Document | Document Title |
---|---|
US08856961B2 |
Processing copyright notice of media file
A method for processing the copyright notice of a media file stored in digital format in an electronic device is provided. The copyright notice of the media file is checked during data transmission between two equivalent electronic devices, and if the copyright notice is not found, action is taken to insert the copyright notice. |
US08856959B2 |
Creating distinct user spaces through user identifiers
A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform. |
US08856957B1 |
Federated identity broker
A federated identity system is described. A federated identity broker registers a first customer as an identity provider and a second customer as an identity consumer. The federated identity broker acts as an intermediary between the first customer and the second customer, to broker an identity request from the first customer that is fulfilled by the second customer. |
US08856954B1 |
Authenticating using organization based information
A method is used in authenticating using organization based information. Organization based information is analyzed for information that is suitable for use in authenticating a user. The organization based information includes employee-used information. A question is derived from the organization based information. Based on the question, a process used to authenticate a user is executed. |
US08856951B2 |
License management system and method
When hardware connected to an image forming apparatus is detected, a check is performed as to whether the hardware was used with another image forming apparatus, and, if used, a license of an application that is operated by the hardware is automatically transferred so that the application can be used in the image forming apparatus to which the hardware is connected. |
US08856950B2 |
Mobile terminal and method of managing information therein including first operating system acting in first mode and second operating system acting in second mode
A mobile terminal including a communication unit configured to communicate with at least one external terminal; a memory configured to store at least first and second operating systems including at least first and second modes, respectively; and a controller configured to execute the first operating system, to activate the first mode, to control a display unit of the mobile terminal to display a mode configuration screen including selectable options for designating a designated mode corresponding to at least one of the first and second modes to a particular information, and to selectively restrict assigning the particular information from the designated mode to a non-designated mode. |
US08856947B1 |
Intrusion detection and prevention processing within network interface circuitry
A network interface controller (NIC) is configured to couple a host to a network. The NIC coupled to the host via a host bus, and the host is configured to operate a plurality of virtual machines. The NIC is configured to receive at least one data frame, the at least one data frame including at least a source network address and indication of at least one destination network address; determine if the received data frame is a frame on which additional processing should occur; based on a result of the determining step, cause the frame to be provided to the host, via the host bus, for the host to perform the additional processing; and receive, via the host bus, the frame on which additional processing has been performed and steer the frame to a destination based on the at least one destination address. |
US08856945B2 |
Dynamic security question compromise checking based on incoming social network postings
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers. |
US08856943B2 |
Dynamic security question compromise checking based on incoming social network postings
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers. |
US08856942B2 |
Privacy-aware content protection system
A method and system are disclosed for preventing rendering of content at overlapping time periods on more rendering devices than permitted by a license associated with the content. |
US08856939B2 |
Cloaking with footprints to provide location privacy protection in location-based services
A method for using a location-based service while preserving anonymity includes receiving a location associated with a mobile node, receiving an anonymity level associated with the mobile node, computing a region containing the location of the mobile node and a number of footprints based on the anonymity level, wherein each of the footprints from a different user, and providing the region to a location-based service to thereby preserve anonymity of the mobile node. A method also allow a mobile device or its user to specify the anonymity level by selecting a public region consistent with a user's feelings towards desired privacy. |
US08856938B2 |
Unvalidated privilege cap
A method for securely accessing an executable file object includes a step in which a request from the target process to access the executable file object is received by an operating system component, and the object is examined for validity before access is allowed. For objects that cannot be validated, the process is run with privileges bounded by the privilege cap, if the privilege cap permits execution of the object. |
US08856937B1 |
Methods and systems for identifying fraudulent websites
A computer-implemented method for identifying fraudulent websites. The method may include identifying a fraudulent-website toolkit. The fraudulent-website toolkit may be programmed for use in creating a fraudulent website. The method may also include determining a characteristic of the fraudulent-website toolkit and using the characteristic of the fraudulent-website toolkit to identify a website created using the fraudulent-website toolkit. The website created using the fraudulent-website toolkit may be identified by searching for websites that comprise the characteristic of the fraudulent-website toolkit. The website created using the fraudulent-website toolkit may also be identified by determining that a web browser is attempting to access the website. Various other methods and computer-readable media are also disclosed. |
US08856933B2 |
Secure system for allowing the execution of authorized computer program code
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash values including those of code modules that are approved for execution on computer systems of subscribers of the service provider. A code module information query, including a cryptographic hash value of a code module, is received from a computer system of a subscriber by the service provider. If the cryptographic hash value matches one the cryptographic hash values contained within the cloud-based whitelist and the code module is an approved code module, then the service provider responds with an indication that the code module is authorized for execution; otherwise, it (i) responds with an indication that the code module is an unknown code module; and (ii) causes one or more behavior analysis techniques to be performed on the code module. |
US08856924B2 |
Mitigating a denial-of-service attack in a cloud-based proxy service
A proxy server in a cloud-based proxy service receives a message that indicates that a domain, whose traffic passes through the proxy server, may be under a denial-of-service (DoS) attack. The proxy server enables a rule for the domain that specifies that future requests for resources at that domain are subject to at least initially passing a set of one or more challenges. In response to receiving a request for a resource of that domain from a visitor, the proxy server presents the set of challenges that, if not passed, are an indication that that the visitor is part of the DoS attack. If the set of challenges are passed, the request may be processed. If the set of challenges are not passed, the request may be dropped. |
US08856922B2 |
Imposter account report management in a social networking system
Imposter account reports received by a social networking system are put into a report management process that routes the reports into other handling processes based upon the comparison of the probability of fraud in an alleged imposter account versus the probability of fraud in an alleged authentic account. The account determined to be most probably fraudulent is enrolled in an account verification process. In the account verification process, the account-holder is asked to verify their identity automatically. If the automatic verification fails to verify the identity of the account-holder, a manual process for verification is initiated. |
US08856919B2 |
Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer interface configured to connect to a local user computer for facilitating communication with the remote server via a data communications network, a user interface configured to present information to a user, and control logic. The control logic is adapted to use security data accessible to the control logic to establish, via the local user computer, a mutually-authenticated connection for encrypted end-to-end communications with the server; collect from the server, via the connection, information indicative of any operation requested via a different connection to the server and requiring authorization by the user; and present the information to the user via the user interface to prompt for authorization of the operation. |
US08856914B2 |
System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment
A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention. |
US08856913B2 |
Method and protection system for mitigating slow HTTP attacks using rate and time monitoring
A system and methods for mitigation slow HTTP, SSL/HTTPS, SMTP, and/or SIP attacks. A protection system monitors each TCP connection between a client and a server. The protection system monitors the header request time and minimum transfer rate for each client and TCP connection. If the client has not completed the data transfer in the minimum time or the data are not transferred at the minimum transfer rate, the protection system determines the connections are potentially a slow attack and resets the connections for the protected devices. |
US08856910B1 |
Detecting encrypted tunneling traffic
Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server. |
US08856898B1 |
Methods for DNSSEC proxying and deployment amelioration and systems thereof
A method, computer readable medium, and device for providing authenticated domain name service includes forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device. The traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers. The traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device. |
US08856895B2 |
Authentication system
The invention relates to an authentication system for a user possessing a means (3) for authentication at an authentication entity (1), said authentication means including a means (11) for storing at least one status variable and a single-use access-code generator (2) actuated upon a request of the user, said access code including at least one unpredictable portion and being transmitted to the authentication entity for validation, said validation authenticating the user at the authentication entity, characterised in that the status variable is updated in a random manner by and upon the initiative of the authentication means systematically and before any generation of a new access code, in that the generator is suitable for computing the access code using the status variable once it is updated, and in that the authentication entity is adapted for modifying the value of at least one internal status variable during the at least partial validation of the access code by using information previously known by the authentication entity as well as the unpredictable portion conveyed by the transmitted access code. |
US08856893B2 |
System and method for an ATM electronic lock system
A method for ATM Electronic Lock System comprising the steps: (a) a user using ATM card and entering PIN in an ATM Electronic Lock Subsystem, (b) the ATM Lock System authenticating the user, (c) generating a RND and Local One Time Code (LOTC) with the user's personal ID, Equipment ID, (d) displaying the RND to the user and the user sending the RND to ATM management center via mobile device, (e) the Management Center authenticating the user and generating a Management Center One Time Code (MC-OTC) and sending the MC-OTC to the user's mobile device, (f) the user entering the MC-OTC to the ATM Electronic Lock Subsystem, (g) the ATM Electronic Lock Subsystem comparing the MC-OTC with LOTC, and sending unlock command to unlock the ATM Electronic Lock System to allow user to access the ATM if the MC-OTC matches the LOTC, otherwise, the ATM Electronic Lock System remains locked. |
US08856891B2 |
Proxy authentication network
A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage. The storage then decrypts the data, generates a new key, and re-encrypts the data for transmission to the requester. |
US08856882B2 |
Method of management in security equipment and security entity
Method of managing security entities positioned to cut off an information stream within a network. The method includes designating an entity to act as a sponsor for a new ward wishing to join the network, requesting to connect the ward with the sponsor, said sponsor determining whether or not it accepts the connection. If the sponsor accepts the connection, then connecting the sponsor and disconnecting from the plurality of entities forming the network. At least one of the entities and the sponsor checking a security level of said ward. If at least one of the entities decides to trust said ward, then the sponsor transmits to the ward configuration information to enable the ward to enter into communication with the network. If at least one of the entities decides not to trust the ward, then the ward cannot access the network and an alarm is generated. |
US08856880B2 |
Method for providing subscriptions to packet-switched networks
Method for providing a subscription to an IP-based Multimedia Subsystem (IMS) for a first client of a packet-switched network is provided. The first client is identified by the same MSISDN number as a second, mobile client of a circuit-switched network. The method comprises the following steps: a) sending, by the first client, a register request to an IMS Server via the packet-switched network, b) sending, by the IMS server, a location query request to a register for the IMS user identities (HSS), c) requesting, by the register for the IMS user identities (HSS), the user subscription information of the circuit-switched network from the register for the circuit-switched network (HLR), d) sending, by the register for the circuit-switched network (HLR), to the register for the IMS user identities, the user subscription information of the second client, e) creating, by the register for the IMS user identities (HSS), a user IMS subscription information based on user subscription information of the second client. |
US08856879B2 |
Social authentication for account recovery
A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account recovery code. The account recovery system sends a communication to the trustee for information to verify the trustee as one of the previously identified trustees. The account recovery system then may transmit a link and code with instructions for the trustee to return the link. The account recovery system then transmits a situational query to the trustee to provide additional security. Finally, if all the communications have been completed for the required level of security, the account recovery code is transmitted to the trustee. The trustee sends the account recovery code to the account holder for access to an account. |
US08856873B2 |
Method, apparatus, and system for sending credentials securely
A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed. |
US08856872B2 |
Computer for disconnecting itself from an external network by disabling its network card after a connection time has expired
A computer includes an enclosure, a network card connected to an external network, a time limit control device, a power module, and a switch. The time limit control device is used to set a connection time of the computer with the external network, and control a network switch module to enable the network card to connect the computer to the external network according the set connection time. The time limit control device is used to count down the connection time, and control a display module to display a remaining connection time. When a countdown of the connection time is zero, the time limit control device controls the network switch module to disable the network card and thereby disconnecting the computer from the external network. |
US08856869B1 |
Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help ensure release of sensitive data is only triggered by authorized sources. The security agent may help ensure sensitive data is only released to authorized destinations. A security agent may translate or obfuscate sensitive data. Sensitive data may include HTTP cookies, session data, authentication information, authorization information, personal information, user credentials, and/or other data sensitive in nature. Sensitive data destinations and/or sensitive data origins may be identified. Identification may be performed using secure means (such as for example a SSL/TLS handshake). Other embodiments are also disclosed and claimed. |
US08856868B2 |
Identification information integrated management system, identification information integrated management server, and computer readable recording medium recording identification information integrated management program thereon
The present application relates to a technique applied to a system for performing authentication of a user by a one-to-one verification method by using an ID and biometric information of the user. When the user registers the ID and reference biometric information in a service providing system, the information is transmitted from the relevant service providing system to a management server. Then, in the management server, ID management by the reference biometric information is performed, and when the user inputs a wrong ID at the time of verification before the relevant service providing system starts to provide a service, a correct ID of the relevant user is found. |
US08856861B2 |
Generic rights token and DRM-related service pointers in a common protected content file
Methods and systems of rendering content on a device having a native digital rights management (DRM) system are described. A device, such as an end-user device capable of executing or playing content, acquires content in a common content format file having standardized locations for specific types of data. A generic digital rights token associated with the content is obtained by utilizing one of the standardized locations in the content format file, where the rights token contains information sufficient to allow retrieval of the rights associated with the content. Utilizing data in another of the standardized locations, it is then determined whether the device is registered in a domain. A license server directory may be accessed utilizing data in another of the standardized locations in the common content format file and a domain identifier, a device identifier, or both are transmitted to the license server directory. A native DRM system trigger is received and, upon activation of the trigger, a native DRM license is acquired, thereby enabling rendering of the content in the common content format file on the device. |
US08856860B2 |
System and method for implementing policy server based application interaction manager
In one example embodiment, an apparatus includes a policy repository for storing a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. Another example embodiment includes an apparatus including a processor operable to evaluate a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. The processor is further operable to execute a decision for the subscriber based on the evaluation of the policy. |
US08856858B2 |
System for establishing communications with a mobile device server
A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium operating in a mobile device server having computer instructions to execute a web server application in the mobile device server. The web server application can be operable to cause a media processor to invoke a software application in the mobile device server. The mobile device server can support voice communications over a cellular communication system. Other embodiments are disclosed. |
US08856852B2 |
Method of obtaining television content from a serving node
A method and system for micro-cloud computing is described. An application serving node, which is a specifically configured piece of customer premises equipment such as a set-top box, is the server for a micro-cloud network. Various user devices that form part of the micro-cloud network, such as television sets and smart phones, communicate with the application serving node. The application serving node is configured with software that allows various heterogeneous types of data to be obtained and streamed to the user devices in multiple ways. The application serving node performs much of the processing necessary for such content streaming itself and thus represents an edge-based network architecture. |
US08856847B2 |
Systems and methods for providing a customized program lineup
Systems and methods for delivering content according to a customized program lineup are provided. A content source transmits a plurality of media assets in a first schedule according to scheduled transmission times. A processing device may receive a user input to receive the media assets in a second schedule different from the first schedule. When a request to access the content source is received, the processing device may automatically determine, based on the second schedule, whether the user has requested a different media asset than the originally-scheduled asset at the time of the request. If the user has requested a different media asset, the processing device may automatically receive and provide the different media asset instead of the originally-scheduled asset. |
US08856845B2 |
Method and system for providing personalized contents
A method is provided for a personalized content delivery system. The method includes detecting a viewing activity of at least one user of a content-presentation device capable of presenting multiple programs in one or more channels, and determining a plurality of user identities of the at least one user. The method also includes discovering available video contents for the at least one user based on the plurality of user identities, and determining personalized video contents for the at least one user by merging the plurality of user identities. Further, the method includes recommending the determined personalized video contents to the at least one user, and delivering the recommended personalized video contents to the at least one user such that the personalized video contents are presented on the content-presentation device. |
US08856844B2 |
Systems and methods for automatically purchasing and recording popular pay programs in an interactive media delivery system
A system and method for automatically purchasing and recording popular pay program is disclosed. The pay programs are selected based on defined criteria and popularity. The most popular pay program that meets defined criteria will be automatically recorded and purchased. Notifications and confirmations are provided before purchase of pay programs. |
US08856843B1 |
Method and system for adding local channels and program guide data at a user receiving device in an aggregated content distribution system
A method and system for generating local channels includes a user receiving device and a local headend in communication with the user receiving device generating a local channel using a multicast stream, generating local channel guide data comprising tuning data for the local channel and communicating a control command to a user receiving device. The control command comprises tuning data for the local channel. The user receiving device stores tuning data for the local channel with program guide data stored in the user receiving device in response to the control command. |
US08856842B2 |
Wireless video clock synchronization to enable power saving
In a wireless video system, the clock rate for wirelessly transmitting the video data from the transmitting device should be identical to the clock rate for receiving the video data at the receiving device. But the two devices have separate clocks, whose frequencies may drift apart over time, leading the video buffer to be over run or under run. Clock synchronizing messages to prevent this may be sent at short intervals when clock synchronization is first being acquired, and at larger intervals after clock synchronization has already been achieved and is merely being maintained. |
US08856841B2 |
Methods, systems, and products for customizing content-access lists
Systems, methods, and computer program products describe customizing the presentation of a content-access list. A preference for a subscriber is received, and a content database is searched for content related to the preference and for content unrelated to the preference. An option list is received including an option, and a non-preference-related option is also received. The non-preference-related option is added to the option list, and the option list is sent to the subscriber. |
US08856835B2 |
Method and system for associating content and content information in a menu structure
A system and method includes a user device and a content processing system receiving content from a content provider, assigning a material identification to the content, receiving content information different than the content, associating the content information and the content and communicating the content information and material identification to the user device. The user device forms a menu from the content information and associated material identification, generates a menu selection from the menu, and communicates the material identification associated with the menu selection to the content processing system. The content processing system communicates the content corresponding to the menu selection to the user device. |
US08856833B2 |
Maintaining a user profile based on dynamic data
The present invention allows users to interact with people, who have interacted with other people, and obtain media files and recommendations from those having common interests, thereby creating interactive media communities and spawning electronic social networks based on media and other types of electronic entertainment. |
US08856830B2 |
Method, apparatus and system for providing access to product data
VISUAL IMAGE MARKETING (VIM) is a system whereby the visual image on a film or television program is utilized to market that specific product. In VIM, film.backslash.television is combined with computer technology to provide real-time or delayed access to product data. Viewers identify a product or object displayed in a video, television show or movie and by merely pointing and clicking on the object to obtain marketing and other data. |
US08856823B2 |
Methods and systems for synchronizing delivery of media content streams having different resolutions
An exemplary method includes processing a first program stream representative of media content having a first resolution and a second program stream representative of the media content having a second resolution, generating a single advertisement stream representative of advertisement content having a third resolution, detecting a transmission lag between the first and second program streams, dynamically synchronizing the first and second program streams to substantially remove the detected transmission lag, transmitting the synchronized first program stream by way of a first content channel, the synchronized second program stream by way of a second content channel, and the advertisement stream by way of an advertisement channel, and directing a media content access device to switch from being tuned to the second content channel to being tuned to the advertisement channel during an advertising break in the media content. Corresponding methods and systems are also disclosed. |
US08856818B2 |
System and method for in-home set top box management
A video services control system comprises a set top box coupled to a television and a video services network configured to provide video services to the television via the set top box. The video services network includes an application program operable to develop and implement individualized usage restriction profiles for users of the set top box to control video services viewing. The application program is configured to provide a designated administrator with authority to dictate the usage restriction profile for non-designated users. The individualized usage restriction profiles include restrictions on the content of video services shown on the television for viewing by the users. The application program is configured to receive information input by the designated administrator, develop each usage restriction profile based on the input information unique to each user, and implement each usage restriction profile to control video services viewing by the users. |
US08856811B2 |
Disk drive apparatus and conveyance roller thereof
A disk drive apparatus is provided. The disk drive apparatus includes: a frame which includes a slot to insert a disk therethrough; a spindle motor assembly which includes a turntable including a disk seating part and a chucking member, and a spindle motor to rotate the turntable; a traverse assembly which mounts the spindle motor thereon and is movable in a direction perpendicular to an inserting direction of the disk; a conveyance roller which is movable between a contact position and a non-contact position with the disk and conveys the disk using a friction force; and a roller driving unit which moves the conveyance roller from the non-contact position to the contact position after an unchucking operation of the disk is completed, when the disk is unloaded. |
US08856807B1 |
Alert event platform
Various systems, processes, tools and techniques are provided for managing and processing alerts associated with different business events that impact a corporate entity. In various aspects, the system may employ an event-driven architecture to process business events and then provide customers and other system users with a mechanism for having have visibility into those business events through a subscription process, for example. Subscribers may be offered the ability to tap into different streams of business events, filter the event streams to obtain information only for events of interest, and then receive alerts associated with the events via one or more communication media or channels. |
US08856805B2 |
Virtual channel for embedded process communication
A native application built for a mobile device can embed non-native JAVA code that may be executed by a JAVA virtual machine also embedded as a library within the native application. Enterprise applications may be extended for use by mobile devices. Business logic for an application may be constructed just once and then used in both enterprise applications and mobile device applications. |
US08856804B2 |
Performance indicator for measuring responsiveness of user interface applications to user input
A method for measuring application responsiveness measures the time elapsed between receiving and processing a trailing tag message inserted into the application's message queue. The method receives a message, generates a trailing tag message associated with the message, and inserts the trailing tag message into the application's message queue. The trailing tag message includes a timestamp indicating when the trailing tag message was queued. A default message handler calculates the time elapsed between when the trailing tag message was queued and when the trailing tag message was processed. The elapsed time may then be used to calculated system responsiveness. |
US08856803B2 |
Content delivery within an application
A view component of an application requests content from a model component of the application, where the request for content includes a request for data. The model component determines whether the requested data is available. If the requested data is available, the model component delivers the requested content and the requested data. If the requested data is not available, the model component first delivers the requested content and a data placeholder, and after the model component retrieves the data, the model component delivers the requested data to replace the data placeholder. |
US08856801B2 |
Techniques for executing normally interruptible threads in a non-preemptive manner
A technique for executing normally interruptible threads of a process in a non-preemptive manner includes in response to a first entry associated with a first message for a first thread reaching a head of a run queue, receiving, by the first thread, a first wake-up signal. In response to receiving the wake-up signal, the first thread waits for a global lock. In response to the first thread receiving the global lock, the first thread retrieves the first message from an associated message queue and processes the retrieved first message. In response to completing the processing of the first message, the first thread transmits a second wake-up signal to a second thread whose associated entry is next in the run queue. Finally, following the transmitting of the second wake-up signal the first thread releases the global lock. |
US08856800B2 |
Service-level enterprise service bus load balancing
A method and system for service-level Enterprise Service Bus (ESB) load balancing is described. In one system, an ESB load balancer tracks service usage of multiple nodes, each hosting an ESB instance. The ESB load balancer receives an incoming message directed to a given type of service, determines which of the ESB instances has a least-used service of the given type, and forwards the incoming message to that ESB instance. |
US08856798B2 |
Mobile computing device activity manager
A system and a method are disclosed for an activity manager providing a centralized component for allocating resources of a mobile computing device among various activities. An activity represents work performed using computing device resources, such as processor time, memory, storage device space or network connections. An application or system service requests generation of an activity by the activity manager, causing the activity manager to associate a priority level with the activity request and identify resources used by the activity. Based on the priority level, resources used and current resource availability of the mobile computing device, the activity manager determines when the activity is allocated mobile computing device resources. Using the priority level allows the activity manager to optimize performance of certain activities, such as activities receiving data from a user. |
US08856797B1 |
Reactive auto-scaling of capacity
Examples of systems and methods are described for managing computing capacity by a provider of computing resources. The computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. Multiple user programs can consume a single computing resource, and a single user program can consume multiple computing resources. Changes in usage and other environmental factors can require scaling of the computing resources to reduce or prevent a negative impact on performance. In some implementations, a fuzzy logic engine can be used to determine the appropriate adjustments to make to the computing resources associated with a program in order to keep a system metric within a desired operating range. |
US08856796B2 |
Methods and system for executing a program in multiple execution environments
A method and a medium are disclosed for executing a technical computing program in parallel in multiple execution environments. A program is invoked for execution in a first execution environment and from the invocation the program is executed in the first execution environment and one or more additional execution environments to provide for parallel execution of the program. New constructs in a technical computing programming language are disclosed for parallel programming of a technical computing program for execution in multiple execution environments. It is also further disclosed a system and method for changing the mode of operation of an execution environment from a sequential mode to a parallel mode of operation and vice-versa. |
US08856795B2 |
Reducing costs for a distribution of applications executing in a multiple platform system
Embodiments of the claimed subject matter are directed to methods and a system that allows the reduction of costs attributed to executing applications on a multi-platform system (such as a mainframe) by migrating certain processes operating on one platform to another platform in the system. In one embodiment, the reduction of cost is achieved by a method for migrating an application executing in a partition operating a proprietary operating system to a second partition operating an alternate operating system and leveraging special purpose processors unavailable to the proprietary operating system, which can be much less costly to purchase and/or rent and license. |
US08856793B2 |
System, method and program for scheduling computer program jobs
Scheduling a program for periodic execution. The program requires a computer resource for execution. The historic availability of the resource is determined and recorded at a multiplicity of times a day. Subsequently, a request is received to schedule a program for execution on the day at a specified time and daily thereafter at the specified time or weekly or monthly thereafter on the day at the specified time. If there has been sufficient historic availability of the resource on the day at approximately the specified time, the program is scheduled for execution on the day at the specified time and daily thereafter at the specified time or weekly or monthly thereafter on the day at the specified time as requested. If not, the program is scheduled for execution at another time on the specific day close to the specified time. |
US08856790B1 |
Systems and methods for data management in a virtual computing environment
Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon thereon. In certain examples, a management server is configured to inject dependencies, such as binary data, over a network to the host system for performing a requested operation. For instance, systems and methods can establish a secure shell (SSH) port forwarding connection through which dependencies stored on the management server are injected into a service console of the host system. The injected dependencies can then be executed and/or used to perform the requested operation, such as a backup or compression operation on virtual machine data. Once the requested operation has completed, the injected binaries are preferably removed from the host system so as to conserve system resources. |
US08856787B2 |
On-boarding applications to a cloud
Methods and arrangements for on-boarding an application to a cloud. An application for hosting in a cloud environment is provided. Metadata related to the application is provided, and metadata related to the cloud is obtained. The application metadata and cloud metadata are compared, and the compatibility of the application with existing offerings of the cloud is ascertained. The application is on-boarded to the cloud. |
US08856782B2 |
On-demand disposable virtual work system
An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes. |
US08856780B2 |
Method and system to remotely flash an external module
A method to remotely flash an external module comprises the steps to electronically transfer a computer program from a computer device to an external module, to partially install the external module to a vehicle, to extract the key data from a device securing the vehicle, to transfer the key data to a computer, to analyze and process the key data with a computer program generating a new computer program allowing the external module to communicate with the security device, to transfer the generated computer program to the external module, to complete the installation of the external module to the vehicle. |
US08856776B2 |
Updating firmware without disrupting service
A method, system, and computer usable program product for updating firmware without disrupting service are provided in the illustrative embodiments. An updated firmware code is sent to a first firmware component and a second firmware component. The first firmware component is a primary firmware component and the second firmware component is a backup firmware component in a redundant firmware configuration. The updated firmware code is installed in second firmware component. The updated firmware code is activated in a third firmware component. The third firmware component is in communication with the first firmware component. A fail-over from the first firmware component to the second firmware component is performed such that a user communicating with the data processing system and receiving a service using the first firmware component continues to receive the service using the second firmware component without a disruption in the service. |
US08856775B2 |
Unstacking software components for migration to virtualized environments
Techniques for unstacking software components are provided. The techniques include discovering a plurality of software components and one or more dependencies between the software components in a computer system, designing a plurality of unstacking options for unstacking said components, and selecting one of said unstacking options to unstack said components. |
US08856773B2 |
Image forming apparatus including a device that updates stored program based on updating data which is selected based on program that is started or startable
An image forming apparatus includes a storage section that stores programs for carrying out processes, an updating data selection section that selects an updating data for at least one of programs from an updating data group, based on a program that is started or is startable, and an updating section that updates at least one arbitrary program stored in the storage section based on the selected updating data. |
US08856772B2 |
Server and firmware updating method
A server includes a Southbridge chipset, a USB port, a storage device, a baseboard management controller (BMC), and a switch. When the BMC is powered on and started, the BMC establishes communication between a USB device connected to the server and the BMC by uploading a driver of the USB device from the storage device to memory of the BMC. In response to receiving a firmware update command in relation to the BMC, the BMC disconnects an electrical connection between the USB port and the Southbridge chipset, and establishes an electrical connection between the USB port and the BMC using the switch. Then, the BMC reads updated firmware data from the USB device via the USB port, writes the updated firmware data into the memory, and updates the firmware of the BMC by writing the updated firmware data into the storage device. |
US08856771B2 |
Protection for unauthorized firmware and software upgrades to consumer electronic devices
A firmware or software update, patch, or upgrade image is authenticated by forcing its checksum to match a pre-determined value. The pre-determined value is known by a consumer electronic device in advance of propagating the image for installation. Upon propagation, the device determines a checksum value of the received imaged, and compares the checksum value to the pre-determined expected authenticity value. If they match, the image is installed. In an optional feature, the image is executed by the device and modifies the pre-determined checksum value to a next value, which is also shared or known by the image server. In this variation, no two images have the same expected value, and unauthorized images may be rejected for installation. |
US08856768B2 |
System and method for compiling machine-executable code generated from a sequentially ordered plurality of processor instructions
A method and system are provided for deriving a resultant software program from an originating software program having overlapping branches, wherein the resultant software project has either no overlapping branches or fewer overlapping branches than the originating software program. A preferred embodiment of the invented method generates a resultant software program that has no overlapping branches. The resultant software is more easily converted into programming reconfigurable logic than the originating software program. Separate and individually applicable aspects of the invented method are used to eliminate all four possible states of two overlapping branches, i.e., forward branch overlapping forward branch, back branch overlapping back branch, and each of the two possible and distinguishable states of forward branch and back branch overlap. One or more elements of each aspect of the invention may be performed by one or more computers or processors, or by means of a computer or a communications network. |
US08856767B2 |
System and method for analyzing dynamic performance of complex applications
A system and method for monitoring the performance and execution flow of a target application and generating a corresponding data model are provided. The system and method comprise attaching to a thread or process of a target application and tracking the execution of subroutines using instrumentation commands. Data representing the execution flow of the various subroutines, subroutine calls, and their performance is gathered and used to generate data models representing the threads and processes of the application. The data models are optionally merged and/or pruned. A visualization of the data models is generated indicating relevant points of interest within the target application's execution flow. |
US08856766B2 |
Generating layouts for graphs of data flow applications
An embodiment of the invention provides a method of displaying a data flow, wherein a description of a data flow application to be displayed is received. The data flow application includes nodes and edges connecting the nodes, wherein the nodes represent operators and the edges represent data connections for data flowing between the operations. A reason that a user is to view the data flow and/or a user constraint on a complexity of the data flow application to be displayed is determined with a processor; and, the time required to render a display of the data flow application is estimated. A transformed representation of the data flow application is created with the processor. The transformed representation is created based upon the user reason, the user constraint, the estimated time of rendering, and/or a layout strategy. The transformed representation is displayed on a graphical user interface. |
US08856764B2 |
Distributed static analysis of computer software applications
A method for distributed static analysis of computer software applications, includes: statically analyzing instructions of a computer software application; identifying at least one entry point in the computer software application; assigning a primary agent to statically analyze the computer software application from the entry point; assigning a secondary agent to statically analyze a call site encountered by the primary agent and produce a static analysis summary of the call site; and presenting results of any of the static analyses via a computer-controlled output device. |
US08856762B2 |
Loop detection apparatus, loop detection method, and loop detection program
A loop detection method, system, and article of manufacture for determining whether a sequence of unit processes continuously executed among unit processes in a program is a loop by means of computational processing performed by a computer. The method includes: reading address information on the sequence of unit processes; comparing an address of a unit process as a loop starting point candidate with an address of a last unit process in the sequence of unit processes; reading call stack information on the sequence of unit processes; comparing a call stack upon execution of the unit process as the loop starting point candidate with a call stack upon execution of the last unit process; outputting a determination result indicating that the sequence of unit processes forms a loop if the respective comparison results of the addresses and the call stacks match with each other. |
US08856761B2 |
Instruction processing method, instruction processing apparatus, and instruction processing program
An instruction processing method includes generating a translated code block for an instruction, among instructions included in a target program to be executed and for which a number of executions through sequential interpretation is greater than or equal to a threshold, and storing the generated translated code block in a first storage unit and removing part or all of the translated code block from the first storage unit at a given timing, wherein the generating reduces the threshold with respect to the number of executions over a given period of time after the part or all of the translated code block is removed. |
US08856756B2 |
Simulation control techniques
Simulation control techniques include shutting down peer processes and user code modules, storing an image of a simulation as a checkpoint after the peer processes and user code modules are shutdown, and re-starting user code modules and peer processes after storing an image of the simulation. The resulting checkpoint and processes can be used for restoring from a checkpoint or restarting a new simulation environments having peer processes such as debuggers coupled to the simulation. |
US08856755B2 |
Dominant-state-based coverage metric
A method, apparatus and product for dominant state based coverage metric. The method comprising: determining whether all possible states of a computer program were examined based on an analysis of states that were examined excluding controlled states that are dominated by a self-dominating states; wherein the controlled states are associated with a controlled nodes in a control flow graph of the computer program, wherein the self-dominating states are associated with a self-dominating node in the control flow graph; wherein each execution path in the control flow graph that reaches the controlled nodes also includes the self-dominating node; and wherein there exists an execution path in the control flow graph that both starts and ends at the self-dominating node and further includes at least one controlled node. |
US08856754B2 |
Systems and methods for enhanced profiling of computer applications
Systems, methods, and computer-readable media are disclosed for enhanced profiling. An exemplary method includes initiating an execution of a software application which includes a plurality of routines, storing information related to data inputs to the plurality of routines during the execution of the software application, storing resource consumption information for the plurality of routines during the execution of the software application, correlating the resource consumption information for the plurality of routines to a size of the data inputs, and analyzing the correlated resource consumption information to determine a subset of the plurality of routines that exhibit at least a threshold amount of resource consumption with increasing size of the data inputs. |
US08856750B2 |
Task-based evaluation of user interfaces
A system and method for evaluating interfaces includes computing a reference script for a task from a reference interface design and translating the reference script into one or more target action scripts based on a target design. The one or more target action scripts on the target design are executed to produce target metrics. The target metrics are compared to determine whether the target action script successfully translates the reference script. |
US08856745B2 |
System and method for using a shared standard expectation computation library to implement compliance tests with annotation based standard
A system and method can implement compliance tests with annotation based standards using a model library. The model library encapsulates expectation computation logic described in one or more annotation based assertions. A compliance test can obtain an actual value for one or more software properties based on evaluating a source file that contains one or more annotations that is defined by the one or more annotation based assertions, and can determine an expected value for the one or more software properties using the model library. Then, the compliance test can compare the actual value for the one or more software properties with the expected value for the one or more software properties. |
US08856739B2 |
Method of updating list of software-as-a-service and system for the same
A method of updating a list of SaaS and a system for the same are provided. A software server of the present invention updates a software list, in which information about software provided to a user terminal is recorded, on the basis of use information for at least one software program received from the user terminal. The software server includes a receiver that receives software use information, and a processor that determines software to be added to a software list and software to be removed from the software list to update the software list on the basis of the received software use information. Accordingly, software that is provided as a service from a server is automatically updated on the basis of software use information, thus overcoming limitations that are caused by setting a service list according to the individual determination of a manager of the server. |
US08856738B2 |
System and method for transplanting source code
A method of integrating an existing source code into a target source code, the method including mapping a plurality of candidate mappings between a change point of the existing source code and a plurality of change points of the target source code, selecting a candidate mapping of the plurality of candidate mappings, automatically updating the existing source code based on the candidate mapping having been selected, and transplanting the existing source code having been updated into the target source code. |
US08856734B2 |
Type-safe dependency injection of services into enterprise components
A system, method, and medium are disclosed for implementing an application component container. The container is configured to detect that a component managed by the container is dependent on an interface that is implemented by a dynamic module provided by a dynamic module system. The container uses a dependency injection framework to inject the implementation into the dependent component in a type-safe manner. |
US08856731B2 |
Scalable language infrastructure for electronic system level tools
Systems and methods of scalable language infrastructure for electronic system level tools. In accordance with embodiments of the present invention, knowledge about types, functions and the like is encapsulated in a plurality of intelligent components called active component extension modules that are external to the infrastructure. The infrastructure implements a communication mechanism between the clients and these intelligent components, and acts as a common backbone. The infrastructure itself does not maintain any knowledge about any client, types, functions, etc. In accordance with a method embodiment of the present invention, a request is received from a client of a language infrastructure. The request is forwarded from the language infrastructure to an active component extension module. The active component extension module performs a service responsive to the request. |
US08856728B2 |
Composition studio to develop and maintain surveillance and compliance scenarios
A system for generating a plurality of surveillance and compliance scenarios includes a first user interface comprising a graphical modeling tool for writing fraud detection logic in a first language and a second user interface for creating one or more configurable threshold parameters, one or more general parameters, as well as one or more configurable subsets of filters to be applied to the detection logic. The system is configured to interpret the fraud detection logic in the first language and translate the fraud detection logic into a second language that is capable of performing the fraud detection on a subset of transactions data after application of the one or more configurable subsets of filters to the detection logic, as well as limiting a number of alerts that can be generated after application of the threshold and general parameters. |
US08856727B2 |
Generation framework for mapping of object models in a development environment
A delta handler can allow calculation of difference between an already generated set of backend entities and a set of new entities necessary to support a primary object affected by a change made in a development environment supporting extensions to a backend model of a software architecture. Improved stability and robustness can be provided via an approach in which a target list of activities relating to creating, changing, or deleting of entities in backend repositories necessary to support the affected primary object is created and a sequence for performance of the activities in the target list is determined in a manner that can allow handling of such activities in a unified manner rather than on a per object type basis. Related methods, systems, articles of manufacture, and the like are described. |
US08856726B2 |
Verification of computer-executable code generated from a slice of a model
In an embodiment, a model is sliced into a plurality of slices. A slice in the plurality of slices is selected. A portion of code, that corresponds to the selected slice, is identified from code generated from the model. The identified code is verified to be equivalent to the selected slice. Equivalence may include equivalent functionality, equivalent data types, equivalent performance, and/or other forms of equivalence between the selected slice and the identified generated code. |
US08856722B2 |
System for semiconductor device, method for manufacturing semiconductor device, semiconductor device and method for bonding substrates
The terminals that oppose each other when substrates are bonded are designed to be reliably joined. Comprised in a semiconductor device design system are a numerical value acquiring part, which acquires the respective numerical values of a plurality of calculation parameters, a junction estimating part, which, in the case in which a plurality of substrates has been pressed at a prescribed pressure so that the bump front end faces come into contact, estimates whether or not the respective mutually opposing bumps will be joined based on the respective numerical values of the calculation parameters acquired by the numerical value acquiring part, and a change processing part, which, in the case in which it has been estimated by the junction estimating part that any of the bumps will not be joined, gives a warning or performs processing so as to change the numerical value of at least one calculation parameter among the plurality of calculation parameters. |
US08856720B2 |
Test coverage of integrated circuits with masking pattern selection
A method of locating faulty logic on a semiconductor chip is disclosed. The method may include determining failure rates for the semiconductor chip, which contain one or more logic elements. The method also may include determining a masking pattern using failure rates. The masking pattern may mask less than all of the logic elements using a determination method. The method may also include applying a test vector to a selected logic element, wherein the result from a test vector is compared to a reference. |
US08856715B1 |
Capacitor designs for integrated circuits utilizing self-aligned double patterning (SADP)
Methodologies enabling BEoL VNCAPs in ICs and resulting devices are disclosed. Embodiments include: providing a plurality of mandrel recesses extending horizontally on a substrate, each of the mandrel recesses having an identical width and being separated from another one of the mandrel recesses by an identical distance; providing a plurality of routes, each of the plurality of routes being positioned in a different one of the mandrel recesses; and providing first and second vertical segments on the substrate, the first vertical segment being connected to a set of the plurality of routes and separated from the second vertical segment, and the second vertical segment being separated from the set of routes. |
US08856712B2 |
Optimized flip-flop device with standard and high threshold voltage MOS devices
A flip-flop operating with standard threshold voltage MOS devices as compared with high threshold voltage MOS devices may have improved speed performance, but greater leakage current. Likewise, a flip-flop operating with high threshold voltage MOS devices may reduce the leakage current and have better power efficiency, but decreased speed and performance. An optimized flip-flop may include a combination of standard threshold voltage MOS devices and high threshold voltage MOS devices. The optimized flip-flop may have less leakage during stand-by mode as compared to a flip-flop with standard threshold voltage MOS devices. In addition, the optimized flip-flop may have better performance and speed as compared to a flip-flop with high threshold voltage MOS devices. |
US08856711B2 |
Apparatus and methods for time-multiplex field-programmable gate arrays
A time-multiplexed field programmable gate array (TM-FPGA) includes programmable logic circuitry, programmable interconnect circuitry, and a plurality of context registers. A user's circuit can be mapped to the programmable logic circuitry, the programmable interconnect circuitry, and the plurality of context registers without the user's intervention in mapping the design. |
US08856709B2 |
Systems and methods for correlated parameters in statistical static timing analysis
Systems and methods for accommodating correlated parameters in SSTA are provided. The method includes determining a correlation between at least two parameters. The method further includes calculating a new parameter or a new parameter set based on the correlation between the at least two parameters. The method further includes performing the SSTA such that the new parameter or the new parameter set is propagated into the SSTA. The method further includes projecting slack using the correlation between the at least two parameters and using a processor. |
US08856704B2 |
Layout library of flip-flop circuit
Provided is a layout library having a plurality of unit layouts in which the same flip-flop circuit is implemented. In the layout library, at least two unit layouts have mutually different arrangement structures. Therefore, coupling capacitances seen at an equal node with respect to the two flip-flop circuits appear to be different from each other. A semiconductor designer can select a layout in which a desired coupling capacitance is set through wiring, and through this, can adopt a required flip-flop circuit. |
US08856702B1 |
Method and apparatus for performing multiple stage physical synthesis
A method for designing a system on a target device includes entering the system. The system is synthesized. The system is mapped. The system is placed on the target device. The system is routed. Physical synthesis is performed on the system immediately after more than one of the entering, synthesizing, mapping, placing and routing procedures. |
US08856701B1 |
Method of radio-frequency and microwave device generation
The present disclosure relates to an apparatus and method to generate a device library, along with layout versus schematic (LVS) and parasitic extraction set-up files for connecting with official tools of a design window supported by a process design kit (PDK). The device library comprises passive devices which can be utilized at any point in an end-to-end design flow from pre-layout verification to post-layout verification of an integrated circuit design. The device library allows for a single schematic view for pre-layout verification but also post-layout verification, thus allowing for pole or pin comparison, and prevents double-counting of parasitic effects from passive design elements by directly instantiating a device from the device library for a verification step. An LVS and parasitic extraction graphical user interface (GUI) allows for incorporation of the generated device library into a pre-existing PDK without any modification to the PDK. Other devices and methods are also disclosed. |
US08856699B2 |
Three dimensional integrated circuits
A three-dimensional semiconductor device, comprising: a circuit block located in a first module layer; and a configuration circuit to control the circuit block further comprising a configurable element in a second module layer positioned above the first module layer. |
US08856690B2 |
Associating gestures on a touch screen with characters
The present invention provides methods for associating a gesture, in contact with a touch screen, with a character. More specifically, the present invention links a user's movement on a surface of a device to represent a character. A character includes any number, letter, or symbol. For example, an illustrative embodiment of the present invention, a user may swipe a surface on their device such as a cell phone. The present invention recognizes the swipe to represent the number “0,” a swipe in another direction to represent the number “1,” a tap in the middle region to represent the number “2,” etc. |
US08856681B2 |
Method and system for automatically resizing and repositioning windows in response to changes in display
Windows in a graphical user interface are automatically repositioned and resized in response to changes in a display configuration. If a window is not capable of being fully displayed within the reconfigured display area, it is constrained to fit the available space. In determining the constraints for the window, the window is given a size which permits an integral amount of information to be displayed to the user. If a minimum required size is not already present in the available display area, the window is moved into the available area until the minimum size is attained. If the visible portion of the window already contains the minimum required area, a determination is made whether additional integral components of the window can be displayed. The window is then appropriately shrunk or expanded to permit an integral number of components to be displayed, and control elements are added to the window. |
US08856678B1 |
Using touch input to select, shrink, and fold displayed content
A display device and a method of controlling therefor according to one embodiment relate, if a display area of the display device does not have an enough space to display a whole content, to the display device providing only a content area which a user wants to see and providing an easy-to-use scrolling environment to the user by folding a part of the whole content and the method of controlling therefor. |
US08856677B2 |
Electronic text viewing apparatus, electronic text viewing method, and mobile phone
An electronic text viewing apparatus includes a viewing application unit that outputs viewing data for displaying a text in a viewable manner, a display unit that displays the viewing data and a fast reading button for receiving a fast reading request for the viewing data, a viewing data requesting unit that issues a request for acquirement of the viewing data to the viewing application unit, and acquires the viewing data to be viewed, a setting data storage unit that stores setting data for the acquired viewing data, and a fast reading viewer control unit that, when the fast reading button is pressed, converts the viewing data into fast reading viewer data by performing display format conversion, display speed control and scroll control of the viewing data, and displays the fast reading viewer data and a return button for converting the fast reading viewer data to the viewing data. |
US08856676B1 |
Pre-filling input fields using heuristic data
In one example, a method receiving information indicating that an input field displayed at a presence-sensitive screen has been accessed, wherein the information comprises an input field identifier that identifies the input field. The method further includes selecting heuristic data based on the input field identifier, wherein one or more properties of the heuristic data are usable to generate at least a portion of an input value. The method further includes generating at least the portion of the input value based on the one or more properties of the heuristic data, wherein at least the portion of the input value is assignable to the input field displayed at the presence-sensitive screen. |
US08856670B1 |
Technique for customizing a user interface
A customization technique that provides a customized user interface in software to a user based on user behaviors while using the user interface during one or more sessions is described. In this customization technique, a usage pattern of the user is determined from the user behaviors, and a user-specific customization of the user interface is generated based on the determined usage pattern. Note that determining the usage pattern may involve generating a directed graph in which vertices correspond to visual components in the user interface and edges between vertices correspond to user behaviors. Then, the user interface in a current release of the software is customized based on the user-specific customization. For example, the customized user interface may include: only a subset of the visual components; a different order of the visual components; and/or a visual component associated with a set of operations. |
US08856668B2 |
Drug delivery devices and related systems and methods
In some aspects, a method includes displaying multiple different screens on a user interface during a treatment, administering a first drug during the treatment; and while administering the first drug, displaying an identifier of the first drug in a drug identification region of the user interface. The drug identification region is present on the user interface with each of the different screens, and the identifier of the first drug is displayed in the drug identification region of the user interface regardless of which of the different screens is displayed. |
US08856664B2 |
Prompting of recipient expertise in collaboration environment
A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface. |
US08856659B2 |
Method for automatically creating book definitions
Book definitions can be dynamically created based on content provided by a user. Such dynamic creation can include organization of user-supplied content into appropriate form, adjustment of book cover properties to match the user-supplied content, and verification that the user supplied content is appropriate for presentation in book form. Various interfaces can also be provided which allow users to generate a book definition based on a minimum of information. |
US08856656B2 |
Systems and methods for customizing photo presentations
Various systems and methods are described for customizing photo presentations. One particular method comprises receiving by the media display system, a plurality of photos depicting individuals and displaying one or more controls for specifying an action to one or more selected individuals. The method further comprises receiving a selection of one or more individuals, generating an action list according to the selection, and customizing the photo presentation comprising photos from among the received plurality of photos according to the action list and according to the analyzed facial regions. |
US08856655B2 |
Media editing application with capability to focus on graphical composite elements in a media compositing area
Some embodiments provide a media editing application that allows a user to focus on a subset of media clips that the application combines to create a composite presentation. The media editing application of some embodiments includes a display area for displaying the composite presentation that the application creates by compositing several media clips (e.g., audio clip, video clip). The multimedia editing application of some embodiments also includes a composite display area (e.g., an area with multiple tracks that span a timeline) for displaying graphical clips representations of media clips that are part of the composite presentation. To focus on a subset of clip representations in the composite display area, the application of some embodiments also includes a tool for causing a first emphasized subset of clip representations (also referred to as “in-focus clips”) to appear larger in the composite display area than a second de-emphasized subset of clip representations (also referred to as “out-of-focus clips”) that are being concurrently represented in the composite display area. |
US08856653B2 |
Video display apparatus, video display management apparatus, video display method and video display management method
According to one embodiment, a video display apparatus includes a selection module, a Web information analysis module, a screen generation module, a transmission module, a reception module, and an alteration module. The selection module is configured to select a partial area of a Web page. The Web information analysis module is configured to analyze first Web information which specifies the partial area. The screen generation module is configured to generate a screen for displaying page information of the partial area, based on the first Web information. The transmission module is configured to transmit the first Web information to an external apparatus. |
US08856648B2 |
Apparatuses and methods for rearranging menu items
An electronic interaction apparatus is provided with a processing unit. The processing unit detects a drag event on a touch screen to indicate a first position to which a menu item is moved, and determines whether the first position corresponds to a page indicator other than a currently highlighted page indicator. If so, the processing unit further configures the touch screen to display a plurality of first menu items corresponding to the page indicator. |
US08856645B2 |
Generating formatted documents based on collected data content
Embodiments described herein include a document generator, which is implemented using a computing system with one or more computing devices, to generate a formatted document associated with a collection of data page units. The document generator or can include a collector, an organization unit, and a formatting unit. The collector facilitates collecting data page units in response to a user selection. The data page units are collected intact and in their original format and are associated with a first ordered sequence. The organization unit facilitates re-sequencing the data page units to associate the data page units with a second ordered sequence. The formatting unit facilitates outputting a formatted document incorporating the collected data page units in the second ordered sequence. |
US08856644B1 |
System, method, and architecture for displaying a document
Data defining a document is received from an online document processing service, and a plurality of elements within the document is identified. The plurality of elements may comprise paragraphs, lines of text, images, tables, headers, footers, footnotes, footnote reference information, etc. For each of the plurality of elements, a respective object comprising a layout function and a render function is generated. An object corresponding to an element is invoked to generate layout data associated with the element, and the element is rendered based on the layout data. |
US08856642B1 |
Information extraction and annotation systems and methods for documents
Information extraction and annotation systems and methods for use in annotating and determining annotation instances are provided herein. Exemplary methods include receiving annotated documents, the annotated documents comprising annotated fields, analyzing the annotated documents to determine contextual information for each of the annotated fields, determining discriminative sequences using the contextual information, generating a proposed rule or a feature set using the discriminative sequences and annotated fields, and providing the proposed rule or the feature set to a document annotator. |
US08856641B2 |
Time-tagged metainformation and content display method and system
Disclosed herein are methods and systems for displaying content-related metainformation, and display of content-related tag metainformation in correspondence, and synchronized, e.g., time-based, with the content, so as to display content together with related time-tag information. |
US08856639B1 |
Systems and methods for online document sign-up
Systems and methods for managing documents are described. A system comprises one or more modules to present controls that reflect a hierarchy of documents available for online delivery, receive an indication of selected controls, and manage online document delivery (ODD) using the indication. A system for presenting a single-page ODD sign-up, comprises one or more modules to identify a user of an online system, determine a financial account associated with the user, and present a hierarchical control, including the financial account, in the single page to the user. A system comprises one or more modules to receive, from a support representative, a user's preference associated with ODD; receive, from an online interface, an indication that the user accepts an agreement associated with ODD; and manage ODD using the indicia reflecting the user's preference after the indication that the user agreed to the agreement has been received. Other embodiments are described. |
US08856638B2 |
Methods and system for remote control for multimedia seeking
The invention relates to multimedia seek sequence using a synchronization index and a mobile computing device. A mobile computing device displays text from a synchronization index. The synchronization index comprises respective times within multimedia corresponding to a word or range of words. A user may perform a gesture performed on a portion of screen of the mobile computing device corresponding to a word, or a range of words, from the synchronization index. The mobile computing device performs a timecode lookup, using the synchronization index, and in response to the gesture performed to select a word or range of words, the timecode lookup functions to associate a time within multimedia to the selected word or range of words. Multimedia is then delivered beginning at that time, or the user is provided instructions for the delivery of multimedia, to a receiving device. The multimedia delivered corresponds to the word or range of words selected by the gesture of the user. |
US08856636B1 |
Methods and systems for trimming video footage
A media authoring application can be configured to use metadata associated with a media presentation to generate a score which serves to identify the interesting portions of the presentation and may thereby streamline the editing process. A method can comprise accessing metadata indicating at least one characteristic of a media presentation comprising a plurality of video segments, determining a qualitative score for at least one segment of the media presentation based on the metadata, and providing a user interface displaying the plurality of segments of the media file, the interface including a visual effect for at least one segment of the media file based on the segment's qualitative score. The method may comprise removing one or more segments based on comparing the score of the segment(s) to a parameter, such as a score threshold. |
US08856634B2 |
Compensating for gaps in workload monitoring data
Gaps in performance data are corrected for through data transformations and conversion. A raw sequence is transformed by correction logic into an interval sequence by partitioning a performance monitoring period into equal intervals and assigning values based on the raw sequence. Locality sequence entries can indicate whether the interval sequence relies on estimation. The interval sequence is converted into an absence length sequence whose entries indicate null value periods in performance data. Conversion includes generating a presence sequence from the interval sequence, and deriving the absence length sequence from the presence sequence, by using a set-based algorithm or other mechanism. Excessive absence length values support treating intervals as downtime for the machine. Correction logic may include a stored procedure residing in a database, for example, which produces the absence length sequence without using a procedural language. |
US08856632B2 |
Method and a device for controlling frequency synchronization
A device for controlling frequency synchronization includes a processor for controlling a phase-controlled clock signal to achieve phase-locking with a reference clock signal, and for controlling a frequency-controlled clock signal so as to achieve frequency-locking with the reference clock signal. The processor is also configured to monitor a deviation between the frequency and phase-controlled clock signals, detect a change of circumstances such as temperature changes causing frequency drifting of the frequency-controlled clock signal, and replace or correct the frequency-controlled clock signal with, or on the basis of, the phase-controlled clock signal when both the monitored deviation and the detected change of circumstances show correlation confirming frequency drift of the frequency-controlled clock signal. |
US08856630B2 |
Continuous parallel Viterbi decoder
A continuous parallel Viterbi decoder configured to (a) compute Trellis paths from an input bitstream encoded with a convolutional code, (b) backtrack the Trellis paths to generate an output signal, (c) store the Trellis paths in a shared memory, and (d) coordinate simultaneous read/write operations from and to the shared memory. |
US08856628B2 |
Method and apparatus for generation and usage of extended golay codes
A wireless device comprises a code-assignment module configured for assigning Golay codes to be used for spreading, a spreading module configured for spreading data with the Golay codes to produce a signal, wherein the Golay codes are randomly used to spread the data, and a transmitter configured for transmitting the signal. The wireless device may transmit a first beacon signal via a set of quasi-omni beam patterns, and a second beacon signal via a set directional beam patterns. The first beacon signal has a first transmission rate that is higher than the second beacon signal's transmission rate. Extended Golay codes having zero periodic cross-correlation may be generated from a Golay code and a set of short sequences. A data block transmitted by the wireless device may comprise Golay codes and data portions, wherein every data portion is between two Golay codes and every Golay code is between two data portions. |
US08856627B2 |
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction. Other embodiments are described and claimed. |
US08856626B2 |
Decoder, decoding method and communication apparatus
According to one embodiment, a decoder includes a control unit and a decoding unit. The control unit determines a window size applied to a first target frame to be a first value and determines a window size applied to a second target frame different from the first target frame to be a second value different from the first value. The decoding unit carries out windowed decoding of a spatially coupled code on the first target frame with the window size set to the first value and carries out windowed decoding of a spatially coupled code on the second target frame with the window size set to the second value. |
US08856624B1 |
Method and apparatus for dynamically generating error correction
A method and apparatus for dynamically selecting forward error correction codes to accompany transmitted packet data on a network is taught. Source content parameter(s) and network state parameter(s) are analyzed to select either equal protection (EP) error correction or unequal correction (UEP) error correction. Selection of UEP error correction versus EP error correction improves the perceived quality of transmitted data without requiring additional error correction overhead. |
US08856618B2 |
Scalable repair block error correction for sequential multiple data blocks in a magnetic data storage device
A technique for recovering of “squeezed” sectors in a set of sequential sectors such as are used in Shingled Magnetic Recording (SMR) is described. Embodiments of the invention use a programmable erased sector recovery scheme, which is a concatenation of a “Cauchy-type” track erasure correction code, together with a media-error correction code that generates N-weighted parity-sectors per track and is capable of replacing up to N-erased sectors per track in any possible combination. |
US08856617B2 |
Sending a zero information gain formatted encoded data slice
A method begins by a dispersed storage (DS) processing module determining whether to send an encoded data slice of set of encoded data slices in accordance with a zero information gain (ZIG) format. When the encoded data slice is to be sent in accordance with the ZIG format, the method continues with the DS processing module selecting a partial encoding threshold number of encoded data slices of the set of encoded data slices, wherein the partial encoding threshold number of encoded data slices does not include the encoded data slice and generating a set of ZIG encoded data slices based on a ZIG function and the partial encoding threshold number of encoded data slices, wherein the set of ZIG encoded data slices represents recovery information of the encoded data slice. The method continues with the DS processing module outputting the set of ZIG encoded data slices. |
US08856616B1 |
Two dimensional encoding for non-volatile memory blocks
Method for encoding information in a flash memory block which combines an independent encoding of each page with a block-level code across multiple pages. The method includes two independent error correction codes, one in horizontal direction and one in vertical direction, with horizontal direction error correction decoding; and vertical direction erasure correction decoding. |
US08856615B1 |
Data storage device tracking log-likelihood ratio for a decoder based on past performance
A data storage device is disclosed comprising a non-volatile memory (NVM). First data is written to a first area of the NVM, and a first estimated data sequence is read from the first area of the NVM. The first estimated data sequence is first decoded, and a log-likelihood ratio (LLR) is first updated based on the first decode. Second data is written to a second area of the NVM, and a second estimated data sequence is read from the second area of the non-volatile memory. The second estimated data sequence is second decoded in response to the first updated LLR, and the LLR is second updated based on the second decode. |
US08856613B2 |
Semiconductor storage device, memory control device, and control method of semiconductor memory
According to one embodiment, a semiconductor storage device includes a semiconductor memory which includes two or more cell peripheral circuits and two or more storage cells at least one of reading and writing of which is controlled by the cell peripheral circuits in each of the cell peripheral circuits. Further, the semiconductor storage device includes a memory control unit configured to instruct to form 1 symbol as a unit for creating an error correction code by the data held by the storage cells controlled by the same cell peripheral circuit and creating an error correction code to the symbol created base of the instruction. |
US08856612B2 |
Method and apparatus for interleaving data in a mobile communication system
An interleaving method in a mobile communication system is provided. The interleaving method includes encoding a plurality of bits to output encoded bits in a sequence, interleaving the encoded bits based on a modulation order to generate interleaved encoded bits comprising consecutive bits having a size based on the modulation order, the consecutive bits corresponding to consecutive bits of the encoded bits, scrambling the interleaved encoded bits with a scrambling code to generate scrambled bits, and modulating the scrambled bits based on the modulation order to output at least one symbol. |
US08856610B2 |
Computer readable storage medium storing error correction program and communication apparatus
A computer-readable medium storing a program causing a computer to execute a process includes, acquiring a plurality of data units that belong to a first block in a certain hierarchy among hierarchical blocks defined by a plurality of hierarchies; generating error correction information corresponding to the first block that equals to an exclusive-OR of the plurality of data units; generating, in each individual hierarchy of one or more individual hierarchies that are continuous from and are lower than the certain hierarchy, error correction information corresponding to each individual block that equals to the exclusive-OR of all data units that belong to the individual block among the plurality of data units, where the individual block is one or more individual blocks other than one specific block in two or more blocks in the individual hierarchy that are included in the same block in a hierarchy. |
US08856604B2 |
Transceiver feedback and/or re-transmission control
A method and apparatus of providing ARQ feedback is disclosed. A first step of one method includes a transmitter transmitting ARQ blocks. A second step includes a receiver transmitting ARQ feedback messages, wherein each ARQ feedback message includes a time reference that indicates a transmission time of a latest transmission burst accounted for in the ARQ feedback message. |
US08856602B2 |
Multi-core processor with internal voting-based built in self test (BIST)
A method and circuit arrangement utilize scan logic disposed on a multi-core processor integrated circuit device or chip to perform internal voting-based built in self test (BIST) of the chip. Test patterns are generated internally on the chip and communicated to the scan chains within multiple processing cores on the chip. Test results output by the scan chains are compared with one another on the chip, and majority voting is used to identify outlier test results that are indicative of a faulty processing core. A bit position in a faulty test result may be used to identify a faulty latch in a scan chain and/or a faulty functional unit in the faulty processing core, and a faulty processing core and/or a faulty functional unit may be automatically disabled in response to the testing. |
US08856601B2 |
Scan compression architecture with bypassable scan chains for low test mode power
This invention permits selectively bypasses serial scan chains. Constant or low toggle data is directed to the bypassed serial scan chain, thus reducing power consumption. The number and identity of serial scan chains bypassed during a particular test can be changed dynamically dependent upon the semiconductor process variations of a particular integrated circuit. This enables an optimal test to be preformed for integrated circuits having differing semiconductor process variations. |
US08856596B2 |
Debugging apparatus and method
A debugging apparatus and method are provided. The debugging apparatus may include a breakpoint setting unit configured to store a first instruction corresponding to a breakpoint in a table, stop a program currently being executed, and insert a breakpoint instruction including current location information of the first instruction into the breakpoint; and an instruction execution unit configured to selectively execute one of the breakpoint instruction and the first instruction according to a value of a status bit. |
US08856589B1 |
Failure protection in an environment including virtualization of networked storage resources
An architecture for protecting against failure in a switched storage network using virtualization. |
US08856584B2 |
Transport control server that modifies routing information
The time required for a path recalculation and a path switching upon occurrence of a failure is shortened. A path generation unit of a transport control server (TCS) S-1 generates the normal path information in accordance with the topology information of a network and the resource information which are set. Also, the path generation unit generates in advance the backup path information for occurrence of the failure based on the prediction topology information and the prediction resource information which have been modified in accordance with a predicted failure position. A path information notification unit of the TCS (S-1) notifies nodes N of the generated normal path information. A failure information acquisition unit of the TCS (S-1) detects the occurrence of the failure. If the occurrence of the failure is detected, the path information notification unit notifies the nodes N of the backup path information that is stored. |
US08856582B2 |
Transparent failover
Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by the client. The server uses the handle identifier to associate with state information. When there is a network failure or a server failover, and a reconnection to the client, the handle identifier is used to identify replayed requests that if replayed would create an inconsistent state on the server. The replayed requests are then appropriately handled. |
US08856574B2 |
Power supply start-up mechanism, apparatus, and method for controlling activation of power supply circuits
A power supply start-up sequencing mechanism for controlling activation of a plurality of power supply circuits with a predetermined timing is disclosed. The mechanism comprises a time value generator arranged to provide a time value signal; and for each of the power supply circuits, a logic circuit arranged to receive the time value signal and from the received signal provide an activation signal to the respective power supply circuit, wherein the respective logic circuit is associated with a start timing value for the respective power supply circuit such that the activation signal is provided when the associated start timing value coincides with the received time value signal. An apparatus comprising such a mechanism, and a method for controlling activation of a plurality of power supply circuits are also disclosed. |
US08856571B2 |
Adjusting device performance over multiple time domains
Adjusting processor performance based on processing profiles. The method may determine that a process has entered a processing state after an idle state. In response to entering the processing state the processing time of the processor may be monitored. In response to the processing time exceeding a first threshold of time, the performance of the processor may be increased from a first level to a second level. In response to the processing time exceeding a second threshold time, the performance of the processor may be decreased from the second level to a third level. In response to the processing time exceeding a third threshold time, the performance of the processor may be increased from the third level to a fourth level. In response to the processing time exceeding a fourth threshold time, the performance of the processor may be decreased from the fourth level to a fifth level. |
US08856568B2 |
Independent power control of processing cores
Independent power control of two or more processing cores. More particularly, at least one embodiment of the invention pertains to a technique to place at least one processing core in a power state without coordinating with the power state of one or more other processing cores. |
US08856560B2 |
Settings based on output powered by low power state power rail
Example embodiments disclosed herein relate to determining a setting at a component. An output to be powered by a low power state power rail can output a value. The component is to be powered by an auxiliary power rail and determines the setting based on the value at auxiliary power good. |
US08856558B2 |
Electronic apparatus having stand-by mode and operation method thereof
An electronic apparatus has a stand-by mode. The electronic apparatus includes a first circuit, a second circuit and a third circuit. The first circuit has an interface and transfers data to an external device. The second circuit has a processor and sets a first power supplying mode of the first circuit. The third circuit sets a second circuit power supplying mode of the second circuit and sets a second power supply mode of the first circuit when the second circuit is disabled. The processor selects a first circuit power supplying mode from power supplying modes of the first circuit as the second power supplying mode before the second circuit is disabled. |
US08856555B2 |
Power state coordination for portable test tools
A system and method of coordinating power states between two detachable units is disclosed. Only the primary unit has a user-controllable power control. The secondary unit is not directly user controllable. The power states of the two units are coordinated using an actuator mechanism when the units are attached. When the two units are detached, the state of the secondary unit is dependent upon the state of the primary unit and any subsequent commands transmitted by the primary unit to the secondary unit. |
US08856554B2 |
Information terminal and method of reducing information leakage
An information terminal includes: a storage unit to store information; a data encryption unit to encrypt the information and decrypt the encrypted information using an encryption key; a pre-deletion unit to delete the encryption key; a signal detection unit to detect an interruption signal; a pre-deletion setting unit to instruct the pre-deletion unit to delete the encryption key in response to the detection of the interruption signal; and a deletion stop unit to stop deletion of the encryption key by the pre-deletion unit. |
US08856552B2 |
Directory synchronization of a dispersed storage network
A method begins by a processing module dispersed storage error encoding data to produce a set of encoded data slices and generating a transaction identifier regarding storage of the set of encoded data slices. The method continues with the processing module outputting a plurality of write request messages to a plurality of dispersed storage (DS) units, wherein each of the plurality of write request messages includes the transaction identifier and a corresponding one of the set of encoded data slices. The method continues with the processing module receiving write response messages from at least some of the DS units, wherein each of the write response messages includes a reference to the transaction identifier. The method continues with the processing module updating directory information regarding storage of the data to produce updated directory information when at least a write threshold number of the write response messages have been received. |
US08856551B2 |
BIOS lock encode/decode driver
Systems and methods for preventing the unauthorized access to data stored on removable media, such as software, include storing a predetermined signature in the area of non-volatile memory in a computer system. Upon initialization of the computer system, a check is made to verify the signature. Only if the signature is verified will decoding software operate. |
US08856550B2 |
System and method for pre-operating system encryption and decryption of data
Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) monitor for input/output operations occurring prior to loading of an operating system into the memory; and (ii) in response to detection of an input/output operation, communicate a command to the encryption accelerator to perform an encryption or decryption task upon data associated with an input/output operation. |
US08856546B2 |
Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures
A processing apparatus may comprise logic to preprocess a message according to a selected secure hash algorithm (SHA) algorithm to generate a plurality of message blocks, logic to generate hash values by preparing message schedules in parallel using single instruction multiple data (SIMD) instructions for the plurality of message blocks and to perform compression in serial for the plurality of message blocks, and logic to generate a message digest conforming to the selected SHA algorithm. |
US08856540B1 |
Customized ID generation
Technologies are described herein for customized identifier (“ID”) generation by an ID service. One or more calling components (“components”) remote from the ID service generate requests for IDs. The requests can include one or more rules defining how the IDs are to be generated, type data identifying a type of IDs to be generated, encryption data specifying whether, and if so, how the IDs are to be encrypted, and number data defining how many IDs are to be generated at a particular time. The ID service receives the request, and in response to the request, generates the number of IDs specified, in accordance with the rules, type data, and encryption data provided in the request. An ID database can store one or more of the IDs and/or rules associated with the components, such that each component can be relieved from maintaining its own database for ID operations. |
US08856539B2 |
Universal secure registry
A secure registry system and method for the use thereof are provided which permits secure access to a database containing selected data on a plurality of entities, at least portions of which database has restricted access. Mechanisms are provided for controlling access to restricted access portions of the database are provided, such access being determined by at least one of the identity of the requesting entity and the entity's status. A multicharacter public code may be provided which the system can map to provide permit delivery of items, complete telephone calls and perform other functions for entities. The system may also be utilized to locate an individual based on limited biological data. Organizations utilizing the system may have custom software facilitating their access and use of the system. |
US08856537B2 |
Method for protecting a telecommunication network and secure router implementing such a method
This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA′1, LSA′2, . . . LSA′n) is transmitted, at least one sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n)) of the lists to be transmitted, and The step of comparing the receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) to the sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n) such that the sending of a list of links (LSA1, LSA2, LSAn) is inhibited if the receiving fingerprint is different from the sending fingerprint. |
US08856530B2 |
Data storage incorporating cryptographically enhanced data protection
Various exemplary embodiments relate to a system for storing encrypted data and providing access to a group of users. The system may include: a record of user accounts including: a user identifier and a public encryption key; an access control list (ACL) defining an access control policy including: permissions defining access to data objects associated with the ACL and an ACL key list including copies of a an ACL key encrypted with the public keys of the users; a user-data storage medium including: encrypted user data, stored as a plurality of data objects, each object associated with an ACL and encrypted with the ACL key, and meta-data; and an access controller configured to: receive a request for a data object, and send a copy of the data object and the ACL key encrypted with the public key of the user if the user has permission to access the data object. |
US08856529B2 |
Systems and methods for providing security to different functions
Methods and systems provide secure functions for a mobile client. A circuit may include a memory configured to store a server access key and a first function authentication key. The circuit may also include authentication circuitry configured to access the server access key to authenticate access to a server to download a function capsule comprising a first function and to access the first function authentication key to authenticate use of the first function of the function capsule. |
US08856528B2 |
Challenge-response system for maintenance operations via responder for telecommunications cabinet
Method of performing a challenge-response process, comprising, in this sequence, the steps of a) providing a first challenge-response pair (50) on a source device (10), assigned to a responding device (30); b) loading the first challenge-response pair (50) from the source device (10) to a challenging device (20), while the source device (10) is operationally connected to the challenging device (20); c) performing a challenge-response process between the challenging device (20) and the responding devices (30) to which the first challenge-response pair (50) is assigned, d) loading one or more second challenge-response pairs (50) from a source device (10) to the challenging device (20), while the source device (10) is operationally connected to the challenging device (20), wherein the step of loading the first challenge-response pair (50) from the source device (10) to a challenging device (20) is performed before the challenging device (20) has received any information from one of the responding devices (30), to which the first challenge-response pair (50) is assigned. |
US08856522B2 |
Security, safety, and redundancy employing controller engine instances
The claimed subject matter provides a system and/or method that facilitates employing safety within an industrial environment. An enhancing component can implement at least one of a security level, authentication, authorization, or an access right to a validated action to at least one of the controller or the controller engine instance. The enhancing component can further separate two or more entities within the industrial environment, the first entity related to process control and the second entity related to process safety. Additionally, the enhancing component can employ at least one of a backup controller or a backup controller engine instance in the event of at least one of a software error or a hardware error within the industrial environment. |
US08856511B2 |
System and method for wiping and disabling a removed device
A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device. |
US08856510B2 |
Method for joining user domain and method for exchanging information in user domain
A method for joining a user domain based on digital right management (DRM), a method for exchanging information between a user device and a domain enforcement agent, and a method for exchanging information between user devices belonging to the same user domain include sharing a domain session key between the user device and the domain enforcement agent or between the user devices belonging to the same user domain. Information is exchanged through a secure session set up between the user device and domain enforcement agent or between the user devices, and information exchange occurs through encryption/decryption using the domain session key. |
US08856508B2 |
Onboard access control system for communication from the open domain to the avionics domain
An onboard access control system to an information system onboard an aircraft, for communication from the open domain to the avionics domain, the open end avionics domains being connected to each other through a single-directional link from the avionics domain to the open domain. The system includes: a security device including: access switches controlling access to the avionics and open domains, a controller, a module for acquisition putting data into buffer memory and transmission to the avionics domain, a data control module, an acquisition module from the open domain and putting into buffer memory, and an operator's authentication mechanism. |
US08856505B2 |
Malware management through kernel detection during a boot sequence
A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing pestware-related events before native applications can run and after a kernel is loaded; managing pestware-related events when native applications can run; and scanning a registry of the computer for pestware when native applications can run. In variations, a pestware management engine is initialized after an operating system of the protected computer is initialized and the pestware management system both receives an event log of the monitored events and compiles the set of behavior rules utilized by kernel-level monitor. |
US08856503B2 |
Computing system, booting method and code/data pinning method thereof
The booting method of a computing system includes determining whether boot data of an operating system is pinned to a main memory, reading boot data from a storage device to pin the read boot data to the main memory when relocation of the pinned boot data is required, and performing a booting operation using the pinned boot data. |
US08856501B2 |
Method and system for controlling operation of interconnected devices by circulating host capability without a centralized manager
Systems and methods for automatically and controlling operation of one or more devices in a system are provided. In a particular embodiment, a command is received by a device in order for the device to determine whether to perform an operation (such as perform initialization of the device). The command may include information indicative of resource capabilities of at least a part of the system. Using the information, the device may determine whether to begin performing the operation (such as initialization), and perform the operation if it is determined to do so. |
US08856500B2 |
Obfuscating program by scattering sequential instructions into memory regions such that jumps occur with steps of both signs in equal frequency
A program is obfuscated by reordering its instructions. Original instruction addresses are mapped to target addresses in an irregular way, with position dependent address steps between the addresses of logically successive instructions. Preferably pseudo-random address steps are used, for example with address steps that have mutually opposite sign with equal frequency. The data processing device has an instruction flow control unit that updates instruction addresses according the position dependent address steps. The instruction flow control unit may comprise a circuit that contains secret information, which is not normally accessible from the outside, to control the updates. A lookup table may be used for example, with address steps, successor addresses or mapped address values. In an embodiment the mapping of original instruction addresses to target addresses may be visualized by means of a path (36) along points in an n-dimensional array, where n is greater than one. Successive original instruction addresses are mapped to successive locations in the path, and locations along respective rows of the array are mapped to respective mutually disjoint ranges (33a-d). Because an n-dimensional path is used a form of locality is preserved that provides for cache efficiency, whereas the multi-dimensional nature of the path makes it possible to combine this locality with pseudo-random steps. |
US08856497B2 |
Central processor for memory tag
This invention provides a processor 200, especially for use as the central processing unit of a memory tag 1200. The processor 200 has a minimal footprint in Silicon or other suitable material. It also is driven by the data that it receives. The processor includes a plurality 206, 212, 214, 224 of registers configured to receive in parallel data that are input to the processor, and to process in parallel the received data, and a micro sequencer and instruction decoder module 202 adapted to select two or more of the plurality of registers to receive the data that are input to the processor, and to control the processing of the received data by the end or more selected registers. A memory 1200 device utilizing such a processor, and a method of processing instructions are also provided. |
US08856491B2 |
Garbage collection implemented in hardware
A computing device is provided and includes a memory module, a sweep engine, a root snapshot module, and a trace engine. The memory module has a memory implemented as at least one hardware circuit. The memory module uses a dual-ported memory configuration. The sweep engine includes a stack pointer. The sweep engine is configured to send a garbage collection signal if the stack pointer falls below a specified level. The sweep engine is in communication with the memory module to reclaim memory. The root snapshot engine is configured to take a snapshot of roots from at least one mutator if the garbage collection signal is received from the sweep engine. The trace engine receives roots from the root snapshot engine and is in communication with the memory module to receive data. |
US08856490B2 |
Optimizing TLB entries for mixed page size storage in contiguous memory
A system and method for accessing memory are provided. The system comprises a lookup buffer for storing one or more page table entries, wherein each of the one or more page table entries comprises at least a virtual page number and a physical page number; a logic circuit for receiving a virtual address from said processor, said logic circuit for matching the virtual address to the virtual page number in one of the page table entries to select the physical page number in the same page table entry, said page table entry having one or more bits set to exclude a memory range from a page. |
US08856489B2 |
Logical sector mapping in a flash storage array
A system and method for efficiently performing user storage virtualization for data stored in a storage system including a plurality of solid-state storage devices. A data storage subsystem supports multiple mapping tables. Records within a mapping table are arranged in multiple levels. Each level stores pairs of a key value and a pointer value. The levels are sorted by time. New records are inserted in a created newest (youngest) level. No edits are performed in-place. All levels other than the youngest may be read only. The system may further include an overlay table which identifies those keys within the mapping table that are invalid. |
US08856488B2 |
Method for utilizing a memory interface to control partitioning of a memory module
Apparatuses and methods for implementing partitioning in memory cards and modules where conventional memory cards or modules have only a single partition. A representative memory card/module in accordance with the invention includes a memory device(s), and a memory interface which includes a data bus, a command line and a clock line. The memory card/module further includes a memory controller coupled to the memory device(s) and to the memory interface. The memory card/module includes means for controlling the partitioning of the memory device(s), and the memory controller is configured to operate the memory device(s) in accordance with the partition information. |
US08856486B2 |
Deploying a copy of a disk image from source storage to target storage
A technique deploys a copy of a disk image from source storage to target storage. The technique involves identifying a particular disk image to be copied from the source storage to the target storage. The technique further involves performing a comparison operation between a first disk image list which lists disk images on the source storage and a second disk image list which lists disk images on the target storage to generate a common disk image list which lists a set of common disk images on both the source and target storage. The technique further involves transferring, from the source storage to the target storage, a set of data portions representing differences between the particular disk image and a common disk image listed on the common disk image list. The set of data portions in combination with the common disk image form a deployed copy on the target storage. |
US08856485B2 |
Storage system and storage control method
A storage method and system where the storage system includes a plurality of servers and a control server configured to select a storage area available to be used by each of the servers from among storage areas of a group of storage devices sharable among the plurality of servers. The system includes, a detecting unit configured to detect an available capacity of a specified storage device other than the storage group, where the specified storage device is designated for use only by a specified server selected from among the servers, a specifying unit configured to specify an available area corresponding to the available capacity detected from the specified storage device through the detecting unit, and a setting unit configured to set the specified available area to a shared storage area that is available to be shared among the server. |
US08856484B2 |
Mass storage system and methods of controlling resources thereof
A storage system and a method for managing a memory capable of storing metadata related to logical volume sets, are disclosed. A memory quota is assigned to a metadata related to a logical volume set. The size of a memory currently consumed by the metadata is monitored. Upon exceeding a threshold by the size of the monitored memory, at least one restraining action related to memory consumption by the metadata is applied. |
US08856483B1 |
Virtual data storage service with sparse provisioning
Virtual data stores may be sparsely provisioned by virtual data storage services in a manner that controls risk of implementation resource shortages. Relationships between requested data storage space size, data storage server capacity, allocated data storage space size and/or allocated data storage space utilization may be tracked on a per data store, per customer, per data storage server, and/or a per virtual data storage service basis. For each such basis, a set of constraints may be specified to control the relationships. The set of constraints may be enforced during implementation resource allocation, and by migration of data storage space portions to different implementation resources as part of a sparse provisioning load balancing. Sparse provisioning details may be made explicit to virtual data storage service customers to varying degrees including explicit, aggregate on a per customer basis, and aggregate on a per virtual data storage service basis. |
US08856480B2 |
Mechanism for enabling full data bus utilization without increasing data granularity
A memory is disclosed comprising a first memory portion, a second memory portion, and an interface, wherein the memory portions are electrically isolated from each other and the interface is capable of receiving a row command and a column command in the time it takes to cycle the memory once. By interleaving access requests (comprising row commands and column commands) to the different portions of the memory, and by properly timing these access requests, it is possible to achieve full data bus utilization in the memory without increasing data granularity. |
US08856478B2 |
Arithmetic processing unit, information processing device, and cache memory control method
A processor holds, in a plurality of respective cache lines, part of data held in a main memory unit. The processor also holds, in the plurality of respective cache lines, a tag address used to search for the data held in the cache lines and a flag indicating the validity of the data held in the cache lines. The processor executes a cache line fill instruction on a cache line corresponding to a specified address. Upon execution of the cache line fill instruction, the processor registers predetermined data in the cache line of the cache memory unit which has a tag address corresponding to the specified address and validates a flag in the cache line having the tag address corresponding to the specified address. |
US08856477B1 |
Networked raid in a virtualized cluster
Technologies are described herein for providing networked RAID in a virtualized storage cluster. The storage capacity of a storage cluster having two or more storage nodes is organized into tiers. A portion of the available storage capacity is allocated to one tier that is organized using chained declustering. Another portion of the available storage capacity is allocated to another tier that is organized using a networked RAID configuration. The storage cluster monitors the frequency at which data in the storage cluster is accessed. Frequently used data that is stored in the network RAID-configured tier is promoted to the chained declustered-configured tier. Infrequently used data that is stored in the chained declustered-configured tier is demoted to the network RAID-configured tier. |
US08856474B2 |
Nonvolatile memory unit with secure erasing function
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the nonvolatile memory to execute data erasing on the basis of the erase command output from the interface, an external input unit which is installed independently of the interface, a second controller that controls the nonvolatile memory to execute data erasing on the basis of an erase instruction signal output from the external input unit, and a change-over circuit that switches between connection of the first controller with the nonvolatile memory and connection of the second controller with the nonvolatile memory, wherein the second controller controls the nonvolatile memory to execute data erasing on the basis of the erase instruction when the connection of the second controller with the nonvolatile memory is established by the change-over circuit. |
US08856471B2 |
System, method and a non-transitory computer readable medium for creating a warranted snapshot
A method for providing a warranted snapshot that may include: receiving a request to create a first warranted snapshot of a first logical volume at a first point in time and creating the first warranted snapshot if the first warranted snapshot is non-writable and if an amount of physical storage actually devoted by a storage system to the first logical volume at the first point of time does not exceed a size of a free physical storage space that is available for storing any future data delta associated with the first warranted snapshot. The creating of the first warranted snapshot may include allocating a first virtual portion of a physical storage space for storing any future data delta associated with the first warranted snapshot. A size of the first virtual portion equals the amount of physical storage actually devoted to the first logical volume at the first point of time. |
US08856469B2 |
Apparatus and method for logging optimization using non-volatile memory
A logging optimization technology using a non-volatile memory is provided. A log record has a first link connected based on a page unit and a second link connected based on a transaction unit. The log record is stored in a non-volatile memory buffer. The log record stored in the non-volatile memory buffer is deleted or moved to a disk, if necessary. |
US08856468B2 |
Memory device capable of improving write processing speed and memory control method
According to one embodiment, a memory device includes a memory unit, a first storage unit, a second storage unit, a third storage unit, a data move unit, and a controller. The first storage unit stores a logical address and an intermediate address. The second storage unit stores the intermediate address and the physical address corresponding to the intermediate address. The third storage unit stores a flag corresponding to the logical address and the intermediate address. The flag represents whether read of latest data by a read operation has succeeded. When the flag stored in the third storage unit represents a success of the read of the latest data, the controller determines whether write has been done for the same logical address of the memory unit during the data move processing, and if the write has been done, invalidates the data move processing. |
US08856466B2 |
Mechanisms to accelerate transactions using buffered stores
In one embodiment, the present invention includes a method for executing a transactional memory (TM) transaction in a first thread, buffering a block of data in a first buffer of a cache memory of a processor, and acquiring a write monitor on the block to obtain ownership of the block at an encounter time in which data at a location of the block in the first buffer is updated. Other embodiments are described and claimed. |
US08856465B2 |
Memory control apparatus and memory control method for controlling the priority of memory accesses
Memory accesses to a memory device that is in a power saving mode depend on the order of the issuance thereof. Thus, a period of time during which the memory is placed in the power saving mode is sometimes shortened, resulting in less effective power savings. A memory control apparatus, which is connected with a plurality of masters and a plurality of memories having a power saving mode, arbitrates memory accesses from the plurality of the masters, monitors whether each of the plurality of the memories is in the power saving state, and determines the priorities of the memory accesses according to the result of the detection of the power saving mode. |
US08856464B2 |
Systems for two-dimensional main memory including memory modules with read-writeable non-volatile memory devices
In one embodiment of the invention, a system is disclosed including a master memory controller and a plurality of memory modules coupled to the master memory controller. Each memory module includes a plurality of read-writeable non-volatile memory devices in a plurality of memory slices to form a two-dimensional array of memory. Each memory slice in each memory module includes a slave memory controller coupled to the master memory controller. When the master memory controller issues a memory module request, it is partitioned into a slice request for each memory slice. |
US08856463B2 |
System and method for high performance synchronous DRAM memory controller
The disclosed system and method enhances performance of pipelined data transactions involving FIFO buffers by implementing a transaction length indicator in a transaction header. The length indicator in the header is formed by components coupled to a memory controller through FIFO buffers. The memory controller uses the length indicator to execute pipelined data transfers at relatively high speeds without causing additional inadvertent shifts or indexes in the FIFO buffer being read. The system and method can be applied to any memory type in general, and avoids the use of additional control signals or added complexity or size in the memory controller. |
US08856459B1 |
Matrix for numerical comparison
A method and apparatus for utilizing a matrix to store numerical comparisons is disclosed. In one embodiment, an apparatus includes an array in which results of comparisons are stored. The comparisons are performed between numbers associated with agents (or functional units) that have access to a shared resource. The numbers may be a value to indicate a priority for their corresponding agents. The comparison results stored in an array may be generated based on comparisons between two different numbers associated with two different agents, and may indicate the priority of each relative to the other. When two different agents concurrently assert requests for access to the shared resource, a control circuit may access the array to determine which of the two has the higher priority. The agent having the higher priority may then be granted access to the shared resource. |
US08856457B2 |
Information processing system and a system controller
In a system including a plurality of CPU units having a cache memory of different capacity each other and a system controller that connects to the plurality of CPUs and controls cache synchronization, the system controller includes a cache synchronization unit which monitors an address contention between a preceding request and a subsequent request and a setting unit which sets different monitoring range of the contention between the preceding request and the subsequent request for each capacity of the cache memory in each of the CPU units. |
US08856455B2 |
Data cache block deallocate requests
A data processing system includes a processor core supported by upper and lower level caches. In response to executing a deallocate instruction in the processor core, a deallocation request is sent from the processor core to the lower level cache, the deallocation request specifying a target address associated with a target cache line. In response to receipt of the deallocation request at the lower level cache, a determination is made if the target address hits in the lower level cache. In response to determining that the target address hits in the lower level cache, the target cache line is retained in a data array of the lower level cache and a replacement order field in a directory of the lower level cache is updated such that the target cache line is more likely to be evicted from the lower level cache in response to a subsequent cache miss. |
US08856454B2 |
Anticipatory response pre-caching
Interaction between a client and a service in which the service responds to requests from the client. In addition to responding to specific client requests, the service also anticipates or speculates about what the client may request in the future. Rather than await the client request (that may or may not ultimately be made), the service provides the unrequested anticipatory data to the client in the same data stream as the response data that actual responds to the specific client requests. The client may then use the anticipatory data to fully or partially respond to future requests from the client, if the client does make the request anticipated by the service. Thus, in some cases, latency may be reduced when responding to requests in which anticipatory data has already been provided. The service may give priority to the actual requested data, and gives secondary priority to the anticipatory data. |
US08856452B2 |
Timing-aware data prefetching for microprocessors
A method and apparatus for prefetching data from memory for a multicore data processor. A prefetcher issues a plurality of requests to prefetch data from a memory device to a memory cache. Consecutive cache misses are recorded in response to at least two of the plurality of requests. A time between the cache misses is determined and a timing of a further request to prefetch data from the memory device to the memory cache is altered as a function of the determined time between the two cache misses. |
US08856450B2 |
Systems for managing a cache in a multi-node virtual tape controller
According to one embodiment, a system includes a virtual tape library having a cache, a virtual tape controller (VTC) coupled to the virtual tape library, and an interface for coupling at least one host to the VTC. The cache is shared by all the hosts, and a common view of a cache state, a virtual library state, and a number of write requests pending is provided to all the hosts by the VTC. |
US08856449B2 |
Method and apparatus for data storage and access
A query cache stores queries and corresponding results of the queries, the results of the queries being derived from a primary store. A differential store stores a pointer to data of the primary store which has changed and which affects the result of the queries stored in the query store. A new query may be satisfied by accessing the corresponding query in the query store and determining, by reference to the differential store, whether data relating to the query in the primary store has changed since the query store was compiled and, completing the new query, by accessing the corresponding data in the primary store, if applicable. Data in the differential store may be arranged and partitioned according to labels. The partitioning may be varied according to predetermined rules. |
US08856447B2 |
Converting memory accesses near barriers into prefetches
Methods, apparatuses, and processors for reducing memory latency in the presence of barriers. When a barrier operation is executed, subsequent memory access operations are delayed until the barrier operation retires. While the memory access operation is delayed, the memory access operation is converted into a prefetch request and sent to the L2 cache. Then, data corresponding to the prefetch request is retrieved and stored in the L1 data cache. When the memory access operation wakes up, the data for the operation will already be stored in the L1 data cache, reducing the memory latency of the operation. |
US08856446B2 |
Hazard prevention for data conflicts between level one data cache line allocates and snoop writes
A comparator compares the address of DMA writes in the final entry of the FIFO stack to all pending read addresses in a monitor memory. If there is no match, then the DMA access is permitted to proceed. If the DMA write is to a cache line with a pending read, the DMA write access is stalled together with any DMA accesses behind the DMA write in the FIFO stack. DMA read accesses are not compared but may stall behind a stalled DMA write access. These stalls occur if the cache read was potentially cacheable. This is possible for some monitored accesses but not all. If a DMA write is stalled, the comparator releases it to complete once there are no pending reads to the same cache line. |
US08856443B2 |
Avoiding duplication of data units in a cache memory of a storage system
According to the teaching disclosed herein there is provided at least a method, system and device for managing a cache memory of a storage system. The storage system is associated with at least one physical storage device and, responsive to a read request, comprising information indicative of a logical address of at least one requested data unit, to obtain a storage physical address associated with the logical address, search the cache memory for a data unit associated with the storage physical address and service the request from the cache in case the data unit is found in the cache memory. |
US08856441B2 |
Dynamic hard disk mapping method and server using the same
A dynamic hard disk mapping method and a server using the same are disclosed. The server includes a first motherboard, a second motherboard, a first disk group corresponding to the first motherboard, and a second disk group corresponding to the second motherboard. In the dynamic hard disk mapping method, at first, a disk redistributing instruction is received and stored. Thereafter, a reset instruction is received and performed. Then, the number of hard disks of the first disk group and the number of hard disks of the second disk group are summed up to obtain a total hard disk number N, wherein N is a positive integer greater than zero. Thereafter, the disk redistributing instruction is read, and a redistribution computation is performed in accordance with the disk redistributing instruction to obtain a third disk group corresponding to the first motherboard and a fourth disk group corresponding to the second motherboard. |
US08856440B2 |
Volatile memory representation of nonvolatile storage device set
The storage devices of a storage device set (e.g., a RAID array) may generate a nonvolatile representation of the configuration of the storage device set, including logical disks, spaces, storage pools, and layout and provisioning plans, on the physical media of the storage devices. A computer accessing the storage device set may also generate a volatile memory representation of the storage device set to use while accessing the storage devices; however, the nonvolatile representation may not be performant due to its different usage and characteristics. Presented herein are techniques for accessing the storage device set according to a volatile memory representation comprising a hierarchy of logical disks, slabs, and extents, and an accessor comprising a provisioning component that handles slab accesses while applying provisioning plans, and that interfaces with a lower-level layout component that translates slab accesses into storage device accesses while applying layout plans to the storage device set. |
US08856438B1 |
Disk drive with reduced-size translation table
A disk drive is disclosed that utilizes an additional address mapping layer between logical addresses used by a host system and physical locations in the disk drive. Physical locations configured to store metadata information can be excluded from the additional address mapping layer. As a result, a reduced size translation table can be maintained by the disk drive. Improved performance, reduced costs, and improved security can thereby be attained. |
US08856436B2 |
Locating host data records on a physical stacked volume
According to one embodiment, a method for accessing host data records stored on a VTS system includes receiving a mount request to access at least one host data record on a VTS system, determining a number of host compressed data records per physical block on a sequential access storage medium, determining a PBID that corresponds to the requested at least one host data record, accessing a physical block on the sequential access storage medium corresponding to the PBID, and outputting the physical block without outputting an entire logical volume that the physical block is stored to. In another embodiment, a VTS system includes random access storage, sequential access storage, support for at least one virtual volume, a storage manager having logic for determining a PBID that corresponds to a SLBID, and logic for performing the above described method. Other methods are also described. |
US08856426B2 |
Memory device
There is provided a memory device capable of stably storing recorded data over a long term of several decades or longer and capable of reliably reading stored data. A first circuit 200 and a second circuit 300 are separately implementable, and the first circuit 200 includes a data recording circuit 210 reading recorded data from an address appointed by an address signal when a read/write signal stays at a first level and writing data to the address appointed by the address signal when the read/write signal stays at a second level, and a write/read control circuit 230 performing data write/read control on the data recording circuit according to the address signal in response to a read or write instruction from the second circuit. |
US08856424B2 |
Semiconductor storage device and method of throttling performance of the same
A semiconductor storage device and a method of throttling performance of the same are provided. The semiconductor storage device includes a non-volatile memory device, and a controller configured to receive a write command from a host and program and to write data received from the host to the non-volatile memory device in response to the write command. The controller inserts idle time after receiving the write data from the host and/or after programming the write data to the non-volatile memory device. |
US08856421B2 |
Multi-processor architecture using multiple switch fabrics implementing point-to-point serial links and method of operating same
A multi-processor architecture for a network device that includes a plurality of barrel cards, each including: a plurality of processors, a PCIe switch coupled to each of the plurality of processors, and packet processing logic coupled to the PCIe switch. The PCIe switch on each barrel card provides high speed flexible data paths for the transmission of incoming/outgoing packets to/from the processors on the barrel card. An external PCIe switch is commonly coupled to the PCIe switches on the barrel cards, as well as to a management processor, thereby providing high speed connections between processors on separate barrel cards, and between the management processor and the processors on the barrel cards. |
US08856417B2 |
Memory module connector with auxiliary power cable
A memory module includes persistent-storage memory chips and an auxiliary voltage connector for powering the persistent-storage memory chips. An auxiliary power cable has a first end coupled to an electronic power source on the system board and has a second end having connector that plugs in to the auxiliary voltage connector on the memory module to provide power to the persistent-storage memory chips. The auxiliary power cable also resists movement of a latch lever to require disconnecting the auxiliary power cable before ejecting the memory module. |
US08856411B2 |
Apparatus and method for remotely controlling peripheral devices in mobile communication terminal
According to one embodiment, a method for remotely controlling peripheral devices in a mobile communication terminal includes acquiring a profile for a controlled peripheral device, configuring a control application for the controlled peripheral device based on the acquired profile, and controlling the controlled peripheral device using the configured control application. |
US08856408B2 |
Reduced latency barrier transaction requests in interconnects
Interconnect circuitry is configured to provide data routes via which at least one initiator device may access at least one recipient device, the circuitry including at least one input for receiving transaction requests; at least one output for outputting transaction requests; at least one path for transmitting the transaction requests between the input and the output. Control circuitry routes received transaction requests from the input to the output in response to a barrier transaction request. An ordering of at least some transaction requests is maintained with respect to the barrier transaction request within a stream of transaction requests passing along one of the at least one paths, by not allowing reordering of at least some of the transactions requests. The control circuitry includes a response signal generator, the response signal generator is responsive to receipt of the barrier transaction request to issue a response signal. |
US08856407B2 |
USB redirection for write streams
Methods and systems for conducting a transaction between a USB device and a virtual USB device driver are provided. A client USB manager stores in a buffer one or more data packets associated with the virtual USB device driver. The client USB manager dequeues one of the one or more data packets from the buffer. The client USB manager transmits the dequeued data packet to the USB device for processing. The client USB manager re-fills completed data packets from the buffer and queues the data packets for transmitting to the USB device without waiting for the virtual USB device driver. |
US08856403B2 |
Communication module, communication system and air conditioner
First and third current paths are connected at mutual one end, and second and fourth current paths are connected at mutual one end. A transmitter sends signals utilizing the change of a current by changing the current flowing between other ends of the first and second current paths. A switching part brings about a non-conductive state between the other end of the third current path and the other end of the fourth current path by being applied with a control signal from a controller. By contrast with this, the switching part brings about a conductive state between the other end of the third current path and the other end of the fourth current path by not being applied the control signal. |
US08856399B2 |
System and method for determining non-fragmentation for communication of packets
A system and method for determining non-fragmentation for communication of data packets includes generating a plurality of packets and storing in a cell-list at least one cell-value indicating a transmission duration of at least one of the packets in units of cell-size, where the cell-size represents a fixed, predetermined time required to transmit at least a minimum length packet. This facilitates determining non-fragmentation for communication of packets having reduced complexity, lower memory requirements, and shorter processing time than conventional techniques. The complexity is O(1), in contrast to conventional non-fragmentation techniques that have complexities O(N). Corresponding to the reduced complexity, the processing time is shorter than for conventional techniques. Depending on the application, the current embodiment has lower memory requirements than conventional non-fragmentation techniques. |
US08856398B2 |
Process to generate various length parameters in a number of SGLS based upon the length fields of another SGL
A method of generating length parameters, comprising the steps of reading a data stream from a host, detecting a particular field of the data stream, and calculating a variable based on a length parameter of a first list to be transferred. The data stream may comprise a plurality of definitions. The method may also comprise the step of selecting one of the list definitions. One of the list definitions may be used to generate a length parameter used in a second list in response to (i) the particular field of the data stream and (ii) the length parameter of the first list. |
US08856397B1 |
Techniques for statistics collection in connection with data storage performance
Described are techniques for tracking activity for one or more devices. Each of the one or more devices is partitioned into one or more extents. Each of the one or more extents includes a plurality of sub extents. Each of the sub extents includes a plurality of chunks. For each of said one or more extents of each of said one or more devices, extent activity level information is determined including one or more metrics indicating an activity level for said each extent; and For each of said one or more extents of each of said one or more devices, an activity bitmap is determined. The activity bitmap includes an entry for each sub extent included in said each extent, said entry indicating an activity level for said each sub extent. |
US08856392B2 |
Dividing a port into smaller ports
A given port at a storage controller is used for communication with storage devices. In response to an indication that at least a portion of the given port is to be dedicated to a group of at least one of the storage devices, the storage controller divides the given port into multiple smaller ports. |
US08856391B1 |
Method and apparatus for controlling data transfer between EEPROM and a physical layer device
An IEEE 802.3 compliant physical layer device provides efficient loading of configuration information of the physical layer device. The configuration information is written into a volatile memory in the physical layer device, and then uploaded to at least one EEPROM. The configuration information is downloaded to the volatile memory during startup of the physical layer device. The system controller can also directly access the EEPROMs, bypassing the volatile memory. By providing a bridge between the system controller and the EEPROMs and providing additional bits in the volatile memory of the physical layer device, the system controller can read and write the EEPROMs one byte at a time. During reset time, the content of the EEPROMs is written to registers in the physical layer device to configure the physical layer device. |
US08856390B1 |
Using device control field to implement non-disruptive notification of an ATA device
An Advanced Technology Attachment (ATA) device is disclosed for communicating with a host. The ATA device receives a command from the host, and while the ATA device is busy processing the command, the ATA device receives intra-command data from the host in at least one bits 3, 4, 5, and 6 in a device control field. In one embodiment the ATA device is a parallel ATA device, and the device control field is part an ATA task file. In another embodiment, the ATA device is a serial ATA device, and the device control field is part of a host to device Frame Information Structure (FIS). |
US08856388B2 |
Method and apparatus for connecting USB devices to a computer
A method and apparatus are provided to enable a plurality of standard USB peripheral devices, utilizing the USB specification, to be distributed at various nodes across a network, wherein communications across the network may take advantage of any pre-existing network connectivity of a standard, non-modified USB host computer. In particular, a virtual host controller function is added to the host computer in order to direct data communications towards a pre-existing network transceiver. As a result, the host computer is not required to be provided with USB hardware and is able to communicate across the network using pre-existing data communication components. |
US08856387B2 |
Local IP access scheme
Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet. |
US08856382B2 |
On-boarding services to a cloud environment
A system in a cloud services environment comprises one or more service offerings, one or more service instances and one or more service support utilities. Each of the one or more service offerings is described by at least one service descriptor. Each of the one or more service instances is obtained from at least one of the one or more service offerings. Each of the one or more service support utilities is customized by at least one service descriptor. A service comprises at least one component and a service descriptor comprises one or more models. |
US08856380B2 |
Communication of information between a plurality of network elements
A communications protocol interface may be configured as being divisible into a core portion and an extensible portion. The extensible portion of the communications protocol interface may be further configured so that each network element can communicate a unique and optimally small subset of actual interoperable data that corresponds to at least a portion of a larger defined data set. A software generator program may be configured to generate a set of extensible source code that operates upon the subset of actual data and that directs the execution of the extensible portion of the communications protocol interface for a particular network element. |
US08856379B2 |
Intelligent network interface system and method for protocol processing
A system for protocol processing in a computer network has an intelligent network interface card (INIC) or communication processing device (CPD) associated with a host computer. The INIC or CPD provides a fast-path that avoids host protocol processing for most large multipacket messages, greatly accelerating data communication. The INIC or CPD also assists the host for those message packets that are chosen for processing by host software layers. A communication control block (CCB) for a message is defined that allows DMA controllers of the INIC to move data, free of headers, directly to or from a destination or source in the host. The CCB can be passed back to the host for message processing by the host. The INIC or CPD contains hardware circuits configured for protocol processing that can perform that specific task faster than the host CPU. One embodiment includes a processor providing transmit, receive and management processing, with full duplex communication for four fast Ethernet nodes. |
US08856375B2 |
System and method for distributing media related to a location
A system and method for distributing media related to a location. The physical location of a media presentation device is received over a network. The physical location of a plurality of end users are identified, via the network, wherein each of plurality of users is associated with a user device capable of storing media files. At least one of the end users is identified who is located in such proximity to the media presentation device that the user can perceive media that presented on the media presentation device. At least one media file that is currently being presented on the media presentation device is identified and transmitted over the network to each of the identified end users. |
US08856374B2 |
Methods and systems for reconfiguration and repartitioning of a parallel distributed stream process
A method of reconfiguring a stream process in a distributed system includes the initial step of managing a stream process including one or more operators. The one or more operators are communicatively associated with one or more stream targets. The one or more operators use a partition function to determine the routing of messages to the one or more stream targets. The method includes the steps of determining a safe state within the stream process, and configuring a configuration state of the one or more operators during the safe state. |
US08856373B2 |
Admission control for performance aware peer-to-peer video-on-demand
A method and apparatus for performing admission control in a peer-to-peer video-on-demand system are described including determining if there is sufficient bandwidth to support leading sub-clip streaming for a new request from a video playback device, determining if there is sufficient bandwidth to admit the request without sacrificing quality of service for existing requests, accepting admission of the new request if both determining acts are positive and rejecting admission of the new request if either of the determining acts are negative. Also described is an apparatus for providing content to a video playback device in a peer-to-peer video-on-demand system including an admission control unit and a data engine component. |
US08856372B2 |
Method and system for local Peer-to-Peer traffic
A system and method providing for the flow of peer-to-peer traffic between end users within an access network without requiring the traffic to pass through a network gateway such as a Broadband Remote Access Server (BRAS). End user devices connect through access nodes to an aggregation network and a gateway. An Upstream Address Resolution Protocol (ARP) proxy and a Downstream ARP proxy are implemented in each access node. The Upstream ARP proxy receives an Upstream ARP request and forwards the request upstream only if peer-to-peer communications are allowed. Otherwise, a reply is sent with the MAC address of the BRAS. The Downstream ARP proxy intercepts a Downstream ARP request for a target device and determines whether the target device is in an ARP Cache in the access node. If so, the proxy sends an ARP reply giving the MAC address of the target device. If not, no ARP reply is sent. |
US08856371B2 |
Video conferencing over IP networks
A method for communication includes establishing communication links over a packet network between a server and plurality of client computers that are to participate in a video teleconference. The server receives from the client computers uplink audio packets and uplink video packets, which respectively contain audio and video data captured by each of the client computers. The server mixes the audio data from the uplink audio packets so as to create respective streams of mixed audio data for transmission to the client computers and transmits to the client computers downlink audio packets containing the respective streams of mixed audio data. The server relays the video data to the client computers in downlink video packets. The client computers receive and synchronize the video data with the mixed audio data. |
US08856370B2 |
Concurrent flashing of data processing units in hierarchical networks
The present invention provides an electronic network with a plurality of processing units that are arranged in sub-networks in a hierarchical and heterogeneous way. The network features a data stream controller that is coupled to any one of the sub-networks and that is adapted to transmit data to any one of the sub-networks. Further, the network has a data transmission port that is coupled to the data stream controller and that provides a high-speed data transmission to the data stream controller. The data stream controller serves to concurrently provide data and in particular flashing data to the various control units in a way that is adapted to the communication protocol and the data transfer rate of each sub-network. The invention therefore provides fast and autonomous flashing of a plurality of processing units, such as electronic control units in a network embedded system such as commonly used in the framework of automotive electronic networks. The data stream controller and its coupling to the various sub-networks provides a non-hierarchical and direct access to any sub-network and/or control unit of a heterogeneous and hierarchical network. |
US08856367B2 |
Arrangement and method for interchanging time markers
An arrangement and a method for interchanging time markers between a first and a second network, wherein the time markers each comprise data packets having a payload comprising a coded time information item. A device is configured to receive a first time marker, directly remove the coded time information item, insert the coded time information item into a new data packet from the second protocol, and to send this data packet as a second time marker using the second network. The arrangement and method allow closed control of the time information or the clock of the time accepter across a network boundary. |
US08856361B2 |
Incrementally changing the availability of a feature
Techniques are described to incrementally change the availability of a feature of a software service to clients over a network based on a configuration setting indicating the proportion of the clients that is eligible to receive the feature. In an implementation, a client rank is generated for a client on the network based on a client identification that identifies the client and a feature identification that identifies the feature. The feature may then be made available to the clients via the network if a comparison of the client rank with the configuration setting indicates that the client is eligible to access the feature. |
US08856357B2 |
BGP peer prioritization in networks
A method for establishing routes to neighboring networks during an initialization sequence according to a prioritized order may include detecting a power-cycling event and accessing a plurality of identifiers stored in a memory device that persisted through the power-cycling event. Each of the plurality of identifiers may be associated with a network. The networks may include first networks that are coupled to network endpoints, and second networks that are capable of coupling to the one or more first networks. For each network, the method may further include accessing a priority field in the memory device that may be associated with the network. The respective priority field can be based on an order in which communications should be established with the network and application layer information. The method may also include attempting to establish communications with each of the plurality of networks in an order based on the priority fields. |
US08856354B1 |
TCP-over-TCP using multiple TCP streams
A system, apparatus, and method for managing TCP over TCP communications using multiple TCP network connections. A plurality of tunneled network connections may be established between network devices. The network devices may employ one of the tunneled network connections over which to establish a plurality of application sessions. If congestion is detected on the employed tunneled network connection that exceeds a threshold, then a reset flag may be sent to abort that tunneled network connection. At least some of the application sessions are also transferred to another one of plurality of tunneled network connections, without terminating the moved application sessions. In one embodiment, at least one more tunneled network connection may be established between the network devices. |
US08856348B2 |
On-demand network connection
An on-demand network connection for a remote user is provided. Responsive to a failure to receive an electronic communication via an established network connection, a remote user device receives a connection request that indicates that the on-demand network connection is to be established. Responsive to receiving the connection request, the on-demand network connection is established from the remote user device to a network. Then, the electronic communication is received on the remote user device via the on-demand network connection. |
US08856347B2 |
Efficient selection of a messaging multiplexed channel instance
A method, system and article of manufacture are disclosed for selecting a channel instance for connecting a client application with a server application in a multi-channel computer system. In this computer system, when a new channel instance is used to connect one of the client applications with one of the server applications, defined channel instance information is established for the channel instance. The method of this invention comprises the steps of when a new application connection request is made, locking existing channel instance information; and after said locking, scanning through a list of channel instance connections for one of the channel instances that is a candidate channel instance for that new application connection request. The method comprises the further steps of, in response to finding a candidate channel instance, determining whether the candidate channel instance is suitable for the new application connection request. |
US08856345B2 |
Redundancy in process control system
The invention relates to a method and an apparatus for arranging redundancy in a process control system comprising at least one client device, at least one data source and at least one server device providing data transfer between the client device and the data source. The method comprises arranging, for the client device, at least two parallel logical connections for transferring substantially the same data between at least one data source and the client device. At the client device, property information on data units transferred via different logical connections is checked, the client device being provided with predetermined order criteria for the property information. At the client device, property information on parallel data units transferred via different logical connections is compared. Data units delivered via the logical connection having, according to the predetermined order criteria, the best property information are selected for the use of one or more applications processing the data units. |
US08856343B2 |
Managing computer resources in a distributed computing system
Methods, apparatus, and products for managing computer resources in a distributed computing system are disclosed that include registering, in a configuration management database by a discovery module in response to a modification of a resource in a resource container, the resource in association with a configuration management database identifier, the resource characterized by a resource type and a resource identification, the resource container including a manageability endpoint characterized by a manageability endpoint reference; and managing the resource by a management module in dependence upon a resource management policy and the manageability endpoint reference, the resource management policy including management actions for the resource. |
US08856342B2 |
Efficiently relating adjacent management applications managing a shared infrastructure
A linkage controller analyzes, for a first management application managing at least one common resource with a second management application adjacent to the first management application within a computing environment comprising multiple resources and relationships, a resource and relationship model known by the first management application of a selection of resources and relationships managed by the first management application from among the plurality of resources and relationships in the computing environment. The linkage controller identifies, for the first management application, only a minimal set of resources and relationships within the resource and relationship model providing at least one optimal linkage point between the first management application and the second management application as to the at least one common resource. The linkage controller outputs the minimal set of resources and relationships to the second management application for relating to the first management application. |
US08856340B2 |
Multi-adapter link aggregation for adapters with hardware based virtual bridges
Mechanisms for providing a network adapter and functionality for performing link aggregation within a network adapter are provided. With these mechanisms, a network adapter is provided that includes a plurality of physical network ports for coupling to one or more switches of a data network and a link aggregation module, within the network adapter, and coupled to the plurality of physical network ports. The link aggregation module comprises logic for aggregating links associated with the plurality of physical network ports into a single virtual link. The link aggregation module interfaces with a virtual Ethernet bridge (VEB) of the network adapter to send data to the VEB and receive data from the VEB. |
US08856333B2 |
Datacenter execution templates
Deployment and execution of a service in a multiple datacenter environment may be facilitated using datacenter execution templates. Developers, business managers, and other interested parties may select and/or modify a declarative execution template embodying multiple factors. The execution template may then be used to generate an execution plan, which is then executed by datacenters which run the service. The execution template may be optimized after deployment of the service, allowing for ongoing adjustment in response to changing business, regulatory, and operational factors. |
US08856332B2 |
Integrated capacity and architecture design tool
A method implemented in a computer infrastructure having computer executable code, including consolidating collected capacity architecture information, which includes data for installed resources, allocated resources and reserved resources and determining available resources based on the collected capacity architecture information. Additionally, the method includes displaying an indication the available resources and performing capacity planning based on the collected capacity architecture information and the available resources. |
US08856326B2 |
Enhanced media control
The present invention is aimed to provide an enhanced mechanism for conflict resolution between authorized services in respect of selective authorization criteria, such as service incompatibilities, subscribed bandwidth QoS assigned per subscriber and pre-emption priority value assigned per service. To this end, the present invention provides for a new method that allows the authorization of a subsequent service as a result of applying a selective authorization criterion for the subscriber at a policy control rules server to determine those previously authorized services to be put on hold, notifying about said previously authorized services to be on hold towards application devices handling such services, and inactivating at a policy enforcement device those control rules applicable to the media associated with said previously authorized services. In addition, the method as well as the policy control rules server, the application devices and the policy enforcement device may be also arranged for re-activating said previously authorized services still on hold when the reason for being on hold has ceased. |
US08856323B2 |
Device and method for facilitating secure communications over a cellular network
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device during a first predetermined period of time; securing the utility-related data at the hub device using digital envelopes during the first predetermined period of time; initiating by the hub device an autonomous wake up process during a second predetermined period of time; sending the secure utility-related data over a first network to a designated server via at least one User Datagram protocol (“UDP”) message during the second predetermined period of time; and receiving an acknowledgement of receipt message of the at least one UDP message from the designated server; wherein the first and second predetermined periods of time typically do not overlap, but may overlap. |
US08856322B2 |
Supervisory portal systems and methods of operation of same
A managed services platform and method of operation of same are described herein. The platform can include a device management service (DMS) server in which the DMS server can act as a gateway for communications with one or more computing devices, and the computing devices are associated with a first entity. The platform can also include an application service (AS) server in which the AS server is communicatively coupled with the DMS server. When a first computing device contacts the DMS server, the DMS server is operable to provide a bundle to the first computing device. As an example, the bundle contains content that at least includes one or more configuration messages and an application set that contains one or more predefined applications. The content of the bundle can be determined at least in part by the first entity. |
US08856320B2 |
Locating a target computer device in an array
A computer program product for locating a target computer device in an array includes computer usable program code for designating a first computer device as a first point of an axis of a reference coordinate system and designating a second computer device as a second point of the axis. The product includes computer usable program code for registering the connection of a first cable from a target computer device to the first computer device and detecting the connection of a second cable from the target computer device to the second computer device, computer usable program code for determining the length of each of the first and second cables, and computer usable program code for determining the location of the target computer device within the reference coordinate system according to the length of the first cable, the length of the second cable, and locations of the first and second computer devices. |
US08856315B2 |
Device classification system
Systems and/or methods include obtaining device information for devices within a network and determining a business function for each of the devices. The systems and/or methods further include assigning a criticality score to each of the devices based on the determined business function and generating a report for the devices based on the determined business function and the assigned criticality score. |
US08856311B2 |
System coordinated WLAN scanning
The invention proposes a scan control device, wherein in the scan operation a network detection is performed, the device comprising a request receiving means (41) for receiving at least one request for providing scan information, and a scan control means (42) for performing a scan operation independently from receiving the scan information requests. The invention also proposes a corresponding method and a computer program product. |
US08856310B2 |
ACORN: providing network-level security in P2P overlay architectures
To address the problem of providing network-based security to mitigate and detect cheating in peer-to-peer (P2P) gaming architecture, an architecture suite called architectures with coordinator obfuscation for resilient P2P gaming networks (ACORN) is presented that uses a combination of low overhead, per-packet access authentication, moving-coordinator and cheat detection mechanisms to effectively mitigate security threats. |
US08856309B1 |
Statistical tool for use in networked computer platforms
A statistic tool is provided for use in relation with a group of nodes in which each node has a statistic server configured to maintain application-related statistical data on local execution in the node. The statistic tool comprises a statistic manager for storing centralized statistical data obtained from the nodes and an intermediary server for processing a request from another computer system concerning the execution of an application by gathering statistical data received from those of the nodes that intervene in the execution of the application. |
US08856302B2 |
Systems and methods for foundation fieldbus alerts
An industrial process control system is provided. The industrial control system includes an alarm server with a processor configured to receive device information representative of field device information extracted from a device definition file. The processor is further configured to translate the device information into a first format interpretable by a global system for mobile communications (OPC AE) server and provide the device information in the first format to the OPC AE server. |
US08856299B2 |
Policy and charging rules function management method, management network element, and network system
A Policy and Charging Rules Function (PCRF) management method includes: acquiring information about a policy control session corresponding to a data connection, where the information about the policy control session includes information about policy control session release or result information about policy control session setup, and managing a mapping relation between the data connection and a PCRF according to the information about the policy control session corresponding to the data connection. A management network element includes: a policy control session information acquiring unit, adapted to acquire the information about a policy control session corresponding to a data connection, where the information about the policy control session includes information about policy control session release or result information about policy control session setup; and a managing unit, adapted to manage a mapping relation between the data connection and a PCRF according to the information about the policy control session corresponding to the data connection. |
US08856296B2 |
Subnet prioritization for IP address allocation from a DHCP server
A method, apparatus, and machine readable storage medium is disclosed for handling Dynamic Host Configuration Protocol (DHCP) at a first DHCP server, assigning a priority to each of a plurality of subnets, assigning to a client an IP address from the highest priority subnet, and transmitting a DHCP offer message to the client. |
US08856294B2 |
System and method for converting a Java application into a virtual server image for cloud deployment
A system and method to convert a software application, such as a Java application into a virtual server image that is suitable for cloud deployment. In accordance with an embodiment, the system and method allows for building a hypervisor appliance containing a virtual machine running an application. In particular, the hypervisor appliance can be compatible with any hypervisor for server virtualization and the application virtual machine can be a Java Virtual Machine (JVM). |
US08856293B1 |
Methods and devices for NAS-level data protection based on NAS configuration images
A network-attached storage (NAS) device comprises an operational state comprising first system settings; a network interface configured to couple to a network and a processor coupled to the network interface. The processor may be configured to identify a NAS configuration image stored on an externally accessible storage device, the NAS configuration image comprising second system settings created from an other NAS device on the network; determine that the NAS configuration image is compatible with the NAS device; receive a copy of the NAS configuration image; compare the second system settings with the first system settings to identify compatible system settings, and modify the first system settings based on the compatible system settings. |
US08856288B2 |
Method and apparatus for the distribution of configuration data
Embodiments of methods and apparatuses for distributing configuration data to one or more mobile terminals. An embodiment of one method of the invention includes receiving from the host application a request from a client to transmit a configuration data value to a mobile terminal. The configuration data value can include a designation of a new precedence level for a mobile terminal corresponding to a new operating characteristic of the mobile terminal. The method can include the step of transmitting from the NMC a configuration data value including the new precedence level to the mobile terminal. The mobile terminal can include a mobile application defining a previous precedence level such that the mobile terminal loads the configuration data in response to the new precedence level different from the previous precedence level. |
US08856280B2 |
Methods and apparatus for interactive specification of context-sensitive service level agreements; for provisioning of resources required during service delivery events regulated by service level agreements; and for monitoring compliance with service level agreements during service delivery events
In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event. In instances where a given service delivery does not comply with service level attributes specified in a controlling service level agreement, the methods and apparatus of the present invention take corrective action. |
US08856278B2 |
Storage system for pervasive and mobile content
A system and method for storage and retrieval of pervasive and mobile content is provided. System may be comprised of a controller and a plurality of storage devices. Plurality of storage devices may include a first storage device located in a first geographic location and a second storage device located in a second geographic location. The controller may be operably connected to each storage device. The controller may also be capable of locating a first storage device containing data and transferring the data between the first storage device and a second storage device. The second storage device may be capable of transferring data to a host, which may be operably connected to the second storage device. |
US08856274B2 |
Method for distributing of routing information for redundant connections
The present invention relates to a method for distributing routing information for redundant connection. The method is implemented in hierarchical IPv6 Internet protocol (IP) networks comprising a plurality of different autonomous systems (AS) which use a border gateway routing protocol (BGP-4) to communicate, which protocol does not allow routing sessions to be established automatically, which prevents multi-provider services from being created. The method of the invention makes it possible to create multi-provider services in the networks discussed above by using the BGP-4 protocol established by the current standards and technologies. This makes it possible to increase services offered by the providers. |
US08856272B2 |
Cloud hosted audio rendering based upon device and environment profiles
Systems and method for requesting audio content that is stored in a cloud network and accessed by many different audio devices where each of the audio devices may have an optimal type of audio encoding, format, and characteristic in addition to being located in different types of listening environment that are considered by a cloud audio server when preparing audio content for transmission to a requesting audio device. |
US08856271B2 |
Data accessing method used for customer premises equipment, and customer premises equipment
The present invention discloses a data accessing method used for CPE and CPE, wherein the data accessing method used for the CPE comprises: acquiring destination domain information; determining a gateway corresponding to the destination domain information according to a preset domain grouping table, wherein the domain grouping table is used to store a corresponding relationship between the destination domain information and the gateway; and accessing data through a modern mapped with the determined gateway. By virtue of the present invention, it can enable the users, when using services provided by operators, to quickly and conveniently access the services provided by different operators, thereby effectively avoiding the phenomena that the speed of accessing or downloading is slow and the access cannot even be achieved when the users cannot select a suitable operator in the prior art. |
US08856270B2 |
Method and apparatus for simplified user access to multiple browser transports in a mobile communication device
System and method are set forth for providing Web access to a user on a mobile communication device. A plurality of browser transports are associated with a single browser icon for display on the mobile communication device, and a predetermined one of the plurality of browser transports is selected for displaying information based on characteristics of the information being requested by the user. |
US08856265B2 |
Event notification based on subscriber profiles
A method, system, and computer program product is disclosed that evaluates the characteristics of a new content source with respect to subscriber profiles. The subscriber profile attributes are evaluated and weighted algorithmically to produce an “inference score” that is a measure used to predict the interest that subscribers may have with respect to the new content. If the inference score is significant enough (e.g., above a certain threshold value), then the service provider can take measures to inform those subscribers deemed to have a high level of interest in the new content of its existence, e.g., by sending a simple notification to the subscriber with a response link for setting up a subscription. |
US08856261B2 |
Network support for system initiated checkpoints
A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. |
US08856257B1 |
Sending alerts from cloud computing systems
A system is described for sending alert messages collected for cloud computing system to external systems. The alert messages may be sent according to determined protocols, such as the syslog protocol and/or SNMP trap, among other appropriate protocols. Partitioning and/or fragmenting of the alert message may be provided based on the use of various types of message identifications and/or other information in which, by virtue of the partitioning and fragmenting, an alert message, regardless of its length, may be sent and reconstructed at the external system. The system advantageously provides for transmission of alert messages using mechanisms other than the syslog protocol and with additional included alert attribute information. |
US08856256B1 |
System and method for file sharing and updating
Embodiments of the present invention include a method and system for sharing changes made by an application to a file on one computer, coherently with other computers, over the Internet. If the application changes multiple files (also referred to as a file group), changes made to all the files are shared together coherently with other computers over the Internet. Coherence over multiple file copies and file group copies is maintained whether users work on files online or offline. A ‘File Upload Lock’ is maintained on a Cloud Server for ensuring coherent sharing of changes made to files. Embodiments include two file syncing processes, variously described as ‘Incremental File Upload’ or ‘Incremental File Download’ and ‘Delta File Upload’ or ‘Delta File Download’. Embodiments also encompass an ‘Explorer’ software tool and user interface that displays folders and files on user devices with pertinent details from the device and the Cloud Server. |
US08856253B2 |
Method and system for presenting reposted message
Embodiments of the present invention provide a method for presenting reposted messages. The method includes: respectively establishing, in a server for each piece of original message X, a reposting chain, which takes the each piece of original message X as a root node, generating a piece of reposted message each time the original message X is reposted, and adding the reposted message to the reposting chain as a sub-node; and pulling needed reposted messages from the server when a client terminal device, at which a user locates receives an instruction instructing viewing the reposted messages corresponding to the original message X in a full amount message aggregation mode, and displaying the reposted messages on a page. Embodiments of the present invention also provide a system for presenting reposted messages. With the scheme of the present invention, a whole reposting chain of the original message may be presented to the user. |
US08856250B2 |
Community notification based on profile update
A notification machine may receive an update to a user profile that describes a user and indicates a group of users as being socially connected to the user by a social network. The update may reference a community (e.g., an employer or a club) of the user. The user profile may be modified by including a reference to the community within the user profile. The notification machine may identify a further user who is included in the community (e.g., employed by the employer, or part of the club). The further user may be socially unconnected to the user by the social network. The notification machine may then generate and provide a notification that the further user is employed by the employer. This notification may contain suggestions that the user initiate communication with the further user, become socially connected with the further user, or both. |
US08856248B2 |
Methods and systems for optimizing engagement with a social network
Techniques to increase engagement with a social networking system. In one embodiment, activities are prioritized based on relatedness to a user. References associated with at least a portion of the prioritized activities are created. The references are categorized into a plurality of types. The reference types may include notifications, friend identifications, and top stories. The references are embedded in digest communications for the user. Descriptive information about the activities are omitted from the digest communications. Digest communications for the user are provided during a time period when the user is not engaged with the social networking system. Notifications for a user are ceased when a level of engagement of the user with the social networking system is less than a threshold value. |
US08856246B2 |
System and method for project management system operation using electronic messaging
Method, system and non-transitory computer-readable medium for project management database update for a project management application. An interface may be provided for variable definition by user-input in a rule to trigger an action within the project management database, where the variable is identified by a label and the label is provided to signal a location of data for the variable in an electronic message, such as an e-mail or text message. An electronic message received for a mailbox may be parsed to locate the label in the received electronic message and thereby obtain data in the electronic message that corresponds to the variable. An action may be triggered according to the data corresponding to the variable, where the action causes an update to the project management database of the project management application. |
US08856243B2 |
Method, device, and system for message distribution
The disclosure relates to a message distribution method, device, and system. A message distribution method includes: creating a session based on a received first type of session message and allocating a corresponding cluster node to the session; and upon receiving a second type of session message associated with the session, distributing the second type of session message to the cluster node corresponding to the session. With the technical solution according to the embodiments of the invention, both the first type of session message and the second type of session message may be processed on the same cluster node, smooth and dynamic capacity expansion may be achieved for the cluster, the system performance may be enhanced, and system maintenance may be facilitated. |
US08856242B2 |
Method and devices to seamlessly inject services in content flows
A method for automating service invocation in message flows between a client (2100) and a server (2104), includes a step of generating a message (2300) including content by said client (2100), a step of transmitting said message by said client (2100) via a network (2103) to said server (2104), wherein said method further includes a step of intercepting said message (2300) by a message interception device (2105) in the network (2103), and a step of determination by said message interception device (2105) whether a service is needed for further execution on said content part of said message. In case a service is needed, said method includes a further step of selecting at least one service engine for further execution of at least one service on said content part of said message. |
US08856238B2 |
Representing remotely available users through working elsewhere status
An application provides a “working elsewhere” status for users working at a location other than their regular work location and still available for meetings, communication sessions, etc. The application determines a user location being other than regular work location and the user still being available through user selection, information from user associated application(s), and/or from a presence notification. The application adjusts the user status to a working elsewhere status and makes the new status available to other applications such as calendaring, communication applications, presence service(s), and comparable ones. Meetings may be scheduled, communication sessions facilitated if the working elsewhere status is sufficient/acceptable for other users. |
US08856235B2 |
Inferring user profile attributes from social information
User profile information for a user of a social networking system is inferred based on information about user profile of the user's connections in the social networking system. The inferred user profile attributes may include age, gender, education, affiliations, location, and the like. To infer a value of a user profile attribute, the system may determine an aggregate value based on the attributes of the user's connections. A confidence score may also be associated with the inferred attribute value. The set of connections analyzed to infer a user profile attribute may depend on the attribute, the types of connections, and the interactions between the user and the connections. The inferred attribute values may be used to update the user's profile and to determine information relevant to the user to be presented to the user (e.g., targeting advertisements to the user based on the user's inferred attributes). |
US08856234B2 |
System and method for performing distributed asynchronous calculations in a networked environment
A method and associated system are provided for performing calculations in a distributed networked environment, comprising: updating a source element on a first computer; sending a calculate update signal to a target calculated element for updating on a target element computer that may be the first computer or a second computer connected to the first computer that uses the source element in a calculation; obtaining the updated source element by a process on the target element computer associated with the target calculated element in response to the sending; and performing a calculation to update the target calculated element using the obtained updated source element. |
US08856219B2 |
System for providing a bidirectional data access service and method thereof
A system for providing a bidirectional data access service includes a relay server and a service server. The relay server is located in the Internet. The service server registers an internal Internet Protocol (IP) address, an external IP address, and a corresponding server identification in the relay server, and establishes a data channel. When a user wants to utilize a predetermined service provided by the service server through a client device, the client device transmits the corresponding server identification to the relay server, and the relay server transmits the internal IP address and the external IP address to the client device according to the corresponding server identification. The client device automatically determines a connection method between the client device and the service server according to an application program, the internal IP address, the external IP address, and a network on which the client device is located. |
US08856218B1 |
Modified media download with index adjustment
A method and corresponding apparatus or system, in which a computing device may obtain an index of a media file, the computing device may use the index as a basis to download just part of the media file as a modified media file, the computing device may adjust the index to account for omission of the remainder of the media file, and the computing device may use the modified index as a basis to play out content of the modified media file. |
US08856217B2 |
Information delivery system for generating a data stream with a server system based on a content file received from a client device
An information delivery system, an information delivery method, an information processing apparatus, and an information processing method is used advantageously to deliver content stream data easily, reliably and inexpensively to the general users. A personal computer prepares a content file and an order form file using software provided by a center system, and transmits the prepared files to the center system over the Internet. Given the order form file from a customer device, the center system encodes a content file accordingly to generate content stream data and causes a moving picture delivery server to deliver the generated stream data to user terminals. This invention can be applied, among others, to systems for delivering content data over the Internet. |
US08856216B2 |
Method and apparatus for efficiently performing file services using cloud computing
A method and apparatus for performing file services using cloud computing comprises receiving, from a client computer, at least one parameter of a file resident on the client computer and a task to be performed upon the file. In view of the task, creating a virtual file based on the at least one parameter of the file, and dividing the virtual file into a plurality of data chunks. The method identifies a byte range within the virtual file associated with the task and at least one corresponding data chunk from the plurality of data chunks that is within the byte range. The method requests the corresponding data chunk(s) from the client computer, receives the corresponding data chunk(s) from the client, processes the corresponding data chunk(s) in accordance with the task, and sends the processed corresponding data chunk(s) to the client computer. |
US08856214B2 |
Relationship quality evaluation and reporting
A system for relationship information evaluation and management. The system incorporates relationship quality parameters that define the contextual parameters of quality, which are mutually validated and are accepted by the respective parties within an existing or prospective relationship. A computer, computing device, written documents or other means are used to capture the perspectives of each person, representative, or entity within the relationship or prospective relationship. This can be done automatically, on a random, periodic, or scheduled basis, or upon manual initiation. The information or data may then be analyzed and coalesced into a meaningful whole (or segments thereof), which may then be archived, printed, reported, and presented to one or both of the parties, or others. The information can be processed and stored based upon certain parameters, attributes, types or classes or relationships, so as to provide history, patterns, trends, alerts, warnings, analyses or comparisons concerning relationship quality. All information collected can be further applied or aggregated within an organization (or beyond, such as in a general locality or marketplace). |
US08856213B2 |
Provisioning a moderated data service using a syndicated radio access network (RAN)
A system is configured to receive, from a content provider, traffic associated with a data service and that is destined for a group of user devices; retrieve service information, associated with the data service, that includes a value, associated with the data service, that represents a level of service quality associated with the data service; determine whether the traffic is authorized to be transmitted to the user devices based on the value; discard the traffic based on a determination that the value is less than a threshold; process the traffic to identify whether a condition is associated with the traffic based on a determination that the value is not less than the threshold; transmit the traffic to one or more of the user devices based on a determination that the traffic is not associated with a condition; and discard the traffic based on a determination that the traffic is associated with a condition. |
US08856212B1 |
Web-based configurable pipeline for media processing
An apparatus and method for a web-based configurable pipeline for media processing is disclosed. The disclosed embodiments include a web browser implemented on a computing device. The web browser includes a web application processor configured to execute instructions included in a web application, and one or more configurable pipelines, wherein a configurable pipeline of the one or more configurable pipelines is created using at least some of the instructions included in the web application, the configurable pipeline including a plurality of components for processing one or more media streams, each component including at least one input or at least one output, and the configurable pipeline is adapted to establish data connections between the plurality of components. |
US08856210B2 |
System, method and storage medium for managing items within file directory structure
A file-mapping method and system can better manage the number of items (i.e., files, subdirectories, or a combination of them) within any single directory within a storage medium. The method and system can be used to limit the number of items within the directory, direct content and content components to different directories, and provide an internally recognizable name for the filename. When searching the storage medium, time is not wasted searching what appears to be a seemingly endless list of filenames or subdirectory names within any single directory. A client computer can have requests for content fulfilled quicker, and the network site can reduce the load on hardware or software components. While the method and system can be used for nearly any storage media, the method and system are well suited for cache memories used with web servers. |
US08856205B2 |
Extensible web services system
Techniques for extending a Web services system are provided. One or more Web service applications (WSA) execute on a device. Each WSA provides at least one service. A WSA implements a particular version of a Web Services (WS) specification that is previous to a current version of the WS specification. In one technique, an orchestration module is added that coordinates the interaction between the WSA and one or more extension modules. While processing the request, the WSA calls the orchestration module. The orchestration module, based on one or more attributes of a request, determines whether an extension module, that comprises logic, should be called to process a portion of the request. The logic corresponds to a difference between the previous version and the current version. After an extension module finishes processing the portion of the request, the WSA is caused to further process the request. |
US08856202B2 |
Flexible remote data mirroring
Methods, systems, and configured storage media are provided for flexible data mirroring. In particular, the invention provides many-to-one data mirroring, including mirroring from local servers running the same or different operating systems and/or file systems at two or more geographically dispersed locations. The invention also provides one-to-many data mirroring, mirroring with or without a dedicated private telecommunications link, and mirroring with or without a dedicated server or another server at the destination(s) to assist the remote mirroring unit(s). In addition, the invention provides flexibility by permitting the use of various combinations of one or more external storage units and/or RAID units to hold mirrored data. Spoofing, SCSI and other bus emulations, and further tools and techniques are used in various embodiments of the invention. |
US08856199B2 |
Random number generator circuit and cryptographic circuit
A random number generator circuit includes: an element generating and outputting physical random numbers; a digitizing circuit digitizing the physical random numbers to output a random number sequence tested by a testing circuit; and an error correcting code circuit including a shift register having the random number sequence input thereto, a multiplier multiplying the stored random number sequence by an error-correcting-code generating matrix, and a selector switch outputting one of an output of the shift register and an output of the multiplier in accordance with a test result obtained by the testing circuit. The error correcting code circuit outputs the output of the multiplier as a corrected random number sequence from the selector switch when the result of a test conducted by the testing circuit indicates a rejection. The testing circuit tests the corrected random number sequence when the result of the test indicates a rejection. |
US08856195B1 |
Method and system for wireless device access to external storage
To meet the needs for storing larger volume personal information for user of wireless device, it is desire to provide extra storage space to the wireless device such as for cell phone or personal assistant device (PDA) etc due to the limited storage space that the wireless device has. Instant application disclosed a system and method for the wireless device to efficiently and effectively use remotely located storage space provided by a server for storing message or multimedia data such as videos, digital music, digital photo/picture. |
US08856190B2 |
Distributed computing system hierarchal structure manipulation
A hierarchal structure manipulation system may include a nested table generation module to generate nested tables representing hierarchal relationships of computing systems in a distributed computing environment. A hierarchal structure manipulation module may access at least one nested table to manipulate a hierarchal structure represented by the nested table. The hierarchal structure manipulation module may use a generic algebraic specification to manipulate the hierarchal structure represented by the nested table. The generic algebraic specification may provide a generic abstraction across a plurality of the computing systems in the distributed computing environment. |
US08856189B1 |
Systems and methods for managing connections to process data
A computer-implemented method for managing connections to process data is described. A connection with an access server is established to determine a connection point associated with one or more targets. The one or more targets are arranged according to the connection points associated with each of the one or more targets. A connection with a first connection point is established. Data from one or more targets associated with the first connection point are processed. The connection with the first connection point is terminated. |
US08856187B2 |
Data management for data aggregation
The invention provides a method, system, and program product for managing data for data aggregation, including data mining and reporting. Locations of a plurality of data to be collected are determined within a source database. Data are simultaneously collected from the plurality of locations and aggregated. The aggregated data are normalized by adding an encryption key and the normalized data are stored. Data at each of the plurality of locations are then released in the source database. |
US08856179B2 |
Method to send a short message service (SMS) campaign to a related object by selecting the base object
A method to transmit SMS messages to a Related Object by selecting the Base Object and transmit SMS messages to both, the Base Object as well as to the Related Object, simultaneously, in a CRM application is disclosed. The relationship between the Base Object and the Related Object may be any one of one-to-one, one-to-many, many-to-one or many-to-many that can be defined while deploying the CRM application. The process takes place in different levels wherein the system decides whether the SMS message should be sent to the Base Object or different Related Objects depending upon the Campaign Workflow and locates the mobile phone number of the entity and finally transmits the SMS message via SMS Service Provider chosen from the user Interface. |
US08856172B2 |
Method and system of unifying data
A system, method and database design is provided for unifying data from a plurality of databases, each having business-context related data and a data access mechanism. A database is created which contains a node for each dimension of an industry. For each data source accessible via the system, a set of data source specific dimensions is created and mapped to the corresponding industry business context dimension(s). A set of templates (e.g., UniViews) is created to query the data sources. Each UniView contains a specific question for a specific dimension designed for a specific data source. A central server coordinates the system and facilitates use of the system through an interface (e.g., the UniViewer). UniViewer allows a user to query the data sources by identifying an industry business context dimension, a dimension instance and at least one UniView. Multiple UniViews can be combined, cached and saved to facilitate complex queries. |
US08856168B2 |
Contextual application recommendations
The disclosure relates to methods and systems for generating application retention metrics. In one aspect, a method for generating a contextual application recommendation is disclosed. Contextual web location information including a remote developer identifier and/or a remote application identifier is received from a remote application. An application database including application records with a developer identifier and an application identifier is queried to determine if the contextual web location information corresponds to an application recommendation. The application database query includes comparing the remote developer identifier to the application database developer identifier to generate a first application recommendation, and/or comparing the remote application identifier to the application database application identifier to generate a second application recommendation. If a recommendation is found, the first and/or the second application recommendation is transmitted to a user of the remote application. |
US08856166B2 |
Query validator
According to some embodiments, a method and apparatus are provided to receive a syntax correct query, analyze the syntax correct query, and output a message associated with the syntax correct query. |
US08856165B1 |
Ranking of users who report abuse
A method, performed by one or more server devices, includes receiving an abuse report from a user, where the abuse report indicates that a comment associated with a document violates a policy associated with providing comments to users; retrieving a trust score of the user, where the trust score is based on a difference between a quantity of valid abuse reports previously generated by the user and a quantity of invalid abuse reports previously generated by the user; generating or adjusting a removal score of the comment based on the retrieved trust score of the user; comparing the removal score to a removal threshold; and removing the comment from further presentation to users if the removal score of the comment is greater than the removal threshold. |
US08856164B2 |
System and method for processing online reading interactions
An online reading processing system and method for providing interactive messages to users at end computer devices are provided, which include storing online reading information in a data storage medium; setting the online reading information with a head mark and a tail mark of at least one expert-marked key range by a setting module; reading the information after being set and hiding the head mark and the tail mark thereof; receiving the key range marked by the user; determining whether the user-marked key range covers the head mark and the tail mark so as to form interactive messages according the determination, thereby solving the drawback of failing to provide appropriate feedback or assessment according to users' behaviors as encountered in the prior techniques, and also increasing online reading interaction and enjoyment. |
US08856163B2 |
System and method for providing a user interface with search query broadening
A system and method for providing a user interface with search query broadening is described. A query defining a search executable on potentially retrievable information is accepted. The query is parsed. A broadened query is provided. At least one of the broadened query and results of a search executed on the broadened query is presented. |
US08856160B2 |
Product options framework and accessories
Techniques are described for describing and associating custom products. In an embodiment, a first attribute value that defines an attribute of a custom product is received from a user that is customizing the custom product. In response to receiving the first attribute value, a legal set of attribute values for a second attribute of the custom product or an accessory product may be determined. The legal set of attribute values identifies one or more attribute values of the second attribute of the custom product or accessory product that are compatible with the first attribute value. The legal set of attribute values may identify a continuous range of values where any value within the continuous range of values is compatible with the first attribute value. In an embodiment, the user may be limited to selecting accessory products having a legal attribute value. |
US08856157B2 |
Automatic detection of columns to be obfuscated in database schemas
Various embodiments of systems and methods for automatic obfuscation of sensitive data in a database schema are described herein. The technique uses static detection of sensitive data by application type, static detection by column name, and data profiling by examining a sample of the tables data from the database schema. |
US08856155B2 |
Management of configuration data structures in multi-layer data models
In one embodiment, a computer program product includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code being configured to: map a template-level configuration-management data structure to a discovery-level configuration-management data structure by a first mapping using mapping information included in the template-level configuration-management data structure, map a customized-level configuration-management data structure to the discovery-level configuration-management data structure by a second mapping using mapping information included in the customized-level configuration-management data structure, and determine a third mapping between the template-level configuration-management data structure and the customized-level configuration-management data structure using the first mapping and the second mapping. |
US08856154B2 |
Data tranformations between a source application and service-oriented target applications supporting different data formats
Embodiments of the invention allow structured data to be transferred between a source application and a service-oriented target application that process data in different formats. The data to be transferred may be divided into different sections, where each section is processed by a respective service of the target application. To transform each section of data into a format compatible with a respective service, the data may have a set of associated rules which transform data based on a set of variables. The source application may provide variable definitions for each of the variables. Each service of the target application may specify values for each of the variables. Once the variables have a specified value, a transformation engine may transform each section of the data and subsequently transfer the transformed sections of the data to respective services of the target application for processing. |
US08856150B2 |
Managing and displaying solutions for multiple resources in an appointment scheduling system
A solution space is computed and stored which comprises for a given set of constraints all possible solutions for all available resources of a certain kind. Upon selection of a specific resource, the solution space is filtered to select all possible combinations containing the specific resource and the result of the filtering is displayed. |
US08856148B1 |
Systems and methods for determining underplayed and overplayed items
Systems and methods for determining underplayed or overplayed items are provided herein. Instructions stored in memory are executed by a processor to: calculate short term scores for radio data and music identification service data of the items, determine linear distance and logarithmic distance between radio virtual radio plays per days on one million stations (VRPDOMS) and identification VRPDOMS of the items, identify and eliminate items lacking minimum requisite number of radio VRPDOMS or identification VRPDOMS, and sort the items by largest linear distance or largest logarithmic distance first. The sorted items are then transmitted to the computing device. |
US08856147B1 |
Method of sorting data on a limited resource computer
A method of sorting data on a limited resource computer is disclosed. Data recording characteristics associated with a data set are determined. A sort-table size is calculated based on the data recording characteristics, and the data set is sorted based on the sort-table size. |
US08856145B2 |
System and method for determining concepts in a content item using context
The present invention is directed towards systems and methods for indexing one or more items of content. The method of the present invention comprises extracting one or more items of text from a given item of content. The one or more items of extracted text are tokenized into one or more concepts. One or more related concepts associated with the one or more concepts are identified. A support score is generated for the one or more concepts, and the item of content is index with the one or more concepts and the one or more associated support scores. |
US08856141B1 |
Providing posts from an extended network
A system includes: an engaging post identifier for identifying and retrieving engaging posts; an extended network post identifier for identifying extended posts from an extended network; a combining module for creating a combined list of added posts from the engaging post and the extended posts, the combining module generating one or more ranked posts by ranking the list of added posts by relevance to a user; and a user interface module for providing the one or more ranked posts. The disclosure also includes a method for finding and providing engaging posts that includes determining engaging posts; determining extended posts from an extended social network using a social graph of the user; adding the engaging posts and the extended posts to create a combined list of added posts; ranking the added posts by relevance to a user; and providing one or more of the ranked posts. |
US08856132B2 |
Tips management system and process for managing organization-wide knowledge tips
The invention provides a method, a system, and a computer program product for managing and distributing knowledge tips in an organization. A member of the organization submits a knowledge tip and one or more data points corresponding to the knowledge tip in a Tips Management System (TiMS). The member associates the knowledge tip with at least one predefined category. A member selects knowledge tips by defining a criterion in TiMS. The member selects category(ies) and/or projects(s) and provides delivery parameters for planning the delivery of knowledge tips to the at least one member. The TiMS delivers the selected knowledge tips to the each member as per the delivery parameters. |
US08856131B1 |
Computer networked selecting of consumer interests
Systems and methods of selecting consumers to receive content on a computer network are provided. A user list identifying a first plurality of users having a group of features corresponding to internet activity of the first plurality of users can be obtained at a computing device. A subgroup of features can be selected from the group of features, and a cluster of users of the first plurality of users can be identified. The users of the cluster of users can each have at least one feature of the subgroup of features. A supplemental user having a supplemental feature can be identified. A correlation between the supplemental feature and at least one feature of the subgroup of features can be determined, and an expanded user list that includes at least one of the first plurality of users and the supplemental user can be generated. |
US08856130B2 |
System, a method and a computer program product for performance assessment
A system, a computerized method, and a computer program product for classification of items based on their attributes and on a classification scheme that is defined based on information pertaining to each item of a set of items, and which is indicative of: (a) a quantity of occurrences of the item in a sample; (b) a quantity of successful occurrences of the item in the sample; and (c) at least one attribute of the item with regard to at least one variable out of a set of variables. |
US08856129B2 |
Flexible and scalable structured web data extraction
This document describes techniques that label text nodes of a seed site for each of a plurality of verticals. Once a seed site is labeled for a given vertical, the techniques extract features from the labeled text nodes of the seed site. The techniques learn vertical knowledge for the seed site based on the human labels and the extracted features, and adapt the learned vertical knowledge to a new web site to automatically and accurately identify attributes and extract attribute values targeted within a given vertical for structured web data extraction. |
US08856121B1 |
Event based metadata synthesis
One disclosed method includes determining time and location information for a first digital asset based on a first set of metadata associated with the first digital asset that does not include location information but includes a first time value, and based on a second set of metadata associated with a second digital asset that includes a second time value and a first location value; determining the first digital asset is associated with an event based on a correlation of the determined time and location information for the first digital asset with event time and location information for the event, in which the determined time and location information for the first digital asset includes the first time value and the first location value; and associating the first digital asset with a third set of metadata associated with the event. |
US08856118B2 |
Creation and transmission of rich content media
A method of playing a rich content stream that includes a media stream and a descriptive stream. The method may include the steps of receiving the rich content stream at a media player, where the descriptive stream is generated from a rich content file executed separately from a source for the media stream, and where the media stream and the descriptive stream are received as separate streams at the media player. The method may also include synchronizing the media stream and the descriptive stream at the media player so that information in the descriptive stream is temporally synchronized with media content playing from the media stream. In addition the method may include activating the playing of the descriptive stream while the media stream is playing on the media player, where descriptive content from the descriptive stream is not played on the media player until being activated by a user. |
US08856117B2 |
System and method of accelerating response time to inquiries regarding inventory information in a network
A method and system for distributing access to inventory items available at vendor locations includes user stations transmitting user inquiries on a communications network. Network-connected location servers access a set of inventory availability information associated with inventory items available at their respective location, for example, tables at a restaurant. The host server receives user inquiries regarding availability of items associated with at least some of the location servers and queries a cache server that locally stores a binary subset of the information from the location servers to determine if the requested item is available without having to separately query the database at each location. Particularly, a web server receives and stores information regarding only whether a requested item is available or not available from a particular location rather than how many items are available at the location. A user, therefore, can access availability of inventory items with less communications traffic. |
US08856111B1 |
Cross media type recommendations for media items based on identified entities
Recommendations for a media item associated with a primary entity are based on co-interaction information gathered from other media content items of several different media types that are also associated with the primary entity. Co-interaction information can include, for example, co-click data for websites, co-watch data for videos, or co-purchase data for purchases. The co-interaction data is processed to determine a co-interaction score between primary media items and secondary media items. From the co-interaction scores, secondary entities associated with the secondary media items are determined. A relatedness score is determined for these secondary entities based on the aggregation of the co-interaction scores of the secondary media items they are associated with. The relatedness score indicates a determination of how related one entity is to another. The secondary entities are ranked according to relatedness score in order to determine secondary entities most relevant to the primary entity. |
US08856109B2 |
Topical affinity badges in information retrieval
Topical affinity badges in information retrieval is described, for example, where graphical elements are presented together with ranked search results from a search engine, to indicate a degree of association between an author of a document and a topic. In various embodiments, a measure of an author's affinity to a topic is predicted using a machine learning system that takes as input author features derived from documents of the author. In various examples topical affinity scores or labels are used to generate badges and/or to index documents at an index of a search engine. For example, badges may be presented with ranked search results, in pop up displays or in other ways. In examples author features relating to any of recency, frequency and presentation of an author's documents are generated, where presentation features may relate to biographical information such as experience, qualifications, and previous documents. |
US08856107B2 |
Method and apparatus for 3D display and analysis of disparate data
The system provides a method and apparatus for sorting and displaying collections of communications. These communications can be a single type or multiple types of data and may come from email systems, bulletin boards, text messages, Facebook and Twitter postings and comments, financial transactions, travel itineraries or any other type of communications. The communications represented by the system can be electronic or physical as desired. The system can also present forwarded, copied, replied, or other types of communications. In one embodiment, the system provides a Universe View of a set of communications. The Universe View, in one embodiment, is a three dimensional representation of a plurality of cubes. Each cube represents a subset of a collection of communications. Each cube can be color coded or shaded to represent a dominant theme of the contents of the communications represented by the cube. |
US08856104B2 |
Querying by concept classifications in an electronic data record system
Embodiments of the present invention enable processing of concept-based query requests submitted to a query service within a healthcare transaction framework. In embodiments, a terminology service within the healthcare transaction framework manages terminology content (concepts represented by a set of terminologies). In embodiments, search criteria from a data access query request are submitted to the terminology service to extract a set of concepts from the terminology content that are associated with the search criteria. In embodiments, equivalence search criteria include a seed concept, and the terminology service returns a set of equivalent concepts comprising the seed concept. In embodiments, classification search criteria include a classification identifier, and the terminology service returns a set of concepts associated with the classification identifier. In embodiments, the query service generates and submits a data access query comprising predicates associated with the returned set of concepts. |
US08856101B2 |
Interactive media card
A method for creating and searching within an entity-defined profile is disclosed. A search engine is provided for searching within first data for data meeting known criteria. The search engine receives criteria data comprising a first media card. The media card relates to an individual or organization. Result data associated with the criteria data is retrieved, the result data associated with at least some data within the first media card to provide search results, and then the search results are displayed. |
US08856099B1 |
Identifying entities using search results
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying entities using search results. One of the methods includes determining that a first search query includes a respective text reference to each of one or more predetermined attributes, wherein each attribute is associated with a first entity type; obtaining search results for the first search query from a search engine, the search results identifying a plurality of resources; identifying entities of the first entity type that are related to any of the plurality of resources identified by the search results; and selecting names of one or more of the identified entities of the first entity type to include in a response to the first search query. |
US08856098B2 |
Ranking search results based on word weight
Ranking search results, comprises retrieving search results that include target strings that relate to a query string; segmenting the query string and each of the target strings; pairing segments in the query string with respective segments in the target strings to form combinations; retrieving weights that correspond to the combinations; and determining a weighted word length based on the weights corresponding to each of the target strings; and ranking the target strings based on their respective weighted word lengths. Alternatively, ranking search results includes determining a minimum weight of each inserted word with respect to segments in the query string; determining a minimum weight of each deleted word with respect to segments in the target strings; determining a total edit distance for each target string; and ranking the target strings based on the total edit distances. |
US08856097B2 |
System and/or method for obtaining of user generated content boxes
The subject matter disclosed herein relates to a process for receiving, evaluating and selecting of content modules such as content summary boxes and landing pages for display on network-accessible search engine results page. In one particular example, potential content providers may be provided with incentives and guidelines for the preparation of content summary boxes and landing pages over an electronic communications network, and the resulting submissions can be ranked and published in conjunction with the display of a search engine results page over the network. |
US08856096B2 |
Extending keyword searching to syntactically and semantically annotated data
Methods and systems for extending keyword searching techniques to syntactically and semantically annotated data are provided. Example embodiments provide a Syntactic Query Engine (“SQE”) that parses, indexes, and stores a data set as an enhanced document index with document terms as well as information pertaining to the grammatical roles of the terms and ontological and other semantic information. In one embodiment, the enhanced document index is a form of term-clause index, that indexes terms and syntactic and semantic annotations at the clause level. The enhanced document index permits the use of a traditional keyword search engine to process relationship queries as well as to process standard document level keyword searches. |
US08856093B2 |
Methods and systems for search indexing
The present invention provides for quick and efficient searching. One embodiment includes a first instruction configured to read at least a first search string and a second search string entered into a same first search field, and a second instruction configured to incrementally filter search results to locate at least a first document that has a least a first word that begins with the first string and a second word that begins with the second string. |
US08856091B2 |
Method and apparatus for sequencing transactions globally in distributed database cluster
A system and method for receiving and tracking a plurality of transactions and distributing the transactions to at least two replication queues over a network. The system and method comprise a global queue for storing a number of the received transactions in a first predetermined order. The system and method also comprise a sequencer coupled to the global queue for creating a copy of each of the transactions for each of said at least two replication queues and for distributing in a second predetermined order each said copy to each of said at least two replication queues respectively, said copy containing one or more of the received transactions. |
US08856082B2 |
Policy based population of genealogical archive data
An approach for managing a family tree archive is provided. The approach includes creating an electronic archive based on a family tree. The approach also includes automatically discovering Internet-based data associated with at least one member of the family tree. The approach additionally includes adding the Internet-based data to the archive. The approach further includes storing the archive at a storage device. |
US08856079B1 |
Application programming interface for efficient object information gathering and listing
An information system has a database having distinct object structures that store information about corresponding operating components of the system. An association structure describes many-to-many relationships among the components. Targeted requests for information about first objects are satisfied by obtaining information from a first object structure as well as information about associated objects from the second object structure. Bulk requests for information about a large number of objects are handled differently, using a lookup structure that associates the first objects with limited information of the associated second objects, such as externally visible names which would be meaningful to a requestor. Thus response can efficiently provide full information about all first objects as well as limited but useful information about all associated second objects, avoiding traversals of the association structure and corresponding interrogations of the second object structure. |
US08856075B2 |
System and method of sharing in a plurality of networks
A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module. |
US08856069B2 |
Combined save and validation logic
Methods, systems, and computer-readable media for combined saving and validation are disclosed. A particular method includes receiving a command to save changes associated with a change set to a data storage device. Entities of the change set are validated and one or more pre-operation commands are executed on the change set. When a pre-operation command modifies one or more first entities of the change set, the first entities are revalidated. The method also includes executing a data operation based on the change set and executing one or more post-operation commands on the change set. When a post-operation command modifies one or more second entities of the change set, the second entities are re-validated. |
US08856068B2 |
Replicating modifications of a directory
Replicating modifications of a directory that include receiving in a source directory service for a source directory requests for modifications in the source directory and transmitting, from the source directory service to a duplicate directory service for a duplicate directory asynchronously in parallel over a plurality of data communications connections, requests for the same modifications in the duplicate directory. In typical embodiments, a duplicate directory may replicate a subtree of a source directory, receiving requests for modifications may include receiving in the source directory service requests for modifications in the subtree in the source directory, and transmitting requests may include transmitting requests for the same modifications in the subtree in the duplicate directory. |
US08856066B2 |
Sharing information between tenants of a multi-tenant database
In a method, system, and computer-readable medium having instructions for sharing information between tenants of a multi-tenant database, information is received on a connection between a first tenant of a multi-tenant database and a second tenant and the connection has information on a scope of data from the first tenant shared with the second tenant, data is allowed for a record of the first tenant to be accessible to the second tenant in accordance with the connection, information is received on a file related to the record of the first tenant, and data is allowed from the file to be accessible to the second tenant in accordance with the connection. |
US08856057B2 |
Cognitive security system and method
A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface accessible by a human operator. The system utilizes symbolic cognitive architectures and inference processing algebras allowing the system to respond to open, incomplete, and/or unknown problem domains, offering flexibility in the case of unexpected changes in the security environment. The system is also capable of intelligently, and in real-time, adapting security peripheral configurations to further probe and analyze the real-time security environment, provided real-time data that can be processed with symbolic cognitive architectures and inference process algebras enabling the identification of new and emerging threat profiles leading to the prediction and detection of security breaches. |
US08856056B2 |
Sentiment calculus for a method and system using social media for event-driven trading
A sentiment calculator uses social media messages for the real-time evaluation of publicly assets, in particular traded equities and commodities wherein a sentiment is an integer computed based upon pairs of lexical items in local syntactic context. The sentiment calculator includes a mechanism for determining polarity in social media messages and a mechanism for determining a strength value of lexical items used in social media messages. |
US08856054B2 |
Evolutionary computing based optimization
Some embodiments for performing evolutionary based optimization feature: a dominance archive, auto-adaptive operators, detection of search stagnation, exploitation of randomized restarts to escape local optima, and/or selection of recombination operators based on their success in generating high quality solutions. |
US08856050B2 |
System and method for domain adaption with partial observation
A novel domain adaption/transfer learning method applied to the problem of classifying abbreviated documents, e.g., short text messages, instant messages, tweets. The method uses a large number of multi-labeled examples (source domain) to improve the learning on the partial observations (target domain). Specifically, a hidden, higher-level abstraction space is learned that is meaningful for the multi-labeled examples in the source domain. This is done by simultaneously minimizing the document reconstruction error and the error in a classification model learned in the hidden space using known labels from the source domain. The partial observations in the target space are then mapped to the same hidden space, and classified into the label space determined by the source domain. |
US08856047B2 |
Fast personalized page rank on map reduce
A personalized page rank computation system is described herein that provides a fast MapReduce method for Monte Carlo approximation of personalized PageRank vectors of all the nodes in a graph. The method presented is both faster and less computationally intensive than existing methods, allowing a broader scope of problems to be solved by existing computing hardware. The system adopts the Monte Carlo approach and provides a method to compute single random walks of a given length for all nodes in a graph that it is superior in terms of the number of map-reduce iterations among a broad class of methods. The resulting solution reduces the I/O cost and outperforms the state-of-the-art FPPR approximation methods, in terms of efficiency and approximation error. Thus, the system can very efficiently perform single random walks of a given length starting at each node in the graph and can very efficiently approximate all the personalized PageRank vectors. |
US08856044B1 |
Segmented access of remotely stored biographical data to a client device
Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is obtained from a vocational collateral such as a business card. In this embodiment, a method and system includes extracting a biographical data from a digital identifier of the vocational collateral. The method and system includes assigning at least one of an access privilege and a security privilege to the biographical data extracted from the digital identifier. The method and system further includes storing the biographical data comprising at least one of the access privilege and the security privilege in a repository of a cloud computing environment accessible to a number of client devices through a network connection. Finally, the method and system includes permitting the number of client devices access to the biographical data based on the access privilege and/or the security privilege. |
US08856042B2 |
Method, apparatus and program for performing personal authentication and inputting operation instruction on the basis of biometric information including posture information
A method includes obtaining an image to be compared at the time of use which is intended for comparing biometric information at the time of use of a user, obtaining posture information at the time of use which indicates a posture when biometric information at the time of use of the user is shot, performing personal authentication for the user by comparing the image to be compared at the time of use with a preregistered image to be compared at the time of registration of the user, and inputting an operation instruction corresponding to operation information preregistered in association with posture information at the time of registration which is determined to match, by comparing the posture information at the time of use with a plurality of pieces of preregistered posture information at the time of registration of the user. |
US08856037B2 |
Method for showcasing a built-up structure and an apparatus enabling the aforementioned method
There is provided a method for showcasing a built-up structure with at least one room. It is advantageous that the user is able to view the interior of the built-up structure by accessing and navigating about a single panoramic image for each room. An apparatus enabling the method and a method of using a work product of the method for showcasing a built-up structure with at least one room is also provided. |
US08856035B2 |
Store system and sales registration method
According to one embodiment, a store system includes: an image output section configured to output an image picked up by an image pickup section; an object recognizing section configured to recognize a specific object by reading a feature value of the output image; a check-image display section configured to display, on a display section, at least an image concerning the recognized object; and a problem solving section configured to receive, when there is a problem in the recognition of the object, an instruction indicating the problem and solve the problem according to content of the received instruction. |
US08856031B1 |
Systems and methods for obtaining and using targeted insights within a digital content and information sharing system
A system for obtaining insight information for a plurality of client applications and a plurality of mobile users, comprises a content management system module configured to distribute a plurality of types of content to the plurality of mobile users, wherein at least one of the content and types of content differs for each of the plurality of client applications; an insights module configured to allow a client associated with a specific client application to define one or more locations and select a target vertical, select an insights algorithm based in the target vertical, identify the status of the plurality of users relative to the defined locations, and cause the content management system module to distribute certain types of content to the plurality of users based on the status; and a data warehouse configured to store the status information for each of the plurality of client applications and associated users. |
US08856030B2 |
Method, system and software for associating attributes within digital media presentations
Disclosed are a system, method and software to associate attributes with digital media assets. Digital media contains specific assets, such as images, that can be replaced with other assets. The system, method and software permit the association of attributes with specific assets. The association of attributes and assets enables the provision of content that is enhanced and more impacting for a user. |
US08856029B1 |
Systems and methods for regulating the receipt of data transmitted from a messaging device
A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a blocking application is initialized. At least one setting for the blocking application is initialized. Incoming data transmitted from the messaging device are detected. At least a portion of the incoming data is blocked based on the initialized at least one setting for the blocking application. |
US08856027B2 |
System and method for slow ad detection
A system and method for slow ad detection is provided. An ad tool receives information including round trip times to load web pages, in which each web page is loaded with at least one ad. Additionally, the ad tools calculates, for each ad, a mean round trip time to load each web page loaded with the respective ad. The ad tool then determines a predetermined number of the ads with highest mean round trip to load each of the web pages with the ad. Further, the ad tool enables testing of each of the predetermined number of ads to determine the round trip load time of each of the predetermined number of ads. |
US08856022B1 |
Parameter normalization for improved cache hit rate
A normalized caching system may receive a data request from a requestor, the request associated with a requested service. The normalized caching system may generate a normalized request by modifying one or more parameters of the request. A normalized response is typically useful for servicing a wider range of subsequent requests than is a non-normalized response. The system may then check whether an entry is cached for the normalized request. If no cached entry is found, the normalized request may be submitted to the requested service, and response received in return. The normalized response may be cached using the normalized request. The response may be denormalized in order to generate a response which is provided to the requestor. When a subsequent request is received, if that subsequent request normalizes to the same normalized request, it may be fulfilled using the response stored in cache, rather than using the requested service. |
US08856020B2 |
Method for optimizing the consumption of a telecommunications service
The invention relates to a method for optimizing the consumption of telecommunications services in user groups. The method allows analyzing in real time the effectiveness of the multiple attributes of the commercial products associated with telecommunication services offered on a telecommunications network without excess calculations having to be generated, and at the same automatically acting accordingly on those attributes, optimizing the objective functions established by the telecommunications operator in the shortest possible time. |
US08856016B1 |
Methods and systems for providing life insurance
Life insurance methods, systems and products are provided that incorporate a fixed account, a separate account, and under specified circumstances a death benefit. One embodiment of a method for providing life insurance policy includes: providing a fixed account for receiving a portion of premiums allocated to the fixed account and providing a separate account for receiving a portion of premiums allocated to the separate account. The separate account allows a policy owner to manage investments in a plurality of investment options. If the policy meets a safety test, the method guarantees the death benefit without withdrawing more than a specified percentage of specified charges from the separate account to fund the guaranteed death benefit. |
US08856014B2 |
Methods and apparatuses for delivery of advice to mobile/wireless devices
Methods and apparatuses to connect consumers to diverse advice sources of experts. In one embodiment, a method includes: providing a list of experts to a mobile device via a wireless media channel for presentation to a consumer; responsive to receiving from the mobile device a selection of one expert from the list of experts, initiating a telephonic connection between the expert and the consumer prior to the consumer submitting a question for advice. In one example, the list includes information to indicate whether one or more of the experts are individually available to telephonically communicate with the consumer at a time when the list is provided to the consumer. In one example, initiating the telephonic connection includes: initiating a first call to the consumer; initiating a second call to the expert; and joining the first and second calls to make the telephonic connection between the expert and the consumer. |
US08856012B2 |
Apparatus and method of encoding and decoding signals
A method of encoding an audio signal, where signals including two or more channel signals are downmixed to a mono signal, the mono signal is divided into a low-frequency signal and a high-frequency signal, the low-frequency signal is encoded through algebraic code excited linear prediction (ACELP) or transform coded excitation (TCX), and the high-frequency signal is encoded using the low-frequency signal. A method of decoding of an audio signal, a low-frequency signal encoded through ACELP or TCX is decoded, a high-frequency signal is decoded using the low-frequency signal, the low-frequency signal and the high-frequency signal are combined to generate a mono signal, and the mono signal is upmixed by decoding spatial parameters regarding signals including two or more channel signals. |
US08856009B2 |
Multi-participant, mixed-initiative voice interaction system
A voice interaction system includes one or more independent, concurrent state charts, which are used to model the behavior of each of a plurality of participants. The model simplifies the notation and provide a clear description of the interactions between multiple participants. These state charts capture the flow of voice prompts, the impact of externally initiated events and voice commands, and capture the progress of audio through each prompt. This system enables a method to prioritize conflicting and concurrent events leveraging historical patterns and the progress of in-progress prompts. |
US08856002B2 |
Distance metrics for universal pattern processing tasks
A universal pattern processing system receives input data and produces output patterns that are best associated with said data. The system uses input means receiving and processing input data, a universal pattern decoder means transforming models using the input data and associating output patterns with original models that are changed least during transforming, and output means outputting best associated patterns chosen by a pattern decoder means. |
US08855998B2 |
Parsing culturally diverse names
Provided are techniques for parsing a name. A name to be parsed is received. A culture of the name is identified. One or more name phrases from the name are identified. Statistics for the one or more name phrases are identified. It is determined whether to perform a first parsing technique that parses different types of name elements within at least one field of the name. In response to determining that the first parsing technique is to be performed, the name is parsed using the statistics and the first parsing technique. In response to determining that the first parsing technique is not to be performed, the name is parsed using the statistics and a second parsing technique. |
US08855996B1 |
Communication network enabled system and method for translating a plurality of information send over a communication network
Disclosed communication network enabled system and method for connecting pluralities of users for translating information sent over a communication network comprising a mobile application installed in a portable mobile communication device for receiving the information from the users. A first time user can specify input language and the desired translated output language into the mobile application. The translation request notification information is routed and sent to top tier users selected from a ranked list by a server as a push notification. The first one to respond is connected to the user. The translator can set the frequency of translation requests and can charge for each translation. After the translation is completed the user can rate the translator which will help the translator to get new requests. Too many bad reports about the translation of a user will get that user blocked. |
US08855995B1 |
Consensus translations from multiple machine translation systems
Systems, methods, and apparatuses including computer program products for machine translation. A method is provided that includes generating a plurality of machine translation systems using a single machine translation engine, and generating a consensus translation from a plurality of candidate translations for a source sentence, where each candidate translation of the plurality of candidate translations is an output of a respective machine translation system of the plurality of machine translation systems. |
US08855994B2 |
Method to simulate a digital system
A simulator is partitioned into a functional component and a behavior prediction component and the components are executed in parallel. The execution path of the functional component is used to drive the behavior prediction component and the behavior prediction component changes the execution path of the functional component. |
US08855993B2 |
Integrated circuit design simulation matrix interpolation
Methods and systems perform a simulation on an integrated circuit design by applying a first value to a first variable and a second value to a second variable of the simulation to produce a first matrix corner simulation value. The methods and systems repeat the simulation using different values for the first and said second variables to produce a second matrix corner simulation value, a third matrix corner simulation value, and a fourth matrix corner simulation value. The methods and systems create a matrix, and the matrix has the first matrix corner simulation value, the second matrix corner simulation value, the third matrix corner simulation value, and the fourth matrix corner simulation value. The methods and systems interpolate all remaining values within the matrix based upon existing simulation values within the matrix. |
US08855988B2 |
Method and systems of determining viable hydraulic fracture scenarios
Determining viable hydraulic fracture scenarios. At least some of the illustrative embodiments include: executing a fracture planning program, and determining a set of schedules from the fracture planning program, each schedule comprising a volume of fracture fluid, amount of proppant, and flow rate of the fracture fluid; providing each schedule of the set of schedules to a stress analysis program, executing the stress analysis program, and determining a set of indications from the stress analysis program, each indication indicative of whether a respect schedule exceeds engineering limits of a tubing string; and providing at least some of the schedules to a fracture simulation program, executing the fracture simulation program, and determining a set of fracture geometries from the fracture simulation program, each fracture geometry corresponding to a respective schedule. |
US08855979B2 |
Process for producing sandwich structures with particulate material pattern
The present invention is concerned with a process for forming a very well defined pattern of particulate material in a composite material comprising a web material and particulate absorbent material. The present invention relates also to a method for determining the equipment design and process parameter for such a process. In a particular application, the present invention provides a process for preparing liquid absorbent structures, such as may be useful for disposable absorbent articles. |
US08855974B2 |
System and method for recommending sensitive make-up based on skin tone of user
A system for recommending a sensitive make-up based on skin tone of a user, includes an avatar creator for creating an avatar image using skin information obtained by scanning user's body. Further, the sensitive make-up recommending system includes a cosmetics information processor for generating analysis information by analyzing a plurality of cosmetics and then storing the generated information in a database. Furthermore, the sensitive make-up recommending system includes a simulator for displaying results of performing a make-up simulation to the avatar image based on the analysis information on certain cosmetics selected by the user and the skin information. |
US08855973B2 |
Determining a next value of a parameter for system simulation
An embodiment of an apparatus includes a simulator and a determiner. The a simulator is configured to simulate a system and to propagate at least one state of the simulated system through time in response to a value of a parameter, and the determiner is configured to determine a next value of the parameter in response to a characteristic of another state of the model and a representation of at least one level set. |
US08855972B2 |
Manufacture of heat trace cable, design, installation, and management, and method thereof
The manufacture and installation of heat trace systems, particularly cables, are controlled from comprehensive controls in the design and management of the heat trace systems. |
US08855971B2 |
Tools for system-level design environments
A remote auxiliary tool is created in a graphical model having at least one of a signal or a block. The remote auxiliary tool is non-intrusively attached to one of the signal or the block. The graphical model and the remote auxiliary tool are executed synchronously. At least one of an execution result or a remote auxiliary tool result is output to at least one of a display device, a storage device or a destination device. |
US08855970B2 |
System and methods for precise microprocessor event counting
Method for providing precise microprocessor performance counter readings including detecting a swap back to a monitored process executing in a microprocessor. In response to the detected swap back to the monitored process, if the value read from the performance counter does not exceed the defined overflow threshold, the value of the performance counter stored in the first memory location is restored to the performance counter. If the value read from the performance counter exceeds the defined overflow threshold, the performance counter is set to zero and the value of the performance counter stored in the first memory location is used to increment an overflow memory location. If the value read from the performance counter exceeds the defined overflow threshold, at least one performance counter reading instruction is detected and in response to the detected at least one performance counter reading instruction, setting the counter output register to zero. |
US08855967B1 |
Surface data measurement system and method
A surface measurement apparatus having at least one sensor and a reference point with pre-determined relative position relative to the sensor measures a distance between the sensor and a point on a surface over which the surface measurement apparatus is configured to travel. A receiver receives data related to a position of the reference point a calculated distance between the reference point and a position measurement station; and a processor calculates an absolute position of the point on the surface based on (a) the measured distance between the at least one sensor and the point, (b) the pre-determined relative position difference between the reference point and the at least one sensor, and (c) the position of the reference point or the calculated distance between the position measurement station and the reference point. |
US08855963B2 |
Discovering thermal relationships in data processing environments
A system, and computer usable program product for discovering thermal relationships in a data processing environment are provided in the illustrative embodiments. An output temperature of a cooling unit operating in the data processing environment is changed from a previous output temperature to a new output temperature. The difference between the previous and the new output temperatures is a change in the output temperature. A change in an ambient temperature proximate to a data processing system is measured. The change in the ambient temperature is a difference between a previous ambient temperature and a new ambient temperature. An expression that represents a relationship between the change in the output temperature and corresponding change in the ambient temperature is determined. The expression is used to determine a cooling correspondence between the cooling unit and the data processing system. |
US08855958B2 |
Method for determining at least one characteristic for the correction of measurements of a coriolis mass flowmeter
A method for determining at least one characteristic for the correction of measurements of a Coriolis mass flowmeter which is characterized by an increased accuracy and a low error rate while determining the characteristic is implemented by detecting values of a measurand during constant flow with the reading sensors, calculating at least one location parameter from the detected values, an calculating at least one dispersion parameter from the detected values and the location parameter. The detection of additional values and the calculation of the location parameter and dispersion parameter from the existing and additional values is carried out until the dispersion parameter reaches a threshold value, and then, the location parameter corresponding to the dispersion parameter is used as the characteristic for the correction of the reading of the Coriolis mass flowmeter. |
US08855956B2 |
Method and system for determining state of charge of an energy delivery device
A method of determining state of charge of an energy delivery device includes sampling voltage values of the energy delivery device during relaxation of the device. The method further includes regressing an open circuit voltage value and the total overpotential being relaxed. The regression includes a predetermined time constant of relaxation associated with the energy delivery device. One embodiment uses the equation V(t)=OCV−α exp(−t/tau), where V(t) represents the sampled voltage values, t represents times at which each of the voltage values are sampled, OCV represents the open circuit voltage value of the energy delivery device, αrepresents the overpotential value, and tau represents the time constant of relaxation. The method uses a predetermined profile that relates open circuit voltage of the energy delivery device to state of charge of the device, to determine a particular state of charge corresponding to the regressed open circuit voltage value. |
US08855954B1 |
System and method for prognosticating capacity life and cycle life of a battery asset
Path classification and estimation method and system used in combination with a computer and memory for prognosticating the remaining useful life of an in-service battery asset by classifying a present degradation path of the in-service battery asset as belonging to one or more of previously collected degradation paths of one or more exemplary battery assets and using the resulting classifications to estimate the remaining useful life of the in-service battery asset thereby transforming raw data inputs into actionable state-of-health outputs. |
US08855950B2 |
Interprocessor communication measurement system
An interprocessor communication measurement system for an information processing apparatus having a plurality of processors which may send data to the other processors through a plurality of communication channels, includes a socket which is connected with communication channels and electrically connects a processor attached thereto with the communication channels, a measurement node which is attached to the socket in place of the processor and electrically connected with the communication channels, wherein the measurement node includes a routing unit configured to send data destined for any one of the other processors to the one of the other processors through the communication channels and an intercepting unit configured to intercept data sent through the routing unit, and a storing unit configured to store data intercepted by the intercepting unit of the measurement node. |
US08855941B2 |
Method for examining prognosis of breast cancer
Disclosed is a method for examining prognosis of breast cancer including the steps of: (A) extracting RNA from a specimen collected from a subject, (B) preparing a determination sample using the extracted RNA, (C) determining the expression level of each gene in the specific gene groups using the obtained determination sample, (D) analyzing the expression level of the determined each gene, and (E) examining prognosis of breast cancer, based on the obtained analysis result are performed. |
US08855939B2 |
System, method, and computer product for exon array analysis
In one embodiment, a method for analyzing data generated by probe arrays is described that comprises receiving user selections of two or more data files and an identification of one or more subsets of intensity values acquired from a biological probe array. The method includes iteratively opening each data file, identifying the selected subset of intensity values associated with each open data file, determining parameters for processing, storing the parameters and the identified intensity values, and closing the open data file prior to the subsequent iteration. The method then includes processing the stored intensity values using the parameters to identify one or more biological events. |
US08855937B2 |
Crop characteristic estimation
A system for estimating a crop characteristic comprises a database, a plant growth model correlator, and a crop characteristic estimator. The database includes plant growth models for a plurality of fields. The plant growth model correlator is communicatively coupled with the database. The plant growth model correlator is configured for determining at least one harvested field with a first plant growth model which correlates with a second plant growth model for at least a portion of an unharvested field. The crop characteristic estimator is configured for estimating a crop characteristic for the unharvested field based on actual crop characteristic data obtained from the at least one harvested field. |
US08855933B2 |
Systems and methods for determining the moments and forces of two concentric pipes within a wellbore
Systems and methods for determining the bending moment and shear force of tubing and casing when the tubing buckles and contacts the casing. |
US08855929B2 |
Using object to align and calibrate inertial navigation system
The initialization of an inertial navigation system is performed using information obtained from an image of an object. Positional and orientational information about the object in a global reference frame and positional and orientational information about the camera relative to the object are obtained from the image. Positional and orientational information for the camera in the global reference frame is determined along with a transformation matrix between inertial sensor reference frame and a navigation coordinate frame. The inertial navigation system is initialized using the positional and orientational information for the camera, the transformation matrix and the velocity of the camera when the object was imaged, i.e., zero. Using the initialized data with measurements from the inertial sensors the position of the mobile platform may be updated during navigation and provided, e.g., on a digital map. Inertial navigation errors may be corrected using information obtained from images of different objects. |
US08855928B2 |
Positioning apparatus judging movement method to control positioning timing
A positioning apparatus includes: a first measuring section to directly measuring its own present position; a second measuring section to measure an azimuth and a movement of a user; a movement method judging section to judge a movement method of the user based on the measurement result by the second measuring section; an azimuth specifying section to specify a movement azimuth of the user based on the measurement result by the second measuring section; a movement speed calculating section to calculate an average movement speed in a period where the movement method of the user is judged to be a movement state by car; and a position calculating section to obtain a movement position by integrating a movement distance into the specified movement azimuth at the average movement speed to reference position information obtained by the first measuring section when the user is in the movement state by car. |
US08855925B2 |
Adaptable navigation device
The described method and system provide for adaptable GPS navigation based on road and traffic conditions. A method includes: receiving input front a user designating a destination; determining a calculated route from a starting point to the destination; and presenting turn-by-turn (TBT) directions based on the route, wherein the presenting of the TBT directions includes presenting conditions information received from an external source. The conditions information can be used during route calculation and can be updated while the user is traveling on the calculated route. |
US08855924B2 |
Scheduling system, method, and program
A scheduling system includes: link creation means for creating a link as a partial route obtained by dividing the traveling route of a moving body indicated by traveling plan data; link adjustment range calculating means for calculating, for each link, a link adjustment range as an adjustment range of a scheduled pass-through time of the moving body not to cause the moving body to have a near-miss with another moving body; and adjusted traveling plan deciding means for deciding on adjusted traveling plan data indicative of a traveling plan of the moving body after adjusted by using link adjustment ranges of all links constructing the traveling route. |
US08855921B2 |
Method and apparatus for transit mapping
A method, apparatus and computer program products are provided for collecting and analyzing route to determine the routes of a transit system. One example method includes receiving GPS data from a plurality of buses or uses from along a transit roué, the discreet GPS reports organized into a set, generating a plurality of clusters, each cluster is comprised of a first GPS point from a first set and one or more subsequent GPS points, each subsequent GPS point from a different set, and wherein each subsequent GPS point is located within a predetermined distance of the first GPS point. The clusters are then connected to form a route polylines. Outliers, inaccuracies, and/or route endpoints may be pruned to improve accuracy and efficiency of the method. The method may also order the aggregated clusters using spatial and temporal data of the GPS reports to improve accuracy. |
US08855920B2 |
Automatic assistance for route planning
A method is provided for automatically assisting the route planning between a starting point and a destination.At least one respective traffic route is ascertained between the starting point and the destination for different means of transport by a traffic route ascertainment unit. The at least one means of transport is associated with the respective traffic route.Emission information is ascertained by an emission ascertainment unit for each traffic route on the basis of the means of transport which are associated therewith and on the basis of the traffic route length of the respective traffic route.The route planning is assisted between starting point and destination on the basis of the emission information. |
US08855919B2 |
Navigation system with destination-centric en-route notification delivery mechanism and method of operation thereof
A method of operation of a navigation system includes: receiving an entry for a destination; identifying a category of interest for the destination; generating a route to the destination; recognizing a traveling context for traveling along the route to the destination; and generating an en-route notification based on matching a delivery profile to the category of interest for traveling within the traveling context for displaying on a device. |
US08855913B2 |
Apparatus for planning trips combination, method for the same, and program for the same
A drive management system proposes a trips combination, such as a combination of two regular trips and/or a side trip from an ongoing trip. A trips database stores a plurality of trips including regular trips. A regular trips combination proposing module automatically creates a trips combination of regular trips and proposes the trips combination to a user. The real-time trips combination proposing module finds out a trip combinable with an ongoing trip based on short-term needs which are retrieved from the trips database and proposes the trips combination to a user. The system proposes the trips combination and shows an impact which will be caused by the proposed trips combination. As a result, it is possible to support a user to plan a trips combination advantageous in some aspect. |
US08855910B2 |
Moving body anti-collision device and moving body with the same
A moving body anti-collision device is disclosed that is able to accurately determine a relative position between moving bodies in a small area and efficiently prevent collisions between moving bodies. The moving body anti-collision device includes a transmission unit that transmits a detection wave, a driving unit that generates a driving signal to drive the transmission unit, a receiving unit that receives a detection wave sent from a transmission unit on other moving body, a calculation unit that calculates a relative position of the moving body relative to the other moving body according to an intensity of the detection wave sent from the other moving body and received by the receiving unit, and a collision determining unit that determines, according to a calculation result given by the calculating unit, whether the moving body collide with the other moving body. |
US08855892B2 |
Control device for internal combustion engine
The present invention relates to a control device for an internal combustion engine including a first control subject (35D) capable of controlling two different control amounts (Pim and Regr) influencing each other at a low frequency and second control subjects (52 and 33) capable of controlling the control amount at a high frequency. In the present invention, the first control amount and the second control amount are changed by the first control subject, and the first control amount and the second control amount are changed by the second control subject. Further, in the present invention, an operation amount (Mv) is input to the first control subject so that a first control amount deviation component (ΔPimL) with respect to a target value changing at a low frequency and a second control amount deviation component (ΔRegrL) with respect to the target value become zero, and operation amounts (Megr and Mth) are input to the second control subject so that a first control amount deviation component (ΔPimH) with respect to a target value changing at a high frequency and a second control amount deviation component (ΔRegrH) with respect to the target value become zero. |
US08855890B2 |
Engine synchronizer
Engine synchronization apparatus and system for multi-engine vehicles such as boats and aircraft providing limited authority throttle cable trim effected by an apparatus interposed between the throttle plate and throttle cable of a slave engine and mounted in a floating configuration. An actuator is mounted to the apparatus to trim the distance between the throttle plate and throttle cable attachment thereby trimming the throttle cable. A system is provided in which a difference signal derived from master and slave engine tachometer signals is used to control the actuator and synchronize the engines within a predetermined range. |
US08855889B2 |
Method for regulating the rail pressure in a common rail injection system of an internal combustion engine
A method for open-loop and closed-loop control of an internal combustion engine (1) in which the rail pressure (pCR) is controlled via a low pressure-side suction throttle (4), as the first pressure-adjusting element in a rail pressure control loop. A rail pressure disturbance variable (VDRV) is generated to influence the rail pressure (pCR) via a high-pressure side pressure control valve (12), as the second pressure-adjusting element, by which fuel is redirected from the rail (6) into the fuel tank (2). The position of the high-pressure side pressure control valve (12) is determined by a PWM signal (PWMDV), which, when normal mode is set, is calculated as a function of the resulting target volume flow and, when protective mode is set, is temporarily set to a maximum value. |
US08855887B2 |
Coasting control device
A coasting control device capable of avoiding coasting control during turning is provided. A turning recognition unit that recognizes that a vehicle is turning and a unit for prohibiting coasting control during turning that prohibits coasting control when the turning recognition unit recognizes that the vehicle is turning are provided. |
US08855878B2 |
System and method for controlling an accumulator based on vehicle conditions
A system and method for controlling an accumulator in a transmission of a motor vehicle includes the steps of determining whether the motor vehicle has been turned off, sensing at least one operating condition of the motor vehicle, and comparing the at least one operating condition to a reference condition. If the at least one operating condition of the motor vehicle fulfills the reference condition and if the motor vehicle has been turned off then the accumulator is discharged. |
US08855875B2 |
Pedal map shift
A method is provided for controlling a prime mover adapted to drive at least one ground engaging element of a working machine. The method includes receiving an operator control input indicative of the control of the prime mover and determining at least one operation signal in response to the operator control input, which operation signal is sent for controlling the prime mover. The method also includes receiving a operating state input indicative of an operating state of the machine and selecting a control mode from at least one speed control mode in which the determined operational signal comprises a desired speed of the prime mover and at least one torque control mode in which the determined operational signal comprises a desired torque of the prime mover in response to the operating state input. |
US08855870B2 |
Clutch control device for industrial vehicle
A clutch control device for an industrial vehicle includes: a braking force detection device that detects braking force of the industrial vehicle; a speed stage detection device that detects a set speed stage of a transmission; a clutch control device that controls engage/release of a forward clutch so that the forward clutch is released when a clutch cut off condition is judged to be satisfied based upon braking force of the industrial vehicle detected by the braking force detection device; and a switching device that automatically switches the clutch cut off condition in the clutch control device based upon a set speed stage of the transmission detected by the speed stage detection device. |
US08855868B2 |
Integrated vehicular system for low speed collision avoidance
A method of providing range measurements for use with a vehicle, the method comprising the steps of: a) visually sensing (2) the area adjacent the vehicle to produce visual sense data (22); b) range sensing (26) objects around the vehicle to produce range sense data; c) combining the visual sense data and the range sense data to produce, with respect to the vehicle, an estimate of ranges to the objects around the vehicle (28). The estimate of ranges to the objects around the vehicle may be displayed (29) to a driver. |
US08855863B2 |
Vehicle steering apparatus
A vehicle steering apparatus is an apparatus, mounted on a vehicle, for setting a target steering reaction force to be applied to a steering wheel on the basis of a steering angle and a vehicle speed and for performing reaction force control to apply the target steering reaction force, the vehicle steering apparatus provided with: a setting device for setting the target steering reaction force such that the target steering reaction force is less than a predetermined base steering reaction force if the vehicle speed is less than or equal to a predetermined base vehicle speed. |
US08855853B2 |
Method and apparatus for data acquisition, data management, and report generation for tractor trailer subsystem testing and maintenance
Techniques for operating, testing, and generating a testing report for the electrical and air subsystems of a vehicular trailer, without the use of an associated truck tractor are disclosed. The system includes a portable testing unit with self-powered electrical and air subsystems which are interconnected to the corresponding subsystems of the vehicular trailer under test. The portable testing unit can be rolled about on a stand and functions as a mini-truck tractor, in the sense that it selectively provides electrical power and air to the VUT. The testing unit is controlled by a small, portable hand held radio frequency remote control that communicates test and data signals to a radio receiver in the portable testing unit. The system acquires testing data from both automatic and manual means from disparate sources. The system stores the testing data and automatically generates testing reports. The system manages the testing data and generated reports. |
US08855852B2 |
Method and system for monitoring a structure
A method and system of monitoring a structure, the method including: a) synchronously acquiring data comprising a plurality of operational parameters and at least one strain data, b) building a significant points dataset from the data acquired in step a), and c) modelling a relationship between the operational parameters and the strain data using the built significant points dataset to train a non-adaptive prediction functional supervised approximation method, wherein the step of building a significant points dataset comprises deletion of redundant information from the acquired data. The resultant models may be used to process structure real operation data in order to estimate the eventual crack initiation and crack growth on a set of predefined locations of the structure. |
US08855847B2 |
Intelligent navigation system
An intelligent navigation system navigates a motor vehicle according to real-time road conditions and maneuverability conditions. The intelligent navigation system predicts and corrects potential route deviations before they actually occur. The intelligent navigation system interacts with the maneuverability of a motor vehicle, such that it can navigate the motor vehicle with very little to no human intervention. The intelligent navigation system may embody a method comprising the steps of receiving, from an input device, destination information related to a destination to be reached by the motor vehicle; receiving, from a positioning device, initial location information related to an initial location of the motor vehicle; determining, using a processor, a task for maneuvering the motor vehicle from the initial location to the destination; and instructing, using the processor, a vehicle maneuver controller to implement the task. |
US08855843B2 |
Starting control device of electric vehicle
A socket receives charging voltage and auxiliary voltage of the main battery from an external power supply. A charging line Lch connects the charging voltage to the main battery. Auxiliary power supply lines connect the auxiliary voltage to a vehicle drive control unit. A main switch is provided on a constant line for inputting the output of an electric power converting unit to the vehicle drive control unit. The vehicle drive control unit includes an electric power converting unit starting unit started when the auxiliary voltage is applied to output a starting signal of the electric power converting unit, and means for maintaining the starting signal to charge the sub-battery with the electric power from the electric power converting unit when the voltage applied from the electric power converting unit through the main switch to the vehicle drive control unit is a predetermined value. |
US08855840B2 |
Method and system for more efficient operation of plug-in electric vehicles
The automobile may have an energy conversion unit, an energy storage unit, a user selection unit, a global positioning system, and a control unit. The automobile can operate in a default charging mode, which is either the charge depletion mode or the charge sustaining mode. Upon user input, the energy conversation unit and/or the energy storage unit can operate in an extended charging mode or a forced charging mode. In the extended charging mode, the state of charge is increased or decreased over a predetermined charging range. In the forced charging mode, the state of charge is increased until a predetermined charge limit is reached. The system and method can also use global positioning system signals to operate in the charge depletion mode, the charge sustaining mode, the extended charging mode, and/or the forced charging mode. |
US08855837B2 |
Altitude and acceleration command altitude hold algorithm for rotorcraft with large center of gravity range
A flight control system includes an Acceleration and Attitude Command/Velocity Hold mode (AACVH) algorithm which blends attitude commands with acceleration commands. This blending determines a trim attitude for a given rotorcraft flight condition. |
US08855835B2 |
Convoy travel apparatus
A convoy travel apparatus in a subject vehicle of a convoy transmits a convoy travel information, which includes the maximum allowable number and the currently-included number of vehicles in the convoy. The apparatus determines whether the subject vehicle is blocking a signal from a leader vehicle of the convoy in which the subject vehicle is traveling as a follower vehicle, where the signal being blocked by the subject vehicle may not reach a position of a rearmost vehicle in the convoy. When the subject vehicle is determined to be blocking the signal, the subject vehicle transmits the convoy travel information indicating that the subject vehicle as a leader vehicle (i.e., a representative leader vehicle) of the convoy, thereby enabling a newly-joining vehicle to receive the convoy travel information transmitted from the follower vehicle in the convoy. |
US08855832B2 |
Rate based power management device
The present invention is a power management device for connecting a power consuming device to a power source so that the device switches the connection on and off automatically based on the power rate (price per kilowatt-hour) obtained from the power supplier. The user may specify a power usage specification, such as a maximum power rate that the user is willing to pay, and then the device disconnects the power from the power consuming device whenever the power rate is greater than the maximum power rate, and turns it on again when the power rate becomes less than or equal to the maximum power rate. The device includes a programmable controller, wireless and ethernet interfaces and can also act as a wireless access point. |
US08855827B2 |
System and method of controlling operation of a liquid diffusion appliance
A method of controlling operation of a diffusion appliance to treat the atmosphere within an enclosed space. The method may include programming the operation of the appliance according to a control scheme specifying a flow rate of liquid to a diffusion means and a periodic operation of the diffusion means. Control schemes may be associated with different volumes of spaces to be treated by the appliance, the rate of decay of the liquid within the space to be treated and the level of concentration of the liquid desired within the space. |
US08855824B2 |
Dual arm robot
The dual arm robot includes a first arm including a first hand, a first visual sensor and a first force sensor, and a second arm including a second hand, a second visual sensor and a second force sensor, uses each visual sensor to detect positions of a lens barrel and a fixed barrel to hold and convey them to a central assembling area, uses the first visual sensor to measure a position of a flexible printed circuits to insert the flexible printed circuits into the fixed barrel, and uses outputs of the force sensors to fit and assemble the fixed barrel onto the lens barrel under force control. The dual arm robot converts a position coordinate of a workpiece detected by each visual sensor to a robot coordinate to calculate a trajectory of each hand and drive each arm, to thereby realize cooperative operation of the two arms. |
US08855822B2 |
Robotic surgical system with mechanomyography feedback
A robotic surgical system for performing a surgical procedure within the body of a subject includes an elongate surgical instrument, a robotic controller configured to control the motion of the distal end portion of the surgical instrument, and a mechanomyography feedback system in communication with the robotic controller. The mechanomyography feedback system includes a mechanical sensor configured to monitor a physical motion of a muscle and to provide a mechanomyography signal corresponding to the monitored physical motion. Additionally, the feedback system includes a processor configured to receive the mechanomyography signal, to determine if the received signal is indicative of an induced muscle response, and to provide a control signal to the robotic controller if an induced muscle response is detected. |
US08855811B1 |
Pharmacy workflow management system including plural counters
A pharmacy workflow management system including plural counters and a pharmacy workflow management method. In embodiments, the system includes a housing, a first automatic object counter and a cassette dispenser which feeds objects from a cassette mounted thereto to the first object counter. A second object counter counts objects fed from a cassette mounted to the cassette dispenser. A data processing platform within the housing is programmed with instructions that enable the system to compare the counts from the first and second object counters. The data processing platform also provides for management of pharmacy workflow by providing improved control of prescription fulfillment. |
US08855810B2 |
Apparatus and method for transferring gloves
The present invention relates to an apparatus for transferring a glove (100) from a conveyor (200) characterized by: a camera (10); a pick-up assembly (20) comprising a pair of inner grippers (21) and two pairs of outer grippers (22); a pair of sensors (30); a robotic arm (40) mounted with the pick-up assembly (20); a processor. The present invention also relates to a method for transferring a glove (100) from a conveyor (200), characterized by the steps of: locating a cuff (101) of the glove (100) on the conveyor (200) by capturing an image on the conveyor with a camera (10) and analyzing the image with a processor; using a robotic arm (40) to move a pick-up assembly (20) to the located cuff (101); gripping the cuff (101) with a pair of inner grippers (21) of the pick-up assembly (20) and lifting the glove (100) by retracting the pair of inner grippers (21); detecting the glove (100) position by using a pair of sensors (30); opening the glove (100) by grabbing and sliding apart the two pairs of outer grippers (22); shifting the glove (100) towards a workstation (300) by using the robotic arm (40); transferring the glove (100) to the workstation (300) by engaging the glove (100) to the workstation (300). |
US08855807B2 |
Computer program products for packaging machines suitable for packaging whole muscle
Computer program products automatically package an object, such as, for example, whole muscle meat pieces, in a covering material, such as, for example, netting using actuators for operating barrier doors, pushers, and locks. |
US08855805B2 |
Conveyance vehicle system
A conveyance vehicle system that achieves an increased efficiency of loading an article from a conveyance vehicle into a loading opening of an automated warehouse, includes a stocker, a conveyance vehicle, and a conveyance vehicle controller. The stocker includes racks, a loading port, and a stocker controller. The conveyance vehicle loads an article into the loading port of the stocker. The conveyance vehicle controller assigns the conveyance vehicle with an article conveyance command to convey the article to the stocker. The stocker controller receives a predicted conveyance command before the article is loaded from the conveyance vehicle into the stocker. The predicted conveyance command includes ID information of the article and information indicating whether or not the article is to be loaded into a rack. |
US08855804B2 |
Controlling a discrete-type manufacturing process with a multivariate model
Described are methods, systems, and a computer-readable storage medium for controlling a discrete-type manufacturing process (e.g., an injection molding process) with a multivariate model. Data representing process parameters, operating parameters, or both of the manufacturing process are received. The received data is compared with a multivariate model that approximates the manufacturing process to provide a result. Upon the result of the comparing satisfying a condition, one or more values for a set of operating parameters for the manufacturing process are determined. When the one or more determined values for the set of operating parameters satisfies a criterion, at least one operating parameter of the manufacturing process is updated. |
US08855801B2 |
Automated integration of feedback from field failure to order configurator for dynamic optimization of manufacturing test processes
The present invention addresses the deficiencies of the art in respect to the manufacturing test processes and provides a novel and non-obvious method, system and apparatus for dynamic optimization of manufacturing test coverage with automated integration of field failure feedback with the order configurator. In one embodiment of the invention, a manufacturing field failure feedback method can be provided. The method can include retrieving field failure data, analyzing the field failure data, storing failure analysis object information, modifying a manufacturing test case selection within the test case selection and order configurator based on using field failure data analysis, the test case selection including rules for test case selection and test case object information, and configuring a testing order with an optimized test case selection. |
US08855799B2 |
Automated mass production method and system thereof
An exemplary embodiment of the present disclosure illustrates an automated mass production method, adapted for an automated mass production system in manufacturing at least an electronic device having a storage unit, the method includes steps of: determining a protocol type of the Auto Handler to select one of the agents; establishing a first communication protocol communication between the MP tool module and the selected agent; establishing a second communication protocol communication between the selected agent and the Auto Handler; the Auto Handler outputting a processing command to the selected agent; the selected agent converting the processing command into a MP tool module executable MP tool instruction; and the selected agent outputting the corresponding MP tool instruction to the MP tool module so as to have the MP tool module executed the MP tool instruction to automatically perform a corresponding mass production process to the electronic device. |
US08855789B2 |
Implantable biostimulator delivery system
A delivery system for implanting a biostimulation device comprising a stylet extending along an axis from knob end to a threaded end configured to engage an internally threaded nut of the biostimulation device and a catheter tube configured to axially contain the stylet. The catheter tube comprises a feature that engages a corresponding feature on the biostimulation device whereby the stylet can be rotated relative to the catheter tube for disengagement of the stylet threaded end from the biostimulation device threaded end. |
US08855788B2 |
MRI compatible electrode circuit
An MRI compatible electrode circuit construct is provided. The construct includes at least two filter components constructed from an electrode wire. One filter component may be a resonant LC filter at or near an electrode/wire interface that resolves the issue of insufficient attenuation by effectively blocking the RF induced current on the wire from exiting the wire through the electrode. The second filter component may include one or more non-resonant filter(s) positioned along the length of the electrode wire that resolve(s) the issue of excessive heating of the resonant LC filter by significantly attenuating the current induced on the wire before it reaches the resonant LC filter. The non-resonant filter(s) may also attenuate the RF current reflected from the resonant LC filter thereby resolving the issue of the strong reflected power from the resonant filter and the associated dielectric heating. |
US08855784B2 |
Implantable medical device including controllably isolated housing
An implantable medical device or some other ambulatory medical device, such as a pacer, defibrillator, or other cardiac rhythm management device can include an electrical energy delivery circuit, such as including an integrated circuit comprising a first electrostimulation output terminal, a can terminal, and a switch control output. The ambulatory or implantable device can include at least two switches in series, each including a respective substrate electrically separate from the integrated circuit, and from each other, the switches configured to controllably isolate a conductive housing of the implantable medical device from the can terminal of the integrated circuit, such as in response to the switch control output. |
US08855781B2 |
Remotely programmable personal device and system and method for remote programming of a personal device
A remotely programmable personal device, in particular a programmable implantable medical device, e.g., a cardiac pacemaker, a defibrillator, a cardioverter or the like. A system for remote programming of such a personal medical device and a method for remote programming of a programmable personal device. |
US08855779B2 |
Methods of diagnosis and treatment of wounds, methods of screening for electrical markers for wounds prognosis in patients
Described herein are electrical markers, specifically alternate current (AC) signals whose appearance in patients with wounds, specifically chronic wounds, correlates to the prognosis of the wounds. Related methods that can be used for diagnosis and treatment of wounds are disclosed. Also described herein are methods that can be used to identify electrical signals of wounds. |
US08855774B2 |
Vestibular prosthesis
A vestibular prosthesis includes micro-electric-mechanical (MEMS) sensors, gyroscopes in each sensitivity axis (X, Y, Z), accelerometers in each sensitivity axis (X, Y, Z) to detect an angular and linear movement providing displacement measurements, gyroscopes in each one of the spatial axes (X, Y, Z), a microprocessor connected to the MEMS sensors and producing an electric pulse pattern or a continuous galvanic current pattern, a conditioning unit that amplifies and conditions the microprocessor output to apply current to the stimulation electrodes, the microcontroller being configured to determine the displacement of the cupula and the otolithic mass, determine a membrane potential as a result of a displacement detected by the MEMS sensors by means of determining a transduction current, and determine an action potential discharge pattern for the primary afferent neuron, which synapses with the hair cell by means of a mathematical model of the informative process of the vestibular mechanoreceptor. |
US08855771B2 |
Screening devices and methods for obstructive sleep apnea therapy
Devices and methods for treating obstructive sleep apnea by first performing an assessment of the patient that involves observing the patient's upper airway during a tongue protrusion maneuver. The assessment may, for example, be done using endoscopy to observe the upper airway while the patient is awake in the supine position. An adequate response of the upper airway during the tongue protrusion maneuver is indicative of likely therapeutic success with hypoglossal nerve stimulation, and may be used for making clinical decisions. The principles of the present invention may be applied to other therapeutic interventions for OSA involving the upper airway. |
US08855764B2 |
System and method for detecting atrial activity signal using a monobody lead in a single chamber implantable cardioverter/defibrillator
A single-chamber implantable device for detecting a patient's atrial activity using a monobody lead is disclosed. The monobody lead (10) includes a ventricular coil (16), a supraventricular coil (18), a distal electrode (14) forming three electrodes for detecting depolarization signals. A generator (12) of the implantable device collects a first unipolar signal (20) between the ventricular coil and the generator housing and a second unipolar signal (22) between the supraventricular coil and the generator housing. An independent component analysis is performed to the detected depolarization signals to determine an estimated atrial activity signal from the first and second unipolar signals. |
US08855763B2 |
Method and apparatus for selecting and timing anti-tachyarrhythmia pacing using cardiac signal morphology
A cardiac rhythm management (CRM) system includes an implantable medical device that delivers anti-tachyarrhythmia therapies including ATP. When a tachyarrhythmia episode is detected, the implantable medical device analyzes the morphology of a cardiac signal to determine whether and/or when to deliver an ATP therapy. In various embodiments, the implantable medical device produces morphological parameters indicative of the likeliness of success of the ATP therapy and selects an anti-tachyarrhythmia therapy mode based on the morphological parameters. In various embodiments, the implantable medical device also controls the timing of the ATP therapy delivery using morphological features of the cardiac signal to maximize the probability that the ATP therapy is delivered into an ATP window during which a tachyarrhythmia episode can be effectively terminated by pacing. |
US08855760B2 |
Systems and methods for early detection of lead breaches using cross-lead impedances detected by an implantable medical device
Techniques are provided for use with an implantable medical device for detecting breaches in lead insulation or other lead failures. In one example, bipolar impedance is measured along single-lead vectors (i.e. intra-lead vectors) of a right atrial (RA) lead and a right ventricular (RV) leads. Impedance is also measured along various cross-lead vectors (i.e. inter-lead vectors) between electrodes of the two leads. A derived impedance value is then determined from a combination of the measured impedance values, wherein the derived impedance is sensitive to a shunt impedance arising from a breach within the RV lead. A lead breach is then detected relatively early based on the derived impedance by detecting a significant deviation in derived impedance over time. Unipolar impedance measurements are used to confirm the breach. |
US08855756B2 |
Methods and program products for providing heart rate information
Methods and program products for providing heart rate information are disclosed. In an embodiment, a method for providing heart rate information about a user includes the steps of defining a plurality of heart rate zones as ranges of percentages of a maximum heart rate of the user, determining upper and lower limits for said heart rate zones based on the maximum heart rate of the user, associating a color with each of said heart rate zones, receiving heart rate information from the user, and initiating a graphical display in response to receiving heart rate information from the user, wherein a color of a portion of the graphical display corresponds with the color associated with one of said heart rate zones. |
US08855755B2 |
Distinguishing between treatable and non-treatable heart rhythms
Techniques are described for distinguishing between treatable and non-treatable heart rhythms. A medical device that operates in accordance with the techniques analyzes characteristics over several cardiac event intervals to detect initiation of a sudden rate onset. After detection of the initiation of the sudden rate onset, the IMD analyzes a morphology of an EGM associated with a selected cardiac event within the first several beats after the initiation of sudden rate onset. In one example, the IMD analyzes the morphology of the EGM associated with the first cardiac event immediately subsequent to the initiation of the sudden rate onset. If the morphology of the EGM of the selected cardiac event is abnormal compared to template EGM, the rhythm is classified as treatable. Otherwise, the rhythm is classified as non-treatable. |
US08855752B2 |
QRS onset and offset detection with adaptive temporal windowing
A heart monitor computes ST segment deviation as the difference in the value of an electrocardiogram signal at the ST and PQ points of a heartbeat. The ST point is found based on slope criteria and temporal criteria. The maximum (positive) slope of the QRS (maxQRS) is located. Within a preset window after the maxQRS point, the processor searches for a sample at which the second finite difference is less than a threshold that is a function of average QRS amplitude. If such a qualifying sample is found, the processor examines its location relative to the location of an adaptive window that is centered on a sample that is an adaptively determined distance from the peak of the R wave. If the qualifying point is within the adaptive window, it is chosen as the ST point. If the qualifying point is after the adaptive window, the ST point is set at the end of the adaptive window. Finally, if the qualifying point is before the adaptive window, the ST point is selected at the beginning of the adaptive window. The adaptive window is then updated according to an exponential average filter based upon the distance between the ST point and the R wave peak. |
US08855738B2 |
Acoustically induced blood stasis and in vivo optical spectroscopy
Ultrasound-induced blood stasis has been observed for more than thirty years. Most of the literature has been focused on the health risks associated with this phenomenon and methods employed to prevent stasis from occurring during ultrasound imaging. To date, experimental observations have been either in vitro or invasive. The current work demonstrates ultrasound-induced blood stasis in murine tumor and nontumor tissue, observed through noninvasive measurements of optical spectroscopy, and discusses possible diagnostic uses for this previously undesirable effect of ultrasound. |
US08855737B2 |
System and method for electrically shielding a microelectrode array in a physiological pathway from electrical noise
A system and method for electrically shielding a physiological pathway from electrical noise is disclosed. The method includes the operation of implanting at least one signal microelectrode into a patient such that the signal microelectrode is proximate to the physiological pathway. An additional operation includes substantially enclosing the microelectrode and a section of the physiological pathway with an electrical shielding wrap. The electrical shielding wrap includes a plurality of holes that enable fluid communication of physiological fluids between an inside and outside of the wrap. |
US08855736B2 |
Safety transcutaneous electrode
Transcutaneous safety electrode assemblies are described that can include a conducting electrode having a sharp end to penetration of the skin of a patient, and a shielding member that is deployable by a user so as to shield the sharp end of the electrode after the electrode is removed from the skin. The shielding member can be deployed by retracting the sharp end of the electrode a protective housing, assisted by spring force provided by the electrode wire so as to self-retract into the protective housing. The deployment and disengagement can be via push button action, and the electrode assembly can be self-retaining on the patient's skin while deployed. |
US08855734B2 |
Medical sensor and technique for using the same
In an embodiment, a sensor may be adapted to provide information related to its position on a patient's tissue. The sensor may include tissue contact sensors which may relay a signal related to the proper placement of the sensor relative to the tissue of a patient. Such a sensor may be useful for providing information to a clinician regarding the location of the sensor in relation to the skin of a patient in order to provide improved measurements. |
US08855733B2 |
Substance component detection device
A substance component detection device includes a sensor substrate which is provided inside a concave groove, in which when an opening is closed by a measurement-target skin to form a closed space, and includes a projection group having a plurality of projections, a light source section which emits light toward the projection group, and light-receiving section which detects Raman scattering light generated by the projection group. |
US08855732B2 |
Non-invasive apparatus and method for measuring human metabolic conditions
In a non-invasive human metabolic condition measuring apparatus and method, a micro-light source emits an incident light having a wavelength from 329 nm to 473 nm to trigger a mitochondrial metabolite of a human mucosa tissue, and the metabolite is excited to generate a fluorescent signal having a wavelength from 405 nm to 572 nm, and the fluorescent signal is filtered by an optical filter, received by a micro receiver, and amplified by an amplification circuit sequentially, and then a filter circuit and an analog/digital conversion circuit of a microprocessing unit are provided for filtering and performing an analog/digital signal conversion respectively, so that the metabolite content can be calculated by the computation to provide human metabolic conditions, and a combination of micro components and circuits is used for miniaturizing the apparatus to provide a convenient carry of the apparatus. |
US08855730B2 |
Transmission and reception of high-speed wireless communication using a stacked array antenna
Methods of transmitting and receiving wireless signals using a compact antenna having an array of compactly arranged emitters/receivers. Wireless signals are transmitted from an antenna feed to the plurality of emitters/receivers in any appropriate band, such as the 5.15 to 5.85 GHz band and/or the 2.40-2.48 GHz band. The feed is connected to a radio connection point and from there may connect to the plurality of emitters/receivers arranged in a plane (or planes) above an antenna feed connecting the emitting elements to the radio connection point. The antenna feed is positioned between the emitters and a ground plane. Signals (e.g., horizontally and vertically polarized signals) may be emitted from the plurality of antenna radiating surfaces. Methods of manufacturing compact array antennas are also described. |
US08855728B2 |
Mobile equipment and sliding structure therefor
A sliding structure is for a mobile equipment which includes a second housing and a first housing slidably provided for the second housing. The sliding structure includes a display frame configured to accommodate a display unit of the first housing and having slide grooves provided for side walls parallel to a direction of the slide, and a slide support section provided along side walls of said second housing in parallel to the slide direction such that tip portions of said slide support section slidably engage with said slide grooves. Although having a simple mechanism, the mobile equipment has a small size and high strength, and can take a large stroke length. In this way, the sliding mechanism for the mobile equipment which has high stiffness and the mobile equipment can be provided in which a damage of the display unit can be prevented while maintaining the small size and a thin structure. |
US08855723B2 |
Temporal incoming communication notification management
Smart phone computer app. The method may include, if a number of an incoming phone call or incoming text message is not temporally allowed, not allowing for notification of the incoming phone call or incoming text according to a normal notification routine and generating a notification of the incoming call or incoming text according to a password-protected masked notification routine of the smart phone, wherein the password-protected masked notification routine of the smart phone includes adding an indication of the incoming phone call or incoming text message to a password-protected phone log or message log of the smart phone and precludes immediately displaying the incoming phone call or incoming text message information on a display of the smart phone, and further precludes adding an indication of the incoming phone call or incoming text message to a default phone log or message log of the smart phone. |
US08855722B2 |
Integrated handheld computing and telephony device
A method and apparatus for an organizer that may receive a cellular portion to form a cellular telephone is provided. An organizer comprises an organizer component, including a microphone. The organizer further includes an area for receiving an additional component. The area is designed to receive a cellular component, and a connection element is designed to mate the microphone in the organizer component with the cellular component, to use the organizer as a part of a cellular telephone. |
US08855717B2 |
Radio base station and radio network controller
A radio base station eNB according to the present invention is provided with: a generation unit 12 configured to generate “eNB DIRECT INFORMATION TRANSFER (a message for information transfer)” including an information element “Inter-system Information Transfer Type” to which either one of a first information element “RIM Transfer” including first radio information requested in GERAN and a first forwarding address destined for the GERAN, or a second information element “SON information transfer for E-UTRAN-UTRAN” including second radio information requested in UTRAN and a second forwarding address destined for the UTRAN can be set. |
US08855713B2 |
Device, network, server, and methods for providing service requests for wireless communication devices
A server stores personal information associated with a user of a wireless communication device. The server also receives from the wireless communication device an image of an item for sale and a price of the item, and appends the image and the price to include the user's email address and the delivery information. |
US08855702B2 |
Communication system for inter-cell coordination
System and methods for intercell coordination are provided. The system includes a macro terminal and a macro base station that allocate a radio resource for a sounding signal and determine a pattern of a sounding signal, in advance. The macro base station provides a femto base station included in the system with information about the pattern of the sounding signal, and the information about the radio resource of the sounding signal. The femto base station may receive the sounding signal from the macro terminal based on the information, and thus, the femto base station may determine whether the macro terminal exists and may determine a channel between the macro terminal and the femto base station. |
US08855694B2 |
Interference alignment scheme for use in communication network
A communication network applying an interference alignment scheme with a low or reduced complexity is provided. The communication network may include a plurality of transmit nodes and a plurality of receive nodes. A plurality of combinations of transmit-receive pairs may exist between the plurality of transmit nodes and the plurality of receive nodes. A communication apparatus for the communication network may select, from candidate combinations of transmit-receive pairs, a target combination to be applied with the interference alignment scheme. In particular, the communication apparatus may sequentially decrease a number of candidate combinations to select the target combination with a low complexity. |
US08855690B2 |
Messaging protocol/service switching methods and devices
Methods, devices, and computer readable media for switching communications from a first messaging protocol/service to a second messaging protocol/service by use of messaging information being embedded in a header of a first message of the first messaging protocol/service to enable the recipient to contact the sender over the second messaging protocol/service, is provided. |
US08855687B2 |
Cellular communication auto redial for dropped call
A device and method include detecting signal strength received at a mobile cellular communication device. A dropped call is detected between the device and another device as a function of detected signal strength. The dropped call is reconnected when detected signal strength reaches a selected first threshold. |
US08855685B2 |
Positioning with wireless local area networks and WLAN-aided global positioning systems
Accurate position capability can be quickly provided using a Wireless Local Area Network (WLAN). When associated with a WLAN, a wireless device can quickly determine its relative and/or coordinate position based on information provided by an access point in the WLAN. Before a wireless device disassociates with the access point, the WLAN can periodically provide time, location, and decoded GPS data to the wireless device. In this manner, the wireless device can significantly reduce the time to acquire the necessary GPS satellite data (i.e. on the order of seconds instead of minutes) to determine its coordinate position. |
US08855684B2 |
Providing information about relevant elements from maps history based on location
Techniques are disclosed herein that generally involve storing a historical record of a user's maps searches (a maps history), and providing a user with relevant information about elements in their maps history based on the location of a mobile device associated with the user. Such elements can include generic queries, specific queries, direction queries, click entries, places, and so forth. In some examples, the mobile device's location is provided to a server, which in turn processes the user's maps history to determine which elements from the maps history may be relevant to the mobile device's current location. Elements that are determined to be of possible relevance, and/or information relating thereto, can then be presented to the user, in many instances decreasing the time and effort required for the user to locate map-based information for which they are searching. |
US08855683B1 |
Providing information to a mobile device based on an event at a geographical location
A system, method, and computer readable medium for providing information to a mobile device based on an event comprising detecting an occurrence of the event, determining if the event is a specific event and if the event occurred at or near a geographical location and sending an alert of the event to at least one mobile device if the event is the specific event, if the event occurs at or near the geographical location, and if the at least one mobile device is located at or near the geographical location. |
US08855682B2 |
System for safe texting while driving
Systems and methods are described to allow safe texting with speech-text conversion for vehicle drivers, with provisions to prevent a user from defeating or bypassing the speech-text conversion. Some embodiments include a special software application in a driver's phone while other embodiments require only software changes at a service provider. If the velocity of a phone exceeds a disable threshold, it is assumed that the user may be texting while driving. That the user is a driver is then determined by one or more of multiple methods including registration. Conventional texting is then disabled for their phone and a safe texting capability is enabled instead. Where persons in the same vehicle utilize different service providers, parameters such as for instance cell phone position, velocity, and direction of travel are time stamped and passed between service providers or alternately made available to other service providers via a central database. |
US08855680B1 |
Computer system with proximity based selections
A location sensitive to do list on a computer that has location detection capability. The to do list has operations that are ordered by location, and by time of day, and where the priority is increased or decreased based on time of day. |
US08855679B2 |
Method and system for populating location-based information
Embodiments of the present invention disclose a method and system for populating location-based information on a portable electronic device. According to one embodiment, a request to create a memory record on the portable electronic device is received from a user. Based on the geographic location of the portable electronic device, relevant location information associated with a plurality of reference fields of the memory record are determined and displayed on the portable electronic device. |
US08855677B2 |
Nodes and methods for positioning
The present invention relates to a method in an LCS server of a wireless communication system, for positioning of an LCS target. The method comprises obtaining (510) information relating to a first predefined geographical area, wherein it has been determined that a probability that the LCS target is located within the first predefined geographical area is below a threshold. The method also comprises receiving (520) a request for a positioning of the LCS target, and using (530) the obtained information relating to the first predefined geographical area for the positioning of the LCS target. |
US08855676B2 |
Method and apparatus for providing satellite assistance data
Disclosed is a method for providing satellite assistance data to facilitate determination of the location of a mobile station, particularly for instance a mobile station served by a femtocell. When a positioning server receives a request for the location of a mobile station, the positioning server will determine from the request the mobile station is served by a femtocell and that the positioning server should query a femtocell server for seed data, or the positioning server may otherwise determine from the request that the positioning server should query the femtocell server for seed data. The seed data would preferably be geographic coordinates of a femtocell with which the mobile station is registered. The positioning server may then use that seed data to facilitate obtaining satellite assistance data from a base station almanac, and the positioning serve may provide the satellite assistance data to the mobile station to facilitate location determination. |
US08855675B2 |
Mobile phone network management systems
A system and methods for maintaining or optimising a mobile phone network by spatially correlating geolocated radio access network (RAN) performance measurement data and geolocated subscriber account data, which in embodiments provides additional technical information on the RAN performance. These data are integrated in a spatial data structure and provided with a spatial querying and data correlation system for identifying, and addressing problem areas of the RAN. |
US08855672B1 |
Key locator device
The key locator device integrates two forms of locating means therein so as to provide location-based services and/or paging means and alarms for locating the key locator device. The locating means include a GPS locating means and a cellular transceiver such that the location of the key locator device may be determined via GPS whereas a paging function in association with an audible alarm may be accomplished via the cellular transceiver. The key locator device includes a caller ID strip that illuminates to display a phone number when so paged. The GPS locating means may provide location-based data of the key locator device remotely via transceiver to a smart phone or computer. The key locator device may include a vibrating means and/or speaker to produce a vibratory and/or audible alarm when so paged. |
US08855670B2 |
Dynamic reconfiguration of regulation-compliance mode in cognitive radio networks
A method for dynamically reconfiguring a regulation-compliance mode of a device, belonging to a wireless network and operating under a network-operation mode (311, 321, 322) in a spectrum band with primary users. The method includes periodically determining at least one of: a primary protection capability of the device (501, 502, 704, 705), availability of enabling signal to the device (601, 701), and a frequency of location change of the device (508, 510, 711, 712); and based on the results of such determinations, operating and configuring transmission parameters of the device according to one of a plurality of regulation-compliance modes that are supported by the device. The wireless device includes: a signal transceiver (201) for processing, transmitting and receiving wireless signals from secondary devices; a primary signal sensing module (202) for detecting a primary signal; a spectrum manager (204) for selecting or deselecting an operating frequency channel; and a geolocation module for determining the location of the device. The wireless device may further include a network interface (203) for accessing a TV band database and a geolocation database. |
US08855668B2 |
Device specific tracking area identity lists
A method and system for providing a User Equipment (UE) (101) with a Tracking Area Identity (TAI) list during a Tracking Area Update (TAU) procedure. The TAI is UE specific and is based on a visitation history (305) of the UE (101). If a pre-existing visitation history of the UE does not exist, a TAI is compiled using other UEs featuring at least one operational similarity as the current UE (101). |
US08855667B2 |
Method and system for locating a notebook computer
A method for locating a notebook computer by sending a Wake on Wireless WAN (WoW) signal via a wireless network to the notebook computer to switch ON the notebook computer; instructing the notebook computer to determine its own location using GPS if the notebook computer lid is open. |
US08855666B2 |
Location registration processing method and mobile station
A location registration processing method according to the present invention includes steps of: starting, at a mobile station (UE), the location registration processing on the basis of predetermined system information, when acquiring the predetermined system information among a plurality of pieces of system information broadcasted by a radio base station (eNB), the predetermined system information including information necessary for performing the location registration processing; and acquiring the rest of the plurality of pieces of system information. |
US08855654B2 |
Methods, systems, and computer readable media for tracking and communicating long term evolution (LTE) handset communication capability
The subject matter described herein includes methods, systems and computer readable media for tracking and communicating LTE handset communication capability. One method includes maintaining, in a signaling message routing node, an LTE communication capability database. The database includes identifiers associated with LTE communication capable handsets. The method further includes, intercepting, at the signaling message routing node, a request for routing information. The method further includes, determining, by the signaling message routing node using the LTE communication capability database, whether a B party number associated with the request for routing information is associated with an LTE communication capable handset. In response to determining that the B party number is associated with an LTE communication capable handset, the method includes, responding, by the routing node, to the request for routing information with an identifier for a node in an LTE network for providing LTE service to the LTE capable handset. |
US08855647B2 |
Method for radio resource control connection reestablishment and terminal
The present invention relates to a method for radio resource control connection reestablishment and a terminal. After triggering the RRC connection reestablishment, the terminal searches for a cell used for RRC connection reestablishment to use the cell as a target cell, and receives an SIB1 message corresponding to the target cell; extracts first base station identification information from the SIB1 message, and compare the first base station identification information with second base station identification information saved by the terminal; if the two pieces of information are consistent, the terminal camps on the target cell and sends an RRC connection reestablishment request message to a base station to which the target cell belongs, so that the base station to which the target cell belongs performs the RRC connection reestablishment with the terminal. |
US08855645B2 |
Radio communication devices and cellular wide area radio base station
A radio communication device may include a cellular wide area radio communication technology circuit configured to provide a communication according to a cellular wide area radio communication technology; a circuit configured to provide a direct communication device to communication device communication; and a message generator configured to generate a message indicating a request for a handover from an established direct communication device to communication device communication connection with a second radio communication device to a cellular wide area radio communication connection with the second radio communication device. |
US08855644B2 |
Creating neighbour cell lists
A neighbor cell list is formed, for use in a basestation of a cellular communications network. For each of a plurality of neighbor cells, a value of a first component is assigned, depending on whether or not the basestation can detect signals transmitted from said neighbor cell. A value of a second component is assigned, depending on a history of successful or unsuccessful handover attempts to said neighbor cell. The values of the first and second components are combined to form a weighting parameter, for use in determining a handover priority to be given to said neighbor cell in the neighbor cell list. |
US08855641B2 |
Wireless communication device capable of efficient radio access technology measurements
A wireless communication device is disclosed that is capable of performing efficient measurements of secondary radio access technologies (RATs). The device includes multiple receiver chains. While operating in a first RAT, the device receives a measurement gap in order to perform measurements. Even though the measurement gap may be too small to adequately measure the other RAT, the device controls one of the receiver chains to measure the other RAT during a time period that overlaps with the measurement gap. In addition, when preparing for an inter-RAT handoff, the device controls one of the receiver chains to perform measurements regardless of whether a measurement gap has been received. In this manner, measurements of alternative RATs are efficiently performed, and handoff latency is significantly reduced. |
US08855639B2 |
Method of allocating CID for fast handover
A handover performing method and a method of allocating a connection identifier (CID) at the time of handover are disclosed. The method includes transmitting a handover request message to a serving base station, and receiving a handover response message including CID update information used in a target base station from the serving base station. At this time, the CID update information may include a transport CID (TCID) allocation start position and a TCID allocable value used in the target base station. Accordingly, it is possible to minimize service delay of a mobile station by providing a method of updating the CID of the mobile station for performing fast handover. |
US08855634B2 |
Method and arrangement for optimizing the operational times and cell exchange performance of mobile terminals
The invention at hand involves a method and an arrangement for optimizing the operational times and cell exchange performance of mobile terminals in a mobile communication network having adjacent radio cells. The mobile terminal temporarily stores network specific characteristics for adjacent radio cells which are not suitable for cell exchange when the mobile communication network is in operation and it uses said characteristics as decision criteria for cell exchange, and said information is used, in particular, to exclude said adjacent radio cells from additional radio technical measurements and identification methods. By implementing the terminal performance according to the inventive method, it is possible to significantly increase the operational times and the cell exchange performance of a mobile terminal in specific situations and to improve the service for a mobile radio customer. The inventive device can also be used for mobile terminals according to GSM or UMTS standard, and also for other radio network technology (for example, wireless LAN (W-LAN), cdma2000, WiMAX, WiBro, enhanced UTRAN, etc.). |
US08855631B2 |
Apparatus and method for measuring signal quality in a portable broadcasting network and system supporting the same
An apparatus and method for measuring signal quality information in a mobile broadcasting network are provided, as well as a system supporting the same. A broadcast server provides a reporting condition for signal quality to a mobile terminal using a control message. The mobile terminal, when it satisfies the reporting condition, transmits a reporting message for signal quality to a management server managing signal qualities. The reporting message includes signal quality measurement results at the current location. In this way, information on the low-signal quality area is automatically collected from the mobile terminal, making it possible to rapidly and easily comprehend the sate of the mobile broadcasting network depending on the collected information. |
US08855615B2 |
Short messaging service for extending customer service delivery channels
A computer implemented method, a computer program product, and a data processing system use short messaging service for extending customer service deliver channels. A message utilizing a short messaging service protocol is received from a sender. Responsive to receiving the message utilizing the short messaging service protocol, the message is parsed into a voice extensible markup language document. A virtual service request is then created from the voice extensible markup language document. Responsive to creating the virtual service request from the voice extensible markup language document, a service is requested from a message recipient, facilitated by using the virtual service request. A non-textual response is then provided to the message sender. |
US08855614B2 |
Retrieving contact information from multiple devices
A first device may be connected to a synchronization device to allow utilization of the first device through an interface of the synchronization device. The connection may be utilized to obtain contact information from the first device by the synchronization device. If it is determined that the contact information retrieved from the first device does not include desired contact information, the desired contact information may be retrieved from a second device. The contact information obtained from the second device may be utilized to initiate communication via the first device through an interface of the synchronization device. |
US08855613B2 |
Monitoring mobile phone communications
The specification describes systems, and operation thereof, allowing parents or other parties to monitor mobile device activities of a child. In addition, parent can dynamically control mobile device activities of the child. Software, or network adjuncts, can link a mobile device to a station set or mobile phone under the control of the parent. Calling traffic to and from the mobile device may be routed to a receiver at a location monitored by the parent. In some embodiments, software allows the parent to intervene in the communications of the child. The intervention may take a variety of forms, such as interrupting a call in progress, terminating call activity, interrupting or terminating Internet access. Where the mobile device is provided with pre-programmed restraining software, the intervention may be modifying the restraining software. |
US08855611B2 |
System for real-time photograph printing service and method for the same
A system for real-time photograph printing service includes a personal terminal, a telecom terminal, and a printing service terminal. The personal terminal is triggered to transmit a digital photograph file and a phone number according to the personal terminal. The telecom terminal fetches a communication address of a user of the personal terminal according to the received telephone number, and the printing service terminal receives the digital photograph file to print out a physical photograph. Finally, the printed photograph is send to the communication address for user by post. |
US08855610B2 |
Mobile communication terminal, method of generating group picture in phonebook thereof and method of performing communication event using group picture
A mobile communication terminal for providing a group picture of a group in a phonebook, a method of generating the group picture in the phonebook of the mobile communication terminal and a method of performing a communication event using the group picture are provided. The method of generating a group picture in a phonebook of a mobile communication terminal includes selecting an original picture in which an image corresponding to each member of a group is displayed in a predetermined area corresponding to the group member, mapping an address of each group member to the corresponding predetermined area in the original picture and storing the original picture to which the group members' addresses are mapped as a group picture of the phonebook. The present apparatus and method enable easier editing and use of a group of a phonebook and characteristic decoration thereof which allow for more efficient use of the mobile terminal. |
US08855608B2 |
Information processing system, mobile terminal, linkage server, and information processing method
An information processing system 1 includes an information collection unit 11 that collects information from an outside, a first communication unit 12 that performs a business-operation data communication to perform a business operation using the collected information, a second communication unit 13 that performs a non-preset communication through voice or text message; and a linkage unit 20 that links the first communication unit 12 and the second communication unit 13. |
US08855604B2 |
Roaming authentication method for a GSM system
A roaming authentication method for a GSM system is disclosed. The method sends an IMSI of a user end to a visitor end, generates a challenge code, and sends the IMSI and the challenge code to a home end. The method further generates a random code, a signature code and a communication key and combines them into an authentication data. The method further generates and sends a response code to the visitor end. The user end generates and sends the authentication signature code to the visitor end for authentication purposes. In another embodiment, the visitor end sends one more challenge code to the home end. The home end generates an authentication key that is stored in the visitor end and used to generate an authentication code. The authentication code is sent to the use end which generates and sends an authentication signature code to the visitor end for authentication purposes. |
US08855601B2 |
System and method for remotely-initiated audio communication
Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Techniques are provided for determining when an audio transmission should be established between a device and one or more clients, and sending a command to initiate the audio transmission. The determination may be based on receiving a request from a client, detecting at a server that the device is lost or stolen, or detecting at the device that the device is missing. The audio transmission may be established without user intervention at the device or in response to user action at the portable electronic device. Device settings such as audio settings at the device may be overridden in connection with the audio transmission. |
US08855596B2 |
Methods and apparatus for placement of an emergency call
Emergency call placement methods and apparatus for a user equipment in a wireless network are disclosed. The placement method includes detecting initiation of an emergency call during a non-idle connection mode of the user equipment (204), terminating the non-idle connection mode (206) and initiating a new connection for the emergency call (208). This method allows the new connection to use a location methodology to locate the user equipment in response to the emergency call. The disclosed wireless user equipment (102, 500) is configured to implement the disclosed method. |
US08855590B2 |
Radio frequency signal receiving device
Disclosed is a radio frequency signal receiving device, which includes a low-noise amplifier (LNA) and a mixer. The LNA includes a first inductor and a second inductor. The mixer has a first differential pair and a second differential pair, common ends of the first differential pair and the second differential pair are respectively coupled to the first differential output end and the second differential output end. The first inductor and the second inductor are serially connected between the first differential output end and the second differential output end of the LNA, so as to reduce power consumption and reach suitable frequency response. The first inductor and the second inductor generate a resonance effect with parasitic capacitance on the mixer, so as to effectively reduce flicker noises, and improve a working benefit of the radio frequency signal receiving device. |
US08855588B2 |
Power amplifying apparatus and wireless signal transmitter utilizing the same
A power amplifying apparatus is provided. A reference signal generator provides a reference signal having an enabling state and a disabling state. A digital power amplifier generates a current based on the reference signal and an input signal. An output signal of the digital power amplifier is related to the current. When the reference signal is in the enabling state, the current is related to the input signal. When the reference signal is in the disabling state, the current is irrelevant to the input signal. During the enabling state of the reference signal, a data generator provides an output alternating between an in-phase signal and a quadrature-phase signal as the input signal to the digital power amplifier. When the reference signal is in the disabling state, the data generator provides a fixed signal as the input signal to the digital power amplifier. |
US08855587B2 |
Power consumption management based on receiver parameter and method for use therewith
An integrated circuit (IC) includes an RF receiver having an AGC module that generates an automatic gain control (AGC) signal based on a strength of a received signal, and a low noise amplifier that amplifies the received signal based on the AGC signal. A processing module generates a power mode signal based on the AGC signal, the power mode signal for adjusting a power consumption parameter of the IC based on the power mode signal. |
US08855582B2 |
Mobile communication terminal for PTT and method for processing missed call information thereof
The present invention relates to a mobile communication terminal for Push To Talk (PTT) and a method for processing missed call information thereof, which allows a receiver to check why an originator requested the PTT telephone call during the absence of the receiver through missed call information. The missed call information includes the voice of the originator requesting the PTT call, and the voice of the originator is output when confirmation of the missed call information is requested. |
US08855581B2 |
Integrated circuit package with transformer
Aspects of a method and system for a transformer in an integrated circuit package are provided. In this regard, signals may be transmitted and/or received via an antenna communicatively coupled to a transformer embedded in multi-layer integrated circuit package. The windings ratio of the transformer may be configured based on an impedance of the antenna, an impedance of a transmitter coupled to the transformer, an impedance of an LNA coupled to the transformer, and/or a power level of the received and/or transmitted signals. The windings ratio may be configured via one or more switching elements which may be MEMS switches embedded in the multi-layer IC package. The transformer may comprise a plurality of loops fabricated on a corresponding plurality of metal layers in the multi-layer IC package, and the loops may be communicatively coupled with one or more vias. The multi-layer IC package may comprise ferromagnetic and/or ferromagnetic materials. |
US08855577B2 |
System and method for assisted open loop multiple input, multiple output communications
A system and method for assisted open loop (OL) multiple input, multiple output (MIMO) communications are provided. A method for controller operations includes: adjusting a transmitter used to transmit information in OL MIMO transmissions, the adjusting based on partial channel information for a channel between a controller and a communications device; and transmitting to the communications device using the adjusted transmitter. |
US08855571B2 |
Radio communication apparatus, system, and method
A first radio communication apparatus includes receiving antennas, an antenna selection processing unit that selects a transmitting antenna from transmitting antennas included in a second radio communication apparatus, generates a set that includes antenna indexes each indicating each of transmitting antennas, rearranges the antenna indexes in sequence starting from an antenna index indicating the selected transmitting antenna, generates a channel matrix in which a column corresponding to the selected transmitting antenna is located at a top, and a selected-channel matrix composed of the column, multiplies an inverse matrix of the channel matrix by the selected-channel matrix to generate an evaluation matrix, rearranges the antenna indexes in the set according to values of elements in the evaluation matrix, and selects an antenna to be used according to the rearranged antenna indexes, and a transmitting unit that transmits an antenna index indicating the selected antenna to the second radio communication apparatus. |
US08855567B2 |
Methods and apparatus for successive interference cancellation based on two rate feedback in peer-to-peer networks
In an ad hoc peer-to-peer communication network between wireless devices, a high priory first receiver device is configured to perform successive interference cancellation. A first pilot signal is received by the first receiver device from the first transmitter device. Similarly, a second pilot signal is received from a second transmitter device, the second pilot signal indicating that the second transmitter device intends to transmit a second traffic signal. The first receiver device determines a first and a second transmission rates for traffic transmissions from the first transmitter device. A control message is then transmitted by the first receiver device to the first transmitter device including the first and second transmission rates. Subsequently, the first receiver device wirelessly receives a traffic signal including a first traffic signal from the first transmitter device including a first and a second signal components generated from a first and a second codewords, respectively. |
US08855563B2 |
Communication apparatus and communication method
A terminal apparatus (M101) includes a terminal unit (M201) and a near-field communication unit (M107). The terminal unit (M201) includes a main memory (M106) that stores operation history information of the terminal apparatus (M101) and a controller (M105). The near-field communication unit (M107) includes a communication control unit (M216) that performs near-field communication with the mobile apparatus (M102) and a near-field communication memory (M215). The controller (M105) stores, in the near-field in communication memory (M215), at least a part of the operation history information stored in the main memory (M106) when a malfunction of the terminal unit (M201) is detected, and the communication control unit (M216) transmits the operation history information stored in the near-field communication memory (M215) is by near-field communication to the mobile apparatus (M102), in accordance with a request from the mobile apparatus (M102). |
US08855558B2 |
Adaptive inductive power supply with communication
An adaptive inductive ballast is provided with the capability to communicate with a remote device powered by the ballast. To improve the operation of the ballast, the ballast changes its operating characteristics based upon information received from the remote device. Further, the ballast may provide a path for the remote device to communicate with device other than the adaptive inductive ballast. |
US08855556B2 |
Methods and apparatus for controlling state and functionality of an electronic component through motion-awareness
Methods and apparatus for operating an electronic component, such as an NEC communication device, allow performance of at least one operation based, at least in part, on the relative positions and/or motions of the electronic component over time. Information regarding motion of the electronic component is used to determine one or more actions, or one or more state changes of the electronic component. Such an electronic component is motion-aware. Since this motion-awareness gives the electronic component the ability to take one or more actions, or to make one or more state changes, based, at least in part, on information indicative of its relative position or motions over time, various states and/or functions of the electronic device may be initiated and/or controlled by subjecting it to one or more movements or motions. |
US08855555B2 |
Mobile wireless communications device providing selective image display based upon near field communication (NFC) and related methods
A mobile wireless communications device may include a portable housing, wireless transceiver circuitry carried by the portable housing, and a first display carried by the portable housing. The mobile wireless communications device may also include a processor carried by the portable housing and coupled to the wireless transceiver circuitry and the first display, and a second display carried by the portable housing. The second display may include an array of pixels. Each pixel may retain a given state between refreshes and without electrical power supplied thereto. The mobile wireless communications device may also include a near-field communications (NFC) device carried by the portable housing and cooperating with the second display to display an image thereon based upon NFC communications. |
US08855551B2 |
System and method for one cell to cover multiple areas
A system, method and network device for covering a plurality of areas by one cell are disclosed. The system includes: a plurality of radio frequency groups and at least one base band unit. One radio frequency group corresponds to one area of the cell, one radio frequency group corresponds to one date channel, and one base band unit is connected to a plurality of radio frequency groups through a plurality of date channels. The embodiment of the invention reduces the signal interference among each area of the same cell, increases the system capacity, and benefits cell splitting, i.e., benefits increasing the capacity and upgrading during network enhancement. |
US08855550B2 |
Wireless relay module having emergency call functionality
A system for networked communications between a series of medical devices, wireless relay modules, and a remote device wireless relay network and an internet-accessible wireless communication network. At least one relay module includes a receiver, a first transmitter coupled to the wireless relay network, a second transmitter coupled to the internet-accessible wireless communication network, and a controller. The controller determines whether the internet-accessible wireless communications network is accessible. If accessible, then medical device data is transmitted to a remote device over that network using the second transmitter. If not accessible, then the first transmitter is used to transmit medical device data to another wireless relay module over the wireless relay network. Additionally, the controller analyzes the medical device data to determine whether an emergency condition exists, and transmits the medical device data to an emergency responder if such condition occurs together with location data for an associated medical device. |
US08855548B2 |
Wireless communications system and method
This invention discloses a method of communicating with a user including wirelessly broadcasting content which is accessible to a multiplicity of users and which includes at least some non-audio content which is not visible to the users without user actuation and which includes product-specific information, enabling a user to select a portion of the content, responsive to a selection by the user, capturing at least part of the non-audio content, corresponding to the portion of the content selected by the user and employing at least part of the captured content to access a contact using a mobile communicator by initially establishing contact with a non product-specific communication facility and employing product-specific information contained in the non-audio content. A system for communicating with a user is also disclosed. |
US08855545B2 |
Method and system for delivering visual and auditory content
A self-contained system containing a plurality of pages of printed content, incorporating means for detecting which page is being viewed by the reader, and incorporating means for producing supplementary auditory output related to the printed content of the pages, wherein the supplementary auditory content produced for any given page is determined by the sequence of pages previously viewed by the reader. |
US08855544B2 |
Image forming apparatus with charge eliminating guide member
The present invention provides an image forming apparatus in which a recording paper to which a toner has been transferred is guided by a guide member and transported to a nip region between two rotatable members that are pressed against each other, and the toner on the recording paper is fixed at the nip region. In this image forming apparatus, a conductive or semiconductive region and an insulating region that are to be brought into contact with the recording paper are sequentially arranged in a recording paper transport direction on a guide face of the guide member, the conductive or semiconductive region is grounded, and the insulating region includes an end portion of the guide member oriented in the recording paper transport direction. |
US08855535B2 |
Toner supply device and image forming apparatus
A toner supply device includes a toner storage section including plural toner containing sections and a dividing part, the plural toner containing sections being arranged from an upstream side to a downstream side in a toner feeding direction and including respective rotating members configured to rotate to feed the toner, the dividing part being formed between the toner containing sections adjacent to each other and including an upper end part. Further, a position of the upper end part of the dividing part is higher than a position of a rotational center of the rotating member included in the toner containing section on the upstream side in the toner feeding direction of the toner containing sections adjacent to each other. |
US08855533B2 |
Power transmission apparatus and image forming apparatus having the same
A power transmission apparatus and an image forming apparatus are provided. The power transmission apparatus of transmitting driving power to first and second movable members includes a driving unit which receives the driving power from a driving power source, and which rotates in forward and backward directions, a first driven unit which transmits the driving power to the first movable member, an elastic clutch which is provided between the driving unit and the first driven unit to selectively allow the driving power from the driving unit to be conveyed to the first driven unit based on the direction of the driving power, and a second driven unit to convey the driving power to the second movable member regardless of the direction of the driving power so as to allow the second movable member to rotate bi-directionally. The first movable member may be, e.g., a photosensitive body. The second movable member may be, e.g., exit rollers for ejecting processed printing medium out of the image forming apparatus. |
US08855516B2 |
Image forming apparatus including air blowing member configured to blow air toward a pressing member forming a nip portion with a fixing member
An image forming apparatus includes; an image forming station for forming a toner image on a sheet; a fixing device including a fixing member and a pressing member; an air feeding member for air feeding cooling air toward the pressing member; and a shutter, provided between the air feeding member and the pressing member, for controlling an air feeding region, wherein the image forming apparatus operable selectively in a first mode for feeding the air an entire area with respect to the longitudinal direction of the pressing member, and in a second mode for feeding the air only a non-sheet-passing area when a small size sheet is fed. |
US08855511B2 |
Multi-compartment storage container for developer, developer detection unit and image forming apparatus
A storage container for a developer, includes: a first storage unit in which a collected developer is stored; a second storage unit which is disposed at an end of the first storage unit, in which the developer conveyed from the first storage unit is stored; a detection member which detects the developer stored in the second storage unit; a full-state determining unit which determines whether the first storage unit is a full state or not, based on a detected result of the detection member; and a conveyance member which is disposed in the first storage unit, and is rotated to convey the developer stored in the first storage unit to the second storage unit, and the conveyance member has: a first region as defined herein; a second region as defined herein; and a third region as defined herein. |
US08855506B2 |
Image forming apparatus
An image forming apparatus includes a fixing device. The fixing device includes a rotatable endless fixing member, a nip forming member arranged inside the fixing member, a pressing member in contact with the nip forming member via the fixing member, and a heating source configured to heat the fixing member. When an abnormality occurs in at least one of the fixing device and other devices included in the image forming apparatus, a rotation of the fixing member is stopped prior to stopping a rotation driving of a discharging unit and, after stopping, the fixing member is controlled to rotate. |
US08855505B2 |
Image stabilization control system and image forming apparatus directed to electrophotographic process for maintaining and improving image quality
An image stabilization control system directed to an electrophotographic process is provided. The image stabilization control system includes a color measuring unit for measuring the color of a toner image after being fixed on a medium. The color measuring unit has an SCE color measuring function of measuring a component excluding specular reflection out of reflected light produced by light emitted from a light source being reflected at the toner image and an SCI color measuring function of measuring the reflected light including the specular reflection. A control value for a fixing step in the electrophotographic process is adjusted based on a first component attributed to a glossiness difference in chrominance, and a control value for a step other than the fixing step in the electrophotographic process is adjusted based on a second component attributed to another factor in the chrominance. |
US08855503B2 |
Optical receiver and optical transmission system
Optical receiver 300 uses two optical delay detectors 223 (set such that the delay times T are equal to symbol time and the phase differences are zero and 90 degrees) to receive an optical multilevel signal 215 and the output signals are A/D converted, thereafter subjected to retiming processes, and then subjected to a differential phase detection, thereby detecting a differential phase at a symbol center time point. In the receiver, the detected differential phase is integrated for each symbol and thereafter combined with an amplitude component obtained from a separately disposed optical intensity receiver, thereby reproducing an optical electric field. Thereafter, a wavelength dispersion compensation circuit (231) of a time period T is used to compensate for the wavelength dispersion of the transmission path. Moreover, an electric or optical Nyquist filter may be inserted to perform a band limitation, thereby enhancing the wavelength dispersion compensation effect. |
US08855497B2 |
Optical transmission system
There is provided an optical transmission system including: an optical transmitting apparatus including: a first processing circuit configured to process a transmission signal to be transmitted, a second processing circuit configured to process overhead data, the processed overhead data being multiplexed to the transmission signal, a retaining circuit configured to retain the overhead data, the retained overhead data being multiplexed to the transmission signal; and an insertion circuit configured to generate an identifier to be inserted into the retained overhead data; and an optical receiving apparatus including a detecting circuit configured to receive the transmission signal transmitted from the optical transmitting apparatus, and detect the identifier, wherein, when the overhead data is a predetermined state, the first processing circuit multiplexes the retained overhead data into which the identifier is inserted and the detecting circuit detects the identifier. |
US08855496B2 |
Optical clock rate negotiation for supporting asymmetric clock rates for visible light communication
A method and apparatus conduct an optical clock rate negotiation to support asymmetric clock rates for visible light communication (VLC) in a VLC device. A first frame that includes a receiver clock rate supported by a first VLC device is transmitted at a predetermined clock rate. A response frame that includes a receiver clock rate supported by a second VLC device is received from the second VLC device. A transmission clock rate of the first VLC device is selected based on the response frame from the second VLC device. Subsequent frames for data communication are transmitted to the second VLC device at the selected transmission clock rate of the first device. Alternatively, when conducting optical clock negotiation in the PHY layer, multiple clock rates are supported within a single frame. |
US08855492B2 |
Selectable multiple-wavelength access for optical network units in arrayed waveguide based wavelength division multiplexing passive optical network
An optical network unit (ONU) accesses services provided by multiple optical line terminals (OLTs) in a wavelength division multiplexing (WDM) passive optical network (PON). The ONU receives downstream signals from a first plurality of OLTs through a designated port of an arrayed waveguide (AWG). At any given time, the bandpass filter module can select any one of a first plurality of AWG cycles allocated to the first plurality of OLTs. Based on received downstream signals, the ONU transmits upstream signals to a second plurality of OLTs through the designated port of the AWG. At any given time, the bandpass filter module and a transmitter of the ONU can select any one of a second plurality of AWG cycles allocated to the second plurality of OLTs. The ONU may be configured with a plurality of receivers and transmitters, whereby it is enabled to simultaneously subscribe to a plurality of AWG cycles. |
US08855490B2 |
Backward compatible PON coexistence
A network comprising a first optical line terminal (OLT), and a second OLT in communication with the first OLT, at least one first-type optical network unit (ONU), and at least one second-type ONU. Included is an OLT configured to implement a method comprising forwarding a first downstream data from a first-type OLT to at least one first-type ONU, and transmitting a second downstream data to at least one second-type ONU. Also included is a method comprising adding at least one second-type ONU to a passive optical network (PON) comprising a first-type OLT and at least one first-type ONU without removing the first-type OLT from the PON. |
US08855488B2 |
Optical transmission system
The present invention relates to an optical transmission system to which a spatial multiplexing optical fiber is applied as a transmission line. The optical transmission system performs optical transmission using the spatial multiplexing optical fiber as an optical transmission line for transmission of signal light. Namely, the optical transmission is carried out in accordance with a modulation format in which a Q-factor of the signal light propagating in certain propagation mode light propagating in the spatial multiplexing optical fiber and a ratio of a signal light power to a square of the shortest distance between modulation symbols in the modulation format satisfy a predetermined relational expression. |
US08855487B2 |
Method and device for obtaining routing information of electro-optical multi-layer network
The present disclosure provides a method and device for obtaining the routing information of an electro-optical multi-layer network. The ports on which an optical transmitter and an optical receiver are located are determined, and the electro-optical conversion information is added to the routing information on a port of the optical layer node side or the electro layer node side on which the optical transmitter and the optical receiver are located. The electro-optical conversion information includes but is not limited to the wavelength tuning capability and signal processing capability. Through the extending of the current Multi-Layer Network (MLN) information model and Wavelength Switched Optical Network (WSON) information model, the present disclosure describes the routing information including the electro-optical conversion information of the present disclosure more accurately, and perfects the electro-optical multi-layer network information model, and improves the accuracy of the path calculation to reach the optimization. |
US08855479B2 |
Imaging apparatus and method for controlling same
To provide an imaging apparatus and a method of controlling the apparatus that enables improved automatic focus adjustment performance also in relation to an image having a shallow depth of field. An imaging element 103 includes a focus state detection unit for detecting a phase difference. A camera signal processing unit 106 generates a focus adjustment signal based on the imaging signal and outputs the signal to a camera control unit 109. The camera control unit 109 acquires an in-focus lens position in accordance with a focus lens based on a focus deviation amount based on a focus state detection result, calculates distance information related to the in-focus distance on the image screen, and controls the driving of the focus lens 102 based on the distance information and the focus adjustment signal from the camera signal processing unit 106. When a difference between the in-focus lens position and the position of the focus lens at the current time exceeds a threshold, the camera control unit 109 drives the focus lens to the in-focus lens position based on the distance information. When the difference between the in-focus lens position and the focus lens position at the current time is less than or equal to the threshold, the camera control unit 109 executes the in-focus control based on the focus adjustment signal. |
US08855478B2 |
Lens barrel
At an inner circumferential surface of a cam frame, second cam grooves and an inner gear are formed. A second lens group frame includes a base, extensions each extending from the base in an optical axis direction, and cam pins each outwardly protruding from a tip end part of a corresponding one of the extensions in a radial direction. In the extension, a stepped part is formed. The stepped part overlaps, when each cam pin moves according to a corresponding one of the second cam grooves, with the inner gear as viewed in the radial direction, and is recessed toward the inside in the radial direction as compared to a tooth tip of the inner gear so as not to overlap with the tooth tip of the inner gear as viewed in a circumferential direction. |
US08855471B2 |
Media generation system
A system generates automatically a highlight summary of a performance, from signals representing a captured version of the performance. The system includes a user operated event logging processor and an ingestion processor. The user operated event logging processor is operable to log event codes, each of which is selected by the user from a set of event codes. Each of the event codes in the set of event codes represents a predetermined event which may occur in the performance, the event codes being selected by the user when an event corresponding to the event code occurs during an observed performance. The ingestion processor is operable to receive the event codes and to receive signals produced by capturing a representation of the performance. |
US08855470B2 |
Use of multiple embedded messages in program signal streams
Methods of generating video streams including advertisement information sufficient to support advertisement countdown times and other functions such as advertisement auto pause functions are described. In accordance with various embodiments, advertisement duration is determined from one or more messages included in a video stream, e.g., prior to the corresponding advertising segment. A countdown timer is generated from the advertisement information and displayed along with the content of the advertisement segment. Restrictions for different subscribers may be indicated in the advertisement information messages, e.g., with some end users being permitted to fast forward or skip advertisements with other users being required to allow the full normal playback of one or more advertisement segments. The auto pause function, when activated, pauses an ad segment or set of ad segments at a predetermined time before output of the main program resumes thereby making sure none of the main program is missed. |
US08855465B2 |
Moving image recording apparatus, moving image recording method, and program
A moving image recording apparatus includes: a reading unit configured to read at least part of a file allocation table (FAT) from a recording medium, which is attached to an attachment unit and whose files are managed by a FAT file system, onto a storage unit; a recording medium determination unit configured to determine whether the recording medium attached to the attachment unit is a write-once recording medium; a moving image recordable time calculation unit configured to calculate, if the recording medium determination unit determines that the recording medium is a write-once recording medium, moving image recordable time based on the number of free clusters in the FAT read onto the storage unit by the reading unit; and a moving image recordable time display unit configured to display the moving image recordable time calculated by the moving image recordable time calculation unit on a display unit. |
US08855462B2 |
Video playback system for enhancing drama effect and related computer program product
A video playback system for enhancing drama effect is disclosed, including: a video playback device having a main display to playback a target video; a first portable communication device having a first screen for displaying a first auxiliary image; and a drama effect enhancing server configured to operably transmit content of the target video to the video playback device via a network and to operably transmit content of the first auxiliary image to the first portable communication device via a network. When the target video playbacked on the main display reaches a first target point of time, the drama effect enhancing server instructs the first portable communication device to utilize the first screen to begin displaying the first auxiliary image. |
US08855459B2 |
Method and apparatus for prolonging battery life of a media player
A method of operating a media player is provided. In one embodiment the method includes receiving a plurality of initially configured video settings for viewing a video segment on the media player for a desired playback duration. The method further includes determining power required to play the video segment based on the initial video settings and playing the video segment if the required power matches or is less than total power available to the media player. In another embodiment, the method may further include, if the required power exceeds the total power available to the media player, adjusting one or more of the initial video settings, either automatically or by user inputs, to reduce the power required to play the requested video segment for the desired playback duration. |
US08855456B2 |
Mounting devices for optical devices, and related sub-assemblies, apparatuses, and methods
Mounting devices for optical devices, and related sub-assemblies, apparatuses, and methods are disclosed. The mounting devices may be employed to secure optical devices that are configured to convert optical signals to electrical signals, or electrical signals to optical signals. The mounting devices may be configured to secure optical devices to an electronics board, such as a printed circuit board (PCB) as an example. To preserve signal integrity, the mounting devices may also be configured to align the optical devices with electrical lead connections on the electronics board. The mounting devices may also be configured to improve grounding of the optical devices to provide and improve radio frequency (RF) shielding to avoid degradation of signal-to-noise (S/N) ratios from RF interference from electronic devices on the electronics board and other nearby electronic devices. |
US08855455B2 |
Fiber optic cable
An arrangement provides for an optical fiber cable having a plurality of fiber optic elements including a glass portion and a UV optical coating portion. A plurality of buffer tubes each contain one or more of the plurality of optical fibers made of a fire retardant polymer. A jacket surrounds the buffer tubes also made of a fire retardant polymer. The fire retardant polymers for the plurality of buffer tubes and for the jacket are selected from PVDF (PolyVinyliDene Fluoride) or FRPVC (Fire Resistance Poly Vinyl Chloride). The ratio of total polymer to UV optical coating of the fiber optic elements, by area, is substantially in the range of 5:1 to 9:1. |
US08855450B2 |
System and method for measuring properties of a thin film coated glass
A system for measuring properties of a thin film coated glass having a light source, a spectrometer, at least one pair of probes, a first optical fiber switch and a second optical fiber switch. The pair of probes includes a first probe located on one side of a glass sheet and a second probe located on the opposite side of the glass sheet, directly across from the first probe. The first and second optical fiber switches are adapted to couple either probe to the light source and/or the spectrometer. Because the design of the system is optically symmetrical, calibration may be performed without the use of a reference material such as a tile or mirror. Each of the first and second probes has a first leg and a second leg that are separated from each other by a distance n so that angled reflections may be detected. |
US08855444B2 |
Method for partitioning and processing a digital image
Method for partitioning a digital image into two or more regions where each region is defined using a portion of the digital image. In addition, margin pixels for each region are defined as pixels that correspond to a top margin, a bottom margin, a left margin, and a right margin of each region of the digital image. Margin pixels are generated by using various techniques such as on-the-fly generation, using data information of neighboring pixels to each region, using data information of pixels within each region, or using predetermined data information for a color including black. The pixels of each region are processed with its margin pixels to create a new processed region of the digital image. The processing may include scaling of each region from a first resolution to a second resolution. The data information of each processed region can be displayed using a portion of an electronic display panel, or a monitor having with multiple display regions. The concatenations of the displayed representations using data information from each processed region faithfully reproduce the digital image. |
US08855442B2 |
Image registration of multimodal data using 3D-GeoArcs
An accurate, flexible and scalable technique for multi-modal image registration is described, a technique that does not need to rely on direct feature matching and does not need to rely on precise geometric models. The methods and/or systems described in this disclosure enable the registration (fusion) of multi-modal images of a scene with a three dimensional (3D) representation of the same scene using, among other information, viewpoint data from a sensor that generated a target image, as well as 3D-GeoArcs. The registration techniques of the present disclosure may be comprised of three main steps, as shown in FIG. 1. The first main step includes forming a 3D reference model of a scene. The second main step includes estimating the 3D geospatial viewpoint of a sensor that generated a target image using 3D-GeoArcs. The third main step includes projecting the target image's data into a composite 3D scene representation. |