Document | Document Title |
---|---|
US08807110B2 |
System and method for sampling fluid from piston top land crevice of piston engine
A system and method for sampling fluid from a top land piston crevice of a reciprocating piston engine. Access into the crevice is via a length of tubing inserted into a bore through the piston wall. Two valves, first a relief valve and then a piloted check valve, operate together to capture a sample of fluid from the crevice at a time just before TDC of the piston on its compression stroke. The sampled fluid flows from the check valve into a sample container. The valves further cooperate to close fluid communication from the crevice after a sample is taken, which allows the engine to operate normally. |
US08807109B2 |
Steel piston with cooling gallery and method of construction thereof
A piston and method of construction is provided. The piston includes a top part fixed to a bottom part. The top part has an uppermost surface with annular inner and outer upper joining surfaces depending therefrom. The bottom part has a pair of pin bosses with pin bores aligned with one another along a pin bore axis; a pair of upwardly extending annular inner and outer lower joining surfaces and a combustion bowl wall. Inner and outer weld joints fix the inner and outer upper and lower joining surfaces to one another. An annular cooling gallery is formed laterally between the upper and lower joining surfaces. The inner weld joint joining the top part to the bottom part is located within the combustion bowl wall and configured to minimized the compression height of the piston. |
US08807108B2 |
Engine crankshaft
A crankshaft is provided. The crankshaft includes an unsupported axially-aligned shaft section interposing an outer main bearing journal and an inner main bearing journal, the unsupported axially-aligned shaft section having a central axis aligned with a rotational axis of the crankshaft, and a pendulum absorber coupled to the unsupported axially-aligned shaft section, the pendulum absorber including a blade extending from the unsupported axially-aligned shaft section and a pendulous counterweight coupled to the blade. |
US08807101B2 |
Variable valve lift apparatus
A variable valve lift apparatus may include an outer tappet body of which a latching portion connecting hole and an outer tappet body guide hole may be formed therewithin, an inner tappet body of which an inner tappet body guide hole may be formed therewithin and slidably disposed within the outer tappet body, a latching portion which may be disposed within the inner tappet body guide hole and selectively coupled to the latching portion connecting hole, a latching portion support pin which guides the latching portion along a longitudinal direction of the inner tappet body guide hole and may be connected to the inner tappet body, a hydraulic pressure chamber, and a plunger which may be slidably disposed in the outer tappet body guide hole and selectively inserts the latching portion into the latching portion connecting hole according to the hydraulic pressure supplied from the hydraulic pressure chamber. |
US08807096B2 |
Heat management module of the cooling system of an internal combustion engine
A heat management module of a cooling system of an internal combustion engine which has a valve housing that includes at least one first feed connection for cooling water of a bypass circuit and at least one adjacent second feed connection for cooling water of a radiator circuit. The feed connections can be connected to a discharge connection depending on the position of a valve member accommodated in the valve housing. A driving element which actuates the valve member is provided on the valve housing. The driving element is a hydrostatic servo motor, which produces a rotating driving motion and which uses a feed pressure line that branches from the cooling system for pressurization. |
US08807087B2 |
Fluid delivery device
A fluid delivery device is provided for applying fluid to an object, including a spray head, a fluid conduit connected to the spray head, and a driver for moving the spray head into a spray position relative to the object, wherein the spray head includes a support arm, the support arm including at least a flexible section, an actuator to cause fluid to be sprayed via the spray head, and a control mechanism that ensures that a) the spray head is moved by the driver substantially to an area of the object to be sprayed, b) the fluid is supplied to the spray head once the spray head is in position, and the fluid device actuated, and c) the spray head is withdrawn from position after spray has been supplied to the object. |
US08807082B1 |
Food bowl for pets
A pet food dish assembly, having a food container with a first container section, and a first bottom edge; and a water container having at least second and third container sections, a first exterior sidewall, a top wall, and a second bottom edge. The top wall has a channel extending between the second and third container sections. The food container mounts onto the water container over the second container section. The first bottom edge is elevated above the top wall when the food container is mounted onto the water container. The food container further has a second exterior sidewall with at least one cutout. The at least one cutout aligns with the channel when the food container is mounted onto the water container. The second container section stores liquid matter to create a barrier to prevent access to and/or contamination of the food container by crawling insects. |
US08807081B1 |
Birdfeeder having magnetic weighted perch bar
A birdfeeder which operates with a perch that is controlled by the use of magnetic force that allows certain smaller birds to freely feed while inhibiting larger birds and small animals, such as squirrels, from feeding is provided. The birdfeeder has a plurality of movable pivoted perches which move from a first position to a second position. In the first (horizontal) position, a small bird may sit on the movable perch and reach an opening in a food hopper while the weight of a larger bird or animal will force the movable perch downward into the second (non-horizontal) position wherein the perch is moved away from the opening in the food hopper. A magnet located on an end of the movable perch secures the perch in the first position until the weight of a larger bird or animal causes the movable perch to pivot to the non-horizontal position. |
US08807076B2 |
Apparatus for vapor phase processing ophthalmic devices
This invention discloses apparatus for processing one or more of a Lens Precursor, a Lens Precursor Form and an ophthalmic Lens. The apparatus provides for vapor phase processing of the subject Lens Precursor, a Lens Precursor Form and an ophthalmic Lens. |
US08807071B2 |
Method and apparatus for load-locked printing
The disclosure relates to a method and apparatus for preventing oxidation or contamination during a circuit printing operation. The circuit printing operation can be directed to OLED-type printing. In an exemplary embodiment, the printing process is conducted at a load-locked printer housing having one or more of chambers. Each chamber is partitioned from the other chambers by physical gates or fluidic curtains. A controller coordinates transportation of a substrate through the system and purges the system by timely opening appropriate gates. The controller may also control the printing operation by energizing the print-head at a time when the substrate is positioned substantially thereunder. |
US08807070B2 |
Rotor processor for dry powders
The improved rotor processor of the present invention includes a stator with a rotatable rotor defining a rotor chamber in which particles are circulated for coating or layering. A spray gun mounted to the stator adjacent the rotor directs liquid into the rotor chamber, while a powder feed system mounted in the stator adjacent the rotor directs dry powder into the rotor chamber. The spray gun and powder feed system are spaced apart circumferentially so as to define a spray zone and a separate powder zone through which the circulating particles repeatedly and sequentially pass. The powder feed system includes a feed screw conveyor, an eductor, and a flexible conduit for delivering micronized powders, such as polymers or glidants, to the rotor chamber. |
US08807067B2 |
Tool for the application of a repair coating to a metallic surface
A tool and a process for producing a repair coating on at least one metallic surface that is coated with at least one corrosion protecting coating A applied with at least one composition selected from the group of pretreatment compositions, of organic compositions and of silicon compound(s) containing compositions. Corrosion protecting coating A has been at least partially removed in area Z. Corrosion protecting coating B contains a silicon compound and is applied as a solution or dispersion containing a silane, a silanol, a siloxane, a polysiloxane or mixture thereof on at least a part of the area Z. A further corrosion protecting coating C may be applied. The tool is provided for use in the process. |
US08807066B2 |
Device for applying adhesive in a slitter-winder of fiber web machine
A device (30) for applying adhesive is used in fiber web machine slitter-winder. The slitter-winder has an unwinder for a machine roll, slitter blades for slitting the unwound web into partial webs, and a winder forming them into rolls. The device (30) applies adhesive on ends of partial webs attaching the ends of the partial webs onto the web rolls. The device (30) has a support structure (31), a moving element (32) on the support structure and two adhesive nozzles (33, 34) on the moving element. The adhesive nozzles (33, 34) are attached to the moving element (32) such that the nozzles (33, 34) are spaced apart in the direction of travel of the moving element (32) so that a trailing nozzle can be accelerated to operating speed before traversing the partial webs, and a leading nozzle can extend further in the direction of travel than the moving element. |
US08807065B2 |
Pan coating apparatus
In a pan coating apparatus including a rotary drum which rotates about a horizontal rotation axis, an air supply chamber having a larger sectional area than that of an opening portion is arranged on a front stage with respect to the front-surface opening portion of the rotary drum. The air supply chamber is formed in a chamber door attached to a front of a casing, and has one end side communicating to the opening portion and another end side connected to an air supply duct via an air supply hole. The air flowing into the air supply chamber from the air supply duct is reduced in flow rate in the air supply chamber and supplied from the opening portion into the rotary drum with the air flow thereof in a stable state. |
US08807064B2 |
Detachable stand and scoreboard assembly having the same
A scoreboard assembly has a scoreboard, a storage box and a detachable stand. The scoreboard includes a folding board. The storage box is detachably connected to the scoreboard. The stand is detachably connected to the scoreboard and is detachable into a top board, a telescopic column, a joint and at least three legs. The telescopic column is detachably connected to the top board. The joint is detachably connected to the telescopic column. The legs are detachably connected to the joint. When the scoreboard assembly is in use, the stand is assembled and the scoreboard is elevated by the stand, which allows players and spectators to watch the score displayed on the scoreboard easily. When the scoreboard assembly is not in use, the stand is disassembled for storage in the storage box and the folding board of the scoreboard is folded to cover the storage box for portability. |
US08807062B2 |
Unconditionally stable floating offshore platform
A platform for offshore drilling and/or production operations comprises an equipment deck. In addition, the platform comprises a buoyant hull coupled to the equipment deck and configured to extend below the surface of the water. The hull comprises a first column having a central axis, an upper end coupled to the deck, a lower end distal the deck, and a plurality of axially stacked cells between the upper end and the lower end. Each cell defining an inner chamber within the cell and an exterior region outside the cell. The plurality of cells includes a first cell extending from the upper end of the first sub-column and a second cell axially positioned below the first cell. The first cell is water-tight. Further, the second cell includes a gas port configured to supply a buoyancy control gas to the inner chamber of the second cell. |
US08807058B1 |
Jet powered multihull networked vessel for providing diving services with an onboard water jetting system and real time diver tracking
A diving services multihull vessel with a starboard pontoon and a port pontoon, with dive support stations built into the bow and stern, a port independently operable water jet drive operated by a port diesel engine; a starboard independently operable water jet drive operated by a starboard diesel engine; a dive compressor, a water jetting unit, a hydraulic power unit, a decompression chamber, a generator; a fuel tank, an onboard dive server for tracking divers and monitoring dive operations and presenting the information on the display as well as for tracking sensor signals including diver depth, elapsed time of dive, ambient water temperature around a diver, video and/or audio feed from a diver and presenting on a display, as well as transmitting via a network to a location remote to the vessel, wherein the vessel further includes a helm control connected to a navigation control and the jet drives. |
US08807052B2 |
Keyboard and trackpad support apparatus
An apparatus for securely and ergonomically supporting a wireless keyboard and wireless trackpad. The apparatus can include a platform and chassis. The trapezoidal shaped chassis provides an ergonomic height and angle for keyboard and trackpad use on a flat surface and the trapezoidal shaped chassis sits securely in one's lap. |
US08807051B2 |
Portable cushion tray
A portable cushion tray includes a cushion coupled to a tray. The tray has a first maximum perimeter. The cushion has a second maximum perimeter. The first maximum perimeter is one of the same as the second maximum perimeter and disposed inside of the second maximum perimeter. The portable cushion tray is used as a furniture accessory and selectively provides each of a pillow and a working surface for use with furniture. |
US08807050B2 |
Railcar constant contact side bearing assembly
A constant contact side bearing assembly for a railcar including a housing with wall structure defining a central axis for the side bearing assembly and a multipiece cap. The cap is arranged in operable combination with the housing and includes a movable first member or spring seat and a movable second member or top cap carried by the first member. A spring resiliently urges the cap members toward railcar body structure. The cap members define cooperating angled surfaces therebetween for urging wall structure on the first member and wall structure on the second member into frictional engagement with the wall structure on the housing in response to a vertical load acting on the friction contacting surface on the cap. At least the top cap is structured to establish a coefficient of friction ranging between about 0.4 and about 0.9 with the railcar during operation of the side bearing assembly. |
US08807049B2 |
Vibration suppression device for railway vehicle
A vibration suppression device for a railway vehicle includes an actuator (5) disposed between a bogie truck (2) and a vehicle body (1), the actuator adjusting a vibration of the railway vehicle by extension/retraction motion thereof, and a controller (4) for controlling the extension/retraction motion of the actuator (5), and the controller (4) derives the total amount of extension/retraction displacements of the actuator (5) within a predetermined period of time during the running of the railway vehicle, and compares the derived total amount of extension/retraction displacements with a preliminarily registered threshold value to determine that the actuator (5) is seized in the case where the total amount of extension/retraction displacements is smaller than the threshold value. Thereby, seizing of the actuator can be self-diagnosed and found at an early stage. |
US08807045B2 |
Transportation apparatus having induced freezing rail system
A transportation apparatus configured to travel on rails and having an induced freezing rail system includes: a transportation vehicle having a support unit configured to support a frame from the rails; and a freezing rail system comprising freezing rails positioned on a ground surface corresponding to the support unit of the transportation vehicle, the freezing rails having a refrigerant and cooling devices. |
US08807044B2 |
Puck key transition system
An apparatus and system whereby a first member can move along a cable track and then on a glide track to then move in another direction and back on a glide track. The first member has a secondary retention system disposed therein. |
US08807043B2 |
Track and bogie for suspended vehicles
The present invention includes a track (1, 101) of a track system with straight, transition, curved, and switch track sections. The invention further comprises bogies (40) for vehicle cabins suspended under the track. Track sections of the track have an upper rail (1) and one or two lower rails (101, 201). Further, a bogie (40) has fore and aft sets of upper guide and switch wheels (151, 251, 154, 254), and one set of lower guide and switch wheels (152, 153, 252, 253, 156, 157, 256, 257). The bogies (40) also have one left and/or one right load bearing wheel (150, 250) and one drive wheel facing upwards and engaging a downwards directed drive wheel running surface (15) of the upper rail. Each set of lower guide wheels consist of left and right wheel pairs (152, 153, 252, 253) so that transition sections can be passed without moving any parts of the bogie (40). Switch wheels (154, 254, 156, 157, 256, 257) are separated from guide wheels so that they can be positioned according to the preferred direction of travel well before reaching a switch. |
US08807041B2 |
Method and system for extending a railway track
A method for extending a railway track downstream from an existing track end includes transporting a common track panel; positioning the common track panel downstream from the existing track, deploying an off-track moving mechanism and positioning an upstream end of the common panel vertically, in line with the existing track end; releasing the common track panel, removing the off-track moving mechanism; and installing the common track panel, by lowering the common track panel until the upstream end of the common track panel is aligned with the existing track end. |
US08807037B2 |
Reusable fireworks launcher with reinforcing sleeve
An improved, multiple-use fireworks launcher (10) is provided for the launching of fireworks such as an artillery shell (40) having a lower lift charge (42) and an upper effect charge (44). The launcher (10) includes a base (12), with an upstanding, open-top launch tube (14) operably coupled with the base (12). A reinforcing section (16) is positioned about the lower end of launch tube (14), and preferably comprises a tubular sleeve (36) tightly secured to the outer surface (32) of launch tube (14). The combined thickness of the tube (14) and section (16) are sufficient to prevent catastrophic failure of the launcher (10) in the event a shell (40) is improperly placed within the tube (14) in an inverted condition with the lift charge (42) thereof positioned over the effect charge (44). |
US08807036B2 |
Vanadium-drier intaglio ink
An oxidatively curing intaglio printing ink is disclosed, comprising an oxidatively curable polymer, an anionic macromolecular surfactant, a wax component, and a salt of vanadium, preferably of the vanadyl (VO2+) ion, as the oxypolymerization inducing siccativating agent. |
US08807025B2 |
Mesh for screen printing and method of forming patterns using the mesh for screen printing
A screen printing mesh including a plurality of octagonal first openings and a plurality of polygonal second openings, each of the second openings being disposed between the first openings, wherein an inner angle between a first line segment of each of the second openings and an adjacent second line segment is 90 degrees or greater. |
US08807022B2 |
Devices and methods to disintegrate foods
The subject application is directed to a food processing device to extract juice. The device includes an inlet coupled to a disintegrator. The inlet is configured to accept food items and the disintegrator configured to disintegrate food items passed through the inlet. The device further includes a separator that accepts the disintegrated food items and separates out the liquid components from the food item. The device further includes a reservoir that is coupled to the separator for accepting and holding the liquid components. The reservoir includes a translucent member for viewing of liquid levels within the reservoir, and a valved outlet. The valved outlet is configured to allow or prevent the flow of liquid from the reservoir through the valved outlet. |
US08807021B2 |
Methods of cooking in continuous cooking oven systems
A method of cooking in a continuous cooking oven system generally includes transporting food products on a continuous, pervious conveyor through a helical path within a cooking chamber, directing a substantially vertical flow of a heated gaseous cooking medium into either a top end or a bottom end of the helical stack and through the plurality of superimposed tiers, and selectively reversing the substantially vertical flow of heated gaseous cooking medium on a user defined interval. |
US08807020B2 |
Toasting apparatus with a handle having predetermined locking positions
The present invention proposes a toaster appliance in which an upper grilling plate is typically hinged to the lower grilling plate in a manner to be rotatable relative to said lower plate. The position of said upper plate relative to said lower plate is conventionally adjusted by means of a handle having predetermined locking positions according to the present invention. Said handle is provided with a connection device having a predetermined locking position, which is set to a perpendicular position of said upper plate relative to said lower plate. Said locking position is determined by a plurality of slots into which a set of spring loaded balls engages within said connection device. |
US08807015B2 |
Piston pump
According to one embodiment, there is provide a piston pump, including: a cylinder having a bottomed cylindrical shape; a piston slidable within the cylinder, the cylinder and the piston defining a pressure chamber therebetween; a suction valve unit disposed in a suction passage of the pressure chamber; and a discharge valve unit disposed in a discharge passage of the pressure chamber, wherein the piston includes a cylindrical piston portion and a large diameter piston portion provided to cover one end of the cylindrical piston portion, and wherein the large diameter piston portion includes a working fluid guide groove extending thereinside along the axial direction of the piston. |
US08807011B2 |
Firearm having a direct gas impingement operating system
A method of removably securing a gas regulating sleeve and a gas line to a rifle by: fluidly coupling a gas block to a bore of a barrel of the rifle; removably locating and securing the gas regulating sleeve in the gas block, the gas line being in fluid communication with the bore via the gas regulating sleeve, and wherein a portion of the gas line is received within an impingement cylinder of a bolt assembly of the rifle when it is in a first position, and wherein the impingement cylinder moves away from the gas line as it moves from the first position to a second position due to gases from the gas block; and wherein the gas regulating sleeve and the gas line are removable from the gas block without disconnecting the barrel from the receiver and without removal of the gas block from the barrel. |
US08807008B2 |
Polymer-based machine gun belt links and cartridge casings and manufacturing method
An example of a polymer-based machine gun link can include a first side having a finger to hold a cartridge and a second side, opposite the first side, having at least two fingers to hold a second cartridge. A stem can join the first side and the second side the two fingers are smaller than the finger and spaced along the stem so that the finger fits between the two fingers. All of the finger, the two fingers, and the stem are made from polymer. |
US08807006B2 |
Accessory for weapon muzzle
A weapon accessory in the likeness of a human, animal, mythical, or other creature, or a part of the creature, has a longitudinal passageway adapted to allow a projectile to exit the muzzle through the accessory. The projectile passageway opens through a mouth, eye, nose/nostril, or ear structure. Additional apertures selected from these structures, other than the one selected for the projectile exit, may be in fluid communication with the projectile passageway for directing exiting gasses in desired directions, for example, for a muzzle brake. The additional apertures preferably extend generally upward at an angle to said projectile passageway, including straight upward, upward and forward, or upward and rearward, and may also extend to a left or right side. Upper and lower jaws of the creature may be shaped or sized to direct gasses and hence light/flash in desired directions, for example, for flash suppression. |
US08807005B2 |
Firearm suppressor having enhanced thermal management for rapid heat dissipation
A suppressor is disclosed for use with a weapon having a barrel through which a bullet is fired. The suppressor has an inner portion having a bore extending coaxially therethrough. The inner portion is adapted to be secured to a distal end of the barrel. A plurality of axial flow segments project radially from the inner portion and form axial flow paths through which expanding propellant gasses discharged from the barrel flow through. The axial flow segments have radially extending wall portions that define sections which may be filled with thermally conductive material, which in one example is a thermally conductive foam. The conductive foam helps to dissipate heat deposited within the suppressor during firing of the weapon. |
US08807000B2 |
Cutting unit in an arrangement for cutting and removal of wires from bales and a device comprising said cutting unit
The device is for cutting and removing wires from bales, such as pulp bales, paper bales and the like. The device has at least one cutting unit that has a cutting tool for cutting off a wire that is arranged around a bale, and at least one winding unit that has a winding tool for unwinding the cut wire from the bale. The cutting tool has an outer cutter and an inner cutter which are coaxially arranged and rotatable with respect to each other. Each cutter has a cutting edge which are arranged to be moved towards each other when the cutters are rotated towards each other in a certain direction, in order to cut off objects, preferably bale wires, between them. |
US08806996B2 |
System and method of an automated roll sizing machine
In embodiments of the present invention improved capabilities are described for a paper roll resizing system. The paper roll resizing system may include a shafted roll stand that suspends a roll of paper mounted horizontally, wherein the shafted roll stand is fixed to a machine housing and is adapted to spin the roll of paper. Alternatively, the roll stand suspends the roll of paper mounted horizontally from two chucks on opposite ends of the roll. The system further includes a cutting tool movably mounted to the roll stand, wherein the cutting tool comprises at least one of a milling head, a planing head, a circular saw, and a laser cutting tool. A controller (PLC) may adjust the position of the cutting tool with respect to the roll of paper held by the roll stand. |
US08806993B2 |
Torque wrench
A wrench for applying torque to a fastener that may eliminate or reduce variations associated with off-axis torque application and/or application of force on the handle at a location other than the load position. |
US08806986B2 |
Ratchet wrench with a bushing
A ratchet wrench includes a wrench head, a ratchet assembly and a bushing. The wrench head is made of metal and defines a cavity therein. The ratchet assembly is disposed in the cavity of the wrench head and has an outer configuration corresponding in shape to a periphery of the cavity of wrench head and being slightly smaller than the cavity of the wrench head. The bushing is made of a metal with a hardness greater than that of the wrench head and is fitted in a clearance defined between the ratchet assembly and an inner wall of the cavity of the wrench head. Moreover, the bushing has a substantially consistent thickness so that the bushing has an outer periphery and an inner periphery both corresponding in shape to the periphery of the cavity. |
US08806979B2 |
Operating mechanism for a parking brake
An operating mechanism for a parking brake includes a manual brake lever pivotably coupled to a bearing block, a locking device adapted to secure the manual brake lever in a predetermined pivoting position, an actuating rod guided inside the manual brake lever and operatively connected to the locking device, and a guiding device for the actuating rod located on the manual brake lever. The guiding device comprises a U-shaped profile having an opening oriented toward a side of the manual brake lever. The opening is adapted to receive the actuating rod. |
US08806977B2 |
Vehicle pedal assembly with hysteresis assembly
A vehicle pedal assembly with a rotatable pedal. A hysteresis assembly includes a friction device and plunger, and first and second springs that are all separate and decoupled from each other and the pedal. The first spring exerts a force against the friction plunger that forces the friction device into frictional contact with the housing to generate and transfer a resistance force to the pedal. The first spring also exerts a force against the pedal when a foot force is removed from the pedal to return the pedal to idle with and without the movement of the friction device and without the force of the second spring. The second spring exerts a force against the friction device when the foot force is removed to return the pedal to idle without the force of the first spring. Barriers block the entry of debris into the housing. |
US08806976B2 |
Brake pedal assembly having non-contacting sensor
A pedal assembly using a non-contacting position sensor utilizing a spring-biased roller on a cam surface to simulate the feel of a conventional brake pedal is provided. The pedal assembly includes an elongated brake support bracket having a cam surface and a pedal arm having a spring-biased roller. A spring-biased roller assembly is mounted to an inward side or beside the pedal arm or on both sides of the pedal arm. The roller assembly includes a fixed leg extending on from an inner side of the pedal arm and a movable leg which is pivotally mounted to the pedal arm. A biasing member extends over the support between the fixed leg and movable leg to generate a biasing force against the roller. When the pedal is depressed, the roller is moved along the cam surface of the support bracket thereby creating the ‘feel’ of a traditional pedal assembly. |
US08806968B2 |
Sampling container and use thereof as well as a method for taking samples
A sampling container for receiving media from a container filling system includes a closed base region, a peripheral wall adjoining the base region and extending substantially orthogonal to the base region, and a filling region opposite the base region and adjoining the peripheral wall. The filling region has a container neck extending substantially orthogonal to the base region and includes a filling opening. An outer thread is arranged over an outer periphery of the container neck. The thread has an outer diameter between 44 and 46 mm and a core diameter between 41 and 43 mm, and rounded edges, at least over portions, with a radius between 0.95 and 1.05 mm. The container neck can be arranged in a receiver of a sampling head, during the sampling process so that the container is sealed in a media-tight manner in relation to an ambient environment. |
US08806964B2 |
Force sensor
A force sensor may include a sense die mounted to a substrate and an actuating assembly for transmitting an external force to the sense die. The sense die may include a diaphragm, a boss extending from the diaphragm, and one or more sensing elements (e.g., piezoresistive elements positioned on the diaphragm). The actuation assembly may include a force receiving feature configured to receive an external force at a first end and transfer at least a portion of the received external force through a second end to the diaphragm via intimate contact with a bottom side of the boss. In some cases, the force sensor may also include signal conditioning circuitry. |
US08806963B2 |
Measuring device and robot
The invention relates to a measuring device (20) for ascertaining a torque acting on an axis (A2,) and to a robot (1) with a robot arm (2) having a plurality of members which are rotatably mounted in reference to axes (A1-A6). The robot (1) also has the measuring device (20), in order to determine for at least one of the axes (A2) the torque exerted on that axis (A2). |
US08806962B2 |
Torque detection device and electric power steering system including the same
A torque detection device includes: a magnetic flux collecting unit, and a sensor housing. The magnetic flux collecting unit includes a holder, first and second magnetic flux collecting rings, and a magnetic shield. The holder has upper and lower through-holes. The first and second magnetic flux collecting rings are fitted to an inner periphery of the holder. The magnetic shield is fitted to an outer periphery of the holder so as to cover the through-holes. The sensor housing is formed integrally with the magnetic flux collecting unit by supplying resin onto an outer periphery of the magnetic flux collecting unit. The holder has a resin flow passage in its outer periphery. Resin that is supplied at the time of forming the sensor housing flows into the through-holes through the resin flow passage. |
US08806960B2 |
Flow measuring device including segmented pipe section with a liner provided in the inner surface
The present invention involves an improvement in the measurement of sewage discharge through the measurement of mass flow rate and conversion to volumetric flow rate using a flow measuring device connected to a segment of pipe through which the sewage flows. |
US08806958B2 |
Ultrasonic air flow sensor
A flow sensor includes a plurality of ultrasonic transceivers and signal processing circuitry. The transceivers are coupled to a portion of the outer surface of a duct, and each is configured to transmit ultrasonic waves into a fluid, receive ultrasonic waves, and supply sensor signals representative of the received ultrasonic waves. The signal processing circuitry is configured to supply separate excitation signals to each of the ultrasonic transceivers, receive the sensor signals supplied by each of the ultrasonic transceivers, and generate, in response to the sensor signals, a flow signal representative of fluid flow in the flow passage. Each of the excitation signals has a different phase, such that the ultrasonic waves transmitted by each of the ultrasonic transceivers at least selectively combine to propagate in an adjustable direction relative to the flow direction. |
US08806957B2 |
Ultrasonic flow meter housing formed by a monolithic polymer structure
The invention relates to an ultrasonic flow meter housing and to an ultrasonic flow meter comprising a housing. The housing is a monolithic polymer structure being cast in one piece. The monolithic structure includes a straight flow tube and a cavity separated from the flow tube, where a shared wall part forms part of the wall of the flow tube and of an inside surface of the cavity. The cavity is arranged for housing at least one ultrasonic transducer at the shared wall part, and a measurement circuit operationally connected to the at least one ultrasonic transducer. In an embodiment, the cavity only has a single opening which can be sealed off by a cover. |
US08806951B2 |
Instrument for determining a quantity associated with a force exerted on a rotor
Rheometer, also usable for stress-strain-investigations, with at least one bearing (28; 35) having an adjustable stiffness in a direction normal to the bearing surfaces (19, 20, 21, 22, 23, 24, 26, 27). The instrument further includes a system (31, 32, 33, 34; 36, 37) for controlling a parameter for adjusting the stiffness of the at least one bearing (28; 35); a system (10) for determining a value of a quantity associated with a second force exerted between the rotor (8, 5, 6,7) and the stator (2) and opposing the force associated with the quantity to be determined; and a data processing system for correcting the determined value of the quantity associated with the second force by a bias value, obtained using a mapping having as a parameter a variable representative of the parameter for adjusting the stiffness. |
US08806946B2 |
System and method for detecting deposits in a fluid line
A system is provided for the detection of deposits in a fluid line that includes, but is not limited to a measuring body, and ultrasonic transducer and an ultrasonic receiver and at least one evaluation unit connected to the ultrasonic transducer and the ultrasonic receiver. The ultrasonic transducer transmits an ultrasonic signal and the ultrasonic receiver receives response signals generated by reflections in the fluid line. From known geometric changes in shape of the fluid line, resulting response signals are finally filtered out of the response signal sequence and from the remaining response signals relating to the deposits, the distances can be calculated between the ultrasonic transducer and the deposits. |
US08806945B2 |
Method and apparatus for shockwave attenuation
A method and apparatus for attenuating a shockwave propagating through a first medium. The method may include the steps of detecting a shockwave-producing event, determining a direction and distance of the shockwave relative to a defended target, and interposing a second medium between the shockwave and a defended object. The second medium is different from the first medium and the shockwave is attenuated in energy as it passes through the second medium prior to reaching the defended object. |
US08806939B2 |
Distributed mass hemispherical resonator gyroscope
A micro-scale hemispherical resonator gyroscope includes a hemispherical resonator with a plurality of masses positioned around the periphery of the hemispherical resonator. At least some of the masses may be made of a heavy metal, such as tungsten, gold, platinum, or lead, and may be positioned at points of maximum deflection or velocity of the resonator. The hemispherical resonator may have a 2 mm diameter and a ring down time of at least 500 seconds. |
US08806935B2 |
Snap-fit measuring container
One or more measuring cups or spoons include a handle and a measuring container. The measuring container is formed with a volumetric capacity such as a fraction of a cup, a teaspoon, or a tablespoon. The handle of a first measuring container includes a feature that interacts with a complementary feature on the handle of a second measuring cup to secure the first and second cups together. In one version, a downwardly extending rib on the handle of a first measuring container is received within a channel formed on the handle of a second measuring container. A set of containers is formed in which each of the containers has an attachment feature allowing the set to be attached together. |
US08806934B2 |
Method and assembly for high angle of attack process parameter sensors
A method and an assembly for sensing a process parameter are provided. The sensing assembly includes a base and a sensor assembly. The sensor assembly includes a sensing element, a first flow channel, and a second flow channel. The first flow channel includes a converging segment, a straightening segment, and a turning segment wherein the turning segment includes a turn radius configured to separate particles from a flow entering the turning segment and the second flow channel is configured to generate a low pressure area downstream of the sensing element. The sensing assembly also includes an extension member extending between the base and the sensor assembly. |
US08806933B2 |
Thermal type air flow meter
A thermal type air flow meter, which detects a flow rate of air flowing in an air passage, includes a sensor portion having a heating element in an air passage, a temperature control unit. The temperature control unit includes a first arm serially connecting a first resistive element and a heater temperature detection resistor which detects a temperature of the heating element, a second arm serially connecting a second resistive element and an air temperature detection resistor which detects a temperature of air flowing in the air passage, and a voltage supply unit which supplies first and second voltages respectively to the first and second arms. The voltage supply unit includes a voltage adjusting portion which can adjust at least one of the first and second voltages such that the detection temperature difference between the heater temperature detection resistor and the air temperature detection resistor becomes constant. |
US08806927B2 |
Method for testing a pressure sensor of a fuel accumulator device
In a method for testing a pressure sensor of a fuel accumulator device in an internal combustion engine, the pressure in the fuel accumulator device is altered using a first actuating variable. The influence of that alteration on the torque generated by the internal combustion engine is determined by a closed loop control system adjusting a second actuating variable to counteract the effect of the first on the torque output by the internal combustion engine. A deviation of the measured alteration from the expected alteration is then calculated. |
US08806922B2 |
Sample injector for liquid chromatography, particularly for high performance liquid chromatography
A sample injector for liquid chromatography includes an injection valve having a waste port, two sample loop ports, and two high-pressure ports. One high-pressure port can be connected to a pump and the other high-pressure port can be connected to a chromatography column. A sample loop is connected to one of the sample loop ports on one end and to a pump volume of a sample conveying device on the other end. A section of the sample loop can be separated to facilitate receiving a sample fluid in the sample loop. A control unit controls the injection valve and the sample conveying device. The sample injector allows a sample to be loaded into the sample loop and then pressurized to an operating pressure prior to injecting the sample into the chromatography column. The sample loop may also be isolated from the operating pressure for facilitating depressurization of the loop. |
US08806920B2 |
Co-molded pierceable stopper and method for making the same
A closure and method of making a closure are disclosed. The closure includes a cap body having a top portion and an opening extending therethrough defining a cavity in communication with said opening. A flow channel is defined within a portion of the cap body having an inlet and an outlet. A stopper is disposed within the cavity adjacent the outlet of the flow channel. The stopper is formed from a material adapted for flowing through the flow channel to form a pierceable portion, with at least one of the cap body and the stopper configured for closing a container. |
US08806910B2 |
Method and apparatus for removing scale from hot-rolled steel strip
A method for continuously removing scale from a hot-rolled carbon steel strip includes: cracking the scale on the hot-rolled steel strip; shot-blasting the cracked scale to remove the scale; deforming the hot-rolled steel strip so as to weaken the bond between scale remaining after the shot-blasting and the hot-rolled steel strip and so as to impart surface roughness to the hot-rolled steel sheet; and polishing the deformed hot-rolled steel strip to remove the remaining scale. |
US08806909B2 |
Control method for a rolling stand for rolling a strip
A strip has a left and a right side. The strip is rolled in a rolling stand. Stresses occurring in the strip at the feed and exit sides are detected by corresponding measuring sensors positioned on the left and right sides of the strip. The detected stresses are fed to a control unit for the rolling stand. The control unit determines a measurement for the transversal positioning of the strip in relation to the rolling stand using the relationship Z=ZLE*ZLA−ZRE−ZRA, where Z is the measurement. ZLE, ZLA, ZRE and ZRA are the individually detected stresses. The control unit determines a correcting variable for correcting the transversal positioning of the strip using the measurement for the transversal positioning and controls the rolling stand according to the correcting variable. |
US08806906B1 |
Actuator lock-out bracket
A lock-out bracket secures the position of a shaft extending through an actuator, the shaft having a first end and a second end, the first end being operative for controlling a valve, the second end being coupled to a limit switch mounted on a limit switch bracket mounted to the actuator. The lock-out bracket includes a substantially flat base plate and a substantially flat lock-out tab substantially perpendicular to the base plate, the base plate defining an opening configured for matingly fitting over, receiving, and engaging the second end of the shaft. The lock-out tab defines a first hole adapted for alignment with a corresponding second hole defined on the limit switch bracket for facilitating the insertion of a lock shackle through the first hole and the second hole to secure the lock-out bracket relative to the actuator and prevent movement of the shaft and valve coupled to the shaft. |
US08806905B2 |
Padlock assembly
A padlock includes a lock body, a shackle assembled with the lock body, a lock subassembly disposed in a cavity in the lock body, and a shackle retainer assembled with the lock body. The lock subassembly is operable between a locked position securing the shackle in a closed position and an unlocked position permitting movement of the shackle to an open position. The shackle retainer extends into a first shackle bore and is received in a recess in a first leg of the shackle. When the shackle is in the open position, the lock subassembly is manipulable to be moved from a first position to a second position to generate a space in the cavity aligned with the shackle retainer, such that the shackle retainer is extendable into the space for disengagement of the shackle retainer from the first shackle leg recess. |
US08806904B2 |
Washing machine laundry drum
The laundry drum is configured for removing water from wet laundry at a high rotational speed and has a circulating drum cover which is bent from a thin-walled material strip to form a cylinder or flat truncated cone wherein the parallel end edges of the material strip make contact in a connecting seam, with an assembly for connecting the end sections including a first tab formed at a first end section and continuing over the general curvature of the drum cover, a second tab formed at a second end section wherein the second tab is at least one of outwardly creased about the wall thickness of the material strip and inwardly creased about the wall thickness of the material strip wherein the tabs of the end sections are fixedly connected to one another and the overlapping tabs on the inside of the drum cover are covered. |
US08806903B2 |
Garment tunnel finisher with atomized spray and hot air mix
A laundry tunnel finisher including a tunnel providing a moisturizing zone therein having a non-linear conveyor pathway therethrough with curved portions adjacent the entrance and exit of the tunnel, at least one nozzle directed at the curved portions of the pathway, a hot water source supplying hot water to the at least one nozzle, a compressed air source supplying compressed air to the at least one nozzle, and a hot air source directing hot air into the tunnel, wherein hot water is atomized using compressed air and is sprayed through the at least one nozzle and mixed with hot air in the tunnel to raise the temperature in the moisturizing zone. |
US08806902B2 |
Cut resistant composite yarn
The invention relates to a cut resistant composite yarn comprising: a) at least one yarn containing filaments and/or staple fibers, said filaments and/or staple fibers containing a hard component, said hard component being a plurality of hard fibers, said hard fibers having an average diameter of at most (25) microns; and b) at least one continuous elastic filament. The invention further relates to a fabric and articles comprising the yarn, in particular a glove. |
US08806901B2 |
Rotary sinker, knitting machine, and stitch forming method
A rotary sinker enabling stitch formation by a knitting machine using a rotor for forming a stitch, a knitting machine including the rotary sinker, and a stitch forming method are provided. The ring sinkers as rotating bodies are capable of rotating about a rotation axis independently of each other. The rotation times of the ring sinkers are set to be different from each other. Thus, the rotation times are adjusted to be different between the ring sinker that holds an old loop and the ring sinker that holds a new loop. Adjustment of the rotation times prevents application of a large tension to the knitting yarn made of low stretch fiber, and a stitch can be formed even with a knitting yarn made of non-stretch or low-stretch fiber. |
US08806899B2 |
Melting device for producing a glass melt
A glass melting oven for producing a glass melt in a row arrangement, having a loading opening for raw glass materials, a melting region, a refining region, a constriction, a conditioning region and an overflow into a processing unit. To remove flaws from the melt that remain visible in the end product, a method includes the steps of a) arranging a refining bench between the melting region and the beginning of the refining region; b) arranging side burners and extraction openings for flue gases between the loading opening and the refining bench; c) delimiting the constriction at both ends by end walls that leave narrow flow cross-sections above the glass melt for flue gases; and d) cooling the glass melt inside the constriction. The glass melting oven is particularly suited for producing flat glass and panels for solar elements. The oxidants for the fuels may also be preheated. |
US08806889B2 |
Ejector type refrigerating cycle unit
A refrigerating cycle unit includes an ejector and a heat exchanger defined by layering a plurality of plates. Each of the plates has a refrigerant passage, and the refrigerant passages are connected by a header tank in a layering direction of the plates. At least two of the plates are fix plates having a fix portion to fix the ejector, and a communication portion through which the ejector and the header tank communicate with each other. The ejector is arranged between the fix portions of the fix plates in the layering direction, so as to be integrated with the heat exchanger. |
US08806885B2 |
Apparatus for storing food
An apparatus for storing food is provided that includes a food storage chamber, a cooling device, a scroll-type fan housing with a fan, and a duct that guides cool air from the scroll-type fan housing to the food storage chamber. The scroll-type fan housing may be located to the left or right of the cooling device, and the duct may be located above or below the cooling device and the scroll-type fan housing. Alternatively, the scroll-type fan housing may be located above or below the cooling device, and the duct located on a left or right side of the cooling device and the scroll-type fan housing. These arrangements result in more usable space within the food storage chamber than other conventional arrangements. |
US08806880B2 |
Expansion valve
An expansion valve for reducing the quantity of material required for the valve body by contriving the arrangement of bolt fitting grooves. In the expansion valve (20), displacement of a valve member driver (36) provided in the valve body (21) is transmitted to a valve member by a valve member drive rod (36f) and the valve opening is altered to control the flow rate of the refrigerant. The valve body (21) consists of a body upper portion (40) and a body lower portion (41) narrower than the body upper portion (40), and bolt fitting grooves (43, 43) opening in the flank of the valve body (21), preferably opening obliquely downward, are formed at the boundary (42) of the body upper portion (40) and the body lower portion (41). With such a layout, the material required at the boundary (42) can be reduced furthermore and the quantity of material required for the valve body (21) can be reduced furthermore, as a result. Since the opening width (minimum spatial dimension) w is smaller than the diameter of bolt, a seating surface is assured sufficiently around the bolt fitting groove (43) and the bolt does not drop off from the bolt fitting groove (43). |
US08806875B2 |
Thermoacoustic device with suppressor
There is provided a thermoacoustic device 1 which has in a loop tube 2, a first stack 3a between a first high-temperature side heat exchanger 4 and a first low-temperature side heat exchanger 5, and a second stack 3b provided between a second high-temperature side heat exchanger 6 and a second low-temperature side heat exchanger 7, so that heat at the first stack side is prevented from being transported to the second stack side even when a large acoustic wave is generated in the tube. In the device, self-excited standing and traveling waves are generated by heating the first high-temperature side heat exchanger 4, and by the standing and traveling waves, the second low-temperature side heat exchanger 7 is cooled. a piezoelectric film 81 is provided to suppress an acoustic streaming and/or a direct-current type flow of a working fluid. |
US08806873B2 |
Method for operating a gas turbine plant
A gas turbine plant has a compressor (2), a first combustion chamber (6) followed by a high pressure turbine (4), a second combustion chamber (10) and a low pressure turbine (5). In the first combustion chamber (6) a first gaseous fuel (8) is injected and combusted, generating first hot gases (9) that are at least partly expanded in the high pressure turbine (4), and in the second combustion chamber (10) a second fuel (11) is injected in the at least partly expanded hot gases generated in the first combustion chamber (6) and combusted, generating second hot gases (12) that are expanded in the low pressure turbine (5). In the first combustion chamber (6) water is also injected to increase the gas turbine plant power output. In the first combustion chamber (6) a water flow rate is injected compatible with a predetermined flame stability limit. In the second combustion chamber (6) the flame temperature is regulated to burn the non-combusted products generated in the first combustion chamber (6) to bring their amount below a predetermined emission limit, without exceeding a predetermined NOx emission limit. |
US08806869B2 |
Method for controlling a turbocharger system of an internal combustion engine, and turbocharger system
The disclosure relates to a method for controlling a turbocharger system of an internal combustion engine. The method comprises controlling a first bypass valve of a high pressure exhaust gas turbine and a second bypass valve of a low pressure gas turbine on the basis of a turbine model, the first and second bypass valves continuously variable. In this way, turbocharger system efficiency may be maximized. |
US08806865B2 |
Ocean wave energy harnessing device
A system for extracting long wavelength ocean wave energy and for extracting rotational wave energy uses a plurality of boom elements connected to at least one hinge element for movement about the hinge element in a direction of the vertical force of a wave and for movement about the hinge element in a direction of the transverse force of a wave, and the hinge element includes a shaft transverse to the boom elements with a blade mounted to the shaft for rotational movement of the shaft in the direction of the rotational force of a wave. |
US08806863B2 |
Hydraulic transmission control
A hydraulic transmission unit comprises at least one pressure regulation valve (1) and a pilot control valve (2) which is connected to the pressure regulation valve (1) by a pilot control line (35). A pre-filling valve (3, 303) sets a pre-filling pressure (p—3) to avoid draining of a clutch (20) and the lines (231, 331) connected to the clutch (20) in an operating condition in which the clutch (20) is not actuated. To avoid draining when the clutch when in the operating condition, the pilot control line (35) is also connected to at least one line (236, 238, 336, 338) which is pressurized with a second pre-filling pressure (p—3). |
US08806861B2 |
Compressed air energy storage system utilizing two-phase flow to facilitate heat exchange
A compressed-air energy storage system according to embodiments of the present invention comprises a reversible mechanism to compress and expand air, one or more compressed air storage tanks, a control system, one or more heat exchangers, and, in certain embodiments of the invention, a motor-generator. The reversible air compressor-expander uses mechanical power to compress air (when it is acting as a compressor) and converts the energy stored in compressed air to mechanical power (when it is acting as an expander). In certain embodiments, the compressor-expander comprises one or more stages, each stage consisting of pressure vessel (the “pressure cell”) partially filled with water or other liquid. In some embodiments, the pressure vessel communicates with one or more cylinder devices to exchange air and liquid with the cylinder chamber(s) thereof. Suitable valving allows air to enter and leave the pressure cell and cylinder device, if present, under electronic control. |
US08806857B2 |
Device and method for removing carbon dioxide from motor vehicle exhaust
A method and device for removing a minor portion of carbon dioxide from the exhaust gases of a motor vehicle, wherein less than 20 percent of the carbon dioxide is removed, and further wherein exhaust flow is not impeded such that there is no significant reduction in efficiency of the motor itself. |
US08806855B2 |
Arrangement and method for operating an exhaust gas aftertreatment device
The invention relates to an arrangement (1) for operating an exhaust gas aftertreatment device, in particular of a motor vehicle, having a plurality of active sensors (3-8) and a control device (2) that comprises at least one voltage supply unit (9) to which the sensors (3-8) are operatively connected. According to the invention, the voltage supply unit (9) comprises at least two supply benches (13-15) that can be switched independently from each other. The sensors (3-8) are grouped according to the function thereof and are then associated with one of the supply benches (13-15). |
US08806853B2 |
System and method for SCR inducement
A system and method of inducing proper operation of a diesel engine exhaust after-treatment system employing SCR technology monitors components to detect a fault condition representing one of a DEF level fault, a DEF quality fault, and a tampering fault, activates a trigger event indicator in response to detecting the fault condition. The trigger event indicator provides an indicium to an operator of the presence of the fault condition. The system and method also activates an inducement event indicator in response to activating the trigger event indicator. The inducement event indicator provides an indicium to the operator that the engine will be shut down if the fault condition is not addressed within a predetermined time period. The system and method causes shutdown of the engine when the fault condition is not addressed within the predetermined time period. |
US08806849B2 |
System and method of operating a power generation system with an alternative working fluid
A method of operating a turbine engine system and a turbine engine system are provided. The method comprises supplying a flow of oxygen to a combustion chamber defined within a plurality of turbines coupled serially together within the turbine engine system, supplying a flow of hydrocarbonaccous fuel to the combustion chambers of each of the plurality of turbines in the turbine engine system, and supplying a working fluid to an inlet of a first turbine engine coupled within the turbine engine system, wherein the working fluid is substantially nitrogen-free and wherein each of the turbines coupled within the turbine engine system is operable with the resulting fuel-oxygen-working fluid mixture. |
US08806845B2 |
Mowing finger arrangement
A mowing finger arrangement and mowing bar for finger bar mowers of a harvester, as well as a method for manufacturing mowing fingers has an upper and lower element connected together to form at least one mowing finger. The mowing finger arrangement serves to guide a mowing sickle and forms counter cutting edges for the sickle blades arranged on the mowing sickle. An abutment on the upper element delimits upward movement of the mowing sickle when a downward force is exerted on the face end of the sickle blades. |
US08806844B2 |
Flail motor head attachment
A flail rotor head attachment for use with any type harvesting machine having crop residue processing elements and including an input opening for receiving crop residue. The attachment includes a frame structure for operatively coupling the attachment to the harvesting machine, a flail rotor and an auger each mounted on the frame structure and a drive mechanism for rotating the flail rotor and the auger in the same direction. The flail rotor includes a plurality of cutting elements for picking up and chopping crop residue from a field, each of the cutting elements being attached to a separate bracket member for allowing free movement of each relative to each other. The auger includes at least two flightings positioned in opposite directions for funneling crop residue towards the opening of the harvesting machine. A shield member is positioned under the auger and adjacent to the flail rotor to facilitate the funneling of the crop residue from the flail rotor to the auger. |
US08806839B2 |
Concrete material and method for preparing the same
A combined concrete material, including: a concrete; a reinforcing bar, the reinforcing bar disposed inside the concrete; and a decorative sheet, the decorative sheet including: a flat part, a first junction, and a second junction. The concrete, the reinforcing bar, and the decorative sheet are fixed together as one whole body. The decorative sheet is disposed outside the concrete, and the inner surface of the flat part is attached to the outer surface of the concrete. The first junction and the second junction are disposed on two ends of the flat part. The inner surface of the flat part is concave and forms a dovetail slot. Neighboring decorative sheets are connected together via the first junction and the second junction, which are embedded in the concrete. |
US08806825B2 |
Exterior finish system
Disclosed is an exterior finish system for building structures that includes a water pervious adhesive for securing an insulation layer to a water resistive barrier applied to a building wall substrate. Also disclosed is a building structure such as a building column or wall that includes the finish system and a method of using the finish system to assemble a building structure such as column or wall. |
US08806823B2 |
Closure strip
A sealing component is disclosed that is installed across an uneven surface without having dedicated segments for engaging raised and recessed portions of the uneven surface. The sealing component may include an elongated strip of compressible nonwoven material. The elongated strip may include an adhesive on one or two sides. In a pre-installation configuration, the strip may be wound into a coil. |
US08806820B2 |
Segments for building spliced prestressed concrete girder and method of manufacturing the segments
Provided are segments of a spliced prestressed concrete girder, which have improved structural integrity at joints, and a method of manufacturing the segments. The method of manufacturing the segments, which are combined to build the spliced prestressed concrete girder, includes: manufacturing one or more joint blocks, each having a first end that has a shear key and is to be spliced to an end of an adjacent segment and having a second end that is bonded to a segment body of the segment; and manufacturing the segment body by using the one or more joint blocks as one or more ends of a formwork in which the segment body is to be made and by casting and curing concrete in the formwork, wherein the one or more joint blocks are fixedly bonded to one or more ends of the segment body in the manufacturing of the segment body. |
US08806807B2 |
Sliding door structure having sliding doors and pivoting doors
A sliding panel structure. The sliding panel structure includes a frame having an upper support track and a lower guide rail. At least one sliding panel is connected between the upper support track and the lower guide rail. The sliding panel includes a sliding panel pivot axis and an extension for riding in the lower guide rail. The extension prevents undesired pivoting of the sliding panel about the sliding panel pivot axis. A mutual attraction device is connected between the sliding panel and the frame with a first mutual attraction part connected to the frame and the second mutual attraction part connected to the sliding panel. A fulcrum is utilized for tilting the sliding panel whenever the first mutual attraction part engages the second mutual attraction part. The tilting of the sliding panel causes the extension to disengage the lower guide rail which allows the sliding panel to pivot about the sliding panel pivot axis. In a preferred embodiment the sliding panel structure includes at least one stationary pivoting panel. In another preferred embodiment the sliding panel is a plurality of sliding panels. In another preferred embodiment the sliding panel is a sliding door. In another preferred embodiment the sliding panel is a sliding window. In another preferred embodiment the mutual attraction device is utilizes magnetic force so that a magnet connected to the sliding panel is attracted to a magnet connected to the frame. |
US08806806B2 |
Electronically powered door with a manual override mechanism
Embodiments of the resent invention provide an electric motor driven door or barrier opener with a manually operable drive for use in the event of a power failure. The operator includes a manually rotatable drive wheel and manual rotation of the drive wheel effects a movement of at least one drive coupler in generally radially extending direction relative to the drive shaft to effect a drive coupling between the drive wheel and the drive shaft to input drive to permit manual opening and or closing of the door. |
US08806805B2 |
Barrier boom implemented as bendable boom of a vehicle barrier
A bendable barrier boom (1) designed to serve as a vehicle barrier, comprises a boom column, a barrier boom (1), and a drive for pivoting the barrier boom (1) between the blocked and the open position. The barrier boom includes a first barrier boom section (2), which is connected to the drive for pivoting the barrier boom (1), and a second barrier boom section (3), which is connected to the first barrier boom section (2) via an articulated joint (4). To maintain the second barrier boom section (3) in the horizontal position, provision is made for a cord (5) arranged in the first barrier boom section (2) parallel to its longitudinal axis that is tightened and clamped around two guide rollers (6, 8). The cord (5) and guide rollers (6, 8) operate to maintain the second boom section in the horizontal position. |
US08806803B1 |
Combination bait bucket and tackle box
A combination bait bucket and tackle box comprises a cylindrical container providing a means for dry storage of fishing supplies and also live bait. The bait container comprises a top portion of the device. The container further comprises a hinged access lid, a carrying handle, and a pair of slots adapted for securely receiving an aerator pump and a lantern. A bottom portion of the bait container lockably engages a top portion of the tackle box in order to allow the entire apparatus to be carried as unitary device. The tackle box comprises a round bottom portion of the apparatus which includes a plurality of drawers for storage of fishing supplies. |
US08806799B1 |
Front sight of a weapon
A front sight assembly that can be mounted to a barrel and a gas block is disclosed. The front sight assembly has a barrel mount that allows the front sight assembly to pivot about the barrel. The front sight assembly also has a gas block mount that allows the user to pivot and set the front sight left or right to allow for windage. The front sight assembly may also have a front sight disposed over the gas block mount. |
US08806797B1 |
Electronic device shotgun mount
A electronic device shotgun mount preferably includes a mounting plate, an attachment device, a barrel snap member and a support gusset. The mounting plate extends from a top of the barrel snap member. The support gusset extends a length of the barrel snap member and substantially a length of a bottom of the mounting plate. The removable attachment device includes a mounting plate attachment pad and a phone attachment pad. The mounting plate attachment pad is secured to the mounting plate. The phone attachment pad is secured to a electronic device. The barrel snap member has a C-shaped cross section. The inner perimeter of the barrel snap member is sized to tightly receive a barrel of a shotgun. In use, the electronic device is attached to the mounting plate and the electronic device shotgun mount is snapped on to the barrel of the shotgun. |
US08806793B2 |
Systems, methods, and apparatuses for installing a hand guard on a firearm
Embodiments of the disclosure can include systems, methods, and apparatuses for installing a hand guard on a firearm. In some embodiments, a method of installing a hand guard on a firearm can be provided. The firearm includes a barrel, a barrel nut, and a delta ring. The delta ring is refracted away from the barrel nut. A number of hand guard members are positioned about the barrel. An annular groove formed between a forward plate and a rear plate associated with each hand guard member is mated with a portion of a flange of the barrel nut. The flange is secured within the annular groove of at least one hand guard member. The delta ring is advanced over a portion of some or all the hand guard members. |
US08806789B2 |
Multi-caliber interchangeable rifle bolt system
An automatic machine gun capable of being quickly reconfigured to fire different calibers of ammunition. The elements necessary to reconfigure the weapon are all stored and contained within the stock of the weapon. The reconfiguration process does not require any external tools. |
US08806786B2 |
Steamer head for a garment steamer
The present invention relates to a steamer head for a garment steamer comprising a main body (2) with a front end (8), a steam outlet (11) and an air inlet (25) formed in the front end (8). A suction force is applied to draw air through the air inlet (25) so that a fabric of a garment disposed proximate the front end (8) is drawn against the front end (8) by the suction force. Further, steam is applied to the fabric of a garment through the steam outlet (11). The front end (8) of the main body (2) comprises first and second surfaces (10, 2). The steam outlet (11) is formed in the first surface (10) and the air inlet (25) is formed in the second surface (12), so that the fabric is drawn against the second surface (12) and steam is applied to the fabric at the first surface (10). The first and second surfaces (10, 12) together forma convex surface. The present invention also relates to a garment steamer comprising a 10 steamer head and a method of removing creases from a garment using a garment steamer. |
US08806785B2 |
Wearing element with enhanced wear resistance
Wearing element with enhanced wear resistance related to wearing elements, such as cast steel teeth to be specially used in machinery for earth-moving, ground-engaging and/or rock-cutting applications, as well as to inserts to be included within the wearing elements, to enhance their wear resistance thus prolonging their service life. |
US08806783B2 |
Articles adapted to releasably receive interchangeable ornaments and system therefor
A sandal can include a sole, one or more straps each having at least one end that is operationally connected to the sole, and a fastening member for releasably receiving an ornament comprising one or more protruding members. The fastening member can be coupled to at least one of the one or more straps and can include an inner cavity and a housing at least partially enclosing the inner cavity. An opening can be disposed in and through an upper portion of the housing in such a way that the opening leads to the inner cavity. One or more projections can be joined with the housing and can extend into the inner cavity. Each of the one or more projection can be situated at a position along a path of motion of at least one of the one or more protruding member from an unfastened position to a fastened position. |
US08806781B2 |
Device for wearing thong-type sandals
A device that engages a stem of a sandal and, in turn, allows the position of toes and web space of a user around the device. The device is constructed to ease the frictional and compression forces on the user by the stem. |
US08806780B2 |
Heel protector
A heel protector is provided that has a tubular structure with a strap and a heel section. The heel section includes a plurality of alternating annular strips of material and annular ridges that allow users of the heel protector to expand the heel section vertically when placed over a shoe so that the heel section covers all or substantially all of a rear portion of the shoe. |
US08806777B2 |
Golf shoe closing device
Disclosed is a foot covering closure mechanism that converts any laced shoe to a design that requires no bending down, sitting or use of the hands to put on or take off ones shoes. The new and unique device utilizes rolling motion actuation for ease of use. Polymeric components for reliability in hostile environments, water seals to keep feet dry and adaptable fastening hardware and exterior color for compatibility with the wide variety of shoes available to the public. Other features make the mechanism easily operated by action of the opposite foot. |
US08806776B2 |
Footwear which improves foot support
An article of footwear including a sole, an upper, and a device for reversibly tightening the upper, the upper including an envelope and a reinforcement which at least partially covers the envelope, the reinforcement including at least one lateral branch and at least one medial branch, each branch extending transversely from a proximal end located by at the sole to a distal end, the tightening device including at least one lateral linking point and at least one medial linking point, each secured to the upper, and a mechanism for biasing the connection points in a direction to reversible tighten the upper. The envelope is flexible, at least one connection point is located on a branch of the reinforcement, and at least one branch is adhesively bonded to the envelope for at least part of its length. |
US08806775B2 |
Method for operating clothes treating apparatus
A method for operating a clothes treating apparatus having a dry function capable of reducing abrasion and crease of a dry object and improving a dry efficiency is provided. The method for operating a clothes treating apparatus having a dry function for drying the clothes by supplying hot air into the interior of a tub includes: supplying hot air into the interior of the tub while forwardly and reversely rotating the tub; detecting the moisture content of the clothes put into the interior of the tub; lowering the temperature of hot air and supplying the same when the detected moisture content is less than a first predetermined level; and supplying the hot air having a lower temperature to complete drying. |
US08806773B2 |
Method of folding an airbag, and device for folding the airbag
Disclosed is a method for folding an airbag (1) for placement in an airbag module for a motor vehicle. The method involves folding the airbag (1), exposing the airbag (1) to moisture, compressing the airbag (1), and simultaneously extracting the moisture. Moisture in liquid or vapor form can be introduced before or after folding the airbag. Further disclosed is a device for folding the airbag. |
US08806772B1 |
Grain drying system
A grain drying system includes a master control unit external to the grain storage bin which is preprogrammed with a desirable grain moisture content or EMC. Condition sensor assemblies mounted within the grain bin determine the relative humidity and the temperature of the grain within the grain bin. Also, sensors mounted in the bin's plenum determine temperature, relative humidity and air pressure. A weather station mounted externally of the grain bin determines the outside air temperature and relative humidity. Depending on the conditions determined by the sensor assemblies and the weather station, the master control unit selectively activates the grain bin's drying fan when needed and when it is efficient and effective to do so. A radio or cellular modem allows for communication of the grain's condition. The internal sensor assemblies are preferably secured to flexible cables hung within the grain bin. The cable and rigid rod-like members support the sensors. The sensors may be secured in a spaced relationship along the cable so that the grain condition can be determined throughout the grain bin. |
US08806770B2 |
Tape measure
A tape measure includes a housing assembly defining a cavity and a tape port from which to extend and retract a measuring tape. The measuring tape forms a spool rotatably coupled about an axis. A hook member is fixedly coupled to an end portion of the measuring tape. A U-shaped guard member extends from the housing assembly adjacent the tape port. The guard member is configured to engage the hook member when the measuring tape is retracted into the housing assembly. |
US08806762B2 |
Cutting element, electric shaver provided with a cutting element
The invention relates to a cutting element (10), such as used in an electric shaver. The cutting element is made from stainless steel with a hardened surface layer (14) over at least part of its surface, and is characterized, in that the cutting end face (11) of the element comprises a, surface layer of hardened steel at least over its cutting edge (12), the rest of the end face comprising the stainless steel. The cutting element has self-sharpening and wear adjustable characteristics. The invention also relates to a method for producing the cutting element, and to an electric shaver comprising at least one cutting element according to the invention. |
US08806760B2 |
Hairdresser'S tool
A multifunctional hairdresser's tool, with which, in combination with an assortment of replaceable blades, different cutting techniques can be carried out. The tool comprises a holder (1) with a handle (3) in which a blade is held by a coupling system. The blade can be fixed in various positions. The assortment of replaceable blades varies from an adapted design of a known type of blade to different completely new types of blades. |
US08806757B2 |
Arched hair clipper blade guide
A blade guide for a hair clipper bladeset, the guide configured for slidable engagement in a transverse track of a stationary blade, and including a blade guide body having a first edge and a second edge being generally parallel to and spaced from the first edge, each of the edges having a pair of opposed free ends. At least one arched load beam connects a corresponding opposed pair of the free ends of the first and second edges for exerting a torsion-resisting biasing force between the edges. |
US08806751B2 |
Method of manufacturing printhead including polymeric filter
A method of manufacturing a printhead includes providing a substrate and a filter membrane structure. A first portion of the substrate defines a plurality of nozzles and a second portion of the substrate defines a plurality of liquid chambers. Each liquid chamber of the plurality of liquid chambers is in fluid communication with a respective one of the plurality of nozzles. The filter membrane structure is adhered, for example, laminated, to the second portion of the substrate. Each liquid chamber of the plurality of liquid chambers is in fluid communication with a distinct portion of the filter membrane structure. Pores are formed in the filter membrane structure using a photo-lithography process. |
US08806750B2 |
Forced oscillation seals for air to gas leaks reduction in regenerative air preheaters
A forced oscillation radial seal is described for regenerative air preheaters which contain rotatable radial plates having upper and lower edges. The forced oscillation seal includes a base with a first portion attached to a lateral face of the plates adjacent the upper and lower edges, and a second free portion, with a pivot system having an axis attached to the second free portion, and a rigid sealing sheet with a first free portion, second portion, and central portion, the sealing sheet attached at its central portion to the pivot system. The forced oscillation seal includes a counterweight attached to the sealing sheet so the sealing sheet reassumes a vertical position after forming a seal with a sealing surface, and a plurality of springs in contact with the sealing sheet and base along the axis of the pivot system, which cooperate with the counterweights to force the seal to oscillate. |
US08806746B2 |
Method for cleaning wind turbine blades
A fast and effective method for cleaning and repairing the shell-spar glue voids of a wind turbine blade, comprising the steps of detecting voids, raising the turbine blade at an incline, drilling holes into top and bottom ends of the void, injecting cleaning solution into the holes, and allowing the cleaning solution to drain out of the bottom holes and drain holes at the tip. The void is then inspected for oil by FTIR spectroscopy. If oil is detected, additional cleaning steps are performed comprising injection of a second cleaning solution into at least two holes of the void followed by a rest period, washing the holes with water via a pressure washer, and drying with compressed air. The blade is then inspected for oil and moisture, and when clean, adhesive is applied to the void through the holes. |
US08806743B2 |
Panelized process for SMT sensor devices
A method is presented for forming multiple surface mount technology (SMT) sensor packages in a panel for separation into individual SMT sensor packages. A base plate is mapped as a grid of sensor footprints, and each footprint is populated with electronic and sensor components. A cover plate including window elements is mapped to a similar grid. The cover plate is bonded to the base plate, such that the window elements are positioned to allow incident electromagnetic radiation upon corresponding sensors mounted on the printed circuit board. Each sensor footprint is sealed within a recess or cell beneath the cover. The sensor circuits may be tested before and/or after being separated into individual SMT sensor packages. |
US08806740B2 |
Silicon chicklet pedestal
A silicon chicklet pedestal for use in a wafer-level test probe of a wafer is provided and includes a main body, first and second opposing faces, and an array of vias formed through the main body to extend between the first and second faces, through which pairs of leads, respectively associated with each via at the first and second faces, are electrically connectable to one another. |
US08806739B2 |
System for framing motor-vehicle bodies or sub-assemblies thereof
In a framing system for framing motor-vehicle bodies or sub-assemblies thereof, the body to be framed is located and clamped in position during the assembling operations by side locating and clamping structures (8). Each of these structures comprises a rigid supporting structure (82) including a base platform (82a) and a frame (81) which carries locating and clamping devices (D). The base platform (82a) is dimensioned in the direction parallel to a body conveyor line with a standard length proportionated to the length of the longest body type on which the system is to operate. Pillars (82b) for supporting the frame (81) are mounted on the platform (82a) at positions which are selected between different possible positions, displaced relative to each other longitudinally and/or transversely. Thus, the side locating and clamping structures (8) can be configured easily for different types of body and the system is able to operate on body types having also very relevant differences in length and/or width. |
US08806738B2 |
Method for manufacturing quartz crystal unit, quartz crystal oscillator and electronic apparatus
A method for manufacturing a quartz crystal unit, comprising the steps of forming a quartz crystal tuning fork shape having a quartz crystal tuning fork base, and first and second quartz crystal tuning fork tines, a quartz crystal tuning fork resonator having the quartz crystal tuning fork shape, forming at least one groove in at least one of opposite main surfaces of each of the first and second quartz crystal tuning fork tines, determining each of a length of the at least one groove and an overall length of the quartz crystal tuning fork resonator so that a series resistance R1 of a fundamental mode of vibration of the quartz crystal tuning fork resonator is less than a series resistance R2 of a second overtone mode of vibration thereof, housing the quartz crystal tuning fork resonator in a case, connecting a lid to the case, and disposing a metal or a glass in a through-hole of the case. |
US08806729B2 |
Apparatus for alignment and support of fence rails
A visualization, alignment and support tool permitting one person fence rail installation, and greatly speeding the installation when more than two persons are employed. Specifically, the tool affixes temporarily to a fence pipe and offers support for a length of fence rail; especially the ends of adjacent fence rails, so that the rails are supported and level relative to a fence pipe bracket which is affixed to the fence pipe. The rail ends can then be fastened with screws or other fasteners to the fence pipe bracket when desired without further adjustment required. |
US08806727B2 |
Method of forming a piezoelectric actuator of an inkjet head
A method of forming a piezoelectric actuator on a vibration plate to provide a driving force to each of a plurality of pressure chambers includes forming a lower electrode on the vibration plate, forming a piezoelectric layer on the lower electrode at a position corresponding to each of the pressure chambers, forming a supporting pad on the lower electrode, the supporting pad contacting one end of the piezoelectric layer and extending away from the one end of the piezoelectric layer, forming an upper electrode extending from a top surface of the piezoelectric layer to a top surface of the supporting pad, and bonding the upper electrode to a driving circuit above the supporting pad to receive a voltage from the driving circuit. |
US08806726B1 |
Pacifier clip
The present invention relates to a pacifier clip, which comprises a base sheet, a mobile clipping member, a pulling member and a tying tool. When the pulling member is pulled, in the rotating motion, an angled flange of the pulling member utilizes an eccentric action to optionally allow an angled part or an inclined cutting plane of the angled flange to be abutted against or adjacent to an oblique support arm of the mobile clipping member, so a passive sheet of the mobile clipping member is downwardly moved or upwardly raised, and tooth rows of the passive sheet and tooth lines of the base sheet are engaged for forming a clipping status or forming a gap in between for forming a releasing status. |
US08806725B2 |
Slide fastener
A slide fastener according to the invention includes a left-and-right pair of first and second fastener stringers, a box pin provided on the first fastener stringer, an insert pin provided on the second fastener stringer, and a pair of first and second sliders. The box pin has a box pin body, a stopper portion, and a ridge portion formed on the box pin body. Further, a chamfered portion is formed on an inner surface of at least one of the upper and lower wing plates of the first slider. The ridge portion is arranged at a position in close contact with the chamfered portion of the first slider when the first slider is stopped at the stopper portion. With this arrangement, it becomes possible to cause the user to be accustomed to securely slide the first slider to the normal insert-pin inserting position. |
US08806724B2 |
Liquid-tight slide fastener
A liquid-tight slide fastener, wherein a pair of right and left coil-like coupling element rows, through which a core thread is respectively passed, is attached by sewing along opposing side edges of a pair of right and left fastener tapes, the fastener tapes having a liquid-tight layer on one surface thereof, and the core thread is coated with a water repellent agent or oil repellent agent. Consequently, even if water or oil invades into a space portion in the coupling element rows through a joint portion in the liquid-tight slide fastener, the core thread repels the water or oil, thereby blocking a further invasion of water or oil, and exerting excellent water repellency or oil repellency without provision of a water stop flap. |
US08806721B2 |
Strap-band type connecting device
In a strap-band type connecting device (1), a strap band (3) has an array of teeth (8), each of which forms a bridged brace (10) between the neighboring slits (8a) to make a helical thread (9a) engage with the bridged brace (10) when a rod screw (9) is brought at the helical thread (9a) into engagement with the slits (8a) within a housing (4). The bridged brace (10) is curvedly deformed to provide a width-reduced groove (10a) in its lengthwise direction (P) so as to form a cross piece segment (11, 13), a geometrical moment of inertia of which increases along a circumferential direction (R) of the strap band (3) with a sufficient rigidity provided to resist against a bending force from the helical thread (9a) upon rotationally operating the rod screw (9). |
US08806718B2 |
Domestic appliance hinge assembly with double linkage
A hinge assembly for pivotably attaching a door to a domestic appliance is provided. The hinge assembly includes a hinge body; a damper having a central longitudinal axis; a first linkage member pivotably attached to the damper; a second linkage member pivotably attached to the damper; and a foot pivotably attached at a first end of the foot to the first and second linkage members, the foot being configured to engage at a second end of the foot a foot receiving portion of the domestic appliance such that the hinge body and the door pivot relative to the domestic appliance. The first and second linkage members are offset from and positioned on opposite sides of the central longitudinal axis of the damper. |
US08806717B2 |
Locking device of a motor vehicle for securing a displaceable motor vehicle component
A locking device for securing a motor vehicle component which is displaceable relative to a motor vehicle structure and which may be secured by means of the locking device within a displacement range in a respective position of rest reached by displacement is provided. The locking device comprising at least one first frictional element and at least one second frictional element, which is moved relative to the first frictional element upon displacement of the motor vehicle component and thereby may slide with a friction surface along a friction surface of the first frictional element under sliding friction conditions and which, in a respective position of rest of the motor vehicle component, with its friction surface bears against the friction surface of the second frictional element under static friction conditions. A flowable additional medium is provided which may be brought, upon a relative movement of the frictional elements, between their friction surfaces. |
US08806713B2 |
Pipe or cable lead-through having modularized modules
A compressible module having an axial groove for localization of a cable or pipe having at least two module sections or submodules having differing physical properties. |
US08806711B2 |
Automatic cleaner
An automatic cleaner includes a casing including a suction port, a suction device disposed in the casing to suction a foreign substance through the suction port, a moving device that moves the casing, and a side brush assembly movably installed on the casing. The side brush assembly includes a brush housing rotatable about a first rotation shaft, and a brush rotatably mounted on the brush housing by a second rotation shaft. The second rotation shaft is moved according to a rotation of the brush housing. |
US08806708B2 |
Surface treating appliance
A surface treating appliance includes a first cyclonic separating unit including at least one first cyclone, a second cyclonic separating unit including a plurality of second cyclones arranged in parallel about an axis, and a third cyclonic separating unit including a plurality of third cyclones arranged in parallel about the axis. Each of the second cyclones and the third cyclones has a tapering body with an outside wall. The plurality of third cyclones is divided into at least a first set of third cyclones and a second set of third cyclones, each of the plurality of second cyclones and the first set of third cyclones being arranged about the second set of third cyclones. At least a part of the outside wall of each of the plurality of second cyclones and each of the first set of third cyclones forms part of the external surface of the surface treating appliance. |
US08806706B2 |
Filter bag indicator and lock-out safety system
The present invention provides a lock-out system and a lock-out apparatus for a vacuum cleaner having a closeable shell for a filter bag. The system includes a filter bag collar mount and a locking mechanism for a filter bag movably connected to the filter bag collar mount. The locking mechanism is able to be in one of an engaged position or in a disengaged position relative to the filter bag mount. Also, the locking mechanism in the disengaged position prevents the closeable shell from closing. |
US08806705B2 |
Leaf blower
The invention is a leaf blower with a handle extended from the rear opposite the exhaust blower pipe. The exhaust pipe has a turned down blower orifice extender. The leaf blower has an air inlet on the upper surface. Various handgrips which operate with the extended handle aids the movement of the blower pipe. The leaf blower may be held at the operators side or attached with various devices to a belt or neck harness with hooks or pommels on the extended handle. |
US08806703B2 |
Vacuum cleaners
A vacuum cleaner includes a device for dispensing atomized liquid, the device having a reservoir for holding liquid and an ultrasonic transducer arranged to atomize the liquid in the reservoir. An airflow is created through the reservoir via the exhaust gasflow from the vacuum cleaner, the airflow carrying the atomized liquid via an elongate tube to dispensing outlet provided on a cleaning head of the vacuum cleaner. The ultrasonic transducer is simple and inexpensive, yet is able to reliably atomize the liquid for dispensing. |
US08806702B2 |
Portable vacuum cleaner
A portable vacuum cleaner is disclosed. The portable vacuum cleaner includes a rechargeable battery and a DC motor. The portable vacuum cleaner further includes a DC power input port for receiving DC power from a remote power source. The DC motor is operable in response to power from either the battery or the remote power source. |
US08806695B2 |
Oral care implement having flexibly supported cleaning elements extending in opposite directions
An oral care implement having a head with a soft tissue cleaner disposed on a second side thereof. In one embodiment, the invention can be an oral care implement comprising: a handle; a head attached to the handle and having a first side and a second side; a plurality of tooth cleaning elements attached to the first side of the head; and a soft tissue cleaner disposed on the second side of the head, the soft tissue cleaner including a first portion comprising a plurality of projections and a second portion comprising a plurality of bristles. |
US08806694B2 |
Conductor cleaning brush assembly for overhead electric power lines
An electric power line conductor cleaning brush assembly includes a tubular housing having a longitudinal opening. A multitude of open disc brushes having bristles are located within an interior of the tubular housing and normal to the tubular housing. |
US08806692B2 |
Quick cable deicing device and power component thereof
A quick cable deicing device and a power component thereof are provided. The deicing device comprises a cable clamping pedestal (11,13) which is sleeved on a cable and is capable of moving along the cable, a deicing head (21, 22) mounted at the head part of the cable clamping pedestal, and a power component which is connected with the tail part of the cable clamping pedestal and is capable of generating a thrust. The deicing device can advance and rotate at the same time under the drive of the power component. The power component comprises a gas tank (31) in a structure which conforms to a Laval nozzle principle and has an aperture expanded after sharply narrowed. The power component conforming to an aerodynamic principle is adopted to generate the momentary thrust to drive the whole device to advance and rotate at the same time; and the deicing velocity of the deicing device is high, while the rotational inertia improves the ice crushing capacity of the deicing head, thereby improving the deicing efficiency; the quick cable deicing device has a low cost, does not need manual operation after the cable is prepared in place, and has a higher safety. |
US08806691B2 |
Electric toothbrush
The invention provides an electric toothbrush capable of changing a resonant frequency and vibration amplitude of an eccentric shaft. An electric toothbrush of the present invention includes a motor, an eccentric shaft with one end fixed to a rotation shaft of the motor, and a stemserving as a vibration transmitting component having a bearing for supporting the other end of the eccentric shaft for transmitting vibration generated in accordance with rotation of the eccentric shaft to a brush portion. In the electric toothbrush, the eccentric shaft is formed so that a gravity center position is movable at least in one direction among a direction in which a distance to a shaft center is changed and an axial direction. |
US08806690B1 |
Dual bridge aircraft passenger boarding ramp assembly and method
A ramp assembly for deplaning passengers from and boarding passengers on an airplane includes a level deck, at least one bridge connector assembly carried by the level deck and at least one floating upper bridge carried by the at least one bridge connector assembly. The at least one bridge connector assembly facilitates horizontal pivoting movement, vertical pivoting movement and side-to-side movement of the at least one floating upper bridge relative to the level deck. A passenger deplaning and boarding method is also disclosed. |
US08806685B2 |
Axillary support device
An axillary support device is provided for decompressing the axilla (armpit) and associated structures in a sidelying position. A thoracic cushion provides firm axillary support to a user at the level of the mid to upper thorax, distal to the axilla. A head cushion connected to the thoracic cushion supports the user's head and may maintain a neutral cervical spine alignment position. A connector connecting the cushions creates a valley to receive an upper arm of the user. A back support may be used to maintain the sidelying position. An inflatable bladder may be used to adjust the axillary support device in order to appropriately relieve pressure on the user's axilla and associated structures. With the axillary support device, the upper arm of the user is relatively free to extend perpendicularly in front of the body in the sidelying position with reduced stress on the lateral shoulder and axilla. |
US08806684B1 |
Pillow device
A pillow device for supporting a person's head without compression of nerves or arteries includes a main section having a top surface, a bottom surface, and a perimeter edge coupled to and extending between the top surface and the bottom surface. A projection extends from the perimeter edge of the main section. The projection is substantially T-shaped having a distal section relative to the main section and a connection section coupled to and extending between the distal section and the perimeter edge. Each of a pair of opposed end sections of the distal section of the projection is configured for positioning under an arm of a user when a head of the user is supported by the main section. |
US08806683B2 |
Portable stirrup with leg support
A portable boot style stirrup assembly with leg support for use during medical procedures. The portable boot style stirrup assembly affixes to the existing stirrup footrests found about medical examination tables, resultantly increasing procedural efficiency and decreasing doctor cost of the performance of in-office medical procedures, increasing patient comfort during prolonged procedures, and increasing doctor and patient safety during procedures. The portable boot style stirrup assembly includes a boot shell structure which supports a patient's foot and calf and a receptacle constructed and arranged to receive the existing stirrup footrest of medical procedure tables and allow for adjustment of the adductive and abductive angle positioning of a patient's leg for examination and surgical procedures. |
US08806681B2 |
Device for maintaining a patient in a position and methods of using it
Methods and devices are provided for maintaining a patient in a position in which the patient's torso can be moved during surgery, for example by which the sternum can be closed after open chest surgery. The device has two contact members for contacting a respective scapula and support structures for maintaining the contact members in a grip position. In use, each contact member imparts a force on the respective scapula to close the patient's sternum. |
US08806676B2 |
Portable hammock and hammock frame
In one embodiment, a frame has a first expanded configuration, a second expanded configuration and a collapsed configuration. The frame includes a support member, a first elongate member, a second elongate member and a coupling member. A first end portion of the first elongate member is pivotally coupled to the support member. A first end portion of the second elongate member is pivotally coupled to the support member. The coupling member is coupled to a second end portion of the second elongate member. A second end portion of the first elongate member is coupled to the coupling at a first location of the coupling member when the frame is in its first expanded configuration. The second end portion of the first elongate member is coupled to the coupling member at a second location of the coupling member when the frame is in its second expanded configuration. |
US08806675B2 |
COT
A cot having a simple structure and capable of being easily installed and dissembled is provided. The cot includes a cloth having horizontal poles inserted into both ends thereof, a plurality of support bars for supporting a load in contact with the ground, and a plurality of connection bars connected to both ends of each support bar and respectively having clips at terminals thereof to receive the horizontal poles, wherein the clips are open toward the outside. |
US08806668B2 |
Cleaner structure for toilet tank
A cleaner structure includes a main body, a forced element and an elastic element. The main body includes a first casing, a floating element, a second casing, first perforations and second perforations. The floating element is disposed within the first casing. The second casing is connected with the first casing for storing a cleaning agent. The elastic element is connected with the first casing and the forced element. During the water level of the liquid inside the toilet tank is changed from a low level to a high level, the second casing is at least partially immersed in the liquid, so that the cleaning agent is released to the liquid. |
US08806667B2 |
Face guard for fastening to a protective helmet, in particular for forestry workers
A face protection to be fastened to a protective helmet, particularly for forestry workers, is described. A visor has two retaining arms and two bearing devices which can be fastened on the inside of a helmet shell for the retaining arms for pivoting the visor between an operating position in which the visor is swung downwards and protects the face, and a parking position in which the visor is swung upwards. Each retaining arm extends towards the free end thereof which can be connected to the bearing device from the visor substantially parallel to and at such a distance from the visor that a slot is formed between the retaining arm and the visor through which slot the helmet shell extends in the parking position, and that, in the parking position, the visor is arranged close-fitting on the outer surface of the helmet shell. |
US08806662B2 |
Welding helmet with protection cover for cartridge
Disclosed is a welding helmet with a protection cover for a cartridge, being manufactured in various forms and capable of covering a cartridge of the welding helmet and thereby protecting the cartridge from welding heat and preventing melting of the cartridge. According to the present invention, the welding helmet comprising a helmet body covering an operator's face, an opening formed on a front of the helmet body, and a cartridge connected with the opening and equipped with an LCD panel which intercepts light emanating from a welding operation to protect the operator's eyes, further comprises a heat transmission interception unit formed on a front of the cartridge of the welding helmet to prevent surface deformation caused by welding heat. |
US08813259B2 |
Dynamic licensing
Dynamic licensing improves the utilization of licenses available within a computer network. License sinks, such as gateways, within a computer network may request licenses from a license source. The license source may be provisioned with a number of licenses from a secure fob plugged into the license source. If the license source has the number of licenses requested from the license sink, the license source may assign the licenses to the license sink. After a certain period of time, the license sink may renew the licenses or let the licenses return to the license source to be assigned to another license sink. The license requests may be passed through the network, including through a proxy and/or a relay, to a license server provisioned with licenses. Dynamic licensing software may execute as a service on each of the license sources and license sinks to pass dynamic licensing messages between devices. |
US08813258B2 |
Selectively exposing base class libraries based on application execution context
Allowing access to APIs based on application context. A method includes determining an application context for an application. A layer is determined for a base class library. Layers of the base class library are defined by one or more developer defined attributes associated with an API, where the API is included in the base class library. The base class library is divided into layers based on the developer defined attributes. The one or more attributes define which application contexts can access the API. If the layer matches the application context then access by the application to the API is allowed. |
US08813257B2 |
Download terminal, and content utilization system
A download terminal acquires and stores a content from a content server, acquires from a license server, a writing-out license including a use condition for writing out of the content to an exchangeable medium and writes out the content to the exchangeable medium according to the writing-out license. The writing-out license includes a pack identifier given to a content group to which the content belongs, and viewing term information of the content, as the use condition. The download terminal determines based on the viewing term information, a viewing time limit of the content to be written out, and synchronizes a viewing time limit of other content having a same pack identifier as that of the content. |
US08813255B2 |
Security classification applying social norming
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an interface; and, a data repository connected to the interface stores the content. A portal connected to the data repository identifies an attempt to access the content from a non-user. A program processor connected to the portal determines whether the content includes a security classification. When the content does not include a security classification, a communications module connected to the program processor sends an alert to the user. The alert includes a request to assign a security classification to the content. When the content includes a security classification, the communications module sends a message to the user, wherein the message includes a request to verify the security classification. |
US08813254B2 |
Conditional access system switcher
A system is configured to provide access between a plurality of terminals and a plurality of different conditional access systems (CASs) associated with the terminals. The system includes a CAS switcher configured to receive requests from the plurality of terminals and, for each of the requests, identifies and sends the requests to a corresponding CAS. The CAS switcher also receives messages from the CASs responsive to the requests and, for each of the messages, identifies and sends the message to a corresponding terminal. |
US08813253B2 |
Method for the authentication of applications
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives via the network, analyses and verifies identification data comprising at least an identifier of the equipment and an identifier of the security module, generates a cryptogram comprising a digest of the application, the identification data and instructions intended for the security module and transmits the cryptogram, via the network and the equipment, to the security module. The latter verifies the application by comparing the digest extracted from the cryptogram with a calculated digest, wherein, during at least one of initialization and activation of the application, the security module executes the instructions extracted from the cryptogram and either releases or blocks access to certain resources of said security module according to a result of the verification of the application. |
US08813250B2 |
Access control program, system, and method
Authority permission grants/denials associated with each of a plurality of roles (R1, R2, . . . , Rm) assigned to one subject are derived by inheritance based on a subject assignment associating a role and a subject, an authority permission assignment associating a role, an authority permission, and a grant/denial, and a role hierarchy indicating an inheritance relation between roles. Among the derived authority permission grants/denials, grants/denials of authority permissions (A1, A2, . . . , An) which are each derived from two or more different roles (R1, R2, . . . , Rm) and which are each granted to one of the plurality of roles R1, R2 . . . Rm but denied to another one of the plurality of roles R1, R2 . . . Rm are determined in accordance with an input. As exceptional authority permission assignment for a virtual exceptional role constituted of a combination of roles (R1, R2, . . . , Rm), authority permission grants/denials associated with each role (R1, R2, . . . , Rm) are derived by inheritance based on the role hierarchy, authority permission assignment, and the exceptional authority permission assignment. |
US08813249B2 |
Mapping identities to documents to enable multiple user logins
Embodiments of the present disclosure provide a system and method for enabling multiple users to access, edit and save content items using a shared computing device. The method and system described herein utilizes an identification table to identify previous associations between each user and each content item. If it is determined that a previous association exists between a particular user and the content item, the particular user may interact with the content item. If however, it is determined that a previous association does not exist, the particular user may attempt to utilize another user's credentials to interact with the content item. |
US08813247B1 |
Providing cryptographic security for objective-oriented programming files
An apparatus and method for providing an Internet Web services for securing the transmission of data between object oriented software infrastructure and relational database via web pages are disclosed. Upon generating a table having multiple columns for encrypting a database, a process is capable of handling object attributes in accordance with the table. The process, in one embodiment, encrypts HTML data elements at a browser level. |
US08813242B1 |
Auto-insertion of information classification
Automatic classification of mobile device-originated content is disclosed. A content object sent from a mobile application to a destination may be received at an intermediate node. The content object may be processed to identify one or more control characters included in the content object. The content object may be modified to replace the identified control characters with classification information. |
US08813241B2 |
Content distribution system, content distribution method, and client terminal
If the user of a first portable terminal intends to let a second portable terminal try out a certain content, the user sends to a distribution server trial permission information including the user's own user ID, a content ID of the content of interest, and a digital signature. The distribution server authenticates the received information before distributing a streaming data of a trial-oriented content with the content ID and user ID attached to it as search keys. This allows the content that can be used on a given user terminal to be tried out on another user terminal without the latter user having recourse to the steps of searching for the content in question. |
US08813238B2 |
Digital rights management with irregular network access
There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols. |
US08813237B2 |
Thwarting cross-site request forgery (CSRF) and clickjacking attacks
Embodiments of the invention generally relate to thwarting fraud perpetrated with a computer by receiving a request from a computer to perform a transaction. Embodiments of the invention may include receiving the request together with transaction data and a cookie, where the transaction data are separate from the cookie; determining in accordance with predefined validation criteria whether the cookie includes a valid representation of the transaction data; and performing the transaction only if the cookie includes a valid representation of the transaction data. |
US08813234B1 |
Graph-based approach to deterring persistent security threats
A processing device comprises a processor coupled to a memory and implements a graph-based approach to protection of a system comprising information technology infrastructure from a persistent security threat. Attack-escalation states of the persistent security threat are assigned to respective nodes in a graph, and defensive costs for preventing transitions between pairs of the nodes are assigned to respective edges in the graph. A minimum cut of the graph is computed, and a defensive strategy is determined based on the minimum cut. The system comprising information technology infrastructure subject to the persistent security threat is configured in accordance with the defensive strategy in order to deter the persistent security threat. |
US08813233B1 |
Machine image inspection
Systems and methods are disclosed which facilitate the evaluation of machine images. A machine image inspection component processes requests for evaluation of machine images hosted on a virtual machine instance. In response to the request, the machine image inspection component selects executable code that can evaluate the requested machine image prior to instantiating the virtual machine instance with the requested machine image. Based on execution of the selected executable code, the machine image inspection can then process the results of the evaluation of the requested machine image accordingly. |
US08813226B2 |
Defense method and device against intelligent bots using masqueraded virtual machine information
A defense method and device against intelligent bots using masqueraded virtual machine information are provided. The method includes performing global hooking on a virtual machine detection request transmitted by a process, determining, on the basis of pre-stored malicious process information, whether or not the process transmitting the virtual machine detection request corresponds to a malicious process, and when the process is found to correspond to the malicious process as a result of the determination, determining that the process is generated by the intelligent bot, and returning the masqueraded virtual machine information to the process. |
US08813225B1 |
Provider-arbitrated mandatory access control policies in cloud computing environments
Methods and apparatus for provider-arbitrated mandatory access control policies in cloud computing environments are disclosed. A system includes an access manager, and a plurality of resources configurable to provide a plurality of distributed, web-accessible services. Each service has a respective service manager. The access manager determines whether a mandatory access control policy document specified by a service manager of a particular service applies to an administration request, wherein the policy indicates that a permission setting for a resource being used to implement at least a portion of the particular service cannot be modified by a client with administrative rights on the resource. In response to determining that the policy document applies, and that an evaluation of the policy document indicates that an administrative operation specified in the administration request is prohibited by the policy, the access manager rejects the administration request. |
US08813223B2 |
Secure network topology on a virtualized server
Generally, this disclosure describes a secure network topology on a virtualized server (and methods thereof). A virtualization management module is deployed as part of a software layer of a virtualized server system. The virtualization management module generates an internal network among the virtual machines and controls access to the network. The virtualization management module translates incoming and outgoing traffic between the virtual machines and an external internet IP address, thus keeping the virtual machines indirectly coupled to the external network. The virtualization management module also provides remote administration and control over each virtual machine (or collection of virtual machines). |
US08813214B1 |
Method and system for providing secure peer-to-peer file transfers
A method and system for providing secure peer-to-peer file transfers whereby request/negotiation message mechanisms used to negotiate file transfers between peers is used to identify/intercept, and block, direct file transfers. The request/negotiation messages are then replaced with messages sent to both peers that include upload and download URL links through which the file can be uploaded, scanned analyzed, and then transferred, via a secure file transfer server. Using the method and system for providing secure peer-to-peer file transfers disclosed herein, peer-to-peer file transfer transactions are provided protection from malware, and provided additional data security, so that peer-to-peer users can utilize this important capability without taking unacceptable risks. |
US08813211B2 |
Automatically configuring computer network at hospitality establishment with reservation-specific settings
A system includes a storage device for storing details of a plurality of reservations of a hospitality establishment. A particular reservation includes a registered device setting for affecting behavior of a computer network at the hospitality establishment toward a user device having a specified device identifier. The system further includes a clock unit for tracking time, and a system controller coupled to the computer network and having access to the storage device and the clock unit. The system controller automatically configures one or more network components of the computer network when a start time of the particular reservation is reached in order to activate the registered device setting, and automatically configures the one or more network components when an end time of the particular reservation is reached in order to deactivate the registered device setting. |
US08813207B2 |
Image generating apparatus, projector, and method for generating an image
An image generating apparatus includes a timepiece determining section determining whether or not the setting of an internal clock is normal, a certificate determining section determining whether or not a received electronic certificate from a communication target apparatus is valid based on the setting of the internal clock, a communication section performing communication for authentication with the communication target apparatus if the certificate determining section determines that the received electronic certificate is valid and receiving image information from an image supplying apparatus belonging to a network to which the communication target apparatus belongs or the communication target apparatus, a control section making the communication section perform communication for authentication irrespective of whether or not the received electronic certificate is valid if the timepiece determining section determines that the setting of the internal clock is not normal, and an image generating section generating an image based on the image information. |
US08813205B2 |
Consolidating disparate cloud service data and behavior based on trust relationships between cloud services
A method for consolidating cloud service data and behaviors can begin with the compilation of user/service membership data that associates requesting entities with subscribed cloud services by a trusted cloud service consolidator. A federated trust library housing inter-service trust information for the cloud services contained in the user/service membership data can be created. In response to a service request from a requesting entity, trusted secondary cloud services can be identified for the requesting entity. Identification of the trusted secondary cloud services can be based upon trust factors synthesized from data contained in the federated trust library. Data satisfying the service request and associated behaviors from each trusted secondary cloud service can then be consolidated into a unified data structure. A behavior can be an executable action supported by a trusted secondary cloud service. The unified data structure can be conveyed to the requesting entity in a service response. |
US08813202B2 |
Mechanism to determine source device service tier based on the version of the HDCP key
A source device and method for authenticating a sink device. The source device and method include detecting when the sink device connects to a communication interface and in response to detecting a connected sink device, activating a sink device authentication protocol which authenticates whether the connected sink device is an approved sink device for connecting via the communication interface. The source device determines a level of authentication of the connected sink device from among a first-level authentication and a second-level authentication based on first and second authentication components, respectively derived from different master keys, which affects the type of content provided to the sink device. Responsive to the level of authentication provided through the connected sink device, modifying the content transmitted to the connected sink device, and preventing transfer of any content from the source device to the sink device in response to the sink device not being authenticated. |
US08813200B2 |
Online password management
This disclosure describes, generally, methods and systems for password management. In one embodiment, a method may include receiving, at a centralized password repository, requests from users. Each request may be configured to request a password to allow access to an associated application. In one embodiment, at least two of the users are at different locations. The method may further include performing a validation analysis for the users' credentials, and in response to verification of a user's credentials, transmitting a response including the password configured to provide access to the associated application. |
US08813199B2 |
Method for realizing convergent WAPI network architecture with separate MAC mode
A method for realizing a convergent Wireless Local Area Networks (WLAN) Authentication and Privacy Infrastructure (WAPI) network architecture with a split Medium Access Control (MAC) mode involves the steps: a split MAC mode for realizing WLAN Privacy Infrastructure (WPI) by an access controller is constructed through splitting the MAC function and the WAPI function of the wireless access point apart to a wireless terminal point and the access controller; integration of a WAPI and a convergent WLAN network system architecture is realized under the split MAC mode that the access controller realizes WPI; the association connection process is performed among a station point, a wireless terminal point and an access controller; the process for announcing the start of performing the WLAN Authentication Infrastructure (WAI) protocol between the access controller and the wireless terminal point is performed; the process for performing the WAI protocol between the station point and the access controller is performed; the process for announcing the end of performing the WAI protocol between the access controller and the wireless terminal point is performed; the secret communication process is performed between the wireless terminal point and the station point by using WPI. |
US08813196B2 |
Web-based conference collaboration tool with dynamic content and roles
A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. |
US08813192B2 |
Techniques for establishing a trusted cloud service
Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment. |
US08813190B2 |
Resource upload
A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the resource to the remote service, selecting the remote storage as a source of the resource, acquiring the resource from the remote storage, and uploading the resource to the remote service. In one embodiment, at least part of the method is executed by a proxy server and the step of acquiring the resource from the remote storage comprises downloading the resource to the proxy server. In another embodiment, the remote service communicates directly with the remote storage. In this further embodiment, a client device acquires authentication data for the resource from the remote storage and the step of acquiring the resource from the remote storage includes providing the authentication data to the remote storage. |
US08813185B2 |
Ad-hoc user account creation
A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user's computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer. |
US08813183B2 |
Method and system for processor or web logon
A system is for a proof of knowledge enrollment or authentication. The system includes a processor having an input, an output and a routine; and a display having an image from the output of the processor. The routine is structured to input from the input of the processor a plurality of different position selections and/or a plurality of different path selections on the image. The routine is further structured to authenticate the proof of knowledge as a function of the plurality of different position selections and/or the plurality of different path selections on the image. |
US08813178B1 |
Systems and methods for preparing and submitting documents to comply with securities regulations
Systems and methods for preparing and submitting documents to a regulatory agency in an on-line environment are provided, which are used for the purpose of complying with various securities regulations. The systems generally include a server that hosts a website in which a user may access, prepare, and submit one or more of various standardized reports to the regulatory agency through an on-line portal. The systems further include a database that includes (i) a listing of the standardized reports (and a listing of data fields included within such reports) and (ii) a listing of acceptable data types for each of such data fields. The website is preferably configured to display all of such data fields for a single standardized report within a single graphical user interface of the website. |
US08813177B2 |
Background application management
The techniques and systems disclosed herein generally pertain to managing permissions for applications to allow the applications to run in a background state by an operating system. In some embodiments, user interfaces may be used to allow users to manage application permissions without requiring the user to understand specifics of background applications, but rather by providing a predetermined threshold number of permissions that the user can assign to applications. When the predetermined threshold number of permissions has been allocated and a subsequent application requests a permission, the user may replace or swap out an application that currently has a permission by giving the permission to the requesting application. |
US08813172B2 |
Protection of data in a mixed use device
Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace. |
US08813171B2 |
Systems, methods, and apparatuses for facilitating authorization of a roaming mobile terminal
Systems, methods, and apparatuses are provided for facilitating authorization of a roaming mobile terminal. A method may include receiving a request for security key related policy information for a user equipment device. The request may be sent by a service providing node on a visited network. The method may further include causing a service authorization information request including a user security settings package to be sent to a policy decisioning server. The method may also include receiving, in response to the service authorization information request, a service authorization information answer including a modified user security settings package including the authorization policy information for the user equipment device. The method may additionally include causing the requested security key related policy information to be sent to the service providing node. Corresponding systems and apparatuses are also provided. |
US08813170B2 |
Testing access policies
A policy that governs access to a resource may be tested against real-world access requests before being used to control access to the resource. In one example, access to a resource is governed by a policy, referred to as an effective policy. When the policy is to be modified or replaced, the modification or replacement may become a test policy. When a request is made to access the resource, the request may be evaluated under both the effective policy and the test policy. Whether access is granted is determined under the effective policy, but the decision that would be made under the test policy is noted, and may be logged. If the test policy is determined to behave acceptably when confronted with real-world access requests, then the current effective policy may be replaced with the test policy. |
US08813166B2 |
System and method for transferring a partially viewed media content file
Embodiments of the disclosed invention include a system and a method for transferring a partially viewed media content file from a digital video recorder to a mobile device. In one embodiment, the method transfers only a remaining portion of a partially viewed media content file to the mobile device. In other embodiments, the method may transfer the entire partially viewed media content file with an indicator of the current viewing point of the partially viewed media content file. The indicator enables the mobile device to begin playing of the partially viewed media content file starting at the current viewing point. |
US08813163B2 |
Methods, communication device, and communication system for presenting multi-media content in conjunction with user identifications corresponding to the same channel number
A method for presenting multi-media contents on a specific communication device is disclosed. The method includes detecting a multi-media content channel currently tuned by the specific communication device; and in addition to a specific multi-media content corresponding to a specific channel number currently tuned by the specific communication device, presenting an information communication user interface. |
US08813160B2 |
Method, system and user device for obtaining a key frame in a streaming media service
The invention discloses a method, system and user device for obtaining a key frame in a streaming media service. The method includes: setting a threshold time for receiving a key frame, receiving video data by a client from a streaming media server, and analyzing the video data, when the network state is normal, sending a request for adjusting a video key frame generating frequency to the streaming media server if a video key frame is not received by the client in the threshold time; when the request is received, the streaming media server determines whether to adjust the video key frame generating frequency, if so, then adjusts the video key frame generating frequency according to the request of the client. The application of the invention can improve the quality of the streaming media service, and advance the experience level of the streaming media service. |
US08813159B2 |
Data transmission device and data transmission control device
Disclosed is a technique for effectively transmitting a plurality of contents under the situation securing minimum QoS. According to the technique, among a plurality of contents to be transmitted to a data reception device, two or more contents are set as main contents, and the remaining contents are set as stand-by contents. One of the two or more main contents is set as a broadcasting content to be broadcasted actually, and the remaining main content is set as a switching content. The data transmission device transmits the two main contents to the data reception device via a high-quality line (main content line) and transmits the remaining stand-by contents via a line of a quality lower than the main content line (proxy data transmission line). Contents are switched by interchanging between a broadcasting content and a switching content and interchanging between a switching content and a stand-by content. |
US08813157B2 |
Method and device for determining the value of a delay to be applied between sending a first dataset and sending a second dataset
The invention relates to a method and to a device for determining the value of a delay to be applied between sending a first dataset and sending a second dataset, the data being representative of a sequence of coded images, the datasets consisting of data subsets, the coded images being coded according to a first level of resolution and at least a second level of resolution higher than the first level of resolution, the data subsets containing data of a first level of resolution. According to the invention: first and second datasets are obtained (E506); and the value of the delay is determined (E507), the value of the delay being dependent on the number of decoded images that can be formed from the data subsets of the first dataset which contain data of the second or of a second level of resolution. |
US08813154B1 |
Injecting a code into video data without or with limited human perception by flashing the code
A playlist and a digital advertisement are received. The digital advertisement is output to a screen on the basis of information in the playlist. A code is generated based on the information in the playlist and the generated code is output to the screen. The generated code is output to the screen by flashing the generated code on the screen at a predetermined flash frequency and for a predetermined flash time so that the generated code is visually imperceptible or barely detectable to a human viewer. A suitable equipped electronic device may detect the code and utilize information encoded in the code in various ways. |
US08813149B2 |
Process and system for management of a continuous broadcast session of a posted direct video stream
A process and an associated system for management of a live streaming session posted directly on terminals connected to a communications network, the process includes stages of: sending invitations to the session to several invited terminals selected by a transmitting terminal; placing the transmitting and invited terminals in synchronized standby states depending on a predetermined synchronization duration, states during which the transmitting terminal is not transmitting the video stream to the destination of a multicast server in the session; when the transmitting terminal leaves its standby state to send a direct video stream to the broadcast server, allowing the invited terminals that have responded in the affirmative to the invitation to access the broadcast server to receive the continuously broadcast video stream. |
US08813147B2 |
System and method for synchronizing video indexing between audio/video signal and data
This invention is directed to a transmission system having a broadcast data synchronization and transmission system including a stream unit which detects group of pictures (GOP) positions of a Motion Picture Expert Group (MPEG) stream to be broadcasted on a television, and a shot/scene unit which sets and marks Extendible Markup Language (XML) TAG information in the corresponding GOP positions detected by the stream unit. |
US08813144B2 |
Quality feedback mechanism for bandwidth allocation in a switched digital video system
A method is provided which is suitable for implementation in a switched digital video content-based network, wherein a head end obtains a first group of program streams and sends to a client only a subset of the program streams selected by subscribers in a neighborhood of the client. At least one of imminence and presence of a condition of inadequate bandwidth is determined. Responsive to the determining of the at least one of imminence and presence of the condition of inadequate bandwidth, a bit rate of at least one of the subset of the program streams selected by the subscribers in the neighborhood of the client is dynamically decreased by adjusting encoding thereof, while maintaining adequate quality for the at least one of the subset of the program streams selected by the subscribers in the neighborhood of the client, based on an objective quality measure, in order to address the at least one of imminence and presence of the condition of inadequate bandwidth. |
US08813141B2 |
System and method of providing video content
A method of providing video content is disclosed that includes receiving video content associated with a television stream from a video source at a server of a video distribution network. The method also includes sending a primary multicast video stream corresponding to the video content to a video distribution network entity via an Internet Protocol (IP) network. The primary multicast video stream is associated with a first bandwidth. Further, the method includes sending a secondary multicast video stream to the video distribution network entity via the IP network. The secondary multicast video stream is associated with a second bandwidth. The primary multicast video stream and the secondary multicast video stream are accessible to a set-top box device via the video distribution network entity in response to a channel change request that indicates the television stream. In addition, the frames of the secondary multicast video stream may be delayed with respect to their counterparts in the primary multicast video stream. This insures that, after sufficient buffering of frames of the primary multicast video stream, when the set-top box device switches from the secondary multicast video stream to the primary multicast video stream there will be no noticeable time shift. |
US08813140B2 |
Content retrieval for digital media recorder devices
A computer receives broadcast content through a receiver and receives a request from a user to record a segment of broadcast content. The computer determines whether metadata associated with the segment of broadcast content includes a location from which the segment can be retrieved at a subsequent time. Responsive to determining that the metadata includes the location from which the segment can be retrieved, the computer records a first portion of the segment of broadcast content, the computer storing the first portion of the segment of broadcast content in a database. Responsive to a request to play the segment of broadcast content, the computer retrieves the first portion of the segment of broadcast content from the database and plays the first portion of the segment of broadcast content. The computer retrieves a remaining portion of the segment of broadcast content not previously recorded through a network connection. |
US08813134B2 |
Mobile device caller ID to smart TV devices
A method, performed by a mobile communication device, may include detecting a smart television device. The method may further include receiving an incoming telephone call, wherein the incoming telephone call includes caller identification information; providing the caller identification information to the smart television device; receiving an instruction on how to process the incoming call from the smart television device; and processing the incoming telephone call based on the received instruction. |
US08813128B2 |
Method and system for providing a multi-decoder based channel surfing service
Methods and systems for providing a multi-decoder based channel surfing service. One aspect provides a method of providing a multi-decoder based channel surfing service for a digital broadcasting system that is connected by a network to a broadcast receiver. This includes: extracting a video signal from each AV (audio/video) signal for a multiple number of broadcast channels; generating a first and a second channel-surfing video source using the multiple extracted video signals, where the first and second channel-surfing video sources include sub-videos for different broadcast channels; and transferring the first and second channel-surfing video sources and source configuration information regarding the first and second channel-surfing video sources to the broadcast receiver, with the broadcast receiver generating a channel-surfing screen by simultaneously decoding the first and second channel-surfing video sources by way of a first and a second decoder. |
US08813125B2 |
Method and apparatus for browsing using alternative linkbases
Systems and methods for navigating hypermedia using multiple coordinated input/output device sets. Disclosed systems and methods allow a user and/or an author to control what resources are presented on which device sets (whether they are integrated or not), and provide for coordinating browsing activities to enable such a user interface to be employed across multiple independent systems. Disclosed systems and methods also support new and enriched aspects and applications of hypermedia browsing and related business activities. |
US08813120B1 |
Interstitial audio control
A method executed on a processor for controls audio during playing of a video segment. The method includes receiving a request to play one or more main videos; noting a request for audio matching among the main videos and one or more interstitial videos; determining requested audio parameters for the audio matching; identifying a first interstitial in the main videos in which the interstitial videos may be served, the first interstitial in proximity to a first main video; locating one or more candidate interstitial videos to serve in the first interstitial by matching audio parameters of each of the candidate videos and audio parameters of at least the first main video; and selecting to serve in the first interstitial, one or more interstitial videos having a closest audio match to the first main video. |
US08813119B2 |
Method for inserting an advertising clip into a video sequence and corresponding device
The present invention relates to a method for processing pictures intended to insert an advertising clip at a point, called insertion, between two pictures of a sequence of video pictures, called video sequence, comprising the following steps: generating a salience map representing the salience of the video sequence preceding the insertion point, generating, for each advertising clip of a set of advertising clips, a salience map, determining, for each advertising clip of said set of advertising clips, a degree of similarity between the salience map of the video sequence and the salience map of said advertising clip, said degree of similarity being representative of the comparison between the location of the salience zones on both said maps, selecting, among said set of advertising clips, the advertising clip having the highest degree of similarity, and inserting the advertising clip selected into the video sequence at the insertion point. |
US08813117B1 |
Content subset conditional access framework
The invention provides secure playback on a client of a selected version of content with files downloaded from a corresponding package stored on a content server. The package includes a plurality of video and audio files for the available versions of the content. Each package of files includes a master manifest that lists the files included in the package. Also, each file listed in the master manifest includes a separate hash value. Separate packages include other video and audio files and other master manifests for available versions of other/different content. In at least one embodiment, one or more subset manifests are generated from the master manifest. Each subset manifest lists a portion of the files listed in the master manifest and the corresponding hash values for these files. |
US08813114B2 |
Video service blackout events
A method includes receiving, at a component of a multimedia content distribution system, a command including blackout information related to a first version of content. The blackout information includes scheduling information. The method includes updating a first entry within a control matrix based on the blackout information in response to the command. The first entry includes information related to when the first version of the content in a first stream is to be blacked out based on the scheduling information. The method also includes updating a second entry within the control matrix based on the blackout information in response to the command. The second entry includes information related to when the second version of the content in a second stream is to be blacked out based on the scheduling information. The method also includes sending a control stream based on the control matrix to one or more set top boxes. |
US08813108B2 |
Apparatus and method for providing preferred media programming
A system that incorporates teachings of the present disclosure may include, for example, identifying a first user initiating control of a media processor device, determining a startup media program according to one or more startup media preferences associated with the identified first user and one or more characteristics corresponding to the first user initiating control, and transmitting to a display device the startup media program derived from a media stream. Other embodiments are disclosed. |
US08813107B2 |
System and method for location based media delivery
A system and method for selecting and presenting media on a network to tune an environment to the tastes of the users within that environment, thus improving the experience of that location. A physical location of a media presentation device is received over a network. The physical location of a plurality of end users are identified via the network, wherein each of plurality of users associated are with a plurality of media files stored on the network. A least one of the end users that are within a defined proximity to the media presentation device are identified. At least one media file associated with the end users that are within a defined proximity to the media presentation device are identified and transmitted over the network to the media presentation device. |
US08813103B1 |
Methods and systems for handling component-object-model communications
A computer-implemented method for handling component-object-model communications. The method may include identifying a request to instantiate a component-object-model object through a remote-procedure-call process. The component-object-model object may be associated with an out-of-process component-object-model server registered in a first environment. The remote-procedure-call process may be running in a second environment with a different registry than the first environment. The method may also include allowing the remote-procedure-call process to access the first environment. Corresponding systems and computer-readable media are also disclosed. |
US08813099B2 |
Unified driving method and unified driver apparatus
The present invention provides a technical solution for a unified driver used in a handheld device. An embodiment of the technical solution may comprise a unified driving method used in a handheld device, which method may comprise: determining driver types of currently installed hardware; setting a current dispatch table on the basis of the driver type and a unified dispatch table suitable for multiple hardware and driving corresponding hardware or software by calling the current dispatch table. |
US08813098B2 |
Universal serial bus host controller driver over a network
A method to interact with a local USB device is disclosed. Messages are transmitted to a remote host controller driver from a host controller associated with the local USB device. Messages are received from the remote host controller driver for the host controller. In some embodiments, a transfer descriptor prototype is received from the remote host controller driver. A completed transfer descriptor is received from the remote host controller driver. The completed transfer descriptor and the transfer descriptor prototype are transformed into a modified transfer descriptor in part by using a collection of rules. The modified transfer descriptor is submitted to the local host controller without intervention from the remote host controller driver. |
US08813097B2 |
Predicting the impact of change on events detected in application logic
A search facility is used to predict the impact of change on events detected in application logic, where the change may involve a computing resource used by or referenced by the application logic and/or by event detection logic. The search may be performed prior to making a change, in order to judge potential impact of the change, or after the change has been made. The search makes the prediction by evaluating semantics of conditions that specify when and/or and how an event will be detected at run-time. |
US08813094B2 |
Input management system and method
The present invention is directed to a method, medium and system for use in a computing environment for managing input information. The system for facilitating input management in a computerized environment may include an input manager for processing events received from an input provider. The system may additionally include a staging area including a stack of events created by the input manager. The staging area allows access by external components. The external components may include a set of filters capable of accessing and manipulating the stack of input events and a set of monitors capable of monitoring manipulation of the stack of events. |
US08813093B2 |
Integration of disparate applications on a network
A system implementable in a network including a plurality of electronic devices coupled to each other via a communication medium includes a consumer configured to advertise at least one characteristic of the consumer. The system further includes a producer configured to initiate the creation of an event-channel by a core services element and provide a service to the consumer based on the at least one characteristic. |
US08813091B2 |
Distribution data structures for locality-guided work stealing
A data structure, the distribution, may be provided to track the desired and/or actual location of computations and data that range over a multidimensional rectangular index space in a parallel computing system. Examples of such iteration spaces include multidimensional arrays and counted loop nests. These distribution data structures may be used in conjunction with locality-guided work stealing and may provide a structured way to track load balancing decisions so they can be reproduced in related computations, thus maintaining locality of reference. They may allow computations to be tied to array layout, and may allow iteration over subspaces of an index space in a manner consistent with the layout of the space itself. Distributions may provide a mechanism to describe computations in a manner that is oblivious to precise machine size or structure. Programming language constructs and/or library functions may support the implementation and use of these distribution data structures. |
US08813088B2 |
Scheduling flows in a multi-platform cluster environment
Techniques for scheduling multiple flows in a multi-platform cluster environment are provided. The techniques include partitioning a cluster into one or more platform containers associated with one or more platforms in the cluster, scheduling one or more flows in each of the one or more platform containers, wherein the one or more flows are created as one or more flow containers, scheduling one or more individual jobs into the one or more flow containers to create a moldable schedule of one or more jobs, flows and platforms, and automatically converting the moldable schedule into a malleable schedule. |
US08813087B2 |
Managing a workload in a cluster of computing systems with multi-type operational resources
Determining an equivalent capacity (ECP) of a computing system comprising multi-type operational resources. The multi-type operational resources comprises at least one general type of resources and at least one specialized type of resources Parameters characteristic of the performance of the system is determined. Assignment of work units to the various resources subject to pre-defined constraints is simulated. Utilization of said general type of resources of the computing system when executing the work units is calculated. |
US08813085B2 |
Scheduling threads based on priority utilizing entitlement vectors, weight and usage level
An embodiment or embodiments of an information handling apparatus can use an entitlement vector to simultaneously manage and activate entitlement of objects and processes to various resources independently from one another. An information handling apparatus can comprise an entitlement vector operable to specify resources used by at least one object of a plurality of object. The information handling apparatus can further comprise a scheduler operable to schedule a plurality of threads based at least partly on entitlement as specified by the entitlement vector. |
US08813084B2 |
Broadcast receiving apparatus and scheduling method thereof
A broadcast receiving apparatus and scheduling method thereof are provided. The broadcast receiving apparatus includes: a communication interface which performs an input-output operation of the broadcast receiving apparatus in response to a request for an input-output event from at least one of the plurality of operating systems; and a controller which processes the requested input-output event according to a priority given to the operating system that has requested the input-output event. |
US08813082B2 |
Thread priority based on object creation rates
A method and apparatus for managing thread priority based on object creation rates. Embodiments of the invention provide a thread monitor configured to reduce the execution priority of a thread creating a sufficient number of new objects to be disruptive of system performance. Thus, although the thread may still create a large number of objects, by monitoring object creation rates and reducing the execution priority of such a thread, overall system performance may be improved. In other words, a given thread may still “misbehave,” but receive fewer opportunities to do so. |
US08813079B1 |
Thread management to prevent race conditions in computer programs
Recording and replaying computer programs includes state synchronization and thread management techniques that facilitate accurately replaying the recorded execution of a multithreaded application program. |
US08813074B2 |
Detecting and correcting network interruptions using network address translation
Embodiments provide a network address translation (NAT) service for network devices. A network connection from at least one private network device to the NAT service is received and a network connection from at least one remote device to the NAT service is received. The private network device is positioned within a private network and the remote device is positioned within a public network. A network availability of the remote device is determined. If the remote device is unavailable or a network configuration setting associated with the remote device changes, the private network device is notified and a connection reset message is transmitted to the private network device. |
US08813067B2 |
One click deployment
Techniques are provided for deploying applications hosted by an application service provider. An application in a first environment is automatically deployed to a second environment in response to receiving a request over a network from the party for whom the second environment is being hosted. The first environment may be an environment where applications are developed by the party over the network. Deployment of the application may entail provisioning of an environment for the application. |
US08813066B2 |
Multi-component software application installation facility
A method is presented for installing a software application on a data processing system that may include multiple data processing entities. The software application may include multiple components for installation on one or more of the entities. The method may include providing input information for each of the components designated for installation. Each component may then be installed according to its corresponding input information, and output information corresponding to each component may be generated. This output information may be provided to one or more data processing entities identified for installation of a subsequent component. The input information corresponding to the subsequent component may be at least partially determined from this output information. |
US08813065B2 |
Microcloud platform delivery system
A cloud computing environment with the ability to deploy a web application that has been developed using one of a plurality of application frameworks and is configured to execute within one of a plurality of runtime environments can be delivered as a self-contained virtual machine disk image configured to launch in a virtualization environment. Upon request (or alternatively, in a pre-processing phase), a cloud computing platform provider can compose a virtual machine disk image comprising the cloud computing environment. The virtual machine disk image may be attached to any virtual machine, whether running on a personal computing device such as a laptop or in an infrastructure-as-a-service service provider to provide a cloud computing environment that is automatically configured to receive and deploy a web application. |
US08813064B2 |
Image forming apparatus, service system and method of installing open services gateway initiative (OSGI)-based service
A method of installing an Open Services Gateway initiative (OSGi)-based service, the method including: accessing characteristic information associated with an OSGi bundle; generating a virtual Java Archive (JAR) file using the accessed characteristic information; and installing the generated virtual JAR file on an OSGi framework. Accordingly, there is no need to generate a separate JAR file, and user convenience is thus increased. |
US08813059B2 |
Display apparatus with memory storing firmware and network system including display apparatus
A display apparatus is provided. The display apparatus includes a selection control unit which is configured to allow a user to input an operation for selecting one language from among a plurality of languages, a display control unit which is configured to display a specific character string corresponding to the selected language on a display unit, a download control unit which is configured to download first firmware corresponding to the selected language without downloading firmware corresponding to a language other than the selected language in a first case where new firmware is to be downloaded, and a storage control unit which is configured to store the first firmware in a memory. |
US08813058B2 |
Realtime tracking of software components
The disclosure is for run-time accessing a software component is provided, together with a computer system embodying the same, and a software utility directing the method. Initially a software component is loaded and analyzed to identify one or more features thereof, which features are checked against a database. Following the check, the component is classified as one of at least first, second, and third component types. A first component type is run without amendment. A second component type is replaced by a component of equivalent functionality prior to running. A third component type is blocked from running. |
US08813053B2 |
Systems and methods for improved parallel ILU factorization in distributed sparse linear systems
Systems and methods for parallel incomplete LU (ILU) factorization in distributed sparse linear systems, which order nodes underlying the equations in the system(s) by dividing nodes into interior nodes and boundary nodes and assigning no more than three codes to distinguish the boundary nodes. Each code determines an ordering of the nodes, which in turn determines the order in which the equations will be factored and the solution performed. |
US08813052B2 |
Cache metadata for implementing bounded transactional memory
Various technologies and techniques are disclosed for providing a bounded transactional memory application that accesses cache metadata in a cache of a central processing unit. When performing a transactional read from the bounded transactional memory application, a cache line metadata transaction-read bit is set. When performing a transactional write from the bounded transactional memory application, a cache line metadata transaction-write bit is set and a conditional store is performed. At commit time, if any lines marked with the transaction-read bit or the transaction-write bit were evicted or invalidated, all speculatively written lines are discarded. The application can also interrogate a cache line metadata eviction summary to determine whether a transaction is doomed and then take an appropriate action. |
US08813050B2 |
Electronic crime detection and tracking
A system for electronic crime reduction is provided, comprising a computer system, a database, a malware de-compiler, a malware parser, and an inference engine. The database contains information that associates electronic crime attack signature data with at least one of an individual, a group, and a location. The malware de-compiler, when executed on the computer system, translates a first malware executable to an assembly language version. The first malware is associated with an electronic crime that has been committed. The malware parser, when executed on the computer system, analyzes the assembly language version to identify distinctive coding preferences used to develop the first malware. The inference engine, when executed on the computer system, analyzes the distinctive coding preferences identified by the malware parser application in combination with searching the database to identify one of an individual, a group, and a location associated with the electronic crime. |
US08813047B2 |
Yet another transformation language (YATL)
A practical language for writing analysis and transformation tools for C/C++ and other languages is provided. This language, YATL, is imperative in style and designed to be easy to use for someone familiar with the grammar of the target language. It allows the developer to describe transformations with reference to elements of the target grammar through a pluggable personality to a compiler. This provides the means for powerful, yet easy to write, transformation programs, while fundamentally remaining language agnostic. |
US08813046B2 |
System and method for internationalization encoding
A system and computer-implemented method for transforming source code in an original natively encoded format to a locale neutral format, wherein data types and functions in the original format are estimated for compliance with the locale neutral format and an estimation is made as to the amount of code conversions necessary to comply with the locale neutral format. In addition, image files referenced by the source code is analyzed and embedded text extracted for enabling translation during the localization process. |
US08813043B2 |
Unifying type checking and property checking for low level programs
This document describes a unified type checker and property checker for a low level program's heap and its types. The type checker can use the full power of the property checker to express and verify subtle, program specific type and memory safety invariants well beyond what the native low level program system can check. Meanwhile, the property checker can rely on the type checker to provide structure and disambiguation for the program's heap, enabling more concise and more powerful type-based specifications. This approach makes use of a fully automated Satisfiability Modulo Theories (SMT) solver and a decision procedure for checking type safety, which means that the programmer's only duty is to provide high-level type and property annotations as part of the original program's source. |
US08813041B2 |
Efficient compression of applications
In one embodiment, a method for inserting advertising into an application includes removing first application code from a first input executable file and placing it into an output executable file, wherein the first application code represents code part of the application. Then a first set of proxies is inserted into the first input executable file, wherein the first set of proxies, when run, makes calls to the first application code. Second application code is added into the output executable file, wherein the second application code represents code executable to display the advertising. The output executable file is compressed. Then, the first input executable file and the output executable file are provided to a device such that the device may load and execute the files. |
US08813040B2 |
Methods and systems for reporting on build runs in software development
A method for reporting build runs includes: obtaining code changes for a software product; identifying the code change as affecting a work item of a software product under development, the work item specifies a feature to be added to or a defect to be removed from the software product; generating (i) a plurality of build runs of the software product, respective build runs corresponding to one or more code changes; and (ii) data associating the work item with one or more build runs that each correspond to at least one of the one or more code changes specified as involving the work item; receiving a user input selecting the work item; and in response to the user input, displaying respective identifiers of at least one build run of the one or more build runs associated with the work item, including presenting an identifier of the at least one build run. |
US08813038B2 |
Data race detection
The claimed subject matter provides a method for detecting a data race. The method includes inserting a plurality of breakpoints into a corresponding plurality of program locations. Each of the program locations accesses a plurality of memory locations. Each of the program locations is selected randomly. The method also includes detecting one or more data races for the memory locations in response to one or more of the breakpoints firing. Additionally, the method includes generating a report describing the one or more data races. |
US08813032B2 |
Customizing synchronization of custom code among multiple programmable hardware elements within a system
Customizing a target system. The target system may include a first device with a first programmable hardware element (PHE) and a second device with a second PHE. Synchronization modules may be provided for implementation on the first and second PHEs. The synchronization modules may provide a standard interface for interacting with other code. A user may specify user-created code for the first and second PHEs which utilizes the synchronization modules. The user-created code may interact with the synchronization modules using the standard interface. Accordingly, hardware descriptions may be generated for the first and second PHEs of the target system. Different modules may be used for different interconnects. Additionally, multiple synchronization modules may be used, e.g., dynamically, during operation of the target system. |
US08813030B2 |
Detecting plug-in and fragment issues with software products
Detection of various issues with plug-ins and fragments corresponding to a software product as part of an automated quality engineering investigation is provided. In order to determine whether any issues are present, information pertaining to each plug-in and fragment is analyzed. The information can be stored in a corresponding manifest for the plug-in and fragment, and can include version information and dependency information for the corresponding plug-in and fragment. The issues can include an error relating to the manifest, an error relating to the version information, an error relating to the dependency information, and/or the like. |
US08813028B2 |
Mobile application creation system
A computer implemented method and system for creating a mobile application provides a mobile application development software (MADS) and pre-coded software components (PCSCs) encapsulated in a mobile application creation interface (MACI). The MADS dynamically maps data to be rendered in the mobile application with one or more data sources and launches the MACI. The MADS creates one or more composite software components (CSCs) by combining more than one of distinct software components selected from component sources and/or the PCSCs. The MADS inserts one or more PCSCs and/or CSCs into the MACI. The MADS generates one or more recommendations for adding one or more characteristic objects associated with the mobile application. The MADS creates the mobile application using the inserted PCSCs, the created composite software components, the recommendations, the dynamically mapped data, and/or an adaptively configured application programming interfaces that facilitate backend integration of the mobile application with the user device. |
US08813027B2 |
Static type checking against external data sources
Static type checking is performed against external data sources in an interacting editing environment. A rich editing experience can be provided to users for external data equivalent to that provided for internal static, typed data. An extensible compiler is provided so that a user or third party can extend type checking facilities to any external data source. An extensible language service is provided so that a user or third party can extend the language service to provide a consistent, current static view of external data. The extensible compiler and language service allow language extensions to plug into the type checking process. This enables the compiler and language service to provide an extension point that allows extensions of the compiler and allow the language service to render dynamic information statically. |
US08813026B1 |
Methods and apparatus for storing information for components of a system in model component files to provide a world view of the system
Method and apparatus for representing data for components of a system in respective model components, generating model sub components from model components for at least some of the system components, and accumulating information from the model components and model sub components to determine a world view of the system. In one embodiment, model components can be updated during system operation. |
US08813025B1 |
Customer impact predictive model and combinatorial analysis
Systems and methods for objective Deployment Failure risk assessments are provided, which may include fault trees. Systems and methods for the analysis of fault trees are provided as well. The risk assessments system may involve the development of a fault tree, assigning initial values and weights to the events within that fault tree, and the subsequent revision of those values and weights in an iterative fashion, including comparison to historical data. The systems for analysis may involve the assignment of well-ordered values to some events in a fault tree, and then the combination those values through the application of specialized, defined gates. The system may further involve the revision of specific gates by comparison to historical or empirical data. |
US08813022B2 |
Aggregating business analytics architecture and configurator
A computer implemented method, a data processing system, and a computer program product are provided for designing an architectural solution. Functional requirements and nonfunctional requirements of the architectural solution are received. Responsive to receiving the functional requirements and nonfunctional requirements, first level outputs are produced. Further input is received through a guided questionnaire based on the first level outputs. Responsive to receiving the further input, a list of client specific components and subcomponents, a client specific solution reference architecture, and a set of reference links is produced. |
US08813020B2 |
Automatically modifying a circuit layout to perform electromagnetic simulation
A system and method for automatically modifying a first layout of a circuit. The first layout may describe a plurality of layers used in a fabrication process to manufacture the circuit. When performed, the fabrication process may result in a vertical electrical connection between two of the layers. However, the vertical electrical connection may not be directly specified by the first layout. The system and method may operate to apply a set of rules to the first layout to automatically generate a modified layout directly specifying a vertical electrical connection between the two layers. The set of rules may be based on knowledge of the fabrication process, and may be designed to modify the geometry of the first layout to more closely model the real geometry of the circuit that will result from the fabrication process. The modified layout may enable an electromagnetic (EM) simulation of the circuit to be accurately performed. |
US08813017B2 |
Gate modeling for semiconductor fabrication process effects
In one embodiment, a method for determining a contour simplification of an object for a simulation is provided. An object in a layout of a transistor design to be created with the photolithographic process is determined. The object includes a width and a length in the layout. A contour simulation is performed to determine a generated contour object. The contour simulation simulates parametric variation factors that may occur in the photolithographic process. An adjusted width and adjusted length of the object is then determined based on the generated contour object. The adjusted width and the adjusted length are usable to determine a parametric model for simulation of the object. For example, a layout versus schematic (LVS) tool may back-annotate the layout. Then, a SPICE simulation may use the output of the LVS tool to verify the electrical behavior of the transistor using the adjusted width and adjusted length. |
US08813016B1 |
Multiple via connections using connectivity rings
Among other things, one or more techniques and/or systems for performing design layout are provided. In an example, a design layout corresponds to a layout of a standard cell whose connectivity is described by a netlist. For example, the netlist specifies net types for respective vias of the standard cell. One or more connectivity rings are formed within the design layout to provide connectivity for one or more vias of the design layout. For example, a first connectivity ring is generated, such as from mandrel, to connect one or more ring one vias. A second connectivity ring is generated, such as from passive pattern, to connect one or more ring two vias. One or more cuts are generated within the design layout to isolate vias having different net types. In this way, the design layout is self-aligned double patterning (SADP) compliant. |
US08813011B2 |
Clock-reconvergence pessimism removal in hierarchical static timing analysis
A system and a method are disclosed for performing clock re-convergence pessimism removal (CRPR) during hierarchical static timing analysis (HSTA). A clock network is divided into a plurality of blocks. A top level includes clock components not included in the plurality of blocks. Block level analysis is performed to determine timing information for each of the plurality of blocks. If available, CRPR data from top level analysis is accounted for in block level analysis. Subsequently, similar analysis is performed on components that are included in top level analysis. If available, CRPR data from bottom level analysis is accounted for in top level analysis. CRPR data can be requested during levels of analysis from the other level. These steps are repeated until analysis is complete. |
US08813006B1 |
Accelerated characterization of circuits for within-die process variations
In one embodiment of the invention, a method for electronic circuit design is disclosed. The method includes analyzing a netlist of a subcircuit to determine one or more input pins and one or more output pins; forming an arc graph of the subcircuit including one or more timing arcs between the one or more input pins and the one or more output pins; and reducing the number of transistors to perturb to perform a sensitivity analysis for within die process variations over the one or more timing arcs to reduce the number of simulations to characterize the subcircuit. |
US08813005B1 |
Debugging using tagged flip-flops
Approaches for testing a module of a circuit design include tagging flip-flops in a netlist of the module with respective path names of the flip-flops from a hardware description language specification of the module. In simulating with the netlist, event data are captured to a first file. A process determines whether or not event data in the first file matches event data in a second file of event data. In response to a difference determined between the first file and the second file, an earliest occurrence of an event in the first file having an associated signal value of a first signal that does not match an associated signal value of a corresponding event in the second file is determined. The one of the plurality of flip-flops that output the first signal is determined, and the respective path name of the one flip-flop is output. |
US08813002B2 |
Circuit board design support program, design support method, and design support apparatus
The embodiment is a non-transitory computer readable storage medium storing a design support program which causes a computer to generate design data for a circuit board in which elements are placed. The program causes the computer to perform: storing, in response to an operation input, operation information in an operation storage section; storing a function of a program executed based on the operation input in a function history storage section; upon detection of an operation of a command causing the computer to execute a predetermined function for generating the design data, acquiring a selected element and storing the selected element in an element information storage section; and detecting an abnormal end of the predetermined function to output the function of the program in the function history storage section, the operation information in the operation information storage section, and the element in the element information storage section to a log file. |
US08813001B2 |
System and method for efficient and optimal minimum area retiming
A method for use in electronic design software efficiently and optimally produces minimized or reduced register flip flop area or number of registers/flip flops in a VLSI circuit design without changing circuit timing or functionality. The method dynamically generates constraints; maintains the generated constraints as a regular tree; and incrementally relocates registers/flip flops and/or the number of registers/flip flops in the circuit design. |
US08813000B2 |
System for designing substrates having reference plane voids with strip segments
Manufacturing circuits with reference plane voids over vias with a strip segment interconnect permits routing critical signal paths over vias, while increasing via insertion capacitance only slightly. The transmission line reference plane defines voids above (or below) signal-bearing plated-through holes (PTHs) that pass through a rigid substrate core, so that the signals are not degraded by an impedance mismatch that would otherwise be caused by shunt capacitance from the top (or bottom) of the signal-bearing PTHs to the transmission line reference plane. In order to provide increased routing density, signal paths are routed over the voids, but disruption of the signal paths by the voids is prevented by including a conductive strip through the voids that reduces the coupling to the signal-bearing PTHs and maintains the impedance of the signal path conductor. |
US08812999B2 |
Method and system of mask data preparation for curvilinear mask patterns for a device
A method comprises: (a) transforming a layout of a layer of an integrated circuit (IC) or micro electro-mechanical system (MEMS) to a curvilinear mask layout; (b) replacing at least one pattern of the curvilinear mask layout with a previously stored fracturing template having approximately the same shape as the pattern, to form a fractured IC or MEMS layout; and (c) storing, in a non-transitory storage medium, an e-beam generation file including a representation of the fractured IC or MEMS layout, to be used for fabricating a photomask. |
US08812989B1 |
Displaying thumbnails
A system and machine-implemented method for displaying thumbnails includes receiving thumbnail data corresponding to plural thumbnails. The plural thumbnails are displayed within a display area. A viewing component is displayed within the display area. The viewing component moves within the display area. Differentiated display of at least one of the thumbnails relative to the remaining plural thumbnails is provided, based on the movement of the viewing component. |
US08812983B2 |
Automatic magnification and selection confirmation
According to one disclosed embodiment, an approach is provided in which a user input is detected at a first location on a display screen, such as a finger selection on a touch-enabled display screen. A number of visual controls that are proximate to the detected location are identified. A magnification interface is then displayed that includes a larger rendition of the visual controls. |
US08812982B2 |
Targeting questions to users of a social networking system
Users of a social networking system post questions for other users to answer. Questions are automatically tagged based on keywords extracted from text within the posted questions as well as user-selected tags. Users also browse questions asked by other users on the social networking system using an interface that displays questions by topics and sub-topics. Answers may be voted on and sorted by social information related to the browsing user. Affinities for tags are recorded based on users' interactions with the question and answer service. Affinities for tags may also be used to target questions to other users and sort answers. |
US08812981B1 |
Methods and apparatus to conditionally display icons in a user interface
A method of conditionally displaying an icon to indicate a status within a user interface as part of a media presentation system is described. An example method includes updating a status of content within the media presentation system, displaying at least one icon within a guide menu containing one or more menu sections with each menu section containing a plurality of menu layers, and displaying the icon within a first menu layer to indicate the status of content within menu layers associated with the first menu layer. |
US08812976B2 |
Programmable equipment configuration method and apparatus
A computer-implemented method, system, and computer readable medium for configuring programmable equipment having hardware devices that can be programmatically interconnected into different hardware configurations. A graphical user interface is provided on a computer display which permits a user to iconically define both a hardware and procedural configuration of the available hardware devices. Configuration data is generated that can be used to automatically configure the programmable equipment according to the user-defined hardware and procedural configuration. |
US08812971B2 |
System for providing strategies to reduce the carbon output and operating costs of a workplace
A system is described for providing strategies to reduce the carbon output and operating cost of a workplace. The system may include a memory, interface, and processor. The memory may store an initial configuration of a workplace and workplace initiatives. The initial workplace configuration may include equipment and travel data items, and each workplace initiative may be associated with a data item and may provide a strategy for reducing the carbon output of the associated data item. The processor may receive the initial configuration from the user and provide workplace initiatives to the user. The processor may receive a selection of an initiative from the user. The processor may process the initial workplace configuration and selected initiative to determine a recommended configuration capable of reducing the carbon output of the data item associated with the selected initiative. The processor may provide the recommended configuration to the user. |
US08812970B2 |
Dynamic device state representation in a user interface
Processes for presenting a current state of a device having device storage connected with a host system are provided. In some processes, device manufacturers or vendors define a set of operational states of a device and provide user interface (UI) elements of a custom representation of each state through information stored in the device storage. Initially, the set of states of the device and UI elements associated with each state are received from the device storage. Information regarding a current state is received from the device, and a representation of the current state, which includes the received UI elements, is presented on the host system. In other processes, UI elements of a representation of each state are obtained from a remote system using device identification information. In other processes, UI elements from the device, from the host system, and/or from a remote system are combined to form a state representation. |
US08812969B2 |
Methods for authoring and interacting with multimedia representations of documents
A method, apparatus and article of manufacture for assisting a user with authoring a multimedia representation of documents. In one embodiment, the method comprises displaying one or more visual, audible, or audiovisual document elements from an input document in graphical user interface; and selecting one or more elements and for inclusion in a multimedia representation. |
US08812967B2 |
Enabling a user to have a custom desired experience while accessing an electronic file
An aspect of the present invention enables a user to have a custom desired experience while accessing electronic files. A digital processing system provides the user the ability to define an experience profile with experience profile containing experience attributes. The user may be provided the ability to associate an experience profile with the electronic file. The digital processing system then controls the experience attributes to create a custom defined experience. As a result, two different electronic files (accessed using a single application) may be associated with two different experience profiles. In addition, experience attributes rooted in dissimilar applications may also be included in an experience profile. |
US08812965B2 |
Creation and publishing of virtual components
A method for use in CAD modeling software to define product structure based on virtual components created independent from geometry and without the need to create files on disk. With the additional capability of assigning geometry to the virtual components of the product structure that sets and orients the virtual components and manages multiple occurrences of like components. Further, the virtual component are published into real components with automatic 3D file creation completed. |
US08812958B2 |
Methods and apparatus for analyzing a social network
Techniques are disclosed for analyzing a social network having a plurality of members, each member having declared a connection with each of one or more other members of the social network. Exemplary techniques include monitoring activity performed by members on the social network, the monitored activity including actions other than the declaring and undeclaring of connections between members. A graphical representation of at least a portion of the social network may be computed to include at least one indication of the monitored activity. |
US08812956B1 |
Video curation platform with pre-roll advertisements for discovered content
A video curation platform displays curated video channels in the form of markup language pages. A page delivered to client machine includes thumbnails of video content that an end user may select and view. The markup language page includes a first container for supporting a first media player, and a second container for supporting a third party media player that is embedded from a content source. The containers are aligned, one in front of the other. The markup language page also includes control logic adapted to be executed in hardware at a client machine when an end user selects video content to be viewed (i) to render first content in the first media player, (ii) upon completing the first content, to automatically hide the first media player and reveal the third party media player; and (iii) to render the video content in the third party media player. |
US08812955B2 |
Information processing method and apparatus and information processing program
A hierarchical hysteresis menu area is such an area in which the hysteresis information from the hysteresis of past operations up to the current hierarchical layer is displayed responsive to an operation on an operating unit and in which selection by a user is made using the operating unit. As the hierarchy progresses, new rows such as “Top Menu”, “ . . . Menu A”, “ . . . Menu A-1” are created progressively, until the current layer [ . . . menu A-1 “ . . . menu A-1”] is demonstrated as the lowermost layer. Indents and marks are used to denote a hierarchical structure. If a cursor is moved by an operating unit to decide on a certain selected layer, reversion may be made directly to the layer. The current menu area indicates the item of the current layer. A folder mark is displayed for a menu having a further lower item. The current hierarchical layer is indicated in this manner in the operating menu system of a hierarchical structure employing a user interface device. |
US08812951B1 |
Publisher formatting controls
Content providers may specify special formatting instructions to manage formatting of content that is ultimately displayed by electronic devices. The formatting instructions may include formatting that is not apparent from an original format of the content. The formatting instructions from a content provider may override default formatting that is used by a viewing application on the electronic device or a host (intermediary) that formats the content for the electronic device, which would otherwise control a format of the content. The formatting instructions may be based on attributes of the electronic devices, such as display size, display type, etc. By enabling content providers to specify these special formatting instructions, the content providers may retain control of an ultimate look and function of the content when the content is formatted for a particular electronic device. |
US08812949B2 |
System and method for automatically detecting and extracting semantically significant text from a HTML document associated with a plurality of HTML documents
A system and method for automatically detecting and extracting semantically significant text from a HTML document associated with a plurality of HTML documents is disclosed. The method may include receiving a HTML document, parsing the HTML document into a parse tree, segmenting the parse tree into one or more segments of one or more unique paths, processing the one or more segments based at least the HTML document, and extracting one or more processed segments from the at least the HTML document based on a predetermined number. |
US08812948B2 |
Systems and methods for automatic submission of forms for web-based legal workflow software
Systems and methods for automatically submitting data entered into a web page in the event the user shifts focus away from the form may include displaying a web page to a user, the web page containing a form; receiving, from the user, at least some input corresponding to the form; detecting that the form has lost user focus; and submitting, in response to the detection, the form. |
US08812942B2 |
Interleaving apparatuses and memory controllers having the same
An interleaving apparatus may include a first buffer unit configured to buffer input data in units having a size of a sector to generate sector unit data, an encoding unit configured to encode the sector unit data and generate a plurality of parity codes based on the encoding, a second buffer unit configured to interleave the sector unit data and the parity codes and generate interleaving data based on the interleaving, the second buffer unit including a plurality of output buffers configured to store the interleaving data, and an output unit configured to output the interleaving data. |
US08812939B2 |
Soft decoding systems and methods for flash based memory systems
Systems and methods for decoding data using a decoder that includes a primary decoder and an auxiliary decoder are provided. A codeword is retrieved from a storage device. A primary decoder attempts to decode the codeword using hard data associated with the codeword. If the primary decoder fails, an indication of the failure may be received by a decoder controller, which activates an auxiliary decoder. The auxiliary decoder attempts to decode the codeword using either hard data or soft data associated with the codeword. The primary decoder is designed to consume less power, consume less silicon area, and have a higher throughput than the auxiliary decoder. The primary decoder is configured to have a higher probability of successfully decoding a codeword, stored in the storage device, in the first attempt to decode the codeword, than failing and requiring the auxiliary decoder to decode the codeword. |
US08812937B2 |
Method for improving the acquisition of a data set transmitted repeatedly in a difficult environment
A method is provided for improving the acquisition of a data set transmitted repeatedly in a difficult environment, which is particularly appropriate to satellite radionavigation systems. The main characteristic of the method is to provide “contextual” aid relating to the transmitted data by indicating the nature and the possible updating of these data so that the receiver can accumulate the energy when the data are repeated in an identical manner. These aid data being short, it is possible to obtain good quality of reception and protection of this aid by virtue of its longer coding than that of the data. |
US08812934B2 |
Techniques for storing bits in memory cells having stuck-at faults
A data storage system includes a memory circuit comprising memory cells and a control circuit. The control circuit generates a first set of redundant bits indicating bit positions of the memory cells having stuck-at faults in response to a first write operation if a first rate of the stuck-at faults in the memory cells is greater than a first threshold. The control circuit is operable to encode data bits to generate encoded data bits and a second set of redundant bits that indicate a transformation performed on the data bits to generate the encoded data bits in response to a second write operation if a second rate of stuck-at faults in the memory cells is greater than a second threshold. The encoded data bits stored in the memory cells having the stuck-at faults match digital values of corresponding ones of the stuck-at faults. |
US08812929B1 |
Detecting insertion/deletion using LDPC code
Systems and methods are provided that use LDPC codes to determine the locations of insertions or deletions within bit-strings of information transmitted through communication channels and which notify a LDPC decoder of the locations of the insertions or deletions prior to the start of the decoding process. The use of such systems and methods, according to this disclosure, may improve LDPC decoder performance by reducing errors cause by insertions and/or deletions. The use of such systems and methods, according to this disclosure, may also provide improved application performance and larger data transmission rates. |
US08812928B2 |
Memory device and memory control unit
A memory device is configured to generate a signal having a temperature compensation function. The device includes a mode register configured to store error detection and correction (EDC) mode data, and an EDC pattern generator configured to receive pattern information and period information included in the mode data and to generate an EDC pattern signal based on the pattern information and the period information. The EDC pattern signal is a periodic signal obtained by repeating a signal pattern based on the pattern information at a periodic rate corresponding to a signal period based on the period information. In some cases, the EDC pattern signal may be disabled during a portion of the signal period. |
US08812925B2 |
Method of an uplink harq operation at an expiry of time alignment timer
Disclosed is the radio (wireless) communication system providing a radio communication service and the terminal, and more particularly, to a method of an uplink HARQ (Hybrid Automatic Repeat reQuest) operation at an expiry of time alignment timer in an Evolved Universal Mobile Telecommunications System (E-UMTS) evolved from the Universal Mobile Telecommunications System (UMTS) or a Long Term Evolution (LTE) system. |
US08812922B2 |
Speeding up defect diagnosis techniques
Fault diagnosis techniques (e.g., effect-cause diagnosis techniques) can be speeded up by, for example, using a relatively small dictionary. Examples described herein exhibit a speed up of effect-cause diagnosis by up to about 160 times. The technologies can be used to diagnose defects using compacted fail data produced by test response compactors. A dictionary of small size can be used to reduce the size of a fault candidate list and also to facilitate procedures to select a subset of passing patterns for simulation. Critical path tracing can be used to handle failing patterns with a larger number of failing bits, and a pre-computed small dictionary can be used to quickly find the initial candidates for failing patterns with a smaller number of failing bits. Also described herein are exemplary techniques for selecting passing patterns for fault simulation to identify faults in an electronic circuit. |
US08812917B2 |
Method and device for row and column interleaving of blocks of variable size
The present disclosure relates to a method for interleaving a stream of input data blocks, the method comprising steps of: subdividing a block into sub-blocks of fixed size in number of data rows and data columns, the sub-blocks being distributed in the block in rows of sub-blocks and in columns of sub-blocks, transferring the data contained in the block into a first memory, while respecting the order of the data in the input stream, transferring the data contained in the block by row of sub-blocks, into a second memory in which the data of each sub-block is accessible from the address of the sub-block, transferring the data of each sub-block by column of sub-blocks, from the second memory into a third memory, by putting back the data of each sub-block in data rows and columns, and transferring the data by data column from the third memory into an output stream. |
US08812913B2 |
Method and apparatus for isolating storage devices to facilitate reliable communication
A method for maintaining reliable communication on a link between an expander and a storage device is provided. The method includes detecting, by a processor coupled to the link, an error corresponding to the link, and maintaining a count of detected errors for the link, by the processor. The method also includes determining, by the processor, if the count of detected errors is above a first error threshold. If the count of detected errors is not above the first error threshold, then the method repeats the detecting, maintaining, and determining steps. If the count of detected errors is above the first error threshold, then the method provides the processor placing the storage device into a segregated zone. |
US08812912B2 |
Detecting system component failures in a computing system
Detecting system component failures in a computing system, including: detecting, by an illumination detector, the occurrence of an illumination event in the computing system; determining, by an illumination event identifier, whether the illumination event is associated with a suspected component failure in the computing system; and sending, by a notification system, a failure event notification upon determining that the illumination event is associated with a suspected component failure in the computing system. |
US08812911B2 |
Distributed testing of a software platform
A system includes a platform server with a software platform on which platform targeting applications (PTAs) execute. An update server may be coupled to the platform server to provide an update to this software platform. Responsive to notification to independent software vendors of the PTAs, results of regression testing performed on at least some of the PTAs can be received in a test server, which may enable commitment of the update based on at least some of the results. |
US08812910B2 |
Pilot process method for system boot and associated apparatus
A pilot process method for system boot and an associated are provided. An environment variable is read from a NAND flash memory. When an irrevocable error exists in an environment variable, the environment variable is read successively for a predetermined threshold number of times. A backup variable of the environment variable is read when the irrevocable error is still present in the environment variable that is read for a predetermined threshold number of times, and the environment variable is restored according to the backup variable. Therefore, when it is confirmed that the environment variable is damaged, a backup variable is utilized and the damaged environment variable is restored according to the backup variable, so as to ensure a normal boot-up process of the system to significantly enhance system reliability as well as user experience. |
US08812909B2 |
Remedying identified frustration events in a computer system
A data processing system comprising: a constantly updating database of a plurality of processes having a plurality of operation times, relating to a plurality of applications, relating to at least one user activity, and using a plurality of computing resources; a monitor arranged to identify a plurality of clashes between the processes, a plurality of frustration events and to correlate between the frustration events and the clashes between the processes; a cause identifier arranged to identify, for each frustration event, a cause for the correlated clash of processes; a remedy generator arranged to generate, for each cause, a remedy arranged to solve the frustration event; a communication module arranged to provide the remedies to users in relation to respective user activities in view of their frustration events; and an analyzer arranged to monitor an efficacy of the remedies in respect to their corresponding frustration events. |
US08812905B2 |
Self-repairable semiconductor and method thereof
A semiconductor device includes a plurality of processors and a spare processor configured to perform respective processing functions. A plurality of first switches is located at respective inputs of the plurality of processors. Each of the plurality of first switches is configured to selectively provide an input signal to a respective one of the plurality of processors and the spare processor. A first multiplexer is located at an input of the spare processor. The first multiplexer is configured to receive the input signals from each of the plurality of first switches and route, to the spare processor, a selected one of the input signals corresponding to a failed one of the plurality of processors. The spare processor is further configured to perform a processing function associated with the failed one of the plurality of processors in response to receiving the selected one of the input signals. |
US08812900B2 |
Managing storage providers in a clustered appliance environment
Receiving a power off alert indicating a power off condition of a first processing system on which a first storage provider is installed, the first storage provider managing at least one storage controller. Responsive to the power off alert, issuing a first command to a second storage provider installed on a second processing system, the first command indicating to the second storage provider to assume management of the storage controller. |
US08812896B1 |
High-availability data center
Method/system is disclosed for recovering computing capacity and critical applications after a catastrophic failure. The method/system involves distributing the computing capacity over multiple computing clusters, each computing cluster having concurrent access to shared data and software applications of other computing clusters. Sufficient backup computing capacity is reserved on each computing cluster to recover some or all active computing capacity on the other computing clusters. Message traffic throughout the computing clusters is monitored for indications of a catastrophic failure. Upon confirmation of a catastrophic failure at one computing cluster, the workloads of that computing cluster are transferred to the backup computing capacity of the other computing clusters. Software applications that have been designated for recovery are then brought up on the backup computing capacity of the other computing clusters. Such an arrangement allows computing capacity and critical software applications to be quickly recovered after a catastrophic failure. |
US08812895B2 |
System redundancy and site recovery
A method may include receiving an order associated with processing a media file and forwarding the order to a resource management system. The method may also include identifying, by the resource management system, tasks associated with fulfilling the order, storing the plurality of tasks and identifying an execution system to execute the tasks. The method may further include forwarding, by the resource management system, the tasks to the execution system. |
US08812892B1 |
Hardware WCK2CK training engine using meta-EDC sweeping and adjustably accurate voting algorithm for clock phase detection
One embodiment of the present invention sets forth a technique for performing high-performance clock training. One clock training sweep operation is performed to determine phase relationships for two write clocks with respect to a command clock. The phase relationships are generated to satisfy timing requirements for two different client devices, such as GDDR5 DRAM components. A second clock training sweep operation is performed to better align local clocks operating on the client devices. A voting tally is maintained during the second clock training sweep to record phase agreement at each step in the clock training sweep. The voting tally then determines whether one of the local clocks should be inverted to better align the two local clocks. |
US08812887B2 |
Electronic display device automatically turns on or off according to whether a user in front of the display
An electronic display device detects whether a user is in front of a display via a camera according to a first frequency in a working mode of the electronic display device. If the electronic display device detects that the user is not in front of the display for a first predefined time period, the electronic display device enters a power saving mode by turning off the display. The electronic display device detects whether the user is in front of the display again via the camera according to a second frequency in the power saving mode. The electronic display device reduces the second frequency after the user is not in front of the display for a second predefined time period. The electronic display device enters the working mode by turning on the display when detecting that the user is in front of the display again. |
US08812884B2 |
System and method for user driven configuration sets for energy efficient networks
A system and method for user driven configuration sets for energy efficient networks. A customization module can be used to generate energy efficiency control policy customizations based on indications of user preference received through a graphical user interface. These customizations enable abstraction of the energy efficiency control policy customization process from low-level details. |
US08812883B2 |
Systems and methods for providing device-to-device handshaking through a power supply signal
Handshaking circuits are provided in a communications cable and in a device operable to be mated with the communications cable. Before a device can utilize the power supply signal of such a communications channel, the two handshaking circuits must sufficiently identify one another over a power supply signal with a decreased voltage. The decreased voltage allows for a cable plug to be provided with a safe, protected power that cannot cause harm to a human. The decreased voltage also reduces the chance that a device can receive a primary power supply signal from the cable before the device sufficiently identifies itself. Accordingly, a laptop may be connected to a portable music player, but the voltage of the power supply signal provided by the laptop to the cable may be decreased on-cable until the handshaking circuit of the portable music player sufficiently performs a handshaking operation with a on-cable handshaking circuit. |
US08812882B2 |
Voltage regulation for a computer system providing voltage positioning for multi-component load
A computer system has a controller and a voltage regulator. The controller generates a power consumption state signal for one or more components of the computer system to the voltage regulator. The voltage regulator supplies a first voltage level for the one or more components when the one or more components are at a first power consumption state. The voltage regulator increases to a second voltage level for the one or more components when the one or more components enter a second power consumption state. |
US08812881B1 |
Distributed uninterruptible power supply
A distributed uninterruptible power supply provides power to a system including a plurality of electronic computing devices. Each electronic computing device may include an on-board battery to provide power when a power outage occurs. The electronic computing devices that are executing processes that may be temporarily suspended without adversely impacting the processing of a majority of the plurality electronic computing devices may be identified as sacrificial devices. The motherboard of each sacrificial device may be deactivated to suspend any executing processes. The DC power provided by the on-board battery of each sacrificial device may be converted to AC power and then supplied to the non-sacrificial devices. |
US08812877B2 |
Database encryption system, method, and program
A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configures security information of data stored in database. |
US08812870B2 |
Confidentiality preserving document analysis system and method
A method and system for document processing allow a service provider to process a document without having access the textual content of the document. The system includes memory which receives an encoded source document from an associated client system. The encoded source document includes structural information and encoded content information. The encoded content information includes a plurality of encoded tokens generated by individually encoding each of a plurality of text tokens of the source document. The structural information includes location information for each of the plurality of text tokens. A processing module processes the encoded document to generate a modified document, without decoding the encoded tokens. A transmission module transmits the modified document to an associated client system whereby the client system is able to generate a transformed document based on the modified document and the plurality of text tokens. |
US08812869B1 |
Programmable logic device with improved security
Techniques of the present invention impede power consumption measurements of an encryption engine on a logic device by running the encryption engine with an independent clock. This clock produces a signal that is decoupled from and asynchronous to clock signals feeding other circuits on the device. The clock feeding the encryption engine is not accessible externally to the device. Circuits may be employed to intentionally slow down or add jitter to one or more of the clock signals. |
US08812860B1 |
Systems and methods for protecting data stored on removable storage devices by requiring external user authentication
A computer-implemented method for protecting data stored on removable storage devices may include (1) identifying an attempt by a computing device to access encrypted data stored on a removable storage device and then, prior to allowing access to the encrypted data, (2) authenticating a user of the computing device by (a) obtaining security credentials from the user that include a time-synchronized authentication code generated by an external authentication device and (b) verifying the validity of the security credentials. Upon authenticating the user, the method may include allowing access to the encrypted data stored on the removable storage device. Various additional methods, systems, and computer-readable media are also disclosed. |
US08812854B2 |
Firmware verified boot
A computer-implemented method for verifying a boot process of a computing system includes reading, by the computing system during the boot process, a header section of a read-write portion of firmware of the computing system. The method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header, and decrypting, using a first public-key, an encrypted signature corresponding to the header. The method further includes comparing the message digest corresponding with the header and the decrypted signature corresponding to the header. In the event the message digest corresponding to the header and the decrypted signature corresponding to the header match, the boot process is continued. In the event the message digest corresponding to the header and the decrypted signature corresponding to the header do not match, the boot process is halted. |
US08812853B1 |
Traceability for threaded communications
Individual chunks of a message are signed with their originators' signatures, thereby providing traceability in threaded messages so that every contributor's content as well as modifications thereof can be identified. |
US08812852B2 |
Method and system for marking digital content
In one embodiment, a request to deliver a piece of digital content to a recipient is received. In response to the request, a datum is embedded in an equivalent piece of digital content that identifies the recipient. The equivalent piece of digital content is then delivered to the recipient. |
US08812850B2 |
Secure multimedia transfer system
A method and apparatus for secure multimedia transfer provides an encrypted data transfer system that makes transferring multimedia content from a client to any incompatible system or to a system outside the location of the client very difficult. |
US08812847B2 |
System and method for authenticating a resource-constrained client
A system and method for authenticating a resource-constrained client are provided. The method includes transmitting, by the server, a query message including a first modified secret key to the client, wherein the first modified secret key is generated using a first secret key and a first blinding value; receiving, from the client, a response message including a response value, wherein the response value is generated using the first blinding value, a second secret key, and an error value; calculating the error value from the response value; and determining, based on the error value, whether authentication of the client is successful. |
US08812843B2 |
Device and authentication method therefor
According to one embodiment, a device includes first and second data generator, a one-way function processor, and a data output interface. The first data generator generates a second key by encrypting a host constant with a first key in AES operation. The second data generator generates a session key by encrypting a random number with a second key in AES operation. The one-way function processor generates authentication information by processing secret identification information with the session key in one-way function operation. The data output interface outputs the encrypted secret identification information, a family key block, and the authentication information to outside of the device. |
US08812840B2 |
Method for fast pre-authentication by distance recognition
A method of pre-authentication of a first entity (10) by a second entity (1) communicating with each other via a wireless connection. The second entity (1) sends (23′) a challenge value (c). If the first entity (10) receives (23) a challenge value (c′), it applies to the received challenge value a predefined transformation (g) known to the second entity to obtain a first transformed value (r) and then sends (24) the first transformed value (r) obtained. If the second entity receives (24′) a transformed value (r′), it compares (25′) the received transformed value to a second transformed value (r″) obtained by applying the predefined transformation (g) to the challenge value sent and considers the pre-authentication to have succeeded if the result of comparing the second transformed value obtained and the transformed value received is below a predefined threshold (m). |
US08812838B2 |
Configuring a valid duration period for a digital certificate
A valid duration period for a digital certificate is established by a process that includes assigning numeric values to certificate term. The numeric value assigned to each certificate term is representative of the valid duration period. The method continues by identifying one certificate term, which may include requesting a user to select a certificate term. The method may include transmitting the requested certificate term to a server. The certificate term requested is sent via a certificate request. The server is configured to convert the numeric value associated with the requested certificate term into a duration counter value. The method may also include a certificate server receiving from the server, the certificate request including the duration counter value. The method may conclude with transmitting the signed certificate request to a client device capable of generating the digital certificate with the requested certificate term. |
US08812836B2 |
Secure remote subscription management
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU) with a connectivity identifier, such as a Provisional Connectivity Identifier (PCID), which may be used to establish an initial network connection to an Initial Connectivity Operator (ICO) for initial secure remote registration, provisioning, and activation. A connection to the ICO may be used to remotely provision the WTRU with credentials associated with the Selected Home Operator (SHO). A credential, such as a cryptographic keyset, which may be included in the Trusted Physical Unit (TPU), may be allocated to the SHO and may be activated. The WTRU may establish a network connection to the SHO and may receive services using the remotely managed credentials. Secure remote subscription management may be repeated to associate the WTRU with another SHO. |
US08812830B2 |
Attestation protocol for securely booting a guest operating system
In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. |
US08812828B2 |
Methods and apparatuses for recovering usage of trusted platform module
Methods and systems to perform platform security in conjunction with hardware-base root of trust logic are presented. In one embodiment, a method includes determining whether a status from an authenticated code module is indicative of an error or not. The method further includes determining whether the hardware-based root of trust logic is enabled based on content in a non-volatile memory location. If the hardware-based root of trust is enabled and the status is indicative of an error, the method further includes writing to the non-volatile memory location to disable hardware-based root of trust logic during a next boot sequence. In one embodiment, a platform initializes and uses the trusted platform module in conjunction with the hardware-based root of trust logic or with a platform-based root of trust logic. |
US08812827B2 |
Wi-Fi router with integrated touch-screen and enhanced security features
A Wi-Fi router with an integrated configuration touch-screen, and method to use this integrated touch screen to provide enhanced security features. The Wi-Fi router, which has a wired or optical network interface, may be factory pre-configured with hard to anticipate passwords and encryption codes, thus making even its default Wi-Fi settings difficult to attack. Besides displaying interactive menus on the touch-screen, the router may also generate touch sensitive dynamic alphanumeric virtual keypads to enable administrators to interact with the device without the need of extra computers or software. Inexperienced administrators secure in the knowledge that they may access and change even difficult to remember security settings at any time through the built-in touch-screen controller and simplified user interface, are encouraged to set up secure Wi-Fi systems. The device may optionally include security software that, upon touch of a button, can provide new randomized or otherwise obfuscated router settings. |
US08812826B2 |
Processor testing
In one implementation, processor testing may include the ability to randomly generate a first plurality of branch instructions for a first portion of an instruction set, each branch instruction in the first portion branching to a respective instruction in a second portion of the instruction set, the branching of the branch instructions to the respective instructions being arranged in a sequential manner. Processor testing may also include the ability to randomly generate a second plurality of branch instructions for the second portion of the instruction set, each branch instruction in the second portion branching to a respective instruction in the first portion of the instruction set, the branching of the branch instructions to the respective instructions being arranged in a sequential manner. Processor testing may additionally include the ability to generate a plurality of instructions to increment a counter when each branch instruction is encountered during execution. |
US08812823B2 |
Memory disambiguation techniques using counter ratio to selectively disable load/store conflict prediction
A memory access management technique is disclosed, one embodiment of which relates to a technique to issue loads to a memory ahead of older store operations corresponding to the same target address. A processor may include load buffer entries having predictor table entries associated therewith, including saturation counters to record history of previous conflicts between loads and stores corresponding to the same target address. A watchdog unit may disable memory disambiguation (MD) if the MD causes too high a misprediction rate for load operation and store operation conflicts. In one embodiment, the MD is disabled if a flush counter value reaches a threshold. |
US08812822B2 |
Scheduling instructions in a cascaded delayed execution pipeline to minimize pipeline stalls caused by a cache miss
A design structure embodied in a machine readable storage medium for designing, manufacturing, and/or testing a design for minimizing unscheduled D-cache miss pipeline stalls is provided. The design structure includes an integrated circuit device, which includes a cascaded delayed execution pipeline unit having two or more execution pipelines that begin execution of instructions in a common issue group in a delayed manner relative to each other, and circuitry. The circuitry is configured to receive an issue group of instructions, determine whether the issue group is a load instruction, and if so, schedule the load instruction in a first pipeline of the two or more execution pipelines, and schedule each remaining instruction in the issue group to be executed in remaining pipelines of the two or more pipelines, wherein execution of the load instruction in the first pipeline begins prior to beginning execution of the remaining instructions in the remaining pipelines. |
US08812818B2 |
Management of persistent memory in a multi-node computer system
A method and apparatus creates and manages persistent memory (PM) in a multi-node computing system. A PM Manager in the service node creates and manages pools of nodes with various sizes of PM. A node manager uses the pools of nodes to load applications to the nodes according to the size of the available PM. The PM Manager can dynamically adjust the size of the PM according to the needs of the applications based on historical use or as determined by a system administrator. The PM Manager works with an operating system kernel on the nodes to provide persistent memory for application data and system metadata. The PM Manager uses the persistent memory to load applications to preserve data from one application to the next. Also, the data preserved in persistent memory may be system metadata such as file system data that will be available to subsequent applications. |
US08812817B2 |
Non-blocking data transfer via memory cache manipulation
A cache controller in a computer system is configured to manage a cache such that the use of bus bandwidth is reduced. The cache controller receives commands from a processor. In response, a cache mapping maintaining information for each block in the cache is modified. The cache mapping may include an address, a dirty bit, a zero bit, and a priority for each cache block. The address indicates an address in main memory for which the cache block caches data. The dirty bit indicates whether the data in the cache block is consistent with data in main memory at the address. The zero bit indicates whether data at the address should be read as a default value, and the priority specifies a priority for evicting the cache block. By manipulating this mapping information, commands such as move, copy swap, zero, deprioritize and deactivate may be implemented. |
US08812813B2 |
Storage apparatus and data access method thereof for reducing utilized storage space
A storage apparatus includes a first data section, a second data section, and a common data section. The first data section stores first data, the second data section stores second data, and the common data section stores common data. The storage apparatus stores a single copy of the common data. The common data and the first data correspond to a first memory bank. The common data and the second data correspond to a second memory bank. |
US08812812B2 |
Dispersed storage network resource allocation
A dispersed storage unit within a dispersed storage network is configured with registry information including a slice name assignment indicating a range of slice names assigned to a vault associated with at least one user of the dispersed storage network. The slice names further corresponding to a plurality of potential data slices to be subsequently created and received for a pillar of the vault. The dispersed storage unit allocates a portion of physical memory therein to store the potential data slices based on the slice name assignment. |
US08812811B1 |
Data migration between multiple tiers in a storage system using pivot tables
Technologies are described for implementing a migration mechanism in a data storage system containing multiple tiers of storage with each tier having different cost and performance parameters. Access statistics can be collected for each territory, or storage entity, within the storage system. Data that is accessed more frequently can be migrated toward higher performance storage tiers while data that is accessed less frequently can be migrated towards lower performance storage tiers. Each tier can be associated with a range of ILM statistics referred to as the bucket for that tier. A pivot table may be provided that relates the tiers and the buckets. Operations on the pivot table can provide counts of how many territories may be promoted or demoted between any two pairs of tiers. |
US08812809B2 |
Method and apparatus for allocating memory for immutable data on a computing device
One embodiment of the present invention provides a system that allocates memory for immutable data on a computing device. During operation, the system receives an application to be executed on the computing device. Next, the system allocates a memory region on the computing device to store immutable data for the application. Note that this memory region is smaller than the immutable data for the application. When the system subsequently receives a request to access a block of immutable data for the application, the system allocates space in this memory region for the block, and proceeds to load the block into the memory region. However, if at a later time the space occupied by this first block is needed for another block, the system unloads and discards the first block. If a subsequent operation needs to use information in the first block, the system regenerates the block by transforming raw data associated with the block into a form that can be directly accessed by the application, and then reloads the block into the memory region. |
US08812804B2 |
Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices
A secure demand paging (SDP) system includes a dynamic random access memory (DRAM), a microprocessor having a secure internal memory and coupled to said DRAM, and a non-volatile memory storing a representation of operations accessible by the microprocessor. The stored representation of operations includes a coded physical representation of operations to configure an SDP space in the DRAM, to organize the SDP space into virtual machine contexts, to organize at least one of the virtual machine contexts into block book keeping blocks and book keeping spaces in the block book keeping blocks, and to execute a secure demand paging process between said secure internal memory and said DRAM. |
US08812803B2 |
Duplication elimination in a storage service
A method of managing storage implemented in a storage management device that manages storage to which access for information is made by a requesting processing apparatus, including randomly obtaining a prescribed number of data units from among data units that constitute the information from the storage, calculating a sample unit duplication ratio, which is a ratio at which the obtained data units duplicate each other, estimating an overall data unit duplication ratio, which is a ratio at which all data units stored in the storage duplicate each other, by using a prescribed function that utilizes the calculated sample unit duplication ratio, and outputting the estimated overall data unit duplication ratio to an output device. |
US08812802B2 |
Capacitor save energy verification
A memory subsystem includes a volatile memory, a nonvolatile memory, and a controller including logic to interface the volatile memory to an external system. The volatile memory is addressable for reading and writing by the external system. The memory subsystem includes a power controller with logic to detect when power from the external system to at least one of the volatile and nonvolatile memories and to the controller fails. When external system power fails, backup power is provided to at least one of the volatile and nonvolatile memories and to the controller for long enough to enable the controller to back up data from the volatile memory to the nonvolatile memory. |
US08812798B2 |
Indication of a destructive write via a notification from a disk drive that emulates blocks of a first block size within blocks of a second block size
A disk drive receives a request to write at least one block of a first block size, wherein the disk drive is configured to store blocks of a second block size that is larger in size than the first block size, and wherein the disk drive stores via emulation a plurality of emulated blocks of the first block size in each block of the second block size. The disk drive generates a read error, in response to reading a selected block of the second block size in which the at least block of the first block size is to be written via the emulation. The disk drive performs a destructive write of selected emulated blocks of the first block size that caused the read error to be generated. The disk drive writes the at least one block of the first block size in the selected block of the second block size. The disk drive sends a notification to indicate the performing of the destructive write. |
US08812795B2 |
Shared memory architecture
Disclosed herein is an apparatus which may comprise a plurality of nodes. In one example embodiment, each of the plurality of nodes may include one or more central processing units (CPUs), a random access memory device, and a parallel link input/output port. The random access memory device may include a local memory address space and a global memory address space. The local memory address space may be accessible to the one or more CPUs of the node that comprises the random access memory device. The global memory address space may be accessible to CPUs of all the nodes. The parallel link input/output port may be configured to send data frames to, and receive data frames from, the global memory address space comprised by the random access memory device(s) of the other nodes. |
US08812794B2 |
Resolving messaging deadlock in a distributed shared memory
Systems and methods for implementing a distributed shared memory (DSM) in a computer cluster in which an unreliable underlying message passing technology is used, such that the DSM efficiently maintains coherency and reliability. DSM agents residing on different nodes of the cluster process access permission requests of local and remote users on specified data segments via handling procedures, which provide for recovering of lost ownership of a data segment while ensuring exclusive ownership of a data segment among the DSM agents detecting and resolving a no-owner messaging deadlock, pruning of obsolete messages, and recovery of the latest contents of a data segment whose ownership has been lost. |
US08812793B2 |
Silent invalid state transition handling in an SMP environment
Embodiments of the invention address deficiencies of the art in respect to cache coherency management and provide a novel and non-obvious method, system and apparatus for silent invalid state transition handling in an SMP environment. In one embodiment of the invention, a cache coherency method can be provided. The cache coherency method can include identifying an invalid state transition for a cache line in a local node, evicting a corresponding cache directory entry for the cache line, forwarding an invalid state transition notification to a node controller for a home node for the cache line in order for the home node to evict a corresponding cache directory entry for the cache line, and relinquishing ownership of the cache line to the home node. |
US08812788B2 |
Virtual cache window headers for long term access history
A method of virtual cache window headers for long term access history is disclosed. The method may include steps (A) to (C). Step (A) may receive a request at a circuit from a host to access an address in a memory. The circuit generally controls the memory and a cache. Step (B) may update the access history in a first of the headers in response to the request. The headers may divide an address space of the memory into a plurality of windows. Each window generally includes a plurality of subwindows. Each subwindow may be sized to match one of a plurality of cache lines in the cache. A first of the subwindows in a first of the windows may correspond to the address. Step (C) may copy data from the memory to the cache in response to the access history. |
US08812787B2 |
Router and many-core system
According to one embodiment, a router manages routing of a packet transferred between a plurality of cores and at least one of cache memories to which the cores can access. The router includes an analyzer, a packet memory and a controller. The analyzer determines whether the packet is a read-packet or a write-packet. The packet memory stores at least part of the write-packet issued by one of the cores. The controller stores cache data of the write-packet and a cache address in the packet memory when the analyzer determines that the packet is the write-packet. The cache address indicates an address in which the cache data is stored. The controller outputs the cache data stored in the packet memory to the core issuing a read-request as a response data corresponding to the read packet when the analyzer determines that the packet is the read-packet and the cache address corresponding to the read-request is stored in the packet memory. |
US08812784B2 |
Command executing method, memory controller and memory storage apparatus
A command executing method for a memory storage apparatus and a memory controller and the memory storage apparatus using the same are provided. The method includes, during a data merging operation, receiving a write command and a write data corresponding to the write command from a host system. The method also includes temporarily storing the write data into a buffer memory, and at a delay time point, transmitting a response message to the host, the delay time point is set by adding a dummy delay time to a time point that the operation of writing the write data into the buffer memory is completed. Accordingly, the method can effectively level the response times of executing write commands during the data merging operation, thereby shortening the maximum access time. |
US08812783B2 |
Operation apparatus, cache apparatus, and control method thereof
An apparatus comprising first holding units each of which includes first nodes connected in series and shifts first data in each first node in a first direction, second holding units each of which includes second nodes connected in series and shifts second data in each second node in a second direction is provided. Each first node corresponds to at least one of the second nodes. The apparatus further comprises an operation unit which executes, for a node of interest which is a first node, an operation using first data in the node of interest, and second data in at least one of the second nodes to which the node of interest corresponds, and an input unit which inputs, in parallel, the first data to at least two out of the first holding units, and serially inputs the second data to at least two out of the second holding units. |
US08812782B2 |
Memory management system and memory management method
A memory management system and method include and use a cache buffer (such as a table look-aside buffer, TLB), a memory mapping table, a scratchpad cache, and a memory controller. The cache buffer is configured to store a plurality of data structures. The memory mapping table is configured to store a plurality of addresses of the data structures. The scratchpad cache is configured to store the base address of the data structures. The memory controller is configured to control reading and writing in the cache buffer and the scratchpad cache. The components are operable together under control of the memory controller to facilitate effective searching of the data structures in the memory management system. |
US08812780B2 |
Raid group control device
A RAID group control device for performing access control over one or more RAID groups each having redundancy. The RAID group control device includes an acquiring unit to acquire access frequency information with respect to a RAID group among the one or more RAID groups; a scheduling unit to find a time period exhibiting a lower access frequency than access frequencies of anterior and posterior time periods in a specified time range on the basis of the access frequency information, and to determine start timing of a process of rewriting firmware of drives belonging to the RAID group on the basis of the found time period; and a firmware rewrite processing unit to start the process of rewriting the firmware of the drives at the determined start timing. |
US08812778B2 |
Fast block device and methodology
A device, method and system is directed to fast data storage on a block storage device. New data is written to an empty write block. A location of the new data is tracked. Meta data associated with the new data is written. A lookup table may be updated based in part on the meta data. The new data may be read based the lookup table configured to map a logical address to a physical address. |
US08812775B2 |
System and method for controlling nonvolatile memory
A memory system, comprises a nonvolatile memory comprising multiple memory cells, and a memory controller configured to control respective cell levels of the memory cells by assigning a logical address of each memory cell to one of multiple address groups according to a frequency with which the logical address has been accessed, determining a cell level for each address group, and controlling each memory cell to have the cell level of the address group to which its logical address is assigned. |
US08812771B2 |
Data storage system with complex memory and method of operating the same
A data storage system and a data storing method for the data storage system are provided. The data storage system includes a host unit, a storage unit, and a first input/output bus functioning as an interface between the host unit and the storage unit. The storage unit includes a non-volatile memory buffer unit and a flash memory unit. The non-volatile memory buffer unit includes a plurality of buffers arranged in parallel. The flash memory unit includes a plurality of data storage devices arranged in parallel to input and output data using a parallel method. In the method, a writing request is first classified into one of a plurality of grades according to a writing request frequency when there is a writing request and the writing requested data is stored in one of the non-volatile memory buffer unit and the flash memory unit according to the writing request frequency. |
US08812761B2 |
System and method for adjusting power usage to reduce interrupt latency
A system and method are described for warming a processor from a low power state in anticipation of a time critical interrupt. For example, one embodiment of a method comprises: detecting that a time-critical interrupt will require processor resources at some point in the future; estimating a time at which the time-critical interrupt will be triggered; scheduling a timer interrupt to fire at a specified time prior to the estimated time that the time-critical interrupt will be triggered, the timer interrupt being scheduled with sufficient time to ensure that the processor is warmed to a level at which it is capable of handling the time-critical interrupt at the time that the time-critical interrupt is triggered; and responsively triggering the timer interrupt at the specified time prior to the time critical interrupt. |
US08812759B2 |
Bus subscriber device for connection to a line-redundant data bus, and method for controlling the communication of a bus subscriber with a line-redundant serial data bus
Bus subscriber device for connection to a line-redundant, serial data bus, over which data are exchanged according to a predefined protocol, having the following features: a data transmission unit, at least two data receiving units that are connected in parallel, a line selection logic and at least two bus communication interfaces for connecting to a corresponding number of lines of the data bus, wherein each of the data receiving units is connectable via an associated bus communication interface to an assigned line of the data bus and has means for receiving a data block from the associated line of the data bus and means for forwarding the received data block to the line selection logic, and wherein the line selection logic has means for selecting a line of the data bus as a receiving line and forwarding the data block received over the selected receiving line. |
US08812758B2 |
Mechanism to flexibly support multiple device numbers on point-to-point interconnect upstream ports
A method and apparatus for supporting multiple device numbers on point-to-point interconnect upstream ports. In one embodiment, the method includes a downstream component (DC) that performs discovery of internal device components of the DC during initialization of the DC. Subsequent to the discovery of internal devices of the DC, the DC may issue a multiple device number (MDN) request to an upstream component (UC) of the DC. In one embodiment, the MDN request may include an indication that the DC supports a “multiple device number capability,” as well as a quantity of the internal device components of the DC. The DC may receive an acknowledgement MDN from the UC to indicate a quantity of device numbers allocated to the DC. Subsequently, the DC may assign device numbers to the internal device components of the DC according to configuration requests received from the UC. Other embodiments are described and claimed. |
US08812755B2 |
Heterogeneous high-speed serial interface system with phase-locked loop architecture and clock distribution system
One embodiment relates to an integrated circuit having a plurality of four-channel serial interface modules. Each of the plurality of four-channel serial interface modules includes a first physical medium attachment (PMA) channel circuit, a second PMA channel circuit adjacent to the first PMA channel circuit, a third PMA channel circuit adjacent to the second PMA channel circuit, a fourth PMA channel circuit adjacent to the third PMA channel circuit, and at least one phase-locked loop (PLL) circuit which is programmably coupled to each of the first, second, third and fourth PMA channel circuits. Other embodiments and features are also disclosed. |
US08812754B2 |
Network relay device and memory control method
A network relay device includes a packet buffer for temporarily storing a received packet, and a packet buffer control section for changing an effective buffer number depending on the received amount of packet. When a traffic amount is small, the packet buffer control section reduces the power consumption by stopping the feeding of power or the supply of clock to a part of the packet buffers. The network relay device further includes plural table memories storing a table for deciding the transfer destination of packet, and a table memory control section for changing an effective table number according to a required number of table entries. When the required table entry number is small, the table memory control section reduces the power consumption by stopping the feeding of power or the supply of clock to a part of the table memories. |
US08812742B2 |
Communication path selection
A computer system includes a processor configured for detecting initial command response times of a plurality of paths for transmitting signals from the processor to one or more external devices via a plurality of channels, assigning weighted values to the plurality of paths based on the detected initial command response times, and modifying a frequency at which respective paths among the plurality of paths are selected for transmitting the signals based on the weighted values assigned to the respective paths. |
US08812736B2 |
Limited-bandwidth electronic data communication system field of the invention
A limited-bandwidth network electronic data communication server includes an electronic data transmission server and a network terminal in communication with the electronic data transmission server over a communications network. The electronic data transmission server includes a data receiver for receiving a request for transmission of an e-mail attachment to a network terminal over a communications network. The e-mail attachment includes content and data defining the presentation of the content. A data processing system is in communication with the data receiver for converting the e-mail attachment into a less memory-intensive data format. The data processing system is configured to perform the conversion by extracting the content from the e-mail attachment without the presentation data. A data transmitter is in communication with the data processing system for transmitting the extracted content to the network terminal over the communications network without the presentation data. |
US08812734B2 |
Network feed content
Network feed content is described. In implementations, a network feed is parsed to locate one or more keywords. Additional content that corresponds to the one or more keywords is added to the network feed. The network feed having the additional content is communicated for receipt via a network by one or more users. |
US08812733B1 |
Transport protocol independent communications library
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a transport protocol independent communications library. In one aspect, a method includes receiving a communication request from a client device and processed according to a selected transport protocol, generating a response to the communication request, the response including data responsive to the communication request and one or more feature values specifying one or more communication features for the communication request, each communication feature being independent of the selected transport protocol, and providing the response to the communication request according to the selected transport protocol. |
US08812732B2 |
Information processing device, content using system, information processing method, and computer program
An information processing device for executing playback processing of a disc recorded content, includes: a data processing unit configured to employ a playlist where content playback order information has been recorded to execute playback of a content; and a local storage unit storing a content; wherein the data processing unit plays a local storage unit stored content instead of a disc recorded content specified with the playlist by content obtaining processing employing mapping information for obtaining a local storage unit stored content as a playback content by employing a disc recorded content information recorded in the playlist. Thus, for example, processing can be performed such that a new commercial content provided by a server is played instead of an old commercial content recorded in a disc. |
US08812730B2 |
Method and apparatus for network port and network address translation
The present invention provides a method and apparatus for network port and network address translation. Several problems with limited addressability may occur when transmitting data packets between a terminal in a first network and a terminal in a second network that is outside the first network. Data forwarding rules are used to define if and how identifiers of data packets to be forwarded between the two networks correlate with each other. According to embodiments, a data forwarding rule includes a first identifier associated with the first network and a second identifier associated with the second network, wherein each identifier has two parts: a source address and source port number corresponding to a source network node, and a destination address and destination port number corresponding to a destination network node. |
US08812729B2 |
Self-managed distributed mediation networks
A distributed mediation network and method of employing such is provided, having a plurality of different types of network module. Each module has a non-reciprocal path therethrough for network traffic and the distribution of network traffic across the network is managed by an autonomic control plane. |
US08812726B2 |
Service insertion in a computer network using internet protocol version 6 techniques
Apparatus, methods and computer programs enable carrying service insertion architecture data plane packets in IPv4 or IPv6 networks by packaging destination addresses using IPv6 mechanisms. For example, a data processing apparatus is configured for receiving, from a service broker, a service label and an Internet Protocol version 6 (IPv6) address of a first service node; receiving an IPv4 packet requesting a service associated with the first service node; creating an IPv6 packet comprising a service label in a Flow Label field of the IPv6 packet, the IPv6 address of the first service node in a destination address field of the IPv6 packet, and the IPv4 packet in a payload field of the IPv6 packet; forwarding the IPv6 packet to the first service node. Approaches allow service insertion architecture support for all-IPv6 traffic including tunneled and non-tunneled techniques for environments in which user applications place data in the flow label field. |
US08812724B2 |
Method and device for transmitting variable rate video data
A video consisting of data organized in the form of a plurality of images is transmitted in a communication network. The method comprises a step of coding images with motion compensation, which consists in compressing the images of the video and in creating dependencies between compressed images, a step of scheduling the transmission of packets representing the compressed images, which consists in sending the compressed images over the network in a selected order, and a step of controlling the rate of the video. At least one of reconsidering the selected order of sending already compressed but not yet transmitted images and deleting at least one compressed image is performed at the time of coding a new image. Furthermore, the dependencies between the new image to be compressed and the compressed images are selected by taking into account the reconsidered sending order at the time of coding the new image. |
US08812721B2 |
System and method for conveying information
A system and method for conveying data include the capability to determine whether a transaction request credit has been received at a computer module, the transaction request credit indicating that at least a portion of a transaction request message may be sent. The system and method also include the capability to determine, of a transaction request message is to be sent, whether at least a portion of the transaction request message may be sent and to send the at least a portion of the transaction request message if it may be sent. |
US08812719B2 |
Distributed delivery of notifications in a mass notification system
A method for distributing notifications to a plurality of recipients is disclosed. The method includes receiving at least one notification for distribution to the recipients, and identifying a distributor configured to transmit the notification to the recipients. The method also includes determining a notification distribution capacity of the distributor, and transmitting the notification to the distributor based on the notification distribution capacity of the distributor. A system for distributing notifications to a plurality of recipients is also provided. |
US08812717B2 |
System and method for providing random access to a multimedia object over a network
A system and method provide random access to a multimedia object over a network. One embodiment of the invention includes a streaming media server that is connected to a client computer over a network. The streaming media server includes at least one multimedia object that is adapted for transmission (“streaming”) across the network. A pre-roll calculation program determines a pre-roll for each segment of the multimedia object and generates a modified multimedia object which includes a pre-roll for each of its segments, a pre-roll identifying a portion of the multimedia object to be transmitted by the streaming media server and received by the client computer prior to playback of the multimedia object at a selected segment. The pre-roll allows the client computer to present, starting at a selected segment, the multimedia object in its entirety without interruption. The pre-roll calculation program further facilitates the design of the multimedia object to minimize delays associated with random accesses to segments of the multimedia object. |
US08812715B2 |
Method, system, and proxy node for P2P streaming media data distribution
A method for Peer-to-Peer (P2P) streaming media data distribution includes: receiving a media resource request message sent by a Client node, and sending a media resource query request corresponding to the message to multiple resource networks; obtaining response messages to the media resource query request; confirming Cache nodes storing the media resource according to the response messages; and requesting the media resource from the Cache nodes. The present invention further provides a system and a Proxy node for streaming media data distribution, thereby expanding an application range of live/on-demand service of a user, and increasing the flexibility of a system for streaming media distribution. |
US08812711B2 |
Three-way communication protocol
Some embodiments of a three-way communication protocol have been presented. In one embodiment, a message receiver receives a message from a message transmitter. The message may include an idempotent identification (ID). The message receiver records the idempotent ID, and sends a first acknowledgement of the message to the message transmitter in response to receipt of the message. In response to receipt of a second acknowledgement from the message transmitter acknowledging the message transmitter's receipt of the first acknowledgement, the message receiver discards the idempotent ID. |
US08812709B2 |
UDP broadcast for a user interface in a download and configuration gaming method
A method for sending a notification message using a modified form of User Datagram Protocol (UDP) multicast notification system in a client-server architecture that otherwise allows only client initiated messages. The method includes: identifying information at a server that has potential for inclusion in a notification message, wherein the server is a Download and Configuration Management (DCM) engine; querying a database for a list of clients that have registered for one or more types of notification by a UDP broadcast processor; receiving a reply with the list of clients that have registered for the one or more types of notification; and sending notification to the clients on the list. |
US08812706B1 |
Method and apparatus for compensating for mismatched delays in signals of a mobile display interface (MDDI) system
A method, apparatus, and computer program product embodied on a hardware computer readable storage medium for compensating mismatched delays in at least two signals of a mobile display digital interface (MDDI) system. The method, apparatus, and computer program product embodied on a hardware computer readable storage medium sends a skew calibration packet from a host to a client. The host begins a calibration pattern; then toggling a data signal and a strobe signal at a substantially similar time which strobe signal is used by the client as a clock source. The method, apparatus, and computer program product embodied on a hardware computer readable storage medium also aligns a timing of the strobe signal and the data signal by providing varying delays and resetting the client to an original clock source before a next packet reception. |
US08812699B2 |
Apparatus, system, and method for data synchronization in a multi-path environment
An apparatus, system, and method are disclosed for synchronizing inbound and outbound data in an environment that offers multiple data pathways. When an attempt to send data by a host computer fails, the host computer notifies a secondary device with a separate network connection of the failure. The secondary device attempts to send the data over its separate network connection. If the secondary device fails to send the data, the host computer generates new attempts to send the data over its network connection. The secondary device does the same if the host computer continues to fail in its attempts to send the data. When either the host computer or the secondary device sends the outbound data, it notifies the other of the successful send. The devices then stop further attempts to transmit the data. For inbound data, the host computer and secondary device obtain unique identifiers for inbound data items, compare them, and request from the other those inbound data items that it has not received. |
US08812696B2 |
Extensible markup language document management method and system
An Extensible Markup Language (XML) document management method includes: receiving an XML document management operation request sent via an XCAP protocol, by an XML Document Management Server (XDMS); determining that the XML document management operation request is in an entrustment mode, and determining whether to perform an operation described in the XML document management operation request in accordance with access permission information corresponding to an XML document, by the XDMS. |
US08812693B2 |
System and method of implementing aggregated virtual private network (VPN) settings through a simplified graphical user interface (GUI)
Systems and methods are provided for defining an operating system that automates setup and implements a virtual private network (VPN) on a network interface device such as a router. A graphical user interface module comprises instructions for electronically providing a graphical user interface including a plurality of interface elements to a user who then may provide customizable input defining a first set of variable parameters. An automation layer module comprises instructions defining the type of graphical user interface to display to a user and instructions for electronically accessing a particular data file defining a second set of static parameters. A firmware module and related processor programs and the network interface device and executes the programmed code to establish a VPN connection in accordance with a configuration defined by the first set of variable parameters and the second set of static parameters. |
US08812691B2 |
Method for binding an address of a user terminal in an access equipment
A method for binding an address of a user terminal in an access equipment includes the following steps. The user terminal requests a dynamic host configuration protocol (DHCP) server via the access equipment to assign an IP address, and the access equipment receives a response message from the DHCP server during the process in which the DHCP server assigns the IP address to the user terminal. The access equipment binds the address of the user terminal with a corresponding port of the access equipment according to the address information and the port information in the response message. By using the scheme of the invention, the access equipment may use the access information and the corresponding port information, which is obtained when the user terminal requests to assign the IP address for implementing binding the address of the user terminal and managing the user terminal effectively and expediently. In addition, since the binding relationship of the user terminal is created dynamically, it could be avoided effectively if the IP address is stolen. |
US08812690B1 |
Method and system to provide reputation scores for a social network member
A method and system to provide reputation scores for a social network member is described. An example system comprises an access module, a unit score generator, and a combined reputation score generator. The access module accesses a member profile, and the unit score generator generates reputation scores for one or more units of the member profile. The member profile represents a member of an on-line social network. The combined reputation score generator generates a combined reputation score for the member profile based on the respective reputation scores for the one or more profile units. |
US08812689B2 |
System and method for rotating a gateway address
A client device, a gateway and a corresponding method are provided in order to increase the security of a network to which access is provided via a gateway. The address of the gateway may rotate, e.g., change, such that hackers or other individuals or devices that should not have access to the network will experience much greater difficulty in securing the address of the gateway and accessing the network, at least for any extended period of time. By ensuring that both the client device and the gateway are synchronized in regard to the rotation of the address of the gateway, however, the client device may still properly address the gateway and therefore access the network, even as the address of the gateway rotates. Different operating systems may also be associated with some of the different addresses of the gateway in order to increase the security of the network. |
US08812686B2 |
Communications system and method
A communication system is arranged to provide a communication service to a communication terminal. The communication system comprises a packet data network arranged to communicate data packets supporting the communication service to and from the communication terminal via a data path through the packet data network, a path computational element arranged to control the data path, an application server arranged to control the communication service and an internet multimedia sub-system operable to control the application server. The application server is operable to provide the communication service to the communication terminal in response to a registration request transmitted from the communication terminal to the internet protocol multimedia sub-system requesting an establishment of the communication service. When establishing the communication service, the internet protocol multimedia sub-system is operable to communicate an adaptation message to the path computational element including information indicating service quality parameters associated with the communication service. The path computational element is operable to calculate the data path in accordance with the service quality parameters and to adapt the packet data network in accordance with the calculated data path. |
US08812684B1 |
Messaging configuration system
Systems and methods that facilitate messaging capabilities within a unified plant model (UPM) via employing a plurality of core messaging primitives for configuration of messages that interact with a message engine of the industrial plant. In a related aspect, initially messaging host modules can be located on a network and associated policies identified. Next, data type ID and name syntax can be defined and unique UPM system identifiers generated by the system. |
US08812680B2 |
Methods and apparatus for peer discovery interference management in a wireless wide area network
A method of operating a wireless device is provided in which the wireless device determines to use one grouping of peer discovery resources of a plurality of groupings of peer discovery resources based on one of a path loss or a distance to a base station. The plurality of groupings include a first grouping of resources having a first plurality of identical subsets of resources and a second grouping of resources having a second plurality of identical subsets of resources. Each of the first plurality of identical subsets of resources extends over at least one of a different time period or a different number of subcarriers than each of the second plurality of identical subsets of resources. The wireless device transmits a peer discovery signal on one subset of the identical subsets of said one grouping of peer discovery resources. |
US08812676B2 |
Methods and apparatus to select and to reselect a resource for peer discovery in peer-to-peer networks
A method, an apparatus, and a computer program product are provided in which signals are received on each of a plurality of resources and an energy of each of the signals of a set of the plurality of resources is determined. In addition, a resource is determined based on a probability for each of the resources in a subset of the set. The probability for selecting a resource with a lower determined energy is less than one and greater than the probability for selecting a resource with a higher determined energy. Furthermore, a signal is transmitted on the selected resource. |
US08812674B2 |
Controlling state transitions in a system
A control system is described for controlling the operation of a target system, such as a data center. The control system uses a prediction module to predict demand for resources of the target system for future time steps. The control system then uses a transition determination module to determine state transitions within the target system to address the predicted demand. Each state transition describes a number of units to be advanced from a first state, at a first time step, to a second state, at a second time step. The control system then commences those state transitions which begin in the current step, and then repeats the predicting and determining for a next time step. The transition determination module can determine the state transitions by operating on an objective function that includes a demand difference component and a cost component, as subject to a set of conservation equations. |
US08812669B2 |
Device for generating a virtual network user
A device for generating a virtual network user that can be used, for data protection purposes, as a pseudonym by which a physical person or legal entity can gain access to the Internet and engage services that can be implemented via the network. The network user is defined by a freely specifiable combination of real and/or arbitrarily specifiable attributes. The input of these attributes into the network access device (PC) of the user activates a transformation system which facilitates the generation of the data flows that implement the virtual network user and that can be saved with the temporal sequence of the data flow in a storage device of the transformation system. An access system allocated to an independent authority is provided, which upon activation can initiate the readout of such data from a memory allocated to the storage device of the transformation system. |
US08812665B2 |
Monitoring for and responding to quality of service events in a multi-layered communication system
A method for providing broadband communications over a multi-layer network having a plurality of Open System Interconnection layers. The method stores information in a memory, the information indicating for each of a plurality of communication resources within the multi-layer network, one or more layers of the network with which that communication resource is associated. The method monitors the multi-layer network to detect a quality of service event that has occurred at a first of a plurality of communication resources, and in response to the monitoring, uses the information to determine a layer of the multi-layer network that is associated with the first of the plurality of communication resources. The method responds to the quality of the service event by changing provisioning of the multi-layer network at a layer that is different from the layer of the multi-layer network that is associated with the first of the plurality of communication resources. |
US08812655B2 |
Determining deadlock-critical relations between components of a vehicle system
In a method for determining deadlock-critical relations between networked components of a vehicle system, a graph, which at least partially represents the inhibit relations defined in the vehicle system and which has nodes and edges, is used, in which a classification takes place of at least a portion of the edges on the basis of the properties of the edges and the nodes connected by the edges, a prioritization of the edges on the basis of the classification takes place, and a determination of shortest deadlock-critical cycles for all nodes and at least some of the edges on the basis of the prioritization is implemented. |
US08812653B2 |
Autonomous intelligent workload management
Apparatus, systems, and methods may operate to create a hypergraph of weighted vertices comprising computing resources and storage resources, and nets comprising workloads; to receive a plurality of requests to be addressed by a network associated with the hypergraph, at least some of the requests associated with data objects; to calculate partition schemes for the network based on the requests and the data objects according to an ant colony optimization heuristic; and to autonomously reallocate the workloads to the computing resources and/or the storage resources according to the partition schemes. The workloads may act as ants following a path defined by the vertices of the hypergraph. Further activities may thus include depositing pheromones along hyperedges of the hypergraph, wherein the hyperedges are used for swapping the vertices between the workloads. Additional apparatus, systems, and methods are disclosed. |
US08812649B2 |
Method and system for processing fault alarms and trouble tickets in a managed network services system
An approach for supporting automated fault isolation and recovery is provided. An alarm indicative of a fault within a customer network is received. An event within a workflow is created in response to the alarm, wherein a new trouble ticket is generated as part of the workflow. Communication with a trouble management system is performed to correlate the alarm with an existing trouble ticket. The new trouble ticket is associated with the existing trouble ticket. |
US08812648B2 |
Techniques for measuring above-the-fold page rendering
Techniques for measuring above-the-fold (ATF) page rendering are provided. Visible objects for an ATF portion of a browser page are identified. A start and end time for each visible object is recorded. Furthermore, a total elapsed time to finish loading each of the visible objects to the ATF portion of a browser is determined. |
US08812647B1 |
Centralized publisher management
A management system can recommend and manage publishing content with publishers of business information. A representative can provide unique identifying information for a business that can be used to determine a category of similar businesses. Based on the identified category, a list of publishers can be identified to the representative as related to the business category. The representative can select one or more of the publishers to publish content about the business. Based on the representative selection, the system can request a set of content from the representative. After receiving the content from the representative, the system can translate the content to formats acceptable to each of the publishers. The content can then be provided to the publishers to publish. The published content can then be monitored for problems, and corrected if problems are discovered. |
US08812643B2 |
Conversion of hierarchical infoset type data to binary data
Encoding and/or decoding of messages. On the encoding end, a composite encoder encodes message from an internal format that is used by internal system components into an external format. However, the composite encoder may encode the outgoing messages into different external formats on a per-message basis. For incoming message, a composite decoder decodes incoming messages from any one of a plurality of external formats into the internal format also on a per-message basis. A per-message report mechanism permits internal system components and the encoding/decoding components to communicate information regarding the encoding or decoding on a per message basis. XML messages can be converted automatically into Binary messages. |
US08812636B2 |
Network management apparatus and method based on simple network management protocol
An apparatus and method is provided for managing a communication device using Simple Network Management Protocol (SNMP). When a developer creates an SNMP interface header file through an application program at a compile time, an extractor generates a management information base (MIB) file and object identifier information (OIDInfo) on the basis of the interface header file. When a manager makes an SNMP request at a run time, an agent sends the OIDInfo included in the SNMP request message to an OIDInfo processor. The OIDInfo processor refers to an OIDInfo memory and delivers general message service (GMS) information to the agent. A GMS request/response process between the agent and the application program is then performed on the basis of the GMS information. |
US08812632B2 |
Arrangement for operating a computer cluster
An arrangement is disclosed for operating a computer cluster distributed over multiple locations using quorum mechanism. The cluster includes interconnected defined system instances. The arrangement includes distributing the cluster configuration to each system instance, and constantly checking system instance connectivity to determine reachable system instances. Each healthy system instance determines a subcluster of itself and all reachable system instances. Information of the distributed cluster configuration is used to calculate a corresponding subcluster configuration. Subcluster configuration information and the cluster configuration information is used for computing a new quorum decision for the corresponding subcluster, using a location quorum function considering proportions of connected locations containing reachable system instances, and weights of the reachable system instances in the locations. Workload placement decisions are made based on the new quorum granting permission to place workload to system instances in a specific subcluster, or refusing the permission, whenever the subcluster changes. |
US08812631B2 |
Method and arrangement for operating a computer cluster
A method is disclosed for operating a computer cluster distributed over multiple locations using quorum mechanism. The cluster includes interconnected defined system instances. The method includes distributing the cluster configuration to each system instance, and constantly checking system instance connectivity to determine reachable system instances. Each healthy system instance determines a subcluster of itself and all reachable system instances. Information of the distributed cluster configuration is used to calculate a corresponding subcluster configuration. Subcluster configuration information and the cluster configuration information is used for computing a new quorum decision for the corresponding subcluster, using a location quorum function considering proportions of connected locations containing reachable system instances, and weights of the reachable system instances in the locations. Workload placement decisions are made based on the new quorum granting permission to place workload to system instances in a specific subcluster, or refusing the permission, whenever the subcluster changes. |
US08812629B2 |
System and method for configuring the remote control functionality of a portable device
A server device receives identity data retrieved from an appliance through use of a physical and logical interconnection referenced to a standard. The identity data is used at the server device to identify within a database having a plurality of appliance records, each of which is cross-referenced to an appliance, an appliance record having data in one or more record fields which matches the identity data retrieved from the appliance. A codeset identifier associated with the identified appliance record is then used to select from a plurality of codesets a codeset for use in configuring the portable device to command functional operations of the appliance. |
US08812627B2 |
System and method for installation and management of cloud-independent multi-tenant applications
An application framework may include a cloud-independent application manager, a cloud-independent content services manager, and cloud-independent content services servers. The framework may dynamically install and manage scalable, multi-tenant applications in a cloud, and may scale the applications, as needed. The application manager may receive and handle requests to install application domains and configurations thereof, and may receive and respond to requests for information about servers on which installed methods are available. The content services servers may execute installed methods, using underlying resources of the cloud, through a cloud-specific SPI. The content services manager and application manager may work together using shared cloud storage to provide scalable content services at a very large scale. In the context of the framework described herein, an “application” may be defined by methods bundled into configurations, and by various cost-based and/or performance-based rules that specify how server instances providing those methods are to be managed. |
US08812626B2 |
Interaction method between service-oriented components
An interaction method between service-oriented components and devices, where services offered by a service-provider are requested by a service-requester. In order to broaden flexibility and to simplify reconfiguration of the system, each service includes a set of ports and each port is an instance of a port-type that defines a set of interaction operations and corresponding message transfers between the service-provider and service-requester. The service provided by the service-provider is carried out in several interaction phases with the service-requester, and the interaction phases follow the specific protocols linked to the instances of port-type and the service is accessed by a sequence of different ports that are linked to the phases. |
US08812623B2 |
Techniques to support selective mobile content optimization
A method performed at an apparatus includes receiving a request for media content corresponding to a user equipment; requesting and receiving some of the media content from a server; and if the requested media content should not be optimized, sending, through the network toward the user equipment, information that causes a node to direct additional requests from the user equipment for the media content through the network toward the server without passing through the apparatus. Another method includes receiving a redirect message comprising an indication corresponding to a location of media content and comprising a tag indicating the redirect message should cause a first apparatus to redirect requests from a user equipment for the media content to a server having the media content without passing through a second apparatus; and for requests received from the user equipment and corresponding to the indication, forwarding requests through the network toward the server. |
US08812620B2 |
Software and method that enables selection of one of a plurality of online service providers
A novel electronic information transport component can be incorporated in a wide range of electronic information products, for example magazine collections, to automate the mass distribution of updates, such as current issues, from a remote server to a wide user base having a diversity of computer stations. Advantages of economy, immediacy and ease of use are provided. Extensions of the invention permit automated electronic catalog shopping with order placement and, optionally, order confirmation. A server-based update distribution service is also provided. In addition, an offline web browser system, with hyperlink redirection capabilities, a novel recorded music product with automated update capabilities and an Internet charging mechanism are provided. |
US08812615B2 |
Remote control of a host computer
A host computer splits a display of the host computer into a grid including a plurality of grid areas. The host computer tracks a rate of display updates in each grid area. In addition, the host computer calculates a weighted average of all of the grid areas that an updated region of the display overlaps. The weighted average is based on the rate of display updates of each overlapped grid area and the percentage of the updated region that overlaps each overlapped grid area. The host computer compresses the updated region using a compression method selected from plural different compression methods. The selected compression method is selected based on the weighted average. The host computer transmits the compressed updated region to the remote client device. |
US08812613B2 |
Virtual application manager
A system and method are provided for managing applications over a network between a server system and client computers. In one example, the method involves receiving user login information from a client computer, then accessing on the server system a user profile associated with the login information. The user profile includes a user environment configuration for a client environment. Transport protocols are selected based on the user profile. The transport protocols are protocols for transporting information between the server system and the client computer. The user environment configuration stored on the server system is then synchronized with a client environment configuration on the client computer. |
US08812610B2 |
Optimized data communications in a parallel computer
A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet—from a source direction—that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension. |
US08812609B2 |
Methods, circuits, devices, systems and associated computer executable code for distributed content caching and delivery
Disclosed are methods, circuits, devices, systems and associated computer executable code for distributed content caching and delivery. An access or gateway network may include two or more gateway nodes integral or otherwise functionally associated with a caching unit. Each of the caching units may include: (a) a caching repository, (b) caching/delivery logic and (c) an inter-cache communication module. Caching logic of a given caching unit may include content characterization functionality for generating one or more characterization parameters associated with and/or derived from content entering a gateway node with which the given caching unit is integral or otherwise functionally associated. Content characterization parameters generated by a characterization module of a given caching unit may be compared with content characterization parameters of content already cached in: one or more cache repositories of the given caching unit, and one or more cache repositories of other caching units. |
US08812607B2 |
Private mobile messaging and data communications apparatus and method of managing organizational messaging
A private mobile data communications apparatus and methods of managing organizational data flow and coordinate a secure messaging infrastructure allow organizations to communicate with and monitor one or more mobile users each having at least one mobile device with which they communicate. The apparatus includes a server component, system client, a mobile client, and multiple application programming interface modules configured to manage information flow and correspond with external systems as needed. |
US08812602B2 |
Identifying conversations in a social network system having relevance to a first file
Methods and systems for providing related conversations in a social network system are disclosed. One method includes identifying a plurality of conversations within the social network system, wherein the plurality of conversations each have a relationship with the first file, wherein the social network system provides a platform for storing and sharing conversation, and each conversation includes a conversation and associated information. The method further includes generating, by a system server, a list of inquiries based on the plurality of conversations, providing, by the system server, the list of inquiries to at least one sender of the first file, receiving from the at least one sender at least one response to the list of inquiries, selecting a subset of the plurality of conversations based on the at least one response, and storing information related to the selected subset of the plurality of conversations. |
US08812600B1 |
Sending out-of-band instant messages from a game networking system
In a method and system of sending an out-of-band instant message from a game networking system, an instant messaging system is accessed from the game networking system to send the out-of-band instant message to a friend of the user on behalf of the user, with the out-of-band instant message pertaining to the game networking system. |
US08812599B2 |
Networked inbox
A computer-implemented electronic messaging method and system, the method comprising the steps of receiving an electronic message at a first system, the electronic message comprising a caregiver type, obtaining contextual information associated with the electronic message at the first system, using the caregiver type and the contextual information to identify an intended caregiver recipient address for an intended caregiver recipient for the electronic message and providing the intended caregiver recipient address to facilitate delivery of the electronic message to the intended caregiver recipient. |
US08812597B2 |
Method and system for instant messaging traffic routing
There is described an interconnect hub for routing an Instant Message (IM) or related communication between a sending IM device in a first IM community and a recipient IM device in one of a plurality of potential second IM communities. The interconnect hub comprises a router for determining the destination of IM communications and routing the IM communications to the intended recipient, a search function for finding the service provider providing IM services to the user identifier, and a cache comprising a plurality of records associating user identifiers with corresponding service providers (mobile or Internet). When the IM communication is received by the interconnect hub, the router examines the recipient user identifier, accesses the cache keying on the recipient user identifier, retrieves the service provider associated with the recipient user identifier, and forwards the IM communication to the associated service provider for delivery to the intended recipient. If there is no record in the cache for the user identifier, the searcher initiates a search to identify the service provider and to update the cache if the service provider is found. |
US08812596B2 |
System for remote management of machine via internet protocol links
The so-called M2M solutions for the remote management of a machine or a process by users of a telecommunication network are addressed using an Internet Protocol Multimedia Subsystem platform by equipping both authorized users and a machine to be controlled with IMS clients supporting presence and messaging services as minimum requirements. The client of an authorized user sees the client of the machine as a buddy of its contact list, and interaction between the users and the machine takes place by publishing presence information by the apparatus and via instant messaging between the users and the apparatus. |
US08812591B2 |
Social networking system data exchange
An online publisher provides content items such as advertisements to users. To enable publishers to provide content items to users who meet targeting criteria of the content items, an exchange server aggregates data about the users. The exchange server receives user data from two or more sources, including a social networking system and one or more other service providers. To protect the user's privacy, the social networking system and the service providers may provide the user data to the exchange server without identifying the user. The exchange server tracks each unique user of the social networking system and the service providers using a common identifier, enabling the exchange server to aggregate the users' data. The exchange server then applies the aggregated user data to select content items for the users, either directly or via a publisher. |
US08812589B2 |
Method and system for document-driven message-based communication
A system for document-driven message-based communications may include a presentation module to open a subject electronic document at a first electronic system; an attribute detector to detect that the subject electronic document is a message-enabled document; an RTC module to initiate an RTC session between a first user associated with the first electronic system and a second user associated with a second electronic system; and a storing module to store one or more RTC messages generated during the RTC session as associated with the subject electronic document. The message-enabled document includes an infrastructure required for real time communications (RTC). |
US08812584B2 |
Moving picture file transmitting server and method of controlling operation of same
A moving picture suitable for display on a mobile telephone is displayed comparatively quickly. When a moving picture is requested, a leading segment of the moving picture is converted. The leading segment has an amount of data which, after the conversion, is less than the amount of data that is displayable on the mobile telephone that issued the request. A succeeding segment, which can be converted while the leading segment is being transmitted to the mobile telephone and viewed by the user of the mobile telephone, is converted. If there is a request for the succeeding segment after the leading segment is viewed, the conversion of the succeeding segment will be finished by the time of the request for succeeding segment. As a result, the succeeding segment can be transmitted to the mobile telephone quickly, and it can be viewed rapidly. |
US08812581B2 |
Home zone determination for electronic messaging services
Systems and methods are disclosed that determine whether a sender/recipient using an electronic messaging service (e.g., SMS messaging service or MMS messaging service) is located in a defined home zone. A communication network in one embodiment includes a messaging system, such as an SMSC or an MMSC, and a home zone system. If the messaging system receives an electronic message from a sender to a recipient, then the home zone system determines a location of the sender/recipient. The home zone system also determines whether the sender/recipient is located in a home zone. If the home zone system determines that the sender/recipient is located in a home zone, then the messaging system forwards the electronic message to the recipient. If the home zone system determines that the sender/recipient is not located in the home zone, then the messaging system blocks the electronic message. |
US08812580B2 |
Override of automatically shared meta-data of media
An override of automatically shared meta-data of media method and apparatus are disclosed. In one embodiment, a method of a server device includes automatically populating a hierarchy using a play-list history data associated with a media data of a client device and modifying the hierarchy based on a user override. The hierarchy may be a hierarchy of the play-list history data of the certain items associated with the media data of the client device. A modified hierarchy may be generated based on an addition, deletion and/or an adjust modifying operation of the user override on the hierarchy and may be automatically populated on a new mark-up language file based on the modified hierarchy. A new compatibility rating may be determined between the user and the other users based on the similar attributes between the modified hierarchy and the other hierarchies and each user of the server device may be enabled to view mark-up language files of the other users. |
US08812576B1 |
QR decomposition in an integrated circuit device
Circuitry for performing QR decomposition of an input matrix includes multiplication/addition circuitry for performing multiplication and addition/subtraction operations on a plurality of inputs, division/square-root circuitry for performing division and square-root operations on an output of the multiplication/addition circuitry, a first memory for storing the input matrix, a second memory for storing a selected vector of the input matrix, and a selector for inputting to the multiplication/addition circuitry any one or more of a vector of the input matrix, the selected vector, and an output of the division/square-root circuitry. On respective successive passes, a respective vector of the input matrix is read from a first memory into a second memory, and elements of a respective vector of an R matrix of the QR decomposition are computed and the respective vector of the input matrix in the first memory is replaced with the respective vector of the R matrix. |
US08812571B2 |
Spectrum agile radio
A spectrum agile radio having one or more variable digital filters is described. To quickly, yet accurately, retune the digital filter(s) a windowing function is applied to an ideal filter characteristic for each of one or more desired frequency bands to generate filter coefficients. Transitioning between coefficients of a previous filter and a current filter is handled to avoid problems associated with discontinuities in the signal processing. |
US08812568B2 |
Information processing method, information processing device, program, and recording medium
An identification information acquisition unit acquires identification information for identifying recording information to be recorded or read. A prime number acquisition unit acquires a prime number corresponding to the identification information among prime numbers having the same number of digits. A computation unit computes the sum of all of the digits of the identification information, the sum being the sum of the products obtained by multiplying the values of each digit of the identification information by the difference obtained by subtracting the differences corresponding to the digits from the acquired prime number. A path determination unit determines a path indicating the directory, where the recording information is stored, from the sum. This method can be applied to an NFS (Network File System). |
US08812565B2 |
Optimizing browser caching through deterministic marking of files
Enhanced browser caching is provided through a file identifier attribute employed at a front end server level for deterministic marking A front end server may use an attribute of a file identifier such as an attached parameter, a pattern, a directory associated with the file, or similar attributes to change the links it emits into other content in order to prompt the browsers to request new files. The attribute may be changed (e.g. incremented) based on a web change associated with the content being served. |
US08812560B2 |
Dynamically scalable modes
The present disclosure includes techniques for storing indexed values that may increase computing performance. In one example, a method includes receiving a request to store an input value in a data structure. The method also includes determining the input value is not represented by an index value of the first group of index values, generating an index value that represents the input value, and determining the generated index value is not included in the first group of representations. The method also includes generating a second group of index values wherein a first size of index values of the first group is different than a second size of index values of the second group. The method also includes modifying a storage capacity of the data structure to store the index values of the second group of the second size and storing the second group of index values in the data structure. |
US08812558B1 |
Push notification of updates to antivirus programs
In one embodiment, updates to antivirus programs are delivered to customer client computers by pushing an update notification from a support server computer to the customer client computers. To prevent firewalls or other network security mechanism from blocking the notification, the notification may be pushed to the customer client computers by instant messaging, short messaging, or through another customer client computer, for example. After a customer client computer receives the notification, the customer client computer may request the support server computer for the updates. In response to the request, the support server computer may provide updates to the customer client computer. |
US08812556B2 |
Storing modification data for recreating modifications
A solution for managing a set of artifacts is provided in which modification data is captured while an artifact is modified and is stored. A proxy agent is generated for a framework agent that manages a set of modifications for an artifact. The proxy agent receives a modification message from, for example, a graphical user interface, captures modification data based on the modification message and forwards the modification message for processing by the framework agent. The captured modification data is serialized in an extensible markup language (XML)-based document for later processing. In one embodiment, the XML-based document comprises an Ant configuration file (script), which can be executed to recreate the modification(s) with or without generating a user interface. |
US08812555B2 |
Dynamic lock-free hash tables
A table update component may perform updates on a dynamic linear hash table, the updates requested by clients based on request item values. A table capacity status component may determine first capacity indicators associated with the dynamic linear hash table, based on results of the update requests. A table maintenance component may initiate lock-free merges and lock-free splits of hash table buckets associated with the dynamic linear hash table, based on initiating lock-free merges and lock-free splits of linked lists included in hash table buckets associated with the dynamic linear hash table, based on the determined first capacity indicators, the linked lists including hashed items stored in the dynamic linear hash table. |
US08812554B1 |
Method and system for storing shared data records in relational database
Database management system comprises a hierarchical data tree. Each tree node is assigned a unique identifier used as a primary key record in each database table. A root of the tree hierarchy is a system data field created by a service provider. None of the individual subscriptions are assigned to the system data field, but all subscribers can read data from the tree branches located under this root. The data of individual subscriptions serves as branches of a hierarchical data tree. The branches are directly connected to the root data. For each subscription, data access and update policies are set for individual database tables and for individual table records. Each database table that stores shared data has a special data field with flags. The flags define read and modify policies for each. The flags are positions within a bit mask. |
US08812551B2 |
Client-side manipulation of tables
Provided is a system and method for providing a browser functionality to determine the existence of a table, identify data therein and manipulate the data according to a user's input. Thus, a method for manipulating data tables in a client machine includes determining at the client machine, existence of a table via a loaded graphical user interface operable with a markup language; extracting data from the table; storing the data from the table in a local cache; manipulating the data in the local cache; and displaying the data in a user-defined table by applying a function within the graphical user interface. The table on the client computer can be generated by the graphical user interface loading a Web page from a server machine, a Web browser or can be operable with a Web browser. Alternatively, the function within the graphical user interface is a preset set of functions. |
US08812546B1 |
State management for user interfaces
State information for a page can be stored and restored using a component state manager to extract and set state information for various components on a page. Each appropriate component can register with the state manager, such that when a user requests to store state information, the state manager can extract state information for each registered component and store the state information accordingly. The user can be provided with a tag or other identifier that allows the user to subsequently request recreation of that state. In response to receiving the identifier, the state manager retrieves the stored state information and sets the state of each respective registered component on the page. The identifiers can be shared with other users to allow those users to also quickly access the same state. |
US08812544B2 |
Enterprise content management federation and integration system
An enterprise content management federation and integration system integrates a plurality of applications and federates information seamlessly by receiving, by a composite system, a request from a client system. The system then translates, by a manager system, the request from the client system. The manager system performs one or more high level validations and retrieves information from a mapping stored by an ontology modeling system, a plurality of content types, repositories, actions and object types based at least in part on a plurality of attributes including one or more metadata models or attribute models. The manager system then invokes one or more composites based at least in part on the request from the client system and some or all the information retrieved from the mapping. |
US08812543B2 |
Methods and systems for mining association rules
Systems, methods, and computer-readable code stored on a non-transitory media for mining association rules include determining a minimum support threshold and a minimum confidence threshold for association rule mining; determining a sampling model; sampling transactions from a transaction dataset; mining association rules from the sampled transactions; and transmitting mined association rules. |
US08812542B1 |
On-the-fly determining of alert relationships in a distributed system
A system provides a controller user interface control and/or display of aspects of a storage area network (SAN) and components thereof, including performance characteristics and alert relationship analyses. The controller enables determinations of alert relationships “on-the-fly” for alerts affecting and affected by multiple causes, symptoms and impacts in the SAN, including on-the-fly determinations of root causes. The on-the-fly determinations of the controller provide that the alert relationships may be determined in response to a query or request by the user without requiring the maintaining of a large stored hierarchical relationship structure of alerts. |
US08812541B2 |
Generation of refinement terms for search queries
A computer-implemented method includes receiving from a user, by a search system, a search query comprising terms. Using at least one association graph comprising terms, the search system generates a suggested replacement query by designating one or more of the terms of the search query as anchor terms, and the remaining terms of the search query as non-anchor terms, and replacing one or more of the non-anchor terms of the search query with one or more suggested replacement terms, to generate the suggested replacement query that includes the one or more anchor terms and the one or more suggested replacement terms. The suggested replacement query is presented to the user. Responsively to a selection of the suggested replacement query by the user, the search query received from the user is replaced with the suggested replacement query, and search results are generated responsively to the suggested replacement query and presented. |
US08812540B2 |
User interfaces for search systems using in-line contextual queries
Systems and methods, including user interfaces, are provided for implementing searches using contextual information associated with a Web page (or other document) that a user is viewing when a query is entered. The page includes a contextual search interface that has an associated context vector representing content of the page. When the user submits a search query via the contextual search interface, the query and the context vector are both provided to the query processor and used in responding to the query. |
US08812536B2 |
Providing regional content by matching geographical properties
A method and a system provide regional content to users by associating data files with geographical properties and matching the geographical property of a data file with the geographical property of the user. The system extracts geographical information from a data file, and associates the data file with a source geographical property corresponding to the extracted geographical information according to a geographical information database. Upon obtaining a user geographical property of a user, the system provides the data file to the user if the source geographical property matches the user geographical property. The method and the system may be implemented using a geographical name lexicon or a geographical name suffix lexicon. |
US08812531B2 |
Concept bridge and method of operating the same
A concept bridge employable with a search engine, method of operating the same and computer information system employing the concept bridge and method. In one embodiment, the concept bridge includes an extractor configured to derive concept terms by extracting significant terms from search text and inferring relevant terms therefrom. The concept bridge also includes a query generator configured to generate a query consistent with an index of a search engine as a function of the concept terms. |
US08812529B2 |
Determining and storing at least one results set in a global ontology database for future use by an entity that subscribes to the global ontology database
Determining and storing at least one validated results set in a global ontology database for future use by an entity that subscribes to the global ontology database. If global ontology data is stored in a global ontology database, attempt to determine a mapping between first and second ontologies. If a mapping between the first and second ontologies can be determined from the global ontology data, the mapping is validated and the validated mapping is defined as a validated results set. If global ontology data is not stored in a global ontology database or a mapping between the first and second ontologies can not be determined from global ontology data stored in the global ontology database, the first and second ontologies are unified by determining a mapping between the first and second ontologies, the mapping is validated and the validated mapping is defined as a validated results set. The validated results set is stored in the global ontology database for future use by an entity that subscribes to the global ontology database. |
US08812525B1 |
Local SQL files for mobile clients
In one embodiment, a method includes receiving a request from a mobile client system for an event attendee list and transmitting a request to a data store for the event attendee list. If the event attendee list is available on the data store, then receiving the event attendee list from the data store, else transmitting a request to a data store for the event attendee list and receiving the event attendee list from a module. After receiving the event attendee list, the method includes transmitting the event attendee list to the mobile client system. |
US08812523B2 |
Predicate result cache
In token compression, a column value is represented by a encoded token. During early predicate evaluation, the result that a decoded token in a column does not satisfy a predicate condition in a predicate conjunction is recorded in a cache as a “FALSE”. Such a result not only means that when the column contains that token that the predicate condition is not satisfied, but also that a predicate conjunction containing the predicate condition is not satisfied. When performing early predicate evaluation on a subsequent row on a token in a column, the conjunction result cache is referred to. If the cache records a FALSE for that token in that column, then it is known the predicate conjunction cannot be satisfied by the decoded token. |
US08812522B2 |
Managing a navigation history
In a mobile terminal, which is able to access resources available over a network, a navigation history is stored. Specifically, the resources are stored in an order in which they are visited by a user, whereby the user can navigate through the stored resources in reverse order by means of a back button. When the stored resources contain a predetermined number of occurrences of a specific resource, the predetermined number being at least two, and the user navigates to the specific resource again, the stored resources between two of said occurrences of the specific resource, and one of said occurrences of the specific resource, are deleted from the stored navigation history. |
US08812521B2 |
Image file sorting method, image file sorting device, and computer program product
An image file sorting method is executed by an image file sorting device, including a storage unit, a control unit, and an image reading unit, wherein the storage unit includes a sorting condition storage unit that stores a sorting condition to specify a sorting destination of an image file. The method includes a sorting keyword extracting step of extracting a sorting keyword from a marker portion of the image file read by the image reading unit, a sorting destination deciding step of deciding the sorting destination of the image file by collating the sorting keyword extracted by the sorting keyword extracting step and the sorting condition stored in the storing condition storage unit, and an image file sorting step of sorting the image file into the sorting destination decided by the sorting destination deciding step. |
US08812520B1 |
Augmented resource graph for scoring resources
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for scoring resources. One method includes generating a resource graph, the graph including nodes representing resources, nodes representing queries, edges between nodes representing resources, and edges between nodes representing queries and nodes representing resources. The method further includes calculating a score for each of the resources, wherein the score for a particular resource is based on scores for resources represented by nodes with edges to the node representing particular resource in the graph and scores for queries represented by nodes that have an edge to the node representing particular resource in the graph, and ranking one or more of the resources in response to a first query received from a user based, at least in part, on the scores. |
US08812517B1 |
Watermarking of structured results and watermark detection
A way of detecting a watermark present in a structured result, such as a search result or a machine translation. The structured result is received and a hash is computed based upon at least part of the result. The resulting bit sequence is tested against a null hypothesis that the bit sequence was generated by a random variable with a binomial distribution with a parameter p=0.5. The result of this test is compared to a significance level, which indicates whether the structured result is watermarked. |
US08812513B2 |
Hash pointer checking for hierarchical database logical relationship
A method of checking consistency of pointers in a hierarchical database includes reading segment information recorded on the hierarchical database and determining a type of each segment and pointer included in each segment. The method also includes extracting parent pointers and twin pointers from child segments and extracting a child pointer from the parent segment. The method also includes calculating a first hash value by a combination of a storage location address of the parent segment and a value of the child pointer and a combination of the values of the parent pointers and the twin pointers included in the child segments, and a second hash value from a combination of storage location addresses of the child segments and the values of the parent pointers included in the child segments. The method further includes indicating a consistency error when the first hash value and the second hash value differ. |
US08812506B2 |
System and method for conducting processor-assisted indexing and searching
Systems and methods are provided for processor-assisted indexing and searching, in which categories or individual documents within a database are annotated to the terms of an ontology, searched and then prioritized by rank. Items of the domain of interest, as well as the ontologies that describe attributes of those items, are embedded into a Bayesian network. Search queries correspond to user activations of items. An error model mimics incomplete or falsely specific items. Search results correspond to a subset of the items to which the query items are semantically-related. A probabilistic inference is performed to obtain marginal probabilities of each search result to explain the presence of the queries. These probabilities can then be used for ranking the search results. |
US08812498B2 |
Methods and systems for providing podcast content
A podcast parsing application is disclosed which may provide podcast content of interest to a user. The podcast parsing application may generate a compilation of podcast content from a plurality of podcasts. When playing a podcast to a user, the podcast parsing application may identify portions of podcast content and provide only those portions of the podcast determined to be of interest to the user. Information derived from user input, metadata tags, viewing histories, popularity data, search results, audio processing techniques or other information sources may be used by the podcast parsing application to distinguish, identify or otherwise provide podcast content of interest to the user. |
US08812497B2 |
Method and system for creating messages including image information
Storing image data and related information for sharing via a URL includes receiving image data uploaded from a client computer via a user interface and receiving, separate from the receiving of the image data, related information uploaded via the user interface. The uploaded image data and related information are stored. A uniform resource locator (URL) configured for retrieving a display that includes the stored image data and the related information is generated. The URL is provided in a message. |
US08812496B2 |
Relevant persons identification leveraging both textual data and social context
A set of documents is annotated by metadata specifying persons associated with documents and their social roles in the documents. The annotated documents define a group of representation modes including at least one content type and at least one social role. An electronic processing device computes a relevance score for a person of interest using a set of queries each having a target social role by performing a sequence of operations that includes the following operations: computing similarities between documents and queries with respect to at least one similarity mode of the group of representation modes; enriching queries or documents to identify and aggregate nearest neighbor documents that are most similar with respect to at least one enrichment mode of the group of representation modes; aggregating over documents; aggregating over queries; and aggregating over at least one of (i) enrichment modes, (ii) similarity modes, and (iii) target social roles. |
US08812494B2 |
Predicting content and context performance based on performance history of users
Systems and methods are provided for selecting contexts for new invitational content and invitational content for new contexts. In particular, a performance history of delivered invitational content in known contexts is combined with similarity measures for the delivered invitational content, with respect to a new invitational content, to generate a list of potential contexts for the new invitational content. Similarly, a performance history of in known contexts with delivered invitational content can combined with similarity measures for known contexts, with respect to a new context, to generate a list of potential content for the new context. Further, a combination of these methods can be used to pair new invitational content with new contexts. |
US08812489B2 |
Swapping expected and candidate affinities in a query plan cache
In an embodiment, a hit percentage of an expected affinity for a first query is calculated, wherein the expected affinity comprises a first address range in a query plan cache, a hit percentage of a candidate affinity for the first query is calculated, wherein the candidate affinity comprises a second address range in a query plan cache, and if the hit percentage of the candidate affinity is greater than the hit percentage of the expected affinity by more than a threshold amount, query plans in the candidate affinity are swapped with query plans in the expected affinity. |
US08812488B2 |
Constructing multidimensional histograms for complex spatial geometry objects
Techniques are described for generating histograms for a multidimensional space. In the presence of large spatial objects, fuzzy splitting techniques are utilized to recursively divide the multidimensional space into partitions, where a single spatial object may belong to multiple partitions. Large spatial objects are essentially broken down into smaller objects that may allow for more efficient partitioning of the multidimensional space. A count of spatial objects in each partition yields a spatial histogram. A spatial object that belongs to multiple partitions may have a weighted count for each of the multiple partitions, based on the extent to which the spatial object overlaps with each partition. Thus, an object that is split among a handful of partitions will only contribute a fraction of a count to each partition. Small partitions having relatively few objects are avoided by refusing to subdivide a partition whose members drop below a threshold number. |
US08812487B2 |
Addition and processing of continuous SQL queries in a streaming relational database management system
Systems, methods, and media are disclosed herein that can be embodied in a traditional Relational Database Management System (RDBMS) in order to transform it into a Streaming Relational Database Management System (SRDBMS). An SRDBMS may provide functionality such as to manage and populate streams, tables, and archived stream histories and support the evaluation of continuous queries on streams and tables. Both continuous and snapshot queries support the full spectrum of the industry standard, widely used, Structured Query Language. The present technology can support a high number of concurrent continuous queries using a scalable and efficient shared query evaluation scheme, support on-the-fly addition of continuous queries into a mechanism that implements the shared evaluation scheme, reuse RDBMS modules such as relational operators and expression evaluators, and visualize results of continuous queries in real time. |
US08812486B2 |
Determining validity ranges of query plans based on suboptimality
A method for approximating a validity range for a domain of cardinalities of input to an optimal query plan is provided. Such a validity range is iteratively approximated using a modified Newton-Raphson method to find roots of cost functions for optimal and alternative query plans, respectively. The Newton-Raphson method is combined with a method of incrementing roots of cost functions, known as input cardinalities, such that discontinuous and non-differentiable points in cost functions are avoided. In this manner, input cardinalities remain within a domain for which a valid range can be specified. Additionally, a robustness measure is determined by a sensitivity analysis performed on an approximated validity range. Using a robustness measure provided by a sensitivity analysis and resultant validity range and, query plan sub-optimality detection is simplified, re-optimization is selectively triggered, and robustness information is provided to a system or user performing corrective actions. |
US08812482B1 |
Apparatuses, methods and systems for a data translator
The APPARATUSES, METHODS AND SYSTEMS FOR A DATA TRANSLATOR (“Data-Translator”) implement an application on a computerized system, whereby the Data-Translator may collect consumer account information from a variety of data sources, arrange the collected data to score each consumer with regard to their contactability, and devise consumer-specific contact strategies for automatic execution. In one embodiment, the Data-Translator may translate imported consumer data updates into a format complying with existing consumer data records in the database, and incorporate the updates into the related consumer data records. |
US08812480B1 |
Targeted search system with de-obfuscating functionality
A content search system for determining whether an input string matches one or more rules includes a parser, a rules database, and a search engine. The parser, which has an input to receive the input string, is to extract one or more selected portions of the input string to form a filtered input string, and is to generate a rule select signal in response to the selected portions of the input string. The rules database stores a plurality of sets of rules. The search engine is to compare the filtered input string with a selected set of rules selected in response to the rule select signal. |
US08812475B2 |
Facilitating object searches in virtual worlds
A mechanism is provided for facilitating object search in a virtual world environment where each object is defined by a plurality of attributes and the search is performed on any attributes of the object however is not limited to a 3-D search. The co-ordinate location of each object in the virtual world is also provided in the search result and the range within which to perform the search may also be specified. Optionally, the user has the ability to teleport/transport to the location of the object using the search result. |
US08812471B2 |
Database, process flow data management server, and process flow data managing program product
A processing load required for updating and searching data is to be reduced in an ERP system.A database is configured so as to include: a process flow table PT in which process flow data containing various kinds of data regarding a process flow including a plurality of business processes are registered; and an update condition table UT in which update condition data indicating an update condition of the process flow data are registered, wherein the process flow data contain status data indicating a progress situation of each of a plurality of business processes included in the process flow, common data common among business processes included in the same process flow, and process unique data unique to each of the business processes included in the same process flow; wherein the status data are updated in the case where the process unique data are updated; and the update condition data are data indicating a state of the status data. |
US08812469B2 |
Configurable persistent storage on a computer system using a database
A method for persistent data storage on a computer system with a kernel by retrieving configuration information regarding a system operation request and then deciding based on the configuration information whether to execute it with special persistent storage or to not do so. The configuration information may be stored on a central node or may be encoded onto any of the nodes. The special persistent storage may be a database. The method may further be implemented by a computer program product. It also may be implemented on a computer system. |
US08812468B2 |
Database management method
A lower-level master node sends, to a higher-level master node, a write set expanded in its own memory including a shadow copy of its own database and a heap tuple map, and the higher-level master node that received the write set verifies whether the update has already been executed and sends the record of this update to the lower-level master node as a transaction log, whereby the database can be updated efficiently and consistently from the lower-level master node to the higher-level master node, and from the higher-level master node to the lower-level master node under its control. |
US08812463B2 |
Apparatus and method for presenting contents in relation to a search axis
An information processing apparatus is disclosed. The apparatus may include a memory storing a program. The apparatus may also include a processor configured to execute the program to cause the apparatus to perform a method. The method may include creating a function relating feature quantities of first contents to known values of the first contents. The method may also include calculating, using the created function, expected values of second contents based on feature quantities of the second contents. In addition, the method may include controlling display of a presentation of the second contents in relation to a search axis, the second contents being positioned along a direction of the search axis based on the calculated expected values. |
US08812461B2 |
Method and system for data deduplication
The present disclosure discloses a method and system for data deduplication. The method comprises: acquiring meta data and multiple data chunks corresponding to at least one original data object, which are generated by using a data deduplication method; combining the acquired multiple data chunks into a new data object; performing deduplication on the new data object to generate new meta data and new data chunks corresponding to the new data object; and storing the meta data corresponding to the at least one original data object, the new meta data corresponding to the new data object, and the new data chunks. The method and system can further improve deduplication ratio, lower data storage amount, and save costs. |
US08812460B2 |
File deduplication in a file system
Each file is assigned in advance with a WWUID which is newly assigned to a file upon the creation or update of the file and is inherited from a file to a copied file when the file is copied. In a backup apparatus, a file name reception unit receives the file name of a backup target file. A WWUID reception unit receives a WWUID corresponding to the file name. A WWUID search unit searches for the same WWUID in backup management information of a previous day stored in a backup destination. Only if the search is failed, a file operation instruction unit instructs the storing of the backup target file into the backup destination. Then, an Rcnt update instruction unit instructs the updating of the number of references made to the WWUID within the backup destination. A second management information update instruction unit then instructs the updating of backup management information of the current day. |
US08812458B2 |
Adaptive methodology for updating solution building block architectures and associated tooling
Provided is a method for the adaptive updating of building block architectures and designs in the event of a change to a component of the building block architecture. When a specific component of the architecture, or SBB, is replaced or modified, the metadata associated with the new or modified component is placed in a building block repository. The system captures or recognizes the event and automatically makes updates to dependent components of the specific component. Such updates may include, but are not limited to, a substitution or replacement of one component with another, generally if the replacement component is a better fit in the solution architecture than the original component. A new or updated system architecture is generated to reflect the replaced and/or modified components and the associated metadata. In the alternative, the system notifies an administrator to make specific changes in components rather than implementing the changes automatically. |
US08812447B1 |
Computer implemented system for accelerating electronic file migration from multiple sources to multiple destinations
A system for migrating electronic files from a plurality of sources, for ECM systems, file shares or others, for use on a client device or on an administrative server, which can be in a cloud computing system, from at plurality of source repositories to a plurality of destination repositories quickly, accurately, and in an accelerated manner using a migration simulation in embodiments. The system includes a processor in communication with data storage and a client device via a network or a computing cloud or both. |
US08812446B2 |
Block level backup and restore
For block level backup, a full image level backup is created of a file system from production storage at a production server to random access storage at a backup server. A mounted image is created from the full image that exposes a block level representation of the file system of the production server for read operations in a file level format. File enumeration is performed on the mounted image for files. Block level read operations are monitored while the files are being enumerated. During monitoring, blocks that are read for the read operations are marked as meta-data blocks. Blocks that are not marked as meta-data blocks are identified as data blocks. The data blocks are migrated to sequential storage, while leaving the meta-data blocks on the random access storage, wherein the data blocks form a backup image. |
US08812443B2 |
Failure data collection system apparatus and method
An apparatus for collecting dump data collection receives an on demand data (ODD) dump request, pauses one or more scan loops, transfers dump data to an ODD dump buffer space, unpauses the scan loops, and offloads dump data from the ODD dump buffer space to the storage device. The apparatus may also prioritize dump data for transfer to the ODD dump buffer space, load balance dump data for transfer to the ODD dump buffer space, and schedule offloading of the dump data from the ODD dump buffer space to non-volatile storage. |
US08812437B2 |
Onsite backup for third party internet-based systems
A system for onsite backup of internet-based data is provided. The system includes a central computer, a client computer, a communications link between the central computer and the Internet, and a communications link between the client computer and the Internet. The system also includes at least one database containing a plurality of data records accessible by the central computer, each data record containing a client identification number. Software executing on the central computer receives a data backup request, and software executing on the central computer transmits the data backup to the client computer. |
US08812434B2 |
Data structure for efficiently identifying transactions
A technique for monitoring software which efficiently communicates transaction trace data, including static and dynamic data, from an agent to a manager is disclosed. A tree data structure describes transactions as a sequence of transaction elements. Each branch may correspond to one type of transaction. The nodes along a branch may be associated with components of monitored software that are invoked to perform the transaction. A provisional branch may be constructed when an agent is unable to initially identify the transaction. Transaction data may be stored in association with the nodes in the provisional branch during the monitoring. After information needed to identify the transaction becomes available to the agent, the provisional branch is updated. The transaction data is reported in response to determining the branch in the tree data structure that matches the provisional branch. |
US08812432B2 |
Large-scale data processing apparatus, method, and non-transitory tangible machine-readable medium thereof
A large-scale data processing apparatus, method, and non-transitory tangible machine-readable medium are provided. The large-scale data processing apparatus includes a storage unit, an interface, and a processor. The storage unit is stored with a measure table comprising at least one measure. Each of the at least one measure includes a value corresponding to a key attribute and a piece of data corresponding to a data field. The interface is configured to receive a level order of N attributes, wherein N is a positive integer and the N attributes comprise the key attribute. The processor is configured to create a measure tree object for the measure table by following the level order so that the measure tree object has N levels corresponding to the N attributes in a one-to-one fashion. |
US08812431B2 |
Method and system for medical decision support using organ models and learning based discriminative distance functions
A method and system for providing medical decision support based on virtual organ models and learning based discriminative distance functions is disclosed. A patient-specific virtual organ model is generated from medical image data of a patient. One or more similar organ models to the patient-specific organ model are retrieved from a plurality of previously stored virtual organ models using a learned discriminative distance function. The patient-specific valve model can be classified into a first class or a second class based on the previously stored organ models determined to be similar to the patient-specific organ model. |
US08812430B1 |
Determining a confidence of a measurement signature score
To directly compare two or more network perturbation amplitude scores and identify whether the difference between them is meaningful, an Uncertainty (confidence interval) for each of the scores is computed. According to this disclosure, experimental replicates of the measurements are used to compute the score Uncertainty, based on an assumption that variability between measurement replicates represents a largest source of error in the score. Preferably, at least three (3) experimental replicates for both treated and control conditions are used to compute Uncertainty. |
US08812429B2 |
Decision tree creation and execution in an interactive voice response system
Decision trees may be created and executed to manage calls in an interactive voice response (IVR) system. Users may be provided with one or more user interfaces to design, create, and modify decision trees. User may add and edit the rules, logic, and instructions of the decision tree, as well as additional information such as labels, headers, comments, and formatting. One or more decision tree files may be created including the rules, logic, and instructions of the decision tree, which are compatible with an execution engine. One or more decision tree development files also may be created including additional information to be used by a decision tree development application to provide the development environment. |
US08812427B2 |
System and method for disaggregating power load
Systems and methods of disaggregating power load are provided. An example of a method is carried out by program code stored on non-transient computer-readable medium and executed by a processor. The method includes receiving time series data representing total energy consumption. The method also includes identifying distinguishing features in the time series data. The method also includes identifying energy consumption constituents of the total energy consumption based on the features. |
US08812426B2 |
Selecting solution for carbon emission prediction
A computer-implemented method and non-transitory article of manufacture tangibly embodying computer readable instructions for selecting a solution for carbon emission prediction. The method includes the steps of: obtaining historical records of carbon emission and a current demand for carbon emission, locating from the historical records of carbon emission a best matching historical record with respect to the current demand, selecting, based on the located best matching historical record, one of (i) a data prediction solution record and (ii) a rule prediction solution, and calculating a demand gap between the current demand and the best matching historical record as a best matching demand gap, where at least one step is carried out using a computer device. |
US08812425B2 |
Method for rule-based context acquisition
Methods and systems for rule-based context acquisition are disclosed herein. The method includes accepting a request for target context from an application at a context acquisition system and identifying context rules relating to the target context using a rule-based inference cache. The method also includes determining an inferred value of the target context based on previously-acquired contexts and the context rules. If the inferred value of the target context cannot be determined, the method further includes executing a first step of a sensing plan for acquiring an inferred value of the target context using a rule-based acquisition planner, as well as executing any of a number of subsequent steps of the sensing plan until the inferred value of the target context is obtained. |
US08812424B2 |
Semantic web technologies in system automation
A computer program product includes a storage medium with program code configured to maintain descriptions of a plurality of information technology resources in a computer-readable storage medium. The program code is configured to maintain a plurality of evaluation strategies. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the program code is configured to determine that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the program code is configured to evaluate the at least one of the plurality of rules and performs the operation of the at least one rule. |
US08812423B1 |
Object qualifiers for multi-dimensional object model
Described are techniques for providing views of an object model. A template is received that specifies allowable access for a first object using qualifiers for the first object. The qualifiers include a first list of one or more roles and a second list of one or more levels of expertise. For a user identifier having an associated role and an associated level of expertise, it is determined whether to allow access to the first object. The determining includes determining whether the associated role is included in the first list and whether the associated level of expertise is included in the second list. Access to the first object is allowed if the associated role is included in the first list and the associated level of expertise is included in the second list. |
US08812422B2 |
Variant database
The invention provides a system and method for describing polymorphisms or genetic variants based on information about mutations and relationships among them. The invention uses object-oriented concepts to describe variants as variant objects and relations among those variants as variant relation object, each object being an instance of an abstract class of genomic feature and able to contain any number of other objects. Information about genetic disorders is stored in association with the object that represents the pathogenic variant. Genetic test results are used to access corresponding objects to provide a report based on variants or polymorphisms in a patient's genetic material. |
US08812421B1 |
Method and apparatus for autonomous synchronous computing
In accordance with one embodiment, a special purpose computer can be implemented for processing a linear optimization problem capable of being represented in the form [A][X]+[I][Y]=[B] and wherein the linear optimization problem can also be represented in the form [E][A][X]+[E][I][Y]=[E][B]. The computer may comprise a first processor; a plurality of row processors each configured to store a row of the matrix [E]; a computer memory in communication with the first processor and in communication with each row processor so that each row processor can read from the computer memory and write to the computer memory; wherein the first processor is configured to signal all of the row processors to process data related to the linear optimization problem. |
US08812415B2 |
Neuromorphic and synaptronic spiking neural network crossbar circuits with synaptic weights learned using a one-to-one correspondence with a simulation
Embodiments of the invention provide neuromorphic-synaptronic systems, including neuromorphic-synaptronic circuit chips implementing spiking neural network with synaptic weights learned using simulation. One embodiment includes simulating a spiking neural network to generate synaptic weights learned via the simulation while maintaining one-to-one correspondence between the simulation and a digital circuit chip. The learned synaptic weights are loaded into the digital circuit chip implementing a spiking neural network, the digital circuit chip comprising a neuromorphic-synaptronic spiking neural network including plural synapse devices interconnecting multiple digital neurons. |
US08812414B2 |
Low-power event-driven neural computing architecture in neural networks
A neural network includes an electronic synapse array of multiple digital synapses interconnecting a plurality of digital electronic neurons. Each synapse interconnects an axon of a pre-synaptic neuron with a dendrite of a post-synaptic neuron. Each neuron integrates input spikes and generates a spike event in response to the integrated input spikes exceeding a threshold. A decoder receives spike events sequentially and transmits the spike events to selected axons in the synapse array. An encoder transmits spike events corresponding to spiking neurons. A controller coordinates events from the synapse array to the neurons, and signals when neurons may compute their spike events within each time step, ensuring one-to-one correspondence with an equivalent software model. The synapse array includes an interconnecting crossbar that sequentially receives spike events from axons, wherein one axon at a time drives the crossbar, and the crossbar transmits synaptic events in parallel to multiple neurons. |
US08812409B2 |
Reducing payload size of machine-readable data blocks in shipment preparation packing lists
Example embodiments provide a Shipment Preparation System (“SPS”), which facilitates the preparation of shipments, such as by producing shipping labels. In one embodiment, the SPS is configured to receive shipment preparation information from a bar code or other machine-readable data block in a packing list. The shipment preparation information identifies a uniform resource identifier (“URI”) that identifies a code module that is remote from the SPS. The SPS determines the URI based on the shipment preparation information, such as by performing a local lookup or requesting the URI from a URI shortening service. The SPS then uses the URI to communicate with the code module in order to obtain information for the preparation of the shipment (e.g., obtaining a destination shipping address) and/or for transmission of information about the preparation of the shipment (e.g., posting an indication that a shipment is ready for pick up). |
US08812408B2 |
Mapping method and system
A mapping method and system. The method includes receiving from a computing system, a selection of a first candidate skill from a list of candidate skills. The computing system receives a selection of a first work location of associated with a first skill. The computing system determines a first geographical location identifier identifying a first area comprising the first work location. The computing system determines a first work region comprising the first area and the first work location. The computing system selects a first group of suppliers associated the first work region. The computing system generates a candidate request document comprising the first candidate skill, the first work region, and the first work location. The computing system transmits to the first group of suppliers the candidate request document. |
US08812406B2 |
Receiving security risk feedback from linked contacts due to a user's system actions and behaviors
An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. |
US08812405B2 |
Services for spontaneous collaboration
An apparatus for providing spontaneous collaboration between a shopper and consultants concerning a shopping goal derives information about the shopper's physical or logical proximity to a particular product category, combined with the current contents of his or her shopping cart is used to determine one or more shopping goals; as well as information about each potential consultant, including physical proximity, willingness to consult, areas of expertise and recent experience is used to rank each consultant in terms of relevance to one or more shopping goal. |
US08812404B2 |
Information aggregation service
Information aggregation techniques are described. In an implementation, a communication is received that includes an indication of a source of information associated with a non-member of the social network. Information associated with the non-member is aggregated from the source. The aggregation may be performed in response to receipt of a selection by a member of the social network service to interact with the information from the source. The aggregated information may then be presented to a member in conjunction with webpages output for interaction with the social network. |
US08812403B2 |
Long term workflow management
A workflow may be moved from one provider to another provider by extracting the metadata from an executing workflow describing the workflow state as part of dehydrating the workflow, and transferring the metadata to a second workflow and rehydrating the workflow at a second provider. An automated workflow manager may determine when to move the workflow and may facilitate moving with or without human intervention. When a workflow is moved from one provider to another, the workflow state may be moved without transferring executable code that executes the workflow. |
US08812401B2 |
Secure payment capture processes
Methods and processes for securely capturing payment device information and conveying the securely captured payment device information to a client application on a merchant's client device in a manner that does not require that the payment device information to be displayed to the merchant. The client application generates and submits a payment authorization request to a payment authorization service in a manner that does not require the payment information to be displayed to the merchant. The merchant receives a status of the payment authorization request as approved, denied, or process failure. Payment capture can be made before an active connection is made with the merchant's client device, or can occur in real-time. |
US08812400B2 |
Managing a memory segment using a memory virtual appliance
In a method for managing a memory segment through use of a memory virtual appliance, data is encapsulated with the memory virtual appliance, in which the memory virtual appliance comprises a virtual machine configured to manage a memory segment in a physical memory. In addition, the memory virtual appliance is implemented using a virtualization wrapper comprising computer readable code enabling the encapsulated data to be shared among a plurality of clients. Moreover, the encapsulated data is stored in the memory segment controlled by the memory virtual appliance. |
US08812399B2 |
Mobile consumer-to-consumer personal point of sale system and related business method
A business method for mobile commerce includes a first buyer purchasing an item from a Internet-based vendor using a first mobile computing device. A shopping history is developed. A second buyer, using a second mobile computing device, interrogates the shopping history of the first buyer to discover certain parameters regarding an article of interest to the second buyer owned by the first buyer. The item is then purchased by the second buyer using shopping history information provided by the first mobile computing device. The method also includes electronically transferring funds to the vendor with at least some of the funds being electronically transferred to the first mobile consumer as a referral fee. |
US08812398B2 |
Key for a wireless-enabled device
A user sets up an account including radio identification, billing information, etc. via a web-based account creation device, or over the telephone with an account representative. An activation key is provided to the user that identifies the radio device and the users account. An activation screen is displayed to a user at the start of wireless activities. The activation screen requires the activation key before continuing with wireless services. Since the key identifies both the radio and user's account (which was approved prior to provision of the activation key), rejection traffic is eliminated and non-active account traffic is significantly reduced. |
US08812391B2 |
IC with mixed mode RF-to-baseband interface
An integrated circuit (IC) includes at least one baseband section, at least one radio frequency (RF) section, and an interface module. The interface module is configured to couple the at least one baseband section to the at least one RF section, wherein the interface module includes an analog interface module and a digital interface module. |
US08812385B2 |
Alterable account number
Embodiments of the invention are directed to apparatuses, systems, and methods that allow for personalized data to be embedded in a primary account number associated with a consumer device. In one embodiment, a consumer device comprises a body and personalized data embedded into a primary account number, associated with the body. The primary account number includes a bank identification number and the bank identification number and the personalized data overlap. |
US08812383B2 |
Apparatus and method for trade aggregation of trade allocations and settlements
A post-trade aggregation system includes an allocation middleware interface, which interacts with an order management system to allocate and settle trades. The order management system receives a trade order on behalf of a customer and either apportions the trade into a plurality of smaller orders and communicates them to a plurality of order destinations directly (e.g. via the FIX protocol), or sends large orders to an order staging and optimization interface which then apportions the larger orders into a plurality of smaller orders and communicates the orders to a plurality of order destinations. The post-trade aggregation system contains an allocation middleware interface which receives the individual trade executions from the plurality of order destination and compresses them into a single average-priced block. The allocation middleware interface then sends the single average-priced block to be cleared by a designated clearing agent and allocates the single average-priced block into one or more custodian accounts. In further aspects, a method and apparatus are also provided. |
US08812378B2 |
System for inventory management
The present invention relates to a system for detecting and communicating the position of a pusher assembly on a shelf. In an embodiment, a system includes a control module, a pusher assembly, and a laser scanner. The laser scanner is configured to transmit a swept beam to a mirrored reflective surface located behind the pusher assembly. The control module analyzes the laser beam at the laser scanner to detect the position of the pusher assembly on the shelf. In another embodiment, a system includes a control module, a pusher assembly, and an infrared transceiver that sends and receives infrared signals. The transceiver may be located behind the pusher assembly. The control module analyzes the infrared signals to determine the position of the pusher assembly on the shelf. |
US08812377B2 |
Service brokering using domain name servers
Systems and methods according to these exemplary embodiments provide techniques for locating a service using DNS search techniques. For example, an IP address of a customer's end user device (10, 20, 30) can be used to perform a reverse DNS search from which an entry pointing to a service, e.g., a payment service or a video delivery service, can be obtained. The entry, e.g., a Uniform Resource Locator (URL), can then be used to access or evaluate the identified service. |
US08812373B2 |
eDropship: methods and systems for anonymous eCommerce shipment
A method of enabling anonymous shipment of a package containing goods purchased by a customer from a vendor for delivery to an address unknown to the vendor includes steps of receiving a request for a package code for the package from the vendor, sending the package code to the vendor, the package code being devoid of delivery address information and sending a shipping identifier and an associated address to the shipper. The shipper, after picking up the package for shipment from the vendor, matches the package code sent to the vendor with the shipping identifier and identifies the associated address as the delivery address of the package. A shipping label may then be printed out and affixed to the package. |
US08812371B1 |
Using feedback to reconcile catalog item attributes
Disclosed are various embodiments for using contributor-provided attributes in conjunction with an electronic item catalog. A computer reconciles a plurality of attributes for an item in an electronic catalog using feedback data related to the item. Each of the attributes is provided by one of a plurality of merchants. The reconciled attribute of the item is updated in the electronic catalog. |
US08812360B2 |
Social advertisements based on actions on an external system
A social networking system generates socially-relevant ads for a user based on actions taken by other users to whom the user is connected. These may be actions taken on, and determined by, an external system, information about which actions can be received by the social networking system and used for matching to an advertisement request. The social networking system may determine a social context for advertising to a user based on the action and may generate an advertisement for the matched ad request that includes an informational message communicating the social context (i.e., an ad with the information message appended to it, a news story for the informational message, etc.). The ad may be targeted to the user based on user affinity for the ad, based on an object interacted with or an action taken by the user's connections on or external to the social networking system, among other criteria. |
US08812359B2 |
Using location-specific ad creatives and/or ad landing pages in an ad system
The usefulness, and consequently the performance, of advertisements are improved by allowing businesses to better target their ads to a responsive audience. For example, location information may be used in ad relevancy determination, and in attribute (e.g., position) arbitration. Such location information may be associated with price information, such as a maximum price bid, and/or with ad performance information. Ad performance information may be tracked on the basis of location information. The content of an ad creative, and/or of a landing page may be selected and/or modified using location information. Tools may be provided to enter and/or modify location information, such as location-dependent targeting information and price information. The location information used to target and/or score ads may be, include, or define an area. The area may be defined by at least one geographic reference point (e.g., defined by latitude and longitude coordinates) and perhaps additional information. |
US08812356B1 |
Voting with your feet
A method of voting with your feet is disclosed. A performance of a location-based action by a player of a computer-implemented game is associated with a vote on a matter. The performance of the location-based action by the player is detected. A count of votes corresponding to the vote on the matter is incremented based on the detecting of the performance of the location-based action by the player. |
US08812342B2 |
Managing and monitoring continuous improvement in detection of compliance violations
A computer implemented method, data processing system, and computer program product is provided for using compliance violation risk data about an entity to enable an identity management system to dynamically adjust the frequency in which the identity management system performs a reconciliation and compliance check of an identity account associated with the entity. Data associated with an identity account is collected, wherein the data comprises at least one of compliance data, prior compliance violations, or personal data about an entity associated with the identity account. One or more risk factors for the identity account based on the collected data are determined. A risk score of the identity account is calculated based on the determined risk factors. The identity account is then audited with a frequency according to the risk score assigned to the identity account. |
US08812340B2 |
Workflow system and method
Provides workflow systems and methods. A workflow system having a matchmaking unit for receiving a task query from a workflow, and a plurality of task definer units, each providing a definition of a task. The matchmaking unit communicates with the task definer units to evaluate the task definitions against the task query based on at least one property associated with each task definition and provides at least one of the task definitions to the workflow as offers based on the evaluation. |
US08812338B2 |
Computer-implemented systems and methods for pack optimization
Computer-implemented systems and methods are provided for optimizing the distribution of packs of an item across an entity's distribution network. Constraint values may be specified to limit the values that may be included in a planned distribution of packs. Also, heuristics may be used to reduce the computation time required to determine optimal values for a planned distribution of packs. Modeling of the planned distribution of packs and optimization of the number of packs to be distributed can be accomplished using a mixed-integer linear programming solver. |
US08812337B2 |
Resource allocation based on retail incident information
Security personnel time is assigned to a store property by generating an incident score based on a probability of an incident occurring on a store property. A set of ranges of incident scores, each range being associated with a number of hours of security personnel time, are retrieved from computer memory. A range of incident scores in the set of ranges of incident scores that the generated incident score falls within is identified and an associated number of hours of security personnel time is retrieved. Security personnel time is assigned to the store property using a processor based on the number of hours of security personnel time retrieved for the identified range of incident scores. |
US08812335B2 |
Automated direct mail procurement system
A machine-implemented method receives job specifications for at least one direct mail printing job from at least one user and creates at least one workflow related to the direct mail printing job. The workflow comprises at least one job activity. The method automatically transmits requests for bids on the job activities to entities for allowing the entities to bid on performing job activities within the workflow. Bids are received on the job activities from the entities and from rate cards previously established by the entities. The method identifies the lowest bids on an individual job activity-by job activity basis from the bids received from the entities and the rate cards and outputs the lowest bids to the user. The method receives an identification of a single selected entity to perform all activities within the workflow from the user and performing the workflow to output the direct-mail printing job. |
US08812333B2 |
Automated split ticketing
An enhanced travel search tool aimed at providing travel opportunities includes a ticket splitter operating from a list of flight connections provided by a front-end flight search engine. The ticket splitter comprises a unit for valuating all ticket partitions generated from the provided list of connection flights and a tree of split criteria updated in a cache for determining the partitions and attributing to each partition a probability value of obtaining a split-ticket solution. The ticket splitter also includes a unit for selecting those of the valuated partitions that have a probability value higher than a defined threshold and provides a sorted list of recommended partitions to a back-end fare search engine to price all the selected partitions including a reference single-ticket solution. Travel search tool offering of travel opportunities is enhanced by automatically including multi-ticket travel solutions. |
US08812332B2 |
Computer system and method for processing of data related to generating insurance quotes
This invention relates generally to a computer system and method for integrating insurance policy underwriting. In one aspect it integrates the older legacy insurance policy generating systems to on line systems where users access the system through browsers. The computer system to perform the process of underwriting, rating, quoting, binding, and booking an insurance policy includes browsers, data bases, processors and a dispatcher that parses the information to select an insurance process. Suitable software programs review messages received from users to determine if certain messages are less than a prescribed limit. If a message is greater than the limit, then the message is parsed into a header information and one or more data fields whereby the header information is provided to a legacy processor and to policy generation software for further creation of policy related information and documentation. |
US08812331B2 |
Insurance product, rating and credit enhancement system and method for insuring project savings
In the present invention, an insurance product, rating system and method generally relates to a rating and pricing system for quantifying the risk that the annual savings will not fall below specified levels associated with implementing and maintaining economic improvements. Disclosed embodiments involve a credit enhancement system and method relating to the manner in which insuring a project savings floor (i.e., a minimum level of return on investment for a given improvement project) can be realized in a better credit rating for bonds or loans associated with the improvement project. The product, system and method can be applied to various industries, including, power generation, petro-chemical, manufacturing and refining facilities. Various embodiments disclosed herein relate to a system and method for establishing a rating system to determine the impact on an insured's credit risk. |
US08812328B2 |
Method for transmitting an anonymous request from a consumer to a content or service provider through a telecommunication network
A method and system for use in allowing a content or service provider to establish an anonymous profile of a consumer using at least one request sent by the consumer through a communication network. The request sent by the consumer includes identification data of the consumer. The identification data is substituted in the network with an alias so as to anonymize the request. The identification data is not accessible to the content or service provider and there is a correspondence between the identification data and the alias. |
US08812327B2 |
Coding/decoding of digital audio signals
A method of hierarchical coding of a digital audio frequency input signal into several frequency sub-bands, including a core coding of the input signal according to a first throughput and at least one enhancement coding of higher throughput, of a residual signal. The core coding uses a binary allocation according to an energy criterion. The method includes for the enhancement coding: calculating a frequency-based masking threshold for at least part of the frequency bands processed by the enhancement coding; determining a perceptual importance per frequency sub-band as a function of the masking threshold and as a function of the number of bits allocated for the core coding; binary allocation of bits in the frequency sub-bands processed by the enhancement coding, as a function of the perceptual importance determined; and coding the residual signal according to the bit allocation. Also provided are a decoding method, a coder and a decoder. |
US08812326B2 |
Detection and use of acoustic signal quality indicators
A computer-driven device assists a user in self-regulating speech control of the device. The device processes an input signal representing human speech to compute acoustic signal quality indicators indicating conditions likely to be problematic to speech recognition, and advises the user of those conditions. |
US08812325B2 |
Use of multiple speech recognition software instances
A wireless communication device is disclosed that accepts recorded audio data from an end-user. The audio data can be in the form of a command requesting user action. Likewise, the audio data can be converted into a text file. The audio data is reduced to a digital file in a format that is supported by the device hardware, such as a .wav, .mp3, .vnf file, or the like. The digital file is sent via secured or unsecured wireless communication to one or more server computers for further processing. In accordance with an important aspect of the invention, the system evaluates the confidence level of the of the speech recognition process. If the confidence level is high, the system automatically builds the application command or creates the text file for transmission to the communication device. Alternatively, if the confidence of the speech recognition is lower, the recorded audio data file is routed to a human transcriber employed by the telecommunications service, who manually reviews the digital voice file and builds the application command or text file. Once the application command is created, it is transmitted to the communication device. As a result of the present invention, speech recognition in the context of a communications devices has been shown to be accurate over 90% of the time. |
US08812324B2 |
Coding, modification and synthesis of speech segments
The invention relates to a method for speech signal analysis, modification and synthesis comprising a phase for the location of analysis windows by means of an iterative process for the determination of the phase of the first sinusoidal component and comparison between the phase value of said component and a predetermined value, a phase for the selection of analysis frames corresponding to an allophone and readjustment of the duration and the fundamental frequency according to certain thresholds and a phase for the generation of synthetic speech from synthesis frames taking the information of the closest analysis frame as spectral information of the synthesis frame and taking as many synthesis frames as periods that the synthetic signal has. The method allows a coherent location of the analysis windows within the periods of the signal and the exact generation of the synthesis instants in a manner synchronous with the fundamental period. |
US08812320B1 |
Segment-based speaker verification using dynamically generated phrases
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for verifying an identity of a user. The methods, systems, and apparatus include actions of receiving a request for a verification phrase for verifying an identity of a user. Additional actions include, in response to receiving the request for the verification phrase for verifying the identity of the user, identifying subwords to be included in the verification phrase and in response to identifying the subwords to be included in the verification phrase, obtaining a candidate phrase that includes at least some of the identified subwords as the verification phrase. Further actions include providing the verification phrase as a response to the request for the verification phrase for verifying the identity of the user. |
US08812319B2 |
Dynamic pass phrase security system (DPSS)
There is disclosed an n-dimensional biometric security system as well as a method of identifying and validating a user through the use of a automated random one-time passphrase generation. The use of tailored templates to generate one-time phase phrase text as well as the use of update subscriptions of templates ensures a high level of security. A verification session preferably uses short, text-independent one-time pass phrases and secure audio tokens with master audio generated from an internal text-to-speech security processor. An automated enrollment process may be implemented in an ongoing and seamless fashion with a user's interactions with the system. Various calibration and tuning techniques are also disclosed. |
US08812318B2 |
Speaker recognition in a multi-speaker environment and comparison of several voice prints to many
One-to-many comparisons of callers' voice prints with known voice prints to identify any matches between them. When a customer communicates with a particular entity, such as a customer service center, the system makes a recording of the real-time call including both the customer's and agent's voices. The system segments the recording to extract at least a portion of the customer's voice to create a customer voice print, and it formats the segmented voice print for network transmission to a server. The server compares the customer's voice print with multiple known voice prints to determine any matches, meaning that the customer's voice print and one of the known voice prints are likely from the same person. The identification of any matches can be used for a variety of purposes, such as determining whether to authorize a transaction requested by the customer. |
US08812313B2 |
Voice activity detector, voice activity detection program, and parameter adjusting method
Judgment result deriving means 74 makes a judgment between active voice and non-active voice every unit time for a time series of voice data in which the number of active voice segments and the number of non-active voice segments are already known as a number of the labeled active voice segment and a number of the labeled non-active voice segment and shapes active voice segments and non-active voice segments as the result of the judgment by comparing the length of each segment during which the voice data is consecutively judged to correspond to active voice by the judgment or the length of each segment during which the voice data is consecutively judged to correspond to non-active voice by the judgment with a duration threshold. Segments number calculating means 75 calculates the number of active voice segments and the number of non-active voice segments. Duration threshold updating means 76 updates the duration threshold so that the difference between the calculated number of active voice segments and the number of the labeled active voice segments decreases or the difference between the calculated number of non-active voice segments and the number of the labeled non-active voice segments decreases. |
US08812312B2 |
System, method and program for speech processing
The present invention relates to a system, method and program for speech recognition. In an embodiment of the invention a method for processing a speech signal consists of receiving a power spectrum of a speech signal and generating a log power spectrum signal of the power spectrum. The method further consists of performing discrete cosine transformation on the log power spectrum signal and cutting off cepstrum upper and lower terms of the discrete cosine transformed signal. The method further consists of performing inverse discrete cosine transformation on the signal from which the cepstrum upper and lower terms are cut off. The method further consists of converting the inverse discrete cosine transformed signal so as to bring the signal back to a power spectrum domain and filtering the power spectrum of the speech signal by using, as a filter, the signal which is brought back to the power spectrum domain. |
US08812311B2 |
Character-based automated shot summarization
Methods, devices, systems and tools are presented that allow the summarization of text, audio, and audiovisual presentations, such as movies, into less lengthy forms. High-content media files are shortened in a manner that preserves important details, by splitting the files into segments, rating the segments, and reassembling preferred segments into a final abridged piece. Summarization of media can be customized by user selection of criteria, and opens new possibilities for delivering entertainment, news, and information in the form of dense, information-rich content that can be viewed by means of broadcast or cable distribution, “on-demand” distribution, internet and cell phone digital video streaming, or can be downloaded onto an iPod™ and other portable video playback devices. |
US08812309B2 |
Methods and apparatus for suppressing ambient noise using multiple audio signals
A method for suppressing ambient noise using multiple audio signals may include providing at least two audio signals captured by at least two electro-acoustic transducers. The at least two audio signals may include desired audio and ambient noise. The method may also include performing beamforming on the at least two audio signals in order to obtain a desired audio reference signal that is separate from a noise reference signal. |
US08812305B2 |
Encoder, decoder and methods for encoding and decoding data segments representing a time-domain data stream
An apparatus for decoding data segments representing a time-domain data stream, a data segment being encoded in the time domain or in the frequency domain, a data segment being encoded in the frequency domain having successive blocks of data representing successive and overlapping blocks of time-domain data samples. The apparatus includes a time-domain decoder for decoding a data segment being encoded in the time domain and a processor for processing the data segment being encoded in the frequency domain and output data of the time-domain decoder to obtain overlapping time-domain data blocks. The apparatus further includes an overlap/add-combiner for combining the overlapping time-domain data blocks to obtain a decoded data segment of the time-domain data stream. |
US08812304B2 |
Method and system for downloading additional search results into electronic dictionaries
In one embodiment, the invention provides a method for a system to provide information based on a query, the method comprising: performing a first search of at least one first source for information responsive to the query; providing a result of the search to a user; searching documents using at least a part of the result of the search; providing the user with at least one example of usage of the result of the search obtained from the searching of stored documents; based on user input, performing a second search of at least one second source for information responsive to the query; and providing a result of said second search to the user. |
US08812303B1 |
Multi-language relevance-based indexing and search
Indexing and querying in multiple languages is accomplished using an ordered chain of filters and/or other such components. When receiving information to be indexed or for a query, the information can be tokenized and typed based at least in part on the language of each token. The character types can be adjusted if appropriate for the languages, and the tokens can be further segmented using a dictionary for the respective language types. Once appropriate tokens are determined, relevant synonyms in each appropriate language can be determined and typed accordingly. If necessary the case of the tokens and synonyms can be adjusted and further segmented based on punctuation. The terms and synonyms then can be used as part of the index or as part of the search query to include other terms or phrases based on relevance to the original information. |
US08812302B2 |
Techniques for inserting diacritical marks to text input via a user device
A computer-implemented method for assisting a user to input Vietnamese text to a user device lacking a subset of characters in a Vietnamese alphabet includes receiving a character input by a user, determining three words previously input by the user, the three words having already had diacritical marks inserted, transmitting the three words and the character to a server via a network, receiving first and second information corresponding to the character from the server via the network, the first and second information generated at the server based on a context of the three words, the context determined at the server using a language model, the first and second information indicating whether the character requires a diacritical mark and a specific diacritical mark, respectively, generating a modified character comprising a character in the Vietnamese alphabet based on the character and the first and second information, and displaying the modified character. |
US08812301B2 |
Linguistically-adapted structural query annotation
A system and method for natural language processing of queries are provided. A lexicon includes text elements that are recognized as being a proper noun when capitalized. A natural language query includes a sequence of text elements including words. The query is processed. The processing includes a preprocessing step, in which part of speech features are assigned to the text elements in the query. This includes identifying, from a lexicon, a text element in the query which starts with a lowercase letter and assigning recapitalization information to the text element in the query, based on the lexicon. This information includes a part of speech feature of the capitalized form of the text element. Then parts of speech for the text elements in the query are disambiguated, which includes applying rules for recapitalizing text elements based on the recapitalization information. |
US08812293B2 |
Apparatus and method for changing language in mobile communication terminal
An apparatus and a method for supporting many languages in a mobile communication terminal are provided. In the method, at least two installable languages are determined from a multi language image file comprising language packages of at least two languages. One of the at least two installable languages is selected and installed. The multi language image file is stored. When a language is to be changed, at least two changeable languages are determined from the multi language image file. The installed language is changed by selecting one of the at least two changeable languages. Therefore, a language to be used can be easily changed without separately downloading installation information of languages. |