Document Document Title
US08850913B2 Manual transmission for a motor vehicle
A manual transmission of a motor vehicle, is actuated by manually shifting a shift lever in a gearshift console having a selector gate and shifting gates in a multiple-H shifting pattern, with coaxial input and output shafts and a parallel countershaft, and with a number of gearset planes. Transmission gears are implemented by engaging at least two associated gear clutches. The gear clutches are divided into a selection group and a shifting group. The selection group gear clutches can be actuated exclusively by moving the shift lever in the selection gate so as to couple the input and counter-shafts. The shifting group gear clutches can be actuated exclusively by moving the shift lever in the shifting gates so as to couple the output and counter-shafts, and the gear clutch respectively engaged in the shifting gates having the two opposite gears is a selection group gear clutch.
US08850905B2 Automated sampling of dissolved contaminants in water
An automated sampler for sampling contaminants that are dissolved in water. An empty, sealed first vial is placed at a first sampling station with a dual-port needle, and a mechanical syringe pump displaces a programmable volume of gas from the first vial. A sealed second vial having a field sample of water with dissolved contaminants, typically without a headspace region, is placed at a second sampling station, with a dual-port needle. The syringe pump extracts an aqueous volume from the second vial, then transfers the aqueous volume into the first vial. This is all done without exposing the field sample to any external gasses or other compounds, and without opening the seal of the field sample to atmosphere. The sample in the first vial is heated, and an aliquot of headspace from the first vial is then injected into an analyzer device for identification and quantification.
US08850902B2 Method and apparatus for detaching and/or isolating a histological sample
The invention relates to an apparatus for treating histological samples, in particular for detaching and/or isolating a histological sample that, in particular after an infiltration operation, is adhering to another sample and/or to the inside of a cassette (1), having a sample receiving chamber (2) which is embodied and intended to be filled at least partly with a liquid (3), in particular with liquid paraffin. The apparatus according to the present invention is characterized in that an apparatus is provided that is introducible into the liquid (3), in particular under open- and/or closed-loop control, in order to elevate the fill level height (6) of the liquid (3), and/or that an apparatus is provided whose volume is increasable, in particular under open- and/or closed-loop control, in order to elevate the fill level height.
US08850901B2 Active material actuation utilizing bi-stable mechanical overload protection
An actuation assembly adapted for driving a load, and protecting against overload conditions, includes an actuator defining a stroke, and an overload protection device including at least one elastic member having a nonlinear force-deflection characteristic defining a limit point and negative stiffness region, drivenly coupled to the actuator opposite the load, and operable to provide a secondary work output path when an overload condition exists.
US08850900B2 Operation amount detection apparatus
An operation amount detection apparatus includes a transmission member that transmits a load corresponding to an operation amount between a shaft portion and an operation target member through connecting portions that connect a first support portion supported by the operation target member and a second support portion supported by the shaft portion, and a detection device that detects an operation amount based on an amount of deformation of the connecting portions. A plurality of the connecting portions are provided in parallel between the first support portion and the second support portion, and deflect due to transmission of a load so that the first support portion and the second support are relatively displaced in a direction of a linear motion. The respective connecting portions are mutually opposed in a direction perpendicular to a lengthwise direction of the shaft portion.
US08850899B2 Production logging processes and systems
Processes and systems for logging production of fluid produced into a well bore without intervention of the well are disclosed. Two or more markers may be introduced into produced fluid at spaced apart locations along a well. The time for each marker to reach a common point may be measured and production rates for produced fluids at each spaced apart location may be calculated.
US08850897B2 Electrically conductive nanotube composite sensor for medical application
A sensor and method of sensing dimensional changes, stress changes or pressure changes on a substrate uses a sensor in the following manner. Temporarily and non-destructively attach a piezoresistant sensor to a surface. The piezoresistant sensor has an electrically conductive elastic body having at least one pair of opposed ends, and the elastic body contains conductive nanotubes homogeneously distributed therein. The elastic body has at least one surface with two opposed ends and electrodes at each of the opposed ends. A current is passed through the elastic body between the two electrodes. The current passing through the elastic body is sensed (e.g., a voltmeter). A mechanical step is performed with or on the substrate, and the sensor measures changes in the current between the electrodes, indicating strain or pressure on the sensor.
US08850896B2 Physical quantity detector
A physical quantity detector includes a diaphragm including a displacement part that is displaced under external pressure, a ring-shaped fixing part that holds an outer circumferential part of the diaphragm, a holding member having a projection part that projects from an inner circumference of the fixing part toward a center at one surface side of the diaphragm, a support fixed to the projection part, and a pressure-sensitive device having a first base part fixed to the displacement part, a second base part fixed to the support, and a pressure-sensitive part provided between the base parts.
US08850892B2 Smart material actuator with enclosed compensator
An actuator driven by a smart material device and suitable for use as an actuator, energy capture device, or sensor, having an enclosed compensator, potting material, at least one actuating arm, and two mechanical webs and a movable supporting member adapted such that application of a suitable electric potential causes a change in shape of the smart material device, thereby flexing the mechanical webs and causing movement of the actuating arm. As an energy capture device or sensor, external motion causes the actuating arm to move, thereby causing the smart material device to generate recoverable electrical energy or an electric signal indicating motion.
US08850889B2 Acceleration sensor
An acceleration sensor includes: a rectangular moving electrode; a pair of beams which connect to centers of two opposite sides of the moving electrode, and support the moving electrode freely swingably; and first and second fixed electrodes which are provided on one side and other side of a boundary line, respectively, and are arranged to be opposed to a front surface of the moving electrode at a predetermined interval. A straight line that connects the pair of beams to each other is taken as the boundary line. Then, on a back surface of the moving electrode, first and second recessed portions are formed on one side of the boundary line and the other side thereof, respectively.
US08850884B2 Liquid tank and fuel cell
Provided are a liquid tank capable of reducing an influence of disturbance on measurement results and measuring accurate volume, and a fuel cell using the same. One face of a liquid container section is structured by a detector in which a first board to a fourth board each configured of a printed board are stacked in order. A pair of detection electrodes 12A and 12B are provided on a front face of the first board, and this pair of detection electrodes 12A and 12B are allowed to contact directly or indirectly to a liquid fuel inside the liquid container section to detect a stray capacitance. A back face side of the first board is disposed with the second board having a shielding electrode 22. Even when a hand or the like is brought close to the detector, the detection electrodes 12A and 12B are prevented from sensing the stray capacitance generated as a result.
US08850883B2 Fluid level detector
A transducer for use in a fluid detector for determining a presence of a fluid within a container, the transducer comprising a piezoelectric element that outputs an ultrasonic signal in response to an input electrical signal, characterized in that said transducer further comprises, a lens with an upper portion, a lower portion, and a focal point, the upper portion including a curved surface with convex side. The piezoelectric element is coupled to the upper portion of the lens so that, when the lens is disposed adjacent an outer surface of a wall of the container such that the lens is intermediate the piezoelectric element and the wall, the lens focuses the ultrasonic signal toward the focal point of the lens and on the inner surface of the wall.
US08850880B2 Diagnostic system for a valve
A valve that can be actuated by a position controller via a drive, wherein the position controller has a housing and is fastened to the valve by the housing. A first temperature sensor and a second temperature sensor are attached on or in the housing. As a result of the position of both sensors, the temperature measured using the first temperature sensor is more readily influenced by the valve and the temperature registered by the second temperature sensor is more readily influenced by the environment. If a gas leak occurs in the valve, a temperature difference occurs that is evaluated for diagnosis of a leak. The diagnostic system is particularly easy to minor implement with minimal effort.
US08850878B2 Methods and systems for diagnosing a turbocharger
Various methods and systems are provided for a turbocharger. In one example, a method includes receiving a signal indicative of a monitored pressure of a pressurized oil supply of a turbocharger or other turbomachine. The method further includes determining whether a high frequency component of the signal meets one or more designated criteria, and, if the high frequency component of the pressure meets the one or more designated criteria, generating a first control signal.
US08850871B2 Pipeline leak location using ultrasonic flowmeters
Fluid leaks are identified and located by successively monitoring changes in fluid flow and sound velocities of fluid at a plurality of locations in the pipe with flow meters, such as with ultrasonic flow meters. Preferably the successive monitoring sampling rates are sufficiently high to measure instantaneous velocity changes. A controller coupled to the meters associates changes in monitored fluid flow and sound velocities in two locations along the pipe with a leak event occurring between those locations. The controller identifies the association event at each location and correlates pipe leak location based at least in part on difference in time between the respective location events. The system and method may be used in liquid and gas pipeline transmission systems.
US08850867B2 Photoacoustic sensor and method for the production and use thereof
A photoacoustic sensor, containing a resonance body, which at least partially delimits a space for receiving molecules to be detected, and a device for detecting an oscillation of the resonance body, including a device for optically detecting the location of at least one partial surface of the resonance body. A method for the photoacoustic detection of molecules in the gas phase and to a method for producing an optically integrated photoacoustic sensor.
US08850865B2 Die cushion device
A die cushion device includes a cushion pad, a support section, a servomotor, and a shock absorber device. The support section supports the cushion pad. The servomotor raises and lowers the support section for raising and lowering the cushion pad. The shock absorber device includes a damping section and relieves shock between the cushion pad and the support section. The damping section generates reaction force in accordance with the relative speed of the cushion pad with respect to the support section.
US08850864B2 Press-processing method, and press-processing apparatus
This aims to provide a press process for drawing a plate material into a predetermined shape. This press process performs a first unwrinkling treatment and a second unwrinkling treatment sequentially for unwrinkling the material. Between these first and second unwrinkling treatments, an introduction for deforming the material is made so that the portion of the material on the side to be subjected to the second unwrinkling treatment may be positioned on the side of a drawing direction with respect to the portion subjected to the first unwrinkling treatment. This first unwrinkling treatment is made on such a portion to be unwrinkled in the material as is located on the side of a larger drawing depth for the predetermined shape. On the other hand, the second unwrinkling treatment is made on such a portion to be unwrinkled as is located on the side of a smaller drawing depth.
US08850863B2 Electric wire or cable
There is provided an aluminum-alloy material having sufficient electric conductivity and tensile strength as a wiring material and excellent in wire-drawing property, and an electric wire or cable using the same. An electric wire or cable includes an aluminum-alloy strand formed of an aluminum-alloy including Fe: 0.1% by mass or more to less than 1.0% by mass, Zr: 0 to 0.08% by mass, Si: 0.02 to 2.8% by mass, at least one of Cu: 0.05 to 0.63% by mass and Mg: 0.04 to 0.45% by mass, and the remainder being aluminum and unavoidable impurities.
US08850861B2 Method and device for producing a circularly cylindrical body, which consists of deformable material, with internally disposed helical recesses
The invention relates to a method for producing a circular cylindrical body (10) comprising a workable mass, having at least one helical internal cavity extending in the interior of the body. The body (10) is initially produced with a straight internal recess, for example by means of extrusion. Afterwards the body is cut to a defined length. The body (10) that has been cut to length is then subjected to a rolling process by means of a friction surface arrangement (23) while being supported over the entire length thereof on a support means (16). The rolling process takes place in multiple steps, wherein a rolling movement using a first axis of rotation (25) is performed in a first step, and a rolling movement using a second axis of rotation (26) that is different from the first axis of rotation is used in a second step. The invention also relates to an apparatus for performing the method.
US08850860B2 Method of controlling operation of tandem rolling mill and method of manufacturing hot-rolled steel sheet using the same
Provided is a method of controlling operation of a tandem rolling mill which enables large reduction rolling in the latter-stage stand of the tandem rolling mill necessary for manufacturing fine-grained steel, and so on. The method comprises: a step of determining a first exit-side sheet thickness in rolling a constant portion of a material to be rolled; and a step of determining a second exit-side sheet thickness in rolling a front end portion of the material, such that a pre-tightening load becomes a set value or less; the material is rolled into the second exit-side sheet thickness, until the front end portion is fed into the stands; the constant portion is rolled by the stand given a pre-tightening load into the first exit-side sheet thickness; and the second exit-side sheet thicknesses of the stands given the pre-tightening load are made larger than the first exit-side sheet thickness.
US08850858B2 Lock subassembly
A lock subassembly for a padlock includes a housing, a locking element, and a locking mechanism. The housing defines an internal cavity and at least one shackle bore isolated from the internal cavity. The locking element is disposed in a first portion of the internal cavity and extends beyond an upper surface of the housing. The locking element is movable between a locked position for interlocking engagement with a shackle and an unlocked position for releasing the shackle. The locking mechanism is disposed in a second portion of the internal cavity and is operable between a locking condition securing the locking element in the locked position and an unlocking condition permitting movement of the locking element to the unlocked position.
US08850857B2 Detacher for a security device
Systems, methods, and apparatuses for a detacher for a security device are disclosed. The detacher (180c) includes a magnet (1820) that can be moved relative to a housing (1810) by a motor (1830). Magnet and motor are mounted inside the housing.
US08850856B2 Apparatus and method for using a dispensing system utilizing a Venturi component
An apparatus is provided herein. The apparatus includes, a clothes basket rotatable about an axis, a motor coupled to the clothes basket, an additive tank, a Venturi component comprising a hole connecting to a water inlet, a hole connecting to the additive tank, and a hole connecting to the clothes basket, a first valve, a second valve, and a processor coupled to the first valve and the second valve, the processor being operative to carry out a dispensing phase of the apparatus, wherein the dispensing phase comprises dispensing additive to the clothes basket, and carry out a self-cleaning phase of the apparatus, wherein the self-cleaning phase comprises washing the additive tank.
US08850853B2 Knitting machine, particularly with a high gauge
A knitting machine comprising a needle holder, which supports a plurality of needles which can be actuated with an alternating motion along their axis and means for guiding the needles on the needle holder which comprise channels for forming knitting which are defined proximate to the end of the needle holder and sliding channels which are defined on the needle holder in a region that is spaced from the end of the needle holder, each one of the channels for forming knitting being engageable by a needle and defining with its inlet, which is directed toward the outside of the needle holder, resting contact regions for the knitting during the retracting motion of the needles, the number of the sliding channels being smaller than the number of the channels for forming knitting.
US08850849B2 Liquefied natural gas and hydrocarbon gas processing
A process for recovering ethane and heavier hydrocarbons from LNG and a hydrocarbon gas stream is disclosed. The LNG feed stream is divided into two portions. The first is supplied to a fractionation column as a first upper mid-column feed. The second portion is heated while condensing a portion of a column distillation stream, thereby producing a “lean” LNG stream and a reflux stream. The reflux stream is supplied as top column feed. The second portion of LNG feed is heated further and supplied to the column as a first lower mid-column feed. The gas stream is divided into two portions. The second is expanded, then both portions are cooled while vaporizing the lean LNG stream and heating another portion of the distillation stream. The colder first portion is supplied to the column as a second upper mid-column feed, and the second is supplied as a second lower mid-column feed.
US08850848B2 Apparatus for sectioning histological samples having a spiral-shaped capillary tube
The invention relates to an apparatus (10) for sectioning histological samples, which encompasses a sectioning unit (18), a sample holder (14), and a drive unit (16) for moving the sample holder (14) relative to the sectioning unit (18) in order to section the sample (12). Also provided is a cooling unit (20), for cooling at least a sub-region of the sample holder (14), which encompasses a compressor for compressing a refrigerant, a capillary tube (25) for delivering the liquefied refrigerant from the compressor (22) to the sample holder (14), and a return line (28) for returning the refrigerant from the sample holder (14) to the compressor (22). At least a sub-region (32) of the capillary tube (25) is embodied in a spiral shape.
US08850846B2 Keg apparatus for self cooling and self dispensing liquids
A self-cooling and self dispensing beverage container in the form of a keg which includes a heat exchange unit having a plurality of segments of compressed carbon disposed therein. A valve is secured to a tube attached to the REU housing for carbon dioxide to adsorbed and then desorbed by the carbon for cooling the beverage. A dispense gas canister is disposed within the container to automatically release carbon dioxide to maintain a pressure head within the container sufficient to assure dispensing of the beverage.
US08850842B2 Refrigerator
A refrigerator including a refrigerating chamber formed at an upper portion of a refrigerator body and a freezing chamber formed at a lower portion of the refrigerator body, the refrigerator comprising an ice-making chamber partitioned from the refrigerating chamber by insulating walls, the ice-making chamber containing within it an icemaker and an ice storage area.
US08850841B2 Refrigerator
A refrigerator including a refrigerating chamber formed at an upper portion of a refrigerator body and a freezing chamber formed at a lower portion of the refrigerator body, the refrigerator comprising an ice-making chamber partitioned from the refrigerating chamber by insulating walls, the ice-making chamber containing within it an icemaker and an ice storage area.
US08850827B2 Control valve with radial seals
A control valve is provided that includes a valve body, a valve element, a first radial seal, and a second radial seal. The valve body forms an inlet, an outlet, and a fluid flow passage therebetween. The valve element is disposed at least partially within the valve body, and is movable between at least a closed position and an open position. When the valve element is in the closed position, fluid is restricted from flowing through the fluid flow passage. When the valve element is in the open position, the fluid is allowed to flow through the fluid flow passage. The first radial seal is disposed against the valve body at a first distance from a centerline of the control valve. The second radial seal is disposed against the valve body at a second distance from the centerline, the second distance being greater than the first distance.
US08850826B2 Carbon capture with power generation
A gas turbine power generation system having a carbon production apparatus and a carbon fuel cell to generate electricity. The carbon production apparatus is functionally connected to the fuel cell to provide carbon to the fuel cell to generate electricity. The system is configured to power the carbon production apparatus with a portion of the electricity generated from the fuel cell.
US08850821B2 System for fuel injection in a fuel nozzle
A system includes a fuel nozzle. The fuel nozzle includes a hub, a shroud disposed about the hub, an airflow path between the hub and the shroud, multiple first fuel outlets disposed on the hub, and multiple swirl vanes disposed in the airflow path downstream from the multiple first fuel outlets.
US08850820B2 Burner
A burner including a gas injector for injecting fuel into the burner for a gas turbine engine is provided. The burner is provided with a quarl, which surrounds a combustion room, at least a first channel emerging into the combustion room for providing the combustion room with air mixed with fuel, a swirler for mixing the air and the fuel located at the inlet of the channel, at least one tube for the provision of fuel at an inlet of at least one channel, wherein the tube is provided with a plurality of diffuser holes distributed along the tube acting as gas injectors for effectively distributing fuel in a flow of air passing through the channel.
US08850816B2 Power regeneration for an information handling system
The present disclosure includes a method for regenerating power in an information handling system. The method includes circulating a cooling fluid through a fluid flow loop connecting a thermosiphon, a turbine, and a condenser. The method further includes removing heat from a heated component of the information handling system, converting the cooling fluid from a liquid state to a gaseous state in the thermosiphon, and extracting energy from the cooling fluid in the gaseous state in the turbine. The method additionally includes removing thermal energy from the cooling fluid in the condenser, converting the cooling fluid from a gaseous state to a liquid state as the thermal energy is removed from the cooling fluid, and returning the cooling fluid in the liquid state to the thermosiphon. The disclosure also includes associated systems and apparatuses.
US08850804B2 Dual path SAIR for dual plane integrated exhaust manifolds
A secondary air injection or SAIR system is illustrated and described which includes a first air injection path defined by in part by a lower ditch formed in the head mounting surface of the cylinder block, and a second air injection path defined in part by a second ditch formed in the block mounting surface. The cylinder head gasket is used to separate and seal the first ditch from the second ditch. The first and second air injection paths are separate and isolated from one another such that secondary air may be selectively introduced through the first air injection path into the first exhaust leg and selective introduced through the second injection path into the second exhaust leg independent of the first air injection path.
US08850799B2 Exhaust purification apparatus for engine
Based on a fuel supplying amount in accordance with an engine operating condition, a discharge amount of a predetermined fuel component contained in exhaust gas to be discharge per unit time is estimated, and integrated by an accumulation amount of the fuel component accumulated in an exhaust purification element. Furthermore, according to an exhaust gas temperature that flows into the element, an amount of the fuel component to be removed from the element per unit time is estimated, and the amount is subtracted from the accumulation amount. When the accumulation amount is equal to or greater than a predetermined value, a determination is made that a timing to forcefully remove the fuel component accumulated in the element has arrived. Then, an alarming lamp is lightened, and a forceful removing processing is performed by raising a temperature of the exhaust gas above a temperature at which the fuel component is removed.
US08850795B2 After-treatment apparatus for exhaust gas right after a combustion chamber
Provided is an after-treatment apparatus for exhaust gas right after a combustion chamber, which apparatus comprises a discharge device with an electrode exposed to an exhaust port installed in a cylinder head, an antenna installed on the back face of a valve head, an electromagnetic wave transmission line installed in a valve stem with one end connected to the antenna and the other end, covered with an insulator or dielectric and extending to and connected to a power-receiving portion, which is positioned at a location fitting into the guide hole or at a location farther from the valve head in the valve stem, and an electromagnetic wave generator for feeding electromagnetic waves to the power-receiving portion. The after-treatment apparatus is configured such that discharge is generated with the electrode of the discharge device and electromagnetic waves fed from the electromagnetic wave generator through the electromagnetic wave transmission line are radiated from the antenna.
US08850793B2 Turbine section of high bypass turbofan
A turbofan engine is disclosed and includes a fan and a compressor in communication with the fan section, a combustor, a turbine and a speed reduction mechanism coupled to the fan and rotatable by the turbine. The turbine includes a first turbine section that includes three or more stages and a second turbine section that includes at least two stages. A ratio of airfoils in the first turbine section to a bypass area is less than about 170.
US08850792B2 Microfluidic electrospray thruster
An electrospray thruster and methods of manufacturing such thrusters are provided. The micro-electrospray thruster increases the thrust density of conventional electrospray thrusters by miniaturizing the individual components of the thruster thereby allowing for the increase in the number and density of the charged particle emitters.
US08850788B2 Burner including non-uniformly cooled tetrahedron vortex generators and method for cooling
The burner (1) for a gas turbine includes a duct (2) housing a plurality of tetrahedron shaped vortex generators (3) and a lance (4) to inject a fuel to be combusted. Within the duct (2), a plurality of vortex generators (3) are provided with a plurality of holes (9) for injecting cooling air. The cooling holes (9) define passing through areas that are non-uniformly distributed on a top wall (11) of the vortex generators (3). A method for locally cooling a hot gases flow passing through a burner includes non-uniformly injecting cooling air from a vortex generator into the hot gas flow in the duct, which can reduce the occurrence of flashback in the burner.
US08850786B2 Systems and methods for intermittently colored yarn
Intermittently colored yarns having an intermittent and random dye spacing pattern, and systems and methods of making the same, are disclosed. Such intermittently colored yarns exhibit higher quality and lower manufacturing costs over the known intermittently colored yarns. The intermittent coloring takes place while the yarn is in caterpillar form. Carpets made from such intermittently colored yarns exhibit enhanced aesthetics over carpets made from known intermittently colored yarns. Alternatively, a stain resist, colorless base dye, or bleaching agent can be applied in the same intermittent and random spacing pattern to the intermittently colored yarns prior to subsequent dyeing. This creates a mirror image like color effect to the resulting yarn.
US08850779B2 Ice bagging system
An ice bagging system includes an ice maker unit, an ice bagger unit, and an ice storing unit. The ice bagger unit includes a sheet of ice bags disposed on a bag roll, the sheet of ice bags is threaded through a plurality of guide rollers, a pinch roller assembly, and a sealing jaw assembly. The pinch roller assembly includes first and second pinch roller wheels that are axially movable inwardly and outwardly to selectively open or close an individual ice bag in the sheet of ice bags.
US08850778B2 Method and apparatus for bag closure and sealing
A method and apparatus for sealing a bag made of a polymeric material by applying heat activated layers on different portions of the bag, wherein the first adhesive layer and the second adhesive layer have respective heat activation temperatures below the softening point temperature of the polymeric material; after creasing the bag along a fold line, applying heat at a temperature below the softening point temperature of the polymeric material to activate the first adhesive layer and the second adhesive layer to adhesive states after the bag has been filled with contents; and folding the bag to form an adhesive-to adhesive seal by contact between the heat activated first adhesive layer and the heat activated second adhesive layer.
US08850775B2 Non-welded coping caps and transitions
A design and fabrication technique whereby a coping cap and/or transition can be supplied with mitered corner sections and other transitional components which utilize the identical prefinished or bare sheet metal material(s) without any reliance on exposed mechanical fasteners, welding, soldering, or post-applied paints. This is essentially accomplished by joining the prefinished sheet material(s) together using a mesh screen and adhesive on the underside (non-exposed) face of the sheet material(s).
US08850774B2 Truss hinge for a stage truss
A truss hinge that includes a number of different labeled parts, where connections between the two different parts can constrain the truss to different angles.
US08850769B2 Floorboards for floating floors
Floorboards for making a floating floor, which floorboards have a core having at least two layers of material arranged at different distances from the surface layer, which differ with respect to at least one of the parameters of composition of materials and material properties.
US08850768B2 Floor panel with soft/resilient wear layer
The invention relates to a floor panel comprising a carrier layer, a wear layer made of a soft/resilient material, and at least two opposite pairs of locking edges, where at least the locking edges of one pair are designed as form-fitting edges and in such a way that two floor panels can be connected by means of these formfitting edges, and where the form-fitting edges each display a horizontal locking surface which, in connected state, together counteract separation of the floor panels in a direction lying in the floor plane and perpendicular to the form-fitting edges, where each form-fitting edge displays a joint-sealing area in the area of the soft/resilient wear layer, and where the horizontal locking surfaces and the joint-sealing areas are coordinated in such a way that, in connected state of two floor panels, initial compression of the joint-sealing areas against each other can be produced and, as a result, a tightly sealed joint in the area of the soft/resilient wear layer.
US08850767B2 Channel screed
A channel screed comprises a first member having an internal channel defined by opposed walls extending from a base. The first member includes ribs within the internal channel that accommodate placement of a second member thereon. The first member having surface features that cooperate with surface features of the second member to provide an attachment therebetween. The first member includes fins projecting outwardly from the opposed walls to provide both an indication of building material thickness, and a mechanical attachment therewith. The second member covers the first member internal channel to provide a desired aesthetic appearance to the installed channel screed. The second member comprises a base with opposed walls, and includes flanges projecting from top edges of the opposed wall surfaces. When attached to the first member, the flanges cover up the internal channel, and the interface between the first member and the building material.
US08850765B2 System of direct fusible anchoring for a support post of a security barrier or parapet in rigid ground
The present invention relates to a device for the anchoring in rigid ground such as decks or floors made of concrete, asphalt, rock etc., for support posts for safety barriers and parapets, by means of bolts partly embedded in the ground and fixed to same by chemical or mechanical means, whose emergent part successively traverses the anchor plate of the post of the barrier, one or more washers and closure nuts which are what fix the bolt to the anchor plate. The washers present the capacity to behave as fusible elements which, in the event of a vertical load due to traction greater than a defined value, are deformed and traversed by the closure nut which, once released from the washer, traverses the corresponding hole of the anchor plate, which is of a size greater than that of the closure nut, with the union between the plate and bolt thus becoming decoupled.
US08850764B2 Structure anti-torsion system and device, and method of use providing compression and tension support
A structure anti-torsion device includes a structural column. The structural column is positioned between adjacent studs of a structural stud wall construction and oriented vertically between the studs. A structural column lower end is fastened to a lower base plate which rests on a wall construction bottom plate. A pair of anchor bolts secured to a foundation extends through the bottom plate and the lower base plate and are fastened to the lower base plate. A structural column upper end is bolted using first and second bolts to an upper base plate. The first and second bolts cooperate through the upper base plate to connect the upper base plate to a double top plate of the wall construction such that the double top plate is connected by the upper base plate, the structural column, and the lower base plate to the foundation.
US08850763B2 Super unitized post tension block system for high high strength masonry structures—with SuperStrongBloks
An improved, high strength construction system that uses post tensioning. It is comprised of a series of interconnected, super heavy duty hollow core blocks 102 with minimal ducts 103, a series of tendons 105, and a plurality of anchors or plates 104 with additional features. The system 101 is configured with the plurality of adjacent blocks 102 contiguous and touching one another and demountably coupled to each other by means of the tendons 105 and anchors 103. The unique features include a strong, durable full plate 104 and bolt 105 both of which may be treated for corrosion resistance. This new coupling results in a structure that is far stronger than an ordinary block structure built with mortar and standard reinforcing. The SYSTEM has more predictable and controlled strength which is stronger than most reinforced concrete systems.
US08850761B2 Structural design with rear-ventilated cladding elements
A structural design is proposed, comprising rear-ventilated cladding elements (1), in particular plates or boards, which can be hung in front of a supporting framework (2), in particular consisting of vertical support elements and horizontal bearing elements, wherein the cladding elements are each assigned a frame (3) which spans a rear-ventilation cross-section (4) and the upper and lower frame leg profiles (5, 6) of which have ventilation openings (8) leading to the front (7) of the cladding. In order to provide advantageous rear-ventilation conditions it is proposed that at least the upper frame leg profile interior (12) is assigned a splash guard (13) which is arranged in the manner of a labyrinth seal, adjoins the frame leg profile below the ventilation openings (8), covers the ventilation openings (8) and preferably faces with the free end thereof towards the front (7) of the cladding.
US08850758B1 Granular material storage capacity increasing device and system
A granular material storage capacity increasing device and system includes a housing including a plurality of roof trusses each including an inner chord. A plurality of panels is attached to the roof structure. Each of the panels extends between and is attached to adjacently positioned ones of the inner chords. Each of the panels is elongated and has a first end, a second end, an upper edge and a lower edge. An upper bend is positioned adjacent to the upper edge and defines an upper flange including the upper edge. A lower bend is positioned adjacent to the lower edge and defines lower flange including the lower edge. A primary bend is positioned between the upper and lower bends. The upper and lower flanges are attached to the inner chord. The primary bend is spaced further from the inner chord than the upper and lower bends.
US08850754B2 Molded solar panel racking assembly
The present invention comprises a stackable ballasted roof mounting solar panel mount unit integrally formed into a single piece. The mount unit comprises a plurality of generally elevated side walls of a ballast receiving basket. Each side walls defines a downwardly facing open channel that is configured to receive a corresponding side wall from a corresponding solar panel mount in a stacking relation. The mount unit further comprises a first pair of posts, wherein each of the first pair of posts forms a downwardly facing post receiving first mouth that is configured to receive a corresponding post from a corresponding first pair of posts of a corresponding solar panel mount in a stacking relation.
US08850753B2 Apparatus for establishing a paver surface over a subsurface
Disclosed is an improved assembly for facilitating the elevated and leveled placement of a paver surface. Yet further disclosed are related methods of using the assembly.
US08850752B1 Hybrid sealed attic insulation and ventilation system
A sealed attic insulating and roof ventilating system has a receiver (lath) material attached to adjacent pairs of rafters and an insulation material secured to the lower surface of the receiver material. This arrangement creates an uninterrupted plenum between the receiver, rafters and roof decking through which air can circulate from the lower roof vents to the upper roof vents. The circulation of air through the plenum prevents moisture from accumulating or condensing under the roof decking and warping the decking, which ultimately leads to deterioration of the decking and failure of the roof covering. This air circulation also eliminates ice damming on the top surface of the roof covering.
US08850748B2 Cable feed device on a vehicle door, or flat cable connection
The invention relates to a cable feed device for a flat cable, or a flat cable connection, respectively, on a vehicle door, wherein the flat cable is provided being extended between the vehicle door that can be moved relative toward a vehicle chassis and the vehicle chassis, or along a component, respectively, which is substantially firmly attached to the vehicle chassis, wherein at least one seal is disposed between the vehicle door and the vehicle chassis, or the component, respectively, and further wherein the flat cable is disposed in a feed through of the seal between the seal and the vehicle door in a closed state of the vehicle door.
US08850747B2 Door with closing profile and integrated ventilation
The present invention relates to a door assembly comprising two opposite members, at least one of which being a rotatable door, and a closing system which is provided for being mounted to one of the opposite members, wherein the closing system comprises a holder profile, at least one engaging member for engaging a complementary edge part on the opposite member to maintain the door in closed position, the engaging member being at least partly elastically deformable to enable opening of the door in at least one direction, and a blocking member with which the opening of the door can be prevented in one direction or the other, wherein the engaging and blocking members are formed by mutually exchangeable strips which are to different extents compressible and which are releasably mountable to the holder profile of the closing system.
US08850741B2 Device for controlling pests
The invention relates to an apparatus for pest control comprising a hollow station (150) forming at least one entrance (160, 165) for the pests to be controlled and a harborage area inside the station; a reservoir for water (100) providing access to water from the inside of said hollow station (150); and a contact pesticide (170) for the pests to be controlled, said contact pesticide (170) being provided inside said hollow station (150) in such a way that pests which enter the hollow station (150) through said at least one entrance (160, 165) to come to the reservoir for water (100) or the harborage area come into contact with said contact pesticide (170).
US08850723B2 Article of footwear having an upper with a matrix layer
Articles of footwear, including athletic footwear, include one or more of: (a) a sole structure; (b) an upper having lateral and medial side elements engaged with the sole structure, the upper made from a polymer matrix structure that extends through at least a heel region; (c) a size adjustment mechanism located at the heel region; (d) a heel tongue element located adjacent the size adjustment mechanism; (e) a shoe securing mechanism; (f) an instep tongue member; and/or (g) a bootie member located at least partially within the foot-receiving chamber. Methods of manufacturing such articles of footwear also are disclosed.
US08850720B2 Sports boot
A sports boot including an upper extending above the ankle joint and at least one rigid collar extending around the wearer's lower leg, the boot including a device for adjusting the volume of the collar to better accommodate the shape of the user's calf. The adjustment device includes a wedge, or collar extension, positioned inside the collar, the wedge being fixed to the collar by means of at least one pivot and by means of a fastening mechanism enabling the relative displacement of the wedge with respect to the collar as well as a deformation of the wedge. The fastening mechanism includes a plate equipped with a cylindrical body having an axis A1 and received in a first circular opening provided in the collar and a rivet received in a second circular opening provided in the wedge and received in a third circular opening having an axis A2 provided in the body, the axis A2 and the axis A1 being non-coaxial. The wedge is fixed by means of a first pivot and a second pivot, which are positioned on respective sides of the collar so that an axis Ap1 of the first pivot and an axis Ap2 of the second pivot are located on a first, substantially horizontal plane P1 and so that the fastening mechanism is not fixed on the first plane P1.
US08850713B2 Hand drying device
A hand drying device includes: a drying chamber; a nozzle; a supply unit; a hand detection sensor; a control unit; and an illuminating unit. The drying chamber includes: an opening; a first inner wall surface; and a second inner wall surface facing the first inner wall surface. A hand is inserted from the opening into a space between the first inner wall surface and the second inner wall surface. The nozzle is arranged on the first inner wall surface and is configured to blow an air stream toward the second inner wall surface. A center axis of the nozzle and an optical axis of the illuminating unit intersect with each other at a proper position in the drying chamber where a hand is supposed to be inserted.
US08850711B2 Mounting device of a length measuring system
A mounting device for mounting a length measuring system extending in a measurement direction, the mounting device including a basic body, a steadying device attached to the basic body and a retainer attached to the basic body. A length measuring system that extends in a measurement direction is fixable on the basic body by clamping between the steadying device and the retainer, wherein the basic body and the retainer are embodied for guiding the retainer on the basic body longitudinally in a manner fixed against relative rotation in a direction of the steadying device by an adjusting element.
US08850710B1 Interconnectable construction level system
The present invention is a construction level system having interconnectable level sections and attachments that can be stored in a carrying bag. Each level section has a construction level and a pair of locking mechanisms that enable interconnections to other level sections or attachments. The locking mechanisms have mating profiles and a locking lever that enable a user to securely mate the locking mechanisms of different level sections together. The carrying bag has pockets sized to the level sections. The bag further comprises a carrying strap and a plurality of compartments for retaining small objects such as pencils and tools.
US08850706B2 Method of manufacturing a well screen
An expanded non-bonded mesh well screen. A method of manufacturing a well screen includes the steps of: expanding at least a portion of a screen jacket; and then securing the screen jacket onto a base pipe. A well screen system includes a base pipe and an at least partially expanded screen jacket surrounding the base pipe. The screen jacket is expanded prior to being positioned on the base pipe.
US08850705B2 Processes for producing exhaust gas manifolds
A process for producing exhaust gas manifolds is provided, which have a flange for fastening to the cylinder head of an internal combustion engine, manifold pipes for leading off the exhaust gases flowing from the cylinders, and a pipe connector, wherein the pipe connector has openings for the manifold pipes. In accordance with the invention, the pipe connector is designed with reinforced openings. Then the ends of the manifold pipes are introduced into the openings and expanded. In this process, the pipe ends undergo plastic deformation, and the pipes are connected gas-tight.
US08850699B2 Method of forming a land grid array with discrete pads
A land grid array (LGA) and a method of forming the LGA are disclosed. The method comprises plating a printed circuit board to form a grid array of copper pads, and soldering a discrete pad over each of the plated copper pads in the grid array. The discrete pad is a solid object that can be handled and positioned independent of other discrete pads. Optionally, the method may further comprise measuring variations in flatness of the printed circuit board as a function of location in the grid array, and selecting individual discrete pads that each have a thickness selected for use at a particular location in the grid array so that the discrete pads provide a locus of exposed surfaces having greater flatness than the printed circuit board.
US08850697B2 Method for manufacturing a radiation imaging panel comprising imaging tiles
An automatic or semiautomatic method of assembly of radiation digital imaging tiles to form a one or two dimensional imaging panel whereby the imaging tiles are provided with alignment mark(s), inherent or specific, and a mother board or substrate is also provide with alignment mark(s) and the imaging tiles are mounted on the mother board by means of mechanical pick and place mechanism, whereby the distances of corresponding alignment mark are set to predetermined values, programmed in the automatic machine.
US08850692B2 3-dimension fiber structures for composites and interfaces
A sheet article, the sheet article including a substrate, a plurality of fasteners on at least a portion of one surface of the substrate, and a cover, at least partially covering the plurality of fasteners, wherein the cover at least partially protects the plurality of fasteners and prevents the plurality of fasteners from engaging other fasteners or pressing down and wherein the covered fasteners can be exposed or the cover can be removed if need.
US08850689B2 Method for manufacturing switchable particle-based display using a pre-filling process
A method for manufacturing a switchable particle-based display is provided, which includes steps of: providing a substrate having a grid structure thereon to define a plurality of cells; providing a template having a plurality of template ribs thereon to define a plurality of compartments corresponding to the plurality of cells; filling a plurality of display particles into the plurality of compartments on the template; transferring the plurality of display particles from the plurality of compartments on the template to the plurality of cells; and removing the template and mounting an opposite substrate over the substrate.
US08850687B2 Method of making a sensor
A thin film sensor, such as a glucose sensor, is provided for transcutaneous placement at a selected site within the body of a patient. The sensor includes several sensor layers that include conductive layers and includes a proximal segment defining conductive contacts adapted for electrical connection to a suitable monitor, and a distal segment with sensor electrodes for transcutaneous placement. The sensor electrode layers are disposed generally above each other, for example with the reference electrode above the working electrode and the working electrode above the counter electrode. The electrode layers are separated by dielectric layer.
US08850686B2 Method for patterning surface of metal object and the metal object
On the surface of the spread multi-layered metal object, as reaches from outside to inside of step-wise, the pattern shaped concave is formed by reaching the lower layer of metal layer of the metal layer. The concave is formed as step-wise, the innermost reaches inside of the metal layer from the surface, the outer reaches the top of the metal layer from the surface, and the outermost reaches the top of the metal layer. The metals removed to form the concave remains inside and effectively control on the pattern part obtained at the end. As a result, able to form desired pattern stably.
US08850685B2 Method for delivering fasteners via an intermediate buffer
Fastener delivery apparatus for automatically selecting and delivering fasteners such as rivets to a setting tool. The fasteners are pre-loaded in a package and dispense via at least one fastener delivery tube that interconnects the setting tool to a fastener feeder device. The fastener feeder device releases selected fasteners from the package into the delivery tube. The fasteners are transportable individually or in groups in the tube from the feeder device to the tool. A transfer station attached to the tool or the delivery tube transfers a fastener from the delivery apparatus into the tool, transfer station is adjacent to the tool so that a delivered fastener may be inserted by the transfer station into the tool and a second position in which it is clear of the tool so as to permit the tool or a portion thereof to move towards a workpiece to insert a smooth, rapid and reliable delivery of fasteners of various sizes and types to the nose of a setting tool in any particular order and provides all the fastener types for any particular work cycle.
US08850684B2 System and method for crimping body lumen filters
As described herein, a body lumen filter is provided that includes a body configured to move between a pre-deployed state and a deployed state, a filtering structure operatively associated with the body to filter particulates, and a blending structure operatively associated with the body. The blending structure can be configured to break up at least one of the particulates.
US08850682B2 Removal of components from aircraft
A method of removing a component from an aircraft includes attaching a device comprising a guide member to the aircraft; attaching the component (such as an actuator) to the guide member; detaching the component from the rest of the aircraft; and moving the guide member so that the component follows a predefined path of removal of the component. A device for use in such a method is also described.
US08850676B2 Guidewire loading tool for a catheter
A removable guidewire funnel tool aids in backloading a catheter onto a guidewire. The guidewire funnel tool includes a pliable loading coupler having a lumen therethrough. The lumen has a tapered distal section that serves to receive a guidewire and a tapered proximal section that receives and couples with a correspondingly tapered distal tip of the catheter. The guidewire funnel tool has a longitudinal slot or area of weakness along the entire length of the loading coupler and a grip tab to enable easy removal of the guidewire funnel tool after the guidewire lumen of the catheter is loading with the guidewire.
US08850675B2 Fastening devices and systems and methods thereof
Fastening devices and systems and methods thereof. Fastening devices and systems and methods thereof can include a unitary or one-piece body having first and second ends configured and operative to be coupled together or to be coupled to their respective complement in another of said fastening devices. The first end can include a ring or annular portion and a projection that are sized and shaped to fit around an anchor and in an orifice, respectively, of the second end. Fastening devices and systems and methods thereof according to embodiments may be used with items, including footwear, apparel, luggage, a backpack, a bag, a purse, a boxing glove, a punching bag, football or lacrosse shoulder pads, or the like.
US08850674B1 Nut plate for pierced earrings
A novel pierced earring for pierced ears which includes a rear plate attached to the pin, the rear plate forming the nut and having a peripheral shape approximating that of the rear portion of the lobe of the ear to provide substantial bearing surface against the rear of the lobe.
US08850668B2 Curtain bead chain fixing device
A curtain bead chain fixing device includes a bead chain guide way through which a bead chain as a pull cord for controlling a curtain is extended and thereby becomes connected to the fixing device, and an elastically movable interfering element being normally pushed into the bead chain guide way to interfere with the free movement of the bead chain in and along the bead chain guide way. When the fixing device is adequately mounted to a wall surface according to specified installation procedures, the interfering element is forced out of the bead chain guide way to release the bead chain therefrom. Therefore, a user of the curtain is urged and guided to adequately mount the fixing device to hold the bead chain in place, and undesired accidents caused by a swinging bead chain can be avoided.
US08850667B2 Garment fastening systems
A garment fastening system having a button member adapted to be inserted into a buttonhole of a garment. The button member has a front wall, a rear wall and a side wall disposed therebetween. The button member defines an aperture that is extending from a portion of the rear wall and a portion of the side wall, and an internal chamber in communication with the aperture. The garment system also has a resilient member extending, through the aperture and having two opposite ends that are connected to the internal chamber thereby defining a loop at least partially extending outside the button member and adapted to receive a button of the garment. The aperture is dimensioned for allowing movement of the resilient member. The garment fastening system can be used for providing elasticity to a garment by simply connecting it to existing button and buttonhole.
US08850664B2 Hose clamp
A hose clamp includes a body elastically deformable between a closed-diameter state and an opened-diameter state, a first grip piece, a second grip piece, a lock portion located on either the first or second grip piece, a lock receiving portion located on the other grip piece side and elastically displaced together with the lock portion when the grip pieces are caused to come close to each other, thereby being locked to the lock portion by a subsequent return operation. The lock receiving portion holds the body in the opened-diameter state when in a locked state, and a restricting portion is capable of restricting displacement of both grip pieces in reverse of the direction of the elastic displacement. Either the first or second grip piece formed with the restricting portion has a distal end located lower than a distal end of the other grip piece when the body is in the closed-diameter state.
US08850663B2 Clamp ring design
A clamp ring and process for manufacturing a clamp ring to effectively reduce, if not eliminate, waste scrap from the manufacturing process. The clamp ring and process for manufacturing the same, results in clamp ring having a seam formed by a metal joining technique such as welding, brazing, bolting, soldering, and clinching.
US08850655B2 Bronze bushing and wear surface
A bushing includes a bronze backing layer having a first axial end, a second axial end, and a central opening, the bushing having a cylindrical shape and a porous bronze layer. PTFE or other suitable low friction material is impregnated into the porous bronze layer at one of a radially inner or outer surface of the bushing. A PTFE or other suitable low friction material topical layer is disposed adjacent the impregnated layer. The bushing may optionally comprise a flange which also includes the bronze backing layer, the porous bronze and impregnated layer, and the topical layer on an axially inner or outer surface.
US08850652B2 Cosmetic brush handle covers
Covers for covering a handle of a cosmetic brush are disclosed. The covers may include a suction cup fixed in a wall of the cover. The covers may be softer than a handle of the cosmetic brush. The covers may have an open end opposite a closed end, or a first open end opposite a second open end. In embodiments where the covers have a first open end opposite a second open end, the covers may be displaced, while remaining coupled to a handle of the cosmetic brush, from a first position covering a group of bristles of the cosmetic brush and exposing the handle of the cosmetic brush to a second position exposing the group of bristles and covering the handle. By virtue of having a suction cup fixed in the wall of the cover a user may removeably couple the cosmetic brush to a smooth surface.
US08850651B1 Mop head and handle
A mop head and handle combination includes a block of substantially rigid foam material with a cylindrically shaped cavity in the interior that extends the length thereof. An elongated slot in said top wall extends downwardly and communicates with the cavity. The width of the slot is less than the diameter of the cavity. The handle includes a vertical pole with a horizontal bar connected to the bottom end forming a T configuration. The handle can be connected to the mop head by aligning the bar with the slot and pushing down on the pole to force the bar through the slot and into the cavity. The portions of the block around the slot flex out of the way to allow the bar to pass therethrough and then flex back to their normal position to maintain the bar in place within the cavity.
US08850649B2 Cleaning tool with upstanding stems and method of cleaning a surface
The present disclosure relates to a cleaning tool, a cleaning sheet and method of removes debris, lint, or hair from a variety of surfaces. The cleaning tool is provided with a first array of stems and a second array of stems, wherein the first array of stems are smaller and more densely included on a cleaning surface of the cleaning tool. The larger stems are able to loosen and pull deeply embedded hair from loose fabric surfaces, while the smaller stems are able to capture and retain the loosened hair.
US08850642B2 Support device and methods
A support device such as a head support is disclosed. The head support has a frame configured for arrangement between collapsed and assembled dispositions. The head support may also have a pad and/or a cushion. In an example, the frame includes a base, a front riser, a support and a rear riser. After assembly, the central plane of the front riser is configured at an angle relative to the central planes of the base and the support, and may be substantially parallel with the central plane of the rear riser. To prepare the head support for transport, the central plane of the base can be configured substantially parallel to central planes of the front riser, the support, and the rear riser.
US08850639B2 Siderail latching mechanism
A latch mechanism for a siderail assembly comprises a handle, a link assembly, and a pin. The handle is configured to be moved between a first position and a second position. The link assembly is coupled to the handle and configured to move between a latch position and an unlatch position as a function of the movement of the handle. The pin is configured to be engaged by the link assembly and is configured to rotate from a first rotational orientation to a second rotational orientation to disengage the link assembly from the pin when a false latching condition occurs.
US08850637B1 Counterbalancing assembly for folding furniture
A counterbalancing assembly for an article of folding furniture comprises at least one piston extending between a support assembly and a furniture component, said piston being biased to resist a downward force of gravity acting on the furniture component. An upper mounting bracket secures a first end of the piston to the support assembly, and a lower mounting bracket secures a second end of the piston to the furniture component. One or both of the upper and lower mounting brackets includes a worm gear and a mounting element that is threaded onto the worm gear. Each such mounting element has a portion adapted to engage a complementary fitting defined by a respective end of the piston, such that rotation of the worm gear causes a corresponding linear movement of the mounting element, and thus, linear movement of the respective end of the piston.
US08850634B2 Apparatus and system for turning and positioning a patient
A device for use with a bed having a frame and a supporting surface includes a flexible sheet with a tether strap connected to the sheet and extending from the sheet. The flexible sheet has opposed top and bottom surfaces, with the top surface having a high friction material with a higher coefficient of friction as compared to the bottom surface, which includes a low friction material. The tether strap is configured for connection to the frame of the bed to secure the sheet in place. A system incorporating the flexible sheet may also include an absorbent pad configured to be placed on the top surface of the sheet, where the high-friction top surface resists sliding of the absorbent pad, as well as one or more wedges having a base wall that the wedge rests on and a ramp surface configured to confront the sheet when the wedge is placed under the sheet. The base wall and the ramp surface may also contain high friction and low friction materials, respectively.
US08850632B2 Bathing enclosure with easy to assemble components
A method for assembling a bathing enclosure includes providing a base on a support, the base having an upper rim. The method includes providing a first wall on the upper rim of the base, providing a second wall in pivotable engagement with the first wall at upper portions thereof, and pivoting the second wall relative to the first wall to mount the second wall on the upper rim of the base.
US08850629B2 Plumbing fixture seat
A seat for a plumbing fixture includes a substantially rigid base and a cushion. The base includes an upper surface and an underside. The cushion is coupled to the base and includes a radial inward edge and a radial outward edge. At least one of the inward and outward radial edges includes a flange extending toward the other of the inward and outward radial edges, and a portion of the base is positioned above the flange to secure the cushion to the base. A lowermost portion of the at least one of the inward and outward radial edges of the cushion is flush with the underside of the base.
US08850621B2 Leg-worn storage device
There is a leg-worn storage device configured to store objects about a leg of a user. The device includes a cylindrical band of two-way elastic fabric. The cylindrical band includes an interior layer of two-way elastic fabric having a friction enhancing texture layer protruding therefrom and penetrating thereinside. The cylindrical band includes an exterior layer of two-way elastic fabric coupled to the interior layer. The cylindrical band includes a pocket formed between the interior layer and the exterior layer; wherein the pocket is selectably accessible from an exterior of the cylindrical band this permitting the storage of objects. The cylindrical band includes a first end region selectably coupled to a second end region. The cylindrical band includes a mating coupling device disposed at each of the first end region and the second end region and configured to selectably couple the first end region to the second end region.
US08850619B2 Technical garment
A technical pant garment 10 having an inner short 11 and an outer short 12. The inner short 11 is formed to tightly fit a wearer of the garment 10 and the outer short 12 is connected to the inner short 11 to fit loosely about the inner short 11. The inner short 11 is constructed to impose on or more leads on the wearer which act to affect the posture of the wearer in a manner tending to cause the wearer who has adopted an incorrect posture to realign towards a correct posture.
US08850614B1 Garment liner
Special articles are fashioned as undergarments of a very brief nature, preferably a panty substitute. Brevity, with regard to undergarments has advantages including: comfort and ease of use, improved cooperation with outerwear and protection against soiling. The articles of the invention provide underwear function and feel. The articles are configured to be an underwear substitute without bunching, chafing, or forming visible panty lines. The underwear substitute provides comfort to the user similar to underwear without forming visible panty lines while protecting the outer garment against soiling.
US08856961B2 Processing copyright notice of media file
A method for processing the copyright notice of a media file stored in digital format in an electronic device is provided. The copyright notice of the media file is checked during data transmission between two equivalent electronic devices, and if the copyright notice is not found, action is taken to insert the copyright notice.
US08856959B2 Creating distinct user spaces through user identifiers
A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform.
US08856957B1 Federated identity broker
A federated identity system is described. A federated identity broker registers a first customer as an identity provider and a second customer as an identity consumer. The federated identity broker acts as an intermediary between the first customer and the second customer, to broker an identity request from the first customer that is fulfilled by the second customer.
US08856954B1 Authenticating using organization based information
A method is used in authenticating using organization based information. Organization based information is analyzed for information that is suitable for use in authenticating a user. The organization based information includes employee-used information. A question is derived from the organization based information. Based on the question, a process used to authenticate a user is executed.
US08856951B2 License management system and method
When hardware connected to an image forming apparatus is detected, a check is performed as to whether the hardware was used with another image forming apparatus, and, if used, a license of an application that is operated by the hardware is automatically transferred so that the application can be used in the image forming apparatus to which the hardware is connected.
US08856950B2 Mobile terminal and method of managing information therein including first operating system acting in first mode and second operating system acting in second mode
A mobile terminal including a communication unit configured to communicate with at least one external terminal; a memory configured to store at least first and second operating systems including at least first and second modes, respectively; and a controller configured to execute the first operating system, to activate the first mode, to control a display unit of the mobile terminal to display a mode configuration screen including selectable options for designating a designated mode corresponding to at least one of the first and second modes to a particular information, and to selectively restrict assigning the particular information from the designated mode to a non-designated mode.
US08856947B1 Intrusion detection and prevention processing within network interface circuitry
A network interface controller (NIC) is configured to couple a host to a network. The NIC coupled to the host via a host bus, and the host is configured to operate a plurality of virtual machines. The NIC is configured to receive at least one data frame, the at least one data frame including at least a source network address and indication of at least one destination network address; determine if the received data frame is a frame on which additional processing should occur; based on a result of the determining step, cause the frame to be provided to the host, via the host bus, for the host to perform the additional processing; and receive, via the host bus, the frame on which additional processing has been performed and steer the frame to a destination based on the at least one destination address.
US08856945B2 Dynamic security question compromise checking based on incoming social network postings
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers.
US08856943B2 Dynamic security question compromise checking based on incoming social network postings
An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers.
US08856942B2 Privacy-aware content protection system
A method and system are disclosed for preventing rendering of content at overlapping time periods on more rendering devices than permitted by a license associated with the content.
US08856939B2 Cloaking with footprints to provide location privacy protection in location-based services
A method for using a location-based service while preserving anonymity includes receiving a location associated with a mobile node, receiving an anonymity level associated with the mobile node, computing a region containing the location of the mobile node and a number of footprints based on the anonymity level, wherein each of the footprints from a different user, and providing the region to a location-based service to thereby preserve anonymity of the mobile node. A method also allow a mobile device or its user to specify the anonymity level by selecting a public region consistent with a user's feelings towards desired privacy.
US08856938B2 Unvalidated privilege cap
A method for securely accessing an executable file object includes a step in which a request from the target process to access the executable file object is received by an operating system component, and the object is examined for validity before access is allowed. For objects that cannot be validated, the process is run with privileges bounded by the privilege cap, if the privilege cap permits execution of the object.
US08856937B1 Methods and systems for identifying fraudulent websites
A computer-implemented method for identifying fraudulent websites. The method may include identifying a fraudulent-website toolkit. The fraudulent-website toolkit may be programmed for use in creating a fraudulent website. The method may also include determining a characteristic of the fraudulent-website toolkit and using the characteristic of the fraudulent-website toolkit to identify a website created using the fraudulent-website toolkit. The website created using the fraudulent-website toolkit may be identified by searching for websites that comprise the characteristic of the fraudulent-website toolkit. The website created using the fraudulent-website toolkit may also be identified by determining that a web browser is attempting to access the website. Various other methods and computer-readable media are also disclosed.
US08856933B2 Secure system for allowing the execution of authorized computer program code
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash values including those of code modules that are approved for execution on computer systems of subscribers of the service provider. A code module information query, including a cryptographic hash value of a code module, is received from a computer system of a subscriber by the service provider. If the cryptographic hash value matches one the cryptographic hash values contained within the cloud-based whitelist and the code module is an approved code module, then the service provider responds with an indication that the code module is authorized for execution; otherwise, it (i) responds with an indication that the code module is an unknown code module; and (ii) causes one or more behavior analysis techniques to be performed on the code module.
US08856924B2 Mitigating a denial-of-service attack in a cloud-based proxy service
A proxy server in a cloud-based proxy service receives a message that indicates that a domain, whose traffic passes through the proxy server, may be under a denial-of-service (DoS) attack. The proxy server enables a rule for the domain that specifies that future requests for resources at that domain are subject to at least initially passing a set of one or more challenges. In response to receiving a request for a resource of that domain from a visitor, the proxy server presents the set of challenges that, if not passed, are an indication that that the visitor is part of the DoS attack. If the set of challenges are passed, the request may be processed. If the set of challenges are not passed, the request may be dropped.
US08856922B2 Imposter account report management in a social networking system
Imposter account reports received by a social networking system are put into a report management process that routes the reports into other handling processes based upon the comparison of the probability of fraud in an alleged imposter account versus the probability of fraud in an alleged authentic account. The account determined to be most probably fraudulent is enrolled in an account verification process. In the account verification process, the account-holder is asked to verify their identity automatically. If the automatic verification fails to verify the identity of the account-holder, a manual process for verification is initiated.
US08856919B2 Authorization of server operations
An authorization device for authorizing operations of a remote server requested from user computers via a data communications network includes a computer interface configured to connect to a local user computer for facilitating communication with the remote server via a data communications network, a user interface configured to present information to a user, and control logic. The control logic is adapted to use security data accessible to the control logic to establish, via the local user computer, a mutually-authenticated connection for encrypted end-to-end communications with the server; collect from the server, via the connection, information indicative of any operation requested via a different connection to the server and requiring authorization by the user; and present the information to the user via the user interface to prompt for authorization of the operation.
US08856914B2 System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment
A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention.
US08856913B2 Method and protection system for mitigating slow HTTP attacks using rate and time monitoring
A system and methods for mitigation slow HTTP, SSL/HTTPS, SMTP, and/or SIP attacks. A protection system monitors each TCP connection between a client and a server. The protection system monitors the header request time and minimum transfer rate for each client and TCP connection. If the client has not completed the data transfer in the minimum time or the data are not transferred at the minimum transfer rate, the protection system determines the connections are potentially a slow attack and resets the connections for the protected devices.
US08856910B1 Detecting encrypted tunneling traffic
Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.
US08856898B1 Methods for DNSSEC proxying and deployment amelioration and systems thereof
A method, computer readable medium, and device for providing authenticated domain name service includes forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device. The traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers. The traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
US08856895B2 Authentication system
The invention relates to an authentication system for a user possessing a means (3) for authentication at an authentication entity (1), said authentication means including a means (11) for storing at least one status variable and a single-use access-code generator (2) actuated upon a request of the user, said access code including at least one unpredictable portion and being transmitted to the authentication entity for validation, said validation authenticating the user at the authentication entity, characterised in that the status variable is updated in a random manner by and upon the initiative of the authentication means systematically and before any generation of a new access code, in that the generator is suitable for computing the access code using the status variable once it is updated, and in that the authentication entity is adapted for modifying the value of at least one internal status variable during the at least partial validation of the access code by using information previously known by the authentication entity as well as the unpredictable portion conveyed by the transmitted access code.
US08856893B2 System and method for an ATM electronic lock system
A method for ATM Electronic Lock System comprising the steps: (a) a user using ATM card and entering PIN in an ATM Electronic Lock Subsystem, (b) the ATM Lock System authenticating the user, (c) generating a RND and Local One Time Code (LOTC) with the user's personal ID, Equipment ID, (d) displaying the RND to the user and the user sending the RND to ATM management center via mobile device, (e) the Management Center authenticating the user and generating a Management Center One Time Code (MC-OTC) and sending the MC-OTC to the user's mobile device, (f) the user entering the MC-OTC to the ATM Electronic Lock Subsystem, (g) the ATM Electronic Lock Subsystem comparing the MC-OTC with LOTC, and sending unlock command to unlock the ATM Electronic Lock System to allow user to access the ATM if the MC-OTC matches the LOTC, otherwise, the ATM Electronic Lock System remains locked.
US08856891B2 Proxy authentication network
A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage. The storage then decrypts the data, generates a new key, and re-encrypts the data for transmission to the requester.
US08856882B2 Method of management in security equipment and security entity
Method of managing security entities positioned to cut off an information stream within a network. The method includes designating an entity to act as a sponsor for a new ward wishing to join the network, requesting to connect the ward with the sponsor, said sponsor determining whether or not it accepts the connection. If the sponsor accepts the connection, then connecting the sponsor and disconnecting from the plurality of entities forming the network. At least one of the entities and the sponsor checking a security level of said ward. If at least one of the entities decides to trust said ward, then the sponsor transmits to the ward configuration information to enable the ward to enter into communication with the network. If at least one of the entities decides not to trust the ward, then the ward cannot access the network and an alarm is generated.
US08856880B2 Method for providing subscriptions to packet-switched networks
Method for providing a subscription to an IP-based Multimedia Subsystem (IMS) for a first client of a packet-switched network is provided. The first client is identified by the same MSISDN number as a second, mobile client of a circuit-switched network. The method comprises the following steps: a) sending, by the first client, a register request to an IMS Server via the packet-switched network, b) sending, by the IMS server, a location query request to a register for the IMS user identities (HSS), c) requesting, by the register for the IMS user identities (HSS), the user subscription information of the circuit-switched network from the register for the circuit-switched network (HLR), d) sending, by the register for the circuit-switched network (HLR), to the register for the IMS user identities, the user subscription information of the second client, e) creating, by the register for the IMS user identities (HSS), a user IMS subscription information based on user subscription information of the second client.
US08856879B2 Social authentication for account recovery
A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account recovery code. The account recovery system sends a communication to the trustee for information to verify the trustee as one of the previously identified trustees. The account recovery system then may transmit a link and code with instructions for the trustee to return the link. The account recovery system then transmits a situational query to the trustee to provide additional security. Finally, if all the communications have been completed for the required level of security, the account recovery code is transmitted to the trustee. The trustee sends the account recovery code to the account holder for access to an account.
US08856873B2 Method, apparatus, and system for sending credentials securely
A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.
US08856872B2 Computer for disconnecting itself from an external network by disabling its network card after a connection time has expired
A computer includes an enclosure, a network card connected to an external network, a time limit control device, a power module, and a switch. The time limit control device is used to set a connection time of the computer with the external network, and control a network switch module to enable the network card to connect the computer to the external network according the set connection time. The time limit control device is used to count down the connection time, and control a display module to display a remaining connection time. When a countdown of the connection time is zero, the time limit control device controls the network switch module to disable the network card and thereby disconnecting the computer from the external network.
US08856869B1 Enforcement of same origin policy for sensitive data
Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help ensure release of sensitive data is only triggered by authorized sources. The security agent may help ensure sensitive data is only released to authorized destinations. A security agent may translate or obfuscate sensitive data. Sensitive data may include HTTP cookies, session data, authentication information, authorization information, personal information, user credentials, and/or other data sensitive in nature. Sensitive data destinations and/or sensitive data origins may be identified. Identification may be performed using secure means (such as for example a SSL/TLS handshake). Other embodiments are also disclosed and claimed.
US08856868B2 Identification information integrated management system, identification information integrated management server, and computer readable recording medium recording identification information integrated management program thereon
The present application relates to a technique applied to a system for performing authentication of a user by a one-to-one verification method by using an ID and biometric information of the user. When the user registers the ID and reference biometric information in a service providing system, the information is transmitted from the relevant service providing system to a management server. Then, in the management server, ID management by the reference biometric information is performed, and when the user inputs a wrong ID at the time of verification before the relevant service providing system starts to provide a service, a correct ID of the relevant user is found.
US08856861B2 Generic rights token and DRM-related service pointers in a common protected content file
Methods and systems of rendering content on a device having a native digital rights management (DRM) system are described. A device, such as an end-user device capable of executing or playing content, acquires content in a common content format file having standardized locations for specific types of data. A generic digital rights token associated with the content is obtained by utilizing one of the standardized locations in the content format file, where the rights token contains information sufficient to allow retrieval of the rights associated with the content. Utilizing data in another of the standardized locations, it is then determined whether the device is registered in a domain. A license server directory may be accessed utilizing data in another of the standardized locations in the common content format file and a domain identifier, a device identifier, or both are transmitted to the license server directory. A native DRM system trigger is received and, upon activation of the trigger, a native DRM license is acquired, thereby enabling rendering of the content in the common content format file on the device.
US08856860B2 System and method for implementing policy server based application interaction manager
In one example embodiment, an apparatus includes a policy repository for storing a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. Another example embodiment includes an apparatus including a processor operable to evaluate a policy for application interaction. The policy defines, for a subscriber, a priority associated with a set of specific application identifiers. The priority further defines establishment priority and retention priority for an application identified by a selected application identifier. The processor is further operable to execute a decision for the subscriber based on the evaluation of the policy.
US08856858B2 System for establishing communications with a mobile device server
A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium operating in a mobile device server having computer instructions to execute a web server application in the mobile device server. The web server application can be operable to cause a media processor to invoke a software application in the mobile device server. The mobile device server can support voice communications over a cellular communication system. Other embodiments are disclosed.
US08856852B2 Method of obtaining television content from a serving node
A method and system for micro-cloud computing is described. An application serving node, which is a specifically configured piece of customer premises equipment such as a set-top box, is the server for a micro-cloud network. Various user devices that form part of the micro-cloud network, such as television sets and smart phones, communicate with the application serving node. The application serving node is configured with software that allows various heterogeneous types of data to be obtained and streamed to the user devices in multiple ways. The application serving node performs much of the processing necessary for such content streaming itself and thus represents an edge-based network architecture.
US08856847B2 Systems and methods for providing a customized program lineup
Systems and methods for delivering content according to a customized program lineup are provided. A content source transmits a plurality of media assets in a first schedule according to scheduled transmission times. A processing device may receive a user input to receive the media assets in a second schedule different from the first schedule. When a request to access the content source is received, the processing device may automatically determine, based on the second schedule, whether the user has requested a different media asset than the originally-scheduled asset at the time of the request. If the user has requested a different media asset, the processing device may automatically receive and provide the different media asset instead of the originally-scheduled asset.
US08856845B2 Method and system for providing personalized contents
A method is provided for a personalized content delivery system. The method includes detecting a viewing activity of at least one user of a content-presentation device capable of presenting multiple programs in one or more channels, and determining a plurality of user identities of the at least one user. The method also includes discovering available video contents for the at least one user based on the plurality of user identities, and determining personalized video contents for the at least one user by merging the plurality of user identities. Further, the method includes recommending the determined personalized video contents to the at least one user, and delivering the recommended personalized video contents to the at least one user such that the personalized video contents are presented on the content-presentation device.
US08856844B2 Systems and methods for automatically purchasing and recording popular pay programs in an interactive media delivery system
A system and method for automatically purchasing and recording popular pay program is disclosed. The pay programs are selected based on defined criteria and popularity. The most popular pay program that meets defined criteria will be automatically recorded and purchased. Notifications and confirmations are provided before purchase of pay programs.
US08856843B1 Method and system for adding local channels and program guide data at a user receiving device in an aggregated content distribution system
A method and system for generating local channels includes a user receiving device and a local headend in communication with the user receiving device generating a local channel using a multicast stream, generating local channel guide data comprising tuning data for the local channel and communicating a control command to a user receiving device. The control command comprises tuning data for the local channel. The user receiving device stores tuning data for the local channel with program guide data stored in the user receiving device in response to the control command.
US08856842B2 Wireless video clock synchronization to enable power saving
In a wireless video system, the clock rate for wirelessly transmitting the video data from the transmitting device should be identical to the clock rate for receiving the video data at the receiving device. But the two devices have separate clocks, whose frequencies may drift apart over time, leading the video buffer to be over run or under run. Clock synchronizing messages to prevent this may be sent at short intervals when clock synchronization is first being acquired, and at larger intervals after clock synchronization has already been achieved and is merely being maintained.
US08856841B2 Methods, systems, and products for customizing content-access lists
Systems, methods, and computer program products describe customizing the presentation of a content-access list. A preference for a subscriber is received, and a content database is searched for content related to the preference and for content unrelated to the preference. An option list is received including an option, and a non-preference-related option is also received. The non-preference-related option is added to the option list, and the option list is sent to the subscriber.
US08856835B2 Method and system for associating content and content information in a menu structure
A system and method includes a user device and a content processing system receiving content from a content provider, assigning a material identification to the content, receiving content information different than the content, associating the content information and the content and communicating the content information and material identification to the user device. The user device forms a menu from the content information and associated material identification, generates a menu selection from the menu, and communicates the material identification associated with the menu selection to the content processing system. The content processing system communicates the content corresponding to the menu selection to the user device.
US08856833B2 Maintaining a user profile based on dynamic data
The present invention allows users to interact with people, who have interacted with other people, and obtain media files and recommendations from those having common interests, thereby creating interactive media communities and spawning electronic social networks based on media and other types of electronic entertainment.
US08856830B2 Method, apparatus and system for providing access to product data
VISUAL IMAGE MARKETING (VIM) is a system whereby the visual image on a film or television program is utilized to market that specific product. In VIM, film.backslash.television is combined with computer technology to provide real-time or delayed access to product data. Viewers identify a product or object displayed in a video, television show or movie and by merely pointing and clicking on the object to obtain marketing and other data.
US08856823B2 Methods and systems for synchronizing delivery of media content streams having different resolutions
An exemplary method includes processing a first program stream representative of media content having a first resolution and a second program stream representative of the media content having a second resolution, generating a single advertisement stream representative of advertisement content having a third resolution, detecting a transmission lag between the first and second program streams, dynamically synchronizing the first and second program streams to substantially remove the detected transmission lag, transmitting the synchronized first program stream by way of a first content channel, the synchronized second program stream by way of a second content channel, and the advertisement stream by way of an advertisement channel, and directing a media content access device to switch from being tuned to the second content channel to being tuned to the advertisement channel during an advertising break in the media content. Corresponding methods and systems are also disclosed.
US08856818B2 System and method for in-home set top box management
A video services control system comprises a set top box coupled to a television and a video services network configured to provide video services to the television via the set top box. The video services network includes an application program operable to develop and implement individualized usage restriction profiles for users of the set top box to control video services viewing. The application program is configured to provide a designated administrator with authority to dictate the usage restriction profile for non-designated users. The individualized usage restriction profiles include restrictions on the content of video services shown on the television for viewing by the users. The application program is configured to receive information input by the designated administrator, develop each usage restriction profile based on the input information unique to each user, and implement each usage restriction profile to control video services viewing by the users.
US08856811B2 Disk drive apparatus and conveyance roller thereof
A disk drive apparatus is provided. The disk drive apparatus includes: a frame which includes a slot to insert a disk therethrough; a spindle motor assembly which includes a turntable including a disk seating part and a chucking member, and a spindle motor to rotate the turntable; a traverse assembly which mounts the spindle motor thereon and is movable in a direction perpendicular to an inserting direction of the disk; a conveyance roller which is movable between a contact position and a non-contact position with the disk and conveys the disk using a friction force; and a roller driving unit which moves the conveyance roller from the non-contact position to the contact position after an unchucking operation of the disk is completed, when the disk is unloaded.
US08856807B1 Alert event platform
Various systems, processes, tools and techniques are provided for managing and processing alerts associated with different business events that impact a corporate entity. In various aspects, the system may employ an event-driven architecture to process business events and then provide customers and other system users with a mechanism for having have visibility into those business events through a subscription process, for example. Subscribers may be offered the ability to tap into different streams of business events, filter the event streams to obtain information only for events of interest, and then receive alerts associated with the events via one or more communication media or channels.
US08856805B2 Virtual channel for embedded process communication
A native application built for a mobile device can embed non-native JAVA code that may be executed by a JAVA virtual machine also embedded as a library within the native application. Enterprise applications may be extended for use by mobile devices. Business logic for an application may be constructed just once and then used in both enterprise applications and mobile device applications.
US08856804B2 Performance indicator for measuring responsiveness of user interface applications to user input
A method for measuring application responsiveness measures the time elapsed between receiving and processing a trailing tag message inserted into the application's message queue. The method receives a message, generates a trailing tag message associated with the message, and inserts the trailing tag message into the application's message queue. The trailing tag message includes a timestamp indicating when the trailing tag message was queued. A default message handler calculates the time elapsed between when the trailing tag message was queued and when the trailing tag message was processed. The elapsed time may then be used to calculated system responsiveness.
US08856803B2 Content delivery within an application
A view component of an application requests content from a model component of the application, where the request for content includes a request for data. The model component determines whether the requested data is available. If the requested data is available, the model component delivers the requested content and the requested data. If the requested data is not available, the model component first delivers the requested content and a data placeholder, and after the model component retrieves the data, the model component delivers the requested data to replace the data placeholder.
US08856801B2 Techniques for executing normally interruptible threads in a non-preemptive manner
A technique for executing normally interruptible threads of a process in a non-preemptive manner includes in response to a first entry associated with a first message for a first thread reaching a head of a run queue, receiving, by the first thread, a first wake-up signal. In response to receiving the wake-up signal, the first thread waits for a global lock. In response to the first thread receiving the global lock, the first thread retrieves the first message from an associated message queue and processes the retrieved first message. In response to completing the processing of the first message, the first thread transmits a second wake-up signal to a second thread whose associated entry is next in the run queue. Finally, following the transmitting of the second wake-up signal the first thread releases the global lock.
US08856800B2 Service-level enterprise service bus load balancing
A method and system for service-level Enterprise Service Bus (ESB) load balancing is described. In one system, an ESB load balancer tracks service usage of multiple nodes, each hosting an ESB instance. The ESB load balancer receives an incoming message directed to a given type of service, determines which of the ESB instances has a least-used service of the given type, and forwards the incoming message to that ESB instance.
US08856798B2 Mobile computing device activity manager
A system and a method are disclosed for an activity manager providing a centralized component for allocating resources of a mobile computing device among various activities. An activity represents work performed using computing device resources, such as processor time, memory, storage device space or network connections. An application or system service requests generation of an activity by the activity manager, causing the activity manager to associate a priority level with the activity request and identify resources used by the activity. Based on the priority level, resources used and current resource availability of the mobile computing device, the activity manager determines when the activity is allocated mobile computing device resources. Using the priority level allows the activity manager to optimize performance of certain activities, such as activities receiving data from a user.
US08856797B1 Reactive auto-scaling of capacity
Examples of systems and methods are described for managing computing capacity by a provider of computing resources. The computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. Multiple user programs can consume a single computing resource, and a single user program can consume multiple computing resources. Changes in usage and other environmental factors can require scaling of the computing resources to reduce or prevent a negative impact on performance. In some implementations, a fuzzy logic engine can be used to determine the appropriate adjustments to make to the computing resources associated with a program in order to keep a system metric within a desired operating range.
US08856796B2 Methods and system for executing a program in multiple execution environments
A method and a medium are disclosed for executing a technical computing program in parallel in multiple execution environments. A program is invoked for execution in a first execution environment and from the invocation the program is executed in the first execution environment and one or more additional execution environments to provide for parallel execution of the program. New constructs in a technical computing programming language are disclosed for parallel programming of a technical computing program for execution in multiple execution environments. It is also further disclosed a system and method for changing the mode of operation of an execution environment from a sequential mode to a parallel mode of operation and vice-versa.
US08856795B2 Reducing costs for a distribution of applications executing in a multiple platform system
Embodiments of the claimed subject matter are directed to methods and a system that allows the reduction of costs attributed to executing applications on a multi-platform system (such as a mainframe) by migrating certain processes operating on one platform to another platform in the system. In one embodiment, the reduction of cost is achieved by a method for migrating an application executing in a partition operating a proprietary operating system to a second partition operating an alternate operating system and leveraging special purpose processors unavailable to the proprietary operating system, which can be much less costly to purchase and/or rent and license.
US08856793B2 System, method and program for scheduling computer program jobs
Scheduling a program for periodic execution. The program requires a computer resource for execution. The historic availability of the resource is determined and recorded at a multiplicity of times a day. Subsequently, a request is received to schedule a program for execution on the day at a specified time and daily thereafter at the specified time or weekly or monthly thereafter on the day at the specified time. If there has been sufficient historic availability of the resource on the day at approximately the specified time, the program is scheduled for execution on the day at the specified time and daily thereafter at the specified time or weekly or monthly thereafter on the day at the specified time as requested. If not, the program is scheduled for execution at another time on the specific day close to the specified time.
US08856790B1 Systems and methods for data management in a virtual computing environment
Systems and methods are disclosed for performing operations on a host system with one or more virtual machines without persistently storing an agent or daemon thereon. In certain examples, a management server is configured to inject dependencies, such as binary data, over a network to the host system for performing a requested operation. For instance, systems and methods can establish a secure shell (SSH) port forwarding connection through which dependencies stored on the management server are injected into a service console of the host system. The injected dependencies can then be executed and/or used to perform the requested operation, such as a backup or compression operation on virtual machine data. Once the requested operation has completed, the injected binaries are preferably removed from the host system so as to conserve system resources.
US08856787B2 On-boarding applications to a cloud
Methods and arrangements for on-boarding an application to a cloud. An application for hosting in a cloud environment is provided. Metadata related to the application is provided, and metadata related to the cloud is obtained. The application metadata and cloud metadata are compared, and the compatibility of the application with existing offerings of the cloud is ascertained. The application is on-boarded to the cloud.
US08856782B2 On-demand disposable virtual work system
An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.
US08856780B2 Method and system to remotely flash an external module
A method to remotely flash an external module comprises the steps to electronically transfer a computer program from a computer device to an external module, to partially install the external module to a vehicle, to extract the key data from a device securing the vehicle, to transfer the key data to a computer, to analyze and process the key data with a computer program generating a new computer program allowing the external module to communicate with the security device, to transfer the generated computer program to the external module, to complete the installation of the external module to the vehicle.
US08856776B2 Updating firmware without disrupting service
A method, system, and computer usable program product for updating firmware without disrupting service are provided in the illustrative embodiments. An updated firmware code is sent to a first firmware component and a second firmware component. The first firmware component is a primary firmware component and the second firmware component is a backup firmware component in a redundant firmware configuration. The updated firmware code is installed in second firmware component. The updated firmware code is activated in a third firmware component. The third firmware component is in communication with the first firmware component. A fail-over from the first firmware component to the second firmware component is performed such that a user communicating with the data processing system and receiving a service using the first firmware component continues to receive the service using the second firmware component without a disruption in the service.
US08856775B2 Unstacking software components for migration to virtualized environments
Techniques for unstacking software components are provided. The techniques include discovering a plurality of software components and one or more dependencies between the software components in a computer system, designing a plurality of unstacking options for unstacking said components, and selecting one of said unstacking options to unstack said components.
US08856773B2 Image forming apparatus including a device that updates stored program based on updating data which is selected based on program that is started or startable
An image forming apparatus includes a storage section that stores programs for carrying out processes, an updating data selection section that selects an updating data for at least one of programs from an updating data group, based on a program that is started or is startable, and an updating section that updates at least one arbitrary program stored in the storage section based on the selected updating data.
US08856772B2 Server and firmware updating method
A server includes a Southbridge chipset, a USB port, a storage device, a baseboard management controller (BMC), and a switch. When the BMC is powered on and started, the BMC establishes communication between a USB device connected to the server and the BMC by uploading a driver of the USB device from the storage device to memory of the BMC. In response to receiving a firmware update command in relation to the BMC, the BMC disconnects an electrical connection between the USB port and the Southbridge chipset, and establishes an electrical connection between the USB port and the BMC using the switch. Then, the BMC reads updated firmware data from the USB device via the USB port, writes the updated firmware data into the memory, and updates the firmware of the BMC by writing the updated firmware data into the storage device.
US08856771B2 Protection for unauthorized firmware and software upgrades to consumer electronic devices
A firmware or software update, patch, or upgrade image is authenticated by forcing its checksum to match a pre-determined value. The pre-determined value is known by a consumer electronic device in advance of propagating the image for installation. Upon propagation, the device determines a checksum value of the received imaged, and compares the checksum value to the pre-determined expected authenticity value. If they match, the image is installed. In an optional feature, the image is executed by the device and modifies the pre-determined checksum value to a next value, which is also shared or known by the image server. In this variation, no two images have the same expected value, and unauthorized images may be rejected for installation.
US08856768B2 System and method for compiling machine-executable code generated from a sequentially ordered plurality of processor instructions
A method and system are provided for deriving a resultant software program from an originating software program having overlapping branches, wherein the resultant software project has either no overlapping branches or fewer overlapping branches than the originating software program. A preferred embodiment of the invented method generates a resultant software program that has no overlapping branches. The resultant software is more easily converted into programming reconfigurable logic than the originating software program. Separate and individually applicable aspects of the invented method are used to eliminate all four possible states of two overlapping branches, i.e., forward branch overlapping forward branch, back branch overlapping back branch, and each of the two possible and distinguishable states of forward branch and back branch overlap. One or more elements of each aspect of the invention may be performed by one or more computers or processors, or by means of a computer or a communications network.
US08856767B2 System and method for analyzing dynamic performance of complex applications
A system and method for monitoring the performance and execution flow of a target application and generating a corresponding data model are provided. The system and method comprise attaching to a thread or process of a target application and tracking the execution of subroutines using instrumentation commands. Data representing the execution flow of the various subroutines, subroutine calls, and their performance is gathered and used to generate data models representing the threads and processes of the application. The data models are optionally merged and/or pruned. A visualization of the data models is generated indicating relevant points of interest within the target application's execution flow.
US08856766B2 Generating layouts for graphs of data flow applications
An embodiment of the invention provides a method of displaying a data flow, wherein a description of a data flow application to be displayed is received. The data flow application includes nodes and edges connecting the nodes, wherein the nodes represent operators and the edges represent data connections for data flowing between the operations. A reason that a user is to view the data flow and/or a user constraint on a complexity of the data flow application to be displayed is determined with a processor; and, the time required to render a display of the data flow application is estimated. A transformed representation of the data flow application is created with the processor. The transformed representation is created based upon the user reason, the user constraint, the estimated time of rendering, and/or a layout strategy. The transformed representation is displayed on a graphical user interface.
US08856764B2 Distributed static analysis of computer software applications
A method for distributed static analysis of computer software applications, includes: statically analyzing instructions of a computer software application; identifying at least one entry point in the computer software application; assigning a primary agent to statically analyze the computer software application from the entry point; assigning a secondary agent to statically analyze a call site encountered by the primary agent and produce a static analysis summary of the call site; and presenting results of any of the static analyses via a computer-controlled output device.
US08856762B2 Loop detection apparatus, loop detection method, and loop detection program
A loop detection method, system, and article of manufacture for determining whether a sequence of unit processes continuously executed among unit processes in a program is a loop by means of computational processing performed by a computer. The method includes: reading address information on the sequence of unit processes; comparing an address of a unit process as a loop starting point candidate with an address of a last unit process in the sequence of unit processes; reading call stack information on the sequence of unit processes; comparing a call stack upon execution of the unit process as the loop starting point candidate with a call stack upon execution of the last unit process; outputting a determination result indicating that the sequence of unit processes forms a loop if the respective comparison results of the addresses and the call stacks match with each other.
US08856761B2 Instruction processing method, instruction processing apparatus, and instruction processing program
An instruction processing method includes generating a translated code block for an instruction, among instructions included in a target program to be executed and for which a number of executions through sequential interpretation is greater than or equal to a threshold, and storing the generated translated code block in a first storage unit and removing part or all of the translated code block from the first storage unit at a given timing, wherein the generating reduces the threshold with respect to the number of executions over a given period of time after the part or all of the translated code block is removed.
US08856756B2 Simulation control techniques
Simulation control techniques include shutting down peer processes and user code modules, storing an image of a simulation as a checkpoint after the peer processes and user code modules are shutdown, and re-starting user code modules and peer processes after storing an image of the simulation. The resulting checkpoint and processes can be used for restoring from a checkpoint or restarting a new simulation environments having peer processes such as debuggers coupled to the simulation.
US08856755B2 Dominant-state-based coverage metric
A method, apparatus and product for dominant state based coverage metric. The method comprising: determining whether all possible states of a computer program were examined based on an analysis of states that were examined excluding controlled states that are dominated by a self-dominating states; wherein the controlled states are associated with a controlled nodes in a control flow graph of the computer program, wherein the self-dominating states are associated with a self-dominating node in the control flow graph; wherein each execution path in the control flow graph that reaches the controlled nodes also includes the self-dominating node; and wherein there exists an execution path in the control flow graph that both starts and ends at the self-dominating node and further includes at least one controlled node.
US08856754B2 Systems and methods for enhanced profiling of computer applications
Systems, methods, and computer-readable media are disclosed for enhanced profiling. An exemplary method includes initiating an execution of a software application which includes a plurality of routines, storing information related to data inputs to the plurality of routines during the execution of the software application, storing resource consumption information for the plurality of routines during the execution of the software application, correlating the resource consumption information for the plurality of routines to a size of the data inputs, and analyzing the correlated resource consumption information to determine a subset of the plurality of routines that exhibit at least a threshold amount of resource consumption with increasing size of the data inputs.
US08856750B2 Task-based evaluation of user interfaces
A system and method for evaluating interfaces includes computing a reference script for a task from a reference interface design and translating the reference script into one or more target action scripts based on a target design. The one or more target action scripts on the target design are executed to produce target metrics. The target metrics are compared to determine whether the target action script successfully translates the reference script.
US08856745B2 System and method for using a shared standard expectation computation library to implement compliance tests with annotation based standard
A system and method can implement compliance tests with annotation based standards using a model library. The model library encapsulates expectation computation logic described in one or more annotation based assertions. A compliance test can obtain an actual value for one or more software properties based on evaluating a source file that contains one or more annotations that is defined by the one or more annotation based assertions, and can determine an expected value for the one or more software properties using the model library. Then, the compliance test can compare the actual value for the one or more software properties with the expected value for the one or more software properties.
US08856739B2 Method of updating list of software-as-a-service and system for the same
A method of updating a list of SaaS and a system for the same are provided. A software server of the present invention updates a software list, in which information about software provided to a user terminal is recorded, on the basis of use information for at least one software program received from the user terminal. The software server includes a receiver that receives software use information, and a processor that determines software to be added to a software list and software to be removed from the software list to update the software list on the basis of the received software use information. Accordingly, software that is provided as a service from a server is automatically updated on the basis of software use information, thus overcoming limitations that are caused by setting a service list according to the individual determination of a manager of the server.
US08856738B2 System and method for transplanting source code
A method of integrating an existing source code into a target source code, the method including mapping a plurality of candidate mappings between a change point of the existing source code and a plurality of change points of the target source code, selecting a candidate mapping of the plurality of candidate mappings, automatically updating the existing source code based on the candidate mapping having been selected, and transplanting the existing source code having been updated into the target source code.
US08856734B2 Type-safe dependency injection of services into enterprise components
A system, method, and medium are disclosed for implementing an application component container. The container is configured to detect that a component managed by the container is dependent on an interface that is implemented by a dynamic module provided by a dynamic module system. The container uses a dependency injection framework to inject the implementation into the dependent component in a type-safe manner.
US08856731B2 Scalable language infrastructure for electronic system level tools
Systems and methods of scalable language infrastructure for electronic system level tools. In accordance with embodiments of the present invention, knowledge about types, functions and the like is encapsulated in a plurality of intelligent components called active component extension modules that are external to the infrastructure. The infrastructure implements a communication mechanism between the clients and these intelligent components, and acts as a common backbone. The infrastructure itself does not maintain any knowledge about any client, types, functions, etc. In accordance with a method embodiment of the present invention, a request is received from a client of a language infrastructure. The request is forwarded from the language infrastructure to an active component extension module. The active component extension module performs a service responsive to the request.
US08856728B2 Composition studio to develop and maintain surveillance and compliance scenarios
A system for generating a plurality of surveillance and compliance scenarios includes a first user interface comprising a graphical modeling tool for writing fraud detection logic in a first language and a second user interface for creating one or more configurable threshold parameters, one or more general parameters, as well as one or more configurable subsets of filters to be applied to the detection logic. The system is configured to interpret the fraud detection logic in the first language and translate the fraud detection logic into a second language that is capable of performing the fraud detection on a subset of transactions data after application of the one or more configurable subsets of filters to the detection logic, as well as limiting a number of alerts that can be generated after application of the threshold and general parameters.
US08856727B2 Generation framework for mapping of object models in a development environment
A delta handler can allow calculation of difference between an already generated set of backend entities and a set of new entities necessary to support a primary object affected by a change made in a development environment supporting extensions to a backend model of a software architecture. Improved stability and robustness can be provided via an approach in which a target list of activities relating to creating, changing, or deleting of entities in backend repositories necessary to support the affected primary object is created and a sequence for performance of the activities in the target list is determined in a manner that can allow handling of such activities in a unified manner rather than on a per object type basis. Related methods, systems, articles of manufacture, and the like are described.
US08856726B2 Verification of computer-executable code generated from a slice of a model
In an embodiment, a model is sliced into a plurality of slices. A slice in the plurality of slices is selected. A portion of code, that corresponds to the selected slice, is identified from code generated from the model. The identified code is verified to be equivalent to the selected slice. Equivalence may include equivalent functionality, equivalent data types, equivalent performance, and/or other forms of equivalence between the selected slice and the identified generated code.
US08856722B2 System for semiconductor device, method for manufacturing semiconductor device, semiconductor device and method for bonding substrates
The terminals that oppose each other when substrates are bonded are designed to be reliably joined. Comprised in a semiconductor device design system are a numerical value acquiring part, which acquires the respective numerical values of a plurality of calculation parameters, a junction estimating part, which, in the case in which a plurality of substrates has been pressed at a prescribed pressure so that the bump front end faces come into contact, estimates whether or not the respective mutually opposing bumps will be joined based on the respective numerical values of the calculation parameters acquired by the numerical value acquiring part, and a change processing part, which, in the case in which it has been estimated by the junction estimating part that any of the bumps will not be joined, gives a warning or performs processing so as to change the numerical value of at least one calculation parameter among the plurality of calculation parameters.
US08856720B2 Test coverage of integrated circuits with masking pattern selection
A method of locating faulty logic on a semiconductor chip is disclosed. The method may include determining failure rates for the semiconductor chip, which contain one or more logic elements. The method also may include determining a masking pattern using failure rates. The masking pattern may mask less than all of the logic elements using a determination method. The method may also include applying a test vector to a selected logic element, wherein the result from a test vector is compared to a reference.
US08856715B1 Capacitor designs for integrated circuits utilizing self-aligned double patterning (SADP)
Methodologies enabling BEoL VNCAPs in ICs and resulting devices are disclosed. Embodiments include: providing a plurality of mandrel recesses extending horizontally on a substrate, each of the mandrel recesses having an identical width and being separated from another one of the mandrel recesses by an identical distance; providing a plurality of routes, each of the plurality of routes being positioned in a different one of the mandrel recesses; and providing first and second vertical segments on the substrate, the first vertical segment being connected to a set of the plurality of routes and separated from the second vertical segment, and the second vertical segment being separated from the set of routes.
US08856712B2 Optimized flip-flop device with standard and high threshold voltage MOS devices
A flip-flop operating with standard threshold voltage MOS devices as compared with high threshold voltage MOS devices may have improved speed performance, but greater leakage current. Likewise, a flip-flop operating with high threshold voltage MOS devices may reduce the leakage current and have better power efficiency, but decreased speed and performance. An optimized flip-flop may include a combination of standard threshold voltage MOS devices and high threshold voltage MOS devices. The optimized flip-flop may have less leakage during stand-by mode as compared to a flip-flop with standard threshold voltage MOS devices. In addition, the optimized flip-flop may have better performance and speed as compared to a flip-flop with high threshold voltage MOS devices.
US08856711B2 Apparatus and methods for time-multiplex field-programmable gate arrays
A time-multiplexed field programmable gate array (TM-FPGA) includes programmable logic circuitry, programmable interconnect circuitry, and a plurality of context registers. A user's circuit can be mapped to the programmable logic circuitry, the programmable interconnect circuitry, and the plurality of context registers without the user's intervention in mapping the design.
US08856709B2 Systems and methods for correlated parameters in statistical static timing analysis
Systems and methods for accommodating correlated parameters in SSTA are provided. The method includes determining a correlation between at least two parameters. The method further includes calculating a new parameter or a new parameter set based on the correlation between the at least two parameters. The method further includes performing the SSTA such that the new parameter or the new parameter set is propagated into the SSTA. The method further includes projecting slack using the correlation between the at least two parameters and using a processor.
US08856704B2 Layout library of flip-flop circuit
Provided is a layout library having a plurality of unit layouts in which the same flip-flop circuit is implemented. In the layout library, at least two unit layouts have mutually different arrangement structures. Therefore, coupling capacitances seen at an equal node with respect to the two flip-flop circuits appear to be different from each other. A semiconductor designer can select a layout in which a desired coupling capacitance is set through wiring, and through this, can adopt a required flip-flop circuit.
US08856702B1 Method and apparatus for performing multiple stage physical synthesis
A method for designing a system on a target device includes entering the system. The system is synthesized. The system is mapped. The system is placed on the target device. The system is routed. Physical synthesis is performed on the system immediately after more than one of the entering, synthesizing, mapping, placing and routing procedures.
US08856701B1 Method of radio-frequency and microwave device generation
The present disclosure relates to an apparatus and method to generate a device library, along with layout versus schematic (LVS) and parasitic extraction set-up files for connecting with official tools of a design window supported by a process design kit (PDK). The device library comprises passive devices which can be utilized at any point in an end-to-end design flow from pre-layout verification to post-layout verification of an integrated circuit design. The device library allows for a single schematic view for pre-layout verification but also post-layout verification, thus allowing for pole or pin comparison, and prevents double-counting of parasitic effects from passive design elements by directly instantiating a device from the device library for a verification step. An LVS and parasitic extraction graphical user interface (GUI) allows for incorporation of the generated device library into a pre-existing PDK without any modification to the PDK. Other devices and methods are also disclosed.
US08856699B2 Three dimensional integrated circuits
A three-dimensional semiconductor device, comprising: a circuit block located in a first module layer; and a configuration circuit to control the circuit block further comprising a configurable element in a second module layer positioned above the first module layer.
US08856690B2 Associating gestures on a touch screen with characters
The present invention provides methods for associating a gesture, in contact with a touch screen, with a character. More specifically, the present invention links a user's movement on a surface of a device to represent a character. A character includes any number, letter, or symbol. For example, an illustrative embodiment of the present invention, a user may swipe a surface on their device such as a cell phone. The present invention recognizes the swipe to represent the number “0,” a swipe in another direction to represent the number “1,” a tap in the middle region to represent the number “2,” etc.
US08856681B2 Method and system for automatically resizing and repositioning windows in response to changes in display
Windows in a graphical user interface are automatically repositioned and resized in response to changes in a display configuration. If a window is not capable of being fully displayed within the reconfigured display area, it is constrained to fit the available space. In determining the constraints for the window, the window is given a size which permits an integral amount of information to be displayed to the user. If a minimum required size is not already present in the available display area, the window is moved into the available area until the minimum size is attained. If the visible portion of the window already contains the minimum required area, a determination is made whether additional integral components of the window can be displayed. The window is then appropriately shrunk or expanded to permit an integral number of components to be displayed, and control elements are added to the window.
US08856678B1 Using touch input to select, shrink, and fold displayed content
A display device and a method of controlling therefor according to one embodiment relate, if a display area of the display device does not have an enough space to display a whole content, to the display device providing only a content area which a user wants to see and providing an easy-to-use scrolling environment to the user by folding a part of the whole content and the method of controlling therefor.
US08856677B2 Electronic text viewing apparatus, electronic text viewing method, and mobile phone
An electronic text viewing apparatus includes a viewing application unit that outputs viewing data for displaying a text in a viewable manner, a display unit that displays the viewing data and a fast reading button for receiving a fast reading request for the viewing data, a viewing data requesting unit that issues a request for acquirement of the viewing data to the viewing application unit, and acquires the viewing data to be viewed, a setting data storage unit that stores setting data for the acquired viewing data, and a fast reading viewer control unit that, when the fast reading button is pressed, converts the viewing data into fast reading viewer data by performing display format conversion, display speed control and scroll control of the viewing data, and displays the fast reading viewer data and a return button for converting the fast reading viewer data to the viewing data.
US08856676B1 Pre-filling input fields using heuristic data
In one example, a method receiving information indicating that an input field displayed at a presence-sensitive screen has been accessed, wherein the information comprises an input field identifier that identifies the input field. The method further includes selecting heuristic data based on the input field identifier, wherein one or more properties of the heuristic data are usable to generate at least a portion of an input value. The method further includes generating at least the portion of the input value based on the one or more properties of the heuristic data, wherein at least the portion of the input value is assignable to the input field displayed at the presence-sensitive screen.
US08856670B1 Technique for customizing a user interface
A customization technique that provides a customized user interface in software to a user based on user behaviors while using the user interface during one or more sessions is described. In this customization technique, a usage pattern of the user is determined from the user behaviors, and a user-specific customization of the user interface is generated based on the determined usage pattern. Note that determining the usage pattern may involve generating a directed graph in which vertices correspond to visual components in the user interface and edges between vertices correspond to user behaviors. Then, the user interface in a current release of the software is customized based on the user-specific customization. For example, the customized user interface may include: only a subset of the visual components; a different order of the visual components; and/or a visual component associated with a set of operations.
US08856668B2 Drug delivery devices and related systems and methods
In some aspects, a method includes displaying multiple different screens on a user interface during a treatment, administering a first drug during the treatment; and while administering the first drug, displaying an identifier of the first drug in a drug identification region of the user interface. The drug identification region is present on the user interface with each of the different screens, and the identifier of the first drug is displayed in the drug identification region of the user interface regardless of which of the different screens is displayed.
US08856664B2 Prompting of recipient expertise in collaboration environment
A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface.
US08856659B2 Method for automatically creating book definitions
Book definitions can be dynamically created based on content provided by a user. Such dynamic creation can include organization of user-supplied content into appropriate form, adjustment of book cover properties to match the user-supplied content, and verification that the user supplied content is appropriate for presentation in book form. Various interfaces can also be provided which allow users to generate a book definition based on a minimum of information.
US08856656B2 Systems and methods for customizing photo presentations
Various systems and methods are described for customizing photo presentations. One particular method comprises receiving by the media display system, a plurality of photos depicting individuals and displaying one or more controls for specifying an action to one or more selected individuals. The method further comprises receiving a selection of one or more individuals, generating an action list according to the selection, and customizing the photo presentation comprising photos from among the received plurality of photos according to the action list and according to the analyzed facial regions.
US08856655B2 Media editing application with capability to focus on graphical composite elements in a media compositing area
Some embodiments provide a media editing application that allows a user to focus on a subset of media clips that the application combines to create a composite presentation. The media editing application of some embodiments includes a display area for displaying the composite presentation that the application creates by compositing several media clips (e.g., audio clip, video clip). The multimedia editing application of some embodiments also includes a composite display area (e.g., an area with multiple tracks that span a timeline) for displaying graphical clips representations of media clips that are part of the composite presentation. To focus on a subset of clip representations in the composite display area, the application of some embodiments also includes a tool for causing a first emphasized subset of clip representations (also referred to as “in-focus clips”) to appear larger in the composite display area than a second de-emphasized subset of clip representations (also referred to as “out-of-focus clips”) that are being concurrently represented in the composite display area.
US08856653B2 Video display apparatus, video display management apparatus, video display method and video display management method
According to one embodiment, a video display apparatus includes a selection module, a Web information analysis module, a screen generation module, a transmission module, a reception module, and an alteration module. The selection module is configured to select a partial area of a Web page. The Web information analysis module is configured to analyze first Web information which specifies the partial area. The screen generation module is configured to generate a screen for displaying page information of the partial area, based on the first Web information. The transmission module is configured to transmit the first Web information to an external apparatus.
US08856648B2 Apparatuses and methods for rearranging menu items
An electronic interaction apparatus is provided with a processing unit. The processing unit detects a drag event on a touch screen to indicate a first position to which a menu item is moved, and determines whether the first position corresponds to a page indicator other than a currently highlighted page indicator. If so, the processing unit further configures the touch screen to display a plurality of first menu items corresponding to the page indicator.
US08856645B2 Generating formatted documents based on collected data content
Embodiments described herein include a document generator, which is implemented using a computing system with one or more computing devices, to generate a formatted document associated with a collection of data page units. The document generator or can include a collector, an organization unit, and a formatting unit. The collector facilitates collecting data page units in response to a user selection. The data page units are collected intact and in their original format and are associated with a first ordered sequence. The organization unit facilitates re-sequencing the data page units to associate the data page units with a second ordered sequence. The formatting unit facilitates outputting a formatted document incorporating the collected data page units in the second ordered sequence.
US08856644B1 System, method, and architecture for displaying a document
Data defining a document is received from an online document processing service, and a plurality of elements within the document is identified. The plurality of elements may comprise paragraphs, lines of text, images, tables, headers, footers, footnotes, footnote reference information, etc. For each of the plurality of elements, a respective object comprising a layout function and a render function is generated. An object corresponding to an element is invoked to generate layout data associated with the element, and the element is rendered based on the layout data.
US08856642B1 Information extraction and annotation systems and methods for documents
Information extraction and annotation systems and methods for use in annotating and determining annotation instances are provided herein. Exemplary methods include receiving annotated documents, the annotated documents comprising annotated fields, analyzing the annotated documents to determine contextual information for each of the annotated fields, determining discriminative sequences using the contextual information, generating a proposed rule or a feature set using the discriminative sequences and annotated fields, and providing the proposed rule or the feature set to a document annotator.
US08856641B2 Time-tagged metainformation and content display method and system
Disclosed herein are methods and systems for displaying content-related metainformation, and display of content-related tag metainformation in correspondence, and synchronized, e.g., time-based, with the content, so as to display content together with related time-tag information.
US08856639B1 Systems and methods for online document sign-up
Systems and methods for managing documents are described. A system comprises one or more modules to present controls that reflect a hierarchy of documents available for online delivery, receive an indication of selected controls, and manage online document delivery (ODD) using the indication. A system for presenting a single-page ODD sign-up, comprises one or more modules to identify a user of an online system, determine a financial account associated with the user, and present a hierarchical control, including the financial account, in the single page to the user. A system comprises one or more modules to receive, from a support representative, a user's preference associated with ODD; receive, from an online interface, an indication that the user accepts an agreement associated with ODD; and manage ODD using the indicia reflecting the user's preference after the indication that the user agreed to the agreement has been received. Other embodiments are described.
US08856638B2 Methods and system for remote control for multimedia seeking
The invention relates to multimedia seek sequence using a synchronization index and a mobile computing device. A mobile computing device displays text from a synchronization index. The synchronization index comprises respective times within multimedia corresponding to a word or range of words. A user may perform a gesture performed on a portion of screen of the mobile computing device corresponding to a word, or a range of words, from the synchronization index. The mobile computing device performs a timecode lookup, using the synchronization index, and in response to the gesture performed to select a word or range of words, the timecode lookup functions to associate a time within multimedia to the selected word or range of words. Multimedia is then delivered beginning at that time, or the user is provided instructions for the delivery of multimedia, to a receiving device. The multimedia delivered corresponds to the word or range of words selected by the gesture of the user.
US08856636B1 Methods and systems for trimming video footage
A media authoring application can be configured to use metadata associated with a media presentation to generate a score which serves to identify the interesting portions of the presentation and may thereby streamline the editing process. A method can comprise accessing metadata indicating at least one characteristic of a media presentation comprising a plurality of video segments, determining a qualitative score for at least one segment of the media presentation based on the metadata, and providing a user interface displaying the plurality of segments of the media file, the interface including a visual effect for at least one segment of the media file based on the segment's qualitative score. The method may comprise removing one or more segments based on comparing the score of the segment(s) to a parameter, such as a score threshold.
US08856634B2 Compensating for gaps in workload monitoring data
Gaps in performance data are corrected for through data transformations and conversion. A raw sequence is transformed by correction logic into an interval sequence by partitioning a performance monitoring period into equal intervals and assigning values based on the raw sequence. Locality sequence entries can indicate whether the interval sequence relies on estimation. The interval sequence is converted into an absence length sequence whose entries indicate null value periods in performance data. Conversion includes generating a presence sequence from the interval sequence, and deriving the absence length sequence from the presence sequence, by using a set-based algorithm or other mechanism. Excessive absence length values support treating intervals as downtime for the machine. Correction logic may include a stored procedure residing in a database, for example, which produces the absence length sequence without using a procedural language.
US08856632B2 Method and a device for controlling frequency synchronization
A device for controlling frequency synchronization includes a processor for controlling a phase-controlled clock signal to achieve phase-locking with a reference clock signal, and for controlling a frequency-controlled clock signal so as to achieve frequency-locking with the reference clock signal. The processor is also configured to monitor a deviation between the frequency and phase-controlled clock signals, detect a change of circumstances such as temperature changes causing frequency drifting of the frequency-controlled clock signal, and replace or correct the frequency-controlled clock signal with, or on the basis of, the phase-controlled clock signal when both the monitored deviation and the detected change of circumstances show correlation confirming frequency drift of the frequency-controlled clock signal.
US08856630B2 Continuous parallel Viterbi decoder
A continuous parallel Viterbi decoder configured to (a) compute Trellis paths from an input bitstream encoded with a convolutional code, (b) backtrack the Trellis paths to generate an output signal, (c) store the Trellis paths in a shared memory, and (d) coordinate simultaneous read/write operations from and to the shared memory.
US08856628B2 Method and apparatus for generation and usage of extended golay codes
A wireless device comprises a code-assignment module configured for assigning Golay codes to be used for spreading, a spreading module configured for spreading data with the Golay codes to produce a signal, wherein the Golay codes are randomly used to spread the data, and a transmitter configured for transmitting the signal. The wireless device may transmit a first beacon signal via a set of quasi-omni beam patterns, and a second beacon signal via a set directional beam patterns. The first beacon signal has a first transmission rate that is higher than the second beacon signal's transmission rate. Extended Golay codes having zero periodic cross-correlation may be generated from a Golay code and a set of short sequences. A data block transmitted by the wireless device may comprise Golay codes and data portions, wherein every data portion is between two Golay codes and every Golay code is between two data portions.
US08856627B2 Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction. Other embodiments are described and claimed.
US08856626B2 Decoder, decoding method and communication apparatus
According to one embodiment, a decoder includes a control unit and a decoding unit. The control unit determines a window size applied to a first target frame to be a first value and determines a window size applied to a second target frame different from the first target frame to be a second value different from the first value. The decoding unit carries out windowed decoding of a spatially coupled code on the first target frame with the window size set to the first value and carries out windowed decoding of a spatially coupled code on the second target frame with the window size set to the second value.
US08856624B1 Method and apparatus for dynamically generating error correction
A method and apparatus for dynamically selecting forward error correction codes to accompany transmitted packet data on a network is taught. Source content parameter(s) and network state parameter(s) are analyzed to select either equal protection (EP) error correction or unequal correction (UEP) error correction. Selection of UEP error correction versus EP error correction improves the perceived quality of transmitted data without requiring additional error correction overhead.
US08856618B2 Scalable repair block error correction for sequential multiple data blocks in a magnetic data storage device
A technique for recovering of “squeezed” sectors in a set of sequential sectors such as are used in Shingled Magnetic Recording (SMR) is described. Embodiments of the invention use a programmable erased sector recovery scheme, which is a concatenation of a “Cauchy-type” track erasure correction code, together with a media-error correction code that generates N-weighted parity-sectors per track and is capable of replacing up to N-erased sectors per track in any possible combination.
US08856617B2 Sending a zero information gain formatted encoded data slice
A method begins by a dispersed storage (DS) processing module determining whether to send an encoded data slice of set of encoded data slices in accordance with a zero information gain (ZIG) format. When the encoded data slice is to be sent in accordance with the ZIG format, the method continues with the DS processing module selecting a partial encoding threshold number of encoded data slices of the set of encoded data slices, wherein the partial encoding threshold number of encoded data slices does not include the encoded data slice and generating a set of ZIG encoded data slices based on a ZIG function and the partial encoding threshold number of encoded data slices, wherein the set of ZIG encoded data slices represents recovery information of the encoded data slice. The method continues with the DS processing module outputting the set of ZIG encoded data slices.
US08856616B1 Two dimensional encoding for non-volatile memory blocks
Method for encoding information in a flash memory block which combines an independent encoding of each page with a block-level code across multiple pages. The method includes two independent error correction codes, one in horizontal direction and one in vertical direction, with horizontal direction error correction decoding; and vertical direction erasure correction decoding.
US08856615B1 Data storage device tracking log-likelihood ratio for a decoder based on past performance
A data storage device is disclosed comprising a non-volatile memory (NVM). First data is written to a first area of the NVM, and a first estimated data sequence is read from the first area of the NVM. The first estimated data sequence is first decoded, and a log-likelihood ratio (LLR) is first updated based on the first decode. Second data is written to a second area of the NVM, and a second estimated data sequence is read from the second area of the non-volatile memory. The second estimated data sequence is second decoded in response to the first updated LLR, and the LLR is second updated based on the second decode.
US08856613B2 Semiconductor storage device, memory control device, and control method of semiconductor memory
According to one embodiment, a semiconductor storage device includes a semiconductor memory which includes two or more cell peripheral circuits and two or more storage cells at least one of reading and writing of which is controlled by the cell peripheral circuits in each of the cell peripheral circuits. Further, the semiconductor storage device includes a memory control unit configured to instruct to form 1 symbol as a unit for creating an error correction code by the data held by the storage cells controlled by the same cell peripheral circuit and creating an error correction code to the symbol created base of the instruction.
US08856612B2 Method and apparatus for interleaving data in a mobile communication system
An interleaving method in a mobile communication system is provided. The interleaving method includes encoding a plurality of bits to output encoded bits in a sequence, interleaving the encoded bits based on a modulation order to generate interleaved encoded bits comprising consecutive bits having a size based on the modulation order, the consecutive bits corresponding to consecutive bits of the encoded bits, scrambling the interleaved encoded bits with a scrambling code to generate scrambled bits, and modulating the scrambled bits based on the modulation order to output at least one symbol.
US08856610B2 Computer readable storage medium storing error correction program and communication apparatus
A computer-readable medium storing a program causing a computer to execute a process includes, acquiring a plurality of data units that belong to a first block in a certain hierarchy among hierarchical blocks defined by a plurality of hierarchies; generating error correction information corresponding to the first block that equals to an exclusive-OR of the plurality of data units; generating, in each individual hierarchy of one or more individual hierarchies that are continuous from and are lower than the certain hierarchy, error correction information corresponding to each individual block that equals to the exclusive-OR of all data units that belong to the individual block among the plurality of data units, where the individual block is one or more individual blocks other than one specific block in two or more blocks in the individual hierarchy that are included in the same block in a hierarchy.
US08856604B2 Transceiver feedback and/or re-transmission control
A method and apparatus of providing ARQ feedback is disclosed. A first step of one method includes a transmitter transmitting ARQ blocks. A second step includes a receiver transmitting ARQ feedback messages, wherein each ARQ feedback message includes a time reference that indicates a transmission time of a latest transmission burst accounted for in the ARQ feedback message.
US08856602B2 Multi-core processor with internal voting-based built in self test (BIST)
A method and circuit arrangement utilize scan logic disposed on a multi-core processor integrated circuit device or chip to perform internal voting-based built in self test (BIST) of the chip. Test patterns are generated internally on the chip and communicated to the scan chains within multiple processing cores on the chip. Test results output by the scan chains are compared with one another on the chip, and majority voting is used to identify outlier test results that are indicative of a faulty processing core. A bit position in a faulty test result may be used to identify a faulty latch in a scan chain and/or a faulty functional unit in the faulty processing core, and a faulty processing core and/or a faulty functional unit may be automatically disabled in response to the testing.
US08856601B2 Scan compression architecture with bypassable scan chains for low test mode power
This invention permits selectively bypasses serial scan chains. Constant or low toggle data is directed to the bypassed serial scan chain, thus reducing power consumption. The number and identity of serial scan chains bypassed during a particular test can be changed dynamically dependent upon the semiconductor process variations of a particular integrated circuit. This enables an optimal test to be preformed for integrated circuits having differing semiconductor process variations.
US08856596B2 Debugging apparatus and method
A debugging apparatus and method are provided. The debugging apparatus may include a breakpoint setting unit configured to store a first instruction corresponding to a breakpoint in a table, stop a program currently being executed, and insert a breakpoint instruction including current location information of the first instruction into the breakpoint; and an instruction execution unit configured to selectively execute one of the breakpoint instruction and the first instruction according to a value of a status bit.
US08856589B1 Failure protection in an environment including virtualization of networked storage resources
An architecture for protecting against failure in a switched storage network using virtualization.
US08856584B2 Transport control server that modifies routing information
The time required for a path recalculation and a path switching upon occurrence of a failure is shortened. A path generation unit of a transport control server (TCS) S-1 generates the normal path information in accordance with the topology information of a network and the resource information which are set. Also, the path generation unit generates in advance the backup path information for occurrence of the failure based on the prediction topology information and the prediction resource information which have been modified in accordance with a predicted failure position. A path information notification unit of the TCS (S-1) notifies nodes N of the generated normal path information. A failure information acquisition unit of the TCS (S-1) detects the occurrence of the failure. If the occurrence of the failure is detected, the path information notification unit notifies the nodes N of the backup path information that is stored.
US08856582B2 Transparent failover
Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by the client. The server uses the handle identifier to associate with state information. When there is a network failure or a server failover, and a reconnection to the client, the handle identifier is used to identify replayed requests that if replayed would create an inconsistent state on the server. The replayed requests are then appropriately handled.
US08856574B2 Power supply start-up mechanism, apparatus, and method for controlling activation of power supply circuits
A power supply start-up sequencing mechanism for controlling activation of a plurality of power supply circuits with a predetermined timing is disclosed. The mechanism comprises a time value generator arranged to provide a time value signal; and for each of the power supply circuits, a logic circuit arranged to receive the time value signal and from the received signal provide an activation signal to the respective power supply circuit, wherein the respective logic circuit is associated with a start timing value for the respective power supply circuit such that the activation signal is provided when the associated start timing value coincides with the received time value signal. An apparatus comprising such a mechanism, and a method for controlling activation of a plurality of power supply circuits are also disclosed.
US08856571B2 Adjusting device performance over multiple time domains
Adjusting processor performance based on processing profiles. The method may determine that a process has entered a processing state after an idle state. In response to entering the processing state the processing time of the processor may be monitored. In response to the processing time exceeding a first threshold of time, the performance of the processor may be increased from a first level to a second level. In response to the processing time exceeding a second threshold time, the performance of the processor may be decreased from the second level to a third level. In response to the processing time exceeding a third threshold time, the performance of the processor may be increased from the third level to a fourth level. In response to the processing time exceeding a fourth threshold time, the performance of the processor may be decreased from the fourth level to a fifth level.
US08856568B2 Independent power control of processing cores
Independent power control of two or more processing cores. More particularly, at least one embodiment of the invention pertains to a technique to place at least one processing core in a power state without coordinating with the power state of one or more other processing cores.
US08856560B2 Settings based on output powered by low power state power rail
Example embodiments disclosed herein relate to determining a setting at a component. An output to be powered by a low power state power rail can output a value. The component is to be powered by an auxiliary power rail and determines the setting based on the value at auxiliary power good.
US08856558B2 Electronic apparatus having stand-by mode and operation method thereof
An electronic apparatus has a stand-by mode. The electronic apparatus includes a first circuit, a second circuit and a third circuit. The first circuit has an interface and transfers data to an external device. The second circuit has a processor and sets a first power supplying mode of the first circuit. The third circuit sets a second circuit power supplying mode of the second circuit and sets a second power supply mode of the first circuit when the second circuit is disabled. The processor selects a first circuit power supplying mode from power supplying modes of the first circuit as the second power supplying mode before the second circuit is disabled.
US08856555B2 Power state coordination for portable test tools
A system and method of coordinating power states between two detachable units is disclosed. Only the primary unit has a user-controllable power control. The secondary unit is not directly user controllable. The power states of the two units are coordinated using an actuator mechanism when the units are attached. When the two units are detached, the state of the secondary unit is dependent upon the state of the primary unit and any subsequent commands transmitted by the primary unit to the secondary unit.
US08856554B2 Information terminal and method of reducing information leakage
An information terminal includes: a storage unit to store information; a data encryption unit to encrypt the information and decrypt the encrypted information using an encryption key; a pre-deletion unit to delete the encryption key; a signal detection unit to detect an interruption signal; a pre-deletion setting unit to instruct the pre-deletion unit to delete the encryption key in response to the detection of the interruption signal; and a deletion stop unit to stop deletion of the encryption key by the pre-deletion unit.
US08856552B2 Directory synchronization of a dispersed storage network
A method begins by a processing module dispersed storage error encoding data to produce a set of encoded data slices and generating a transaction identifier regarding storage of the set of encoded data slices. The method continues with the processing module outputting a plurality of write request messages to a plurality of dispersed storage (DS) units, wherein each of the plurality of write request messages includes the transaction identifier and a corresponding one of the set of encoded data slices. The method continues with the processing module receiving write response messages from at least some of the DS units, wherein each of the write response messages includes a reference to the transaction identifier. The method continues with the processing module updating directory information regarding storage of the data to produce updated directory information when at least a write threshold number of the write response messages have been received.
US08856551B2 BIOS lock encode/decode driver
Systems and methods for preventing the unauthorized access to data stored on removable media, such as software, include storing a predetermined signature in the area of non-volatile memory in a computer system. Upon initialization of the computer system, a check is made to verify the signature. Only if the signature is verified will decoding software operate.
US08856550B2 System and method for pre-operating system encryption and decryption of data
Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) monitor for input/output operations occurring prior to loading of an operating system into the memory; and (ii) in response to detection of an input/output operation, communicate a command to the encryption accelerator to perform an encryption or decryption task upon data associated with an input/output operation.
US08856546B2 Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures
A processing apparatus may comprise logic to preprocess a message according to a selected secure hash algorithm (SHA) algorithm to generate a plurality of message blocks, logic to generate hash values by preparing message schedules in parallel using single instruction multiple data (SIMD) instructions for the plurality of message blocks and to perform compression in serial for the plurality of message blocks, and logic to generate a message digest conforming to the selected SHA algorithm.
US08856540B1 Customized ID generation
Technologies are described herein for customized identifier (“ID”) generation by an ID service. One or more calling components (“components”) remote from the ID service generate requests for IDs. The requests can include one or more rules defining how the IDs are to be generated, type data identifying a type of IDs to be generated, encryption data specifying whether, and if so, how the IDs are to be encrypted, and number data defining how many IDs are to be generated at a particular time. The ID service receives the request, and in response to the request, generates the number of IDs specified, in accordance with the rules, type data, and encryption data provided in the request. An ID database can store one or more of the IDs and/or rules associated with the components, such that each component can be relieved from maintaining its own database for ID operations.
US08856539B2 Universal secure registry
A secure registry system and method for the use thereof are provided which permits secure access to a database containing selected data on a plurality of entities, at least portions of which database has restricted access. Mechanisms are provided for controlling access to restricted access portions of the database are provided, such access being determined by at least one of the identity of the requesting entity and the entity's status. A multicharacter public code may be provided which the system can map to provide permit delivery of items, complete telephone calls and perform other functions for entities. The system may also be utilized to locate an individual based on limited biological data. Organizations utilizing the system may have custom software facilitating their access and use of the system.
US08856537B2 Method for protecting a telecommunication network and secure router implementing such a method
This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA′1, LSA′2, . . . LSA′n) is transmitted, at least one sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n)) of the lists to be transmitted, and The step of comparing the receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) to the sending fingerprint (hash(LSA′1), hash(LSA′2), . . . hash(LSA′n) such that the sending of a list of links (LSA1, LSA2, LSAn) is inhibited if the receiving fingerprint is different from the sending fingerprint.
US08856530B2 Data storage incorporating cryptographically enhanced data protection
Various exemplary embodiments relate to a system for storing encrypted data and providing access to a group of users. The system may include: a record of user accounts including: a user identifier and a public encryption key; an access control list (ACL) defining an access control policy including: permissions defining access to data objects associated with the ACL and an ACL key list including copies of a an ACL key encrypted with the public keys of the users; a user-data storage medium including: encrypted user data, stored as a plurality of data objects, each object associated with an ACL and encrypted with the ACL key, and meta-data; and an access controller configured to: receive a request for a data object, and send a copy of the data object and the ACL key encrypted with the public key of the user if the user has permission to access the data object.
US08856529B2 Systems and methods for providing security to different functions
Methods and systems provide secure functions for a mobile client. A circuit may include a memory configured to store a server access key and a first function authentication key. The circuit may also include authentication circuitry configured to access the server access key to authenticate access to a server to download a function capsule comprising a first function and to access the first function authentication key to authenticate use of the first function of the function capsule.
US08856528B2 Challenge-response system for maintenance operations via responder for telecommunications cabinet
Method of performing a challenge-response process, comprising, in this sequence, the steps of a) providing a first challenge-response pair (50) on a source device (10), assigned to a responding device (30); b) loading the first challenge-response pair (50) from the source device (10) to a challenging device (20), while the source device (10) is operationally connected to the challenging device (20); c) performing a challenge-response process between the challenging device (20) and the responding devices (30) to which the first challenge-response pair (50) is assigned, d) loading one or more second challenge-response pairs (50) from a source device (10) to the challenging device (20), while the source device (10) is operationally connected to the challenging device (20), wherein the step of loading the first challenge-response pair (50) from the source device (10) to a challenging device (20) is performed before the challenging device (20) has received any information from one of the responding devices (30), to which the first challenge-response pair (50) is assigned.
US08856522B2 Security, safety, and redundancy employing controller engine instances
The claimed subject matter provides a system and/or method that facilitates employing safety within an industrial environment. An enhancing component can implement at least one of a security level, authentication, authorization, or an access right to a validated action to at least one of the controller or the controller engine instance. The enhancing component can further separate two or more entities within the industrial environment, the first entity related to process control and the second entity related to process safety. Additionally, the enhancing component can employ at least one of a backup controller or a backup controller engine instance in the event of at least one of a software error or a hardware error within the industrial environment.
US08856511B2 System and method for wiping and disabling a removed device
A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device.
US08856510B2 Method for joining user domain and method for exchanging information in user domain
A method for joining a user domain based on digital right management (DRM), a method for exchanging information between a user device and a domain enforcement agent, and a method for exchanging information between user devices belonging to the same user domain include sharing a domain session key between the user device and the domain enforcement agent or between the user devices belonging to the same user domain. Information is exchanged through a secure session set up between the user device and domain enforcement agent or between the user devices, and information exchange occurs through encryption/decryption using the domain session key.
US08856508B2 Onboard access control system for communication from the open domain to the avionics domain
An onboard access control system to an information system onboard an aircraft, for communication from the open domain to the avionics domain, the open end avionics domains being connected to each other through a single-directional link from the avionics domain to the open domain. The system includes: a security device including: access switches controlling access to the avionics and open domains, a controller, a module for acquisition putting data into buffer memory and transmission to the avionics domain, a data control module, an acquisition module from the open domain and putting into buffer memory, and an operator's authentication mechanism.
US08856505B2 Malware management through kernel detection during a boot sequence
A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing pestware-related events before native applications can run and after a kernel is loaded; managing pestware-related events when native applications can run; and scanning a registry of the computer for pestware when native applications can run. In variations, a pestware management engine is initialized after an operating system of the protected computer is initialized and the pestware management system both receives an event log of the monitored events and compiles the set of behavior rules utilized by kernel-level monitor.
US08856503B2 Computing system, booting method and code/data pinning method thereof
The booting method of a computing system includes determining whether boot data of an operating system is pinned to a main memory, reading boot data from a storage device to pin the read boot data to the main memory when relocation of the pinned boot data is required, and performing a booting operation using the pinned boot data.
US08856501B2 Method and system for controlling operation of interconnected devices by circulating host capability without a centralized manager
Systems and methods for automatically and controlling operation of one or more devices in a system are provided. In a particular embodiment, a command is received by a device in order for the device to determine whether to perform an operation (such as perform initialization of the device). The command may include information indicative of resource capabilities of at least a part of the system. Using the information, the device may determine whether to begin performing the operation (such as initialization), and perform the operation if it is determined to do so.
US08856500B2 Obfuscating program by scattering sequential instructions into memory regions such that jumps occur with steps of both signs in equal frequency
A program is obfuscated by reordering its instructions. Original instruction addresses are mapped to target addresses in an irregular way, with position dependent address steps between the addresses of logically successive instructions. Preferably pseudo-random address steps are used, for example with address steps that have mutually opposite sign with equal frequency. The data processing device has an instruction flow control unit that updates instruction addresses according the position dependent address steps. The instruction flow control unit may comprise a circuit that contains secret information, which is not normally accessible from the outside, to control the updates. A lookup table may be used for example, with address steps, successor addresses or mapped address values. In an embodiment the mapping of original instruction addresses to target addresses may be visualized by means of a path (36) along points in an n-dimensional array, where n is greater than one. Successive original instruction addresses are mapped to successive locations in the path, and locations along respective rows of the array are mapped to respective mutually disjoint ranges (33a-d). Because an n-dimensional path is used a form of locality is preserved that provides for cache efficiency, whereas the multi-dimensional nature of the path makes it possible to combine this locality with pseudo-random steps.
US08856497B2 Central processor for memory tag
This invention provides a processor 200, especially for use as the central processing unit of a memory tag 1200. The processor 200 has a minimal footprint in Silicon or other suitable material. It also is driven by the data that it receives. The processor includes a plurality 206, 212, 214, 224 of registers configured to receive in parallel data that are input to the processor, and to process in parallel the received data, and a micro sequencer and instruction decoder module 202 adapted to select two or more of the plurality of registers to receive the data that are input to the processor, and to control the processing of the received data by the end or more selected registers. A memory 1200 device utilizing such a processor, and a method of processing instructions are also provided.
US08856491B2 Garbage collection implemented in hardware
A computing device is provided and includes a memory module, a sweep engine, a root snapshot module, and a trace engine. The memory module has a memory implemented as at least one hardware circuit. The memory module uses a dual-ported memory configuration. The sweep engine includes a stack pointer. The sweep engine is configured to send a garbage collection signal if the stack pointer falls below a specified level. The sweep engine is in communication with the memory module to reclaim memory. The root snapshot engine is configured to take a snapshot of roots from at least one mutator if the garbage collection signal is received from the sweep engine. The trace engine receives roots from the root snapshot engine and is in communication with the memory module to receive data.
US08856490B2 Optimizing TLB entries for mixed page size storage in contiguous memory
A system and method for accessing memory are provided. The system comprises a lookup buffer for storing one or more page table entries, wherein each of the one or more page table entries comprises at least a virtual page number and a physical page number; a logic circuit for receiving a virtual address from said processor, said logic circuit for matching the virtual address to the virtual page number in one of the page table entries to select the physical page number in the same page table entry, said page table entry having one or more bits set to exclude a memory range from a page.
US08856489B2 Logical sector mapping in a flash storage array
A system and method for efficiently performing user storage virtualization for data stored in a storage system including a plurality of solid-state storage devices. A data storage subsystem supports multiple mapping tables. Records within a mapping table are arranged in multiple levels. Each level stores pairs of a key value and a pointer value. The levels are sorted by time. New records are inserted in a created newest (youngest) level. No edits are performed in-place. All levels other than the youngest may be read only. The system may further include an overlay table which identifies those keys within the mapping table that are invalid.
US08856488B2 Method for utilizing a memory interface to control partitioning of a memory module
Apparatuses and methods for implementing partitioning in memory cards and modules where conventional memory cards or modules have only a single partition. A representative memory card/module in accordance with the invention includes a memory device(s), and a memory interface which includes a data bus, a command line and a clock line. The memory card/module further includes a memory controller coupled to the memory device(s) and to the memory interface. The memory card/module includes means for controlling the partitioning of the memory device(s), and the memory controller is configured to operate the memory device(s) in accordance with the partition information.
US08856486B2 Deploying a copy of a disk image from source storage to target storage
A technique deploys a copy of a disk image from source storage to target storage. The technique involves identifying a particular disk image to be copied from the source storage to the target storage. The technique further involves performing a comparison operation between a first disk image list which lists disk images on the source storage and a second disk image list which lists disk images on the target storage to generate a common disk image list which lists a set of common disk images on both the source and target storage. The technique further involves transferring, from the source storage to the target storage, a set of data portions representing differences between the particular disk image and a common disk image listed on the common disk image list. The set of data portions in combination with the common disk image form a deployed copy on the target storage.
US08856485B2 Storage system and storage control method
A storage method and system where the storage system includes a plurality of servers and a control server configured to select a storage area available to be used by each of the servers from among storage areas of a group of storage devices sharable among the plurality of servers. The system includes, a detecting unit configured to detect an available capacity of a specified storage device other than the storage group, where the specified storage device is designated for use only by a specified server selected from among the servers, a specifying unit configured to specify an available area corresponding to the available capacity detected from the specified storage device through the detecting unit, and a setting unit configured to set the specified available area to a shared storage area that is available to be shared among the server.
US08856484B2 Mass storage system and methods of controlling resources thereof
A storage system and a method for managing a memory capable of storing metadata related to logical volume sets, are disclosed. A memory quota is assigned to a metadata related to a logical volume set. The size of a memory currently consumed by the metadata is monitored. Upon exceeding a threshold by the size of the monitored memory, at least one restraining action related to memory consumption by the metadata is applied.
US08856483B1 Virtual data storage service with sparse provisioning
Virtual data stores may be sparsely provisioned by virtual data storage services in a manner that controls risk of implementation resource shortages. Relationships between requested data storage space size, data storage server capacity, allocated data storage space size and/or allocated data storage space utilization may be tracked on a per data store, per customer, per data storage server, and/or a per virtual data storage service basis. For each such basis, a set of constraints may be specified to control the relationships. The set of constraints may be enforced during implementation resource allocation, and by migration of data storage space portions to different implementation resources as part of a sparse provisioning load balancing. Sparse provisioning details may be made explicit to virtual data storage service customers to varying degrees including explicit, aggregate on a per customer basis, and aggregate on a per virtual data storage service basis.
US08856480B2 Mechanism for enabling full data bus utilization without increasing data granularity
A memory is disclosed comprising a first memory portion, a second memory portion, and an interface, wherein the memory portions are electrically isolated from each other and the interface is capable of receiving a row command and a column command in the time it takes to cycle the memory once. By interleaving access requests (comprising row commands and column commands) to the different portions of the memory, and by properly timing these access requests, it is possible to achieve full data bus utilization in the memory without increasing data granularity.
US08856478B2 Arithmetic processing unit, information processing device, and cache memory control method
A processor holds, in a plurality of respective cache lines, part of data held in a main memory unit. The processor also holds, in the plurality of respective cache lines, a tag address used to search for the data held in the cache lines and a flag indicating the validity of the data held in the cache lines. The processor executes a cache line fill instruction on a cache line corresponding to a specified address. Upon execution of the cache line fill instruction, the processor registers predetermined data in the cache line of the cache memory unit which has a tag address corresponding to the specified address and validates a flag in the cache line having the tag address corresponding to the specified address.
US08856477B1 Networked raid in a virtualized cluster
Technologies are described herein for providing networked RAID in a virtualized storage cluster. The storage capacity of a storage cluster having two or more storage nodes is organized into tiers. A portion of the available storage capacity is allocated to one tier that is organized using chained declustering. Another portion of the available storage capacity is allocated to another tier that is organized using a networked RAID configuration. The storage cluster monitors the frequency at which data in the storage cluster is accessed. Frequently used data that is stored in the network RAID-configured tier is promoted to the chained declustered-configured tier. Infrequently used data that is stored in the chained declustered-configured tier is demoted to the network RAID-configured tier.
US08856474B2 Nonvolatile memory unit with secure erasing function
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the nonvolatile memory to execute data erasing on the basis of the erase command output from the interface, an external input unit which is installed independently of the interface, a second controller that controls the nonvolatile memory to execute data erasing on the basis of an erase instruction signal output from the external input unit, and a change-over circuit that switches between connection of the first controller with the nonvolatile memory and connection of the second controller with the nonvolatile memory, wherein the second controller controls the nonvolatile memory to execute data erasing on the basis of the erase instruction when the connection of the second controller with the nonvolatile memory is established by the change-over circuit.
US08856471B2 System, method and a non-transitory computer readable medium for creating a warranted snapshot
A method for providing a warranted snapshot that may include: receiving a request to create a first warranted snapshot of a first logical volume at a first point in time and creating the first warranted snapshot if the first warranted snapshot is non-writable and if an amount of physical storage actually devoted by a storage system to the first logical volume at the first point of time does not exceed a size of a free physical storage space that is available for storing any future data delta associated with the first warranted snapshot. The creating of the first warranted snapshot may include allocating a first virtual portion of a physical storage space for storing any future data delta associated with the first warranted snapshot. A size of the first virtual portion equals the amount of physical storage actually devoted to the first logical volume at the first point of time.
US08856469B2 Apparatus and method for logging optimization using non-volatile memory
A logging optimization technology using a non-volatile memory is provided. A log record has a first link connected based on a page unit and a second link connected based on a transaction unit. The log record is stored in a non-volatile memory buffer. The log record stored in the non-volatile memory buffer is deleted or moved to a disk, if necessary.
US08856468B2 Memory device capable of improving write processing speed and memory control method
According to one embodiment, a memory device includes a memory unit, a first storage unit, a second storage unit, a third storage unit, a data move unit, and a controller. The first storage unit stores a logical address and an intermediate address. The second storage unit stores the intermediate address and the physical address corresponding to the intermediate address. The third storage unit stores a flag corresponding to the logical address and the intermediate address. The flag represents whether read of latest data by a read operation has succeeded. When the flag stored in the third storage unit represents a success of the read of the latest data, the controller determines whether write has been done for the same logical address of the memory unit during the data move processing, and if the write has been done, invalidates the data move processing.
US08856466B2 Mechanisms to accelerate transactions using buffered stores
In one embodiment, the present invention includes a method for executing a transactional memory (TM) transaction in a first thread, buffering a block of data in a first buffer of a cache memory of a processor, and acquiring a write monitor on the block to obtain ownership of the block at an encounter time in which data at a location of the block in the first buffer is updated. Other embodiments are described and claimed.
US08856465B2 Memory control apparatus and memory control method for controlling the priority of memory accesses
Memory accesses to a memory device that is in a power saving mode depend on the order of the issuance thereof. Thus, a period of time during which the memory is placed in the power saving mode is sometimes shortened, resulting in less effective power savings. A memory control apparatus, which is connected with a plurality of masters and a plurality of memories having a power saving mode, arbitrates memory accesses from the plurality of the masters, monitors whether each of the plurality of the memories is in the power saving state, and determines the priorities of the memory accesses according to the result of the detection of the power saving mode.
US08856464B2 Systems for two-dimensional main memory including memory modules with read-writeable non-volatile memory devices
In one embodiment of the invention, a system is disclosed including a master memory controller and a plurality of memory modules coupled to the master memory controller. Each memory module includes a plurality of read-writeable non-volatile memory devices in a plurality of memory slices to form a two-dimensional array of memory. Each memory slice in each memory module includes a slave memory controller coupled to the master memory controller. When the master memory controller issues a memory module request, it is partitioned into a slice request for each memory slice.
US08856463B2 System and method for high performance synchronous DRAM memory controller
The disclosed system and method enhances performance of pipelined data transactions involving FIFO buffers by implementing a transaction length indicator in a transaction header. The length indicator in the header is formed by components coupled to a memory controller through FIFO buffers. The memory controller uses the length indicator to execute pipelined data transfers at relatively high speeds without causing additional inadvertent shifts or indexes in the FIFO buffer being read. The system and method can be applied to any memory type in general, and avoids the use of additional control signals or added complexity or size in the memory controller.
US08856459B1 Matrix for numerical comparison
A method and apparatus for utilizing a matrix to store numerical comparisons is disclosed. In one embodiment, an apparatus includes an array in which results of comparisons are stored. The comparisons are performed between numbers associated with agents (or functional units) that have access to a shared resource. The numbers may be a value to indicate a priority for their corresponding agents. The comparison results stored in an array may be generated based on comparisons between two different numbers associated with two different agents, and may indicate the priority of each relative to the other. When two different agents concurrently assert requests for access to the shared resource, a control circuit may access the array to determine which of the two has the higher priority. The agent having the higher priority may then be granted access to the shared resource.
US08856457B2 Information processing system and a system controller
In a system including a plurality of CPU units having a cache memory of different capacity each other and a system controller that connects to the plurality of CPUs and controls cache synchronization, the system controller includes a cache synchronization unit which monitors an address contention between a preceding request and a subsequent request and a setting unit which sets different monitoring range of the contention between the preceding request and the subsequent request for each capacity of the cache memory in each of the CPU units.
US08856455B2 Data cache block deallocate requests
A data processing system includes a processor core supported by upper and lower level caches. In response to executing a deallocate instruction in the processor core, a deallocation request is sent from the processor core to the lower level cache, the deallocation request specifying a target address associated with a target cache line. In response to receipt of the deallocation request at the lower level cache, a determination is made if the target address hits in the lower level cache. In response to determining that the target address hits in the lower level cache, the target cache line is retained in a data array of the lower level cache and a replacement order field in a directory of the lower level cache is updated such that the target cache line is more likely to be evicted from the lower level cache in response to a subsequent cache miss.
US08856454B2 Anticipatory response pre-caching
Interaction between a client and a service in which the service responds to requests from the client. In addition to responding to specific client requests, the service also anticipates or speculates about what the client may request in the future. Rather than await the client request (that may or may not ultimately be made), the service provides the unrequested anticipatory data to the client in the same data stream as the response data that actual responds to the specific client requests. The client may then use the anticipatory data to fully or partially respond to future requests from the client, if the client does make the request anticipated by the service. Thus, in some cases, latency may be reduced when responding to requests in which anticipatory data has already been provided. The service may give priority to the actual requested data, and gives secondary priority to the anticipatory data.
US08856452B2 Timing-aware data prefetching for microprocessors
A method and apparatus for prefetching data from memory for a multicore data processor. A prefetcher issues a plurality of requests to prefetch data from a memory device to a memory cache. Consecutive cache misses are recorded in response to at least two of the plurality of requests. A time between the cache misses is determined and a timing of a further request to prefetch data from the memory device to the memory cache is altered as a function of the determined time between the two cache misses.
US08856450B2 Systems for managing a cache in a multi-node virtual tape controller
According to one embodiment, a system includes a virtual tape library having a cache, a virtual tape controller (VTC) coupled to the virtual tape library, and an interface for coupling at least one host to the VTC. The cache is shared by all the hosts, and a common view of a cache state, a virtual library state, and a number of write requests pending is provided to all the hosts by the VTC.
US08856449B2 Method and apparatus for data storage and access
A query cache stores queries and corresponding results of the queries, the results of the queries being derived from a primary store. A differential store stores a pointer to data of the primary store which has changed and which affects the result of the queries stored in the query store. A new query may be satisfied by accessing the corresponding query in the query store and determining, by reference to the differential store, whether data relating to the query in the primary store has changed since the query store was compiled and, completing the new query, by accessing the corresponding data in the primary store, if applicable. Data in the differential store may be arranged and partitioned according to labels. The partitioning may be varied according to predetermined rules.
US08856447B2 Converting memory accesses near barriers into prefetches
Methods, apparatuses, and processors for reducing memory latency in the presence of barriers. When a barrier operation is executed, subsequent memory access operations are delayed until the barrier operation retires. While the memory access operation is delayed, the memory access operation is converted into a prefetch request and sent to the L2 cache. Then, data corresponding to the prefetch request is retrieved and stored in the L1 data cache. When the memory access operation wakes up, the data for the operation will already be stored in the L1 data cache, reducing the memory latency of the operation.
US08856446B2 Hazard prevention for data conflicts between level one data cache line allocates and snoop writes
A comparator compares the address of DMA writes in the final entry of the FIFO stack to all pending read addresses in a monitor memory. If there is no match, then the DMA access is permitted to proceed. If the DMA write is to a cache line with a pending read, the DMA write access is stalled together with any DMA accesses behind the DMA write in the FIFO stack. DMA read accesses are not compared but may stall behind a stalled DMA write access. These stalls occur if the cache read was potentially cacheable. This is possible for some monitored accesses but not all. If a DMA write is stalled, the comparator releases it to complete once there are no pending reads to the same cache line.
US08856443B2 Avoiding duplication of data units in a cache memory of a storage system
According to the teaching disclosed herein there is provided at least a method, system and device for managing a cache memory of a storage system. The storage system is associated with at least one physical storage device and, responsive to a read request, comprising information indicative of a logical address of at least one requested data unit, to obtain a storage physical address associated with the logical address, search the cache memory for a data unit associated with the storage physical address and service the request from the cache in case the data unit is found in the cache memory.
US08856441B2 Dynamic hard disk mapping method and server using the same
A dynamic hard disk mapping method and a server using the same are disclosed. The server includes a first motherboard, a second motherboard, a first disk group corresponding to the first motherboard, and a second disk group corresponding to the second motherboard. In the dynamic hard disk mapping method, at first, a disk redistributing instruction is received and stored. Thereafter, a reset instruction is received and performed. Then, the number of hard disks of the first disk group and the number of hard disks of the second disk group are summed up to obtain a total hard disk number N, wherein N is a positive integer greater than zero. Thereafter, the disk redistributing instruction is read, and a redistribution computation is performed in accordance with the disk redistributing instruction to obtain a third disk group corresponding to the first motherboard and a fourth disk group corresponding to the second motherboard.
US08856440B2 Volatile memory representation of nonvolatile storage device set
The storage devices of a storage device set (e.g., a RAID array) may generate a nonvolatile representation of the configuration of the storage device set, including logical disks, spaces, storage pools, and layout and provisioning plans, on the physical media of the storage devices. A computer accessing the storage device set may also generate a volatile memory representation of the storage device set to use while accessing the storage devices; however, the nonvolatile representation may not be performant due to its different usage and characteristics. Presented herein are techniques for accessing the storage device set according to a volatile memory representation comprising a hierarchy of logical disks, slabs, and extents, and an accessor comprising a provisioning component that handles slab accesses while applying provisioning plans, and that interfaces with a lower-level layout component that translates slab accesses into storage device accesses while applying layout plans to the storage device set.
US08856438B1 Disk drive with reduced-size translation table
A disk drive is disclosed that utilizes an additional address mapping layer between logical addresses used by a host system and physical locations in the disk drive. Physical locations configured to store metadata information can be excluded from the additional address mapping layer. As a result, a reduced size translation table can be maintained by the disk drive. Improved performance, reduced costs, and improved security can thereby be attained.
US08856436B2 Locating host data records on a physical stacked volume
According to one embodiment, a method for accessing host data records stored on a VTS system includes receiving a mount request to access at least one host data record on a VTS system, determining a number of host compressed data records per physical block on a sequential access storage medium, determining a PBID that corresponds to the requested at least one host data record, accessing a physical block on the sequential access storage medium corresponding to the PBID, and outputting the physical block without outputting an entire logical volume that the physical block is stored to. In another embodiment, a VTS system includes random access storage, sequential access storage, support for at least one virtual volume, a storage manager having logic for determining a PBID that corresponds to a SLBID, and logic for performing the above described method. Other methods are also described.
US08856426B2 Memory device
There is provided a memory device capable of stably storing recorded data over a long term of several decades or longer and capable of reliably reading stored data. A first circuit 200 and a second circuit 300 are separately implementable, and the first circuit 200 includes a data recording circuit 210 reading recorded data from an address appointed by an address signal when a read/write signal stays at a first level and writing data to the address appointed by the address signal when the read/write signal stays at a second level, and a write/read control circuit 230 performing data write/read control on the data recording circuit according to the address signal in response to a read or write instruction from the second circuit.
US08856424B2 Semiconductor storage device and method of throttling performance of the same
A semiconductor storage device and a method of throttling performance of the same are provided. The semiconductor storage device includes a non-volatile memory device, and a controller configured to receive a write command from a host and program and to write data received from the host to the non-volatile memory device in response to the write command. The controller inserts idle time after receiving the write data from the host and/or after programming the write data to the non-volatile memory device.
US08856421B2 Multi-processor architecture using multiple switch fabrics implementing point-to-point serial links and method of operating same
A multi-processor architecture for a network device that includes a plurality of barrel cards, each including: a plurality of processors, a PCIe switch coupled to each of the plurality of processors, and packet processing logic coupled to the PCIe switch. The PCIe switch on each barrel card provides high speed flexible data paths for the transmission of incoming/outgoing packets to/from the processors on the barrel card. An external PCIe switch is commonly coupled to the PCIe switches on the barrel cards, as well as to a management processor, thereby providing high speed connections between processors on separate barrel cards, and between the management processor and the processors on the barrel cards.
US08856417B2 Memory module connector with auxiliary power cable
A memory module includes persistent-storage memory chips and an auxiliary voltage connector for powering the persistent-storage memory chips. An auxiliary power cable has a first end coupled to an electronic power source on the system board and has a second end having connector that plugs in to the auxiliary voltage connector on the memory module to provide power to the persistent-storage memory chips. The auxiliary power cable also resists movement of a latch lever to require disconnecting the auxiliary power cable before ejecting the memory module.
US08856411B2 Apparatus and method for remotely controlling peripheral devices in mobile communication terminal
According to one embodiment, a method for remotely controlling peripheral devices in a mobile communication terminal includes acquiring a profile for a controlled peripheral device, configuring a control application for the controlled peripheral device based on the acquired profile, and controlling the controlled peripheral device using the configured control application.
US08856408B2 Reduced latency barrier transaction requests in interconnects
Interconnect circuitry is configured to provide data routes via which at least one initiator device may access at least one recipient device, the circuitry including at least one input for receiving transaction requests; at least one output for outputting transaction requests; at least one path for transmitting the transaction requests between the input and the output. Control circuitry routes received transaction requests from the input to the output in response to a barrier transaction request. An ordering of at least some transaction requests is maintained with respect to the barrier transaction request within a stream of transaction requests passing along one of the at least one paths, by not allowing reordering of at least some of the transactions requests. The control circuitry includes a response signal generator, the response signal generator is responsive to receipt of the barrier transaction request to issue a response signal.
US08856407B2 USB redirection for write streams
Methods and systems for conducting a transaction between a USB device and a virtual USB device driver are provided. A client USB manager stores in a buffer one or more data packets associated with the virtual USB device driver. The client USB manager dequeues one of the one or more data packets from the buffer. The client USB manager transmits the dequeued data packet to the USB device for processing. The client USB manager re-fills completed data packets from the buffer and queues the data packets for transmitting to the USB device without waiting for the virtual USB device driver.
US08856403B2 Communication module, communication system and air conditioner
First and third current paths are connected at mutual one end, and second and fourth current paths are connected at mutual one end. A transmitter sends signals utilizing the change of a current by changing the current flowing between other ends of the first and second current paths. A switching part brings about a non-conductive state between the other end of the third current path and the other end of the fourth current path by being applied with a control signal from a controller. By contrast with this, the switching part brings about a conductive state between the other end of the third current path and the other end of the fourth current path by not being applied the control signal.
US08856399B2 System and method for determining non-fragmentation for communication of packets
A system and method for determining non-fragmentation for communication of data packets includes generating a plurality of packets and storing in a cell-list at least one cell-value indicating a transmission duration of at least one of the packets in units of cell-size, where the cell-size represents a fixed, predetermined time required to transmit at least a minimum length packet. This facilitates determining non-fragmentation for communication of packets having reduced complexity, lower memory requirements, and shorter processing time than conventional techniques. The complexity is O(1), in contrast to conventional non-fragmentation techniques that have complexities O(N). Corresponding to the reduced complexity, the processing time is shorter than for conventional techniques. Depending on the application, the current embodiment has lower memory requirements than conventional non-fragmentation techniques.
US08856398B2 Process to generate various length parameters in a number of SGLS based upon the length fields of another SGL
A method of generating length parameters, comprising the steps of reading a data stream from a host, detecting a particular field of the data stream, and calculating a variable based on a length parameter of a first list to be transferred. The data stream may comprise a plurality of definitions. The method may also comprise the step of selecting one of the list definitions. One of the list definitions may be used to generate a length parameter used in a second list in response to (i) the particular field of the data stream and (ii) the length parameter of the first list.
US08856397B1 Techniques for statistics collection in connection with data storage performance
Described are techniques for tracking activity for one or more devices. Each of the one or more devices is partitioned into one or more extents. Each of the one or more extents includes a plurality of sub extents. Each of the sub extents includes a plurality of chunks. For each of said one or more extents of each of said one or more devices, extent activity level information is determined including one or more metrics indicating an activity level for said each extent; and For each of said one or more extents of each of said one or more devices, an activity bitmap is determined. The activity bitmap includes an entry for each sub extent included in said each extent, said entry indicating an activity level for said each sub extent.
US08856392B2 Dividing a port into smaller ports
A given port at a storage controller is used for communication with storage devices. In response to an indication that at least a portion of the given port is to be dedicated to a group of at least one of the storage devices, the storage controller divides the given port into multiple smaller ports.
US08856391B1 Method and apparatus for controlling data transfer between EEPROM and a physical layer device
An IEEE 802.3 compliant physical layer device provides efficient loading of configuration information of the physical layer device. The configuration information is written into a volatile memory in the physical layer device, and then uploaded to at least one EEPROM. The configuration information is downloaded to the volatile memory during startup of the physical layer device. The system controller can also directly access the EEPROMs, bypassing the volatile memory. By providing a bridge between the system controller and the EEPROMs and providing additional bits in the volatile memory of the physical layer device, the system controller can read and write the EEPROMs one byte at a time. During reset time, the content of the EEPROMs is written to registers in the physical layer device to configure the physical layer device.
US08856390B1 Using device control field to implement non-disruptive notification of an ATA device
An Advanced Technology Attachment (ATA) device is disclosed for communicating with a host. The ATA device receives a command from the host, and while the ATA device is busy processing the command, the ATA device receives intra-command data from the host in at least one bits 3, 4, 5, and 6 in a device control field. In one embodiment the ATA device is a parallel ATA device, and the device control field is part an ATA task file. In another embodiment, the ATA device is a serial ATA device, and the device control field is part of a host to device Frame Information Structure (FIS).
US08856388B2 Method and apparatus for connecting USB devices to a computer
A method and apparatus are provided to enable a plurality of standard USB peripheral devices, utilizing the USB specification, to be distributed at various nodes across a network, wherein communications across the network may take advantage of any pre-existing network connectivity of a standard, non-modified USB host computer. In particular, a virtual host controller function is added to the host computer in order to direct data communications towards a pre-existing network transceiver. As a result, the host computer is not required to be provided with USB hardware and is able to communicate across the network using pre-existing data communication components.
US08856387B2 Local IP access scheme
Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet.
US08856382B2 On-boarding services to a cloud environment
A system in a cloud services environment comprises one or more service offerings, one or more service instances and one or more service support utilities. Each of the one or more service offerings is described by at least one service descriptor. Each of the one or more service instances is obtained from at least one of the one or more service offerings. Each of the one or more service support utilities is customized by at least one service descriptor. A service comprises at least one component and a service descriptor comprises one or more models.
US08856380B2 Communication of information between a plurality of network elements
A communications protocol interface may be configured as being divisible into a core portion and an extensible portion. The extensible portion of the communications protocol interface may be further configured so that each network element can communicate a unique and optimally small subset of actual interoperable data that corresponds to at least a portion of a larger defined data set. A software generator program may be configured to generate a set of extensible source code that operates upon the subset of actual data and that directs the execution of the extensible portion of the communications protocol interface for a particular network element.
US08856379B2 Intelligent network interface system and method for protocol processing
A system for protocol processing in a computer network has an intelligent network interface card (INIC) or communication processing device (CPD) associated with a host computer. The INIC or CPD provides a fast-path that avoids host protocol processing for most large multipacket messages, greatly accelerating data communication. The INIC or CPD also assists the host for those message packets that are chosen for processing by host software layers. A communication control block (CCB) for a message is defined that allows DMA controllers of the INIC to move data, free of headers, directly to or from a destination or source in the host. The CCB can be passed back to the host for message processing by the host. The INIC or CPD contains hardware circuits configured for protocol processing that can perform that specific task faster than the host CPU. One embodiment includes a processor providing transmit, receive and management processing, with full duplex communication for four fast Ethernet nodes.
US08856375B2 System and method for distributing media related to a location
A system and method for distributing media related to a location. The physical location of a media presentation device is received over a network. The physical location of a plurality of end users are identified, via the network, wherein each of plurality of users is associated with a user device capable of storing media files. At least one of the end users is identified who is located in such proximity to the media presentation device that the user can perceive media that presented on the media presentation device. At least one media file that is currently being presented on the media presentation device is identified and transmitted over the network to each of the identified end users.
US08856374B2 Methods and systems for reconfiguration and repartitioning of a parallel distributed stream process
A method of reconfiguring a stream process in a distributed system includes the initial step of managing a stream process including one or more operators. The one or more operators are communicatively associated with one or more stream targets. The one or more operators use a partition function to determine the routing of messages to the one or more stream targets. The method includes the steps of determining a safe state within the stream process, and configuring a configuration state of the one or more operators during the safe state.
US08856373B2 Admission control for performance aware peer-to-peer video-on-demand
A method and apparatus for performing admission control in a peer-to-peer video-on-demand system are described including determining if there is sufficient bandwidth to support leading sub-clip streaming for a new request from a video playback device, determining if there is sufficient bandwidth to admit the request without sacrificing quality of service for existing requests, accepting admission of the new request if both determining acts are positive and rejecting admission of the new request if either of the determining acts are negative. Also described is an apparatus for providing content to a video playback device in a peer-to-peer video-on-demand system including an admission control unit and a data engine component.
US08856372B2 Method and system for local Peer-to-Peer traffic
A system and method providing for the flow of peer-to-peer traffic between end users within an access network without requiring the traffic to pass through a network gateway such as a Broadband Remote Access Server (BRAS). End user devices connect through access nodes to an aggregation network and a gateway. An Upstream Address Resolution Protocol (ARP) proxy and a Downstream ARP proxy are implemented in each access node. The Upstream ARP proxy receives an Upstream ARP request and forwards the request upstream only if peer-to-peer communications are allowed. Otherwise, a reply is sent with the MAC address of the BRAS. The Downstream ARP proxy intercepts a Downstream ARP request for a target device and determines whether the target device is in an ARP Cache in the access node. If so, the proxy sends an ARP reply giving the MAC address of the target device. If not, no ARP reply is sent.
US08856371B2 Video conferencing over IP networks
A method for communication includes establishing communication links over a packet network between a server and plurality of client computers that are to participate in a video teleconference. The server receives from the client computers uplink audio packets and uplink video packets, which respectively contain audio and video data captured by each of the client computers. The server mixes the audio data from the uplink audio packets so as to create respective streams of mixed audio data for transmission to the client computers and transmits to the client computers downlink audio packets containing the respective streams of mixed audio data. The server relays the video data to the client computers in downlink video packets. The client computers receive and synchronize the video data with the mixed audio data.
US08856370B2 Concurrent flashing of data processing units in hierarchical networks
The present invention provides an electronic network with a plurality of processing units that are arranged in sub-networks in a hierarchical and heterogeneous way. The network features a data stream controller that is coupled to any one of the sub-networks and that is adapted to transmit data to any one of the sub-networks. Further, the network has a data transmission port that is coupled to the data stream controller and that provides a high-speed data transmission to the data stream controller. The data stream controller serves to concurrently provide data and in particular flashing data to the various control units in a way that is adapted to the communication protocol and the data transfer rate of each sub-network. The invention therefore provides fast and autonomous flashing of a plurality of processing units, such as electronic control units in a network embedded system such as commonly used in the framework of automotive electronic networks. The data stream controller and its coupling to the various sub-networks provides a non-hierarchical and direct access to any sub-network and/or control unit of a heterogeneous and hierarchical network.
US08856367B2 Arrangement and method for interchanging time markers
An arrangement and a method for interchanging time markers between a first and a second network, wherein the time markers each comprise data packets having a payload comprising a coded time information item. A device is configured to receive a first time marker, directly remove the coded time information item, insert the coded time information item into a new data packet from the second protocol, and to send this data packet as a second time marker using the second network. The arrangement and method allow closed control of the time information or the clock of the time accepter across a network boundary.
US08856361B2 Incrementally changing the availability of a feature
Techniques are described to incrementally change the availability of a feature of a software service to clients over a network based on a configuration setting indicating the proportion of the clients that is eligible to receive the feature. In an implementation, a client rank is generated for a client on the network based on a client identification that identifies the client and a feature identification that identifies the feature. The feature may then be made available to the clients via the network if a comparison of the client rank with the configuration setting indicates that the client is eligible to access the feature.
US08856357B2 BGP peer prioritization in networks
A method for establishing routes to neighboring networks during an initialization sequence according to a prioritized order may include detecting a power-cycling event and accessing a plurality of identifiers stored in a memory device that persisted through the power-cycling event. Each of the plurality of identifiers may be associated with a network. The networks may include first networks that are coupled to network endpoints, and second networks that are capable of coupling to the one or more first networks. For each network, the method may further include accessing a priority field in the memory device that may be associated with the network. The respective priority field can be based on an order in which communications should be established with the network and application layer information. The method may also include attempting to establish communications with each of the plurality of networks in an order based on the priority fields.
US08856354B1 TCP-over-TCP using multiple TCP streams
A system, apparatus, and method for managing TCP over TCP communications using multiple TCP network connections. A plurality of tunneled network connections may be established between network devices. The network devices may employ one of the tunneled network connections over which to establish a plurality of application sessions. If congestion is detected on the employed tunneled network connection that exceeds a threshold, then a reset flag may be sent to abort that tunneled network connection. At least some of the application sessions are also transferred to another one of plurality of tunneled network connections, without terminating the moved application sessions. In one embodiment, at least one more tunneled network connection may be established between the network devices.
US08856348B2 On-demand network connection
An on-demand network connection for a remote user is provided. Responsive to a failure to receive an electronic communication via an established network connection, a remote user device receives a connection request that indicates that the on-demand network connection is to be established. Responsive to receiving the connection request, the on-demand network connection is established from the remote user device to a network. Then, the electronic communication is received on the remote user device via the on-demand network connection.
US08856347B2 Efficient selection of a messaging multiplexed channel instance
A method, system and article of manufacture are disclosed for selecting a channel instance for connecting a client application with a server application in a multi-channel computer system. In this computer system, when a new channel instance is used to connect one of the client applications with one of the server applications, defined channel instance information is established for the channel instance. The method of this invention comprises the steps of when a new application connection request is made, locking existing channel instance information; and after said locking, scanning through a list of channel instance connections for one of the channel instances that is a candidate channel instance for that new application connection request. The method comprises the further steps of, in response to finding a candidate channel instance, determining whether the candidate channel instance is suitable for the new application connection request.
US08856345B2 Redundancy in process control system
The invention relates to a method and an apparatus for arranging redundancy in a process control system comprising at least one client device, at least one data source and at least one server device providing data transfer between the client device and the data source. The method comprises arranging, for the client device, at least two parallel logical connections for transferring substantially the same data between at least one data source and the client device. At the client device, property information on data units transferred via different logical connections is checked, the client device being provided with predetermined order criteria for the property information. At the client device, property information on parallel data units transferred via different logical connections is compared. Data units delivered via the logical connection having, according to the predetermined order criteria, the best property information are selected for the use of one or more applications processing the data units.
US08856343B2 Managing computer resources in a distributed computing system
Methods, apparatus, and products for managing computer resources in a distributed computing system are disclosed that include registering, in a configuration management database by a discovery module in response to a modification of a resource in a resource container, the resource in association with a configuration management database identifier, the resource characterized by a resource type and a resource identification, the resource container including a manageability endpoint characterized by a manageability endpoint reference; and managing the resource by a management module in dependence upon a resource management policy and the manageability endpoint reference, the resource management policy including management actions for the resource.
US08856342B2 Efficiently relating adjacent management applications managing a shared infrastructure
A linkage controller analyzes, for a first management application managing at least one common resource with a second management application adjacent to the first management application within a computing environment comprising multiple resources and relationships, a resource and relationship model known by the first management application of a selection of resources and relationships managed by the first management application from among the plurality of resources and relationships in the computing environment. The linkage controller identifies, for the first management application, only a minimal set of resources and relationships within the resource and relationship model providing at least one optimal linkage point between the first management application and the second management application as to the at least one common resource. The linkage controller outputs the minimal set of resources and relationships to the second management application for relating to the first management application.
US08856340B2 Multi-adapter link aggregation for adapters with hardware based virtual bridges
Mechanisms for providing a network adapter and functionality for performing link aggregation within a network adapter are provided. With these mechanisms, a network adapter is provided that includes a plurality of physical network ports for coupling to one or more switches of a data network and a link aggregation module, within the network adapter, and coupled to the plurality of physical network ports. The link aggregation module comprises logic for aggregating links associated with the plurality of physical network ports into a single virtual link. The link aggregation module interfaces with a virtual Ethernet bridge (VEB) of the network adapter to send data to the VEB and receive data from the VEB.
US08856333B2 Datacenter execution templates
Deployment and execution of a service in a multiple datacenter environment may be facilitated using datacenter execution templates. Developers, business managers, and other interested parties may select and/or modify a declarative execution template embodying multiple factors. The execution template may then be used to generate an execution plan, which is then executed by datacenters which run the service. The execution template may be optimized after deployment of the service, allowing for ongoing adjustment in response to changing business, regulatory, and operational factors.
US08856332B2 Integrated capacity and architecture design tool
A method implemented in a computer infrastructure having computer executable code, including consolidating collected capacity architecture information, which includes data for installed resources, allocated resources and reserved resources and determining available resources based on the collected capacity architecture information. Additionally, the method includes displaying an indication the available resources and performing capacity planning based on the collected capacity architecture information and the available resources.
US08856326B2 Enhanced media control
The present invention is aimed to provide an enhanced mechanism for conflict resolution between authorized services in respect of selective authorization criteria, such as service incompatibilities, subscribed bandwidth QoS assigned per subscriber and pre-emption priority value assigned per service. To this end, the present invention provides for a new method that allows the authorization of a subsequent service as a result of applying a selective authorization criterion for the subscriber at a policy control rules server to determine those previously authorized services to be put on hold, notifying about said previously authorized services to be on hold towards application devices handling such services, and inactivating at a policy enforcement device those control rules applicable to the media associated with said previously authorized services. In addition, the method as well as the policy control rules server, the application devices and the policy enforcement device may be also arranged for re-activating said previously authorized services still on hold when the reason for being on hold has ceased.
US08856323B2 Device and method for facilitating secure communications over a cellular network
A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device during a first predetermined period of time; securing the utility-related data at the hub device using digital envelopes during the first predetermined period of time; initiating by the hub device an autonomous wake up process during a second predetermined period of time; sending the secure utility-related data over a first network to a designated server via at least one User Datagram protocol (“UDP”) message during the second predetermined period of time; and receiving an acknowledgement of receipt message of the at least one UDP message from the designated server; wherein the first and second predetermined periods of time typically do not overlap, but may overlap.
US08856322B2 Supervisory portal systems and methods of operation of same
A managed services platform and method of operation of same are described herein. The platform can include a device management service (DMS) server in which the DMS server can act as a gateway for communications with one or more computing devices, and the computing devices are associated with a first entity. The platform can also include an application service (AS) server in which the AS server is communicatively coupled with the DMS server. When a first computing device contacts the DMS server, the DMS server is operable to provide a bundle to the first computing device. As an example, the bundle contains content that at least includes one or more configuration messages and an application set that contains one or more predefined applications. The content of the bundle can be determined at least in part by the first entity.
US08856320B2 Locating a target computer device in an array
A computer program product for locating a target computer device in an array includes computer usable program code for designating a first computer device as a first point of an axis of a reference coordinate system and designating a second computer device as a second point of the axis. The product includes computer usable program code for registering the connection of a first cable from a target computer device to the first computer device and detecting the connection of a second cable from the target computer device to the second computer device, computer usable program code for determining the length of each of the first and second cables, and computer usable program code for determining the location of the target computer device within the reference coordinate system according to the length of the first cable, the length of the second cable, and locations of the first and second computer devices.
US08856315B2 Device classification system
Systems and/or methods include obtaining device information for devices within a network and determining a business function for each of the devices. The systems and/or methods further include assigning a criticality score to each of the devices based on the determined business function and generating a report for the devices based on the determined business function and the assigned criticality score.
US08856311B2 System coordinated WLAN scanning
The invention proposes a scan control device, wherein in the scan operation a network detection is performed, the device comprising a request receiving means (41) for receiving at least one request for providing scan information, and a scan control means (42) for performing a scan operation independently from receiving the scan information requests. The invention also proposes a corresponding method and a computer program product.
US08856310B2 ACORN: providing network-level security in P2P overlay architectures
To address the problem of providing network-based security to mitigate and detect cheating in peer-to-peer (P2P) gaming architecture, an architecture suite called architectures with coordinator obfuscation for resilient P2P gaming networks (ACORN) is presented that uses a combination of low overhead, per-packet access authentication, moving-coordinator and cheat detection mechanisms to effectively mitigate security threats.
US08856309B1 Statistical tool for use in networked computer platforms
A statistic tool is provided for use in relation with a group of nodes in which each node has a statistic server configured to maintain application-related statistical data on local execution in the node. The statistic tool comprises a statistic manager for storing centralized statistical data obtained from the nodes and an intermediary server for processing a request from another computer system concerning the execution of an application by gathering statistical data received from those of the nodes that intervene in the execution of the application.
US08856302B2 Systems and methods for foundation fieldbus alerts
An industrial process control system is provided. The industrial control system includes an alarm server with a processor configured to receive device information representative of field device information extracted from a device definition file. The processor is further configured to translate the device information into a first format interpretable by a global system for mobile communications (OPC AE) server and provide the device information in the first format to the OPC AE server.
US08856299B2 Policy and charging rules function management method, management network element, and network system
A Policy and Charging Rules Function (PCRF) management method includes: acquiring information about a policy control session corresponding to a data connection, where the information about the policy control session includes information about policy control session release or result information about policy control session setup, and managing a mapping relation between the data connection and a PCRF according to the information about the policy control session corresponding to the data connection. A management network element includes: a policy control session information acquiring unit, adapted to acquire the information about a policy control session corresponding to a data connection, where the information about the policy control session includes information about policy control session release or result information about policy control session setup; and a managing unit, adapted to manage a mapping relation between the data connection and a PCRF according to the information about the policy control session corresponding to the data connection.
US08856296B2 Subnet prioritization for IP address allocation from a DHCP server
A method, apparatus, and machine readable storage medium is disclosed for handling Dynamic Host Configuration Protocol (DHCP) at a first DHCP server, assigning a priority to each of a plurality of subnets, assigning to a client an IP address from the highest priority subnet, and transmitting a DHCP offer message to the client.
US08856294B2 System and method for converting a Java application into a virtual server image for cloud deployment
A system and method to convert a software application, such as a Java application into a virtual server image that is suitable for cloud deployment. In accordance with an embodiment, the system and method allows for building a hypervisor appliance containing a virtual machine running an application. In particular, the hypervisor appliance can be compatible with any hypervisor for server virtualization and the application virtual machine can be a Java Virtual Machine (JVM).
US08856293B1 Methods and devices for NAS-level data protection based on NAS configuration images
A network-attached storage (NAS) device comprises an operational state comprising first system settings; a network interface configured to couple to a network and a processor coupled to the network interface. The processor may be configured to identify a NAS configuration image stored on an externally accessible storage device, the NAS configuration image comprising second system settings created from an other NAS device on the network; determine that the NAS configuration image is compatible with the NAS device; receive a copy of the NAS configuration image; compare the second system settings with the first system settings to identify compatible system settings, and modify the first system settings based on the compatible system settings.
US08856288B2 Method and apparatus for the distribution of configuration data
Embodiments of methods and apparatuses for distributing configuration data to one or more mobile terminals. An embodiment of one method of the invention includes receiving from the host application a request from a client to transmit a configuration data value to a mobile terminal. The configuration data value can include a designation of a new precedence level for a mobile terminal corresponding to a new operating characteristic of the mobile terminal. The method can include the step of transmitting from the NMC a configuration data value including the new precedence level to the mobile terminal. The mobile terminal can include a mobile application defining a previous precedence level such that the mobile terminal loads the configuration data in response to the new precedence level different from the previous precedence level.
US08856280B2 Methods and apparatus for interactive specification of context-sensitive service level agreements; for provisioning of resources required during service delivery events regulated by service level agreements; and for monitoring compliance with service level agreements during service delivery events
In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event. In instances where a given service delivery does not comply with service level attributes specified in a controlling service level agreement, the methods and apparatus of the present invention take corrective action.
US08856278B2 Storage system for pervasive and mobile content
A system and method for storage and retrieval of pervasive and mobile content is provided. System may be comprised of a controller and a plurality of storage devices. Plurality of storage devices may include a first storage device located in a first geographic location and a second storage device located in a second geographic location. The controller may be operably connected to each storage device. The controller may also be capable of locating a first storage device containing data and transferring the data between the first storage device and a second storage device. The second storage device may be capable of transferring data to a host, which may be operably connected to the second storage device.
US08856274B2 Method for distributing of routing information for redundant connections
The present invention relates to a method for distributing routing information for redundant connection. The method is implemented in hierarchical IPv6 Internet protocol (IP) networks comprising a plurality of different autonomous systems (AS) which use a border gateway routing protocol (BGP-4) to communicate, which protocol does not allow routing sessions to be established automatically, which prevents multi-provider services from being created. The method of the invention makes it possible to create multi-provider services in the networks discussed above by using the BGP-4 protocol established by the current standards and technologies. This makes it possible to increase services offered by the providers.
US08856272B2 Cloud hosted audio rendering based upon device and environment profiles
Systems and method for requesting audio content that is stored in a cloud network and accessed by many different audio devices where each of the audio devices may have an optimal type of audio encoding, format, and characteristic in addition to being located in different types of listening environment that are considered by a cloud audio server when preparing audio content for transmission to a requesting audio device.
US08856271B2 Data accessing method used for customer premises equipment, and customer premises equipment
The present invention discloses a data accessing method used for CPE and CPE, wherein the data accessing method used for the CPE comprises: acquiring destination domain information; determining a gateway corresponding to the destination domain information according to a preset domain grouping table, wherein the domain grouping table is used to store a corresponding relationship between the destination domain information and the gateway; and accessing data through a modern mapped with the determined gateway. By virtue of the present invention, it can enable the users, when using services provided by operators, to quickly and conveniently access the services provided by different operators, thereby effectively avoiding the phenomena that the speed of accessing or downloading is slow and the access cannot even be achieved when the users cannot select a suitable operator in the prior art.
US08856270B2 Method and apparatus for simplified user access to multiple browser transports in a mobile communication device
System and method are set forth for providing Web access to a user on a mobile communication device. A plurality of browser transports are associated with a single browser icon for display on the mobile communication device, and a predetermined one of the plurality of browser transports is selected for displaying information based on characteristics of the information being requested by the user.
US08856265B2 Event notification based on subscriber profiles
A method, system, and computer program product is disclosed that evaluates the characteristics of a new content source with respect to subscriber profiles. The subscriber profile attributes are evaluated and weighted algorithmically to produce an “inference score” that is a measure used to predict the interest that subscribers may have with respect to the new content. If the inference score is significant enough (e.g., above a certain threshold value), then the service provider can take measures to inform those subscribers deemed to have a high level of interest in the new content of its existence, e.g., by sending a simple notification to the subscriber with a response link for setting up a subscription.
US08856261B2 Network support for system initiated checkpoints
A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.
US08856257B1 Sending alerts from cloud computing systems
A system is described for sending alert messages collected for cloud computing system to external systems. The alert messages may be sent according to determined protocols, such as the syslog protocol and/or SNMP trap, among other appropriate protocols. Partitioning and/or fragmenting of the alert message may be provided based on the use of various types of message identifications and/or other information in which, by virtue of the partitioning and fragmenting, an alert message, regardless of its length, may be sent and reconstructed at the external system. The system advantageously provides for transmission of alert messages using mechanisms other than the syslog protocol and with additional included alert attribute information.
US08856256B1 System and method for file sharing and updating
Embodiments of the present invention include a method and system for sharing changes made by an application to a file on one computer, coherently with other computers, over the Internet. If the application changes multiple files (also referred to as a file group), changes made to all the files are shared together coherently with other computers over the Internet. Coherence over multiple file copies and file group copies is maintained whether users work on files online or offline. A ‘File Upload Lock’ is maintained on a Cloud Server for ensuring coherent sharing of changes made to files. Embodiments include two file syncing processes, variously described as ‘Incremental File Upload’ or ‘Incremental File Download’ and ‘Delta File Upload’ or ‘Delta File Download’. Embodiments also encompass an ‘Explorer’ software tool and user interface that displays folders and files on user devices with pertinent details from the device and the Cloud Server.
US08856253B2 Method and system for presenting reposted message
Embodiments of the present invention provide a method for presenting reposted messages. The method includes: respectively establishing, in a server for each piece of original message X, a reposting chain, which takes the each piece of original message X as a root node, generating a piece of reposted message each time the original message X is reposted, and adding the reposted message to the reposting chain as a sub-node; and pulling needed reposted messages from the server when a client terminal device, at which a user locates receives an instruction instructing viewing the reposted messages corresponding to the original message X in a full amount message aggregation mode, and displaying the reposted messages on a page. Embodiments of the present invention also provide a system for presenting reposted messages. With the scheme of the present invention, a whole reposting chain of the original message may be presented to the user.
US08856250B2 Community notification based on profile update
A notification machine may receive an update to a user profile that describes a user and indicates a group of users as being socially connected to the user by a social network. The update may reference a community (e.g., an employer or a club) of the user. The user profile may be modified by including a reference to the community within the user profile. The notification machine may identify a further user who is included in the community (e.g., employed by the employer, or part of the club). The further user may be socially unconnected to the user by the social network. The notification machine may then generate and provide a notification that the further user is employed by the employer. This notification may contain suggestions that the user initiate communication with the further user, become socially connected with the further user, or both.
US08856248B2 Methods and systems for optimizing engagement with a social network
Techniques to increase engagement with a social networking system. In one embodiment, activities are prioritized based on relatedness to a user. References associated with at least a portion of the prioritized activities are created. The references are categorized into a plurality of types. The reference types may include notifications, friend identifications, and top stories. The references are embedded in digest communications for the user. Descriptive information about the activities are omitted from the digest communications. Digest communications for the user are provided during a time period when the user is not engaged with the social networking system. Notifications for a user are ceased when a level of engagement of the user with the social networking system is less than a threshold value.
US08856246B2 System and method for project management system operation using electronic messaging
Method, system and non-transitory computer-readable medium for project management database update for a project management application. An interface may be provided for variable definition by user-input in a rule to trigger an action within the project management database, where the variable is identified by a label and the label is provided to signal a location of data for the variable in an electronic message, such as an e-mail or text message. An electronic message received for a mailbox may be parsed to locate the label in the received electronic message and thereby obtain data in the electronic message that corresponds to the variable. An action may be triggered according to the data corresponding to the variable, where the action causes an update to the project management database of the project management application.
US08856243B2 Method, device, and system for message distribution
The disclosure relates to a message distribution method, device, and system. A message distribution method includes: creating a session based on a received first type of session message and allocating a corresponding cluster node to the session; and upon receiving a second type of session message associated with the session, distributing the second type of session message to the cluster node corresponding to the session. With the technical solution according to the embodiments of the invention, both the first type of session message and the second type of session message may be processed on the same cluster node, smooth and dynamic capacity expansion may be achieved for the cluster, the system performance may be enhanced, and system maintenance may be facilitated.
US08856242B2 Method and devices to seamlessly inject services in content flows
A method for automating service invocation in message flows between a client (2100) and a server (2104), includes a step of generating a message (2300) including content by said client (2100), a step of transmitting said message by said client (2100) via a network (2103) to said server (2104), wherein said method further includes a step of intercepting said message (2300) by a message interception device (2105) in the network (2103), and a step of determination by said message interception device (2105) whether a service is needed for further execution on said content part of said message. In case a service is needed, said method includes a further step of selecting at least one service engine for further execution of at least one service on said content part of said message.
US08856238B2 Representing remotely available users through working elsewhere status
An application provides a “working elsewhere” status for users working at a location other than their regular work location and still available for meetings, communication sessions, etc. The application determines a user location being other than regular work location and the user still being available through user selection, information from user associated application(s), and/or from a presence notification. The application adjusts the user status to a working elsewhere status and makes the new status available to other applications such as calendaring, communication applications, presence service(s), and comparable ones. Meetings may be scheduled, communication sessions facilitated if the working elsewhere status is sufficient/acceptable for other users.
US08856235B2 Inferring user profile attributes from social information
User profile information for a user of a social networking system is inferred based on information about user profile of the user's connections in the social networking system. The inferred user profile attributes may include age, gender, education, affiliations, location, and the like. To infer a value of a user profile attribute, the system may determine an aggregate value based on the attributes of the user's connections. A confidence score may also be associated with the inferred attribute value. The set of connections analyzed to infer a user profile attribute may depend on the attribute, the types of connections, and the interactions between the user and the connections. The inferred attribute values may be used to update the user's profile and to determine information relevant to the user to be presented to the user (e.g., targeting advertisements to the user based on the user's inferred attributes).
US08856234B2 System and method for performing distributed asynchronous calculations in a networked environment
A method and associated system are provided for performing calculations in a distributed networked environment, comprising: updating a source element on a first computer; sending a calculate update signal to a target calculated element for updating on a target element computer that may be the first computer or a second computer connected to the first computer that uses the source element in a calculation; obtaining the updated source element by a process on the target element computer associated with the target calculated element in response to the sending; and performing a calculation to update the target calculated element using the obtained updated source element.
US08856219B2 System for providing a bidirectional data access service and method thereof
A system for providing a bidirectional data access service includes a relay server and a service server. The relay server is located in the Internet. The service server registers an internal Internet Protocol (IP) address, an external IP address, and a corresponding server identification in the relay server, and establishes a data channel. When a user wants to utilize a predetermined service provided by the service server through a client device, the client device transmits the corresponding server identification to the relay server, and the relay server transmits the internal IP address and the external IP address to the client device according to the corresponding server identification. The client device automatically determines a connection method between the client device and the service server according to an application program, the internal IP address, the external IP address, and a network on which the client device is located.
US08856218B1 Modified media download with index adjustment
A method and corresponding apparatus or system, in which a computing device may obtain an index of a media file, the computing device may use the index as a basis to download just part of the media file as a modified media file, the computing device may adjust the index to account for omission of the remainder of the media file, and the computing device may use the modified index as a basis to play out content of the modified media file.
US08856217B2 Information delivery system for generating a data stream with a server system based on a content file received from a client device
An information delivery system, an information delivery method, an information processing apparatus, and an information processing method is used advantageously to deliver content stream data easily, reliably and inexpensively to the general users. A personal computer prepares a content file and an order form file using software provided by a center system, and transmits the prepared files to the center system over the Internet. Given the order form file from a customer device, the center system encodes a content file accordingly to generate content stream data and causes a moving picture delivery server to deliver the generated stream data to user terminals. This invention can be applied, among others, to systems for delivering content data over the Internet.
US08856216B2 Method and apparatus for efficiently performing file services using cloud computing
A method and apparatus for performing file services using cloud computing comprises receiving, from a client computer, at least one parameter of a file resident on the client computer and a task to be performed upon the file. In view of the task, creating a virtual file based on the at least one parameter of the file, and dividing the virtual file into a plurality of data chunks. The method identifies a byte range within the virtual file associated with the task and at least one corresponding data chunk from the plurality of data chunks that is within the byte range. The method requests the corresponding data chunk(s) from the client computer, receives the corresponding data chunk(s) from the client, processes the corresponding data chunk(s) in accordance with the task, and sends the processed corresponding data chunk(s) to the client computer.
US08856214B2 Relationship quality evaluation and reporting
A system for relationship information evaluation and management. The system incorporates relationship quality parameters that define the contextual parameters of quality, which are mutually validated and are accepted by the respective parties within an existing or prospective relationship. A computer, computing device, written documents or other means are used to capture the perspectives of each person, representative, or entity within the relationship or prospective relationship. This can be done automatically, on a random, periodic, or scheduled basis, or upon manual initiation. The information or data may then be analyzed and coalesced into a meaningful whole (or segments thereof), which may then be archived, printed, reported, and presented to one or both of the parties, or others. The information can be processed and stored based upon certain parameters, attributes, types or classes or relationships, so as to provide history, patterns, trends, alerts, warnings, analyses or comparisons concerning relationship quality. All information collected can be further applied or aggregated within an organization (or beyond, such as in a general locality or marketplace).
US08856213B2 Provisioning a moderated data service using a syndicated radio access network (RAN)
A system is configured to receive, from a content provider, traffic associated with a data service and that is destined for a group of user devices; retrieve service information, associated with the data service, that includes a value, associated with the data service, that represents a level of service quality associated with the data service; determine whether the traffic is authorized to be transmitted to the user devices based on the value; discard the traffic based on a determination that the value is less than a threshold; process the traffic to identify whether a condition is associated with the traffic based on a determination that the value is not less than the threshold; transmit the traffic to one or more of the user devices based on a determination that the traffic is not associated with a condition; and discard the traffic based on a determination that the traffic is associated with a condition.
US08856212B1 Web-based configurable pipeline for media processing
An apparatus and method for a web-based configurable pipeline for media processing is disclosed. The disclosed embodiments include a web browser implemented on a computing device. The web browser includes a web application processor configured to execute instructions included in a web application, and one or more configurable pipelines, wherein a configurable pipeline of the one or more configurable pipelines is created using at least some of the instructions included in the web application, the configurable pipeline including a plurality of components for processing one or more media streams, each component including at least one input or at least one output, and the configurable pipeline is adapted to establish data connections between the plurality of components.
US08856210B2 System, method and storage medium for managing items within file directory structure
A file-mapping method and system can better manage the number of items (i.e., files, subdirectories, or a combination of them) within any single directory within a storage medium. The method and system can be used to limit the number of items within the directory, direct content and content components to different directories, and provide an internally recognizable name for the filename. When searching the storage medium, time is not wasted searching what appears to be a seemingly endless list of filenames or subdirectory names within any single directory. A client computer can have requests for content fulfilled quicker, and the network site can reduce the load on hardware or software components. While the method and system can be used for nearly any storage media, the method and system are well suited for cache memories used with web servers.
US08856205B2 Extensible web services system
Techniques for extending a Web services system are provided. One or more Web service applications (WSA) execute on a device. Each WSA provides at least one service. A WSA implements a particular version of a Web Services (WS) specification that is previous to a current version of the WS specification. In one technique, an orchestration module is added that coordinates the interaction between the WSA and one or more extension modules. While processing the request, the WSA calls the orchestration module. The orchestration module, based on one or more attributes of a request, determines whether an extension module, that comprises logic, should be called to process a portion of the request. The logic corresponds to a difference between the previous version and the current version. After an extension module finishes processing the portion of the request, the WSA is caused to further process the request.
US08856202B2 Flexible remote data mirroring
Methods, systems, and configured storage media are provided for flexible data mirroring. In particular, the invention provides many-to-one data mirroring, including mirroring from local servers running the same or different operating systems and/or file systems at two or more geographically dispersed locations. The invention also provides one-to-many data mirroring, mirroring with or without a dedicated private telecommunications link, and mirroring with or without a dedicated server or another server at the destination(s) to assist the remote mirroring unit(s). In addition, the invention provides flexibility by permitting the use of various combinations of one or more external storage units and/or RAID units to hold mirrored data. Spoofing, SCSI and other bus emulations, and further tools and techniques are used in various embodiments of the invention.
US08856199B2 Random number generator circuit and cryptographic circuit
A random number generator circuit includes: an element generating and outputting physical random numbers; a digitizing circuit digitizing the physical random numbers to output a random number sequence tested by a testing circuit; and an error correcting code circuit including a shift register having the random number sequence input thereto, a multiplier multiplying the stored random number sequence by an error-correcting-code generating matrix, and a selector switch outputting one of an output of the shift register and an output of the multiplier in accordance with a test result obtained by the testing circuit. The error correcting code circuit outputs the output of the multiplier as a corrected random number sequence from the selector switch when the result of a test conducted by the testing circuit indicates a rejection. The testing circuit tests the corrected random number sequence when the result of the test indicates a rejection.
US08856195B1 Method and system for wireless device access to external storage
To meet the needs for storing larger volume personal information for user of wireless device, it is desire to provide extra storage space to the wireless device such as for cell phone or personal assistant device (PDA) etc due to the limited storage space that the wireless device has. Instant application disclosed a system and method for the wireless device to efficiently and effectively use remotely located storage space provided by a server for storing message or multimedia data such as videos, digital music, digital photo/picture.
US08856190B2 Distributed computing system hierarchal structure manipulation
A hierarchal structure manipulation system may include a nested table generation module to generate nested tables representing hierarchal relationships of computing systems in a distributed computing environment. A hierarchal structure manipulation module may access at least one nested table to manipulate a hierarchal structure represented by the nested table. The hierarchal structure manipulation module may use a generic algebraic specification to manipulate the hierarchal structure represented by the nested table. The generic algebraic specification may provide a generic abstraction across a plurality of the computing systems in the distributed computing environment.
US08856189B1 Systems and methods for managing connections to process data
A computer-implemented method for managing connections to process data is described. A connection with an access server is established to determine a connection point associated with one or more targets. The one or more targets are arranged according to the connection points associated with each of the one or more targets. A connection with a first connection point is established. Data from one or more targets associated with the first connection point are processed. The connection with the first connection point is terminated.
US08856187B2 Data management for data aggregation
The invention provides a method, system, and program product for managing data for data aggregation, including data mining and reporting. Locations of a plurality of data to be collected are determined within a source database. Data are simultaneously collected from the plurality of locations and aggregated. The aggregated data are normalized by adding an encryption key and the normalized data are stored. Data at each of the plurality of locations are then released in the source database.
US08856179B2 Method to send a short message service (SMS) campaign to a related object by selecting the base object
A method to transmit SMS messages to a Related Object by selecting the Base Object and transmit SMS messages to both, the Base Object as well as to the Related Object, simultaneously, in a CRM application is disclosed. The relationship between the Base Object and the Related Object may be any one of one-to-one, one-to-many, many-to-one or many-to-many that can be defined while deploying the CRM application. The process takes place in different levels wherein the system decides whether the SMS message should be sent to the Base Object or different Related Objects depending upon the Campaign Workflow and locates the mobile phone number of the entity and finally transmits the SMS message via SMS Service Provider chosen from the user Interface.
US08856172B2 Method and system of unifying data
A system, method and database design is provided for unifying data from a plurality of databases, each having business-context related data and a data access mechanism. A database is created which contains a node for each dimension of an industry. For each data source accessible via the system, a set of data source specific dimensions is created and mapped to the corresponding industry business context dimension(s). A set of templates (e.g., UniViews) is created to query the data sources. Each UniView contains a specific question for a specific dimension designed for a specific data source. A central server coordinates the system and facilitates use of the system through an interface (e.g., the UniViewer). UniViewer allows a user to query the data sources by identifying an industry business context dimension, a dimension instance and at least one UniView. Multiple UniViews can be combined, cached and saved to facilitate complex queries.
US08856168B2 Contextual application recommendations
The disclosure relates to methods and systems for generating application retention metrics. In one aspect, a method for generating a contextual application recommendation is disclosed. Contextual web location information including a remote developer identifier and/or a remote application identifier is received from a remote application. An application database including application records with a developer identifier and an application identifier is queried to determine if the contextual web location information corresponds to an application recommendation. The application database query includes comparing the remote developer identifier to the application database developer identifier to generate a first application recommendation, and/or comparing the remote application identifier to the application database application identifier to generate a second application recommendation. If a recommendation is found, the first and/or the second application recommendation is transmitted to a user of the remote application.
US08856166B2 Query validator
According to some embodiments, a method and apparatus are provided to receive a syntax correct query, analyze the syntax correct query, and output a message associated with the syntax correct query.
US08856165B1 Ranking of users who report abuse
A method, performed by one or more server devices, includes receiving an abuse report from a user, where the abuse report indicates that a comment associated with a document violates a policy associated with providing comments to users; retrieving a trust score of the user, where the trust score is based on a difference between a quantity of valid abuse reports previously generated by the user and a quantity of invalid abuse reports previously generated by the user; generating or adjusting a removal score of the comment based on the retrieved trust score of the user; comparing the removal score to a removal threshold; and removing the comment from further presentation to users if the removal score of the comment is greater than the removal threshold.
US08856164B2 System and method for processing online reading interactions
An online reading processing system and method for providing interactive messages to users at end computer devices are provided, which include storing online reading information in a data storage medium; setting the online reading information with a head mark and a tail mark of at least one expert-marked key range by a setting module; reading the information after being set and hiding the head mark and the tail mark thereof; receiving the key range marked by the user; determining whether the user-marked key range covers the head mark and the tail mark so as to form interactive messages according the determination, thereby solving the drawback of failing to provide appropriate feedback or assessment according to users' behaviors as encountered in the prior techniques, and also increasing online reading interaction and enjoyment.
US08856163B2 System and method for providing a user interface with search query broadening
A system and method for providing a user interface with search query broadening is described. A query defining a search executable on potentially retrievable information is accepted. The query is parsed. A broadened query is provided. At least one of the broadened query and results of a search executed on the broadened query is presented.
US08856160B2 Product options framework and accessories
Techniques are described for describing and associating custom products. In an embodiment, a first attribute value that defines an attribute of a custom product is received from a user that is customizing the custom product. In response to receiving the first attribute value, a legal set of attribute values for a second attribute of the custom product or an accessory product may be determined. The legal set of attribute values identifies one or more attribute values of the second attribute of the custom product or accessory product that are compatible with the first attribute value. The legal set of attribute values may identify a continuous range of values where any value within the continuous range of values is compatible with the first attribute value. In an embodiment, the user may be limited to selecting accessory products having a legal attribute value.
US08856157B2 Automatic detection of columns to be obfuscated in database schemas
Various embodiments of systems and methods for automatic obfuscation of sensitive data in a database schema are described herein. The technique uses static detection of sensitive data by application type, static detection by column name, and data profiling by examining a sample of the tables data from the database schema.
US08856155B2 Management of configuration data structures in multi-layer data models
In one embodiment, a computer program product includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code being configured to: map a template-level configuration-management data structure to a discovery-level configuration-management data structure by a first mapping using mapping information included in the template-level configuration-management data structure, map a customized-level configuration-management data structure to the discovery-level configuration-management data structure by a second mapping using mapping information included in the customized-level configuration-management data structure, and determine a third mapping between the template-level configuration-management data structure and the customized-level configuration-management data structure using the first mapping and the second mapping.
US08856154B2 Data tranformations between a source application and service-oriented target applications supporting different data formats
Embodiments of the invention allow structured data to be transferred between a source application and a service-oriented target application that process data in different formats. The data to be transferred may be divided into different sections, where each section is processed by a respective service of the target application. To transform each section of data into a format compatible with a respective service, the data may have a set of associated rules which transform data based on a set of variables. The source application may provide variable definitions for each of the variables. Each service of the target application may specify values for each of the variables. Once the variables have a specified value, a transformation engine may transform each section of the data and subsequently transfer the transformed sections of the data to respective services of the target application for processing.
US08856150B2 Managing and displaying solutions for multiple resources in an appointment scheduling system
A solution space is computed and stored which comprises for a given set of constraints all possible solutions for all available resources of a certain kind. Upon selection of a specific resource, the solution space is filtered to select all possible combinations containing the specific resource and the result of the filtering is displayed.
US08856148B1 Systems and methods for determining underplayed and overplayed items
Systems and methods for determining underplayed or overplayed items are provided herein. Instructions stored in memory are executed by a processor to: calculate short term scores for radio data and music identification service data of the items, determine linear distance and logarithmic distance between radio virtual radio plays per days on one million stations (VRPDOMS) and identification VRPDOMS of the items, identify and eliminate items lacking minimum requisite number of radio VRPDOMS or identification VRPDOMS, and sort the items by largest linear distance or largest logarithmic distance first. The sorted items are then transmitted to the computing device.
US08856147B1 Method of sorting data on a limited resource computer
A method of sorting data on a limited resource computer is disclosed. Data recording characteristics associated with a data set are determined. A sort-table size is calculated based on the data recording characteristics, and the data set is sorted based on the sort-table size.
US08856145B2 System and method for determining concepts in a content item using context
The present invention is directed towards systems and methods for indexing one or more items of content. The method of the present invention comprises extracting one or more items of text from a given item of content. The one or more items of extracted text are tokenized into one or more concepts. One or more related concepts associated with the one or more concepts are identified. A support score is generated for the one or more concepts, and the item of content is index with the one or more concepts and the one or more associated support scores.
US08856141B1 Providing posts from an extended network
A system includes: an engaging post identifier for identifying and retrieving engaging posts; an extended network post identifier for identifying extended posts from an extended network; a combining module for creating a combined list of added posts from the engaging post and the extended posts, the combining module generating one or more ranked posts by ranking the list of added posts by relevance to a user; and a user interface module for providing the one or more ranked posts. The disclosure also includes a method for finding and providing engaging posts that includes determining engaging posts; determining extended posts from an extended social network using a social graph of the user; adding the engaging posts and the extended posts to create a combined list of added posts; ranking the added posts by relevance to a user; and providing one or more of the ranked posts.
US08856132B2 Tips management system and process for managing organization-wide knowledge tips
The invention provides a method, a system, and a computer program product for managing and distributing knowledge tips in an organization. A member of the organization submits a knowledge tip and one or more data points corresponding to the knowledge tip in a Tips Management System (TiMS). The member associates the knowledge tip with at least one predefined category. A member selects knowledge tips by defining a criterion in TiMS. The member selects category(ies) and/or projects(s) and provides delivery parameters for planning the delivery of knowledge tips to the at least one member. The TiMS delivers the selected knowledge tips to the each member as per the delivery parameters.
US08856131B1 Computer networked selecting of consumer interests
Systems and methods of selecting consumers to receive content on a computer network are provided. A user list identifying a first plurality of users having a group of features corresponding to internet activity of the first plurality of users can be obtained at a computing device. A subgroup of features can be selected from the group of features, and a cluster of users of the first plurality of users can be identified. The users of the cluster of users can each have at least one feature of the subgroup of features. A supplemental user having a supplemental feature can be identified. A correlation between the supplemental feature and at least one feature of the subgroup of features can be determined, and an expanded user list that includes at least one of the first plurality of users and the supplemental user can be generated.
US08856130B2 System, a method and a computer program product for performance assessment
A system, a computerized method, and a computer program product for classification of items based on their attributes and on a classification scheme that is defined based on information pertaining to each item of a set of items, and which is indicative of: (a) a quantity of occurrences of the item in a sample; (b) a quantity of successful occurrences of the item in the sample; and (c) at least one attribute of the item with regard to at least one variable out of a set of variables.
US08856129B2 Flexible and scalable structured web data extraction
This document describes techniques that label text nodes of a seed site for each of a plurality of verticals. Once a seed site is labeled for a given vertical, the techniques extract features from the labeled text nodes of the seed site. The techniques learn vertical knowledge for the seed site based on the human labels and the extracted features, and adapt the learned vertical knowledge to a new web site to automatically and accurately identify attributes and extract attribute values targeted within a given vertical for structured web data extraction.
US08856121B1 Event based metadata synthesis
One disclosed method includes determining time and location information for a first digital asset based on a first set of metadata associated with the first digital asset that does not include location information but includes a first time value, and based on a second set of metadata associated with a second digital asset that includes a second time value and a first location value; determining the first digital asset is associated with an event based on a correlation of the determined time and location information for the first digital asset with event time and location information for the event, in which the determined time and location information for the first digital asset includes the first time value and the first location value; and associating the first digital asset with a third set of metadata associated with the event.
US08856118B2 Creation and transmission of rich content media
A method of playing a rich content stream that includes a media stream and a descriptive stream. The method may include the steps of receiving the rich content stream at a media player, where the descriptive stream is generated from a rich content file executed separately from a source for the media stream, and where the media stream and the descriptive stream are received as separate streams at the media player. The method may also include synchronizing the media stream and the descriptive stream at the media player so that information in the descriptive stream is temporally synchronized with media content playing from the media stream. In addition the method may include activating the playing of the descriptive stream while the media stream is playing on the media player, where descriptive content from the descriptive stream is not played on the media player until being activated by a user.
US08856117B2 System and method of accelerating response time to inquiries regarding inventory information in a network
A method and system for distributing access to inventory items available at vendor locations includes user stations transmitting user inquiries on a communications network. Network-connected location servers access a set of inventory availability information associated with inventory items available at their respective location, for example, tables at a restaurant. The host server receives user inquiries regarding availability of items associated with at least some of the location servers and queries a cache server that locally stores a binary subset of the information from the location servers to determine if the requested item is available without having to separately query the database at each location. Particularly, a web server receives and stores information regarding only whether a requested item is available or not available from a particular location rather than how many items are available at the location. A user, therefore, can access availability of inventory items with less communications traffic.
US08856111B1 Cross media type recommendations for media items based on identified entities
Recommendations for a media item associated with a primary entity are based on co-interaction information gathered from other media content items of several different media types that are also associated with the primary entity. Co-interaction information can include, for example, co-click data for websites, co-watch data for videos, or co-purchase data for purchases. The co-interaction data is processed to determine a co-interaction score between primary media items and secondary media items. From the co-interaction scores, secondary entities associated with the secondary media items are determined. A relatedness score is determined for these secondary entities based on the aggregation of the co-interaction scores of the secondary media items they are associated with. The relatedness score indicates a determination of how related one entity is to another. The secondary entities are ranked according to relatedness score in order to determine secondary entities most relevant to the primary entity.
US08856109B2 Topical affinity badges in information retrieval
Topical affinity badges in information retrieval is described, for example, where graphical elements are presented together with ranked search results from a search engine, to indicate a degree of association between an author of a document and a topic. In various embodiments, a measure of an author's affinity to a topic is predicted using a machine learning system that takes as input author features derived from documents of the author. In various examples topical affinity scores or labels are used to generate badges and/or to index documents at an index of a search engine. For example, badges may be presented with ranked search results, in pop up displays or in other ways. In examples author features relating to any of recency, frequency and presentation of an author's documents are generated, where presentation features may relate to biographical information such as experience, qualifications, and previous documents.
US08856107B2 Method and apparatus for 3D display and analysis of disparate data
The system provides a method and apparatus for sorting and displaying collections of communications. These communications can be a single type or multiple types of data and may come from email systems, bulletin boards, text messages, Facebook and Twitter postings and comments, financial transactions, travel itineraries or any other type of communications. The communications represented by the system can be electronic or physical as desired. The system can also present forwarded, copied, replied, or other types of communications. In one embodiment, the system provides a Universe View of a set of communications. The Universe View, in one embodiment, is a three dimensional representation of a plurality of cubes. Each cube represents a subset of a collection of communications. Each cube can be color coded or shaded to represent a dominant theme of the contents of the communications represented by the cube.
US08856104B2 Querying by concept classifications in an electronic data record system
Embodiments of the present invention enable processing of concept-based query requests submitted to a query service within a healthcare transaction framework. In embodiments, a terminology service within the healthcare transaction framework manages terminology content (concepts represented by a set of terminologies). In embodiments, search criteria from a data access query request are submitted to the terminology service to extract a set of concepts from the terminology content that are associated with the search criteria. In embodiments, equivalence search criteria include a seed concept, and the terminology service returns a set of equivalent concepts comprising the seed concept. In embodiments, classification search criteria include a classification identifier, and the terminology service returns a set of concepts associated with the classification identifier. In embodiments, the query service generates and submits a data access query comprising predicates associated with the returned set of concepts.
US08856101B2 Interactive media card
A method for creating and searching within an entity-defined profile is disclosed. A search engine is provided for searching within first data for data meeting known criteria. The search engine receives criteria data comprising a first media card. The media card relates to an individual or organization. Result data associated with the criteria data is retrieved, the result data associated with at least some data within the first media card to provide search results, and then the search results are displayed.
US08856099B1 Identifying entities using search results
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying entities using search results. One of the methods includes determining that a first search query includes a respective text reference to each of one or more predetermined attributes, wherein each attribute is associated with a first entity type; obtaining search results for the first search query from a search engine, the search results identifying a plurality of resources; identifying entities of the first entity type that are related to any of the plurality of resources identified by the search results; and selecting names of one or more of the identified entities of the first entity type to include in a response to the first search query.
US08856098B2 Ranking search results based on word weight
Ranking search results, comprises retrieving search results that include target strings that relate to a query string; segmenting the query string and each of the target strings; pairing segments in the query string with respective segments in the target strings to form combinations; retrieving weights that correspond to the combinations; and determining a weighted word length based on the weights corresponding to each of the target strings; and ranking the target strings based on their respective weighted word lengths. Alternatively, ranking search results includes determining a minimum weight of each inserted word with respect to segments in the query string; determining a minimum weight of each deleted word with respect to segments in the target strings; determining a total edit distance for each target string; and ranking the target strings based on the total edit distances.
US08856097B2 System and/or method for obtaining of user generated content boxes
The subject matter disclosed herein relates to a process for receiving, evaluating and selecting of content modules such as content summary boxes and landing pages for display on network-accessible search engine results page. In one particular example, potential content providers may be provided with incentives and guidelines for the preparation of content summary boxes and landing pages over an electronic communications network, and the resulting submissions can be ranked and published in conjunction with the display of a search engine results page over the network.
US08856096B2 Extending keyword searching to syntactically and semantically annotated data
Methods and systems for extending keyword searching techniques to syntactically and semantically annotated data are provided. Example embodiments provide a Syntactic Query Engine (“SQE”) that parses, indexes, and stores a data set as an enhanced document index with document terms as well as information pertaining to the grammatical roles of the terms and ontological and other semantic information. In one embodiment, the enhanced document index is a form of term-clause index, that indexes terms and syntactic and semantic annotations at the clause level. The enhanced document index permits the use of a traditional keyword search engine to process relationship queries as well as to process standard document level keyword searches.
US08856093B2 Methods and systems for search indexing
The present invention provides for quick and efficient searching. One embodiment includes a first instruction configured to read at least a first search string and a second search string entered into a same first search field, and a second instruction configured to incrementally filter search results to locate at least a first document that has a least a first word that begins with the first string and a second word that begins with the second string.
US08856091B2 Method and apparatus for sequencing transactions globally in distributed database cluster
A system and method for receiving and tracking a plurality of transactions and distributing the transactions to at least two replication queues over a network. The system and method comprise a global queue for storing a number of the received transactions in a first predetermined order. The system and method also comprise a sequencer coupled to the global queue for creating a copy of each of the transactions for each of said at least two replication queues and for distributing in a second predetermined order each said copy to each of said at least two replication queues respectively, said copy containing one or more of the received transactions.
US08856082B2 Policy based population of genealogical archive data
An approach for managing a family tree archive is provided. The approach includes creating an electronic archive based on a family tree. The approach also includes automatically discovering Internet-based data associated with at least one member of the family tree. The approach additionally includes adding the Internet-based data to the archive. The approach further includes storing the archive at a storage device.
US08856079B1 Application programming interface for efficient object information gathering and listing
An information system has a database having distinct object structures that store information about corresponding operating components of the system. An association structure describes many-to-many relationships among the components. Targeted requests for information about first objects are satisfied by obtaining information from a first object structure as well as information about associated objects from the second object structure. Bulk requests for information about a large number of objects are handled differently, using a lookup structure that associates the first objects with limited information of the associated second objects, such as externally visible names which would be meaningful to a requestor. Thus response can efficiently provide full information about all first objects as well as limited but useful information about all associated second objects, avoiding traversals of the association structure and corresponding interrogations of the second object structure.
US08856075B2 System and method of sharing in a plurality of networks
A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.
US08856069B2 Combined save and validation logic
Methods, systems, and computer-readable media for combined saving and validation are disclosed. A particular method includes receiving a command to save changes associated with a change set to a data storage device. Entities of the change set are validated and one or more pre-operation commands are executed on the change set. When a pre-operation command modifies one or more first entities of the change set, the first entities are revalidated. The method also includes executing a data operation based on the change set and executing one or more post-operation commands on the change set. When a post-operation command modifies one or more second entities of the change set, the second entities are re-validated.
US08856068B2 Replicating modifications of a directory
Replicating modifications of a directory that include receiving in a source directory service for a source directory requests for modifications in the source directory and transmitting, from the source directory service to a duplicate directory service for a duplicate directory asynchronously in parallel over a plurality of data communications connections, requests for the same modifications in the duplicate directory. In typical embodiments, a duplicate directory may replicate a subtree of a source directory, receiving requests for modifications may include receiving in the source directory service requests for modifications in the subtree in the source directory, and transmitting requests may include transmitting requests for the same modifications in the subtree in the duplicate directory.
US08856066B2 Sharing information between tenants of a multi-tenant database
In a method, system, and computer-readable medium having instructions for sharing information between tenants of a multi-tenant database, information is received on a connection between a first tenant of a multi-tenant database and a second tenant and the connection has information on a scope of data from the first tenant shared with the second tenant, data is allowed for a record of the first tenant to be accessible to the second tenant in accordance with the connection, information is received on a file related to the record of the first tenant, and data is allowed from the file to be accessible to the second tenant in accordance with the connection.
US08856057B2 Cognitive security system and method
A cognitive system and method for predicting and detecting security breaches is provided which yields cognitive inputs to a security management interface accessible by a human operator. The system utilizes symbolic cognitive architectures and inference processing algebras allowing the system to respond to open, incomplete, and/or unknown problem domains, offering flexibility in the case of unexpected changes in the security environment. The system is also capable of intelligently, and in real-time, adapting security peripheral configurations to further probe and analyze the real-time security environment, provided real-time data that can be processed with symbolic cognitive architectures and inference process algebras enabling the identification of new and emerging threat profiles leading to the prediction and detection of security breaches.
US08856056B2 Sentiment calculus for a method and system using social media for event-driven trading
A sentiment calculator uses social media messages for the real-time evaluation of publicly assets, in particular traded equities and commodities wherein a sentiment is an integer computed based upon pairs of lexical items in local syntactic context. The sentiment calculator includes a mechanism for determining polarity in social media messages and a mechanism for determining a strength value of lexical items used in social media messages.
US08856054B2 Evolutionary computing based optimization
Some embodiments for performing evolutionary based optimization feature: a dominance archive, auto-adaptive operators, detection of search stagnation, exploitation of randomized restarts to escape local optima, and/or selection of recombination operators based on their success in generating high quality solutions.
US08856050B2 System and method for domain adaption with partial observation
A novel domain adaption/transfer learning method applied to the problem of classifying abbreviated documents, e.g., short text messages, instant messages, tweets. The method uses a large number of multi-labeled examples (source domain) to improve the learning on the partial observations (target domain). Specifically, a hidden, higher-level abstraction space is learned that is meaningful for the multi-labeled examples in the source domain. This is done by simultaneously minimizing the document reconstruction error and the error in a classification model learned in the hidden space using known labels from the source domain. The partial observations in the target space are then mapped to the same hidden space, and classified into the label space determined by the source domain.
US08856047B2 Fast personalized page rank on map reduce
A personalized page rank computation system is described herein that provides a fast MapReduce method for Monte Carlo approximation of personalized PageRank vectors of all the nodes in a graph. The method presented is both faster and less computationally intensive than existing methods, allowing a broader scope of problems to be solved by existing computing hardware. The system adopts the Monte Carlo approach and provides a method to compute single random walks of a given length for all nodes in a graph that it is superior in terms of the number of map-reduce iterations among a broad class of methods. The resulting solution reduces the I/O cost and outperforms the state-of-the-art FPPR approximation methods, in terms of efficiency and approximation error. Thus, the system can very efficiently perform single random walks of a given length starting at each node in the graph and can very efficiently approximate all the personalized PageRank vectors.
US08856044B1 Segmented access of remotely stored biographical data to a client device
Methods and systems of segmented access of remotely stored biographical data to a client device are disclosed. In one embodiment, a biographical information is obtained from a vocational collateral such as a business card. In this embodiment, a method and system includes extracting a biographical data from a digital identifier of the vocational collateral. The method and system includes assigning at least one of an access privilege and a security privilege to the biographical data extracted from the digital identifier. The method and system further includes storing the biographical data comprising at least one of the access privilege and the security privilege in a repository of a cloud computing environment accessible to a number of client devices through a network connection. Finally, the method and system includes permitting the number of client devices access to the biographical data based on the access privilege and/or the security privilege.
US08856042B2 Method, apparatus and program for performing personal authentication and inputting operation instruction on the basis of biometric information including posture information
A method includes obtaining an image to be compared at the time of use which is intended for comparing biometric information at the time of use of a user, obtaining posture information at the time of use which indicates a posture when biometric information at the time of use of the user is shot, performing personal authentication for the user by comparing the image to be compared at the time of use with a preregistered image to be compared at the time of registration of the user, and inputting an operation instruction corresponding to operation information preregistered in association with posture information at the time of registration which is determined to match, by comparing the posture information at the time of use with a plurality of pieces of preregistered posture information at the time of registration of the user.
US08856037B2 Method for showcasing a built-up structure and an apparatus enabling the aforementioned method
There is provided a method for showcasing a built-up structure with at least one room. It is advantageous that the user is able to view the interior of the built-up structure by accessing and navigating about a single panoramic image for each room. An apparatus enabling the method and a method of using a work product of the method for showcasing a built-up structure with at least one room is also provided.
US08856035B2 Store system and sales registration method
According to one embodiment, a store system includes: an image output section configured to output an image picked up by an image pickup section; an object recognizing section configured to recognize a specific object by reading a feature value of the output image; a check-image display section configured to display, on a display section, at least an image concerning the recognized object; and a problem solving section configured to receive, when there is a problem in the recognition of the object, an instruction indicating the problem and solve the problem according to content of the received instruction.
US08856031B1 Systems and methods for obtaining and using targeted insights within a digital content and information sharing system
A system for obtaining insight information for a plurality of client applications and a plurality of mobile users, comprises a content management system module configured to distribute a plurality of types of content to the plurality of mobile users, wherein at least one of the content and types of content differs for each of the plurality of client applications; an insights module configured to allow a client associated with a specific client application to define one or more locations and select a target vertical, select an insights algorithm based in the target vertical, identify the status of the plurality of users relative to the defined locations, and cause the content management system module to distribute certain types of content to the plurality of users based on the status; and a data warehouse configured to store the status information for each of the plurality of client applications and associated users.
US08856030B2 Method, system and software for associating attributes within digital media presentations
Disclosed are a system, method and software to associate attributes with digital media assets. Digital media contains specific assets, such as images, that can be replaced with other assets. The system, method and software permit the association of attributes with specific assets. The association of attributes and assets enables the provision of content that is enhanced and more impacting for a user.
US08856029B1 Systems and methods for regulating the receipt of data transmitted from a messaging device
A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a blocking application is initialized. At least one setting for the blocking application is initialized. Incoming data transmitted from the messaging device are detected. At least a portion of the incoming data is blocked based on the initialized at least one setting for the blocking application.
US08856027B2 System and method for slow ad detection
A system and method for slow ad detection is provided. An ad tool receives information including round trip times to load web pages, in which each web page is loaded with at least one ad. Additionally, the ad tools calculates, for each ad, a mean round trip time to load each web page loaded with the respective ad. The ad tool then determines a predetermined number of the ads with highest mean round trip to load each of the web pages with the ad. Further, the ad tool enables testing of each of the predetermined number of ads to determine the round trip load time of each of the predetermined number of ads.
US08856022B1 Parameter normalization for improved cache hit rate
A normalized caching system may receive a data request from a requestor, the request associated with a requested service. The normalized caching system may generate a normalized request by modifying one or more parameters of the request. A normalized response is typically useful for servicing a wider range of subsequent requests than is a non-normalized response. The system may then check whether an entry is cached for the normalized request. If no cached entry is found, the normalized request may be submitted to the requested service, and response received in return. The normalized response may be cached using the normalized request. The response may be denormalized in order to generate a response which is provided to the requestor. When a subsequent request is received, if that subsequent request normalizes to the same normalized request, it may be fulfilled using the response stored in cache, rather than using the requested service.
US08856020B2 Method for optimizing the consumption of a telecommunications service
The invention relates to a method for optimizing the consumption of telecommunications services in user groups. The method allows analyzing in real time the effectiveness of the multiple attributes of the commercial products associated with telecommunication services offered on a telecommunications network without excess calculations having to be generated, and at the same automatically acting accordingly on those attributes, optimizing the objective functions established by the telecommunications operator in the shortest possible time.
US08856016B1 Methods and systems for providing life insurance
Life insurance methods, systems and products are provided that incorporate a fixed account, a separate account, and under specified circumstances a death benefit. One embodiment of a method for providing life insurance policy includes: providing a fixed account for receiving a portion of premiums allocated to the fixed account and providing a separate account for receiving a portion of premiums allocated to the separate account. The separate account allows a policy owner to manage investments in a plurality of investment options. If the policy meets a safety test, the method guarantees the death benefit without withdrawing more than a specified percentage of specified charges from the separate account to fund the guaranteed death benefit.
US08856014B2 Methods and apparatuses for delivery of advice to mobile/wireless devices
Methods and apparatuses to connect consumers to diverse advice sources of experts. In one embodiment, a method includes: providing a list of experts to a mobile device via a wireless media channel for presentation to a consumer; responsive to receiving from the mobile device a selection of one expert from the list of experts, initiating a telephonic connection between the expert and the consumer prior to the consumer submitting a question for advice. In one example, the list includes information to indicate whether one or more of the experts are individually available to telephonically communicate with the consumer at a time when the list is provided to the consumer. In one example, initiating the telephonic connection includes: initiating a first call to the consumer; initiating a second call to the expert; and joining the first and second calls to make the telephonic connection between the expert and the consumer.
US08856012B2 Apparatus and method of encoding and decoding signals
A method of encoding an audio signal, where signals including two or more channel signals are downmixed to a mono signal, the mono signal is divided into a low-frequency signal and a high-frequency signal, the low-frequency signal is encoded through algebraic code excited linear prediction (ACELP) or transform coded excitation (TCX), and the high-frequency signal is encoded using the low-frequency signal. A method of decoding of an audio signal, a low-frequency signal encoded through ACELP or TCX is decoded, a high-frequency signal is decoded using the low-frequency signal, the low-frequency signal and the high-frequency signal are combined to generate a mono signal, and the mono signal is upmixed by decoding spatial parameters regarding signals including two or more channel signals.
US08856009B2 Multi-participant, mixed-initiative voice interaction system
A voice interaction system includes one or more independent, concurrent state charts, which are used to model the behavior of each of a plurality of participants. The model simplifies the notation and provide a clear description of the interactions between multiple participants. These state charts capture the flow of voice prompts, the impact of externally initiated events and voice commands, and capture the progress of audio through each prompt. This system enables a method to prioritize conflicting and concurrent events leveraging historical patterns and the progress of in-progress prompts.
US08856002B2 Distance metrics for universal pattern processing tasks
A universal pattern processing system receives input data and produces output patterns that are best associated with said data. The system uses input means receiving and processing input data, a universal pattern decoder means transforming models using the input data and associating output patterns with original models that are changed least during transforming, and output means outputting best associated patterns chosen by a pattern decoder means.
US08855998B2 Parsing culturally diverse names
Provided are techniques for parsing a name. A name to be parsed is received. A culture of the name is identified. One or more name phrases from the name are identified. Statistics for the one or more name phrases are identified. It is determined whether to perform a first parsing technique that parses different types of name elements within at least one field of the name. In response to determining that the first parsing technique is to be performed, the name is parsed using the statistics and the first parsing technique. In response to determining that the first parsing technique is not to be performed, the name is parsed using the statistics and a second parsing technique.
US08855996B1 Communication network enabled system and method for translating a plurality of information send over a communication network
Disclosed communication network enabled system and method for connecting pluralities of users for translating information sent over a communication network comprising a mobile application installed in a portable mobile communication device for receiving the information from the users. A first time user can specify input language and the desired translated output language into the mobile application. The translation request notification information is routed and sent to top tier users selected from a ranked list by a server as a push notification. The first one to respond is connected to the user. The translator can set the frequency of translation requests and can charge for each translation. After the translation is completed the user can rate the translator which will help the translator to get new requests. Too many bad reports about the translation of a user will get that user blocked.
US08855995B1 Consensus translations from multiple machine translation systems
Systems, methods, and apparatuses including computer program products for machine translation. A method is provided that includes generating a plurality of machine translation systems using a single machine translation engine, and generating a consensus translation from a plurality of candidate translations for a source sentence, where each candidate translation of the plurality of candidate translations is an output of a respective machine translation system of the plurality of machine translation systems.
US08855994B2 Method to simulate a digital system
A simulator is partitioned into a functional component and a behavior prediction component and the components are executed in parallel. The execution path of the functional component is used to drive the behavior prediction component and the behavior prediction component changes the execution path of the functional component.
US08855993B2 Integrated circuit design simulation matrix interpolation
Methods and systems perform a simulation on an integrated circuit design by applying a first value to a first variable and a second value to a second variable of the simulation to produce a first matrix corner simulation value. The methods and systems repeat the simulation using different values for the first and said second variables to produce a second matrix corner simulation value, a third matrix corner simulation value, and a fourth matrix corner simulation value. The methods and systems create a matrix, and the matrix has the first matrix corner simulation value, the second matrix corner simulation value, the third matrix corner simulation value, and the fourth matrix corner simulation value. The methods and systems interpolate all remaining values within the matrix based upon existing simulation values within the matrix.
US08855988B2 Method and systems of determining viable hydraulic fracture scenarios
Determining viable hydraulic fracture scenarios. At least some of the illustrative embodiments include: executing a fracture planning program, and determining a set of schedules from the fracture planning program, each schedule comprising a volume of fracture fluid, amount of proppant, and flow rate of the fracture fluid; providing each schedule of the set of schedules to a stress analysis program, executing the stress analysis program, and determining a set of indications from the stress analysis program, each indication indicative of whether a respect schedule exceeds engineering limits of a tubing string; and providing at least some of the schedules to a fracture simulation program, executing the fracture simulation program, and determining a set of fracture geometries from the fracture simulation program, each fracture geometry corresponding to a respective schedule.
US08855979B2 Process for producing sandwich structures with particulate material pattern
The present invention is concerned with a process for forming a very well defined pattern of particulate material in a composite material comprising a web material and particulate absorbent material. The present invention relates also to a method for determining the equipment design and process parameter for such a process. In a particular application, the present invention provides a process for preparing liquid absorbent structures, such as may be useful for disposable absorbent articles.
US08855974B2 System and method for recommending sensitive make-up based on skin tone of user
A system for recommending a sensitive make-up based on skin tone of a user, includes an avatar creator for creating an avatar image using skin information obtained by scanning user's body. Further, the sensitive make-up recommending system includes a cosmetics information processor for generating analysis information by analyzing a plurality of cosmetics and then storing the generated information in a database. Furthermore, the sensitive make-up recommending system includes a simulator for displaying results of performing a make-up simulation to the avatar image based on the analysis information on certain cosmetics selected by the user and the skin information.
US08855973B2 Determining a next value of a parameter for system simulation
An embodiment of an apparatus includes a simulator and a determiner. The a simulator is configured to simulate a system and to propagate at least one state of the simulated system through time in response to a value of a parameter, and the determiner is configured to determine a next value of the parameter in response to a characteristic of another state of the model and a representation of at least one level set.
US08855972B2 Manufacture of heat trace cable, design, installation, and management, and method thereof
The manufacture and installation of heat trace systems, particularly cables, are controlled from comprehensive controls in the design and management of the heat trace systems.
US08855971B2 Tools for system-level design environments
A remote auxiliary tool is created in a graphical model having at least one of a signal or a block. The remote auxiliary tool is non-intrusively attached to one of the signal or the block. The graphical model and the remote auxiliary tool are executed synchronously. At least one of an execution result or a remote auxiliary tool result is output to at least one of a display device, a storage device or a destination device.
US08855970B2 System and methods for precise microprocessor event counting
Method for providing precise microprocessor performance counter readings including detecting a swap back to a monitored process executing in a microprocessor. In response to the detected swap back to the monitored process, if the value read from the performance counter does not exceed the defined overflow threshold, the value of the performance counter stored in the first memory location is restored to the performance counter. If the value read from the performance counter exceeds the defined overflow threshold, the performance counter is set to zero and the value of the performance counter stored in the first memory location is used to increment an overflow memory location. If the value read from the performance counter exceeds the defined overflow threshold, at least one performance counter reading instruction is detected and in response to the detected at least one performance counter reading instruction, setting the counter output register to zero.
US08855967B1 Surface data measurement system and method
A surface measurement apparatus having at least one sensor and a reference point with pre-determined relative position relative to the sensor measures a distance between the sensor and a point on a surface over which the surface measurement apparatus is configured to travel. A receiver receives data related to a position of the reference point a calculated distance between the reference point and a position measurement station; and a processor calculates an absolute position of the point on the surface based on (a) the measured distance between the at least one sensor and the point, (b) the pre-determined relative position difference between the reference point and the at least one sensor, and (c) the position of the reference point or the calculated distance between the position measurement station and the reference point.
US08855963B2 Discovering thermal relationships in data processing environments
A system, and computer usable program product for discovering thermal relationships in a data processing environment are provided in the illustrative embodiments. An output temperature of a cooling unit operating in the data processing environment is changed from a previous output temperature to a new output temperature. The difference between the previous and the new output temperatures is a change in the output temperature. A change in an ambient temperature proximate to a data processing system is measured. The change in the ambient temperature is a difference between a previous ambient temperature and a new ambient temperature. An expression that represents a relationship between the change in the output temperature and corresponding change in the ambient temperature is determined. The expression is used to determine a cooling correspondence between the cooling unit and the data processing system.
US08855958B2 Method for determining at least one characteristic for the correction of measurements of a coriolis mass flowmeter
A method for determining at least one characteristic for the correction of measurements of a Coriolis mass flowmeter which is characterized by an increased accuracy and a low error rate while determining the characteristic is implemented by detecting values of a measurand during constant flow with the reading sensors, calculating at least one location parameter from the detected values, an calculating at least one dispersion parameter from the detected values and the location parameter. The detection of additional values and the calculation of the location parameter and dispersion parameter from the existing and additional values is carried out until the dispersion parameter reaches a threshold value, and then, the location parameter corresponding to the dispersion parameter is used as the characteristic for the correction of the reading of the Coriolis mass flowmeter.
US08855956B2 Method and system for determining state of charge of an energy delivery device
A method of determining state of charge of an energy delivery device includes sampling voltage values of the energy delivery device during relaxation of the device. The method further includes regressing an open circuit voltage value and the total overpotential being relaxed. The regression includes a predetermined time constant of relaxation associated with the energy delivery device. One embodiment uses the equation V(t)=OCV−α exp(−t/tau), where V(t) represents the sampled voltage values, t represents times at which each of the voltage values are sampled, OCV represents the open circuit voltage value of the energy delivery device, αrepresents the overpotential value, and tau represents the time constant of relaxation. The method uses a predetermined profile that relates open circuit voltage of the energy delivery device to state of charge of the device, to determine a particular state of charge corresponding to the regressed open circuit voltage value.
US08855954B1 System and method for prognosticating capacity life and cycle life of a battery asset
Path classification and estimation method and system used in combination with a computer and memory for prognosticating the remaining useful life of an in-service battery asset by classifying a present degradation path of the in-service battery asset as belonging to one or more of previously collected degradation paths of one or more exemplary battery assets and using the resulting classifications to estimate the remaining useful life of the in-service battery asset thereby transforming raw data inputs into actionable state-of-health outputs.
US08855950B2 Interprocessor communication measurement system
An interprocessor communication measurement system for an information processing apparatus having a plurality of processors which may send data to the other processors through a plurality of communication channels, includes a socket which is connected with communication channels and electrically connects a processor attached thereto with the communication channels, a measurement node which is attached to the socket in place of the processor and electrically connected with the communication channels, wherein the measurement node includes a routing unit configured to send data destined for any one of the other processors to the one of the other processors through the communication channels and an intercepting unit configured to intercept data sent through the routing unit, and a storing unit configured to store data intercepted by the intercepting unit of the measurement node.
US08855941B2 Method for examining prognosis of breast cancer
Disclosed is a method for examining prognosis of breast cancer including the steps of: (A) extracting RNA from a specimen collected from a subject, (B) preparing a determination sample using the extracted RNA, (C) determining the expression level of each gene in the specific gene groups using the obtained determination sample, (D) analyzing the expression level of the determined each gene, and (E) examining prognosis of breast cancer, based on the obtained analysis result are performed.
US08855939B2 System, method, and computer product for exon array analysis
In one embodiment, a method for analyzing data generated by probe arrays is described that comprises receiving user selections of two or more data files and an identification of one or more subsets of intensity values acquired from a biological probe array. The method includes iteratively opening each data file, identifying the selected subset of intensity values associated with each open data file, determining parameters for processing, storing the parameters and the identified intensity values, and closing the open data file prior to the subsequent iteration. The method then includes processing the stored intensity values using the parameters to identify one or more biological events.
US08855937B2 Crop characteristic estimation
A system for estimating a crop characteristic comprises a database, a plant growth model correlator, and a crop characteristic estimator. The database includes plant growth models for a plurality of fields. The plant growth model correlator is communicatively coupled with the database. The plant growth model correlator is configured for determining at least one harvested field with a first plant growth model which correlates with a second plant growth model for at least a portion of an unharvested field. The crop characteristic estimator is configured for estimating a crop characteristic for the unharvested field based on actual crop characteristic data obtained from the at least one harvested field.
US08855933B2 Systems and methods for determining the moments and forces of two concentric pipes within a wellbore
Systems and methods for determining the bending moment and shear force of tubing and casing when the tubing buckles and contacts the casing.
US08855929B2 Using object to align and calibrate inertial navigation system
The initialization of an inertial navigation system is performed using information obtained from an image of an object. Positional and orientational information about the object in a global reference frame and positional and orientational information about the camera relative to the object are obtained from the image. Positional and orientational information for the camera in the global reference frame is determined along with a transformation matrix between inertial sensor reference frame and a navigation coordinate frame. The inertial navigation system is initialized using the positional and orientational information for the camera, the transformation matrix and the velocity of the camera when the object was imaged, i.e., zero. Using the initialized data with measurements from the inertial sensors the position of the mobile platform may be updated during navigation and provided, e.g., on a digital map. Inertial navigation errors may be corrected using information obtained from images of different objects.
US08855928B2 Positioning apparatus judging movement method to control positioning timing
A positioning apparatus includes: a first measuring section to directly measuring its own present position; a second measuring section to measure an azimuth and a movement of a user; a movement method judging section to judge a movement method of the user based on the measurement result by the second measuring section; an azimuth specifying section to specify a movement azimuth of the user based on the measurement result by the second measuring section; a movement speed calculating section to calculate an average movement speed in a period where the movement method of the user is judged to be a movement state by car; and a position calculating section to obtain a movement position by integrating a movement distance into the specified movement azimuth at the average movement speed to reference position information obtained by the first measuring section when the user is in the movement state by car.
US08855925B2 Adaptable navigation device
The described method and system provide for adaptable GPS navigation based on road and traffic conditions. A method includes: receiving input front a user designating a destination; determining a calculated route from a starting point to the destination; and presenting turn-by-turn (TBT) directions based on the route, wherein the presenting of the TBT directions includes presenting conditions information received from an external source. The conditions information can be used during route calculation and can be updated while the user is traveling on the calculated route.
US08855924B2 Scheduling system, method, and program
A scheduling system includes: link creation means for creating a link as a partial route obtained by dividing the traveling route of a moving body indicated by traveling plan data; link adjustment range calculating means for calculating, for each link, a link adjustment range as an adjustment range of a scheduled pass-through time of the moving body not to cause the moving body to have a near-miss with another moving body; and adjusted traveling plan deciding means for deciding on adjusted traveling plan data indicative of a traveling plan of the moving body after adjusted by using link adjustment ranges of all links constructing the traveling route.
US08855921B2 Method and apparatus for transit mapping
A method, apparatus and computer program products are provided for collecting and analyzing route to determine the routes of a transit system. One example method includes receiving GPS data from a plurality of buses or uses from along a transit roué, the discreet GPS reports organized into a set, generating a plurality of clusters, each cluster is comprised of a first GPS point from a first set and one or more subsequent GPS points, each subsequent GPS point from a different set, and wherein each subsequent GPS point is located within a predetermined distance of the first GPS point. The clusters are then connected to form a route polylines. Outliers, inaccuracies, and/or route endpoints may be pruned to improve accuracy and efficiency of the method. The method may also order the aggregated clusters using spatial and temporal data of the GPS reports to improve accuracy.
US08855920B2 Automatic assistance for route planning
A method is provided for automatically assisting the route planning between a starting point and a destination.At least one respective traffic route is ascertained between the starting point and the destination for different means of transport by a traffic route ascertainment unit. The at least one means of transport is associated with the respective traffic route.Emission information is ascertained by an emission ascertainment unit for each traffic route on the basis of the means of transport which are associated therewith and on the basis of the traffic route length of the respective traffic route.The route planning is assisted between starting point and destination on the basis of the emission information.
US08855919B2 Navigation system with destination-centric en-route notification delivery mechanism and method of operation thereof
A method of operation of a navigation system includes: receiving an entry for a destination; identifying a category of interest for the destination; generating a route to the destination; recognizing a traveling context for traveling along the route to the destination; and generating an en-route notification based on matching a delivery profile to the category of interest for traveling within the traveling context for displaying on a device.
US08855913B2 Apparatus for planning trips combination, method for the same, and program for the same
A drive management system proposes a trips combination, such as a combination of two regular trips and/or a side trip from an ongoing trip. A trips database stores a plurality of trips including regular trips. A regular trips combination proposing module automatically creates a trips combination of regular trips and proposes the trips combination to a user. The real-time trips combination proposing module finds out a trip combinable with an ongoing trip based on short-term needs which are retrieved from the trips database and proposes the trips combination to a user. The system proposes the trips combination and shows an impact which will be caused by the proposed trips combination. As a result, it is possible to support a user to plan a trips combination advantageous in some aspect.
US08855910B2 Moving body anti-collision device and moving body with the same
A moving body anti-collision device is disclosed that is able to accurately determine a relative position between moving bodies in a small area and efficiently prevent collisions between moving bodies. The moving body anti-collision device includes a transmission unit that transmits a detection wave, a driving unit that generates a driving signal to drive the transmission unit, a receiving unit that receives a detection wave sent from a transmission unit on other moving body, a calculation unit that calculates a relative position of the moving body relative to the other moving body according to an intensity of the detection wave sent from the other moving body and received by the receiving unit, and a collision determining unit that determines, according to a calculation result given by the calculating unit, whether the moving body collide with the other moving body.
US08855892B2 Control device for internal combustion engine
The present invention relates to a control device for an internal combustion engine including a first control subject (35D) capable of controlling two different control amounts (Pim and Regr) influencing each other at a low frequency and second control subjects (52 and 33) capable of controlling the control amount at a high frequency. In the present invention, the first control amount and the second control amount are changed by the first control subject, and the first control amount and the second control amount are changed by the second control subject. Further, in the present invention, an operation amount (Mv) is input to the first control subject so that a first control amount deviation component (ΔPimL) with respect to a target value changing at a low frequency and a second control amount deviation component (ΔRegrL) with respect to the target value become zero, and operation amounts (Megr and Mth) are input to the second control subject so that a first control amount deviation component (ΔPimH) with respect to a target value changing at a high frequency and a second control amount deviation component (ΔRegrH) with respect to the target value become zero.
US08855890B2 Engine synchronizer
Engine synchronization apparatus and system for multi-engine vehicles such as boats and aircraft providing limited authority throttle cable trim effected by an apparatus interposed between the throttle plate and throttle cable of a slave engine and mounted in a floating configuration. An actuator is mounted to the apparatus to trim the distance between the throttle plate and throttle cable attachment thereby trimming the throttle cable. A system is provided in which a difference signal derived from master and slave engine tachometer signals is used to control the actuator and synchronize the engines within a predetermined range.
US08855889B2 Method for regulating the rail pressure in a common rail injection system of an internal combustion engine
A method for open-loop and closed-loop control of an internal combustion engine (1) in which the rail pressure (pCR) is controlled via a low pressure-side suction throttle (4), as the first pressure-adjusting element in a rail pressure control loop. A rail pressure disturbance variable (VDRV) is generated to influence the rail pressure (pCR) via a high-pressure side pressure control valve (12), as the second pressure-adjusting element, by which fuel is redirected from the rail (6) into the fuel tank (2). The position of the high-pressure side pressure control valve (12) is determined by a PWM signal (PWMDV), which, when normal mode is set, is calculated as a function of the resulting target volume flow and, when protective mode is set, is temporarily set to a maximum value.
US08855887B2 Coasting control device
A coasting control device capable of avoiding coasting control during turning is provided. A turning recognition unit that recognizes that a vehicle is turning and a unit for prohibiting coasting control during turning that prohibits coasting control when the turning recognition unit recognizes that the vehicle is turning are provided.
US08855878B2 System and method for controlling an accumulator based on vehicle conditions
A system and method for controlling an accumulator in a transmission of a motor vehicle includes the steps of determining whether the motor vehicle has been turned off, sensing at least one operating condition of the motor vehicle, and comparing the at least one operating condition to a reference condition. If the at least one operating condition of the motor vehicle fulfills the reference condition and if the motor vehicle has been turned off then the accumulator is discharged.
US08855875B2 Pedal map shift
A method is provided for controlling a prime mover adapted to drive at least one ground engaging element of a working machine. The method includes receiving an operator control input indicative of the control of the prime mover and determining at least one operation signal in response to the operator control input, which operation signal is sent for controlling the prime mover. The method also includes receiving a operating state input indicative of an operating state of the machine and selecting a control mode from at least one speed control mode in which the determined operational signal comprises a desired speed of the prime mover and at least one torque control mode in which the determined operational signal comprises a desired torque of the prime mover in response to the operating state input.
US08855870B2 Clutch control device for industrial vehicle
A clutch control device for an industrial vehicle includes: a braking force detection device that detects braking force of the industrial vehicle; a speed stage detection device that detects a set speed stage of a transmission; a clutch control device that controls engage/release of a forward clutch so that the forward clutch is released when a clutch cut off condition is judged to be satisfied based upon braking force of the industrial vehicle detected by the braking force detection device; and a switching device that automatically switches the clutch cut off condition in the clutch control device based upon a set speed stage of the transmission detected by the speed stage detection device.
US08855868B2 Integrated vehicular system for low speed collision avoidance
A method of providing range measurements for use with a vehicle, the method comprising the steps of: a) visually sensing (2) the area adjacent the vehicle to produce visual sense data (22); b) range sensing (26) objects around the vehicle to produce range sense data; c) combining the visual sense data and the range sense data to produce, with respect to the vehicle, an estimate of ranges to the objects around the vehicle (28). The estimate of ranges to the objects around the vehicle may be displayed (29) to a driver.
US08855863B2 Vehicle steering apparatus
A vehicle steering apparatus is an apparatus, mounted on a vehicle, for setting a target steering reaction force to be applied to a steering wheel on the basis of a steering angle and a vehicle speed and for performing reaction force control to apply the target steering reaction force, the vehicle steering apparatus provided with: a setting device for setting the target steering reaction force such that the target steering reaction force is less than a predetermined base steering reaction force if the vehicle speed is less than or equal to a predetermined base vehicle speed.
US08855853B2 Method and apparatus for data acquisition, data management, and report generation for tractor trailer subsystem testing and maintenance
Techniques for operating, testing, and generating a testing report for the electrical and air subsystems of a vehicular trailer, without the use of an associated truck tractor are disclosed. The system includes a portable testing unit with self-powered electrical and air subsystems which are interconnected to the corresponding subsystems of the vehicular trailer under test. The portable testing unit can be rolled about on a stand and functions as a mini-truck tractor, in the sense that it selectively provides electrical power and air to the VUT. The testing unit is controlled by a small, portable hand held radio frequency remote control that communicates test and data signals to a radio receiver in the portable testing unit. The system acquires testing data from both automatic and manual means from disparate sources. The system stores the testing data and automatically generates testing reports. The system manages the testing data and generated reports.
US08855852B2 Method and system for monitoring a structure
A method and system of monitoring a structure, the method including: a) synchronously acquiring data comprising a plurality of operational parameters and at least one strain data, b) building a significant points dataset from the data acquired in step a), and c) modelling a relationship between the operational parameters and the strain data using the built significant points dataset to train a non-adaptive prediction functional supervised approximation method, wherein the step of building a significant points dataset comprises deletion of redundant information from the acquired data. The resultant models may be used to process structure real operation data in order to estimate the eventual crack initiation and crack growth on a set of predefined locations of the structure.
US08855847B2 Intelligent navigation system
An intelligent navigation system navigates a motor vehicle according to real-time road conditions and maneuverability conditions. The intelligent navigation system predicts and corrects potential route deviations before they actually occur. The intelligent navigation system interacts with the maneuverability of a motor vehicle, such that it can navigate the motor vehicle with very little to no human intervention. The intelligent navigation system may embody a method comprising the steps of receiving, from an input device, destination information related to a destination to be reached by the motor vehicle; receiving, from a positioning device, initial location information related to an initial location of the motor vehicle; determining, using a processor, a task for maneuvering the motor vehicle from the initial location to the destination; and instructing, using the processor, a vehicle maneuver controller to implement the task.
US08855843B2 Starting control device of electric vehicle
A socket receives charging voltage and auxiliary voltage of the main battery from an external power supply. A charging line Lch connects the charging voltage to the main battery. Auxiliary power supply lines connect the auxiliary voltage to a vehicle drive control unit. A main switch is provided on a constant line for inputting the output of an electric power converting unit to the vehicle drive control unit. The vehicle drive control unit includes an electric power converting unit starting unit started when the auxiliary voltage is applied to output a starting signal of the electric power converting unit, and means for maintaining the starting signal to charge the sub-battery with the electric power from the electric power converting unit when the voltage applied from the electric power converting unit through the main switch to the vehicle drive control unit is a predetermined value.
US08855840B2 Method and system for more efficient operation of plug-in electric vehicles
The automobile may have an energy conversion unit, an energy storage unit, a user selection unit, a global positioning system, and a control unit. The automobile can operate in a default charging mode, which is either the charge depletion mode or the charge sustaining mode. Upon user input, the energy conversation unit and/or the energy storage unit can operate in an extended charging mode or a forced charging mode. In the extended charging mode, the state of charge is increased or decreased over a predetermined charging range. In the forced charging mode, the state of charge is increased until a predetermined charge limit is reached. The system and method can also use global positioning system signals to operate in the charge depletion mode, the charge sustaining mode, the extended charging mode, and/or the forced charging mode.
US08855837B2 Altitude and acceleration command altitude hold algorithm for rotorcraft with large center of gravity range
A flight control system includes an Acceleration and Attitude Command/Velocity Hold mode (AACVH) algorithm which blends attitude commands with acceleration commands. This blending determines a trim attitude for a given rotorcraft flight condition.
US08855835B2 Convoy travel apparatus
A convoy travel apparatus in a subject vehicle of a convoy transmits a convoy travel information, which includes the maximum allowable number and the currently-included number of vehicles in the convoy. The apparatus determines whether the subject vehicle is blocking a signal from a leader vehicle of the convoy in which the subject vehicle is traveling as a follower vehicle, where the signal being blocked by the subject vehicle may not reach a position of a rearmost vehicle in the convoy. When the subject vehicle is determined to be blocking the signal, the subject vehicle transmits the convoy travel information indicating that the subject vehicle as a leader vehicle (i.e., a representative leader vehicle) of the convoy, thereby enabling a newly-joining vehicle to receive the convoy travel information transmitted from the follower vehicle in the convoy.
US08855832B2 Rate based power management device
The present invention is a power management device for connecting a power consuming device to a power source so that the device switches the connection on and off automatically based on the power rate (price per kilowatt-hour) obtained from the power supplier. The user may specify a power usage specification, such as a maximum power rate that the user is willing to pay, and then the device disconnects the power from the power consuming device whenever the power rate is greater than the maximum power rate, and turns it on again when the power rate becomes less than or equal to the maximum power rate. The device includes a programmable controller, wireless and ethernet interfaces and can also act as a wireless access point.
US08855827B2 System and method of controlling operation of a liquid diffusion appliance
A method of controlling operation of a diffusion appliance to treat the atmosphere within an enclosed space. The method may include programming the operation of the appliance according to a control scheme specifying a flow rate of liquid to a diffusion means and a periodic operation of the diffusion means. Control schemes may be associated with different volumes of spaces to be treated by the appliance, the rate of decay of the liquid within the space to be treated and the level of concentration of the liquid desired within the space.
US08855824B2 Dual arm robot
The dual arm robot includes a first arm including a first hand, a first visual sensor and a first force sensor, and a second arm including a second hand, a second visual sensor and a second force sensor, uses each visual sensor to detect positions of a lens barrel and a fixed barrel to hold and convey them to a central assembling area, uses the first visual sensor to measure a position of a flexible printed circuits to insert the flexible printed circuits into the fixed barrel, and uses outputs of the force sensors to fit and assemble the fixed barrel onto the lens barrel under force control. The dual arm robot converts a position coordinate of a workpiece detected by each visual sensor to a robot coordinate to calculate a trajectory of each hand and drive each arm, to thereby realize cooperative operation of the two arms.
US08855822B2 Robotic surgical system with mechanomyography feedback
A robotic surgical system for performing a surgical procedure within the body of a subject includes an elongate surgical instrument, a robotic controller configured to control the motion of the distal end portion of the surgical instrument, and a mechanomyography feedback system in communication with the robotic controller. The mechanomyography feedback system includes a mechanical sensor configured to monitor a physical motion of a muscle and to provide a mechanomyography signal corresponding to the monitored physical motion. Additionally, the feedback system includes a processor configured to receive the mechanomyography signal, to determine if the received signal is indicative of an induced muscle response, and to provide a control signal to the robotic controller if an induced muscle response is detected.
US08855811B1 Pharmacy workflow management system including plural counters
A pharmacy workflow management system including plural counters and a pharmacy workflow management method. In embodiments, the system includes a housing, a first automatic object counter and a cassette dispenser which feeds objects from a cassette mounted thereto to the first object counter. A second object counter counts objects fed from a cassette mounted to the cassette dispenser. A data processing platform within the housing is programmed with instructions that enable the system to compare the counts from the first and second object counters. The data processing platform also provides for management of pharmacy workflow by providing improved control of prescription fulfillment.
US08855810B2 Apparatus and method for transferring gloves
The present invention relates to an apparatus for transferring a glove (100) from a conveyor (200) characterized by: a camera (10); a pick-up assembly (20) comprising a pair of inner grippers (21) and two pairs of outer grippers (22); a pair of sensors (30); a robotic arm (40) mounted with the pick-up assembly (20); a processor. The present invention also relates to a method for transferring a glove (100) from a conveyor (200), characterized by the steps of: locating a cuff (101) of the glove (100) on the conveyor (200) by capturing an image on the conveyor with a camera (10) and analyzing the image with a processor; using a robotic arm (40) to move a pick-up assembly (20) to the located cuff (101); gripping the cuff (101) with a pair of inner grippers (21) of the pick-up assembly (20) and lifting the glove (100) by retracting the pair of inner grippers (21); detecting the glove (100) position by using a pair of sensors (30); opening the glove (100) by grabbing and sliding apart the two pairs of outer grippers (22); shifting the glove (100) towards a workstation (300) by using the robotic arm (40); transferring the glove (100) to the workstation (300) by engaging the glove (100) to the workstation (300).
US08855807B2 Computer program products for packaging machines suitable for packaging whole muscle
Computer program products automatically package an object, such as, for example, whole muscle meat pieces, in a covering material, such as, for example, netting using actuators for operating barrier doors, pushers, and locks.
US08855805B2 Conveyance vehicle system
A conveyance vehicle system that achieves an increased efficiency of loading an article from a conveyance vehicle into a loading opening of an automated warehouse, includes a stocker, a conveyance vehicle, and a conveyance vehicle controller. The stocker includes racks, a loading port, and a stocker controller. The conveyance vehicle loads an article into the loading port of the stocker. The conveyance vehicle controller assigns the conveyance vehicle with an article conveyance command to convey the article to the stocker. The stocker controller receives a predicted conveyance command before the article is loaded from the conveyance vehicle into the stocker. The predicted conveyance command includes ID information of the article and information indicating whether or not the article is to be loaded into a rack.
US08855804B2 Controlling a discrete-type manufacturing process with a multivariate model
Described are methods, systems, and a computer-readable storage medium for controlling a discrete-type manufacturing process (e.g., an injection molding process) with a multivariate model. Data representing process parameters, operating parameters, or both of the manufacturing process are received. The received data is compared with a multivariate model that approximates the manufacturing process to provide a result. Upon the result of the comparing satisfying a condition, one or more values for a set of operating parameters for the manufacturing process are determined. When the one or more determined values for the set of operating parameters satisfies a criterion, at least one operating parameter of the manufacturing process is updated.
US08855801B2 Automated integration of feedback from field failure to order configurator for dynamic optimization of manufacturing test processes
The present invention addresses the deficiencies of the art in respect to the manufacturing test processes and provides a novel and non-obvious method, system and apparatus for dynamic optimization of manufacturing test coverage with automated integration of field failure feedback with the order configurator. In one embodiment of the invention, a manufacturing field failure feedback method can be provided. The method can include retrieving field failure data, analyzing the field failure data, storing failure analysis object information, modifying a manufacturing test case selection within the test case selection and order configurator based on using field failure data analysis, the test case selection including rules for test case selection and test case object information, and configuring a testing order with an optimized test case selection.
US08855799B2 Automated mass production method and system thereof
An exemplary embodiment of the present disclosure illustrates an automated mass production method, adapted for an automated mass production system in manufacturing at least an electronic device having a storage unit, the method includes steps of: determining a protocol type of the Auto Handler to select one of the agents; establishing a first communication protocol communication between the MP tool module and the selected agent; establishing a second communication protocol communication between the selected agent and the Auto Handler; the Auto Handler outputting a processing command to the selected agent; the selected agent converting the processing command into a MP tool module executable MP tool instruction; and the selected agent outputting the corresponding MP tool instruction to the MP tool module so as to have the MP tool module executed the MP tool instruction to automatically perform a corresponding mass production process to the electronic device.
US08855789B2 Implantable biostimulator delivery system
A delivery system for implanting a biostimulation device comprising a stylet extending along an axis from knob end to a threaded end configured to engage an internally threaded nut of the biostimulation device and a catheter tube configured to axially contain the stylet. The catheter tube comprises a feature that engages a corresponding feature on the biostimulation device whereby the stylet can be rotated relative to the catheter tube for disengagement of the stylet threaded end from the biostimulation device threaded end.
US08855788B2 MRI compatible electrode circuit
An MRI compatible electrode circuit construct is provided. The construct includes at least two filter components constructed from an electrode wire. One filter component may be a resonant LC filter at or near an electrode/wire interface that resolves the issue of insufficient attenuation by effectively blocking the RF induced current on the wire from exiting the wire through the electrode. The second filter component may include one or more non-resonant filter(s) positioned along the length of the electrode wire that resolve(s) the issue of excessive heating of the resonant LC filter by significantly attenuating the current induced on the wire before it reaches the resonant LC filter. The non-resonant filter(s) may also attenuate the RF current reflected from the resonant LC filter thereby resolving the issue of the strong reflected power from the resonant filter and the associated dielectric heating.
US08855784B2 Implantable medical device including controllably isolated housing
An implantable medical device or some other ambulatory medical device, such as a pacer, defibrillator, or other cardiac rhythm management device can include an electrical energy delivery circuit, such as including an integrated circuit comprising a first electrostimulation output terminal, a can terminal, and a switch control output. The ambulatory or implantable device can include at least two switches in series, each including a respective substrate electrically separate from the integrated circuit, and from each other, the switches configured to controllably isolate a conductive housing of the implantable medical device from the can terminal of the integrated circuit, such as in response to the switch control output.
US08855781B2 Remotely programmable personal device and system and method for remote programming of a personal device
A remotely programmable personal device, in particular a programmable implantable medical device, e.g., a cardiac pacemaker, a defibrillator, a cardioverter or the like. A system for remote programming of such a personal medical device and a method for remote programming of a programmable personal device.
US08855779B2 Methods of diagnosis and treatment of wounds, methods of screening for electrical markers for wounds prognosis in patients
Described herein are electrical markers, specifically alternate current (AC) signals whose appearance in patients with wounds, specifically chronic wounds, correlates to the prognosis of the wounds. Related methods that can be used for diagnosis and treatment of wounds are disclosed. Also described herein are methods that can be used to identify electrical signals of wounds.
US08855774B2 Vestibular prosthesis
A vestibular prosthesis includes micro-electric-mechanical (MEMS) sensors, gyroscopes in each sensitivity axis (X, Y, Z), accelerometers in each sensitivity axis (X, Y, Z) to detect an angular and linear movement providing displacement measurements, gyroscopes in each one of the spatial axes (X, Y, Z), a microprocessor connected to the MEMS sensors and producing an electric pulse pattern or a continuous galvanic current pattern, a conditioning unit that amplifies and conditions the microprocessor output to apply current to the stimulation electrodes, the microcontroller being configured to determine the displacement of the cupula and the otolithic mass, determine a membrane potential as a result of a displacement detected by the MEMS sensors by means of determining a transduction current, and determine an action potential discharge pattern for the primary afferent neuron, which synapses with the hair cell by means of a mathematical model of the informative process of the vestibular mechanoreceptor.