Document Document Title
US08881309B2 Systems for finding a lost transient storage device
Processes for identifying and recovering a lost transient storage device are provided. In some processes, information regarding the owner of the device is obtained. The device ownership information may be stored on a remote service with which the device is registered and/or may be stored on the device itself. In one process, the remote service provides the device with customized device-executable code when the device is registered. The device may also contain information regarding trusted systems. The process includes obtaining status information indicating whether a device is lost when the device is connected to a host system. In some processes, the status is determined by a remote service. In other processes, the status is determined by the device. If the device is lost then a device recovery plan is executed. Portions of a device recovery plan may be executed on the remote service, the host system, and/or the device.
US08881308B2 Method to enable development mode of a secure electronic control unit
A system and method for installing software on a secure controller without requiring the software to be properly signed. The method includes determining whether a by-pass flag has been set in the controller that identifies whether a file validation procedure is required to install the file and performing a pre-check operation to determine whether predetermined parameters of the file have been satisfied. The method also includes installing the file into a memory in the controller if the pre-check operation has been satisfied. The method further includes determining whether the file has a proper signature and indicating that the signature is proper if the by-pass flag is set and the file does not include a proper signature, and allowing the file to be installed if the signature has been indicated as being proper.
US08881307B2 Electronic file security management platform
According to some embodiments, an electronic file security management platform may receive a request from a user to access a first electronic file associated with a first application, such as a word processing document. A security characteristic associated with the user may be determined, and an encrypted version of the first electronic file may be decrypted in accordance with the security characteristic. The electronic file security management platform may then arrange for the user to access the first electronic file via the first application such that: (i) a first portion of the first electronic file is available to the user based on a first security requirement associated with the first portion and the security characteristic, and (ii) a second portion of the first electronic file is not available to the user based on a second security requirement associated with the second portion and the security characteristic.
US08881304B2 Method of controlled access to content
A method of controlled access to content, comprising joining an access sharing network, obtaining a content item from the access sharing network which requires access control data to enable playback, obtaining the access control data, determining from the access control data that a particular other device is authorized to play back the content item, and enabling playback of the content item in accordance with the access control data upon a positive determination that said other device is a member of said access sharing network. Preferably the access control data is used also during a predetermined period of time after making a determination that said other device has ceased to be a member of the access sharing network. Also a device (101) configured to carry out the method.
US08881303B2 System and method for executing web services
The subject embodiments provide a method such as a web service method. The method is used to execute two or more web services that have respective web user interfaces, and are operationally independent of each other. The method comprises: (i) executing the two or more web services under manual operation of a user; (ii) recording a script based on activities of the user in the execution; (iii) securing the recorded script; and (iv) executing the two or more web services by playing said secured script without individually executing them. The method is user friendly; highly customizable; and safe with respect to document retrieval and submission.
US08881300B2 Automated detection of flaws and incompatibility problems in information flow downgraders
Mechanisms for evaluating downgrader code in application code with regard to a target deployment environment. Downgrader code in the application code is identified. Based on an input string, an output string that the downgrader code outputs in response to receiving the input string is identified. One or more sets of illegal string patterns are retrieved. Each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment. The illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes. A determination is made as to whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string. An output indicative of the results of the determining is generated.
US08881296B2 Marking and obscuring sensitive values in traces
In one embodiment, a method for processing trace data is provided. The method generates trace data during execution of the target application and obtains criteria for identifying whether a value in the trace data is sensitive. An initial occurrence of a sensitive value in the trace data is identified based on the obtained criteria. The method then stores the sensitive value in a data structure accessible by an obscuring process. The obscuring process receives the trace data and obscures occurrences of the sensitive value in the trace data prior to providing the trace data for display.
US08881293B1 Static application security testing
Methods, systems, and computer-readable storage media for analyzing source code of an application. In some implementations, actions include determining a control flow graph of the application using the source code of the application; determining a plurality of source-sink pairs of exploitable data sources and exploitable data sinks; and determining, for each source-sink pair, whether the source-sink pair is potentially exploitable by: determining one or more conditions under which the invoking procedure passes the exploitable data source to the exploitable data sink of the invoked procedure; and determining, using the control flow graph, whether the conditions are met in at least one possible context of the application, and if so, determining that the source-sink pair is potentially exploitable.
US08881292B2 Evaluating whether data is safe or malicious
“Known bad” data, “known good” data, or both can be stored in a database. A technique for evaluating data compares the data to the “known bad” data, “known good” data, or both. Based on the comparison, the data may or may not be allowed to be processed by a mobile device.
US08881289B2 User behavioral risk assessment
A predetermined particular behavioral profile is identified associated with at least one particular user of a computing system, the particular behavioral profile identifying expected behavior of the at least one user within the computing system. Activities associated with use of the computing system by the particular user are identified and it is determined whether the identified activities correlate with the particular behavioral profile. Identifying an activity that deviates from the particular behavioral profile beyond a particular threshold triggers a risk event relating to the particular user.
US08881285B2 Method and system for content distribution network security
A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.
US08881284B1 Method and system for secure network access using a virtual machine
A method and apparatus for secure network access using a virtual machine are disclosed. The method includes provisioning a virtual machine, downloading content to the virtual machine, and sending information from the virtual machine. The information that is sent from the virtual machine is configured to allow the display of output from the virtual machine. The output from the virtual machine is based on the content. The apparatus includes a number of virtual machine servers. Each of the virtual machine servers is configured to support at least one of a number of virtual machines. A first virtual machine of the virtual machines includes an antivirus module. The first virtual machine is configured to download content. The antivirus module is configured to detect a virus by virtue of being configured to analyze the content.
US08881282B1 Systems and methods for malware attack detection and identification
Exemplary systems and methods for malware attack detection and identification are provided. A malware detection and identification system can comprise a controller. The controller can comprise an analysis environment configured to transmit network data to a virtual machine, flag input values associated with the network data from untrusted sources, monitor the flagged input values within the virtual machine, identify an outcome of one or more instructions that manipulate the flagged input values, and determine if the outcome of the one or more instructions comprise an unauthorized activity.
US08881280B2 Device-specific content delivery
Devices of an individual's device-sphere recognize risky or undesirable behavior requested by devices outside of the device-sphere and allow the user to prevent the behavior. The user's decision is stored and used to protect all devices of the user's device-sphere from similar risky behavior from the outside devices. If the choice is made for all devices of the user's device-sphere, the choice is broadcast to other devices of the user's device-sphere such that other devices can benefit from the choice made by the user.
US08881278B2 System and method for detecting malicious content
A system and method for detecting malicious code in web content is described. A controller receives information, routes the information to the appropriate module and determines whether a user receives the web content or a report of a detection of malicious code. A vulnerability definition generator generates vulnerability definitions. A parser parses web content into static language constructions. A translation engine translates the static language constructions into trap rules, translates the web content into application programming interface (API) calls and determines whether the API calls trigger any of the trap rules. A sandbox engine generates an environment that mimics a browser and executes dynamic parts of the web content and determines whether a dynamic part triggers a trap rule.
US08881277B2 Method and systems for collecting addresses for remotely accessible information sources
A method and system are described for collecting addresses for remotely accessible information sources. Messages, such as emails, carried by a messaging network (N1) are intercepted before reaching a destined terminal. Addresses for remotely accessible information sources (i.e. URLs) are identified from the intercepted email messages. The messages are analyzed to be classified as either a first type of message (e.g. spam or virus messages) or a second, different, type of message. If the intercepted message is classified as the first spam/virus type then data indicative of the identified address (URL) is transmitted to a filtering system (100) which controls access to the remotely accessible information sources. As a result, addresses (URLs) are gleaned from transmitted messages such as spam e-mail and supplied to a filtering system (100) which controls access to the resources accessible at those addresses.
US08881276B2 Dynamically generated whitelist for high throughput intrusion prevention system (IPS) functionality
In one embodiment, detecting network data, retrieving a whitelist associated with the detected network data, and selectively applying an intrusion prevention policy based on the retrieved whitelist are provided.
US08881273B2 Device reputation management
A device reputation server recognizes malicious devices used in prior attacks and prevents further attacks by the malicious devices. Server computers require a digital fingerprint of any client devices prior to providing any service to such client devices. Logging of network activity include the digital fingerprint of the device perpetrating the attack. When an attack is detected or discovered, the attacked server reports the attack and the digital fingerprint of the perpetrating device to a device reputation server. The device reputation server uses the report to improve future assessments of the reputation of the device associated with the reported digital fingerprint.
US08881272B2 System and method for selecting and applying filters for intrusion protection system within a vulnerability management system
A system for controlling selection of filters for protecting against vulnerabilities of a computer network includes a vulnerability management system analyzes the computer network and determines network vulnerabilities for the computer network. The vulnerability management system is configured to receive real-time data on a status of filters protecting against vulnerabilities of the computer network. A database contains a pre-generated mapping of network vulnerabilities to filters for protecting against the network vulnerabilities. The vulnerability management system enables user control of filters for protecting against vulnerabilities of the computer network based upon the determined network vulnerabilities of the computer network, the pre-generated mapping of network vulnerabilities to the filters for protecting against the network vulnerabilities and the real-time data on the status of the filters.
US08881269B2 Device, method, and graphical user interface for integrating recognition of handwriting gestures with a screen reader
While an electronic device with a display and a touch-sensitive surface is in a screen reader accessibility mode, the device displays an application launcher screen including a plurality of application icons. A respective application icon corresponds to a respective application stored in the device. The device detects a sequence of one or more gestures on the touch-sensitive surface that correspond to one or more characters. A respective gesture that corresponds to a respective character is a single finger gesture that moves across the touch-sensitive surface along a respective path that corresponds to the respective character. The device determines whether the detected sequence of one or more gestures corresponds to a respective application icon of the plurality of application icons, and, in response to determining that the detected sequence of one or more gestures corresponds to the respective application icon, performs a predefined operation associated with the respective application icon.
US08881267B2 Systems and methods for supporting pre-boot log in
A method for supporting pre-boot log in is described herein. The method includes receiving a password, via an operating system of the computer system, selected by a user for use in a pre-boot log in. The method includes determining whether the password can be entered by the user prior to completion of booting of the computer system. If the password cannot be entered by the user prior to completion of the booting, the method includes signaling that the password is unacceptable.
US08881264B2 Method for controlling the execution of an applet for an IC card
A method for controlling the execution of an applet for an IC Card including a java card platform, includes a phase for downloading the applet inside the IC Card, a phase for executing the applet through the java card platform and a phase for storing an identification platform number inside a memory portion of the IC Card. The phase for executing the applet has a first step for detecting the identification platform number to perform the phase for executing the applet with or without restrictions, respectively if the identification platform number is not or is detected by the step for detecting. The applet is a java card applet or a SIM toolkit applet.
US08881263B2 Location-based security system for portable electronic device
A location-dependent security method and system for a portable electronic device is disclosed. Without requiring that the user enter any location information, the system determines one or more familiar areas for the device based on locations where the device has received at least a threshold amount of successful user authentication entries. Thereafter, when a user attempts to access the device or an application of the device, the device will implement a first authentication process if the device is in one of the familiar areas, or a different authentication process if the device is not in one of the familiar areas.
US08881262B2 Image processing apparatus and user authentication method for image processing apparatus
An image processing apparatus includes a first authentication unit configured to authenticate a user, a second authentication unit configured to authenticate the user, an operation unit configured to receive an operation from the user, a logout unit configured to set the user in a logout state in which the user is unauthenticated, if a predetermined time has passed without the operation unit receiving any operation from the user while the user is authenticated by the first authentication unit or the second authentication unit, and a change unit configured to change the predetermined time to a second time shorter than a first time, if the user is unauthenticated by the second authentication unit while the user is authenticated by the first authentication unit and the second authentication unit.
US08881258B2 System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
A method for containing a threat in network environment using dynamic firewall policies is provided. In one example embodiment, the method can include detecting a threat originating from a first node having a source address in a network, applying a local firewall policy to block connections with the source address, and broadcasting an alert to a second node in the network. In more particular embodiments, an alert may be sent to a network administrator identifying the source address and providing remedial information. In yet other particular embodiments, the method may also include applying a remote firewall policy to the first node blocking outgoing connections from the first node.
US08881255B2 Selection of access conditions for portable tokens
The invention relates to a portable token (SC) comprising a capability query mechanism (CQM). The capability query mechanism (CQM) is set to inform entities (PC, MW) willing to communicate with the portable token (SC) of at least a subset of the command(s) (C) available in the portable token (SC). The portable token (SC) is arranged to set a flag when the capability query mechanism (CQM) is invoked. When a command (C) is called, the portable token (SC) enforces first access conditions (AC1) for the command (C) if the flag is set, or second access conditions (AC2) if the flag is cleared.
US08881248B2 Service provider access
A method and apparatus for enabling a user to access a service provider is described. The user sends a request from a browser to a proxy server. The proxy server modifies the request by adding data (such as a URL) relating to a location of an identity provider able to provide user credentials for the user and forwards the modified request to the service provider. The modification of the access request may occur before the request is sent to the service provider or in response to an authentication request from the service provider. The data relating to the location of the identity provider may be provided as a header (e.g. an http header).
US08881247B2 Federated mobile authentication using a network operator infrastructure
Architecture that utilizes the strong authentication mechanisms of network operators to provide authentication to mobile applications by identity federation. When a mobile client initiates request for access to an application outside the network operation infrastructure, the request is passed to an associated application secure token service. The application secure token service has an established trust and identity federation with the network operator. The application secure token service redirects the request to a network operator security token server, which then passes the request to a network operator authentication server for authentication against an operator identity service. Proof of authentication is then issued and returned from the network operator security token server to the application secure token service and the application, which allows the mobile client to access the application.
US08881244B2 Authorizing computing resource access based on calendar events in a networked computing environment
An approach for authorizing access to computing resources (e.g., electronic files) based on calendar events (e.g., meetings of a user) in a networked computing environment (e.g., a cloud computing environment) is provided. A portion/segment (e.g., private cloud) of the networked computing environment may be designated for storing at least one electronic file to be shared (e.g., as stored in a computer storage device associated with the portion). The portion of the networked computing environment may then be associated (e.g., graphically) with an electronic calendar entry (e.g., a meeting having a set of attendees). Based on the calendar entry, a set of users (e.g., the meeting attendees) authorized to access the at least one electronic file may be determined based on the electronic calendar entry. Thereafter, access (e.g., a related permissions) to the at least one electronic file may be authorized for the set of users.
US08881233B2 Resource management via periodic distributed time
Systems and methods for providing resource management in a distributed network are disclosed. A loose collection of devices in a network may not be aware of the power restrictions for other devices. Wall powered devices will generally have drastically different power settings than battery powered mobile devices. The invention provides a federation policy for time that can be used to slave to a local service responsible for understanding the local resource requirements of each device (or node) on the network. In such a distributed time system, all services in a particular time domain may be sped up, slowed down, or completely halted.
US08881232B2 Visualization of access permission status
Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables.
US08881230B2 Secure social web orchestration via a security model
A method includes receiving, by a first computer, input from a first user. The method further includes creating, by the first computer, a hierarchical class tree implementing security profiles based on the input from the user. The hierarchical class tree identifies data, actions, and behaviors pertaining to content, and the security profiles restrict access and use of that user's content. The method also includes transmitting, by the first computer, a portion of the hierarchical class tree to a second computer. A corresponding apparatus is also provided.
US08881228B2 Providing a managed browser
Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a managed browser. The managed browser may, for instance, be configured to provide a managed mode in which one or more policies are applied to the managed browser, and an unmanaged mode in which such policies might not be applied and/or in which the browser might not be managed by at least one device manager agent running on the computing device. Based on device state information and/or one or more policies, the managed browser may switch between the managed mode and the unmanaged mode, and the managed browser may provide various functionalities, which may include selectively providing access to enterprise resources, based on such state information and/or the one or more policies.
US08881227B2 Secure web container for a secure online user environment
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
US08881224B2 Method and system for providing masking services
A system and method for presenting on-demand masking of data as a software service in a distributed environment is provided. An application hosted on a computing device receives request for access to application data from a user. Credentials of the user are first validated in order to determine whether the user is authorized to access the requested application data. For an authorized user, a category of the user is determined to ascertain whether the user is privileged to obtain full access. In case the user is a privileged user, unmasked application data is fetched from a database utility and provided to the user. In case the user is not a privileged user, application data access request is transferred to a data masking service. Application data is fetched from database utility, masked based on pre-defined masking rules and provided to the user.
US08881222B2 Multimedia interactive simulator
A system that incorporates teachings of the present disclosure may include, for example, a device, including a centralized controller to: distribute multimedia content to permit a television (TV) emulator client at one or more retail store locations to simulate a plurality of features of a television system interactively by using a media controller; and periodically update the multimedia content distributed to the TV emulator client. Other embodiments are disclosed.
US08881220B2 Managed video services at edge-of-the-network
Systems and methods for managing video delivery to mobile device clients. Videos are assimilated for transmission to clients, a playout lead is estimated for each video and the videos are transmitted to the clients.
US08881216B2 System and method for locating and capturing desired media content from media broadcasts
A media agent that monitors multiple broadcast transmissions and a method for the same. The media agent establishes connections with broadcast transmissions and then identifies characteristics of the media content contained within the broadcast transmission. The association between the identified characteristic of the media content and the connected broadcast transmission is maintained to allow the information gathered from the broadcast transmission to be used meaningfully.
US08881215B2 System and method for compressing video based on detected data rate of a communication channel
A system and method are described below for encoding interactive low-latency video using interframe coding. For example, one embodiment of a computer-implemented method for performing video compression comprises: detecting a maximum data rate of a communication channel between a server and a client; dynamically selecting a tile size for encoding a sequence of images based on the detected maximum data rate; logically subdividing each of the sequence of images into a plurality of tiles sized according to the selected tile size, each of the tiles having a defined position within each of the sequence of images; encoding each tile within each image of the sequence of images using a first compression format or a second compression format, wherein a tile at a particular position of a first image in the sequence of images is encoded using the first compression format and the same tile within one or more subsequent images is encoded using the second compression format.
US08881211B2 Video player system with transmission device for transmitting content to content player device for content playback based consumption resource information
A video playback system, transmission apparatus, and content playback apparatus are provided that are capable of performing accurate resource prediction when playing back content via a network. A transmission apparatus generates consumption resource information in which a playback time and band information of content corresponding to the playback time are paired from management information of content to be played back, and transmits this consumption resource information to a content playback apparatus. Utilizing consumption resource information transmitted from the transmission apparatus, the content playback apparatus predicts a resource that will be consumed by the content playback apparatus, using a table held in the content playback apparatus, according to the playback time and playback mode.
US08881210B2 System and method for internet access to a personal television service
A communication system and a family of methods for remote access to personal television service are disclosed. According to this invention, a remote personal TV service center provides centralized program guide information. A user may access to the personal TV service center through a digital video recorder which is connected to the personal TV service center via telephone modem or a network server. A user may access to the personal TV service center through a remote computer terminal or a personal digital assistant which is connected to a computer network. The user selects program events and programs the digital video recorder by using a graphical user interface installed in the front panel of the digital video recorder in case of local programming, or using a similar GUI which is incorporated into the Web pages presented to remote users by a Web server in case of remote programming. The media stream stored in one digital video recorder may be transferred to another digital video recorder. For data security protection during data transfer, all communication are authenticated and encrypted.
US08881208B2 Wireless communication apparatus and control method thereof
A wireless communication apparatus and a control method thereof are provided. The wireless communication apparatus includes: a first communication unit which receives a video signal from an image device; a video processor which processes the video signal; a second communication unit establishes a wireless connection with another device; and a controller receives wireless connection information from the image device through the first communication unit, and controls the second communication unit to establish the wireless connection with the other device based on the received wireless connection information.
US08881207B2 Device and method for outputting data of a wireless terminal to an external device
An apparatus is provided. The apparatus includes a control unit to establish communication with a wireless terminal and to control reception of multimedia data wirelessly transmitted from the wireless terminal, and an output unit to display the multimedia data on an external device, whereby the multimedia data is reproduced on the external device in real time.
US08881205B2 System for controlling media presentation devices
A system that incorporates teachings of the present disclosure may include, for example, a remote controller adapted to present a graphical user interface (GUI) with a first portion for selecting one or more set-top boxes (STBs) and one or more user accounts, and with a second portion corresponding to a console comprising a plurality of selectable icons, disable access to at least a portion of the plurality of selectable icons of the console, detect a selection of one of the STBs, detect a selection of one of the user accounts, establish a communication session with the selected STB, and enable access to the plurality of selectable icons of the console to manage operations of the selected STB. Other embodiments are disclosed.
US08881202B2 Last mile data delivery systems and methods
A data delivery system leverages existing satellite infrastructure to deliver massive data sets (e.g., genomic data) to last-mile, remote or rural, locations. The system repurposes existing high-capacity satellite links normally used to broadcast entertainment content by creating customized channels specifically adapted to delivering large data sets to be stored upon computer systems.
US08881195B2 Test system for a set-top box
The present application is directed to a test system for testing set-top boxes which provide a video output to a televisión. The test system records the execution of a test script, inputs to the set-top box and video output, each separately with a time stamp. The test system has a graphical user interface for playing back the video, inputs and scripts in a synchronised fashion.
US08881192B2 Television content through supplementary media channels
A method and system implements supplementary media channels to Internet-protocol television (IPTV) channels. An IPTV user may receive a selected IPTV program on an IPTV channel. The IPTV program may be correlated in time with metadata describing the content of the IPTV program. At a point in the IPTV program, the metadata may match with user configuration information for receiving supplemental content. A supplementary media channel may be used at such point to provide the supplemental content to the IPTV user during the IPTV program. Supplemental content may include additional storyline content for the IPTV program or an advertising message, a redeemable coupon, a promotional offer, or an order invitation. The supplementary media channel may include a telephone connection with the IPTV user, an email message, a text message, or an instant message sent to the IPTV user, or a voice-over-Internet-protocol (VoIP) connection with the IPTV user.
US08881187B2 Logging network discoverable information
Systems and methods for logging network discoverable information. An indication of user-interest of particular media content may be identified. An address identification parameter that specifies a network file path of the particular media content may be identified based on the indication of user-interest. A location parameter that specifies an estimated physical location of the particular computing device within a computing network may be determined based on the address identification parameter. The address identification parameter may be stored within a network accessible media content log.
US08881184B2 Disc device
A disc device which takes out a disc stored in a magazine and conveys the disc to any disc drive, in which the magazine comprises a tray which stores a plurality of discs, and a case which has a substantially rectangular parallelepiped shape and which stores the tray. The case has an opening at front face into which the tray can be inserted into or taken out therefrom. The tray has an outer shape being substantially rectangular in planar view. The tray is provided with cut portions formed at corner portions positioned on the back side of the case being cut off. The disc device further comprises a picker which holds the tray and draws out the tray from the case. The picker rotates the tray when the cut portion passes through the opening.
US08881183B2 Disc visible type disc drive apparatus
A disc-visible type disk drive apparatus is disclosed. The disk drive apparatus includes: a main body casing having a first slot provided at a first side surface to load a disc; a protection cover having a first cover provided on the first side surface of the main body casing, wherein the first cover covers a portion of the disc exposed outside the main body casing through the first slot and forms a passage through which the disc passes during loading and unloading; a disc detecting sensor disposed in the first cover which detects the disc; and a disc loading unit disposed in the main body casing and having a loading roller which is driven so as to load the disc if the disc is detected by the disc detecting sensor.
US08881181B1 Establishing a social application layer
A virtual space may be presented within a plurality of virtual environments provided by different platforms without requiring idiosyncratic APIs associated with the virtual space for each different platform. An API adaptor module may be configured to facilitate interfacing between a single virtual space API and platform APIs associated with two or more different platforms. A space module may be configured to execute an instance of a virtual space, and to implement the instance of the virtual space to determine view information defining views of the instance of the virtual space for presentation via two or more virtual environments provided by the two or more platforms. Facilitating user interactivity with the virtual space via a given virtual environment provided by a given platform may include interfacing between the virtual space API and a platform API associated with the given platform.
US08881179B2 Cross-platform application programming interfaces for applications
Concepts and technologies are described herein for cross-platform application programming interfaces for applications. In accordance with the concepts and technologies disclosed herein, the cross-platform APIs support interoperability and extensibility with various application programs using a single language and/or set of APIs. Extensions authored for a particular application program may be used with other application programs that expose the same or a similar set of APIs, even if other object models or APIs associated with the application programs differ from one another. Thus, the APIs support cross-platform, cross-device, and cross-version compatibility of extensions.
US08881178B2 Calling of late bound functions from an external program environment
The present invention is directed toward automatically integrating a late bound program language into an external environment. The external environment may be an early bound environment, a late bound environment or some combination thereof. Associated with the late bound program environment is a modular execution engine and an interface mechanism, wherein the interface mechanism is capable of expressing late bound semantics in a format compatible with the external environment.
US08881174B2 Computing device and function module management method
A method for managing function modules using a computing device. The computing device loads the function modules according to a serial number corresponding to a filename and a directory path of each function module. The computing device obtains register commands from an interface of each function module and saves the register commands into a command library. The computing device searches for a register command in the command library when the register command is inputted by an input device connected to the computing device, and executes the searched register command of the function module.
US08881173B2 Event processing system, distribution controller, event processing method, distribution control method, and program storage medium
The number of dispatch rules set to each dispatcher is reduced in an event processing system.An event processing system includes a distribution controller 100 and a plurality of dispatchers 300. To each of the plurality of dispatchers 300, dispatching target attribute information, that is attribute information included in an event 601 that is a dispatching target for the dispatchers 300, has been assigned. The distribution controller 100 sets a dispatch rule 604 including a dispatch condition indicating one or more conditions of attribute information included in an event 601 and a destination of an event 601 that satisfies the dispatch condition to the dispatchers 300, to which the dispatching target attribute information matching any one of the conditions of attribute information included in the dispatch condition of the dispatch rule 604 has been assigned, among the plurality of dispatchers 300.
US08881171B1 Method and computer readable medium for providing checkpointing to windows application groups
A computer readable medium and method for providing checkpointing to Windows application groups. The checkpointing may be triggered asynchronously using Asynchronous Procedure Calls. The computer readable medium includes computer-executable instructions for execution by a processing system. The computer-executable instructions may be for reviewing one or more command line arguments to determine whether to start at least one of the application groups, and when determining to start the at least one of the application groups, creating a process table in a shared memory to store information about each process of the at least one of the application groups. Further, the instructions may be for registering with a kernel module to create an application group barrier, creating a named pipe for applications of the application group to register and unregister, triggering a checkpoint thread to initiate an application group checkpoint; and launching an initial application of the applications of the application group.
US08881170B2 Method for simulating screen sharing for multiple applications running concurrently on a mobile platform
A system for sharing a physical display screen among multiple applications on a mobile platform includes an Internet-connected client device and software executing on the client device from a non-transitory physical medium, the software providing a first function assigning dominancy to one of the multiple running applications, a second function mitigating application background transparency among the multiple running applications, a third function establishing a messaging mechanism and protocol between the multiple running applications, and a fourth function enabling the dominant application to intercept digital input directed toward individual ones of the multiple running applications and to dispatch the input to the appropriate application.
US08881167B2 Load balancing in network based telephony applications
Techniques are disclosed for load balancing in networks such as those networks handling telephony applications. By way of example, a method for directing requests associated with calls to servers in a system comprised of a network routing calls between a plurality of nodes wherein a node participates in a call as a caller or a receiver and wherein a load balancer sends requests associated with calls to a plurality of servers comprises the following steps. A request associated with a node belonging to a group including a plurality of nodes is received. A server is selected to receive the request. A subsequent request is received. A determination is made whether or not the subsequent request is associated with a node belonging to the group. The subsequent request is sent to the server based on determining that the subsequent request is associated with a node belonging to the group.
US08881165B2 Methods, computer systems, and physical computer storage media for managing resources of a storage server
For managing a storage server having improving overall system performance, a first input/output (I/O) request is received. A first priority level is dynamically assigned to the first I/O request, the first I/O request associated with a performance level for an application residing on a host in communication with the storage server. A second I/O request of a second priority level is throttled to allow at least a portion of a predetermined amount of resources previously designated for performing the second I/O request to be re-allocated to performing the first I/O request. The second priority level is different than the first priority level.
US08881158B2 Schedule decision device, parallel execution device, schedule decision method, and program
A schedule decision method acquires dependencies of execution sequences required for a plurality of sub tasks into which a first task has been divided; generates a plurality of sub task structure candidates that satisfy said dependencies and for which a plurality of processing devices execute said plurality of sub tasks; generates a plurality of schedule candidates by further assigning at least one second task to each of said sub task structure candidates; computes an effective degree that represents effectiveness of executions of said first task and said second task for each of said plurality of schedule candidates; and decides a schedule candidate used for the executions of said first task and said second task from said plurality of schedule candidates based on said effective degrees.
US08881154B2 Complex dependency graph with bottom-up constraint matching for batch processing
Architecture that includes a batch framework engine incorporated into the server and that supports a rich set of dependencies between tasks in a single batch job. A bottom-up approach is employed where analysis is performed if a task can run based on the parent tasks. The framework runs batch jobs without the need of a client, and provides the ability to create dependencies between tasks, which allow the execution of tasks in parallel or in sequence. Using an AND/OR relationship engine, a task can require that all parent tasks (logical AND) meet requirements to run, or that only one parent (logical OR) is required to meet its requirements in order to run. Clean-up or non-important tasks can have the a flag set where even if such tasks fail when executing, the batch job will ignore these tasks when defining the final status of the job.
US08881143B2 Optimization framework for remotely executing a maintenance operation on a virtual machine
Embodiments provide a system for executing a maintenance operation on a virtual machine (VM). The system includes a host computing device including a first VM and a second VM, a maintenance application installed within the first VM, and an optimization framework providing an interface to the maintenance application. The system also includes an optimization server coupled to the maintenance application through the optimization framework. The optimization server is configured to select a maintenance operation to execute on the second VM and command the maintenance application to execute the maintenance operation on the second VM.
US08881142B1 Determining and using probable instance lifetimes
In certain embodiments, a computer-implemented method includes accessing a request to instantiate a virtual machine from a user, accessing virtual machine lifetime data, and determining, based at least in part on the virtual machine lifetime data, a probable lifetime for the virtual machine. The virtual machine lifetime data includes actual lifetime data for a prior virtual machine that was previously instantiated. The actual lifetime data indicates an amount of time that the prior virtual machine was operational.
US08881139B1 Legacy application rehosting system
A legacy application rehosting system for operating a legacy operating system application on modern operating systems without substantially rewriting the legacy operating system application. The legacy application rehosting system generally includes transferring the source code from the legacy platform to the new platform, transferring the data from the legacy platform to an internal database of the legacy application on the new platform, execution of the legacy application on the new platform and remediating exceptions, migrating data from the internal database to a new database and deploying the system.
US08881136B2 Identifying optimal upgrade scenarios in a networked computing environment
Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested.
US08881134B2 Updating elements in data storage facility using predefined state machine over extended time period
A sequence for distributing at least one of a plurality of code packages to the at least one facility according to different states of a fixed state machine is set. The at least one of the plurality of code packages is installed in at least one staging area. The at least one of the plurality of code packages is maintained in the at least one staging area in a valid, dormant mode while the fixed state machine is stopped. Pursuant to a resumption of the fixed state machine at a subsequent time, a current code package is swapped with the at least one of the plurality of code packages in the at least one staging area to activate the at least one of the plurality of code packages.
US08881131B2 Method and apparatus for populating a software catalogue with software knowledge gathering
A method and a corresponding apparatus for inventoring software products on a plurality of computer are proposed. The inventoring system aims at populating a software catalog without the manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalog) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process which gathers information from a potentially very large collection of computers. Any occurrence of a group of identical files across multiple computers is considered a reliable indicator that they belong to the installation footprint of a product.
US08881127B2 Systems and methods to automatically generate classes from API source code
According to some embodiments, Application Programming Interface (API) source code, including command design patterns, is determined to be executed as a runtime scenario. Class may then be automatically generated as linkable building blocks in accordance with the API source code and command design patterns. For example, API command classes and associated methods may be dynamically read using reflection, and a building block class associated with each API command class may be generated. Runtime readable embedded metadata may be planted in the building block classes, at least some of the metadata being provided by the reflection. According to some embodiments, a logical sequence of the building blocks classes may be linked in accordance with the runtime scenario.
US08881123B2 Enabling symbol resolution of private symbols in legacy programs and optimizing access to the private symbols
A method for generating a binary executable of a program so that private symbols in a module are accessible from another module. In one embodiment, the method compiles a source program to an intermediate representation and scans the representation to find the private symbols in the program's modules. It then wraps a function around each private symbol. When called, the function returns an address of the private symbol, so that the other module can access the symbol from outside the module in which the symbol is found. At run time, a call is made to obtain the address of the function, which is then executed to obtain the address of the private symbol so that the symbol can be accessed. In another embodiment, a Just-In-Time compiler executes the wrapper functions and patches the executable program with the direct address of the private symbol to avoid a call to the wrapper function.
US08881122B1 Predicate matching library for complex program analysis
A matching library of a code analysis system defines a number of predicates applicable to an abstract syntax tree (AST) corresponding to program code being analyzed. The predicates represent whether or not nodes of the program code's AST have corresponding properties, such as representing a class that inherits from another given class. The code analysis system obtains an AST to analyze, a predicate expression query that includes predicates of the matching library, and action code. The code analysis system identifies nodes of the AST that match the predicate expression query by executing code of the matching library and executes the action code against the identified nodes.
US08881118B2 Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
US08881117B2 Structural analyser
A method and corresponding tool, the method comprising: generating a lower-level control flow structure representing a portion of an executable program, the lower-level control flow structure comprising a plurality of lower-level nodes representing operations occurring within the program and a plurality of directional edges representing program flow between nodes; generating a higher-level control flow structure by matching a plurality of the lower-level nodes and edges to higher-level structure nodes representing internal structure, each higher-level structure node representing a group of one or more lower-level nodes and one or more associated edges; and using the higher-level control flow structure to estimate a timing property relating to execution of the program on a processor. The higher-level structure nodes are selected exclusively from a predetermined set of structure node patterns, each pattern in the set having at most one entry point and at most one exit point.
US08881115B2 Compiling source code for debugging with expanded snapshots
Debugging source code includes: tracking, by a debugger during a debug session, duration of user examination of source code locations; providing, by the debugger to an optimizing compiler, a source code examination profile specifying source code locations examined by the user during the debug session; and receiving, by the debugger from the optimizing compiler: compiled source code for debugging, the compiled source code comprising, at each of one or more source code locations specified in the source code examination profile: a snapshot before the source code of the source code location, followed by an expanded snapshot, the expanded snapshot including computer program instructions to enable, during a debug session, examination of variable values changing during execution of the source code at the source code location; and a recording of snapshot locations and expanded snapshot locations.
US08881112B2 Quality measure tool for a composite application
A method for estimating a quality measure of a composite application is presented. The method may include receiving a set of sequence diagrams describing interactions between pairs of components in a composite application. Each sequence diagram may describe a functional use case of the composite application. Component quality metrics may also be received, such that each component quality metric corresponds to a component of the composite application. A quality estimation may be calculated for each use case of the composite application. The quality estimation may be determined as a function of one or more of the component quality metrics. A quality measure of the composite application may then be calculated as a function of the quality estimation for each use case. The quality measure of the composite application may be output.
US08881111B1 Testing user interface responsiveness for mobile applications
Embodiments are directed towards testing a responsiveness of a graphical user interface (GUI) for an application executing on a computer. During execution of each portion of a test, stimuli may be provided to the application. The stimuli may be provided to the application thread that is associated with rendering graphics for the GUI. Responses from the application to the stimuli may be monitored to determine a responsiveness of the application for at least one portion of the test. The responsiveness may be determined based on a wait time between providing a request and receiving a reply to the request, which may indicate that the application is in a state to accept input through the GUI. Responsiveness may be determined separately for each portion of the test. A displayable report may be generated to include the responsiveness of the application for each portion of the test.
US08881110B2 Role-based automation scripts
A computer performs an action called for by a script. The computer determines how to perform the action based in part on a role template not included in the script and based in part on a role-template extension included in the script.
US08881109B1 Runtime documentation of software testing
Embodiments of a system (such as a computer system), a method, and a computer-program product (e.g., software) for use with the computer system are described. These embodiments may be used to test software that includes instructions for a graphical user interface with objects that receive values in associated fields. In particular, during testing, the system identifies the objects and associated expected values in the software, tests the software based on the identified objects and the expected values, and generates a flow file which includes the testing operations and corresponding results. Moreover, during the testing, the system may generate a compliance document which includes the testing operations and the results. Additionally, the system compares differences between the flow file and a previous flow file (associated with previous testing), and presents the differences to a quality-assurance analyst who evaluates whether or not the differences are consistent with design changes between the software and a previous version of the software.
US08881106B2 Debugging parallel software using speculatively executed code sequences in a multiple core environment
Methods and apparatus relating to debugging parallel software using speculatively executed code sequences in a multiple core environment are described. In an embodiment, occurrence of a speculative code debug event is detected and a speculative code execution debug module is executed in response to occurrence of the event. Other embodiments are also disclosed and claimed.
US08881104B2 Component discovery from source code
A method for component discovery from source code may include receiving source code, and determining business classes by excluding packages and classes in the source code identified as belonging to a presentation layer, as belonging to a data access layer, as models and/or as utilities. The method may further include extracting multi-dimensional features from the business classes, estimating similarity for business class pairs based on the extracted multi-dimensional features, clustering the business classes based on the similarity and mapping functional concepts to the clusters. The clusters generated by the clustering may represent components of the source code. The method may also include determining interfaces for the components based on the clustering.
US08881103B2 Comparing component weights between builds
A computer system, program, or method may provide for quantifying changes in an individual component among a plurality of components in a software development environment where the components are incorporated in a build. This may include calculating a baseline weight of the individual component prior to a change; effecting, in the software development environment, the change to the individual component; calculating a modified weight of the individual component after the change; determining a threshold for a difference between the baseline weight and the modified weight of the individual component; calculating the difference between the baseline weight and the modified weight of the individual component; and providing on the software development computer a notification if the difference exceeds the threshold. The weights of the individual component may use data such as a count of other components required by the individual component, an install size, a runtime memory usage, a depth of a dependency tree, a component license type, a component category for memory location, a component code type, and/or other types of data.
US08881098B2 Image processing apparatus, image processing method, and non-transitory computer-readable storage medium
An image processing apparatus includes plural module creating units, plural wrapper creating units, an extracting unit, a calling unit, and an argument processing unit. The module creating units create processing modules that are obtained by instantiating different types of image processing classes by using functions. The wrapper creating units create wrappers that call the module creating units and that pass arguments specified in a pointer form to the module creating units. The extracting unit extracts, from image processing information, class names of the image processing classes corresponding to the individual processing modules and the arguments unique to the image processing classes. The calling unit converts the extracted class names and calls the wrapper creating units to which the converted class names are given. The argument processing unit stores the extracted arguments in an array, specifies an initial address of the array, and passes the initial address to the created wrappers.
US08881096B2 Computer product, IP model generating apparatus, and IP model generating method
A computer-readable recording medium stores therein an IP model that combines source code of IPs that include an interface representing input/output of data; a register storing the data; a behavior executing processing based on the data; and a state performing wait processing according to time information from the interface and a connection code indicative of a connecting relation between the IPs.
US08881094B2 Container-based architecture for simulation of entities in a time domain
The present invention relates generally to a software architecture for simulation of physical entities. The invention provides an object-oriented container-based framework architecture for simulator implementations, methods, and objects in a time domain on a distributed computer network and in field deployed units. The invention further provides an interface system and a plug-in definition which allows compartmentalization of participants in the container and easy extensibility of the system. A hierarchy of life-cycle containers having contained objects is disclosed. An object graph description is used by an assembly engine to construct an executable object graph including the hierarchy of life-cycle containers. Life-cycle containers can be implemented as LRU portable containers for field deployed units.
US08881090B2 Method for fabrication of an integrated circuit in a technology reduced with respect to a native technology, and corresponding integrated circuit
The technological fabrication of the integrated circuit includes a fabrication of the integrated circuit in a reduced technological version of a native technology including at least a first dimensional compensation applied to the reduced channel length and to the reduced channel width of each transistor originating from a transistor, referred to as a “minimum transistor”, designed in the native technology and having in this native technology an initial channel length equal to a minimum length for the native technology and an initial channel width equal to a minimum width for the native technology. The fabrication obtains a transistor having a channel length equal, to a given precision, to the initial channel length and a channel width equal, to a given precision, to the initial channel width.
US08881089B1 Physical synthesis optimization with fast metric check
A system, process, etc. according to some embodiments, which includes operations that include selecting one of a plurality of solutions (“selected solution”) for optimization of an integrated circuit design during physical synthesis. The operations can further include performing on the selected solution a fast evaluation of a specific metric without updating design documents (e.g., without updating a netlist or metric map). If the evaluation of the specific metric is non-satisfactory, then the candidate solution is rejected. If the evaluation of the specific metric is satisfactory, then a design document is updated and a full evaluation of the specific metric (and other metrics) can be performed.
US08881082B2 FEC decoder dynamic power optimization
A computing device is configured to analyze a logic gate design having logic gates. The computing device is configured further to identify logic gates that are affected by toggling activity associated with an input of one or more of the logic gates. The computing device is configured further to replace, within the logic gate design, the identified logic gates with different logic gates that are not affected by the toggling activity; and output a new logic gate design based on replacing the identified logic gates with the different logic gates, the application specific integrated circuit, with the new logic gate design, producing a same output as the application specific integrated circuit with the logic gate design, based on same inputs.
US08881075B2 Method for measuring assertion density in a system of verifying integrated circuit design
An assertion-based verification tool for circuit designs includes an effective measurement of assertion density for any given generated set of assertions. A register-transfer level (RTL) description of an integrated circuit (IC) is used to compute a set of predicates. Then, determination is made as to the number of predicates that are satisfiable on the given set of assertions received respective of the RTL description. Thereafter, simulation traces for the RTL are received and the number of predicates satisfiable on the simulation traces is computed. A figure of merit of assertion density is determined from the ratio of the respective numbers of predicates. The set of assertions may be modified as required to satisfy a predetermined threshold value of assertion density, to assure that a circuit is rigorously tested by the verification tool.
US08881071B2 Photolithography mask design simplification
A photolithography mask design is simplified. In one example, a target mask design is optimized for a photolithography mask. Medial axes of the design and assist features on the optimized mask are identified. These are simplified to lines. Lines that are distant from a respective design feature are pruned. The remaining lines are simplified and then thickened to form assist features.
US08881070B1 Optical proximity correction based on edge fragment correlation
Aspects of the invention relate to techniques for applying edge fragment correlation information to optical proximity correction. Conventional edge adjustment values for the edge fragments are first derived from edge placement error values. Neighbor-aware edge adjustment values for the edge fragments are then computed based on the edge placement error values, the conventional edge adjustment values and edge fragment correlation information. The computation comprises: calculating pseudo edge placement error values by subtracting neighboring edge movement contribution values from the edge placement error values and calculating the neighbor-aware edge adjustment values based on the pseudo edge placement error values. The computed neighbor-aware edge adjustment values are combined with conventional edge adjustment values and the edge fragments are adjusted accordingly. The process may be repeated for a number of times.
US08881067B2 Method and apparatus for monitoring cross-sectional shape of a pattern formed on a semiconductor device
To enable SEM-based management of a cross-sectional shape or manufacturing process parameters of a semiconductor device pattern to be measured, the association between the shape or parameters and SEM image characteristic quantities effective for estimating the shape or parameters is saved as learning data. The image characteristic quantities are collated with learning data to estimate the shape or to monitor the process parameters. Accuracy and reliability is achievable by calculating three kinds of reliability (reliability of the image characteristic quantities, reliability of estimation engines, and reliability of estimating results) based on the distribution of the image characteristic quantities and then judging whether additional learning is necessary, or selecting and adjusting image characteristic quantities and estimation engine based on the reliability.
US08881065B2 Presentation mode/full-screen mode interrupting action prevention
A method and program for preventing an interrupting action in a computer resource for a full-screen mode or presentation mode of a user application are disclosed. Such a method includes: detecting, for example by a window manager, that a user application is entering into full-screen mode in a display space of the computer resource; transmitting to a target module, for example via a message bus, a mode message indicating that the full-screen mode is being entered; and preventing the interrupting action by the target module. The interrupting action may be a display action in a display space associated with the computer resource. The target module may be an instant messaging application, a screen saver application, a calendar application, a power management application, or a voice communication application.
US08881062B2 Mobile terminal and controlling method thereof
A mobile terminal including a wireless communication unit configured to wirelessly communicate with at least one other terminal; a display unit including a touchscreen; a memory configured to store a specific application, an application icon for executing the specific application, and a first widget application displaying a partial executed function of the specific application; and a controller configured to when receiving a first touch gesture on the application icon, execute the specific application, and when receiving a second touch gesture on the application icon that is different than the first touch gesture, control the display unit to display the first widget application on the touchscreen.
US08881061B2 Device, method, and graphical user interface for managing folders
A multifunction device displays a plurality of selectable user interface objects on the display. In response to detecting the first input, the device moves a first object in the plurality of selectable user interface objects across the display to a location on the display that is proximate to a second object in the plurality of selectable user interface objects. In response to detecting that the first input meets predefined folder-creation criteria while the first object is proximate to the second object, the device creates a folder that contains the first object and the second object.
US08881060B2 Device, method, and graphical user interface for managing folders
A multifunction device displays a plurality of selectable user interface objects on the display. In response to detecting the first input, the device moves a first object in the plurality of selectable user interface objects across the display to a location on the display that is proximate to a second object in the plurality of selectable user interface objects. In response to detecting that the first input meets predefined folder-creation criteria while the first object is proximate to the second object, the device creates a folder that contains the first object and the second object.
US08881058B2 System and method for displaying objects in a user interface based on a visual acuity of a viewer
A system, a computer readable storage medium including programs, and a computer-implemented method for displaying objects in a graphical user interface of a device are described. A vision test is presented in the graphical user interface of the device, the vision test including vision test objects used to test a visual acuity level of a user of the device. Input is received from the user identifying the user's ability to see at least one vision test object in the vision test. Display settings corresponding to the input received from the user are identified. Objects in the graphical user interface are displayed based on the display settings.
US08881055B1 HTML pop-up control
A computer-implemented method includes setting minimum boundaries for a pop-up window based on content, displaying the content in the pop-up window, receiving an input to change a layout of the content, calculating new minimum boundaries for the pop-up window based on the layout change, resizing the pop-up window using the new minimum boundaries and displaying the content in the resized pop-up window.
US08881053B2 Modal launching
Embodiments are described for handling display of modal windows in a multi-screen device. In embodiments, a modal window will be launched and displayed in a display which receives the input that resulted in the display of the modal window. The other portions of a first display or second display, not displaying the modal window, are made inactive. In other embodiments, the modal window occupies only a first display and the second display remains active.
US08881048B2 System and method for providing three-dimensional graphical user interface
Methods and systems are provided for providing an improved three-dimensional graphical user interface. In one embodiment, the method generally comprises: receiving an input from an end user, and capturing computing output from at least one computer source in response to the received end-user input. The computing output can be presented as two or more objects within a three-dimensional virtual space displayed to the end user. In one embodiment, the method further comprises generating a timeline that includes an icon for each object presented within the virtual space. In another embodiment, the method further comprises providing a database for storing and categorizing data regarding each object presented within the virtual space.
US08881045B2 Method and apparatus for generating prompt information of a mobile terminal
A method and apparatus for generating prompt information of a mobile terminal are disclosed. The method includes: selecting a start point and an end point in a multimedia file; clipping a part of the multimedia file between the start point and the end point in the multimedia file; and encoding the clipped part of the multimedia file, and generating prompt information of the mobile terminal. An apparatuses for generating prompt information of a mobile terminal is also disclosed. Therefore, the present invention enables a user to control the generation of prompt information of a mobile terminal.
US08881041B2 Method and apparatus for providing UI animation
A method and apparatus for translating between an object displayed in a first mode of a user interface (UI) and a second mode of the UI. The method includes determining a current UI mode from among UI modes, which include a physics animation mode and a non-physics animation mode, and determining an animation type of the current UI mode; extracting current UI information, associated with the animation type of the current UI mode, of a UI object; translating the current UI information of the UI object to translation UI information of the UI object associated with the animation type of another UI mode among the UI modes; and storing the translation UI information.
US08881040B2 System and method for detecting, collecting, analyzing, and communicating event-related information
A system and method involves detecting operational social disruptive events on a global scale, assigning disease event staging and warnings to express data in more simplistic terms, modeling data in conjunction with linguistics analysis to establish responsive actions, generating visualization and modeling capabilities for communicating information, and modeling disease propagation for containment and forecasting purposes.
US08881035B2 Rendering dynamic contents with static file based graphical user interface form control
The invention provides a method for rendering dynamic web contents with static file based graphical user interface (GUI) form control The method includes the steps of trapping an event which requires to draw or redraw an image in a file based GUI image control in a current local environment; initiating a WebCrawler function with parameters derived from the current local environment to retrieve data from the web; generating a locally accessible file with web content in a format interpretable by the file based GUI image control; and having the file based GUI image control render the web content contained in the locally accessible file.
US08881033B2 Systems and methods for adaptive content distribution
An application displaying primary content, such as a webpage, may include unused space. The unused space may exist within the application displaying the primary content (e.g., within the browser window) or on other portions of the display (e.g., outside of the browser window). The unused space is identified and leveraged to display secondary content on the client display along with the primary content. The secondary content may be adaptable to conform to different sizes and/or configurations of the unused space. The secondary content may be updated as the user interacts with elements on the client display.
US08881030B2 System and method for enhancing socialization in virtual worlds
There is provided a system and method for inducing a reply from a first client connected to a virtual world to facilitate a social interaction using a second client connected to the virtual world. There is provided a method for inducing a reply from a first client connected to a virtual world to facilitate a social interaction using a second client connected to the virtual world, the method comprising locating, in the virtual world, an avatar of the second client in a proximity of an avatar of the first client, executing a social action using the avatar of the second client such that the social action is observable by the first client but not observable by the second client, receiving the reply from the first client in response to the social action, and rendering the reply from first client using the avatar of the first client.
US08881026B2 Human-to-human collaborative session request queue processing
Embodiments of the present invention address deficiencies of the art in respect to queued requests to establish human-to-human collaborative sessions and provide a novel and non-obvious method, system and computer program product for managing queued requests to establish human-to-human collaborative sessions. In one embodiment, a human-to-human collaborative data processing system can be provided which can include a messenger configured for coupling to other messengers. The system further can include a queue of incoming session requests to establish respective human-to-human collaborative sessions with requesters associated with the other messengers. Finally, the system can include queue management logic enabled to order the session requests in the queue according to queue rules coupled to the queue management logic.
US08881025B2 Systems, apparatus, methods and computer-readable storage media facilitating heterogeneous messaging for a communication device
Apparatus, methods and computer-readable storage media for threading calls and messages are provided. A method can include: receiving messaging content; and displaying the messaging content in a single thread, wherein the messaging content is threaded and a thread of the messaging content comprises at least one text message and at least one call. The method can further include threading the messaging content, wherein the threading comprises ordering the messaging content based, at least, on a time at which received ones of the messaging content are received at a communication device. In various embodiments, the messaging content can include one or more of voice information, MMS or SMS text messages, voicemail information, system messages, email messages, instant messages, pictorial information, video information or audio information, data traffic information, user-opted notifications, traffic reports, news alerts, weather information, stock reports, social networking chats, social networking posts or social networking status updates.
US08881023B2 Methods and apparatus for synchronizing virtual and physical mouse pointers on remote KVM systems
A method and system is disclosed for synchronizing the virtual and physical mouse cursors of a local computer and a remotely controlled computer. Video signals generated by a host computer are transmitted to a client computer in order to allow the user of a client computer to have a virtual presence on the host computer. However, the signals transmitted by the host computer may contain errors that can cause a physical mouse to lose synchronization with a virtual mouse. Therefore this virtual presence architecture uses USB protocol and human interface descriptors that support the movement of a mouse to an absolute position in order to synchronize a virtual mouse cursor with a physical mouse cursor.
US08881022B2 Method and system for binding graphical interfaces to textual code
In an embodiment, a method of binding a human machine interface to an expression of existing computer code may include analyzing the existing computer code to identify one or more bindable expressions in the existing computer code, and receiving a command to bind a human machine interface with one or more of the identified bindable expressions. The method may further include binding, using a processor, one or more of the bindable expressions with the human machine interface in response to the command. The binding may enable the human machine interface to communicate information within the existing computer code in place of the one or more bound expressions. The bound machine interface may communicate information within the computer code while the computer code is executing.
US08881020B2 Multi-modal communication through modal-specific interfaces
Technologies are described herein for providing multi-modal communication through modal-specific interfaces. In one method, a communication in a first modality is received from a first interface across a computer network. The communication is converted into a second modality. Upon converting the communication into the second modality, the communication is provided to a second interface across the computer network.
US08881018B2 Method and system for remediating nonfunctional website content
A method and system for website content remediation are provided. The website content remediation computer system includes a memory device and a processor in communication with the memory device. The website content remediation computer system is programmed to determine items of nonfunctional content within a website, display a plurality of nonfunctional content types of the determined items to a user on a graphical user interface, and receive from the user a selection input of one of the displayed nonfunctional content types. The computer system is further programmed to display a report of items of nonfunctional content of the selected nonfunctional content types, receive from the user a selection input of one of the items, and receive from the user an action command that remediates the selected item.
US08881014B2 Web based sales presentation method and system with synchronized display
Systems and methods for facilitating web based sales presentations with synchronized display are provided According to one embodiment, a method comprises receiving a request from a sales representative to have an invitation sent to a customer to remotely view a presentation; sending a communication to the customer inviting the customer to view the presentation; storing the presentation at a storage unit associated with a server system; displaying at a first separate computer system of the sales representative, navigational links for selecting a slide of the presentation; in response to the customer selecting a URL included in the communication to the customer, displaying, at a second separate computer system of the customer, the presentation; and synchronizing a display of the presentation at the first separate computer system of the sales representative and the display of the presentation at the second separate computer system of the customer.
US08881009B2 Synthetic audiovisual description scheme, method and system for MPEG-7
A method and system for description of synthetic audiovisual content makes it easier for humans, software components or devices to identify, manage, categorize, search, browse and retrieve such content. For instance, a user may wish to search for specific synthetic audiovisual objects in digital libraries, Internet web sites or broadcast media; such a search is enabled by the invention. Key characteristics of synthetic audiovisual content itself such as the underlying 2d or 3d models and parameters for animation of these models are used to describe it. More precisely, to represent features of synthetic audiovisual content, depending on the description scheme to be used, a number of descriptors are selected and assigned values. The description scheme instantiated with descriptor values is used to generate the description, which is then stored for actual use during query/search. Typically, a user, to search for a needed synthetic audiovisual content initiates a query that is passed on to a search engine that then retrieves the candidate content from one or more databases whose description closely matches the query criteria specified by the user.
US08881004B2 Use of multiple data sources for spell check function, and associated handheld electronic device
An improved spell check function and handheld electronic device provide a spell checking feature that is available in a plurality of data entry fields of a plurality of applications. A memory on the handheld electronic device has a plurality of linguistic data sources which are searched for linguistic data during a spell check operation. Generic linguistic data is stored in a static data source, and other linguistic data is stored in a dynamic data source. An identification of a misspelled text entry results in an editing session being automatically opened on the misspelled text entry. Proposed spell check interpretations of a text entry are output in a list, and an actuation of a key further results in the outputting of a menu of selectable spell check options. At least some of the selectable spell check options are selectable either with a track ball or with a key of a keypad.
US08881003B1 Online storage aggregation and publishing
A storage farm is maintained, on which user generated publishable content is stored. Users can copy generated content to the storage farm for automatic publishing to associated target sites. User login information for the plurality of publication sites is maintained, such that the system can use the login information to login to the various publication sites as a given user. The publishable content stored in the storage farm is compared to publishable content published on the associated publication sites. Responsive to finding publishable content on at least one publication site that is not present on the storage farm, that publishable content can be aggregated to the storage farm for future access by the associated user. Responsive to finding publishable content on the storage farm not published on an associated publication site, that publishable content can be automatically published.
US08881002B2 Trial based multi-column balancing
A trial based layout builder generates multiple trial multi-column layouts for content until a multi-column layout that satisfies particular criteria for multi-column balancing is generated. Multiple trial multi-column layouts can be generated in parallel based on different boundaries until a layout that does satisfy the criteria is identified. Different elements of the content laid out in different trial multi-column layouts can be reused in subsequently generated trial multi-column layouts. The content can also optionally be separated into multiple different portions at various break points, and trial multi-column layouts for the different portions can be generated in parallel. Additionally, if a trial multi-column layout for one of the portions that satisfies the particular criteria is identified, the content in that portion can be displayed while continuing to attempt to identify a layout for the content of the other portion that satisfies the one or more criteria.
US08881000B1 System and method for informing users of an action to be performed by a web component
A system and method is disclosed for informing a user of an action to be performed by a web component in a domain of a primary website. A web component is provided to a web browser for display in connection with a website. The web component includes code that is executed in a different web domain than the website. On receiving an indication that a user has moved a cursor over the web component, the web component generates an alert informing the user of the action to be performed by the web component before the user activates the web component.
US08880994B1 System and method for annotating and manipulating electronic documents
A method, system, and computer program product allow a user to annotate and manipulate a plurality of electronic documents. The user loads a first electronic document comprising electronic content, which content may be annotated or otherwise manipulated by the user and which annotations are made using a user-defined indication means. The annotated content is outputted to a second electronic document, wherein the content is automatically organized into a corresponding grouping defined by a user-selected identifying aspect. The user may subsequently reorganize any of the outputted annotations within the second electronic document. The method, system, and computer program product further utilize a file browser within which a plurality of electronic documents may be organized and maintained by the user and a client-server protocol for communicating data between a remote database and a local storage medium.
US08880990B2 Information processing device, information processing method, information processing program, and recording medium on which information processing program is recorded
An information processing device that acquires data constituting a Web page that is to be provided to a terminal device via a network and is designed for displaying predetermined content information. The information processing device then acquires a script that is programmed to allow reference to correspondence information associating candidate content information that is set beforehand as a candidate for content information to be displayed on the Web page, with variation information specifying variations of at least the display form of an object to be displayed on the Web page. The information processing device incorporates the script into the page data in an executable manner. In response to a request from the terminal device, the information processing device transmits the page data having the script incorporated thereinto, to the terminal device.
US08880987B2 Checksum using sums of permutation sub-matrices
A method for encoding data bits includes computing checksum parity bits based on the data bits. A set of equations satisfied by the data bits and the checksum parity bits corresponds to a dense parity-check matrix. The dense parity-check matrix comprises sums of permutation sub-matrices.
US08880986B2 Systems and methods for improved data detection processing
The present invention is related to systems and methods for enhancing data detection in a data processing system. In one embodiment, a data processing system is disclosed that includes a data detector circuit that is governed at least in part based upon selected coefficients. The selected coefficients are selected as either a first set of coefficients or a second set of coefficients where the second set of coefficients has fewer coefficients than the first set of coefficients.
US08880985B2 High-speed long codeword QC-LDPC soft decision decoder
A Quasi-Cyclic, LDPC, large girth, soft-decision decoder and accompanying methods.
US08880984B2 Digital broadcasting receiver and method for controlling the same
According to one embodiment, a method of processing broadcast data in a broadcast transmitter includes: encoding the broadcast data for broadcast service; encoding signaling information for signaling the broadcast data; assigning the encoded broadcast data and the encoded signaling information into a signal frame; and transmitting a broadcast signal including the signal frame. The broadcast signal further includes a signaling table having access information of the broadcast data. The signaling table includes service id information for identifying the broadcast service and component information for indicating a number of components in the broadcast service.
US08880981B2 Identifying lost write errors in a raid array
A data access request is received specifying a data block stored in a stripe of a parity group that includes a plurality of data storage devices to store data blocks and a parity storage device to store parity information for the data. The stripe includes a data block from each of the plurality of data storage devices and the stripe includes a parity block from the parity storage device. An error is detected in the data block specified by the data access request. The error is identified as a lost write error for the data block or a lost write error for the parity block. Identifying the error includes comparing a first storage device signature stored in a metadata field associated with the data block to a second storage device signature stored in a label block identifying a data storage device where the data block is stored.
US08880975B2 Method and device for information block coding and synchronization detecting
A method and a device for information block coding and synchronization detecting are provided. Information block coding and synchronization detecting may be performed according to a synchronization character sequence satisfying certain conditions. Thus, the probability of incorrect synchronization may be effectively reduced without increasing the complexity. Optimal synchronization character sequences in different lengths are provided to further reduce the probability of incorrect synchronization.
US08880973B1 Detector-decoder interface for GF(q) iterative decoding
Systems and methods are provided for GF(q) iterative decoding. A decoder computes a plurality of R messages corresponding to a variable node of the decoder and forms decoder extrinsic information for the variable node by combining the plurality of R messages. The decoder stores the decoder extrinsic information in a memory during a first time period and retrieves the decoder extrinsic information from the memory during a second time period, the second time period occurring after the first time period. The decoder extrinsic information is provided to a soft detector.
US08880967B2 Semiconductor test system and method
A test controller applies test stimulus signals to the input pads of plural die on a wafer in parallel. The test controller also applies encoded test response signals to the output pads of the plural die in parallel. The encoded test response signals are decoded on the die and compared to core test response signals produced from applying the test stimulus signals to core circuits on the die. The comparison produces pass/fail signals that are loaded in to scan cells of an IEEE 1149.1 scan path. The pass/fail signals then may be scanned out of the die to determine the results of the test.
US08880966B2 Transitioning POLL IN to set MRST and CE high states
An optimized JTAG interface is used to access JTAG Tap Domains within an integrated circuit. The interface requires fewer pins than the conventional JTAG interface and is thus more applicable than conventional JTAG interfaces on an integrated circuit where the availability of pins is limited. The interface may be used for a variety of serial communication operations such as, but not limited to, serial communication related integrated circuit test, emulation, debug, and/or trace operations.
US08880965B2 Low power scan flip-flop cell
A low power scan flip-flop cell includes a multiplexer, a master latch, a scan slave latch and a data slave latch. The master latch is connected to the multiplexer, and used for generating a first latch signal. The scan slave latch is connected to the master latch, and generates a scan output (SO) signal. The data slave latch is connected to the master latch, and generates a Q output depending on a scan enable (SE) input signal and the first latch signal. The Q output is maintained at a predetermined level during scan mode, which eliminates unnecessary switching of combinational logic connected to the scan flip-flop cell and thus reduces power consumption.
US08880964B2 Block and page level bad bit line and bits screening methods for program algorithm
A programming process evaluates NAND strings of a block to detect a defective NAND string, e.g., a NAND string with a defective storage element. Status bits can be stored which identify the defective NAND string. Original data which is to be written in the NAND string is modified so that programming of the defective NAND string does not occur. For example, a bit of write data which requires a storage element in the defective NAND string to be programmed to a higher data state is modified (e.g., flipped) so that no programming of the storage element is required. Subsequently, when a read operation is performed, the flipped bits are flipped back to their original value, such as by using error correction code decoding. In an erase process, a count of defective NAND strings is made and used to adjust a pass condition of a verify test.
US08880962B2 Maintenance planning and failure prediction from data observed within a time window
A system, method and computer program product for predicting a failure of equipment from prior maintenance data of the equipment collected during a time duration estimate a number of preceding failures of the equipment prior to the time duration. The system, method and computer program product construct a model, based on the prior maintenance data, of an impact of an external intervention on a failure of the equipment. The system, method and computer program product construct a model, based on the constructed model of the impact of the external intervention and the estimated number of preceding failures, a replacement policy of the equipment and a probability of a subsequent failure of the equipment in a subsequent time period.
US08880957B2 Facilitating processing in a communications environment using stop signaling
Processing, such as debug and/or recovery processing, within a communications environment is facilitated. Responsive to detecting an event, a stop signal is propagated through a communications network of the communications environment, and each network element that receives the stop signal, transmits the signal to its neighbors (if any), and then performs an action depending on its specific programming. The action can be to take no action, perform a debugging action or perform a recovery action. The elements that receive the signal and perform the same action as other elements form a coordinated network providing a coordinated result.
US08880952B1 Generic and extensible provider debug interface
Described are techniques for debugging code of a provider using a debug interface. The provider includes a first software layer providing common services and a second software layer including code modules each providing a set of customized services. The debug interface includes a first function interface for a first function having first code included in the first software layer and including a second function interface for a second function having second code included in the first software layer which provides for runtime transfer of control to code included in said second software layer. The first function is invoked to issue debug commands to debug code in the first software layer. The second function is invoked to issue debug commands to debug code in the second software layer. A client sends debug commands in accordance with the debug interface to a server including the provider.
US08880945B2 Customer premises equipment diagnostic, recovery, and reporting systems and methods
Exemplary customer premises equipment (“CPE”) diagnostic, recovery, and reporting systems and methods are disclosed herein. An exemplary method includes a technical support server subsystem aggregating, over time, technical support data representing technical issues of CPE devices and operations performed to resolve the technical issues, identifying a subset of the technical support data, and providing the identified subset of the technical support data to a CPE device for local storage by the CPE device, locally stored technical support data configured to be used by the CPE device to self-recover from a future technical issue associated with the CPE device. In certain embodiments, the CPE device may be configured to function as a media server device and/or as an intermediary technical support device at a customer premises. Corresponding methods and systems are also disclosed.
US08880944B2 Restarting event and alert analysis after a shutdown in a distributed processing system
Restarting event and alert analysis after a shutdown in a distributed processing system includes identifying a shutdown condition of the distributed processing system; determining whether the shutdown was a planned shutdown or an unplanned shutdown; if the shutdown was planned, storing an identification of the last event in an event log that was injected in an event queue at the time of the planned shutdown and restarting event and alert analysis using the next event identified in the event log; and if the shutdown was unplanned, for each event analyzer, identifying the last event included in the last event pool that the event analyzer closed; and restarting event and alert analysis at the event analyzer using the next event received by the event analyzer after the identified last event.
US08880942B2 Electronic device and method of ensuring guaranteed services
A method for ensuring guaranteed services for real-time traffic on an interconnect with errors is provided. The real-time traffic comprises a first and second traffic class (HRT, SRT). Real-time traffic of the first and/or second traffic class (HRT, SRT) is transmitted from a transmitter to a receiver. It is detected by the receiver whether an error has occurred during the transmission of the real-time traffic and the error is reported to the transmitter. At least part of the real-time traffic of the second traffic class (SRT) is re-transmitted by the transmitter if the transmitter has received an error report from the receiver within a predetermined time period.
US08880940B2 Pessimistic data reading in a dispersed storage network
A method begins by a processing module receiving a data retrieval request and determining a read threshold number of dispersed storage (DS). The method continues with the processing module sending read request messages to DS units and receiving encoded data slices to produce received encoded data slices. The method continues with the processing module determining an incremental number of encoded data slices based on the number of received encoded data slices, determining an incremental number of DS units, and sending a read request message to each of the incremental number of DS units when the number of received encoded data slices compares unfavorably to a decode threshold number. The method continues with the processing module dispersed storage error decoding the received encoded data slices to produce data when the number of received encoded data slices compares favorably to the decode threshold number of encoded data slices.
US08880939B2 Storage subsystem and method for recovering data in storage subsystem
When a double failure occurs in a storage device storing a mutual conversion table such as a track management information table in thin provisioning, the storage address of the track within the storage subsystem cannot be specified and user data is lost. In order to solve the problem, the present invention provides a storage subsystem capable of recovering data by referring to a track address stored in an accessible track management information table or a user data section, renewing the damaged track management information table to restore the corresponding relationship between track management information tables, and enabling the user data to be accessed again.
US08880935B2 Redundancy and load balancing in remote direct memory access communications
A system for managing communications to add a first Remote Direct Memory Access (RDMA) link between a TCP server and a TCP client, where the first RDMA link references first remote memory buffer (RMB) and a second RMB, and further based on a first remote direct memory access network interface card (RNIC) associated with the TCP server and a second RNIC associated with the TCP client. The system determines whether a third RNIC is enabled. The system adds a second RDMA link, responsive to a determination that the third RNIC is enabled. The system detects a failure in a failed RDMA link. The system reconfigures the first RDMA link to carry at least one TCP message of a connection formerly assigned to the failed RDMA link, responsive to detecting the failure. The system communicates at least one message of the at least one connection on the first RDMA link.
US08880933B2 Learning signatures for application problems using trace data
The problem signature extraction technique extracts problem signatures from trace data collected from an application. The technique condenses the manifestation of a network, software or hardware problem into a compact signature, which could then be used to identify instances of the same problem in other trace data. For a network configuration, the technique uses as input a network-level packet trace of an application's communication and extracts from it a set of features. During the training phase, each application run is manually labeled as GOOD or BAD, depending on whether the run was successful or not. The technique then employs a learning technique to build a classification tree not only to distinguish between GOOD and BAD runs but to also sub-classify the BAD runs into different classes of failures. Once a classification tree has been learned, problem signatures are extracted by walking the tree, from the root to each leaf.
US08880932B2 System and method for signaling dynamic reconfiguration events in a middleware machine environment
A system and method can provide fault tolerance in a middleware machine environment. A subnet manager can determine whether there is a path record change when a fault occurs in the middleware machine environment. Furthermore, the subnet manager can signal a dynamic reconfiguration event to at least one host in the middleware machine environment. The at least one host can send a message to the subnet manager to query for a latest path record. Then, the subnet manager can provide a latest path record to the at least one host.
US08880926B2 Counter/gating producing technology specific function outputs from TCK and TMS(C)
Control events may be signaled to a target system having a plurality of components coupled to a scan path by using the clock and data signals of the scan path. While the clock signal is held a high logic level, two or more edge transitions are detected on the data signal. The number of edge transitions on the data signal is counted while the clock signal is held at the high logic state. A control event is determined based on the counted number of edge transitions on the data signal after the clock signal transitions to the low logic state.
US08880921B2 Communication device and communication system
According to an embodiment, a communication device includes a wake-up signal reception unit configured to receive a wake-up signal to request a change of a state from a second state to a first state, the second state requiring less power consumption than the first state; and a state control unit configured to change the state from the second state to the first state and inform a control unit of the change of the state when the wake-up signal is received, the control unit being configured to process a frame received during the first state.
US08880920B2 Systems, methods and devices for limiting current consumption by a different ramp rate upon power-up
Embodiments are described including those for controlling peak current consumption of a multi-chip memory package during power-up. In one embodiment, each memory device of the multi-chip package includes a power level detector used to compare an internal voltage signal to a threshold. A current limiter controls the ramping rate of the internal voltage signal in response to the power level detector as the internal voltage signal ramps up towards the threshold.
US08880916B2 Circuits and methods for controlling battery management systems
A controller for a battery management system includes a first terminal, a second terminal, and communication circuitry. The first terminal receives power from a battery in the battery management system. The second terminal receives a clock signal. The communication circuitry coupled to the first and second terminals detects the clock signal, and generates a first switching signal according to a result of detecting the clock signal to control the battery management system to switch from operating in a ship mode to operating in a non-ship mode according to the first switching signal. The detecting and generating are performed with the battery management system in the ship mode. The battery management system disables controlling of charging and discharging of the battery in the ship mode, and the battery management system enables controlling of charging and discharging of the battery in the non-ship mode.
US08880914B2 Information processing apparatus and judging method
According to one embodiment, an information processing apparatus includes a processor, a non-volatile storage unit, a receiving unit, a judging unit, and a transmitting unit. The receiving unit receives from the processor an inquiry about accessibility of the storage unit. The judging unit judges, upon receipt of the inquiry, whether the storage unit is accessible on the basis of a start-up time period between starting power supply to the storage unit and activation of the storage unit. The transmitting unit transmits a judgment result obtained by the judging unit to the processor.
US08880911B2 Power supply apparatus
The power supply includes an output unit that converts a DC voltage and outputs the DC voltage; a capacitor that stabilizes the DC voltage output from the output unit, the power supply being able to be operated in a power saving mode in which a power consumption is reduced by stopping a whole or part of an operation of a load operated by the DC voltage output from the output unit; a detection unit that detects that a power is cut off; a discharging load that discharges the capacitor; and a control unit that performs control so as to operate the charging load when the detection unit detects that the power is cut off during the operation in the power saving mode.
US08880895B2 Methods, systems, and computer program products for recovering a password using user-selected third party authorization
A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party.
US08880892B2 Secured embedded data encryption systems
Devices generate security vectors based on their own attributes. A device's security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets using its own transformation matrix, and transmits those packets. A receiving device uses its copy of the transmitting device's transformation matrix to decrypt the data in a packet, determining whether a MAC extracted from that packet matches the transmitting device's MAC. The receiving device can permit or prevent further processing of the packet's data depending on whether the MACs match. Each device can store a copy of a same program that can be used to derive derivative security vectors from existing security vectors. Each device in the network can derive the same set of derivative vectors for any selected other device in the network, thereby “evolving” the transformation matrices.
US08880889B1 Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI)
The invention relates to systems and methods for secure, remote, wireless submission of financial transactions. Authentication and authorization functionality are provided through use of proof of possession tests, a token service that provides a user device with a token that includes user entitlement data, and high assurance digital certificates.
US08880888B2 Privacy-enhanced E-passport authentication protocol
A passport authentication protocol provides for encryption of sensitive data such as biometric data and transfer of the encryption key from the passport to the authentication authority to permit comparison to a reference value.
US08880885B2 Mutual authentication schemes
Implementations of the present disclosure are directed to web-based authentication. Implementations include receiving user credentials at a browser, transmitting a first request to an application, the first request including a first user credential, receiving a first response, the first response including an encrypted server public key (SPK) and a user-specific salt value, decrypting the encrypted SPK to provide a SPK, the encrypted SPK being decrypted based on the user-specific salt value and a second user credential, determining a browser public key (BPK) and a client-side session signing key (SSK), encrypting the BPK to provide an encrypted BPK, transmitting a second request to the application, the second request including the encrypted BPK and a request signature, the request signature having been provided based on the client-side SSK, and receiving a second response, the second response including a response signature and indicating that a user has been authenticated by the application.
US08880881B2 Secure communications between devices
A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes generating a first self-signed key at the first mobile computing device, pairing the first device with a second device, the pairing including receiving user input of a passcode and after receiving the user input sending the first public key to the second mobile computing device and receiving a second public key from the second mobile computing device, storing the second public key in a database of trusted devices, the database of trusted devices being stored in the first mobile computing device, receiving in the first mobile computing device a list of mobile computing devices connected to a mobile network, matching the list of mobile computing device against the database of trusted devices, and establishing secure communication between the first mobile computing device and the second mobile computing device.
US08880880B2 Facilitating access control in peer-to-peer overlay networks
Methods and apparatuses are provided for facilitating access controls for digital objects stored within a peer-to-peer overlay network. A privacy-preserving method is provided for matching identities between a first peer node and a second peer node in a peer-to-peer network. Such identity matching may be used, for example, to ascertain whether the first peer node should provide access to certain digital object stored in the peer-to-peer overlay network. Rather than providing its identities in an unprotected format, the second peer may provide its identities to the first peer node in a concealed representation so as to prevent the first peer from learning about non-matching identities. Such concealed representation may be a data structure that cryptographically conceals one or more identities of the second peer node or a user of the second peer node within a shared data space of the data structure.
US08880879B2 Accelerated cryptography with an encryption attribute
Methods and systems for encrypting and decrypting are presented. In one embodiment, the method comprises encrypting one or more segments of a data with a key. The data is associated with at least one encryption attribute and having a plurality of segments. The encryption attribute includes information to identify one or more segments of the data to encrypt. The method further comprises encrypting the encryption attribute and storing the data including the partly encrypted data and the encrypted encryption attribute.
US08880878B2 Content distribution storage system, method for obtaining content, node device, and computer readable medium
A content distribution storage system includes: a first transmission unit configured to transmit a special content including certificate revocation list information indicating a list of at least an invalid electronic certificate to a first node group; a second transmission unit configured to transmit identification information for identifying the special content to a second node group; and a first node device. The first node device includes: a certificate obtaining unit configured to obtain the electronic certificate; an identification information obtaining unit configured, based on the obtained electronic certificate, to obtain the identification information of the special content comprising the certificate revocation list information corresponding to the obtained electronic certificate obtained; and a special content obtaining unit configured to obtain the special content from at least one node device of the first node group which stores the special content associated with the obtained identification information.
US08880869B1 Secure wireless local area network (WLAN) for data and control traffic
A device receives capability information associated with a next hop device of a wireless local area network (WLAN). The device also determines, based on the capability information, whether the next hop device is capable of implementing security for traffic, where the security includes a media access control (MAC) security standard and a layer 2 link security standard. The device further creates, via the MAC security standard, a secure channel with the next hop device when the next hop device is capable of providing security for traffic.
US08880866B2 Method and system for disabling communication paths in a multiprocessor fabric by setting register values to disable the communication paths specified by a configuration
Disabling communication in a multiprocessor fabric. The multiprocessor fabric may include a plurality of processors and a plurality of communication elements and each of the plurality of communication elements may include a memory. A configuration may be received for the multiprocessor fabric, which specifies disabling of communication paths between one or more of: one or more processors and one or more communication elements; one or more processors and one or more other processors; or one or more communication elements and one or more other communication elements. Accordingly, the multiprocessor fabric may be automatically configured in hardware to disable the communication paths specified by the configuration. The multiprocessor fabric may be operated to execute a software application according to the configuration.
US08880857B2 Conditional ALU instruction pre-shift-generated carry flag propagation between microinstructions in read-port limited register file microprocessor
A microprocessor includes a hardware instruction translator that translates an architectural instruction into first and second microinstructions. To execute the first microinstruction, an execution pipeline performs the shift operation on the first source operand to generate the first result and a carry flag value and updates a non-architectural carry flag with the generated carry flag value. To execute the second microinstruction, it performs the second operation on the first result and the second operand to generate the second result and new condition flag values based on the second result. If a architectural condition flags satisfy the condition, it updates the architectural carry flag with the non-architectural carry flag value and updates at least one of the other architectural condition flags with the corresponding generated new condition flag values; otherwise, it updates the architectural condition flags with the current value of the architectural condition flags.
US08880856B1 Efficient arithmetic logic units
A processor may include a conditional arithmetic logic unit and a main arithmetic logic unit. The conditional arithmetic logic unit may perform a first arithmetic logic operation to generate a first result, and output the result. The main arithmetic logic unit may select input buses among a plurality of data buses that carry the first result from the conditional arithmetic logic unit, perform a second arithmetic logic operation on data provided by the selected input buses to generate a second result, and write the second result in a storage component.
US08880854B2 Out-of-order execution microprocessor that speculatively executes dependent memory access instructions by predicting no value change by older instructions that load a segment register
An out-of-order execution microprocessor executes an architectural segment register-loading instruction that instructs the microprocessor to load a new value into an architectural segment register of the microprocessor. A comparator compares the new value specified by the architectural segment register-loading instruction with a current contents of the architectural segment register. A control unit causes to be re-executed using the new value all instructions in the microprocessor that used the current architectural segment register contents as a source operand and that are newer in program order than the architectural segment register-loading instruction whenever the comparator indicates the new value does not equal the current contents. An instruction scheduler retrieves the current contents and issues for execution instructions that use the retrieved current contents, even though the instructions are newer in program order than the register-loading instruction and the register-loading instruction has not yet written the new value to the architectural segment register.
US08880851B2 Microprocessor that performs X86 ISA and arm ISA machine language program instructions by hardware translation into microinstructions executed by common execution pipeline
A microprocessor includes a hardware instruction translator that translates x86 ISA and ARM ISA machine language program instructions into microinstructions, which are encoded in a distinct manner from the x86 and ARM instructions. An execution pipeline executes the microinstructions to generate x86/ARM-defined results. The microinstructions are distinct from the results generated by the execution of the microinstructions by the execution pipeline. The translator directly provides the microinstructions to the execution pipeline for execution. Each time the microprocessor performs one of the x86 ISA and ARM ISA instructions, the translator translates it into the microinstructions. An indicator indicates either x86 or ARM as a boot ISA. After reset, the microprocessor initializes its architectural state, fetches its first instructions from a reset address, and translates them all as defined by the boot ISA. An instruction cache caches the x86 and ARM instructions and provides them to the translator.
US08880849B2 Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements
The present invention concerns configuration of a new category of integrated circuitry for adaptive computing. The various embodiments provide an executable information module for an adaptive computing engine (ACE) integrated circuit and may include configuration information, operand data, and may also include routing and power control information. The ACE IC comprises a plurality of heterogeneous computational elements coupled to an interconnection network. The plurality of heterogeneous computational elements include corresponding computational elements having fixed and differing architectures, such as fixed architectures for different functions such as memory, addition, multiplication, complex multiplication, subtraction, configuration, reconfiguration, control, input, output, and field programmability. In response to configuration information, the interconnection network is operative to configure the plurality of heterogeneous computational elements for a plurality of different functional modes.
US08880846B2 Semiconductor device
A semiconductor device according to the present invention includes a first address generation unit that includes a first register group and generates a table address by a cyclically repeating first pattern using a value stored to the first register group, a second address generation unit that includes a second register group and generates an access address by a cyclically repeating second pattern using a value stored to the second register group and parameter information determined by the table address, and a control unit that outputs setting information to be supplied to the first register group and the second register group. Further, the semiconductor device performs at least one of a read process and a write process of data from and to a data memory using the access address.
US08880843B2 Providing redundancy in a virtualized storage system for a computer system
A method for providing redundancy in a virtualized storage system for a computer system is provided. The method includes determining a first set of first logical addresses to provide a virtual storage volume. A redundancy schema is then selected to provide redundancy data for primary data stored in the first set of first logical addresses. A second set of second logical addresses is determined to provide logical storage for the primary data and for the redundancy data. The first set of first logical addresses and the second set of second logical addresses are then mapped and a set of physical storage addresses is selected from a set of physical storage elements. Mapping between the second set of second logical addresses and the set of physical addresses is then performed to provide physical storage for the primary data and the redundancy data stored in the virtual storage volume.
US08880842B2 Dynamic detection and reduction of unaligned I/O operations
Detection and reduction of unaligned input/output (“I/O”) requests is implemented by a storage server determining an alignment value for data stored by the server within a storage system on behalf of a first client, writing the alignment value to a portion of the volume that stores the data for the first client, but not to a portion of the volume that stores data for a second client, and changing a location of data within the portion of the volume that stores the data for the first client, but not a location of data in the portion of the volume that stores data for the second client, to an alignment corresponding to the alignment value. The alignment value is applied to I/O requests directed to the portion of the volume that stores the data blocks for the first client after the location of the data blocks has been changed.
US08880839B2 Writing adjacent tracks to a stride, based on a comparison of a destaging of tracks to a defragmentation of the stride
Compressed data is maintained in a plurality of strides of a redundant array of independent disks, wherein a stride is configurable to store a plurality of tracks. A request is received to write one or more tracks. The one or more tracks are written to a selected stride of the plurality of strides, based on comparing the number of operations required to destage selected tracks from the selected stride to the number of operations required to defragment the compressed data in the selected stride.
US08880837B2 Preemptively allocating extents to a data set
Provided are a computer program product, system, and method for preemptively allocating extents to a data set in a storage system. A data set is comprised of a plurality of extents configured in at least one volume in the storage system. A first extent is allocated to the data set in a first volume to extend the data set. A determination is made as to whether a second extent can be allocated to the data set in the first volume in response to the allocating of the first extent. The second extent in a second volume is allocated for the data set in response to determining that the second extent cannot be allocated to the data set in the first volume.
US08880832B2 Controller for storage devices and method for controlling storage devices
A controller is connectable to a host system and a plurality of storage devices. A monitor unit monitors operating status of a plurality of storage devices and sets the operating status of the storage devices in a status table. Upon receiving a write command from the host system, a command responding unit receives write data sent from the host system within a certain period of time after the write command, holds the write data received in a buffer memory, instructs a timer to start counting, sets a write destination for data in the status table, outputs a control signal that gives an instruction to write data to the storage device of the write destination, and returns a write completion response corresponding to the write command to the host system when receiving the deadline notification from the timer.
US08880829B2 Method and apparatus for efficient, low-latency, streaming memory copies
Systems, methods, and apparatus with improved techniques for copying data from a source memory location to a destination memory location are disclosed. An exemplary method includes receiving a source address that indicates the source memory location, a destination address that indicates the destination memory location, and receiving a size indicator that indicates the size of the data. When the size is less than a threshold size, a particular pointer in a jump table is accessed, based upon the size that points to particular load and store instructions. The jump table includes a plurality of pointers that point to a corresponding one of a plurality of load and store instructions. The particular load-store instructions are then executed with a processor of the computing device to copy the data from the source memory location to the destination memory location. Several other efficiency-improvement aspects are also disclosed that may be used in connection with these steps to further improve copy efficiencies.
US08880828B2 Preferential block recycling in a redirect-on-write filesystem
Provided are techniques for more efficient data storage on a computing system. An inode table is provided and populated with information relating to current and N previous locations within data storage that a particular data block has been stored. When a particular data block is modified in a redirect on write system, the modified data block is stored, if possible in a previous storage location for that particular data block and the current data location may be saved for use as the location for a subsequent modification.
US08880827B2 Method for executing security-relevant and non-security-relevant software components on a hardware platform
A method for executing safety-relevant and non-safety-relevant software components on a hardware platform comprising a computer, memory and a monitoring component that operates independently of the computer. The safety-relevant software component erects a memory protection against access of a non-safety-relevant function to at least one area of the memory of the safety-relevant function before execution of the non-safety-relevant software component, so that the non-safety-relevant software component does not have access to the areas of the memory being used for safety-relevant components. After the return from the non-safety-relevant component, the memory protection is deactivated and the monitoring function monitors the safety-relevant function for its proper operation.
US08880820B2 Techniques for using sparse files during snapshots
Techniques for using sparse files during snapshots are provided. Snapshots are managed and maintained for a source volume via sparse files. Metadata defines the sparse files and operations of a file system are used to create, define, and manipulate the metadata. When a write operation is detected during a snapshot, sparse files are used to copy the write operation before the write operation is performed on the source volume; the sparse files server as the snapshot data.
US08880819B2 Memory apparatuses, computer systems and methods for ordering memory responses
Memory apparatuses that may be used for receiving commands and ordering memory responses are provided. One such memory apparatus includes response logic that is coupled to a plurality of memory units by a plurality of channels and may be configured to receiving a plurality of memory responses from the plurality of memory units. Ordering logic may be coupled to the response logic and be configured to cause the plurality of memory responses in the response logic to be provided in an order based, at least in part, on a system protocol. For example, the ordering logic may enforce bus protocol rules on the plurality of memory responses stored in the response logic to ensure that responses are provided from the memory apparatus in a correct order.
US08880818B2 Reconfigurable memory controller
Embodiments of a memory controller are described. This memory controller includes signal connectors, which are electrically coupled to a communication path that includes multiple links, and an interface circuit, which is electrically coupled to the signal connectors. In a first operating mode, the interface circuit communicates with a first memory device via the communication path using spatial multiplexing, in which there are dedicated command/address links and dedicated data links in the communication path. Moreover, in a second operating mode, the interface circuit communicates with a second memory device via the communication path using time multiplexing, in which at least some of the links in the communication path time interleave command/address information and data.
US08880816B2 Reducing storage system power consumption in a remote copy configuration
A storage system in a remote copy configuration includes a redirect mechanism. The redirect mechanism determines whether to redirect read operations to a remote storage system, which is part of the remote copy configuration, based on a power management policy and a redirect policy. The redirect mechanism takes into account response time data, input/output demand, power utilization data, and input/output classes and priorities to determine whether to redirect read access requests to the remote storage system. Redirection of read operations to the remote storage system results in reduced power consumption at the local system.
US08880815B2 Low access time indirect memory accesses
An apparatus having a memory and a controller is disclosed. The controller may be configured to (i) receive a read request from a processor, the read request comprising a first value and a second value, (ii) where the read request is an indirect memory access, (a) generate a first address in response to the first value, (b) read data stored in the memory at the first address and (c) generate a second address in response to the second value and the data, (iii) where the read request is a direct memory access, generate the second address in response to the second value and (iv) read a requested data stored in the memory at the second address.
US08880812B1 WWN table management systems and methods
A serial attached small computer systems interface (SAS) module includes a first port with (i) a first physical layer device and (ii) a first port control module. The first physical layer device communicates with a plurality of initiators. The first port control module comprises a first world wide number (WWN) table. The first WWN table comprises connection rates of the plurality of initiators during communication with the first physical layer device. Each of the connection rates is a last connection rate of a respective one of the plurality of initiators.
US08880810B2 Storage system comprising multiple storage apparatuses with both storage virtualization function and capacity virtualization function
A storage system includes a first storage apparatus and a second storage apparatus. The first storage apparatus includes a capacity pool that is partitioned into multiple pool pages and includes a storage area of an external logical volume provided by at least one storage apparatus. The second storage apparatus provides first virtual volume which is a virtual logical volume comprising multiple first virtual areas. In a case of receiving a write request from the computer to a virtual area in the first virtual volume to which a page is not allocated, an unallocated pool page of the external logical volume is allocated to the virtual area. An authority to allocate the unallocated pool page of the external logical volume is assigned to the first storage apparatus.
US08880803B2 Storage device and storage-device control method
A generation-code storage unit stores therein a generation code in association with identification information for identifying the block datum. A generation-code managing unit assigns a new generation code to a detected consecutive data set and any block datum included in writing data other than the consecutive data set and stores the assigned generation code in the generation-code storage unit. A data writing unit adds the new generation code to the block datum or consecutive data set included in the writing data and writes it to a storage unit. A determining unit determines whether the generation code added to a read block datum or consecutive data set is accordant with the generation code of the read block datum or consecutive data set stored in the generation-code storage unit. A data transmitting unit transmits, when the generation codes are accordant, the read block datum or consecutive data set.
US08880798B2 Storage system and management method of control information therein
An embodiment of this invention divides a cache memory of a storage system into a plurality of partitions and information in one or more of the partitions is composed of data different from user data and including control information. The storage system dynamically swaps data between an LU storing control information and a cache partition. Through this configuration, in a storage system having an upper limit in the capacity of the cache memory, a large amount of control information can be used while access performance to control information is kept.
US08880797B2 De-duplication in a virtualized server environment
A data de-duplication application de-duplicates redundant data on the primary storage read/write pathway of a virtualized server environment. The virtualized server environment comprises one or more server applications operating on a virtualization layer provided on a computer architecture that includes memory (e.g., RAM, cache memory) for temporarily storing data and storage (e.g., disk storage) for persistently storing data. The one or more server applications use the read-write pathway to read data into memory from storage and to write data to storage from memory. The de-duplication application identifies redundant data in memory, storage, or both, and replaces the redundant data with one or more pointers pointing to a single copy of the data. The de-duplication application can operate on fixed or variable size blocks of data and can de-duplicate data either post-process or in-line.
US08880795B2 Intelligent partitioning of external memory devices
Multiple memory devices, such as hard drives, can be combined and logical partitions can be formed between the drives to allow a user to control regions on the drives that will be used for storing content, and also to provide redundancy of stored content in the event that one of the drives fails. Priority levels can be assigned to content recordings such that higher value content can be stored in more locations and easily accessible locations within the utilized drives. Users can control and organize how recorded content is stored between the drives such that an external drive may be removed from a first gateway device and attached to a second gateway device without losing the ability to access the recorded content from the first gateway device at a later time. In this manner, a user is provided with the ability to transport an external drive containing stored content recordings between multiple different gateway devices such that the recordings may be accessed at different locations or user premises.
US08880794B2 Populating a sparsely allocated memory in a storage array
Apparatus and associated methodology contemplating a data storage system having a memory that includes a first addressable storage space and a second differently addressable storage space. A controller selectively accesses stored instructions that when executed transfer some user data sets with the first addressable storage space in accordance with a dense allocation of the first addressable storage space, and transfer other user data sets with the second addressable storage space in accordance with a sparse allocation of the second addressable storage space that allocates a predefined reserved storage capacity between adjacent stored non-sequential user data sets.
US08880791B2 Isolation switching for backup of registered memory
Certain embodiments described herein include a memory system having a register coupled to a host system and operable to receive address and control signals from the host system, a volatile memory subsystem, a non-volatile memory subsystem, a controller coupled to the non-volatile memory subsystem, and a circuit coupled to the register, the volatile memory subsystem, and the controller. In a first mode of operation, the circuit is operable to selectively isolate the controller from the volatile memory subsystem, and to selectively couple the volatile memory subsystem to the register to allow data to be communicated between the volatile memory subsystem and the host system. In a second mode of operation, the circuit is operable to selectively couple the controller to the volatile memory subsystem to allow data to be communicated between the volatile memory subsystem and the non-volatile memory subsystem using the controller, and is operable to selectively isolate the volatile memory subsystem from the register.
US08880790B2 Methods and apparatus for transferring data between memory modules
A computer-implemented method for transferring data from a computer system programmed to perform the method includes receiving in a memory buffer in a first memory module hosted by the computer system, a request for data stored in RAM of the first memory module from a host controller of the computer system, retrieving with the memory buffer, the data from the RAM, in response to the request, formatting with the memory buffer, the data from the RAM into formatted data in response to a defined software transport protocol, and initiating with the memory buffer, transfer of the formatted data to a storage destination external to the first memory module via an auxiliary interface of the memory buffer, bypassing the host controller of the computer system.
US08880788B1 Flash optimized, log-structured layer of a file system
In one embodiment, a flash-optimized, log-structured layer of a file system of a storage input/output (I/O) stack executes on one or more nodes of a cluster. The log-structured layer of the file system provides sequential storage of data and metadata on solid state drives (SSDs) to reduce write amplification, while leveraging variable compression and variable length data features of the storage I/O stack. The data may be organized as an arbitrary number of variable-length extents of one or more host-visible logical units (LUNs). The metadata may include mappings from host-visible logical block address ranges of a LUN to extent keys, as well as mappings of the extent keys to SSD storage locations of the extents. The storage location of an extent on SSD is effectively “virtualized” by its mapped extent key such that relocation of the extent on SSD does not require update to volume layer metadata.
US08880787B1 Extent metadata update logging and checkpointing
In one embodiment, an extent store layer of a storage input/output (I/O) stack executing on one or more nodes of a cluster manages efficient logging and checkpointing of metadata. The metadata managed by the extent store layer, i.e., the extent store metadata, resides in a memory (in-core) of each node and is illustratively organized as a key-value extent store embodied as one or more data structures, e.g., a set of hash tables. Changes to the set of hash tables are recorded as a continuous stream of changes to SSD embodied as an extent store layer log. A separate log stream structure (e.g., an in-core buffer) may be associated respectively with each hash table such that changed (i.e., dirtied) slots of the hash table are recorded as entries in the log stream structure. The hash tables are written to SSD using a fuzzy checkpointing technique.
US08880783B2 Differential vector storage for non-volatile memory
A method is disclosed for storing information on non-volatile memory which can rewrite memory cells multiple times before a block needs to be erased. The information to be stored is transformed into a suitable form which has better robustness properties with respect to common sources of error, such as leakage of charge, or imperfect read/write units.
US08880778B2 Memory buffer having accessible information after a program-fail
A memory device, and a method of operating same, utilize a first memory buffer associated with a first memory array and a second memory buffer associated with a second memory array to maintain information subsequent to a program-fail event associated with the first memory array and to provide the information to the second memory array.
US08880771B2 Method and apparatus for securing and segregating host to host messaging on PCIe fabric
A PCIe fabric includes at least one PCIe switch. The fabric may be used to connect multiple hosts. The PCIe switch implements security and segregation measures for host-to-host message communication. A management entity defines a Virtual PCIe Fabric ID (VPFID). The VPFID is used to enforce security and segregation. The fabric ID may be extended to be used in switch fabrics with other point-to-point protocols.
US08880769B2 Management of target devices
Techniques for management of target devices are provided. User input for management of a target device may be received. The user input may be converted into a first format. The first format may be encapsulated into a second format and sent over a communications channel. The second format may be un-encapsulated to recover the first format. The first format may be provided to the target devices.
US08880767B2 Bridging board and server system
A bridging board configured for connecting a processor with a hard disk backboard includes a first signal connecting apparatus, a second signal connecting apparatus, a plurality of duplexer and a signal conditioner. The first signal connecting apparatus is electronically connected to the processor. The second signal connecting apparatus electronically connected to the hard disk backboard. Each duplexer has an input terminal electronically connected to the first signal connecting apparatus, and two output terminals electronically connected to the second signal connecting apparatus to allow the processor to communicate with the backboard via the bridging board. The signal conditioner is electronically connected between the first signal connecting apparatus and the second signal connecting apparatus to amplify signals transmitted from the processor to the hard disk backboard.
US08880765B2 Interface bus for utility-grade network communication devices
In one embodiment, a network device having a plurality of hardware interfaces is disclosed. The network device includes a central processing unit and a main circuit board. The main circuit board has expansion slots that receivably connect corresponding secondary circuit boards to the main circuit board. The main circuit board also has sensors for detecting predetermined parameters. A voltage regulator is operative to regulate one or more particular expansion slots, in response to detection of a predetermined parameter associated with respective slots.
US08880755B2 Transmission device and transmission method
A transmission device includes: an FPGA that configures a port processing circuit in a line interface which communicates with an XFP; and a flash memory that stores configuration information for configuring, in the FPGA, a measurement circuit that measures and acquires a transmission parameter for use in communication between the XFP and the port processing circuit; and an FPGA control unit that configures the measurement circuit in a portion of the port processing circuit based on the configuration information read from the flash memory, upon detecting a loop-back connection with the XFP. The measurement circuit measures and acquires a transmission parameter. The FPGA control unit sets the acquired transmission parameter to the line interface, and reconfigures the measurement circuit in the port processing circuit.
US08880752B2 Customizing and/or multiplexing universal serial bus pins
A method performed in an electronic device that connects via a USB connector to an accessory that supports multiple different operating modes. The method comprises: in response to successful authentication of the accessory after an initial connection, configuring an accessory usage setting of the electronic device to correspond to the accessory's default operational mode. In response to a request to change the operational mode of the accessory to a second operational mode: communicating to the accessory, over the signal/communication lines of the USB, mode identifying information corresponding to the second operational mode; generating a voltage level change on an ID line of the USB connector to communicate to the accessory that a change in the accessory's present operational mode is being triggered, where the accessory is designed to change to the second operational mode when a pulse or voltage level change is detected on the ID line.
US08880748B2 Switching system which allows primary USB connection in response to USB signaling
System and method controlling connectivity within a device. A device may be coupled to a host device. In response to the coupling, low power logic (e.g., an embedded device) of the device may be coupled to the host device. The low power logic may perform enumeration with the host device using only power provided by the host device. The low power logic may also charge a battery of the device using power provided by the host device. Device circuitry of the device may provide a signal for coupling to the host device. In response, the device circuitry may be coupled to the host device and may perform device enumeration with the host device.
US08880746B2 Method using virtual ASIC pins to reconfigure hardware
An apparatus and method for unconditionally loading a value into first memory of an first integrated circuit, which operates in one of several different modes depending on value stored in the first memory. In one embodiment, apparatus comprises a printed circuit board. The first integrated circuit (IC) is mounted on the printed circuit board, wherein the first IC comprises a first memory device, and wherein the first IC is configured to operate in a first mode when a first value is stored in the first memory device, and wherein the first IC is configured to operate in a second mode when a second value is stored in the first memory device. The printed circuit board also includes a second IC mounted thereon. The second IC comprises a second memory device that stores the first value. A third IC mounted on the printed circuit board is configured to provide a copy of the first value stored in the second memory device to the first IC for storage in the first memory device, wherein the third IC is configured to provide the copy of the first value to the first IC without condition.
US08880740B2 Computing device location
Embodiments of the present invention address deficiencies of the art in respect to computing device location and provide a novel and non-obvious method, system and computer program product for visually locating a computing device. In one embodiment of the invention, a computing device location method can include establishing filter criteria grouping different computing devices by common characteristic, wirelessly broadcasting the filter criteria in a discovery request to in range peripheral locators coupled to computing devices, aggregating a list of discovered peripheral locators meeting the filter criteria, selecting at least one of the peripheral locators in the list, and interrogating the selected peripheral locators to retrieve data provided by corresponding ones of the computing devices. Additionally, a display element in each of the discovered peripheral locators can be illuminated upon discovering the peripheral locators. Likewise, a display element can be illuminated in the selected peripheral locators upon selecting the peripheral locators.
US08880736B2 Methods and systems for archiving and restoring securely installed applications on a computing device
Embodiments of the present disclosure provide methods and systems of backing up applications and their associated data installed on a device, such as a mobile device. In particular, data for a backed-up application is stored on a remote archive host and can be restored to dynamically managed containers of securely installed applications on the device. Upon request, the archive host may provide a package of files to the device. The device may then restore the application based on the contents of the package. The package may comprise all the files needed to install the application including the program code, data, and documents. Alternatively, the package may simply comprise just some of the files, such as just the data or documents for an application. After installation, a secure installer framework may be used to verify the applications and authorize the application's execution on the device.
US08880735B2 Mail server based application record synchronization
A solution is provided wherein standard mail servers may be used to assist the synchronization of application data across multiple devices. This allows the synchronization of application data without requiring contemporaneous operation of the synchronization partner devices. This may be accomplished by generating a record for each change to a database on a first device. Upon synchronization of the first device with the mail server, the changes since the last synchronization may be uploaded to the mail server and stored in a mailbox for a user associated with the device. If a second device associated with the user then attempts to synchronize with the mail server, the records may be downloaded and the corresponding changes implemented in the database on the second device.
US08880732B1 Method and system for application isolation
Method and system for application isolation is provided. A computing system executes a plurality of processor executable applications and each application is assigned an address by an adapter that is operationally coupled to the computing system. The adapter also assigns a unique identifier to each construct generated by the plurality of applications; maintains a data structure associating the address with the unique identifier assigned to each construct; receives a request having an address and a unique identifier from an application from among the plurality of applications; retrieves the address and the unique identifier from the request; compares the retrieved address and the unique identifier with information maintained by the data structure; and processes the request if the retrieved address and the unique identifier matches with information of the data structure.
US08880730B2 Method and system for managing destination addresses
A method for downloading destination addresses associated with a given client device from a server to the client device is disclosed. The method comprises the steps of determining a resource limitation of the client device, sorting the addresses, and transmitting a subset of the sorted addresses from the server to the device, wherein the transmitted sorted address subset is determined by the resource limitation.There is also provided a system and server for supporting Instant Messaging (IM). The system comprises a telecommunications network interconnecting a plurality of IM clients and an IM server, the plurality of IM clients configured to exchange instant messages with one another via the telecommunications network and the IM server, each of the IM clients having an associated IM address, the IM server comprising a memory for storing a plurality of IM addresses, a set of the IM addresses corresponding to each of the IM clients and wherein a given set comprises at least one IM address other than an IM address of the IM client to which the given set corresponds, wherein on occurrence of a triggering event associated with a particular IM client the IM server selects a subset of the IM addresses from the set of addresses corresponding to the particular IM client based on a resource limitation of the particular IM client and transmits the selected IM address subset to the particular IM client.
US08880729B2 Method and apparatus for routing requests for service using BGP community attributes
According to one embodiment, an apparatus that makes improved routing decisions is provided that includes a receiver, a retriever, a proximity engine, and a transmitter. The receiver may be configured to receive a request from a source. The retriever may be configured to retrieve a plurality of providers capable of servicing the request. The proximity engine may be configured to rank the plurality of providers based on weights indicative of a network distance. The weights may correspond to a first Border Gateway Protocol (BGP) community attribute associated with the source and at least a second BGP community attribute associated with at least one of the providers in the plurality of providers. The transmitter may be configured to transmit the request to the provider in the plurality of providers with the highest ranking.
US08880727B1 Transparently providing layer two (L2) services across intermediate computer networks
A device provides layer two (L2) services between customer networks that are coupled by one or more intermediate computer networks. The device comprises a routing process that receives label information for a label switched path (LSP) through the intermediate networks. The device further comprises a L2 service that receives L2 service information from a device associated with second customer networks. In accordance with the label information, the device transports L2 communications between the first and second customer networks through the one or more intermediate networks. By utilizing label information in this manner, the device may minimize the impact of providing L2 services through the intermediate networks.
US08880724B2 Event triggered traceroute for optimized routing in a computer network
In one embodiment, a network device (e.g., a master controller) may detect an event on a current path in a computer network from a local network domain to a destination address prefix of a remote domain. In response, the device may dynamically (e.g., intelligently) determine a trace target destination address within the destination address prefix, and may perform (or request performance of) a Traceroute of the current path and a selection of alternate paths in the network from the local network domain to the trace target, where the Traceroute is adapted to obtain per-hop measurements along the respective traced path. The measurements may then be stored, for example, to be used for optimal path selection, fault identification reporting, etc.
US08880722B2 Dynamic media bit rates based on enterprise data transfer policies
In general, this disclosure describes techniques of dynamically selecting versions of media content based on data transfer policies of a media content provider that provides the media content. As described herein, a media content provider may establish a variety of data transfer policies for a variety of purposes. When requests are received, versions of media assets indicated by the requests are selected such that an overall bandwidth utilization of the media content provider is likely to be substantially equal to a desired bandwidth utilization established by one or more of the enterprise data transfer policies.
US08880721B2 System and method for minimizing network bandwidth retrieved from an external network
A system and method are provided of minimizing network bandwidth used from an external network by client peers in a local network. The method can include the operation of organizing a plurality of clients each having media streamlets and a client parent in a structure within the local network. Mapping information propagates through the structure. The mapping information represents local streamlet locations as stored by the plurality of clients. Another operation is retrieving a local streamlet from a client identified in the mapping information as having the local streamlet for the requesting client.
US08880716B2 Network streaming of a single data stream simultaneously over multiple physical interfaces
Sending a data stream from a sending endpoint to a receiving endpoint, wherein both of the sending endpoint and the receiving endpoint each have multiple physical interfaces connecting the sending endpoint and the receiving endpoint to multiple networks, respectively, is provided. The data stream is split into a series of data packets and sent over the multiple physical interfaces. A next available data packet of the series is sent over a fastest one of the multiple physical interfaces. A data packet from further back in the series is extracted in accordance with a determined expected difference in arrival time, and sent on a corresponding slower one of the multiple physical interfaces. The next available data packet is sent from the sending endpoint nearly simultaneously as the extracted data packet is sent from the sending endpoint.
US08880715B2 Remote control of a host computer
A host computer is remotely controlled by a remote client device over a network that carries transmissions in a connection-oriented protocol and a connectionless protocol. The host computer establishes a connection to the remote client device using a connection-oriented protocol, and receives commands from the remote client device over the connection-oriented protocol and implements the commands so as to affect a display of the host computer. The host computer transmits content of the display to the remote client device using the connection-oriented protocol. In addition, the host computer identifies one or more rapid-change areas in the display of the host computer in which the display is changing more quickly than a predetermined threshold rate of change, and transmits content of each rapid-change area to the remote client device using a connectionless protocol at a rate higher than the connection-oriented protocol.
US08880714B2 Method and system for use in coordinating multimedia devices
Some embodiments of the present invention provide methods for use in playing back content. Some of these methods access a content package comprising media content to be locally played back; detect, as defined by the content package, whether a remote secondary device is available with which a connection can be established; determine whether an authorization to establish the connection has been confirmed; establish, when the authorization is confirmed, a communication connection; determine, as instructed by the content package and when the communication with the secondary device is established, whether one or more commands are received from the secondary device; and implement, as instructed by the content package and when it is determined that the one or more commands are received from the secondary device, the one or more commands in controlling playback experience of the media content.
US08880713B2 System and methods for use in communicating with an energy management device in an energy device network
System, method, and computer-readable instructions for use in communicating with an energy management device in a network that comprises one or more energy devices. First search results are created by searching for devices associated with a first energy management device identifier using a first discovery protocol. Second search results are created by searching for devices associated with a second energy management device identifier using a second discovery protocol. The first and second search results are combined to create a collection of candidate devices, and at least one candidate device of the candidate devices is validated to determine whether the candidate device is an energy management device.
US08880709B2 Method and system for scheduled streaming of best effort data
A system is provided for controlling the transmission of best-effort filed data or programs on channels from one of plural controllers to one or more client nodes. A program is a group of files and has program information indicating to a client node how to use the files of the program. A channel is a virtual path, wherein a client node can receive program files from different channels in a separable fashion. Channels also have channel information. Multiple controllers are provided which self configure in rank order to control the scheduled transmission of programs files on channels. Client nodes receive announcements of programs and channels from the controllers and selectively subscribe to the channels and programs. Client nodes can be instructed to positively acknowledge receipt of programs and also send back negative acknowledgements for ranges of data words in program files not received. The negative acknowledgements can be consolidated to reduce the number of packets on the network. The format of packets carrying program files and acknowledgement/negative acknowledgement messages are specified.
US08880704B2 Migration in place by infrastructure deployment of platforms to customer hardware
Technologies related to migration in place are generally described. In some examples, software and/or data associated with a platform customer can be “migrated” to a new platform while allowing the platform customer's software and/or data to remain on same hardware. A data center and/or Infrastructure as a Service (IaaS) provider may be configured to support migration in place for example by providing hardware identifiers upon request, providing platform identifiers upon request, providing platform compatibility information upon request and/or approving platforms for migration in place operations, deploying platform modules to migration in place hardware, providing user session support during migration in place operations, and/or performing security operations.
US08880697B1 Using rules to determine user lists
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for receiving data including a user identifier associated with a user and one or more key-value pairs associated with the user's access of a resource. Each key-value pair includes a key and a value provided by the resource. Upon determining that the received data satisfies one or more rules associated with a user list comprising user identifiers, the user identifier is added to the user list.
US08880695B2 Information processing apparatus and information processing method
There is provided an information processing apparatus including: a receiving section that receives function information about one or more functions from an external device connected via a network; a display section that displays a list of the functions of the external device, the functions being included in the function information; a selected-information acquiring section that acquires selected information pertaining to a function selected by a user from the list of the functions displayed by the display section; and a coordinate function executing section that causes the external device to execute the function selected by the user. Such a configuration provides the information processing apparatus designed such that even if the information processing apparatus and the external device do not have information about each other, the function of the external device can be executed by operating the information processing apparatus.
US08880693B2 Network service provider-assisted authentication
A data store includes previously collected client data records, each previously collected client data record associated with a respective first network address. A verification module is communicatively coupled to the data store, the module configured to determine that it is a competent verification module and to receive a verification request including user data and a second network address and further configured to respond with an indication of whether the user data corresponds to the previously collected client data record identified by the first network address corresponding to the second network address.
US08880684B2 Method and system for measuring individual network round-trip delays in IP gateways
An IP gateway, attached to a source network and a destination network, handles an application session between a source client device and a destination client device. Application-level control messages in the existing application session may be time stamped by the IP gateway. Individual network round-trip delays (RTDs) associated with the attached networks may be calculated or determined utilizing the resulting time stamps. The IP gateway may time stamp one or more of the application-level control messages in the existing application session whenever transmission and/or reception of the application-level control messages occurs at the IP gateway. The resulting gateway related time stamps such as the gateway-to-source receive time stamp and the gateway-to-destination transmit time stamp may be stored. An individual RTD associated with the destination network may be calculated or determined utilizing the stored gateway related time stamps and processing delay measurement extracted from one of the application-level control messages from the destination client device.
US08880682B2 Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations
A method for facilitating forensic analysis of operational data for an IT infrastructure includes deriving performance data from a plurality of physical systems, network elements and storage devices in an IT infrastructure via a toolset comprising a plurality of IT monitoring and metrics tools, importing the performance data into an integrated forensics platform, aggregating the imported data, and analyzing the aggregated data to determine resources consumed. Each tool is communicatively interfaced with one or more of the physical systems, network elements and storage devices.
US08880681B2 Network characterisation
Methods and systems for assigning information indicative of a network characteristic to one of a plurality of data units traversing a path across a network, said data units having associated therewith values indicative of said network characteristic, said path having at least one portion passing through a lower-capability region and at least one portion passing through a higher-capability region, said lower-capability region being a region in which information indicative of said network characteristic may be represented by values having a first resolution, and said higher-capability region being a region in which information indicative of said network characteristic may be represented by values having a second resolution, said second resolution being greater than said first resolution, said one data unit being a data unit entering said higher-capability region.
US08880678B1 System and method for managing and monitoring a web application using multiple cloud providers
A system and method for managing and monitoring a web application that uses multiple cloud providers. Preferably, a cloud manager monitors the web applications and pulls web resources from multiple cloud providers. The system and method preferably allows for automatic wiring from a cloud provider to a web application, and allows for use of different Web resources from multiple cloud providers. The cloud manager also preferably allows for automatic scaling for the web application.
US08880677B2 System and method for delivering content to users on a network
Targeted content may be provided to a designated set of one or more interconnected resources. Programmatic operations are executed using resources that are private to the one or more interconnected devices. The operations, when executed, cause or result in (i) monitoring activities of one or more users of the designated set; (ii) developing profile information of the one or more users, where the profile information is based at least partially on information determined from monitoring activities of the one or more users; (iii) generating, from the profile information, a set of coded data that represent selection criteria; and (iv) communicating the set of coded data to a programmatic source external to the system, where the represented selection criteria enables programmatic selection of content resources from a content library for the system.
US08880676B1 Resource planning for computing
Disclosed are various embodiments for the planning of resources used in computing. Usage statistics regarding one or more virtual machine instances executing in a networked plurality of computing devices are obtained. The usage statistics are grouped, for example, based on one or more customer usage classifications, thereby producing one or more usage groups. A corresponding demand forecast is generated for each of the usage groups. A projected demand for one or more physical components of the networked computing devices is calculated according to the demand forecasts.
US08880675B2 Method and appartus for use in remote diagnostics
The present invention provides an apparatus, system and method for use in remotely diagnosing electronic devices and/or providing content. The method for use in remotely diagnosing includes the initiating a diagnostic analysis of an electronic device, identifying the electronic device, receiving scripts communicated over a distributed network for diagnosing, remotely initiating diagnostic instructions with the scripts and receiving a response based on the instruction. The method can further determine further diagnostic instructions based on responses, and remotely initiate further instructions with the scripts. Additionally, a system for use in remotely diagnosing electronic devices includes a script generator coupled with a distributed network, and a remote diagnostic controller coupled with the distributed network and with an electronic device. The script generator compiles scripts and forwards them over the distributed network. The diagnostic controller implements the scripts to forward instructions to and to receive replies from the electronic device.
US08880673B2 Application providing system, application providing method, and information processing apparatus
An application providing system has a communication terminal, a Web server that manages resources of Web applications, and a push server that manages storage location addresses of resources. The push server has an address managing unit that manages a terminal ID, a storage location address, and providing timing in a manner associated with one another. The push server further has a timing monitoring unit that monitors the providing timing. The push server further has a push transmitting unit that transmits a storage location address of a resource of a Web application associated with providing timing to a communication terminal associated with the providing timing upon detection of the providing timing to cache the resource of the Web application corresponding to the providing timing in the communication terminal.
US08880668B2 Method and system for integrating data from multiple sources
An approach is provided for integrating data. Data is collected from one or more source systems and workflow data is extracted from the collected data. One or more predetermined tasks associated with execution of a workflow based on the workflow data are identified. Status information relating to progress of the workflow towards completion is estimated by correlating the workflow data with the one or more predetermined tasks.
US08880666B2 Method, policy request router, and machine-readable hardware storage device to select a policy server based on a network condition to receive policy requests for a duration
Example methods, apparatus and articles of manufacture to route policy requests are disclosed. A disclosed example method includes receiving, at a policy request router, a policy request from a policy requestor, applying, at the policy request router, a rule to a parameter representing a network condition to select a policy server for the policy request, and sending from the policy request router to the policy requestor an identifier representing the policy server, the policy requestor to send the policy request to the policy server based on the identifier, the policy server to enforce a policy associated with the policy request.
US08880665B2 Nonstop service system using voting, and information updating and providing method in the same
A nonstop service system using voting and a method for updating and providing information in the nonstop service system. The nonstop service system includes a plurality of groups of nodes for storing and managing information on the basis of identifiers for distinguishing clients, each group including a plurality of nodes each of which is capable of storing and managing information independently. The nonstop service system further includes a control dispatcher server, which is located between the group of nodes and the clients and manages state information and connection information of the nodes belonging to the plurality of groups of nodes. The control dispatcher server selects a group of nodes corresponding to a client according to an information update and provision request from the client, transmits the information update and provision request to the nodes belonging to the selected group of nodes, and, when information is provided from the nodes, provides information which is selected from the provided information using voting based on a specific criterion such as a currency criterion to the client. According to the present invention, it is possible to invest in constructing an initial service system based on the amount of service use, and it is possible to construct a service system with low costs and high efficiency. Further, a nonstop service system can be efficiently constructed without requiring additional equipment.
US08880662B1 Re-provisioning a network device
Methods, media, and network devices are provided for automatically re-provisioning a network device. The network devices include several triggers for re-provisioning the network device. When a trigger is satisfied, the network devices may switch communication networks by replacing current provisioning credentials with provisioning credentials for other communication networks. After the switch, the home address for the network devices point to the other communication networks.
US08880659B2 Configuring network devices using compilations of coherent subsections of configuration settings
A method of configuring a networking device comprises: collecting data regarding the networking device; conveying the data to a remote server; selecting configuration slice instances based on the data using the server, wherein templates for the slice instances are stored on the server; compiling the configuration slice instances using the server; and delivering the compiled configuration slice instances to the networking device; wherein the slice instances are coherent sub-sections of configuration settings for the networking device.
US08880656B2 Customer edge device auto-configuration
A customer edge device is automatically configured. A request for customer edge device configuration data may be transmitted to a provider edge device via an Ethernet-layer operations, administration, maintenance, and provisioning (OAM&P) protocol. The request for configuration data may be relayed from the Ethernet-layer OAM&P protocol to a configuration protocol. The request for configuration data may be transmitted from the provider edge device to a configuration repository server via the configuration protocol. The configuration repository server may transmit the requested configuration data to the provider edge device via the configuration protocol. The provider edge device may relay the configuration data from the configuration protocol to the Ethernet-layer OAM&P protocol and transmit the configuration data to a customer edge device via the Ethernet-layer OAM&P protocol. The customer edge device may automatically configure itself using the configuration data.
US08880654B2 Protocol adapter for passing diagnostic messages between vehicle networks and a host computer
A protocol adapter for transferring diagnostic messages between networks within a vehicle and a host computer. The protocol adapter operates as a voltage translator to support J1708 software. The protocol adapter also recognizes when the protocol adapter is connected to a host computer running the J1939 and/or J1708 protocols and automatically switches to that protocol.
US08880652B2 Heuristic browser predictive pre-caching
A method and computer readable medium are disclosed for predictive caching of web pages for display through a screen of a mobile computing device. A load request is received at a mobile computing device, where the load request includes a current timestamp and an address. The address points to a remote server storing a current copy of the address content. The mobile computing device determines whether there is an existing copy of the address content is pre-cached on the mobile computing device. The mobile computing device determines whether a difference between the current timestamp and a pre-cache timestamp is greater than a heuristic timeliness value. If it is, the mobile computing device pre-caches the current copy of the address content from the remove server at the address on the mobile computing device. The mobile computing device then provides the current copy of the address content for display on its screen.
US08880643B2 Method, device and system for forwarding document content in extensible markup language document management
In the field of mobile communications, embodiments of the present invention disclose a method, a device and a system for forwarding document content in Extensible Markup Language Document Management (XDM). The method includes: receiving a forwarding request sent by a forwarding sender, where the forwarding request is used to forward the document content to a forwarding receiver; judging, according to a rights document, whether the forwarding sender has a forwarding right to the document content and whether the forwarding receiver has an access right to the document content; and when the forwarding sender has the forwarding right and the forwarding receiver has the access right, forwarding the document content to the forwarding receiver. Through the solutions in the embodiments of the present invention, the forwarding sender selectively forwards the document content to the forwarding receiver according to the rights document stored in an XDM Server (XDMS).
US08880641B2 Redundant communication in a communication system
A method for redundant communication in a communication system having a plurality of communication networks connected to one another by at least one node, wherein data that originates from a first communication network is prevented from being transmitted back from the second the communication network into the first communication network as a result of information that is predefined before the transmission.
US08880635B1 Selective requesting of cached resources
Methods, systems, and apparatus for selectively requesting cached versions of resources. In one aspect, a method includes transmitting, by a user device, a resource request for a resource hosted by a first server; determining whether the first server provided response data; in response to determining that the first server provided response data: determining whether a cache request condition has occurred; in response to determining that a cache request condition has occurred: transmitting a request for a cached version of the resource to a cache server; and receiving cache data that causes the user device to display the cached version of the resource; and in response to determining that the first server did not provide response data: transmitting a request for a cached version of the resource to the cache server; and receiving cache data that causes the user device to display the cached version of the resource.
US08880634B2 Cache sharing among branch proxy servers via a master proxy server at a data center
A method for cache sharing among branch proxy servers. A branch proxy sever receives a request for accessing a resource at a data center. The branch proxy server creates a cache entry in its cache to store the requested resource if the branch proxy server does not store the requested resource. Upon creating the cache entry, the branch proxy server sends the cache entry to a master proxy server at the data center to transfer ownership of the cache entry if the master proxy server did not store the resource in its cache. When the resource becomes invalid or expired, the master proxy server informs the appropriate branch proxy servers storing the resource to purge the cache entry containing this resource. In this manner, the master proxy server ensures that the cached resource is synchronized across the branch proxy servers storing this resource.
US08880633B2 Proxy server with byte-based include interpreter
According to this disclosure, a proxy server is enhanced to be able to interpret instructions that specify how to modify an input object to create an output object to serve to a requesting client. Typically the instructions operate on binary data. For example, the instructions can be interpreted in a byte-based interpreter that directs the proxy as to what order, and from which source, to fill an output buffer that is served to the client. The instructions specify what changes to make to a generic input file. This functionality extends the capability of the proxy server in an open-ended fashion and enables it to efficiently create a wide variety of outputs for a given generic input file. The generic input file and/or the instructions may be cached at the proxy. The teachings hereof have applications in, among other things, the delivery of web content, streaming media, and the like.
US08880625B2 Automatic expiration of messages communicated among end user communication devices
An exemplary method is implemented by a first end-user communication device for processing a received electronic communication that includes a digital packet having a header segment and a user data segment. The user data segment contains a first command and a user message, where the first command contains a first parameter representing automatic expiration and an associated first value representing how long the user message will be available for display by the first end-user communication device. Under the control of an enhanced services application program, the user message in clear text format is generated for display on a screen of the first end-user communication device. A determination is made of the expiration of the time set by the first value, and upon the expiration, the clear text user message is thereafter prevented from being accessed by the first end-user communication device.
US08880624B2 Method and apparatus for receiving data from a plurality of feed sources
The present specification relates generally to computing devices and more particular relates to a method and apparatus for receiving data from a plurality of feed sources at a plurality of servers via a mobile device comprising a processor interconnected with a display. In one aspect, the mobile device is configured to start a feed service; register feed adapters with the feed service; receive content data via the feed adapters; and generate a list view of the content data on a display of the mobile device.
US08880623B2 Prioritization in a continuous video playback experience
Methods, systems, and apparatus can provide ordered (e.g. ranked) lists of content items as a suggested list of items to watch. The ordered list can be based on feedback from other users. The content items can also be presented (e.g. in a continuous playback mode) to a passive user so that the user does not have to actively select a next item to watch. This passive mode can select a next item (e.g. from a list that is updated based on recent user feedback), and the item can be queued on a client device for playing to a user. Content items can also be provided from different independent servers.
US08880622B2 Message thread management using dynamic pointers
Embodiments of the present invention provide a method, system and computer program product for message thread management using dynamic pointers. In an embodiment of the invention, a method for message thread management using dynamic pointers is provided. The method includes selecting a message thread in a message inbox of a messaging client, comparing characteristics of the message thread to a pre-established set of criteria, and removing the selected message thread to remote storage, generating a message thread pointer to the selected message thread and inserting the message thread pointer into the message inbox in place of the selected message thread in response to the characteristics of the message thread satisfying the criteria.
US08880621B2 Load balancing in broker-based messaging systems and methods
An exemplary method includes a message broker subsystem receiving a message intended for delivery to a recipient software application instance, determining that the recipient software application instance is included in a plurality of functionally equivalent software application instances that are registered with a global directory service subsystem that is communicatively coupled to the message broker subsystem, automatically selecting a software application instance from the plurality of software application instances for receipt of the message in accordance with a load balancing heuristic, and attempting to deliver the message to the selected software application instance. Corresponding methods and systems are also described.
US08880620B2 Social graphing for data handling and delivery
Architecture that enables data handling according to types of social relationships. A social graph is used to categorize the types of the social relationships of the tagged messaging users. The social graph can include social relationship categories for friends, family, coworkers, and blocked individuals of the recipient, for example. The social graph can also include metadata related to the tagged users. The metadata defines the social relationship of the tagged users to the recipient. Delivery of messages to the recipient from the tagged messaging users is managed based on the social graph. Delivery management can include blocking messages, allowing the messages through, or delivering the messages with high or low priority, for example. Email messages can be delivered to respective email locations based on the social graph. User information can be imported and/or mined from external sources to augment the social graph.
US08880617B2 Method, apparatus and system for detecting unwanted digital content delivered to a mail box
Email messages stored on a mail server are filtered to identify the email messages that contain unwanted content. The mail server receives incoming email messages over a network. A content filter performs an initial scan to identify the incoming email messages that contain unwanted content by determining whether signatures associated with the email messages are included on a list of signatures that identify email messages that are known to include unwanted content. The email messages that are not identified as containing unwanted content are forwarded to appropriate mail boxes on the mail server. Multiple scanning threads perform a subsequent scan of the email messages in the mail boxes to identify those email messages containing unwanted content that were not identified by the initial scan. The subsequent scan determines whether signatures associated with the email messages in the mail boxes are included in an updated list of the signatures.
US08880616B2 Method and system for distributing contents to a plurality of users
A method for distributing contents to several users, wherein users are interconnected as members of one or more groups and wherein the group members can be pre-arranged from the user side is characterized in that based on his context a user can select one or more content from offered contents, in that the selected contents are dynamically personalized by taking advantage of a correlation of selected contents on the one hand and a group on the other hand by embedding communication triggers into the contents to initiate a communication with a group, and in that the personalized group-related contents are pushed to the members of the group.
US08880615B2 Managing a workflow using an instant messaging system to gather task status information
A method and system for managing a workflow using instant messages to determine the statuses of interdependent tasks. First and second tasks of the workflow are determined to be interdependent, whereby the first task is required to be completed before the second task is started. After receiving a first instant message (IM) that responds to an IM-based first query requesting a status of the first task, the first IM is determined to include key word(s) indicating that the first task is completed. An IM-based second query requesting a status of the second task is sent. After receiving a second IM that responds to the second query, the second IM is determined to include the key word(s) indicating that the second task is completed.
US08880608B1 Social affinity on the web
Methods, systems, and apparatus, including computer programs encoded on computer storage devices, for determining social affinities from public data. In one aspect, a method computes numeric affinity scores or weights between pairs of network identities, e.g., identities made public by users of social web sites on the Internet, where the pairs of identities appear to represent pairs of individual people, using explicit and inferred social connections obtained from public user data on the Internet. Some of the system and methods explore all social connections (paths) between any given pair of vertices X and Y in the weighted graph data structure of such social connections and aggregates information about their number and relative strength to produce the affinity score from X to Y.
US08880607B1 Generating suggestions for user groups in social networks
Implementations of the present disclosure include generating one or more suggested social circles based on an analysis of past user interactions. The user can accept the suggested social circle and use it to distribute digital content. Generating a suggested social circle can include determining, for each of various sets of contacts, an initial score that represents a strength of the particular user's affinity to the set as a whole based on prior interactions of the particular user with the set, and determining, for each member of each set, an individual score that represents an average strength of the particular user's affinity to the member based on the interactions. An overall score for each set is calculated based on the initial score for the set and the individual scores of each member in the set. Based on the overall scores, at least one of the sets is identified for presentation as a suggested social circle to the particular user. Social circle data corresponding to the suggested social circle is transmitted to display a representation of the suggested social circle on a client device associated with the particular user.
US08880603B2 Peer to peer (P2P) operation by integrating with content delivery networks (CDN)
A method and apparatus for use in a network storage control peer (NSCP) supporting peer to peer (P2P) operation are disclosed. The method includes receiving information from a tracker, wherein the information includes swarm stats, selecting and joining a swarm based on the received information, receiving a first stat report from the tracker, wherein the stat report includes additional swarm stats, determining whether to upload information to an ingestion gateway based on the received first stat report, transmitting an upload request message to the ingestion gateway, receiving an upload response from the ingestion gateway, and transmitting a second stat report to the tracker; wherein the second stat report includes a uniform resource identifier (URI) for the uploaded information.
US08880601B2 Arrangement and method for transport sharing within a trusted network
An arrangement, of functionally connected electronic devices includes: a data input entity, configured to obtain user in-formation relative to a plurality of users, data indicative of trust between multiple users and data indicative of a number of ride requests and ride offers by the users, a trust network knowledgebase entity configured to establish and manage a number of trust networks on the basis of the obtained data. The knowledgebase entity groups a plurality of users into a number of trust networks, a scheduling entity configured, on the basis of the obtained data, to determine a potential transport sharing scenario for a plurality of users belonging to the same trust network. The scheduling entity is configured to find potential matches between the ride requests and ride offers to determine the scenario, and a data output entity configured to indicate the scenario to multiple users of the plurality.
US08880599B2 Collection digest for a media sharing system
A system and method are disclosed for providing a collection digest summarizing a shared media collection for presentation to a user. In one embodiment, a user device of a user joins a media sharing system including the user device and one or more other users devices, each associated with a sharing user and hosting a shared media collection of the sharing user. The user device obtains a collection digest from at least one of the other user devices that summarizes the shared media collection hosted by the at least one of the other user devices and presents the collection digest to the user. The collection digest may be used to assist the user in determining whether to access the shared media collection.
US08880598B2 Emulation of room lock and lobby feature in distributed conferencing system
Architecture for a session lock and lobby feature in a distributed conferencing framework for a conferencing session. Under a lock scenario, once a user enters the session, the session can be locked to prevent other individuals from entering, even if the individuals were invited to the session. Locking can be accomplished manually by a session participant and/or automatically based on criteria. The lobby feature allows a session participant to be aware of users in the lobby and pending access to the session by providing notification and/or identification of the user attempting to gain access. The session leader can selectively allow access to the session. The architecture facilitates lock and lobby features in multiple identical, leaderless, conference servers which together form a distributed conferencing system. The lock and lobby features can employ media session protocols such as session initiation protocol (SIP) and centralized conference control protocol (C3P).
US08880595B2 Asynchronous, passive knowledge sharing system and method
A system for knowledge sharing comprises a remote electronic device comprising distribution means configured to automatically determine that one or more sender constraints are met for a plurality of first data entities; data gathering means configured to allow the reception of the plurality of first data entities from the remote electronic device, subject to one or more recipient constraints; and store the received plurality of first data entities in a database of the electronic device; matching means configured to identify a relevance of one or more of the plurality of first data entities when generating a new data entity on the electronic device; display means configured to display one or more of the identified first data entities when generating the new data entity; and editing means configured to use data from one or more of the displayed first data entities for generating the new data entity.
US08880594B2 Computer networking system and method with Javascript execution for pre-fetching content from dynamically-generated URL
An apparatus, method, and non-transitory computer-readable medium comprising program code which when executed by an apparatus causes the apparatus to effect the method, for pre-fetching web content. Preferably, a proxy server performs the pre-fetching. Techniques such, for example, as executing Javascript in pre-fetched pages, modifying pre-fetched pages to address URL generation involving random numbers or dates, using cookie information or browser specifics when performing pre-fetching of pages, and injecting Javascript to measure response time may be performed, by way of example.
US08880591B2 Workflow management in distributed systems
The workflow management system provides automatic management and execution of workflows that include both automated and user-driven actions. The system monitors connected external systems and/or users for the occurrence of events, which trigger the execution of one or more workflow plans. Each workflow plans consists of a plurality of actions and user actions to be performed in a sequential manner. Actions are executed automatically by the system, but user actions are executed asynchronously due to the inclusion of users in the workflow plan. The system handles the asynchronous nature of user actions by maintaining a pending user action database that users can access to view pending user actions, complete user actions, and reserve user actions for subsequent completion.
US08880590B2 Information processing apparatus and execution control method
Provided an information processing apparatus including a communication unit, an acquisition unit that acquires an application from an external storage apparatus each time processing concerning execution is started, a determination unit that determines whether the external storage apparatus acting as an acquisition source is registered, a first determination unit that determines whether to execute the application based on a user's operation if it is determined that the external storage apparatus is not registered, a communication processing unit that performs communication with an authentication server if the first determination unit determines to execute the application, a second determination unit that determines whether to execute the application based on an authentication result transmitted from the authentication server, and an execution processing unit that selectively executes the acquired application if the determination unit determines that the external storage apparatus is registered or the second determination unit determines to execute the application.
US08880589B2 Signature based map caching
Systems, methods, and computing devices for building, operating and using map systems with signature-based map caches are disclosed. Based on the desired map properties included in a formatted map request, a map signature can be generated. The map signature can be used to access a signature based map cache to determine whether a map with identical map properties has been previously generated and stored in cache or otherwise available for retrieval. If the map signature exists in the map cache, the corresponding map can be delivered to a map client. If the map signature does not exist in the map cache, then a map can be generated or rendered based on the map properties in the map request. Once the map is generated, it can be saved to the map cache along with associated map signature for future retrieval.
US08880587B2 System and method for delivery of content objects
Techniques for delivering content to an end user device are disclosed. A policy server performs an ingest process in which multiple versions of a content object are created. The multiple versions of the content object are associated with a single network identifier which can be distributed to publishers of the content object. When the content object is requested using the single network identifier, the policy server determines a preferred version and delivery orchestration scheme from among the multiple versions for delivery to an end user device based on several criteria. The policy server may thereafter orchestrate delivery of the preferred version of the content object to the end user device. The single network identifier may be associated with an edge location in a content delivery network (CDN) and the policy server may orchestrate delivery in cooperation with servers at the CDN edge location.
US08880586B2 Metadata subscription registry
Updated metadata can be requested from a set of remote servers according to a subscription registry. The subscription registry can include information for retrieving metadata from the remote servers. The requested updated metadata can be received from the remote servers. The metadata can be impact analysis and lineage metadata, and it can be requested from and received at an impact analysis and lineage metadata service. In addition, at least a portion of the metadata from the remote servers can be parsed, and a reference to a new remote server can be discovered in the metadata. Information for retrieving metadata from the new remote server can be added to the subscription registry, and metadata can be retrieved from the new remote server according to the subscription registry.
US08880578B2 Hardware independent simple network management protocol based on a generic data collection scheme
A method and/or a system for a generic agent in a managed network are disclosed. In one embodiment, a method of a generic simple network management protocol (SNMP) module on a network node includes communicating with a device succeedingly coupled to the network node using a data collector module assigned to the device. The method also includes translating data passed between the device and a management module managing the device based on a simple network management protocol.
US08880570B2 Information processing system, information processing apparatus, information processing method, and computer readable medium
An information processing system includes a first information processing apparatus, a second information processing apparatus, and a third information processing apparatus. The first information processing apparatus includes a collecting unit that collects information, a generating unit that generates first and second deleting conditions, an adding unit that adds the first and second deleting conditions to the information, and a first transmitting unit that transmits the information including the first and second deleting conditions added thereto. The second information processing apparatus includes a first receiving unit that receives the transmitted information, a first storing unit that stores the received information, a second transmitting unit that transmits the stored information, and a first deleting unit that deletes the information. The third information processing apparatus includes a second receiving unit that receives the transmitted information, a second storing unit that stores the received information, and a second deleting unit that deletes the information.
US08880568B2 Report generation for a navigation-related database
Systems, devices, features, and methods for updating a geographic database, such as a navigation-related database, and/or reporting discrepancies associated with geographic data of the geographic database are disclosed. For example, one method comprises capturing a photograph of an observed geographic feature in a geographic region. Comment information corresponding to the observed geographic feature may be stored. The comment information is indicative of a discrepancy between the observed geographic feature and the geographic data corresponding to the geographic region. The comment information may be associated with the photograph to generate a report, and the report is transmitted.
US08880567B2 Discovery and management of configuration data contained within mashups
A computer program product for discovering and distributing relevant business information contained in a mashup comprises computer usable program code is configured to interrogate a mashup maker to discover the elements, relationships, and dependencies embodied by a mashup page; assemble this information into a data structure; and make the data structure accessible. A method for updating a configuration management database, where an end user creates a mashup page that embodies the end user's knowledge about the elements and processes required to fulfill a specific task, comprises deriving elements, relationships, and dependencies from the mashup page; creating a data structure representing this information, and communicating this data structure to the configuration management database.
US08880561B2 Computer system and computerized method for storing business objects and business mapping data
A computerized method for accessing a business object for a user defined process includes receiving at a computer system a request for generation of a user process for access to a business object, and generating via the computer system an SADL (Service Adaptation Definition Language) from a data mapping of business object data of the business object, wherein the data mapping includes a mapping of the data mapping. The computer method further includes generating via the computer system a plurality of artifacts to support the user process, wherein the SADL file is an artifact for designing the user process at a design time and for run time execution of the user process.
US08880557B2 Method, program, and system for dividing tree structure of structured document
A method and system for dividing a tree structure of a structured document based on a tree structure defined by a schema of the structured document. The method includes the following steps: calculating an index value of size of a subtree having each element as a root for at least part of at least one element included in the tree structure defined by the schema, and deciding on a division pattern using the index value, where the division pattern is used to divide the tree structure of the structured document to which the schema is applied so that the size of the subtree, after being divided, meets a predetermined standard.
US08880555B2 Ranking of address book contacts based on social proximity
In one embodiment, a user of a social networking system requests to look up an address book maintained by the social networking system. The social networking system improves the look up search results by ranking one or more contacts in the address book based on social graph, social relationship and communication history information.
US08880549B2 Concurrent database access by production and prototype applications
A database manager, computer program product and methods for managing a database utilized by multiple applications. In one embodiment, the database manager performs a database record change to database records by a first application. The database manager branches the database records such that the database record change is visible to the first application and is not visible to one or more other applications accessing the database. The database manager can merge database record changes made by the other applications such that database schema changes made by the other applications are visible to the first application.
US08880544B2 Method of adapting a uniform access indexing process to a non-uniform access memory, and computer system
Method and apparatus for constructing an index that scales to a large number of records and provides a high transaction rate. New data structures and methods are provided to ensure that an indexing algorithm performs in a way that is natural (efficient) to the algorithm, while a non-uniform access memory device sees IO (input/output) traffic that is efficient for the memory device. One data structure, a translation table, is created that maps logical buckets as viewed by the indexing algorithm to physical buckets on the memory device. This mapping is such that write performance to non-uniform access SSD and flash devices is enhanced. Another data structure, an associative cache is used to collect buckets and write them out sequentially to the memory device as large sequential writes. Methods are used to populate the cache with buckets (of records) that are required by the indexing algorithm. Additional buckets may be read from the memory device to cache during a demand read, or by a scavenging process, to facilitate the generation of free erase blocks.
US08880543B2 Aggregation system for downloading resources
Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method for aggregating data rates. The method comprises identifying plural mobile devices configured for communication with a carrier-associated network for downloading network resources, and creating a data bundle representing data download capacity to be shared among mobile devices for data downloads from the network. The method further comprises negotiating a data bundle price with the carrier, and receiving requests from mobile devices for downloading network data. The method further comprises presenting data to a mobile device user that has provided a request, including rate information for initiating a download associated with the request, the rate information based on the negotiated price irrespective of airtime or data charges for the download ordinarily charged by the carrier. The method further comprises debiting a user account using a group price based on the rate information.
US08880542B2 Simply querying across time
A temporal relational database includes a relational database framework that allows for all the capabilities of a standard relational database with the addition of the concept of time. Transactions, which can be modifications of attribute values or changes to the database schema, can be stored with temporal histories. Through the use of these temporal histories, the temporal database is able to seamlessly respond to queries for times that are in the past, present, or future. Furthermore, transactions can be entered into the temporal relational database that are not effective until some point in the future, thus allowing for seamless migration of the data and schema of a database. Applications that access data in a temporal database may retrieve a time appropriate schema from the temporal database. An exemplary use of a temporal database to manage roles and responsibilities within an organization is described.
US08880533B2 Method and apparatus for enhancing electronic reading by identifying relationships between sections of electronic text
An apparatus, method and article of manufacture of the present invention detects the presence of references to the same concept in separate sections of text, and, with no input required from the reader, presents the reader with information concerning the detected references to the concept. The information provided may comprise information related to the location of the reference to the concept in other sections of text, and the reader also is provided the ability to move from one reference to a concept directly to another reference to the same concept.
US08880522B2 Generating reports in an online services system
A system and method for performing security assessments in an online services system. In one embodiment, the method includes receiving a list of target data for a report; and generating fields in the report. The method also includes populating the fields with composite information; receiving a command to execute the report; fetching the target data using the composite information; and populating the report with the target data.
US08880517B2 Propagating signals across a web graph
Methods, systems, and computer-readable media for a method of propagating signals across a web graph. A signal describes a document or otherwise provides useful information about a document in a web graph. A web graph is a collection of documents that are related to one another through links, such as hyperlinks. The signals are propagated in the sense that information from the related pages is associated with the target page even though the information may not be directly found in the target page. This information may then be used by a search engine to determine that a particular page is relevant to a search query.
US08880516B2 Endorsing local search results
Methods and systems for improving user search experience with a search engine by providing a way for associated users to create and share personalized lists of local search results and/or advertisements through endorsements of such local search results and/or ads. Local search endorsements can be used to personalize the search engine's ranking of local search results by offering a way for users to re-rank the results for themselves and for those who trust them.
US08880514B2 Terminology-based system for supporting data object definition
The present invention relates to a terminology-system-based system for supporting data object definition, which delimits a concept by means of a qualifier. The terminology-system-based system for supporting data object definition stores a terminology system in which a concept is structured to a terminology object and a terminology relation, and stores a data object for the concept in order to define a data object for a selected concept (hereinafter, referred to as a corresponding concept). The terminology-system-based system for supporting data object definition comprises a qualifier recommendation unit, which receives a qualifier of the selected corresponding concept to define the corresponding concept, searches for a data object which is stored and defined as a concept which is the same as the corresponding concept (hereinafter, referred to as the same concept), and recommends a qualifier of the object. According to the above-described system, qualifiers of data objects to be newly defined are recommended by utilizing a constructed terminology system and construction information on predefined data objects. Therefore, new data objects can be more systematically and conveniently defined.
US08880512B2 Method, apparatus and system, for rewriting search queries
A search system includes: a data rewriting system that obtains, from a database, one or more search term candidates that are relevant to a present search query. The data rewriting system retrieves properties of the present search query and the one or more search term candidates, where the properties describe respective matching results of the present search query and the one or more search term candidates. Based at least in part on the matching results, the data rewriting system determines whether or not the present search query needs to be rewritten, and rewrites the present search query based at least in part on the matching results to provide a rewritten present search query if it is determined that the present search query needs to be rewritten. A search engine performs a search based at least in part on the rewritten present search query.
US08880511B2 Database query optimization and cost estimation
Described are systems and methods relating to database query optimization and query cost estimation. The approach is described in the context of searching balanced and semi-balanced tree indexes such as B-trees, B+ trees, and R-B trees. The described approach may be used for both simple and composite queries, and the described approach may be used for relational queries, i.e., where a variable is less than or greater than a certain value and the database is being used to find the set of records that satisfy the relation. Further, the described approach may be used for generalized N-ary tree queries and cost estimations.
US08880510B2 Unique value calculation in partitioned tables
An estimation algorithm can generate a uniqueness metric representative of data in a database table column that is split across a plurality of data partitions. The column can be classified as categorical if the uniqueness metric is below a threshold and as non-categorical if the uniqueness metric is above the threshold. A first estimation factor can be assigned to the column if the column is classified as categorical or a larger second estimation factor can be assigned if the column is non-categorical. A cost estimate for system resources required to perform a database operation on the database table can be calculated. The cost estimate can include an estimated total number of distinct values in the column across all of the plurality of data partitions determined using the assigned first estimation factor or second estimation factor and a number of rows in the table as inputs to an estimation function.
US08880509B2 System and method for caching database reports
A method of generating predictive reports includes recording a user identification, a timestamp including a connection date, and a query associated with report requested by a user from a database system for each connection of the user identification to the database system during a predetermined period. A plurality of intervals is defined in the predetermined period. Retrieved are instances of the user identification associated with connections of the user identification to the database system during a threshold number of the plurality of intervals based on a position that a current date occupies in a current interval, such that a position of each connection date in a respective interval is the same as the position that the current date occupies in the current interval. The query is executed to generate the report from the database system on the current date prior to a request for the report from the user.
US08880507B2 Longest prefix match using binary search tree
Longest Prefix Match (LPM) is implemented using a binary tree based search algorithm. Masked entries are stored in a plurality of binary search engines, wherein each of the binary search engines stores masked entries of a corresponding mask length. A search value is applied to each of the binary search engines in parallel. The search value is masked within each of the binary search engines, thereby creating a plurality of masked search values, each having a masked length equal to the mask length of the corresponding binary search engine. Each of the masked search values is compared with the masked entries of the corresponding binary search engine. An LPM result is selected from the binary search engine that detects a match, and has the longest corresponding mask length. Alternately, each binary search engine stores masked entries of N mask lengths, and N consecutive comparisons are performed to identify the LPM.
US08880505B2 Method and computer program for evaluating database queries involving relational and hierarchical data
A method and apparatus for resolving conjunctive queries, comprising relational predicates and external predicates, such as XML predicates. The method and apparatus obtain results from a relational engine or from an external engine, and then use the obtained results as input for the other engine, so as to optimize the activity of the other engine. The process may repeat further times, with the results obtained by the other engine being input to the first engine. The method and apparatus further disclose handling value, being isomorphic hierarchical subtrees.
US08880504B2 Tag management device, system and recording medium
A tag management device executes a process including adding, to data received, sort-free identifiers that identifies receiving order, and are monotonically increasing or monotonically decreasing numbers or character strings arranged in alphabetical order or a combination thereof; storing, sequentially in a first storing unit associated with a tag that is added to the received data, the identifiers added at the adding; storing, sequentially in a second storing unit in an associated manner, the received data and the identifiers added at the adding; and searching, when a storing unit associated with a tag to be searched for is the first storing unit, data associated with the tag to be searched for by joining, using an inner join or an outer join, information stored in the first storing unit and information stored in the second storing unit.
US08880499B1 Personalizing aggregated news content
A system customizes a news document associated with a user of a news aggregation service. The system includes a remote news aggregation server configured to create a news aggregation service document based on a request received from the user. The remote news aggregation server identifies news content from a plurality of news source servers based on the received request and presents the identified news, content in the news aggregation service document. The remote news aggregation server is further configured to receive a request from the user to remove a news item from the presented news content and removing the requested news item from the identified news content. Updated news content is presented in an updated news aggregation service document.
US08880494B2 Longest prefix match scheme
A LPM search engine includes a plurality of exact match (EXM) engines and a moderately sized TCAM. Each EXM engine uses a prefix bitmap scheme that allows the EXM engine to cover multiple consecutive prefix lengths. Thus, instead of covering one prefix length L per EXM engine, the prefix bitmap scheme enables each EXM engine to cover entries having prefix lengths of L, L+1, L+2 and L+3, for example. As a result, fewer EXM engines are potentially underutilized, which effectively reduces quantization loss. Each EXM engine provides a search result with a determined fixed latency when using the prefix bitmap scheme. The results of multiple EXM engines and the moderately sized TCAM are combined to provide a single search result, representative of the longest prefix match. In one embodiment, the LPM search engine supports 32-bit IPv4 (or 128-bit IPv6) search keys, each having associated 15-bit level 3 VPN identification values.
US08880492B2 Keyword suggestion for efficient legal E-discovery
Given a set of documents relevant to a litigation hold and a seed set of keywords, a second set of keywords can be generated and suggested to a user. Each document in a training set of documents is given an indication of relevance. Based on the indication of relevance, a set of further keywords relevant to the litigation is extracted from the documents and suggested to a user. The suggested set of keywords may or may not include keywords in the seed set. Additionally, the suggested set of keywords may be related to the seed set of keywords.
US08880491B2 Systems and methods to play media content selected using a portable computing device on a display device external to the portable computing device
A particular method includes identifying, at a portable computing device, media content that is accessible from a remote computing device via a network. The method includes receiving user input associated with a particular media content item of the identified media content. The user input indicates selection of a send media to a second device option associated with the particular media content item. The method includes generating a message in response to the user input, wherein the message includes information identifying the particular media content item. The method also includes sending the message from the portable computing device to an application server that provides media content to a set top box device. In response to the message, the application server sends information to the second device that causes the set top box device to automatically play the particular media content item.
US08880481B1 Inverse distribution function operations in a parallel relational database
Inverse distribution operations are performed on a large distributed parallel database comprising a plurality of distributed data segments to determine a data value at a predetermined percentile of a sorted dataset formed on one segment. Data elements from across the segments may be first grouped, either by partitioning keys or by hashing, the groups are sorted into a predetermined order, and data values corresponding to the desired percentile are picked up at a row location of the corresponding data element of each group. For a global dataset that is spread across the database segments, a local sort of data elements is performed on each segment, and the data elements from the local sorts are streamed in overall sorted order to one segment to form the sorted dataset.
US08880476B2 Low-overhead enhancement of reliability of journaled file system using solid state storage and de-duplication
A mechanism is provided in a data processing system for reliable asynchronous solid-state device based de-duplication. Responsive to receiving a write request to write data to the file system, the mechanism sends the write request to the file system, and in parallel, computes a hash key for the write data. The mechanism looks up the hash key in a de-duplication table. The de-duplication table is stored in a memory or a solid-state storage device. Responsive to the hash key not existing in the de-duplication table, the mechanism writes the write data to a storage device, writes a journal transaction comprising the hash key, and updates the de-duplication table to reference the write data in the storage device.
US08880473B1 Method and system for providing storage checkpointing to a group of independent computer applications
A system and method for storage checkpointing to a group of independent computer applications. The system has a storage disk that stores files; a storage access interface to access the storage disk; and a computer. The computer runs the group of independent computer applications and utilizes the files stored on the storage disk. A file system on the server accesses the files stored on the storage disk. An operating system and at least one device driver can be called by the file system, and at least one buffer buffers first data written to the storage disk and second data read from the storage disk.
US08880470B2 Method and system for performing live migration of persistent data of a virtual machine
A disclosed method includes distinguishing static and dynamic persistent data, copying the static persistent data at the source data store to the destination data store on a basis of frequencies of updates, copying the dynamic persistent data to the destination data store, updating a bitmap data structure during the copying of the dynamic persistent data to indicate which blocks of the dynamic persistent data have been modified during the copying step, identifying the blocks that have been modified during the copying step using the bitmap data structure, and iteratively copying the identified blocks to the destination data store. The method may further include determining when the number of the identified blocks is below a predetermined threshold and suspending the virtual machine prior to the next copying step.
US08880464B1 Methods and apparatus for synchronizing closed heterogenous systems
Methods, systems, and computer program products for synchronizing a first closed system with a second closed system are disclosed. A first transaction synchronization function on a first computing device receives a first plurality of user transactions and stores corresponding transaction records in a first synchronization file in a common format. The first transaction synchronization function submits the first plurality of user transactions to the first closed system via a first vendor interface for application to a first database. A second computing device accesses the first synchronization file, translates the transaction records in accordance with a second vendor interface, and submits the translated transaction records to a second closed system via a second vendor interface for application to a second closed system.
US08880463B2 Standardized framework for reporting archived legacy system data
Legacy computing system archive files may have unique data structures designed for long-term data retention purposes and not particularly suited for data mining, querying, and other data collection functions needed to prepare certain types of reports. A report specific template may be created to facilitate the extract of specific legacy system data necessary to complete report that is stored in legacy system archive files. Once the data objects containing information relevant to the report have been identified, a hierarchical list of tables and fields of each table associated with each identified data object may be obtained from an external data source for further selection. Copies of the selected table and/or field data may then be extracted, compared, and merged with other data, such as other field and table data, obtained from other sources.
US08880462B2 Method, system and apparatus for providing information to client devices within a network
A method (40), system (10) and control device (14) are provided for delivering information, such as Emergency Alert System (EAS) information, to one or more client devices (16) in a network, e.g., a home network or business network. The control device (14), which is connected to the client devices (16) via a suitable home or business network connection, receives information, such as EAS information, from an appropriate transmission source (22). The control device (14) performs any one or more of a number of functions that allows the information to be properly received by appropriate client devices (16). Such functions include formatting or encoding the information as needed by the client devices (16) to properly receive the information. Also, using a tuner (38), the control device (14) can be tuned to an appropriate channel for providing the information to the appropriate client devices (16).
US08880460B2 DVIVD match audit system and 5 star event data recorder method thereof
A live dual audit system and recorder method validating and independently verifying element effort event data, assigning audit levels to element effort reports displaying audit level icons whether effort event data is submitted by effort owner or generated by the system's dynamic method, and whether the effort is acknowledged by the project owner. A semi-automated first audit examines repository auditor input effortology decisions against provided effort exhibit data. A fully automated second audit examines dynamically generated system effort data against repository data. A DVIVD event data match audit recorder displays real time dynamic dual audit test reports with each effort audit level movement, and indicates any element effort audit mismatch data system location. An element's audited effort dataset level is displayed in the DVIVD event data match audit recorder until all dataset requirements are fulfilled and satisfy that element's highest audit level, and displays a “System Audit Certified” icon report.
US08880457B2 Method and system for recommending a decision based on combined entity modeling
A method for improved, automated analysis of a data set improves the reliability of the data set by comparing the data set with a model of similar data. The method may be used in applications such as medical imaging, clinical trial participant selection, marketing, security, traffic control, and other applications.
US08880456B2 Analyzing genome sequencing information to determine likelihood of co-segregating alleles on haplotypes
Sequencing information is used to correlate alleles at certain locations to alleles at other locations. The statistical information from the reads of fragments in a sample can be used to determine the phasing of haplotypes and to correct or confirm based calls at the locations. In one example, a confidence value (strength score) is determined for a particular hypothesis, which can include whether two alleles are on a same haplotype at two particular loci, as well as what the alleles are on another haplotype (e.g. for a diploid organism). The strength can include a positive contribution from data that is consistent with the hypothesis and a negative contribution from data is that inconsistent with the hypothesis, where both values can be used in a formula to determine the strength.
US08880455B2 Medical decision making support apparatus and control method for the same
A medical decision making support apparatus performs the inference processing of obtaining an inference result by performing inference processing associated with medical diagnosis based on a plurality of pieces of input medical information, and the calculation processing of calculating the degree of denial or affirmation of the inference result in association with each of a plurality of partial sets including each medical information extracted from the plurality of pieces of medical information as an element. The medical decision making support apparatus presents a user an inference result obtained by the inference processing and negative information indicating medical information included in a partial set, of the plurality of partial sets, for which the degree of denial is calculated by the calculation processing.
US08880454B2 Clinical decision support systems for managing subscriptions to rule content
A system includes a centralized repository for tracking rule content and managing subscriptions to rule content by organizations and providers utilizing the system; a rule-evaluation server for receiving requests for rule-evaluations for specific patients, wherein the server determines content needing to be evaluated and retrieves the content to be used; a rule engine for performing the evaluations, wherein content, patient data, and rule evaluation parameters are provided to the engine, and the engine returns recommendations triggered by the evaluation, if any; an aggregator for aggregating recommendations from multiple sources, detecting and coordinating related recommendations, and applying configuration settings based on the patient and/or provider in context; and a client component for coordinating communication between an electronic health records system, the server, and the aggregator.
US08880446B2 Predictive analytics factory
An apparatus, system, method, and computer program product are disclosed for a predictive analytics factory. A receiver module is configured to receive training data. A function generator module is configured to determine a plurality of learned functions from multiple classes based on the training data. A predictive compiler module is configured to form a predictive ensemble comprising a subset of learned functions from the plurality of learned functions. The subset of learned functions is from at least two of the multiple classes.
US08880445B2 Method and apparatus for performing dynamic textual complexity analysis using machine learning artificial intelligence
A data processing system including one or more client devices, wherein each client device is connected to a network system and a data center unit. The data center unit includes a network interface unit, a user interface, one or more storage devices, wherein the one or more storage devices comprise one or more databases. Further, the data center unit includes a storage device controller and database manager for controlling the operation of storage devices and databases, a web server for providing web services to clients, a database server for providing database services to the one or more clients and a machine learning artificial intelligence application server for predicting textual complexity of data. The machine learning artificial intelligence application server includes one or more databases for storing data used to refine textual complexity analysis for improved accuracy of textual complexity predictions.
US08880444B2 Audio based control of equipment and systems
A method for controlling a device responsive to an audio signal captured using an audio sensor. A data processor is used to automatically analyze the audio signal using a plurality of semantic concept detectors to determine corresponding preliminary semantic concept detection values, each semantic concept detector being adapted to detect a particular semantic concept. The preliminary semantic concept detection values are analyzed using a joint likelihood model based on predetermined pair-wise likelihoods that particular pairs of semantic concepts co-occur to determine updated semantic concept detection values. One or more semantic concepts are determined based on the updated semantic concept detection values, and the device is controlled responsive to identified semantic concepts. The semantic concept detectors and the joint likelihood model are trained together with a joint training process using training audio signals, at least some of which are known to be associated with a plurality of semantic concepts.
US08880442B2 Method for generating a machine heartbeat
A method and system for generating a heartbeat of a process including at least one machine configured to perform a process cycle consisting of a plurality of timed events performed in a process sequence under an identified condition includes determining the duration of each of the timed events during the process cycle performed under the identified condition, ordering the durations of the plurality of timed events in the process sequence, and generating a heartbeat defined by the ordered durations of a process cycle. The identified condition may be one of a design intent, baseline, learnt, known, current or prior condition. The variance of the heartbeat between a first and at least a second identified condition may be analyzed to monitor and/or control the process or machine. The system may display the process heartbeat information and may generate a message in response to the heartbeat and/or variance thereof.
US08880441B1 Click stream analysis for fraud detection
An improved technique trains a fraud detection system to use mouse movement data as part of a user profile. Along these lines, a training apparatus receives sets of mouse movement datasets generated by a legitimate user and/or a fraudulent user. The training apparatus assigns each mouse movement dataset to a cluster according to one of several combinations of representations, distance metrics, and cluster metrics. By correlating the clusters with the origins of the mouse movement datasets (legitimate or fraudulent user), the training apparatus constructs a robust framework for detecting fraud at least partially based on mouse movement data.
US08880440B2 Automatic combination and mapping of text-mining services
Embodiments of systems and methods for automatic combination of text mining services, may comprise an instance generation component and an auto-mapping component. From common text sources, the instance generation component generates instances for taxonomy elements attached to a particular text mining service. These instances are then forwarded to the auto-mapping component, which computes a mapping between different taxonomies. This mapping may be saved to avoid repeated instance generation and mapping processes for similar taxonomies. The computed mapping may in turn be input to a result combiner element, together with extraction results from calling the different text mining services. The result combiner returns the merged result sets to the execution, and finally to the user or API.
US08880439B2 Robust Bayesian matrix factorization and recommender systems using same
In a recommender method, Bayesian Matrix Factorization (BMF) is performed on a matrix having user and item dimensions and matrix elements containing user ratings for items made by users in order to train a probabilistic collaborative filtering model. A recommendation is generated for a user using the probabilistic collaborative filtering model. The recommendation may comprise a predicted item rating, or an identification of one or more recommended items. The recommender method is suitably performed by an electronic data processing device. The BMF may employ non-Gaussian priors, such as Student-t priors. The BMF may additionally or alternatively employ a heteroscedastic noise model comprising priors that include (1) a row dependent variance component that depends upon the matrix row and (2) a column dependent variance component that depends upon the matrix column.
US08880438B1 Determining content relevance
System and methods allow for ranking relevance of parameters of a content item. A method includes: receiving, using at least one processing circuit, a plurality of parameters of a content item and a plurality of corresponding initial relevance scores of the parameters indicating relevance of the parameters to the content item; estimating, using a statistical model, a plurality of revised relevance scores from the initial relevance scores, wherein each of the revised relevance scores is a function of at least two of the plurality of initial relevance scores; and ranking the plurality of parameters based on the revised relevance scores.
US08880436B2 Automation system and method for a web-based implementation portal
Online collaboration through a web portal facilitates effective communication among all parties, regardless of their geographical and organizational boundaries. With the disclosed web-based implementation portal, project implementation according to various embodiments of the present invention, is no longer an abstract list of service pledges by banks. Companies can visualize at each stage exactly how a solution will be implemented for them. In some embodiments, through embedded workflow steps and pre-defined templates, the portal can standardize and automate the customer onboarding process. The process can be standardized and automated from the time the customer confirms subscription to specific commercial solutions to the time when these commercial products are implemented and used by the customer.
US08880430B1 Intelligent identification of on-line bank accounts utilized for business purposes
Computer-implemented methods, articles of manufacture and systems for identifying an on-line bank account utilized for business purposes. A computer processor receives or determines a name of on-line bank account entered by an account holder. The account name is tokenized or parsed into name segments, which are analyzed using a first or local set of rules that is applied to each individual segment to tag or assign a score to each individual segment, and a second or global set of rules are applied to multiple name segments or groups of segments. Scores generated by application of the first and second rule sets are used to determine whether the customer uses the account identified by the account name for business purposes.
US08880425B2 Mobile agent point-of-sale (POS)
Systems and methods are disclosed for conducting transactions and financial transfers utilizing a mobile device communicatively coupled with a mobile communications network and executing a mobile point-of-sale application. According to some embodiments, the mobile point-of-sale application is adapted to conduct money transfer transactions by communicating transaction information through the mobile communications network to a money transfer provider system that processes the money transfer and communicates receipt information to the mobile point-of-sale application. Additionally, according to some embodiments, an account associated with an agent of the money transfer provider can be used in money transfer transactions conducted by the mobile point-of-sale application.
US08880423B2 Inventory estimation for search retargeting
Techniques for estimating advertisement inventory for search retargeting segments are provided. A total inventory for each cluster of a plurality of clusters is estimated based on a history of previously viewed pages and previously used search keywords that were submitted by users is searches performed prior to accessing the previously viewed pages. A search retargeting (SRT) segment is received that includes a set of search keywords. The SRT segment is received in a request for deliverable advertisement inventory for advertisements associated with the SRT segment. A deliverable inventory for the received SRT segment is estimated based on the estimated total inventories for the clusters.
US08880422B1 Energy high performance capability assessment
A high performance capability assessment model helps an energy industry business meet the challenges of the global marketplace. As a result, the energy industry business can achieve the clarity, consistency, and well-defined execution of core processes that reduce inefficiencies and waste that result from unnecessary process complexity and exceptions. In addition, the high performance capability assessment model helps the energy industry business to identify specific areas in which improvements may be made and understand how to make the improvements, and establishes levels of capability along the way to reaching an ultimate capability goal.
US08880420B2 Utility for creating heatmaps for the study of competitive advantage in the restaurant marketplace
A utility builds and displays heatmaps of competitive activity that aid in studying the competitive advantage of a particular restaurant. The heatmaps are constructed based on activity logged with a restaurant service, and available within the restaurant service's database(s).
US08880418B2 Workflow process consolidation
A workflow server is connected with operating computer terminals through a network to manage workflow. The workflow server consolidates information necessary for processing multiple consecutive nodes to be processed by one participant operating one of the operating computer terminals, and sends the consolidated information to the operating computer terminal concerned.
US08880417B2 System and method for ensuring accurate reimbursement for travel expenses
An Expense Verification System (EVS) checks for fraud/errors in reimbursement requests. The EVS stores rules for reimbursement in accordance with company policies. The EVS receives travel reservation records for auditing, parses the records to identify a reference number, and then obtains from a trusted source travel record data for a corresponding reference number. Trusted data is compared to company policy-specific rules to determine compliance. In one embodiment, an extracted fare basis identifier is compared to lists of permitted and/or prohibited fare basis codes in the rules to determine compliance. In another embodiment, data is extracted from acknowledgment receipt records from a trusted data source and extracted booking and travel dates are compared to the rules to determine compliance. The EVS issues an alert in the event of non-compliance.
US08880413B2 Binaural spatialization of compression-encoded sound data utilizing phase shift and delay applied to each subband
The invention is aimed at improving the quality of the filtering by transfer functions of HRTF type of signals (L, R) compressed in a transformed domain, for binaural playing on two channels (L-BIN, R-BIN), using a combination of HRTF filters (hL,L, hL,R) including a decorrelated version (HRTF-C*, HRTF-E*) of a few of these filters. For this purpose, a decorrelation cue is given with spatialization parameters (SPAT) accompanying the compressed signals (L, R). The Decorrelation comprises applying a different phase shift to each subband of the input signal combined with addition of an overall delay. The invention makes it possible to improve the broadening in the binaural rendition of audio scenes initially in a multi-channel format.
US08880407B2 Projector, projection system, and retrieved information displaying method
A projector includes a display part configured to display a first image by projection; a retrieval object specifying part configured to cause a user of the projector to specify an object of retrieval; a result display area specifying part configured to cause the user to specify an area for displaying the result of the retrieval in the displayed first image; and an image combining part configured to receive a second image of the result of the retrieval from a server that has performed the retrieval with respect to the object of retrieval specified by the user, and to display the second image by combining the second image with the area for displaying the result of the retrieval in the displayed first image.
US08880400B2 Voice recognition device
Voice recognition is realized by a pattern matching with a voice pattern model, and when a large number of paraphrased words are required for one facility, such as a name of a hotel or a tourist facility, the pattern matching needs to be performed with the voice pattern models of all the paraphrased words, resulting in an enormous amount of calculation. Further, it is difficult to generate all the paraphrased words, and a large amount of labor is required. A voice recognition device includes: voice recognition means for applying the voice recognition to an input voice by using a language model and an acoustic model, and outputting a predetermined number of recognition results each including a set of a recognition score and a text representation; and N-best candidate rearrangement means for: comparing the recognition result to a morpheme dictionary held in a morpheme dictionary memory; checking whether a representation of the recognition result can be expressed by any one of combinations of the morphemes of the morpheme dictionaries; correcting the recognition score when the representation can be expressed; and rearranging an order according to the corrected recognition score so as to acquire recognition results.
US08880399B2 Utterance verification and pronunciation scoring by lattice transduction
In the field of language learning systems, proper pronunciation of words and phrases is an integral aspect of language learning, determining the proximity of the language learner's pronunciation to a standardized, i.e. ‘perfect’, pronunciation is utilized to guide the learner from imperfect toward perfect pronunciation. In this regard, a phoneme lattice scoring system is utilized, whereby an input from a user is transduced into the perfect pronunciation example in a phoneme lattice. The cost of this transduction may be determined based on a summation of substitutions, deletions and insertions of phonemes needed to transducer from the input to the perfect pronunciation of the utterance.
US08880397B2 Systems, devices and methods for list display and management
Exemplary embodiments provide systems, devices and methods that allow creation and management of lists of items in an integrated manner on an interactive graphical user interface. A user may speak a plurality of list items in a natural unbroken manner to provide an audio input stream into an audio input device. Exemplary embodiments may automatically process the audio input stream to convert the stream into a text output, and may process the text output into one or more n-grams that may be used as list items to populate a list on a user interface.
US08880393B2 Indirect model-based speech enhancement
Enhanced speech is produced from a mixed signal including noise and the speech. The noise in the mixed signal is estimated using a vector-Taylor series. The estimated noise is in terms of a minimum mean-squared error. Then, the noise is subtracted from the mixed signal to obtain the enhanced speech.
US08880392B2 Knowledge system method and apparatus
A method and apparatus for automating the acquisition, reconstruction, and generation of knowledgebases of associated ideas and using such knowledgebases in many application including machine translation of human languages, search and retrieval of unstructured text, or other data, based on concept search, voice recognition, data compression, and artificial intelligence systems.
US08880386B2 Method for circuit simulation
A computer-implemented method for simulating an electrical circuit. The method includes (a) setting a first temperature distribution in the electrical circuit, (b) performing an electrical simulation across the electrical circuit taking into consideration the first temperature distribution, (c) performing a thermal simulation across the electrical circuit taking into consideration a result of the electrical simulation, to obtain a second temperature distribution, and (d) determining whether a criterion for termination the simulation is met. If the criterion is met, terminate the simulation. If the criterion is not met, assign the second temperature distribution to the first temperature distribution, and repeat steps (b), (c), and (d).
US08880376B2 Apparatus and method for distinguishing between human being and animal using selective stimuli
An apparatus and method for identifying a human being and an animal are disclosed to properly identifying whether or not a target is a human being or an animal. The apparatus for distinguishing between a human being and an animal includes: a target stimulation unit generating a stimulation signals for selectively stimulating the senses of a human being and an animal and providing the generated stimulation signal to a target; and a target identifying unit detecting the reaction of a target to the simulation signal to identify whether or not the target is a human being or an animal.
US08880374B2 Charged particle beam device
Provided is a charged particle beam device wherein a secondary signal generated from an alignment pattern having known coordinate values in a sample coordinate system is detected, and a positional deviation quantity between the coordinate system of a sample (10) and the coordinate system of a stage (21) is calculated so as to generate coordinate correction data. At the time of observing a sample image, the secondary signal generated from the alignment pattern is detected at least once so as to perform realignment, and the coordinate correction data is updated. Thus, the charged particle beam device performs long-time inspection at a high observation magnification by accurately correcting the sample coordinate information obtained by temperature change, while suppressing device cost increase and throughput deterioration.
US08880368B2 Electric power system waveform search
The present disclosure relates to searching electric power system waveforms. Disclosed herein are various systems and methods for improving search performance through indexing electric power system waveforms using waveform attributes such as frequency, amplitude, angle, rate of change, and the like. According to some embodiments, multiple indexes may be used together to find information of interest. A reference signal may be utilized according to some embodiments. Normalizing a plurality of waveforms using a reference signal may facilitate the use of an index for comparing two arbitrary waveforms. This disclosure also relates to detecting and indexing islanding conditions in an electric power system. Various embodiments may utilize information relating to islanding conditions in connection with search operations.
US08880366B2 Modular, expandable measuring device comprising an access-protected area
Disclosed is a modular, expandable measuring device that includes an access-protected area. In one embodiment, the measuring device is a modular energy meter (EZ), which includes a two-part housing (SA, U) having a detachable connection for holding together the housing parts; at least one internal module (Z, K, IO, IR) arranged in a protected area; at least one external module (EO, ER, EK, EKR) arranged outside of the protected area; and at least one optical interface (OSE, OSI) which is arranged in the internal module (Z, K, IO, IR) and/or in the external module (EO, ER, EK, EKR) and is used for communication, including the detection of the opening of the protected area.
US08880360B2 Mirror with media display device
A combination mirror and media display device assembly is provided. The combination mirror and media display device includes a mirror platform having a media display device viewing area and a media display device coupled to the mirror platform. The media display device is positioned to display images through the media display device viewing area.
US08880351B2 Method and apparatus for analysis of tissue microarrays
The present techniques include methods and systems for finding correspondences between tissue spots in tissue microarray serial sections belonging to the same recipient block. The present techniques may also be used to relate individual tissue cores to clinical information. Using either a whole slide image or the relative x-y coordinates of the tissue spots on the slide, individual tissue spots in different tissue microarrays may be linked to one another and their clinical information.
US08880349B2 Mud pulse telemetry
Mud pulse telemetry. The various embodiments are directed to methods and systems of encoding data in a mud pulse telemetry system, where at least a portion of the data is encoded the time between pressure transitions. Moreover, the various embodiments are directed to detection methods and systems that detect the pressure transitions at the surface.
US08880348B2 Radon migration of acoustic data
Disclosed is a method implemented by a processor for imaging a formation penetrated by a borehole. The method includes: obtaining acoustic data in a depth-time domain using an acoustic downhole tool disposed at a depth in the borehole, the acoustic downhole tool having an acoustic source and an acoustic receiver; transforming the acoustic data in the depth-time domain into a Radon domain using a Radon transform; filtering the acoustic data in the Radon domain to increase a signal of interest in the acoustic data in the Radon domain; determining a location of a point in the formation that reflected acoustic energy emitted from the acoustic source to the acoustic receiver, the location of the point being represented in the Radon domain; and inverting the location of the point represented in the Radon domain into a radius-depth domain to image the formation.
US08880345B2 Route generation system, route generation method, and program
Provided is a route generation device capable of generating an appropriate route. A route generation system of one embodiment of the present invention includes: analysis sections that analyze aerial image data to identify the land state of an area included in an aerial image; a storage section that stores traffic cost information associating a traffic-cost coefficient indicating traffic difficulty with the land state; a route searching section that calculates traffic costs of a plurality of routes from a start point to an end point by referring to the analysis results of the analysis sections and the traffic cost information and that determines a route candidate to be used from the start point to the end point based on the calculation results.
US08880344B2 Method for displaying images on a display device and driver assistance system
A method for displaying images (15, 18, 21) on a display device (3) of a driver assistance system (2) in a motor vehicle (1) is made available. Navigation data is received by the driver assistance system (2), and sensor data relating to the surroundings (10 to 13) of the motor vehicle (1) is acquired by at least one sensor (5a to 5d) of the driver assistance system (2). A control device (4) processes the sensor data to form a surroundings image (15, 18) which shows at least a surrounding area (16, 19) next to the motor vehicle (1′). A map image (21) which is generated while taking into account the navigation data on stored map data is displayed on the display device (3). Enlargement and/or zooming in of the map image (21) take/takes place on the display device (3). After a predetermined mapping scale (zoom factor) of the map image (21) has been reached, there is a change from the map image (21) to the surroundings image (15, 18). A driver assistance system (2) which serves to carry out the method is also made available.
US08880342B2 Moving body position detection system, moving body position detection apparatus, moving body position detection method, and computer-readable storage medium
A moving body position detection system including an unit acquiring dead reckoning navigation information including a moving body direction; a unit identifying a moving body position based on the dead reckoning navigation information on the moving body; a unit predicting a predicted arrived position of the moving body after a predetermined interval from the position of the moving body based on the dead reckoning navigation information on the moving body; a unit calculating a difference direction angle between a direction from the position of the moving body to the predicted position and the direction of the moving body; a unit correcting the difference direction angle if it is equal to or larger than a threshold; and a unit updating the moving body position based on the difference direction angle.
US08880337B2 Navigation system for an electric vehicle
A navigation system for an electric vehicle may ascertain a selection of a charging station based on a user input, wherein a stored position of the charging station is an ultimate destination. The navigation system can ascertain a current position of the electric vehicle. In addition, the navigation system can ascertain a reachability of a target position that is separated from the current position and the stored position of the charging station. The ascertainment of reachability can be based on the current position of the electric vehicle, the stored position of the selected charging station, and the current state of charge of the energy storage device, so that the target position and subsequently the stored position of the selected charging station are reachable with the current state of charge of the energy storage device.
US08880333B2 Effective slope for fuel consumption calculation
A method and system for calculating a green route using an effective slope is disclosed. A route calculation application calculates one or more routes from an origin to a destination. For each of the routes, the route calculation application calculates an associated fuel consumption value. The fuel consumption value is based on effective slope for segments in the route. The effective slope is a value that is based on the impact slope has on the fuel consumption of a vehicle traveling on the segment.
US08880332B2 People guidance using kiosk and user ID
A method for providing navigation information to a user, the method including: inputting identification associated with the user into one terminal of a plurality of terminals distributed throughout an area visited by the user, each terminal being located in a kiosk and operating in kiosk mode; inputting a destination; computing a route from the kiosk to the destination; and presenting the route as the navigation information to the user.
US08880315B2 Method of managing the braking of an aircraft to limit its pitch
A method of managing the braking of an aircraft 1 having at least one controllable brake 9 for braking the aircraft 1 when the aircraft 1 is on the ground and as a function of a braking setpoint C. The method includes correcting the braking setpoint as a function of the pitch angle θ of the aircraft 1 during braking.
US08880310B2 Control device of automatic transmission
If it is determined that a D range is in use and determined that a vehicle is stopped, neutral control means (25) commands and controls an engagement pressure of a clutch (C-1) so as to achieve a state in which a piston of the clutch (C-1) contacts a clutch drum by a biasing force of a spring, and a state in which oil fills an oil passage from a linear solenoid valve (SLC1) to a hydraulic oil chamber and fills the hydraulic oil chamber. There is thus no drag loss in the clutch (C-1) during a neutral control, and the same fuel economy as when, for example, a manual shift to the neutral range is made can be achieved during the neutral control.
US08880308B2 Methods and system for using vehicle longitudinal acceleration for transmission control
A method and system of improving shift event performance in a vehicle with an automatic transmission. One or more accelerometers in the vehicle are used to sense one or more longitudinal acceleration values. The longitudinal acceleration values or values derived therefrom are compared with predetermined stored values. Shift event behavior is changed in response to differences between the one or more longitudinal acceleration values or values derived therefrom and the predetermined stored values.
US08880305B2 Vehicle control apparatus
There is provided a vehicle control apparatus. The vehicle control apparatus includes: an automatic return type select switch that receives an operation for selecting an operating condition of an automatic transmission and outputs a selection signal corresponding to the received selection operation; a switch controller that switches the operating condition of the automatic transmission in accordance with the selection signal output by the select switch; an emergency determining unit that determines whether or not the select switch has been operated consecutively at least a predetermined number of times within a predetermined period while the vehicle travels, and outputs an emergency operation signal when determining that the select switch has been operated consecutively; and a brake control unit and an electric parking brake control unit that apply braking to the vehicle on the basis of an operation by a driver and the emergency operation signal output by the emergency determining unit.
US08880304B2 Method for determination of numbers of gear steps
A method for determining numbers of gear steps N for a gearbox in a motor vehicle. The vehicle has an engine connected to drive the gearbox. The numbers of gear steps N is the number of downshifts or the number of upshifts which the gearbox effects at an upshift point or a downshift point. A downshift point represents a first engine speed at which the gearbox effects a downshift. An upshift point represents a second engine speed at which the gearbox effects an upshift. The numbers of gear steps N are determined on the basis of a predicted acceleration a for the motor vehicle during a time period T. The invention relates also to a system, a motor vehicle, a computer program and a computer program product thereof for performing the method.
US08880300B2 Outdoor power equipment unit with condition responsive electronic control of traction drive system
An outdoor power equipment unit comprises a self-propelled mower having a hydraulic traction drive system. When engine load exceeds a predetermined percentage of full load, a controller automatically reduces the stroke of a variable displacement pump in the traction drive system to reduce the ground speed of the mower without the operator having to change the position of the traction pedal. This reduces engine load to enhance continued good cutting performance. At any time, the controller can take the same actions to reduce ground speed if an excessively high temperature in a fluid used in a cooling system on the mower is detected, or if excessive loads on the mower decks of the mower are detected, or both.
US08880297B2 Control device for vehicle seat
A control device for a vehicle seat is provided. This control device for the vehicle seat is provided with a control unit. In order to improve the performance of getting into and out of a vehicle, the control unit executes an away movement for moving the vehicle seat to the rear of the vehicle when a preset away condition is satisfied, and when a preset return condition is satisfied in this state, executes a return movement for moving the vehicle seat to the front of the vehicle. The return condition includes, as a first return condition, a vehicle door being closed with a portable key in the vehicle.
US08880295B2 Torque based end of travel soft stop
A control system for controlling a steering system near an end of travel region is provided. The control system includes a first module that selectively estimates a command adjust value based on a hand wheel position and a hand wheel torque. A second module generates a motor assist command based on the command adjust value to control the steering system.
US08880292B2 Device for estimating vehicle body vibration and controller for suppressing vehicle body vibration using same
A vehicle body vibration estimating device for estimating a vehicle body vibration as a sprung mass of a vehicle where wheels are suspended via a suspension device. The vehicle body vibration estimating device includes a wheel speed physical quantity detecting section and a vibration estimating section. The wheel speed physical quantity detecting section detects a wheel speed physical quantity related to wheel speed, which is a circumferential velocity of a wheel. The vibration estimating section estimates the vehicle body vibration from a correlation relationship between displacements in a back-and-forth direction and displacements in an up-and-down direction of the wheels with respect to the vehicle body, and the wheel speed physical quantity detected by the wheel speed physical quantity detecting section.
US08880291B2 Methods and systems for preventing unauthorized vehicle operation using face recognition
Various embodiments relate to systems and methods for detecting an unauthorized use of a vehicle. One or more facial images of one or more authorized drivers of a vehicle may be stored on a vehicle computing system. After detecting movement of the vehicle, one or more facial images of a driver of the vehicle may be periodically received from at least one in-vehicle camera. The one or more captured facial images of the driver may be periodically processed based on the stored facial images of the one or more authorized drivers to determine if the driver is an authorized driver. If the driver is not an authorized driver based on the periodic determination, vehicle operation may be disabled. If the driver is authorized based on the periodic determination, operation of the vehicle may continue.
US08880288B2 Determining low-speed driving direction in a vehicle
A method and a system of determining a driving direction of a vehicle traveling at a low speed. The method includes determining whether the vehicle is in one of three states: (1) an uphill state in which the vehicle is located on an upward sloping surface, (2) a downhill state in which the vehicle is located on a downward sloping surface, and (3) a flat surface state in which the vehicle is located on a flat surface. The method also includes obtaining information from a plurality of vehicle sensors and determining a direction of movement of the vehicle based upon the determined state of the vehicle and information from the plurality of vehicle sensors.
US08880286B2 Wheel electronics unit, vehicle wheel and vehicle
A wheel electronics unit for a wheel information device in the installed state is arranged in a vehicle wheel of a vehicle. The wheel electronics unit contains a first sensor that is configured to record a measuring signal, which includes at least one first wheel-specific parameter, and an evaluation unit, which is configured to determine a current rotational position of the vehicle wheel at the time of the measurement on the basis of the measurement signal.
US08880285B2 Flexible coaching platform for telematics system
A telematics system provides a platform for generating coaching tips, feedback, and simple indices based on driving behavior, historical information, heursistics and expert knowledge. The coaching tips are displayed on the policyholder portal and text describing the tips is completely configurable by an administrator on the server for the application. Furthermore, both ‘driving behavior’ and ‘environmentally friendly (green) driving’ tips can be supported.
US08880277B2 Methods and systems for diagnosing a vehicle
Methods and apparatus are provided for generating a vehicle specific configuration file. The method includes: determining a vehicle identification number; retrieving, based on the vehicle identification number, from at least one data storage device a bus topology, module information, at least one message identification number, and at least one message length; and generating a configuration file based on the vehicle identification number, the bus topology, the module information, the at least one message identification number, and the at least one message length.
US08880275B1 Autonomous underwater vehicle control system and method
A vehicle control system is provided that includes an internal communications system. The vehicle control system further includes a controller configured to communicate with a plurality of independent vehicle systems via the internal communications system. The controller stores and accesses a plurality of libraries of system processes having data associated with the plurality of vehicle components. The controller maintains an operational state for the vehicle during an operational failure of at least one of the plurality of independent vehicle systems.
US08880272B1 Approach for estimating the geometry of roads and lanes by using vehicle trajectories
A method and apparatus is provided for controlling the operation of an autonomous vehicle. According to one aspect, the autonomous vehicle may track the trajectories of other vehicles on a road. Based on the other vehicle's trajectories, the autonomous vehicle may generate a representative trajectory. Afterwards, the autonomous vehicle may change at least one of its speed or direction based on the representative trajectory.
US08880266B2 Acceleration control system in electric vehicle
A control system includes an electric motor, an electric storage device, a throttle grip, a brake lever, a controller, and an acceleration/deceleration adjustment lever. The controller supplies electric power from the electric storage device to the electric motor in response to an acceleration command input by the throttle grip and causes the electric motor to drive the rear wheel. The controller adjusts the electric power generated by rotational power applied by the rear wheel in response to an acceleration/deceleration command from the acceleration/deceleration adjustment lever. The acceleration/deceleration adjustment lever is provided separately from throttle grip.
US08880259B2 Electric power dissipation control
A method and apparatus for controlling an electric motor. An electric motor apparatus has an electric motor with motor stator windings, a battery, battery control module coupled to the battery and configured to monitor and detect a state of the battery, and a motor control unit coupled to the battery and the batter control module and being configured to select an operation of the electric motor based on a signal from the battery control module representing the state of the battery. The motor control unit selects a normal motor control operation, a power dissipation motor control operation, or a discharge operation. During the power dissipation motor control operation, power from brake torque is dissipated in the motor stator windings of the electric motor.
US08880256B2 Method and apparatus for state selection stabilization for electrified powertrains
A method for stabilizing selection between a plurality of operating range states of an electro-mechanical multi-mode transmission configured to transfer torque among an engine, at least one electric machine, and a driveline includes requesting operation of the transmission in a preferred operating range state while a shift from a first operating range state to a second operating range state is in progress prior to achieving the second operating range state. Powertrain information is monitored and compared to a driver perception threshold only if a change of mind condition is detected. The shift to the second operating range state is avoided and a shift to the preferred operating range state is commanded if the powertrain information does not violate the driver perception threshold.
US08880254B2 Engine starting control method for hybrid vehicle
Disclosed is an engine starting control method for a hybrid vehicle that includes a starting motor for starting an engine and a driving motor for driving a vehicle. More specifically, a control unit may be configured to accelerate a stopped engine, determine whether a current speed of the engine is greater than a predetermined value, inject fuel to the engine when the current speed of the engine is greater than the predetermined value, determine a torque of the starting motor based on a target speed of the engine, and control a speed of the engine based on the determined torque of the starting motor.
US08880253B2 Nonlinear adaptive observation approach to battery state of charge estimation
A method of controlling an electric vehicle including an internal combustion engine, a battery having a state of charge (SOC) and an open circuit voltage (OCV), includes establishing a system for estimating battery SOC. The system includes (i) a parameter estimation subsystem including a recursive parameter estimator for identifying battery parameters and (ii) an OCV estimation subsystem including a nonlinear adaptive observer for estimating battery OCV. Estimated battery OCV is related to estimated battery SOC by a mapping. An output is generated based on the estimated battery SOC.
US08880250B2 DC bus voltage control
Provided is a method and controller for controlling a vehicle dc bus voltage. The method includes generating a parameter. The parameter is based on a reference dc bus voltage squared. The method includes controlling the vehicle dc bus voltage based on the parameter and a detected dc bus voltage. The method may also include generating another parameter based on a power demand associated with at least one of a motoring mode operation and a generating mode operation of a traction motor associated with the vehicle. The power demand is indicated in a message received via a dedicated high speed data bus. The method includes controlling the vehicle dc bus voltage based on the another parameter.
US08880245B2 Method and device for aiding the management of the flight of an aircraft
The device comprises servocontrol means which automatically control, in a combined manner, an automatic thrust system of the aircraft and airbrakes of the aircraft, as a supplement to usual means for steering the vertical trajectory, so that the aircraft attains a speed setpoint and/or altitude setpoint, at the location defined by a geographical constraint.
US08880242B2 Structural health management with active control using integrated elasticity measurement
A system and method for actively controlling a structure is disclosed. At least one non-optimal event is identified in real-time based on at least one real-time elasticity measurement, if an event threshold exceeds a predetermined value. In response to an active control command, a control mechanism is then activated in real-time to compensate for the non-optimal event.
US08880241B2 Vertical takeoff and landing (VTOL) small unmanned aerial system for monitoring oil and gas pipelines
Extended-range monitoring and surveillance of facilities and infrastructure—such as oil, water, and gas pipelines and power lines—employs autonomous vertical take-off and landing (VTOL) capable, small unmanned aerial system (sUAS) aircraft and docking platforms for accommodating the sUAS aircraft. Monitoring and surveillance of facilities using one or more embodiments may be performed continually by the sUAS flying autonomously along a pre-programmed flight path. The sUAS aircraft may have an integrated gas collector and analyzer unit, and capability for downloading collected data and analyzer information from the sUAS aircraft to the docking platforms. The gas collector and analyzer unit may provide remote sensing and in-situ investigation of leaks and other environmental concerns as part of a “standoff” (e.g., remote from operators of the system or the facilities) survey that can keep field operators out of harm's way and monitor health of the environment.
US08880240B2 Methods of controlling vehicle interfaces using device motion and near field communications
Methods for establishing continuous communications between a vehicle and a mobile device using Near Field Communications (NFC), and using the NFC communication to enable application hosting on the mobile device and other features. An NFC-enabled mobile device is placed in close proximity to an NFC antenna in the vehicle, where in one embodiment the NFC antenna is integrated into a wireless charging pad for the device. Continuous wireless NFC communications are established between the mobile device and the vehicle, such that the device can serve as a controller for in-vehicle systems. Control applications on the mobile device can include driver-commanded features such as operation of windows and door locks, as well as automatic features such as navigation and collision warning. Other uses of the NFC-enabled mobile device are also disclosed, such as event-based information capture and gesture-based control.
US08880236B2 Static synchronous generators
A method of controlling an inverter, by modelling a synchronous generator is provided. The method includes: representing angular position and rotational speed of virtual generator rotor using numerical variables; measuring the inverter's output current; calculating virtual electromagnetic torque acting on the virtual generator rotor from: measured inverter output current and variable representing virtual excitation current; calculating rotational speed of the virtual rotor from: virtual electromagnetic torque, variable representing virtual drive torque applied to the virtual generator rotor, and parameter representing the rotor's virtual inertia; calculating, from the variables representing angular position and rotational speed of virtual generator rotor, and excitation current, control signal for controlling the inverter to produce AC output which corresponds to that of the virtual synchronous generator; and implementing first feedback loop in which deviation of rotational speed of virtual generator rotor from a reference rotational speed is detected and used to adjust the virtual drive torque.
US08880235B2 Staggering and feathering of demand response and energy supply change in a managed electrical system
One embodiment of the present invention provides an energy-management system for managing energy within a predominantly closed power system. During operation, the system obtains one or more control actions that control energy transitions of a plurality of components, receives transitional characteristics associated with the components, and schedules the energy transitions by generating a set of offsets. A respective offset results in a delay of at least one energy transition.
US08880234B2 Supervisory control method and equipment for smart grids
Supervisory control equipment for smart grids provided with a plurality of generators and loads and operated in interconnection with a commercial power system through an interconnected circuit breaker, comprising a frequency control ability calculation part for calculating the frequency control ability of the interconnected system by using a total power demand and a bus bar frequency; and an islanding and interconnection detection part for calculating frequency control ability of the commercial power system according to the frequency control ability of the system of the frequency control ability calculation part to discriminate between the interconnected and islanding operations according to the magnitude of the frequency control ability.
US08880229B2 Grid-interactive photovoltaic generation system with power quality control and energy saving
Disclosed here is a grid-interactive photovoltaic generation system having power quality improvement and power saving functions. The grid-interactive photovoltaic generation system includes a solar cell array, a first inverter, and a second inverter. The solar cell array receives solar light and generates predetermined power. The first inverter converts the power, generated by the solar cell array, into power required by a grid line. The second inverter is connected to the first inverter, and steps down power, which will be supplied to a load, to an appropriate voltage.
US08880227B2 Component temperature control by coolant flow control and heater duty cycle control
Methods and systems for controlling temperatures in plasma processing chamber for a wide range of setpoint temperatures and reduced energy consumption. Temperature control is coordinated between a coolant liquid loop and a heat source by a control algorithm implemented by the plasma processing module controller. The control algorithm may completely stop the flow of coolant liquid to a temperature-controlled component in response to a feedback signal indicating an actual temperature is below the setpoint temperature. The control algorithm may further be based at least in part on a feedforward control signal derived from a plasma power or change in plasma power input into the processing chamber during process recipe execution.
US08880219B1 Apparatus for counting and dispensing pills using pill volume calculations
A self-contained pill dispenser is disclosed. A housing is provided and a hopper for containing a plurality of pills is supported by the housing. A feed chute having a detector mechanism is operatively connected to the hopper for receiving pills therefrom. A microcontroller is also operatively connected to the hopper, the feed chute, and the detector mechanism. The microcontroller calculates the volume of each of the pills transiting the detector mechanism based on occluded electromagnetic signals detected by the detector mechanism and the time of transit of each pill relative thereto.
US08880218B2 Nail polish color selection system
A user interactive custom nail polish color and effects dispensing system and method of doing business, including for both point of sale and remote (e.g., via internet) transactions.
US08880217B2 Picking system
A picking system includes a conveyer, a robot, a main camera, and a control device. The conveyer conveys workpieces. The robot performs a holding operation and a moving operation on the workpieces. The main camera captures the transport path of the conveyer. The control device detects the workpiece on the basis of the image captured by the main camera and instructs the robot to perform the holding operation on the detected workpiece. Moreover, the control device instructs the robot to perform the holding operation on the overlapped workpieces when the overlapping of the workpieces is detected.
US08880216B2 Picking system
A picking system includes a conveyer, a robot, and a control device. The conveyer conveys workpieces. The robot includes a plurality of holding parts and a supporting part. The holding parts hold the workpieces. The supporting part is rotatably provided against an arm to support the plurality of holding parts. Then, the control device instructs the robot to rotate the supporting part by a predetermined amount in such a manner that the direction of the workpiece becomes a predetermined direction for each the workpiece held by the holding parts and then to place the workpiece on a predetermined place.
US08880213B2 Apparatus and method to store information
A data storage facility comprising a plurality of data storage media, an automated data storage library comprising a first plurality of storage cells, one or more data storage devices in communication with the controller, and a controller in communication with one or more host computers, a vault comprising a second plurality of storage cells, wherein the vault does not comprise any data storage devices, and a robotic accessor in communication with the controller, wherein the accessor comprises a gripper mechanism, and wherein the robotic accessor can bidirectionally transport each of the plurality of portable data storage media between the first plurality of storage cells and the one or more data storage devices.
US08880212B2 High performance milling
Technology for milling selected portions of a workpiece by a cutting tool of a numerical control machine is described. The described technology can receive a main toolpath, the main toolpath comprising one or more cuts; compute one or more transition toolpaths, each transition toolpath defining a transition area intersecting one or more of the cuts of the main toolpath; trim one or more cuts of the main toolpath near two or more points of intersection between the main toolpath and the transition toolpaths; connect the trimmed portions of the main toolpath with one or more connecting moves such that each connecting move is mostly inside one or more of the transition areas; and mill the selected portions of the workpiece by moving the cutting tool in accordance with the cuts, transition toolpaths, trimmed cuts, and connecting moves.
US08880208B2 Device and method for controlling the playback of a file of signals to be reproduced
Controlling playback by strokes entered via a MIDI interface or measured by one or more motion sensors is disclosed. The variations of the playback speed can also be smoothed to ensure a better musical rendition. The velocity of the strokes can also be taken into account to control the volume of the audio output and other gestures or strokes can also act on the tremolo or vibrato.
US08880207B2 Multi-parametric analysis of snore sounds for the community screening of sleep apnea with non-gaussianity index
An apparatus for diagnosing sleep disorders such as OASHS from snore sounds includes a segmentation module (126) coupled to a data logger (124) to provide segments of the digitized audio signal to a Snore Segment Identifier (128). A total airways response (TAR) module (130), pitch calculator (132), and MFCC calculator (134) are each coupled to an output side of the snore segment identifier module (128). Each of these modules is respectively arranged to calculate pitch, bispectrum, diagonal slice, and MFCC parameters for the snore segments received from the snore segment identifier (128). Similarly, the NGI calculator (136) produces a non-Gaussianity index for the digitized audio signal. A classification module (144) is arranged to process the calculated parameters and compare a resulting diagnosis probability to a predetermined threshold value. The results of this comparison are then indicated on video display (142), which communicates with the classification module (133) via display controller (140) and bus (145). For example, if the results of the comparison are over threshold then display (142) is driven to indicate “OS AHS is present.”
US08880202B2 Optimization system using an iteratively coupled expert engine
An energy management system uses an expert engine and a numerical solver to determine an optimal manner of using and controlling the various energy consumption, producing and storage equipment in a plant/community. The energy management system operates the various energy manufacturing and energy usage components of the plant to minimize the cost of energy over time, or at various different times, while still meeting certain constraints or requirements within the operational system, such as producing a certain amount of heat or cooling, a certain power level, a certain level of production, etc. In some cases, the energy management system may cause the operational equipment of the plant to produce unneeded energy that can be stored until a later time and then used, or that can be sold back to a public utility, for example, so as to reduce the overall cost of energy within the plant.
US08880201B2 Safety controller and safety control method
To perform control in synchronization with a control cycle of a control target while maintaining safety. A safety controller includes: a processor; a system program for controlling allocation of an execution time of the processor to tasks; a signal generation unit that generates a periodic carrier signal; a control unit that updates a control content for the control target with a control content instructed by instruction information output from the processor, every first predetermined cycle of the carrier signal, and performs PWM control for the control target; and an interrupt signal generation unit that outputs an interrupt signal to the processor every second predetermined cycle of the carried signal. The processor executes the system program to schedule the tasks in accordance with scheduling information on a safety-related time partition and a normal control time partition, switches the time partitions according to an output of the interrupt signal, and outputs the instruction information to the control unit by a normal control task or a safety-related task.
US08880198B2 Byzantine fault-tolerant SCADA system
A system for automatically monitoring and controlling an infrastructure or process includes a plurality of remote clients installed along various portions of an industrial infrastructure or an infrastructure performing a process. Each of the remote clients collects data. A plurality of server replicas is in communication with the plurality of remote clients. The server replicas receive the collected data from the remote clients and process the received data. The plurality of remote clients and the plurality of server replicas communicate across an electronic network. The plurality of server replicas includes a state machine replication system that is tolerant of a failure of one or more of the server replicas.
US08880193B1 Cochlear electrode array
A method for forming a cochlear electrode array with a plurality of electrodes which are spaced so as to stimulate sites within a cochlea includes shaping a sheet of electrically conductive material to form a support structure and a plurality of electrodes, in which the electrodes are tethered to the support structure at the spacing of the cochlear electrode array. A cochlear lead includes a flexible body that has frictional characteristics that vary about its circumference. A cochlear lead includes a flexible body with a first region and a second region with different surface textures. This generates differential sliding forces during insertion of the cochlear lead which influence a motion of the cochlear lead during insertion. The cochlear lead having an electrode array with varying stiffness along its length is also provided.
US08880191B2 Method of implanting a spinal cord stimulator lead having multiple obstruction-clearing features
A method of implanting a spinal cord stimulator lead in the epidural space of a human or animal subject. The method includes discharging a first pressurized fluid through a first lumen in the stimulator lead directly onto a tissue obstruction to form a partial/pilot or full/final opening in the tissue obstruction. If a full opening was not formed sufficient for passage of the stimulator lead, the method further includes inserting a distal-end portion of the stimulator lead into the partial opening and then delivering a second pressurized fluid through a second lumen in the spinal cord stimulator lead and into a balloon for expanding a distensible balloon to clear the tissue obstruction sufficient for passage of the stimulator lead. The method further comprising advancing the stimulator lead past the cleared tissue obstruction and into place for use to deliver therapeutic energy to spinal tissue adjacent the contacts.
US08880184B2 Spacers for use with transcutaneous energy transfer system
A transcutaneous energy transfer system, method and kit for an implantable medical device having componentry for providing a therapeutic output and a secondary coil operatively coupled to the componentry and is adapted to be implanted at a location in a patient. An external power source has a primary coil contained in a housing. The external power source is capable of providing energy to the implantable medical device when the primary coil of the external power source is placed in proximity of the secondary coil of the implantable medical device. A holder is adapted to be externally positioned with respect to the patient at a spot in proximity of the location of the implantable medical device and secured at the location. A spacer, removably coupled to the holder, has an opening receiving the protrusion. A plurality of spacers can be used. The number is spacers is selectable based on the size of the protrusion.
US08880182B2 Fitting a cochlear implant
A computer-implemented method for fitting a medical implant to a recipient, the medical implant being operative to stimulate a physiological system of the recipient over a plurality of stimulation channels. The method includes: determining, based on measurements, an initial stimulation profile for the plurality of stimulation channels; determining a representative stimulus level of the initial stimulation profile; determining a fitting stimulation profile by modifying the shape a shape of the initial stimulation based on the representative stimulus level profile; and configuring the medical implant according to the fitting stimulation profile.
US08880177B2 Selective high frequency spinal cord modulation for inhibiting pain with reduced side effects, and associated systems and methods
Selective high-frequency spinal cord modulation for inhibiting pain with reduced side effects and associated systems and methods are disclosed. In particular embodiments, high-frequency modulation in the range of from about 1.5 KHz to about 50 KHz may be applied to the patient's spinal cord region to address low back pain without creating unwanted sensory and/or motor side effects. In other embodiments, modulation in accordance with similar parameters can be applied to other spinal or peripheral locations to address other indications.
US08880175B2 Systems and methods for selectively applying electrical energy to tissue
Systems and devices for selectively applying electrical energy to a target region beneath a skin surface of a patient involve applying an electrical impulse to one or more electrodes on a skin surface of the patient to modulate one or more nerves at the target region, where the impulse is substantially blocked at nerves located between the target region and the skin surface such that only the nerves at the target region are modulated by the electrical impulse.
US08880174B1 Medical diagnostic and predictive therapeutic method using discriminant analysis
A diagnostic method and predictor of prognosis from various therapeutic treatments is provided using discriminant analysis statistics. In one form, a patient is identified as having a disease using discriminant analysis when one or more values of a physiological parameter of the patient is closer to that of a previously characterized group of individuals having a disease and the patient is diagnosed as not having the disease, or healthy, if the value of a patient's parameter is closer to that of individuals previously characterized as healthy, or not having the disease. For example, the parameters can be based on the autonomic and/or enteric nervous system. Advantageously, the present method can be readily adapted using conventional linear discriminant analysis statistics to factor more than one parameter between a patient and one or more previously classified groups, to thereby enhance predictability and reliability of the present method. Further, in another form, linear discriminant analysis is used to predict outcomes of various therapeutic treatments of a disease to which a patient is afflicted by comparing the value or values of one or more patient parameter with respective ones in previously characterized individuals having the same affliction which have been treated either successfully or unsuccessfully.
US08880171B2 Cardiac cycle synchronized sampling of impedance signal
A system comprising implantable device, the implantable medical device including an intrinsic cardiac signal sensor, an impedance measurement circuit configured to apply a specified current to a transthoracic region of a subject and to sample a transthoracic voltage resulting from the specified current, and a processor coupled to the intrinsic cardiac signal sensor and the impedance measurement circuit. The processor is configured to initiate sampling of a transthoracic voltage signal in a specified time relation to a fiducial marker in a sensed intrinsic cardiac signal, wherein the sampling attenuates or removes variation with cardiac stroke volume from the transthoracic voltage signal, and determine lung respiration using the sampled transthoracic voltage signal.
US08880168B2 Defibrillator/monitor system having a pod with leads capable of wirelessly communicating
A modular external defibrillator system in embodiments of the teachings may include one or more of the following features: a base containing a defibrillator to deliver a defibrillation shock to a patient, (b) one or more pods each connectable to a patient via patient lead cables to collect at least one patient vital sign, the pods operable at a distance from the base, (c) a wireless communications link between the base and a selected one of the two or more pods to carry the at least one vital sign from the selected pod to the base, the selection being based on which pod is associated with the base.
US08880164B2 Method and system for determining a variation in a metabolic function and managing the variation accordingly
This invention describes a method for determining an abnormality of metabolic function and/or a variation of metabolic function, the method including the steps of, in a processing system receiving electroencephalography (EEG) signal information (100), analyzing the signal information (110), and determining the abnormality from the analysis (120). It also describes a method for managing the variation accordingly, the method including the steps of, detecting the abnormality (400), applying patient information (410), determining appropriate dose (420), and providing the required dose (430).
US08880163B2 Method and a system for classifying neural signals, and a method of selecting electrodes for direct neural control
A classification method for classifying neural signals, the method comprising the following steps: a) using a plurality of electrodes over a determined period of time to acquire a plurality of neural signal samples; b) estimating a covariance matrix of said neural signals; and c) classifying said neural signals, the classification being performed: either in the Riemann manifold of symmetric positive definite matrices of dimensions equal to the dimensions of said covariance matrix; or else in a tangent space of said Riemann manifold. A method of selecting neural signal acquisition electrodes based on the Riemann geometry of covariance matrices of said signals. An application of said classification method and of said method of selecting electrodes to direct neural control.
US08880159B2 Methods for determining risk of ventricular arrhythmia
Methods and systems are disclosed for analyzing three dimensional orthogonal ECG measurements to assess patient risk of a subsequent cardiac event based on evaluation of cardiac vector values in view of risk factors defined by the invention.
US08880156B2 Method and system for determining a physiological condition using a two-dimensional representation of R-R intervals
The physiological condition of a person is determined in physiological condition determining system by using a sensor for sampling a plurality of heart beats of the person, and using a control unit to perform the acts of: extracting a series of cardiac R-R intervals from the heart beat samples, providing a two-dimensional representation of subsequent R-R intervals, wherein two subsequent R-R interval forms an entry in the two-dimensional representation resulting in a plurality of entries, determining a centroid, an average radius and an average rotation frequency for the plurality of entries in the two-dimensional representation, determining a plurality of distances between the radius and each of the entries in the two-dimensional representation, and determining the physiological condition of the person using the radius in combination with the plurality of distances.
US08880154B2 Fibrous marker and intracorporeal delivery thereof
An intracorporeal marker includes a fibrous unitary marker body having bioabsorbable fibers compressed into a compressed configuration, and bound in the compressed configuration by a polymer binding agent. The intracorporeal marker may be incorporated into an intracorporeal marker delivery device having a delivery cannula which has a distal tip, an inner lumen and a discharge opening in communication with the inner lumen. The compression and binding occur prior to insertion of the fibrous unitary marker body into the inner lumen of the delivery cannula. The fibrous unitary marker body is slidably disposed within and pushable through the inner lumen of the elongated delivery cannula proximal to the discharge opening.
US08880152B2 System for determining the position of a knee prosthesis
The present application provides an apparatus and method for determining a position of a joint prosthesis using a computer assisted orthopedic surgery system in support of an arthroplasty surgery. The apparatus and method includes attaching a first locatable element to a first bone on one side of a joint, providing a sensor having a second locatable element and moving the sensor in proximity of the joint to locate a plurality of positions of the sensor relative to the first locatable element using a tracking device. The apparatus and method further includes selecting a generic model of a joint, determining the generic model in response to the plurality of positions located using the tracking device to generate a deformed model determining a position for a joint prosthesis on the deformed model, and outputting on a display the determined position upon the deformed model.
US08880147B2 Sensor assembly tethered within catheter wall
A distal tip assembly for an elongate medical device having an axis comprises a shaft having a proximal end portion, a distal end portion, a wall, and a central lumen extending axially between said proximal end portion and said distal end portion. The distal tip assembly further comprises a position sensor disposed in an outer sleeve such that the sensor can shift relative to the sleeve. The sleeve is disposed at least in part in the wall and is substantially fixed thereto.
US08880146B1 Tumor resistance and sodium/ diffusion MRI
The present invention enables a safe and noninvasive assessment of tumor resistance using one diffusion or sodium MRI scan over the entire tumor. The evaluation can be done before therapy and can help select a strategy of treatment. The invention can be used in different types of tumors in most parts of the human body. The level of tumor resistance can be determined reproducibly and quickly. The results can be used immediately to create individualized therapy. The invention allows clinicians to avoid ineffective therapies, which may be more harmful than useful, or come up with the other more appropriate alternatives.
US08880145B2 Planning system for intraoperative radiation therapy and method for carrying out said planning
The invention relates to a simulation and planning system for intraoperative radiation therapy and to a method allowing said system to be used for treatment studies, simulation, planning, training and recording, which system generally comprises a central processing unit or computer (1) for management and control and software-based communication with the rest of the devices and the user; one or several monitors or screens (2) for displaying images and peripherals responsible for gathering data relating to the actions performed by said user, a deformation simulation module for the virtual simulation of the deformation produced in the organs and tissues during the process; algorithms for instantly calculating the radiation dose applied during the radiation therapy treatment simulation and means for recording all the activities carried out and generating a full dosimetry report.
US08880141B2 Photoacoustic imaging devices and methods of making and using the same
A photoacoustic imaging device includes an array of light sources configured and arranged to illuminate a target region and an array of ultrasonic transducers between the array of light sources and the target region. The array of transducers may be fixedly coupled to the array of light sources, and the array of ultrasonic transducers may be configured and arranged to receive ultrasound transmissions from the target region.
US08880135B2 Low alternating-current loss oxide superconductor and fabricating method thereof
The present invention is configured such that, in a low AC loss oxide superconductor constituted by providing an oxide superconducting layer 6 on a substrate 1, said oxide superconducting layer 6 is separated into a plurality of filament conductors 2 in parallel to the lengthwise direction of said substrate 1 by dividing grooves 3 plurally formed in the widthwise direction of said substrate, and a high-resistance oxide 8 is formed in said dividing grooves 3. Because of the invention, it is possible to increase the insulation properties of individually divided mated filament conductors, and to obtain an oxide superconductor that has low AC loss.
US08880134B2 Superconductor device
This invention relates to a superconductor device, comprising: a superconductor; a former which supports the superconductor; and, an intermediate electrical connector attached to the former for coupling the superconductor to a power source, wherein the intermediate electrical connector is connected to the superconductor via a deformable portion in the intermediate electrical connector, wherein the deformable portion allows relative movement between the superconductor and former.
US08880133B2 Vehicle communication device
An example vehicle communication device includes a vehicle installed unit and a portable unit in communication with the vehicle installed unit. The portable unit communicates a message through the vehicle installed unit to a remote location, and the vehicle installed unit adds information to the message.
US08880131B2 Cover mechanism for opening and closing device
A cover mechanism is provided for an opening and closing device, which includes a fixed plate arranged at a first housing; a moving plate arranged at a second housing; a hinge arm that is arranged between the two plates and rotates to move the moving plate between a closed position where the first and second housings overlap and an open position where surfaces of the first and second housings are substantially coplanar; and a recess formed at the second housing that prevents the hinge arm from interfering with the second housing in the open position. The cover mechanism includes a cover arranged at the moving plate that covers the recess when the moving plate is positioned at the closed position and moves from the covering position by engaging with and being urged by the rotating hinge arm; and an urging part that urges the cover toward the covering position.
US08880130B2 Method for reproducing music file of mobile communication terminal and mobile terminal implementing the same
A method for reproducing a music file of a mobile communication terminal includes outputting a confirmation message for determining whether a music file is to be reproduced if reproduction of the music file is requested during the manner mode of the mobile communication terminal, and reproducing the music file if an external output device is connected to the mobile communication terminal. Since a user can reproduce music files without any complex key manipulation, even during the manner mode of the mobile communication terminal, the user can listen to desired music easily, thereby improving the convenience of the mobile communication terminal.
US08880126B2 Method and system for wireless LAN network detection
A method and a system discover a wireless LAN network for a multi-mode handset in a power-efficient way. The method extends stand-by time for the cellular and wireless LAN multi-mode handset, taking advantage of that fact that the cellular interface demands less energy from the battery than the wireless LAN (WLAN)-based interface in such a handset. The method therefore uses the cellular interface as an always-on proxy for the wireless LAN interface to receive the initial packets of a communication session, and uses the initial packet or packets to activate the handset's interface with the wireless LAN.
US08880123B2 Apparatus and method for running application in mobile terminal
An apparatus and method for running an application in a mobile terminal are provided. The apparatus includes a display for running a second application on a first screen according to a second touch event, and displaying a second screen smaller than the first screen, and a controller for hiding the second screen from a current screen to display an entire area of the first screen while a touch in an external area of the second screen is detected, and displaying again the second screen on the first screen if the touch in the external area of the second screen is released.
US08880118B1 Determining presence status using motion detection
Determining a presence status associated with a user of a mobile communications device allows for presence information to be provided to network elements and device clients. Presence status information includes information that indicates whether a user is likely available via the mobile communications device. Acceleration data associated with the mobile device is collected and analyzed to determine whether a human profile is indicated. Presence status information is generated based at least on whether the human profile is indicated.
US08880117B2 Mechanical input-output device for mobile terminal
A mechanical information input/output device of a mobile terminal permits various functions to be selected or adjusted according to changing positions of certain mechanical structures therein. The mechanical terminal preferably includes: a case for forming an external form with a predetermined form; and a mechanical information output unit provided at one side of the case and formed with at least one mechanical structure that changes a disposition by information according to a user function of the mobile terminal.
US08880106B2 Operation of devices supporting multiple SIMs
Exemplary embodiments are directed to operation of a device supporting multiple SIMs. A method may include detecting a paging collision scenario between a first subscription and at least a second subscription. The method may further include modifying a page reading operation of at least one of the first subscription and the at least a second subscription to avoid a paging collision between the first subscription and the at least a second subscription. Other aspects, embodiments, and features are also claimed and described in the application.
US08880103B2 Method and apparatus for transmitting indoor context information
The subject matter disclosed herein relates to a system and method for determining indoor context information relating to a location of a mobile device. Indoor context information may be utilized by a mobile device or a network element to obtain an estimate of a location of the mobile device within an indoor environment.
US08880098B2 Communication server and session control method
According to one embodiment, a communication server is provided with a communication interface unit, a storage unit, a setting unit and a roaming unit. The storage unit stores terminal list containing terminal ID and position ID (pID) of a content output terminal on a network. The setting unit transmits an instruction to set a session for outputting a content on the terminal, upon receiving from the terminal a first message containing user ID (uID), user position ID (upID) and content information associated with the session. The roaming unit selects, when a second message containing the uID and the upID is received, and it is determined that the user moved, a terminal having a pID corresponding to the upID, and transmits, to devices associated with session roaming to the selected terminal, an instruction to perform the session roaming.
US08880092B1 Using smart meters to determine mobile wireless computing device location
Multiple smart meters periodically measure strengths of detected signals generated by fixed position wireless devices. A centrally located location determining system receives this data, and correlates received strengths of the signals generated by the specific fixed position wireless devices with the physical locations of the measuring smart meters. Periodically, updated signal strengths are received, and stored correlations are replaced with updated correlations. Strengths of signals generated by fixed position wireless devices are received from a mobile computing device, as measured by the mobile device. The location determining system compares the signal strengths received from the mobile computing device to the most current strengths of signals of the same fixed position wireless devices, as measured by multiple smart meters, so as to perform triangulation and determine the physical location of the mobile device.
US08880091B2 Resource measurement and reporting method in long term evolution system
A method for measuring and reporting resource in a long term evolution system comprises: a source base station encapsulating a resource status request message and sending the message to a target base station; after receiving the resource status request message, the target base station processing the message, and sending a resource status success response to the source base station if the processing is successful, or else sending a resource status failure response if the processing is failed; the source base station encapsulating at least a message type (2), a measurement request type (3), a source base station global identifier (4) and measurement configuration information (5) in the resource status request message, wherein, the measurement request type (3) is modify; the measurement configuration information (5) is measurement configuration information (5) in current measurement request type (3).
US08880089B2 Mobile communication system and radio resource assignment method
In a mobile communication system including a first base station and a second base station, the first base station includes: a user information obtaining unit configured to obtain user information in the first base station, and the second base station includes: a user information obtaining unit configured to obtain user information in the second base station; a base station internal information collection unit configured to collect user information in the first and the second base stations; and a resource assignment determination unit configured to determine radio resources that can be used by the first base station and radio resources that can be used by the second base station based on the user information in the first and the second base stations.
US08880088B2 Signalling for interference management in HETNETs
The method and apparatus disclosed herein enable interference suppressed information (information about interference after interference suppression to be provided to the Radio Network Controller (RNC) and/or to surrounding Radio Base Stations (RBSs)), thereby providing better radio resource management for hot spots and/or allowing the RBSs to better understand their impact on surrounding cells. Generally, a network node in the wireless network signals interference suppressed information, e.g., an interference suppressed load or overload indicator, an interference suppressed neighbor cell interference, and/or an interference suppressed noise floor to a remote node in the wireless network to facilitate radio resource management. Further, a radio network controller in the wireless network may manage the interference in cells based on the interference suppressed information by generating an interference management instruction based on the interference suppressed information, and sending the interference management instruction to the radio base station to control one or more interference management settings, e.g., a power control setting, a load threshold, etc.
US08880084B2 Method and apparatus for allocating ACKCH resources in a wireless communication system
Methods and apparatus for receiving/transmitting an Acknowledgement (ACK)/Negative Acknowledgement (NACK) signal in a wireless communication system are provided. User data and a pilot are transmitted via an uplink channel. An ACK/NACK resource is identified based on a resource index of the transmitted user data. The ACK/NACK signal corresponding to the transmitted user data is received using the ACK/NACK resource.
US08880082B2 Method and system for extending multiple input multiple output wireless service
Disclosed herein is a method and system for extending MIMO service in a wireless communications system. The system comprises a base station, a remote system, and a host system communicatively coupled to the base station and the remote system. The base station is configured to generate, from a baseband signal, a downlink signal comprising a plurality of downlink signal streams, including at least a first downlink signal stream and a second downlink signal stream. Accordingly, the base station may include a first and a second antenna that are configured to transmit the first and second downlink signal streams, respectively. The remote system provides wireless service in a remote coverage area. Further, the remote system is configured to transmit a downlink signal as a plurality of downlink signal streams. The host system is communicatively coupled to the base station and to the remote system and configured to relay the downlink signal streams from the base station to the remote system.
US08880080B2 Method and system for combining text and voice messages in a communications dialogue
This publication discloses a method and system for delivering messages in a telecommunications network (1, 2, 6, 11, 12). In the method a voice-message call attempt is received (43), or a connection is formed to a potential user of a service, on the basis of a voice-message call attempt. According to the invention, as a response to the voice-message connection formed or to the call attempt, to the second part (41) of the connection is sent a text-form message, which initiates a long, logically continuous, temporally discontinuous session N, in such a way that the sender address (e.g., the A number) is converted to correspond to the session number N and the session stage J at the time, and in the message there is at least one selection query.
US08880079B2 Mobile communication method, femtocell radio base station, and network apparatus
The disclosed mobile communication method is a mobile communication method in a mobile communication system, wherein at least a part of a macro-cell (#A), with which first broadcast information is transmitted at a first frequency, and a femto cell (#a), in which second broadcast information is transmitted at a second frequency, overlap geographically. The method has step in which a wireless base station (#a) for a femto cell that manages the femto cell (#a) detects the first broadcast information, step in which the wireless base station (#a) for a femto cell transmits guiding broadcast information at a first frequency in response to detection of the first broadcast information, and step (C) in which a mobile station (UE #1) that is communicating in the macro-cell (#A) performs handover to the femto cell (#a) when the guiding broadcast information is detected.
US08880074B2 Operating method of CSG femto base station, handover method of handover to CSG femto base station and managing method of managing information of neighboring CSG femto cell
Disclosed is an operating method of a femto base station which includes broadcasting a plurality of public land mobile network (PLMN) identities; broadcasting a plurality of closed subscriber group (CSG) identities correlated with the plurality of PLMN identities; and establishing wireless communication with user equipment based on the broadcasted PLMN and CSG identities.
US08880072B2 Apparatus and method for searching for an allowed femtocell in wireless communication system
An apparatus and a method for searching for an allowed femtocell in a wireless communication system. A method for providing neighbor base station information from a femto base station to a User Equipment (UE) allowed to access in a wireless communication system includes, when the allowed UE initially accesses or when the neighbor base station information of the femto base station is changed, generating a message comprising the neighbor base station information of the femto base station. The method also includes sending the generated message to the allowed UE.
US08880070B1 Time integration of active-mode events and idle-mode events into communication data records
In a wireless communication system, a first wireless communication network exchanges data with wireless communication devices that are in active-mode on the first wireless communication network. The first network generates active-mode event records characterizing the data exchanges. A second wireless communication network receives registration messages from the wireless communication devices that are in idle-mode on the second wireless communication network. The second network generates corresponding idle-mode event records characterizing the idle-mode registrations. A data processing system integrates the active-mode event records and the idle-mode event records into integrated communication data records that correlate the active-mode events and the idle-mode events by their corresponding event times.
US08880069B2 Communication system
A communication system is described in which a home base station operating in a hybrid access mode is able to provide preferential connectivity to mobile communication devices that are members of a closed subscriber group associated with the home base station compared to mobile communication devices that are not members of the closed subscriber group.
US08880067B2 Correlating registrations originating from a device
Systems and methods for correlating multiple registrations from a single device are disclosed. A private ID used in an prior registration may be used to obtain subsequent private IDs. The subsequent private IDs may be used in subsequent registrations. An instance ID from an prior registration may be used in conjunction with different registration IDs in subsequent registrations.
US08880065B2 Technique for cell signature determination
A technique for cell signature determination in a cellular communication network is described. A method implementation of this technique comprises the steps of providing a set of cell signature hypotheses (d(n)), each cell signature hypothesis including a first partial hypothesis (d(2n)) and a second partial hypothesis (d(2n+1)), receiving a signal (X(n)) carrying a cell signature, the signal (X(n)) including a first partial signal (X(2n)) and a second partial signal (X(2n+1)), correlating the first partial signal (X(2n)) with each first partial hypothesis (d(2n)) to determine a first correlation result for each cell signature hypothesis, correlating the second partial signal (X(2n+1)) with each second partial hypothesis (d(2n+1)) to determine a second correlation result for each cell signature hypothesis, and determining the cell signature based on the correlation results including discarding a given cell signature hypothesis based on an analysis of a first magnitude of the first correlation result associated with the given cell signature hypothesis and a second magnitude of the second correlation result associated with the given cell signature hypothesis.
US08880064B2 Method for controlling the power for broadcasting a Cognitive Pilot Channel
The invention relates to a method for controlling the power for broadcasting a Cognitive Pilot Channel broadcasting lists of information to each of a plurality of meshes Mi (i=1 to n), n being the number of meshes in a geographical area comprising at least one base station (4) broadcasting the CPC to the meshes Mi. The method comprises the following steps: calculating for each mesh Mi a transmission power Pi; and broadcasting to each mesh Mi the Cognitive Pilot Channel with the power Pi.
US08880063B2 Method and user equipment with dual RF transceivers to perform PLMN list generation or PLMN search
Techniques for efficiently performing public land mobile network (PLMN) list generation or PLMN search on user equipment for use in a mobile communication system are described. The user equipment is operating in a plurality of supported modes and each supported mode includes a plurality of frequency bands. The user equipment includes an antenna, two RF transceivers and a processor. The RF transceivers are coupled to the antenna for operating in the operating frequency bands via the antenna. The processor coupled to the RF transceivers receives a request requesting PLMN list generation or PLMN search, determines whether both or either of the RF transceivers are available for handling the PLMN list generation or PLMN search, respectively directs the RF transceivers to generate a PLMN list or perform a search for at least one selected operating frequency band according to the request and a dispatch rule, and provides a corresponding execution result.
US08880061B2 Enabling handoff for multiple packet data network connections
Techniques for enabling handoff for multiple packet data network connection include selecting, when roaming from a current access network (AN) supporting multiple concurrent packet data network (PDN) connections to a handover target AN not supporting multiple concurrent PDN connections, a single PDN connection, from among multiple active PDN connections, for operation in the handover target AN and exchanging messages to register the single PDN connection in the handover target AN.
US08880060B2 Terrestrial based high speed data communications mesh network
A network for providing high speed data communications may include multiple terrestrial transmission stations that are located within overlapping communications range and a mobile receiver station. The terrestrial transmission stations provide a continuous and uninterrupted high speed data communications link with the mobile receiver station employing a wireless radio access network protocol.
US08880059B2 System and methods for media access control optimization for long range wireless communication
A system and method for media access control optimization for long distance wireless communication between an airborne platform and a surface base station is provided. The system includes receiving an incoming beamform signal. The incoming beamform signal includes a data portion and a token. It is possible, in some embodiments, that the data portion and the token are independently modulated. The token identifies a subsequent transmitter by including any of: an identification of which transmitter is to transmit next, length of time the next transmitter should transmit for, and transmit timing data. The system may then transmit an outgoing beamform signal including a data portion and a token. After which the system may wait for a return transmission, or a timeout. The system may also be enabled, in some embodiments, to maintain a list of active transmitters. This list of active transmitters may be updated periodically by adding and removing particular transmitters according to successful response transmissions.
US08880058B2 Automatic tuning system
A system and method, automatically adaptable for use on multiple platforms, configured to reduce echoes heard by an end user of a remote communication device is provided. The system is configured to transmit communication from the remote communication device to a speaker, and to pick up communication from the microphone to the remote communication device. The system and method is directed towards emitting a test signal and processing the signal so as to calculate a phase shift to be applied to an outgoing auditory signal. The calculated phase shift is configured to cancel the test signal.
US08880056B2 Systems and methods for mobile phone validation
A method for validating the operational characteristics of a mobile phone is provided. The message may include sending a message from the mobile phone to network testing equipment. This message may alert the network testing equipment that a debug state of the mobile phone is enabled. The method may also include sending test data from the network testing equipment to the mobile phone. The method may further include receiving the test data at the mobile phone. The method may yet further include creating a log of received data at the mobile phone. In addition, the method may include using short message service signaling to send at least a portion of the logged data from the mobile phone to the network test equipment.
US08880054B2 System and method for remote asset management
A remote asset management system comprising a network of programmable wireless modules, each having an antenna and an identification module and configured to communicate via a radio communication protocol. The system further includes a plurality of assets each linked to one of the wireless modules and configured to be managed by the linked wireless module. A remote system server service platform is configured to receive remote asset data from the wireless modules, pass the remote asset data to and from the wireless modules, send messages to at least one of the wireless modules, monitor the wireless modules by requesting and receiving current mode information, and remotely program the wireless modules. A data processing module located within the wireless module(s) and configured to process messages received by the wireless module, authenticate said message, analyze authenticated messages, and carry out asset management instructions included in the message.
US08880048B1 Method and apparatus for managing calls for call-related calendar entries stored on a device
Method and apparatus managing calls for call-related calendar entries stored on a device is described. In some examples, calendar entries stored in the device are parsed to detect call-related calendar entries. A telephone number associated with each of the call-related calendar entries is extracted. An invocator is provided in the device that is configured to cause the device to dial the telephone number associated with a first call-related calendar entry of the call-related calendar entries that is within a temporal threshold of a current time maintained by the device.
US08880047B2 Realtime, location-based cell phone enhancements, uses, and applications
Enhancements of and to cell phone operations are based in whole or in part on determining the location of the cell phone. Systems and methods select and determine locations or areas of importance or relevance, and based on that information and other programmed factors affect or alter the operations of the cell phone. While the systems and methods are illustrated by use of cell phone embodiments and applications, they are equally applicable to virtually any portable or mobile communication device, including for example, wireless laptop computers and PDAs.
US08880034B2 Data segmentation profiles
A mobile communication device provides a user with the ability to set up one or more profiles on the device. Each profile is configured to segment the user's data and applications and selectively restrict access from an active profile to user data and applications associated with other profiles on the device. The mobile communication device stores profile configuration data including profile selection criteria used to automatically associate items of user data with profiles on the device. When an item of user data is received on the device, the device automatically identifies a profile to associate with the received item based on the profile selection criteria, and the received item is stored in the device so as to be associated with the identified profile. Exemplary profile selection criteria include criteria based on a current time or location, a currently active profile, a data type of the received item, and a source of the received item.
US08880032B2 Providing a masked short message service in a wireless network
A method and apparatus for providing a masked short message service in a wireless network are disclosed. For example, the method receives a message from a first endpoint device directed to a second endpoint device, wherein the message indicates that the message is a masked short message service message, and forwards the masked short message service message with a code towards the second endpoint device. In one example, the second endpoint device parses the message and executes instructions contained therein, e.g., for sending a regular SMS with content derived from masked SMS, making a call, playing music, finding location by invoking an API, sending a file or a picture and any other functions that the second endpoint device may be capable of doing. The masked short message service provides a method for remotely controlling a 2G/3G mobile device through a computer or another mobile device.
US08880029B2 Wireless base station, wireless communication system, wireless communication method, and computer-readable medium storing device
A wireless communication system includes a wireless base station FAP2 which communicates with a mobile communication terminal UE1; a core network apparatus CN4 which is a higher-level apparatus of the wireless base station; and a femto wireless base station gateway GW3 which relays between the FAP2 and the core network apparatus CN4. The wireless base station FAP2 includes a determination unit 21a which determines whether to stop voice call reception processing or voice call transmission processing with reference to determination information upon detection of a voice call reception to the mobile communication terminal UE1 within a communication service area or a voice call transmission from the mobile communication terminal UE1 within the communication service area in the FAP2; and a signal processing unit 25a which informs a higher-level apparatus of a message including a determination result when the determination unit determines to stop the processing.
US08880027B1 Authenticating to a computing device with a near-field communications card
A method is performed by a computing device. The method includes, (a) at the computing device, wirelessly receiving an authentication code from an authentication card via near-field communications (NFC), (b) providing the authentication code received wirelessly via NFC to an authentication service configured to authenticate the user of the computing device based on the authentication code, and (c) in response to the authentication service authenticating the user based on the authentication code received wirelessly via NFC, providing the user with access to a resource via the computing device. Analogous computer program products and apparatuses are also provided described.
US08880021B2 System and method for updating location information of voice-over-internet protocol based devices for E911 services
A system and method for updating physical address location information of a wireless device for E911 services. The updating may include determining that the current geographical coordinate location of the wireless device has moved beyond a predetermined distance from a last recorded geographical coordinate location. A physical address location associated with the current geographical coordinate location may then be updated. The physical address location may be updated in the wireless device and/or a data repository operating on a data packet network. The physical address location may be communicated to a public safety answering point (PSAP) in response to an emergency 911 call being placed.
US08880019B1 Emergency alert system (EAS) message service profile
The service profile of an emergency alert system (EAS) message provides an indication of the alert and technology attributes associate with the delivery of the emergency alert message. In an example configuration, the service profile comprises an alert profile and a technology profile. The alert profile contains information pertaining to alert attributes and alert attribute contents. The technology profile contains information pertaining to text attributes, audio attributes, in band video attributes, out of band video/multimode attribute, and/or multimedia attributes.
US08880013B2 Gain control in a shared RF front-end path for different standards that use the same frequency band
Disclosed is a radio frequency (RF) communication circuit having an input for receiving an RF signal and providing independently gain controlled signal paths from the input. In a first signal path, the signal is amplified by a constant gain. In a second signal path, the signal is amplified by a constant gain and by a variable gain amplifier.
US08880010B2 Dual-loop transmit noise cancellation
A transmitter circuit is described. The transmitter circuit includes a first local oscillator that generates a first frequency equal to a duplex frequency. The transmitter circuit also includes a second local oscillator that generates a second frequency equal to a receive frequency. The transmitter circuit further includes a first mixer that combines the first frequency with a first input signal. The transmitter circuit also includes a first feedback loop. The first feedback loop includes a second mixer that combines the second frequency with a transmit signal and a first filter and a first adder that combines an output of the first mixer with an output of the first filter. The transmitter circuit also includes a third local oscillator that generates a third frequency equal to the receive frequency. The transmitter circuit further includes a third mixer that combines the third frequency with an output of the first adder.
US08880009B2 Method for performing communication in a self-organized wireless network
A method for performing communication in a self-organized wireless network, in particular a vehicular network, preferably based on the IEEE 802.11 MAC protocol, wherein the network includes a plurality of network nodes each being equipped with a communication system, wherein the communication systems generate periodic messages that are transmitted via a dedicated wireless communication channel, wherein each of the communication systems employs specific transmission parameters—message interval and transmit power—for transmitting the periodic messages, is characterized in that a reliability threshold for a maximum admissible load of the communication channel is defined, and that each network node, taking into consideration information on network nodes in its surrounding, establishes a relation between the message interval and the transmit power—interval-power-relation—such that the reliability threshold is not exceeded, wherein each network node applies its established interval-power-relation to adjust transmit power and/or message interval of its outgoing periodic messages.
US08880004B2 System and method for resolving conflicts between air interfaces in a wireless communication system
A device and method for resolving conflicts between air interfaces in a wireless communication system are disclosed. In one embodiment, the method comprises communicating over a first air interface, receiving a request for resources for concurrent use in communicating over a second air interface, determining that a conflict does not exist between resources for the first air interface and at least a portion of the requested resources for the second air interface, and concurrently communicating over the first air interface using resources for the first air interface and communicating over the second air interface using at least a portion of the requested resources for the second air interface.
US08880002B2 Over-the-air test
A simulated radio channel is shifted with respect to a plurality of antenna elements coupled with an emulator for communicating with a device under test by using different directions for the simulated radio channel in an anechoic chamber.
US08879998B2 Assessing interference environment for wireless communication devices
Disclosed is a device and method to automate the process of measuring RF noise, correlating measured noise with known sources, and making adjustments to the noise-measuring and reporting process. A wireless communication device is coupled to equipment at a fixed location, and transmits data about the operation of the equipment back to an operator, via a provider's network. Examples include fixed wireless terminals. A management entity aboard the wireless communication device performs the measurements via a transceiver and performs remedial actions when required, without requiring an onsite technician or remote assistance. The management entity may include a spectrum analyzer.
US08879997B2 Method and apparatus for antenna radiation cross polar suppression
Cross-polar discrimination (XPD) of a dual orthogonal cross-polarized antenna is maximized via a cross-coupling network between base station MIMO branches prior to connection to the base station antenna. In one embodiment, a cross coupling network combines each MIMO branch signal with an attenuated phase reversed (phase shifted) copy of the other MIMO branch signal. The amount of attenuation for each branch is equivalent to the cross polar suppression required for each antenna array. The cross-coupling can be applied at different stages of signal processing within a base station.
US08879996B2 Method to enable Wi-Fi direct usage in radar bands
A method and system for allowing a client device to establish a direct communications session such as Wi-Fi Direct service using the 5 GHz band. In one embodiment, a client device first establishes a direct communications session, in the 2.4 GHz band with another client device, and then, based on the content used in that service, establishes a 5 GHz service if needed.
US08879994B2 Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner
Embodiments of the systems, devices and methods described herein generally facilitate performing Bluetooth pairing between a first device and a second device. In accordance with one example embodiment, a first device generates a barcode that encodes Bluetooth pairing data for transmission to the second device, wherein the pairing data comprises a Bluetooth address associated with the first device, and wherein the pairing data further comprises a personal identification number usable to complete the Bluetooth pairing, the barcode is transmitted to the second device, and Bluetooth pairing is performed with the second device.
US08879993B2 Method, apparatus, and computer program product for wireless short-range communication establishment
Method, apparatus, and computer program product example embodiments enable devices to initiate a communication connection. In an example embodiment, a method includes receiving one or more device detection messages at an apparatus; transmitting, by the apparatus, one or more response messages including information usable for a wireless device receiving the one or more response messages to estimate a distance to the apparatus; and receiving, at the apparatus, a reverse response message including an information message from the wireless device, containing information usable for estimating a distance between the apparatus and the wireless device.
US08879992B2 Method, apparatus, and computer program product for discovery of wireless networks
Method, apparatus, and computer program product embodiments of the invention are disclosed to improve the discovery of wireless networks. In example embodiments of the invention, a method comprises: listening by an apparatus, to wireless discovery request messages transmitted by one or more wireless devices; listening by the apparatus, to wireless discovery response messages from one or more other wireless devices; and modifying transmission by the apparatus, of one or more of its own wireless discovery request messages based on at least one of the wireless discovery request messages listened to or the wireless discovery response messages listened to.
US08879990B2 Method and apparatus for automatically connecting short range wireless network in portable terminal
A method and an apparatus for automatically connecting a short range wireless network in a portable terminal. The method for automatically connecting a short range wireless network in the portable terminal includes, when registering to an Access Point (AP), storing location information of the AP. The method also includes obtaining location information of the terminal. The method further includes controlling an activation cycle of a communication module by comparing the location information of the terminal and the location information of the AP. The method still further includes, when the communication module is activated, searching for the AP.
US08879989B2 System, method and apparatus for displaying caller-identification
An application for a caller-identification system includes a circuit for receiving caller-identification information from a tip and ring interface and a circuit for wirelessly transmitting at least a subset of the caller-identification information to a display system. In the display system includes a circuit for receiving the caller-identification information and a circuit for displaying the caller-identification information on a display.
US08879988B2 Receiver for a telecommunications system
Methods and apparatus in a near-field communication system, in which a modulated signal received in a Reader is clipped by applying upper and lower clip levels. After clipping, the modulated part of the signal corresponds to a greater portion of the overall signal, and thus the requirements placed on an analog-to-digital converter for the clipped signal are reduced. In a first mode of operation, prior to or at the start of reception of the load-modulated signal, the clip levels may be set in a feedforward manner on the basis of preset values or a detected change in the overall signal; in a second mode of operation, once the clipped signal is available, the clip levels may be set in a feedback manner on the basis of the clipped signal.
US08879986B2 Wireless bidirectional communications between a mobile device and associated secure element using inaudible sound waves
In some embodiments, a system includes a mobile communication device and a secure element physically coupled to the mobile communication device. The mobile communication device includes a first wireless transceiver, first processor, first memory, first speaker, first microphone, and first Audio To Digital conversion (ADC). The secure element includes a second wireless transceiver, second processor, second memory, second speaker, second microphone, a second Audio To Digital converter (ADC), and a second Digital to Audio converter (DAC). The mobile communication device is configured to transmit data via the first speaker to the secure element microphone using inaudible sound waves. The secure element is configured to transmit data wirelessly via the second speaker to the mobile communication device using inaudible sound waves.
US08879984B2 Contact verification signaling
Certain aspects of the present disclosure provide techniques and apparatus for verification signaling, for example, in wireless communications in a television white space (TVWS) network.
US08879978B1 Entropy-based sequences of educational modules
Techniques disclosed herein can determine sequences for educational units by evaluating entropies of multiple potential sequences and biasing selection of next units towards those associated with high sequence entropies. Further, an analysis can determine which units are under-represented (relative to a target proportion) in a past sequence and bias towards inclusion of an under-represented unit in the sequence. The available units that are considered for potential selection can include those matched to a learner's skill (e.g., such that all pre-requisite units have been mastered but the unit itself has not been mastered). Thus, techniques can generate sequences of units that promote unit variation and nonetheless conform to relative unit frequencies and skill level appropriateness.
US08879969B2 Image forming apparatus including image forming calibration
An image forming apparatus can transfer a plurality of color component images onto a surface of a recording medium to form an image on the recording medium. The image forming apparatus includes a pattern generation part to generate information about an alignment pattern to be used for a calibration of an image forming, a plurality of stations each including a photosensitive drum to form an alignment pattern corresponding to each of a plurality of color components onto a carry belt or the recording medium, and a read part to detect a plurality of alignment patterns formed by the plurality of stations.
US08879965B2 Developing device having conveyer for conveying toner from toner chamber to developing chamber
A developing device can supply sufficient amount of developing agent into a developing chamber regardless of residual amount of developing agent in a developing agent chamber. The developing chamber has a developing roller and a supply roller. The developing agent chamber is positioned below the developing chamber. A wall portion is positioned below and extending along a lower portion of the supply roller. A vertical conveyer is configured to convey the developing agent from the lower portion of the developing agent chamber to a position above the supply roller. The developing chamber has a reservoir positioned above the supply roller and configured to accumulate the developing agent conveyed by the vertical conveyer.
US08879955B2 Drum unit and image forming apparatus having drum unit
A drum unit has a photosensitive drum, a circular tube member, a housing, and a bearing portion. The photosensitive drum includes a drum sleeve, a flange portion, and a supporting portion. The supporting portion is press-fitted into the inner peripheral surface of the circular tube member made of metal. The sliding surface of the circular tube member is rotatably inserted into the bearing portion attached to the housing of the drum unit.
US08879952B2 Image forming device having holder unit that holds developing units and spacer member to maintain developing units at particular position
A holder unit is configured to hold a plurality of photosensitive drums such that the plurality of photosensitive drums are arrayed in a predetermined direction and juxtaposed with each other with a space between neighboring photosensitive drums. A plurality of developing units is held by the holder unit, each is provided in association with each photosensitive drum, and each includes a developing roller displaceable between a contact position where the developing roller is in contact with the photosensitive drum and a spaced position where the developing roller is spaced away from the photosensitive drum. A spacer member has a plurality of retaining portions each in association with each developing unit and configured to retain each developing unit at the spaced position, and a linking portion integral with the retaining portions and configured to connect neighboring retaining portions therethrough in the predetermined direction.
US08879948B2 Toner cartridge
A toner cartridge, a main casing accommodates therein toner and is formed with an opening which provides communication between an interior and an exterior of the main casing. A shutter is movable along the main casing by an external driving force applied in a force direction between a closed position at which the shutter closes the opening and an open position at which the shutter opens the opening. A toner seal is formed with a seal opening opposing the opening of the main casing, and interposed between the main casing and the shutter when the shutter is positioned at the closed position. A guide portion is configured to guide a movement of the shutter in an inclined direction inclined with respect to the force direction.
US08879944B2 Cartridge having molded resin electrode
A cartridge is provided with an electrode portion for connecting a main assembly contact. The cartridge electrode includes a first contact portion, exposed toward an outside of a frame of the cartridge, contacted to a main assembly contact provided in the apparatus main assembly. The cartridge electrode further includes a second contact portion provided for being electrically connected to a process means of the cartridge, and an injection receiving portion into which resin is injected when the cartridge electrode is molded into the frame. The electroconductive resin injected from the injection receiving portion is branched to mold the first contact portion and the second contact portion so that an electroconductive path for electrically connecting the main assembly contact and the process means is formed.
US08879936B2 Information processing apparatus, printing apparatus, and information processing method
One aspect of the present invention provides an information processing apparatus for determining a height of a toner image formed on a carrier, the apparatus comprising: a control unit configured to control an amount of irradiation light based on whether laser light irradiated by an irradiation unit is irradiated onto the toner image; an acquisition unit configured to acquire an image obtained by capturing reflected light of the laser light irradiated by the irradiation unit; and a determination unit configured to determine the height of the toner image based on the acquired image.
US08879935B2 Apparatus and method to control temperature of heating roller used in fusing device of image forming apparatus
The apparatus includes a heating roller that generates heat for melting toner attached to a printing medium; a first induction coil that is disposed outside the heating roller and heats the heating roller by using induced current generated according to current flowing through the first induction coil; two second induction coils that are disposed at upper portions of both ends of the first induction coil and heat the heating roller by using induced current generated according to current flowing through the two second induction coils; a power supply unit that supplies current to the first induction coil and the two second induction coils; and a control unit that controls the power supply unit to supply current flowing in the same direction or different directions to the first induction coil and the second induction coils according to the size of paper fed into the heating roller.
US08879934B2 Image forming apparatus
An image forming apparatus, including: a fixing device configured to fix a toner image onto a sheet by heating the sheet having the toner image formed thereon; a wire-shaped guide configured to guide the sheet having the toner image fixed thereto; and a holder, configured to hold the wire-shaped guide, to which the wire-shaped guide is fixed by using elasticity of the wire-shaped guide.
US08879933B2 Image formation apparatus and method of adjusting developer discard amount for the same
An image formation apparatus includes an exposure unit to form an electrostatic latent image with image dots on a rotatable image carrier by exposing the image carrier to irradiation light, a development unit to form a developer image by attaching a developer to the electrostatic latent image, a voltage supply unit to supply the development unit with a development voltage, a cleaning unit to clean up the developer left on the image carrier after the development, and a developer discard amount controller to control an amount of the developer to be forcibly attached to the image carrier based on a total rotation number of the image carrier if the number of image dots printed during a prescribed number of rotations of the image carrier is smaller than a reference value, and to forcibly attach the controlled amount of the developer to the image carrier to discard the developer.
US08879930B2 Image forming apparatus
When a cleaning operation is performed, a controller of an image forming apparatus controls to emit a light beam from a light emitting window so as to form a stripe image in a predetermined position of an intermediate transfer member so as to form a image defect part in the stripe image, which occurs when a cleaning member moving in a reciprocating manner in a main scanning direction along the light emitting window blocks the light beam. In addition, the controller detects the image defect part by a density detecting member. When a predetermined number of image defect parts are not formed in the predetermined position in the period from start to end of the cleaning operation, the controller determines that the cleaning member is within the scanning range of the light beam.
US08879921B2 Apparatus and a method for modulation of an optical signal
The invention relates to an apparatus and a method for modulation of an optical signal with a data signal, said apparatus (6) comprising a configurable digital encoding unit (8) encoding data of said data signal to provide an encoded modulation control signal (EMCS), and a signal modulation unit (9) modulating said optical signal with respect to its signal phase and/or signal amplitude in orthogonal polarization directions in response to said encoded modulation control signal (EMCS) to generate a multi-dimensional optical signal vector.
US08879914B2 Low-energy optical network architecture
A method and apparatus for controlling traffic in an optical network having a plurality of OLTs for communicating with a plurality of PONs. A traffic controller receives traffic information concerning current traffic volume and, preferably with reference to a rules database, calculates the number of OLTs required to support the current traffic volume. A separate determination may be made whether a network reconfiguration is permitted at this time. If a reconfiguration is permitted, the traffic controller configures a traffic control switch to route the PON traffic to an from only the calculated number of OLTs. The traffic control switch may be implemented using a voltage-controlled optical fiber coupling or electronically, routing the traffic as electrical signals to and from electro-optical converters associated with each PON. The OLTs to be used may be selected by the traffic controller. The method and apparatus may also be used for fault management to route PON traffic through operational components when a failure of other components in the network is detected.
US08879910B2 Optical packet switching system and optical packet transmitter device
An optical packet transmitter device includes: a detection unit for detecting packet-length information and priority information from a received Ether signal; a setting unit for setting, according to the degree of priority, a division factor by which the Ether signal is divided and a wavelength used for an optical packet signal to be transmitted; a header generation unit for generating a header containing destination information, the packet-length information, the priority information, and information of wavelength in use of the Ether signal; a transmission processing unit for dividing the Ether signal according to the set division factor and generating a plurality of packet signals; a header insertion unit for inserting the generated header in at least one packet signal; and an electrical/optical converter unit for converting the plurality of packet signals into optical packet signals of a plurality of wavelengths according to the set wavelength in use.
US08879908B2 Optical channel monitor
An optical channel monitor includes a demultiplexer, a plurality of paths and a processing section. The demultiplexer demultiplexes an input optical signal, which is wavelength-multiplexed, for respective multiplexed wavelengths to generate a plurality of optical signals. The plurality of paths respectively generate a plurality of digital signals indicating optical powers of the plurality of optical signals. The processing section inputs the plurality of digital signals to calculate correction values of the optical powers, which correspond to characteristics of the demultiplexer. The demultiplexer includes a filter having FMHM (Full With at Half Maximum) within a predetermined range. The predetermined range is set based on a pass center wavelength accuracy of the filter and an oscillation wavelength accuracy of a transponder which generates the input optical signal.
US08879907B2 Measurement apparatus, network design apparatus, transmission system, and network management apparatus
A measurement apparatus includes: a transmitter disposed at a transmission-side node and configured to transmit two pulsed lights with different wavelengths at time intervals to a reception-side node; a transmission controller configured to control the transmitter so as to transmit the two pulsed lights repeatedly while changing the time interval; a receiving unit disposed at the reception-side node and configured to receive the two pulsed lights from the transmitter via one or more relay nodes; a detection unit configured to detect a change in a phase of at least one of the two pulsed lights received by the receiving unit; and a measurement unit configured to measure, based on the time interval and the change in a phase detected by the detection unit, a dispersion value of each transmission line between two nodes of nodes including the transmission-side node, the reception-side node, and the one or more relay nodes.
US08879904B1 Protection switching with transmitter compensation function
An optical network and method of protection switching between first and second transceivers where dispersion compensation is effected electrically in the transmitters. The method includes detecting, at the second transceiver, a signal failure of a signal transmitted from the first transceiver and, upon detecting the signal failure, signaling the first transceiver to change its compensation function. The signaling can be done by encoding overhead bits in a signal transmitted from the second to the first transceiver. Another method of protection switching includes both transceivers toggling alternate reception paths upon detecting a signal failure and changing their dispersion compensation function to that of their respective alternate path.
US08879900B2 Image blur correction device and imaging apparatus
An image blur correction device includes a lens unit which has at least one lens, and can be pivoted in two directions, which are orthogonal to each other, with respect to an outer housing, and a first driving motor and second driving motor which pivot the lens unit in the directions, in which a coil body having a plurality of coil sections, and a magnet placed to face the plurality of coil sections, are provided in the first driving motor and the second driving motor, a placement area, in which the plurality of coil sections are placed and a non-placement area, in which there are no coil sections, are formed, and the outer circumference of the non-placement area is positioned to the inside of a virtual circle that links the outer circumferences of each coil section in each plurality of coil section.
US08879895B1 System and method for processing ancillary data associated with a video stream
Method and system for capturing and playing back ancillary data associated with a video stream. At capture, a first video stream and its associated non-audio ancillary data are received. The non-audio ancillary data associated with the first video stream is encoded into a first audio stream on a basis of a predefined encoding scheme. The captured non-audio ancillary data can then be transmitted and processed with the first video stream in the form of the first audio stream. At playback, a second video stream and a second audio stream containing encoded non-audio ancillary data associated with the second video stream are received. The second audio stream is decoded on a basis of a predefined decoding scheme in order to extract therefrom the non-audio ancillary data associated with the second video stream. The second video stream and its associated non-audio ancillary data are then both output for playback. This method of capture and playback enables a non-linear editing application that supports only video and audio data to receive, preserve, display to a user for editing purposes, and transmit unsupported non-audio ancillary data, since the latter is in the form of an audio stream.
US08879894B2 Pixel analysis and frame alignment for background frames
Background frames can be completed from a collection of frames having foreground objects that are partially obscuring the pixels comprising the background. The special offset of a pixel represented across a collection of frames can be determined based on camera movement data. By determining the relative offset of a pixel represented in a first frame from the same pixel in other frames, pixel values representing a background object can be accumulated to derive a completed background frame.
US08879890B2 Method for media reliving playback
A method for viewing a collection of images or videos, includes analyzing the collection to determine properties of the images or videos and using the determined properties to produce icons corresponding to such properties; providing a time-varying display of the images or videos in the collection following an ordering of the images or videos in the collection and at least one of the corresponding icons; receiving a user selection of an icon; changing the time-varying display of the images or videos in the collection following a reordering of the images or videos in the collection in response to the user selection; storing the sequence of the user selections and associated timing in a script in a processor accessible memory; and playing back the viewing of the collection of images or videos using the script.
US08879886B2 Method and apparatus for configuring storage of video data from a plurality of sources
A method of configuring a storage device for recording video data from a plurality of video sources comprising the steps of providing a list of parameters that control settings of the plurality of video sources that affect the amount of video data that will be provided by a video source from the plurality of video sources, allowing a user to select a parameter from the list, allowing the user to change the selected parameter, determining the effect of changing the selected parameter on the amount of video storage available; and providing the user with feedback concerning the effect of changing the selected parameter.
US08879875B2 Optical switch
An optical fiber switch (16) for alternatively redirecting an input beam (14) comprises a redirector (18) and a redirector mover (20). The redirector (18) is positioned in the path of the input beam (14) along a directed axis (344A). The redirector (18) redirects the input beam (14) so that a redirected beam (46) alternatively launches from the redirector (18) (i) along a first redirected axis (354) that is spaced apart from the directed axis (344A) when the redirector (18) is positioned at a first position (348), and (ii) along a second redirected axis (356) that is spaced apart from the directed axis (344A) when the redirector (18) is positioned at a second position (350) that is different from the first position (348). The redirector mover (20) moves the redirector (18) about a movement axis (366) between the first position (348) and the second position (350). The redirector mover (20) includes a stator component (320A) and a rotor component (320B) that moves relative to the stator component (320A). The input beam (14) is directed along the directed axis (344A) substantially between the stator component (32A) and the redirector (18) prior to the input beam (14) being redirected by the redirector (18).
US08879873B2 Optical modulator
An optical modulator that supports a plurality of modulation formats is provided. The optical modulator includes: a distribution part including an optical demultiplexing/variable-branching switchable circuit; an optical modulator array; and an aggregation part including a combining ratio variable combining circuit and/or an optical multiplexing/variable-combining switchable circuit. The distribution part forms any or a combination of a variable 1×M demultiplexer/brancher, a combination of one or more fixed ILFs and an optical switch and a combination of a plurality of variable optical couplers and an optical switch; the optical modulator array includes a plurality of optical modulators; the aggregation part includes a structure of any or a combination of one or more variable optical couplers, a combination of a plurality of variable attenuators, an M×1 variable coupler, a variable M×1 demultiplexer/brancher and a combination of one or more fixed ILFs and an optical switch.
US08879872B2 Method and apparatus for restoring resolution of multi-view image
A method and apparatus for restoring a resolution of a low resolution view image from a multi-view image. In the resolution restoration method, detailed information may be generated using a reference image neighboring a criterion image, and a resolution of the criterion image may be restored using the detailed information.
US08879871B2 Method for processing images using automatic georeferencing of images derived from a pair of images captured in the same focal plane
An image processing system in which the georeferencing of at least one digital image is achieved by means of at least one picture model of the said digital image and of a digital reference relief form. The digital image is obtained from a pair of digital images acquired in the same focal plane. An intermediate digital relief form is produced from said pair of digital images. The intermediate digital relief form and said digital reference relief form are processed to refine the said picture model of the said digital image to be georeferenced. A final digital relief form is generated and said final digital relief form and said digital image are projected in a geographical or cartographic system, for the purpose of their georeferencing. The pair of digital images in the same focal plane are acquired in a small stereoscopic base configuration by sensors located in the same focal plane.
US08879870B2 Image creation with software controllable depth of field
A method of controlling depth of field of an image by a computer after the image has been taken based on the data acquired while taking the image, including, acquiring multiple images from the same perspective with different focal points, selecting parameters for preparing a displayable image, constructing an image using the data of the acquired multiple images according to the selected parameters; and displaying the constructed image.
US08879868B2 Image processing method for converting an annual image
An image processing method includes a step of extracting an inner circle and an outer circle from an annular image, a step of obtaining the center for the extracted inner circle and the extracted outer circle respectively, and a step of moving a processing center serving as a reference in the polar coordinate conversion gradually between the center of the inner circle and the center of the outer circle to convert the circular image into a panoramic development image. According thereto, when an annular image of a side wall surface of a hole imaged by an omnidirectional imaging device (10) is converted into a panoramic development image according to a polar coordinate conversion, a distortion resulted from a position deviation occurred between an optical axis (L1) of the omnidirectional imaging device (10) and a central axis (L2) of the hole (H) can be corrected.
US08879867B2 Processing source video for real-time enhancement of a signal of interest
What is disclosed is a system and method for real-time enhancement of an identified time-series signal of interest in a video that has a similar spatial and temporal structure to a given reference signal, as determined by a measure of closeness. A closeness measure is computed for pixels of each image frame of each channel of a multi-channel video to identify a time-series signal of interest. The intensity of pixels associated with that time-series signal is modified based on a product of the closeness measure and the reference signal scaled by an amplification factor. The modified pixel intensity values are provided back into the source video to generate a reconstructed video such that, upon playback of the reconstructed video, viewers thereof can visually examine the amplified time-series signal, see how it is distributed and how it propagates. The methods disclosed find their uses in remote sensing applications such as telemedicine.
US08879866B2 Image processing circuit, semiconductor device, image processing device, and electronic appliance
An image processing circuit includes: a correction amount calculation section which calculates a correction amount from area-by-area correction amounts set respectively for two, corresponding to the hue of input image data, out of a plurality of areas into which the hue/saturation plane is divided; and a color correction processing section which generates output image data by subjecting the input image data to color correction processing according to the correction amount.
US08879862B2 Method and apparatus for automatically summarizing video
One embodiment of the present invention provides a system that automatically produces a summary of a video. During operation, the system partitions the video into scenes and then determines similarities between the scenes. Next, the system selects representative scenes from the video based on the determined similarities, and combines the selected scenes to produce the summary for the video.
US08879860B2 Image decoding method, image decoding apparatus, and image coding and decoding apparatus for decoding tile boundaries
An image decoding method obtains pieces of coded data which are included in a bitstream and generated by coding tiles obtained by dividing a picture. The pieces of coded data are decoded to generate image data of the tiles. When obtaining the pieces of coded data, tile boundary independence information is further obtained from the bitstream. The tile boundary independence information indicates whether each boundary between the tiles is a first or second boundary. Image data of a first tile is generated by decoding a first code string included in first coded data with reference to decoding information of an already-decoded tile when the tile boundary independence information indicates the first boundary. The first code string is decoded without referring to the decoding information of the already-decoded tile when the tile boundary independence information indicates the second boundary.
US08879856B2 Content driven transcoder that orchestrates multimedia transcoding using content information
Apparatus and methods of using content information for encoding multimedia data are described. A method of processing multimedia data includes receiving multimedia data, and encoding the multimedia data into a first data group and a second data group based on content of the multimedia data, the first data group being configured to be independently decodable from the second data group, and wherein the first and second data groups are encoded at different quality levels. The method can also include classifying the content of the multimedia data and encoding the multimedia data based on the content classification.
US08879853B2 System, method and program for enumerating local alignments from pair of documents
Provided is a system for enumerating local alignments, comprising a local alignment enumeration module for enumerating local alignments, in a case where the cell of a second matrix corresponding to a cell at a transition source indicates that the cell belongs to a local alignment, and in a case where the maximum score calculated is larger than the predetermined value, registers, in the cell of the second matrix corresponding to the cell to be calculated, an identifier of a local alignment registered in the cell of the second matrix corresponding to the cell at the transition source, and further, in a case where the maximum score calculated is larger than a maximum score of the cells belonging to the same local alignment, stores the cell to be calculated as an end point of the local alignment.
US08879851B2 Shape from differential motion with unknown reflectance
A computer implemented method for determining shape from differential motion with unknown reflectance includes deriving a general relation that relates spatial and temporal image derivatives to bidirectional reflectance distribution function BRDF derivatives, responsive to 3D points and relative camera poses from images and feature tracks of an object in motion under colocated and unknown directional light conditions, employing a rank deficiency in image sequences from the deriving for shape determinations, under predetermined multiple camera and lighting conditions, to eliminate BDRF terms; and recovering a surface depth for determining a shape of the object.
US08879850B2 Image stabilization method and image stabilization device
An image stabilization method and an image stabilization device are provided. In the method, each of images to be processed is detected by a feature point detection method to detect a plurality of feature points. The relationship of the same feature points in adjacent images to be processed is analyzed. According to the relationship of the feature points, a homography transform matrix of adjacent images to be processed is calculated. Based on the known feature points and the homography transform matrix, a stabilization matrix and a plurality of adjustment matrices corresponding to each image to be processed are calculated. Compensation is performed on each image to be processed by the adjustment matrices, so as to produce a plurality of corrected images. A first image of adjacent corrected images multiplied by the same stabilization matrix is transformed to a second image of the adjacent corrected images.
US08879848B2 Machine vision based automatic maximal clamp measurement tool
System and method for measuring distances in an image. An image is received that includes curves corresponding to one or more objects in the image. Multiple curves in a specified region of interest (ROI) in the image are detected, where the ROI has a specified direction. Each curve includes respective curve points. A convex hull is determined based on the respective curve points. One or more candidate antipodal point pairs of the convex hull are determined. A first point pair of the one or more antipodal point pairs is selected based on one or more specified constraints. A clamp angle corresponding to the first point pair is determined. A distance between the first point pair along a direction specified by the clamp angle is determined. The first point pair, the distance, and the clamp angle are stored. Calibration information may be applied at any point during the process.
US08879844B2 High-performance closed-form single-scan calculation of oblong-shape rotation angles from optical image data of arbitrary size and location for user interface applications
A method and system for calculating oblong-shape rotation angles from optical image data of arbitrary size for user interface applications is described without the need of eigenvector routines and storage of the image data. The oblong shape may be of arbitrary size and location and need not be precisely elliptical. A few running sums are calculated and stored throughout each scan, and the results are obtained in closed form by simple post-scan computation. An algorithmic embodiment can execute on one or more hardware processors with limited or otherwise constrained computation power, available instruction cycles, available memory, etc. Hardware processors may CPUs found in desktops, laptops, tablets, or handheld computing devices. The resulting arrangement may be used for touch or optical user interfaces and other purposes.
US08879842B2 Method and non-transitory computer readable medium for HTML file conversion
An HTML file for making a browser adapted to a canvas element in HTML5 perform a process of color conversion of a specified image with specified characteristics and display the converted image at high speed. In the process of carrying out color conversion of the specified image with specified characteristics and displaying the converted image, an algorithm is employed such that data manipulation on a pixel-by-pixel basis is not instructed from the HTML file to the browser, but instead a plurality of instructions are given to overwrite an entire area of a bitmap image as original image data, and data derived therefrom are expanded onto a canvas uniformly with color of an appropriate brightness value and transparency.
US08879841B2 Anisotropic denoising method
In accordance with an embodiment of the invention, an anisotropic denoising method is provided that removes sensor noise from a digital image while retaining edges, lines, and details in the image. In one embodiment, the method removes noise from a pixel of interest based on the detected type of image environment in which the pixel is situated. If the pixel is situated in an edge/line image environment, then denoising of the pixel is increased such that relatively stronger denoising of the pixel occurs along the edge or line feature. If the pixel is situated in a detail image environment, then denoising of the pixel is decreased such that relatively less denoising of the pixel occurs so as to preserve the details in the image. In one embodiment, detection of the type of image environment is accomplished by performing simple arithmetic operations using only pixels in a 9 pixel by 9 pixel matrix of pixels in which the pixel of interest is situated. As a result, improved image environment sensitive noise reduction is achieved that requires a relatively low gate count in hardware implementations.
US08879840B2 Image processor, image processing method, and program for shift-changing depth data of an image
An image processing apparatus includes circuitry configured to encode image data and depth data according to a predetermined encoding system and configured to perform both rate control of a code generation amount from encoding the image data and rate control of a code generation amount from encoding the depth data. The circuitry is also configured to shift-change the depth data based on a difference between the bit depth of the depth data and the bit depth of the image data.
US08879839B2 Image processing apparatus, image processing method, and storage medium
An image processing apparatus includes a color intersection point determination and contour point extraction unit configured to raster-scan a multivalued image by using a pixel matrix having a predetermined size, to determine whether a target point is a color intersection point for dividing a contour for forming a boundary between pixels having a different value from each other, according to states of a plurality of pixels in the pixel matrix, and to extract a contour point for forming the boundary between the pixels having a different value from each other; and a contour information reconstruction unit configured to, by using color intersection points determined by the color intersection point determination and contour point extraction unit and contour points extracted thereby, generate contour information including contour lines each being sectioned by the color intersection points.
US08879835B2 Fast adaptive edge-aware matting
Methods, apparatus, and computer-readable storage media for fast adaptive edge-aware matting in which a matting technique adaptively feathers selections, provides smooth color correspondence matting, and performs well in textured regions. The matting technique may require fewer strokes and less parameter tuning than conventional matting techniques. The matting technique may have two components implemented in a matting pipeline. A color similarity component implements a color similarity constraint technique based on a radial basis function (RBF) technique to generate a color-constrained mask, and a locality constraint component implements a locality constraint technique based on a fast flood fill technique to generate a locality-constrained mask. The final mask (or matte) output may be an element multiply of the masks generated by the two components.
US08879834B2 Method and apparatus for reduced complexity video processing via special chroma handling
A method and apparatus for reduced complexity video and image processing with special chroma handling are disclosed. Frame-type decisions are made on a video stream made up of a sequence of frames. A first subset of the frames are selected to be monochrome and generated without chroma data. A second subset of the frames are selected to be in color and generated with chroma components. In one embodiment, the first subset of frames includes odd frames and the second subset of frames includes even frames in the video stream. Under higher video frame rates, the lack of color in every other frame is not visible to the end viewer. Accordingly, subsequent processing of the output video stream permits luma-only processing of many frames in the video stream, extensively reducing the amount of computation.