Document | Document Title |
---|---|
US08776699B2 |
Interconnectable furniture
An interconnectable furniture having a planar surface. The planar surface includes at least two pairs of curved sides, each of the pairs includes a convex side, convex with respect to points within the planar surface, and a concave side, concave with respect to points within the planar surface. The pairs of curved sides are defined by arc lengths having a same radius R, and wherein the respective sides of the planar surface meet to form rounded corners of the planar surface. Additionally, a plurality of attachment points attached to a bottom of the planar surface and located substantially near rounded corners of the planar surface formed by the at least two pairs of curved sides, and configured for attaching a corresponding plurality of legs. |
US08776697B1 |
Pallet with tine support elements
An improved pallet comprising: a support deck with an upper load contacting surface and a lower ground facing surface; a first and second sidewall, each with ground contacting legs and each connected to two elongate sides of the support deck; a pallet cavity formed below said lower ground facing surface of the support deck and between said first and second sidewalls; and a support element with a tine contacting surface protruding vertically down from the lower ground facing surface of the support deck partially into the pallet cavity but not below the ground contacting legs of the first and second sidewalls. |
US08776696B2 |
Low floor vehicle
A low floor vehicle can reduce, during curved track traveling of a vehicle, the lateral pressure of the vehicle, can prevent occurrence of vibration and creaking sounds of the vehicle, can improve riding comfort for passengers, and can reduce wear of wheel flanges, is provided.The low floor vehicle includes: a journal member which couples a pair of wheels and is attached to a truck frame; and a truck frame lateral beam arranged along a vehicle width direction closer to the center of the truck frame than the journal member. The journal member can turn with respect to the truck frame. A coupling member which couples the journal member and the truck frame lateral beam is provided. The coupling member is attached to the center in the vehicle width direction of the truck frame lateral beam so as to be pivotable around an axis extending in a vehicle height direction. |
US08776695B2 |
Support sleeve for a track riser
The present invention is for a support sleeve for a riser supporting an elevated toy vehicle trackway above a surface, the sleeve comprising a first end, a second end having an open end, one or more walls extending between the first end and second end, wherein the one or more walls define a hollow interior for supporting the riser, and one or more supports extending outwardly from the perimeter of the first end. The one or more supports form a shoulder extending outwardly from the first end, wherein the shoulder encircles the perimeter of the first end. The present invention further provides a method of stabilizing one or more toy vehicle tracks mounted on one or more track risers, comprising inserting a first track riser within a hollow support sleeve having a top end and a base end, the base end having one or more outwardly projecting supports. |
US08776694B2 |
Monorail sortation system
A sortation system where control and operation is facilitated by a contact-free, wireless communication configuration. Wireless communication is accomplished in a line-of-sight (LOS) manner while the cars of the sortation system are continuously moving along the track at operational speed. Each car is configured to operate independently with respect to how a car is instructed to accept and deliver packages. The sortation system provides for the cars to act as messengers between the bin stations and the system controller with respect to the status and health of the bin stations. |
US08776693B2 |
Apparatus and method for dispensing incendiary projectiles
An apparatus and method for dispensing incendiary projectiles is provided. The apparatus includes an injector for injecting the projectiles with a reactant at a dispensing rate, and a controller operable to control the dispensing rate. The controller is operable to control solenoids of a dispenser gate and a shuttle motor, and to prevent jam conditions of the apparatus. The apparatus can detect and automatically correct jam conditions that do occur. The apparatus can count the number of incendiary projectiles dispensed during a current operation and during the lifetime of the apparatus. The apparatus is dimensioned to minimize the number of incendiary projectiles purged from the apparatus after an operator has indicated to stop dispensing. |
US08776692B1 |
Flameless smoke pot
A flameless smoke pot and a method of generating smoke using the smoke pot. The smoke pot includes a casing having a side wall with air inlet openings and containing a plurality of perforated tubes containing red phosphorous pellets. A heat generating pyrotechnic composition is disposed at a first end of the casing to generate heat which flows through the perforated tubes containing red phosphorous pellets to produce white phosphoric acid clouds of smoke. The white phosphoric acid clouds of smoke are combined with atmospheric air containing water to generate the white phosphoric acid clouds of aerosol smoke. The white phosphoric acid clouds of aerosol smoke are directed through a perforated flame arrester whereby visible flame is prevented from being created. |
US08776690B2 |
Sleeve for accommodating propellant charge powder
The invention relates to a combustible sleeve for accommodating propellant charge powder, to munitions designed using such a sleeve, and to a production method for such sleeves. The sleeve according to the invention is designed for accommodating propellant charge powder and has a jacket wall made of combustible felted fibrous material and an inlay of intersecting threads in the jacket wall. The threads are disposed therein at a distance from one another such that felted fibrous material reaches through the regions between the threads. The method comprises the following steps: preparing a jacket wall made of combustible felted fibrous material and inserting an inlay made of intersecting threads into the jacket wall. The threads are disposed therein at a distance from one another such that the felted fibrous material extends through the regions between the threads. |
US08776688B2 |
Electrically initiated inertial igniters for thermal batteries and the like
A method for electrically initiating an inertial igniter for a munition. The method including: providing an electrical energy generating device to generate a voltage over a duration responsive to an acceleration of the munition; providing a first electrical storage device connected to the electrical energy generating device through a voltage divide circuit to receive a portion of the voltage over the duration; providing a second electrical storage device connected to the electrical energy generating device to accumulate the voltage; and providing a circuit powered by a connection to the electrical energy generating device, the circuit determining an all-fire condition based on both a connection to the first electrical storage device that receives the portion of the voltage and the duration of voltage generation and a predetermined accumulated voltage of the second electrical storage device. |
US08776687B2 |
Device and method for forming thin film pattern
The present invention provides device and method for forming a thin film pattern which can maintain an extent of wetting of a printing liquid at a proper state without time dependence. The device for forming a thin film includes a printing liquid supply unit for supplying printing liquid, a cliché having a depressed pattern and a relieved pattern for patterning the printing liquid, a printing roller for having the printing liquid supplied from the printing liquid supply unit thereto coated thereon and being rolled on the cliché and the substrate, and a solvent supply unit for supplying a solvent to the printing liquid before the printing liquid coated on the printing roller is brought into contact with the cliché. |
US08776686B2 |
Automated cutting system for customized field stencils
The Automated Cutting System for Customized Field Stencils (“ACSCFS”) is a device designed to implement an automated field stencil creation process. The ACSCFS is comprised of a computer system and an automated cutting table, wherein said automated cutting table is further comprised of a cutting surface, an automated means for placing sheet material onto said cutting surface, and an automated cutting implement. The computer analyzes a color logo image and translates it into a line drawing. The drawing is then scaled, and guideline aperture locations are placed along each line. The computer then transmits instructions to the automated cutting table, directing the creation of a field stencil with a dotted guideline hole pattern. Such field stencils allow for the reproduction of multi-color logos using a single stencil. |
US08776685B2 |
Screen printing apparatus
A screen printing apparatus including two screen printers, each including a substrate introduction portion by which a substrate is introduced from an upstream side of a component mounting line, a printing portion which performs a screen printing to the introduced substrate, a substrate discharge portion by which the substrate is discharged to a downstream side, and a substrate moving stage which receives the substrate to position the substrate with respect to the printing portion and to move the substrate to the substrate discharge portion. The two substrate introduction portions, the two printing portions, and the two substrate discharge portions are arranged symmetrically to each other with respect to a perpendicular symmetrical plane extending in a transportation direction of the substrate in the component mounting line, respectively. Each printing portion is provided at a position further from the perpendicular symmetrical plane than the substrate discharge portion. |
US08776683B2 |
Process for manufacturing absorbent products having customized graphics
The present disclosure involves absorbent articles having customized graphics disposed inside packages labeled as containing customized articles. During the manufacturing process, customized absorbent articles are constructed with article identity graphics, and the packages to contain the customized articles are labeled with package identity graphics. A controller uses article and package identity graphics to track the manufacture of the customized articles and synchronize placement of the customized articles in the appropriately labeled packages. The methods disclosed herein provides for the manufacture of customized absorbent articles in series with the manufacture of absorbent articles having non-custom graphics. The substrates and/or components having the custom graphics in the manufacturing process are detected by a sensor that provides a feedback signal to a controller. The controller, in turn, commands a packing system to place the customized absorbent articles in packages; label the packages with a package identity graphic; and thereby create customized absorbent products. |
US08776681B2 |
Apparatus and method for densifying a fibrous mat
An apparatus and method for densifying a fibrous mat, such as scrim, to achieve a uniform mat density, comprising a set of parallel bars each having a row of pins extending downward therefrom which can engage the mat fibers, a plurality of shafts along which the bars slide so as to maintain the bars parallel, a plurality of extendable accordion linkages connecting the set of bars, and a linear positioning assembly having a reciprocating drive mechanism coupled to one of the bars which can move the bars in response to an actuation signal. As the drive mechanism retracts the bar to which it is coupled the spacing between the rows of bars is decreased uniformly and the rows of pins draw the fibers together and compress them uniformly across the width of the mat. |
US08776679B1 |
Semi-automatic bale ejection sequence
A bale ejection sequence for ejecting a bale from a baler is initiated from an operator command based upon monitored bale ejection factors. A controller implements a timing sequence that is based on a calibration of a cycle timing of a tailgate of the baler. The timing sequence relates to movement of the tractor, a position of the tailgate, and a hydraulic flow rate of fluid to a hydraulic system connected to the tailgate to move the tailgate between a closed position and an open position. |
US08776677B1 |
Nut shelling machine and method
A nut shelling apparatus and method for the shelling of nuts such as chinquapins and chestnuts without substantially damaging the meat of the nuts. The nut shelling machine utilizes a combination of the inertia of the nut and a planar rotating cutting disc, such as one with a layer of aluminum oxide abrasive material, to cut the shell of the nut in a series of small cuts. The rotating abrasive disc utilizes the resistive inertia of the nuts to launch the nut in an upward direction and causing the nuts to fall onto the abrasive surface to repeatedly cut the shells. The repeated cutting action results in removal of a substantial amount of the shell in a short period of time while at the same time minimizing damage to the meat of the nut. |
US08776670B2 |
Piston assembly
A piston assembly and a method of making the same. Exemplary piston assemblies may include a piston crown having a ring belt portion defining a cooling gallery, and a strut extending away from the ring belt portion to define a wrist pin bore. The piston may further include a piston skirt assembly secured to the strut. The piston skirt assembly may include two separate portions that each have a closure plate formed integrally with the portion, with the closure plate generally enclosing the cooling gallery. Exemplary methods of assembling a piston may include providing a piston crown having a ring belt portion defining a cooling gallery and a strut extending away from the ring belt portion to define a wrist pin bore. The methods may further include forming a piston skirt assembly having two portions having a closure plate integrally formed therewith, and securing the skirt to the crown. |
US08776668B2 |
Machine housing of a hydraulic machine
A machine housing of a piston machine is disclosed. The machine housing is formed in two parts. The machine housing has a main housing which is closed off by a connection plate. Here, the connection plate is screwed to the main housing by means of a plurality of screws, and is positioned with low tolerances with respect to said main housing by means of two centering pins. Here, the centering pins are arranged with twofold rotational symmetry with respect to a shaft axis of a drive shaft of the piston machine. In contrast, screw positions do not have rotational symmetry with respect to said shaft axis. This prevents incorrect mounting of the connection plate. |
US08776667B2 |
System for determining the position of a piston along its path of travel for a fluid-dynamic actuator
A fluid-dynamic actuator having a detection system for determining the position of a piston along its path of travel within a cylinder. The piston includes a head and rod extending therefrom. First grooves are machined on respective sections of the rod. Projections of the first grooves onto a first plane parallel to the longitudinal axis of the rod define segments arranged obliquely with respect to the axis. Second grooves extend along the axis for predetermined lengths such that a respective number of second grooves run across each section. Optical sensors detect the presence of second grooves through a second plane transverse to the axis and a displacement of segments along a line coplanar with the second plane due to movement of the piston. A processor counts detected second grooves to determine the position of the piston as a function of the count of second grooves and the displacement of segments. |
US08776663B1 |
Cabin for a humvee vehicle
The present invention is directed to new and improved armor protection that can replace the existing crew cabin with a field replaceable armored crew compartment to be attached to the existing body of an HMMWV military vehicle to protect the military personnel within from explosive blasts, roll-over or collisions. In accordance with the concepts of the present invention, in order to provide additional protection to personnel in the HMMWV crew compartment, a sacrificial V shaped hull is designed to be attached onto the underside of the crew compartment over the HMMWV frame rails. In the event of an explosion underneath the HMMWV, the V shaped hull will shield the personnel inside the cabin. |
US08776658B2 |
Band saw
A band saw comprises a band saw blade that is moved along a running direction against which a sawing material is guided in a feed direction. The band saw further includes a guide mechanism for the band saw blade comprising a plurality of magnet guide elements that are adjustable in their force for exerting a force on the band saw blade to influence its position in space. The magnet guide elements are positioned upstream and downstream of the sawing material and have at least two magnets one beside the other, as viewed along the running direction. |
US08776653B1 |
Meat cutting assembly
An assembly for cutting a meat or food product passing along a path of travel comprising a cutting roller having a plurality of cutting blades radially mounted thereon. A mating assembly interacts with the cutting blades to accomplish a multipoint cutting procedure facilitated by the concurrent rotation of the cutting roller and cutting blades as well as a linear reciprocal travel thereof transverse to the path of travel. A stabilizing assembly restricts the dimensional variance of the spacing between the cutting roller and mating assembly, through which the meat product travels and an ejecting assembly removes cut portions from the cutting blades, back onto the path of travel. The assembly includes a modular construction disposal within and removal from a processing line associated with the path of travel. |
US08776652B2 |
Device and method for cutting through the adhesive bead of panes
A device and a method for cutting through the adhesive bead of panes that have been fixed by bonding is specified, said device having a motor-drivable winding device, a coil for winding-on a separating means for cutting through the adhesive bead, a suction plate for fixing the winding device by means of negative pressure on a pane to be removed, wherein the winding device is mounted so as to be rotatable on the suction plate and wherein at least one guide roller for guiding the separating means is provided, which is preferably placed in a corner region of the pane in order to hold the cutting angle between separating means and adhesive bead extensively ≦90° during the removal operation. |
US08776644B2 |
Electronic identifier attachment for inventory items
Disclosed are various embodiments and a corresponding method for an adapter configured to attach an electronic identification device to an inventory item having a universal attachment fitting. A first end of the adapter body is configured to permanently attach to the universal attachment fitting. A second end of the adapter body is configured to attach to a tool configured to attach to the universal attachment fitting. An electronic identification device is attached to the adapter body. |
US08776643B2 |
Indexable tool
A tool may be configured, in various embodiments, with a handle capable of housing house a gear in an aperture. The gear can have at least a predetermined number of facets and an orbital ring. A securing feature can have a first notch that is adapted to engage the orbital ring to allow rotational movement while securing the gear within the aperture. |
US08776640B2 |
Ratchet wrench preventing jam of pawls
A ratchet wrench includes a head having a first compartment rotatably receiving a drive member. A second compartment is defined in an inner periphery of the first compartment and receives first and second pawls. A switch is pivotably mounted in a control groove of the head and controls engagement relations between the first and second pawls and the drive member. A limiting member is connected between the first and second pawls and maintains two closest teeth respectively of first and second toothed sections of the first and second pawls to be in a restraining spacing that is smaller than a jam spacing, preventing the first and second pawls from jamming between the drive member and a wall of the second compartment. |
US08776635B2 |
Composite flywheel
A flywheel includes a wheel having a composite rim structure with multiple radial layers of steel material. Epoxy type adhesive can bond the multiple layers of stainless steel together. |
US08776628B2 |
Transmission of motorcycle
A motorcycle having a transmission which includes a counter shaft to which a rotation of a crankshaft disposed in an engine is transmitted and a drive shaft to which a rotation of the counter shaft is transmitted. A pair of drive gears mounted on the counter shaft so as to be rotated integrally with the counter shaft, and a pair of driven gears mounted on the drive shaft so as to be meshed with the pair of drive gears, respectively, to be rotatable therewith, and a friction ring is interposed between the pair of driven gears. |
US08776622B2 |
Apparatus for mobile collection of atmospheric sample for chemical analysis
Portable devices and related methods for collecting and storing atmospheric samples for subsequent chemical analysis are provided. A sample cartridge according to one implementation includes self-sealing inlet and outlet ports configured to close automatically when not in use, and a sample retention portion between the inlet and outlet ports that is adapted to trap an atmospheric sample. The sample cartridge may also include a memory device for recording data regarding the sample. Another embodiment provides a portable sampler configured to removably secure a self-sealing sample cartridge. A portable sampling device may also be used with an analytical instrument. The analytical instrument may analyze the sample and read the data recorded on the sample cartridge's memory. |
US08776619B2 |
Small angle sensor for measuring steering shaft torque
A small angle sensor for measuring steering shaft torque. The sensor includes a multi-pole magnet and one or more stators. Each of the one or more stators encompasses the outer circumference of the multi-pole magnet. Each of the one or more stators has a horizontal ring section having an inner circumference and an outer circumference; and a plurality of teeth. Each tooth extends in a vertical direction from the inner circumference of the horizontal ring section; and a lip extends in a vertical direction from the outer circumference of the horizontal ring section. The sensor also includes one or more collectors. Each of the one or more collectors encompasses only a portion of the lip of the one or more stators. The sensor includes one or more magnetic sensing elements. Each of the one or more magnetic sensing elements located proximate to the one or more collectors. |
US08776618B2 |
Torque sensor rotor
Disclosed is a rotor for a torque sensor configured to improve a mechanical coupling force with respect to a jig in a process of adjusting a torque center, thus enabling a fine adjustment, the rotor including a rotor body having a sleeve coupled to a rotating shaft and a yoke protruding from an outer circumference of the sleeve, a ring-shaped magnet coupled to an outer circumference of the yoke, and an anti-slip structure formed on the rotor body and partially coming into contact with a jig during a rotating process for adjusting a torque center, thus inhibiting slipping between the rotor body and the jig when a rotating force is transmitted, so that slipping between the jig and the rotor body is inhibited to enable precise transmission of the rotating force whereby accuracy is improved during fine adjustment of the torque center. |
US08776617B2 |
Method and system of submersible pump and motor performance testing
Submersible pump and motor performance testing. At least some of the illustrative embodiments are methods including: coupling a torque meter between an electric motor and a pump; and submersing the torque meter, electric motor, and pump in water. During periods of time when the torque meter, electric motor and pump are submerged in the water, the method comprises: operating the pump and the electric motor; measuring pump performance; and simultaneously measuring electric motor performance. |
US08776608B2 |
Coplanar process fluid pressure sensor module
A coplanar process fluid pressure sensor module is provided. The module includes a coplanar base and a housing body. The coplanar base has a pair of process fluid pressure inlets, each having an isolator diaphragm. The housing body is coupled to the coplanar base at an interface between the coplanar base and the housing body. A differential pressure sensor is operably coupled to the pair of process fluid pressure inlets, and is disposed proximate the coplanar base within the housing body. |
US08776603B2 |
Method and system for non-destructive testing
Provided herein is a non-destructive testing method capable of diagnosing a condition of an object to be tested using a single-pulse ultrasonic wave signal. An attenuation waveform of the single-pulse ultrasonic wave signal received by a receiving section 3 is wavelet transformed by a wavelet transform section 6 to obtain an envelope line A(t) and a phase φ(t) of the attenuation waveform. A temporal change computing section 7 approximates the attenuation waveform by an approximation equation available for computation, using the envelope line A(t) and the phase φ(t) of the attenuation waveform inputted from the wavelet transform section 6, and obtains the temporal change of instantaneous frequency of the attenuation waveform. A diagnosing section 8 diagnoses a condition of the object to be tested, based on the temporal change of the instantaneous frequency computed by the temporal change computing section 7. |
US08776596B2 |
Apparatus for the monitoring of floating roof position for storage tank roofs
A floating storage tank roof having a roof cover level monitor apparatus uses a flexible rod having a first end in contact with the storage tank cover bottom surface and a second end in contact with a base mounted to the top of the storage tank roof. As the rod flexes the second end of the rod is pushed into a slot within the base and against a resilient member within the slot. Within the slot are disposed proximity switches. As the rod second end sinks into the slot the proximity switches are actuated by mechanical or magnetic means. The spacing of the switches within the slot is calibrated to represent the level of the storage tank roof. A force transducer may also be used in lieu of the switches. |
US08776591B2 |
Downhole, single trip, multi-zone testing system and downhole testing method using such
A multizone testing system (100), for the testing of subterranean layers, comprises an upper subsystem (109) comprising a control station (151), a main isolation packer (113) for isolating the upper subsystem (109) from the lower subsystem (111), a lower subsystem (111) comprising an array of individual apparatuses (116) connected in series, each apparatus (116) being adapted for the testing of one layer and comprising a series of remotely activated tools for hydraulically isolating and testing the corresponding layer and a communication system comprises communication means between the control station (151) and the surface and between the control station (151) and each of the individual apparatuses (116) in order to control the remotely activated tools of the individual apparatuses for sequential testing of the layers. A multizone testing method for the testing of a plurality of subterranean layers intersected by a well, using a multizone testing system (100) comprises the steps of running and positioning said system (100) into the well such that each individual apparatus (116) is adjacent to a layer to be tested and controlling the remotely activated tools of the individual apparatuses for a sequential test of the layers. |
US08776588B2 |
Transmission device for transmitting information about tire condition and tire condition monitoring system
A tire condition monitoring system includes a transmission device, a receiving device, and a monitoring section. The transmission device includes a sensor, a transmitter, a housing, and a engaged member. The sensor detects, as the tire information, a condition of gas filled in the tire cavity area surrounded with the tire and a rim. The transmitter wirelessly transmits the detected tire information. The housing houses the sensor and the transmitter, including an inner space and a through hole. The inner space is surrounded with a wall of the housing and is separated from the tire cavity area. The through hole passes through the wall. The engaged member is engaged with the through hole to be provided to the housing. The engaged member includes one of an air vent and a communication groove for communicating between the tire cavity area and the inner space. |
US08776587B2 |
Tire tester
Disclosed is a tire tester (1) provided with: a device frame (3); a slide base (10) provided on the device frame (3) so as to be able to move up and down; a large spindle (11) that is attached to the slide base (10) and can rotatably support a large-diameter tire (T1); and a small spindle (12) that is attached to the slide base (10) and can rotatably support a small-diameter tire (T2) that is smaller than the large-diameter tire (T1). The disclosed tire tester (1) can push one of the tires (T1 or T2) against a simulated road surface (5), by means of the up/down movement of the slide base (10), and perform a tire test. |
US08776585B2 |
Fuel vapor purging diagnostics
Systems and methods are provided for monitoring reverse flow of fuel vapors and/or air through a vehicle fuel vapor recovery system, the fuel vapor recovery system coupled to an engine intake of a boosted internal combustion engine. One example method comprises, intermittently adjusting a restriction in the fuel vapor recovery system during boosted conditions, and indicating degradation based on one or more of a change in a pressure value, or based on a change in flow in the fuel vapor recovery system. |
US08776580B2 |
System and process for detecting leakage in umbilicals
A system and process for detecting the place of leakage from umbilical hoses. This system includes an internal device (PIG) which is inserted in the hose of the umbilical cable which is leaking and external detecting equipment which is intended to identify the position of the PIG device which is already inside the umbilical. The device which is inserted in the umbilical and which is known as a PIG, is made of metal and the external detecting equipment comprises two parts: one formed by a ring which surrounds the umbilical, having a sensor system and another part which has the electronics, capable of identifying the presence of the PIG and, with this, modifying the signal, so that it can be identified. The system is presented as a process for detecting the exact place of leakage from umbilical hoses and the technology tested is easy to operate and the inspection is carried out at a good speed and continuously, without creating waste. |
US08776578B2 |
Gas sensor
A gas sensor having high detection sensitivity and a low output signal noise includes a laminate of thermistor ceramic, a catalytic electrode, an internal electrode, and external electrodes. When coming into contact with a detection target gas, the catalytic electrode generates heat, and the resistance of a thermistor layer of a sensing portion is decreased. Since the heat generated by the catalytic electrode is directly transferred to the thermistor layer without passing through an insulating layer or the like, high detection sensitivity is obtained. In addition, the structure can be formed in which heat of the sensing portion is insulated by a hollow portion and heat diffusion is prevented, so that the heat capacity of the sensing portion is further decreased. |
US08776577B2 |
Generated gas collecting method and measuring method
According to one embodiment, a generated gas collecting method collects a generated gas after exposing the interior of a chamber to an organic gas having a boiling point higher than that of the generated gas. |
US08776572B2 |
Necking machine
A necking machine (1) having a plurality of processing stations on a rotating tool carrier (7). The motion of the tool carrier (7) with respect to the work pieces is carried out by a crankshaft (25). This is carried out by a non-constant gear. The gear includes two non-round gearwheels (21, 23) that improve a rotational-speed profile of the crankshaft (25) and thus a velocity profile, in particular, in an area of the dead center. |
US08776569B2 |
Forging mold
A forging mold includes a female mold and a male mold coupling with the female mold. The female mold includes an external mold defining an accommodating groove for receiving an internal mold and a pressing block therein, and a first fixing hole penetrating through the external mold and connected with the accommodating groove. The pressing block has a gap opened at a bottom portion thereof and adjacent to the internal mold. The internal mold has a base body and a blocking protrusion protruded from a bottom portion of the base body to be pressed in the gap. A first fixing element is screwed into the first fixing hole of the external mold with a distal end thereof resisting against the pressing block to further press the pressing block towards the internal mold so as to secure the internal mold and the pressing block in the accommodating groove. |
US08776567B2 |
Arm material and a method for its manufacture
An arm material for an upper arm or a lower arm is provided which constitutes a double wishbone suspension or the like of an automobile and which has a flat, hollow, closed cross-sectional shape and enables further decreases in size, decreases in weight, and increases in strength.An arm material for an automobile suspension has a body made from a parts material made by metal. The parts material made by metal has a flat, hollow, closed cross-sectional shape having a pair of opposing long sides and is formed from a single member in its lengthwise direction. The body has at least a first bent portion which is bent in a plane roughly parallel to the pair of long sides. |
US08776564B2 |
Impact treatment method for improving fatigue characteristics of welded joint, impact treatment device for improving fatigue characteristics for same, and welded structure superior in fatigue resistance characteristics
An impact treatment method for improving fatigue characteristics of a welded joint comprising pressing an impact pin against the surface of a base metal material near a toe of a weld bead and making it move relatively to the weld line direction to apply hammer peening treatment or ultrasonic impact treatment, characterized by using as the impact pin an impact pin having a tip curvature radius of ½ or less of a thickness of the metal material and between 2 to 10 mm and, on a surface of a base metal material up to a range where a distance from the toe of the weld bead to the center of the impact treatment position is within 2.5 times the tip curvature radius of the impact pin and where the impact pin does not contact the weld metal during impact treatment, applying hammer peening or ultrasonic impact treatment so as to cause by the impact pin residual plastic deformation where an impact dent has a groove depth of 0.1 to 2 mm, the tip curvature radius of the impact pin or less, and 1/10th or less of the thickness of the metal material and where the impact dent has a width of 1.5 to 15 mm and five times or more the groove depth. |
US08776561B1 |
Door knob unlocking tool kit
A tool kit for unlocking a door knob lock set which bypasses the cylinder and pin pairs which normally must be aligned properly with the proper key. The tool kit includes a pin lifting tool which is used to move the pins so that a forked tool is inserted into the key way, through the cylinder, through an aperture in the end of the cylinder and on to the shaft which must be turned to unlock the lock. The forked tool straddles the shaft and then the forked tool is turned, thereby turning the shaft and unlocking the lock. |
US08776560B2 |
Bike link for securing a bike
A bicycle link having one or more openings that can be π-shaped and having a slider that closes a portion of the one or more openings is disclosed. The slider can be secured in place in relation to the bicycle link with a padlock or the like being placed in aligned holes in the slide and it the portion of the bicycle link containing the slider. Cables, chains and the like are placed in the openings and secured to immovable objects. When the slider is locked in place to close a portion of the openings, this arrangement secures the bicycle. |
US08776559B2 |
Security device for a power tool accessory
A security assembly is configured for attachment to a hole saw having a cap defining a central mounting aperture. The security assembly includes a substantially cylindrical base portion having a central axis. A handle portion is coupled to the cylindrical base portion and defines a tag cavity for housing a security tag. An extension member extends opposite the handle portion from the base portion along the central axis. The extension member engages the central mounting aperture of the hole saw. |
US08776555B1 |
Safety locking handcuffs
A handcuff assembly comprising a pair of handcuff bodies retained to one another by one or more linkages. Each body extends between a pivot end and a body latching end. A locking arm is pivotally assembled to the handcuff body pivot end. A series of ratcheted teeth extend along a portion of each locking arm proximate an arm latching end. A first locking pawl is integrated into each handcuff body, wherein the first locking pawl is operated by a key to engage the pawl with the ratcheted teeth, retaining the handcuff assembly in a locked configuration. A second locking mechanism is provided at the pivot assembly, wherein the second locking mechanism resists pivotal motion of the locking arm when oriented into a locked configuration by way of rotating a key. The handcuff assembly requires rotation of two separate locking mechanisms by two separate key motions to unlock each locking arm. |
US08776553B2 |
Method and apparatus for determining load size in a washing machine
A method and apparatus according to one embodiment for determining laundry load size in an automatic clothes washer includes supplying water to predetermined water levels higher than a saturate water level and determining the amount of water supplied to reach each predetermined water level from a prior water level, and determining a load size based on the determined amount of water supplied between the current predetermined water level and the prior water level. |
US08776551B2 |
Transverse row bushings having ceramic supports
A bushing system includes a bushing having a bottom plate with a plurality of holes from which filaments are drawn. At least one elongated support extends through the bushing generally along a longitudinal axis to hold and stabilize the bushing. To handle the harsh conditions under which the bushing is subjected, the support comprises an alumina-based ceramic that generally resists sagging or excessive expansion and contraction during heating and cooling. |
US08776549B2 |
Device and method for severing a continuous glass strip
The invention relates to a method and a device for severing a marked region of a glass strip (1) produced continuously on a conveyor belt (11), having the following characteristics: a) a line (12) highlighting the severing of the marked region is scored on the continuous glass strip (1), b) once the scored line (12) reaches the crusher roll (6), the two lock rolls (7, 8) following the crusher roll (6) are folded away downward, c) once the scored line (12) is located in the region of the highest area of the crusher roll (6), means for shearing off (5) push onto the glass strip (1) and break it off, d) after the broken-off glass piece (10) has dropped, the lock rolls (7, 8, 9) are folded back in the conveyor belt (11), and to a computer program and a machine-readable carrier with the program code thereof. |
US08776547B2 |
Local strengthening of glass by ion exchange
This disclosure describes a process for strengthening, by ion-exchange, the edges of an article separated from a large glass sheet after the sheet has been ion-exchanged to strengthen by exposing only the one or a plurality of the edges of the separated article to an ion-exchange medium (for example without limitation, a salt, paste, frit, glass) while the glass surface is maintained at temperatures less than 200° C. |
US08776542B2 |
Cooling system
A cooling system that cools a wafer in a vacuum chamber of a sputtering apparatus, includes a wafer cooling stage for cooling the wafer, a cooling mechanism for cooling the wafer cooling stage, cooling gas supply units which introduces a cooling gas to the wafer cooling stage, a wafer rotating mechanism which holds the wafer in a state separated from the wafer cooling stage by a predetermined gap, and is rotated while holding the wafer, and a driving mechanism which rotates the wafer rotating mechanism at a predetermined rotational speed. |
US08776539B2 |
Ejector-type refrigeration cycle and refrigeration device using the same
A system has first and second compressors (22, 180), a heat rejection heat exchanger (30), an ejector (38), a heat absorption heat exchanger (64), and a separator (48). The heat rejection heat exchanger (30) is coupled to the compressor to receive refrigerant compressed by the compressor. The ejector (38) has a primary inlet (40) coupled to the heat rejection exchanger (30) to receive refrigerant, a secondary inlet (42), and an outlet (44). The separator (48) has an inlet coupled to the outlet of the ejector to receive refrigerant from the ejector. The separator has a gas outlet (54) coupled to the compressor (22) to return refrigerant to the first compressor. The separator has a liquid outlet (52) coupled to the secondary inlet of the ejector to deliver refrigerant to the ejector (38). The heat absorption heat exchanger (64) is coupled to the liquid outlet of the separator to receive refrigerant. The second compressor (180) is between the separator and the ejector secondary inlet. |
US08776534B2 |
Gas balanced cryogenic expansion engine
An expansion engine operating on a Brayton cycle which is part of a system for producing refrigeration at cryogenic temperatures that includes a compressor, a counter-flow heat exchanger, and a load that may be remote, which is cooled by gas circulating from the engine. The engine has a piston in a cylinder which has nearly the same pressure above and below the piston while it is moving. Low pressure on a piston drive stem provides a force imbalance to move the piston towards the warm end. |
US08776533B2 |
Strain tolerant bound structure for a gas turbine engine
A gas turbine engine includes bound assemblies with an inner diameter ring, struts, and an outer diameter ring. The strut is connected to the inner diameter ring and extends radially outward therefrom to connect to the outer diameter ring. A strain relief feature is disposed adjacent to or at the connection between the strut and the inner diameter ring and/or the outer diameter ring. The strain relief feature lengthens the arc segment of fillet curvature. For a constant thermal punch load, the lengthened arc segment of fillet curvature results in a decreased maximum strain in the bound assembly. |
US08776531B2 |
Gas engine drives for gasification plants
The present application provides an integrated gasification combined cycle system. The integrated gasification combined cycle system may include a gas turbine engine, a syngas system for producing a syngas for the gas turbine engine and having a compressor therein, and a second gas engine in communication with the syngas system. The second gas engine dives the compressor via the syngas. |
US08776528B2 |
Method for operating a gas turbine plant with a compressor station for gaseous fuel
The disclosure relates to a method for operating a gas turbine plant which is supplied with a fuel gas via a compressor station. The compressor station includes a compressor which compresses the fuel gas which is fed via a gas feed line and delivers it via at least one control valve to a combustion chamber of the gas turbine plant. A bypass system is arranged in parallel to the compressor via which fuel gas can be directed in a switchable manner past the compressor to the at least one control valve. An energy-saving operation can be achieved in a simple manner by continuously measuring the fuel gas pressure at the outlet of the at least one control valve. A minimum fuel gas pressure, which is desired (e.g., necessary) for operation of the gas turbine, at the inlet of the at least one control valve is determined from the measured pressure values in each case. The compressor station can be switched over to bypass operation when the fuel gas pressure which reaches the inlet of the at least one control valve via the bypass system is greater than or equal to the minimum fuel gas pressure. |
US08776527B1 |
Techniques to reduce infrared detection of a gas turbine engine
A discharge nozzle is provided having a centerbody and a conduit enclosing the centerbody and is operable to receive exhaust flow from a turbine discharge of a gas turbine engine. In one form the centerbody is symmetric and extends along the flow direction, rising away from a reference axis to a maximum position before falling and converging on the reference axis. A set of rings is disposed between the centerbody and the conduit and are positioned between the centerbody and the conduit. |
US08776523B2 |
Steam-driven power plant
A steam-driven power plant includes a steam source providing steam at a desired pressure and a steam turbine operably connected to the steam source. The steam turbine includes a low pressure section and an intermediate pressure section. A low pressure admission conduit is configured to convey steam from the steam source to an entrance of the low pressure section and an intermediate pressure admission conduit is configured to convey steam from the steam source to a mid-steampath point of the intermediate pressure section. One or more valves are located between the steam source and the steam turbine to control a flow of steam from the steam source through the low pressure admission conduit and/or the intermediate pressure admission conduit. |
US08776521B2 |
Systems and methods for prewarming heat recovery steam generator piping
The present application describes a heat recovery steam generator. The heat recovery steam generator may include a superheater, a first turbine section, a first main steam line in communication with the superheater and the first turbine section, and a first prewarming line positioned downstream of the first main steam line such that a flow of steam from the superheater preheats the first main steam line without entry into the first turbine section. |
US08776517B2 |
Emissions-critical charge cooling using an organic rankine cycle
The disclosure provides a system including a Rankine power cycle cooling subsystem providing emissions-critical charge cooling of an input charge flow. The system includes a boiler fluidly coupled to the input charge flow, an energy conversion device fluidly coupled to the boiler, a condenser fluidly coupled to the energy conversion device, a pump fluidly coupled to the condenser and the boiler, an adjuster that adjusts at least one parameter of the Rankine power cycle subsystem to change a temperature of the input charge exiting the boiler, and a sensor adapted to sense a temperature characteristic of the vaporized input charge. The system includes a controller that can determine a target temperature of the input charge sufficient to meet or exceed predetermined target emissions and cause the adjuster to adjust at least one parameter of the Rankine power cycle to achieve the predetermined target emissions. |
US08776515B2 |
Pumping assembly using active materials
A pumping assembly is provided. The assembly includes a first movable element selectively movable within a first pump housing and an actuator including an active material. The active material is configured to undergo a change in attribute in response to an activation signal. The active material is operatively connected to the first movable element such that the change in attribute causes the first movable element to move within the first pump housing. In one example, the active material is a shape memory alloy material having a crystallographic phase that is changeable between Austenite and Martensite in response to the activation signal. |
US08776514B2 |
Electrothermal microactuator for large vertical displacement without tilt or lateral shift
A microactuator for displacing a platform vertically with respect to a substrate includes a first rigid frame, a first flexible bimorph beam connecting the first frame to the substrate, a second rigid frame, a second flexible bimorph beam connecting the second frame to the first frame, and a third flexible bimorph beam connecting a platform to the second frame. Activation of the first, second, and third flexible bimorph beams allows vertical displacement of the platform with respect to the substrate, with negligible lateral shift. A microactuator assembly includes a substrate, a plurality of first rigid frames, a plurality of first flexible bimorph beams, a plurality of second rigid frames, a plurality of second flexible bimorph beams, a platform, and a plurality of third flexible bimorph beams. Activation of the first, second, and third bimorph beams allows vertical displacement of the platform with respect to the substrate, with negligible lateral shift. A further embodiment with four identical such microactuators oriented at four sides of the platform, can achieve 1D or 2D angular scanning of the mirror plate by the activation of 1 or 2 adjacent microactuators. |
US08776512B2 |
Swing system and construction machinery or vehicle comprising a swing system
A swing system for construction machinery or a vehicle, particularly an excavator or a crane, includes a swing brake for blocking or unblocking a rotational movement of a first portion of the vehicle relative to a chassis portion of the vehicle, and a swing pump and a swing motor are provided for performing the rotational movement. The swing pump can be positioned in a neutral position where no rotational movement of the first portion takes place. At least one brake control actuator is provided for automatically engaging the brake when the swing pump is in its neutral position. The swing system can provide an improved control of the swing movement on a slope and an improved comfort during operation of the swing movement. |
US08776508B2 |
Passive valve assembly with negative start angle
A passive valve assembly for a vehicle exhaust system includes an exhaust component that defines an exhaust gas flow path and a vane that is positioned within the exhaust gas flow path. The vane is positioned at an initial start position and is movable between a closed position to provide a minimum exhaust gas flow and an open position to provide a maximum exhaust gas flow. The start position is orientated at a negative angle relative to the closed position. |
US08776506B2 |
Method for predicting NOx amount and exhaust system using the same
A method for predicting a NOx amount may include detecting an O2 amount in an intake air, calculating a reference O2 amount in the intake air according to a driving condition of an engine, calculating a reference NOx amount contained in an exhaust gas according to the driving condition of the engine, and primarily correcting the reference NOx amount based on the detected O2 amount in the intake air and the reference O2 amount in the intake air according to the driving condition of the engine. |
US08776505B2 |
Method for predicting NOx amount and exhaust system using the same
A method for predicting a NOx amount, may include determining a reference NOx amount according to a driving condition of an engine, primarily correcting the reference NOx amount according to an exhaust gas recirculation (EGR) ratio, and secondarily correcting the primarily corrected NOx amount according to an environmental factor and the driving condition. |
US08776503B2 |
Method and apparatus for monitoring a reductant injection system in an exhaust aftertreatment system
A reductant injector is configured to dispense a reductant into an exhaust gas feedstream of an internal combustion engine upstream of a selective catalytic reduction device. The reductant injector of a reductant injection system is monitored by generating injector pulsewidth commands corresponding to a prescribed reductant flowrate, monitoring the injector pulsewidth commands, verifying the prescribed reductant flowrate corresponds to the injector pulsewidth commands, monitoring a fluidic pressure in the reductant injection system, estimating a first injected quantity of the reductant corresponding to the injector pulsewidth commands, estimating a second injected quantity of the reductant corresponding to the fluidic pressure in the reductant injection system, and comparing the first and second injected quantities of reductant. |
US08776499B2 |
Emission treatment systems and methods using passivated surfaces
Provided are exhaust systems, components, and catalytic articles that have been passivated for use in conjunction with diesel engines that includes a NOx abatement system that uses a reductant. These items are passivated in order to minimize degradation of a reductant in their presence when, for example, they have been subjected to temperatures in excess of 650° C. |
US08776496B2 |
Hydrocarbon retaining system configuration for combustion engine
Systems, methods, and computer readable storage media are described in which exhaust gas is routed to a hydrocarbon retaining device during starting, and purged to the engine intake manifold. Various alternative approaches are described for controlling operation and diagnosing degradation. Further, various interrelated configurations are described. |
US08776492B2 |
Adjustable link
An adjustable link for a bracelet, including first and second half links longitudinally moveable via cooperation of a guide and a complementary guide, and captived by cooperation of a stopping mechanism and a complementary stopping mechanism. The first half link includes a longitudinal finger with a locking mechanism including a radial elastic return moveable between folded and unfolded positions, and the second half link includes a longitudinal channel allowing the finger to pass in only one of the folded or unfolded positions, and, in proximity to the channel, a complementary locking mechanism cooperating, in at least one locking position, with the locking mechanism in the other of the folded or unfolded positions, the locking mechanism and complementary locking mechanism together defining at least two of the longitudinally separate locking positions. |
US08776489B2 |
Mowing cutter disc having a mowing blade and a holder
A quick-change mowing blade arrangement is provided. The mowing blade has a shaped feature and a hole which maintain a certain spacing X from one another. For installation, the mowing blade is held, by means of the hole, pivotally on a head of a peg. If the head) undergoes an impermissible amount of wear, the shaped feature is no longer hidden by a cover of the mowing cutter disc, but becomes visible. |
US08776488B1 |
Mower apparatus with cutting mechanism adaptation
An apparatus for cutting vegetation is disclosed. The apparatus comprises a first and second cutting mechanism for cutting vegetation. The first cutting mechanism is configured to cut vegetation from an original height to a first height. The original height is a height greater than a height reachable by the second cutting mechanism. The second cutting mechanism is configured to cut the same vegetation from the first height to a second height, after the first cutting mechanism has cut the vegetation to the first height. |
US08776487B2 |
Integrated draper belt support and skid shoe in an agricultural harvesting machine
A cutting platform for use with an agricultural harvesting machine includes at least one platform section. Each platform section has a cutterbar assembly movable in a localized manner in upwards and downwards directions, an endless belt with a leading edge, and a plurality of skid shoes. Each skid shoe extends rearwardly from the cutterbar assembly and has an upper surface defining a belt support for the leading edge of the endless belt. |
US08776485B2 |
Form-fill-seal machine
A form-fill-seal machine is capable of reducing poor sealing caused by a packaged article catching in lateral seal portions. The form-fill-seal machine is provided with an upper tube, a lower tube disposed therebelow, a former, a lateral sealing mechanism below the lower tube, and opening and closing sliding members. A packaged article is dropped through the interiors of the upper tube and the lower tube. The former winds a sheet of a film F around the circumference of the lower tube to convert same into a tubular film. The lateral sealing mechanism laterally seals the tubular film. The opening and closing sliding members, which are disposed between the upper tube and the lower tube, shut off an upwardly oriented flow of gas from the interior of the lower tube when in a closed state. |
US08776483B2 |
System for making pneumatically filled packing cushions
System, method and material for making pneumatically filled packing cushions in which a plastic film material having two superposed layers joined together along first and second longitudinal edges is prefabricated at a first location by forming longitudinally spaced, transversely extending rows of perforations across it and sealing it together along seal lines which extend from the first edge of the material in a direction generally parallel to the rows of perforations other and terminate a short distance from the second edge to form chambers with open mouths facing the second edge between the rows of perforations. The material is then fan-folded or formed into rolls for storage and shipment. At a second location, gas is introduced into the chambers by passing the material along a tube positioned between the ends of the seals and the second edge of the material and injecting the gas into the open mouths of the chambers through openings in a side wall of the tube. The two layers are then sealed together across the open mouths to close the chambers and retain the gas in them. |
US08776482B2 |
Container treatment machine with a passage for passing
A passage for the sealed and/or sterile passage of a functional element (15), for example a rod and/or wave-like functional element through at least one wall (6) separating a sterile chamber (5) from an non-sterile chamber, comprising at least one hydraulic seal (20) enabling a relative movement of the functional element (15) in relation to the at least one wall (6). |
US08776481B2 |
Packing-packaging apparatus
A packing-packaging machine includes: sheet feeding means; a horizontal bonding unit for forming a bag body by forming horizontal bonding on a tubular body at predetermined intervals; and an object dispensing unit for dispensing an object to be packaged to the bag body during a repetition of the formation of the horizontal bonding. The object dispensing unit includes a shutter for opening and closing a falling path of a predetermined amount of the object into the bag body. The shutter is opened and closed such that the predetermined amount of the object and another predetermined amount of the object fall with a spacing therebetween, and that before the horizontal bonding is formed on the bag body packed with the predetermined amount of the object which has been dropped during opening-closing operation of the shutter, the other predetermined amount of the object for a next bag body starts falling. |
US08776480B2 |
Vented nail base roof assembly and associated method
A roof assembly for covering a building includes a first structural layer coupled to the framework of the building, a second structural layer positioned above the first structural layer, and an insulating layer including a roof insulation panel positioned between the first and second structural layers. A ventilating purlin extends between and contacts the first and second structural layers along at least one edge of the roof insulation panel. The ventilating purlin transfers loads from the second structural layer to the first structural layer without using the insulating layer for structural support. The ventilating purlin also includes at least one ventilation opening positioned to enable air flow through the ventilating purlin into a ventilating layer of air space formed between the insulating layer and the second structural layer. Thus, the ventilating purlin permits full ventilation of the roof assembly. |
US08776479B2 |
Anchoring in a construction model
An anchoring device including an anchoring element suitable for being anchored an object of construction material with the aid of mechanical vibrations. The anchoring element includes a thermoplastic material and a tool. The thermoplastic material forms at least a part of a radially outer surface of the anchoring element, and the tool has a proximal portion and a broadening portion distally of the proximal portion. The broadening portion has an outer second cross-section, the second cross section being larger than the first cross section but being adapted to the first cross section so that the tool can be moved with respect to the anchoring element while the broadening portion is in the axially-extending opening and locally expands the anchoring element while thermoplastic material of the anchoring element that surrounds the broadening portion is in a solid state. |
US08776475B2 |
DLO molding with dutch bend feature and clip retention feature
A window surround molding is secured on a vehicle door flange with a retainer clip. The molding extends in a longitudinal direction and has a cross-section including first and second channels separated by a Dutch bend. The flange is disposed in the second channel on one side of the Dutch bend. The clip is disposed in the first channel on an opposite side of the Dutch bend. An arm extends in the longitudinal direction away from first and second ends of the clip and engages the molding to secure the clip within the first channel. The clip also includes a lower edge that engages the Dutch bend. A flex tab protrudes from a front face of the clip and engages the flange to secure the molding on the flange and to prevent rotation of the molding relative to the flange. |
US08776474B2 |
Anchoring method for external bonding and reinforcing technique with prestressed fiber cloth
An anchoring method for external bonding and reinforcing technique with prestressed fiber cloth mainly involves the following steps: stretching fiber cloth (1) on the surface of a reinforced member (2) firstly, and then bonding the prestressed fiber cloth (1) and the reinforced member (2) as a whole with resin. In addition, certain measures of installing a steel plate (5) for anchoring and using an anchor device (7) are applied to the anchorage end of the prestressed fiber cloth (1) on the end of the reinforced member (2). The prestress on the anchorage end of the prestressed fiber cloth (1) is partly or all released after thermosetting of the resin so as to eliminate or reduce the stress concentration on the end. |
US08776469B2 |
Adjustable hanger assembly for use with metal bar joists and beams
An adjustable hanger assembly for hanging support rods or ceiling fixtures includes two adjacent spanning angles or channels having at least one clamp assembly at each end thereof and at least one fixture hanging assembly disposed between the ends of the spanning angles or channels. The clamp for use with joists utilizing angles includes legged and washer clamp plates, fastener, and fastening device. The clamp for use with beams utilizing angles includes alternate legged clamp plate, fastener hook, and fastening device. The fixture hanging assembly includes legged and washer fixture plate, hanger rod with threaded end, and fastening. Each legged clamp plates, alternate legged clamp plates, and legged fixture plates is adapted to ride horizontally along top of spanning angles or channels. The load bearing capacity of the angles or channels is increased by bracing these members against each other at clamp assembly and fixture hanging assembly locations. |
US08776466B2 |
Lath furring strips
The present invention provides a lath furring strip having a height not exceeding 0.365 inches which has improved waterproofing capabilities by incorporating the lath furring strip into other architectural structures such as reveals, expansion joints and window flange coverings. By integrating these structures with a lath furring strip having water proofing features, there is increased water proofing of the entire architectural structure. One or more moisture barriers can easily be applied to the wall or furring strips that prevents seepage of moisture from the stucco on the lath to a wall or framing. |
US08776464B2 |
Protective cover for reinforcing bar
A protective cover for covering an end of a reinforcing bar is provided. In some aspects, the protective cover includes a collar having a first end, a second end, and an impact absorbing portion disposed therebetween. The first end of the collar is configured to receive the end of the reinforcing bar. The impact absorbing portion of the collar is configured to withstand an impact without penetration of the reinforcement bar through the protective cover and is further configured to absorb at least a portion of the impact. The impact absorbing portion resides solely within the collar. The protective cover further includes a cap disposed at the second end of the collar. The cap has a surface area of about sixteen square inches. |
US08776461B2 |
Plastic window frame trim for corrugated building walls and installation method
A plastic window frame trim is for installation of a window in a corrugated metal building wall having a cut opening with a top edge, bottom edge, and side edges, each of the edges being backed by framing members. The window frame trim includes: a frame header J-channel with a flange; a frame footer J-channel with a flange; a pair of nailing fins; and fasteners. The trim header J-channel, footer J-channel, and nailing fins are attached to the window frame. The window frame is lifted so frame header J-channel flange slides between the top edge of the metal building wall and a framing member at the top of the cut opening. The window is lowered so footer J-channel flange slides between the bottom edge of the metal building wall and a framing member at the bottom of the cut opening so that window frame rest on the window sill. Fasteners attach the window frame to the framing members through the metal building wall. Trim caps snap over the nailing fins to finish the trimmed window. |
US08776460B2 |
Plastic window frame trim for corrugated building walls and installation method
A plastic window frame trim is for installation of a window in a corrugated metal building wall having a cut opening with a top edge, bottom edge, and side edges, each of the edges being backed by framing members, the window having an accessory groove. The window frame trim includes: a frame header J-channel with a flange; a frame footer J-channel with a flange; a pair of nailing fins; and fasteners. The trim header J-channel, footer J-channel, and nailing fins are attached to the window at the accessory groove on the window frame. The window frame is lifted so frame header J-channel flange slides between the top edge of the metal building wall and a framing member at the top of the cut opening. The window is lowered so footer J-channel flange slides between the bottom edge of the metal building wall and a framing member at the bottom of the cut opening so that window frame rest on the window sill. Fasteners attach the window frame to the framing members through the metal building wall. Trim caps snap over the nailing fins to finish the trimmed window. |
US08776456B1 |
Solar panel tile roof mounting device
Disclosed is a device for mounting solar panels and other equipment to tile roofs, or similar roof structures, that does not require removal of roofing tile for installation. A stanchion is inserted into a hole drilled into a roofing tile. Two or more wood securing fasteners are inserted into diagonal and crossing through-holes in the sides of the stanchion above the tile and exit on opposing sides of the stanchion, with respect to their insertion point, below the tile. The ends of the wood securing fasteners engage the surface of the roof sheeting beneath the tile at a distance outwardly away from the stanchion. With this arrangement, the tile roof equipment-mounting device engages the roof surface over a wider area than the diameter of the hole drilled into the roof tile without the need for removing the roof tile. |
US08776455B2 |
Photovoltaic tile for a roof
A photovoltaic tile for a roof includes a plurality of tiles, at least two adjacent tiles of which at least partially overlap each other, including a body (12) having overlapping edges constituting a top edge (20) and a bottom edge (22), the top edge (20) being formed so as to cover the bottom edge (22) of at least one of the adjacent tiles, a photovoltaic layer (40), and electrical connectors (52) which are connected to the photovoltaic layer (40) through electrical conductors (54). The electrical connectors (52) are provided in assembly elements (57, 58) by nesting, the assembly elements being provided on the overlapping edges (20, 22) to enable the overlapping edges to be mutually positioned during the placement of two of the adjacent tiles (10) and the electrical contact of the electrical connectors (52) with each other. The invention also relates a method for manufacturing such tile. |
US08776452B1 |
Universal quick corner for raised floor system
A floor panel assembly (used as replacement floor panel or in a new installation) includes universal quick-attach corners that mates with support stands and stringers of an existing raised floor system to provide leveling. The panel assembly includes a top plate (apertured or not) with corner structures including a post retainer and interconnected down flanges that support the top plate inboard of its perimeter. In one form, the universal quick corners each includes an arrow-shaped extension plate attached to the post retainer and extending toward the top plate's perimeter, and includes a body with multiple thickness pads selectable to support the extension plate at selected height. Thus, the quick corner holds an upper surface of the top plate level with an upper surface of adjacent existing floor panels of the existing raised floor system. In another aspect, only the body is used at each corner (without the extension plate). |
US08776451B2 |
Extendible structure
An extendible structure which includes an elongated extendible member having elasticity, and a storage part that serves to store the extendible member by winding it up, wherein a tip end of the extendible member can be extended from the storage part in a one-dimensional manner, so that an extendible part thus extended becomes a hollow tubular structure. The extendible member is composed of three divided extendible members so that the extendible part of the hollow tubular structure is divided into three parts, and the individual divided extendible members are constructed such that their tip end portions are joined with one another, and at the same time, their base end portions are wound around individual storage parts, respectively, independently from each other. Surface fasteners are each provided on a side of each of the divided extendible members. |
US08776446B1 |
Pharmacist workstation
A pharmacist workstation that has a desk that is accessible to customers at a customer position in front of the desk; pharmacist seating directly behind the desk, from which a pharmacist can directly interact with a customer in front of the desk; a pass-through window to a secure preparation area; and a private consulting area that has an entrance that is located to a side of the pharmacist seating. |
US08776441B1 |
Window vent latch sheath and method
A sheath for a window vent latch having a housing defining a slot sized to allow a vent latch to fit therein, and a spring attached to the housing for engaging the inside of a conventional window jamb. A method of seating a window vent latch in a window frame including the steps of providing a vent latch in a vent latch sheath having a housing and a spring, a window with a window frame having a window jamb, placing the vent latch sheath in the window jamb while allowing the spring to engage the window jamb, and adjusting the vent latch housing along the window jamb. |
US08776440B2 |
Sash limiter apparatus and method
A limiter system includes a base including a pin. A rocker is rotatably and translationally coupled with the pin. The rocker includes a first end including an abutment feature, a second end including a reset feature, and a slot including first and second slot ends and a slot track therebetween. The pin is translationally and rotatably received in the slot, and the pin is translational between the first and second slot ends. The rocker is configured for positioning between a first abutting position and a second resetting position. In the first abutting position, the abutment feature extends away from the base. In the second resetting position, the reset feature extends away from the base, and the abutment feature is nearer to the base than the reset feature. |
US08776437B2 |
Casement window operator with folding handle
An operator for a casement window is disclosed which includes a hub that frictionally receives a spindle. The hub is pivotally connected to a proximal end of a pivoting handle. The hub is disposed within a cavity that extends through the proximal end of the handle and terminates at a back wall. The cavity partially accommodates a biasing element, an actuator and the hub. The biasing element is disposed between the actuator and the back wall and biases the actuator towards the hub. The hub includes at least one open position recess and open position protrusion and the actuator includes a complementary protrusion and a recess wherein the protrusion is received in the at least one open position recess of the hub and the recess of the actuator receives the at least one open position protrusion of the hub when the handle is pivoted to the open position. |
US08776432B2 |
Integrated trellis machine
An integrated trellis machine for growing systems. The trellis machine comprises a framework which supports a shroud such that the shroud defines a growing area within the interior of the trellis machine. A nutrient delivery system supplies nutrients to vegetation as it grows within the growing area. A lighting system supplies light to the vegetation and includes a source of light which is housed within a casing. The casing is supported within the growing area and forms a conduit having ends which are open to the exterior of the growing area. A trellis is supported by the framework and located within the growing area between the nutrient delivery system and the source of light The trellis forms a barrier between the vegetation and the source of light and the trellis is shaped so as to redirect the growth of the vegetation as the vegetation grows. |
US08776427B1 |
Fish attraction device
An apparatus for attracting fish is disclosed. The apparatus has a motor with rotating driveshaft that defines a rotational axis substantially parallel to a surface of a body of water. A housing encloses the motor, and the driveshaft extends therefrom. There is an impeller with a hub axially aligned with and coupled to the driveshaft. The impeller has one or more flat planar blades, each defined by a trailing edge and a leading edge and extending radially from the hub in an orthogonal relationship to the rotational axis of the driveshaft without pitch. A proximate end of the blades is fixed to the hub an opposed distal end includes a cupped paddle projecting therefrom with a paddle leading surface and a paddle trailing surface. Turbulence and cavitation is generated by the impeller, and the visual and audible side effects thereof are simulative of fish feeding activity. |
US08776426B1 |
Magazine release assist tool
A magazine release assist tool is described comprising of a generally U-shaped clip having an integrated arm extension. The tool is used to assist in the release of a magazine from a firearm that is equipped with a magazine release blocking mechanism. The clip is removably secured to the lower receiver of a firearm and the arm extension is provided to form a resilient flat spring having a pivot at its proximate end and a push pin at its distal end. When attached to the firearm, a user can depress the flat spring such that the push pin will engage the magazine release button of the firearm allowing quick removal of the magazine. |
US08776422B2 |
Communication and control of accessories mounted on the powered rail of a weapon
A firearm used in military applications may have a plurality of accessories that can be attached to the weapon, with each accessory having a need for electric power. In order to reduce the weight of these power-consuming accessories, as well as the proliferation of batteries used to power these power-consuming accessories, a Powered Rail provides a point of mechanical and electrical interconnection for the power-consuming accessories with a common power source. The Weapon Accessory Control System is provided to enable the user to control the activation of a power-consuming accessory as well as enable communications between the user and the power-consuming accessory and among power-consuming accessories. |
US08776421B1 |
Shoulder stock adapter for a handgun
An adapter is described for use in attaching a shoulder stock to a handgun with a bottom opening handgrip recess. The adapter includes an upright member having upper and lower ends and a longitudinal slot to attach a stock. A lower arm extends forward from the upright member lower end, and a brace arm extends forward from the upright member upper end. A recess insert extends upwardly from the distal end of the lower arm. A latching member releasably secures the insert in the handgrip recess. Also described is a grip plate module to replace the grip plates on a handgun handgrip that does not include a recess. The module includes first and second replacement grip plates for attachment in place of the original grip plates, and a replacement grip plate connector extending between the replacement grip plates. The connector includes a bottom opening recess to receive an adapter insert. |
US08776420B2 |
Firearm having a removable hand guard
A method of making a hand guard for a semi-automatic or automatic rifle is provided. The method including the steps of: forming a first portion of the hand guard from a first material; inserting the formed first portion into a mold; and molding a second portion of the hand guard about the first portion, the second portion being a second material, the second material being different from the first material, wherein a first section of the first portion is completely encased by the second portion and a second section of the first portion is not encased by the second portion. |
US08776419B2 |
Double stack magazine
Double stack magazines have a tubular body defining an elongated passage and a lower and upper end, a floor plate element connected to the lower end, an elongated separator element within the passage, a follower defining an aperture receiving the separator element and movable within the elongated passage, a spring within the passage having a first end contacting the floor plate, and having an opposed second end contacting and biasing the follower toward the upper end of the body. The separator may be a rod spaced apart from the body surfaces. The spring may be spaced apart from the separator element. The spring may be a coil spring having multiple winds, each encompassing the separator element. The separator element may be medially located in the body. The separator element may be positioned to define first and second stack passages between the left and right side walls and the separator element. |
US08776406B2 |
Reversible wing plow and method of rotation
A reversible wing plow including a hitch, a moldboard and a moldboard shifting mechanism. The hitch is coupleable to the rear of a prime mover. The moldboard is operably coupled to the hitch proximate an inboard end and rotatable about a first horizontal axis that extends outwardly from the hitch generally parallel to a direction of forward movement of the prime mover. The moldboard shifting mechanism includes first and second linear actuators, both of which are coupled to the hitch at one end and coupled to opposing sides of a rotation crank plate on the other end. The crank plate is further operably coupled to the moldboard, whereby the moldboard is rotatably shiftable to the driver or passenger side of the prime mover, or to a vertically oriented transport position. |
US08776402B2 |
Ankle inversion and eversion prevention shoe
An ankle inversion and eversion prevention athletic shoe has an upper foot support portion and a shoe bottom. The ankle inversion and eversion athletic shoe device is designed for preventing an athlete from spraining or turning or rolling an ankle during normal athletic competition or play or activities. The shoe includes a brace. The brace is located either behind the ankle on a heel of the shoe or on a side of said shoe in the general vicinity of the ankle. The brace includes an elongated arm and a floor contact surface designed to limit or control sliding of the foot to enable wearer time to regain composure, footing and balance. The brace provides the wearer time to regain his or her balance onto the shoe bottom, thus significantly limiting or precluding the typical and usually unavoidable ankle injury. |
US08776395B2 |
Washer/dryer
A washer or dryer including a body with a loading port covered by a door having a convex transparent face that extends from the loading port inwards towards the interior of the body; and a detachable convex carrier having a depth and diameter greater than the convex transparent face that is stored on the convex transparent face that extends from the loading port inwards towards the interior of the body. |
US08776392B2 |
Resin drying method and apparatus
A low pressure dryer for granular or powdery material includes a plurality of canisters rotatable about a common vertical axis serially among material heating, vacuum drying and material inventory discharge positions; pneumatic piston-cylinder means for rotating the canisters about said axis among said heating, vacuum drying and inventory discharge positions; means for heating contents of a canister at said heating position; means for sealing and drawing vacuum within a canister at said vacuum drying position and means for selectably permitting downward flow of dried granular or powdery material out of a canister at said discharge position where said canisters move collectively and unitarily one with another. |
US08776389B2 |
Tape-measure device having an L-shaped pivotable end piece having a slot for guiding a tool
A tape-measure device having elements for measuring and/or marking/cutting an object, includes a tape, a shell (3) with a reel, an opening (5) enabling the tape (2) to pass through the shell wall, an end piece (6) attached to the distal end of the tape, a stop button (7) for the reel for blocking the tape or for enabling the rolling/unrolling of the tape. The elements include a guide shoulder (8) formed on the shell, a guide opening (9) at the end piece for the removable insertion of the end of a marking/cutting tool, and a sliding surface (60) for the end piece for translatably engaging the surface of the object to mark/cut the object using one of the surfaces thereof when the guide shoulder is simultaneously slid along an edge of the object and the end piece of the tape against the surface of the object to be marked/cut. |
US08776383B2 |
Clamp for reciprocating saw
A reciprocating saw can include a housing and a motor disposed in the housing. A blade retaining mechanism can receive a saw blade. A drive mechanism can translate rotational motion of the motor into reciprocating motion of the blade retaining mechanism. A clamp assembly can include first and second shoes that are coupled to the housing. The first shoe can have a first shoe body that includes a first material facing surface. The second shoe can include a second material facing surface that opposes the first material facing surface and that defines a clamping distance therebetween. At least one of the first and second shoes is selectively adjustable relative to the housing, such that the clamping distance can be altered. One of the first or second shoe bodies can have a third material facing surface that comprises an arcuate section defining a radius. |
US08776381B2 |
Double-pivot folding knife
A folding knife having a handle, a blade pivotably coupled to the handle, and a liner includes a liner lock and a first pivot member that is a post, pin, rod, or other structure having a shape adapted to be slidably received in the second arcuate opening of the blade. The liner further includes a first arcuate opening that has an enlarged end portion and an axis approximately perpendicular to the longitudinal axis of the handle adapted for slidably receiving the second pivot member of the blade. A tang of the blade includes the second pivot member, and the second arcuate opening that has an enlarged end portion and an axis approximately parallel to the longitudinal axis of the blade. An extended tang portion, or flipper, extends downward from the tang. The handle also includes an opposing liner arranged alongside the liner in the handle with the blade positioned therebetween. |
US08776379B2 |
Removable strip for packaging cutlery and related methods
An elongated apparatus for releasably retaining a plurality of utensils in a grouping includes an elongated base and at least one protrusion. The apparatus includes an elongated base having a longitudinal axis and at least one protrusion extending from the elongated base. The at least one protrusion is configured to be removably coupled to a handle end of a utensil such that coupling of the handle end occurs via movement of the handle end along an axis transverse to the longitudinal axis of the elongated base. Upon coupling of the handle end of the utensil to the at least one protrusion, the utensil is restricted from rotating about the longitudinal axis so long as the handle end of the utensil is coupled to the at least one protrusion. |
US08776372B2 |
Cast magnesium alloy wheels
A method of imparting superior fatigue performance to a vehicle wheel cast from a magnesium alloy by selective application of friction stir processing to regions of the casting known to be subject to high in-service stresses is described. The method may be particularly applicable to open wheel designs in which a plurality of spokes is used to connect the hub and rim portions of the wheel. |
US08776360B2 |
Workshop for preparing aircraft engines for shipping
A workshop for preparing aeroengines for shipping, the workshop including a station for fitting test and measurement mechanism on an engine, a mechanism for transporting the engine to test premises and for returning the engine to the workshop, a station for removing the test and measurement mechanism, a station for endoscopic inspection, a finishing station, and a shipping station. The engines are transported from one station to another by spreaders fastened on the engines and attached to hoists that are movable in translation along an overhead structure arranged in the workshop, each station being fitted with computer terminals for displaying and tracking the tasks to be performed on the engine in the corresponding station. |
US08776355B2 |
Method and device for fixing a faucet to a mounting
The invention relates to a method and device for fixing a faucet to a mounting (1), such as a worktop or a sinktop. A fixing collar (2) is fastened to the top surface of a mounting by turning from above one or more set screws (3) extending from the fixing collar (2) over a distance below a bottom surface of the worktop. Turning of the screw is used for raising a clamping claw (4), which is in engagement with the threading of said set screw and which is steered by means of a guide (5) extending downward from the fixing collar and used for disallowing a rotation of the clamping claw (4) along with the set screw (3). The bottom end of a faucet body (10) or its extension is fastened around the fixing collar (2) by expanding the fixing collar (2) by an actuation means, such as a screw (8). |
US08776352B2 |
Tissue prosthesis processing technology
A heart valve prostheses crimping apparatus and method for deducing the diameter of stents containing heart valve prosthesis. A medical prosthesis catheter loading apparatus, including a crimping assembly for reducing the diameter of a prosthesis; and a catheter clamp for holding a catheter adjacent to the prosthesis. Also disclosed is an apparatus for reducing the diameter of a medical prosthesis, including a base, a crimp head connectable to the base, and an actuation mechanism connected to the base and connectable to the crimp head to actuate the crimp head. Also disclosed is a method of loading a medical prosthesis into a catheter, including the steps of reducing the diameter of a prosthesis from its normal deployed state to a diameter less than that of the lumen of the catheter; holding a catheter adjacent to the reduced diameter prosthesis; and moving the prosthesis into the catheter lumen. |
US08776351B2 |
Split-ring gland pipe coupling with corrugated armor
A pipe coupling for coupling adjacent ends of a pair of pipes includes a sleeve, a split-ring gland positioned around one of the ends of the sleeve, and at least one annular gasket positioned within the split-ring gland and configured to be compressed by the split-ring gland for sealing one pipe end to the sleeve. The split-ring gland includes two partially circular gland members with spaced ends defining a gap. The pipe coupling includes an armor positioned to span the gap between the spaced ends to provide a generally closed annular periphery about the gasket. The armor includes a corrugated portion having a plurality of corrugations engaging the split-ring gland and the gasket during compression of the gasket. The armor is cold formed to improve structural strength and durability. |
US08776349B2 |
Method for assembling synchronizer and jig for assembling synchronizer
A method for assembling a synchronizer by using a jig, the synchronizer including a synchronizer hub, at least one of recesses formed radially at an external circumference of the synchronizer hub, a synchronizer key disposed in the recess, a synchronizer sleeve enclosing the exterior circumference of the synchronizer hub and axially movably engaged to the synchronizer hub, and a spring disposed between the synchronizer hub and the synchronizer key, may include locating the synchronizer key and the spring in the recess of the synchronizer hub, engaging the jig to the synchronizer hub by inserting a rear portion of the jig in the recess axially, engaging the synchronizer sleeve to the synchronizer hub, and removing the jig from the synchronizer hub. |
US08776345B2 |
Tire mounting apparatus
A tire mounting apparatus is constructed from a first working mechanism and a second working mechanism that are separate from each other. The first working mechanism is provided with a tire holding device for holding a tire and with a temporary tightening device for temporarily tightening nuts onto hub bolts to which the tire is mounted. The second working mechanism is provided with a final tightening device means for finally tightening the temporarily tightened nuts. The final tightening device includes two nut runners and an interval adjuster for adjusting an interval between the two nut runners. |
US08776344B2 |
Steam reformer tube assembly and method of assembling or retrofitting same
A steam reformer tube assembly includes a reformer tube including a wall defining an interior space for receiving fluid delivered into the reformer tube, a plug at least partially positioned in an opening in the interior space such that a gap is defined between the plug and the wall of the reformer tube, and a sealing member positioned in the gap to either limit or prevent the passage of fluid toward the opening in the interior space of the reformer tube and along the gap that is defined between the exterior surface of the plug and the interior wall of the reformer tube. A method of assembling a steam reformer tube assembly is also provided. |
US08776341B2 |
Method of repairing diamond rock bit
Hardfacing is applied on gage surfaces of bit blades, the leading and trailing edges of bit blades, and on carbide inserts. The gage surfaces contains natural diamonds, synthetic diamonds, thermally stable polycrystalline (TSP) diamonds and carbide inserts, and the hardfacing is applied over at least a portion of them. As primary cutters on the bit blades are worn down during drilling, the gage surfaces of the bit blades are also worn down. A hardfacing is applied to the worn gage surfaces of the bit blades, thereby allowing the drill bit to drill deeper and longer without requiring replacement. |
US08776331B2 |
Mechanical closure part
A mechanical closure part includes a support part and a plurality of closure elements extending away from the support part via stems and provided with head parts (2) on their free ends. The closure elements are subdivided on the support part into groups (4) which form a fictitious annular arrangement in the form of a multi-cornered element having corners equipped with a closure element. A group of closure elements (6) is formed within the respective groups (4) with their head parts (2), in the non-actuated state of the closure, adjoining each other in an adjacent manner. |
US08776328B2 |
Rebar clip for joining different size bars
A rebar clip is provided for joining a larger diameter rebar to a smaller diameter rebar transverse to the larger diameter rebar. In a first embodiment the clip includes diameter reducing tabs extending into upper arches of the clip for engagement with smaller diameter bars crossed on top of larger diameter bars. In a second embodiment the clip includes diameter reducing tabs extending into lower arches of the clip so that the clip may hold larger diameter bars on top of smaller diameter bars. A guide track for a clip applying gun is provided which allows for use with either version of clips and with clips of the same nominal diameter for joining equal size bars. |
US08776326B2 |
Panel connection snap assembly
A connection assembly incorporating a striker of elongated configuration including a base platform and an elongated pin segment projecting away from one side of the base platform. A housing holding the striker includes a plurality of internal snap arms normally extending in inwardly angled relation. The elongated pin segment extends along an axial passageway such that the distal ball head and at least a portion of the striker shaft project outwardly away from the housing with the internal snap arms behind the base platform. A striker catch engages the distal ball head upon insertion into the striker catch. |
US08776324B2 |
Attaching structure for an attachable arrangement
An attaching structure for use in an attachable arrangement including at least one elongate strap and configured to be removably attached to at least a portion of a body of a user. The attaching structure includes: a frame having a first end and a second end, wherein the first end is configured for attachment of at least one strap of the attachable arrangement; and an adjustment mechanism is operational engagement with the frame, wherein at least a portion of the adjustment mechanism is configured to contact at least one strap of the attachable arrangement and permit adjustable movement thereof; and wherein the second end of the frame is elongated and configured to permit the user to grasp the second end of the frame and move it relative to the body of the user. |
US08776322B2 |
Tie wrap for bundling objects
A twist tie device having an elongated piece of shape-retaining deformable material. A cover covers the shape-retaining deformable material along the length of the elongated piece. The cover has a bond between the elongated piece and the cover. The bond between the cover and the elongated piece is along the entire interior surface of the cover. An outer cover may be bonded to the cover. The outer cover may have a gripping surface and a non-gripping surface. The gripping surface will provide more grip for the twist tie device when it is wrapped around itself and the gripping surface will provide more grip when it is wrapped around objects. A nongripping surface being generally smoother than the gripping surface is suitable for containing indicia. |
US08776320B2 |
Handle assembly for a domestic appliance
A handle assembly for mounting to a door of an appliance includes a main body member having first and second end portions separated by an intermediate portion. Each of the first and second end portions includes a cavity adapted to receive an end insert formed of soft material. Each of the end inserts includes an attachment member. The handle is mounted to a front face of the door through interengagment of the attachment members and base members provided on the door without scratching the surface of the door. |
US08776318B2 |
Slide-tilt mechanism
A slide/tilt mechanism is provided to include a base plate; a slide plate which is slid between a closed position and an open position with respect to the base plate; a guide plate which supports the slide plate to make the slide plate movable; a tilt mechanism which tilts the slide plate with respect to the base plate by inclining the guide plate with respect to the base plate; an elastic member which actuates the slide plate in a slide direction and a tilt direction; and a tilt restriction member which engages the tilt mechanism to restrict the inclination of the guide plate when the slide plate is slid from the closed position to the open position, and disengages the tilt mechanism to permit the inclination of the guide plate when the slide plate reaches the open position. |
US08776315B2 |
Door damping mechanism
A damping device that includes an arm having a longitudinally extending slot and a cylinder cut-out defined therein, and a damping assembly secured in the cylinder cut-out. The damping assembly includes a cylinder housing with a chamber having a piston and fluid disposed therein. The piston includes a rod with a head on a distal end thereof that extends outside the cylinder housing and into the slot. The damping assembly includes a biasing member extending between the cylinder housing and the head. |
US08776314B2 |
Roller
The invention relates to a roller (1), preferably comprising two wheels (2) and a locking device, an activating part (10) being able to act on the locking device for releasing or locking in a position that corresponds to a directional lock and/or in a position that corresponds to a total lock, and the activating part (10) being movable by a drive, a linear movement of a transmission part (7) that is generated by the drive being transmitted via spring force to the activating part (10) in order to move the activating part, and the activating part (10), in any case in a position corresponding to the total lock or in any case in a position corresponding to the direction lock, being in addition movable relative to the stationary transmission part, against a spring supported on the transmission part, into a release position by means of an actuating handle (11) that is movable independently of the drive and preferably by hand so as to override the total lock or the directional lock. In order to provide a roller that is formed in an advantageous manner with regard to an emergency release, it is proposed that a geometric axis of rotation (d) of the actuating handle (11) is disposed on the same side as the activating part (10) with respect to the axis of rotation (D) of the wheel (2), the activating part being disposed offset, in a vertical section, with respect to an axis of rotation (D) of the wheel (2). |
US08776310B2 |
Cleaner-head for a vacuum cleaner
A cleaner head for a vacuum cleaner has a dirty-air inlet provided in a main suction chamber of the cleaner head, an outlet duct extending from the main suction chamber for connection to a suction source, and a rotating brush bar housed inside the main suction chamber for agitating a floor surface contacted through the dirty-air inlet. The brush bar is driven by an air-cooled motor housed inside a hollow section of the brush bar, the motor having an air intake and an air exhaust fluidly connected to one another to form an air cooling path through the inside of the motor. The air intake is connected to a clean air inlet on the cleaner head and the air exhaust is fluidly connected to the outlet duct by an exhaust duct which bypasses the main suction chamber. |
US08776303B2 |
Articulating vacuum hose
A debris collection system is disclosed comprising a vehicle and an articulating vacuum hose. The articulating vacuum hose includes a vacuum hose assembly and an articulating arm. The articulating arm is configured to support the vacuum hose assembly which is comprised of a vacuum hose, support bands and support cables. The articulating arm includes a first arm extension and a second arm extension. The first arm extension is mounted to the vehicle and rotatable with respect to the vehicle about two perpendicular pivot axes. The second arm extension is pivotally connected to the first arm extension and is rotatable with respect to the first arm extension about a third pivot axis. The first and second arm extensions can be moved to a folded position wherein both extensions are parallel to each other and to an exterior surface of the vehicle. |
US08776301B2 |
Lint and fuzz balls remover
A lint and fuzz ball removing device is disclosed comprising at least one blade attached to an easily grasped and maneuvered body allowing for the quick removal and or detangling of lint, hair and pill balls. The blade surface is entirely covered with particle removing hooks or finger-like projections, including a plurality of flat surfaces, and edges of the blade, allowing for the quick and easy removal of lint, hair, fuzz and pill balls of any shape and size, across broad surfaces or hard to reach areas of clothing and fabric. |
US08776300B2 |
Cleaning cloth
A cleaning cloth constructed of an upper sheet and lower sheet that are joined together for form an interior cavity into which additional cleaning cloths, cleaning materials, abrasive materials, scented materials, etc. can be placed. The cleaning cloth includes strips that can be used to connect the cleaning cloth to a mop head or other surface. |
US08776299B2 |
Toothbrush head
A toothbrush head that includes a main body portion and a generally cylindrical connection member extending downwardly and defining an axis. The connection member includes bottom, outer and inner surfaces and a central opening. The connection member also includes a first lower protrusion that includes first and second inclined surfaces extending inwardly from the inner surface, a first slot defined in the bottom surface and the inner surface, a first lower notch defined in the inner surface, and a first opening defined in the inner surface above the first lower protrusion. |
US08776298B2 |
Cleaning section of an electric oral hygiene device
A cleaning section of an oral hygiene device is disclosed. The cleaning section includes a cleaning element carrier mounted for oscillatory rotation around a carrier rotation axis; a gear unit arranged for being coupled to a drive shaft of a handle of the oral hygiene device, which drive shaft defines a drive shaft rotation axis in an attached state, and the gear unit further having an actuation element for transferring motion from the drive shaft to the cleaning element carrier during operation. The carrier rotation axis is parallel to the drive shaft rotation axis and is disposed at a distance to the drive shaft rotation axis. |
US08776297B2 |
Laundry treating apparatus and method
A laundry treating apparatus includes a cabinet, a tub provided in the cabinet, a drum rotatably provided in the tub for receiving laundry, a gasket provided between the cabinet and the tub, a plurality of spray nozzles provided at a lower part of the gasket for spraying wash water upward into the drum, and a pump for pumping wash water to the spray nozzles. |
US08776295B2 |
Multi-needle quilting tape guide apparatus and method
A multi-needle quilting machine (20) is provided with a tape or ribbon guide (30) that is operated by a method by which a narrow strip (32) is fed against a facing layer (11a) of a wide multi-layered material (24) as it is fed into the quilting machine. In the quilting machine (20), series of chain stitches are sewn, at least one of which joins the tape (32) and layers of the multi-layered material (24) together with the same thread in a quilting process, thereby applying the tape (32) to the quilted product in a single quilting operation without the need for a post-quilting tape application step. The tape may form a decorative strip or have unsewn sections that serve as handles for a mattress when the quilted product is formed into a mattress cover. |
US08776287B1 |
Bottom bed sheet with cell phone pockets
A bottom bed sheet for a mattress is provided wherein the sheet has cell phone pockets formed therein. The bottom bed sheet may be positioned with respect to the mattress whereby a cell phone pocket is positioned at the upper right side of the sheet or positioned at the upper left side of the sheet. |
US08776275B2 |
Protective shoulder pads with release mechanism
This invention concerns protective shoulder pads (2) having a release mechanism (7). The shoulder pads (2) protect an individual wearing the protective shoulder pads (2) against impact to the superior, anterior, posterior and/or lateral regions of the shoulder and upper arm. Release mechanism (7) allows the protective shoulder pads (2) to be more safely and easily removed from the individual wearing the protective shoulder pads (2) while the individual wearing the protective shoulder pads (2) is maintained in the supine position, thus decreasing the risk of further injuring the individual wearing the protective shoulder pads (2). |
US08776266B1 |
Hunting garment and saftey harness system
A hunting garment system including a safety harness which restrains a hunter while perched on a tree stand, an outer member, and an inner member. Both the inner member and the outer member include detachable sleeves and a detachable hood allowing the hunter to select a particular weather-conforming configuration. The safety harness is designed to be safely anchored onto a tree and is worn alone, beneath the outer member, beneath the inner member, beneath an outer vest, beneath an inner vest, or in combination with an assembly of the outer member over the inner member. |
US08776265B2 |
Infant swaddling system and method
A swaddling system and method for use when swaddling the upper and lower torso of an infant separately. The system is equipped with fasteners that allow the upper and lower torso portions to be secured separately, and to allow for the changing of diapers without unwrapping the upper torso. In addition, the system allows for the partial swaddling of an infant while in a car or stroller seat. |
US08776263B1 |
Welding mask system
A face plate has a major chamber positionable in front of a face of a welder. A visor housing has a forward opening. A minor chamber is provided within the visor housing. A forward assembly is fixedly positioned within the minor chamber adjacent to the forward opening. The forward assembly has a glass ultraviolet filter centrally. The forward assembly has a heat resistant transparent plate outwardly. The forward assembly has a fixed polarized filter lens inwardly. A rearward assembly is fixedly positioned within the major chamber adjacent to the visor housing. The rearward assembly includes a rotatable polarized filter lens. A drive assembly is adapted to rotate the rotatable polarized filter lens with respect to the fixed polarized filter lens. |
US08782804B2 |
Storage device, storage system, and authentication method
According to one embodiment, a storage device that has a nonvolatile semiconductor memory includes an authentication information storage unit that previously stores first apparatus authentication information to authenticate an authorized host device and first user authentication information to authenticate an authorized user. The storage device executes apparatus authentication on the basis of second apparatus authentication information received from a newly connected host device and the first apparatus authentication information in the authentication information storage unit and executes an invalidation process of user data stored in the nonvolatile semiconductor memory, when the apparatus authentication is failed. |
US08782803B2 |
System and method of encrypting a derivative work using a cipher created from its source
A derivative work is encrypted using a cipher created from digital sources used to create the derivative work. A software application made available for download permits a mix artist to generate a derivative-encrypted work from a derivative work that the mix artist has created using one or more of the digital sources. The derivative-encrypted work is streamed to a worldwide web server, where it is made available for download by consumers for a fee. The software application is also available for download by the consumers and permits the consumers to purchase and download any available derivative-encrypted work. However, the derivative-encrypted works can only be decrypted if the consumer has possession of a digital source for each of the source art works associated with the digital sources used to create the derivative work. |
US08782800B2 |
Parametric content control in a network security system
A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and social engineering attacks. The system can implement centralized policies that allow an administrator to approve, block, quarantine, or log file activities. The system can provide and update a security value that causes host computers to change security levels for a number of different policies. The policies are grouped into a master set of policies and options which are propagated to the hosts from a centralized server. The security value is stored on the hosts and the server, and changes of the value on the server are propagated to the hosts. |
US08782799B2 |
Triggering a private browsing function of a web browser application program
A private browsing function of a web browser application program may be triggered for a browser by a browser or by a URL provider. Upon receipt of the URI by a web browser, the URI is inspected for the presence of a private browsing indicator. When the URI is found to contain a private browsing indicator, operation of the private browsing function for the web browser application program is triggered. |
US08782798B2 |
Method and apparatus for protecting data using a virtual environment
The present invention relates to a method and apparatus for protecting data using a virtual environment, which creates a safe virtual environment that supports the execution of application programs being operated on a computer and which enables important data to be inputted or outputted only within the virtual environment, such that access to the important data is prevented in a general local environment. According to the present invention, data leakage is initially prevented to protect data, and convenience is provided in that a user may use the computer in a general manner while performing desired work. |
US08782797B2 |
Lockbox for mitigating same origin policy failures
Systems and methods to manage same-origin-policy (SOP) failures that occur in a computing environment are provided. In an illustrative implementation, an exemplary computing environment comprises a lockbox module, and an instruction set comprising at least one instruction directing the lockbox module to process data and/or computing application execution commands representative of and a request for a selected operation/feature according to a selected SOP management paradigm. In the illustrative implementation, the SOP management paradigm comprises one or more instructions to deploy a “lockbox” computing application element allowing for the management, monitoring, and control of computing application features/operations operable under a same origin policy. |
US08782793B2 |
System and method for detection and treatment of malware on data storage devices
Disclosed are systems and methods for detection and repair of malware on data storage devices. The system includes a controller, a communication interface for connecting an external data storage device, and a memory for storing antivirus software. The antivirus software is configured to scan the data contained in the data storage device, perform repair or removal of malicious files or programs found on the data storage device, identify suspicious files or programs on the data storage device and malicious files or programs that cannot be repaired or removed from the data storage device, send information about these files or programs to the antivirus software provider, receive updates for the antivirus software from the antivirus software provider, and rescan the suspicious files or programs and malicious files or programs that cannot be repaired or removed using updated antivirus software. |
US08782786B2 |
Remedial action against malicious code at a client facility
Aspects of this invention may relate to a malicious application remedial action request application where a network site interaction may be requested from a client computing facility; the network site interaction from the client computing facility may be determined to be unacceptable based on an acceptance policy at a gateway facility; access to the network site from the client computing facility may be denied; information relating to the attempted interaction with the network site may be sent from the gateway facility to the client computing facility, wherein the information may indicate that the attempted interaction occurred; and the client computing facility may interpret the information relating to the attempted interaction, determine whether the attempted interaction was the result of an automatically generated request, and take remedial action in the event that the attempted interaction was the result of the automatically generated request. |
US08782779B2 |
System and method for achieving protected region within computer system
A system and method for achieving one or more protected regions within a computer system having multiple partitions are disclosed. In at least some embodiments, the system includes an intermediary device for use within the computer system having the multiple partitions. The intermediary device includes a fabric device, and a first firewall device capable of limiting communication of a signal based upon at least one of a source of the signal and an intended destination of the signal, the first firewall device being at least indirectly coupled to the fabric device. The intermediary device further includes a first conversion device that is one of integrated with the first firewall device and distinct from the first firewall device, and that is capable of converting between a processor address and a fabric address for use by the fabric device. In some embodiments, the various devices each include Control and Status Registers (CSRs). |
US08782778B2 |
Rule-based application access management
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. |
US08782775B2 |
Embedded authentication systems in an electronic device
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). |
US08782773B2 |
Framework for communicating across a firewall
A system for enabling communication between a first domain and a second domain is disclosed. At least the first domain is protected by a firewall. A first data-processing system is provided in the first domain and a second data-processing system provided in second domain. The second domain hosts an application that the first domain desires to access. To enable the communication between the two domains a tunnel is established through the firewall. The tunnel runs from the first data-processing system to the second data-processing system. The second data-processing system provides a web-proxy interface to interface to the application and also acts as a tunnel gateway. |
US08782768B2 |
Systems and methods for accessing a virtual desktop
Methods, computer-readable storage medium, and systems described herein facilitate enabling access to a virtual desktop of a host computing device. An authentication system receives one of an authentication token and a reference to the authentication token, wherein the authentication token is indicative of whether a user successfully logged in to an authentication portal using a client computing device. The authentication system generates a private key, a digital certificate, and a personal identification number (PIN) for the user in response to receiving the one of the authentication token and the reference to the authentication token. The private key, the digital certificate, and the PIN are stored in a virtual smartcard, and the client computing device is authorized to log into a virtual desktop using the virtual smartcard. |
US08782766B1 |
Method and apparatus for single sign-on collaboration among mobile devices
A system for, and method of, single sign-on collaboration among a plurality of mobile devices, includes a server for issuing a first identity token to subsequently authenticate a user of a first of the mobile devices to a service provider, and for generating and sending a collaboration credential to the first device based on the first identity token or user authentication. The first device sends the collaboration credential generated by the server to a second device paired with the first device. The server also issues a second identity token to subsequently authenticate to the service provider the user of the second device based on the collaboration credential received from the first device, to support single sign-on collaboration for the user across the plurality of mobile devices. |
US08782758B2 |
Biometric authentication system, biometric authentication server, method and program thereof
An authentication system in which a authentication server and a plurality of clients are coupled through a network and configured to process an authentication from a user of a client, is configured to determine as a cache target user another user who is different from the user who requested the authentication; is configured to generate an identifier that indicates the cache target user; and is configured to transmit biometric data of the cache target user and the identifier to the client from which the authentication of the user was requested. A cache availability determiner can determine whether biometric data of any cache target user are available on a client. |
US08782757B2 |
Session sharing in secure web service conversations
Techniques are disclosed for sharing communication session information sharing in web service applications. The techniques include management of concurrent sessions by dynamically determining the session association of web service requests at runtime. These sessions can be shared by a group of web services on the server side, and across multiple web services clients with many users, independently of where these applications reside. Session identifiers are determined for these concurrent web service invocations based on an algorithm that uses information from configuration and runtime data. Different information is used in the session identifier depending on configuration parameters to provide different types of sharing that correspond to different use cases. This mechanism can be used with SOAP-based web services, REST-based web services, and the like. |
US08782753B2 |
Authorization and authentication based on an individual's social network
In particular embodiments, a method includes receiving a request to transmit content related to a first user to a second user, determining whether transmission of the content is authorized based on a list of unauthorized users, and transmitting the content to the second user if the transmission is authorized based on the list. |
US08782752B1 |
Apparatus and method for multi-plane threshold security
Servers are configured to operate in two or more threshold security planes with each such threshold security plane implementing at least a portion of a corresponding threshold security protocol involving at least a subset of the servers. The servers are implemented on at least one processing device comprising a processor coupled to a memory. Multiple ones of the servers may be implemented on a single processing device, or each of the servers may be implemented on a separate processing device. At least one of the servers may be part of at least two of the threshold security planes. A given request for a protected resource is processed through each of the planes in order for a corresponding user to obtain access to the protected resource. By way of example, the security planes may comprise two or more of an authentication plane, an access control plane and a resource plane. |
US08782751B2 |
Systems and methods for user access authentication based on network access point
Systems and methods of authenticating user access based on an access point to a secure data network include a secure data network having a plurality of a network access points serving as entry points for a user to access the secure data network using a user device. The user is associated with a user identity, each network access point with a network access point identity. The user uses a user device to send an access request, requesting access to the secure data network, to the network access point, which then sends an authentication request to an identity server. The identity server processes the authentication request, by validating the combination of the user identity and the network access point identity, and responds with an authentication response, granting or denying access, as communicated to the user device via an access response. |
US08782743B2 |
Methods and apparatus for use in a generic bootstrapping architecture
According to an aspect of the present invention there is provided a method of obtaining authentication information for use in a Generic Bootstrapping Architecture, GBA, employed in a network with one or more GBA-capable subscriber registers and one or more GBA-incapable subscriber registers. The method involves a selection function for determining whether the authentication information of a subscriber is stored at a GBA-capable subscriber register or at a GBA-incapable subscriber register, and an inter working function for translating between the Diameter messages of the Zh interface and the MAP messages of the Zh′ interface. |
US08782740B1 |
Systems and methods for detection of unauthorized or unsecured access points
A method for detecting unauthorized or unsecured access points is disclosed. At least one node of a computer network having a wireless network interface is identified. At least one of the identified nodes is requested to scan for detectable wireless access points. A listing of identified wireless access points is utilizing information gathered through at least one of the scans. An inventory of authorized wireless access points is formulated. The listing is compared to the inventory to identify unauthorized wireless access points. Also, security information may be gathered and analyzed for identified wireless access points. |
US08782739B2 |
Access list key compression
Methods and apparatus for implementing an access list key for accessing information associated with a packet from an access list are disclosed. The packet includes an IP source address field and an IP destination address field, the IP source address field including an IP source address and the IP destination address field including an IP destination address, the IP source address and the IP destination address each having a number of bits (e.g., 128 bits in the case of IPv6). An IP source address is obtained from the IP source address field of the packet and an IP destination address is obtained from the IP destination address field of the packet. A modified IP source address is generated from the obtained IP source address such that the number of bits in the modified IP source address is less than the number of bits in the obtained IP source address. In addition, a modified IP destination address is generated from the obtained IP destination address such that the number of bits in the modified IP destination address is less than the number of bits in the obtained IP destination address. The access list key is then composed from the modified IP source address and the modified IP destination address. |
US08782738B2 |
Aircraft communications system using whitelists to control access and associated methods
A communications system for an aircraft carrying at least one person having a personal electronic device (PED) includes an aircraft server in the aircraft for determining airborne validation of a ground server address entered via a corresponding PED, and a transceiver in the aircraft cooperating with the aircraft server for communicating using the airborne validated ground server address. A ground server on the ground is for determining ground validation of the airborne validated ground server address, and provides ground access for the corresponding PED for which the entered ground server address has both airborne and ground validation. |
US08782736B1 |
Method and apparatus for policy criteria generation
Methods, apparatuses, and computer program products are described herein that are configured to generate criteria that defines instances in which a policy is to be applied or otherwise activated. In some example embodiments, a method is provided that comprises receiving an indication of a selected field of one or more fields that are applicable to a criteria for a policy. The method of this embodiment may also include receiving an indication of an operation selection and a specified value related to the selected field. The method of this embodiment may also include generating a criterion that modifies the criteria for the policy. |
US08782731B2 |
System, method, and apparatus for providing digital video recorder services on a portable wireless device
Methods and apparatus for providing digital video recorder services with a portable wireless device (PWD). The PWD includes at least a transceiver, a processing unit and a memory unit. The transceiver receives a video content signal transmitted from a broadcaster of mobile broadcast digital TV, and an electronic program guide (EPG). The processing unit is in communication with the transceiver and the memory unit and the processing unit: stores the TV programming information on the memory unit; displays, responsive to a first user input, the TV programming information; records on the memory unit, responsive to a second user input, a selected video content signal received by the transceiver; and plays back the selected video content signal, responsive to a third user input, from the memory unit. |
US08782730B2 |
User assistance via customer premises equipment media files
A particular customer premises equipment (CPE) device includes a display interface, a processor, and a memory accessible to the processor. The memory includes a plurality of media files that include user assistance information. The memory also includes instructions executable by the processor to access a media file of the plurality of media files and, in response to a user request for assistance, send content of the media file to a display device via a display interface. |
US08782728B2 |
Stream conditioning for seamless switching of addressable content across transport multiplex, using local stored content as pre-roll and post-roll buffers; in digital television receivers
A system, method and apparatus to enable addressable advertising content delivery in which multiple addressable content streams are sent in a transport multiplex, Addressable Content Channel Multiplex, different from the Primary Channel Multiplex on which the Primary Channel is delivered. The Primary Channel is network stream onto which the addressable content is to be inserted. Seamless switch between the Primary Channel and the addressable content streams on the Addressable Content Channel Multiplex is accomplished by using Receiver stored content as interim buffers to which the switching happens prior to switching to a different transport multiplex. These buffers feed the audio and video decoders with content, during the time it takes for the tuner to switch to a different transport multiplex. Pre-roll and Post-roll content buffers are used during switching, one from Primary Channel Multiplex to Addressable Content Channel Multiplex and from Addressable Content Channel Multiplex to Primary Channel Multiplex. |
US08782724B2 |
User editable metadata for interactive television programs
Television programming may be annotated with metadata and the metadata may be shared among subscribers. A set-top box may receive, from a server, metadata relating to a television program, the metadata having been created by users of other set-top boxes and at least some elements of the metadata including information describing portions of the television program to which the metadata is relevant. The set-top box may present the metadata during portions of the television program at which the metadata is relevant. |
US08782722B1 |
Decoding of closed captions at a media server
Systems and methods of processing closed captions are disclosed. For example, a media server may receive a first video stream and first closed caption data associated with the first video stream. The media server may interpret at least one command included in the first closed caption data to generate interpreted closed caption data. The media server may transmit, to a destination device, a second video stream including second closed caption data that is generated based on the interpreted closed caption data. |
US08782720B2 |
Method and system for synchronizing content between terminals
A synchronization apparatus and method for synchronizing playback time of a media provided to multiple devices during service transfer and replication process are provided. The content synchronization system for providing a receiving terminal with content of a sending terminal, the content synchronization system includes the sending terminal; the receiving terminal; and a server configured to provide content to the sending terminal and the receiving terminal and to comprise a communication unit configured to communicate the sending terminal and the receiving terminal and to transmit a message and information about time point at which the message is sent, and a content playback time point calculating unit configured to calculate a first content playback start time point of the receiving terminal in an effort to provide the content of the sending terminal that is synchronized with the receiving terminal. |
US08782716B2 |
Systems and methods for rendering user interface objects in accordance with a variable scaling factor
A method for rendering one or more user interface objects on a television screen is disclosed. The method is performed at a computer system coupled with the television screen. The method includes receiving a request for rendering a user interface object, and identifying a variable scaling factor. The variable scaling factor is determined in accordance with a distance parameter corresponding to a distance between a respective user and the television screen. The method also includes rendering the user interface object on the television screen in accordance with the variable scaling factor while maintaining a display of a television program on the television screen based on a fixed scaling factor. |
US08782715B2 |
Communication apparatus
A communication apparatus comprises a connecting unit for connecting with a power line, a circuit for receiving a power supply through the connecting unit, and a communicating unit for communicating with an external apparatus through the connecting unit, a controlling unit for determining whether or not to permit a power supply stop, in accordance with the communicating unit receiving information on a request for the power supply stop, and controlling the communicating unit to transmit response data corresponding to the determination. |
US08782707B2 |
Differentiated PSIP table update interval technology
An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. |
US08782703B2 |
System and method for picture-in-picture assisted time-adaptive surfing for a content presentation system
Systems and/or methods are disclosed herein to identify a user interacting with a content presentation system, adaptively learn, in a passive manner, a user's pattern of accessing content over time, and globally store the user's identifying and use information. Specifically, disclosed are systems and/or methods for switching from a first signal provided to a second signal, including identifying a user of a first content presentation system, creating a first preferred channel list which includes channel information for each of select ones of plural signals, where the preferred channel list is created based on the identity of the user and based on channel use information for the user during a recurring first time period, presenting substantially simultaneously to the user a first signal of the select ones of plural signals in a first frame and a second signal of the select ones of plural signals in a second frame. |
US08782701B2 |
Method for watching missed television programs and user terminal
A method for watching a missed television (TV) program and a user terminal are provided. The method includes the following steps. Electronic program guide (EPG) information distributed by a headend is received, and a local table of missed programs and current time are obtained. It is determined that a missed program exits when the user terminal is in a non-working status according to the local table of missed programs and the current time. Information of the missed program in the local table of missed programs is updated according to the EPG information. It is detected whether the missed program is played currently, and if yes, a service of watching a missed program is implemented. By using the method for making up for watching the missed TV program and the user terminal, when the missed program of the user is played in a system, the user is reminded in time of watching the missed program, and a trouble that the user searches the missed program through the EPG is avoided. |
US08782700B2 |
Controlling one or more attributes of a secondary video stream for display in combination with a primary video stream
A method controls one or more attributes of a secondary video stream for display in combination with a primary video stream. The method comprises: identifying a primary video stream; identifying a secondary video stream; assigning one or more settings for one or more attributes of said secondary video stream to a predetermined set of one or more user identifiers; identifying the user identifier associated with a given video processing module; determining the one or more attribute settings assigned to the user identifier; and processing the secondary video stream for display in combination with the primary video stream in accordance with the one or more attribute settings for the user identifier. |
US08782695B2 |
Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same
A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel. |
US08782689B2 |
Method of broadcasting content and at least one complementary element, utilizing a server and a terminal
A method and apparatus are provided for broadcasting at least one complementary element corresponding to a content broadcast to a terminal. The method includes: applying, to at least one portion of the content, at least one index detection function, stored in a database, the detection function delivering an information cue regarding the presence or absence of the index, providing at least one complementary element associated with the index, if a presence cue is emitted; and combining the content and the at least one complementary element, thereby delivering a complete content. |
US08782686B2 |
Dynamic item highlighting system
A method and apparatus for highlighting a program listing in a set of program listings based on selection criteria. The selection criteria may indicate that the a broadcaster has agreed to pay a service provider in return for the service provider ensuring that a program listing, corresponding to the program of the broadcaster, is highlighted in a program page that displays a set of program listings, such as television program listings. If there are multiple program listings, listed in a program page, that are to be highlighted, then details of the respective contracts may be used to determine which program listing to highlight. Such details may include the total contract value, a ratio of contract value-to-page view, and/or the time of contract formation. |
US08782678B2 |
Disk clamping mechanism and disk rotating motor provided with same
There is provided a disk clamping mechanism that supports a disk on a turntable unit under pressure by an attractive force produced between a clamping magnet and a damper constituted in a rotor unit, wherein the clamping magnet is directly fixed at the upper surface of a rotor frame including the turntable unit, and further, the upper surface of the clamping magnet is covered with a centering member for centering the disk. |
US08782673B2 |
Sharing of first class objects across multiple interpreted programming languages
Systems and methods are disclosed for enabling users to write scripting code in a first scripting language, and then use a second scripting language to call language constructs written in that first scripting language. Functions, Class Definitions, Class Instances, Modules and other language constructs are treated as first-class objects that can be shared across the different scripting languages. The techniques disclosed herein are also applicable to domain-specific languages. As part of the methodology, a respective underlying representation of each of these object types is designed as an interface and then that interface is implemented in each scripting language. In addition, code is written in each scripting language implementation to allow the latter to use the interface to represent a Function, Class, or other language construct. |
US08782670B2 |
System and method for application isolation
A system, method, and computer readable medium for providing application isolation to one or more applications. The system may include an isolated environment including application files and executables, and an interception layer intercepting access to system resources and interfaces. The system may further include an interception database maintaining mapping between the system resources inside the isolated environment and outside, and a host operating system, wherein the isolated environments are saved on at least one of a local and remote storage. |
US08782669B2 |
Non-transitory storage medium encoded with computer readable information processing program capable of enhancing zest of application program performing event processing, information processing apparatus, method of controlling information processing apparatus, and information processing system
An exemplary embodiment provides a non-transitory storage medium encoded with a computer readable information processing program and executable by a computer of an information processing apparatus. The information processing program causes the computer to function as a data storage unit for storing for each user, data for application that can be made use of in a prescribed application program executable by a plurality of users, a data communication unit for transmitting and receiving the data for application stored in the data storage unit to and from another unspecified information processing apparatus present within a prescribed range, and an event processing unit for performing event processing based on at least one of the data for application received by the data communication unit and the data for application of another user stored in the data storage unit when one of the plurality of users executes the prescribed application program. |
US08782665B1 |
Program execution optimization for multi-stage manycore processors
An architecture for a multi-stage manycore processor shared dynamically among a set of software applications, with capabilities for destination task defined intra-application prioritization of inter-task communications (ITC), for architecture-based ITC performance isolation between the applications, as well as for prioritizing application task instances for execution on cores of manycore processors based at least in part on which of the task instances have available for them the input data, such as ITC data, that they need for executing. |
US08782664B2 |
Autonomic hardware assist for patching code
Hardware assist to autonomically patch code. The present invention provides hardware microcode to a new type of metadata to selectively identify instructions to be patched for specific performance optimization functions. The present invention also provides a new flag in the machine status register (MSR) to enable or disable a performance monitoring application or process to perform code-patching functions. If the code patching function is enabled, the application or process may patch code at run time by associating the metadata with the selected instructions. The metadata includes pointers pointing to the patch code block code. The program code may be patched autonomically without modifying original code. |
US08782661B2 |
Systems and methods for load balancing drives and servers
A file system that balances the loading of filers and the capacity of drives that are associated with the filers is described. The file system includes a first disk drive that includes a first unused capacity and a second disk drive that includes a second unused capacity, wherein the second unused capacity is smaller than the first unused capacity. The file system further includes a first filer that is configured to fill requests from clients through access to at least the first disk drive. The file system further includes a second filer that is configured to fill requests from clients through access to at least the second disk drive. The second filer is configured to select an infrequently accessed file from the second disk drive and to push the infrequently accessed files to the first disk drive, thereby improving a balance of unused capacity between the first and second disk drives without substantially affecting a loading for each of the first and second filers. |
US08782659B2 |
Allocation of processing tasks between processing resources
Processing tasks are allocated between a plurality of processing resources. Each of the processing resources has associated therewith one or more queues for holding tasks awaiting processing. Each of the tasks has a task-type indication identifying the task as belonging to one of a plurality of predetermined task-types. At least one of the plurality of processing resources selects one of the plurality of task-types and transfers one or more tasks of that task-type to another of the processing resources. |
US08782654B2 |
Co-allocating a reservation spanning different compute resources types
A system and method of reserving resources in a compute environment are disclosed. The method embodiment comprises receiving a request for resources within a computer environment, determining at least one completion time associated with at least one resource type required by the request, and reserving resources within the computer environment based on the determine of at least the completion time. A scaled wall clock time on a per resource basis may also be used to determine what resources to reserve. The system may determine whether to perform a start time analysis or a completion time analysis or a hybrid analysis in the process of generating a co-allocation map between a first type of resource and a second type of resource in preparation for reserving resources according to the generated co-allocation map. |
US08782652B2 |
Control server, virtual server distribution method
When plural virtual servers are distributed to plural physical servers, efficient distribution is performed in terms of the processing capacity of the physical servers and their power consumption. Firstly a second load of each virtual server in future is predicted based on a first load in a prescribed time period up to the present of each of the plural virtual servers. Next, the schedule is determined to distribute the plural virtual servers to the plural physical servers based on the second load of each virtual server so that a total of the second loads of one or a plurality of the virtual servers distributed to a physical server is within a prescribed range of proportion with respect to processing capacity of the physical server. Furthermore, the distribution is instructed (execution of redistribution) in accordance with the schedule. |
US08782651B2 |
Dynamically redirecting a file descriptor of an executing process by another process by optionally suspending the executing process
The method includes identifying a first executing process using a second executing process. The first executing process may include a file descriptor and the first executing process may be independent of the second executing process. The method includes disassociating the file descriptor from a first data stream using the second executing process without involvement of the first executing process. The method includes associating the file descriptor with a second data stream using the second executing process without involvement of the first executing process in response to disassociating the file descriptor from the first data stream. |
US08782647B2 |
Intelligent retry method using remote shell
Method for issuing and monitoring a remote batch job, method for processing a batch job, and system for processing a remote batch job. The method for issuing and monitoring a remote batch job includes formatting a command to be sent to a remote server to include a sequence identification composed of an issuing server identification and a time stamp, forwarding the command from the issuing server to the remote server for processing, and determining success or failure of the processing of the command at the remote server. When the failure of the processing of the command at the remote server is determined, the method further includes instructing the remote server to retry the command processing. |
US08782639B2 |
Computer scheduling product and apparatus therefor
A computer-readable recording medium stores therein a scheduling program that causes a computer to execute a process. The process includes executing multiple virtual computing machines that operate an OS; receiving a change in the number of activations of completely activated software from the OS; updating when the change in the number of activations has been received, a first table that stores software completely activated in the OS; selecting from a second table that stores combinations of a completely activated software group, a combination according to a software group stored in the first table; extracting from the second table and according to the selected combination, priorities of software stored for each of the combinations; and updating the priorities of the software stored in the first table to the extracted priorities. |
US08782637B2 |
Mini-cloud system for enabling user subscription to cloud service in residential environment
A mini-cloud system has been described to enable subscription or service model for computing infrastructure, software, and digital content. The mini-cloud system works as a pipeline for information delivery connecting end user, infrastructure provider, content provider, and retailer offering automatic provisioning of infrastructure, content life cycle management, automatic upgrade, servicing, and license managements based on subscription model. Mini-cloud system uses a subscription management component and virtualization host to back computing environment, then adds routing component to connect to back-end cloud infrastructure along with a digital content delivery framework. The system allows a user to subscribe in a computing environment, preferred software applications, and digital content like move and pay a monthly utility bill. |
US08782634B2 |
Installation method and apparatus
Upon installing an application, one of a plurality of frameworks determines a framework in which the application is to be installed, and installs the application in the determined framework. |
US08782632B1 |
Methods and apparatus for performing in-service software upgrade for a network device using system virtualization
A method and/or network system is able to perform an in-service software upgrade (“ISSU”) using virtualization technology while ongoing network service is maintained. After receipt of an upgrade signal such as a command of software upgrade, a new or second virtual machine (“VM”) is created in response to the upgrade signal. After downloading the new version of program to the second VM while maintaining the first version of program running on the first VM, the process for providing network management begins to migrate from the first version of program to the new version of program. The process simultaneously facilitates ISSU for a data-path module such as a line card to convert from the previous version of software to the new version of the software. |
US08782627B2 |
Path specializations for runtime code with phase behavior
Mechanism that employs code cloning and specialized code execution for barriers to minimize runtime overhead. This is facilitated by duplicating code and inserting specializations of the barriers in the code copies. The mechanism is effective for garbage collection when the garbage collection executes through different phases, and the barrier behavior and overheads depend on these phases. The duplicated and specialized code enables the program to run efficiently by reducing the dynamic count of a phase check when the phase is well-known and phase checks can be avoided. |
US08782622B2 |
Optimistic selection of best performing generated code of multiple ISA systems
A system and method are disclosed for improving the performance of compiled Java code. A native code management module determines the available processor resources associated with a target information processing system, their respective instruction set architecture (ISA), and possible native code compilation optimization processes. The native code management module then generates compiler parameter permutations, which are iteratively provided to a just-in-time (JIT) compiler. Each compiler parameter permutation is used by JIT compiler to generate a native code compilation iteration. Each of the resulting native code compilation iterations are executed by the JVM and their respective performance is measured to determine the best performing native code compilation iteration. |
US08782619B2 |
Extending programming language semantics while maintaining standard syntax through aliasing
A method is provided for allowing programmers to specify program execution control semantics using standard programming language syntax even when the standard language does not provide a language construct for specifying execution control. In a similar manner, the approach provides programmers the ability to extend the expressiveness of a language by introducing statements expressed in the syntax of a target programming language. A program written in a first programming language may be translated into statements of a second programming language, where the target programming language is more expressive than the first. This language-based approach preserves the standard syntax of the first programming language, allowing a program written with semantic extensions to be compiled and run according to the standard on any standards-compliant system. |
US08782616B2 |
Templates for configuring digital sending devices to achieve an automated business process
A content management method is described. The method includes identifying digital sending devices. The method includes authoring an automated business process design. And the method includes translating the automated business process design into information technology templates for configuring each of the identified digital sending devices to achieve the automated business process. |
US08782614B2 |
Visualization of JVM and cross-JVM call stacks
A method for diagnosing problems in a computer system by visualizing flows through applications and other subsystems in a directed graph on a user interface. The user interface represents multiple instances of each application or other subsystem by a respective node, and edges indicate which nodes depend on one another. Aggregate metrics which are based on the multiple instances, and associated alerts, can be provided for the nodes and edges. An aging process can indicate which nodes have not been recently invoked. The user interface can also indicate which nodes and edges are associated with a given business transaction. In a summary view, a node hides the identity of invoked components such as servlets of the application, while in a detailed view these details are provided. |
US08782610B2 |
Method of tracing object allocation site in program, as well as computer system and computer program therefor
A data structure of a run-time object having a hash value field. The data structure allows an object allocation site to be traced from the run-time object, the object allocation site being a site in a program allocating the run-time object. A method for allowing an object allocation site to be traced from a run-time object includes embedding a value corresponding to the object allocation site in the program. A hash-value field includes the embedded value and the object identifier, and the tracing is performed by identifying the object allocation site that corresponds to the embedded value. A computer system for tracing an object allocation site includes a memory that stores the run-time object; an acquirer that acquires the value from a hash value field; and an identification unit that identifies the object allocation site that corresponds to the acquired value. |
US08782602B2 |
Updating a workflow when a user reaches an impasse in the workflow
Provided are a method, system, and article of manufacture for updating a workflow when a user reaches an impasse in the workflow. A workflow program processes user input at a current node in a workflow and provides user input to traverse through at least one workflow path to reach the current node. The workflow program processes user input at the current node to determine whether there is a next node in the workflow for the processed user input. The workflow program transmits information on the current node to an analyzer in response to determining that there is no next node in the workflow. If there are modifications to the current node, then the analyzer transmits to the workflow program an update including the determined modifications to the current node in response to determining the modification. |
US08782601B2 |
Systems and methods for applying dynamic relational typing to a strongly-typed object-oriented API
A computer-implemented method includes executing instructions stored on a computer-readable medium. The computer-implemented method includes receiving, at a server hosting a strongly-typed object-oriented application programming interface (API), a single API call to request data from the strongly-typed object-oriented API, where the single API call includes a tuple having multiple object types, obtaining the requested data and returning the requested data. |
US08782598B2 |
Supporting a work packet request with a specifically tailored IDE
A computer-implemented method, system, and/or computer program product supports a user who is servicing a work packet request within a software factory. A tooling environment that is necessary to service a work packet request in a software factory is established. The software factory includes an assembly line that executes work packets to create the deliverable software, and a published set of services that describes what assembly services for assembling the work packets are offered by the assembly line. A full work packet-aware Integrated Development Environment (IDE) that is specific for a work packet identified by the work packet request is created. The full work packet-aware IDE and an associated Graphical User Interface (GUI) are transmitted to a user who has been assigned to service the work packet request, thus allowing resources depicted in the GUI to be interactively supplied to that user. |
US08782597B2 |
Ontology updating apparatus, method and system
According to one embodiment, an ontology updating apparatus includes a generation unit, an updating unit, a detection unit and a notification unit. The generation unit generates updating reference relationship. The updating unit updates a first class and a first package. The detection unit detects, using the updating reference relationship, whether at least one of target packages are comprised in the updating reference packages of the updated first package, the target packages each indicating a package to be updated and associated with the updated first class. The notification unit generates, if there is the target package, an update notice that the target package needs to be updated. |
US08782596B2 |
Automatically generating a graphical data flow program based on a circuit diagram
A method and system configured to: (a) display a first diagram including a first icon in response to input selecting the first icon; (b) associate the first icon with a first hardware device in response to input selecting the first hardware device from a set of hardware devices; (c) associate the first icon with a set of physical channels of the first hardware device in response to user input selecting the physical channels; and (d) perform the following operations one or more times: receive user input selecting a resource from a set of available resources including resources on the first hardware device; update the first diagram to include a graphical representation of the selected resource; receive user input to the first diagram specifying configuration information for the selected resource; and store the configuration information; (e) display a dataflow node indicating a transfer operation to be performed. |
US08782592B2 |
System and method for designing digital circuitry with an activity sensor
A system for designing digital circuitry comprising: a digital circuit simulator based on a file containing a functional description of this digital circuit; means for estimating an output variable from the digital circuit when executing a test bench supplied to the simulator; event counters, the events being detected using control signals provided by the simulator when executing the test bench. Said system further comprises means for selecting a portion of the event counters by iteratively optimizing a model for calculating the output variable of the digital circuit using output data from the event counters and means for registering the selected portion of event counters and the optimized calculation model. |
US08782590B2 |
Power managers for an integrated circuit
A system for an integrated circuit comprising a plurality of power islands includes a first power manager and a second power manager. The first power manager manages a first power consumption for the integrated circuit based on needs and operation of the integrated circuit. The second power manager communicates with the first power manager and manages a second power consumption for one of the power islands. |
US08782581B2 |
Test bench hierarchy and connectivity in a debugging environment
This application discloses a design verification tool to collect messages generated by a test bench during elaboration of the test bench. The messages can identify connectivity corresponding to library components in the test bench. A debug tool can generate a schematic representation of the test bench having circuit symbols corresponding to at least portions of the library components, which are interconnected with trace lines based, at least in part, on the messages. The debug tool can prompt display of the schematic representation of the test bench. |
US08782571B2 |
Multiple patterning process for forming trenches or holes using stitched assist features
One illustrative method disclosed herein involves identifying an overall target pattern comprised of at least one hole-type feature, decomposing the overall target pattern into at least a first sub-target pattern and a second sub-target pattern, wherein the first sub-target pattern and the second sub-target pattern each comprise at least one common hole-type feature, generating a first set of mask data information corresponding to the first sub-target pattern, and generating a second set of mask data information corresponding to the second sub-target pattern. |
US08782564B2 |
Method for collaborative display of geographic data
Embodiments of the present invention recite a method for collaborative display of geographic data. In one embodiment, a configuration file is created which defines how geographic data collected by a geographic data collection device is to be displayed by an office application. The configuration file is used to create a geographic data file in which collected geographic data is formatted to visually convey information about a geographic feature. The office application then accesses the geographic data file and automatically displays the geographic feature in a manner which is consistent with the configuration file. |
US08782562B2 |
Identifying content via items of a navigation system
A navigation system which provides: a navigation front end which provides tiles that are easily identifiable and content-driven vs. context-driven; a navigation system that includes an expanded view/tile paradigm; and a navigation system that allows users to interact with the native operating system environment of the information handling system. |
US08782561B2 |
Onscreen function execution method and mobile terminal for the same
An onscreen function execution apparatus and method are provided. The apparatus and method allow for intuitively executing various functions by manipulating function widgets arranged on an idle mode screen. The onscreen function execution method of the present invention includes displaying an idle mode screen having a widget box containing at least one widget icon, arranging at least one widget by moving the at least one widget icon representing the at least one widget out of the widget box and positioning the at least one widget icon at a position on the idle mode screen and enabling, if a widget selection command is detected on the at least one widget, the at least one widget. The execution method enables a user to customize an idle mode screen with functional objects. |
US08782560B2 |
Relative item of interest explorer interface
Systems and methods are disclosed for providing a Graphical User Interface (GUI) for representing a reference item and a number of items of interest. In one embodiment, each item of interest is assigned to one of a number of concentric regions in a two-dimensional space based on one or more attributes of the item of interest. The concentric regions in the two-dimensional space are centered at a location in the two-dimensional space that corresponds to the reference item. A GUI is then generated such that the GUI includes concentric display regions that correspond to the concentric regions in the two-dimensional space, where a select concentric display region provides an expanded view of the items of interest located within the corresponding region in the two-dimensional space and the remaining concentric display region(s) provide collapsed view(s) of the items of interest in the corresponding region(s) of the two-dimensional space. |
US08782559B2 |
Apparatus and method for displaying a three dimensional GUI menu of thumbnails navigable via linked metadata
A display control apparatus includes a search unit for searching for a second content linked to a first content and a display control unit for controlling display of a search history of content search performed in accordance with one of a first image and a first character, each indicating the first content, one of a second image and a second character, each indicating the second content and link information linking the first content to the second content. |
US08782556B2 |
User-centric soft keyboard predictive technologies
An apparatus and method are disclosed for providing feedback and guidance to touch screen device users to improve text entry user experience and performance by generating input history data including character probabilities, word probabilities, and touch models. According to one embodiment, a method comprises receiving first input data, automatically learning user tendencies based on the first input data to generate input history data, receiving second input data, and generating auto-corrections or suggestion candidates for one or more words of the second input data based on the input history data. The user can then select one of the suggestion candidates to replace a selected word with the selected suggestion candidate. |
US08782555B2 |
Nested user interfaces for multiple displays
Nested user interfaces for multiple displays is described. In embodiment(s), user interface panels can be generated for individual display on a small screen device as well as for display together to form a nested user interface on a larger display device. Each user interface panel can be individually displayed to encompass a small display screen on the small screen device. Additionally, a television client device can render a nested user interface that includes a plurality of the user interface panels displayed together to form the nested user interface on a larger display device. |
US08782550B1 |
Character string replacement
In one example, a method includes outputting, for display at a presence-sensitive display, a graphical user interface including a text display region and a graphical keyboard. The method further includes receiving an indication of a first gesture detected at a location within the text display region, and selecting, based at least in part on the location within the text display region, at least a portion of a character string included in the text display region. The method further includes receiving, while the first gesture is detected at the presence-sensitive display, an indication of at least a portion of a second gesture to select at least one key of the graphical keyboard, and outputting, responsive to receiving an indication of a termination of at least the second gesture, a replacement character string for display within the text display region to replace the portion of the character string. |
US08782540B2 |
Content, traffic and advertising engine, system and method
An engine, platform, system and method of interconnecting content generation, advertisement relevance, and traffic stimulation. The present invention may include the generation of one or more content items into a primary content window, the presentation of one or more content items in a secondary content window, a repeated crawl of the one or more content items in the primary content window, the presentation of a first plurality of advertisements relevant to the repeated crawl, the maintenance of a viewer of the primary content window at least partially based upon the one or more content items in the secondary content window, at least until the presentation of a second plurality of advertisements relevant to the repeated crawl, a targeting of at least one subset of traffic in accordance with the generation of the content in the primary content window, and a tracker that increases proportionally with the relevance of the first plurality of advertisements. |
US08782534B2 |
Independent viewing of web conference content by participants
A method for allowing independent viewing of web conference content may include enumerating a plurality of windows of content of a web conference to allow caching of visible and non-visible portions of each enumerated window by a client computer device of a participant to provide independent viewing of each enumerated window by the participant in the web conference. The method may also include forming a bitmap of visible and non-visible portions of each enumerated window. The method may further include transmitting the bitmap of each enumerated window to the client computer device of the participant in the web conference. |
US08782530B2 |
Method and system for providing a user interface in a computer
Presenting a user interface in a computing system, where device-specific information is added to data defined generically with respect to a particular device or presentation technology. The generic definition can be provided via template representing data and functionality of a user interaction, which is presented to a user in a specific way on a specific user interface. A class can be derived in the user interface from the template and instantiated with data in accordance with particulars of a data type. Data can be presented via instructions representing basic presentation patterns defining how data is to be presented on a user interface. Identifications of the instructions are matched to instructions to generate instructions specific to a presentation environment. |
US08782527B2 |
Collaborative phone-based file exchange
A collaborative phone-based file exchange technique that wirelessly synchronizes a user's work context with his or her mobile phone and makes this context readily available and sharable in collaborative situations. When the user is away from their desk, collaboration with others is possible by sharing/downloading between the mobile phone and a paired PC, which may be a colleague's computer or a meeting room workstation/computer. When the user returns to their office, any recently downloaded files are automatically synchronized back to their office PC. |
US08782525B2 |
Displaying physical signal routing in a diagram of a system
Displaying physical signal routing of a system. A diagram of the system may be displayed. The system may include physical components connected via physical connections and logical components implemented on various ones of the physical components. The diagram may include a plurality of icons connected by wires. At least a first subset of the icons may represent logical elements of the system and wires between the first subset of icons may represent logical connections between corresponding logical elements. User input requesting signal routing information of the system may be received. In response, a signal route corresponding to a first logical connection between a first logical element and a second logical element may be visually indicated. |
US08782524B2 |
Method and apparatus for controlling presentation slides
A presentation control system and method are provided, in which a first terminal is connected to a second terminal to control displaying of a presentation file stored in the second terminal. The first terminal controls execution of the presentation file in the second terminal, controls execution of switching between slide pages included in the presentation file in the second terminal, and controls closing of the presentation file in the second terminal. |
US08782521B2 |
Graphical user interface with improved media presentation
Improved graphical user interfaces and techniques for providing remote media content to users are disclosed. According to one aspect, an application window display on a display device can expose a user not only to local media content but also to remote media content that is associated with the local media content. The local media content is stored locally, while the remote media content is stored remotely and available from a remote media server. According to another aspect, the remote media content to be displayed can be determined in a manner that is dependent on a user interaction with the local media content. According to still a further aspect, the manner by which the remote media content is displayed can be dependent on the availability of remote media content at the remote media server. |
US08782513B2 |
Device, method, and graphical user interface for navigating through an electronic document
An electronic device with a display and a touch-sensitive surface stores a document having primary content, supplementary content, and user-generated content. The device displays a representation of the document in a segmented user interface on the display. Primary content of the document is displayed in a first segment of the segmented user interface and supplementary content of the document is concurrently displayed in a second segment of the segmented user interface distinct from the first segment. The device receives a request to view user-generated content of the document. In response to the request, the device maintains display of the previously displayed primary content, ceases to display at least a portion of the previously displayed supplementary content, and displays user-generated content of the document in a third segment of the segmented user interface distinct from the first segment and the second segment. |
US08782512B2 |
Controller, method, and program product for controlling job information display, and recording medium
A controller for controlling a display of list information of one or more jobs executed in one or more apparatuses on a display unit is disclosed, wherein with respect to a specified one of display items of the list information of the jobs, the display items each having one or more classifications and having one or more attribute items determined independently for each of the classifications, a selection field for selecting one of the classifications is displayed; and the area of the specified one of the display items is expanded in accordance with the one of the classifications selected in the selection field, and the attribute items corresponding to the selected one of the classifications are displayed in the expanded area with respect to one or more of the jobs related to the selected one of the classifications. |
US08782510B2 |
Cell content scrolling
Disclosed are methods and systems for cell content alignment. The methods and systems involve retrieving one or more table parameters, the one or more table parameters including size of currently invisible cells in a display window, size of merged cells, the display window size and text size in the merged cells, calculating a position of a text in a visible portion of merged cells based on the table parameters and displaying the text in the merged cells based on the calculated position of the text. |
US08782509B2 |
Table graphics management method and apparatus
Embodiments of the present invention provide a table graphics management method and apparatus. The table graphics management method includes: displaying a table on a display apparatus; detecting a control track for the table input by an input device; determining a moving direction of the control track according to the detected control track; and along the moving direction of the control track, transposing original information in the frames of the row that are sequentially arranged along the first dimension into the frames of the column that are sequentially arranged along the second dimension, and transposing original information in the frames of the column that are sequentially arranged along the second dimension into the frames of the row that are sequentially arranged along the first dimension, so as to acquire a transposed table; and displaying a transposed table on the display apparatus. |
US08782508B2 |
Manipulating labelled data for data entry in management applications
A method is disclosed for data entry into the content of cells belonging to an output field, said data being expressed as a mathematical expression of the cell contents of at least one input field in a data multidimensional table used by a data management application. The comprises the steps of entering labels corresponding to the at least one input field and a label corresponding to the output field, said later label being expressed as the mathematical expression of said labels of said at least one input field; parsing the label of the output field into a mathematical expression by identifying the numeric operands, the operators and the at least one existing input field label; translating in the mathematical expression, the at least one existing input field label into the address of the cell containing the at least one input field label; and, for each cell of the output field, pasting in the cell content the translated mathematical expression and replacing in said pasted mathematical expression each cell address of the at least one input field label by the cell address of the at least input field belonging to the same record. |
US08782501B2 |
Error correction encoding method, decoding method and associated devices
An error correction encoding method is provided for encoding in parallel source digital data, having the form of a frame, wherein said data can be classified into N classes, where N is an integer at least equal to 2.The encoding method includes: a first recursive systematic convolutional encoding step of data to be encoded, formed by the data of the class 1; and an implementation of the following steps, for each n ranging from 1 to M, where M is a positive integer equal to or lower than N−1: nth mixing of a set formed by the data of the class n+1 and the systematic data of the preceding encoding; and (n+1)th recursive systematic convolutional encoding of data to be encoded, formed by the result of the nth mixing. Also disclosed is a related decoding method, as well as an associated encoding and decoding devices. |
US08782499B2 |
Apparatus and method for transmitting and receiving data in communication/broadcasting system
An apparatus and method for transmitting and receiving data in a wireless communication is provided. The method includes determining a number of zero-padding bits, determining a number (Npad) of bit groups in which all bits are padded with zeros, padding the all bits within 0th to (Npad−1)th bit groups indicated by a shortening pattern with zeros, mapping information bits to bit positions which are not padded in Bose Chaudhuri Hocquenghem (BCH) information bits, BCH encoding the BCH information bits to generate Low Density Parity Check (LDPC) information bits, and LDPC encoding the LDPC information bits to generate a zero-padded codeword, wherein the shortening pattern is defined as an order of bit groups defined as 6, 5, 4, 9, 3, 2, 1, 8, 0, 7, 10 and 11. |
US08782496B2 |
Memory controller, semiconductor memory apparatus and decoding method
A memory controller including a buffer configured to perform decoding frame-unit data decoded by an LDPC decoder through partial parallel processing based on a check matrix made up of a block of a unit matrix and a plurality of blocks in which each row of the unit matrix is sequentially shifted and store threshold decision information of the data read from a memory section, an LLR conversion section configured to convert the threshold decision information to an LLR, an LMEM configured to store probability information β calculated during iteration processing that repeatedly performs column processing and row processing based on the LLR in an iteration unit equal to or smaller than a size of the block, and a CPU core configured to transfer the probability information β stored in the LMEM to the buffer every time the iteration processing in the iteration unit is completed. |
US08782491B2 |
Detecting intentional corruption of data in a dispersed storage network
A method begins by a dispersed storage (DS) processing module of a DS unit selecting a data slice for corruption analysis and requesting integrity information for the data slice from one or more other DS units of a dispersed storage network. When the one or more requested integrity information is received, the method continues with the DS processing module analyzing the one or more received integrity information and local integrity information of the data slice stored in the DS unit. When the analysis of the one or more received integrity information and the local integrity information of the data slice is unfavorable, the method continues with the DS processing module identifying the data slice as being corrupted. |
US08782490B2 |
Data storage device and program method that modifies arrangement of program data to eliminate interfering data patterns
A data storage device includes a non-volatile memory device including a plurality of memory cells and a memory controller. The memory controller is configured to modify an arrangement of program data and to program the modified program data into the plurality of memory cells. The memory controller modifies the program data to eliminate a given data pattern causing physical interference between adjacent memory cells from the modified program data. |
US08782487B2 |
Systems and methods for locating and correcting decoder mis-corrections
Various embodiments of the present invention provide systems and methods for data processing. For example, data processing systems are disclosed that include a data decoding circuit having a data decoder circuit, an element modification circuit, an element modification log, and a mis-correction detection circuit. |
US08782485B2 |
Hierarchical channel marking in a memory system
Channel marking is provided in a memory system that includes a first memory channel, a second memory channel, and error correction code (ECC) logic. The memory system is configured to perform a method that includes receiving a request to apply a first channel mark to the first memory channel and determining a priority level of the first channel mark. A request is received to apply a second channel mark to the second memory channel, and a priority level of the second mark is determined. It is determined that the priority level of the first channel mark is higher than the priority level of the second channel mark. The first channel mark is supplied to the ECC logic while blocking the second channel mark from the ECC logic. |
US08782482B2 |
Method and system to improve link budget of a wireless system
A method and system to improve the link budget of a wireless system using fast Hybrid Automatic Repeat Request (HARQ) protocol. In one embodiment of the invention, the Medium Access Control (MAC) logic in a base station determines whether the quality of the communication link with a mobile station is bad. When the MAC logic in the base station determines that the quality is bad, the base station uses a fast Hybrid Automatic Repeat Request (HARQ) protocol to indicate to the mobile station to send identical information to the base station in each of a plurality of successive or consecutive communication intervals before processing any received identical information from the mobile station. The fast HARQ protocol reduces the latency of receiving the identical information correctly, as compared with the current HARQ protocol. |
US08782481B2 |
Receiving terminal and receiving method
A receiving terminal is provided that prevents a load on a network near a receiving terminal from increasing when a retransmission request is made to a plurality of other terminals, and enables the probability of being able to compensate for a lost packet by means of a retransmission packet to be increased. In a receiving terminal that transmits a retransmission request for compensating for a lost packet lost in a network, a measurement section measures a time period corresponding to a distance in the network between the receiving terminal and a plurality of receiving terminals, a calculation section calculates for each of the receiving terminals a float (spare time period) found by subtracting the current time and a time period measured by the measurement section from a playback time at which a retransmitted packet is played back, and a decision section decides retransmission request transmission timing and a retransmission request transmission destination for each of the receiving terminals based on the calculated floats. |
US08782477B2 |
High-speed serial interface bridge adapter for signal integrity verification
A loopback card includes a connector configured to connect to an IO interface and emulate a storage device interface. The connector includes a port configured to receive a set of signals from the IO interface and transmit them to a redriver. The connector is configured to receive the set of signals from the redriver and transmit them from the redriver to the IO interface. The connector includes control signal inputs configured to receive control signals from the IO interface. The connector further includes one or more logic gates configured to receive the control signals. The one or more logic gates apply a logic operation on the control signals to generate an output and route the output to the IO interface through the connector. The redriver is operably connected to the port and configured to receive the set of signals from the port and transmit them back to the port. |
US08782475B2 |
PRBS test memory interface considering DDR burst operation
A method of testing an interconnect between an electronic component and an external memory comprises receiving a data word having data bits and translating the data word into multiple cycles. The multiple cycles are transmitted through the interconnect to the external memory one after another such that a value of the data bit being transmitted is switched for each cycle. In another embodiment, an electronic component comprises an interface, a translation unit, and a test module. The translation module is configured to receive a burst from the external memory through the interface and is configured to translate the burst into a data word. The test module is configured to receive the data word from the translation module and is configured to compare the data word to a test pattern to detect an interconnect defect. |
US08782473B2 |
Sending failure information from a solid state drive (SSD) to a host device
A system, method, and computer program product are provided for sending failure information from a solid state drive (SSD) to a host device. In operation, an error is detected during an operation associated with a solid state drive. Additionally, a command is received for failure information from a host device. Further, the failure information is sent from the solid state drive to the host device, the failure information including failure information associated with the solid state drive. |
US08782468B2 |
Methods and tools to debug complex multi-core, multi-socket QPI based system
Methods and apparatus relating to debugging complex multi-core and/or multi-socket systems are described. In one embodiment, a debug controller detects an event corresponding to a failure in a computing system and transmits data corresponding to the event to one of the other debug controllers in the system. Other embodiments are also disclosed and claimed. |
US08782466B2 |
Multiple processing elements
A first processing element can run within a first operating range. A second processing element can run within a second operating range. A third processing element can be activated if the second processing element fails or can be refrained from being run unless the first or second processing element fails. |
US08782459B2 |
Apparatus and method for advanced synchronous strobe transmission
An apparatus is provided that compensates for misalignment on a synchronous data bus. The apparatus includes a resistor network, a core clocks generator, and a synchronous strobe driver. The resistor network is configured to provide a ratio signal that indicates an amount to advance a synchronous data strobe associated with a data group. The core clocks generator is coupled to the ratio signal, and is configured to advance a data strobe clock by the amount. The synchronous strobe driver is configured to receive the data strobe clock, and is configured to employ the data strobe clock to generate the synchronous data strobe, where the synchronous data strobe, when enabled, is advanced also by the amount. |
US08782457B2 |
Information processing apparatus and control method thereof
One embodiment provides an information processing apparatus, including: a main controller; a sub controller configured to supply power to the main controller; a first operation input module configured to issue an operation signal to cause the sub controller to start power supply to the main controller, in a power-off state; and a second operation input module configured to accept an operation input, wherein the sub controller is switchable into a forcibly locked state where the power supply to the main controller is not started in response to the operation signal, the sub controller being switchable into the forcibly locked state, according to the operation input from the second operation input module. |
US08782454B2 |
System and method for managing clock speed based on task urgency
A system and method are described for utilizing task urgency information when making power management decisions. For example, one embodiment of a method for managing power states of a processor comprises: executing a first power management state machine based on a first urgency level associated with a first task; detecting the execution of a second task having a second urgency level associated therewith; if the second urgency level is greater than the first urgency level, then executing a second power management state machine associated with the second urgency level. |
US08782453B2 |
Network power management apparatus and method
A network power management apparatus and method. The network power management apparatus includes a protocol management unit configured to be connected to a local communication apparatus and establish and manage a path between the local communication apparatus and neighboring communication apparatuses in the same network. The protocol management unit includes a delivery unit to deliver link information and power information of the local communication apparatus to the neighboring communication apparatuses, a first database to store the link information and the power information of the local communication apparatus and link information and power information of each of the neighboring communication apparatuses, a path management unit to calculate and establish a path using the information stored in the first database, and a packet generating unit to generate a power message using the power information of the local communication apparatus and deliver the generated power message to the neighboring communication apparatuses. |
US08782447B1 |
System and method for determining power consumption
A system and method is provided to measure the power consumption of circuits whereby, in one aspect, a processor's temperature is maintained so that its power consumption is measured at the point the processor throttles. |
US08782446B2 |
Security of cryptographic devices against differential power analysis
An embodiment of the invention provides a cryptographic device that draws a substantially constant current from an accessible electrical node that supplies power to the cryptographic device. Keeping the current drawn from the accessible electrical node substantially constant reduces the probability that secure information may be taken by unwanted third parties from the cryptographic device. The cryptographic device includes an active shunt current regulator, a low-pass filter, a linear voltage regulator and an AES (advanced encryption standard) circuit. |
US08782442B2 |
Apparatus and method for multi-point detection in power-over-Ethernet detection mode
An apparatus and method for multi-point detection in a power source equipment (PSE) device is provided. During multi-point detection, a series of at least four currents is sequentially applied to a link port of the PSE device. Each current is applied during a different measurement interval. A voltage measurement sample is obtained for each of the measurement intervals. A difference in voltage between alternating voltage samples is determined and used by a detection module to determine whether a valid power device is coupled to the link port of the PSE. |
US08782435B1 |
System and method for validating program execution at run-time using control flow signatures
A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow control instruction which terminates the sequence; a hash generator, configured to generate a hash associated with execution of the sequence of instructions; a memory configured to securely receive a reference signature corresponding to a hash of a verified corresponding sequence of instructions; verification logic configured to determine a correspondence between the hash and the reference signature; and authorization logic configured to selectively produce a signal, in dependence on a degree of correspondence of the hash with the reference signature. |
US08782431B2 |
Digital data authentication and security system
The present invention includes a system and process for generating secured, marked digital files. A cryptographic token is inertly embedded in markup language tags of digital files. |
US08782429B2 |
Securing execution of computational resources
Controlling access to computational features includes: preparing a computational resource for execution by an execution system that has been provided a primary descriptor containing an identity value and that has associated a feature indicator with the primary descriptor; accessing a secondary descriptor containing the identity value and cryptographically assigned to the computational resource; and granting the computational resource access to a computational feature of the execution system based on the feature indicator. |
US08782428B2 |
Encryption device and encryption method
Even if failure, or the like, occurs during the encryption process, the encryption process is surely resumed. A flag changing unit changes an encryption flag of one disk to being encrypted after an encryption request is received and before the encryption of the data stored on the one disk is started. The flag changing unit changes the encryption flag of the one disk to having been encrypted and changes the encryption flag of the other disk to being encrypted before copying the encrypted data from the one disk to the other disk is started. The flag changing unit changes the encryption flag of the other disk to having been encrypted after copying to the other disk is completed. |
US08782427B2 |
System and method for sequentially processing a biometric sample
This invention provides for progressive processing of biometric samples to facilitate user verification. A security token performs initial processing. Due to storage and processing limitations, false rejections may occur. To overcome this, the biometric sample is routed to a stateless server with greater processing power and data enhancement capabilities. The stateless server processes and returns an enhanced biometric sample to the security token for another attempt at verification. In another embodiment, the security token may have a second failure when verifying the enhanced biometric sample. It can then send the enhanced or raw biometric sample to a stateful server. The stateful server processes the biometric sample and performs a one to many search of a biometric database having a master set of enrolled authorized user biometric templates. The security token uses signals from the stateful server to grant or deny access. In both embodiments, heuristics remain with the security token. |
US08782425B2 |
Client-side CAPTCHA ceremony for user verification
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system, the facility presents a CAPTCHA challenge requesting verification that the user wants the action performed on the computer system. Upon receiving a response, the facility compares the received response to an expected correct response. If the received response is the correct response, the facility authorizes the action to be performed. |
US08782421B2 |
System and method for verification of personal identity
A system and method for storing identifying information and telephone numbers associated with individuals, and cross-referencing said information so as to link a first individual to other referee individuals capable of identifying the first individual as a result of a telephone conversation. When a relying party wishes to confirm the identity of a contracting party, the system is contacted and, using identifying information pertaining to said contracting party, identifies the set of referee individuals capable of identifying said contracting party, contacts a referee selected at random from the set, and places the contracting party in telephonic communication with the referee. At the conclusion of said telephonic communication, said system invites the referee to state the name of the first individual; by comparing the voice sample with a stored voice sample, the apparatus then provides identity confirmation to said relying party. |
US08782415B2 |
System for, and method of, providing the transmission, receipt and content of an E-mail message to a recipient
A server transmits a message and attachments from a sender to a recipient. A hash is provided of (a) the message, (b) an identification of the sender and (c) a hash of the attachments to form a data string. Instructions may be included for the recipient to send a hashed encryption of the string to a website at the server by registered electronic mail which provides options to obtain other electronic advantages. To authenticate the message, the recipient transmits the message, the attachments and the hashed encryption of the string to the server website. The server decrypts and detaches the hashed encryption of the string to provide a first string and hashes the message, the sender identification and the hashed attachments in the first string to form a second string. The server also detaches and hashes the attachments from the message received at the server website to form first hashed attachments and detaches the hashed attachments from the string to form second hashed attachments. When the first and second hashed attachments match and the first and second strings match, the server authenticates the message to the recipient. |
US08782413B2 |
Unattended code update of storage facility
Various embodiments for providing an update to at least one storage facility in a computing storage environment are provided. In one embodiment, media is received in one or more updatable elements of one or more components of the at least one storage facility, each of the one or more updatable elements including one or more unique update images and one or more unique update commands, a security verification is performed on the update via a certificate authentication mechanism to confirm a validity of the update, a safety verification is performed on the update to confirm a suitability of the update to the at least one storage facility, the update is installed in the at least one storage facility, and the update in the at least one storage facility is processed by traversing a fixed state machine for each updatable element. |
US08782412B2 |
Secured privileged access to an embedded client on a mobile device
Disclosed is an apparatus and method to access privileges of Virtual Mobile Management (VMM) client in mobile device. A disclosed example method contains an assigning embedded stub to raise the access privilege of the tool on a mobile device, the embedded stub is integrated by an operating system of the mobile device with “root” privilege, determining via a secured key exchange algorithm that the VMM client and tools is authorized to be installed on the mobile device then, the VMM client and tools of a mobile device are authorized to access a network interface of the Communication Endpoint Gateway (CEG) server, configuring the embedded stub to install the key exchange procedure for the shared certification between the embedded stub, VMM client and the session mediation server, enabling the embedded stub to communicate through a secure link via VMM client. |
US08782410B2 |
Avoiding padding oracle attacks
Information leakage prevention in a cryptographic protocol is implemented in a network device. The technique implements an error message processing strategy to mask information otherwise useful to an attacker and that has been generated (by decryption processes) as a consequence of an attacker's exploit. The technique avoids information leakage associated with a padding oracle attack. In one aspect each error message (irrespective of its content) is replaced with a generic error message so that the attacker does not obtain the specific error message content(s) that might otherwise provide useful information. In addition to masking the error message content, the technique preferably implements a “delay” policy that delays the transmission of particular error messages (or message types) to hide (from the attacker's point-of-view) whether a particular error message is relevant to (or a consequence of) the attacker's exploit. |
US08782409B2 |
Confidential message exchange using benign, context-aware cover message generation
Systems and methods are disclosed permitting a sender to send a secret and secure message to a recipient. An application on a sender device interfaces with known message generating tools to permit a user to generate a message. The local application encrypts the message (and optional attachments) based on public/private key pairing negotiated with the server given the recipient device id. The sender device transmits the cipher text to the server. The server generates a benign, text-based, context-appropriate message and delivers same to a recipient device by way of a known messaging service. The benign message provides a secret clue to the recipient that an encrypted message is available. Recipient may then access and decrypt the encrypted message, such as from the server in response to a successful challenge (e.g., password request). |
US08782408B2 |
Method and system for securing communication
A method for securing communication among members of a group. The method includes a first member obtaining a first secret. An n-bit generator executing on the first member generates a first message digest using the first secret. The first member extracts a first encryption solution and a second encryption solution, at least in part, from the first message digest, encrypts a first communication using the first encryption solution to obtain a first encrypted communication, and sends, to a second member of the group, the first encrypted communication. The first member further receives, from the second member, a second encrypted communication, and decrypts the second encrypted communication using the second encryption solution to obtain a second communication. |
US08782404B2 |
System and method of providing trusted, secure, and verifiable operating environment
A method and system of synergizing hardware, firmware, software, and useful feature(s) into a trusted, secure, and verifiable operating environment (TSVOE) that is critical for businesses and consumers that rely on information technology products and/or services. Such products provide various capabilities such as protecting the corporate infrastructure from attack, protecting the client from attack, designing a customizable operating schema, advanced validation of client authentication, establishing a clean environment within a dirty environment, etcetera. Moreover, by ensuring that operating environment security is achieved, a product can provide guarantees that modern state-of-the-art systems cannot. Finally, diversification of hardware, software, firmware, and features creates robust products. |
US08782402B2 |
System and method for secure communications
Encryption of electronic messages may be automatically processed by a messaging system based on keywords or other attributes of the messages. In one example, if the message includes a predefined keyword, the messaging system may automatically encrypt the message for all recipients outside of a private network. In another example, the messaging system may automatically encrypt messages based on recipient address. Thus, if a recipient is on a list of addresses to which encryption applies, the message being sent to that particular recipient may be encrypted while a copy of the message being sent to other recipients not on the list might remain unencrypted. |
US08782397B2 |
Compact attribute for cryptographically protected messages
A system and associated method for verifying a signature of a signed message having a compact attribute. Components of the compact attribute of the signed message appear in a predefined order within the compact attribute, and are identified by an object identifier associated with the compact attribute. A processing flag and a security assertion are among the components of the compact message. The processing flag directs rules to process the security assertion. The security assertion is made by an authority trusted by both a sender and a recipient of the signed message. The recipient validates the signature of the signed message based on the processing flag and the security assertion recovered from the compact attribute. |
US08782396B2 |
Authentication with physical unclonable functions
Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs corresponding to individual PUFs can be enrolled and used to determine authentication data, which may be managed in a database. Later when a target object with a PUF is intended to be authenticated a set (or subset) of challenges are applied to each PUF device to authenticate it and thus distinguish it from others. In some examples, authentication is achieved without requiring complex cryptography circuitry implemented on the device. Furthermore, an authentication station does not necessarily have to be in communication with an authority holding the authentication data when a particular device is to be authenticated. |
US08782395B1 |
Monitoring usage of WAN optimization devices integrated with content delivery networks
Content delivery networks may associate each WAN optimized network connection with a specific client-to-cloud-service connection using connection identifiers. When an edge node of a content delivery network receives or intercepts a network connection request from a client device including an auto-discovery indicator from an upstream WAN optimization module, the edge node stores a connection identifier for this network connection. The edge node sends a connection response back to the client device including an auto-discovery response indicator. In response, the WAN optimization module sends one or more inner connection setup messages including the connection identifier to a second WAN optimization module in the content delivery network to establish a direct connection, referred to as an inner connection. The connection identifier is matched with the previously stored connection identifier to associate an inner connection with the network connection between the client and the cloud service. |
US08782394B2 |
Centralized authentication system
Centralized authentication systems are provided. A representative system, among others, includes an authentication registration system, a content provider and an internet server. The mobile authentication registration system resides on a content provider, and is operable to receive a single identification number and password from a user independent of a platform the user is associated with, and determine that the identification number and password combination provided by the user is associated with a registered user. The content provider provides personalized content to any of a plurality of registered users on a plurality of platforms. The server receives a connection request from a wireless device, sends an authentication request to the authentication registration system, and provides a personalized content from the content provider to said at least one device. Methods and other systems for multiple access portals are also provided. |
US08782393B1 |
Accessing SSL connection data by a third-party
A method, system, and apparatus are directed towards enabling access to payload by a third-party sent over an SSL session. The third-party may be a proxy situated between a client and a server. SSL handshake messages are sent between the client and the server to establish the SSL connection. As the SSL handshake messages are routed through the proxy, the proxy may extract data. In addition, one of the client or the server may send another message within, or out-of-band to, the series of SSL handshake message directly to the proxy. The other SSL message may include secret data that the proxy may use to generate a session key for the SSL connection. With the session key, the proxy may receive SSL messages over the SSL connection, modify and/or transpose the payload within the received SSL messages, and/or terminate the SSL connection at the proxy. |
US08782392B1 |
Privacy-protective data transfer and storage
A method is performed at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors. The method includes receiving a first data transmission from a first client system, where the first data transmission including a first document, the first document having one or more portions that are marked as private; encrypting the marked portions of the first document using a key; and sending a second data transmission to a destination system, where the second data transmission includes a second document, the second document including the encrypted marked portions of the first document and a remainder of the first document that is not marked as private. The key is unavailable to the destination system. The second document is stored at the destination system. |
US08782391B2 |
Service activation using algorithmically defined key
Systems and methods for service activation using algorithmically defined keys are disclosed. A consumer who has a relationship with a first party may wish to enroll in a service provided by a third party. The first party can maintain control of such enrollments through the use of algorithmically defined keys. The algorithmically defined keys also allow the third party service provider to verify data provided by the consumer as matching data stored by the first party. The verification provides for data synchronization without requiring the third party to have access to the first parties data systems. |
US08782383B2 |
System and method for selectively managing a branch target address cache of a multiple-stage predictor
A multiple stage branch prediction system includes a branch target address cache (BTAC) and a branch predictor circuit. The BTAC is configured to store a BTAC entry. The branch predictor circuit is configured to store state information. The branch predictor circuit utilizes the state information to predict the direction of a branch instruction and to manage the BTAC entry based on modified state information prior to resolution of the branch instruction. |
US08782382B2 |
Last branch record indicators for transactional memory
In one embodiment, a processor includes an execution unit and at least one last branch record (LBR) register to store address information of a branch taken during program execution. This register may further store a transaction indicator to indicate whether the branch was taken during a transactional memory (TM) transaction. This register may further store an abort indicator to indicate whether the branch was caused by a transaction abort. Other embodiments are described and claimed. |
US08782381B2 |
Dynamically rewriting branch instructions in response to cache line eviction
Mechanisms are provided for evicting cache lines from an instruction cache of the data processing system. The mechanisms store, for a portion of code in a current cache line, a linked list of call sites that directly or indirectly target the portion of code in the current cache line. A determination is made as to whether the current cache line is to be evicted from the instruction cache. The linked list of call sites is processed to identify one or more rewritten branch instructions having associated branch stubs, that either directly or indirectly target the portion of code in the current cache line. In addition, the one or more rewritten branch instructions are rewritten to restore the one or more rewritten branch instructions to an original state based on information in the associated branch stubs. |
US08782375B2 |
Hash-based managing of storage identifiers
Managing storage identifiers in a pool is facilitated by providing a hashing-based management protocol in association with a stack which accommodates storage identifiers of the pool. The hashing-based management protocol includes: based on a request, popping a storage identifier from the stack without evaluating for update of a hash link associated with the stack, potentially allowing the hash link to become inconsistent with storage identifiers remaining in the stack; and based on return of a freed storage identifier to the stack, hashing the freed storage identifier and identifying whether there is an inconsistency in the hash link related to return of the freed storage identifier, and based on identifying the inconsistency, one of updating the hash link to remove the inconsistency, or indicating, where ascertained, that the freed storage identifier is a duplicate storage identifier. |
US08782373B2 |
Seamless application access to hybrid main memory
A command from an application is received to access a data structure associated with one or more virtual addresses mapped to main memory. A first subset of the virtual addresses for the data structure having constituent addresses that are mapped to the symmetric memory components and a second subset of the virtual addresses for the data structure having constituent addresses that are mapped to the asymmetric memory components are identified. Data associated with the virtual address from the first physical addresses and data associated with the virtual addresses from the second physical addresses are accessed. The data associated with the symmetric and asymmetric memory components is accessed by the application without providing the application with an indication of whether the data is accessed within the symmetric memory component or the asymmetric memory component. |
US08782370B2 |
Selective data storage in LSB and MSB pages
A method for data storage includes providing a memory, which includes multiple groups of memory cells and is configured to concurrently store first data using a first storage configuration having a first access time, and second data using a second storage configuration having a second access time, longer than the first access time, such that each memory cell in each of the groups stores at least one bit of the first data and one or more bits of the second data. Data items are accepted for storage in the memory. The accepted data items are classified into a fast-access class and a normal-access class. The data items in the fast-access class are stored in the memory using the first storage configuration, and the data items in the normal-access class are stored in the memory using the second storage configuration. |
US08782367B2 |
Memory area protection circuit
A circuit for controlling the access to at least one area of a memory accessible by a program execution unit, including a first instruction address input; at least one second data address input, the addresses coming from the execution unit; at least one function of correlation of these addresses; and at least one output of a bit for validating the fulfilling of conditions set by the correlation function. |
US08782364B2 |
Determining availability of data elements in a storage system
Data elements are stored at a plurality of nodes. Each data element is a member data element of one of a plurality of layouts. Each layout indicates a unique subset of nodes. All member data elements of the layout are stored on each node in the unique subset of nodes. A stored dependency list includes every layout that has member data elements. The dependency list is used to determine availability of data elements based on ability to access data from nodes from the plurality of nodes. |
US08782359B2 |
Data recovery systems and methods
Nearline disaster recovery (“nearline DR”) storage systems and methods that permit the use of previously restored stored data from a near time period by virtual applications operating off a backup storage location during the period of disaster recovery at a primary site. This is generally referred to as a “nearline DR storage process.” |
US08782358B2 |
Transparent input / output switching between synchronously mirrored storage volumes
A method for configuring transparent synchronous mirroring volume switching for a first volume and a second volume that are coupled, via a storage area network, to a host computer, with the first volume mapped to the host computer. The method includes initiating synchronization of status data between the first volume and the second volume, and setting the first volume to an active state. The second volume is set to an inactive state, and an identifier associated with the active first volume is copied to a memory coupled to the inactive second volume. The copied identifier is retrieved from the memory by the host computer, and the inactive second volume is then mapped to the host computer. |
US08782357B2 |
Reversing a communication path between storage devices
Reversing a communication path between a first volume on a first storage device and a second volume on a second storage device includes suspending communication between the first and second volumes while maintaining operations for other volumes of the storage devices, causing the first volume to change from a source volume to a destination volume without destroying the first volume, causing the second volume to change from a destination volume to a source volume without destroying the second volume, and resuming communication between the first and second volumes. Causing the first volume to change from a source volume to a destination volume may include modifying a table of the first storage device. Causing the second volume to change from a source volume to a destination volume may include modifying a table of the second storage device. |
US08782353B2 |
Information processing device having data field and operation methods of the same
An information processing device includes a memory array and a controller. The memory array includes a data field that stores file data and a management information field that stores information regarding the data field. The controller controls a writing operation to the memory array. The controller stores a portion of the file data, corresponding to a product of a positive-integer and a predetermined unit block size, in the data field by block units, with reference to the data field information of the management information field. |
US08782352B2 |
System and method for supporting a self-tuning locking mechanism in a transactional middleware machine environment
A lock mechanism can be supported in a transactional middleware system to protect transaction data in a shared memory when there are concurrent transactions. The transactional middleware machine environment comprises a semaphore provided by an operating system running on a plurality of processors. The plurality of processors operates to access data in the shared memory. The transactional middleware machine environment also comprises a test-and-set (TAS) assembly component that is associated with one or more processes. Each said process operates to use the TAS assembly component to perform one or more TAS operations in order to obtain a lock for data in the shared memory. Additionally, a process operates to be blocked on the semaphore and waits for a release of a lock on data in the shared memory, after the TAS component has performed a number of TAS operations and failed to obtain the lock. |
US08782351B2 |
Protecting memory of a virtual guest
The method for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager. |
US08782350B2 |
Circuit providing load isolation and noise reduction
Certain embodiments described herein include a memory module having a printed circuit board including at least one connector configured to be operatively coupled to a memory controller of a computer system. The memory module further includes a plurality of memory devices on the printed circuit board and a circuit including a first set of ports operatively coupled to at least one memory device. The circuit further includes a second set of ports operatively coupled to the at least one connector. The circuit includes a switching circuit configured to selectively operatively couple one or more ports of the second set of ports to one or more ports of the first set of ports. Each port of the first set and the second set comprises a correction circuit which reduces noise in one or more signals transmitted between the first set of ports and the second set of ports. |
US08782348B2 |
Microprocessor cache line evict array
An apparatus for ensuring data coherency within a cache memory hierarchy of a microprocessor during an eviction of a cache line from a lower-level memory to a higher-level memory in the hierarchy includes an eviction engine and an array of storage elements. The eviction engine is configured to move the cache line from the lower-level memory to the higher-level memory. The array of storage elements are coupled to the eviction engine. Each storage element is configured to store an indication for a corresponding cache line stored in the lower-level memory. The indication indicates whether or not the eviction engine is currently moving the cache line from the lower-level memory to the higher-level memory. |
US08782342B2 |
Systems and methods for automatically generating a mirrored storage configuration for a storage array
An information handling system includes a plurality of storage enclosures, a plurality of logical storage units located in each storage enclosure, a controller connected to each of the plurality of logical storage units. The controller is configured to receive data regarding the plurality of logical storage units, and automatically execute an algorithm based on the received logical storage unit data to generate a mirrored storage configuration to be implemented, the mirrored storage configuration defining mirrored pairs of the plurality of logical storage units. |
US08782339B2 |
Storage system having cross node data redundancy and method and computer readable medium for same
Embodiments of the present invention generally provide for multi-dimensional disk arrays and methods for managing same and can be used in video surveillance systems for the management of real-time video data, image data, or combinations thereof. |
US08782338B2 |
Method for wear leveling in a nonvolatile memory
A method for writing and reading data memory cells, comprising: defining in a first memory zone erasable data pages and programmable data blocks; and, in response to write commands of data, writing data in erased blocks of the first memory zone, and writing, in a second memory zone, metadata structures associated with data pages and comprising, for each data page, a wear counter containing a value representative of the number of times that the page has been erased. |
US08782337B2 |
Storage system and data transfer method of storage system
A storage system is described and includes a storage apparatus for storing data used by an external apparatus, first and second temporary data storage units, a host interface, a disk interface, and first and second controllers. The first controller is configured to select as a data transfer process, when the host interface receives a command from the external apparatus, one of a first data transfer process and a second data transfer process based on the command. The first data transfer process is a data transfer from the first temporary data storage unit to the external apparatus by the host interface. The second data transfer process is a data transfer from the first temporary data storage unit to the second temporary data storage unit by the second controller, and a data transfer from the second temporary data storage unit to the external apparatus by the host interface. |
US08782336B2 |
Hybrid storage system with control module embedded solid-state memory
A hybrid control module includes a host interface control module configured to transfer data to and from a host interface. A first embedded multi-media card (eMMC) interface is configured to (i) connect to a second eMMC interface of a control module embedded solid-state memory (SSM) and (ii) transfer the data between the hybrid control module and the control module embedded SSM. A buffer management module is (i) in communication with the host interface control module, the first eMMC interface and a disk access control module and (ii) configured to buffer the data in volatile memory. The data is received by the buffer management module and from at least one of the host interface control module, the first eMMC interface, or the disk access control module. |
US08782334B1 |
Hybrid drive copying disk cache to non-volatile semiconductor memory
A hybrid drive is disclosed comprising a head actuated over a disk comprising a plurality of data sectors. The hybrid drive further comprises a non-volatile semiconductor memory (NVSM) comprising a plurality of memory segments. A disk cache is defined comprising a first plurality of the data sectors, and a non-cache area of the disk is defined comprising a second plurality of the data sectors. When a write command is received from a host, data is written to the disk cache, and under certain conditions, the data is copied from the disk cache to the NVSM. |
US08782332B2 |
Control method and controller for DRAM
A DRAM controller including a judging module, a determination module, and a transmission module is provided. The judging module judges an address content difference between a first command and a third command. The determination module determines a plurality of buffering address contents, associated with at least one second command, according to the address content difference. The transmission module then sequentially transmits the first command, the at least one second command, and the third command to the DRAM. |
US08782329B2 |
Method for performing data shaping, and associated memory device and controller thereof
A method for performing data shaping is provided. The method is applied to a controller of a Flash memory, where the Flash memory includes a plurality of blocks. The method includes: according to contents of data to be written into or read from the Flash memory, generating/recovering an input seed of at least one randomizer/derandomizer; and utilizing the randomizer/derandomizer to generate a random function according to the input seed, for use of adjusting a plurality of bits of the data bit by bit. An associated memory device and a controller thereof are also provided. |
US08782328B2 |
Method for transmitting program codes to a memory of a control device, particularly for motor vehicles
A method is described for transmitting program codes to a program memory in a controller, particularly in a motor vehicle, having the following operations: a) connecting an interface in a controller to a programming appliance which contains the program codes, setting all the memory cells of the program memory in the controller to a standard value, compressing the program code in the programming appliance on the basis of a lossless data compression process, transmitting the compressed program code to the controller, decompressing the received program code in the controller, and storing the decompressed program code in the program memory in the controller. |
US08782327B1 |
System and method for managing execution of internal commands and host commands in a solid-state memory
Embodiments of the invention are directed to enable simultaneous or nearly simultaneous execution of internal and host-issued commands in a non-volatile storage subsystem while maintaining data consistency. Embodiments maintain validity information on data residing at physical addresses as well as logical to physical address mappings in the solid-state storage subsystem. In one embodiment, a controller within the storage subsystem selectively cancels internal commands that it determines to be writing data that has been rendered invalid by another command. In one embodiment, the determination is made by consulting the validity information kept by the controller in an invalid page table. |
US08782324B1 |
Techniques for managing placement of extents based on a history of active extents
A technique of managing data placement involves constructing an active extent list which identifies active extents stored in a storage pool based on a history of extent activity. The technique further involves based on the active extent list, generating preferred extent-tier pairings for extents of a particular LUN slice that are initially stored on a first tier of the pool, the preferred extent-tier pairings matching (i) a first extent of that LUN slice to the first tier and (ii) a second extent of that LUN slice to a second tier of the pool. The technique further involves, based on the preferred extent-tier pairings, maintaining the first extent on the first tier and relocating the second extent from the first tier to the second tier to distribute the first and second extents of that LUN slice across multiple tiers of the pool in accordance with the extent activity history. |
US08782321B2 |
PCI express tunneling over a multi-protocol I/O interconnect
Described are embodiments of methods, apparatuses, and systems for PCIe tunneling across a multi-protocol I/O interconnect of a computer apparatus. A method for PCIe tunneling across the multi-protocol I/O interconnect may include establishing a first communication path between ports of a switching fabric of a multi-protocol I/O interconnect of a computer apparatus in response to a peripheral component interconnect express (PCIe) device being connected to the computer apparatus, and establishing a second communication path between the switching fabric and a PCIe controller. The method may further include routing, by the multi-protocol I/O interconnect, PCIe protocol packets of the PCIe device from the PCIe device to the PCIe controller over the first and second communication paths. Other embodiments may be described and claimed. |
US08782312B2 |
Method for data transmission by telegram
A method for data transmission by telegram via a fieldbus of process automation technology, wherein information is transmitted via the fieldbus in the form of data in at least one telegram, and wherein the information, especially the same information, is transmitted in the at least one telegram in a first data format and in a second data format, wherein the first data format differs from the second data format. |
US08782311B2 |
Automation device
The invention relates to an automation device, with which a multiplicity of physically distributed functional units communicate with each other by means of a common transmission protocol. The device has a microcontroller (110), which is assigned at least one clock generator (120) and one memory unit (150), and which is connected at least to one data source (140), which is designed to output a data bit-stream to be transmitted. |
US08782309B2 |
Method and apparatus for suggesting data for deletion
An approach is provided for suggesting data for deletion from an electronic data storage medium. An external device detects initiation of transfer of data from first storage medium to second storage medium. Next, the external device determines an available storage in the second storage medium for the data. Then, the external device generates a list to suggest content for deletion within the second storage medium to accommodate the data. |
US08782300B2 |
Electronic apparatus
An electronic apparatus provided with a serial communication circuit achieving a baud rate adjustment with high precision is provided. For example, a bit width of each of a plurality of bits in received serial data is measured by a clock counter, and an average value of the bit width is calculated detecting its maximum value and minimum value. Moreover, for example, a maximum tolerance and a minimum tolerance are calculated as a value substantially 1.5 times the average value and a value substantially 0.5 times the average value, and determination is made as to whether or not the maximum value and the minimum value are within a range between the maximum tolerance and the minimum tolerance. If they are within the range, the corresponding average value is set in a baud rate setting register. |
US08782298B2 |
Computing device and method for adjusting physical links of a SAS expander of the computing device
A method to adjust physical links of serial attached small computer system interface (SAS) expanders of a computing device. The SAS expanders include a first SAS expander and one or more second SAS expanders. When data flow of the physical links of the first SAS expander for transmitting data to a second SAS expander is saturated, the method determines whether the first SAS expander has reserved physical links that can be adjusted. If the first SAS expander has reserved physical links that can be adjusted, the method generates a new firmware, and adjusts the adjusted physical link to the second SAS expander by writing the new firmware to the first SAS expander. The method also adjusts the adjusted physical link to the second SAS expander on hardware circuit. |
US08782295B2 |
Method and apparatus for a multi-engine descriptor controller for distributing data processing tasks across the engines
A method and apparatus, such as multi-engine controller that can be used to control multiple data processing engines in a command based IO processing system, such as a storage controller, to solve to the problem of scaling the data processing rate to match the advances in the IO interface data rates, including a method of identifying dependencies among various tasks queued up in the system and scheduling tasks out-of-order to avoid head of line blocking, a method to buffer and reorder the completed tasks such that the task output order is the same as that in the input to the system. |
US08782294B1 |
Intra-processor resource control
A processor and execution units providing intra-processor resource control. A processor includes a processor core and a peripheral. The processor core includes a first execution unit, and a second execution unit coupled to the first execution unit. The peripheral is coupled to the second execution unit. The second execution unit is configured to execute a complex instruction, and includes a status register and resource control logic. The status register includes a resource control field configured to store resource control information. The resource control information specifies whether the second execution unit requests access to the peripheral during execution of an instruction stream comprising a complex instruction. The resource control logic is configured to apply the resource control information to request access to the peripheral during execution of the instruction stream comprising the complex instruction. |
US08782293B1 |
Intra-processor operation control
A processor and execution units providing intra-processor operation control. In one embodiment, a processor includes a processor core and a peripheral device. The processor core includes a first execution unit and a second execution unit. The second execution unit is coupled to the first execution unit and the peripheral device. The second execution unit is configured to execute a complex instruction, and includes a status register and execution control logic. The status register includes an execution control information field configured to store execution control information. The execution control information specifies operational parameters of the peripheral device. The execution control logic is configured to apply the execution control information to generate execution control signals, and to control operation of the peripheral device via the execution control signals. |
US08782289B2 |
Presenting multi-function devices behind a switch hierarchy as a single function device
In one embodiment, a computer system, comprises at least one host node, at least one input/output node coupled to the host node, at least one multi-function device coupled to the input/output node via a switch, and a middle manager processor comprising logic to block an enumeration process in a host node for the multi-function devices behind the switch hierarchy, initiate an enumeration process for the multi-function devices in a manager processor separate from the host node, store a routing table for the switch hierarchy in a memory module coupled to the manager processor, and allocate, in the manager processor, endpoint device resources to the host node. |
US08782288B2 |
Multicast-enabled address resolution protocol (ME-ARP)
A Multicast-Enabled Address Resolution Protocol (ME-ARP) is disclosed. This ME-ARP allows the building of independent IP based Virtual Private LAN segments (VPLS) over a multicast enabled IP backbone using stateless tunnels and optimal VPLS traffic forwarding. Each VPLS has an associated IP subnet which is completely independent from other VPLS or the underlying IP backbone itself. Each Customer Premises Equipment (CPE) device needs only to be configured with a VPLS identifier and its serving IP subnet per VPLS designated interface. |
US08782287B2 |
Methods and apparatus for using multiple reassembly memories for performing multiple functions
A packet processing system comprises first processing circuitry for performing a first function, and first memory circuitry coupled to the first processing circuitry for storing received packets, wherein at least a portion of the packets stored by the first memory circuitry are usable by the first processing circuitry in accordance with the first function. The packet processing system further comprises at least second processing circuitry for performing a second function, and at least second memory circuitry coupled to the second processing circuitry for storing at least a portion of the same packets stored in the first memory circuitry, wherein at least a portion of the packets stored in the second memory circuitry are usable by the second processing circuitry in accordance with the second function. In an illustrative embodiment, the first processing circuitry and the second processing circuitry operate in a packet switching device such as a router. In such case, the first processing circuitry and the second processing circuitry operate between a packet network interface and a switch fabric of the packet switching device. |
US08782284B2 |
Extensible deployment system
An extensible deployment system is disclosed that provides for flexible deployment and centralized management of a scalable communication system. The scalable communication system may be segmented into multiple groups of services, e.g. multiple solutions, that may be deployed across one or more servers. The groups of services may each access separate databases in a single database instance that may allow for the groups of services to be deployed and upgraded independently. A management interface may be provided that allows for centralized management, and deployment, of all of the groups of services, irrespective of the independent upgrade paths of the groups of services. The management interface may include a local authentication system and may also be interoperable with one or more external authentication systems, such that users may use login credentials of an external authentication system to access the management interface. |
US08782282B1 |
Network management system
A technique for communicating in a network management system is disclosed. The technique includes transferring information from an application server to a gateway that processes the information, transferring the gateway processed information from the gateway to a plurality of adapters associated with the gateway that process the gateway processed information, and transferring the adapter processed information from one of the adapters to a client. |
US08782280B2 |
Device identifier selection
A method includes receiving an enumeration message via a host interface of a device that is operatively coupled to a host device and to one or more other devices. The method includes identifying the enumeration message as a command originated by the host device or as a response message from one of the other devices. In response to identifying the enumeration message as a command, an enumeration response message is sent to the host device. The enumeration response message indicates a distinctive device identifier value. The method also includes, in response to identifying the enumeration message as a response message from one of the other devices, reading from the response message an identifier value used by such other device and at least temporarily storing this identifier value at the device to enable the device to select the distinctive device identifier value. |
US08782272B2 |
Switching media streams in a client system based on environmental changes
A method and system for switching media streams of a video in a client system. The media streams are made available to the client system by a content providing system. A first media stream received from the content providing system is played in a SHOW mode in the client system. An environmental change in an environment within or adjacent to the client system is detected, resulting in executing a procedure for deciding whether to switch from playing the first media stream to playing a second media stream differing from the first media stream. The executed procedure decides to make the switch. The switch is made to playing the second media stream in the SHOW mode as the second media stream is being received from the content providing system in response having been requested from the content providing system. The switching preserves content continuity of the video. |
US08782267B2 |
Methods, systems, devices, and computer-readable media for delivering additional content using a multicast streaming
A system and method for improving media delivery and display. By utilizing a memory buffer in a DVR or similar device, and broadcasting linear content at a rate other than 1×, services like video on demand or regular broadcasters can be more versatile. For example viewers can start over without launching a separate VOD session. If part of the linear content requested is not in the buffer, a switched multicast stream can be sent to with the proper section of content. Other receivers on the network may also receive the stream and buffer the content if the content is related to what a viewer is viewing. |
US08782264B2 |
System and method for verifying parental approval
An improved system and method enable website operators and online service providers to verify parental approval for access by underage users, e.g., for compliance with COPPA. The system and method herein also enable parents to monitor what sites their children have approval to visit; enable parents to withdraw approval at any time for any site(s) previously approved using the system and method described herein; and enable website operators/online service providers to admit or prevent children from logging in or accessing online services or content based on real time parental approval data. |
US08782263B1 |
Authenticated session controller
A single client session may be managed such that two or more virtual instances are presented without regard to technologies of the different virtual instances. Individual ones of the two or more virtual instances may be of a virtual environment or a virtual space. A first virtual instance may be loaded into the client session responsive to a user being authenticated for the first virtual instance based on received authentication information. A second virtual instance may then be loaded into the client session responsive to the user being authenticated for the second virtual instance based on the same received authentication information. Information associated with the user, information associated with a user character controlled by the user, and/or other instance services may be provided to the first virtual instance and/or the second virtual instance. Individual ones of the virtual instances may be monitored for a runtime error and/or memory abuse. |
US08782260B2 |
Network access control system and method using adaptive proxies
A method, system and computer program for providing multilevel security to a computer network. The method comprises the step of receiving a first communication packet on at least one network interface port from an outside network. The method further includes the steps of filtering the first packet in one of at least two levels of security comprising a first level of security which examines the content information of the packet and a second level of security which examines the first packet excluding the content information of the packet. The system includes a first packet filter configured to filter its input packets by examining content information of its packets and a second packet filter configured to filter its input packets by examining the header information without examining the content information of its packets. The system further includes a third filter which is configured to forward a number of packets to one of the first and second filters, thereby providing security to the computer network. The computer program includes a first module located in an application layer, a second module located in a network layer, and a third module located in a kernel space and configured to examine a number of packets received by the computer network from at least one outside network and to forward the number of packets to one of the first and second modules after examining the number of packets. |
US08782258B2 |
Transferring web data between operating system environments
An electronic device having a multi-environment operating system (OS) is disclosed. The electronic device creates a web session and/or updates a browser configuration in a first OS environment based on a web session and/or a browser configuration in a second OS environment. The web session is created and/or the browser configuration is updated when a primary OS environment transitions from the second OS environment to the first OS environment. The transition may occur when the device transitions from a docked mode to a mobile mode, or from a mobile mode to a docked mode. |
US08782255B2 |
Handling of user access-dependent information in a core network subsystem
An object of the present invention is a method for the handling of user access-dependent information in a system comprising a core network subsystem accessed by an access network, said method comprising: a step wherein an entity of said core network subsystem obtains user access-dependent information from said access network, a step wherein an entity of said core network subsystem signals to another entity, in the context of a core network subsystem procedure relating to a user's terminal, user access-dependent information obtained from said access network, a step wherein an entity of said core network subsystem uses user access-dependent information obtained from said access network, for control of service delivery to said user. |
US08782251B2 |
Automated configuration of network mode
Aspects of the subject matter described herein relate to a mechanism for seamlessly changing a network mode of a network device that is connected to multiple nodes. In aspects, agents reside on the nodes. A master agent communicates with the other agents and receives the capabilities of the nodes on which they execute. The master agent creates a data structure that includes the settings needed to connect using the new network mode. The master agent distributes this data structure to the other agents and each agent stores settings associated with the current network mode in case a rollback is needed. The master agent then instructs the other agents to begin communicating using the new network mode and the network device is reconfigured. If the master agent does not receive success acknowledgments from all of the other agents, the master agent initiates a rollback procedure. |
US08782249B1 |
Message engine
Systems and methods that facilitate messaging capabilities within a plant (e.g., a unified plant model—UPM) via employing a message engine that normalizes messaging of various messaging protocols and formats, wherein various systems of such plant can map to the message engine; and provide a consistent interface where events are sent/received consistently across such system. Such messaging engines can facilitate communication (e.g., via preferred channels) to other services/products, wherein the configuration and management of messaging is consistent across the system. |
US08782245B1 |
System and method for managing provisioning of storage resources in a network with virtualization of resources in such a network
This invention is a system and method for managing provisioning of resources for one or more data storage networks using a new architecture. |
US08782242B2 |
Software application placement using computing resource containers
Embodiments associate software applications with computing resource containers based on placement rules. A placement rule indicates that a first software application is to be co-located with a second software application during execution of the first and second software applications, or that the first software application is to be separated from the second software application during execution of the first and second software applications. A target computing resource container is selected based on the placement rule and a computing resource container that is associated with the first software application. The second software application is associated with the target computing resource container, and the placement rule may be provided to the target computing resource container. |
US08782239B2 |
Distributed router computing at network nodes
A system permitting alteration of the information processing position, where an existing information system is used, while minimizing alterations in configuration or the like, is to be provided. Intelligent nodes each having an information processing section and any desired address altering section are arranged on boundaries of a network where packets are likely to pass. This node has a flow table for recognizing as a flow a group of packets transmitted from each user's terminal, a flow status table for determining the connection state and the next destination address or the final destination address of each flow, and a module to observe the loaded state of its own information processing function. It rewrites the destination address of any flow not in a connection-established state in the flow status table to a less loaded one out of its own information processing function section or external information processing apparatus. |
US08782238B2 |
Server clustering in a computing-on-demand system
A device may provision two or more servers, each of the servers including a first network interface. In addition, the device may enable a second network interface in each of the provisioned servers, create a shared volume, assign the shared volume to each of the provisioned servers, and enable a clustering application on each of the provisioned servers to form a cluster comprising the provisioned servers, the cluster having a heartbeat via the second network interfaces. |
US08782236B1 |
Managing resources using resource expiration data
Resource management techniques, such as cache optimization, are employed to organize resources within caches such that the most requested content (e.g., the most popular content) is more readily available. A service provider utilizes content expiration data as indicative of resource popularity. As resources are requested, the resources propagate through a cache server hierarchy associated with the service provider. More frequently requested resources are maintained at edge cache servers based on shorter expiration data that is reset with each repeated request. Less frequently requested resources are maintained at higher levels of a cache server hierarchy based on longer expiration data associated with cache servers higher on the hierarchy. |
US08782235B2 |
Resource migration system and resource migration method
A resource migration system includes a plurality of servers. A first (second) server includes a first (second) main memory and a first (second) memory data manager. The first memory data manager manages a set of first data segments formed by copying a plurality of segments of first memory data stored in the first main memory. The second memory data manager receives resource data regarding the first data segments from the first server, determines whether each first data segment is able to be replaced by any of second data segments formed by copying a plurality of segments of second memory data stored in the second main memory, receives from the first server some first data segments which have been determined to be unable to be replaced by any second data segment, and reconstructs the set of first data segments with received first data segments and some second data segments. |
US08782234B2 |
Arrangement for managing data center operations to increase cooling efficiency
A method includes a step of obtaining efficiency characteristic information for each of a plurality of air conditioning units in a location containing a plurality of server computers. The method also includes employing one or more processing units to allocate one or more processing tasks to one of the plurality of server computers based on the efficiency characteristic information. |
US08782233B2 |
Embedding a cloud-based resource request in a specification language wrapper
Embodiments relate to systems and methods for embedding a cloud-based resource request in a specification language wrapper. In embodiments, a set of applications and/or a set of appliances can be registered to be instantiated in a cloud-based network. Each application or appliance can have an associated set of specified resources with which the user wishes to instantiate those objects. For example, a user may specify a maximum latency for input/output of the application or appliance, a geographic location of the supporting cloud resources, a processor throughput, or other resource specification to instantiate the desired object. According to embodiments, the set of requested resources can be embedded in a specification language wrapper, such as an XML object. The specification language wrapper can be transmitted to a marketplace to seek the response of available clouds which can support the application or appliance according to the specifications contained in the specification language wrapper. |
US08782231B2 |
Simple integration of on-demand compute environment
Disclosed are a system and method of integrating an on-demand compute environment into a local compute environment. The method includes receiving a request from an administrator to integrate an on-demand compute environment into a local compute environment and, in response to the request, automatically integrating local compute environment information with on-demand compute environment information to make available resources from the on-demand compute environment to requestors of resources in the local compute environment. |
US08782229B2 |
Transmission management system and transmission system
A disclosed transmission management system includes a receiver unit to receive alteration information for altering a communication status of a first transmission terminal from the first transmission terminal that communicates with a second transmission terminal to exchange content data, a terminal management unit to manage first status information indicating the communication status of the first transmission terminal, an acquisition unit to acquire the first status information from the terminal management unit in a case where the receiver unit receives the alteration information for altering the communication status of the first transmission terminal, and an alteration unit to alter the first status information managed by the terminal management unit, based on the alteration information for altering the communication status of the first transmission terminal received by the receiver unit and the first status information acquired by the acquisition unit. |
US08782227B2 |
Identifying and correcting an undesired condition of a dispersed storage network access request
A method begins by a processing module sending a transaction verification request to the set of dispersed storage (DS) units, wherein the transaction verification request includes a transaction number that corresponds to a particular dispersed storage network (DSN) access request. The method continues with the processing module receiving transaction verification responses from at least some of the set of DS units to produce received transaction verification responses. The method continues with the processing module identifying an undesired condition with processing the DSN access request and initiating a corrective remedy for the undesired condition when a DS unit of the set of DS units does not provide a desired transaction verification response. |
US08782226B2 |
Allocating internet protocol (IP) addresses to nodes in communications networks which use integrated IS-IS
Previously it has only been possible to allocate unique internet protocol (IP) addresses to nodes in open systems interconnection (OSI) communications networks such as those using integrated IS-IS, by manual configuration. This is time consuming and expensive because an operator must travel to the site of the node. By exploiting features of the OSI routing protocol the present invention enables IP addresses to be automatically allocated to the new network nodes. This is particularly advantageous for new intermediate systems such as optical multiplexers with integral routers. Once an IP address has been allocated, the node can be managed by a remote management system or operator using internet protocol methods. |
US08782223B2 |
Systems and methods for categorizing network traffic content
A method for categorizing network traffic content includes determining a first characterization of the network traffic content determining a first probability of accuracy associated with the first characterization, and categorizing the network traffic content based at least in part on the first characterization and the first probability of accuracy. A method for use in a process to categorize network traffic content includes obtaining a plurality of data, each of the plurality of data representing a probability of accuracy of a characterization of network traffic content, and associating each of the plurality of data with a technique for characterizing network traffic content. A method for categorizing network traffic content includes determining a characterization of the network traffic content, determining a weight value associated with the characterization, and categorizing network traffic content based at least in part on the characterization of the network traffic content and the weight value. |
US08782221B2 |
Method to allocate buffer for TCP proxy session based on dynamic network conditions
Allocation of buffers for a TCP proxy session between a client and a server by a service gateway includes: monitoring dynamic network behaviors for server and client side sessions of the TCP proxy session; and allocating capacity for a server side buffer and capacity for a client side buffer in a memory buffer based on the dynamic server side network behaviors, the dynamic client side network behaviors, and a weighted average of a capacity of the memory buffer. In one approach to the allocation, the gateway determines whether an available capacity of the server or client side buffer is sufficient to store a data packet. If not sufficient, the allocated capacity of the server or client side buffer is increased based on measurements of the dynamic network behaviors and the weighted average, and the available capacity of the server or client side buffer is adjusted accordingly. |
US08782220B2 |
Software product management through the cloud
Status of software product(s) may be monitored through the cloud by Extract, Transform, Load (ETL) of status information, in the form of business process status indicators from customer tenants. Examples of such status indicators can include a backlog of tasks to be fulfilled, or a number of business documents present in specific processing states, which describe aspects of the business application and allow an understanding of the overall status of the monitored application. A data extractor component of a customer tenant may extract and transform the status indicators from a plurality of business documents. A data import framework of a central monitoring system may in turn employ mapping to condense that heterogeneous data into a monitoring-specific simplified status model. |
US08782219B2 |
Automated discovery of template patterns based on received server requests
Described herein are methods for determining patterns based on requests received by a server. Based on the determined patterns, insight into the types of requests received by the server can be gained. Additionally, performance statistics and query statistics can be aggregated in a useful way. For example, performance statistics may be summarized for each determined pattern. One technique for determining patterns includes determining a sequence of template identifiers identifying templates that correspond to sub-sequences of requests in a sequence of server requests. A model may be created based on the sequence of template identifiers. Based on the model, template patterns may be determined. Template patterns may further be grouped into pattern clusters. |
US08782218B1 |
Activity stream based alert processing for information technology infrastructure
An activity stream based alert processor is configured to receive product-specific alerts from respective products implemented in information technology infrastructure, and to process the product-specific alerts to generate one or more activity streams using a specified activity stream format suitable for delivery to one or more remediation elements. For example, the activity streams may be generated in a standardized activity stream format suitable for delivery to one or more social networking applications to facilitate collaborative remediation of the product-specific alerts by multiple administrative entities, such as network, storage and server administrators. The alerts in an illustrative embodiment may comprise system management alerts generated by respective software products or other products in cloud infrastructure of a cloud service provider. |
US08782217B1 |
Online identity management
An identity scanner monitors information regarding a target individual on various data sources, such as social networking sites. The information is analyzed to identify risk and/or reward factors that are indicative of risk levels associated with the target's privacy, reputation, safety, health, and/or other attributes. Various information regarding the identified risks and/or reward factors identified may be provided to a monitoring individual (e.g., a guardian of the target individual) in various customizable manners and mediums. |
US08782216B2 |
Quantitative management assessments of data communication networks with converged architectures
Techniques for quantitative converged network assessment are described. Performance information, associated with network infrastructure elements and application or service elements of a computer network, is received. One or more key performance indicators of a reference network architecture are compared with at least a portion of the performance information. A plurality of first scores is determined based on the comparison of the one or more key performance indicators and at least a portion of the performance information. Based on the plurality of first scores, a single second score is determined that indicates a converged state of the computer network with respect to the reference network architecture. |
US08782205B2 |
Device and computer readable medium
A device and a computer readable medium having a computer program stored thereon are provided. The device includes: a detecting unit configured to detect one or more host computers accessible from the device and operational states of the respective host computers; and a restricting unit configured to restrict a function of the device based on the operational states of the host computers detected by the detecting unit. |
US08782204B2 |
Monitoring hardware resources in a software provisioning environment
A provisioning server can provide and utilize a diagnostic tool to test and interrogate hardware on target machines and to collect data from the hardware. The diagnostic tool can operate on the target machine independently of software already installed on the target machine. The diagnostic tool can interrogate hardware of the target machine and collect data from the hardware of the target machine. The provisioning server can select the diagnostic tool from a set of pre-generated diagnostic tools or generate a custom diagnostic tool tailored to a specific target machine. The provisioning server can interact directly with the diagnostic tool or interact with the diagnostic tool utilizing a network management server. Once data is collected, the provisioning server can be configured to store the collected data and/or output the data to other parties or systems. |
US08782202B2 |
Monitor control of devices connected to network
At an upload time, each of multiple printers connecting with a network identifies storage or non-storage of any unsent monitor information file, which has not yet been sent to a management server. In the case of storage of any unsent monitor information file, the printer collects from the other printers unsent monitor information files, which are stored in the other printers and have not yet been sent to the management server, and uploads the collected monitor information files and the unsent monitor information file stored in the self printer to the management server. This arrangement effectively reduces the access frequency from the respective printers to the management server for transmission of monitor information files from the printers to the management server. |
US08782199B2 |
Parsing a packet header
An intelligent network interface card (INIC) or communication processing device (CPD) works with a host computer for data communication. The device provides a fast-path that avoids protocol processing for most messages, greatly accelerating data transfer and offloading time-intensive processing tasks from the host CPU. The host retains a fallback processing capability for messages that do not fit fast-path criteria, with the device providing assistance such as validation even for slow-path messages, and messages being selected for either fast-path or slow-path processing. A context for a connection is defined that allows the device to move data, free of headers, directly to or from a destination or source in the host. The context can be passed back to the host for message processing by the host. The device contains specialized hardware circuits that are much faster at their specific tasks than a general purpose CPU. A preferred embodiment includes a trio of pipelined processors devoted to transmit, receive and utility processing, providing full duplex communication for four Fast Ethernet nodes. |
US08782198B2 |
System and method for storage discovery in a storage area network using device domains under control of a storage device
A storage device coupled to a fabric includes a memory and a processor operable to receive, default domain information for a storage area network (SAN) from a management server coupled to the fabric. The default domain information including a list of host systems and a list of initiators on the SAN. The processor also sends the default domain information to a management station to configure a discovery domain including a host system selected from the list of host systems and an initiator selected from the list of initiators, receives the discovery domain from the management station, directs the management server to add the first discovery domain to a list of device domains implemented by the management server on the SAN, and directs the management server to enable the first discovery domain. |
US08782196B2 |
Hardware task manager
A hardware task manager for an adaptive computing system. The task manager indicates when input and output buffer resources are sufficient to allow a task to execute. The task can require an arbitrary number of input values from tasks. Likewise, output buffers must also be available before the task can start to execute and store results. The hardware task manager maintains a counter associated with each buffer. For input buffers, a negative value for the counter means that there is no data in the buffer and the buffer is not ready and the associated task cannot run. Predetermined numbers of bytes, or “units,” are stored into the input buffer and an associated counter is incremented. When the counter value transitions from a negative value to a zero the high-order bit of the counter is cleared indicating the input buffer has sufficient data and is available to be processed. |
US08782194B2 |
Streaming media search and playback system
A method is provided for playing back media from a network. The method includes receiving a search criteria from a network enabled device. The method further includes accessing a database comprising a plurality of network addresses, where the database associates each address with one or more classes of information. The addresses in the database each access a media network resource. The method further includes selecting at least one address in the database using the search criteria, and signaling the selected address to the network enabled device. The method also includes controlling the network enabled device so as to automatically access and play back the media resource of the selected address. |
US08782190B2 |
Demand response management system
A demand response management system which may be implemented with demand response logic. The system may be used by utilities, independent system operators, intermediaries and others to manage operations of demand response programs relative to customers, clients, participants, and users of outputs from the utilities, independent system operators, and the like. Demand response logic of the demand response management system may provide demand signal propagation and generation from demand response events. |
US08782188B2 |
Automated device reporting
A method performed by a device includes detecting a first condition to generate a report record associated with the device; generating the report record associated with the device, in response to detecting the first condition, where generating the report record includes recording environment conditions associated with the device, recording device conditions associated with the device, and recording signal conditions associated with the device; detecting a second condition to send the generated report record to a server device; and sending the generated report record to the server device, in response to detecting the second condition. |
US08782186B2 |
Systems and methods for addressing managed elements
Systems and methods for managing information technology (IT) resources determine the physical location of at least one managed element using a property of the at least one managed element, wherein the managed element is assigned a unique name within a container and the property specifies a value that indicates the physical location of the managed element within the container, further wherein the value is provided in a format that is standardized for the type of container. |
US08782185B2 |
Network booting a machine coupled to the network by a link aggregation group
A technique includes network booting a physical machine coupled to a network by a link aggregation group. The technique includes selectively disabling ports of the physical machine associated with the link aggregation group in connection with the network booting until a driver of an operating system to group the ports together is installed on the physical machine. |
US08782184B2 |
Method and system for adaptive delivery of digital messages
A system and method for automatically adapting digital message traffic flow evaluates message delivery disposition, latency and performance metrics such that the system operates more optimally in terms of both overall throughput as well as with respect to system sending reputation. Reputation is in the context of maintaining message flow within limits that are acceptable for a given destination, such that the sender behavior avoids being flagged as abusive or otherwise undesirable. |
US08782173B2 |
Auditable distribution of a data file
Auditable data distribution from a server to clients is achieved as follows. The server delivers chunks of a data file, and identifiers of the chunks, to the clients. For each chunk of the data file received by the clients, a digest is generated by the client that received the chunk, using at least a part of the chunk and further data of the client that received the chunk. The further data is known to the server. The client that received this chunk sends the digest to the server, which receives the digest. The server determines an identity of the clink that received the chunk in question, by comparing the digest to the chunks that the server has sent and to the further data known to the server. The server stores the identity of the client that received the chunk. |
US08782172B2 |
Method of controlling mobile terminal, home hub, and visited hub in virtual group for content sharing
Provided is a method of controlling a home hub in a virtual group that may provide a geographical boundary about the virtual group by associating an identifier of a network of a virtual group included in an access point list with a name of the virtual group and a name of the home hub managing the virtual group, and may provide a terminal which moves to a visited virtual group with information about a network of the visited virtual group, thereby facilitating recognition of a virtual group and content sharing. |
US08782164B2 |
Implementing asyncronous collective operations in a multi-node processing system
A method, system, and computer program product are disclosed for implementing an asynchronous collective operation in a multi-node data processing system. In one embodiment, the method comprises sending data to a plurality of nodes in the data processing system, broadcasting a remote get to the plurality of nodes, and using this remote get to implement asynchronous collective operations on the data by the plurality of nodes. In one embodiment, each of the nodes performs only one task in the asynchronous operations, and each nodes sets up a base address table with an entry for a base address of a memory buffer associated with said each node. In another embodiment, each of the nodes performs a plurality of tasks in said collective operations, and each task of each node sets up a base address table with an entry for a base address of a memory buffer associated with the task. |
US08782159B2 |
Method and system for creating and sending handwritten or handdrawn messages via mobile devices
A handwritten or handdrawing messaging system employs a handwriting messaging component operable with a messaging client of a mobile device connected to the data transmission network to set up a handwriting data capture area in the messaging client into which the user can enter handwritten or handdrawn input through a suitable manual input device, and then operates to capture the handwritten or handdrawn input and send it as a handwritten electronic message to the intended recipient. It also sets up a graphical data viewing area within the messaging client for viewing handwritten electronic messages sent to the user. Preferably, it is a small-footprint software module installed with the messaging client of the mobile device. The mobile device can be any type of wired or wirelessly-connected portable device operating on a computing platform, such as a personal digital assistant (PDA) device, game console or player device, or other mobile messaging device. The manual input device can be a touch-sensitive screen, tablet with pen input, stylus pad with stylus input, or an attached drawing pad. The system is particularly useful for messaging via mobile game player devices, so that people all over the world can send handwritten messages, chat, and play handdrawn games with each other. |
US08782155B2 |
Methods and apparatus for inserting content into conversations in on-line and digital environments
Content is inserted into conversations hosted on a takeoff site using creatives that provide lures and links to other material that users engaged in the conversation might find helpful and relevant. Such insertions are made in a contextually meaningful fashion through the use of a matching and decision process that determines best candidate creatives and an appropriate time and place for their insertion into the conversation. |
US08782154B2 |
System and method for verifying delivery and integrity of electronic messages
A server transmits a message from a sender to a destination address. During transmission, the server and the destination address have a dialog constituting an attachment, via a particular one of SMTP and ESMTP protocols, concerning the message, the server and the destination address. The message passes through servers between the server and the destination address. This passage is included in the attachment. Verifiers are provided for the message and for the attachments. The verifiers may constitute encrypted hashes of the message and of the attachment. The sender receives the message, the attachments and the verifications from the server before authentication and transmits the message, the attachments and the verifiers to the server to obtain authentication by the server. The server operates on the message and the message verifier to authenticate the message and operates on the attachments and the attachments' verifier to verify the attachments. |
US08782153B2 |
Migrating social connections from a first profile to a second profile
In general, aspects of the present disclosure are directed to techniques for migrating social networking connections in a social network from one profile to another profile. A first incoming connection from a third profile in a social network to a first profile in the social network may be determined. A first outgoing connection to a fourth profile in the social network from the first profile in the social network may be determined. A second incoming connection from the third profile to a second profile may be created based at least in part on the first incoming connection. A second outgoing connection to the fourth profile from the second profile may be created based at least in part on the first outgoing connection. |
US08782151B2 |
Systems and methods for facilitating relationship management
Messages exchanged among users of a relationship management and work collaboration system are organized within user-defined, secure communication channels organized according to user-defined hierarchies that represent the users' personal relationships with one another. Security of the communications channels is maintained using individual, dynamic keys, each of the keys being uniquely associated with a respective one of the channels, and being generated according to combinations of individual passwords established by each respective channel's participants. In-bound messages in the form of e-mails are received and associated with respective ones of the channels according to e-mail aliases associated with the inbound messages. Out-bound e-mails may be sent to channel participants according to e-mail addresses associated with the participants and channel preferences established by the system users. In some instances, messages are posted or not posted to those of the channels under the control of respective moderators and channel participants. |
US08782150B2 |
Method and apparatus for enabling device communication and control using XMPP
A method and device is provided for platform independent device communication by detecting a request at a processor-based device to perform a function, determining an external device corresponding to the request, retrieving a tag for the external device for performing a function corresponding to the request and generating a message implemented in XMPP, having embedded therein the tag, wherein the tag is essential at the external device for performing the function corresponding to the request. Receiving the message at a device, determining whether the message comprises a device message, retrieving a tag included in the message, wherein the tag corresponds to an executable command to perform a function and executing the tag to perform the function. |
US08782148B2 |
Managing redundancy in electronic mail messages
A computer implemented method and system is provided for managing emails within an email system or email box. At the creation of a new email at the email system, an identification of its content (CID) is calculated, the result of that calculation being stored in a header of that email to be forwarded together with the new email. It is checked at the email system when receiving an email to determine whether the email includes a CID identifying the content of that email. If this is not the case, then a CID of the content of the received email is calculated, the resulting CID being stored in the header of that email together with the email. A comparison between the received email and the already stored emails at the email system is performed by comparing the corresponding CID of the received email with the CID of the stored emails. The email system is reorganized by superseding duplicate emails having the same CID. |
US08782143B2 |
Disk management
Systems, methods, and computer-program products store file segments by receiving a first file segment, and storing the first file segment in a first memory area having a highest ranking. The first memory area is reassigned as a memory area having a next highest ranking when a second file segment is received and the first memory area has reached a maximum capacity. The second file segment is stored in another memory that is reassigned as the memory area having the highest ranking. |
US08782142B2 |
System and method for evaluating healthcare information technology
A method for evaluating a healthcare information system includes first determining a first specification for the healthcare information system. The first specifications may include healthcare profile data for specifying a profile of a healthcare provider, technology profile data for specifying a profile of technology resources, and performance data for measuring the benefits associated with performance indicators of the healthcare information system. Then, an evaluation is determined from the first specification, which may include system performance values. Additionally, characteristic values for performance indicators may be presented to the user. Next, a second specification is then determined by specifying to the user that at least some values of the first specification may be changed. Then, an evaluation for the healthcare information system is determined for the second specification. |
US08782136B1 |
System and method for providing access to data objects based on proximity
A system and method for providing access to data objects based on proximity. The system and method allow sharing of data objects by identifying one or more client devices proximate to the sharing device. The user of the sharing device may then select one or more of the identified devices with which to share the data object. Aspects of the invention include the ability to enable a “sharing mode” on the client devices to opt-in and allow communication with other similarly configured devices in the area. Access to the data object may be managed via an access control list present on a remote server, with the remote server hosting the data object. |
US08782135B2 |
Focused listening and advertising guide system and method
A method for providing an online social network of radio listeners, the method comprising the steps of providing a database of radio stations; providing a flagging function to allow the users to generate flags to indicate one or more radio stations; providing a flag-cast comprising a continuously updated feed of the flags generated by the users; providing a profile database storing user data associated with each of the users; providing a communications interface allowing the users to communicate user information to the social network provider; providing a monitoring module to track user activities on the social network; providing an activity database to store activity data about the users; providing a flag database to store flag data related to the flags generated by the users; and providing a flag-cast component that limits the flags displayed in the flag-cast by identifying selected flags. |
US08782129B1 |
Identifying associated systems such as advertising networks
Among other disclosure, a method includes receiving first electronic content configured for displaying a first page in a browser, the first electronic content including a document object model for the first page. Content in the document object model is identified as corresponding to at least one advertisement on the first page, the first page further including page content. Information is extracted from the identified content to be used in identifying an advertising network system that the advertisement links to. An identity of the advertising network system is determined using the extracted information. Second electronic content is generated using the first electronic content and the determined identity of the advertising network system. A second page including the page content of the first page and the advertisement is generated and displayed. On the second page the advertisement is labeled with the determined identity of the advertising network system. |
US08782126B2 |
Communication method and apparatus, server and client on network, and program codes realizing communication thereof
An end user is provided with an environment to easily remote-control a video camera via a general network such as the Internet. For this purpose, on a client side, the content of camera control is described in file-transfer protocol description, and the description is transferred to a camera server on the Internet via a browser. The camera server interprets the description, controls a camera in accordance with the designated content, to perform image sensing, and returns the obtained video image as the content of a file to the client. The client performs various controls while observing the video image. When a desired angle has been found, the client instructs to register the angle in a bookmark, then angle information displayed at that time is registered. Thereafter, when the user of the client can see the video image obtained on the same image-sensing conditions by merely select-designating the angle information registered in the bookmark. |
US08782122B1 |
Automated collaboration for peer-to-peer electronic devices
Automated collaboration for peer-to-peer electronic devices, in which a user profile is registered for a peer-to-peer network. The user profile defines rules for automated collaboration among electronic devices connected to the peer-to-peer network. An electronic device connected to the peer-to-peer network discovers a new electronic device joining the peer-to-peer network. The electronic device sends, to the new electronic device, the user profile and automatically, without user input at the electronic device or the new electronic device, negotiates with the new electronic device to determine how the electronic device and the new electronic device will collaboratively work together to meet the rules specified in the user profile. Based on the negotiation, the electronic device collaborates with the new electronic device in a manner that results in the new electronic device handling at least a portion of an event at the new electronic device. |
US08782119B2 |
System for managing service interactions
A system is disclosed for managing service interactions in a combined service. The system includes a first aspect of service delivery for providing a first service, a second aspect of service delivery for providing a second service, a combined aspect of service delivery for providing a combined service capable of associating the first service to one of the second service. The combined service is implemented using a combined state model, which includes a predetermined number of combined states formed on the basis of the states of the first and the second service and armed detection points for detecting predetermined transitions between the combined states. The combined aspect of service delivery further includes a combined state manager adapted to transmit a control signal to the first and/or the second aspects of service delivery for inducing a predetermined state transition in the respective first and/or the second service in response to the activation of an armed detection point. |
US08782116B2 |
Method and device for processing digital data with a unique identifier
The invention relates to a method of processing digital data constituting a signal in a distributed communication network comprising a plurality of communication apparatuses, the signal being identified by a unique identifier (ID), characterized in that the method comprises the following steps: storing one or more parts of the signal, termed exploitable parts of the signal, at one at least given address of a memory location and in a format readable by an application, associating the unique identifier of the signal with each exploitable part of the signal, storing in at least one communication apparatus a data structure establishing a link between each exploitable part of the signal and the unique identifier of that signal. |
US08782115B1 |
Hardware architecture and scheduling for high performance and low resource solution for QR decomposition
A matrix decomposition circuit is described. In one implementation, the matrix decomposition circuit includes a processing element to process a plurality of processing cells and a scheduler coupled to the processing element, where the scheduler instructs the processing element to process only required processing cells of the plurality of processing cells. In one specific implementation, the required processing cells are processing cells with non-zero inputs. Also, in one specific implementation, the matrix decomposition circuit includes an internal memory that has a rotation angles memory that stores rotation angle values calculated by the processing element, where the rotation angles memory is a first-in first-out (FIFO) memory; a systolic cell internal input values memory that stores systolic cell internal input values, where the systolic cell internal input values memory is a FIFO memory; and a systolic cell values memory that stores systolic cell values, where the systolic cell values memory is an addressable memory. In one specific implementation, where a group of Mtotal input matrices are to be decomposed to Mtotal output matrices, where Mtotal is an integer greater than one, M input matrices are fed into a decomposition circuit to decompose in parallel, where M is an integer less than or equal to Mtotal and is a minimum number required to ensure that processing element latency is hidden. |
US08782114B2 |
Arithmetic device
According to one embodiment, a representation converting unit converts a set of n elements (h0, h1, . . . , hn−1) (hi: a member of a finite field Fp^m, 0≦i≦n−1) that is a projective representation of a member g of an n-th degree algebraic torus Tn(Fp^m) (n: positive integer, p: prime number, m: positive integer) into a limited projected representation expressed by a set of n elements (h′0, h′1, . . . , h′n−1) (h′i: a member of the finite field Fp^m, 0≦i≦n−1) in which at least one element out of the n elements is a zero element 0 or an identity element 1. An arithmetic unit omits part of Fp^m operation that is arithmetic operation in the finite field Fp^m based on a fact that an element in the set of n elements (h′0, h′1, . . . , h′n−1) represented by the limited projective representation is a zero element “0” or an identity element “1” when performing Fp^mn operation that is arithmetic operation of a finite field Fp^mn in combination with the Fp^m operation. |
US08782112B2 |
Methods and systems for optimal zero-forcing and MMSE frequency domain equalizers for complex and VSB signals
An improved receiver apparatus and algorithm for equalizing signals in a receiver device may equalize a block of data generated from N data symbols in a single carrier communication system. A first algorithm may be applied to a plurality of signal samples to generate a frequency domain representation of the samples. A channel estimate may be generated and a frequency response of a zero-forcing or a minimum-mean-square equalizer is applied. A conjugate of the computed frequency response is multiplied with a frequency domain representation for each sample to generate a product value. N-aliased frequency domain values from the generated product value may be determined for each of the samples. A second algorithm is applied to the generated N-aliased frequency domain values to generate estimates of the transmitted time domain data symbols. |
US08782111B2 |
Digital filter
A digital filter has a plurality of filters, wherein each filter performs coefficient multiplication and delay processing for an input signal and an output signal, obtains the output signal from the input signal, and includes a plurality of coefficient multipliers for multiplying a signal by a predetermined coefficient. The digital filter also includes a plurality of delay circuits for delaying a signal, and an adder for adding a plurality of signals. A first RAM stores a plurality of sets of coefficient data for a plurality of coefficient multipliers of the first filter and stores delay data for the delay circuit of the second filter. A second RAM stores a plurality of sets of coefficient data for a plurality of coefficient multipliers of the second filter and stores delay data for the delay circuit of the first filter. |
US08782110B2 |
Signal processing system employing time and frequency domain partitioning
The present invention relates to a method for processing a digital input signal by a Finite Impulse Response, FIR, filtering means, comprising partitioning the digital input signal at least partly in the time domain to obtain at least two partitions of the digital input signal; partitioning the FIR filtering means in the time domain to obtain at least two partitions of the FIR filtering means; Fourier transforming each of the at least two partitions of the digital input signal to obtain Fourier transformed signal partitions; Fourier transforming each of the at least two partitions of the FIR filtering means to obtain Fourier transformed filter partitions; performing a convolution of the Fourier transformed signal partitions and the corresponding Fourier transformed filter partitions to obtain spectral partitions; combining the spectral partitions to obtain a total spectrum; and inverse Fourier transforming the total spectrum to obtain a digital output signal. |
US08782109B2 |
Asynchronous sample rate conversion using a polynomial interpolator with minimax stopband attenuation
Methods for sample rate conversion are provided that use a polynomial interpolator with minimax stopband attenuation. A method for sample rate conversion of an input signal is provided that uses a time-varying polyphase filter having a discrete polyphase index m. Another method for sample rate conversion of an input signal is provided that uses a time-varying polyphase filter having a continuous polyphase index τ. In these methods, an output time index is mapped to an input sample index and the polyphase index, the polynomial coefficients of a polyphase filter are computed using the polyphase index, and the polyphase filter is applied to an input sample at the input sample index to generate the output sample at the output time index. |
US08782107B2 |
Digital fast CORDIC for envelope tracking generation
Disclosed is a coordinate rotation digital computer (CORDIC) having a maximum value circuit that selects a larger of the first component or the second component. A minimum value circuit selects a minimum operand that is a smaller one of the first component or the second component. Also included are N rotator stages, each corresponding to a unique one of N predetermined vectors, each of the N rotator stages having a first multiply circuit to multiply the maximum operand by a cosine coefficient of a predetermined vector to output a first rotation component, a second multiply circuit for multiplying the minimum operand by a sine coefficient of the predetermined vector to output a second rotation component, and an adder circuit for adding the first rotation component to the second rotation component to output one of N results, and a maximum value circuit for outputting a maximum one of the N results. |
US08782106B2 |
Method and system for managing execution of virtual applications
A system and method for directing download and execution of an application. A runtime engine receives an identifier of a block of shared memory from a directing process. The shared memory stores a map indicating which portions of an application file have been stored in a local copy of the application file. The runtime engine also receives an instruction from the directing process to execute the local copy when the local copy stores less than the entire application file. As the application executes, the runtime engine identifies requests from the application to access portions of the local copy and uses the map to determine whether the requested portions have been stored in the local copy. If the requested portions are not stored in the local copy, the runtime engine prevents the executing application from accessing the local copy until the map indicates the requested portions have been stored therein. |
US08782105B1 |
Finer granted data organization using data sublayers
Disclosed is a method implemented by a computer system that comprises a file system. The file system comprises first, second, third, and fourth directories wherein the first and second directories are sub-directories of the third directory, the third directory is a sub-directory of the fourth directory, the first directory stores only files identified by a first file extension, the second directory stores only files identified by a second file extension, and the first and second file extensions are distinct. In one embodiment, the method comprises receiving first and second requests to open first and second files, respectively, that are contained in the file system. The first and second requests comprise first and second file system paths, respectively. The first file system path comprises a first file name, and the first file name comprises the first file extension. The second file system path comprises a second file name, and the second file name comprises the second file extension. The first file system path is modified by adding identities of the first, third, and fourth directories to the first file system path. The second file system path is modified by adding identities of the second, third, and fourth directories to the second file system path. |
US08782103B2 |
Monitoring system for optimizing integrated business processes to work flow
An information handling system comprises a connection via a network interface for receiving data representing business process data from an integrated business process running at a location, the business process data comprising at least data indicating from where documents are received. The system also comprises a storage device for storing data representing an aggregate of business process data for an integrated business process, and a processor adapted to determine from the aggregate business process data whether the integrated business process running at the location receives documents from an external trading partner that, if the integrated business process receives documents from the external trading partner, then the processor prepares instructions to select an information handling system environment for running the integrated business process having additional disk space or solid state drive resources. |
US08782100B2 |
Hybrid database table stored as both row and column store
A hybrid database table is stored as both a row and a column store. One or more techniques may be employed alone or in combination to enhance performance of the hybrid table by regulating access to, and/or the size of, the processing-intensive column store data. For example during an insert operation, the column store data may be searched for a uniqueness violation only after certain filtering and/or boundary conditions have been considered. In another technique, a hybrid table manager may control movement of data to the column store based upon considerations such as frequency of access, or underlying business logic. In still another technique, querying of the hybrid table may result in a search of the column store data only after an initial search of row store data fails to return a result. |
US08782096B2 |
Virtual repository management
Virtual repository management is disclosed. An indication is received that a content management functionality is desired to be available with respect to one or more external content items. A reference object is created for each for the one or more external content items that represents the external content item and enables the content management functionality to be performed with respect to the external content item. |
US08782091B2 |
Method and system for addressing a node in tree-like data structure
A system and method for addressing a node in a tree-like data structure evaluates a relative path expression of a node from one or more marker nodes. In one aspect, a single path expression is determined from a nearby marker node. In another aspect, multiple path expression are determined and resolved to a single path expression. In yet another aspect, the method and system of the present disclosure assign unique identifiers to a subset of nodes in the tree data structure. |
US08782089B2 |
Selective file erasure using metadata modifications and apparatus
A process that ensures the virtual destruction of data files a user wishes to erase from a storage medium, such as a hard drive, flash drive, or removable disk. This approach is appropriate for managing custom distributions from a large file sets as it is roughly linear in compute complexity to the number of files erased but is capped when many files are batch erased. |
US08782087B2 |
Analyzing large data sets to find deviation patterns
Operations, such as data processing operations, can be improved by applying clustering and statistical techniques to observed behaviors in the data processing operations. |
US08782084B2 |
System, method, and computer program product for conditionally allowing access to data on a device based on a location of the device
A system, method, and computer program product are provided for conditionally allowing access to data on a device based on a location of the device. In use, a location of a device storing data is identified. Furthermore, access to the data is conditionally allowed, based on the location. |
US08782083B1 |
Dynamic sourcing
Dynamic sourcing, in which a data request that is associated with a query is received and a parameter of data needed for satisfaction of the query is identified. Parameter information defining data available in at least one cube stored in a cache is accessed and the parameter is compared with the parameter information. Based on comparison results, it is determined whether one or more cubes in the cache include sufficient data to satisfy the query. In response to a determination that one or more cubes include sufficient data to satisfy the query, a response to the data request is generated by executing the query against the one or more cubes. In response to a determination that the cubes do not include sufficient data to satisfy the query, a response to the data request is generated by executing at least a portion of the query against a database system. |
US08782081B2 |
Query template definition and transformation
A database query template and metadata mapping provide an end-user to generate customized database reports via a user interface. The parameters and data available to the end-user can be modified by editing the database query template and metadata mapping without modifications of the underlying system. A database query template includes query language keywords, variables, and template-tokens and defines the metrics, dimensions, data comparisons, filters, and aggregations available to an end-user. Template tokens include restriction tokens for comparing and filtering data, options-section-tokens for defining and omitting sections of the query template, and descriptor tokens for identifying dimensions and metrics of the database. The database query template is transformed into a database query based on values input by a user. The metadata mapping associates the variables of the database query template to the database data model and can include data constraints for validation of user input. |
US08782078B2 |
Systematic process for creating large numbers of relevant, contextual marginal comments based on existing discussions of quotations and links
A system for searching digital works for comments includes search software capable of searching web pages for comments about a referenced work. In one embodiment, the software searches a web page for delimiters such as quotes that are in proximity to a link to another web page. The software stores any comments in proximity to the quoted content for use in a comment display system where it may be displayed as comment marginalia. |
US08782077B1 |
Query image search
In general, in one aspect, a method includes receiving a query image, accessing a database of hash values of other images, determining a hash value for the query image by applying a hash function to a bit-vector of data representing signs of a subset of wavelet coefficients collected from the query image, the subset corresponding to wavelet coefficients having greatest magnitude, comparing the hash value of the query image to the hash values of the database, and based on the comparison, identifying as near duplicate images one or more of the other images having a hash value that matches the hash value of the query image. This and other implementations of this aspect can include corresponding systems, apparatus, and computer program products. |
US08782076B2 |
System and method for gathering and standardizing customer purchase information for target marketing
The present invention relates to storing and manipulating customer purchasing information, particularly purchasing information by credit cards, debit cards, checks, and the like. A hierarchical organizational structure is created comprising a plurality of categories and sub-categories. The customer purchase information may then be retrieved according to user created links to generate customer preference information. The customer preference information may be stored in a customer account, thereby allowing targeted offers to be made to customers. |
US08782067B2 |
Searching method, searching device and recording medium recording a computer program
In a searching device, an extractor extracts extracted documents, each of which contains a desired search string, from a plurality of document groups each including a plurality of documents. A preference determiner determines an output preference for each of the extracted documents in accordance with a predetermined rule. A group determiner determines, in sequence for each of the plurality of document groups, whether or not the document group is a determined group which contains one or more satisfying documents among extracted documents satisfying a predetermined output condition. And, an outputter outputs, in sequence for each of the plurality of the determined groups, a predetermined number of the satisfying documents contained in the determined group. |
US08782065B2 |
Interfacing an application to data sources via a web service interface
A system supports discovering available web services, retrieving description documents describing the web services, and binding methods and their parameters to data of an application document. When a user wants to bind a discovered web service to an application document, the system retrieves a description document from the web service. The system then parses the description document to identify the methods supported by the web service along with their parameters. The system allows a user to map method names and parameter names to more user-friendly display names. The system allows the user to bind the parameters to data of an application document. When the document is to be updated, the system sends a request for services specifying a method and input parameters as indicated by the binding. When a response is received, the system stores output parameters of the response in the document as indicating by the binding. |
US08782056B2 |
Method and system for facilitating information searching on electronic devices
A method and system for facilitating information searching for a user of an electronic device is provided. Facilitating searches involves obtaining information about the user interests, identifying potential data of interest to the user, extracting data related to the data of interest to the user, and collecting the extracted related data for presentation to the user on the device. |
US08782051B2 |
System and method for text categorization based on ontologies
A system for text categorization based on ontologies comprising data collector software modules; a categorizer software module; and a database comprising an indexed database of documents and their categorizations, and further comprising a plurality of ontologies, each ontology comprising a plurality of hierarchical taxonomies and each hierarchical taxonomy comprising a plurality of taxons. The data collector software modules receive a document to be classified and submit them to the categorizer software module; and the categorizer performs the following steps to categorize each document: splitting the document into sentences; selecting words or phrases that are present in ontologies stored in the database server; selecting a plurality of subtrees from the ontologies based on the presence of specific subcategories in the document; determining a weight for each subcategory; pruning subcategories having a weight below a threshold; and for each of the plurality of modified subtrees, computing a conditionality coefficient. |
US08782045B1 |
Evaluating techniques for clustering geographic entities
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for evaluating clusters of geographic entities, for example, to be used in a randomized geographic experiment. One method includes using a clustering algorithm to cluster geographic entities into a set of clusters, and identifying whether each geographic entity is an ambiguously classified entity or a definitively classified entity. The method further includes determining a measurement for the set of clusters according to a quantification of an attribute of the definitively classified entities and the ambiguously classified entities. Similar measurements can be calculated for other sets of clusters, and the clusters can be compared according to their measurements. |
US08782044B2 |
File management apparatus and method
A file management apparatus includes a storage unit to store a binder to bind one or more files, and a controller to provide a file management window including a binder display field, and to support a function of searching for the stored binder using the file management window. Therefore, files are bound through the binder display field to manage and search for files. Accordingly, utility of binders may increase. |
US08782043B2 |
Multi-sided media viewer and technique for media association
A system provides a multi-sided media viewer capable of displaying media assets from an electronic archival news and content database. Each side of the media player contains different information regarding the media asset. A primary side of the media asset may display a media asset related to an educational program, such as a course curriculum or the like. The secondary sides of the media viewer may contain additional information regarding that media asset, including personalized information generated by a system user as well as automatically populated information, such as information collected from other external news services or content providers. The system may further provide an educational game in which users are encouraged to find and draw connections between media assets to create an interconnection of related news items. The multi-sided media viewer may be a two-sided cue card, or a multidimensional news or content element having any number of sides depending on the additional information to be displayed with the media asset. |
US08782038B2 |
Systems and methods for online compatibility matching and ranking
The field of the invention relates to systems and methods for operation of a matching service, and more particularly to systems and methods that enable online compatibility matching and ranking. In a preferred embodiment, the system includes a matching system server coupled to a public network and accessible to one or more users. The matching system server includes a database that stores match profile data associated with the one more users, wherein the match profile data includes self-identified preferences. The matching server system is configured to correlate a first user's match profile data with one or more of the plurality of users' match profile data to identify a set of potential matches for the first user based on a relaxed set of self-identified preferences and calculate a compatibility value for each match in the set of potential matches. |
US08782037B1 |
System and method for mark-up language document rank analysis
A system and method for mark-up language document rank analysis that may be performed automatically and that may also determine one or more differences between mark-up language documents with regard to their relative rank. |
US08782035B2 |
Syndicated data stream content provisioning
Apparatus for syndicated data stream content provisioning, the apparatus comprising: an interaction tracker, configured to track at least one interaction of a user with at least one content object of a respective one of a group consisting of at least one syndicated data stream received on a computer device, the interaction being implicitly indicative of a preference of the user, a ranking function calculator, in communication with the interaction tracker, configured to calculate a ranking function based on the tracked interaction, and a content ranker, in communication with the ranking function calculator, configured to rank a plurality of content objects of the syndicated data streams of the group, in an order based on the calculated ranking function. |
US08782034B1 |
Utilizing information about user-visited places to recommend novel spaces to explore
A system and machine-implemented method for recommending a point of interest includes the steps of obtaining interest information indicating an interest of each of multiple users for a multiple points of interest, obtaining attributes for constraining a search of the multiple points of interest, identifying a point of interest that satisfies the attributes and has the least similarity to the interest information for a first user, and providing information about the identified point of interest for display to the first user. |
US08782031B2 |
Optimizing web crawling with user history
A politeness manager estimates traffic to the sites based on historical log data generated and sent by plug-ins or toolbars on client web browsers. The historical log data details dates and times the web browsers visit different web sites that is used to understand what timeframes specific web sites are busy and what timeframes the web sites are not busy. Crawl rates for different timeframes for a web site are determined based on the historical log data, and web crawlers are scheduled to crawl the web site according to the crawl rates to minimize the chances that web crawler requests are responsible for the site crashing. |
US08782028B1 |
Proxying search requests for files to a search engine
A method and apparatus for proxying search requests for a storage system and maintaining a central index for performing the search requests is described herein. An index manager on the storage system may initially produce the central index by examining each file in a file system and update the central index thereafter by examining only those files that have changed since the central index was initially produced or last updated. The index manager may receive a changed file list from a differencing layer configured for comparing snapshots of the file system at different time points to produce changed file lists. A search proxy module may receive search requests in a search protocol and proxy the search requests to a search engine by converting the search requests to another search protocol compatible with the search engine. The search engine may then use the central index for performing the search request. |
US08782027B2 |
Method and apparatus for authentication of file read events
A computerized method and apparatus for distinguishing between false positive read events and true positive events of reading a file, comprising determining an amount of date read from the file, in case the amount of data exceeds a threshold generating a true positive read event, otherwise generating a false positive read event in case a decision condition is met, and an apparatus to carry out the same. |
US08782025B2 |
Systems and methods for address intelligence
Systems and methods for determining the present status of at least one occupancy of one or more individuals based on one or more occupancy data sources are described. The techniques include obtaining the at least one occupancy of said one or more individuals from said one or more sources; computing a score of said at least one occupancy by a computer processor based on the currency and the relative trustworthiness of said one or more sources; and determining said present status of said at least one occupancy based on said computed score. The techniques can also include presenting the at least one occupancy in a user readable format. |
US08782023B1 |
Versioned database cache
A device may store information associated with a group of items in a database. The information associated with a particular item may include a group of versions of a particular attribute. A particular version of the particular attribute may include a value associated with the particular attribute and a timestamp. The device may receive a query that specifies a time; determine that the query is associated with the particular item; and determine, based on the specified time, which version of the particular attribute is associated with the query. The device may determine which version of the particular attribute is associated with the query by identifying, based on the timestamps associated with the versions of the particular attribute, a version of the particular attribute that is a newest version, of the versions of the particular attribute that are associated with timestamps that are before or concurrent with the specified time. |
US08782022B2 |
Method and apparatus for aggregating and translating real-time user information to update social network profiles
A method, computer readable medium and apparatus for automatically updating social network profiles are disclosed. For example, the method receives one or more inputs from a subscriber, processes the one or more inputs in accordance with a policy defined by the subscriber to produce an update about the subscriber and publishes the update about the subscriber on one or more social network profiles associated with the subscriber. |
US08782020B2 |
Method of and system for committing a transaction to database
A method of and system for committing a transaction to a database. In one embodiment the method comprises initiating a database transaction; creating an electronic record that includes transaction data from the database transaction; executing a rule associated with the record to determine whether an electronic signature is required to connote review and/or approval of the electronic record, and requesting the electronic signature prior to committing the transaction to the database if execution of the rule results in a determination that an electronic signature is required. |
US08782016B2 |
Database record repair
A computer implemented method for repairing records of a database, comprises determining a first set of records of the database which violate a functional dependency of the database, modifying records in the first set to make them consistent with the functional dependency to provide an output consistent database instance, determining a second set of records of the output consistent database instance comprising duplicate records, merging duplicate records in the second set in dependence on the functional dependencies of the records to provide a modified database instance. |
US08782015B2 |
Systems and methods for processing data in a web services environment
Systems and methods are disclosed for processing data in a web service environment. In one implementation, the data processing system includes a Web service for receiving a request via a network. The request includes a first set of data. The system further includes a storage device, coupled to the Web service, for storing a second set of data. The Web service is configured to perform certain functions in response to the request, including accessing the second set of data, performing a data consistency check of the first and second sets of data, generating a response indicating a result of the data consistency check, and sending the response to the requestor via the network. |
US08782014B2 |
Data integrity mechanism for external storage devices
A method for maintaining data integrity of a storage device is provided. A request is received to create an access monitoring session for a data range on a volume of the storage device. A session identification (ID) is determined for the access monitoring session for data range on the volume. An entry is created in an access monitoring session table for the session ID, and the entry adds the access monitoring session with session ID for the data range on the volume to the access monitoring session table. Request parameters are included in the request to create the access monitoring session. The request parameters denote access to the data range on the volume for the session ID and are stored in the access monitoring session table. Access is controlled to the data range on the volume for the session ID based on request parameters stored in the access monitoring session table. |
US08782010B2 |
Representing de-duplicated file data
Providing a subset of de-duplicated data as output is disclosed. The subset of data includes a plurality of data segments. In some embodiments, the output includes segments of data stored across a plurality of containers in a de-duplicated storage system. Each container stores one or more data segments from the subset as well as one or more segments not from the subset. For each container that includes at least one data segment from the subset, the corresponding container data is included in the output in its entirety, including segments that are not from the subset. In the event that container data is included in the output, a value in a data structure that corresponds to the container is updated. The data structure includes a value for each container in the de-duplicated storage system that indicates whether the corresponding container data has been included in the output. |
US08782007B1 |
Efficient data movement
A method, article of manufacture, and apparatus for processing information are disclosed. In some embodiments, this includes collecting information about a database, determining a first disk to read from based on the collected information, determining a second disk to write to based on the collected information, and performing a write operation on the second disk. In some embodiments, a read operation may be performed on the first disk contemporaneously with the write operation on the second disk, and the read operation may be the only operation performed on the first disk at a time. |
US08782005B2 |
Pruning previously-allocated free blocks from a synthetic backup
Pruning previously-allocated free blocks from a synthetic backup. In one example embodiment, a method of pruning previously-allocated free blocks from a synthetic backup includes identifying multiple sequential backups to be included in a synthetic backup, accessing a copy of a file system block allocation map (FSBAM) of the most recent of the multiple sequential backups that was stored with the most recent backup, identifying a set of blocks that includes the most recent block for each unique block position contained within the multiple sequential backups, pruning the set of blocks to exclude all blocks that are identified as being free in the FSBAM, storing the pruned set of blocks in the synthetic backup, and storing a copy of the FSBAM with the synthetic backup. |
US08782001B2 |
Computation of impacted and affected code due to database schema changes
The disclosed technology enables assistance to software developers by identifying the software application code that needs to be changed or behaves differently, as a consequence of a database schema change. The disclosed technology also enables a provision of automatic transformations, or at least hints for the transformation of the code, to accommodate the database schema change. |
US08782000B2 |
Management device, correction candidate output method, and computer product
A management device includes a storage unit which stores both an attribute value before correction and an attribute value after correction concerning a configuration item as a management target and type information of the configuration item or relationship information between the configuration item and another configuration item; a determination unit which, when an attribute value input for a new configuration item coincides with the attribute value before correction stored in the storage unit, determines a degree of coincidence between type information or relationship information input for the new configuration item and the type information stored in the storage unit or the relationship information stored in the storage unit; and an output unit which outputs the attribute value after correction based on the determination result of the determination unit. |
US08781999B2 |
Explorer style file viewer for a group of machines which display meta views of files on a group of machines
A system and method for identifying and presenting various views of files of a set of computers. In one preferred embodiment, the present invention presents a user with an explorer type interface that allows a user to view, for example, all computers of a network, and to select particular ones of the computers for analysis. The present invention allows a user to select specific computers and compare, for example, all files that are common to all those computers, or to display all files unique to each of those computers. In a preferred embodiment, the present invention also allows the user to take action on the presented information, such as to apply a common security policy to the group of machines. |
US08781998B2 |
Workflow automation system and method
The workflow automation system is a secure, online web-based system that automates any office workflow in a minimal amount of time by providing appropriate customizations and ASP.net forms, the customizations including name of the system, task-names, role names, names of actions on each task, order of tasks, etc. After the customizations, the workflow automation system is executable to provide each role a secure login with a central HR repository; an application that the role is responsible for; active task(s) in the application, etc. The desired web forms can be made in ASP.net using provided templates for forms, and controls to define what to do when by whom. The workflow automation system includes automatic sending of e-mail reminders to complete tasks after certain administrator-defined intervals, application tracking, parallel and sequential task processing, easy concealment of certain role names from others, and an easy method to provide Instructions on each web page. |
US08781997B2 |
Reusing reporting components in customized cubes
Disclosed herein are representative embodiments of tools and techniques for reusing derived measures of cubes in customized cubes. According to one exemplary technique, a base cube of a customized cube is determined. Additionally, a footprint of a derived measure of the base cube is determined. Also, a report that uses the customized cube is generated using the derived measure of the base cube. |
US08781995B2 |
Range queries in binary decision diagrams
In particular embodiments, a method includes receiving a query for data in data sets that are within a specified range, constructing a first binary decision diagram (BDD) representing the specified range, and constructing a third BDD representing the data in the specified range by performing an AND operation between the first BDD and a second BDD representing the data sets. |
US08781988B1 |
System, method and computer program product for messaging in an on-demand database service
In accordance with embodiments, there are provided mechanisms and methods for messaging in an on-demand database service. These mechanisms and methods for messaging in an on-demand database service can enable embodiments to more flexibly message in on-demand database environments. The ability of embodiments to provide such feature may lead to enhanced messaging features which may be used for providing more effective ways of messaging in the context of on-demand databases. |
US08781987B1 |
Decision making using algorithmic or programmatic analysis
A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems. The system can then automatically determine an instruction in a first time limit based on the calculated scored and command the executing system to execute the instruction. |
US08781983B2 |
Framework for the evolution of electronic neural assemblies toward directed goals
Methods and systems for the evolution of electronic neural assemblies toward directed goals. A compact computing architecture includes electronics that allows users of such an architecture to create autonomous agents, in a real or a virtual world and add intelligence to machines. An intelligent machine is composed of four basic modules: one or more sensors, one or more motors, a (Reward Input Output System) RIOS, and a cortex. A number of genetically evolved detectors can project both to cortex and RIOS. At first the neurons within the cortex evolve to predict the structure of the sensory data followed by the structure of proprioceptive activations of its own motor system. Finally, once the cortex has learned its sensory and motor programs, it evolves to predict the reward signals, which comes in multiple channels but is dominated by the detection of the acquisition of free-energy. |
US08781982B1 |
System and method for estimating remaining useful life
Mechanisms for predicting a remaining useful life of a cutter head of a milling machine that includes a plurality of flutes are disclosed. Features are extracted from reference data associated with a plurality of reference cutter heads. The reference data includes reference vibration data and reference wear data. At least two Neural Network predictive models are trained in parallel for predicting the remaining life of a new cutter head based upon the extracted features. Operational data associated with the new cutter head is obtained. The operational data includes operational vibration data and operational wear data. Features extracted from the operational data are input into an optimal predictive model of the at least two Neural Network predictive models. A remaining useful life of the new cutter head is estimated by the optimal predictive model. |
US08781980B2 |
Matching pattern of events with interval conditions
The matching apparatus 100 stores, with respect to a branching pattern included in event patterns 140a, a reception time of an event that serves as the branching point in a source node that indicates the transition destination of the event, connects the source node to the branch node by a transition with an interval condition, connects the branch nodes to the link node that indicates the linking point at which these branch nodes are linked together, and thereby generates NFAs 140b. Then, the matching apparatus 100 compares event streams 140c with the NFAs 140b to determine whether the event streams 140c includes the event patterns 140a. |
US08781971B2 |
Method and apparatus for enforcing software licenses
A method and apparatus for enforcing software licenses for resource libraries such as an application program interface (API), a toolkit, a framework, a runtime library, a dynamic link library (DLL), an applet (e.g., a Java or ActiveX applet), or any other reusable resource. The resource library can be used by authorized end user software programs. A “per-program” licensing scheme for a resource library can allow a resource library to be licensed only for use with particular software programs. |
US08781969B2 |
Extensible media rights
A DRM System. A DRM system comprising a service provider, a CE device coupled to the service provider, and an XMR license disposed upon the CE device. |
US08781968B1 |
Dynamic display based on estimated viewers
A system is provided for dynamic display based on estimated viewers. The system includes a sensor, a server, and a dynamic display. The sensor senses traffic in an environment. The server estimates a number of potential viewers based on sensing the traffic, selects content based on the number, and communicates the content. The dynamic display receives the content and displays the content for the potential viewers. |
US08781964B2 |
Smart safe for multiple users
In some embodiments, a method for processing a safe transaction includes receiving at a safe a first deposit of currency from a first user. Identification information is received from the first user. The identification information identifies the first user, an amount of the first deposit, and an account of the first user with a first financial institution. Transaction information is transmitted to the first financial institution. The transaction information provides information to the first financial institution of the first deposit to facilitate the first financial institution crediting the account of the first user. |
US08781961B2 |
Currency conversion with pre-paid card
A system is provided for a stored-value card account to serve as a platform to transfer funds in alternate currency. A prepaid cardholder may transfer to a recipient in a first currency from an account in a second currency. The prepaid cardholder selects the amount to be transferred, the recipient, and the currency to be provided to the recipient. An exchange rate is obtained automatically from a currency exchanger and once the prepaid cardholder authorizes the transfer, funds in the requested currency are transferred to the recipient and the prepaid cardholder account owner's prepaid cardholder account is debited the appropriate amount. Thus, currency conversion and delivery to a recipient is possible in an automated process. |
US08781958B2 |
Systems and methods for monitoring, managing, and facilitating transactions involving vehicles
A method for monitoring, managing, and facilitating transactions involving a vehicle includes: accessing information including one or more inputs and/or parameters for a transaction involving a vehicle, at least one of the inputs and/or parameters identifying the vehicle or being associated with or established in association with the vehicle; and facilitating or initiating a process of charging an account depending upon the one or more inputs and/or parameters. |
US08781956B2 |
Systems and methods for making structured reference credit decisions
A structured reference credit decision device includes a database configured to store information related to applicants, potential customers, referencers, potential referencers, lenders, and other third parties, a fetch data component coupled with the database, the fetch data component configured to receive input application information, fetch relevant information from the database, based on the application information, related to a subject applicant of the input application information and at least one referencer, and generate a plurality of linked data packages based on the fetched information, and an evaluation device coupled with the fetch data component, the evaluation engine configure to apply credit outcome models to the plurality of linked data packages and generate a recommendation relative to the subject applicant or application. |
US08781949B2 |
System and method for displaying money management information in an electronic trading environment
A system and method for displaying a plurality of profit and risk related indicators are described. A graphical interface displays and dynamically updates a plurality of profit/loss (P/L) indicators including a realized, net, and open indicator. The net and open indicators are based on a trader's net position and a current market level, while the realized indicator is based on trader's buys and sells associated with a tradeable objects. In one embodiment, the plurality of indicators are displayed in relation to a plurality of money management regions defining a maximum order quantity and a maximum net position controlling the trader's trades, so that a trader can quickly determine his current as well as potential money management parameters. The graphical interface may also display a plurality of potential risk/gain indicators in relation to a realized profit indicator so that a trader, before entering an order having a predetermined order quantity, can view a potential risk/gain in entering into a predetermined net position in view of potential market movements. |
US08781948B2 |
Trade matching platform with variable pricing based on clearing relationships
The disclosure describes systems and methods for using enhanced RFQs and incoming enhanced orders to assist in detecting implied orders using an implied spread determination module. In one example, a system includes a processor and memory storing a search list and computer-executable instructions, where the instructions determine whether the financial instrument associated with an eRFQ or new enhanced order is on the search list, and then determine if an implied order exists in combination with that financial instrument and CCP attribute designations. In some embodiments, a timer may be used to track a predetermined amount of time to spend towards determining if implied orders exist for a particular financial instrument at particular clearing houses. |
US08781944B2 |
Method of matching orders on an electronic trading system and an electronic trading system for matching orders
Matching orders on an electronic trading system is disclosed. Information is broadcasted regarding the current order status of an order book of the electronic trading system The order status includes a queue of orders. An order is received to trade that selects or indicates an order in the order book having queue number two or higher. If the received order has one or more properties matching the selected order, the received order is matched with the selected order. |
US08781928B2 |
Methodology for charging of discrete resource reservation based services
Methods, apparatus, and articles of manufacture are disclosed. These perform the following: accessing records of previous usage within a billing period of service units for customers, wherein the service units are discrete sizes of services for resource types, wherein each usage of an individual one of the service units has start and stop events, and wherein each resource type has a price fixed as of a date of the previous usage; dividing the billing period into time periods determined using the start and stop events for the usage of all of the service units; using the accessed records and the time periods and based on one or more criteria, assigning resource types to the previous usage in the time periods of the service units by the customers; and determining total charge for a selected customer based on the assignments of the resource types and corresponding prices for the selected customer. |
US08781922B2 |
Processing a bill of materials
A system may receive an input specification, compose a workflow by connecting an output port of a first one of a plurality of work units to an input port of a second one of the work units, receive a work order associated with the workflow, decompose the workflow into constituent work units upon receipt of the work order, instantiate tasks that correspond to the work units, generate a bill of materials that lists input and output files associated with the tasks based on the tasks and the input specification, and update fields of the bill of materials, the fields indicating states of the input and output files. |
US08781920B2 |
Methods, systems, and products for tracking surgical items
Methods, systems, and products track equipment used during surgical procedures. An allowable zone associated with a surgical procedure is identified. The allowable zone determines where surgical items may be used during the procedure. A location of a surgical item is determined. When the location is outside the allowable zone, an alarm is triggered to indicate the surgical item is moving outside the allowable zone towards an area in which the surgical item may not be used. |
US08781918B2 |
Monitoring updates involving data structures accessed in parallel transactions
The embodiments described herein provide techniques for monitoring updates involving data structures accessed in parallel transactions. In an example, objects may be stored in one of the data structures and such objects that may be accessed in multiple, parallel transactions. Counters are maintained in another data structure to track the stored objects. In an illustrative embodiment, this counter is based on a checksum that is derived from a sub key that uniquely identifies an object within a group of objects. |
US08781916B1 |
Providing nuanced product recommendations based on similarity channels
Embodiments of the method include receiving, from a client device, a request for products similar to a target product. The request specifies a similarity channel for the target product that indicates one or more themes. Thereafter, a set of products similar to the target product is identified, where each of the products in the set shares in common with the target product at least one of the themes indicated by the similarity channel. After identifying the set of similar products, the set is ranked according to a similarity of each product in the set to the target product. Subsequently, the set of ranked products is provided to the client device. |
US08781910B2 |
Automobile history information delivery system
A system and method for providing ready access to information about a vehicle offered for sale. A linking element is physically located on the vehicle. The linking element can assume many forms, with one example being a printed QR code on a “buyers guide” sticker or a separate sticker. A prospective purchaser uses a smart phone or other portable device to retrieve information based on the linking element. The smart phone then transmits this information over a communication link to a database containing information on many vehicles. The smart phone then receives the information back from the database on the specific vehicle queried where it may be reviewed by the user. |
US08781909B2 |
Method, medium, and system for ensuring the quality of a service in a distributed computing environment
A method of determining a service provider to perform a service. A request for the service and requirements pertaining to performance of the service is received. Identification of providers of service capable of performing the service in conformity with the requirements is received. The request and the requirements are broadcasted to the providers of service. An indication of willingness, by service providers selected from the providers of service, to perform the service in conformity with the requirements is received. An indication of performance of the service by each service provider and statistical data indicative of an extent to which performance of the service by each service provider matches each requirement are received. A preferred service provider is ascertained from analysis of the statistical data, based on performance of the service by the preferred service provider most closely matching the requirements. An identification of the preferred service provider is stored. |
US08781904B2 |
System and method for transponder-enabled account transactions
A transponder-initiated transaction system is electromagnetically coupled to an account transponder device at the point of sale. The account transponder device may be embedded within a watch, key chain or other personal article for convenience or affinity. The transponder device may communicate account information to an RF-enabled point of sale device, enabling transactions to take place without resort to remote data processing facilities. In other embodiments partial or complete account information may be accessed or stored at co-located or remote sources. New account registrants may access a Web site to enter a transponder ID and activate a new account, which may be a credit account, debit account, cash account, special purpose vending account, or other types of accounts. |
US08781903B1 |
Handheld order unit and cash handling device
Methods and devices allow a handheld order unit to be used with a cash handling device. A handheld order unit may be used by a staff person to enter order information, to display an amount due for the meal or other transaction, to facilitate payment, to print receipts, and to communicate information about the transaction to a cash handling device. The cash handling device may identify the handheld order unit and the assigned user for the unit and determine what financial documents need to be inserted by the user for reconciliation purposes. |
US08781902B2 |
Methods, devices, and computer program products for customer operated coupon tracking
A method of providing coupons for shopping includes storing a shopping list in an electronic device including items for purchase via a merchant, storing electronic representations of coupons in the electronic device and associating the electronic representations of coupons with items included in the shopping list. |
US08781898B1 |
Location query targeting
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for selecting content items for presentation. In one aspect, a method includes receiving a content item request that references a geographic location. A set of targeted phrases for the geographic location are received. The set of targeted phrases specify one or more targeted phrases that are each specified as a targeting criterion for at least a threshold number of content items for which a reference to the geographic location is also specified as a targeting criterion. A set of targeted queries for the geographic location are selected. Eligible content items are selected based on the set of targeted queries. In turn, data that cause presentation of at least one of the eligible content items are provided. |
US08781897B2 |
Media targeting system and method
A media targeting system and method uses visual pattern recognition techniques in association with consumer transactions as the basis for building a targeting database, which is then later used for automated consumer identification and targeted advertising purposes. The invention solves the problem of generating a large scale, robust media targeting database without relying on active or passive participation by consumers. Also disclosed are other demographics estimation systems and methods which facilitate less expensive media targeting capabilities which can be used in conjunction with the more robust transaction associated method disclosed. |
US08781890B2 |
Access rights modification within webpage implementation server system
A method, within a computer hardware system, includes the following. Limited access rights to the computer hardware system are associating with a first entity. In response to the first entity submitting a registration for a first website, the limited access rights previously associated with the first entity are removed. A first functional marketing element associated with a second entity is inserted within a first website associated with a first entity. A second functional marketing element associated with the first entity is reciprocally inserted within a second website associated with the second entity based upon the first functional marketing element being inserted within the first website. The second functional marketing element, within the second website, includes a link to the first website, and the first functional marketing element, within the first website, includes a link to the second website. |
US08781883B2 |
Time motion method, system and computer program product for annotating and analyzing a process instance using tags, attribute values, and discovery information
Process studies are performed to determine improvements to processes, such as manufacturing or service related processes. One or more instances of a process may be captured (e.g., recorded) and annotated. A user is enabled to interact with a recording included in the process instance of a process being performed. The user is enabled to apply a process step tag selected from a plurality of process steps to a section of the recording. The user may be enabled to interact with the recording to apply an attribute value selected from a list of attribute values to the process instance. The user may be enabled to interact with the recording to apply discovery information to the process instance. Annotation information associated with the process instance is generated that includes the process step tag, any applied attribute values, and any applied discovery information. |
US08781881B2 |
Merchant benchmarking tool
A benchmarking tool generates reports for delivery to a merchant illustrating a performance of the merchant as compared to the performance of the merchant's peers. The performance is illustrated through metrics that algorithmically combine data on transactions of consumers with the merchant or its peers, respectively. The metrics may be further subdivided into consumer groups such as new consumers, consumers that have shopped within the merchant in the past, consumers that no longer shop within the merchant, or consumers that use a commercial account to pay for purchases. The reports may be rendered in a graphical display for use by the merchant. |
US08781872B2 |
Methods and systems for assigning operators to print production cells based on relationships
A system of assigning operators to cells in a document production environment may include a computing device and a computer-readable storage medium in communication with the computing device. The computer-readable storage medium may include one or more programming instructions for identifying a first plurality of cell operators, where each cell operator may be associated with one or more skills, identifying a cell to be staffed, where the cell may be associated with one or more functions, identifying, from the first plurality of cell operators, a subset of cell operators including one or more cell operators who each possess the skills necessary to perform the one or more functions associated with the cell, selecting, from the subset, a second plurality of cell operators based on at least one relationship amongst the second plurality of cell operators, and assigning the second plurality of cell operators to the cell. |
US08781870B2 |
Personal information management with location functionality
A method is provided for prompting a user to perform PIM-related acts based on dynamic location data. The user's current location is received and a PIM item is selected from the user's PIM system. The user's current location is compared to the location of the selected PIM item. Based on the comparison, a suggested user fulfillment action for the PIM item is suggested to the user. |
US08781869B2 |
Determining estimation variance associated with project planning
Method and system for determining estimation variance associated with project planning are provided. In one aspect, information associated with a project is obtained and initial estimations for the tasks in the project are determined using available information. The tasks are performed and actual measurements are obtained from the completed tasks. The actual measurements are used to revise the estimates of the remaining tasks. The revised estimates are used to compute a project level estimate and a variance on that estimate, and to enable better project management. |
US08781868B2 |
Determining an inventory target for a node of a supply chain
Determining an inventory target for a node of a supply chain includes calculating a demand stock for satisfying a demand over supply lead time at the node of the supply chain, and calculating a demand variability stock for satisfying a demand variability of the demand over supply lead time at the node. A demand bias of the demand at the node is established. An inventory target for the node is determined based on the demand stock and the demand variability stock in accordance with the demand bias. |
US08781866B2 |
Method and system for creating electronic business referrals with cloud computing from social media sites
A method and system for creating electronic business referrals with cloud computing from social media sites. Plural unique referral identifier tracking codes are generated for a same target network device from a same social media site (e.g. FACEBOOK, TWITTER, etc.) or for the same target network device from plural different social media sites. The plural unique referral tracking codes are processed by a cloud referral application on a cloud communications network. The plural unique referral codes include appointment requests or referrals of new patients or customers for professional services or reservations or coupons or electronic purchase requests for goods or services. A thank you and referral bonus is automatically generated from the cloud referral application for the target network devices that send the plural unique referral identifier tracking codes. The plural unique referral codes include analytic data that is used by vendors providing professional services or goods or services. |
US08781860B2 |
Optimization of chronic pain management over a communications network
A method for facilitating treatment of patients, wherein the server is communicatively coupled to a communications network, is provided that solves the above-described problems. The method includes receiving, via the communications network, an exercise regimen for a patient, wherein the exercise regimen includes a normalized model of at least one exercise activity, transmitting, via the communications network, the exercise regimen to a computing device of the patient, receiving, via the communications network, patient observation data, including a log of the patient performing the least one exercise activity, and generating a report including data from the exercise regimen and the patient observation data. |
US08781857B2 |
Method for competitive prescription drug and/or bidding service provider selection
Unfilled prescriptions are submitted to a registry comprising pre-qualified pharmacies for a “reverse auction” in which the pharmacies bid for the opportunity to fill the prescription. The pharmacies or a network of pharmacies on behalf of the pharmacies are allowed to bid based on price and/or offering ancillary services. The auction may also be used to bid on supplying specified pharmaceutical cognitive services. The method may also include obtaining cost comparisons with generic substitutes or similar alternative pharmaceutical products. The system may further comprise automatically requesting a review by the prescriber for a list of similar substitutes or prior-authorization for third-party payers. The winner of the reverse auction is selected by the customer. |
US08781854B1 |
Systems and methods for identifying healthcare transactions with a risk of failing to include appropriate directions for use
Systems and methods for identifying healthcare transactions with a risk of failing to include appropriate directions for use are provided. A healthcare claim transaction may be received from a healthcare provider computer. Based upon an analysis of the received healthcare claim transaction, identification information for a prescriber may be determined. A determination may be made as to whether the identified prescriber is an at-risk prescriber that has previously failed to include appropriate directions for use in association with a prescription. If it is determined that the prescriber is an at-risk prescriber, then a predetermined control action may be implemented. Otherwise, if it is determined that the prescriber is not an at-risk prescriber, then the healthcare claim transaction may be communicated to a claims processor computer associated with a claims processor. |
US08781852B2 |
Systems and methods for creating a form for receiving data relating to a health care incident
Embodiments of the invention relate to systems and methods for creating a form for receiving data relating to a health care incident. A dictionary of field objects is provided in a metabase, where a field object defines attributes, and an instance of a field object is a form field. A request to create a user-defined field object is received and it is determined that the user-defined field object is not in the dictionary of field objects in the metabase. The user-defined field object is generated by defining attributes for the user-defined field object, where at least one attribute is a presentation attribute for a form field within a form. The user-defined field object is added to the dictionary of field objects in the metabase and the user-defined field object is linked to a data location in a persistent store. The form is generated, where the form is an ordered collection of form fields, where at least one form field is an instance of the user-defined field object and is displayed according to the at least one presentation attribute. |
US08781849B1 |
System for and method of enhancing patient's healthcare by utilizing provider-generated data
A system and method by which medical care providers enter data representing a patient's condition(s), treatments provided and drugs prescribed and other information that may be germane to a patient's condition. The data is transmitted to both a managed-care organization as well as to interconnected centralized service center(s) that receive similar data from multiple participating providers. The service center(s) store, for each patient, all the data. When such data is received from the medical providers treating the patient the service center can create a profile of the patient and compare all of this data with a database or lookup table (LUT) that contains all of the recommended protocols, treatments, follow-up treatments, medications, etc. for a patient. When follow-up treatments, medications, etc. are recommended, the service center(s) can automatically send reminders, recommendations or suggestions to the patient's provider(s) to take recommended steps to ensure the wellness of the patient. |
US08781843B2 |
Method and an apparatus for processing speech, audio, and speech/audio signal using mode information
A method of processing a signal, which includes receiving at least one of a first signal and a second signal, receiving mode information, and decoding the at least one of the first signal and the second signal using at least one of a first coding scheme and a second coding scheme according to the mode information. Further, the mode information is information for indicating that a prescribed mode corresponds to which one of at least three modes. |
US08781842B2 |
Scalable coding with non-casual predictive information in an enhancement layer
A method for audio coding and decoding comprises primary encoding of a present audio signal sample into an encoded representation (T(n)), and non-causal encoding of a first previous audio signal sample into an encoded enhancement representation (ET(n−N+)). The method further comprises providing of the encoded representations to an end user. At the end user, the method comprises primary decoding of the encoded representation (T*(n)) into a present received audio signal sample, and non-causal decoding of the encoded enhancement representation (ET*(n−N+)) into an enhancement first previous received audio signal sample. The method further comprises improving of a first previous received audio signal sample, corresponding to the first previous audio signal sample, based on the enhancement first previous received audio signal sample. Devices and systems for audio coding and decoding are also presented. |
US08781840B2 |
Retrieval and presentation of network service results for mobile device using a multimodal browser
A method of obtaining information using a mobile device can include receiving a request including speech data from the mobile device, and querying a network service using query information extracted from the speech data, whereby search results are received from the network service. The search results can be formatted for presentation on a display of the mobile device. The search results further can be sent, along with a voice grammar generated from the search results, to the mobile device. The mobile device then can render the search results. |
US08781839B1 |
Computerized information and display apparatus
Computerized apparatus useful for obtaining and displaying information. In one embodiment, the computerized apparatus includes a network interface, display device, and speech recognition apparatus configured to receive user speech input and enable performance of various tasks, such as obtaining desired information relating to indoor entities, maps or directions, or any number of other topics. The downloaded data may also, in one variant, be displayed with contextually related advertising or other content. |
US08781833B2 |
Speech recognition semantic classification training
An automated method is described for developing an automated speech input semantic classification system such as a call routing system. A set of semantic classifications is defined for classification of input speech utterances, where each semantic classification represents a specific semantic classification of the speech input. The semantic classification system is trained from training data having little or no in-domain manually transcribed training data, and then operated to assign input speech utterances to the defined semantic classifications. Adaptation training data based on input speech utterances is collected with manually assigned semantic labels. When the adaptation training data satisfies a pre-determined adaptation criteria, the semantic classification system is automatically retrained based on the adaptation training data. |
US08781832B2 |
Methods and apparatus for buffering data for use in accordance with a speech recognition system
Techniques are disclosed for overcoming errors in speech recognition systems. For example, a technique for processing acoustic data in accordance with a speech recognition system comprises the following steps/operations. Acoustic data is obtained in association with the speech recognition system. The acoustic data is recorded using a combination of a first buffer area and a second buffer area, such that the recording of the acoustic data using the combination of the two buffer areas at least substantially minimizes one or more truncation errors associated with operation of the speech recognition system. |
US08781824B2 |
Offline generation of subtitles
One embodiment described herein may take the form of a system or method for generating subtitles (also known as “closed captioning”) of an audio component of a multimedia presentation automatically for one or more stored presentations. In general, the system or method may access one or more multimedia programs stored on a storage medium, either as an entire program or in portions. Upon retrieval, the system or method may perform an analysis of the audio component of the program and generate a subtitle text file that corresponds to the audio component. In one embodiment, the system or method may perform a speech recognition analysis on the audio component to generate the subtitle text file. |
US08781819B2 |
Periodic signal processing method, periodic signal conversion method, periodic signal processing device, and periodic signal analysis method
The invention relates to a periodic signal processing method, a periodic signal conversion method, and a periodic signal processing device capable of reducing the influence of periodicity without using a spectral model. Time windows are arranged such that a center of each of the time windows is at a division position which divides a fundamental frequency in a temporal direction into fractions 1/n (where n is an integer equal to or larger than 2) so as to extract a plurality of portions of different ranges from a signal having periodicity. A power spectrum for the plurality of portions extracted by the respective time windows is calculated, and the calculated power spectrum is added with a same ratio. |
US08781815B1 |
Non-standard and standard clause detection
A non-standard and standard clause detection system imports raw input data or contractual documents, and extracts non-standard and standard clauses that are semantically linked. One embodiment of a disclosed configuration is a system and a method for identifying non-standard and standard clauses in contractual documents. The system and the method comprise of generating a primary policy and a secondary policy, obtaining a first feature data set by applying the primary policy to a semantic language evaluator, and obtaining a second feature data set by applying the secondary policy to the semantic language evaluator. The first feature data set obtained is the aggregation of the standard clauses used in the document. Furthermore, the second feature data set encompasses the first feature data set, thus the difference between the first feature data set and the second feature data set is the aggregation of the non-standard clauses. |
US08781810B2 |
System and method for productive generation of compound words in statistical machine translation
A method and a system for making merging decisions for a translation are disclosed which are suited to use where the target language is a productive compounding one. The method includes outputting decisions on merging of pairs of words in a translated text string with a merging system. The merging system can include a set of stored heuristics and/or a merging model. In the case of heuristics, these can include a heuristic by which two consecutive words in the string are considered for merging if the first word of the two consecutive words is recognized as a compound modifier and their observed frequency f1 as a closed compound word is larger than an observed frequency f2 of the two consecutive words as a bigram. In the case of a merging model, it can be one that is trained on features associated with pairs of consecutive tokens of text strings in a training set and predetermined merging decisions for the pairs. A translation in the target language is output, based on the merging decisions for the translated text string. |
US08781808B2 |
Prediction-based distributed parallel simulation method
The simulation consists of a front-end simulation and a back-end simulation. The front-end simulation can use an equivalent model at different abstraction level, or a simulation model for the back-end simulation. The back-end simulation uses the simulation result of front-end simulation so that it can run one or more simulation runs sequentially or in parallel. Alternatively, models at lower level of abstraction are simulated together with a model at higher level of abstraction in parallel using two or more simulators. |
US08781803B2 |
Method and device for generating and publishing a railway signaling diagram
The invention relates to method and device for generating and publishing a railway signaling diagram comprising a track diagram of a railway network and track equipment arranged on the network portion, each piece of track equipment comprising particular characteristics. One method of the invention comprises: (a) entry by a user of topological data of the portion of the railway network; (b) automatic generation by the computation means of a track diagram of the portion of the railway network from topological data; (c) selection by the user of a plurality of rules for positioning track equipment to be arranged on the railway track diagram, and (d) automatic generation by the computation means of the railway signaling diagram of the portion of the network from selected rules for positioning the track equipment and the railway diagram. The invention also relates to a device adapted to carry out the preceding method. |
US08781802B2 |
Simulation device and simulation method
A simulation device for generating an answer to a question inputted thereto. A communication unit is configured to input a selected question associated with a first criterion and a second criterion. A generating unit is configured to generate a copy of a continuously updated environment model. A generating unit is configured to generate a simulation scenario, depending upon the first criterion. A modifying unit is configured to modify the generated simulation scenario. An applying unit is configured to apply the modified generated simulation scenario to the generated copy of the continuously updated environment model. A simulating unit is configured to perform a simulation process in accordance with the second criterion. An answering unit is configured to answer information, depending upon a result of the simulation process. |
US08781801B2 |
Meteorological phenomena simulation device and method
A meteorological simulation method acquires the geomorphological data of a predetermined region, acquires the meteorological data of the predetermined region entirely or partially, acquires the 3D spatial data of a partial region in the predetermined region where the 3D space is defined by grids, calculates the meteorological data in the predetermined region by using the geomorphological data and the meteorological data, acquires the attribute data of each grid including the geometrical factors of the grids, calculates heat radiation energy of every grid based on the attribute data of each grid, calculates the flux between a solid object or the like and the ground surface and the pressure variation on the boundary of the solid object and the atmosphere based on the heat radiation energy thus calculated, calculates the weather data on the boundary of the solid object or the like and the atmosphere based on the flux and pressure variation, and calculates the meteorological data in the predetermined region furthermore after a predetermined time by outputting the calculated meteorological data to an output unit and using the meteorological data on the boundary of the solid object or the like and the atmosphere. |
US08781800B2 |
Data de-duplication in computer storage systems
Embodiments of the present invention provide an approach that utilizes discrete event simulation to quantitatively analyze the reliability of a modeled de-duplication system in a computer storage environment. In addition, the approach described herein can perform such an analysis on systems having heterogeneous data stored on heterogeneous storage systems in the presence of primary faults and their secondary effects due to de-duplication. In a typical embodiment, data de-duplication parameters and a hardware configuration are received in a computer storage medium. A data de-duplication model is then applied to a set of data and to the data de-duplication parameters, and a hardware reliability model is applied to the hardware configuration. Then a set (at least one) of discrete events is simulated based on the data de-duplication model as applied to the set of data and the data de-duplication parameters, and the hardware reliability model as applied to the hardware configuration. Based on the simulation, a set of data reliability and availability estimations/estimates can be generated (e.g., and outputted/provided). |
US08781798B2 |
Systems and methods for exploring and utilizing solutions to cyber-physical issues in a sandbox
Methods and arrangements for accommodating and synthesizing data for seeking broad-based solutions to complex problems. Logical models with respect to infrastructure in a first location are created. System-level models are created with respect to the logical models, and simulations are performed on the system-level models to verify expected behavior. Feedback is employed from the performed simulations to forecast changes in the system-level models. |
US08781796B2 |
Systems and methods for individualized alertness predictions
Systems and methods are provided for generating individualized predictions of alertness or performance for human subjects. Alertness or performance predictions may be individualized to incorporate a subject's individual traits and/or individual states. These individual traits and/or individual states (or parameters which represent these individual traits and/or individual states) may be represented by random variables in a mathematical model of human alertness. The mathematical model and/or prediction techniques may incorporate effects of the subject's sleep timing, the subject's intake of biologically active agents (e.g. caffeine) and/or the subject's circadian rhythms. The mathematical model and/or prediction techniques may incorporate feedback from the subject's measured alertness and/or performance. |
US08781795B2 |
Strut and tie method for waffle slabs
The strut and tie method for waffle slabs relates to computer modeling of waffle slabs to predict strength and mode of failure. The waffle slab strut and tie method utilizes a three-dimensional strut-and-tie model, which is applied to distinct structural features of waffle slabs. Individual ribs in the slab form two-dimensional trusses, which are connected with perpendicular trusses at rib intersections. The geometry of the slab defines the location of nodes for finite element analysis. |
US08781792B2 |
Yield computation and optimization for selective voltage binning
Techniques for improving parametric chip yield of manufactured chips are provided. In one aspect, a method for optimizing parametric chip yield is provided. The method includes the following steps. Parametric chip yield is computed based on performance and power consumption of a plurality of manufactured chips subject to a given voltage binning scheme. It is then determined whether the parametric chip yield computed is optimal. If the parametric chip yield is not optimal, the voltage binning scheme is altered and the compute and determine steps are repeated. Otherwise the binning scheme is left unaltered. |
US08781790B2 |
Return pulse shape analysis for falling edge object discrimination of aerosol LIDAR
A LIDAR optical remote sensing system and method analyzes the falling edge profile of a return LIDAR signal that may be indicative of an object or an aerosol cloud, which is generally more diffuse. Using the falling edge profile permits burnthrough to an object that may be obscured by the aerosol cloud. The profile is compared against at least one threshold that may correspond, in various embodiments, to a negative slope of the falling edge, an integrated power under the falling edge, or a range estimate error for varying transmitted power values, varying transmitted pulse lengths and/or varying receiver detector field of view values. |
US08781786B2 |
Spindle speed detection through current sensing during boost braking
A circuit includes a comparator having input terminals configured to be coupled across a drive transistor adapted to drive a phase of a motor. The comparator senses a drive current of the motor phase, said sensed drive current represented by a periodic signal whose period is indicative of motor speed. A motor speed calculation circuit receives the periodic signal and processes the periodic signal to determine a speed of the motor. |
US08781783B2 |
System and method for checking ground vias of a controller chip of a printed circuit board
A system and method for checking a ground via of control chips of a printed circuit board (PCB) provides a graphical user interface (GUI) displaying a layout of the PCB. The control chip has a plurality of ground pins. The computer searches for signal path routing of each ground pin and ground vias along each signal path routing of each ground pin. If there are any ground vias having the same absolute coordinates, the computer determines that the ground vias are shared by more than one ground pin. |
US08781778B2 |
Systems and methods for thermal gradient compensation for ring laser gyroscopes
Systems and methods for thermal gradient compensation for ring laser gyroscopes are provided. In one embodiment, a method for producing bias compensated angular rate measurements from a ring laser gyroscope comprises: sampling an angle measurement output from a laser block sensor to obtain an angular rate measurement; obtaining an laser block temperature measurement (Tblock) for the laser block sensor; obtaining a temperature gradient measurement (Tdiff) for at least one gradient line across a portion of the laser block sensor; calculating a rate bias error by applying parameters produced from the temperature measurement (Tblock) and the temperature gradient measurement (Tdiff) to a thermal gradient compensation model, wherein the thermal gradient compensation model includes at least one coefficient corresponding to the temperature gradient measurement (Tdiff); and calculating a difference between the angle rate measurement and the rate bias error to produce a bias compensated angular rate measurement. |
US08781777B2 |
Rotation angle detection device and electric power steering system using the same
A bridge circuit includes a plurality of half-bridges formed of sensor elements, which change impedance in accordance with a rotation angle of a detection target. A control circuit acquires output signals of the half-bridges and calculates a phase correction value for correcting a phase deviation. A memory circuit stores the phase correction value. The control circuit corrects a pre-correction rotation angle by the phase correction value. Since the pre-correction rotation angle is corrected by the phase correction value, a rotation angle of the detection target is detected with high accuracy even if the sensor elements are assembled with some positional deviations. |
US08781774B2 |
Integrated closed-loop hybridization device built in by construction
The invention relates according to a first aspect to a hybridization device (1) comprising a virtual platform (2), a bank (3) of Kalman filters each estimating a correction vector (dX0-dXn) comprising a plurality of components, said device formulating a hybrid output (SH) corresponding to inertial measurements (PPVI) calculated by the virtual platform (2) and corrected by a stabilization vector (dC) exhibiting one and the same plurality of components, characterized in that it comprises a correction formulation module (4) configured so as to formulate each of the components (dC[state]) of the stabilization vector (dC) as a function of all the corresponding components (dX0[state]-dXn[state]) of the correction vectors (dX0-dXn). |
US08781766B2 |
Fault location using traveling waves
Disclosed herein are various embodiments of systems and methods for calculating a fault location in electric power delivery system based on a traveling wave created by an electrical fault in the electric power delivery system. According to one embodiment, an intelligent electronic device may be configured to detect a transient traveling wave caused by an electrical fault. A first traveling wave value of the transient traveling wave may be determined and a corresponding first time associated with the first traveling wave may be determined. The IED may receive a second time associated with a second traveling wave value of the transient traveling wave detected by a remote IED. The distance to the remote IED may be known. An estimated fault location may be generated based on the time difference between the first time and the second time. Additional methods of calculating the fault location may also be employed. |
US08781762B2 |
Systems and methods for determining geologic properties using acoustic analysis
Systems and methods which determine geologic properties using acoustic analysis are shown. Acoustic signals are collected during processing (e.g., crushing, shearing, striking, compressing, etc.) of geologic media, such as rock samples, for determining geologic properties according to embodiments. The acoustic signals collected may include frequency information, amplitude information, time information, etc. which may be utilized in determining geologic properties, such as geologic media properties (e.g., mineralogy, porosity, permeability, sealing capacity, fracability, compressive strength, compressibility, Poisson's Ratio, Youngs Modulus, Bulk Modulus, Shear Modulus), geologic structure properties (e.g., lithology, seal quality, reservoir quality), geologic acoustic properties (e.g., acoustic logging effectiveness, acoustic response, natural or harmonic frequencies, etc.). Embodiments may be used to provide determination of geologic properties from a variety of geologic media samples, such as cuttings, core samples, etc. |
US08781760B2 |
Tire condition monitoring method and tire condition monitoring system
A tire condition monitoring method and a monitoring system having a simple configuration and that can process data with a high degree of reliability. The method or system determines at a sensor module whether a measured value from a sensor satisfies a preset condition. If determined that the measured value does not satisfy the preset condition, at least one flag is set in the data packet to be transmitted from the sensor module. If, at the receiver, it is determined that the measured value of the received data does not to satisfy a preset condition, whether a flag is included in the received data is determined. If it is determined that the received data includes a flag, the received data is used, and if it is determined that a flag is not included, the received data is discarded. |
US08781755B2 |
Fugitive emission flux measurement
A method of obtaining a fugitive emission flux measurement of airborne matter is provided. The method involves measuring the airborne matter along one or more than one measurement surface that spans the fugitive emission using two or more than two measurement beam paths where each of the two or more than two measurement beam paths are parallel to each other, or substantially parallel to each other, and determining a mass per unit length measurement for the measurement surface, determining a representative wind velocity at or near the one or more than one measurement surface, and calculating the fugitive emission flux of the airborne matter in mass per unit time using the mass per unit length determination and representative wind velocity. |
US08781754B2 |
Method and apparatus for detecting consensus motifs in data sequences
Disclosed are a method of and system for detecting a consensus motif in a data sequence. The method comprises the steps of obtaining the data sequence, identifying potential signal (PS) segments of interest in the data sequence, and carrying out comparison and alignment processes amongst the PS segments to extract the consensus motif. Preferably, an unsupervised motif discovery process is used to identify the PS segments. More specifically, this may be done by extracting all common motifs across the sequence using the unsupervised motif discovery process; and for each of at least selected positions in the sequence, computing the weighted sum of the common motifs that cover said position. The PS segments that cover the positions where said number is above a given threshold may then be identified as the PS segments. |
US08781753B2 |
System and method for evaluating physiological parameter data
Embodiments disclosed herein may include systems and methods for evaluating physiological parameter data. Embodiments of methods may include monitoring a patient to produce a signal comprising a sequence of numerical values for a physiological parameter over a time period, calculating an index from the signal, comparing the index to a reported index, and if the index is greater than the reported index, setting the reported index to the value of the index. Embodiments of methods may include calculating a modulation of the signal, comparing the modulation to a previous value of the modulation to identity a trend in the modulation and if the trend corresponds to an undesirable condition, using a first function to increase the reported index. Embodiments of methods may include providing an indication of a physiological status based on the reported index. |