for transforming web service policies from logical model to physical model
A physical service and policy model of a service-oriented architecture system is generated from a logic model. Web service policies are transformed from the logical model to the physical model. The logical model includes a plurality of logical service components and logical dependency relationships among the logical service components. At least one of the logical service components has been specified with logical policies. The physical model includes physical components and physical dependency relationships associated with the service components and tire logical dependency relationships among the service components in the logical model. Effective logical policies are calculated for each of the logical service components and mapped to associated physical components in the physical model. |
US08775587B2 |
Physical network interface selection to minimize contention with operating system critical storage operations
An apparatus, program product and method dynamically select a physical network interface for use by an application running on a networked computer in a manner that attempts to minimize bandwidth contention between application-related operations and any operating system critical storage operations that may be initiated by an operating system resident on the same networked computer. The dynamic selection prioritizes at least one physical network interface that does not handle operating system critical storage operations over at least one physical network interface that does handle operating system critical storage operations, thus minimizing the likelihood of the application causing poor performance and/or failure of the operating system due to contention over limited network resources. |
US08775580B2 |
Hard zoning on NPIV proxy/NPV devices
Techniques are disclosed for zoning information to be shared with an NPIV proxy device or an NPV device such as a blade switch in a blade chassis. Doing so allows the NPV device to enforce zoning locally for the attached server blades and virtualized systems. The NPV device may learn zoning rules using Fiber Channel name server queries and registered state change notifications. Additionally, the NPV device may snoop name server queries to retrieve zoning information (or state change messages) without using the zoning change protocols and without consuming a Fiber Channel domain from the Fiber Channel fabric. |
US08775577B1 |
System and method for configuration management service
System and method for agentless computing system configuration management in networked environments. A configuration management service may be implemented as a service on a network with a standard network interface. A client may communicate with the service to specify a configuration for a target system, for example through a browser interface. The specified configuration may be stored by the service. The service may generate a package according to the specified configuration. The package may be delivered to the target system via the network. The package may then install the configuration, for example, one or more software, data, or other digital components, on the target systems in accordance with the specified configuration. The clients may request that the service verify and/or update the installed configuration on the target system. The service may, in response, generate an update package for the installed configuration. Target systems may include computer systems and virtual machines. |
US08775575B2 |
Differentiating image files in a networked computing environment
In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon. |
US08775574B2 |
Remote network management having multi-node awareness
Embodiments relate to systems and methods for remote network configuration management having multi-node awareness. A management server can communicate with a set of hosts in a network, each of which can have associated target machines such as computer clients. The configuration details of the set of hosts can be stored in a set of configuration files. The configuration files can specify, for example, processor, memory, hardware, I/O, and other resources of the hosts or targets associated with the hosts. When a systems administrator or other user wishes to push an updated configuration or send new data to the set of hosts, the management server can identify versions of software and other resources to transmit and install to hosts in the set of hosts based on their particular configuration details reflected in the corresponding configuration files(s), without having to manually identify versions to be distributed to individual hosts or resolve dependencies. |
US08775570B2 |
Geographic recommendation online search system
In one example implementation computer executable instructions are executed to provide an application program interface (API) to an online resource search system. The instructions are executed to receive a get recommendation (get rec) web enabled function call from a client network node to get recommendation information ordered by at least one of similarity, popularity, and distance. The function call can include a geographic location identifier, a radius identifier, a tag identifier, an item identifier, a global or local search flag, and a user identifier as parameters. The instructions can be executed to respond to the getrec function call by returning a number of recommendations, a number of uses, and a set of tags. |
US08775569B2 |
Method for updating the data of a navigation system
In a method for updating the data of a data storage device of a navigation system, updated data are transmitted by local data transmission stations and stored in the data storage device. To improve the usage opportunities of the navigation system, the updated data are transferred to a service provider. |
US08775566B2 |
File format for media distribution and presentation
A file format supports distribution, presentation, and storage of media presentations (“MPs”). A sequence of a MP is composed of segments of media data referred to by segmentIDs. Segments are defined as movie fragments, pursuant to the “ISO base media file format”. Multiple instances of a segment, each having a unique instanceID, are created by encoding the media data based on different encoding characteristics, referred to as encodingIDs. A sequence map box (“SMB”) stores the arrangement of a sequence's segmentIDs-to-instanceIDs, including encodingIDs. The SMB is distributed to a client-side media processing unit (“MPU”). Information regarding an instance selected for distribution to the MPU is encapsulated in an instance identifier box (“IIB”), along with the arrangement of instanceIDs for the segment, and distributed to the MPU. At the time of distribution and/or playback of the MP, the MPU interchange instances based on the contents of the SMB and/or the IIB. |
US08775565B2 |
Systems and methods for providing electronic document services
A system facilitates the procurement of one or more document services for a document directly from a document preparation software application used to create the document. The system activates a graphical user interface within the document preparation software application, contacts a server to identify available document services, and configures the graphical user interface based on the available document services. The system detects selection of one of the available document services and provides the document from the document preparation software application to one or more service providers for performance of the selected document service. |
US08775561B2 |
Expanding a social network by the action of a single user
Techniques for creating a social network are provided. Private relationships that are established (e.g., in the context of instant messaging) may become public by the action of a single user. Each user determines whether they want to be “social” to (or discoverable by) friends of the user's friends. For example, user A is a friend of (i.e., has established a relationship with) user B and user B is a friend of user C, but user A and user C are not friends of each other (i.e., user A and user C have not established a relationship with each other). If user C unilaterally takes an action, then user A is able to see that user C is a friend of user B. User A may then take further actions to attempt to establish a relationship with user C or otherwise contact user C. |
US08775560B2 |
Host-based intelligent results related to a character stream
Information may be presented to a user by using a first application to receive a character stream of one or more noncompletion characters. The noncompletion characters indicate that additional characters may be received. The character stream is exchanged with a host that analyzes the character stream to generate results that are responsive to the user's predicted interest. Results are received and displayed so that the user may select one of the results to launch a code segment related to the selected result. |
US08775556B1 |
Automated segmentation and processing of web site traffic data over a rolling window of time
Configurations for performing automated segmenting of tracking data included in an event tracking data communication over a rolling window of time are described. After an event tracking data communication is received associated with a time stamp, some configurations can segment the event tracking data communication according to one or more aggregation tables and store and/or update the included tracking data into one or more aggregation tables. In one aspect, a respective aggregation table corresponds to a predetermined period of time and includes corresponding event tracking data that is frequently searched/queried in reporting real-time analytics data. Some configurations continually sort the segments of tracking data within each of the aggregation tables to report the top segments of the tracking data from those aggregation tables in a real-time manner. |
US08775553B2 |
Managing signal delivery to a plurality of display platforms
Methods, apparatuses, and systems for managing signal delivery to a plurality of display platforms are disclosed. A system in accordance with one or more embodiments of the present invention comprises a centralized database, and a plurality of points of presence, each point of presence in the plurality of points of presence coupled to the centralized database, each point of presence comprising a management service and a data cache, wherein the management service maintains a data session with a client based on a comparison of information stored in the data cache and a current client request, the management service further comparing the current client request with the centralized database when the client is denied signal delivery from the system. |
US08775545B1 |
Image hosting for cross-platform display over a communication network
Data including information regarding a display of the host device may be received. A display of a client device may correspond to the display of the host device. Information regarding the display of the host device may be received and evaluated identify the images in the display. The identified images may be stored in memory and associated with a uniform resource locator (URL). A bitstream describing the display may be generated in which each image is referenced using the associated URL. The bitstream may then be provided to a client device, where rendering of the bitstream results in a display corresponding to the host device. Rendering the display may include retrieving the images associated with the URLs in the bitstream. |
US08775543B2 |
Methods, apparatuses, and computer program products for analyzing communication relationships
An apparatus may include a processor configured to store a record of communications with a remote device. The processor may be further configured to calculate one or more values representative of a communication relationship with the remote device over a period of time based at least in part upon the stored record of communications. The processor may be additionally configured to determine a communication relationship pattern based upon the one or more calculated values. |
US08775535B2 |
System and method for the transmission and management of short voice messages
A system and method for exchanging short voice messages between devices connected to a network is provided. This system includes server components that are capable of being connected to a network and support the transmission, receipt, storage, and playback of short voice messages and location information. This system can also include software clients installed on mobile devices, desktop computers, and/or other remote computers that are connected to a network. These clients may also support voice modification of transmitted audio. This method enables asynchronous communication such that users may transmit voice messages and/or locations to recipients and the recipients may be alerted that messages have arrived, even if their clients are not active. The system of the invention provides privacy to the users of the system by allowing for multi-level privacy and trust settings, and by concealing a sending client's IP address from the receiving client. |
US08775534B2 |
Method and system for e-mail enhancement
A method for enhancing an electronic message, referred to as an e-mail, upon receiving the same in the e-mail inbox of a user, the method includes the following steps: a local application, working with the e-mail inbox and extracting a set of data contained in the incoming e-mail, sends the data set to a remote server, receives a response from the remote server, and attaches the response to the incoming e-mail; and the remote server receives the data set sent by the local application, analyzes the data so as to identify specific elements, and sends the specific elements as a reply to the local application. The invention relates to the exchange of structured information by e-mail, and in particular to scheduling appointments, contact details, and monitoring tasks to be performed. |
US08775531B2 |
Completion processing for data communications instructions
Completion processing of data communications instructions in a distributed computing environment with computers coupled for data communications through communications adapters and an active messaging interface (‘AMI’), injecting for data communications instructions into slots in an injection FIFO buffer a transfer descriptor, at least some of the instructions specifying callback functions; injecting a completion descriptor for each instruction that specifies a callback function into an injection FIFO buffer slot having a corresponding slot in a pending callback list; listing in the pending callback list callback functions specified by data communications instructions; processing each descriptor in the injection FIFO buffer, setting a bit in a completion bit mask corresponding to the slot in the FIFO where the completion descriptor was injected; and calling by the AMI any callback functions in the pending callback list as indicated by set bits in the completion bit mask. |
US08775529B2 |
Bridging communications between communication services using different protocols
According to particular embodiments, a system for bridging communications includes agent servers that deploy monitoring agents into source communication services where the monitoring agents collect events in a native communication protocol of the source communication service. The agent servers select events for relaying and translate those events into a native communication protocol of the destination communication service. In addition, the agent servers deploy relay agents into destination communication services to relay the translated events to the destination communication service. |
US08775527B2 |
Collaborative email filtering
A first filter input is received from a first recipient of an email including a plurality of recipients. The first filter input is associated with the email. Further, the first filter input is propagated to at least another of the plurality of recipients of the email. |
US08775525B2 |
Method of transmitting electronic mail messages
A method and a device for transmitting electronic mail messages using a mobile wireless telephone network short message service are provided. An electronic mail message is transmitted by using the at least one short message which includes a short message header portion and a short message data portion. The short message data portion includes a user data header portion having: a) an identifying data field to identify that the short message data portion includes addressing information in accordance with RFC 822, and b) a length data field identifying a length of the addressing information in accordance with RFC 822. The addressing information in accordance with RFC 822 includes data fields differentiated from one another by keywords. |
US08775523B2 |
Method and system to intelligently route message requests
A computer-implemented method of routing an electronic message. The electronic message is received. A rank, within an organization, of a sender of the electronic message is determined. The electronic message is routed to a destination computer based upon the rank of the sender. |
US08775522B2 |
Transmission apparatus, reception apparatus, control method thereof, communication system, and program
A transmission apparatus transmits e-mail to a reception apparatus through a network by selecting one of a communication method via a mail server and a communication method without intervention of a mail server. This transmission apparatus generates the e-mail and transmits, to the reception apparatus, the e-mail and information representing the reply method of a transmittal confirmation request in response to the e-mail. The transmission apparatus receives, from the reception apparatus in accordance with the reply method, a transmittal confirmation result in response to the transmitted e-mail. |
US08775512B1 |
Distributing information over a network
Distributing information over a network is disclosed. Nodes are grouped into regions. Preferred nodes are designated. A source of content to be delivered to a preferred node using a preferred algorithm is indicated to at least one preferred node. At least one common node is assigned the preferred node as a relay of information. |
US08775507B2 |
Rest interface for job submission
Methods, systems, and computer program products for REST interface for job submission are provided for use at a computing system that includes one or more clients, one or more hosting programs and a cluster that includes a plurality of schedulers. The hosting program works between the clients on different platforms and the schedulers of the cluster system. The hosting program receives requests from the clients and then submits the requests to the schedulers. The communication between the hosting program and the schedulers may be based on .Net remoting protocol. Regardless of what platform the clients use, the hosting program maintains a same user interface to all the clients and the communication between the clients and the hosting program may be based on Representational State Transfer (“REST”). In addition, the hosting program also delegates identities to the clients when it receives multiple authentications from the schedulers. |
US08775503B2 |
Deltacasting for overlapping requests
Methods, apparatuses, and systems are provided for improving utilization of a communications system (e.g., a satellite communications system) when handling overlapping content requests. Embodiments use various techniques (e.g., dictionary coding techniques) to create fingerprints of content traversing the links of the communications system. These fingerprints are used to identify and exploit opportunities for using multicasting to share forward-link capacity by collapsing multiple overlapping requests for the same content via multiple content session streams into fewer session streams, including one or more shared session streams. |
US08775500B2 |
Distributed computing system having leader signaled agents to execute task after data acquisition completion
In a distributed computing system pertaining to the present invention, servers 2a to 2c constituting a cell achieve consensus using Paxos and execute a task using predetermined data in accordance with an instruction from a client 3. The server 2a, which acts as a leader, transmits a data acquisition promotion signal to the servers 2b and 2c, which act as agents. When the servers 2b and 2c do not store the data therein, they acquire the data and then transmit a data acquisition completion signal to the server 2a. After the server 2a acquires the data, when it receives the data acquisition completion signal from at least half of the servers constituting the cell, it transmits an execution signal for instructing execution of the task to the servers 2b and 2c. The servers 2b and 2c execute the task using the data. |
US08775496B1 |
Circuits and methods for calculating a cholesky decomposition of a matrix
Approaches for Cholesky decomposition of a matrix are described. A first circuit is configured to generate an inverse square root of an input value. A second circuit is configured to generate a product of a value output by the first circuit and provided at a first input and a value provided at a second input. A third circuit is configured to generate a difference between a value provided at the first input and a value provided at the second input of the third circuit. The first input of the third circuit is coupled to the output of the second circuit. A control circuit is configured to iteratively distribute a plurality of values of the matrix and the outputs of the first, second, and third circuits to the inputs of the first, second, and third circuits such that the Cholesky decomposition of the matrix is output by the third circuit. |
US08775495B2 |
Compression system and method for accelerating sparse matrix computations
The present invention involves a sparse matrix processing system and method which uses sparse matrices that are compressed to reduce memory traffic and improve performance of computations using sparse matrices. |
US08775491B2 |
Method and apparatus for reducing signal edge jitter in an output signal from a numerically controlled oscillator
A method for reducing signal edge jitter in an output signal from a numerically controlled oscillator includes processing an input signal with a first accumulator to provide a first accumulator output signal and continuing to use a carry in the processing of the input signal with the first accumulator in the event of an overflow. The method further includes processing the input signal with a second accumulator to provide a second accumulator output signal and rejecting a carry in the processing of the input signal with the second accumulator in the event of an overflow. The method further includes outputting the second accumulator output signal at an output of the numerically controlled oscillator and synchronizing the second accumulator using the first accumulator output signal. |
US08775488B2 |
System and method for data caching
Systems, methods, and computer readable mediums. A method includes receiving a first pre-caching rule from a policy database, receiving first data corresponding to the first pre-caching rule, and transmitting the first data to a file server cache (FSC) to be pre-cached on the FSC. The method may also include receiving a request for second data from the FSC and receiving a second pre-caching rule from the policy database. The second pre-caching rule specifies third data to be pre-cached on the FSC when the second data is requested. The method may include receiving the second data and the third data and transmitting the second data and the third data to the FSC. |
US08775476B2 |
System and method for creating, deploying, integrating, and distributing nodes in a grid of distributed graph databases
In a computer environment, a system and method is described that generally provides for creation of a distributed graph database, creation and deployment of nodes in a distributed graph database system, and integration of nodes into a set of distributed graph databases that include data nodes and edges that are: entities built using forms, relations, and relationships; immutable but evolvable through the addition of new data nodes or new edges joining the evolving data node to another data node; shareable and mergeable. |
US08775473B2 |
Software and metadata structures for distributed and interactive database architecture for parallel and asynchronous data processing of complex data and for real-time query processing
The various embodiments of the invention provide software and metadata structures for a data processing system and method, for applications such as marketing campaign management, speech recognition and signal processing. An exemplary system embodiment includes a first data repository adapted to store a plurality of entity and attribute data; a second data repository adapted to store a plurality of entity linkage data; a metadata data repository adapted to store a plurality of metadata modules, with a first metadata module having a plurality of selectable parameters, received through a control interface, and having a plurality of metadata linkages to a first subset of metadata modules; and a multidimensional data structure. |
US08775470B2 |
Method for implementing fine-grained access control using access restrictions
Disclosed is a data processing system-implemented method, a data processing system and an article of manufacture for controlling access to data stored on a database having relational objects for which access restrictions are defined for elements of the relational objects The data processing system-implemented method includes receiving a user request to access one or more relational objects of the database, identifying any access restrictions defined for the one or more relational objects, determining whether any identified access restrictions are applicable to the user request, determining whether any determined applicable access restrictions are to be enforced for the user request, and allowing access to the one or more relational objects based on the determined enforceable access restrictions. |
US08775466B2 |
Projection mining for advanced recommendation systems and data mining
A method for projection mining comprises performing a first projection on a first data object of a first type comprising a plurality of data entries and a second data object of a second type comprising a plurality of data entries to create definitions of attributes of the first data object and definitions of attributes of the second data object, performing a second projection of the definitions of the attributes of the first data object and the definitions of the attributes of the second data object into a space of meta-attributes based on semantic relationships among the attributes of the first data object and the second data object, learning relationships between the space of meta-attributes formed by the projections of the first data object and the second data object and a space of meta-attributes relating to new data not included in the first data object and the second data object, and generating at least one new data object of the first or second type based on the new data using the learned relationships. |
US08775463B2 |
Detection and display of semantic errors in a reporting tool
Various embodiments of systems and methods for providing a semantic guidance in a report are described herein. A mismatch is identified between a report object positioned at a location on the report and the area with which the location is associated. The mismatch is identified based on the metadata of the report object and the attribute of the area with which the location is associated. In one embodiment, the identified mismatch is displayed to a user in a tooltip. In one embodiment, if an attribute of an area of the report is changed, the mismatch is identified between the report object present in the area and the changed attribute. |
US08775461B2 |
Case search system, case database, case search apparatus, case search method, and program
A case search system for searching for a case that serves as a reference in a design or operation of a wireless network.The case search system includes a case database in which, for a case of design or operation of a wireless network, environment information that determines environmental characteristics of a wireless network in an area associated with the case is registered, and a case search unit that searches the case database for a case which serves as a reference using, as a search key, environment information that determines environmental characteristics of a wireless network in a target area which is a subject matter of the design or operation of the wireless network. |
US08775460B2 |
Managing changes to computer system
Automated system, method and program for managing a change to a computer program. One or more servers which the changed computer program accesses or uses to perform one or more functions are determined. One or more other computer programs in one or more other servers which access the one or more servers are determined. People responsible for the one or more servers and the one or more other computer programs and/or the one or more other servers that the changed computer program has been changed are notified. Another automated system, method and program for managing a change to a computer program is disclosed. One or more servers which the changed computer program accesses are determined by automatically querying configuration files of the changed computer program. People responsible for the one or more servers are notified that the changed computer program has been changed. |
US08775448B2 |
High-throughput message generation
Personalized messages are generated from a message template with high throughput by transforming data sources of the message template to key-value data structures that are stored in-memory and performing data look-ups using the in-memory key-value data structures. |
US08775445B2 |
Automated configuration of location-specific page anchors
A request is received via an input device of a computing device for a hypertext link to an item of web content rendered on a display of the computing device. It is determined whether a markup language (ML) document used to render the web content includes an existing page anchor proximate to an item reference within the ML document. The hypertext link is configured based upon the determination of whether the ML document includes the existing page anchor proximate to the item reference within the ML document. The configured hypertext link is returned in response to the request. |
US08775444B2 |
Generating a subset aggregate document from an existing aggregate document
Embodiments described herein are directed to generating a subset aggregate document from an existing aggregate document. Data pages in an existing aggregate document that satisfy node selection criteria are identified. An aggregate document slice is created that includes the data pages that satisfy the node selection criteria. Connections between the data pages from the existing aggregate document to the aggregate document slice are imported to form at least one continuous path with the data pages. |
US08775442B2 |
Semantic search using a single-source semantic model
Techniques for providing semantic search of a data store are disclosed. A similarity metric of a document comprising the data store to a concept represented in a semantic model derived at least in part from a reference source that includes content not included in the data store is determined. A relevance metric of a search query to the concept is computed. The similarity metric and the relevance metric are used to determine, at least in part, a ranking of the document with respect to the search query. |
US08775440B2 |
Method and system for adaptive prefetching
A cache server prefetches one or more web pages from an origin server prior to those web pages being requested by a user. The cache server determines which web pages to prefetch based on a graph associated with a prefetch module associated with the cache server. The graph represents all or a portion of the web pages at the origin server using one or more nodes and one or more links connecting the nodes. Each link has an associated transaction weight and user weight. The transaction weight represents the importance of the link and associated web page to the origin server and may be used to control the prefetching of web pages by the cache server. The user weight may be used to change a priority associated with a request for a web page. The user weight and transaction weight may change based on criteria associated with the origin server. |
US08775434B1 |
Resource catchment areas
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for determining a catchment area for a search result. In one aspect, a method includes receiving search log data specifying a resource that was referenced by search results that were presented to users, query locations for the resource, and whether the users interacted with the search results. A catchment area is determined for the resource based on the search log data, where the catchment area specifies a geographic region for which the resource is a candidate resource. In turn, the resource is indexed according to its catchment area. The catchment area is used in response to receiving a search query that is associated with a particular query location to select candidate search results that reference resources having catchment areas that include the particular query location. Final search results are selected from the candidate search results. |
US08775433B2 |
Self-indexing data structure
A machine based tool and associated logic and methodology are used in converting data from an input form to a target form using context dependent conversion rules, and in efficiency generating an index that may be utilized to access the converted data in a database. Once the data has been converted, an index data structure for each data object may be automatically generated that encodes one or more characteristics or attributes of the converted data so that an entity may access the data using the index structure. As an example, the one or more characteristics may include categories, subcategories, or other attributes of the data. |
US08775432B2 |
Indexing long word lists in databases
A vehicle navigation system having an input device, a storage device, a processor, and an output device. The storage device stores a database of geographical locations, such as the names of states, cities, streets, or countries. The database has a data list that includes data sub-lists, where the data sub-lists may have one or more data sub-list elements. Each data sub-list may have an assigned unique name. The data sub-lists also may be divided into parts, such that each part is assigned a unique name. The processor is operative to index the data sub-lists or the parts of a divided data sub-list. The processor may be further operative to search the database for a data sub-list element given an input from a user, and the output device may output one or more data sub-list elements from the database based on the search performed by the processor. |
US08775431B2 |
Systems and methods for hot topic identification and metadata
According to some embodiments, systems, apparatus, methods and computer program code are provided for receiving data from a plurality of remote data sources, the received data being associated with a plurality of search terms, analyzing the received data to identify at least a first trending search term, comparing the trending search term with a database of topical terms to determine whether the trending search term is relevant to a predetermined topic, querying a content database using the trending search term to identify a caption to be associated with the trending search term, and storing the trending search term and the caption in a database. |
US08775428B2 |
Method and apparatus for predicting object properties and events using similarity-based information retrieval and modeling
Method and apparatus for predicting properties of a target object comprise application of a search manager for analyzing parameters of a plurality of databases for a plurality of objects, the databases comprising an electrical, electromagnetic, acoustic and thermal spectral database (ESD), a micro-body assemblage database (MAD) and a database of image data whereby the databases store data objects containing identifying features, source information and information on site properties and context including time and frequency varying data. The method comprises application of multivariate statistical analysis and principal component analysis in combination with content-based image retrieval for providing two-dimensional attributes of three dimensional objects, for example, via preferential image segmentation using a tree of shapes and to predict further properties of objects by means of k-means clustering and related methods. By way of example, an evidence tree display showing a target object linked by a pathway to a predicted property comprises a similarity value, a speculation value and a model-based rank. |
US08775425B2 |
Systems and methods for massive structured data management over cloud aware distributed file system
Methods and arrangements for accommodating a query, directing the query to datasets, creating partitions and partitioning the datasets, and returning a response to the query, the response being structured in accordance with the created partitions. |
US08775424B2 |
System for creative image navigation and exploration
A system and method for assisting a user in navigation of an image dataset are disclosed. The method includes receiving a user's text query, retrieving images responsive to the query from an image dataset, providing for receiving the user's selection of a first feature selected from a set of available first features via a graphical user interface, providing for receiving the user's selection of a second feature selected from a set of available second features different from the first features via the graphical user interface, and displaying at least some of the retrieved images on the graphical user interface. The displayed images are arranged, e.g., grouped, according to levels and/or combinations of levels of the user-selected first and second features. |
US08775415B2 |
Recommending media programs based on media program popularity
A computer-implemented method includes receiving information expressing a user's interest in one or more media programs, obtaining information indicative of popularity for a plurality of media programs responsive to the received information by individuals other than the user, and transmitting one or more recommendations of media programs for display to the user, from the plurality of media programs that relate to the received information. |
US08775405B2 |
Method for identifying and ranking news sources
A search engine and/or news aggregator considers events and stories described in electronic documents, a location of a searcher/reviewer, and a situs associated with content of the document to determine how/if they should be presented to users. |
US08775400B2 |
Extracting facts from social network messages
Within a social network, users may submit various types of messages, such as personal messages to other users and status messages to be shared with all associated users. While these messages often relate to highly personal information such as opinions and personal emotions, such messages may also comprise one or more facts about a particular topic, such as a report of a weather condition in a particular location at a particular time. These facts may be identified in various messages, and may be stored in a fact store, such that when a user submits a query specifying a topic may receive from the fact store one or more facts that are responsive to the topic of the query. Additionally, user interfaces may be devised and provided to users submitting such messages, e.g., in order to reduce ambiguity and improve the reliable extraction of facts from messages. |
US08775398B2 |
Method and system for determining an order of presentation of search results
A method and system for determining an order of presentation of the search results is provided. An example system comprises a search request detector, a search engine, and an intermingler. The search request detector may be configured to receive a search request, and the search engine may be configured to determine search results based on the search request. The search results may comprise a first set of items in a first format and a second set of items in a second format. The number of items in the first set and the number of items in the second may reflect a predetermined target ratio and respective exposure percentages for items in the first format and items in the second format. The intermingler may be configured to determine an order of presentation of the search results in a list of search results based on the target ratio. |
US08775397B2 |
Database access acceleration
A system includes a request analyzer configured to receive a plurality of database requests and classify the plurality of database requests as transaction requester or non-transaction requests, and further configured to route the transaction requests to a transaction server for application against a transaction database, including write access to an identified portion thereof, and to route the non-transaction requests to a non-transaction server to thereby read data obtained from a non-transaction database. The system also includes an update manager configured to update the non-transaction database, based on the application of the transaction requests against the transaction database. |
US08775396B2 |
Method and system for searching a wide area network
A method and system for searching a wide area network that enables users to find the information they seek more quickly and more easily than prior art search engines are disclosed. Aspects of this disclosure include a process for making use of a user's prior search queries for query definition; a process for similarly making use of prior search queries by other users; a process for expanding and clarifying the meaning of queries; a process for including paid and other preferred results in an overall query result; and a process for using user evaluation data from previous search query results to identify results that should be included or removed from a current result. |
US08775394B2 |
Transactional failover of data sets
A network storage server implements a method to perform transactional failover of data sets. Multiple storage objects are organized into primary and secondary data sets, and a disaster recovery policy is configured for failing-over a primary data set to a secondary data set. A failover operation is defined for the disaster recovery policy. The failover operation includes multiple failover actions. During a failover situation, the failover operation is invoked to fail-over the primary data set. The failover operation is transactionally processed to ensure that all failover actions of the failover operation are performed in a single transaction. |
US08775393B2 |
Updating a perfect hash data structure, such as a multi-dimensional perfect hash data structure, used for high-speed string matching
A representation of a new rule, defined as a set of a new transition(s), is inserted into a perfect hash table which includes previously placed transitions to generate an updated perfect hash table. This may be done by, for each new transition: (a) hashing the new transition; and (b) if there is no conflict, inserting the hashed new transition into the table. If, however, the hashed new transition conflicts with any of the previously placed transitions, either (A) any transitions of the state associated with the conflicting transition are removed from the table, the hashed new transition is placed into the table, and the removed transitions are re-placed into the table, or (B) any previously placed transitions of the state associated with the new transition are removed, and the transitions of the state associated with the new transition are re-placed into the table. |
US08775392B1 |
Revision control and configuration management
In an illustrative embodiment, an apparatus, computer-readable medium, or method may be configured to manage a configuration. Files may be inserted into a file container in a computing environment and state information on the files may be stored. A change to a file in the file container may be received. A comparison result may be obtained by comparing a previous version of the file container to the file container after receiving the change to the file. The comparison result may be provided. |
US08775384B2 |
Adaptive quiesce for efficient cross-host consistent CDP checkpoints
A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative. |
US08775382B2 |
View maintenance on multiple tables located in different software components with the same primary keys
A method performed by a processor allows an individual to update or maintain a database including a core and an extension. The core contains core tables including general data and the extension contains extension tables including specific data. The core tables and the extension tables have the same primary keys and the specific data are an extension of the general data. The method includes receiving an input from the individual for modifying the database, modifying the core using the received input, and automatically modifying the extension to reflect the modifying of the core. |
US08775379B2 |
Ensuring partitioned dataset extended (PDSE) critical dataset redundancy (CDR)
In one embodiment, a system includes a critical partitioned dataset extended (PDSE) stored to memory of the system; logic adapted for protecting the critical PDSE by creating a copy of the critical PDSE, referred to as a PDSE copy; logic adapted for providing a critical dataset redundancy (CDR) task with exclusive access to the PDSE copy; logic adapted for providing a replacement critical PDSE by redirecting corralled connections to the PDSE copy; logic adapted for protecting the replacement critical PDSE by creating a copy of the replacement critical PDSE, referred to as a replacement PDSE copy; and logic adapted for providing the CDR task with exclusive access to the replacement PDSE copy. |
US08775378B2 |
Consistent backup of electronic information
Systems and methods are provided for performing backup operations while a user is using a device. In one implementation, a method is provided. A backup operation of data including a plurality of related items is initiated. Modifications to one or more items of the plurality of related items are monitored for during the backup operation. The backup operation is completed. If a modification occurred to one or more items, a second backup operation is performed for the modified items. |
US08775377B1 |
Efficient data backup with change tracking
The present disclosure provides for efficiently creating a full backup image of a client device by efficiently communicating backup data to a backup server using a change tracking log, or track log. A present full backup image can be created using a track log that is associated with a previous full backup image. The client device can determine whether files, which were included in the previous full backup image, have or have not changed using the track log. The client device can transmit changed file data to the backup server for inclusion in the present full backup image. The client device can also transmit metadata identifying unchanged file data to the backup server. The backup server can use the metadata to extract a copy of the unchanged file data from the previous full backup image for inclusion in the present full backup image. |
US08775376B2 |
Hybrid data backup in a networked computing environment
Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”. A storage solution is then determined based on the set of storage configuration parameters. In general, the storage solution identifies at least one local storage resource and at least one remote storage resource (e.g., a cloud storage resource) for backing up the portions of the set of data that are unique to the set of data. Once the storage solution has been determined, the unique portions of the set of data will be stored in accordance therewith. |
US08775375B2 |
Higher efficiency storage replication using compression
An improved scalable object storage system includes methods and systems allowing multiple clusters to work together. In one embodiment, there is a multi-cluster synchronization system between two or more clusters. The multi-cluster synchronization system uses variable compression to optimize the transfer of information between the clusters. Compression is used not only to minimize the total number of bytes sent between the two clusters, but to dynamically vary the size of the objects sent across the wire to optimize for higher throughput after considering packet loss, TCP windows, and block sizes. This includes both the packaging of multiple small files together into one larger compressed file, saving on TCP and header overhead, but also the chunking of large files into multiple smaller files that are less likely to have difficulties due to intermittent network congestion or errors. |
US08775374B2 |
Data synchronization system and data synchronization method
[PROBLEM TO BE SOLVED] To reduce a server load when synchronizing data between a client and a server.[SOLUTION] A client 10 sends a synchronization request 41 containing an anchor point to a server 20. The server 20 sends synchronization information 42 to the client 10, which synchronization information including change profile information on data updated between the anchor point and a boundary point and change profile information on a change log after the anchor point. Based on the synchronization information 42, the client 10 sends a download request 43 to the server 20, and the server 20 sends download information 44 to the client 10 in response to the download request 43. The client 10 registers data contained in the download information 44 to a client database 11. |
US08775368B1 |
Fine grained tiered storage with thin provisioning
A system for managing data includes providing at least one logical device having a table of information that maps sections of the logical device to sections of at least two storage areas. Characteristics of data associated with a one section of the logical device may be evaluated. The section of the data may moved between the at least two storage areas according to a policy and based on the characteristics of the data. The table of information is updated according to the movement of data between the at least two storage areas. Each of the at least two storage areas may correspond to a different storage tier, and each of the storage tiers may have different characteristic, such as speed of pools of storage devices within the tiers. A write target policy may be applied to store initial writes in a preferred location of the at least two storage areas. |
US08775367B2 |
Enterprise data as office content
Techniques for enterprise data as office content are described. An apparatus may comprise a client device having an application program, an insertion component and an update component. The insertion component may be arranged to insert source data elements from a data source into a document for the application program. The update component may be arranged to update the inserted data elements as the source data elements are modified. Other embodiments are described and claimed. |
US08775366B2 |
Optimization of analytical effectiveness in an analyst network
Optimization of analytical effectiveness of a plurality of analysts is achieved, in part, this through the routing of information elements (i.e., discrete quantities of content suitable for analysis by one or more analysts) to selected analysts in order to maximize achievement of analysis goals defined as part of an analysis plan. Within an analyst network, information elements are obtained by a routing controller from an information network. Based on the analysis goals provided to the routing controller, the routing controller selects specific analysts to receive the information elements. Various characteristics of individual or groups of analysts may be used to identify the selected analysts. In this manner, the present invention provides the ability to tailor the available analyst resources to best address the universe of available topics in the most efficient and productive manner. |
US08775364B2 |
Model-theoretic approach to data anonymity and inference control
A system and method for secure data management is presented. The method comprises receiving a query, performing the query and obtaining answers to it, creating certain formulas representing the answers; and determining whether there is a minimum number of distinct models of these formulas conjoined with the relevant anonymity predicates along with previous answers and general background knowledge, and when that number of models does not exist, suppressing the answers. In one aspect, the method further comprises creating formulas encoding the information conveyed by the answer; and combining the formulas encoding the information with prior information. |
US08775362B2 |
Methods and apparatus to construct histogram and wavelet synopses for probabilistic data
A disclosed example method involves generating a plurality of wavelet coefficient quantities. Each wavelet coefficient quantity is generated based on items represented by probabilistic data. Each wavelet coefficient quantity represents different ones of the items by multiplying corresponding wavelet vectors. The example method also involves determining an error measure associated with each of the plurality of wavelet coefficient quantities, and selecting at least one of the plurality of wavelet coefficient quantities based on its associated error measure. The method also involves displaying parameter information associated with the one of the plurality of wavelet coefficient quantities to represent the probabilistic data. |
US08775358B2 |
Method and apparatus for performing probabilistic inference and providing related solution methods
A method, apparatus and computer program product for performing probabilistic inference and providing related solution methods is presented. At least one state space (SS) is obtained for variables of interest relating to a problem of interest. None or more densities (D) defining pure functions over locations in the at least one SS are also obtained as is none or more kernels (K) defining a stochastic walk through the at least one SS. A virtual machine executes a stochastic walk through the state space to produce a solution for a problem of interest. |
US08775356B1 |
Query enhancement of semantic wiki for improved searching of unstructured data
Enhanced querying of unstructured data in enterprise knowledge base for improved collaboration and management of content is obtained by implementing the knowledge base using Semantic Wiki technology to afford semantic querying capability, and by annotating data in the knowledge base with reasoning supports that infer relations between different data using special properties that define transitive, symmetric and inverse of relations between data. |
US08775351B2 |
System and method for providing recommendations with a location-based service
A mobile application is provided that provides intelligent recommendations based on the knowledge of where the user has been, and what venues the user would like to visit. Further, such an application may be capable of determining where people in a user's social network have been and what venue locations these related users would like to visit. Also, in another implementation, the application may be capable of determining where people with similar tastes have been, and where they would like to go. Some or all of this information may be used by a mobile application that provides recommendations to a user. For instance, in one implementation, a user having a mobile device such as a cell phone wishes to locate a venue based on one or more parameters, and some or all of this information may be used to order or rank recommendations within the interface. |
US08775348B2 |
Method and system for automatic analysis of failure or state messages
This method for automatic analysis of failure or state messages generated by at least one complex system is characterized in that it comprises the steps for integrating said messages to a database of failure or state messages, and for determining with a computer, for each of said messages, an index of overall interest characterizing a degree of relevance of said message, on the basis of at least one parameter representative of a frequency of occurrence of similar messages in said database, and a correlation between said or each representative parameter and a predefined number of indexes of overall interest. A corresponding analysis system is also provided. |
US08775345B2 |
Recovering the structure of sparse markov networks from high-dimensional data
A method, information processing system, and computer readable article of manufacture model data. A first dataset is received that includes a first set of physical world data. At least one data model associated with the first dataset is generated based on the receiving. A second dataset is received that includes a second set of physical world data. The second dataset is compared to the at least one data model. A probability that the second dataset is modeled by the at least one data model is determined. A determination is made that the probability is above a given threshold. A decision associated with the second dataset based on the at least one data model is generated in response to the probability being above the given threshold. The probability and the decision are stored in memory. The probability and the decision are provided to user via a user interface. |
US08775344B2 |
Determining and validating provenance data in data stream processing system
Techniques are disclosed for determining and validating provenance data in such data stream processing systems. For example, a method for processing data associated with a data stream received by a data stream processing system, wherein the system comprises a plurality of processing elements, comprises the following steps. Input data elements and output data elements associated with at least one processing element of the plurality of processing elements are obtained. One or more intervals are computed for the processing element using data representing observations of associations between inputs elements and output elements of the processing element, wherein, for a given one of the intervals, one or more particular input elements contained within the given interval are determined to have contributed to a particular output element. In another method, intervals are specified, and then validated by comparing the specified intervals against intervals computed based on observations. |
US08775340B2 |
Detection and prediction of physiological events in people with sleep disordered breathing using a LAMSTAR neural network
Apparatus and methods are disclosed for generating and outputting physiological event results from physiological data related to a patient. Physiological event results include results predicting and/or detecting individual physiological events related to a medical condition of the patient. |
US08775337B2 |
Virtual sensor development
Embodiments include processes, systems, and devices for developing a virtual sensor. The virtual sensor includes one or more inference models. A decision engine utilizes an inference model associated with a mobile device to determine another inference model that is configured to accept physical sensor data from another mobile device. In this way, the virtual sensor can be developed for use with many mobile devices using initial inference models developed for a small number of mobile devices or a single mobile device. Embodiments also include methods to select mobile devices from which to request physical sensor data for virtual sensor input. Embodiments also include architectures that provide a library of virtual sensors. |
US08775334B1 |
Personalized campaign planner
Campaign messages may be prioritized for a given potential recipient by generating one or more learning structures associated with the campaign message. The learning structure(s) is then evaluated relative to the potential recipient to determine potential effectiveness of the campaign messages for the potential recipient. One such learning structure is a decision tree comprising a hierarchy of attributes associated with past recipients of the campaign message. Attributes associated with the potential recipient are then applied to the decision tree to obtain a metric of potential value of the campaign message to the potential recipient. |
US08775333B1 |
Systems and methods for generating a threat classifier to determine a malicious process
A computer-implemented method for generating a threat classifier is described. A parameter collection module is distributed to a plurality of client processing systems. The module comprises a set of rules to detect a behavior in the client processing systems. If one or more of the set of rules are satisfied, input data indicative of a plurality of client processing parameters is received. The input data is scaled to provide a plurality of parameter vectors. Each of the parameter vectors are classified as a threat or a non-threat. A machine learning process is performed on at least one of the classified parameter vectors. The threat classifier is generated from the machine learning process. The threat classifier is transferred to at least one client processing system. The threat classifier is configured to automatically determine if a process to be performed in a client processing system is malicious. |
US08775324B2 |
Compatibility scoring of users in a social network
The compatibility score of individuals in a social network is computed based on the compatibility of interests expressed by these individuals. The compatibility score between any two interests is calculated as the log of the estimated probability that a member of the social network will express both interests as his/her interests divided by the product of: (i) the estimated probability that a member of the social network will express the first of the two interests as his/her interest and (ii) the estimated probability that a member of the social network will express the second of the two interests as his/her interest. The compatibility score between two individuals is calculated as the sum of the compatibility scores between each interest appearing in a set of interests expressed by the first of the two individuals and each interest appearing in a set of interests expressed by the second of the two individuals. |
US08775323B2 |
Method and system for providing user tailored service using social network service
Provided are a method and a system for providing a user tailored service using a social network service. The method includes at a user terminal, receiving a transaction approval message from a credit card company server when a customer uses a credit card, and obtaining purchase information of the customer based on the received transaction approval message, and forming a social network for sharing the purchase information of the customer with predetermined persons having a social relationship, wherein the predetermined persons include friends, family members, and colleagues of the customer. |
US08775321B1 |
Systems and methods for providing notification of and access to information associated with media content
Certain embodiments provide a user notification such as a cue in a media content player. The notification or cue indicates that there is additional content available for a piece of media being played or about to be played. The notification or cue may be superimposed on content or provided separate from the media content being provided. In certain embodiments, the notification may provide a link for accessing the additional content the notification identifies. For example, the user may click on a notification to link to a dynamically-generated webpage comprising information retrieved about the media content being presented. |
US08775319B2 |
Secure content transfer systems and methods to operate the same
Secure content transfer systems and methods to operate the same are disclosed. An example system includes a content server to encrypt content according to an encryption key, and to transfer the encrypted content, the encryption key and a license to a client that supports a digital rights management technology. The example system further includes a broadcast system headend to determine the encryption key, wherein the broadcast system headend is physically separate from the content server, and a digital rights management license server to provide the license. |
US08775312B2 |
Alternative payment method for online transactions using interactive voice response
A method for performing payments in remote transactions between a buyer and a vendor is provided. The method includes receiving buyer information from a vendor's network outlet when the buyer indicates a desire to purchase a selection at a later time through an Interactive Voice Response (IVR) center; providing a token to the buyer; receiving information about the token from the buyer through the IVR center; verifying the information about the token; transferring funds from a buyer account to a vendor account. Also provided is a system for processing payments in remote transactions including an IVR center to: receive a request for token from a buyer to purchase products from a vendor, and to receive information about the product; provide the token to the buyer; access a database, the database including information from vendor's and buyer's accounts; transfer funds from buyer's account to vendor's account upon buyer confirmation. |
US08775311B2 |
Systems and methods for pre-authorized money transfer transactions
Methods and systems which allow one or more money transfer transactions to be implemented in a manner which provides additional certainty to a receiving party are provided. In one embodiment, a money transfer service authorizes a sender to transfer up to a certain amount of money. With this authorization, a money transfer transaction regiment is established, while the money transfer service maintains an accounting of the balance to insure that the balance remains below the pre-determined authorized amount. In another embodiment, a money transfer services utilizes reliability criteria to authorize a sender to transfer money with the money and service charge being collected after the transfer is completed. |
US08775310B2 |
Method, apparatus, and computer program product for allowing payment cards issued for only limited duration use to be reused multiple times to reduce the overall cost of issuance
A recyclable contactless payment device is issued to a first patron of a venue. Use of the contactless payment device at the venue by the first patron is facilitated, as is return of the contactless payment device by the first patron for recycling. The contactless payment device is deactivated and stored. The issuing and facilitation of use are repeated for at least a second patron of the venue, with the same recyclable contactless payment device. |
US08775307B2 |
Systems and methods for administering extended absence insurance
A computer receives rating information relating to proposed issuance of an insurance policy endorsement. The rating information relates to a proposed insured that employs a number of employees. The computer processes the rating information to generate a premium amount to be charged for the insurance policy endorsement. The endorsement is then issued. The endorsement may provide reimbursement to the insured for losses incurred by the insured arising from absence from work by one or more of the employees. |
US08775302B2 |
Method of and system for making purchases over a computer network
A method of and system for making purchases over a computer network using an ATM card or the like is provided. In accordance with the invention, a consumer transmits his ATM card number over the network to an on-line merchant. The on-line merchant then forwards the ATM card number to a third party contractor, such as a bank, that will oversee and authorize the transaction. Simultaneously or thereafter, the consumer transmits his PIN over the network to the third party contractor, who verifies that the ATM card number and PIN are valid. |
US08775301B2 |
Reducing risks related to check verification
Share of Wallet (“SOW”) is a modeling approach that utilizes various data sources to provide scores that describe a consumers spending capability, tradeline history including balance transfers, and balance information. Share of wallet scores can be used as a parameter for determining whether or not to accept and/or guarantee a check. The share of wallet can be used to calculate a risk value of a customer. For example, the scores can weight one or more factors related to the check writer and differentiate between a low-risk customer and a high-risk customer. |
US08775297B2 |
Automated trading system
A computer trading system includes a quote screening function configured to accept quotes specifying a quote amount in a price where the quote amount is greater than a minimum quote amount to produce screen quote messages and to reject quotes specifying a quote amount less than the minimum quote amount. A market view generator generates market views from those quotes which specify an amount greater than or equal to the minimum quote amount. An order screening function only-accepts orders specifying an amount less than a maximum transaction amount submitted in response to the market views to produce screened order messages. A transaction processor receives screened quote messages and screened order messages and matches appropriate messages with each other. The minimum quote amount is substantially equal to or greater than the maximum transaction amount whereby a screened order message can be matched entirely with one screened quote message. |
US08775296B2 |
Social based automatic trading of currencies, commodities, securities and other financial instruments
The present invention includes methods, apparatuses, systems, platforms and associated software applications for facilitating semi-automatic or automatic trading of Financial Assets based on the past or present trading activities of other traders (e.g. “Social Trading”, optionally implemented as a “Linked Account Trading System”). |
US08775295B2 |
Method and system for trading options
Device, system and method of trading an option. A method may include executing, by a computing device, at least one transaction of an option on an underlying asset using at least one of a bid price and an offer price, wherein a bid/offer spread between the bid price and offer price is the result of a calculation using first data corresponding to at least one parameter defining the option and second data corresponding to at least one current market condition relating to the underlying asset. |
US08775291B1 |
Systems and methods for enrichment of data relating to consumer credit collateralized debt and real property and utilization of same to maximize risk prediction
Systems and methods for enrichment of data associated with risk prediction. Data may be enriched by incorporating one or more aspects of consumer credit, collateralized debt, mortgage, real property, and loan data for use in systems, products, and methods relying on risk prediction models to maximize the effectiveness of the risk prediction. A time-series of consumer credit data may be provided to provide historical context to data. In a particular application, enriched data is leveraged to predict occurrence of an event relating to underlying assets of a structured security, such as a mortgage-backed security. Other systems and methods are disclosed. |
US08775288B2 |
Student venture management
A technique involves providing an actual cost commitment and investing a retail value of the actual cost commitment to a student venture, and receiving a return on the retail value and a return on actual cost that is equal to the return on the retail value minus the actual cost commitment. A system constructed according to the technique may include an investment decision engine, a portfolio management engine, and a venture scholar fund operations engine. The system may further include, for example, an authentication engine and a public information engine. |
US08775281B2 |
Color detection for tiered billing in copy and print jobs
Disclosed herein are a method and an image processing apparatus implementing the method for determining a billing structure for outputting documents. The method determines if pixels of image data of a document in device independent space are neutral (e.g., gray) or non-neutral (e.g., color), and, based on at least the determined neutral pixels in device independent space, determines a billable pixel count of color pixels in the image data. In one example, the determined billable pixel count of color pixels is based on at least both an estimated color count in device independent space and a determined pixel count in device dependent space. In another, pixels are tagged based on the neutral and/or non-neutral determination in device independent space, and, if the tag indicates that a selected pixel is color in device dependent space, the selected pixel is counted for the billable pixel count. |
US08775275B1 |
Inferring user intent based on network navigation paths
Paths followed by a plurality of devices are recorded. Devices of the plurality have sent content requests similar to a current content request. Behaviors exhibited by respective ones of the plurality of devices. The respective ones of the paths are grouped into intent groupings. A path followed by a device is assembled. The assembling the path comprises recording a plurality of content requests generated by the device prior to the current content request. An intent grouping matching the path is identified. The intent grouping is associated with an expected behavior. Content calculated to facilitate the expected behavior is identified. |
US08775272B2 |
System and method for enabling marketing channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards. |
US08775271B2 |
Method, medium, and system for automated creation of montage of matching products
Automated electronic document design systems and methods for generating matching customized product designs and preparing images of matching customized products in a montage for displaying to a user. |
US08775264B1 |
Spiral listing of items
Disclosed are various embodiments for rendering images of items in a ranked listing as a spiral on a network page. In one embodiment, a page builder ranks a listing of items according to a criterion provided by the user and generates a network page that depicts a spiral comprising a plurality of images, where each image is associated with one of the items in the ranked listing. The page builder arranges the images such that the image associated with the highest ranked item is located at the center of the spiral and the remaining images are arranged along a path of the spiral in decreasing order according to the ranking of the items associated with each of the respective remaining images. In addition, the page builder embeds a client side application that renders a shifting of the images when an image is selected by the user. |
US08775260B1 |
Apparatus and method for providing product location information to customers in a store
A system and method are disclosed for providing product location information within a store. The system comprises a first user interface fixed within the store and an inventory information unit coupled to the first user interface. The first user interface is configured to receive an input signal from a user related to the identity of a product within the store, to process the input signal and to provide a product inquiry signal in response to the input signal. The first user interface is further configured to receive a location information signal, and to provide an output signal in response to the location information signal. The inventory information unit comprises a database containing product location information and is configured to provide the location information signal to the first user interface after receiving the product inquiry signal from the first user interface. |
US08775259B2 |
Secure system and process for identification and identity registration
An identification and registration system including a scanner (J) for making a digital copy of an identity document (K), a server (A), transmission means for transmitting said digitized copy, character recognition means (E) for extracting from said digital copy information relating to identity, a database (B) for storing said digital copy and said identity-related information, a EPT/POS electronic payment terminal (I), transmission means for transmitting said identity-related information to said EPT/POS, a telephone (H) associated with a secret code, transmission means for transmitting the number of said telephone from said EPT/POS to said server, means for sending by said server to said EPT/POS a melody to be played, means (C) for calling said telephone by said server, and means of audio identification (C) by said server of said melody via said telephone call to said cellular telephone. |
US08775255B2 |
Internet business transaction processor
Targeted products are offered over a communications network. Product data for a plurality of products from a plurality of distributors for the products is received. Customer data from a plurality of customers comprising personal information about customers is received. Using the data, at least one user-specific product offering from the plurality of products is generated. Automated messages comprising the at least one user-specific product offering to the one or more customers are then sent. |
US08775252B2 |
Electronic media system
The invention is a digital information display system (10), comprised of an electronically controlled display (20), usually used to display advertising, A video camera (30) is used to detect one or more viewers in the audience who are paying attention (100) to the display (20), and if so which part of the display (30). Based on which part of the display has the viewers attention, the advertising displayed is adjusted in real-time and based on the viewer analysis to promote continued attention from the viewer. It is an advantage of the invention that the display is able to continuously present relevant advertising content, and with reduced delay, to an audience by using its passive observation and analysis capabilities. |
US08775247B2 |
Presenting personalized social content on a web page of an external system
A social networking system generates socially-relevant stories for a user based on other users (e.g., based on actions taken by other users) to whom the user is connected. These socially-relevant stories, including news stories, social advertisements, etc., may be presented on a web page within a domain of an external system that is different from the domain of the social networking system. When a web page from an external system is requested for a viewing user, the social content about other users who are connected to the viewing user may be provided by the social networking system for that viewing user. This personalized social content may be presented in a frame (e.g., an iframe) of the external web page rendered and provided for display to the viewing user. |
US08775246B2 |
System and method for enabling channel registration in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards. |
US08775245B2 |
Secure coupon distribution
Systems and method are provided for ensuring secure and validated coupon generation and distribution, and the prevention of fraudulent coupon printing. A Uniform Resource Locator (URL) is provided to a consumer, where the URL points to a dynamic coupon webpage presentable to the consumer, and where the URL includes a link identifier indicative of a coupon contained on the dynamic coupon webpage to be printed. The URL may include a member identifier (MID) that uniquely identifies the consumer and provides security regarding the printing of the coupon by limiting the number of prints that the consumer can make of the coupon. Furthermore, a token may be utilized in conjunction with the MID for additional security regarding the printing of the coupon by preventing the printing of the coupon if the token is invalid or expired. |
US08775244B2 |
Optimal scheduling of venue attendance based on queue size and location
Embodiments of the invention provide for managing attraction attendance levels through tracking current attendance levels and notifying patrons of incentives to alter their attraction selections in real-time. Examples identify an attraction queue that has a customer wait time failing to meet a threshold and determine a geographic relationship of a tracking device associated with a registered customer to the queue. Accordingly, an incentive is created from metadata associated with the queue and offered to the registered customer to urge the registered customer to take a queue balancing action. The queue balancing action may be leaving the queue if the customer wait time exceeds a threshold maximum wait time and the tracking device is within the queue, or choosing to enter the queue if the customer wait time is less than a threshold minimum wait time and the tracking device is outside of the queue. |
US08775238B2 |
Generating customized disincentive marketing content for a customer based on customer risk assessment
A computer implemented method, apparatus, and computer usable program product for managing a level of marketing disincentives directed towards a customer using a risk assessment score. In one embodiment, a risk assessment score for a customer associated with a retail facility is retrieved. The risk assessment score is analyzed to determine whether the customer is a desirable customer or an undesirable customer. In response to the risk assessment score indicating that the customer is an undesirable customer, aggressive marketing disincentives targeted to the undesirable customer are generated. If the risk assessment score indicates the customer is a desirable customer, marketing incentives targeted to the desirable customer are generated. |
US08775237B2 |
System and method for measuring and reporting user reactions to advertisements on a web page
In one embodiment, a system comprises a first element viewable on a web page on or near an advertisement and soliciting user reactions concerning the advertisement; and a second element displayed in response to selection of the first element, soliciting one or more user reactions concerning the advertisement, and displaying the advertisement or a substantial duplicate thereof. In one embodiment, a method comprises collecting user reactions concerning an advertisement on a web page and presenting a report of the reactions comprising a bar graph with each bar representing a characteristic of the advertisement. In one embodiment, a method comprises collecting user reactions concerning advertisements included on web pages and presenting a report of the reactions comprising a graph including multiple icons, each representing an advertisement; an axis corresponding to a quantity of reactions; and an axis corresponding to ratings associated with the reactions for characteristics of the advertisements. |
US08775231B1 |
System and method for identifying and presenting business-to-business sales opportunities
The present invention relates to a system and method for efficiently identifying the sales opportunities in a business-to-business market environment. It provides a computer-implemented predictive sales intelligence system and method for identifying sales opportunities. The present invention is a computer implemented system and method for efficiently identifying reliable purchase pattern profiles through scientific analysis of customer data. It includes a system and method for calculating a customer's purchase profile, clustering customers based on similarity of their purchase profile, and efficiently providing a reliable set of opportunities including lost sales (retention) and cross-selling (wallet share expansion) opportunities. It uses this reliable estimate of sales opportunities to retain and expand wallet share for customers. |
US08775229B1 |
Method of correcting a project schedule
Automated methods for correcting the remaining portion of a project schedule in order to reflect actual performance to date are provided. For some embodiments, the remaining schedule is corrected by applying factors that are extrapolated from the actual completion times of project milestones in comparison to the scheduled times for the same milestones. This approach results in a project schedule that is more accurate, and thus enables improved management of the project. |
US08775228B2 |
Methods and apparatus for agreement-based automated service provisioning
Techniques are disclosed for automated provisioning of resources to fulfill a service agreement. For example, a technique for use by a service provider for automatically provisioning one or more resources based on at least one service agreement offer of a service client comprises the following steps/operations. The at least one service agreement offer is obtained. At least one implementation plan template is obtained. A provisioning description is then automatically derived in accordance with the service agreement offer and the implementation plan template, wherein the provisioning description is usable for configuring one or more resources such that a service may be provided to the service client. |
US08775223B2 |
System and method for managing seat reservations
This invention relates to an electronic means by which people can select the exact seat or seats they want for any type of event or reserve an appointment for any activity. More specifically, a customer or a ticket re-seller or a venue operator can go, for example, to the internet and select the event or activity for which he wants a ticket or tickets or reserve a time and reserve and order the exact seat or seats or the time of his choosing directly online. The seat or seats or reserved time he selects is then removed from the inventory for that activity or event and made not available for any other buyer and such is so indicated by a graphical representation or other such indicator on the online map or picture representing availability of seating or time for that event. |
US08775220B2 |
Method and system for estimating economic losses from wind storms
The present invention relates to systems and methods for estimating economic losses from wind storms. Accordingly, provided herein are methods estimating roughness length of an area surrounding a structure, methods calculating local wind speed at a structure, methods of estimating wind pressure on a structure, and methods of calculating the insurability of a structure. Also provided are systems and computer-readable storage media configured for performing the disclosed methods. |
US08775218B2 |
Transforming data for rendering an insurability decision
Transformation of disparate data for use in rendering a decision involving a potentially insurable risk. An Extract, Transform, Load (ETL) process extracts the data and converts it from a plurality of formats into a standard format for processing. A heuristic engine inferentially processes the converted data to identify information relevant to the decision to be rendered. A consolidation and presentation engine generates presentable knowledge from the relevant information and then presents the knowledge to a decision-making entity for rendering the decision. And an optimization feedback process monitors one or more actions on the presented knowledge by the decision-making entity and adjusts one or more of the ETL process, the heuristic engine, and the consolidation and presentation engine as a function of the monitored actions. |
US08775214B2 |
Management method and system for a user
The invention provides a system, method, machine readable program and a graphical user interface for managing multiple accounts associated with a user. The method includes receiving a first set of information associated with identification of a user, in response to the first set of information, identifying a second set of information relating to a financial account associated with the user, the financial account being associated with a financial institution, in response to the first set of information. The method also includes identifying a third set of information relating to a health account associated with the user, the health account being associated with a healthcare institution. A fourth set of information is generated based upon the second set of information and the third set of information. The method also includes sending a signal representative of the fourth set of information. The signal may be sent to the user or a designee of the user. |
US08775213B2 |
Method, apparatus, and system for reading, processing, presenting, and/or storing electronic medical record information
A method for accessing, processing, presenting, and/or storing electronic medical record (EMR) information on a touch-sensitive display includes reading EMR information, displaying at least a portion of the EMR information on a touch-sensitive sliding timeline, detecting finger swipe or similar gestures, and scrolling the sliding timeline so that a different portion of the EMR information is displayed chronologically on the touch-sensitive sliding timeline. The resolution of the timeline can be expanded or collapsed in response to pinch gestures. The timeline is divided into a columns, each column including icons representing medical related events. A second timeline having a different time resolution from the first timeline is used for navigating the medical related events. Different levels of detail regarding the medical related events can be viewed in different detail panes. An EMR access device and system are also disclosed, which are configured to access and present EMR information. |
US08775206B2 |
Healthcare privacy violation detection and investigation system and method
A method for detecting privacy violations of patient personal healthcare information (PHI) can include receiving audit logs from all systems within a healthcare facility. These audit logs are generated any time PHI is accessed. The Healthcare Privacy Violation Detection System (HPV-DS) compares these generate audit logs to prior access history of the employee or authorized user that generated the audit log. If any field in the generated audit log is different from the authorized user's prior access history, the risk of a privacy violation is assessed and a risk score is assigned. For audit logs that differ from past access history enough, an alert turned on and the audit log is flagged for administrators to review. |
US08775204B2 |
System and method for enabling group channels in an IP marketplace
A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards. |
US08775203B2 |
Ice diet system and methods of implementing same
Embodiments of the present invention relate to system and method of dieting, wherein safe increases to an individual's basal metabolic rate accelerates the burning of fat, and may be used as a primary method of weight loss and/or as a complementary technique to the success of other weight loss strategies. In one embodiment of the present invention, a method of weight loss comprises measuring a temperature and quantity of a consumable product; determining a gross caloric value of the consumable product; calculating an energy to be expended during consumption of the consumable product by an individual; calculating a net caloric value of the consumable product, wherein the net caloric value is equal to a gross caloric value of the consumable product less the caloric energy expended by an individual in consuming the consumable product; and tracking the net caloric value over a predetermined time interval. |
US08775201B2 |
Data logger
A data logging module and a method of monitoring a medical warming cabinet is disclosed. A temperature of the heating chamber and a state of a door of the heating chamber are sampled at predetermined intervals and recorded as data packets on a memory device. A display may provide a message when the memory device is reaching capacity. Moreover, a selected of the data packets may be analyzed (such as the data packets excluding the data packets when the door is open) for the generation of a report. The data packets from the memory device may be transferred from the memory device to an external memory device as necessary. |
US08775195B2 |
Systems and methods for assets, personnel, and travel information and risk management
A system(s) and method(s) for providing asset, personnel, and travel information accumulation, analysis, and reporting for improved risk assessment and management are disclosed. In various embodiments, risk assessments(s) may be provided and may include receiving intelligence from at least one intelligence source, receiving information about one or more asset(s), and generating a risk assessment report. Various embodiments may include receiving intelligence from at least one intelligence source, receiving asset information, and generating a risk assessment report based on the intelligence and a personnel or employee profile. Further, various embodiments methods and systems may provide travel information to a consumer, by for example, acquiring information from at least one information source, characterizing the acquired information by its pertinence to travel, transforming the characterized travel information into a useable format, applying rules to this transformed travel information in connection with the consumer-specific travel profile, and delivering a report to the consumer. |
US08775191B1 |
Efficient utterance-specific endpointer triggering for always-on hotwording
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for classifying utterances. The methods, systems, and apparatus include actions of obtaining an audio input signal representing an utterance of a user. Additional actions may include determining that a shape of at least a portion of the audio input signal matches a shape of at least a portion of an audio trigger signal corresponding to a keyword. Further actions may include, based at least on determining that the shape of at least the portion of the audio input signal matches the shape of at least the portion of an audio trigger signal corresponding to the keyword, classifying the utterance as a trigger utterance that corresponds to the keyword. |
US08775190B2 |
Voice-operated control circuit and method for using same
A voice-operated control circuit and method for using the voice-operated control circuit in connection with a toy vehicle. The voice-operated control circuit contains an audio detector, such as a microphone, to detect audible sound signals, and an integrated circuit that determines the duration of the audible sound signals received by the audio detector. At a user-defined time and based on the audible sound signals received, the integrated circuit determines and controls the duration of operation of various components of the toy vehicle, such as a motor, lights and/or sounds. |
US08775187B2 |
Voice authentication system and methods
A method for configuring a voice authentication system comprises ascertaining a measure of confidence associated with a voice sample enrolled with the authentication system. The measure of confidence is derived through simulated impostor testing carried out on the enrolled sample. |
US08775186B2 |
Method for emotion communication between emotion signal sensing device and emotion service providing device
Provided are a method for emotion communication to share a user's emotions between an emotion signal sensing device and an emotion service providing device. The method for emotion communication includes: the emotion signal sensing device's sensing biological and environmental information of the user and generating an emotion signal and emotion information of the user based on the biological and environmental information; establishing an emotion communication connection with the emotion service providing device; transmitting the emotion signal and the emotion information to the emotion service providing device by the emotion communication connection establishment; and breaking the connection with the emotion service providing device. |
US08775185B2 |
Speech samples library for text-to-speech and methods and apparatus for generating and using same
A method for converting translating text into speech with a speech sample library is provided. The method comprises converting translating an input text to a sequence of triphones; determining musical parameters of each phoneme in the sequence of triphones; detecting, in the speech sample library, speech segments having at least the determined musical parameters; and concatenating the detected speech segments. |
US08775183B2 |
Application of user-specified transformations to automatic speech recognition results
Textual transcription of speech is generated and formatted according to user-specified transformation and behavior requirements for a speech recognition system having input grammars and transformations. An apparatus may include a speech recognition platform configured to receive a user-specified transformation requirement, recognize speech in speech data into recognized speech according to a set of recognition grammars; and apply transformations to the recognized speech according to the user-specified transformation requirement. The apparatus may further be configured to receive a user-specified behavior requirement and transform the recognized speech according to the behavior requirement. Other embodiments are described and claimed. |
US08775182B2 |
Method and apparatus for speech segmentation
Machine-readable media, methods, apparatus and system for speech segmentation are described. In some embodiments, a fuzzy rule may be determined to discriminate a speech segment from a non-speech segment. An antecedent of the fuzzy rule may include an input variable and an input variable membership. A consequent of the fuzzy rule may include an output variable and an output variable membership. An instance of the input variable may be extracted from a segment. An input variable membership function associated with the input variable membership and an output variable membership function associated with the output variable membership may be trained. The instance of the input variable, the input variable membership function, the output variable, and the output variable membership function may be operated, to determine whether the segment is the speech segment or the non-speech segment. |
US08775181B2 |
Mobile speech-to-speech interpretation system
Interpretation from a first language to a second language via one or more communication devices is performed through a communication network (e.g. phone network or the internet) using a server for performing recognition and interpretation tasks, comprising the steps of: receiving an input speech utterance in a first language on a first mobile communication device; conditioning said input speech utterance; first transmitting said conditioned input speech utterance to a server; recognizing said first transmitted speech utterance to generate one or more recognition results; interpreting said recognition results to generate one or more interpretation results in an interlingua; mapping the interlingua to a second language in a first selected format; second transmitting said interpretation results in the first selected format to a second mobile communication device; and presenting said interpretation results in a second selected format on said second communication device. |
US08775174B2 |
Method for indexing multimedia information
It comprises analyzing audio content of multimedia files and performing a speech to text transcription thereof automatically by means of an ASR process, and selecting acoustic and language models adapted for the ASR process at least before the latter processes the multimedia file, i.e. “a priori”.The method is particularly applicable to the automatic indexing, aggregation and clustering of news from different sources and from different types of files, including text, audio and audiovisual documents without any manual annotation. |
US08775167B2 |
Noise-robust template matching
Noise robust template matching may be performed. First features of a first signal may be computed. Based at least on a portion of the first features, second features of a second signal may be computed. A new signal may be generated based on at least another portion of the first features and on at least a portion of the second features. |
US08775163B1 |
Selectable silent mode for real-time audio communication system
A facility for conducting a real-time conversation in which the selected one of a number of participants utilizes a silent mode is described. Remark spoken by participants other than the selected one are transformed into text and displayed for the selected participant. Remarks entered textually by the selected participant are transformed into speech and played audibly for participants other than the selected one. |
US08775155B2 |
Machine translation using overlapping biphrase alignments and sampling
A system and method for machine translation are disclosed. Source sentences are received. For each source sentence, a target sentence comprising target words is generated. A plurality of translation neighbors of the target sentence is generated. Phrase alignments are computed between the source sentence and the translation neighbor. Translation neighbors are scored with a translation scoring model, based on the phrase alignment. Translation neighbors are ranked, based on the scores. In training the model, parameters of the model are updated based on an external ranking of the ranked translation neighbors. The generating of translation neighbors, scoring, ranking, and, in the case of training, updating the parameters, are iterated with one of the translation neighbors as the target sentence. In the case of decoding, one of the translation neighbors is output as a translation. The system and method may be at least partially implemented with a computer processor. |
US08775153B2 |
Transitioning from source instruction set architecture (ISA) code to translated code in a partial emulation environment
In one embodiment, a processor can operate in multiple modes, including a direct execution mode and an emulation execution mode. More specifically, the processor may operate in a partial emulation model in which source instruction set architecture (ISA) instructions are directly handled in the direct execution mode and translated code generated by an emulation engine is handled in the emulation execution mode. Embodiments may also provide for efficient transitions between the modes using information that can be stored in one or more storages of the processor and elsewhere in a system. Other embodiments are described and claimed. |
US08775149B2 |
Method and system for implementing parallel execution in a computing system and in a circuit simulator
A method and mechanism for implementing a general purpose scripting language that supports parallel execution is described. In one approach, parallel execution is provided in a seamless and high-level approach rather than requiring or expecting a user to have low-level programming expertise with parallel processing languages/functions. Also described is a system and method for performing circuit simulation. The present approach provides methods and systems that create reusable and independent measurements for use with circuit simulators. Also disclosed are parallelizable measurements having looping constructs that can be run without interference between parallel iterations. Reusability is enhanced by having parameterized measurements. Revisions and history of the operating parameters of circuit designs subject to simulation are tracked. |
US08775147B1 |
Algorithm and architecture for multi-argument associative operations that minimizes the number of components using a latency of the components
An algorithm and architecture are disclosed for performing multi-argument associative operations. The algorithm and architecture can be used to schedule operations on multiple facilities for computations or can be used in the development of a model in a modeling environment. The algorithm and architecture resulting from the algorithm use the latency of the components that are used to process the associative operations. The algorithm minimizes the number of components necessary to produce an output of multi-argument associative operations and also can minimize the number of inputs each component receives. |
US08775145B2 |
System and apparatus for modeling the behavior of a drilling assembly
A method for drilling a borehole includes obtaining, while drilling the borehole, sensor data for the drilling assembly, analyzing, while drilling the borehole, the sensor data using a drilling behavior model to obtain results, and adjusting the drilling of the borehole based on the results. The drilling behavior model models drilling of the borehole using a distance drilled, a number of touch points, a number of bend angles, a number of external moments, a number of lengths of distributed weights, a lateral displacement of a center of the borehole at a bit, at least one vertical displacement from the center of the borehole, at least one angular offset, at least one force, and at least one mass per unit length. |
US08775144B2 |
Constrained pressure residual preconditioner for efficient solution of the adjoint equation
A method, system and computer program product is disclosed for using a constrained pressure residual (CPR) preconditioner to solve adjoint models. A linear system of fluid flow equations comprising a plurality of variables that represent fluid flow properties in a geological formation of a subterranean reservoir is provided. Matrix (Ã)T, which comprises a transpose of a Jacobian matrix associated with the linear system of fluid flow equations, is constructed. A constrained pressure residual preconditioner MCPRA−1 is constructed responsive to the matrix (Ã)T. Matrix equation (Ã)Ty=d is then solved using the constrained pressure residual preconditioner MCPRA−1. |
US08775141B2 |
System and method for performing oilfield simulation operations
The invention relates to a method of simulating operations of an oilfield, which has process facilities and wellsite operatively connected, each wellsite having a wellbore penetrating a subterranean formation for extracting fluid from an underground reservoir. The method steps include selecting simulators for modeling the oilfield with at least one of the simulators having functionality to model fluid injection, selectively coupling each of the simulators according to a predefined configuration, and modeling an injection operation of the oilfield by selectively communicating between the simulators. |
US08775139B2 |
Method for simulating fluid flow and recording medium for performing the method
A method for simulating fluid flow includes: discretizing a space in which a fluid flows into a regular lattice; assuming that fluid particles repetitively move and collide in the lattice; deriving a univariate polynomial equation by comparing the n-th (n is a non-negative integer) order momentum of velocity between the Maxwell-Boltzmann distribution and the discretized Maxwell-Boltzmann distribution; calculating the weight coefficients corresponding to the discrete velocities of the fluid particles based on the univariate polynomial equation; and deriving a lattice Boltzmann model using the weight coefficients. A lattice Boltzmann model with superior stability and accuracy may be derived easily. |
US08775138B2 |
Methods for handling withdrawal of streams from a linear programming model developed from a thermodynamically-based reference tool
The invention relates to linear programming methods and systems. The linear programming model has at least one input streams, at least one intermediate stream, and at least one output stream. The linear programming model is utilized for simulating the effect of withdrawing at least a portion of an intermediate steam on one or more of the model's outputs. |
US08775133B2 |
Personalized fit and functional designed medical prostheses and surgical instruments and methods for making
Methods, devices and systems for virtual, remote and real-time collaboration between surgeons and engineers using system learning and intelligent and timely disbursement of design and performance information to engineering teams embarking on the preliminary design event of a personalized orthopedic implant or personalize surgical instrument utilizing a case-based reasoning expert system. Additive manufacturing technology and statistically controlled advanced manufacturing processes quickly produce personalized medical devices worldwide. |
US08775126B2 |
Mobile device and method for performing black box function
A mobile device and method for performing a black box function are provided. Each of a plurality of connection ports of the mobile device are electrically connected to an external entity. When a voltage exceeding a given critical value is applied through the connection port, a detection history recording unit of the mobile device not only checks detection time information, but also checks terminal ID information about the connection port. Then the detection history recording unit records the terminal ID information and the detection time information. Therefore, when any trouble or fault occurs in the mobile device, it is possible to easily find out the cause of such trouble or fault though data recorded in the detection history recording unit. |
US08775125B1 |
System and method for improved processing performance
The invention is directed to a computer-implemented method and system for improving processing performance for a group of computing resources, the method implemented on at least one computer having a processor and accessing at least one data storage area. The method comprises implementing the processor for calculating a benchmark for each computing resource in the group of computing resources and normalizing the benchmark across the group of computing resources to determine a number of performance units for each computing resource. The method additionally includes providing a graphical user interface for facilitating visual comparison for comparing processing performance indicators for multiple computing resources in the group of computing resources and reconfiguring at least some of the computing resources represented on the graphical user interface based on the comparison. |
US08775120B2 |
Method of data synthesis
Methods, devices, and computer programs are presented for consolidating overlapping data provided by multiple sources. One method includes operations for associating a plurality of devices to a user, each device operable to capture data associated with the user, and for receiving, from the plurality of devices, captured data about a first activity associated with a first period of time. Additionally, the method includes operations for detecting that the received captured data from two or more devices provide overlapping information about the first activity, and for evaluating one or more rules for consolidating the overlapping information to produce consolidated data. The consolidated data provides a unified view of the first activity during the first period of time. The consolidated data is stored in permanent storage and made available for presentation to the user. |
US08775118B2 |
Angle detection apparatus
According to one embodiment, in the angle detection apparatus, the first A-D converter unit receives the first signal, and performs analog-to-digital conversion of the first signal. The second A-D converter unit receives the second signal orthogonal to the first signal, and performs analog-to-digital conversion of the second signal. The first delay circuit receives a third signal outputted by the first A-D converter unit, and performs a phase adjustment of the third signal. The second delay circuit receives a fourth signal outputted by the second A-D converter unit, and performs a phase adjustment of the fourth signal. The phase detection adjustment unit monitors phases of signals outputted by the first and second delay circuits, and gives phase adjustment commands to the first and second delay circuits, when a phase shift occurs. |
US08775114B2 |
Method and apparatus for determining phase sensitivity of an accelerometer based on an analysis of the harmonic components of the interference signal
A method and apparatus for determining phase sensitivity of an accelerometer based on an analysis of the harmonic components of the interference signal, which can estimate phase lags of an accelerometer through an analysis of the interference signal obtained using a single photo-detector when the accelerometer moves in sinusoidal motion with an initial phase of vibration. The method comprises the steps of obtaining an interference signal in a time domain generated from a signal reflected by an accelerometer and a fixed mirror using a single photo-detector; transforming the interference signal in the time domain into a signal in a frequency domain including a plurality of harmonic signals by Fourier transform; and determining the phase sensitivity of the accelerometer using initial phase of vibration displacement of the accelerometer, which is included in the interference signal in the frequency domain. |
US08775113B2 |
Automated portable media device testing system
Circuits, methods, and apparatus for testing media devices. One example provides a test system for testing a number of media players. One or more computers can control the testing of the media players and collect results. Each media player tested may be connected to a computer via an adapter. The adapter may include a connection control circuit and an interface. The connection control circuit may connect and disconnect a power supply to the media player being tested. The voltage waveform produced when the power supply is connected and disconnected may be designed to mimic the voltage waveform produced when a user connects and disconnects a cable or docking station from the media player. The interface may receive commands to provide specific instructions to the media player. The interface may monitor the status and activities performed by the media player and report back to the computer. |
US08775112B2 |
System and method for increasing die yield
The present invention systems and methods facilitate increased die yields by flexibly changing the operational characteristics of functional components in an integrated circuit die. The present invention system and method enable integrated circuit chips with defective functional components to be salvaged. Defective functional components in the die are disabled in a manner that maintains the basic functionality of the chip. A chip is tested and a functional component configuration process is performed on the chip based upon results of the testing. If an indication of a defective functional component is received, the functional component is disabled. Workflow is diverted from disabled functional components to enabled functional components. |
US08775110B2 |
Coriolis flowmeter with zero checking feature
Descriptions are provided for implementing flowmeter zero checking techniques. In operating a flowmeter, it may be the case that, even if previously calibrated, the flowmeter will produce erroneous measurements, will indicate a non-zero flow during a period of zero flow. Therefore, zero checking features are provided that allow for fast and accurate determinations of the zero-flow values, for use in adjusting later measurements. The zero-checking features include a button attached to an exterior of a flowmeter, so that it is easily accessible to an operator of the flowmeter. The button, in conjunction with an internal zero checking system, allows for a display of a zero value in response to a request from the operator of the flowmeter. |
US08775108B2 |
Method and architecture for pre-bond probing of TSVs in 3D stacked integrated circuits
On-chip test architecture and design-for-testability methods for pre-bond testing of TSVs are provided. In accordance with certain embodiments of the invention, a die level wrapper is provided including gated scan flops connected to one end of each TSV. The gated scan flops include a scan flop structure and a gated output. The gated output is controlled by a signal to cause the output of the gated scan flop to either be in a “floated state” or take the value stored in the flip-flop portion of the gated scan flop. The gated output of the gated scan flop can be used to enable resistance and capacitance measurements of pre-bonded TSVs. |
US08775107B2 |
Measurement and apparatus for electrical measurement of electrical drive parameters for a MEMS based display
Methods and devices to measure voltage margins of electromechanical devices are disclosed. The voltage margins are determined based on responses to test voltages which cause the devices to change states. State changes of the devices are detected by monitoring integrated current or charge used to drive the devices with the test voltages. |
US08775100B2 |
Cable for inspecting heat tubes and method of analyzing insertion force of cable
A heat tube inspection cable and a method of analyzing an insertion force of the cable are disclosed. The heat tube inspection cable includes a sensor unit configured to detect a defect in a heat tube, a plurality of segment units each configured to comprise a body part and a wheel part rotatably connected to the body part, a signal cable configured to helically pass through the body part of each of the plurality of segment units to transmit electric signal from the sensor unit, and a wire configured to pass through the body part of each of the plurality of segment units to keep the linear configuration of the plurality of segment units like a bead necklace and to provide axial and bending strength. |
US08775093B2 |
Pattern recognition system for classifying the functional status of patients with pulmonary hypertension, including pulmonary arterial and pulmonary vascular hypertension
A method employing pattern recognition techniques for identifying the functional status of patients with Pulmonary Hypertension is described. This method describes a process by which sets of cardiopulmonary exercise gas exchange variables are measured during rest, exercise and recovery and stored as unique data sets. The data sets are then analyzed by a series of feature extraction steps, yielding a multi-parametric index (MPIPH) which reflects the current functional status of a patient. The method also employs a description scheme that provides a graphical image that juxtaposes the measured value of MPI to a reference classification system. An additional description scheme provides a trend plot of MPI values measured on a patient over time to provide feedback to the physician on the efficacy of therapy provided to the patient. The method will enable physicians to gather, view, and track complicated data using well-understood visualization techniques to better understand the consequences of their therapeutic actions. |
US08775091B2 |
Marine seismic surveying employing interpolated multi-component streamer pressure data
It is described a method of interpolating and extrapolating seismic recordings, including the steps of deriving particle velocity related data from seismic recordings obtained by at least one streamer carrying a plurality of multi-component receivers and using the particle velocity related data to replace higher derivatives of pressure data in an expansion series. |
US08775087B1 |
System for acquiring and displaying in near real time gas analysis, well data collection, and other well logging data
The system includes a gas processor with gas processor data storage and computer instructions to receive in various device protocols simultaneously information from rig based sensors and gas analysis devices drilling data, calibrate the devices and graphically present the data using both time events and depth events. Computer instructions scale the data and form the geological-hydrocarbon executive dashboard for transmission to various client devices to present real time streaming data, real time calibration information, real time alarms while enabling users to add and remove detection devices and sensors, including rig servers and remote servers, online without shutting down the entire monitoring and analysis system. |
US08775086B2 |
Lag calculation with caving correction in open hole
A gas analyzer system that can detect atmospheric air gasses in drilling mud is used to calculate an actual lag time in a well. The calculated lag time and a theoretical lag time may be compared to estimate a caving percentage in an open hole section of the well. |
US08775084B2 |
Adaptive borehole corrections accounting for eccentricity for array laterologs
Disclosed is an adaptive borehole correction (ABC) technique based on an inversion approach that advantageously corrects shallow laterolog measurements for borehole effects, including determining and accounting for unknown tool eccentricity. The algorithm is based on simplex radial 1-D inversion where at every logging up to four unknowns are determined, namely tool eccentricity, Rt, Rxo, and Lxo. After that a borehole correction methodology is employed wherein the tool response in a borehole with real mud resistivity Rm is modified to a response in the borehole with virtual mud resistivity equal to Rxo. |
US08775082B2 |
Filtered model output statistics (FMOS)
A computer-implemented method to provide stabilized and spatially smooth regression coefficients for weather forecast error correction from small training data sets. In accordance with the present invention, an MOS estimate of the regression coefficient calculated from a small data set can be optimally combined with a smooth prior estimate of the regression coefficient, an estimate of the spatial error covariance of that prior estimate, and an estimate of the spatial error covariance of the MOS estimate. The result is a filtered MOS (FMOS) regression coefficient which can be used to more accurately estimate and correct errors in weather forecasts even using only small data sets. |
US08775078B1 |
Vehicle navigation using cellular networks
The present disclosure provides a method for navigation of a vehicle using cellular networks that involves determining, with an inertial navigation system, a vehicle location estimate. The method also involves transmitting, with a transmit antenna, a transmit signal to the cellular tower requesting a cell identification (CID); and receiving, with a receive antenna, a receive signal from the cellular tower containing the CID. Further, the method involves determining the cellular tower location by looking up the CID in a lookup table; determining a difference in time from the time the transmit signal was sent to the time the receive signal was received; calculating the distance from the vehicle to the cellular tower by using the time difference; and refining the vehicle location estimate by using the cellular tower location, the distance from the vehicle to the cellular tower, and the angle of the transmit antenna and the receive antenna. |
US08775077B2 |
Systems and methods for using location data to electronically display dispensing of markers by a marking system or marking tool
One or more markers are dispensed on ground, pavement or other surface in a dig area to be excavated or disturbed during excavation activities, so as to provide a visual indication of a presence or an absence of one or more underground utilities in the dig area. One or more signals are wirelessly transmitted in response to the dispensing of the one or more markers, wherein the signal(s) represent(s) first data relating to a location at which the marker(s) is/are dispensed, and/or one or more characteristics of the dispensed marker(s). |
US08775075B2 |
Terminal device and recording medium
A mobile phone terminal has a positional information acquisition unit acquiring present positional information indicating a present position, a destination information acquisition unit acquiring destination information specifying a destination (where to return, and where to go), a navigation unit navigating a route from a position specified by the present positional information acquired by the positional information acquisition unit to a destination specified by the destination information, upon activation, a distance acquisition unit acquiring a distance between a position specified by the present positional information acquired by the positional information acquisition unit and a destination specified by the destination information, and an activation control unit activating the navigation unit depending on a distance acquired by the distance acquisition unit. |
US08775072B2 |
Methods, devices, and computer program products for geo-tagged photographic image augmented files
A method of providing augmented Global Positioning System (GPS) navigation can include detecting movement of a GPS enabled mobile device along a navigational route and displaying a photographic image on a display of the GPS enabled mobile device responsive to detecting movement of the GPS enabled mobile device along the navigational route provided by the GPS enabled mobile device. Related devices and computer program products are also disclosed. |
US08775070B1 |
Method and system for user preference-based route calculation
A method and system for providing user preference based route calculation whereby criteria based digital map data associated with one or more user criteria is generated and/or obtained. When a user makes a request for a map and/or directions from a first point to a second point that includes one or more user route criteria, the criteria based digital map data is searched based, at least in part, on the one or more user route criteria and one or more potential routes are determined that most closely match the one or more user route criteria. One or more user criteria based maps and/or sets of directions are then generated associated with the one or more potential routes that most closely match the one or more user route criteria. Data representing the one or more user criteria based maps and/or sets of directions is then provided to the user. |
US08775067B2 |
Navigation service system and method using mobile device
A navigation service system and a navigation service method are provided. The navigation service system includes a mobile device, and a web server for communicating with the mobile device, the mobile device includes a display unit for displaying at least one navigation widget icon, a wireless communication unit for executing wireless communications with the web server, a Global Positioning System (GPS) module for receiving location information of the mobile device, a memory unit for storing a navigation widget, and a navigation widget controller for controlling the wireless communication unit to transmit the location information of the mobile device to the web server, for controlling the wireless communication unit to receive map data related to the location information from the web server, and for controlling the display unit to display the map data and the location information. |
US08775066B2 |
Three dimensional terrain mapping
Disclosed is a technique for generating a three dimensional terrain map of a geographic area. Mobile units are equipped with satellite receivers (e.g., GPS receivers) for generating location data. A map generator uses the location data to generate a three dimensional terrain map. In one embodiment, the mobile units have primary uses other than mapping, and are traversing the geographic area to be mapped in connection with their primary function. The map generation process may be performed iteratively over time, as additional location data becomes available. During a time period when location data is unavailable for a portion of the three dimensional terrain map, the map generator may estimate the missing portion of the map using the available data. The estimated portion may later be updated with actual data as that data becomes available. The map may also contain enhancements based on enhancement data received by the map generator. |
US08775065B2 |
Radio model updating
The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein. |
US08775064B2 |
Sensor alignment process and tools for active safety vehicle applications
A method and tools for virtually aligning object detection sensors on a vehicle without having to physically adjust the sensors. A sensor misalignment condition is detected during normal driving of a host vehicle by comparing different sensor readings to each other. At a vehicle service facility, the host vehicle is placed in an alignment target fixture, and alignment of all object detection sensors is compared to ground truth to determine alignment calibration parameters. Alignment calibration can be further refined by driving the host vehicle in a controlled environment following a leading vehicle. Final alignment calibration parameters are authorized and stored in system memory, and applications which use object detection data henceforth adjust the sensor readings according to the calibration parameters. |
US08775063B2 |
System and method of lane path estimation using sensor fusion
A method for estimating a projected path of travel for a vehicle on a road includes monitoring a plurality of sensor inputs, determining a road geometry in front of the vehicle based upon the monitored sensor inputs, determining a vehicle position in relation to the road geometry based upon the monitored sensor inputs, determining a plurality of particle points in front of the vehicle representing a potential path of travel from the road geometry and the vehicle position, and utilizing iteratively determined ones of the plurality of particle points to navigate the vehicle including omitting ones of the plurality of particle points passed by the vehicle. |
US08775057B2 |
Control device for in-cylinder fuel injection type internal combustion engine
Provided is a control device for an in-cylinder injection engine which reduces an amount of fuel attaching and remaining on a piston crown surface so as to bring the first injection as advanced as possible and suppress an increase in the number of exhaust particles of PM, when fuel injection is performed a plurality of times in one cycle in the in-cylinder injection engine. At least the first fuel injection of the respective injections dividedly performed the plurality of times is performed in an intake stroke. At least the first injection start timing of the respective injections dividedly performed the plurality of times is set in accordance with an EGR amount. The first injection start timing is more advanced when the EGR amount is large than when the EGR amount is small. |
US08775053B2 |
Control device for internal combustion engine
An internal combustion engine control device having a particulate matter sensor which has a pair of electrodes disposed at a distance from each other and measures the amount of particulate matter in a gaseous body, and elimination means for burning and eliminating particulate matter attached to the particulate matter sensor. The control device performs a particulate matter elimination process to judge whether the amount of particulate matter attached to the particulate matter sensor is smaller than a reference particulate matter amount that is predefined as the minimum amount of remaining particulate matter required to bring the pair of electrodes into electrical conduction at one or more spots. When the amount of particulate matter is judged to be smaller than the reference particulate matter amount, the control device causes the elimination means to terminate the particulate matter elimination process. |
US08775049B2 |
Method for evaluating the state of a fuel-air mixture
A method for evaluating the state of a fuel-air mixture and/or the combustion in a combustion chamber of an internal combustion engine, with sample signals of flame light signals being stored in a database, and with flame light signals of the combustion in the combustion chamber being detected and compared with the stored sample signals, and with an evaluation of the state being output in the case of coincidence between the measured and stored signal patterns. In order to enable the monitoring of the combustion in the simplest possible way the sample signals in the database are stored with the assigned emission values and an evaluation of the state of the combustion is performed with respect to the obtained emissions in the case of coincidence between the measured and stored signal patterns for the combustion chamber of the respective cylinder. |
US08775048B2 |
Method and apparatus for determining a reference vehicle velocity and a rear wheel speed in a vehicle having three speed sensors
The method for controlling a safety system (102-108) of a vehicle (10) determines a reference velocity from a first front wheel sensor (20A) and a second front wheel speed signal from a second front wheel sensor (20B). An axle speed sensor (20C) may be used to determine an axle speed signal. A first rear speed signal and a second rear speed signal are determined from the reference velocity, a slip effect and a yaw signal. The yaw signal may be determined from a yaw rate sensor (28). Safety system (102-108) may be controlled in response to the first rear wheel speed signal and the second rear wheel speed signal. |
US08775039B2 |
Dynamically adjustable inch/brake overlap for vehicle transmission control
A motorized vehicle includes a transmission system and an inch/brake device providing at least two ranges of motion. An engagement force of the transmission system is provided in a first range of motion of the inch/brake device, and a braking force of the motorized vehicle is provided in a second range of motion of the inch/brake device. An accelerator device moves between two or more positions, wherein moving the accelerator device from one position to another position causes an amount of overlap between the first and second ranges of motion of the inch/brake device to vary. |
US08775038B2 |
Method and apparatus for selecting an engine operating state for a multi-mode powertrain system
A method for operating a powertrain system including a multi-mode transmission configured to transfer torque among an engine, torque machines, and a driveline, includes executing a first search to determine a first engine operating point within an all-cylinder state and a corresponding operating cost for operating the powertrain system in response to an output torque request. A second search is executed to determine a second engine operating point within a cylinder deactivation state and a corresponding operating cost for operating the powertrain system in response to the output torque request. One of the first and second engine operating points is selected as a preferred engine operating point based upon the operating costs and the engine is controlled at the preferred engine operating point in the corresponding one of the all-cylinder state and the cylinder deactivation state. |
US08775037B2 |
Travel controller
A travel controller which controls the travel of a vehicle includes a road information acquisition unit which acquires road information of a scheduled travel route, a temporary target travel control pattern generation unit which generates a temporary target travel control pattern of the scheduled travel route on the basis of the road information, an engine state transition section estimation unit which estimates an engine state transition section where the state of an engine transits when the vehicle travels using the temporary target travel control pattern, a speed difference calculation unit which calculates a speed difference resulting from variation in engine output in the engine state transition section, a target travel control pattern generation unit which corrects the temporary target travel control pattern on the basis of the speed difference to generate a target travel control pattern, and a travel control unit which performs travel control on the basis of the target travel control pattern. |
US08775036B2 |
Vehicle control device
When a capacity coefficient (Cre) of a torque converter is larger than or equal to a predetermined threshold (CreA), a speed ratio (e) is calculated on the basis of an actual power transmission efficiency (η) by referring to a predetermined unique relationship between a power transmission efficiency (η) and a speed ratio (e). Therefore, even in a second speed ratio variation range (R2) in which the capacity coefficient (Cre) is larger than or equal to the threshold (CreA) and the speed ratio (e) is not uniquely determined for the capacity coefficient (Cre), the speed ratio (e) is calculated using the unique relationship between the speed ratio (e) and the power transmission efficiency (η), so the speed ratio (e) may be calculated in all the speed ratio variation range of the torque converter. |
US08775034B2 |
Shift control system for industrial vehicle
A shift control system for an industrial vehicle includes: a vehicle speed detection device that detects a vehicle speed; a transmission device that shifts up and shifts down a speed stage of a transmission; a shift control device that permits shift up when a vehicle speed becomes equal to or greater than a shift up permission vehicle speed; a height position detection device that detects a height position of a working machine device; a forward/backward switch device that switches the industrial vehicle between forward travel and backward travel; and a shift up control switch selection device that switches between normal control, in which shift up is performed by the transmission device when the vehicle speed becomes equal to or greater than the shift up permission vehicle speed, and delay control, in which shift up timing is delayed with respect to the normal control. |
US08775032B2 |
Agricultural machine with variable RPM control
The present invention relates to a self-propelled agricultural machine, comprising: elements (5) for gathering and/or processing crops; an engine (1) operable to travel the machine through a first driving mechanism (3) and to drive the operation of said elements through a second driving mechanism (4); and a control unit (6) for controlling engine RPM, characterized in that the control unit (6) is configured for controlling the engine RPM (ni) on the basis of a target RPM (ns), which is in turn based on an assessment of the imposed engine load (Ti), wherein in at least in one sub-range between 0% and 100% of the maximum load, the target RPM is a constantly rising function of said engine load. The present invention relates also to a method of controlling the RPM of the engine. |
US08775031B1 |
Automatic interior rearview mirror positioning system
A rearview mirror control system for a vehicle that changes the rear viewing angle of an interior rearview mirror to eliminate blind spots. The control system receives inputs from a vehicle steering angle sensor, a vehicle yaw rate sensor, a vehicle speed sensor, a turn signal sensor, a global positioning system (GPS) receiver and map information and the vehicle operator's use of a switch housed on the vehicle's steering wheel apparatus. |
US08775030B2 |
Vehicle seat belt system
A vehicle seat belt system includes a reversible belt tensioner (12) adapted to apply a belt tightening force (F) on several predetermined levels to a belt strap (14) of a seat belt, a control unit (16) for controlling the belt tensioner (12) and a device (18) for detecting the course of a road (S1, S2) ahead of the vehicle and for identifying bends lying ahead of the vehicle. The control unit (16) causes the belt tightening force (F) to be kept on an increased level when in the course of the road a further bend follows a just taken bend within a predetermined distance. |
US08775027B2 |
Electric power steering system
An electric power steering system includes a motor control device that controls, based on an assist command value, driving of a motor that gives an assist torque to a steering mechanism. The motor control device computes a first assist component based on a steering torque and a vehicle speed. A steered-angle command value is computed based on the steering torque and the first assist component, and a second assist component is computed by performing a feedback control that matches the steered angle with the steered-angle command value. The motor control device adds the second assist component to the first assist component so as to compute an assist command value. The motor control device includes a road information compensation portion that decreases an absolute value of the second assist component included in the assist command value when a skid is detected by a vehicle state detecting portion. |
US08775022B2 |
Methods and systems providing seat ventilation
A method of providing seat ventilation using a seat ventilation system (SVS) within a vehicle is provided. The method includes determining whether a vehicle seat is occupied using an air bag ECU. Occupancy information is provided from the air bag ECU to an air conditioning ECU. The air conditioning ECU controls a seat climate module based on the occupancy information received from the air bag ECU. |
US08775019B2 |
Active anti-vibration supporting device and anti-vibration control method for same
In an active anti-vibration supporting device (301), an ACM_ECU (200) for estimating an engine vibration state by using output data from a crank pulse sensor (Sa) and a TDC sensor (Sb) drives a driving unit (41) so as to extend and contract and thereby suppresses the transmission of vibration. The ACM_ECU (200) calculates the number of STGs (S1F) that is a quotient obtained when dividing the phase delay (P1F) of a target current value waveform by an average STG time ((T1)/4) in a first cycle (C1) of engine vibration and the remaining time (P′1F) of the phase delay (P1F), wherein the target current value waveform is used for suppressing the transmission of the engine vibration calculated using the output data from the crank pulse sensor (Sa) and the TDC sensor (Sb). The timing at which the elapse of the STG time equivalent to the number of STGs (S1F) in a third cycle (C3) of the engine vibration in the driving timing of the driving unit has been detected is set as a phase delay reference. Further, after the remaining time (P′1F) has elapsed, the target current value waveform is output. |
US08775017B2 |
Method and system for wear control of vehicle tyres
A method for wear control of vehicle tires, includes: detecting deformation of an inner surface of a first tire by means of a first sensor; determining a first level of wear of the first tire; detecting a deformation of an inner surface of a second tire by means of a second sensor; determining a second level of wear of the second tire; comparing the first and second levels of wear with each other; and generating a notification signal representative of the comparison. Also disclosed is a system for wear control of vehicle tires, a method of determining the wear of a tire and a system for determining the wear of a tire. |
US08775012B2 |
Motor vehicle ignition key, motor vehicle navigation device, motor vehicle system, and methods
What is described is a motor vehicle ignition key and a method including a movement sensor for detecting the movement of the motor vehicle ignition key, a motor vehicle navigation device, and a method including a calculator for calculating a driving route in dependence of movement data, and a motor vehicle system and a method including a motor vehicle ignition key and a motor vehicle controller. |
US08775010B2 |
System and method of conducting vehicle usage data analysis
A method of conducting vehicle usage data analysis is provided. The method includes providing usage data about at least one vehicle to a database. The usage data may be analyzed and compared to a member of a set of vehicle development models to determine whether to update a vehicle development model. The usage data may also be analyzed to determine whether to transmit a communication to a vehicle. |
US08775006B2 |
System and method for enhanced vehicle control
A method and system may determine, in a vehicle, a desired path around an object based on a location of the object relative to the vehicle, relative speed, road parameters and one or more vehicle parameters. The method and system may calculate one or more vehicle control parameter values which minimize a predicted deviation from the desired vehicle path. The method and system may determine whether the one or more vehicle control parameter values would cause the vehicle to exceed one or more vehicle stability constraints. If the one or more vehicle control parameter values would cause the vehicle to exceed one or more vehicle stability constraints, the one or more vehicle control parameter values may be reduced to one or more vehicle control parameter values not causing the vehicle to exceed the one or more vehicle stability constraints. The method and system may output the one or more vehicle control parameter values to a vehicle automated control device. |
US08775003B2 |
Methods and systems for controlling a proportional integrator
Methods and apparatus are provided for controlling a boost converter. In one embodiment, the method processes a command signal in a slew rate limiting circuit. The output of the slew rate limiting circuit is then processed using one or more feedback parameters from the proportional integrator to provide a processed command signal. The processed command signal is processed with a controlled signal to provide an error signal which is provided to the proportional integrator to provide a current command signal. In one embodiment, the apparatus includes an error generating circuit configured to provide a processed command signal using one or more feedback parameters from the proportional integrator, and to provide the error signal by subtracting a signal to be controlled from the processed command signal. A slew rate limiting circuit is used to receive a command signal and provide an output to the error generating circuit. |
US08775001B2 |
Motorized wheelchair interlock
A control system for a powered wheelchair that detects when a user is in a first orientation to cause movement of the powered wheelchair. The control system inhibits movement of the wheelchair when the user is not in the first orientation. |
US08775000B2 |
Method and apparatus for controlling a multi-mode powertrain system
A method for operating a powertrain system includes selecting a plurality of candidate transmission ranges associated with a present powertrain operating point and deselecting candidate transmission ranges not associated with the present powertrain operating point. A high resolution engine speed/torque search is executed for each of the selected candidate transmission ranges. A low resolution engine speed/torque search is executed for each of the deselected candidate transmission ranges. Each search is executed to determine a respective minimum power cost for operating the powertrain system in one of the candidate transmission ranges in response to an output torque request and output speed. A preferred transmission range is determined from the candidate transmission ranges. A preferred engine operating point is determined corresponding to the minimum power cost for the preferred transmission range. The powertrain system is controlled in the preferred transmission range with the engine operating at the preferred engine operating point. |
US08774998B2 |
Vehicle control device
Provided is a vehicle control device 1 for supporting deceleration in order to stop a vehicle at a predetermined stop location, the vehicle control device 1 including energy regeneration amount computation means 11 for computing an energy regeneration amount caused by deceleration, and operational timing determination means 12 for determining an operational timing in the deceleration based on the energy regeneration amount. It is possible to realize traveling of the vehicle with excellent fuel consumption without degrading the overall energy regeneration amount when the vehicle stops. |
US08774995B2 |
Information processing apparatus, motor-driven movable body, and discharge control method
There is provided an information processing apparatus including a travelable information display unit that displays before a discharge, regarding motor-driven movable bodies of a discharge source and a discharge destination driven by using electric power of batteries, information about places to which the motor-driven movable body of the discharge source can move using electric power of the battery left after the discharge by assuming, when information about a discharge amount discharged from the battery of the motor-driven movable body of the discharge source toward the motor-driven movable body of the discharge destination that receives power supply is input, a case in which the discharge amount is discharged from the battery. |
US08774994B2 |
System and method for vehicle performance control
A method is provided for controlling a drivetrain of a vehicle which includes a prime mover operatively connected to at least one tractive element. The method includes: (a) determining the vehicle's total weight; and (b) using an electronic controller carried by the vehicle, causing the prime mover to apply power to the tractive element so as to propel the vehicle, the magnitude of the power being a function of the vehicle's total weight. |
US08774989B1 |
Aircraft energy state display
A method and apparatus for displaying an energy state of an aircraft. The energy state of the aircraft is identified by a processor unit based on a speed of the aircraft and an altitude of the aircraft. An indication of the energy state is displayed by the processor unit. |
US08774987B2 |
Vertical gust suppression system for transport aircraft
A method for vertical gust suppression due to turbulence for an aircraft having at least one of direct lift control surfaces or pitch control surfaces. The method includes sensing atmospheric turbulence, measuring the sensed atmospheric turbulence to generate turbulence data, generating a command based on the turbulence data, and applying the command to aircraft controls to actuate the direct lift control surfaces or the pitch control surfaces based on the turbulence data. Therefore, an aircraft response to the actuation of the direct lift control surfaces or the pitch control surfaces reduces a vertical acceleration, a pitch acceleration, a pitch rate, a pitch attitude or a structural load of the aircraft due to the turbulence. Thus, the method reduces the effects of vertical gusts of wind on the aircraft, improves the comfort level for aircraft passengers and crew, and reduces diversions the aircraft may take to avoid the turbulence. |
US08774981B2 |
Infantry robotic porter system and methods useful in conjunction therewith
A robotic system comprising a robotic platform; a follow-path functionality enabling the robotic platform to follow a leading soldier, at least selectably, without reliance on GPS; and a Human Machine Interface between the platform and a leading soldier. |
US08774980B2 |
Container data center and cooling system thereof
A cooling system includes a first temperature sensor, a pump, a first controller, and a first filtering device. The first temperature sensor senses a temperature of an external water source and outputs a first temperature value. The pump pumps the water from the external water source. The first controller is connected between the first temperature sensor and the pump to receive the first temperature value, and compare the first temperature value with a first predetermined temperature value. If the first temperature value is less than the first predetermined temperature value, the first controller controls the pump to pump the water from the external water source. The first filtering device is connected to the pump to receive and filter the pumped water and output the filtered water to a cold water pipe of the container data center to cool servers of the container data center. |
US08774975B2 |
Outage management algorithm
Techniques and systems are described that assist in predicting, diagnosing, and/or managing an incident in a utility service area. A communication system is provided in the service area to communicate with nodes of the service area. In some instances, the communication system is configured to communicate with nodes of the service area according to a hierarchy of the nodes and/or a physical location of the nodes. |
US08774970B2 |
Trainable multi-mode floor cleaning device
A floor cleaning device that is manually trainable for subsequent automatic operation. Prior to automatic operation, a user trains the cleaning device by manually manipulating the device through one or more desired cleaning paths. After training of the device, the device is configured to automatically initiate subsequent cleaning operations in accordance with the trained routine(s). Preferably, the training routine includes user specification of one of a number of cleaning modalities that are supported by the flooring cleaning device. In addition to automatic navigation, the floor cleaning device is configured to initiate a desired cleaning modality as a function of the device's position with respect to one or more of the trained routine(s). |
US08774968B2 |
Trajectory planning method, trajectory planning system and robot
A trajectory planning system obtains a trajectory for controlling a state of an object toward a goal state. The system includes a search tree generating section which registers a state of the object as a root of a search tree in a state space, registers a next state of the object after a lapse of a predetermined time interval obtained through dynamical relationships during the time interval as a branch of the search tree in the state space. The system further includes a known-state registration tree storing section which stores a known-state registration tree and a known-state registration tree generating section which determines a cell to which the next state belongs among a plurality of cells previously prepared by segmenting the state space, determines whether or not a state which belongs to the cell has already been registered as a branch of the known-state registration tree, discards the next state when a state which belongs to the cell has been registered, and registers the next step as a branch of the known-state registration tree when a state which belongs to the cell has not been registered. The system further includes a trajectory generating section which selects a state whose distance to the goal state is minimum among states registered as branches of the known-state registration tree and obtains a trajectory using a sequence of states in a backward direction from the state toward the root of the known-state registration tree. |
US08774966B2 |
Autonomous surface cleaning robot for wet and dry cleaning
An autonomous floor cleaning robot includes a transport drive and control system arranged for autonomous movement of the robot over a floor for performing cleaning operations. The robot chassis carries a first cleaning zone comprising cleaning elements arranged to suction loose particulates up from the cleaning surface and a second cleaning zone comprising cleaning elements arraigned to apply a cleaning fluid onto the surface and to thereafter collect the cleaning fluid up from the surface after it has been used to clean the surface. The robot chassis carries a supply of cleaning fluid and a waste container for storing waste materials collected up from the cleaning surface. |
US08774965B2 |
Method and device for controlling a manipulator
According to a method according to the invention for controlling a manipulator, in particular a robot (10), a planned path (z1(t)) of the manipulator is specified by a path generating device (1.1, 1.2, 1.3), a control path (z2(t)) is determined automatically on the basis of the planned path by a path conversion device (2), and the control path is traversed with the manipulator by a manipulator controller (3), with the path conversion device (2) determining curvature information (aij; t2(ti)) of the control path on the basis of curvature information (aij; t1(ti)) of the planned path. |
US08774964B2 |
Secure medicament dispensing cabinet, method and system
A medicament dispensing cabinet includes a frame, at least one controller, and a plurality of drawers each movably carried by the frame and each defining a plurality of dispensing cells. A plurality of dispensing devices is provided with each one carried by one of the dispensing cells. Each of the dispensing cells further comprises a motor for providing rotary motion to one of the removable dispensing devices in response to the controller, a sensor operating in conjunction with the controller for counting medicament dispensed from one of the removable dispensing devices, a chute for receiving medicament dispensed from one of the removable dispensing devices and a chute gate for controlling access to the chute. The cabinet may additionally comprise a chute gate release responsive to the controller for controlling the chute gate and a chute gate sensor connected to the controller and responsive to the position of the chute gate. |
US08774961B2 |
Automatic delivery system for continuous batch order processing
An automatic delivery system includes a conveyor including powered first rollers arranged in parallel with each other defining a spacing between sequential ones of the first rollers. Fixed second rollers or fixed members are each connected to and coaxially aligned with individual ones of the first rollers and sequentially separated by the first roller spacing. The second rollers are divisible into at least two groups, each defining a loading station. Each of the loading stations has a station positioning device including at least one extension rod extending through and horizontally displaceable within the spacing between sequential ones of the first and second rollers. The station positioning device displaces a container received on the powered first rollers into and out of the loading station. A computer controlling the system and the station positioning device includes data for components inserted into the container at the loading station of each group. |
US08774957B2 |
Embroidery data generating device, computer readable medium storing embroidery data processing program, and sewing machine
An embroidery data generating device is disclosed. The embroidery data generating device generates embroidery data that is used for sewing an embroidery pattern including multiple color-wise pattern sections with a sewing machine and that includes thread color data specifying a color of each of the color-wise pattern sections. The embroidery data generating device includes a first storage device that stores multiple entries of preset color information; an extractor that randomly extracts color data used as the thread color data from each entry of the color information stored in the first storage device; and an allocator that randomly allocates the color data extracted by the extractor to each of the thread color data associated with each of the color-wise pattern sections. |
US08774955B2 |
Audio control of multimedia objects
In some examples, aspects of the present disclosure may include techniques for audio control of one or more multimedia objects. In one example, a method includes receiving an electronic document that includes a group of one or more multimedia objects capable of generating audio data. The method also includes registering a multimedia object of the group of one or more multimedia objects, wherein registering the multimedia object comprises storing a multimedia object identifier that identifies the multimedia object. The method further includes receiving audio data; and determining, by a computing device, a volume level of the audio data generated by the registered multimedia object based on one or more configuration parameters, wherein the one or more configuration parameters define one or more volume levels associated with the multimedia object identifier. The method also includes outputting, to an output device, the audio data at the determined volume level. |
US08774953B2 |
Information processing device, control method therefor, and program
An information processing device according to an embodiment of the present invention includes the following elements: a detection unit configured to detect an amount of change in position of an image data item that is displayed on a display screen; and a processing unit configured to perform image processing on the image data item in accordance with a detection result that is obtained by the detection unit, and to perform audio processing on an audio data item corresponding to the image data item in accordance with the detection result that is obtained by the detection unit. |
US08774952B2 |
Adaptive mode control apparatus and method for adaptive beamforming based on detection of user direction sound
An adaptive mode control apparatus and method for adaptive beamforming based on detection of a user direction sound are provided. The adaptive mode control apparatus includes a signal intensity detector that searches for signal intensity of each designated direction to detect signal intensity having a maximum value when a voice signal of each direction is input through at least one microphone; and an adaptive mode controller that compares the signal intensity having the maximum value detected through the signal intensity detector with a threshold value and determines whether to perform an adaptive mode of a Generalized Sidelobe Canceller (GSC) according to the comparison results. Therefore, a lack of control of adaptation of an adaptive filter of the conventional art is solved. That is, as one condition for guaranteeing performance of adaptive beamforming, adaptation of an adaptive filter is not performed when noise of a sound with a high autocorrelation is cancelled. |
US08774951B2 |
System and method for enhanced media playback
Systems and methods for enhanced media playback are disclosed. According to one aspect, during media playback, auxiliary (or secondary) media can be integrated with primary media. For example, an electronic device offering media playback can not only play back media item data but can also play back other auxiliary media data. In one implementation, presentation of a media group can involve not only presentation of media items of the media group but also presentation of auxiliary media. Another aspect pertains to how and when auxiliary media data is to be presented (e.g., played) by an electronic device. Another aspect pertains to updating or refreshing auxiliary media data. Still another aspect pertains to restricting presentation of primary media by an electronic device unless auxiliary data is also presented. |
US08774950B2 |
Apparatuses, systems, and methods for apparatus operation and remote sensing
A method and system for controlling an apparatus including receiving data indicative of an actual state of the apparatus, defining a first viewpoint relative to at least one of the environment and the apparatus, determining a first predicted state of the apparatus at time T, determining a first predicted state of the environment at time T, producing a first virtualized view from the first viewpoint, sending a first control signal to the apparatus after producing the first virtualized view, defining a second viewpoint relative to at least one of the apparatus and the environment, determining a second predicted state of the apparatus at time T+delta T, determining a second predicted state of the environment at time T+delta T, producing the second virtualized view from the second viewpoint, sending a second control signal to the apparatus after producing the second virtualized view, and changing the actual state of the apparatus based on the first control signal. |
US08774949B2 |
Hybrid intelligent control method and system for power generating apparatuses
A present invention relates to a novel hybrid intelligent control system and method for power generating apparatuses, in which the control system comprises: a fuzzy sliding mode speed controller, embedded with a fuzzy inference mechanism so as to be used for controlling the speed of a power generating apparatus; and a radial basis function network (RBFN) pitch controller, being embedded with an on-line training RBFN so as to be used for controlling the pitch angle of a turbine coupled to the power generating apparatus. In a variable-speed energy conversion system using the aforesaid control system, the turbine can be driven to operate at its maximum efficiency by adjusting its blade pitch angle in response to the variation of the input flowing into the turbine, while allowing the shaft speed of the power generating apparatus to be controlled by a fuzzy interference mechanism so as to achieve its maximum power output. |
US08774947B2 |
Controller for a climate control system
A system is provided for controlling at least one climate control apparatus for conditioning a space. The system includes a controller mountable to a climate control apparatus that is segregated from the space to be conditioned. The controller has a plurality of selectable setting parameters for configuring the controller to operate at least one of a plurality of climate control apparatus, and a plurality of visual indicators for visually indicating the selection of at least one selectable setting parameter. A user interface is adapted for installation in the space, and has a display for displaying selectable setting parameters for configuring the controller. The user interface includes user input controls for enabling selection of at least one displayed selectable setting parameter, where the controller responsively activates at least one visual indicator for indicating the selection of at least one selectable setting parameter by the user-interface. |
US08774941B2 |
Systems and methods for making and using paddle lead assemblies for electrical stimulation systems
A paddle lead assembly for providing electrical stimulation of patient tissue includes a paddle body. The paddle body includes four columns of electrodes, each column including at least one electrode. The columns include two outer columns flanking two inner columns. The paddle lead assembly further includes a plurality of lead bodies coupled to the paddle body. At least one terminal is disposed on each of the plurality of lead bodies. A plurality of conductive wires couple each of the electrodes to at least one of the plurality of terminals. |
US08774940B2 |
Paddle lead body with insertion tab
An implantable stimulation system including an epidural lead for spinal cord stimulation that includes a paddle having an array of electrodes coupled to conductors within the paddle body. The paddle is elongated in shaped with the distal end of the paddle having a tabbed or extended portion with the lead exiting the extended portion of the paddle an angle relative to the longitudinal axis of the paddle. |
US08774939B2 |
Electrical stimulation leads having RF compatibility and methods of use and manufacture
An implantable lead has an inner core, a plurality of coiled conductor guides, and a plurality of conductors. The inner core defines a plurality of lumens. Each coiled conductor guide defines a plurality of helical lumens. Each coiled conductor guide is disposed in a coiled arrangement over a portion of the inner core. Each of the conductors electrically couples at least one electrode to at least one terminal. At least one of the conductors includes a plurality of units. Each unit includes a first conductor segment extending along the inner core from a beginning point to a first position, a coiled conductor segment disposed at least partially in one of the lumens of the coiled conductor guides and extending from the first position to the second position, and a second conductor segment extending along the inner core from the second position to an endpoint. |
US08774938B2 |
Implant having three-dimensional shape for electrically stimulating a nerve structure
The invention relates to an implant which includes, in order to electrically stimulate a nerve structure, in particular the retina, an electrically insulating substrate (1), a array of recesses (2) formed in an upper surface of the substrate, stimulation electrodes (3) arranged at the bottom of the recesses, and an electrically conductive layer forming a ground plane (4) at the upper portion of the recesses. The sizes of the recesses and of the electrodes of the implant are such that the spatial selectivity of the stimulation current applied to the nerve structure is maximized. |
US08774936B2 |
Photoelectrical devices for stimulating neurons
The present invention provides a novel photoelectrical device for efficient transmission of electrical signals to a neuron. This photoelectrical device comprises one or more charging units for coupling to and stimulating one or more neurons by charge, the charging unit comprising: a nanostructure-based electrode having a surface, which has a predetermined developed surface area for coupling to a neuron and which carries a plurality of photosensitive regions (e.g. quantum dots) interfacing with a biocompatible macromolecule for tuning the relative energy levels between the photosensitive regions and the electrode, as well as for directing the spatial polarity of charge separation the surface being thereby electrically chargeable and dischargeable in response to light excitation of the photosensitive regions, the charges stimulating the neuron when coupled to the surface. |
US08774934B2 |
Temperature sensor for an implantable medical apparatus
A temperature sensor for detecting heating of at least one electrode pole of a temporarily or permanently implantable electrode line or a similar implant having at least one elongated electrical conductor which is connected to at least one electrode pole. The temperature sensor has an impedance detecting unit or is connected to one and is configured for evaluating an electrode pole impedance detected by the impedance detecting unit in such a manner that the evaluation takes place with respect to a temperature-dependent feature of the electrode impedance. The impedance detecting unit is electrically connected to the at least one electrode pole or is configured and arranged to be electrically connected to the at least one electrode pole. |
US08774922B2 |
Catheter apparatuses having expandable balloons for renal neuromodulation and associated systems and methods
Methods and apparatus are provided for treating contrast nephropathy, e.g., via a pulsed electric field, via a stimulation electric field, via localized drug delivery, via high frequency ultrasound, via thermal techniques, etc. Such neuromodulation may effectuate irreversible electroporation or electrofusion, necrosis and/or inducement of apoptosis, alteration of gene expression, action potential attenuation or blockade, changes in cytokine up-regulation and other conditions in target neural fibers. In some embodiments, neuromodulation is applied to neural fibers that contribute to renal function. In some embodiments, such neuromodulation is performed in a bilateral fashion. Bilateral renal neuromodulation may provide enhanced therapeutic effect in some patients as compared to renal neuromodulation performed unilaterally, i.e., as compared to renal neuromodulation performed on neural tissue innervating a single kidney. |
US08774920B2 |
Implantable device header and method
Systems and methods for implantable medical devices and headers are described. In an example, an implantable medical device header is provided with an epoxy material having properties that produce a high strength resistance to side load failure. Examples are shown that include a surface texturing at an interface between the header and a metallic container portion. |
US08774910B2 |
Polymer linear actuator for micro electro mechanical system and micro manipulator for measurement device of cranial nerve signal using the same
A polymer linear actuator for a micro electro mechanical system (MEMS) and a micro manipulator for a measurement device of cranial nerve signal using the same are provided. The polymer linear actuator has first and second bodies positioned spaced apart to a distance from each other, and one or more pairs of V-type moving units connecting the first and second bodies together, wherein the moving units in pair are opposed to each other to convert a rotation motion of the respective moving units into a linear motion, thereby causing the first and second bodies to move linearly. |
US08774904B2 |
Device with an OCT system for examining and treating living tissue by means of heating of the tissue by absorbing electromagnetic radiation
A device for examining or treating living tissue by means of local heating of the tissue by absorbing electromagnetic radiation, with at least one radiation source emitting electromagnetic radiation, a control unit for controlling the irradiation parameters of the radiation source, and at least one FD-OCT apparatus with a light source emitting a measurement light for illuminating that tissue region in which the electromagnetic radiation is absorbed by the tissue, characterized by a computational unit for carrying out the following steps: determining the depth-resolved tissue velocity in the radiation direction of the measurement light at a predetermined measurement point of the tissue from the phase information from the FD-OCT interference light, integrating the established tissue velocity over time, differentiating the calculated time integral with respect to space, and displaying the spatial derivative as a function of space and time and/or feeding the spatial derivative as a function of space and time to an evaluation module and/or feeding the spatial derivative as a function of space and time to the control unit. |
US08774903B2 |
Medical imaging apparatus and method
A medical device is used to image a body cavity using a plurality of axially and angularly spaced imaging sensors. Each imaging sensor generates an image that is distinct from one another due to distinct fields of vision. Each image includes an overlapping zone with commonalities that are used to extrapolate a greater calibrated image. |
US08774900B2 |
Computer-aided osteoplasty surgery system
A method for performing computer-assisted orthopaedic surgery includes the steps of: (1) producing and displaying three-dimensional geometrical models of first and second bones, the first and second bones forming a joint; (2) identifying a zone of impingement between the first bone and the second bone on at least one of the bones; and (3) generating and displaying a color map of at least one surface of at least one bone, the at least one surface being within the zone of impingement, the color map including different colors representing different depths of bone to be removed in order to achieve an increased range of motion between the first and second bones. |
US08774898B2 |
Oxygen-enhanced MR imaging technique
The present invention relates to a method of characterising tissue function in a subject in need of such characterization. The method comprises performing an imaging technique, on a voxel defined within a tissue space of interest, wherein image data is generated over a time period during which the subject inhales gases with at least two different partial pressures of a paramagnetic gas. A compartmental model algorithm is applied to the image data generated for the voxel to provide information on metabolic function of the tissue. |
US08774890B2 |
Electrode arrays and methods of making and using same
Described herein are improved electrode array devices and improved active agent delivery devices. Further described are methods of making and using the improved devices. An improved electrode array device includes a substrate and a plurality of probes disposed on the substrate, wherein the probes are formed from a plurality of aligned carbon nanotubes that are not encapsulated by a structure-providing material. An active agent delivery device includes a substrate having an aperture therein, an active agent delivery member disposed on a first surface of the substrate and having an aperture therein, and an active agent chamber disposed on a second surface of the substrate configured to deliver an active agent through the aperture of the substrate and the aperture of the active agent delivery member. |
US08774889B2 |
Patient monitoring system with efficient pattern matching algorithm
A patient monitoring system with an efficient pattern matching algorithm, a method, and a computer product thereof are disclosed. The system may include a physiological data input device or sensor which receives a plurality of physiological measurements within a time window thereby generating at least one time window data set, a memory which stores a program, and a processor. The program when executed by the processor, causes the processor to compress the at least one time window data set to a reduced-rank basis, and perform a pattern match between a reference pattern and the compressed at least one time window data set using a distance metric. |
US08774886B2 |
Analyte sensor
Systems and methods of use for continuous analyte measurement of a host's vascular system are provided. In some embodiments, a continuous glucose measurement system includes a vascular access device, a sensor and sensor electronics, the system being configured for insertion into a host's peripheral vein or artery. |
US08774884B2 |
Systems, devices, and methods including a dark-field reflected-illumination apparatus
Systems, devices, and methods are described for providing a monitor or treatment device configured to, for example, detect hemozoin, as well as to monitor or treat a malarial infection. |
US08774883B2 |
Superconducting direct current transmission system
A DC superconducting coaxial transmission system provides electrical transmission of 5,000 megawatts of energy while simultaneously delivering liquid hydrogen. The transmission system includes a coaxial transmission segment including an inner superconductor, an outer superconductor disposed in surrounding relation to the inner conductor, and a dielectric insulator disposed between the inner superconductor and the outer superconductor. Liquid hydrogen surrounds the superconductors. Three phase transformers and poly phase rectifier/inverters provide a DC voltage source to the superconductors from the electrical grid. In one embodiment, a switching circuit connected between the voltage source and the superconductor injects a cancellation current component into the direct current flow. The cancellation current component is polarized to flow in a direction opposite to the direct current flow to produce a current zero, thus enabling safe interruption of the high DC current while minimizing the magnitude of transient voltages during switching. |
US08774882B2 |
Mobile device case with removably insertable corners
A mobile device case including a housing sized to receive a mobile device. The housing includes at least one corner defining an aperture there through. A corner element is included and is removeably insertable within the aperture. |
US08774880B2 |
Mobile wireless communications device with electrically conductive continuous ring and related methods
A mobile wireless communications device may include a portable housing that may include an electrically conductive continuous ring defining a perimeter of the portable housing. The electrically conductive continuous ring may be configured to function as an antenna. The mobile wireless communications device may further include a printed circuit board (PCB) carried by the portable housing and may include an electrically conductive layer defining a ground plane. The mobile wireless communications device may further include wireless transceiver circuitry carried by the PCB and coupled to the antenna. The mobile wireless communications device may also include an electrically conductive shorting member coupled between the electrically conductive continuous ring and the ground plane. |
US08774878B2 |
Ultra mobile communicating computer with finger holes to ease grip
An Ultra Mobile Communicating Computer, that can have all of the features and capabilities of a smart phone and pocket computer combined and more, plus many other features such as hands free carrying, one-hand and desk free, walk & type, ready to use operation, a fast, multi finger, one or two hand keyboard with full set of large, soft touch keys, large bi-directional screen, photo cell pads and others, and that can be made disintegrable, reconfigurable, custom made, in particular to be a talking machine for speech challenged, an car for deaf, a crime prevention device, computer remote control, translator, musical instrument and multi party game gadget, in addition to a thin earpiece, an ear borne music player, video player, radio and or TV. |
US08774875B1 |
Spatial separation-enabled noise reduction
Noise reduction is provided to audio captured by a headset by employing spatially separated microphones provided by a headset and a mobile phone. Primary audio is captured by a headset microphone and includes both voice audio and ambient noise. Secondary audio is captured by a mobile phone microphone and includes ambient audio. Noise reduction is performed using the primary and secondary audio to generate a noise-reduce audio. |
US08774872B2 |
Methods and devices for providing a ring signal to a called party terminal
Methods and devices for providing a ring signal to a called party terminal (450, 550, 650, 750, 124, 134) for a call from a calling party terminal (400, 500, 600, 700, 120, 130) to the called party terminal for alerting the called party regarding the call from the calling party. A communication network node (420, 520, 620, 720, 122, 132, D90) receives (S100) an indication of an attempt for the call and sends (S110) a ring signal specified by the calling party at a service node (430, 530, 630, 730, 125, 135, D100) of a calling party ring signal service to the called party terminal for alerting the called party regarding the call from the calling party. |
US08774868B2 |
Power-saving system and method for a mobile terminal
The present invention discloses a power-saving system and method for a mobile terminal. By way of monitoring the power level of the mobile terminal, the present invention adopts a high visual contrast power-saving mode while reducing the backlight lightness when the power level is low. The present invention achieves the object of increasing the display resolution and facilitating the user to obtain information while saving power. |
US08774866B1 |
Electrically floating, near vertical incidence, skywave antenna
An Electrically Floating, Near Vertical Incidence, Skywave (NVIS) Antenna comprising an antenna element, a floating ground element, and a grounding element. At least part of said floating ground element is positioned between said antenna element and said grounding element. The antenna is separated from the floating ground element and the grounding element by one or more electrical insulators. The floating ground element is separated from said antenna and said grounding element by one or more electrical insulators. |
US08774865B2 |
Method for operating a base station and base station
A method for operating a base station of a mobile wireless system, in particular of a mobile communications network, wherein the base station is configured to operate in different operation states, wherein the operation states at least include an active operational mode, in which the radio interface subsystem of the base station is fully activated, and a low-duty operational mode with reduced radio transmission activity, is characterized in that in the low-duty operational mode the base station implements a window mechanism including availability intervals during which radio transmissions are allowed and unavailability intervals in which no radio transmissions are allowed. Furthermore, a corresponding base station for deployment in a mobile wireless system is disclosed. |
US08774858B2 |
Adaptive RF saturation detection in a wireless device implementing multiple wireless protocols
System and method for detecting radio frequency (RF) saturation in a wireless device configured to simultaneously receive first signals according to a first wireless protocol and second signals according to a second wireless protocol. Signals having components of both the first and second signals may be received at a shared gain element. A level of saturation of the shared gain element may be determined. A current definition of a saturation event may be determined. A gain adjustment value may be determined based on the level of saturation and the current definition of a saturation event. A gain value of the shared gain element may be adjusted by the determined gain adjustment value. |
US08774857B2 |
Schemes for the efficient reception of radio communications signals
Receiving a Wi-Fi radio signal using a Bluetooth receiver architecture. Also, adapting a Wi-Fi receiver architecture to constrain a received radio signal to less than the bandwidth of a conveyed Wi-Fi signal for subsequent processing purposes. |
US08774855B2 |
Method to estimate head relative handset location
In one embodiment, the disclosure includes an apparatus comprising a processor configured to estimate a position of a wireless communication device relative to a user's body part based on an output of at least one sensor, wherein the position is selected from a group comprising: a left side position, a right side position, and a front-facing position, and configure at least one wireless communication device setting based on the estimated position. In another embodiment, the disclosure includes a mobile device comprising at least one sensor, an antenna subsystem, a transceiver subsystem coupled to the antenna subsystem, and a processor coupled to the transceiver subsystem and the sensor, and wherein the processor is configured to determine that the mobile device is in use, obtain a tilt angle of the mobile device from the sensor, and estimate the mobile device location relative to a user's body using the tilt angle. |
US08774854B2 |
Cell type information sharing between neighbor base stations
The present invention relates to a method and arrangement for cell type information sharing between neighbor base stations in a telecommunications system. One embodiment comprises informing a second radio base station serving a second cell and having a neighbor relation with a first cell served by a first base station, of at least the cell type of the first cell. This is accomplished by adding the cell type information to a set of information to be signaled to the second base station, and then signalling the set of information to the second base station. |
US08774846B2 |
Methods and apparatus relating to wireless terminal beacon signal generation, transmission, and/or use
A portable wireless terminal generates and transmits a beacon signal. The beacon signal includes a sequence of beacon signal bursts, each beacon signal burst including one or more beacon symbols. A beacon symbol is transmitted using the air link resources of a beacon symbol transmission unit at a relatively high transmission power level with respect to user data symbols transmitted from the same wireless terminal, thus facilitating easy detection by other wireless terminals. The beacon symbols of the beacon signal occupy a small fraction of the total available air link resources. Beacon signals can, and sometimes do, convey wireless terminal identification information, via the location of the beacon symbols within the portion of the air link resource reserved for beacon symbol transmission units. |
US08774836B2 |
Method and system for optimized transfer of location database information
A servicing communication device may receive a subset of a location reference database that is maintained by a plurality of location servers, and may provide location related data to a mobile device that is communicatively coupled to the servicing communication device based on the received subset. The servicing communication device may determine capabilities and/or requirements of the mobile device, and may generate the location related data based on that determination. The servicing communication device may determine attributes and/or parameters that may affect determination of the subset of the location reference database. The subset of location reference database may be requested based on the determined attributes and/or parameters. The attributes and/or parameters may comprise a location of the servicing communication device. The servicing communication device may determine its location, directly based on GNSS transmissions and/or indirectly based on assisted GNSS (A-GNSS) data received from the plurality of location servers. |
US08774835B2 |
Methods, systems and computer program products for a remote business contact identifier
This disclosure details the implementation of methods, systems and computer program products for remote business contact identification (hereinafter, “RBCI”). RBCI systems implement a remote business identification application whereby users may submit rich media including indicative information of at least one target business entity to a RBCI service provider, and the service provider may identify the target business entity within its database and return the contact information of the target business entity to the user instantly. |
US08774833B2 |
Navigation system destination entry
A system and method for entering a destination into a navigation system, usually a vehicle navigation system, that reduces the cognitive load on the vehicle user over known systems. The method includes contacting the destination by any suitable and available manner, such as by a cell phone provided on or in the vehicle, through the internet, through an ad-hoc network, etc., where information concerning the GPS location of the destination is sent back to the navigation system and is displayed on the navigation system screen. If the destination is accurate, the vehicle driver can select that destination, such as by touching an icon on the screen, which would allow the destination entry process to be performed while the vehicle was moving. |
US08774831B2 |
Database seeding with location information for wireless access points
A query device scans radio frequencies for visible transmitting devices. The querying device receives at least a signal strength and identifier information associated with each of the transmitting devices. The list of visible devices is used to query a database containing location information for a plurality of visible devices. The list may be sent to a locationing system that may perform a location analysis on the resulting data to return a location to the query device. The weighted average of the locations returned in the database query may be computed to determine the location of the querying device, with the weight for each of the locations being the current signal strength detected by the querying device. Neural network analysis may also be used to determine the location of the querying device. Learning and seeding operations many also be used to populate the database with location information for transmitting devices. |
US08774830B2 |
Training pattern recognition systems for determining user device locations
A query device scans radio frequencies for visible transmitting devices. The querying device receives at least a signal strength and identifier information associated with each of the transmitting devices. The list of visible devices is used to query a database containing location information for a plurality of visible devices. The list may be sent to a locationing system that may perform a location analysis on the resulting data to return a location to the query device. The weighted average of the locations returned in the database query may be computed to determine the location of the querying device, with the weight for each of the locations being the current signal strength detected by the querying device. Neural network analysis may also be used to determine the location of the querying device. Learning and seeding operations many also be used to populate the database with location information for transmitting devices. |
US08774829B2 |
Sensor node positioning for location determination
Systems, methods, and devices are described for determining a physical location of a wireless device. A receiver may be configured to receive associations between anchor locations and sensor nodes, wherein each sensor node uses near field communications to identify an anchor location. The receiver may also receive signal strength measurements from the wireless device measuring the signal strength of wireless sensor nodes. Arrangements may also be configured to determine physical locations of the sensor nodes based on physical locations of anchor locations and utilize received signal strength measurements with the determined physical locations of the sensor nodes to determine the physical location of the wireless device. |
US08774827B2 |
Apparatus and method for generating position fix of a tracking device in accordance with a subscriber service usage profile to conserve tracking device power
A tracking device is disclosed for communication of location coordinate information. In one embodiment, the tracking device includes a signal transceiver device, a location coordinate acquisition device, and a computational processor activated and deactivated in accordance with a subscriber service usage profile. The location coordinate acquisition device generates a position fix of the tracking device and a signal transceiver device reports the position fix to a location tracking server. A flash memory device stores a zone management map. In accordance with a fix reporting period based at least in part on a subscriber service usage application including or accessing the subscriber service usage profile, an internal clock activates or deactivates the signal transceiver device, the computational processor, and/or the location coordinate acquisition device. In one example, the internal clock updates a fix reporting period based on current position fix relative to restricted and allowed areas on the zone management map. |
US08774826B2 |
System and method for reducing latency of location based information retrieved from a location service
A system and method is provided for reducing latency when providing user location information services. The system is implemented in a computer infrastructure which comprises computer executable code tangibly embodied on a computer readable medium. The executable code is operable to trigger a location based service to obtain user location information prior to the user registering for location services. |
US08774824B1 |
Alleviating and overriding throttled conditions in LTE
Systems, methods, and computer-readable media for alleviating and overriding throttled conditions in Long Term Evolution networks are provided. In embodiments, indications that throttled conditions have been reached are received at Mobile Management Entities. Cause codes are communicated, in embodiments, to mobile devices directing the mobile devices to refrain from further attach attempts. In embodiments, attach attempts associated with unique identifiers are received by the Mobile Management Entities that override throttled conditions. In embodiments, authentication failure conditions from the Mobile Management Entities are detected. Algorithms are invoked, in embodiments, to initiate cell barring modes for base stations and detect failure percentages. |
US08774823B2 |
Cellular network load balancing
A method and system are disclosed for operation of a cellular network comprising a first base station, a second base station and a mobile station being served by the first base station. Load information is received from the second base station at the mobile station, the load information indicating a load placed on the resources of the second base station and a load indication based on the received load information is communicated from the mobile station to the first base station. The first base station may be a macrocell base station and the second base station may be a non-planned or femtocell base station. |
US08774822B2 |
Transmission of data within a communications network
Transmission of control parameters from a controller of a communications network via an interface to a network element of the network, in order to enable the network element to configure high speed downlink packet access, is enable by an interference application protocol which allows the controller to add the control parameters to control messages transmitted from the controller to the network element via the interference. |
US08774816B2 |
Dynamic shared forward link channel for a wireless communication system
A dynamic shared forward link channel (or “data” channel) is used to send multicast data to a group of wireless devices, e.g., using a common long code mask for the data channel. Reference power control (PC) bits are also sent on the data channel and used for signal quality estimation. A shared forward link control channel is used to send user-specific signaling to individual wireless devices, e.g., using time division multiplexing (TDM) and a unique long code mask for each wireless device. A shared forward link indicator channel is used to send reverse link (RL) PC bits to the wireless devices, e.g., using TDM. The data channel is jointly power controlled by all wireless devices receiving the data channel. The control and indicator channels are individually power controlled by each wireless device such that the signaling and RL PC bits sent on these channels for the wireless device are reliably received. |
US08774813B2 |
Interference management
In a network containing a macro base station and wireless access points within the range of the macro base station, information from wireless access points are used to change the quantity of almost blank subframes delivered by the macro base station, adjust the cell range extension area of one or more of the wireless access points, or provide instructions to alter the number of wireless access points. The information is analyzed. The analysis allows determination of a capacity gain associated with using the wireless access points within an area associated with the macro base station and whether the capacity gain provides at least a threshold amount of gain permitting the macro base station and the wireless access points to provide service to mobile devices within the area. |
US08774811B2 |
Method for selecting optimal radio access technology and communication apparatuses utilizing the same
A communication apparatus is provided. A first subscriber identity card camps on a first cell, which is associated with a first radio access technology (RAT) and belongs to a first wireless network, via a radio transceiver module. A second subscriber identity card camps on a second cell, which is associated with a second RAT and belongs to a second wireless network, via the radio transceiver module. A processor constructs a first packet switch connection with the first wireless network via the first subscriber identity card to perform data transfer in the first wireless network, measures a first data transfer throughput of the first wireless network when performing the data transfer via the first subscriber identity card, and determines to perform the data transfer in the second wireless network via the second subscriber identity card when a theoretical data transfer throughput corresponding to the second RAT is higher than the first data transfer throughput. |
US08774809B2 |
Electronic device and operating method thereof
The present invention relates to an electronic device and a method of operating the electronic device. There are provided an electronic device and a method of operating the electronic device that may more effectively resolve handover request collisions by using a specific field value included in a handover request message. |
US08774807B2 |
Method of performing handover in multi carrier wireless access system
There is provided a method for handover of a terminal in a wireless access system using multi-carrier operation. The method comprises: receiving a handover command message from a serving base station; and performing network reentry to a target base station based on the handover command message, wherein the handover command message includes information required for handover to the target base station and information on whether the target base station supports handover using multi-carriers. Accordingly, it is possible to efficiently perform the handover in the wireless access system supporting the multi-carriers. |
US08774805B2 |
System and method for radio access technology-specific routing for multi-mode mobile devices
Systems and methods for radio access technology specific routing for multi-mode mobile devices are provided. For each of a number of radio access technologies supported by a mobile device, the mobile device is configured to use respective routing information. This has the advantage of allowing radio access technology specific processing to be performed. |
US08774802B2 |
Method and apparatus for EPLMN list management in mobile terminal
An apparatus and method for Equivalent Public Land Mobile Network (EPLMN) list management in a mobile terminal are provided. The method includes receiving a message from a network after storing an EPLMN list having at least one PLMN entry, determining whether an EPLMN list is present in the received message, and performing EPLMN list management by maintaining, when an EPLMN list is not present in the received message, the stored EPLMN list. As a result, the mobile terminal may retain an accurate EPLMN list and efficiently perform cell selection/reselection. |
US08774800B2 |
UE initiated frequency partitioning based CoMP scheme for downlink cellular communications
In the embodiments of the present invention, proposed is a method in which a CoMP enabled UE chooses the BSs to be in its cooperating set and a BS partitions its bandwidth to serve its own UEs and UEs from other cells that have requested it to be in its cooperating set. |
US08774798B2 |
Determining capability to provide dynamic local time updates in a prepaid terminating call
A method and system for setting a charging rate for a terminating call to a prepaid mobile subscriber in a telecommunications network is provided. A query from a GMSC to a mobile subscriber's HLR returns information from a VMSC where the mobile subscriber is registered, including local time information for the MSC where the mobile subscriber is registered. The local time information can be included in an Initial Detection Point at call setup so that a peak or off-peak rate for the call can be set. Additional messaging between the GMSC and the VMSC/VLR can determine the capability of the VMSC/VLR to provide updated local time information for the duration of the call. |
US08774796B2 |
System using international roaming-capable mobile communication network
The present invention provides a system using an international roaming-capable mobile communication network in which a server controls the form in which a service is provided in accordance with the country of a service area in which a mobile station is located. The mobile station 1 determines the service area in which the mobile station 1 is located in accordance with a mobile communication mode set by a mobile communication mode setting function. Alternatively, the mobile station 1 determines the service area in which it is located through notification information relating to a mobile communication network system, received from a base station. When the mobile station 1 transmits a request for a service to a content provider server 4, the mobile station 1 simultaneously adds a region header describing the determined service area. A gateway G/W63 may add the region header instead of the mobile station 1. |
US08774795B2 |
Reconfigurable satcom avionics radio
In one embodiment, a main radio unit for an avionic communication system is provided. The main radio unit includes a software defined radio (SDR) configured to simultaneously provide at least one safety certified channel for a cockpit of an aircraft and at least one other channel for cabin services of the aircraft, wherein the SDR is configurable such that the SDR can generate signals corresponding to different communication protocols. The main radio unit also includes an interface for the at least one safety certified channel, wherein the interface is configured to convert signals between a protocol for hardware in the cockpit and a satellite communication protocol used by the SDR for the at least one safety certified channel; and wherein the SDR is configured to communicate with an RF unit for transmission and reception of signals over an antenna. |
US08774794B2 |
Flexible telematics system and method for providing telematics to a vehicle
A method for providing telematics to a vehicle includes the steps of providing a user-removable telematics component that has a Global Positioning System device, a data pump, and a short range wireless personal area network transceiver (e.g., Bluetooth transceiver), communicatively connecting the telematics component to an integrated communication device of the vehicle, the integrated communication device having a memory holding a list uniquely identifying at least one mobile communication device selected from a currently paired mobile communication device, a previously paired mobile communication device, and a pre-defined mobile communication device, transmitting a request for information out from the telematics component utilizing a communications path of the data pump, receiving the request for information at an off-site telematics provider, and channeling a response to the request for information from the off-site telematics provider automatically through the at least one mobile communication device. |
US08774792B2 |
Method, apparatus, and system for measuring aggregated carrier cell
A method for measuring an aggregated carrier cell includes: obtaining, by a user equipment, measurement configuration information of an aggregated carrier cell, where the measurement configuration information includes signal estimation value information and a corresponding measurement period thereof; obtaining, by the user equipment, a measurement period of a non-active component carrier according to a signal estimation value of the non-active component carrier in the aggregated carrier cell and the measurement configuration information; and measuring the non-active component carrier according to the measurement period. With the method of the present invention, the user equipment can measure different component carriers in an aggregated carrier cell in different periods. |
US08774789B2 |
Enhanced discontinuous mode operation with shared radio frequency resources
A scheduling technique is described for discontinuous transmission and reception. The scheduling technique may be implemented in a mobile communication device with multiple SIMs. The scheduling technique facilitates enhanced communication capability for the mobile communication device. In one implementation, the scheduling technique helps avoid substantial overlap between discontinuous receive cycles of the SIMs, for example by renegotiating a discontinuous transmit/receive offset if too much overlap exists. The renegotiation process may be incorporated into a future industry standard communication protocol (e.g., 3GPP release 11 or later), or may be implemented as an extension to an existing communication protocol. |
US08774787B2 |
Methods and systems for providing location-sensitive conference calling
Systems and methods for providing location based conference calling services on communications networks. Location information relating to a device is passed to a location sensitive conference calling system. The location sensitive conference calling system uses the location information to identify a conference calling system, or a conference bridge associated with a conference calling system, to which to connect the device. The device is connected with the conference calling system, or a conference bridge associated with the conference calling system. |
US08774785B1 |
Methods and systems for blocking unwanted communications
Methods and systems are described for processing call blocking instructions and for managing mobile messaging. A method of processing call blocking instructions is described. A call processing system receives a call from a caller intended for a first user. A notification regarding the call is transmitted to a mobile device associated with the first user. A message from the user is received via the mobile device, wherein the message is a text or multimedia type message. At least partly in response to the message, the caller is placed on a blacklist indicating that future calls from the caller to the user are to be blocked. |
US08774769B2 |
Updating timestamps of short messages
A time stamp of a message from a sending mobile device may be modified to correlate with the time zone occupied by a recipient mobile device. A message from a sending mobile device may be received at a message center. The message center may then route the message to a switch that manages the recipient mobile device, in which the switch is in a time zone that is different from the time zone occupied by the recipient mobile device. Accordingly, the switch may update a time stamp of the message to correlate with the time zone occupied by the recipient mobile. Following the update, the switch may transfer the message with the updated time stamp to the recipient mobile device. |
US08774767B2 |
Method and apparatus for providing phonebook using image in a portable terminal
A method and apparatus for providing a phonebook using an image in a portable terminal are provided. The method includes recording contact information in metadata of an image, and performing a linkage function using the image having the contact information recorded therein. |
US08774765B2 |
Systems and methods for providing mobile handset position to software applications
Providing information as to location of a mobile station involves receiving a mobile station location request from a requesting software application at an API gateway of a wireless communications network. The API gateway provides a network-initiated request to the wireless communications network for the location of the mobile station after determining that the requesting application is authorized to receive the location of the specified mobile station. The location of the mobile station can be determined, according to either a coarse or granular location position resolution, or accuracy, based on the request of the application and/or the conditions of the wireless communication network. Information as to location of the mobile station can be produced, and provided to the requesting software application, which can be resident on the mobile station itself or at a different location/platform. |
US08774764B2 |
Method and system for peer-to-peer enforcement
The present invention concerns a method and a system for establishing a dynamic peer-to-peer communications channel between a first terminal and a second terminal. A first terminal and a second terminal are connectable over secured communications channels to a secured network. The first terminal sends a connection request for establishing a communications channel between the terminals. The connection request is intercepted and analyzed by an analyzer module. The analyzer modules requests network parameters from the first and the second terminals. Based on the intercepted connection request, and the network parameters of the terminals, the analyzer module instructs the terminal to establish a peer-to-peer communications channel over a network distinct from the secured network. Security of the peer-to-peer communications channel may be maintained by means of a central unit of the secured network. In this regard, the central unit may send to the terminal authentication keys and/or encryption keys. |
US08774761B2 |
Mobile device to detect unexpected behaviour
Disclosed is an apparatus and method for a mobile device to detect unexpected behavior associated with the mobile device. The mobile device may include a memory and a processor coupled to the memory. The processor may be configured to monitor at least one of physical conditions and/or device actions associated with the mobile device. If a call or a data transmission is requested, the processor may be configured to compare the monitored physical conditions and/or device actions to an anomaly threshold value and may execute an anomaly exception routine if the anomaly threshold value is exceeded. |
US08774760B2 |
Method and system for providing real-time alert notification
A system and method for providing real-time alert message to one or more subscribers in a service provider network is provided. The service provider network may be an enterprise, a communication service provider or a hosted service. A throttler application receives request for alert message generated by an alert originator application and relays the request to a gateway of an alert notification module. A token associated with the request is validated. Based on token parameter values which includes subscriber identities, delivery channel specifications, alert originator application priorities and end point identities, the alert message is customized and is presented to one or more appropriate delivery channel servers. The alert message is then delivered to the one or more subscribers. |
US08774750B2 |
Method and apparatus for controlling a harmonic rejection mixer
In one embodiment, the present invention includes a method for receiving a radio frequency (RF) signal and mixing the RF signal with a master clock to obtain a mixed signal, cyclically rotating the mixed signal to each of N gain stages for at least one cycle of the master clock, and summing the outputs of the N gain stages to provide an output signal. |
US08774748B2 |
Receiver for FSK radio frequency signals with high sensitivity demodulator and method for activating the same
The high sensitivity FSK radiofrequency signal receiver includes an antenna for receiving FSK radiofrequency signals, a LNA amplifier receiving signals picked up by the antenna, a local oscillator for supplying oscillating signals, a mixer for mixing the incoming signals with the oscillating signals to produce intermediate signals. The receiver includes a broadband or poly-phase filter for filtering the intermediate signals, and a sampler for supplying sampled intermediate signals to a high sensitivity demodulation stage, which supplies data signals. The receiver includes a processing circuit for performing a discrete Fourier transform of sampled intermediate signals. The selector at the processing circuit output determines the difference between the signal amplitude peak frequency above a determined threshold and the expected frequency of the intermediate signals. The frequency difference enables for correcting the oscillating signals frequency, to enable the demodulation stage to demodulate the data in the sampled intermediate signals and supply data signals. |
US08774742B2 |
High efficiency transmitter
A high efficiency transmitter is disclosed. In an exemplary embodiment, a transmitter is provided that includes a first transmission path configured to receive a baseband signal and generate a first RF output when output power is in a first output power range, and a second transmission path configured to receive the baseband signal and generate a second RF output when the output power is in a second output power range. |
US08774740B2 |
Power control for power amplifiers
Aspects of a system for improving efficiency over power control for linear and class AB power amplifiers may include a current source circuit that enables determination of a bias current level for a PA circuit within an IC die based on an amplitude of an input modulation signal. The PA circuit may enable generation of an output signal based on a differential input signal and the input modulation signal to the current source circuit. A generated bias voltage may be applied to a transformer external to the IC die, but internal to an IC package containing the IC die and/or a circuit board containing the IC package. One or more amplifier bias voltage levels may be applied to the PA circuit wherein the amplifier bias voltage levels may be derived from the generated bias voltage level and/or the determined bias current level. |