Document | Document Title |
---|---|
US08955160B2 |
Method for detecting abnormalities in a cryptographic circuit protected by differential logic, and circuit for implementing said method
In a method for detecting anomalies in a circuit protected by differential logic and which processes logic variables represented by a pair of components, a first network of cells carrying out logic functions on the first component of said pairs, a second network of dual cells operating in complementary logic on the second component, the logic functions being carried out by each pair of cells in a pre-charge phase placing the variables in a known state on input to the cells and followed by an evaluation phase where a calculation is performed by the cells, the method includes detecting an anomaly by at least one non-consistent state. |
US08955158B2 |
Method and apparatus for transmitting rights object information between device and portable storage
A method and apparatus for transmitting rights object information between a device and a portable storage are provided. The method includes transmitting a predetermined request from the device to the portable storage, generating a current permission status format including information of a rights object designated by the request, using the portable storage, and transmitting the current permission status format from the portable storage to the device. According to the method and apparatus, overhead is reduced and information transmission speed is increased when the rights object information is transmitted between the device and the portable storage. |
US08955156B2 |
Method and apparatus for securely providing postal address data to client devices
A method of securely providing postal address data to a requesting client device includes storing, at a server, a plurality of number items each associated with at least one respective address item. Each number item is indicative of a mobile telephone number and each address item is indicative of postal address data. A requesting client device sends an address item request, to the server, and the address item request includes a target key indicative of a mobile telephone number. The address item request is received at the server. A respective address item associated with a number item indicative of the mobile telephone number indicated by the target key is identified at the server. A data package including at least a part of the postal address data indicated by the respective address item identified at the server is sent from the server to the requesting client device. |
US08955151B2 |
Dynamic management of groups for entitlement and provisioning of computer resources
Methods, systems, and techniques for managing groups of entities, such as individuals, employees, or systems, and providing entitlement and access to computer resources based on group membership are provided. Example embodiments provide a Group Management System having a Group Management Engine “GME,” an Entitlement Engine, and a Provisioning Engine, which work together to allow simplified grouping of entities and providing entitlement and access to the entities based upon the group membership. In one embodiment, the GME leverages dynamic programming techniques to enable accurate, scalable systems that can manage near real time updates and changes to the group's status or to the entities' status. These components cooperate to enable provisioning of applications based upon current entitlement. |
US08955150B2 |
Apparatus and method for managing digital rights using virtualization technique
The present invention relates to an apparatus and a method for managing digital rights using virtualization technique, and more particularly to an apparatus and a method for enabling a user to access a desired text file in an independent area through a virtual machine corresponding to a licensed right for accessing the text file. The present invention comprises a virtual machine (VM) management unit for controlling a user access authorization function for accessing the text file in the area to which the virtualization technique is applied. |
US08955146B1 |
System and method for regulated collaboration marketplace
A collaboration system includes a banker collaboration platform offering a first degree of access, and a vendor collaboration platform that offers a second degree of access to the banker collaboration platform. Vendors are not allowed to directly contact bankers and bankers' identities are maintained secret from the vendors. The two platforms can be part of a network site hosted on one or more server machines in a network environment. |
US08955145B2 |
Dynamic enforcement of privacy settings by a social networking system on information shared with an external system
An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings. |
US08955139B2 |
Sound and effective data-flow analysis in the presence of aliasing
A method, an apparatus, and a computer program product are disclosed that include tracking, using a data flow model of a program suitable for taint analysis of the program, information from sources of taint to entities in a heap using a model of the heap based on the program. The tracking is performed so that the information is relevant for taint propagation and is performed in a manner that is field-sensitive for the entities in the heap. The method, apparatus, and computer program product also include, based on output of the tracking, the operation of performing data-flow analysis to determine taint flow from the sources of the taint through data flow paths to sinks using the taint. |
US08955138B1 |
Systems and methods for reevaluating apparently benign behavior on computing devices
A computer-implemented method for reevaluating apparently benign behavior on computing devices may include (1) receiving a plurality of reports from a plurality of computing systems that indicate that an attack that targeted each of the systems reached a specific stage on each system, (2) identifying behavioral data that includes, for each computing system within the plurality, a plurality of activities that the computing system observed before the attack reached the specific stage on the computing system, wherein the plurality of activities are of a type of activity that is relevant to detecting a prior stage of the attack, (3) analyzing the behavioral data to correlate the attack with at least one activity observed before the attack reached the specific stage, and (4) determining that the activity is suspect based at least in part on correlating the attack with the activity. Various other methods, systems, and computer-readable media are also disclosed. |
US08955131B2 |
Method and system for proactive detection of malicious shared libraries via a remote reputation system
A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded on an electronic device, determining that one or more of the shared libraries include suspicious shared libraries by determining that the shared library is associated with indications that the shared library may have been maliciously injected, loaded, and/or operating on the electronic device, and identifying the suspicious shared libraries to a reputation server. |
US08955129B2 |
Method and system for detecting fake accounts in online social networks
A system and method for detecting fake accounts in OSNs is proposed to aid the OSN provider 20 against fake users, wherein a social graph G of the OSN, with n nodes, a non-Sybil region GH and a Sybil region GS, is obtained and the following steps are performed: a trust value T(i)(v) is computed through i power iterations on each node v of the social graph G, i=0, 1, . . . O(log n) the power iterations distribute the trust value T(i)(v) from each node v to its neighbor nodes, after O(log n) power iterations, ranking nodes by a degree-normalized trust T ^ v = T ( w ) ( v ) deg ( v ) in order to obtain a ranked list of nodes, detecting fake accounts based on the obtained ranked list assigning intervals in the ranked list to a fake portion, determined by manual inspection means of the OSN provider, based on the degree-normalized trust of the nodes belonging to the intervals. |
US08955126B2 |
Tiered object-related trust decisions
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object. |
US08955124B2 |
Apparatus, system and method for detecting malicious code
Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code. |
US08955121B2 |
System, method, and computer program product for dynamically adjusting a level of security applied to a system
A system, method, and computer program product are provided for dynamically adjusting a level of security applied to a system. In use, predetermined activity that is at least potentially associated with unwanted activity is identified on a system. Further, a level of security applied to the system is dynamically adjusted, in response to the identification of the predetermined activity. |
US08955119B2 |
Behavior-based traffic profiling based on access control information
A method includes receiving one or more of user information, role information, or authorization information associated with a user accessing a network, selecting a traffic flow to monitor that is associated with the one or more of user information, role information, or authorization information, monitoring the traffic flow, determining whether an anomaly exists with respect to the traffic flow based on a traffic behavior pattern associated with the one or more of user information, role information, or authorization information, and performing a security response when it is determined that the anomaly exists. |
US08955116B2 |
Information processing apparatus and control method of the same
A device function to be used by an application is specified, a risk level of the specified device function is acquired, and a risk level of the application is calculated based on the acquired risk level of the device function. |
US08955114B2 |
Application monitoring through collective record and replay
Methods and systems for application monitoring through collective record and replay are disclosed herein. The method includes recording a number of execution traces for an application from a number of user devices at a runtime library, wherein the number of execution traces relates to non-deterministic data. The method also includes replaying the number of execution traces to determine whether a behavior of the application creates a security risk. |
US08955111B2 |
Instruction set adapted for security risk monitoring
A processor is adapted to manage security risk by updating and monitoring a taint storage element in response to receipt of taint indicators, and responding to predetermined taint conditions detecting by the monitoring. The processor can be operable to execute instructions of a defined instruction set architecture and comprises an instruction of the instruction set architecture operable to access data from a source and operable to receive a taint indicator indicative of potential security risk associated with the data. The processor can further comprise a taint storage element operable for updating in response to receipt of the taint indicator and logic. The logic can be operable to update the taint storage element, process the taint storage element, determine a security risk condition based on the processing of the taint storage element, and respond to the security risk condition. |
US08955108B2 |
Security virtual machine for advanced auditing
A security system collects an audit trail on a computer outside of a boundary created by one or more virtual machines. The security system uses a privileged virtual machine to collect audit logs for each protected virtual machine. As the protected virtual machines run, they send auditing information to the privileged virtual machine. The privileged virtual machine can collect auditing information from protected virtual machines much more quickly than a network server, as well as collecting auditing events from multiple protected virtual machines. Because the auditing destination is located on the same computer as the virtual machine monitored by the audit trail, no network dependency is present. Thus, the security system allows for monitoring the activity of administrators and other users while preventing tampering with the audit trail of each user's actions. |
US08955106B2 |
Managing infectious forwarded messages
Systems and methods for managing forwarded infectious messages are provided. Managing electronic message comprises receiving a message, forwarding the message, determining that the forwarded message is infectious after the message has been forwarded and preventing the infectious forwarded message from spreading. |
US08955104B2 |
Method and system for monitoring system memory integrity
A host system integrity monitor for monitoring memory, operating systems, applications, domain manager, and other host system's structures of interest is isolated and independent of the CPU and operating system of commodity systems. The system requires no modifications to the protected (monitored) host's software, and operates correctly even when the host system is compromised. Either arranged as a stand-alone computer on the add-in card which communicates with the monitored host system through the PCI bus, or as the co-processor based monitor located on the motherboard of the host system, or residing on one of the virtual CPU while the monitored system resides on another virtual CPU, or residing within the domain manager of the host system, the monitor monitors the integrity of the examined structure by calculating hash values of the structure, comparing them with expected hash values, and sending error reports once the discrepancy between these values is detected. |
US08955101B2 |
Upper-order computer, lower-order computer, monitoring system and monitoring method
The present disclosure discloses an upper-order computer, a lower-order computer, a monitoring system and a monitoring method, so as to eliminate the disadvantages of low standardization level and small scale in manually setting and adjusting performance parameters. The upper-order computer includes a central control module and an information interacting module, the information interacting module including a human-computer interacting unit, and the central control module including a processing unit, a display control unit and a parameter configuring unit, wherein the processing unit is adapted for controlling a lower-order computer by sending control commands; the display control unit is adapted for processing effective operating data acquired from the lower-order computer, and is adapted for instructing the human-computer interacting unit to perform presenting; and the parameter configuring unit is adapted for configuring parameters of the lower-order computer by sending parameter configuring commands. It can be seen that the upper-order computer is capable of presenting the processed effective operating data and configuring parameters. Compared with directly setting and adjusting the controller by human, the technical solution of the present disclosure has the advantages of high standardization level and large scale. |
US08955099B1 |
Distributing and sharing licenses across network devices in a virtual private network (VPN)
A device creates a pool of available licenses for secure network resources, and receives an unused license from a network device. The device also provides the unused license in the pool of available licenses, and receives a request for a license from another network device. The device further provides, to the other network device, the unused license from the pool of available licenses. |
US08955090B2 |
Session initiation protocol (SIP) firewall for IP multimedia subsystem (IMS) core
A SIP firewall defends an IMS network against SIP registration-based DoS/DDoS attacks by issuing fake authentication challenges when suspiciously high registration traffic is present. The fake authentication challenges include a predictive nonce that is to be used in the challenge response, thus forcing users to be state-aware and to issue the SIP registration requests from valid IP address in order to successfully respond to the fake authentication challenges. Upon confirming an association between the challenge response and the fake authentication challenges, the firewall opens a registration window to a protected node of the core network. In such manner, the firewall opens a registration window to (unauthenticated) legitimate users while stopping DDoS mode of registrations (or at least making them extremely difficult and costly) without impacting or involving the protected node. |
US08955089B2 |
“Push” keep-alive mechanism for SIP user agents located behind NATS/firewalls
A user equipment (UE) and method is provided having one or more components configured to receive a non-session initiation protocol (SIP) notification from a SIP entity and in response to send a ping request to the SIP entity, the one or more components further configured to receive a SIP request from the SIP entity. A network component and method is also provided that include one or more components configured to send a non-session initiation protocol (SIP) notification to a user equipment (UE) and to receive a ping request from the UE and further to send a SIP request to the UE. |
US08955085B2 |
Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device
In a device registration system, user authentication and device authentication of a CE device are executed in a single session, and the user and the CE device are associated with each other if these authentications succeed. The CE device obtains information for user authentication from an IC card and portable memory, and sends the information and device authentication information to a device registration unit. The device registration unit sends the information for the user authentication to a user authentication unit, and the device authentication information to a device authentication unit. The user authentication unit executes a user authentication process and sends information of the user to the device registration unit if authentication succeeds. The device authentication unit executes a device authentication process and sends information of the device to the device registration unit if authentication succeeds. The device registration unit associates user information and device information with each other. |
US08955083B2 |
Method and arrangement for secure user authentication based on a biometric data detection device
An arrangement for secure user authentication includes a computer or telecommunication terminal with a smartcard and a device. The smartcard is adapted to securely store biometric information relating to at least one user and the device is adapted to detect biometric data of users. The smartcard and the device include a radio interface for communicating together and a module for exchanging biometric information between each other. In this way, tampering of the transferred biometric information is difficult. In order to increase the security, one or more of the following measures may be used: a secure communication channel between the device and the smartcard, a direct (preferably short range) communication channel between the device and the smartcard and encryption and decryption of biometric information transferred between the device and the smartcard. |
US08955082B2 |
Authenticating using cloud authentication
An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access within a local area network by entering a cloud identification and password, which may be verified by a cloud authentication mechanism. If the authentication is successful from the cloud authentication mechanism, the user identification and password are stored locally for subsequent authentication requests. In some embodiments, the cloud password may be periodically flushed so that subsequent requests may be passed to the cloud authentication mechanism. The authentication mechanism may be used in both domain and workgroup local area networks, and may operate in parallel with other users who may have local area network or client credentials which may not be authenticated from the cloud. |
US08955075B2 |
Hardware-based device authentication
An opportunity for a computing device to participate in a secure session with a particular domain is identified. A secured microcontroller of the computing device is used to identify a secured, persistent seed corresponding to the particular domain and stored in secured memory of the computing device. A secure identifier is derived based on the seed and sent for use by the particular domain in authenticating the computing device to the particular domain for the secure session. The particular domain can further apply security policies to transactions involving the computing device and particular domain based at least in part on the secure identifier. |
US08955071B2 |
Controlled password modification method
A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. |
US08955070B2 |
Controlled password modification method and apparatus
Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and Linkedln. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. Te apparatus may be in the form of a computer system or a computer readable storage medium. |
US08955066B1 |
Knowledge based authentication using recent user internet activity
A technique of knowledge-based authentication receives information from third parties as to a user's recent web history including purchase history at an on-line retailer or search engine queries to produce a challenge question to authenticate the user based on that recent web history. |
US08955065B2 |
Recovery of managed security credentials
Disclosed are various embodiments for recovery and other management functions relating to security credentials which may be centrally managed. Account data, which includes multiple security credentials for multiple network sites for a user, is stored by a service in an encrypted form. A request for the account data is obtained from a client. The request specifies a security credential for accessing the account data. The account data is sent to the client in response to determining that the client corresponds to a preauthorized client and in response to determining that the security credential for accessing the account data is valid. |
US08955060B2 |
Collaborative parental control of streaming media
A network device receives a request for a selected video from a first user at a client device, and determines similarities between a second user associated with the first user and other parents in a collaborative community, wherein the similarities are determined based on the second user's, and the other users', prior censoring of videos. The network device obtains all exclusions applied by the second user, and the other users, in the collaborative community to the selected video, wherein each of the exclusions comprises a portion of the selected video identified for censoring by one of the users in the collaborative community. The network device further selectively applies each of the determined exclusions to the selected video based on the determined similarities, and sends the selected video, with the selectively applied exclusions, to the requesting first user at the client device. |
US08955056B2 |
Terminal and method for assigning permission to application
A terminal to assign permission to an application includes a storage device to store an application list including information of applications authorized to receive manager permission, and an application processor to receive a request for the manager permission from the application and to determine to allow the manager permission to the application in response to a determination that the application is included in the application list. A method that uses a processor to assign permission to an application includes receiving a request for manager permission from the application, determining, using the processor, whether the application is included in an application list including information of applications authorized to receive manager permission, and determining whether to allow the manager permission to the application if the application is included in the application list. |
US08955048B2 |
Conference data management
Tools are provided for conducting a conference/meeting and/or obtaining, managing and archiving conference/meeting data. For example, a conference application can be provided through a network to a registrant or participant of the conference. The conference application allows the registrant or participant to access conference data (such as presentation slides, conference materials, other posted content, etc.), save comments, files, other content, etc., make revisions to the conference data, and share data with other registrants or participants of the conference. |
US08955035B2 |
Anonymous principals for policy languages
Techniques to allow a security policy language to accommodate anonymous credentials are described. A policy statement in a security policy language can reference an anonymous credential. When the policy statement is evaluated to decide whether to grant access to a resource mediated by the policy statement, the anonymous credential is used. The policy language can be implemented to allow one anonymous credential to delegate access-granting rights to another anonymous credential. Furthermore, an anonymous credential can be re-randomized to avoid linkage between uses of the anonymous credential, which can compromise anonymity. |
US08955034B2 |
Module and associated method for TR-069 object management
The present invention relates to a security module for use in management of a TR-069 Object Model of a device. The Object Model comprises a plurality of parameters for selection by a view selector module based on credentials and for defining thereby an object model view associated to the device. The security module comprises means for associating the object model view to a security policy and means for configuring the security attributes of the security policy on an intermediate network entity. |
US08955033B2 |
Systems and methods for HTTP callouts for policies
A method of identifying an action of a policy in association with communications between a client and one or more servers includes determining, by an intermediary, a policy action based on using a callout based policy. In one aspect, an intermediary receives communications between a client and one or more servers. The intermediary identifies a policy for the communications, the policy specifying a request and a server to communicate the request. Responsive to the policy, the intermediary transmits the request to the server. Based on the server response to the request, the intermediary determines an action of the policy. In another aspect, a system for the present method includes an intermediary and a policy engine for identifying a policy to specify a request and a destination server. Responsive to a server response to the request, the intermediary determines an action of the policy. |
US08955030B2 |
System and method for personal content access
A method and system for integrated personal content access have been disclosed. The system includes a gateway which is able to communicate across devices, coordinating media content distribution among the devices and users. The gateway can seamlessly switch or copy content streams from one device to another, even if the devices use different formats or protocols. Tags can be used for adding embellishments to content on the fly for viewing by the user or by others. Tokens for indicating the identity and source of content, along with a location within the content, can also be used when sharing content or when switching content viewing between devices. Additionally, a network of gateways is possible, where content may be shared between devices connected to different gateways. |
US08955028B2 |
System for interfacing external data to IPTV and method of the same
A system for interfacing external data to IPTV and a method of the same are provided, which register unique numbers of mobile phones, other data communication devices and IPTVs in conjunction with an external data transmission server in advance and have an SMS server, a mobile communication company's server and a mail server and external data transmission server linked with one another, and which transmits at least one of text, moving image data, and still image data to a desired mobile phone or IPTV according to user's setting for its output. This present invention can interface external data received by various data communication devices such as a mobile phone, an email server, and a mobile communication company's server to IPTV for its output onto the screen according user's setting, and establishes an output time of the external data in advance by a user to output it at a time of high concentration. |
US08955025B1 |
System and method for rejoining a traffic log mode after a breakout in a broadcasting environment
Disclosed herein is a system and method for rejoining a traffic log mode after a breakout in a broadcasting environment. One example method involves (i) receiving a traffic log including traffic log entries, each corresponding to a VC and a start time; (ii) operating in a traffic log mode; (iii) receiving a breakout-mode request; (iv) responsive to receiving the breakout-mode request, (a) terminating operation of the traffic log mode, (b) generating a simulation log, and (c) operating in a breakout mode; (v) receiving a rejoin request; (vi) determining a breakout termination time based on the received rejoin request; (vii) proximate the breakout termination time, terminating operation of the breakout-mode, and operating in a custom log mode; (viii) determining a rejoin position of the traffic log based on the received rejoin request; and (ix) operating in the traffic log mode. |
US08955024B2 |
Video streaming
A video sequence is to be transmitted at a selectable quality from a server over a network. A network control protocol operates in response to a control parameter to allocate to the server a share of available transmission capacity in proportion to the value of the control parameter. First, one determines a plurality of transmission rate values that are needed over successive time periods of the sequence for successful transmission of the sequence at a reference quality; then the control parameter is set, proportional to the transmission rate value and communicated to the control protocol at corresponding time instants. The sequences can then be transmitted, encoded at a quality from time to time selected in dependence upon the actual transmission capacity made available by the network to the server. |
US08955023B2 |
Transfer device, transfer method, and program
A transfer device includes: a first network connection control section that controls connection to a first network enabling transfer of content data and/or control data using a first address assigned by a key device in the network; a second network connection control section that controls connection to a second network enabling transfer of content data and/or control data using a second address assigned by a device having a routing function; and an address table that stores the correspondence between the first address of devices on the first network connected via the first network connection control section and the second address of the devices on the second network connected via the second network connection control section. |
US08955022B2 |
Securing property
Methods, systems, and apparatuses for securing property are presented. Video content viewed by a user may be detected, and the user may be automatically prompted to change settings on a security system based on the detecting. A comparison of the current time with the duration of the video content may serve as the basis for such prompting. Additionally, a premise security system may be placed in a learning mode. Changes in position of a security sensor may be detected and used to set a permitted range of motion for the sensor. Further, a plurality of security sensor profiles may be stored, and each profile may identify a different predefined permitted range of motion of a sensor. The addition of a new sensor to a premise may be detected, and a user may be prompted, on a display, to identify a profile to be used for the new sensor. |
US08955017B2 |
Channels and services display
The availability of a new information service is publicized by displaying an icon in an EPG when the presence of a new information service is detected. A list of new services is then displayed responsive to a user command. When one of the new services is displayed instead of the list. |
US08955008B2 |
Television decoding unit with multiple wireless access modules
The present invention proposes a system comprising a television decoding unit and a plurality of access modules, said access modules comprising wireless communication means with the television decoding unit, a memory comprising an identification of said module, said television decoding unit comprising means for detecting the presence and to receive the identification of an access module, means to apply a filter on events displayed on the television unit, said filter being defined with pre-defined filter category attached to the identification, and means to record the events consumption while the access module is detected by the television unit. |
US08955000B2 |
Disc drive and a housing thereof including penetration hole
A disc drive that includes: a housing configured to receive a tray, a pickup mounted on the tray; a connector installed on the housing for outputting signals obtained from the optical pickup; a ribbon cable that includes a first end which is connected to the connector, including a plurality of wire layers, and a part installed adjacent to a side of a body of the housing; and at least one penetration hole formed in a side of the body of the housing so as to reduce a capacitive coupling between the ribbon cable and the body of the housing. |
US08954991B2 |
Acknowledging incoming messages
Acknowledging incoming messages, including: determining, by an acknowledgement dispatching module, whether an incoming message has been received in an active message queue; responsive to determining that the incoming message has been received in the active message queue, resetting, by the acknowledgement dispatching module, an acknowledgment iteration counter; incrementing, by the acknowledgement dispatching module, the acknowledgment iteration counter; determining, by the acknowledgement dispatching module, whether the acknowledgment iteration counter has reached a predetermined threshold; and responsive to determining that the acknowledgment iteration counter has reached the predetermined threshold, processing, by the acknowledgement dispatching module, all messages in the active message queue. |
US08954990B2 |
Adaptable mass data message receipt and handling system and method
Compact event code messages are generated by sources, which may include human users, system components or any other sources. The event code messages include an event type, a source type, and a date. The messages are initially processed based on this information. The messages also include payload data that is not considered during initial processing, rendering initial processing fast and efficient. The messages may then be listed or queued and further processed by specialize event handlers, which may consider the payload data and may draw upon other resources. The system components, including the event handlers may be increased or decreased as needed and dynamically as messages are received and processed. New events, rules for event processing, event handlers and other system components may be added at any time to expend the number and types of events that can be handled, and the particular handling performed on them. |
US08954976B2 |
Data storage in distributed resources of a network based on provisioning attributes
Systems, methods, and apparatus, including computer program products for receiving a content transfer request that includes a first set of provisioning attributes that characterizes one or more operational objectives of a first item of content; and processing the content transfer request to allocate resources of a storage environment to store the first item of content. |
US08954973B2 |
Transferring architected state between cores
A method and apparatus for transferring architected state bypasses system memory by directly transmitting architected state between processor cores over a dedicated interconnect. The transfer may be performed by state transfer interface circuitry with or without software interaction. The architected state for a thread may be transferred from a first processing core to a second processing core when the state transfer interface circuitry detects an error that prevents proper execution of the thread corresponding to the architected state. A program instruction may be used to initiate the transfer of the architected state for the thread to one or more other threads in order to parallelize execution of the thread or perform load balancing between multiple processor cores by distributing processing of multiple threads. |
US08954972B2 |
Systems and methods for event stream processing
Disclosed are systems and methods for processing events in an event stream using a map-update application. The events may be embodied as a key-attribute pair. An event is processed by one or more instances implementing either a map or an update function. A map function receives an input event from the event stream and publishes one or more events to the event stream. An update function receives an event and updates a corresponding slate and publishes zero or more events. Systems and methods are also disclosed herein for implementing a map-update application in a multithreaded architecture and for handling overloading of a particular thread or node. Systems and methods for providing access to slates updated according to update operations are also disclosed. |
US08954967B2 |
Adaptive parallel data processing
Described herein are methods, systems, apparatuses and products for adaptive parallel data processing. An aspect provides providing a map phase in which at least one map function is applied in parallel on different partitions of input data at different mappers in a parallel data processing system; providing a communication channel between mappers using a distributed meta-data store, wherein said map phase comprises mapper data processing adapted responsive to communication with said distributed meta-data store; and providing data accessible by at least one reduce phase node in which at least one reduce function is applied. Other embodiments are disclosed. |
US08954965B2 |
Trusted execution environment virtual machine cloning
Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine. |
US08954964B2 |
System and method for isolated virtual image and appliance communication within a cloud environment
Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual computing environment may be isolated into a private network. A service request may then be formulated at the guest virtual machine and addressed to a predetermined non-existent address. The request is then ostensibly sent to the predetermined address, whereupon the service request is actually transmitted to a shared resource with a security appliance machine in the virtual computing environment. The request is then forwarded to the security appliance machine and a reply formulated. The reply is sent back to the guest virtual machine via the shared resource. |
US08954958B2 |
Method of configuring a virtual application
A method of modifying a virtual application configuration to include modifications made at runtime by a virtual application that is implemented by a first virtualized application file that was created previously using the virtual application configuration. At runtime, the virtual application implemented by the first virtualized application file stores modifications to its configuration in a sandbox memory location. The method includes reading the modifications from the sandbox memory location. Then, the modifications are written to the virtual application configuration. The modified virtual application configuration is then used to create a second virtualized application file that includes the modifications stored in the sandbox memory location. |
US08954957B2 |
Network traffic processing according to network traffic rule criteria and transferring network traffic metadata in a network device that includes hosted virtual machines
Network devices include hosted virtual machines and virtual machine applications. Hosted virtual machines and their applications implement additional functions and services in network devices. Network devices include data taps for directing network traffic to hosted virtual machines and allowing hosted virtual machines to inject network traffic. Network devices include unidirectional data flow specifications, referred to as hyperswitches. Each hyperswitch is associated with a hosted virtual machine and receives network traffic received by the network device from a single direction. Each hyperswitch processes network traffic according to rules and rule criteria. A hosted virtual machine can be associated with multiple hyperswitches, thereby independently specifying the data flow of network traffic to and from the hosted virtual machine from multiple networks. The network device architecture also enables the communication of additional information between the network device and one or more virtual machine applications using an extended non-standard network protocol. |
US08954956B2 |
Distributing and executing software code
Systems and methods for distributing and executing software code. In some embodiments, a method may include storing program instructions configured to invoke interactions with one or more of a plurality of automation devices, the plurality of automation devices divided into sets of one or more automation devices, each set of one or more automation devices associated with a respective Distributed Execution System (DES) node. The method may also include distributing the program instructions to each DES node, each DES node configured to operate in a discovery mode to evaluate the program instructions and identify one or more semantic statements that are applicable to its associated set of one or more automation devices, each DES node configured to operate in an execution mode subsequently to the discovery mode to execute the identified one or more semantic statements with respect to that DES node's associated set of one or more automation devices. |
US08954954B2 |
Method and device for application installation to multiple memory components
A method and device for installing an application to a device are provided. The method includes: receiving, at the device, application files associated with the application, the application files including computer readable instruction files and resource files; installing, by an installation manager, the computer readable instruction files to a first memory component associated with the device; and storing the resource files on a second memory component associated with the device. |
US08954953B2 |
Systems and methods for deploying a customized operating system
In accordance with embodiments of the present disclosure, a method may include extracting an operating system install image from a source installation package. The method may also include receiving target information regarding information handling resources of a target information handling system. The method may further include generating executable custom scripts based on an identity of the operating system and the target information, the custom scripts configured to, when executed by the target information handling system, initiate execution of the operating system install image and perform target information handling system-based customizations to the operating system based on the target information. |
US08954951B1 |
Stop distribution of application updates
A communication device may determine whether an installed application should be updated based on an uninstall and/or reinstall history of the application and control distribution of updates to the installed application based on the determination. A frequency at which the application is uninstalled and/or reinstalled on the communication device or other device utilized by the user of the communication device may be determined based on the monitored usage of the application. The distribution of the updates to the application may be discontinued when the frequency exceeds a particular threshold. The distribution of the updates may continue when the frequency is below the particular threshold. A version number of the installed application may be compared to a corresponding version number of a version of the application that is stored on a remote server in order to determine when the update to the application is available for distribution. |
US08954950B2 |
Web portal application customization method and system using profiles
Web portal application customization methods and systems using profiles allow developers to expose different functionalities and a different look and feel to users belonging to different user profiles. Specifically, the method allows a developer to define default and profile-specific transitions as well as default and profile-specific states. Upon request of a transition by a workflow engine, the system transparently provides the workflow engine with a profile-specific transition if a profile-specific transition associated with the user is available. If a profile-specific transition is not available, the system provides the application with a default transition. Likewise, the system transparently provides the application with a profile-relevant state according to the profile of the user and the availability of a profile-specific state. Accordingly, the method may implement highly customizable functionalities and look and feel effectively and cost-efficiently. |
US08954947B2 |
Fast variable validation for state management of a graphics pipeline
In a state management system of an effects system implemented in a Graphics Processing Unit (GPU), techniques and technologies are provided for setting a value to particular variables at application run-time without validating the variables. For example, a compiled effects file comprising a number of variables can be loaded at application load time, and a generic, variable interface pointer for a particular variable of the effects file can be retrieved. A specialized variable interface pointer can then be generated which is associated with the particular variable by specifying a desired type of access that will be performed on the particular variable. At application run-time, the specialized variable interface can be used to set a value to each of the particular variables without validating the particular variables at application run-time. |
US08954945B2 |
Profile-based global live-range splitting
A computer program product is provided for splitting a live-range of a variable in frequently executed regions of program instructions. The live-range of a variable is split into multiple sub-ranges, each of which can be assigned to a different register or spilled into memory. The amount of spill code is reduced in frequently used regions of code by coalescing the live ranges based on profile information obtained after splitting the live ranges at every join and fork point in a control flow graph. |
US08954941B2 |
Method and apparatus and record carrier
Method of generating respective instruction compaction schemes for subsets of instructions to be processed by a programmable processor, comprising the steps of a) receiving at least one input code sample representative for software to be executed on the programmable processor, the input code comprising a plurality of instructions defining a first set of instructions (S1), b) initializing a set of removed instructions as empty (S3), c) determining the most compact representation of the first set of instructions (S4) d) comparing the size of said most compact representation with a threshold value (S5), e) carrying out steps e1 to e3 if the size is larger than said threshold value, e1) determining which instruction of the first set of instructions has a highest coding cost (S6), e2) removing said instruction having the highest coding cost from the first set of instructions and (S7), e3) adding said instruction to the set of removed instructions (S8), f) repeating steps b-f, wherein the first set of instructions is formed by the set of removed instructions (S9, S10). |
US08954938B2 |
Managing build variants in a common repository
A system includes determination of first coordinates in a repository coordinate system associated with a seed component corresponding to a target build result of a first code building system, the seed component comprising a projection method between the repository coordinate system and a variant coordinate system of the first code building system, determination of second coordinates in the variant coordinate system, the second coordinates associated with an execution environment of the target build result, determination of third coordinates in the repository coordinate system based on the first coordinates, the second coordinates and the projection method, and association of the target build result with the third coordinates. |
US08954933B2 |
Interactive semi-automatic test case maintenance
Embodiments of the invention relate to test case maintenance for user interfaces. In one embodiment, user source and test cases are linked for test case maintenance. A link is determined to have been created between a user interface and at least one test script. The test script includes a set of test instructions. The user interface includes a set of user interface elements. Each test instruction is run against the user interface. Mapping information for each test instruction is generated. A change is determined to have occurred in at least one of the user interface and the test script. In response to a change having occurred to the user interface, at least one test instruction affected by the change is identified. In response to a change having occurred to the test script, at least one user interface element affected by the change to the test script is identified. |
US08954929B2 |
Automatically redirecting method calls for unit testing
A unit testing system allows testing of multiple types of method calls using an unmodified software application module. The system dynamically copies byte code of the tested method, clones the byte code, and executes the cloned byte code. During cloning, the system instruments the code so that method calls are redirected into a system method, where the system can determine whether a mocked method should be called instead. The result is that the developer does not need to modify the original methods in order to redirect method calls to mock methods. The developer can simply reference a test module of the unit testing system and easily write tests that redirect any method they wish. Thus, the unit testing system provides a framework for building more useful unit tests that cause less interference with production-ready code. |
US08954927B2 |
Management of objects within a meta-data repository
At least one binary relationship defining an enhancement to a standard meta-object instance can be stored in a meta-data repository. The at least one binary relationship can be specified at design time and can define a dependency required to create an enhanced meta-object instance that includes the standard meta-object instance and the enhancement. The standard meta-object instance can be provided by a core software platform. The enhanced meta-object can include at least one additional feature relating to an external software component integrated into the core software platform. At run time, a request for a custom instance of a data structure based on the enhanced meta-object instance can be received. The custom instance can include a meta-object instance extension specified at design time by a service consumer of the core software platform. Also at run time, a transitive shell representing the custom instance of the data structure can be generated. |
US08954918B2 |
Test design optimizer for configurable scan architectures
Roughly described, a scan-based test architecture is optimized in dependence upon the circuit design under consideration. In one embodiment, a plurality of candidate test designs are developed. For each, a plurality of test vectors are generated in dependence upon the circuit design and the candidate test design, preferably using the same ATPG algorithm that will be used downstream to generate the final test vectors for the production integrated circuit device. A test protocol quality measure such as fault coverage is determined for each of the candidate test designs, and one of the candidate test designs is selected for implementation in an integrated circuit device in dependence upon a comparison of such test protocol quality measures. Preferably, only a sampling of the full set of test vectors that ATPG could generate, is used to determine the number of potential faults that would be found by each particular candidate test design. |
US08954916B2 |
Test circuit, integrated circuit, and test circuit layout method
A test circuit includes a substrate, a wiring section having a plurality of pieces of wiring, and a device-under-test section formed on the substrate, and having a device-under-test main body and a plurality of connecting electrodes for establishing connection between the main body and the plurality of pieces of wiring, an extending direction of a straight line connecting a position of a center of rotation in a plane of pattern formation of the main body and each electrodes being inclined at a predetermined angle to an extending direction of the pieces of wiring, and the connecting electrodes being arranged at positions such that connection relation between the electrodes and the plurality of pieces of wiring is maintained even when the main body and the electrodes are rotated about the position of the center of rotation by 90 degrees relative to the wiring section in the plane of the pattern formation. |
US08954907B1 |
Block emulation techniques in integrated circuits
Techniques for emulating a logic block in an integrated circuit (IC) design are provided. The techniques include identifying a plurality of logic elements that are connectable to formal logic block. These logic elements are connected to perform logic functions associated with the logic block. The logic block may be a physical logic block on one IC design and a non-existent logic block on another IC design. The logic elements and associated connections form an emulated logic block. |
US08954902B2 |
Method and apparatus improving gate oxide reliability by controlling accumulated charge
A method and apparatus are disclosed for use in improving the gate oxide reliability of semiconductor-on-insulator (SOI) metal-oxide-silicon field effect transistor (MOSFET) devices using accumulated charge control (ACC) techniques. The method and apparatus are adapted to remove, reduce, or otherwise control accumulated charge in SOI MOSFETs, thereby yielding improvements in FET performance characteristics. In one embodiment, a circuit comprises a MOSFET, operating in an accumulated charge regime, and means for controlling the accumulated charge, operatively coupled to the SOI MOSFET. A first determination is made of the effects of an uncontrolled accumulated charge on time dependent dielectric breakdown (TDDB) of the gate oxide of the SOI MOSFET. A second determination is made of the effects of a controlled accumulated charge on TDDB of the gate oxide of the SOI MOSFET. The SOI MOSFET is adapted to have a selected average time-to-breakdown, responsive to the first and second determinations, and the circuit is operated using techniques for accumulated charge control operatively coupled to the SOI MOSFET. In one embodiment, the accumulated charge control techniques include using an accumulated charge sink operatively coupled to the SOI MOSFET body. |
US08954900B1 |
Multi-patterning mask decomposition method and system
A portion of a layout of a single layer of an integrated circuit is to be multi-patterned. The patterns are divided into first and second groups, to be patterned on the single layer by a first mask or a second mask. For each portion of each pattern, a spacing relationship is determined between that portion and any adjacent pattern on either or both sides. A processor computes a first capacitance (C), resistance (R), or resistance-capacitance (RC) cost of assigning the first group to the first mask and the second group to the second mask, and a second cost of assigning the first group to the second mask and the second group to the first mask, based on the spacing relationships. The first group is assigned to the first mask and the second group to the second mask if the first cost is lower than the second cost. |
US08954892B2 |
Flexible reporting on storage resources
A method for providing flexible reporting for applications which utilize storage in at least one storage system comprises presenting a plurality of business views which aggregate application storage characteristics for a plurality of applications according to a reporting structure which is defined by a user, each of the business views being a hierarchical folder structure of the applications and a plurality of folders, wherein at least one folder in the hierarchical folder structure contains at least one of an application or another folder; for each of the business views, presenting the applications and folders as a plurality of nodes which are selectable by the user; and in response to a selection of one of the nodes from the plurality of business views and a report type specified by the user, generating a report based on the report type of the selected node, the report aggregating any of the application storage characteristics for the selected node according to the report type. |
US08954889B2 |
Slide bar display control device and slide bar display control method
The slide bar display control device according to the present invention includes, a display means which indicates a first slide bar including a first slider and a first bar, an input means which can select an arbitrary part of the first slide bar shown on the display means based on touch operation, and a control means which controls the display means and the input means, wherein, when the control means detects that a first operation has been performed in a state that the first slider shown on the display means is being touched in the input means, the display means indicates a second slide bar including a second slider and a second bar, and wherein the second slider is a slider different in a variation amount of a set value per unit moving distance from the first slider. |
US08954887B1 |
Long press interface interactions
A computer-implemented user interface method includes displaying one or more display elements in a graphical user interface, including elements that correspond to pop up controls, receiving a selection of one of the one or more display elements, determining whether the selected element corresponds to a pop up control, and displaying the selected element in a highlighted format upon receiving the selection if the element corresponds to a pop up control, and displaying a pop up control after displaying the element in a highlighted format if the selection persists for a long press period. |
US08954883B2 |
Method and system for visually indicating a replay status of media items on a media device
A device is provided for visually indicating a replay status of media items on a media device. Aspects of the device include displaying in a graphical user interface (GUI) of the media device a representation of a first media item; displaying a profile score of the first media item that is based on user preferences; and displaying a replay score for the first media item that affects replay of the first media item. |
US08954882B2 |
Recording medium storing information processing program, information processing device, information processing system, and information processing method
An example information processing device includes an information processing unit which scrolls a screen of a display unit on which a web page is displayed, in response to a flick gesture or operation, and during flick scroll, reduces the web page in size and displays a portion of the web page reduced in size on the screen of the display unit. |
US08954876B1 |
Method and apparatus for providing a session status indicator
A method and apparatus for generating display status information for a computer in a remote computing environment. The method comprises receiving, from a remote computer, a first data set associated with a display image, where the first data set comprises an encoding of a source image to be rendered at the remote computer; decoding, at a client computer, the first data set to generate a first portion of the display image; and determining, from the first data set, a perceptual quality level for the display image. The apparatus comprises: a client resource for receiving display data and decoding the display data; a session monitor for determining a state of the display data decoded by the client resource; and a user interface for presenting the display status information, the display status information comprising the state of the display data. |
US08954874B2 |
Methods and systems for providing one or more topic specific portals
A methods and systems are provided for presenting one or more topic specific portals. A portal may present various content relating to a common topic. The content may be episodes of a television show, movies, products, games, songs, images, and general information about the topic. The topic may be the television show, a movie studio, an actor, a company, or a particular genre or theme. A service provider may deliver the portal in an interactive programming guide sent to the set top boxes of its subscribers. The portal may be interactive such that subscribers may order or watch the content presented on the portal. A content provider may create or edit the portals and send the portals to the service provider. The delivery of the portal to the service provider by the content provider may be through an application programming interface. |
US08954866B2 |
Messaging and presence protocol as a configuration and management bus for embedded devices
Techniques are provided herein for establishing at a network management server a presence on a network. A presence associated with one or more managed devices on the network is detected. An instant messaging (IM) session is established with the one or more managed devices. The IM session forms a virtual chat room for performing a management function on the one or more managed devices, and IM messages are sent that are configured to perform the management function on the one or more managed devices. Techniques are also provided herein for establishing on a network an enriched presence by a network management server that is configured to perform a management function via a presence function of a messaging and presence protocol. |
US08954865B2 |
Facilitating communications between computer users across a network
A stand-alone icon (i.e., an icon that is not part of an application interface) is provided to facilitate communications across a network between users of at least one communications program. The icon represents a contact or a set of contacts. Status information regarding the contact or set of contacts is received and displayed using the icon or in response to an operation performed on the icon. The icon additionally may provide an interface for performing actions related to the contact or set of contacts. The actions may generally include, for example, retrieving profile information about the contact, setting an alert to indicate that the contact's network/login status (e.g., login, logout, or idle) has changed, or performing communications with the contact. |
US08954862B1 |
System and method for collaborative viewing of a four dimensional model requiring decision by the collaborators
A method and system for documenting collaboration by a team analyzing telemetry data, where the data is used to generate a three dimensional visual display modeling the objects and events recorded by the telemetry data. One of the collaborating team members controls display of the model, and each collaborator is able to interact with the visual display and to employ a virtual camera to display and record operation of the model from a perspective selected by the member. Collaborating team members enter time-stamped notes which are displayed in sequential order for all collaborators on a common portion of a display screen upon replay of the simulation. Each team member is provided with a microphone and audio gear to collaborate by voice with other members of the team. The notes and virtual camera views coupled to the simulation provide decision makers on the team with an improved understanding of the problem modeled by the simulation, thereby facilitating an improved decision. |
US08954861B1 |
Administrator configurable gadget directory for personalized start pages
A method of facilitating the self-administration of a directory of available modules on a group's syndicated customizable content document or start page is presented. The method includes presenting an initial list of modules to an administrator of a group, enabling the administrator to identify module selection information that identifies criteria for inclusion and/or exclusion of one or more modules in a directory, and storing the module selection information identified by the administrator. When a user of the group accesses a customized content document, the user is presented with a modified list of available modules based on the module selection information. Using this method, the administrator is capable of excluding modules from a global list, including only a specific subset of modules, or a combination of both. A system of carrying out the method is also presented. |
US08954859B2 |
Visually analyzing, clustering, transforming and consolidating real and virtual machine images in a computing environment
System, method and computer program product for generating a GUI that facilitates the management of real and/or virtual images on computing machines in a computing environment. The system and method provides for an interactive visualization of virtual images (machines) and the software components included in each virtual image or real image. According to a consolidating and clustering processes, the images are bundled and displayed in a dendogram to show a hierarchy of the similarity between images. Further, software components are represented by small coded cells and organized into logical groupings. The system and method provides for user interactive functionality that facilitates the gathering of details on certain aspects of the images and/or components. The end result is a software program that facilitates user's ability to consolidate and manage real and virtual images. |
US08954858B2 |
Launching service applications using a virtual network management system
A network service administration system including a plurality of service objects, a plurality of address objects; and a service configuration application for a multifunction appliance running on a client computer coupled to the appliance via a network. The service configuration application includes an interface allowing subscribers to configure at least a subset of application content services provided by the appliance and including a rule set implementing rules in ones of said application content services in said subset based on changes to configurations of any other of said application content services. Each of said service objects may comprise an individual network service definition. |
US08954852B2 |
Adaptive intervals in navigating content and/or media
The present embodiments provide methods and apparatuses for use in navigating through content. Some embodiments provide methods for use in navigating through content that receive an initial first directional control command, activate a seek mode upon receipt of the initial first directional control command comprising advancing over a first amount of content in a first direction from a first point in the content to a second point in the content, receive an initial second directional control command following the receipt of the initial first directional command, and activate a search mode upon receipt of the initial second directional control command, comprising advancing back over a second amount of the first amount of the content where the second amount is less than the first amount of the content. |
US08954851B2 |
Adding video effects for video enabled applications
A streaming video interface component receives video frames from a streaming driver before the frames are received by a consuming application. The streaming video interface component provides the video frames to a video effect rendering component which renders video effects selected by a user. The video frames with the rendered video effects are then provided back to the streaming interface component which thereafter provides them to the consuming application. |
US08954850B2 |
Computer-implemented method and systems for assisting a user in applying a business process pattern
A computer-implemented method for assisting a user in applying a business process pattern. In some embodiments, the computer-implemented method includes providing a graphical user interface (GUI) adapted for displaying a first representation of a business process and for allowing user editing of the business process. The computer-implemented method also includes receiving a user selection of a fragment of the business process as displayed in the first representation. In some embodiments, the computer-implemented method includes calling a second representation of the business process, the second representation including a hierarchy of fragments of business process, and checking whether the fragment selected by the user corresponds to one of the fragments of the second representation. The computer-implemented method may also include instantiating a business process pattern using the selected fragment if the fragment selected corresponds. The selected fragment is re-usable within the business process pattern. |
US08954847B2 |
Displays of user select icons with an axes-based multimedia interface
A method of displaying an on-screen graphical user interface, the method comprising providing a plurality of user-selectable icons, and a plurality of content icons representing respective items of contents; generating image data for the on-screen user-interface with a multi-dimensional array which includes a first axis comprising the plurality of user-selectable icons adapted to be arranged in a specific direction and which is also adapted to include a second axis comprising the plurality of content icons in a direction intersecting, or abutting, the first axis; and outputting the image data for the on-screen user interface related to displaying the contents to a display, wherein the generating displays the second axis to intersect, or abut, the first axis. |
US08954846B2 |
Communication apparatus and storage medium storing program
A communication apparatus including: a positional information storing portion which stores positional information of content-related information; a content-related-information obtaining portion which obtains the content-related information; a web-page generating portion which generates, using the content-related information, a web page including first information; a web-page storing portion which has a storage device store the web page, the storage device being accessible from an external device; an assigning portion which assigns web-page positional information to the web page such that the external device is allowed to access to the web page; a recording-page generating portion which generates a recording page on which is described second information; a positional-information adding portion which adds the web-page positional information to the recording page; and a recording controller which controls a recording section configured to perform recording on a recording medium, such that the recording section records the recording page. |
US08954845B2 |
Image processing device, method and storage medium for two-way linking between related graphics and text in an electronic document
A region division portion extracts an “object”, an “anchor expression accompanying the object” and a “text including the anchor expression” from image data based on a paper document and an electronic document. A link processing portion generates link information that associates, in two ways, the “object”, the “anchor expression included in the text” or the “text including the anchor expression” with each other. Then, a format conversion portion converts the link information into electronic document data including two-way link information. When this electronic document data is displayed by an application and one of the “object” and the “anchor expression included in the text” is selected, the other can be displayed according to the link information. |
US08954844B2 |
Differential dynamic content delivery with text display in dependence upon sound level
Differential dynamic content delivery including providing a session document for a presentation, where the session document includes a session grammar and a session structured document; selecting from the session structured document a classified structural element in dependence upon user classifications of a user participant in the presentation; presenting the selected structural element to the user; streaming speech to the user from one or more users participating in the presentation; converting the speech to text; detecting a total sound level for the user; and determining whether to display the text in dependence upon the total sound level for the user. |
US08954834B1 |
System for communicating information to a mobile device using portable code widgets
A system is provided for widget to widget communication. The system includes a first device, a second device, and a communication server. The first device and/or the second device are a mobile device. The communication server provides a first widget to the first device and provides a second widget to the second device, wherein the first widget and the second widget are portable code that is installed and executed in a corresponding runtime environment without additional compilation. The first widget, when executed by the first device, communicates information that identifies content associated with the first widget and a state of the content via the first device to the communication server. The communication server communicates the information and the state to the second device. The second widget, when executed by the second device, presents at least some of the content based on the information and the state in coordination with the first widget presenting the content. |
US08954832B1 |
Asymmetric distance coding
A digital electronic message comprising datawords to be transmitted in a communications system can be encoded prior to transmission using an asymmetric error detection coding scheme. The coding scheme is asymmetric because the coding scheme includes multiple codeword groups each with a different minimum coding distance. The codewords in a group having a greater minimum coding distance can correspond to datawords that have a relatively high susceptibility to transmission errors. The codewords in a group having a lesser minimum coding distance can correspond to datawords that have a relatively low susceptibility to transmission errors. |
US08954831B2 |
Error correction codes for incremental redundancy
A method includes accepting input including at least part of a codeword that has been encoded by an ECC defined by a set of parity check equations. The codeword includes data bits and parity bits. A decoding process is applied to the codeword using the data bits and only a first partial subset of parity bits in the input, and using only a second partial subset of equations. Upon a failure to decode the codeword using the partial subsets, the codeword is re-decoded using the data bits and all parity bits in the input, and using all equations. The set of parity check equations is defined such that any parity bit in the codeword appears in multiple equations, and any parity bit in the first partial subset of the parity bits appears in a plurality of equations in the second partial subset of the equations. |
US08954829B2 |
Digital broadcasting system and method of processing data
A broadcast transmitter and a method of processing broadcast data in the broadcast transmitter are disclosed. The method includes randomizing broadcast service data, first encoding the randomized broadcast service data to add parity data, second encoding the first-encoded broadcast service data at a code rate of D/E, first interleaving the second-encoded broadcast service data, encoding signaling data for signaling the broadcast service data, modulating the first-interleaved broadcast service data and the encoded signaling data, and transmitting the modulated data. |
US08954819B2 |
Method and apparatus for reading a disc
Aspects of the disclosure provide a circuit that includes a decoder, an error checking module, and a controller. The decoder is configured to receive codewords, and decode the codewords based on an error correcting code. The error checking module is configured to error-check sectors using an error detecting code in the sectors. Each sector is formed of a plurality of decoded codewords. The controller is configured to store in a memory, when the error checking fails for at least one sector, the decoded codewords and corresponding flags indicative of pass or fail of the decoding of the codewords. |
US08954815B2 |
System and method for delivering content over a multicast network
A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session. |
US08954814B2 |
Method and apparatus for decoding
Aspects of the disclosure can provide a method and an apparatus to decode a data stream based on multiple transmissions with efficient usages of storage and power resources. The method can include receiving a first plurality of encoded code blocks corresponding to a first transmission of a transport block, decoding the first plurality of encoded code blocks into decoded code blocks, error detecting the decoded code blocks, and storing a decoding history of the decoded code blocks. Further, the method can include receiving a second plurality of encoded code blocks corresponding to a retransmission of the transport block. The second plurality of encoded code blocks can map the first plurality of encoded code blocks, respectively. The method can selectively decode a subset of the second plurality of encoded code blocks based on the decoding history. In addition, the method can include storing soft bits for code blocks that failed decoding. |
US08954812B2 |
Computer error detection device and method
An exemplary computer error detection device for detecting the warning sounds emitted by a malfunctioning computer is provided. The computer error detection device includes a storage unit, a display unit, a detection unit, and a processing unit. The storage unit includes a look-up table (LUT). The LUT includes a plurality of solution plans each corresponding to a predetermined warning sound. The display unit displays a selecting interface thereon for a user to input a basic input output system (BIOS) type or a computer model of the computer. The detection unit records a warning sound emitted from the malfunctioning computer and generates an electronic sample of the warning sound. The processing unit searches the LUT to determine a solution plan corresponding to the sample, and controls the display unit to display the determined solution plan. |
US08954810B2 |
Progressive validation check disabling based upon validation results
Execution statistics are gathered that represent results of execution of a validation check that evaluates code performance within an executing application. A determination is made as to whether the gathered execution statistics for the execution of the validation check match configured criteria to disable the validation check. The validation check is programmatically disabled in response to determining that the gathered execution statistics for the execution of the validation check match the configured criteria to disable the validation check. |
US08954808B1 |
Systems and methods for performing input/output path failovers
A computer-implemented method for performing input/output path failovers may include identifying a computing system with a plurality of input/output paths to a storage array. The computer-implemented method may additionally include detecting a failure of a first input/output path within the plurality of input/output paths. The computer-implemented method may also include receiving a communication from the storage array indicating that a storage processor within the first input/output path is unavailable. The computer-implemented method may further include selecting at least one alternate input/output path within the plurality of input/output paths that does not include the storage processor. The computer-implemented method may additionally include reconfiguring the computing system to access the storage array via the alternate input/output path. Various other methods, systems, and computer-readable media are also disclosed. |
US08954795B2 |
System and method for responding to failure of a hardware locus at a communication installation
A method for responding to a failure of hardware locus of at a communication installation having a plurality of control apparatuses for controlling a plurality of processes distributed among a plurality of hardware loci, the hardware loci including at least one spare hardware locus, includes the steps of: (a) Shifting control of a failed process from an initial control apparatus to an alternate control apparatus located at an alternate hardware locus than the failed hardware locus. The failed process is a respective process controlled by the initial control apparatus located at the failed hardware locus. (b) Relocating the respective control apparatuses located at the failed hardware locus to a spare hardware locus. (c) Shifting control of the failed process from the alternate control apparatus to the initial control apparatus relocated at the spare hardware locus. |
US08954794B2 |
Method and system for detection of latent faults in microcontrollers
Embodiments relate to systems and methods for detecting register corruption within CPUs operating on the same input data enabling non-invasive read access to and comparison of contents of at least one set of according ones of registers of different CPUs to detect corrupted registers in form of according registers with inconsistent contents. |
US08954793B2 |
Method and a storage server for data redundancy
A method and a storage server for backing up data, involves mass storage devices of users of the service that connect to the storage server of the service provider over a public data network. The customers store the data with their terminals. The data is stored to the file system of the mass storage device which encrypts the stored data and transfers the data in encrypted form over the public data network to the storage server. The storage server calculates error correction data from the encrypted data. The error correction data is stored in the mass memory of the storage server. When recovering the stored data of the users, the storage server requests the stored data of all the users whose data was used for the error correction data calculation over the public data network to be used for the recovery calculation. |
US08954787B2 |
Establishing trust in a maintenance free storage container
A maintenance free storage container includes a plurality of storage servers, wherein the maintenance free storage container allows for multiple storage servers of the plurality of storage servers to be in a failure mode without replacement. The maintenance free storage container further includes a container controller operable to manage failure mode information of the plurality of storage servers, manage mapping of a plurality of virtual storage servers to at least some of the plurality of storage servers based on the failure mode information, communicate storage server access requests with a device external to the maintenance free storage container using addressing of the plurality of virtual storage servers, and communicate the storage server access requests within the maintenance free storage container using addressing of the plurality of storage servers. |
US08954785B2 |
Redundancy and load balancing in remote direct memory access communications
A method for managing communications to add a first Remote Direct Memory Access (RDMA) link between a TCP server and a TCP client, where the first RDMA link references first remote memory buffer (RMB) and a second RMB, and further based on a first remote direct memory access network interface card (RNIC) associated with the TCP server and a second RNIC associated with the TCP client. The system determines whether a third RNIC is enabled. The system adds a second RDMA link, responsive to a determination that the third RNIC is enabled. The system detects a failure in the second RDMA link. The system reconfigures the first RDMA link to carry at least one TCP packet of a session formerly assigned to the second RDMA link, responsive to detecting the failure. The system communicates at least one packet of the at least one session on the first RDMA link. |
US08954778B2 |
Electronic timekeeping circuit and a method for operating timekeeping circuit
An electronic timekeeping circuit and a method for operating an electronic timekeeping circuit are described. In one embodiment, an electronic timekeeping circuit includes power supplies and timekeeping circuit components that are grouped into power supply domains. Power is supplied to each of the power supply domains by a corresponding one of the power supplies. Timekeeping registers are duplicated for each of the power supply domains. The timekeeping registers are synchronized between the power supply domains if one of the timekeeping registers is modified or if one of the power supplies is turned off and subsequently turned back on. Other embodiments are also described. |
US08954776B2 |
Energy-saving circuit for motherboard
When there is a memory module mounted in a memory slot, a memory power circuit provides a voltage to the memory slot. First and second power pins of the memory slot are connected. A first electronic switch is turned on. A second electronic switch is turned off. A programmable logic controller (PLC) outputs a first control signal to the memory power circuit to output the voltage to the memory slot. When there is no memory module mounted in the memory slot and the motherboard is powered on, the memory power circuit provides a voltage to the memory slot. The first and second power pins of the memory slot are disconnected. The first electronic switch is turned off. The second electronic switch is turned on. The PLC outputs a second control signal to control the memory power circuit not to output the voltage to the memory slot. |
US08954775B2 |
Power gating functional units of a processor
In one embodiment, the present invention includes an apparatus having a core including functional units each to execute instructions of a target instruction set architecture (ISA) and a power controller to control a power mode of a first functional unit responsive to a power identification field of a power instruction of a power region of a code block to be executed on the core. Other embodiments are described and claimed. |
US08954769B2 |
Image processing apparatus restricting shifting to power saving mode until the apparatus sends a notification indicating the location of a newly stored document
An image processing apparatus capable of shifting to a power saving mode. The image processing apparatus includes a storing unit configured to store a document in a storage device, a notification unit configured to periodically notify an apparatus of a predetermined destination of information about a document that has been newly stored by the storing unit into the storage device, and a control unit configured to restrict shifting to a power saving mode in which the notification unit cannot make the notification after storage of a document by the storing unit has been completed and until the notification unit notifies at least information about the document. |
US08954767B2 |
Standby current reduction through a switching arrangement with multiple regulators
Consistent with an example embodiment, there is a power regulator arrangement with variable current capacity providing power from a power supply to a load having variable demand. As a load, a high-performance microprocessor has several modes of operation. At the highest speed setting, it demands a lot of current. At slower clock speeds and during state retention, the processor has a very low current consumption. Using a single regulator, the current efficiency may be very low during long standby periods. To increase the efficiency even at lower load currents, a scheme is based on parallel operation of multiple regulators having different load ranges, for example, a “low, “medium,” and “high” range regulators. Having knowledge of the load current profile, the regulators can be adjusted such that the peak of the efficiency curve matches the load profile of the regulator. The efficiency of the power regulator arrangement is enhanced throughout the range of power demanded by the load. |
US08954763B2 |
Automated infrastructure management systems and methods for enabling real time energy management
Automated infrastructure management systems and methods document infrastructure elements within a facility, provide a comprehensive record of all network-connected equipment within a facility, and facilitate trouble shooting of network-connected equipment. An automated infrastructure management system includes a plurality of intelligent patch panels, each comprising a plurality of connector ports connected to individual communication channels of a network, a controller in communication with at least some of the intelligent patch panels that obtains connectivity information for the intelligent patch panel's ports, and management software in communication with the controller. The management software performs various functions including correlating the interconnection information for the intelligent patch panels with the physical location information for telecommunications in its database, applying energy management policies to a respective communication channel, providing real time physical location information for devices connected to communication channels to a network switch, and displaying real time physical location information of the devices. |
US08954756B2 |
Systems and methods for transformation of logical data objects for storage
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object includes creating in the storage device an encrypted logical data object including a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into the encrypted sections in accordance with an order the chunks are received, wherein the encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object. |
US08954755B2 |
Memory address translation-based data encryption with integrated encryption engine
A method and circuit arrangement utilize an integrated encryption engine within a processing core of a multi-core processor to perform encryption operations, i.e., encryption and decryption of secure data, in connection with memory access requests that access such data. The integrated encryption engine is utilized in combination with a memory address translation data structure such as an Effective To Real Translation (ERAT) or Translation Lookaside Buffer (TLB) that is augmented with encryption-related page attributes to indicate whether pages of memory identified in the data structure are encrypted such that secure data associated with a memory access request in the processing core may be selectively streamed to the integrated encryption engine based upon the encryption-related page attribute for the memory page associated with the memory access request. |
US08954752B2 |
Building and distributing secure object software
A method and structure for enhancing protection for at least one of software and data being executed on a computer. A file to comprise a secure object is constructed, using a processor on a build machine, the secure object to be executed on a target machine different from the build machine. The secure object comprises at least one of code and data that is to be encrypted when the secure object is stored on the target machine. The encrypted stored secure object is decrypted by the target machine when executed by the target machine after retrieval from a memory on the target machine. The decryption uses a system key of the target machine. The secure object is stored, upon completion of construction, in an encrypted state as a completed secure object, and the secure object is completed without the build machine having the system key of the target machine. |
US08954751B2 |
Secure memory control parameters in table look aside buffer data fields and support memory array
Techniques and apparatus for utilizing bits in a translation look aside buffer (TLB) table to identify and access security parameters to be used in securely accessing data are provided. Any type of bits in the TLB may be used, such as excess bits in a translated address, excess attribute bits, or special purpose bits added specifically for security purposes. In some cases, the security parameters may include an index into a key table for use in retrieving a set of one or more keys to use for encryption and/or decryption. |
US08954749B2 |
Methods, systems, and product for hashing using twisted tabulation
Methods, systems, and products describe a robust solution for the dictionary problem of data structures. A hash function based on tabulation is twisted to utilize an additional xoring operation and a shift. This twisted tabulation offers strong robustness guarantees over a set of queries in both linear probing and chaining. |
US08954746B2 |
Communication apparatus, and method for controlling communication apparatus
A communication apparatus is provided that encrypts content data that is to be uploaded to a server by using a first encryption key used in a process for sharing a communication parameter for communicating with other communication apparatus via a wireless network or a second encryption key based on the communication parameter shared in the sharing process. Consequently, the content data can be viewed only by a specific communication apparatus. |
US08954741B2 |
Apparatus and method for supporting family cloud in cloud computing system
A method and an apparatus for effective data sharing between users in a cloud computing system are provided. The cloud computing system includes a first cloud hub and a User Equipment (UE). The first cloud hub provides a cloud service to a UE connected by a public cloud access and provides a cloud service to a UE connected to a public personal cloud system installed by a service provider, and is installed by a user. The UE subscribes to the first cloud hub as a main cloud and inquires as to data stored in the first cloud hub. |
US08954740B1 |
Session key proxy decryption method to secure content in a one-to-many relationship
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure content. The server determines whether the user is a member of the group using the identifying information of the user. If the user is a member of the group, the server decrypts the encrypted session key using a private key of the group, and causes the client device to obtain a session key to access the secure content. |
US08954737B2 |
Method and apparatus for performing distributed privacy-preserving computations on user locations
A location-trace comparison system can perform privacy-preserving computations on locations traces for two or more users, for example, to determine a location-visit overlap for these users. During operation, the system obtains location-event descriptions for locations that a local user has visited and/or is likely to visit, such that a respective location-event description indicates a location identifier and a time-interval identifier. The system encrypts the location-event descriptions to generate a corresponding set of encrypted local-user events, and receives encrypted remote-user events from a remote device, for at least one remote user. The system compares the encrypted location events to determine an overlap between the set of encrypted local-user events and the set of encrypted remote-user events. The system then determines, from the encrypted-event overlap, location-event descriptions for locations that the local and remote users have both visited and/or are both likely to visit during the same time interval. |
US08954736B2 |
Limiting the functionality of a software program based on a security model
Systems, methods, routines and/or techniques for limiting the functionality of a software program based on a security model are described. One or more embodiments may include limiting the functionality of a software program (e.g., a widget) based on one or more operations that the widget intends to take. One or more embodiments may include limiting the functionality of a widget that is located on and/or accessible via a lock screen of a mobile device. One or more embodiments may include preventing a widget from causing an application to perform sensitive actions when a system is in an un-authenticated state. One or more embodiments may include preventing a widget from installing and/or displaying on a particular screen of a mobile device (e.g., a lock screen) if the widget includes a function that indicates that a sensitive operation will be taken. |
US08954735B2 |
Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware
A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified. |
US08954733B2 |
Embedded extrinsic source for digital certificate validation
A computer uses the information included within a digital certificate to obtain a current date and time value from a trusted extrinsic trusted source and the computer compares the obtained current date and time value to a validity period included in the digital certificate to determine if the digital certificate is expired. The information included within the digital certificate specifying an extrinsic source for the current date and time value can be included in an extension of the digital certificate, and the information can specify a plurality of extrinsic sources. |
US08954724B2 |
Anonymization of data within a streams environment
Streams applications may decrypt encrypted data even though the decrypted data is not used by an operator. Operator properties are defined to permit decryption of data within the operator based on a number of criteria. By limiting the number of operators that decrypt encrypted data, the anonymous nature of the data is further preserved. Operator properties also indicate whether an operator should send encrypted or decrypted data to a downstream operator. |
US08954721B2 |
Multi-chip initialization using a parallel firmware boot process
Mechanisms, in a multi-chip data processing system, for performing a boot process for booting each of a plurality of processor chips of the multi-chip data processing system are provided. With these mechanisms, a multi-chip agnostic isolated boot phase operation is performed, in parallel, to perform an initial boot of each of the plurality of processor chips as if each of the processor chips were an only processor chip in the multi-chip data processing system. A multi-chip aware isolated boot phase operation of each of the processor chips is performed in parallel, where each of the processor chips has its own separately configured address space. In addition, a unified configuration phase operation is performed to select a master processor chip from the plurality of processor chips and configure other processor chips in the plurality of processor chips to operate as slave processor chips that are controlled by the master processor chip. |
US08954717B2 |
System capable of booting through a universal serial bus device and method thereof
A system capable of booting through a Universal Serial Bus device includes a Universal Serial Bus port, an embedded controller, a platform control hub, and a basic input/output system. The embedded controller is used for generating a boot signal when the system is powered off and at least one Universal Serial Bus device is plugged into the Universal Serial Bus port. The platform control hub is woken up according to the boot signal. The basic input/output system has boot sequence setting values. The basic input/output system first starts to boot the at least one Universal Serial Bus device through the platform control hub according to the boot sequence setting values when the basic input/output system is woken up according to the boot signal. |
US08954711B2 |
Address generation in a data processing apparatus
A data processing apparatus is provided comprising processing circuitry and an instruction decoder responsive to program instructions to control processing circuitry to perform the data processing. The instruction decoder is responsive to an address calculating instruction to perform an address calculating operation for calculating a partial address result from a non-fixed reference address and a partial offset value such that a full address specifying a memory location of an information entity is calculable from said partial address result using at least one supplementary program instruction. The partial offset value has a bit-width greater than or equal to said instruction size and is encoded within at least one partial offset field of said address calculating instruction. A corresponding data processing method, virtual machine and computer program product are also provided. |
US08954710B2 |
Variable length encoding in a storage system
A system and method for maintaining a mapping table in a data storage subsystem. A data storage subsystem supports multiple mapping tables including a plurality of entries. Each of the entries comprise a tuple including a key. A data storage controller is configured to encode each tuple in the mapping table using a variable length encoding. Additionally, the mapping table may be organized as a plurality of time ordered levels, with each level including one or more mapping table entries. Further, a particular encoding of a plurality of encodings for a given tuple may be selected based at least in part on a size of the given tuple as unencoded, a size of the given tuple as encoded, and a time to encode the given tuple. |
US08954709B2 |
Memory management apparatus, memory management method and non-transitory computer readable storage medium
A memory management apparatus has an ASID conversion table, an actual ASID use table, and a TLB flush control section. The ASID conversion table and the actual ASID use table manage virtual ASID, actual ASID and an overlap flag so that they are related for each VM. The TLB flush control section reads actual ASIDs allocated to VM as a switching target at the time of switching VM as a switching source into the VM as the switching target, determines whether the read actual ASID is allocated to the plurality of VMs in an overlapped manner with reference to the overlap flag, and sets the actual ASID in the read actual ASIDs determined being allocated in the overlapped manner as a target for the TLB flush. |
US08954708B2 |
Method of storing data in non-volatile memory having multiple planes, non-volatile memory controller therefor, and memory system including the same
A method of controlling a non-volatile memory device having multiple planes including receiving write requests from a host, the write requests each including a logical address, a write command, and a data set; storing the data sets at an address of a buffer; storing the buffer address in a mapping table that maps addresses of the buffer to the multiple planes; sequentially transmitting the data sets stored at respective buffer addresses to page buffers, respectively, of the planes corresponding to the buffer addresses according to the mapping table; and programming in parallel at least two data sets stored in respective page buffers to memory cells of the non-volatile memory device. |
US08954704B2 |
Dynamic network adapter memory resizing and bounding for virtual function translation entry storage
An approach is provided which a system selects a first virtual function from a plurality of virtual functions executing on a network adapter that includes a memory area. Next, the system allocates, in the memory area, a memory corresponding to the first virtual function. The system then stores one or more translation entries in the allocated memory partition, which are utilized to send data traversing through the first virtual function. As such, the system sends, utilizing one or more of the translation entries, the data packets from the network adapter to one or more destinations. In turn, the system dynamically resizes the memory partition based upon an amount of the memory partition that is utilized to store the one or more translation entries. |
US08954701B2 |
Address space management while switching optically-connected memory
Memory is dynamically switched through the optical-switching fabric using at least one communication pattern to transfer memory space in the memory blades from one processor to an alternative processor in the processor blades without physically copying data in the memory to the processors. Various communication patterns for the dynamically switching are supported. |
US08954700B2 |
Method and apparatus for managing processing thread migration between clusters within a processor
A method, and corresponding apparatus, of managing processing thread migrations within a plurality of memory clusters, includes embedding, in memory components of the plurality of memory clusters, instructions indicative of processing thread migrations; storing, in one or more memory components of a particular memory cluster among the plurality of memory clusters, data configured to designate the particular memory cluster as a sink memory cluster, the sink memory cluster preventing an incoming migrated processing thread from migrating out of the sink memory cluster; and processing one or more processing threads, in one or more of the plurality of memory clusters, in accordance with at least one of the embedded migration instructions and the data stored in the one or more memory components of the sink memory cluster. |
US08954698B2 |
Switching optically connected memory
Memory is dynamically switched through the optical-switching fabric using at least one communication pattern to transfer memory space in the memory blades from one processor to an alternative processor in the processor blades without physically copying data in the memory to the processors. Various communication patterns for the dynamically switching are supported. |
US08954695B1 |
Secure pool memory management
In general, the invention is directed to techniques for identifying memory overruns. For example, as described herein, a device includes a main memory that enables an addressable memory space for the device. A plurality of memory pages each comprises a separate, contiguous block of addressable memory locations within the addressable memory space. The device also includes a memory manager comprising a secure pool allocator that assigns a secure pool size value to a first one of the plurality of memory pages. The secure pool size value defines a plurality of protected memory spaces in the first memory page that partition the first memory page into a plurality of secure objects. The device also includes a memory management unit comprising secure pool logic that determines, based on the secure pool size value, whether a memory address is an address of one of the protected memory spaces in the first memory page. |
US08954693B2 |
Data storage device with selective data compression
A memory controller comprises a host interface block comprising a compression ratio calculator configured to determine whether a compression ratio of input data exceeds a predetermined compression ratio, and a compression block configured to compress the input data as a consequence of the host compression ratio calculator determining that the compression ratio exceeds the predetermined compression ratio. |
US08954692B2 |
File protecting method and system, and memory controller and memory storage apparatus thereof
A file protecting method and system and a memory controller and a memory storage apparatus using the same are provided. The file protecting method includes performing a file protection enabling procedure for a file to generate an entry value backup according to at least one entry value corresponding to at least one cluster storing the file, which is recorded in a file allocation document, store the entry value backup in a secure storage area and change the entry value corresponding to the cluster storing the file in the file allocation document, wherein the file cannot be read according to the changed entry value. Accordingly, the file stored in the memory storage apparatus the can be effectively protected from being accessed by an un-authorized person. |
US08954691B2 |
Identifying unallocated memory segments
A network device that includes a first memory to store packets in segments; a second memory to store pointers associated with the first memory; a third memory to store summary bits and allocation bits, where the allocation bits correspond to the segments. The network device also includes a processor to receive a request for memory resources; determine whether a pointer is stored in the second memory, where the pointer corresponds to a segment that is available to store a packet; and send the pointer when the pointer is stored in the second memory. The processor is further to perform a search to identify other pointers when the pointer is not stored in the second memory, where performing the search includes identifying a set of allocation bits, based on an unallocated summary bit, that corresponds to the other pointers; identify another pointer, of the other pointers, based on an unallocated allocation bit of the set of allocation bits; and send the other pointer in response to the request. |
US08954688B2 |
Handling storage pages in a database system
An operation is disclosed for handling storage pages in a database system. The database system may include a management component and a storage component. The storage component may include storage locations with different hierarchical levels. Each storage page of the storage pages may include a number of records. The operation may include copying a storage page from the storage component to a buffer pool controlled by the management component, monitoring which records of the storage page in the buffer pool are being accessed, and setting information indicating access for each record accessed. The operation may also include determining, based on the information indicating access, whether to split the storage page into at least two resulting storage pages. The operation may also include writing the at least two resulting storage pages to the storage component at storage locations, where the at least two resulting storage pages have different hierarchy levels. |
US08954679B2 |
Management of cached data based on user engagement
A social data aggregator generates entries of action data describing actions taken by users. A portion of the entries are stored in an action cache to expedite retrieval. To store more recent or relevant entries in the action cache, entries are removed from the action cache based on engagement scores associated with the entries. An engagement score indicates a likelihood of a user requesting content interacting with a notification based on an entry. Entries having the lowest engagement scores or having engagement scores below a threshold are removed from the action cache. |
US08954677B1 |
System and method for managing an object cache
In order to optimize efficiency of deserialization, a serialization cache is maintained at an object server. The serialization cache is maintained in conjunction with an object cache and stores serialized forms of objects cached within the object cache. When an inbound request is received, a serialized object received in the request is compared to the serialization cache. If the serialized byte stream is present in the serialization cache, then the equivalent object is retrieved from the object cache, thereby avoiding deserialization of the received serialized object. If the serialized byte stream is not present in the serialization cache, then the serialized byte stream is deserialized, the deserialized object is cached in the object cache, and the serialized object is cached in the serialization cache. |
US08954676B2 |
Cache with scratch pad memory structure and processor including the cache
Disclosed are a cache with a scratch pad memory (SPM) structure and a processor including the same. The cache with a scratch pad memory structure includes: a block memory configured to include at least one block area in which instruction codes read from an external memory are stored; a tag memory configured to store an external memory address corresponding to indexes of the instruction codes stored in the block memory; and a tag controller configured to process a request from a fetch unit for the instruction codes, wherein a part of the block areas is set as a SPM area according to cache setting input from a cache setting unit. According to the present invention, it is possible to reduce the time to read instruction codes from the external memory and realize power saving by operating the cache as the scratch pad memory. |
US08954671B2 |
Tiered storage device providing for migration of prioritized application specific data responsive to frequently referenced data
Data is placed in tiered storage with a suitable granularity according to application characteristics. The storage apparatus comprises a controller for managing storage areas, provided by storage media of a plurality of types of varying performance, as pools, and for assigning the storage areas in page units to a virtual volume from any tiered storage among a plurality of types of tiered storage which the pool comprises in response to a data write request from the host computer, wherein, for specific data which is managed by the host computer, the controller specifies an area with a high referencing frequency among the specific data on the basis of organization information of the specific data, and moves this area to another of the tiered storage with a higher performance than an already assigned tiered storage. |
US08954669B2 |
Method and system for heterogeneous data volume
A method and system is disclosed for providing a heterogeneous data storage comprising a plurality of storage devices of different types with respect to device vendor, model, capacity, performance and/or function. The present invention employs data access mechanisms specific to the type of underlying storage and the type of data to be stored or retrieved, and provides for integrated remote mirroring, disaster recovery and hierarchical storage management (HSM), as well as improved I/O performance and life expectancy of storage disks. A method of writing to and reading from heterogeneous data volume is also disclosed. |
US08954662B2 |
SSD controller, and method for operating an SSD controller
A Solid State Drive (SSD) controller is disclosed. When a data read command is transmitted by a host, the SSD controller may select a representative pointer from at least one first pointer by checking a point in time when data writing is completed in a buffer by at least one memory, read the data from the buffer by referring to a second pointer, and transmit the read data to the host, based on the representative pointer. |
US08954656B2 |
Method and system for reducing mapping table size in a storage device
A method and system are disclosed for handling logical-to-physical mapping and reducing mapping table size. The method includes the storage device storing in fast access memory, such as DRAM, only the physical location of a primary cluster in each cluster group, and then writing location information for remaining clusters in a cluster group into the header of the data for the primary cluster of the cluster group in non-volatile memory. The system includes a storage device having volatile memory, non-volatile memory and a controller in communication with the volatile and non-volatile memory that is configured to carry out the method noted above. |
US08954654B2 |
Virtual memory device (VMD) application/driver with dual-level interception for data-type splitting, meta-page grouping, and diversion of temp files to ramdisks for enhanced flash endurance
A Virtual-Memory Device (VMD) driver and application execute on a host to increase endurance of flash memory attached to a Super Enhanced Endurance Device (SEED) or Solid-State Drive (SSD). Host accesses to flash are intercepted by the VMD driver using upper and lower-level filter drivers and categorized as data types of paging files, temporary files, meta-data, and user data files, using address ranges and file extensions read from meta-data tables. Paging files and temporary files are optionally written to flash. Full-page and partial-page data are grouped into multi-page meta-pages by data type before storage by the SSD. ramdisks and caches for storing each data type in the host DRAM are managed and flushed to the SSD by the VMD driver. Write dates are stored for pages or blocks for management functions. A spare/swap area in DRAM reduces flash wear. Reference voltages are adjusted when error correction fails. |
US08954653B1 |
Mechanisms for efficient management of system data in data storage systems
A data storage system configured to efficiently manage system data, efficiently organize system data, and reduce system data redundancy is disclosed. In one embodiment, the data storage system can maintain memory allocation information configured to track defective allocation units. Memory allocation information can be further configured to provide information for locating the memory allocation units or memory locations in physical memory. Separate information that indicates locations of the data allocation units or memory locations and/or records defective memory locations may not be needed. Hence, redundancy can be reduced, efficiency can be increased, and improved performance can be attained. |
US08954652B2 |
Method and controller for identifying a unit in a solid state memory device for writing data to
In a method for identifying a unit in a solid state memory device for writing data to a tier structure is maintained the tier structure comprising at least two tiers for assigning units available for writing data to. In response to receiving a request for writing data it is determined if a unit for writing data to is available in a first tier of the at least two tiers. In response to determining that a unit is available for writing data to in the first tier this unit is identified for writing data to, and in response to determining that no unit is available for writing the data to in the first tier it is determined if a unit is available for writing data to in a second tier of the at least two tiers subject to a priority of the write request. |
US08954651B2 |
System and method for data inversion in a storage resource
A method may comprise receiving a page of data to be stored on a storage resource. The method may also comprise determining, for each particular inversion mode of a plurality of inversion modes, the number of bits of the page of data to be inverted to store a representation of the page of data in accordance with the particular inversion mode. The method may additionally comprise determining a selected inversion mode from the plurality of inversion modes for the page of data, the selected inversion mode comprising the inversion mode for which the least number of physical bit transitions are required to store the representation of the page of data in accordance with the selected inversion mode. The method may further comprise storing the representation of the page of data in a data memory in accordance with the inversion mode. |
US08954647B2 |
Systems and methods for redundantly storing metadata for non-volatile memory
Systems and methods are provided for storing data to or reading data from a non-volatile memory (“NVM”), such as flash memory, using a metadata redundancy scheme. In some embodiments, an electronic device, which includes an NVM, may also include a memory interface for controlling access to the NVM. The memory interface may receive requests to write user data to the NVM. The user data from each request may be associated with metadata, such as a logical address, a directional flag, or other data. In response to a write request, the NVM interface may store the user data and its associated metadata in a first memory location (e.g., page), and may store a redundant copy of the metadata in a second memory location. The directional flag indicates the geometric relationship between the first memory location and the second memory location. Thus, if the first memory location becomes inaccessible, the memory interface can still recover the metadata from the backup copy stored in the second memory location. |
US08954646B2 |
Method for managing a plurality of blocks of a flash memory, and associated memory device and controller thereof
A method for managing a plurality of blocks of a Flash memory includes: recording/updating linking information regarding a logical block address, wherein the linking information includes a plurality of physical block addresses linking to the logical block address, and each physical block address represents a block of the plurality of blocks; and when a block represented by a physical block address of the plurality of physical block addresses has no valid page, selectively erasing the block and removing the physical block address from the linking information, wherein when a number of blocks that are within blocks represented by the physical block addresses and have no valid page reaches a predetermined value, erasing all of the blocks that have no valid page and removing physical block addresses thereof from the linking information. |
US08954641B2 |
Method and apparatus for establishing communication
A method and apparatus for establishing communication between a first device and a second device. In the method, the second device recognizes a mark representing the first device to establish communication with the first device, and establishes communication with the first device, based on information included in the mark. |
US08954640B1 |
In-system programming of memory external to integrated circuit
An integrated circuit (IC) can include an interface configured to receive packetized data specifying a programming instruction for a memory external to the integrated circuit over a first communication channel. The first communication channel can be an in-band signaling channel also used by the IC when performing a function independent of programming the memory. The IC can include a buffer having a first port coupled to the interface and a second port. The buffer can be configured to store the programming instruction extracted from the packetized data. The IC also can include a programmer coupled to the second port. The programmer can be configured to program the memory over a second communication channel different from the first communication channel responsive to interpretation of the programming instruction from the buffer. |
US08954632B2 |
System method for regulating an input/output interface by sampling during a time duration associated with I/O states
An apparatus includes an input/output (I/O) interface circuit that includes a memory and a controller. The memory stores a plurality of commands to regulate an input/output (I/O) interface. The commands indicate at least one I/O state of at least one I/O terminal of the I/O interface circuit and a time duration that is associated with the I/O state. The controller executes the commands to place the I/O interface in the the I/O state(s) in a predetermined sequence. |
US08954631B2 |
Continuously transferring data using a USB mass storage device
A method for continuous data transfer when a USB mass storage device is disconnected and reconnected is provided. The method may include monitoring state information from one or more mass storage devices, using a software driver to detect a change in state of the mass storage device on the computer. Active I/O transfers using the USB mass storage device are paused when the software driver detects that the USB mass storage device is detached from the computer. A configurable timer is started. The software drive may detect the attaching of a USB device. If, prior to the expiration of the timer, the software driver verifies that the USB mass storage device is the same that was previously attached to the computer, active I/O transfers are continued. |
US08954627B2 |
Fibre channel N-port ID virtualization protocol
Disclosed is a computer implemented method, data processing system and computer program product to discover an SCSI target. The method comprises a client adapter transmitting an N_port ID virtualization (NPIV) login to a virtual I/O server (VIOS). The client adapter receives a successful login acknowledgement from the VIOS and issues a discover-targets command to the fabric. Upon determining that the SCSI target information is received, wherein the SCSI target information includes at least one SCSI identifier. Responsive a determination that SCSI target information is received the client adapter issues a port login to a target port, wherein the target port is associated with the at least one SCSI target. The client adapter makes a process login to form an initiator/target nexus between a client and at least one SCSI target. The client adapter queries the SCSI target by using a world wide port name associated with the target port. |
US08954625B2 |
System, method and computer program product for portable multimedia content display
A system, method and computer program product for performing a method for presenting multimedia data are disclosed. The method includes but is not limited to detecting insertion of a portable storage device into a first end user device; automatically launching transfer of multimedia data and Meta data describing the multimedia data from the first end user device to the portable storage device; transferring the multimedia data from the first end user device to the portable storage device; detecting insertion of the portable storage device into a second end user device; automatically launching transfer of multimedia data and Meta data describing the multimedia data from the portable storage device to the second end user device; and transferring the multimedia data from the portable storage device to the second end user device. |
US08954622B1 |
Embedded programmable logic for logic stacking on application processor
A system includes a programmable interface module located on an integrated circuit (IC), the programmable interface module configured to be programmed to operate in a plurality of modes, and communicate with at least one device external to the IC based on a selected one of the plurality of modes. Each of the plurality of modes corresponds to at least one of a type of peripheral feature, a type of communication interface, and a protocol type. An interface configuration module is configured to receive an indication of the selected one of the plurality of modes and program the programmable interface module to operate in the selected one of the plurality of modes in response to the indication. |
US08954619B1 |
Memory module communication control
Methods and systems for memory module communication control are disclosed. A method includes receiving a message associated with a memory module in communication with a controller via a bus including a clock line. Further, the method includes determining whether the bus is idle. The method also includes communicating a signal via the clock line regarding the message associated with the memory module in response to determining that the bus is idle. |
US08954617B1 |
System, method and article of manufacture for monitoring, controlling and improving storage media system performance based on data type
An apparent load is determined based on assigning weightings to commands based on various factors including, but not limited to, the limitations of the underlying storage media device(s), where the command queue fullness is viewed from that perspective rather than simply the number of commands outstanding in a storage media device. Also disclosed is the use of a positive bias and a negative bias to artificially influence the apparent load to influence where a particular data type gets stored. |
US08954616B1 |
System, method and article of manufacture for monitoring, controlling and improving storage media system performance based on storage media device write rate
An apparent load is determined based on assigning weightings to commands based on various factors including, but not limited to, the limitations of the underlying storage media device(s), where the command queue fullness is viewed from that perspective rather than simply the number of commands outstanding in a storage media device. Also disclosed is the use of a positive bias and a negative bias to artificially influence the apparent load based on write rate of storage media devices. |
US08954614B1 |
System, method and article of manufacture for monitoring, controlling and improving storage media system performance based on temperature
An apparent load is determined based on assigning weightings to commands based on various factors including, but not limited to, the limitations of the underlying storage media device(s), where the command queue fullness is viewed from that perspective rather than simply the number of commands outstanding in a storage media device. Also disclosed is the use of a positive bias and a negative bias to artificially influence the apparent load where such a positive bias and/or negative bias may be used to influence temperature of storage media devices. |
US08954613B2 |
Network interface and protocol
A communication interface for providing an interface between a data link and a data processor, the data processor being capable of supporting an operating system and a user application, the communication interface being arranged to: support a first queue of data received over the link and addressed to a logical data port associated with a user application; support a second queue of data received over the link and identified as being directed to the operating system; and analyze data received over the link and identified as being directed to the operating system or the data port to determine whether that data meets one or more predefined criteria, and if it does meet the criteria transmit an interrupt to the operating system. |
US08954612B2 |
Enterprise smart grid and demand management platform and methods for application development and management
A computer-implemented platform server and method is provided for energy management operations in a Smart Grid environment. The platform server includes an application module configured to operate any of a plurality of Smart Grid Applications. A consumer-side module is configured for bi-directional communication with a plurality of consumer-side intelligent appliances. An Operations Technology (OT) module is configured for communication with an electrical grid Energy Management System (EMS). A translation module is coupled to, and configured to translate data received from, the application, consumer-side, and OT modules, so that the platform is configured to selectively receive, translate, and transmit data from and among any of said application, consumer-side, and OT modules, to facilitate automated energy management operations in a Smart Grid environment. |
US08954609B1 |
Time adjustment using time-to-live values
In one example, network device includes a control unit having one or more hardware-based microprocessors and an interface. The interface can receive a first time synchronization message from a master device that comprises a first TTL value. The first TTL value can be indicative of a number of hops traversed by the first time synchronization message. The interface can subsequently receive a second time synchronization message from the master device that comprises a second TTL value that is is indicative of a number of hops traversed by the second time synchronization message. The network device can also include a timing module that determines a time adjustment based at least in part on the determination that the first and second TTL values are different, and applies the time adjustment to update the time of the network device. |
US08954608B1 |
Network clock synchronization using total-field magnetometers and the spatial coherence of the earth's geomagnetic field
A method for synchronizing network clocks comprising the following steps: measuring with a first magnetometer the geomagnetic field at a first network node; processing data measured by the first magnetometer to generate first sensor spatially-coherent data; measuring with a second total field magnetometer the Earth's magnetic field at a second network node, wherein the second magnetometer is physically separated from the first magnetometer by a distance of up to one kilometer; processing data measured by the second magnetometer to generate second sensor spatially-coherent data; transmitting the first sensor spatially-coherent data from the first network node to the second network node; calculating a clock drift between the first and second network nodes based on the first sensor spatially-coherent data and the second sensor spatially-coherent data; and adjusting the second node system clock to match the first node system clock based on the calculated clock drift. |
US08954602B2 |
Facilitating communication between enterprise software applications
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for facilitating communication between enterprise software applications. Some enterprise software systems communicate using a message protocol designed for use with an exchange system. Those systems require the exchange system to communicate using that message protocol. To communicate with systems using that message protocol, a local system can build a message formatted in accordance with the message protocol, even without an exchange system. The local system stores configuration data and uses the configuration data to build the message. |
US08954599B2 |
Data stream operations
Examples of the present disclosure include methods, devices, and/or systems. An example method for performing data stream operations can include passing input data through a data stream splitter, dividing the input data into multiple lines of data upon recognizing a delimiter within the input data at the data stream splitter, splitting the multiple lines of data into multiple data streams at the data stream splitter, and performing data stream operations on each of the multiple data streams with a respective one of a plurality of finite state machines (FSMs). |
US08954597B2 |
Method and apparatus for synchronizing paused playback across platforms
A method and apparatus for resuming playback of a media program, the playback initiated on a first device and resumed on a second device is disclosed. The method does not rely on additional messages transmitted from the playback devices, but rather on server side monitoring of the transmission of the media program. |
US08954591B2 |
Resource negotiation for cloud services using a messaging and presence protocol
Techniques are provided for sending from a client in a first network device a first session-initiate message to a second network device that is configured to provide network layer, data link layer, or associated convergence layer based service connection information in order for the second network device to accept or reject a network layer, data link layer, or associated convergence layer based service connection with the first network device. The first session-initiate message is based on a messaging and presence protocol. A session-accept message is received at the client in the first network device that is configured to accept the service connection and provide a network layer, data link layer, or associated convergence layer based service connection information in order for the first network device to establish the service connection with the second network device. The session-accept message is based on the messaging and presence protocol. In response to receiving the session-accept message, the service connection is established. |
US08954589B2 |
Multi-process browser architecture
Systems and methods for multi-process browser architecture are described herein. In an embodiment, a system for providing multi-process browser architecture includes at least one rendering process for each browser instance that renders a content area; and at least one browser process that communicates with one or a plurality of rendering engine processes. In another embodiment, a method for providing a multi-process browser architecture includes instantiating a unique rendering process for each content area instance and instantiating a unique browser process. In this way browsers may avoid the effects of faulty processes affecting other browser processes. This may improve user efficiency while enhancing user experience. |
US08954586B2 |
Pre-provisioning virtual machines in a networked computing environment
Disclosed are approaches for pre-provisioning cloud computing resources such as virtual machines (VMs) in order to achieve faster and more consistent provisioning times. Embodiments describe approaches to generate a pre-provisioned pool of virtual machines that are utilized when one or more consumers start to initiate a large volume of requests. In typical embodiments, a selection of an operating system to be associated with a VM is received in a computer data structure. A provisioning of the VM will then be initiated based on the selection of the operating system. Thereafter, at least one selection of at least one software program to be associated with the VM will be received in the computer data structure. The provisioning of the VM can then be completed based on the at least one selection of the at least one software program in response to a provisioning request received in the computer data structure. |
US08954585B2 |
Apparatus for resource allocation in a frequency overlay system and a method thereof
A resource allocation method and apparatus for a frequency overlay system that is capable of reducing the overhead of the resource allocation information transmitted by the base station is provided. A frequency overlay system of the present invention includes a base station which transmits resource allocation information including an address type selected among multiple address types designating addresses for transmission resource in different patterns and an address value indicating a resource region allocated according to the selected address type and at least one mobile station which receives the resource allocation information and receives data through the resource region identified with reference to the resource type and address value indicated by the resource allocation information; and a resource allocation method of the present invention includes transmitting, at a base station, resource allocation information including an address type selected among multiple address types designating addresses for transmission resource in different patterns and an address value indicating a resource region allocated according to the selected address type, and receiving, at a mobile station, data through the resource region identified with reference to the resource type and address value indicated by the resource allocation information. |
US08954572B2 |
Monitoring system
A monitoring system comprising a plurality of computers (PC1, PC2) in a network, a plurality of monitoring devices (2, 3, 5, 7, 8, 12) and a plurality of drivers (GDS) configured for the monitoring devices (2, 3, 5, 7, 8, 12), each driver (GDS) communicating with the network through a designated channel, each channel configured to be run on any of a plurality of the computers (PC1, PC2) in the network, wherein there is assigned to each channel a predefined order of priority in which an active computer (PC1, PC2) of the network is selected for running the channel and wherein the order of priority assigned to each channel varies between channels and wherein, in use, when the highest priority available computer (PC1, PC2) for any given channel is inactive, the given channel switches to the next highest priority available computer (PC1, PC2) which is active. |
US08954569B2 |
Gateway, control method thereof, application server, and control method thereof
The present invention generally relates to a gateway, a method for controlling the gateway, an application server, and a method for controlling the application server. The present invention particularly relates, but is not limited to, a technology that facilitates the formation of a single network from a plurality of local networks. |
US08954568B2 |
Method and system for building an elastic cloud web server farm
A method and system for building an elastic cloud web server farm. The method includes registering a web application on a serving cloud and copying the web application to a distributed store. A load of the web application is specified, and a plurality of nodes is added for the web application based on the load. A web server corresponding to a node of the plurality of nodes is then initialized. A web request is received from a user and a web server is selected from a list of available web servers to process the web request. The web request is further transmitted to the web server. A web response, based on the web request, is transmitted back to the user. The system includes a central registry, a distributed store, a process coordinator, one or more web servers, and a router. |
US08954567B1 |
Predicting mediaplan traffic
Methods, systems, and apparatus for predicting traffic data, including a method comprising: receiving data indicative of traffic data for a mediaplan during first and second time spans, the data representing numbers of unique entities that have interacted with a location during the first and second time spans; and using a function to predict third traffic data during the third time span. The function, when the arbitrary third time span does not exceed the first and second time spans, uses an exponential that includes a difference of dot products using natural logs of combinations of the time spans and first and second traffic data, divided by a difference of natural logs of the first and second time spans. Otherwise, the function uses a difference of dot products using combinations of the time spans and the first and second traffic data, divided by a difference of the first and second time spans. |
US08954564B2 |
Cross-cloud vendor mapping service in cloud marketplace
Embodiments relate to systems and methods for a cross-cloud vendor mapping service in a dynamic cloud marketplace. The cloud marketplace system receives bids from a user for the provisioning of applications or other software in the cloud, and registers selected provisioning clouds to deliver the requested software. The set of provisioning clouds can be re-selected on a scheduled and/or other ongoing basis, creating a sequence of provisioning clouds. A vendor mapping service can be abstracted and provided external to the cloud marketplace system, and track the user's software usage across the shifting sets of provisioning clouds. The vendor mapping service can aggregate the usage history over time, and generate billing and/or other subscription reports. The cloud marketplace system need only register the user ID, software applications, and/or other subscription data to the vendor mapping service one time, after which the service can track the user's software usage history automatically. |
US08954561B2 |
System and method of displaying search results based on density
A system and method is provided of generating a map. In one aspect, the map is selected based on a location provided by a user and listings are selected based on their proximity to the location, whether they match a query provided by the user, and the number of matching listings within regions of the map. |
US08954559B2 |
System and method for extending IMS SCIM / service broker to enable application servers using MSCML to execute on CDMA win networks
Systems and methods provide unified playing of announcements across different network interfaces. A system to extend an IMS SCIM to enable application servers using MSCML to play announcements to execute on WIN (CDMA) networks include an application server, including IMS applications. The system includes a SCIM to manage communication between call parties and the applications. In a CDMA network, which an open dialogue the SCIM is configured to respond to the IMS applications that then can play the announcement, receive a second message which indicates the announcement to play from the IMS applications, buffer the announcement indicated, and respond with a message to the IMS applications as if the announcements have been played. |
US08954558B2 |
Method and system for handling a dynamic host configuration protocol internet protocol version 4 address release
A method and a Packet data network GateWay (PGW) for releasing an Internet Protocol (IP) address in a mobile network are provided. The method includes allocating an Internet Protocol version 4 (IPv4) address and an Internet Protocol version 6 (IPv6) address to a User Equipment (UE) to activate a Packet Data Network (PDN) connection between the UE and the PGW; and if the UE releases the IPv4 address, transmitting to a Serving GateWay (SGW) a Binding Revocation message including an indication to release only the IPv4 address from the PDN connection to SGW. |
US08954557B2 |
Assigning server categories to server nodes in a heterogeneous cluster
A cluster management system dynamically assigns a category to a server node based on the server node's attributes. The system can detect a change in value of a server attribute of a first server node. Then, in response to detecting the change in value of the server attribute, the system identifies a plurality of server attributes for the first server node, and dynamically assigns to the first server node a category that matches the server attributes. Further, the system can add the server node to a server pool that has a matching category with the server node. |
US08954555B2 |
Using push notifications to reduce open browser connections
A browser request is received at a computing device. A determination is made as to whether to replace the browser request with a push notification based upon characteristics of the browser request. The browser request is replaced with the push notification in response to determining, based upon the characteristics of the browser request, to replace the browser request with the push notification. |
US08954554B2 |
Systems and methods for transferring remote context
Example systems and methods provide remote context transfer and session termination. A computer-implemented method for remote context transfer between user sessions with a clinical information system includes accepting a user log on request for a user session at a first clinical information system; identifying one or more open sessions associated with the user; saving a context associated with one of the one or more open sessions; terminating the one or more open sessions identified as associated with the user; and transferring the saved context to the user session at the first clinical information system for use by the user in the user session. |
US08954551B2 |
Virtualization of groups of devices
A virtualization mechanism may create a virtual representation of a group of physical computers and the physical connections between the computers. The mechanism may comprise a discovery tool for determining a topology of connected physical computers and selecting the elements to virtualize, a device virtualization tool that may create virtual versions of the physical computers, and a connection virtualization tool that may create virtual connections between the virtual computers. The virtual devices and virtual connections may then be operated virtually. In many cases, optimized versions of the virtual devices and virtual connections may be performed. |
US08954550B2 |
Service dependency discovery in enterprise networks
The claimed subject matter provides systems and/or techniques that identify service dependencies in enterprise networks. The system can include devices that, based on received network data packets, identify packets with common five tuples, aggregate the identified packets to form transactions associated with individual hosts, and determine delay distributions between one or more services solicited from or in response to the individual hosts. Based on the delay distributions, the system differentiates between dependent service pairs and independent service pairs and thereafter assembles and outputs dependency graphs that include dependency relationships between services from the perspective of a client-side and a server-side. |
US08954549B2 |
Automatic detection of a network interface on a host for accessing networked storage
A host computer is coupled to data storage and has access to the data storage. The host computer has multiple network interfaces, which are associated with multiple logical networks. The host computer detects a network address of the data storage, and identifies one of the network interfaces that is associated with a best-performing logical network for accessing the data storage. The host computer then receives a routing configuration that routes traffic to the data storage via the identified network interface. |
US08954548B2 |
Targeted caching to reduce bandwidth consumption
A system includes a name server, an edge cache server, and a local cache server. The name server is configured to provide an anycast IP address in response to a request for an IP address of an origin hostname from a client system. The edge cache server is configured to respond to the anycast IP address and a unicast IP address and to retrieve content from an origin. The local cache server includes a storage and is configured to respond to the anycast IP address, to retrieve content from the edge cache server, and provide the content to a client system. |
US08954541B2 |
Method, computer-readable medium, and system for discovery and registration of controlled devices associated with self-describing modules
A system, method, and computer-readable medium for the discovery and registration of controlled devices associated with self-describing Modules in a control system are provided. A controlled device associated with a self-describing module is coupled with a master controller on which the self-describing module is installed. A remote monitoring system is communicatively coupled with the master controller, and a remote monitoring system agent is installed on the master controller. The agent discovers a Module associated with the controlled device and queries the Module for a version thereof. The agent then evaluates whether the Module is self-describing. In the event the Module is self-describing, the agent requests a run-time capabilities object from the Module and registers the controlled device with the remote monitoring system according to the capabilities object. |
US08954537B2 |
Apparatus and method for providing a provider-selected message in response to a user request for user-selected information
A method for providing a provider-selected message in response to a user request for user-selected information is disclosed. The method includes receiving a request from a client program for user-selected information. If a provider-selected message has not been previously transmitted to the client program, the method further includes transmitting provider-selected information to the client program. If a provider-selected message has been previously transmitted to the client program, the method further includes transmitting the user-selected information. In one embodiment, the method also includes receiving a second request from the client program for the user-selected information after the provider-selected information is displayed for a limited time. |
US08954535B2 |
Dynamic network device processing using external components
A network device may receive information regarding a service set identifying service to apply to a data flow received via a particular interface of the network device; receive the data flow via the particular interface; identify a service to provide to the data flow based on the information regarding the service set; identify a processing device to process the data flow; and provide the data flow to the processing device. The processing device may be different than the network device and may process the data flow, on behalf of the network device, to form a processed data flow. The processed data flow may include the data flow with the service applied to the data flow. The network device may further receive the processed data flow from the processing device and transmit the processed data flow toward a destination device. |
US08954534B2 |
Host-based intelligent results related to a character stream
Information may be presented to a user by using a first application to receive a character stream of one or more noncompletion characters. The noncompletion characters indicate that additional characters may be received. The character stream is exchanged with a host that analyzes the character stream to generate results that are responsive to the user's predicted interest. Results are received and displayed so that the user may select one of the results to launch a code segment related to the selected result. |
US08954532B2 |
Communication system determining effective remaining transmission rate using small-sized test data before transmitting actual data
A first communication device stores a transmission rate table including response times, and transmission rates associated with the response times, each first response time indicating a time for transmitting test data between the first and second communication devices, while transmitting load data between any pair of communication devices at one of different transmission rates. The first communication device determine a necessary transmission rate for actual data; detect a response time indicating a time for transmitting the test data between the first and second communication devices; determine a transmission rate associated with the response time, as a used transmission rate, based on the transmission rate table; determine an effective remaining transmission rate based on a maximum transmission rate of the communication network and the used transmission rate; and start transmission of the actual data when the effective remaining transmission rate is higher than the necessary transmission rate. |
US08954531B2 |
Intelligent messaging label results related to a character stream
Information may be presented to a user by using a first application to receive a character stream of one or more noncompletion characters. The noncompletion characters indicate that additional characters may be received. The character stream is exchanged with a host that analyzes the character stream to generate results that are responsive to the user's predicted interest. Results are received and displayed so that the user may select one of the results to launch a code segment related to the selected result. |
US08954527B2 |
Networked computer system for communicating and operating in a virtual reality environment
The present invention relates to interactive virtual reality networked computer systems and methods that facilitate communication and operation in a virtual reality environment. The virtual reality networked computer system has an infrastructure that includes a number of users, hosts and servers. The interconnected hosts and servers allow users to effectively locate, activate, access and interact within virtual reality environments in a variety of different ways. For example, users can establish user groups such that interaction within the virtual reality environment occurs between hosts (accessed by users) without the need of a central or dedicated server. |
US08954526B2 |
Network operating system
Generally described, the present invention is directed to a network operating system that provides more effective ways of leveraging the connectivity of computer networks. In one embodiment, an XML virtual machine is implemented that accepts high-level application code written in an XML programming language as input. Functionality is provided to interpret or translate the application code written in an XML programming language into code that is suitable for execution across computer platforms. Moreover, the XML virtual machine supports the Model View Controller (MVC) design paradigm that facilitates true data abstraction from applications to a common data model. Multi-instance applications, with each instance potentially supporting multiple views, may be created and executed. |
US08954525B2 |
Method and apparatus of performing remote computer file exchange
Disclosed are an apparatus and method of exchanging data between a first computing device and a second computing device using a customized data transfer protocol. One example of operation may include establishing a control channel between the first computing device and the second computing device to exchange control information, negotiating a data transfer between the first and second computing devices, establishing a data channel between the first and second computing devices to transfer data, and transferring data from the first computing device to the second computing device over the data channel in parallel with control information being transferred over the control channel. The client devices may be a client and server configuration transferring data via a point-to-point data connection. |
US08954524B1 |
Access to network content
A method and system for improving access to network content are described. Aspects of the disclosure minimize the delay between a navigation event and a network response by prerendering the next navigation event. For example, the method and system may predict a likely next uniform resource locator during web browsing to preemptively request content from the network before the user selects the corresponding link on a web page. The prediction operation may use a current location of a computing device to identify a set of browsing habits associated with that location. The browsing habits may be used to identify a most likely navigation event for prerendering. The methods and systems describe a variety of manners for prerendering content and managing and configuring prerendering operations. |
US08954523B2 |
Method and apparatus for identifying virtual content candidates to ensure delivery of virtual content
An apparatus and method is provided that ensures virtual content providers such as advertisers that their virtual content will reach every mobile device, every application within each mobile device and/or every user. Such functionality is referred to herein as a “guaranteed reach”. Guaranteed reach parameters including reach type parameters (mobile devices, applications and/or users) are specified in a memory. A server receives a virtual content request and a received target identification uniquely identifying, for example, the requesting device via a network. The server identifies virtual content candidates from the memory by comparing the received target identification to the stored target identification associated with the virtual content. The guaranteed reach parameters may also include frequency-based criteria that guarantee a frequency of impression(s) for particular virtual content and guaranteed priority criteria to ensure the guarantee will be met. |
US08954521B1 |
Management and presentation of notification content
An example method includes, responsive to receiving an indication of an incoming communication, identifying, by a computing device, first and second portions of an image that are associated with respective first and second portions of a face of a human user, wherein the human user has been determined to be an originator of the incoming communication. The example method further includes outputting, by the computing device and for display, the first and second portions of the image that are associated with the respective first and second portions of the face of the human user, and outputting, by the computing device and for display, message content associated with the incoming communication, such that the message content as displayed at least partially overlays the second portion of the image. |
US08954505B2 |
Systems and methods for computer and voice conference audio transmission during conference call via VoIP device
A new approach is proposed that contemplates systems and methods to support canceling audio streams leaked from a speaker to a microphone so that a clean audio stream of a presenter or viewer speaking at a conference call is transmitted. Here, the audio streams being canceled includes the computer audio stream of an application being run or a material being presented online during a web conference and/or the audio stream received from the rest of the group of participants at the conference call. The computer audio stream is then transmitted in addition to the presenter or viewer audio stream, and separate from any other audio stream captured by the hosting device during the conference call. |
US08954503B2 |
Identify experts and influencers in a social network
On embodiment accesses a set of information comprising one or more elements of information relating to a subject matter, wherein the one or more elements of information have been shared among one or more users of a social-networking system; for each element of information, determines a rate of sharing of the element of information among the one or more users and identifies one or more first users who cause the rate of sharing of the element of information to increase; and identifies one or more influencers associated with the subject matter from the one or more first users identified for each element of information. |
US08954500B2 |
Identifying and employing social network relationships
Methods and apparatus are described for detecting social relationships across multiple networks and/or communication channels. These social relationships may then be utilized in a wide variety of ways to support and enhance a broad range of user services. |
US08954498B2 |
Digital image communication
A system for enhancing group communication includes a computer server for receiving a first digital from a remote client. The server analyzes the first image to determine one or more first image attributes and communicates the image to one or more recipients. Communication information including image attributes, email addresses, and names of the recipients is stored. When a second image is received the server analyzes it to determine its attributes and forms second image communication information relevant to the second image. The second communication information includes data from the first image communication information, its image attributes, and one or more separate second image recipients. |
US08954495B2 |
Proxy application with dynamic filter updating
The disclosure describes a proxy server application that supports the dynamic modification of proxy rules implemented by a proxy server. The proxy rules implemented by the proxy server specify network behaviors to be performed at various points during the handling of requests from client applications. A proxy server implements the proxy rules by processing one or more user-generated network traffic filters for managing network traffic. In an embodiment, users generate network traffic filters by creating network traffic filter source code that specify processing steps to be performed by a proxy server relative to network messages the proxy server receives. In an embodiment, user-generated network traffic filters may be added, removed, reordered, or otherwise modified in a proxy server application at runtime in order to respond to current network conditions or to achieve other desired proxy configurations. |
US08954488B2 |
Extensibility for web based diagram visualization
Extensible architecture and data flow in a web based diagram visualization service is accomplished by enabling a diagram update engine to launch custom data modules. Data modules for data sources that are not inherently supported are created by third parties through a specially defined interface (e.g. .NET® assemblies) and made visible for the web based diagram services and callable from a diagram update engine. Thus, a number of data sources from which diagram data can be retrieved and the way incoming data is manipulated and aggregated is extensible through code. |
US08954482B2 |
Managing data flows in graph-based computations
Processing data elements associated with a hierarchy that includes multiple levels includes: forming multiple flows of data elements, with each flow being associated with a level of the hierarchy; and including within at least some of the flows hierarchical structure information associated with a level of the hierarchy. For at least one of the levels, two or more and fewer than all of the flows include hierarchical structure information associated with that level. |
US08954471B2 |
Method and system for providing process-based access control for a collaboration service in enterprise business software
The present invention relates to access control objects directly associated with collaboration process nodes, which are themselves associated with a collaborative software object. The direct association of the access control objects allows for a fine granularity of per-party access control at every step of a collaborative process. Systems and methods for constructing access lists from the access control objects are described, as well as restricted GUI rendering according to access indicators associated with an access control object. |
US08954468B2 |
Extracting a meaningful frequent itemset
An efficient extraction of a meaningful frequent itemsets. The present invention discloses a system that includes a decision unit that decides a new itemset that becomes an investigation target in the same sequence as searching an itemset tree in a depth-first manner and in descending order. The present invention further discloses a frequent occurrence determining unit that registers the frequency of occurrence of the new itemset in a table if the frequency of occurrence is equal to or more than a predetermined threshold. The present invention includes a correlation determining unit that determines whether there is a correlation between each item in the new itemset and a subset of remaining items that were removed from the new itemset. The present invention discloses a registration unit that registers the new itemset in a set of meaningful frequent itemsets if the determination is positive for all items of the new itemset. |
US08954458B2 |
Systems and methods for providing a content item database and identifying content items
Systems and methods are provided for identifying unsolicited or unwanted electronic communications, such as spam. The disclosed embodiments also encompass systems and methods for selecting content items from a content item database. Consistent with certain embodiments, computer-implemented systems and methods may use a clustering based statistical content matching anti-spam algorithm to identify and filter spam. Such a anti-spam algorithm may be implemented to determine a degree of similarity between an incoming e-mail with a collection of one or more spam e-mails stored in a database. If the degree of similarity exceeds a predetermined threshold, the incoming e-mail may be classified as spam. Further, in accordance with other embodiments, systems and methods may be provided to determine a degree of similarity between a query or search string from a user and content items stored in a database. If the degree of similarity exceeds a predetermined threshold, the content item from the database may be identified as a content item that matches the query or search string provided by the user. |
US08954454B2 |
Aggregation of data from disparate sources into an efficiently accessible format
Methods and apparatus are presented for aggregating data from disparate sources into an efficiently accessible format. For example, an aggregation tool may receive attribute-based data from one source and metrics-based data from another source. Given this data, the aggregation tool may store attribute data from the attribute-based data into a data object, where the data object includes multiple time slots corresponding to defined time ranges. The aggregation tool may then determine from the metrics-based data, respective metrics data for each of the multiple time slots of the data object, where each time slot is associated with the attribute data. The aggregation tool may store the respective metrics data into each of the multiple time slots of the data object. In this way, the data object may serve to efficiently provide an answer to a query requiring data from multiple data sources. |
US08954453B2 |
On-demand database service system and method for determining whether a developed application will operate properly with at least one other application
In accordance with embodiments, there are provided mechanisms and methods for determining whether a developed application associated with an on-demand database service will operate properly with at least one other application. These mechanisms and methods for providing such determination can enable embodiments to ensure that new versions of developed applications will operate in the same application environment of a previous version. The ability of embodiments to make such determination may lead to an improved application migration development/runtime framework, etc. |
US08954446B2 |
Client-side repository in a networked deduplicated storage system
A storage system according to certain embodiments includes a client-side repository (CSR). The CSR may communicate with a client at a higher data transfer rate than the rate used for communication between the client and secondary storage. During copy operations, for instance, some or all of the data being backed up or otherwise copied to secondary storage is stored in the CSR. During restore operations, copies of the data stored in the CSR is accessed from the CSR instead of from secondary storage, improving performance. Remaining data blocks not stored in the CSR can be restored from secondary storage. |
US08954445B2 |
System and method for efficiently representing and managing a computer facility
A method of representing and managing hierarchical relationship configuration in a computing facility is described. The method includes providing and storing a first index of hardware identifier assigned to each object in the computing facility; providing and storing a second index of ancestry identifiers of each object in the computing facility, the ancestry identifier of an object being the hardware identifier of an ancestor object at 1 to n hierarchy levels above the object; providing and storing a type information element for each ancestor object indicative of a type of ancestor object; and identifying an ancestor object of a particular object in the computing facility by accessing the first index of hardware identifier of the particular object; and identifying an ancestor object thereof of a particular typed by accessing the ancestry identifiers and the type information element of the particular object. |
US08954444B1 |
Search and indexing on a user device
Search may be performed on a user device, such as a handheld electronic book reader device. A search query term may be received. Text of a collection of electronic items stored in memory of the user device may be searched, using an item index and/or a master index, for the queried term. Search results may be returned identifying locations in the electronic items at which the queried term appears. |
US08954440B1 |
Selectively delivering an article
Selectively delivering an article is disclosed. A user preference is received. A document is also received. An entity pair comprising a concept included in a concept taxonomy and a textual representation included in the document is determined. The document is categorized based at least in part on the concept. A user associated with the user preference is selectively notified of the document. |
US08954438B1 |
Structured metadata extraction
Structured metadata extraction may include accessing one or more documents from which to extract the structured metadata from each of a plurality of hosts. A plurality of entity names can be extracted from the one or more documents from one of the plurality of hosts using an entity name pattern. A first element list can be extracted from the one or more documents based at least in part on the plurality of entity names and based at least in part on one or more heuristic rules. An element list pattern may be generated based at least in part on the first element list, and a second element list may be extracted from the one or more documents based at least in part on the element list pattern. |
US08954437B2 |
Monitoring content repositories, identifying misclassified content objects, and suggesting reclassification
Provided is a technique for organizing content objects in an enterprise content management system. Auditing of the content objects is performed to identify one or more content objects that are to be re-classified. A content object is selected. A first category associated with the content object is obtained. A relevancy score is obtained for the first category. A list of candidate categories and relevancy scores for each of the candidate categories are obtained. In response to determining that the first category does not correspond to a candidate category or that the relevancy score does not exceed a threshold, the content object is identified as improperly categorized, and the candidate categories that have associated relevancy scores that exceed the threshold are provided in an audit report. |
US08954436B2 |
Monitoring content repositories, identifying misclassified content objects, and suggesting reclassification
Provided are a computer implemented method, computer program product, and system for organizing content objects in an enterprise content management system. Auditing of the content objects is performed to identify one or more content objects that are to be re-classified. A content object is selected. A first category associated with the content object is obtained. A relevancy score is obtained for the first category. A list of candidate categories and relevancy scores for each of the candidate categories are obtained. In response to determining that the first category does not correspond to a candidate category or that the relevancy score does not exceed a threshold, the content object is identified as improperly categorized, and the candidate categories that have associated relevancy scores that exceed the threshold are provided in an audit report. |
US08954435B2 |
Method and system for reclaiming storage on a shared storage device or independent of the mount state of a file system
A method for storage reclamation in a shared storage device. The method includes executing a distributed computer system having a plurality of file systems accessing storage on a shared storage device, and initiating a reclamation operation by using a reclamation agent that accesses the shared storage device. The method further includes reading the file system data structure that represent unallocated storage blocks of one of the plurality of file systems that will undergo a reclamation operation. A plurality of I/O resources that are used to provide I/O to the unallocated storage blocks are then interrupted. Storage from the unallocated storage blocks is then reclaimed, and normal operation of the I/O resources that are used to provide I/O to the unallocated storage blocks is resumed. |
US08954433B2 |
Generating a recommendation to add a member to a receptivity cohort
A processor-implemented method, system, and/or computer program product generate a recommendation to add a member to a receptivity cohort. A receptivity cohort is made up of members who share a conduct attribute, which is a facial expression, body language, and/or social interaction of a person. The conduct attribute has been predetermined to be an indicator of a level of receptiveness to a proposed future change in a set of circumstances. Biometric sensor data, which describe the facial expression, body language and/or social interaction for a candidate member, are retrieved from a set of biometric sensors. The retrieved biometric sensor data for the candidate member is compared to the conduct attribute of members of the receptivity cohort. In response to the biometric sensor data for the candidate member matching the conduct attribute of members of the receptivity cohort, a recommendation is generated to add the candidate member to the receptivity cohort. |
US08954430B1 |
Persistent searches
Various systems, methods, and programs embodied in computer-readable mediums are provided for saving search results. A representative example includes receiving an indication of a selected first search result. The selected first search result included in a first plurality of search results matching a first search criteria. This example also includes aggregating the selected first search result and a second plurality of search results matching a second search criteria, and providing the aggregated search results. |
US08954427B2 |
Search result previews
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing search result page previews. In one aspect, a method includes receiving data that specify a set of search results responsive to a search query. Query-relevant content is selected to be included in a page preview for at least one of the search results. In turn, data that cause presentation of the page preview are provided. The data provided can cause presentation of the query-relevant content at an initial zoom level and at a higher zoom level, where the initial zoom level is a zoom level at which both the query-relevant content and other content from the resource are presented. The page preview can include a page tear that defines multiple portions of the page preview for a resource. |
US08954422B2 |
Query suggestion for E-commerce sites
Providing query suggestions using a query log including a number of user sessions that comprise training data including a sequence of a plurality of sets of queries. Some of the sets of queries include query transitions followed by a purchase related event. The query log is cleaned and normalized. Query log stationary scores and transition scores of at least some of the plurality of sets is generated. A set of query suggestions is built and similarity scores are computed for at least some of the set of query suggestions to determine whether individual ones of the at least some of the set of query suggestions meet a predetermined assurance level. Those that meet the level are included as elements of the set of query suggestions that meet the predetermined assurance level. That set of query suggestions are mixed and ranked in accordance with a user behavior sought to be optimized. |
US08954421B2 |
Systems and methods to provide visual browsing
Systems and methods for multi-directional visual browsing on an electronic device are described. In example embodiments, a primary result and a peripheral result are determined. A display layout based on attributes associated with the primary result and the peripheral result is generated. The display layout is then formatted into instructions, which will cause a device to render the display layout. The instructions are transmitted to the client device. |
US08954418B2 |
Performing complex operations in a database using a semantic layer
The present invention includes a database with a semantic layer for performing standard SQL and complex operations custom to one or more application. In one embodiment the present invention includes receiving a data request from an application in a database, the data request specifying standard SQL operations and custom application operations to be performed for said application. The data request is processed in a semantic layer of the database. The semantic layer processes the standard SQL operations and the custom application operations and generates a logical execution plan comprising the standard SQL operations and the custom application operations. The logical execution plan is converted into a physical execution plan, which is executed by the database to generate a data result. The data result may be sent back to the application. |
US08954417B2 |
Content management system that retrieves data from an external data source and creates one or more objects in the repository
A content management system (CMS) provides a way to include data from an external source as an object in the repository managed by the CMS. The CMS includes an external data mechanism that processes a document with a query to a data source external to the repository. The external data mechanism executes the query, and creates one or more objects in the repository according to the type of data returned. Each object containing data returned from the query is linked to that query via a formal relationship in the CMS. When an object that has a formal relationship with a query is checked out of the repository, the query corresponding to the object may be executed, and the data returned from the query may be stored in the object. Alternatively, the data may be used directly if a corresponding lifecycle policy indicates the corresponding query should not be executed. |
US08954409B1 |
Acquisition of multiple synchronization objects within a computing device
In general, techniques of the present disclosure relate to synchronizing concurrent access to multiple portions of a data structure. In one example, a method includes, sequentially selecting a plurality of requests from a request queue, wherein at least one of the requests specifies a plurality of requested synchronization objects for corresponding candidate portions of a data structure to which to apply an operation associated with a data element. The method also includes querying one or more sets of identifiers to determine whether one or more of the requested synchronizations objects specified by the selected request are acquirable. The method also includes acquiring each of the requested synchronization objects that are acquirable. The method includes, responsive to acquiring all of the one or more requested synchronization objects, selecting a subset of the candidate portions of the data structure and applying the operation only to the selected subset of the candidate portions. |
US08954405B2 |
Content validation for documentation topics using provider information
At least one processor may determine one or more issues in one or more of a plurality of documentation topics that document at least one software functionality based at least upon applying one or more business rules to the one or more of the plurality of documentation topics. Responsive to determining the one or more issues, one or more entries may be inserted into an issues report, wherein the one or more entries include information regarding the one or more issues. |
US08954396B2 |
Validating and enabling validation of package structures
This document describes tools capable of validating and enabling validation of a package's structure. To do so, constraint grammar is provided that is capable of enabling a person to build a set of machine-readable constraints for a package's structure. Based on this set of constraints, a package validator module may accurately and automatically validate that a package's structure meets these constraints. |
US08954390B1 |
Method and system for replication in storage systems
A data container replication method and system are provided. The data container includes a plurality of entries and is replicated from a source module to a destination module. The data container may be a directory that includes a plurality of files. Before replicating the directory, it is determined if the source module and the destination module use a same directory version and directory layout. If the directory version and layout are the same, then the entire directory is replicated “as is” without evaluating every directory entry. If the directory version or the directory layout is different, then each directory entry is evaluated, before being replicated. |
US08954386B2 |
Locally editing a remotely stored image
One or more techniques and/or systems are disclosed for editing a remotely stored image. A user can browse to a site comprising the image, and a preview (e.g., lightweight) version of the image can be loaded to a canvas component of the browser. One or more edits can be applied locally to the preview image, comprising one or more transformation. The one or more transformations can be recorded, and an edited version of the preview image, comprising the one or more image transformations, can be rendered in the canvas component. Once the user commits to one or more transformations, a request can be sent to a remote server comprising the image, to remotely edit the image, where the request comprises one or more delta changes that indicate the one or more committed image transformations, as opposed to requiring multiple bandwidth intensive transfers of the entire image. |
US08954385B2 |
Efficient recovery of transactional data stores
Approaches for recovering a node of a distributed transactional system. When a recovering node is being brought on-line, a copy of at least a portion of a first data store maintained by an existing node is created without ceasing to process transactions against the first data store at the existing node. The recovering node creates a second data store based on the copy of the first data store. While the recovering node creates the second data store, the recovering node stores committed transaction data received from a plurality of nodes. The committed transaction data describes transactions committed against data stores maintained by the sender of the committed transaction data. The recovering node may thereafter replay, against the second data store, any transactions identified by the committed transaction data that are associated with a global transaction number that is more recent than is a reference commit number. |
US08954383B1 |
Analyzing mapping objects of file systems
A method is used in analyzing mapping objects of file systems. Each mapping object of a set of mapping objects of files of a file system is analyzed by iterating over the set of mapping objects. A file is associated with a first mapping object of the set of mapping objects and a snapshot copy of the file is associated with a second mapping object of the set of mapping objects. The second mapping object shares a subset of a set of storage objects associated with the first mapping object. Information for each storage object of the set of storage objects associated with each mapping object of the set of mapping objects is stored. Based on the stored information, each storage object of the set of storage objects associated with each mapping object of the set of mapping objects is processed. |
US08954381B1 |
Determining data movements in a multi-tiered storage environment
Techniques are described for determining data movements. Gradient sets are determined for storage tiers. Each gradient set is associated with one of the storage tiers and includes at least one gradient. Based on the gradient sets, a donor tier and a first set of one or more receiving tiers are selected from the plurality of storage tiers. A first data portion having data currently stored on at least one physical device of the donor tier is selected. In accordance with data movement criteria, a second data portion included in a receiving tier of the first set is selected. Selecting the second data portion includes modeling a first data movement including moving the first data portion from the donor tier to the receiving tier. The first data movement may be included in a recommended list and may be performed by a data storage optimizer. |
US08954380B2 |
Application management method and information processing apparatus
An information processing apparatus includes an application management unit which manages the state of an application, and a package management unit which manages dependence relationship information between the package of an arbitrary application and the package of another application. The package is a group of files to be used to execute the application. The package management unit processes the application based on the dependence relationship information. The application management unit manages the state of the application in accordance with a notification from the package management unit. |
US08954374B2 |
Community-driven map creation and access
Techniques for creating and enabling access to a community-augmented map are provided. The techniques include uploading user-generated content about one or more locations on a map, processing the user-generated content about one or more locations on the map and storing the user-generated content about one or more locations on the map in an intelligent knowledgebase, applying one or more domain concepts from the intelligent knowledgebase to the user-generated content to infer one or more derivatives in connection with one or more locations in the map, and retrieving information of the one or more locations on the map from the intelligent knowledgebase to provide the map information as augmented metadata on the map. |
US08954371B2 |
Systems and/or methods for dynamic selection of rules processing mode
Certain example embodiments described herein relate to techniques for dynamically selecting rule processing modes. The processing mode does not need to be specified during rule design/authoring. Two sets of artifacts may be generated to support a desired processing mode. This may occur in the designer's local workspace, e.g., so that rule invocation can be tested locally. Additionally, or alternatively, both sets of artifacts may be installed on the rule engine running on a remote server when the project is deployed. The designer need not be aware that both sets of artifacts are being generated. In certain example embodiments, the designer may have the ability to sequence rules within metaphors (or decision entities such as decision tables), and/or the ability to sequence metaphors within rule sets. During rule invocation, a parameter may be provided to indicate the processing mode (e.g., sequential or inferential) to be used by the rule engine. |
US08954370B2 |
Policy processor for configuration management
A policy processor is described that may be used to implement a system for managing the configuration of assets in a distributed computing network, such as an enterprise network. The policy processor resides on a managed node in the distributed computing network and operates to receive, evaluate and enact policies issued by one or more policy authorities in the distributed computing network. The policy processor utilizes a conflict resolution model to determine which policy rules included within the policies should be put into effect and which should not. |
US08954368B2 |
Translating paralinguistic indicators
Paralinguistic indicators are translated at a paralinguistic translation server by receiving from a source a first set of data related to a first paralinguistic indicator that is configured to enable non-verbal communications between a source and a destination. The source is one of an instant messaging system and a virtual world system and the destination is one of the textual instant messaging system and a virtual world system but differs from the source. The first set of data related to the first paralinguistic indicator is translated into a second set of data related to a second paralinguistic indicator, such that the second paralinguistic indicator that is at least partially synonymous to the non-verbal communications associated with the first paralinguistic indicator. The second set of data related to the second paralinguistic indicator is transmitted to the destination. |
US08954356B2 |
Evolution of a user interface based on learned idiosyncrasies and collected data of a user
A user interface evolves based on learned idiosyncrasies and collected data of a user. Learned idiosyncrasies and collected data of the user can be stored in a knowledge base. Information from the surrounding environment of the user can be obtained during learning of idiosyncrasies or collection of data. Thought-based statements can be generated based at least in part on the knowledge base and the information from the environment surrounding the user during learning of idiosyncrasies or collection of data. The thought-based statements serve to invoke or respond to subsequent actions of the user. The user interface can be presented so as to allow for interaction with the user based at least in part on the thought-based statements. Furthermore, personality nuances of the user interface can be developed that affect the interaction between the user and the user interface. |
US08954351B2 |
Food vending machine system incorporating a high speed stored energy oven
A novel vending machine system integrating a food storage container and a high speed stored energy cooking oven capable of cooking foods in under one minute such as that further described by U.S. Provisional Application 60/822,028 filed on Aug. 10, 2006 as well as co-pending application “Wire Mesh Thermal Radiative Element and Use in a Radiative Oven” filed on Dec. 30, 2008 by De Luca. The invention disclosing a novel configuration for the oven incorporating storage, a system allowing for the proper cooking of items and food positioning, an activation system, and an invoicing system. |
US08954350B2 |
Order supporting apparatus, control method for an order supporting apparatus, order supporting system, and computer readable storage medium
An order supporting apparatus connected to a monitoring apparatus over a network, the monitoring apparatus determining a supply status of devices in the network and sends supply shortage information regarding at least one of the devices determined to have a supply shortage to the order supporting apparatus. In particular, the order supporting apparatus includes a device information storage part that stores device information describing whether each device is monitored as a monitoring target, and maintenance contract information of each device, and a determination part that determines, based on the device information, whether each device is subject to the maintenance contract when the order supporting apparatus receives the supply shortage information. Further, the determination part deselects, in the device information, a device as the monitoring target when the device is determined to have a supply shortage by the monitoring apparatus. |
US08954347B1 |
System for monitoring inventory and dispensing activity of a plurality of diverse beverages
A system for monitoring inventory, dispensing activities and irregularities associated with service and sale of beverages primarily, but not exclusively, liquor beverages. A processor includes display facilities and communication capabilities and is operatively associated with a scale assembly disposed in supporting relation to each of a plurality of containers associated with each of the plurality of beverages. RFID tags are connected to each of the beverage containers for wireless communication between tag readers associated with the scale assembly thereby providing beverage identification and recognition. A tracking application is associated with the processor and structured to monitor usage activities of the plurality of beverages in association with the scale assembly. The tracking application includes at least a bar monitoring function, inventory function, statistics function and setup function, each structured in association with the display facility of the processor to determine and visually generate various categories of data indicative of at least dispensing activities and inventory control of the plurality of beverages logged into the system. |
US08954346B1 |
Serving form ads with a video
Serving form ads with videos is disclosed, including: receiving from a client device a request including a set of parameters associated with a video; and determining a form ad to be displayed with the video based at least in part on the set of parameters. |
US08954344B2 |
Methods of offline fare collection for open-loop and hybrid card systems
Interconnected methods of card-based fare collection at computer-based service access validation terminals are disclosed. The first method is characterized by periodically propagating to the validation terminals card transaction data originated at other validation terminals. This method is most pertinent to the public transit fare systems utilizing open-loop payment cards and vehicle-installed terminals. The second method is characterized by actualizing the validation terminals' data by way of data broadcasting or multicasting. This method makes the first method practical and improves performance of open-loop and closed-loop card systems implementing offline validations. |
US08954343B2 |
Person-to-person matching system
An improved system for matching individuals seeking personal relationships includes: (a) a plurality of personality categories into which an individual may be categorized, (b) a plurality of psychology-based, personality traits, (c) a plurality of preferences on various subjects that an individual may have, (d) a plurality of images for consideration by an individual, each of the images configured such that an individual who would chose to be associated with an image can be assessed to possess one of the plurality of personality traits and preferences, (e) a user interface for presenting the plurality of images and allowing an individual to identify with which of these the individual elects to be associated, and (f) an algorithm configured to utilize these elected associations to categorize this individual into one of the personality categories and to ascribe to the individual a specific set of preferences in various subject areas. |
US08954340B2 |
Risk evaluation based on vehicle operator behavior
A method for ascertaining the risk associated with the driver of a vehicle utilizes three-dimensional (3D) motion sensing data. A server gathers motion sensing data from one or more motion sensing modules and clusters the motion sensing data into movement categories. The server then assigns an indication of risk to at least some of the movement categories and combines the motion sensing data from a plurality of movement categories to generate a collective measure of risk associated with the driver of the vehicle. |
US08954337B2 |
Interactive genome browser
Disclosed is an interactive genome browser executing within a web browser application, configured to display patient genetic data and additional genetic data tracks which are aligned by base pair. Additional tracks may include public data, community data, private data, sequence gaps, and additional genetic tests or probes which are available. Tests or probes may be ordered by selecting them from a test or probe track. Data in a genetic information database may also be searched using the interactive genome browser. Analyzed patient data may be published and made available to a community of users, which may communicate with one another. |
US08954335B2 |
Speech translation system, control device, and control method
Appropriate processing results or appropriate apparatuses can be selected with a control device that selects the most probable speech recognition result by using speech recognition scores received with speech recognition results from two or more speech recognition apparatuses; sends the selected speech recognition result to two or more translation apparatuses respectively; selects the most probable translation result by using translation scores received with translation results from the two or more translation apparatuses; sends the selected translation result to two or more speech synthesis apparatuses respectively; receives a speech synthesis processing result including a speech synthesis result and a speech synthesis score from each of the two or more speech synthesis apparatuses; selects the most probable speech synthesis result by using the scores; and sends the selected speech synthesis result to a second terminal apparatus. |
US08954329B2 |
Methods and apparatus for acoustic disambiguation by insertion of disambiguating textual information
Techniques for disambiguating at least one text segment from at least one acoustically similar word and/or phrase. The techniques include identifying at least one text segment, in a textual representation having a plurality of text segments, having at least one acoustically similar word and/or phrase which has a different spelling, annotating the textual representation with disambiguating information to help disambiguate the at least one text segment from the at least one acoustically similar word and/or phrase, and synthesizing a speech signal, at least in part, by performing text-to-speech synthesis on at least a portion of the textual representation that includes the at least one text segment, wherein the speech signal includes speech corresponding to the disambiguating information located proximate the portion of the speech signal corresponding to the at least one text segment. |
US08954326B2 |
Apparatus and method for voice command recognition based on a combination of dialog models
Provided are a voice command recognition apparatus and method capable of figuring out the intention of a voice command input through a voice dialog interface, by combining a rule based dialog model and a statistical dialog model rule. The voice command recognition apparatus includes a command intention determining unit configured to correct an error in recognizing a voice command of a user, and an application processing unit configured to check whether the final command intention determined in the command intention determining unit comprises the input factors for execution of an application. |
US08954319B2 |
System and method for generating manually designed and automatically optimized spoken dialog systems
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable storage media for generating a natural language spoken dialog system. The method includes nominating a set of allowed dialog actions and a set of contextual features at each turn in a dialog, and selecting an optimal action from the set of nominated allowed dialog actions using a machine learning algorithm. The method includes generating a response based on the selected optimal action at each turn in the dialog. The set of manually nominated allowed dialog actions can incorporate a set of business rules. Prompt wordings in the generated natural language spoken dialog system can be tailored to a current context while following the set of business rules. A compression label can represent at least one of the manually nominated allowed dialog actions. |
US08954318B2 |
Method of and system for using conversation state information in a conversational interaction system
A method of using conversation state information in a conversational interaction system is disclosed. A method of inferring a change of a conversation session during continuous user interaction with an interactive content providing system includes receiving input from the user including linguistic elements intended by the user to identify an item, associating a linguistic element of the input with a first conversation session, and providing a response based on the input. The method also includes receiving additional input from the user and inferring whether or not the additional input from the user is related to the linguistic element associated with the conversation session. If related, the method provides a response based on the additional input and the linguistic element associated with the first conversation session. Otherwise, the method provides a response based on the second input without regard for the linguistic element associated with the first conversation session. |
US08954314B2 |
Providing translation alternatives on mobile devices by usage of mechanic signals
Disclosed is subject matter that provides a technique and a device that may include an accelerometer, a display device, an input device and a processor. The input device may receive textual information in a first language. The processor may be configured to generate a plurality of probable translation alternatives for a translation result. Each probable translation alternative may be a translation of the textual information into a second language. The processor may present a first of the plurality of probable translation alternatives on the display device in an alternate translation result dialog screen. Based on an accelerometer signal, the processor may determine whether the device is being shaken. In response to a determination the device is being shaken, the processor may present a second of the plurality of probable translation alternatives on the display device in place of the first of the plurality of probable translation alternatives. |
US08954309B2 |
Techniques for application tuning
Techniques for tuning systems generate configurations that are used to test the systems to determine optimal configurations for the systems. The configurations for a system are generated to allow for effective testing of the system while remaining within budgetary and/or resource constraints. The configurations may be selected to satisfy one or more conditions on their distributions to ensure that a satisfactory set of configurations are tested. Machine learning techniques may be used to create models of systems and those models can be used to determine optimal configurations. |
US08954308B2 |
Modeling of multi-layered power/ground planes using triangle elements
In a method of simulating electrical characteristics of a circuit board having a plurality of features, the plurality of features is projected onto a planar construct. A Delaunay triangulation routine for generating a triangular mesh that corresponds to the single planar construct is executed on the digital computer. A routine that generates a Voronoi diagram corresponding to the triangular mesh. An equivalent circuit for each triangle is determined. The equivalent circuit includes exactly three sub-circuits that couple a vertex within the triangle to a vertex within an adjacent triangle and exactly one sub-circuit that couples the vertex within the triangle to a reference plane. A routine solves, for each triangle, an equation describing an electrical characteristic value based on the equivalent circuit corresponding to the triangle. A routine for generating a human-perceptible indication of the electrical characteristic value for each triangle is executed on the digital computer. |
US08954305B2 |
Circuit simulation apparatus and circuit simulation method
A circuit simulation apparatus acquires wiring connection information indicating connection data in an electric circuit, selects a component constituting the circuit based on the wiring connection information, performs a setting of replacing the selected component with each resistor having different resistance values, generates at least one of netlists using the acquired wiring connection information and at least one of the set resistance values, calculates a value of an equivalent power source and a value of an internal resistance thereof for a part of the circuit using the acquired wiring connection information and at least one of the generated netlists, and calculates a resistance value of the selected component and a power consumption for the resistance value using the value of the equivalent power source and the value of the internal resistance. |
US08954300B2 |
Screening method and apparatus
A screening method and apparatus, the method comprising irradiating a subject for screening with excitation radiation, collecting detector output data from a radiation detector located near the subject, and resolving individual signals in the detector output data by (i) determining a signal form of signals present in the data, (ii) making parameter estimates of one or more parameters of the signals, wherein the one or more parameters comprise at least a signal temporal position, and (iii) determining the energy of each of the signals from at least the signal form and the parameter estimates. The screening time is shorter, dwell time is shorter, resolution is improved and/or throughput is increased. |
US08954298B2 |
Methods and systems for helicopter rotor blade balancing
Methods and systems for balancing helicopter rotor blades are disclosed. In some examples, density data of a rotor blade may be acquired by scanning the rotor blade. In some examples, a three-dimensional model of a rotor blade may be merged with density data of the rotor blade. In some examples, simulations may be performed to predict flight data associated with a modeled rotor blade. In some examples, a database may be referenced to predict a desired weight balance of a rotor blade. |
US08954297B2 |
Automated and intelligent structure design generation and exploration
Computational systems and methods are disclosed that learn about and assist with appropriate structure-based design choices. The systems and methods autonomously explore design states, and suggest to a user one or more optimize design states. Constraints are provided to limit exploration to valid design states. Systems and methods are disclosed that assist groups of users with coordinating their efforts in producing a cohesive design. Systems and methods are disclosed for learning from past optimizations in order to provide more rapid convergence on an optimized design, avoid local maxima and other hurdles to optimization, avoid undesired optimizations, and so on. |
US08954294B2 |
Measuring device and measuring method for continuous physical quantity
The invention discloses a measuring device and a measuring method for a continuous physical quantity. The measuring device comprises a timing unit for outputting a time base and a time scale; a sampling unit for sampling the continuous physical quantity under control of the time base and at time intervals that meet the Nyquist sampling theorem, and outputting a sampling value; a decision unit for deciding whether the sampling value turns into a transient state from a steady state or turns into the steady state from the transient state; a calculating unit for calculating a steady state value for the sampling value of the sampling unit in the steady state; and an output unit for outputting the start time of the steady state and the steady state value X, and the start time and the sampling value of the transient state according to the result of decision and the time scale. The invention may not only avoid the aliasing and but also reduce the output data volume. |
US08954293B2 |
Method and arrangement for reconstructing the source of an electromagnetic field
The disclosure relates to a method for reconstructing the source of an electromagnetic field. Firstly, a measurement space separate from the source is selected so that the measurement space is connected to the source via a magnetically homogeneous spatial region. Measured values of the electromagnetic field emitted by the source are recorded on the surface of the measurement space so that the electromagnetic field in the measurement space can be uniquely determined in the context of an error bound determined by the discreteness of the measured values. A mathematical model of the electromagnetic source is developed which has a multiplicity of unknowns, and a system of equations is set up that relates the unknowns of the model to the measured values. The system of equations is solved in order to determine the characteristics of the electromagnetic source. The disclosure also relates to an arrangement for carrying out the method. |
US08954292B2 |
Methods, systems, and computer program products for locating and tracking objects
A system for locating and tracking an object is provided. The system includes a measuring device configured to determine a property of a paving-related material, a locating device configured to determine a location of the measuring device, a tracking system configured to store tracking information associated with the measuring device and one or more properties determined by the measuring device, and a communications system configured to transfer, to a remote device, the location of the measuring device and the tracking information associated with the measuring device. |
US08954291B2 |
Alarm setting and interfacing with gesture contact interfacing controls
A device configured for capture of activity data for a user includes a housing, a sensor, a motor, a memory, and a processor. The sensor is disposed in the housing to capture physical contact upon the housing. The motor causes vibration of the housing. The memory stores an alarm setting that defines a time of day for triggering an alarm on the device. The processor activates the alarm upon reaching the time of day defined by the alarm setting, with the alarm causing the motor to produce the vibration of the housing. The sensor, which is interfaced with the processor, is configured to detect a physical contact upon the housing. The processor is configured to deactivate the alarm if the physical contact qualifies as an input to deactivate the alarm. The deactivating of the alarm causes the vibration of the device to be suspended. |
US08954288B2 |
System for determining ambient temperature
A mechanism for indicating ambient temperature of an enclosure from temperatures determined within the enclosure. The temperatures may be obtained from two or more sensors at each of two or more locations within the enclosure. The enclosure may include an apparatus inside such as electronics of which power consumption may be determined. Data including temperatures of two locations within the enclosure at various electronics power consumption levels may be entered into a 2-D plot. An approximation of the 2-D plot may be effected with an appropriate equation to be solved for ambient temperature. The data of the 2-D plot plus temperatures of a third location and air flow levels in the enclosure may be entered into a 3-D plot. An approximation of the 3-D plot may be effected with an appropriate equation to be solved for ambient temperature. |
US08954282B2 |
Autonomic seismic data processing
Implementations of various technologies for a method for processing seismic data. In one implementation, the method may include receiving a record of seismic data. The record of seismic data may have a plurality of attributes. A first seismic data process may be performed on the record of seismic data. The first seismic data process may generate a plurality of datasets. A selection of a portion of the plurality of attributes for ranking the datasets may be received. A quality score may be determined for each attribute of the portion of the plurality of attributes for each dataset. A ranking may be determined for each dataset based on the quality score. |
US08954281B2 |
Wellbore fluid testing apparatus and methods
A system for testing a wellbore fluid includes a test chamber having first and second platens therein. The chamber is in a thermally insulating enclosure. The enclosure includes a heating element. The platens simulate response of the wellbore fluid through an hydraulically induced fracture in subsurface rock formation. The system includes means to control a distance between the platens. A pump introduces the wellbore fluid into a space between the platens and another pump introduces a pressure test fluid into contact with the wellbore fluid. A respective pressure sensor is in fluid communication with a discharge side of each pump, and a sensor is included to measure a parameter related to the position of the second platen or the space between the platens. A data acquisition and control device is configured to detect signals from the respective pressure transducers and the sensor. |
US08954279B2 |
Human-like global positioning system (GPS) directions
In one embodiment, a method includes receiving, from a user, a request for a route from a first geolocation to a second geolocation; and calculating the route from the first geolocation to the second geolocation. The route includes one or more segments and a set of navigation instructions of the segments. The method also includes accessing a data store for one or more pre-determined paths determined at least in part by previous location data of the user. Each pre-determined path comprising an abbreviated navigation instruction. The method also includes identifying one or more pre-determined paths that coincide with one or more of the segments; modifying the set of navigation instructions by replacing the navigation instructions of the coinciding segments with the abbreviated navigation instruction of each identified pre-determined path; and providing, to the user, the modified set of navigation instructions. |
US08954276B1 |
System and method for managing indoor geolocation conversions
The present technology proposes techniques for managing indoor geolocation conversions based on a user's intent in an indoor location. An advertiser may determine the intent of a user of a mobile device and transmit advertisements to the mobile device related to the determined intent. The intent may be determined based on events that include a location of the mobile device, network browsing history, and a transaction made using the mobile device. The advertisement may provide the user with directions to an item based on location information from the mobile device. The advertisements may also load balance geolocation conversions in order to manage a number of users at a particular location. |
US08954273B2 |
Navigation system, particularly for a motor vehicle
A navigation system, in particular for a motor vehicle, for determining a route to a destination, wherein the navigation system includes an input device for alphanumeric input of the destination and a display for displaying changing information and includes a processing unit for displaying potential destinations in a representation of a map by means of the display during input of the destination. |
US08954272B2 |
Method and apparatus for the tracking of multiple objects
Tracking systems using multi-object-tracking (MOT) combine data from a plurality of sensors (101) to derive a state estimate of one or more objects (103) are described. The interfaces to the sensors (101) are such that different ones of the sensors (101) can be used. The tracking (102) in the system consists of different blocks for state estimation (104), object's existence estimation (106), and data association (105). To utilize the data of a sensor, the sensor data and the system which is observed is modeled using the Bayesian filtering framework. All interfaces of the system, i.e. the interfaces between the sensors (101) and the MOT system as well as of the blocks in the MOT are of a characteristic that ensures that only compatible models are used with each other already when designing the system. |
US08954268B1 |
Using location-based logic to adjust building automation schedules
An apparatus for adjusting scheduled events in an automation system of a building at a predetermined location includes a location module, an arrival time module, and a regulator module. The location module determines a current location of a user in response to a triggering event. The arrival time module calculates an estimated time of arrival of the user at a residence. The regulator module adjusts a characteristic of a scheduled event in the automation system in response to comparing the estimated time of arrival of the user to a time of the scheduled event in the automation system. |
US08954267B2 |
Mobile device positioning
Methods, apparatus, and computer program products for determining a mobile device location. An example of a method for determining a mobile device location includes receiving signals from a transmitter, measuring signal characteristics of the received signals, and downloading data from a database corresponding to a defined region associated with the transmitters. The downloaded data includes a set of position points, a classification of each position point, and expected signal characteristics for each position point. The method further includes comparing the measured signal characteristics with the expected signal characteristics for each position point, assigning a weight to position points based on the compared signal characteristics, and determining the mobile device location by selecting one position point from the set as a position point solution corresponding to the mobile device location based on the assigned weight. The position point solution is constrained by the classification of each position point. |
US08954264B2 |
Environmental waypoint insertion
The different advantageous embodiments provide a system comprising an environmental waypoint insertion process and a processor unit. The processor unit is configured to run the environmental waypoint insertion process. The environmental waypoint insertion process is configured to receive information. The environmental waypoint insertion process determines whether and how to suggest additional waypoints for insertion into a flight plan to a subscriber. |
US08954263B2 |
Portable navigation device
A navigation device is configured to allocate display setting such as color schemes and screen contents to at least one ambient lighting condition, monitors and evaluates a signal indicative of ambient lighting conditions and determines whether display settings for the current ambient lighting conditions are already in use and to change display settings so that they suit current ambient lighting conditions if needed. |
US08954262B2 |
Method and apparatus for dynamic aircraft trajectory management
Disclosed are algorithms and agent-based structures for a system and technique for analyzing and managing the airspace. The technique includes managing bulk properties of large numbers of heterogeneous multidimensional aircraft trajectories in an airspace, for the purpose of maintaining or increasing system safety, and to identify possible phase transition structures to predict when an airspace will approach the limits of its capacity. The paths of the multidimensional aircraft trajectories are continuously recalculated in the presence of changing conditions (traffic, exclusionary airspace, weather, for example) while optimizing performance measures and performing trajectory conflict detection and resolution. Such trajectories are represented as extended objects endowed with pseudo-potential, maintaining objectives for time, acceleration limits, and fuel-efficient paths by bending just enough to accommodate separation. |
US08954261B2 |
Autonomous vehicle positioning system for misbehavior detection
An autonomous vehicle positioning system for determining a position of a remote vehicle relative to a mobile host vehicle based on safety alert messages broadcast from the remote vehicle relating to an event in a road of travel. A host vehicle communication unit communicates with the remote vehicle for receiving the broadcast messages from the remote vehicle. A host vehicle control unit identifies reference points along the road of travel. Each reference point identifies a position of the host vehicle and associated signal reception properties, for example time-of-arrival, angle-of-arrival and received signal strength when the host vehicle receives the broadcast message. The control unit of the host vehicle selects a set of the reference points having identified positions and associated times, angles and signal strength. The control unit determines a position of the remote vehicle as a function of the time difference-of-arrival, angle-of-arrival or received signal strength between each selected reference point in the set. |
US08954258B2 |
Electronically operated pressure reducing regulator
A pressure-reducing regulator for CNG fuel includes a high pressure sensor that detects fuel pressure at an inlet, a filter element that filters fuel, an orifice that provides access to a pressure reduction chamber, and a movable pintle located within the orifice, such that a flow rate of fuel through the orifice varies according to a position of the pintle within the orifice. The pressure-reducing regulator further includes a motor that moves the pintle, a low pressure sensor that detects fuel pressure at an outlet and a control unit comprising a processor. The process is configured for reading data from the high pressure sensor, data from the low pressure sensor and vehicle data from an engine, calculating a desired position of the pintle based on the sensor data and the vehicle data, and transmitting a signal to the motor for moving the pintle to the desired position. |
US08954256B2 |
Vehicle-use speed control apparatus
The vehicle-use speed control apparatus sets a virtual preceding vehicle assumed to run at a target speed at a predetermined initial distance ahead of the own vehicle when the brake pedal is operated causing a relative speed between the actual vehicle speed and the target speed exceeds a predetermined value, calculates an initial value of a performance index for approach and alienation based on the initial distance and the target speed. Thereafter, the vehicle-use speed control apparatus repeatedly calculates a following distance to the virtual preceding vehicle based on a time elapsed from when a speed control start condition is satisfied, the current relative speed and the initial distance, and a target relative speed based on the initial distance, the initial value of the performance index and the following distance, and controls the vehicle speed based on the difference between the target relative speed and the actual relative speed. |
US08954254B2 |
Computer network for calculating and distributing the true aircraft braking friction coefficient for an aircraft runway or taxiway using data received from an aircraft's on board flight data management system
This invention relates to a computer network for calculating and distributing the true braking coefficient of aircraft on runways and taxiways using a computer which obtains data from an aircraft, including in some preferable embodiments dynamic aircraft properties recorded on the aircraft's flight data management system. Environmental and aircraft parameters may also be used to calculate the braking friction coefficient. A computer and network are used to obtain data and to calculate the friction coefficient, and may be used to distribute the result. The network may utilize, at least in part, wireless local area networks to facilitate data transfer and distribution of the result. The computer for calculating the braking coefficient may be located on the aircraft. |
US08954244B2 |
Method and apparatus for actuating an automated transmission, in particular an automated transmission of a commercial vehicle, and test bench
A method for actuating an automated transmission, in particular an automated transmission of a commercial vehicle, which is coupled to a drive motor, where data and/or signals are supplied to a controller of the automated transmission via an interface. When a defined event occurs, a temporally predictive non-steady profile of the drive motor torque for this event is transmitted to the controller of the automated transmission. The transmission controller ascertains and/or specifies a transmission shifting strategy on the basis of the transmitted data. There is also provided an apparatus for actuating an automated transmission, and also a test bench. |
US08954243B2 |
Dynamic tip-off detection, display and location selection
Tip-off is a process of bringing a transport vehicle to a target weight by using only part of a bucket of a loader. By observing sensor data, tip-off may be automatically determined. Once determined, a visual indication may be made to an operator, allowing the operator to both confirm that tip-off mode is active and to show what tip-off mode is selected, truck tip-off or pile tip-off. Among other benefits, automatic tip-off allows an operator to maintain contact with the loader controls when entering tip-off mode of operation. |
US08954237B2 |
Modular and scaleable port verhicle
The invention relates to a central module for a modular vehicle. The module is characterized in that it comprises, on either side of a loading surface, a first end having a first junction surface and a second end opposite said first end having a second junction surface that is symmetrical nonparallel to said first surface, each of the latter designed to be capable of complementarily engaging with a complementary junction surface of a side module capable of engaging with the central module by buttressing assembly. The invention relates to a modular vehicle comprising such a module. The vehicle is characterized in that the latter is assembled, at each end thereof, to a side module, one side module comprising means for running on the ground. The invention relates to a train of vehicles comprising such a vehicle. |
US08954233B2 |
Vehicle body drifting suppression device
A vehicle body drifting suppression device including a steering torque detection unit which detects a steering torque of a vehicle, wherein a vehicle body drifting suppression is performed according to a vehicle body drifting suppression control-amount, and the vehicle body drifting suppression control-amount is adjusted according to a temporal sustention status of the steering torque. |
US08954232B2 |
Vehicle control system
A vehicle control system includes a control portion configured to determine a single parameter based on a running condition of a vehicle, and determine control amounts for a plurality of actuators provided in the vehicle based on the parameter. A relation of the control amount for each of the plurality of actuators to the parameter is predetermined. The control portion is configured to, when the parameter is determined, determine the control amounts for the respective actuators based on the parameter, and control the actuators based on the determined control amounts. |
US08954228B2 |
Gas turbine engine failure detection
A gas turbine engine control system is disclosed having a fault detection system capable of detecting a high N1 condition. N1 rotational speed is measured and, in two different locations, subtracted from a target N1 value and a requested N1 value. The resultant error values are scaled by a gain that is scheduled as a function of N2 rotational rate. Each error value is accumulated with separate integrators that have independent maximum and minimum limits. The integrators are reset based upon a number of conditions. A number of additional conditions must also be satisfied for the fault detection system to trigger a fault condition. If the additional conditions are satisfied and the integrators are accumulating values, then a fault condition is set if either or both integrators accumulate a value that reaches a selected limit. |
US08954222B2 |
Method and system for retrieving diagnostic information
A system, method, and apparatus for retrieving trouble codes from a motor vehicle and retrieving only relevant diagnostic information relative to the returned codes from one or more remote diagnostic libraries. An electronic diagnostic library contains generalized diagnostic vehicle information tagged with trouble code identification ID's at a first location, and a diagnostic tool at a second location requests only relevant diagnostic information from the electronic library that is tagged with trouble code identification ID's corresponding to the retrieved trouble codes. The diagnostic tool receives the specific diagnostic vehicle information at the first location and may store the specific vehicle information locally prior to displaying an index to the information to a repair technician. |
US08954219B2 |
Installed in vehicle for monitoring target section in the vehicle
In a device installed in a vehicle for monitoring a target section in the vehicle, an executing unit executes a specific process for addressing an abnormality in the target section, and an instructing unit instructs the executing unit to execute the specific process when an abnormality occurs in the target section. A determining unit determines when the specific process is required to be checked. A checking unit instructs the executing unit to execute the specific process independently of whether an abnormality occurs in the target section each time it is determined that the specific process is required to be checked, thus checking whether an abnormality occurs in the specific process. |
US08954217B1 |
Determining when to drive autonomously
Aspects of the disclosure relate generally to determining whether an autonomous vehicle should be driven in an autonomous or semiautonomous mode (where steering, acceleration, and braking are controlled by the vehicle's computer). For example, a computer may maneuver a vehicle in an autonomous or a semiautonomous mode. The computer may continuously receive data from one or more sensors. This data may be processed to identify objects and the characteristics of the objects. The detected objects and their respective characteristics may be compared to a traffic pattern model and detailed map information. If the characteristics of the objects deviate from the traffic pattern model or detailed map information by more than some acceptable deviation threshold value, the computer may generate an alert to inform the driver of the need to take control of the vehicle or the computer may maneuver the vehicle in order to avoid any problems. |
US08954213B2 |
Engine starting strategy to avoid resonant frequency
A machine comprising powertrain components, an engine that applies power to powertrain components, and a hybrid motor that applies power to powertrain components. The machine includes an electronic control module that controls the hybrid motor to apply power to powertrain components. The machine includes an engine parameter sensor. The engine parameter sensor senses engine performance parameters and sends engine performance parameter signals to the electronic control module. The electronic control module monitors engine performance parameters and control the hybrid motor to apply power to the powertrain components to provide hybrid performance parameters to counteract the engine performance parameters. |
US08954212B2 |
Control device for electric vehicle
A control device for a creep speed advance and creep speed backing up of an electric vehicle. A mode switch provided with an operating section can be operated in a longitudinal direction and can be operated leftward from an intermediate part. The operating section is automatically returned to a stop position in which a speed zero instruction is output to a motor when not being operated by return springs. When the operating section is pushed forward, a creep speed advance mode can be selected and when the operating section is pulled backward, a creep speed backing up mode can be selected. To clearly discriminate a position of the operating section among the creep speed advance mode, the creep speed backing up mode and a normal mode, a stopper is arranged between the stop position and the normal mode so that larger force is required to operate the operating section. |
US08954207B1 |
Method of enhancing on-board state estimation using communication signals
A method of enhancing on-board state estimation for a spacecraft utilizes a network of assets to include planetary-based assets and space-based assets. Communication signals transmitted from each of the assets into space are defined by a common protocol. Data is embedded in each communication signal transmitted by the assets. The data includes a time-of-transmission for a corresponding one of the communication signals and a position of a corresponding one of the assets at the time-of-transmission. A spacecraft is equipped to receive the communication signals, has a clock synchronized to the space-wide time reference frame, and has a processor programmed to generate state estimates of the spacecraft. Using its processor, the spacecraft determines a one-dimensional range from itself to at least one of the assets and then updates its state estimates using each one-dimensional range. |
US08954203B2 |
Systems and methods for distributed power factor correction and phase balancing
A power management system includes a plurality of monitors, communicatively coupled together over a communications medium. Each respective monitor of the plurality of monitors is configured to capture power factor (PF) data at a corresponding distribution segment for calculation of a PF correction. |
US08954192B2 |
Navigating autonomous coverage robots
A method of navigating an autonomous coverage robot between bounded areas includes positioning a navigation beacon in a gateway between adjoining first and second bounded areas. The beacon configured to transmit a gateway marking emission across the gateway. The method also includes placing the coverage robot within the first bounded area. The robot autonomously traverses the first bounded area in a cleaning mode and upon encountering the gateway marking emission in the gateway, the robot remains in the first bounded area, thereby avoiding the robot migration into the second area. Upon termination of the cleaning mode in the first area, the robot autonomously initiates a migration mode to move through the gateway, past the beacon, into the second bounded area. |
US08954189B2 |
Security and tracking system and process for agricultural product distribution
Sonic embodiments provide an agricultural commodity distribution system that provides secure distribution of an agricultural commodity to an authorized person. In some embodiments, the system comprises a server computing device, a data storage associated with the computing device, and a controller that activates the distribution to the authorized person. In some embodiments, the server is communicably connected to a mobile communication device of a person such that the person can send the distribution request to the server via the mobile communication device. The server of some embodiments is associated with the data storage such that the server can validate the distribution request against data stored in the data storage. The server of some embodiments is also communicably connected to the controller such that the server transmits an activation code to the controller when the distribution request is validated. |
US08954183B2 |
Aircraft component manufacturing method and apparatus
A method of manufacturing in which a robot arm is used to pick up a workpiece which is subsequently scanned by a scanner and positioned relative to a manufacturing system for manufacturing in order to eliminate the use of a bespoke jig. |
US08954177B2 |
Controlling operation of a media device based upon whether a presentation device is currently being worn by a user
A mechanism is provided for automatically controlling the operation of a media device based at least in part upon whether a portable presentation device coupled to the media device is currently being worn by a user. A portable presentation device may be any device that is meant to be worn by a user and that is capable of presenting media content to the user (e.g. earphones, headphones, goggles or faceplates with video/audio capability, etc.). With this mechanism, a user can affect the operation of the media device by simply putting on or taking off the portable presentation device. The user does not need to manually manipulate the controls of the media device. By automatically controlling the operation of the media device in this manner, use of the media device and the portable presentation device as a unit is made much simpler and more convenient. |
US08954176B2 |
Expandable multimedia control system and method
A multimedia control system which may be expanded without creating or modifying source code. The system is based on a master programmable multimedia controller. The master programmable multimedia controller has a list of unique identifiers that indicate valid subordinate programmable multimedia controllers that are eligible to become part of the system. One or more subordinate programmable multimedia controllers having a matching unique identifier to a unique identifier on the master's list may be added to the system to provide additional control ports, increase audio or video processing or switching capacity. A method is provided for determining whether a particular subordinate programmable multimedia controller may be added to the system. |
US08954174B2 |
Method and device to process digital media streams
A digital processing circuit for processing media data includes a data path arranged to transmit at least media data along the data path between a plurality of processing modules connected serially. The data is transmitted directly from the output of a first module to an input of a second module of the plurality by sequential clocking signals. A routing controller controls transmission of data from the first of the plurality of processing modules to any target processing module selected from the plurality of modules by providing an identification for the target processing module in a signal provided on the datapath. |
US08954173B1 |
Method and apparatus for profiling and identifying the source of a signal
A method and apparatus for profiling and identifying the source of a signal is provided. A first method includes receiving a signal produced by a known source and creating a matrix of wavelet coefficients corresponding to a wavelet transform of the signal. The method also includes profiling the signal according to an output of a wavelet transform utilizing a particular base function and a particular scale set. A second method includes performing a wavelet transform having a particular profile on a received signal and determining the presence of a particular signal-producing entity as a function of wavelet coefficients exceeding a threshold. An apparatus includes a receiver configured to receive a signal and a processor coupled to the receiver, such that the processor is configured to perform wavelet transforms on the signals. A database is coupled to the processor and configured to store wavelet transform profiles. |
US08954167B2 |
Helically formed coil for a neural cuff electrode
A lead assembly for an implantable medical device includes a lead body having a proximal end and a distal end. One or more connectors at the proximal end of the lead body are each adapted for connection to a pulse generator. One or more conductive elements are coupled to the one or more connectors at the proximal end and extend through the lead body to the distal end. Each of the one or more conductive elements includes an electrode coil that extends from the distal end of the lead body that is formed into a helix having a diameter greater than a diameter of the electrode coil. |
US08954160B2 |
Detection of extracardiac stimulation by a cardiac rhythm management device
A medical device system and associated method for controlling a cardiac rhythm management therapy detect extracardiac stimulation. Cardiac pacing pulses are delivered, and a cardiac electrical signal comprising myocardial depolarization and repolarization signals is acquired. A processor is configured to, responsive to the cardiac electrical signal, detect extracardiac capture due to the cardiac pacing pulse. |
US08954156B2 |
Methods and apparatuses for configuring artificial retina devices
Methods and apparatuses for configuring an implantable device to interface with retina cells are described. The device may comprise an array of pixel units capable of stimulating the retina cells are described. The pixel units may operate in a mode of operation selected from a plurality of modes including a normal mode and a calibration mode. A control circuitry of the device may be configured to switch the mode of operation for the pixel units. In one embodiment, the pixel units may be configured to receive light for stimulating the retina cells during the normal mode to enable perception of the light. During the calibration mode, the pixel units may be configured to adjust amount of stimulation to the retina cells. |
US08954151B2 |
RF resistant feedthrough assembly and electrical stimulation systems containing the assembly
A control module for an electrical stimulation system includes a casing having an electrically-conductive portion; an electronic subassembly disposed in the casing; and a header portion coupled to the casing and including a connector for a lead or lead extension. The control module also includes a feedthrough assembly coupling the casing to the header portion. The feedthrough assembly includes a non-conductive ceramic block; conductive feedthrough pins passing through the ceramic block and electrically coupling the connector to the electronic subassembly disposed in the casing; a metal flange disposed around, and attached to, the ceramic block, and a non-conductive spacer attached to the metal flange and to the casing to raise the ceramic block above, and away from, the casing. Other control modules include a ceramic block that has a rim portion that raises the plate portion, through which the feedthrough pins pass, of the block away from the casing. |
US08954150B2 |
Side mount feedthrough system for sealed components
The present subject matter provides apparatus and methods for manufacturing an encasement for a component of an implantable medical device having a main circuit board. The method includes forming an encasement aperture on a lateral side of the encasement. The lateral side of the encasement is adapted to be placed substantially parallel to a surface of the main circuit board. A feedthrough assembly is connected through the encasement aperture. The feedthrough assembly includes at least one terminal conductor at least partially passing through the encasement aperture. |
US08954146B2 |
Implantable cardiac device with dyspnea measurement
Cardiac monitoring and/or stimulation methods and systems employing dyspnea measurement. An implantable cardiac device may sense transthoracic impedance and determine a patient activity level. An index indicative of pulmonary function is implantably computed to detect an episode of dyspnea based on a change, trend, and/or value exceeding a threshold at a determined patient activity level. Trending one or more pulmonary function index values may be done to determine a patient's pulmonary function index profile, which may be used to adapt a cardiac therapy. A physician may be automatically alerted in response to a pulmonary function index value and/or a trend of the patient's pulmonary index being beyond a threshold. Computed pulmonary function index values and their associated patient's activity levels may be stored periodically in a memory and/or transmitted to a patient-external device. |
US08954143B2 |
Radial feed through packaging for an implantable electroacupuncture device
An implantable electroacupuncture device (IEAD) treats a disease or medical condition of a patient through application of stimulation pulses applied at a specified acupoint or other target tissue location. In a preferred implementation, the IEAD is an implantable, coin-sized, self-contained, leadless electroacupuncture device having at least two electrodes attached to an outside surface of its housing. The device generates stimulation pulses in accordance with a specified stimulation regimen. Power management circuitry within the device allows a primary battery, having a high internal impedance, to be used to power the device. The stimulation regimen generates stimulation pulses during a stimulation session of duration T3 minutes applied every T4 minutes. The duty cycle, or ratio T3/T4, is very low, no greater than 0.05. The low duty cycle and careful power management allow the IEAD to perform its intended function for several years. |
US08954142B2 |
Microelectrode and multiple microelectrodes
A medical microelectrode includes an elongate electrode body including a tip section, a main body section and, optionally, a coupling section. The tip section, the main body section and, optionally, the coupling section are embedded in a first electrode matrix element, which is substantially rigid, biocompatible and soluble or biodegradable in a body fluid. Additionally the microelectrode includes a dissolution retarding layer on the first electrode matrix element and/or a second electrode matrix element disposed between the first electrode matrix element and the electrode. Upon dissolution or biodegradation of the first electrode matrix element a drug comprised by the first electrode matrix element or the second electrode matrix element is released into the tissue. Also disclosed are bundles and arrays of the electrodes and their use. |
US08954137B2 |
Use of patterns in processing on mobile monitoring device and computer system
A system include circuitry to receive information from a mobile device including ECG data representative of a beating heart, circuitry to analyze the ECG data using at least one pattern to detect a notable finding in the ECG data and circuitry to determine at least one pattern to send to the mobile device, based on the analysis of the ECG data. The system sends the at least one determined pattern to the mobile device. |
US08954136B2 |
Implantable cardiac systems with baseline correction in response to noise detection
Implantable cardiac devices and methods of their use. A method of operation in an implantable cardiac device may include steps for characterizing detected events as noise or not noise, identifying a set of consecutive noise events or a threshold quantity of noise events in a set period of time and declaring a noisy series to have occurred. In response to the declaration of a noisy series, the method initiates a baseline correction algorithm. Devices for performing such methods are also disclosed. |
US08954132B2 |
Methods and systems for guiding an emission to a target
Disclosed are methods and systems for guiding emissions to a target. The methods and systems utilize, in part, Markerless Tracking software to detect a beam of energy, such as a laser, toward a target such as a tissue that is the subject of a medical procedure. |
US08954128B2 |
Polymer membranes for continuous analyte sensors
Devices and methods are described for providing continuous measurement of an analyte concentration. In some embodiments, the device has a sensing mechanism and a sensing membrane that includes at least one surface-active group-containing polymer and that is located over the sensing mechanism. The sensing membrane may have a bioprotective layer configured to substantially block the effect and/or influence of non-constant noise-causing species. |
US08954127B2 |
Systems and methods for estimating values of a continuous wavelet transform
According to embodiments, techniques for estimating scalogram energy values in a wedge region of a scalogram are disclosed. A pulse oximetry system including a sensor or probe may be used to receive a photoplethysmograph (PPG) signal from a patient or subject. A scalogram, corresponding to the obtained PPG signal, may be determined. In an arrangement, energy values in the wedge region of the scalogram may be estimated by calculating a set of estimation locations in the wedge region and estimating scalogram energy values at each location. In an arrangement, scalogram energy values may be estimated based on an estimation scheme and by combining scalogram values in a vicinity region. In an arrangement, the vicinity region may include energy values in a resolved region of the scalogram and previously estimated energy values in the wedge region of the scalogram. In an arrangement, one or more signal parameters may be determined based on the resolved and estimated values of the scalogram. |
US08954126B2 |
Superconducting direct-current electrical cable
A superconductive electrical direct current cable with at least two conductors insulated relative to each other is indicated, where the cable is placed with at least two conductors insulated relative to each other, where the conductors are arranged in a cryostat suitable for guidance of the cooling agent, wherein the cryostat is composed of at least one metal pipe which is surrounded by a circumferentially closed layer with thermally insulating properties. In the cryostat is arranged a strand-shaped carrier composed of insulating material, where the carrier has at least two diametrically oppositely located outwardly open grooves in each of which is arranged one of the conductors. Each conductor is composed of a plurality of superconductive elements. |
US08954110B2 |
Communication device, communication system and program
To improve convenience of a function of rearranging and conveying information registered in an address book. A mobile phone, if any one of users registered in an address book is selected, obtains location information of a mobile phone owned by the selected user from a location search server. The mobile phone, by comparing location information of a home or an office of the selected user registered in the address book and the location information of the mobile phone obtained from the location search server, decides an indication sequence of plural communication addresses registered in the address book for the selected user. |
US08954105B2 |
Method and apparatus for transmitting/receiving data and control information through an uplink in a wireless communication system
Disclosed is a method and an apparatus for multiplexing and transmitting data and uplink control information, and receiving the data and control information in a wireless communication system. In the system multiplexing an uplink packet data channel and a control channel, a transport format of the control channel for transmission of the control information is changed according to the transport format of the data channel. The disclosed method and apparatus can control the quantity of resources for the control channel in the case of transmitting high speed data, and thus can the efficiency of the data channel resources. |
US08954104B2 |
Synchronization of PICO-nodes in a heterogeneous cellular network deployment
A high-power point (110) and one or more low-power points (120) transmit signals associated with the same cell-identifier in a heterogeneous cell deployment. Coverage areas corresponding to the low-power points (120) fall at least partly within the coverage area for the high-power point, so that mobile stations (130) within range of a low-power point are also within range of the high-power point (110). A low-power point (120) measures timing or frequency, or both, of one or more signals received at the low-power point (120) from the high-power point (110), and adjusts the timing or frequency, or both, of a transmission from the low-power point (120) to a mobile station (130), to align the transmission with signals received by the mobile station (130) from the high-power point (110). |
US08954103B2 |
Model based doppler compensation using traffic data
Implementations and techniques for model based Doppler compensation using traffic data are generally disclosed. |
US08954097B1 |
Methods and systems for implementing dynamic modulation schemes based on paging area
Disclosed herein are methods and systems for implementing dynamic modulation schemes based on paging area. In one embodiment, a radio access network (RAN) receives a request to page a user equipment (UE), and identifies the cell in which the UE was last registered. The RAN sends one or more paging requests in one or more cells, where the respective modulation coding scheme (MCS) that the RAN selects for each such paging request depends at least in part on the distance of the receiving cell from the cell in which the UE was last registered. |
US08954088B1 |
Location-based person and object monitoring
Location-based person and object monitoring are provided. The location of a person or object may be monitored by associating a device with the person or object that is operative to send location information for the monitored person or object to a receiving station for establishing precise geo-location data for the monitored person or object. The geo-location information for the monitored person or object may be passed to a television services system for generating and displaying on a viewable television channel mapping information showing the location of the monitored person or object. A television channel may be designated for each monitored person or object. If the monitored person or object moves out of a prescribed monitoring range, a television channel showing the mapping information may be automatically displayed to replace a presently viewed television channel for alerting a monitoring person as to the whereabouts of the monitored person or object. |
US08954087B2 |
Apparatus and method for providing communication services via television white spaces
Disclosed herein are an apparatus and method for providing communication services. The apparatus includes a location information acquisition unit, a radio station information acquisition unit, and an offloading unit. The location information acquisition unit acquires information about the current location of the user terminal by sending a location information request message to the user terminal. The radio station information acquisition unit requests information about a white space radio station from which the user terminal can receive the communication services by sending the information about the current location of the user terminal to a white space server, and acquires, from the white space server, information about an available white space radio station. The offloading unit sends the information about the available white space radio station to the user terminal, and also sends information about the user terminal to the available white space radio station. |
US08954086B2 |
Method of performing a measurement procedure in LTE-A (long-term evolution advanced) system
The invention disclosed herein relates to a wireless communication system and a user equipment (UE) providing wireless communication services, and more particularly, to a method of effectively performing the measurement of a plurality of frequencies while reducing the measurement load of the UE in the carrier aggregation technology for increasing data transmission speed using a plurality of frequencies in an Evolved Universal Mobile Telecommunications System (E-UMTS), a Long Term Evolution (LTE) system, and a LTE-Advanced (LTE-A) system that have evolved from a Universal Mobile Telecommunications System (UMTS). |
US08954083B1 |
System and method for preventing or allowing occurrence of a base station function
A method, system, and computer-readable medium for preventing or allowing a base station (BS) to perform a particular BS function are described. The BS and/or a base station controller (BSC) determine and compare a location of the BS to respective location(s) of one or more other BSs. The BS and/or BSC determine whether the BS location is at least a threshold distance respectively from each of one or more other BSs. If the BS location is at least a threshold distance respectively from each of one or more other BSs, the BS and/or BSC sets at least one parameter to prevent the BS from performing the particular BS function. If the BS location is less than the threshold distance respectively from at least one of the one or more other BSs, the BS and/or BSC sets at least one parameter to allow the BS to perform the particular BS function. |
US08954081B2 |
System and method for simultaneous routing of a special number call to a plurality of agencies
A system for simultaneously routing a special number call from a mobile unit to a plurality of agencies includes (a) at least one of an unlicensed mobile access network and a radio access network communicating with the mobile unit; (b) a mobile switch coupled with at least one of the networks; (c) a call receiver coupled with the mobile switch; at least one of the call receiver and the mobile switch being coupled for communication with respective of the agencies; and (d) a locator coupled with at least one of the mobile switch and the call receiver. After receiving the special number call, the call receiver cooperates with at least one of the locator and the mobile switch to effect routing of the special number call to one or more included agency. Determination which agency is an included agency is made at the call receiver. |
US08954079B2 |
Mobile communication system and base station identifier management method thereof
A mobile communication system and method for managing the base station identifiers is provided. The method includes transmitting macro base station information from a terminal to a first pico base station; transmitting a Neighbor Relation Table (NRT) including the macro base station information from the first pico base station to a Self Organizing Network (SON) server; determining, at the SON server, whether a second pico base station using same Physical Cell Identifier (PCI) as the first pico base station exists by comparing a previously stored NRT with the received NRT; and reallocating, at the SON server, upon determining that the second pico base station uses the same PCI as the first pico base station, new PCIs to the first and second pico base stations. |
US08954076B2 |
Cooperative communication between terminals in wireless communication system supporting multi-radio access technology
Disclosed is a method for executing communication in a wireless communication system supporting multi-radio access technology, through cooperation between a first terminal requesting terminal cooperation and a second terminal accepting terminal cooperation. The method comprises: a step for the first terminal to transmit to a base station resource allocation request information on the uplink transmission of the second terminal; a step for the second terminal to receive from the base station a first uplink grant (UL grant) as a response to the resource allocation request information; a step for the first terminal to transmit data to the second terminal; and a step for the second terminal to transmit to the base station the data received from the first terminal using the resource allocated by the first UL grant. |
US08954075B2 |
Communications system
A mobile communications system is described in which an E-UTRAN base station dynamically changes its handover and/or its cell reselection parameters to control the load on the base station and which transmits a message to a non E-UTRAN neighboring cell, so that it can adapt its handover and/or its cell reselection parameters to avoid repeated handover and/or cell reselection of a mobile communications device between the non E-UTRAN cell and the E-UTRAN cell. |
US08954072B2 |
Method and apparatus for cell update while in an enhanced Cell—FACH state
A method and apparatus for cell update while in a Cell_FACH state are disclosed. After selecting a target cell, system information is read from the target cell including high speed downlink shared channel (HS-DSCH) common system information. A radio network temporary identity (RNTI) received in a source cell is cleared and a variable HS_DSCH_RECEPTION is set to TRUE. An HS-DSCH medium access control (MAC-hs) entity is configured based on the HS-DSCH common system information. High speed downlink packet access (HSDPA) transmission is then received in the target cell. A CELL UPDATE message is sent to notify of a cell change. The HSDPA transmission may be received using a common H-RNTI broadcast in the system information, a reserved H-RNTI as requested in a CELL UPDATE message, or a temporary identity which is a subset of a U-RNTI. The MAC-hs entity may be reset. |
US08954067B2 |
Method and apparatus for emulating a plurality of subscriptions
Various methods are provided for facilitating a software smart card environment consisting of multiple virtual UICCs (vUICC) hosting a plurality of SIMS or U-SIMS. One example method may comprise receiving a network authentication request from a first network operator. The method may also comprise causing, using a processor, a UICC to activate a subscription for the first network operator and deactivate a subscription for a second network operator in an instance in which the subscription for the first network operator is not the active subscription. The method may further comprise determining a vUICC identification relating to the requested application. The method may further comprise causing authentication information to be transmitted to the first network operator based on the subscription for the first network operator. Similar and related example apparatuses and example computer program products are also provided. |
US08954063B2 |
Broadcast and multicast services in wireless communication systems
Methods and apparatus for assigning, identifying and controlling broadcast transmissions are disclosed. A broadcast flow is assigned to a broadcast logical channel of the physical resources of a wireless communication channel. A broadcast channel control message indicative of parameters of the broadcast logical channel is generated. Upon receipt, the broadcast channel control message is processed and used to accordingly process the received broadcast transmission. |
US08954059B1 |
Mobile devices having a common communication mode
A second communication mode can be enabled for a source device and a destination device. Each device can be a mobile device having a first communication mode and a default number for the first communication mode. The default numbers for the source device and the destination device can be stored. A call request can be received from the source device operating in the second communication mode. The call request can be directed to the default number of the destination device. The destination device can be determined as a client based on the default number of the destination device. A communication session can be established between the source device and the destination device over a network upon determining the destination device is an active client. |
US08954055B2 |
Initial acquisition and neighbor search algorithms for wireless networks
In a wireless network, a base station (BS) may send a primary synchronization signal (PSS) and a secondary synchronization signal (SSS). The synchronization signals may be used by user equipments (UEs) for cell detection and acquisition. A typical searching operation may involve first locating the PSS sequences transmitted by neighboring BSs, followed by SSS detection. Described further herein are algorithms that result in the detection of the PSS and the SSS from a BS. A method for detecting a BS generally includes sampling a received signal from receiver antennas to obtain a sampled sequence, analyzing the sampled sequence to detect a PSS in a current half-frame (HF), calculating signal-to-noise ratio (SNR) metrics based on the detected PSS, combining the calculated SNR metrics with SNR metrics from previous HFs, analyzing the combined SNR metrics to obtain timing information, and analyzing the sampled sequence using the timing information to detect a SSS. |
US08954054B2 |
Method for processing and testing of called terminal and long term evolution system
The disclosure discloses a method for processing/testing of a called terminal and a Long Time Evolution (LTE) system. The method comprises that: a network side of the LTE system sends a paging message to the terminal residing in an LTE cell which is called by a Circuit Switched (CS) domain service; the terminal establishes a Radio Resource Control (RRC) connection with the network side; the terminal sends to the network side a message for requesting to establish a CS domain service; the network side indicates, to the terminal, carrier frequency information of a Global System for Mobile Communications (GSM) cell to which the terminal needs to be redirected; the terminal sends a channel request message to the GSM cell; the terminal performs routing area updating in the GSM cell; the terminal sends a paging response message to the GSM cell; the terminal establishes the CS domain service in the GSM cell. By using the disclosure, when being called by the CS domain service, the terminal residing in the LTE cell can return to a cell of a corresponding network to establish the CS domain service. |
US08954051B2 |
Uniquely identifying target femtocell to facilitate femto-assisted active hand-in
Systems, methods, devices, and computer program products are described for supporting macrocell-to-femtocell hand-ins of active macro communications for mobile access terminals. An out-of-band (OOB) link is used to detect that an access terminal is in proximity of a femtocell (e.g., using an OOB radio integrated with the femtocell or in a common subnet with the femtocell). Having detected the access terminal in proximity to the femtocell, an OOB presence indication is communicated to a femto convergence system disposed in a core network in communication with the macro network to effectively pre-register the access terminal with the femto-convergence system. When the femto convergence system receives a handoff request from the macro network implicating the pre-registered access terminal, it is able to reliably determine the appropriate target femtocell to use for the hand-in according to the pre-registration, even where identification of the appropriate target femtocell would otherwise be unreliable. |
US08954049B2 |
Method of operating a module for wireless communication or the like wireless communication terminal, module for wireless communication and device of an integrated circuit card and a system of a communication equipment for operating the module
The invention relates to a method of operating a module 100 or the like wireless communication terminal for wireless communication, wherein in operation the module 100 is in signaling relation to a device 3 of an integrated circuit card, wherein the operation is adapted for signaling between the module 100 and the integrated circuit card device 3 (ICC-device) via an interface system 10, the interface system 10 comprising at least one command interface instance 10.0, 10.1, 10.2, 10.3 adapted for direct command signaling between the module 100 and at least one application 1, 2, and a card application toolkit 80 (CAT) for direct command signaling between the module 100 and the integrated circuit card device 3 (ICC-device). |
US08954048B2 |
System and methods for multi-tasking in a clientless mobile phone
A method for supporting execution of a plurality of applications over a clientless mobile phone is disclosed. The method comprises displaying over a display of the mobile phone a menu of at least one application of a plurality of applications executed by a clientless mobile interaction (CMI) server, wherein the CMI server communicates the menu of the plurality of applications to the mobile phone using a USSD protocol; receiving an input responsive of a selection of one application of the at least one application displayed in the menu; communicating the selected application to the CMI server using the USSD protocol; receiving contents of the selected application from the CMI server using the USSD protocol; and displaying the received contents over the display of the mobile phone. |
US08954046B2 |
Private labeled mobile applications
Currently technology encourages use of mobile applications, which executes programs on mobile devices that formerly only operated on personal computers. These mobile applications, “mobile apps” typically run on smart phone style devices such as iPhone, Android based and Blackberry based phones. Many mobile applications are service oriented and are sold or provided to the end user by the Dealer of these products and services. These applications are typically branded in the name of the manufacturer or provider of these products or services, using the manufacturer's graphic theme and logos. In many cases, the Dealer of the products or services would prefer that the mobile application they provide to their customer base be branded with their company's name, color themes and logos. Unfortunately, it is very expensive and cumbersome to generate custom mobile applications that are branded in the image and name of the Dealer. |
US08954045B2 |
Method and apparatus for managing resources at a wireless device
Techniques for managing resources at a wireless device are described. In one aspect, the wireless device controls applications based on resource demands and available resources. Processing demands by the applications may be monitored, and at least one of the applications may be controlled based on the processing demands and a maximum processing capacity of a processing unit executing the applications. A data application may be controlled by reducing the amount of data exchanged by the application when high processing demands are detected, and vice versa. In another aspect, the wireless device varies resource capacity to match resources demands. The processing capacity of the processing unit may be adjusted based on the processing demands. Higher clock frequency may be selected for the processing unit when the processing demands exceed a high threshold, and lower clock frequency may be selected when processing demands fall below a low threshold. |
US08954044B1 |
Off-device service platform discovery
Many mobile devices can access websites on the Internet. A mobile device running a web server application can host websites and provide services. For a first mobile device to access services on a second mobile device, the first mobile device needs the IP address of the second mobile device. The first mobile device sends a connection request to the second mobile device. The first mobile device receives, from the second mobile device, the network address of the second mobile device, identification of services that are available on the second mobile device, and a security token. The first mobile device selects a service and sends an HTTP or HTTPS request for the service to the network address of the second mobile device, and also sends the security token. The second mobile device authenticates the request based on the token and allows the first mobile device to access the selected service. |
US08954037B2 |
System and method of signaling the importance of a transmission in a wireless communications network
A method of communicating an importance level of a call to a recipient mobile device is disclosed. The method includes receiving call information for a particular call at a mobile switching center and generating an initial address message for the particular call. The initial address message may include a notification value field. The method further includes determining whether an importance level has been designated for the particular call, setting a value of the notification value field based on whether an importance level has been designated for the particular call, and transmitting the initial address message for the particular call to a recipient mobile device. |
US08954035B2 |
Wi-Fi authentication by proxy
In one example, a method may include a telecommunication service provider detecting that a cellular device is located within a transmission-receiving distance of an Internet router, determining that the cellular device is associated with a client device, transmitting stored authentication credentials for the client device to the Internet router, and the router registering the client device. |
US08954034B2 |
Hash key generation apparatus and method for multiple cards communication system
A mobile station is provided. The mobile station has a plurality of removable user identification modules, key generation logic, and hash logic. The plurality of removable user identification modules are each configured to store unique corresponding information associated with a corresponding plurality of cellular subscriptions. The key generation logic is configured generate a hash key. The hash logic is coupled to the key generation logic, and is configured to employ the hash key to determine parameters and attributes for continuing communication with a base station, where each of the parameters and attributes are determined to maximize use of common hardware and software within the mobile station to concurrently provide for communications in support of the corresponding plurality of cellular subscriptions. |
US08954032B1 |
Creating accurate billing records in a carrier-aggregation network
A method, system and medium are provided for accounting for shared-network scenarios in a carrier-aggregation network using billing identifiers. A base station within the network establishes a wireless-telecommunications link with a mobile station associated with a first provider within the network. The base station communicates a billing identifier associated with the base station to the first provider. The billing identifier indicates a type of shared-network scenario associated with the base station. The billing identifier is used by the provider to determine billing information for the mobile station. |
US08954025B2 |
Tactical radio transceiver with intermediate frequency (IF) filter package for narrowband and wideband signal waveforms
A communications radio has an IF stage with an associated filter array. The array includes at least one narrowband filter whose passband is less than 3 MHz, at least one wideband filter whose passband is 3 MHz or greater, a first switch with a common pole connected to an input terminal of the array, a second switch with a common pole connected to an output terminal of the array, a third switch whose common pole is operatively connected to the input terminal, and a fourth switch whose common pole is operatively connected to the output terminal. The first and the second switches cooperate to insert a selected filter between the first and second terminals. The third and the fourth switches cooperate to insert the filter array into either a receive signal path when the radio is in a receive mode, or a transmit signal path when in a transmit mode. |
US08954021B2 |
Group III-N transistors on nanoscale template structures
A III-N semiconductor channel is formed on a III-N transition layer formed on a (111) or (110) surface of a silicon template structure, such as a fin sidewall. In embodiments, the silicon fin has a width comparable to the III-N epitaxial film thicknesses for a more compliant seeding layer, permitting lower defect density and/or reduced epitaxial film thickness. In embodiments, a transition layer is GaN and the semiconductor channel comprises Indium (In) to increase a conduction band offset from the silicon fin. In other embodiments, the fin is sacrificial and either removed or oxidized, or otherwise converted into a dielectric structure during transistor fabrication. In certain embodiments employing a sacrificial fin, the III-N transition layer and semiconductor channel is substantially pure GaN, permitting a breakdown voltage higher than would be sustainable in the presence of the silicon fin. |
US08954019B2 |
Mobile wireless communications device with LNA front end circuit and related methods
A mobile wireless communications device may include an antenna, LTE RF differential inputs, and a front end circuit. The front end circuit may include band pass filters coupled to the antenna, LNAs coupled respectively to the band pass filters, and RF switching circuits. Each RF switching circuit may be respectively coupled between each LNA and a pair of LTE RF differential inputs and configured to switch to one or both of the pair of LTE RF differential inputs. |
US08954018B2 |
Tunable wideband distribution circuit
A tunable wideband distribution circuit for transmitting a wireless signal over a transmission line is disclosed. The tunable wideband distribution circuit may include a programmable gain buffer, wherein the gain of the programmable gain buffer is based at least in part on a frequency of the wireless signal. The tunable wideband distribution circuit may also include a tuning element configured to modify an effective impedance of the transmission line based at least on the frequency of the wireless signal, wherein the tuning element is electrically coupled to the transmission line. |
US08954013B2 |
Driving strength control apparatus, driving strength control method and terminal equipment
The embodiments of the present invention provide a driving strength control apparatus and method and terminal equipment. The control apparatus comprises: a signal receiving unit to receive a test signal transmitted by a peripheral device; a signal sampling unit to sample the test signal received by the signal receiving unit to obtain a plurality of rising edges and falling edges of the test signal; an interval measuring unit to measure the time interval between a rising edge and a falling edge, or between a rising edge and another rising edge, or between a falling edge and another falling edge; and a controlling unit to adjust the driving strength imposed on the peripheral device according to the time interval. With the embodiments of the present invention, the driving strengths imposed on the peripheral device may be made identical, preventing signal deviation and improving the quality of compatibility. |
US08954010B2 |
Spectrum management system for municipal spectrum using guided cognitive radio
Described is a system and method for assigning a frequency to an access point in a wireless network comprising a plurality of access points. The system and method includes accessing a rule-base to obtain a set of rules for the wireless network, accessing a license database to obtain information about relevant wireless nodes in a region, creating a list of possible primary node frequencies from a list of frequencies associated with primary wireless nodes in the license database, creating a list of possible secondary node frequencies from a list of frequencies associated with secondary wireless nodes in the license database, identifying a list of clear frequencies from a set of unused frequencies, selecting a frequency from frequencies in the lists of possible primary node frequencies, possible secondary node frequencies, and clear frequencies and registering the frequency in the license database. |
US08954006B2 |
Computer to vehicle wireless link
A wireless data link system between a vehicle having a vehicle controller and a computing device having a computing processor is provided. The wireless data link system includes a vehicle data link (“VDL”) device and a computing data link (“CDL”). The VDL device has a VDL controller, a VDL memory, and a VDL interface circuitry. The VDL interface circuitry provides a connection to the vehicle controller for exchanging data. The VDL memory stores a passcode that provides a secure connection and a VDL recognizable code that is associated with the VDL device. The CDL device has a CDL controller, a CDL memory, and CDL interface circuitry. The CDL interface circuitry provides a connection to the computing processor for exchanging data. |
US08953997B2 |
Print system and method for monitoring print jobs
A print system including a print engine for printing a receiving material, a plurality of holders, each for holding one type of receiving material and delivering said material for printing to the print engine, a receiver for receiving jobs, a job being an order containing printing information on one or more types of receiving material specified in said order, and a control system for planning jobs, wherein the jobs are placed in a print queue in a sequence of finishing, and the control system is adapted to establish: a) the types of receiving material specified for a set of different jobs in the print queue, b) a shortage of a type of receiving material if there is insufficient receiving material present in the plurality of holders in order to finish a job of the said set, c) an indication of the time when said type of receiving material is no longer present in the plurality of holders, and wherein the print system further comprises a unit for displaying an image adapted to show an operator of the print system the items established under b) and c) by the control system. |
US08953996B2 |
Fixing apparatus for fixing toner onto a sheet
A fixing apparatus according to an embodiment includes: a first roller; a second roller that forms a nip between the second roller and the first roller and presses a sheet passing through the nip against the first roller; a heater that heats at least one of the first roller and the second roller, a heating range of the heater being greater than a maximum printing width of a predetermined maximum sheet width, and a heat-uniformizing member that distributes heat of the heater along a longitudinal direction thereof, an effective length of the heat-uniformizing member in the longitudinal direction being the same as, or greater than, the predetermined maximum sheet width. |
US08953992B2 |
Fixing device and image forming apparatus
A fixing device includes a fixing unit, a cleaning unit, and a controller. The fixing unit includes a pair of nipping members and a heat source that heats at least one of the pair of nipping members. The cleaning unit includes a cleaning web wound on a supply core to be supplied from the supply core and taken up on a take-up core, and a pressing roller that is pressed against one of the pair of nipping members. The controller causes the take-up core to rotate in such a manner that, when a leading portion of the cleaning web extending up to 2% of an overall length of the cleaning web from a leading end of the cleaning web is fed, a length of the cleaning web to be fed in one feeding is 10-30% larger than when a subsequent portion of the cleaning web is fed. |
US08953991B2 |
Fixing device and image forming apparatus
A fixing device includes a fixing member configured to heat and fix a toner image onto a recording medium; a pressurizing member configured to press a heating member, which is used for heating the fixing member, against the fixing member and form a fixing nip part; and a guide member configured to guide the recording medium away from the fixing member and the pressurizing member at a downstream side of the fixing member or the pressurizing member in a conveying direction of the recording medium. The guide member includes a pushing unit for maintaining a relative positional relationship between the guide member and an outer peripheral surface of the fixing member or the pressurizing member, and the pushing unit is provided in a manner as to follow surface characteristics of outer peripheral parts of the fixing member or the pressurizing member where the pushing unit pushes. |
US08953983B2 |
Image forming apparatus and transport device
Disclosed is an image forming apparatus including an image forming apparatus member, a toner image forming unit including a housing that accommodates at least one of a toner image retainer to retain a toner image and a toner retainer to supply a toner to the toner image retainer, and a recording medium transport unit including a transport belt, having an endless shape, that is openably and closably mounted to the image forming apparatus member and transports a recording medium with being wound between a pair of support rollers provided along a transport direction of the recording medium, and a regulation member that faces the transport belt to regulate a posture of the recording medium, wherein when the recording medium transport unit is closed with respect to the image forming apparatus member, the regulation member is positioned to come into contact with the housing. |
US08953982B2 |
Displacement mechanism for secondary transfer unit of an image forming apparatus
A displacement mechanism for a secondary transfer unit (40) includes a first eccentric cam (71), a second eccentric cam (72) and a shaft member (73). The first eccentric cam (71) and the second eccentric cam (72) are in contact with either edge portion of the secondary transfer unit (40) in width direction of a primary transfer belt (31), and rotate in phase with each other. The shaft member (73) supports the first eccentric cam (71) and the second eccentric cam (72). The first eccentric cam (71) is configured in such a manner that any radius in a peripheral portion (711) is of magnitude not less than a radius at a segment of the second eccentric cam (72) that is in phase with a segment of the peripheral portion (711). The second eccentric cam (72) is configured in such a manner that any radius in at least a segment of a peripheral portion (721) not including a press generating section (722) nor a separation generating section (723) is smaller than a radius at a segment of the first eccentric cam (71) that is in phase with the segment of the peripheral portion (721). |
US08953979B2 |
Image forming apparatus having supporting member configured to hold developing sections
An apparatus main body has an opening at a front side. A developing-section supporting member configured to hold developing sections and to be pulled in a pulling direction through the opening from an internal position inside the apparatus main body to an external position outside the apparatus main body at which the developing sections is configured to be mounted and dismounted. Exposing members emit light in an optical axis direction for forming a latent image on respective photosensitive members. The exposing members are provided at the developing-section supporting member. A displacement mechanism is configured to support the developing-section supporting member and to displace the developing-section supporting member between: an adjacent position at which the developing-section supporting member is adjacent to the photosensitive members; and a separated position at which the developing-section supporting member is separated from the photosensitive members. |
US08953978B2 |
Image forming apparatus
An image forming apparatus includes: a rotary member which rotates with respect to an apparatus main body between a first position and a second position; and a buffering member connected to the apparatus main body and the rotary member for buffering an impact attributable to the rotation of the rotary member. The buffering member includes: a hollow member; a movable member moveable between an evacuation position and an advance position; and a slide member provided to the movable member and contactable with an inner circumferential surface of the hollow member. The slide member is deformable such that a first pressure on the hollow member when the rotary member rotates from the first position to the second position is larger than a second pressure on the hollow member when the rotary member rotates from the second position to the first position. |
US08953976B2 |
Developing device, image forming apparatus, and process cartridge
A developing device including a developer bearing member rotatable while bearing developer on a surface thereof, a rotary body having a rotary shaft, a casing that contains the developer supplied to the surface of the developer bearing member to accommodate at least a portion of the rotary body, a rotary gear having a rotary shaft parallel to the rotary shaft of the rotary body and disposed outside a lateral wall of the casing to support an end of the rotary shaft of the rotary body, and a stationary shaft member fixed to the lateral wall of the casing to rotatably support the rotary gear. An axial center of the stationary shaft member is collinear with an axial center of the rotary shaft of the rotary body. |
US08953972B2 |
Transfer roller cleaning apparatus and electronic photograph printer
Provided are a transfer roller cleaning apparatus that has a supply roller that is immersed in the carrier liquid in a carrier liquid vessel; a cleaning roller that is rubbed and rotated on the supply roller and the transfer roller, and supplies the carrier liquid received from the supply roller to a surface of the transfer roller; and a carrier liquid circulation device which includes the carrier liquid vessel, supplies the carrier liquid in a storage tank to the carrier liquid vessel using a pump, and sends the carrier liquid overflowed from the carrier liquid vessel back to the storage tank via an overflow liquid recovery path, so as to constitute a carrier liquid circulation path and an electronic photograph printer configured by providing the same. |
US08953969B2 |
Image forming apparatus having suction duct for sucking developer not used in development
An image forming apparatus includes an image carrier, a developing unit, and a developer sucking section. A relationship 0≦X≦R+kRW (where k=10 to 12) is established, when X (m) is a distance from a center of a transport pole to a position where a straight line crosses a rotating section, R (m) is a chain standing length of developer on the transport pole, W (m/s) is a peripheral velocity of the developing unit, and k is a coefficient. The transport pole is adjacent to a development pole and is situated downstream of the development pole in a direction of rotation of the rotating section. The straight line is situated at a downstream side in the direction of rotation of the rotating section and connects a center of rotation of the developing unit and an end of the developer sucking section. |
US08953968B2 |
Air-bearing photoreceptor backer bar for eliminating transfer streaks
An apparatus for eliminating transfer streaks in a printing system is provided and comprises a hollow transfer backer bar including sealed ends. The transfer backer bar further includes a plurality of holes with the holes spaced along the photoreceptor supporting surface of the transfer backer bar. Air pressure can be applied within a hollow transfer backer bar thereby creating an air flow outward through the holes. The air flow contacts the underside of a photoreceptor and floats the photoreceptor on a thin cushion of air flow during transfer of an image to paper. |
US08953963B2 |
Developing device, image forming apparatus, and method for controlling developing device
A developing device includes a developing roller, a magnetic roller, a capacitor, a transformer, and a switching portion. The magnetic roller supplies toner to the developing roller or takes off the toner from the same. The capacitor is connected to a primary of the transformer, and the developing roller is connected to a secondary of the same. During a period while the voltage between electrodes of the capacitor is changing, the switching portion changes the duty ratio in a predetermined second time slot in which current flowing in the switching portion is smaller than that flowing in a first time slot. |
US08953959B2 |
Printing apparatus
A printing apparatus includes: a printing device configured to print an image on a sheet; a temperature detector configured to detect a temperature in the printing apparatus; and a controller. The controller executes: a first processing in which the controller changes a first indicator based on printing performed by the printing device; a second processing in which the controller changes the first indicator based on a first temperature detected by the temperature detector at a first point in time and a second temperature detected by the temperature detector at a second point in time; and a third processing in which the controller suppresses a rise in the temperature in the printing apparatus when the first indicator reaches a predetermined value. |
US08953954B2 |
Monitoring device system, image forming apparatus, and monitoring device method
A monitoring device system that includes a user apparatus, including a monitoring device application, and an image forming apparatus. The user apparatus includes an application information sending unit configured to send application information corresponding to the monitoring device application to the image forming apparatus, and a notice information control unit configured to acquire information about the image forming apparatus. The image forming apparatus includes a display unit configured to display an application information item corresponding to the received application information from the user apparatus, and a communication control unit configured to send the information about the image forming apparatus to the user apparatus in response to a user selecting the displayed application information item at the image forming apparatus. |
US08953953B2 |
Coherent optical receiver, apparatus and method for detecting inter-channel skew in coherent optical receiver
In a coherent optical receiver, sufficient demodulation becomes impossible and consequently receiving performance deteriorates if an inter-channel skew arises, therefore, a method for detecting inter-channel skew in a coherent optical receiver according to an exemplary aspect of the invention includes the steps of: outputting a plurality of optical signals separated into a plurality of signal components by making a test light from a test light source interfere with a local light from a local light source; detecting the optical signals and outputting detected electrical signals; quantizing the detected electrical signals and outputting quantized signals; performing a fast Fourier transform process on the quantized signals; and calculating a difference in propagation delay between the plurality of signal components on the basis of a plurality of peak values in the results of performing the fast Fourier transform process. |
US08953951B1 |
Fast chromatic dispersion estimation
This disclosure describes the Fast Chromatic Dispersion Estimation (FCDE) techniques which corrects for chromatic dispersion in high data rate optical communications systems such as some coherent optical communications systems. FCDE may utilize transform such as fast-Fourier transforms to estimate the chromatic dispersion. From an estimation of the chromatic dispersion, the techniques may determine filter tap coefficients for compensating the chromatic dispersion. |
US08953950B2 |
Ultra-high-speed photonic-enabled ADC based on multi-phase interferometry
A ultra high speed photonic Analog to Digital Converted (ADC) for sampling and quantizing an electrical voltage signal, internally enabled by photonics uses coherent optical detection architectures for photonic quantization. Coherent light is phase modulated by the test signal. Using an interferometer, or an array of interferometers the phase of modulated light is compared with a reference light. Flash ADC, successive approximation ADC and delta-sigma ADC configurations are presented. |
US08953948B2 |
Optical transport network synchronization and timestamping systems and methods
The present disclosure provides to Optical Transport Network (OTN_ synchronization systems and methods that maintain proper sequential ordering of events at nodes which may be utilized in performing root cause analysis or diagnosing network performance. In an exemplary embodiment, the systems and methods utilize functionality incorporated into OTN providing a cost effective and standards-based approach to nodal synchronization. Once synchronized, network events are logged with an appropriate timestamp enabling a determination of a sequential order of network events can be determined. Further, the node timestamps may be synchronized, with microsecond or even sub-microsecond of precession which is critical in diagnosing network failures or slow traffic recovery. |
US08953947B2 |
Bandwidth efficient dual carrier
In some examples, a transmit assembly is described that may include a first optical transmitter, a second optical transmitter, and a polarizing beam combiner. The first optical transmitter may be configured to emit a first optical data signal centered at a first frequency. The second optical transmitter may be configured to emit a second optical data signal centered at a second frequency offset from the first frequency by a nominal offset n. The polarizing beam combiner may be configured to generate a dual carrier optical data signal by polarization interleaving the first optical data signal with the second optical data signal. An output of the polarizing beam combiner may be configured to be communicatively coupled via an optical transmission medium to a polarization-insensitive receive assembly. |
US08953946B2 |
High-bandwidth optical communications relay payload
A free space optical communication system (100) and method including: several optical beam expanders (414) for receiving incoming optical signals from ground sites and neighboring satellites; several optical preamplifiers (412) for preamplifying the received optical signals; one or more optical main amplifiers (404) for amplifying the preamplified optical signals; and an optical switch (408) for directing respective amplified optical signals to respective destinations via a respective optical beam expander. The respective amplified optical signals are inputted to a respective optical beam expander (414) for transmission to said respective destinations, as outgoing optical signals. |
US08953945B2 |
Radio frequency transmitter with on-chip photodiode array
A radio transmitter integrated circuit includes a photodiode array circuit, a digital conversion module, and a transmit baseband processing module. The photodiode array circuit converts received light into electrical image signals. The digital conversion module converts the electrical image signals into digital image signals. The transmit baseband processing module converts the digital image signals into digital transmit baseband or low IF signals. |
US08953944B2 |
Systems and methods for establishing an underwater optical communication network
The systems and methods described herein provide a reconfigurable, long-range, optical modem-based underwater communication network. In particular, the network provides a low power, low cost, and easy to deploy underwater optical communication system capable of being operated at long distances. Optical modem-based communication offer high data rate, omni-directional spatial communication in the visual spectrum. The omni-directional aspect of communication is advantageous because precise alignment of communication units may not be required. The optical modems may be deployed via unmanned underwater vehicles (UUVs) and physically connected by tethers. |
US08953941B2 |
Method and apparatus for identifying a port in a passive optical network
Typical passive optical networks (PONs) employ several optical network terminals (ONTs) connected to an optical line terminal (OLT) via an optical splitter/combiner (OSC). Due to the passive nature of the OSC, determining a port assignment of an ONT may be difficult or impossible. Methods described herein provide for identifying a port in a passive optical network, optionally as corresponding to an ONT. A first subset of the ONTs is caused to transmit a first signal, such as a status signal, with a respective attribute having a first value, and a second subset of the ONTs is caused to transmit a second signal with the respective attribute having a second value. At the OSC, the signals are detected as a function of the attribute and the first and second values. Results of this detection are reported, from which an identification of a port and associated ONT can be determined. |
US08953939B2 |
Variable bit-rate QPSK transmitter and method employing polarization manipulation
Disclosed are universal QPSK transmitter structures and methods for generating different QPSK signals exhibiting different polarization schemes, namely PolMux, PolMod and PolSw. The bit rate of the generated signals is variable, thereby allowing the transmitter to adjust to varying network traffic conditions. Advantageously, the generated signals may be detected by analog receivers (PolSw-QPSK) and coherent receivers (PolMux-QPSK, PolMod-QPSK, and PolSw-QPSK). |
US08953937B2 |
Arrangement for generating a signal having an adjustable time position or phase position
The invention relates to a system for producing a signal having a variably adjustable time position or phase position, comprising at least one light source for producing a first light component (2) having a first wavelength and a second light component (2′) having a second wavelength deviating from the first wavelength and a phase modulator (5) for varying a phase of the first light component (2), wherein the system is designed to produce a beat note signal by superposing the two light components (2, 2′) and has a common optical fiber (4) for coupling in both light components (2, 2′), wherein furthermore the phase modulator (5) is arranged at an end or in the course of said optical fiber (4) and is transparent to both light components (2, 2′) and is designed to vary the phase of the first light component (2) selectively independently of a phase of the second light component (2′) or more intensely than the phase of the second light component (2′). The invention further relates to a use of such a system. |
US08953936B2 |
Method for protection of multi-wavelength passive optical network
An Optical Line Termination (OLT) system in a multi-wavelength Passive Optical Network (PON) includes a protection port for protecting a set of OLT ports without the use of a physical switch. The protection port has a tunable transceiver. The OLT system detects a failure of one of the OLT ports, which was originally adapted to transmit downstream traffic to a subset of ONUs on a downstream wavelength and to receive upstream traffic from the subset of ONUs on an upstream wavelength. In response to the detection, the OLT system tunes the protection port to the downstream wavelength for transmission and to the upstream wavelength for reception, and resumes communication between the OLT system and the subset of ONUs through the protection port instead of the OLT port. |
US08953933B2 |
Aerial photogrammetry and aerial photogrammetric system
Aerial photogrammetry is provided by using two or more flying vehicles, each equipped with a GPS device and an image pickup unit. This method comprises setting up two or more photographing points and setting up a photographing point area, respectively, with each of the photographing points as the center, measuring a position of the flying vehicle by the GPS device, a step where each of the flying vehicle reaches each corresponding photographing point area and maintains the position of the photographing point area, acquiring a time when the flying vehicle finally reaches the photographing point area, setting up a shutter timing time after a predetermined time from the moment when the flying vehicle has finally reached the photographing point area, and taking aerial photographs by the two or more flying vehicles at the shutter timing time. |
US08953929B2 |
Remote video recording camera control through wireless handset
A video recording camera system provide remote control functionality through a wireless handset interface. In embodiments, a video recording camera includes an optical sensor, a processor coupled to the optical sensor to process an input image signal received from the optical sensor into an encoded video data stream, a non-volatile storage medium coupled to the processor to store, locally in the video recording camera, encoded video data stream as recorded video data, and a wireless transceiver. In embodiments, a cellular-enabled wireless communication handset communicatively couples to the video recording camera over a wireless personal area network (WPAN) supported by the camera's wireless transceiver. The handset serves as a gateway to the camera providing access to recorded video data or functions of the camera, via the WPAN, as determined based on communications conducted by the handset over a cellular communication link. |
US08953926B1 |
Spline optic and lighting device
Optical and thermal splines are integrated in the external envelope of a non-planar lamp allowing the optical output of discrete light sources such as LEDs to be distributed for uniform output and the achievement of desired light distributions such as omnidirectional output. Integrated thermal splines and perimeter location of light sources allow for improved thermal management without significantly compromised optical performance. |
US08953922B1 |
Fiber ribbon strain relief clamp
An apparatus for clamping and relieving strain in a set of optical fiber ribbon. The strain relief clamp includes a first attachment portion and second attachment portion configured to secure the strain relief clamp to a system component and a set of optical fiber ribbons to the strain relief clamp. When secured the strain relief clamp is configured to relieve strain in the set of optical fiber ribbons. |
US08953921B2 |
Adapter panel with lateral sliding adapter arrays
An adapter panel arrangement including a chassis and a panel of adapters. The adapters defining open rearward cable connections and open forward cable connections of the panel arrangement. The adapters being arranged in arrays that slide independently of other adapter arrays to provide access to the open rearward and open forward cable connections. |
US08953915B2 |
Electric cable with strain sensor and monitoring system and method for detecting strain in at least one electric cable
An electric cable includes a strain sensor longitudinally extending along the cable and including a strain optical fiber arranged within a bending neutral region surrounding and including a bending neutral longitudinal axis of the electric cable, and at least two longitudinal structural elements, at least one of the at least two longitudinal structural elements being a core including an electrical conductor, wherein the strain sensor is embedded in a strain-transferring filler mechanically coupling at least one of the at least two longitudinal structural elements with the strain sensor. With the disclosed cable construction, the strain experienced by the at least one of the at least two longitudinal structural elements is transferred to the strain sensor at least in a strained condition. In the preferred embodiments, the electric cable is a heavy-duty cable. |
US08953914B2 |
Light diffusing fibers with integrated mode shaping lenses
A method including the steps of providing a light-diffusing optical fiber (12a) having a glass core (20), a cladding (40) surrounding the core (20), and a plurality of nano-sized structures in the form of voids (32) situated within said core (20) or at a core-cladding boundary; cleaving the light-diffusing fiber (12a), thereby forming a cleaved end face (66); and applying energy to one or more of 1) the cleaved end face (66) and 2) the light-diffusing fiber (12b) along a portion of the length thereof adjacent the cleaved end face (66), the amount of energy being sufficient to collapse and seal the voids (32) exposed at the cleaved end face (66), leaving a sealed cleaved end face (68). A lens may then be attached to the sealed cleaved end face (68), or the sealed cleaved end face (68) may be softened sufficiently to induce formation of a lensing surface such as a convex lensing surface (60) on the sealed end face (68). |
US08953913B2 |
Integrated optical circuit with an off-center groove
An integrated optical circuit includes a substrate having an input face, an output face, a lower face and an upper face, an optical waveguide extending between a first end located on the input face of the substrate and a second waveguide end located on the output face of the substrate. The integrated optical circuit further includes at least one off-center groove, the off-center groove extending from the lower face to the inside of the substrate, the at least one off-center groove being located at a non-zero distance d from the median plane, the off-center groove replacing a central groove and the at least one off-center groove being capable of attenuating the non-guided optical beam transmitted by the substrate between the first end and the second end. |
US08953912B2 |
Small diameter radiation sensor cable
A simple method of making robust radiation sensor cables using a special fiber cap that holds a scintillating fiber therein directly abutting an end of a fiber optic cable, thus providing a clean and protected connection therebetween. |
US08953911B1 |
Spectroscopic imaging probes, devices, and methods
In part, the invention relates to a single clad fiber to multi-clad optical fiber connector for use in applying excitation light to a sample and obtaining reflected light from the sample. The connector can include a dual clad optical fiber portion and a single clad optical fiber portion in optical communication with the dual clad optical fiber portion. In one embodiment, a core of the dual clad optical fiber portion and a core of the single clad optical fiber portion have substantially similar indices of refraction. In one embodiment, excitation light is propagated by the core of the dual clad optical fiber. Further, in one embodiment, light reflected by the sample is propagated by the first cladding layer of the dual clad optical fiber portion. |
US08953910B2 |
Proof reading of text data generated through optical character recognition
A method includes preparing respective proof reading tools for performing carpet proof reading and side-by-side proof reading of text data, recording a log of time to perform proof reading operations by using the first and second proof reading tools. The method further includes estimating, based on times stored in a log, times to perform proof reading of a character using 1) the first proof reading tool followed by using the second proof reading tool, and 2) the second proof reading tool. The method further includes determining for each character value, based on the estimated times, to use the first proof reading tool along with using the second proof reading tool or to use the second proof reading tool without using the first proof reading tool. |
US08953908B2 |
Metadata management and generation using perceptual features
The present disclosure relates to signal processing. One claim recites a method comprising: receiving an imagery or audio file; utilizing a configured multi-purpose electronic processor, identifying perceptual features in the imagery or audio file; and based on the perceptual features or data representing the perceptual features automatically creating metadata for the imagery or audio file. The act of automatically creating metadata utilizes at least some data obtained from a process in a portable computing device, the process comprises communication with a device that is separate from an apparatus that is performing the method. Of course, other claims and are provided too. |
US08953907B2 |
Modified bicubic interpolation
Systems, methods, and other embodiments associated with image scaling are described. According to one embodiment, a method acquiring a set of amplitude values describing pixels in an image. Image scaling is performed on the image. A target pixel is identified from the set of pixels. A preceding pixel is identified to the target pixel. An amplitude range of amplitudes is defined between the amplitude of the preceding pixel and the target pixel. It is determined whether the interpolation between the preceding pixel and target pixel will result in an interpolated pixel having an interpolated amplitude outside of the amplitude range. Based on this determination, an interpolation slope is selected that reduces overshoot or undershoot in interpolation pixels generated between the target pixel and the preceding pixel. |
US08953906B2 |
Illumination spectrum recovery
The disclosure concerns processing of electronic images, such as hyperspectral, multispectral or trichromatic images. In particular, but is not limited to, a method, software and computer for estimating parameters of a reflectance model applied to an image is disclosed. Examples of processing of the images using the estimated parameters includes material recognition, re-coloring and re-shading of objects represented in the image. That is, a computer implemented method is provided of estimating one or more of photogrammetric parameters, Ω(u) surface shape N and index of refraction n(u,λ) represented in a reflectance image having one or more known illumination directions L and a known viewing direction V, the method comprising optimizing (802) the difference between the reflectance image and a reflectance model, the reflectance model being based on surface shape N; the material index of refraction n(u,λ) and a set of photogrammetric parameters Ω(u). |
US08953905B2 |
Rapid workflow system and method for image sequence depth enhancement
Movies to be colorized/depth enhanced (2D→3D) are broken into backgrounds/sets or motion/onscreen-action. Background and motion elements are combined into composite frame which becomes a visual reference database that includes data for all frame offsets used later for the computer controlled application of masks within a sequence of frames. Masks are applied to subsequent frames of motion objects based on various differentiating image processing methods, including automated mask fitting/reshaping. Colors/depths are automatically applied with masks throughout a scene from the composite background and to motion objects. Areas never exposed by motion or foreground objects may be partially or fully realistically drawn/rendered/applied to the occluded areas and applied throughout the images to generate artifact-free secondary viewpoints during 2D→3D conversion. Iterative workflow is eliminated for simple artifact correction through real-time manipulation of images to avoid re-rendering of images and associated delays of sending work product to other workgroups for correction. |
US08953904B2 |
Image processing apparatus and method of operating image processing apparatus
An image processing apparatus includes a relative coordinate acquiring portion for acquiring a corresponding position over the input image to a predetermined pixel in a rectangular region obtained by dividing the output image, a reference region specifying portion for specifying a reference region including a corresponding region over the input image of the rectangular region for a plurality of rectangular regions arranged continuously over the output image respectively, a reading region determining portion for merging each reference region related to each of the rectangular regions, thereby obtaining a merging region, reading control means for reading a pixel value of each pixel included in the merging region in the input image, and correction processing means for executing the distortion correction processing by using a pixel value of a pixel which is read through the reading control means, thereby acquiring a pixel value of the output image. |
US08953903B2 |
Method of multi-frame image noise reduction
A method of multi-frame image noise reduction suitable for an image-capturing device includes following steps: obtaining a current frame and multiple reference frames; defining a mask and a target point in the mask; judging whether the target point pixel of the current frame is on an edge according to an edge map of the frame; when the pixel is on the edge, using the pixels in the reference frames on the edge to calculate a replacement result; when the target point pixel is not on the edge, using the pixels in the reference frames surrounding the target point to calculate a replacement result; after that, generating a pixel corresponding to the position of the target point in an output image according to the replacement result; further, moving the mask and going back to judge whether the pixel of the target point of the current frame is on the edge. |
US08953899B2 |
Method and system for rendering an image from a light-field camera
A method for rendering an image from a light-field camera, which generates a raw light-field image, includes: generating feature data, which includes feature elements associated with position information and obtained based on the raw light-field image and a preset threshold condition; generating a raw focused image from the raw light-field image; obtaining a virtual focus position that is designated on the raw focused image; and refocusing the raw focused image according to the virtual focus position by updating pixel values of pixels of the raw focused image that correspond respectively in position to the feature elements of the feature data, so as to generate a refocused image. |
US08953897B2 |
Coding artifacts removing method, coding method, decoding method, coding artifacts removing apparatus, coding apparatus, and decoding apparatus
A method of removing coding artifacts in first and second processed edges that are processed edges in an image signal and in different directions includes: determining, based on at least pixel values of first adjacent pixels adjacent to the first processed edge, a first target pixel from which coding artifacts are to be removed for the first processed edge (S11); removing coding artifacts from the determined first target pixel (S13); determining, based on at least pixel values of second adjacent pixels adjacent to the second processed edge, a second target pixel from which coding artifacts are to be removed for the second processed edge (S12); and removing coding artifacts from the determined second target pixel (S14), wherein at S12, the second target pixel is determined based on pixel values of the second adjacent pixels from which the coding artifacts are not removed at S13. |
US08953895B2 |
Image classification apparatus, image classification method, program, recording medium, integrated circuit, and model creation apparatus
The image classification apparatus extracts first features of each received image (S22) and second features of a relevant image relevant to each received image (S25). Subsequently, the image classification apparatus obtains a third feature by calculation using locality of the extracted first and second features, the third feature being distinctive of a target object of each received image (S26), and creates model data based on the obtained third feature (S27). |
US08953893B2 |
System and method to determine feature candidate pixels of an image
A system and method of processing an image is disclosed. A particular method of determining whether a particular pixel of an image is a feature candidate includes receiving data corresponding to a subset of a plurality of pixels surrounding the particular pixel. Each of the plurality of pixels may be from the image. The method further includes excluding the particular pixel from consideration as a feature candidate based on a comparison of values of the data to a comparison value. The comparison value may be based on an attribute value of the particular pixel and a threshold attribute value. |
US08953888B2 |
Detecting and localizing multiple objects in images using probabilistic inference
An object detection system is disclosed herein. The object detection system allows detection of one or more objects of interest using a probabilistic model. The probabilistic model may include voting elements usable to determine which hypotheses for locations of objects are probabilistically valid. The object detection system may apply an optimization algorithm such as a simple greedy algorithm to find hypotheses that optimize or maximize a posterior probability or log-posterior of the probabilistic model or a hypothesis receiving a maximal probabilistic vote from the voting elements in a respective iteration of the algorithm. Locations of detected objects may then be ascertained based on the found hypotheses. |
US08953886B2 |
Method and system for character recognition
Character recognition is described. In one embodiment, it may use matched sequences rather than character shape to determine a computer-legible result. |
US08953885B1 |
Optical character recognition
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for performing optical character recognition. In one aspect, a method includes receiving a text image I. A set of feature functions are evaluated for a log linear model to determine respective feature values for the text image I, wherein each feature function hi maps the text image I to a feature value, and wherein each feature function hi is associated with a respective feature weight λi. A transcription {circumflex over (T)} is determined that minimizes a cost of the log linear model. |
US08953882B2 |
Systems and methods for determining noise statistics of image data
The present disclosure generally relates to systems and methods for image data processing. In certain embodiments, an image processing pipeline may compute noise statistics associated with image data by receiving a frame of the image data having a plurality of pixels. The image processing pipeline may then identify a plurality of portions of the frame of the image data such that each portion of the plurality of portions has a flat surface. The image processing pipeline may then calculate a plurality of gradients for each portion of the plurality of portions, determine one or more dominant gradient orientations for each portion of the plurality of portions, and generate a histogram that represents a plurality of dominant gradient orientations that corresponds to the plurality of portions. After generating the histogram, the image processing pipeline may store the histogram, which may represent the noise statistics, in a memory. |
US08953880B2 |
Image processing apparatus, recording medium storing image processing program, and method of image processing
An image processing apparatus including a dispersion calculation portion, an ε deriving portion, and a filtering portion, and eliminates mosquito noise from a digitally compressed image having a plurality of color components. The dispersion calculation portion is configured to calculate, for each of the color components of each pixel contained in the digitally compressed image, a dispersion of pixel values of a plurality of pixels contained in a first region in which that pixel serves as a representative pixel. The ε deriving portion is configured to derive, for each pixel contained in the digitally compressed image, a greatest value of the plurality of dispersions that respectively correspond to the plurality of color components of that pixel, or a corrected value of the greatest value, as an ε value of an ε filter for that pixel. The filtering portion is configured to apply the ε filter to the digitally compressed image. |
US08953869B2 |
Apparatus and methods for inspecting extreme ultra violet reticles
Disclosed are methods and apparatus for inspecting an extreme ultraviolet (EUV) reticle is disclosed. An optical inspection tool is used to obtain a phase defect map for the EUV reticle before a pattern is formed on the EUV reticle, and the phase defect map identifies a position of each phase defect on the EUV reticle. After the pattern is formed on the EUV reticle, a charged particle tool is used to obtain an image of each reticle portion that is proximate to each position of each phase defect as identified in the phase defect map. The phase defect map and one or images of each reticle portion that is proximate to each position of each phase defect are displayed or stored so as to facilitate analysis of whether to repair or discard the EUV reticle. |
US08953867B2 |
Recording device and control method for a recording device
A recording device and a control method for a recording device improve the accuracy of reading MICR information while also shortening the time required for recording media processing. A dot impact printer 10 has a magnetic head 34 that magnetically reads MICR information recorded on a recording medium S, a recording head 18 that is mounted on a different carriage than the magnetic head 34 and records images on the recording medium S, and a back scanner 112 that optically reads MICR information recorded on the recording medium S, disposed sequentially to the transportation path P of the recording medium S. When reading the MICR information by means of the magnetic head 34 does not succeed, the recording medium S is conveyed to the back scanner 112, the MICR information is read by the back scanner 112, the reading results are compared, and the MICR information is identified. |
US08953866B2 |
Method for imaging and differential analysis of cells
Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis. |
US08953860B2 |
Information processing apparatus and information processing method
An information processing apparatus may include an obtaining unit to obtain a number of users from information on detection of a face region including a face in a captured image provided at the apparatus. The apparatus also may include a setting unit to set a display region for content and a display region for a captured image in a display screen; and a display image generation unit to generate a display image to be displayed in the display region for a captured image, in accordance with the information on the detection, the number of users, and the display region set for a captured image. |
US08953858B2 |
Methods and systems for analyzing, prioritizing, visualizing, and reporting medical images
Methods and systems for retrieving and processing medical diagnostic images are provided, comprising using picture analysis prioritization visualization and reporting system (“PAPVR system”) to determine whether each of one or more images from an image database or imaging device is of medical interest to a reviewing physician, determine whether one or more of the images is representative of the images, and provide the one or more images to a display and analysis system for review by a reviewing physician. The PAPVR system can provide the one or more images with a Key Image that is representative of the images. In addition, the PAPVR system can detect whether a patient suffers from a particular ailment, and provide a reviewing physician quantitative information that is relevant to the patient's condition. |
US08953855B2 |
Edge detection technique and charged particle radiation equipment
An object of the present invention is to provide an edge detection technique and equipment which are capable of stably detecting an edge by suppressing the influence of noise even in the case where the image is obtained by charged particle radiation equipment, such as a scanning electron microscope and has a low S/N ratio. More specifically, the present invention is to propose a technique and equipment which are configured to determine a peak position (edge) on the basis of the following two edge extraction techniques. That is, the present invention is to propose a technique and equipment wherein at least two peaks are formed by using, as edge detection techniques, for example, one peak detection technique having a relatively high sensitivity and the other peak detection technique which is relatively less susceptible to the influence of noise than the one peak detection technique, and wherein a position where the peaks coincide with each other is determined as a true peak position (edge position). |
US08953849B2 |
Method and system for biometric recognition
High quality, sharply focused images of an iris and the face of a person are acquired in rapid succession in either sequence by a single sensor and one or more illuminators, preferably within less than one second of each other, by changing the sensor settings or illumination levels between each acquisition. |
US08953846B2 |
License plate recognition system and method
A license plate recognition system and method recognizes a license plate attached to a vehicle and bears a license plate number. The system includes a database module, a reducing module, an image capturing unit, a sorting unit, and a recognizing module. The database module stores license plate position sample type-related data and license plate number sample type-related data whose quantity is reducible by the reducing module. The image capturing unit captures license plate images at different imaging resolutions to generate license plate position image eigenvalue and license plate number image eigenvalue. The sorting unit computes the license plate position image eigenvalue to generate license plate position type-related data and computes the license plate number image eigenvalue to generate license plate number type-related data. The recognizing module compares the license plate number type-related data with the license plate number sample type-related data, thereby recognizing the license plate number. |
US08953842B2 |
Method for road sign recognition
For recognizing road signs, a camera captures image data of the surroundings of a vehicle. The image data are analyzed to determine a region that contains a potential road sign. The image region is evaluated by a first classification unit to identify a road sign belonging to a particular class based on a recognized class-specific feature. Then, the brightness or color intensity of at least a portion of the road sign is analyzed along radially extending scanning beams, to determine potential contour points of an information-bearing part of the road sign, which is then extracted and semantically interpreted in a second classification unit to determine the information content thereof. |
US08953838B2 |
Detecting ground geographic features in images based on invariant components
Systems, devices, features, and methods for detecting geographic features in images, such as, for example, to develop a navigation database are disclosed. For example, a method of detecting a path marking from collected images includes collecting a plurality of images of geographic areas along a path. An image of the plurality of images is selected. Components that represent an object on the path in the selected image are determined. In one embodiment, the determined components are independent or invariant to scale of the object. The determined components are compared to reference components in a data library. If the determined components substantially meet a matching threshold with the reference components, the object in the selected image is identified to be a path marking corresponding to the reference components in the data library. |
US08953836B1 |
Real-time duplicate detection for uploaded videos
Systems and methods are provided herein relating to real-time duplicate detection of video content. Fingerprints can be generated for an uploaded video. The fingerprints can be used to match the uploaded video to a set of matching videos. The set of matching videos can be filtered based on the type of match, and the quality of the match. A unique cluster-id can be generated for the uploaded video containing an upload time, and that unique cluster-id can then be modified to associate the uploaded video with a cluster-id of potential duplicates. Cluster-ids can then be used in the context of a search to filter results that have identical cluster-ids. The benefits in using real-time duplicate detection can better maximize user experiences in a video sharing service that contains potential duplicates of the same content. |
US08953835B2 |
Mobile terminal and method for forming human network using the same
A mobile terminal and a method of forming a human network using the same are provided. The method for forming a human network includes selecting a person of interest from an image; selecting a relay person from the first stored image to which information about the selected person of interest is relayed through facial recognition; and acquiring the personal information for the selected person of interest from a mobile terminal of the selected relay person. |
US08953834B2 |
Flat-panel speaker having a multilayer PCB pattern voice coil film
The present invention relates to a flat-panel speaker, and more particularly, to a flat-panel speaker having a multilayer PCB pattern voice coil film, which enables induced electromotive force to be increased by controlling the impedance of the multilayer voice coil film. The flat panel speaker having the multilayer PCB pattern voice coil film according to the present invention is characterized in that the voice coil comprises: a PCB (printed circuit board) pattern printed thereon and voice coil films stacked in an even number of 4 layers or more. Two layers each of said voice coil films are mutually connected in series, and the serially-connected voice coil films are connected to each other in parallel. |
US08953832B2 |
Audio output device and video/audio output device using the same
An audio output device including a casing, a first speaker component, a second speaker component and a sound-guiding board, and a video/audio output device using the same are disclosed. The first speaker component is a circular speaker, and is disposed at the casing. The first speaker component faces towards a first direction. The second speaker component is disposed at the casing, and faces towards a second direction which is different from the first direction. The sound-guiding board is a square plate body, located above the first speaker component, and is separated at a predetermined distance from the first speaker component. |
US08953826B2 |
System, method and apparatus for television speaker configuration
An application for present invention includes a television with a set of speaker outputs including at least a left speaker and a right speaker. On screen displays are used to properly configure the speakers and assure maximum audio quality from the television. In some embodiments, a cross-point switch connects the speakers attached to the television with the correct outputs of an internal amplifier. |
US08953824B2 |
Display apparatus having object-oriented 3D sound coordinate indication
A display apparatus having an object-oriented 3D sound coordinate indication is disclosed, in which sounds are outputted from a speaker positioned matching with a coordinate of an object in a matrix speaker apparatus formed of a plurality of small size speakers disposed behind a display apparatus in cooperation with an object content displayed on a display apparatus screen. The display apparatus having an object-oriented 3D sound coordinate indication comprises a center channel decoder which receives an audio signal corresponding to a center channel speaker among the audio signals outputted from a decoder of the surround speaker system and separates into sound sources based on an object; a center channel matrix for setting the coordinates of sound sources based on the objects separated by the center channel decoder; a matrix amplifier for amplifying an output sound of a speaker matching with each coordinate value of the sound sources based on the object; and a plurality of speakers which are arranged in a matrix shape behind the display monitor, whereby sounds are outputted through the speakers corresponding to the coordinates of the objects displayed on the display monitor. |
US08953823B2 |
Piezoelectric speaker and piezoelectric speaker array
A piezoelectric speaker is a piezoelectric speaker which radiates acoustic waves by vibrating according to an applied voltage, including (i) a substrate which includes a first region having first bending stiffness against bending of a plane perpendicular to a vibration direction and a second region having second bending stiffness against bending of the perpendicular plane, the second bending stiffness being different from the first bending stiffness, (ii) a first piezoelectric element which is mounted on the first region and to which a voltage of a first frequency band is applied, and (iii) a second piezoelectric element which is mounted on the second region and to which a voltage of a second frequency band different from the first frequency band is applied. |
US08953822B2 |
Audio vibration exciter
An audio resonance vibrator includes a yoke defining a bottom and a sidewall extending vertically from the bottom, an elastic frame cooperatively with the yoke forming a housing defining a receiving space, a magnet disposed on the bottom of the yoke cooperatively with the sidewall of yoke forming a magnetic gap, a vibrating unit accommodated in the receiving space defining a vibrating plate and a coil assembly connected with the vibrating plate. The coil assembly is at least partially received in the magnetic gap, and the vibrating plate is positioned on the elastic frame. The audio resonance vibrator further includes an elastic member interposed between the magnet and the vibrating plate to support the magnet. |
US08953820B2 |
Method and apparatus for adjusting volume using distance sensors
An electronic device includes a volume adjustment activating module, a distance detection module, and an adjusting module. The volume adjustment activating module is configured for activating the distance detection module to measure distances between a volume adjusting member and the distance detection module. The distance detection module includes at least one distance sensor, the at least one distance sensor is configured for detecting distances between the volume adjusting member and the distance detection module to obtain a plurality of distance measure values. The adjusting module is configured to adjust a volume of the electronic device according to the distance measure values. |
US08953819B2 |
Method and apparatus for focusing sound using array speaker
Provided is a method and apparatus for focusing sound using an array speaker system. The method includes generating a plurality of delayed signals to be focused to a predetermined position from an input signal, filtering a low-frequency signal having a frequency that is lower than a reference frequency from the delayed signals, generating low-frequency focusing signals divided into 2 groups by adjusting a gain of the filtered low-frequency signal, and applying the low-frequency focusing signals divided into the 2 groups to speaker units of the array speaker system at both sides with respect to a center portion of the array speaker system and outputting the low-frequency focusing signals through the speaker units. In this way, the performance of sound focusing for the low-frequency signal can be improved and thus a listener located a predetermined distance from and in a predetermined direction relative to the array speaker system can clearly listen to the low-frequency focusing signals. |
US08953816B1 |
Method and apparatus to dynamically configure a vehicle audio system
A vehicle audio system senses the availability of a wireless audio device in or near a vehicle, and uses logic circuitry to identify a device-specific record from among many records available in a memory. The identified record contains data codes from the available wireless audio device and from a software application running on the device. Upon identifying the data code record, the system downloads a copy of an alternate software application selected from the memory and configures the alternate software application to process data from the wireless audio device. The system provides a user the option to play sound from the vehicle speakers or play sound from the wireless audio device. |
US08953810B2 |
Synchronization in a bilateral auditory prosthesis system
Aspect of the present invention are generally directed to synchronization between a first auditory prosthesis and a second auditory prosthesis of a bilateral auditory prosthesis system. In this system, a primary wireless communications channel, usable for synchronizing the first and second prostheses, may be disabled to, for example, conserve power. Then, upon detection of a trigger in sound received by one or more of the prostheses, the primary wireless communication channel is enabled and the prostheses synchronized using the primary wireless communication channel. |
US08953808B2 |
System and method for effectively performing data restore/migration procedures
A system and method for effectively supporting data transfer procedures includes a source device that registers with an account server to participate in a data backup service. The source device then encrypts and stores user data onto a datacenter. The source device later may request a data transfer task from a vendor. The datacenter responsively transfers the encrypted user data to a vendor server, and an escrow server generates and sends a temporary key to the vendor server. A destination device may then utilize the temporary key to decrypt and securely store the user data onto the destination device. |
US08953804B2 |
Method for establishing a secure communication channel
In a method for establishing a secure communication channel between a portable data carrier (10) and a terminal on the basis of an asymmetric cryptosystem, a value (X; Y; V; W) derived from a public key (PKD; PKT) of the cryptosystem is displayed on a display device (40) of the data carrier (10). |
US08953803B2 |
Circuit switched mobile telephony in fixed wireless access
A fixed wireless terminal (29) comprises interfaces (32, 34) and a controller (40), e.g., a Generic Access Network Controller (GANC). The controller (40) is configured to interwork Generic Access Network (GAN) signaling employed between the mobile wireless terminal (29) and the fixed wireless terminal (30) with circuit switched signaling employed between the fixed wireless terminal and the radio access network (22). The interworking enables the controller (40) to provide a circuit switched mobile telephony core network service to the mobile wireless terminal (30). |
US08953797B2 |
Configuring audiovisual systems
A method, an apparatus, and a computer program product for configuring audiovisual equipment. An image captured by an imaging sensor of a camera may comprise an encoded pattern that includes information that can unlock a feature or function of a camera or other audiovisual equipment the information is extracted from the encoded pattern using an image processor of the camera, or communicatively coupled to the camera. The information may comprise encrypted information which may be decrypted using a unique identifier of the camera. The information may be transmitted to downstream audiovisual equipment and may be used to unlock features and functions of other devices. The other devices may include another camera. |
US08953793B2 |
Cryptographic key generation
A technique for generating a cryptographic key is provided. The technique is particularly useful for protecting the communication between two entities cooperatively running a distributed security operation. The technique comprises providing at least two parameters, the first parameter comprising or deriving from some cryptographic keys which have been computed by the first entity by running the security operation; and the second parameter comprising or deriving from a token, where the token comprises an exclusive OR of a sequence number (SQN) and an Anonymity Key (AK). A key derivation function is applied to the provided parameters to generate the desired cryptographic key. |
US08953790B2 |
Secure generation of a device root key in the field
Methods and systems for secure key generation are provided. In embodiments, during the manufacturing process, a device generates a primary seed for the device and stores the seed within the device. The device exports the device primary key to a secure manufacturer server. The secure manufacturer server generates a public/private root key for the device and requests a certificate for the public root key of the device from a certificate authority. The device, having the stored primary seed, is integrated into an end-user system. Upon occurrence of a condition, the device after integration into the end-user system generates the public/private root key in the field. The system also receives and installs the certificate for the public root key. |
US08953788B1 |
Encrypting a data transmission using multiple channels
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first algorithm; creating at least two subsets of data from the data stream by extracting one or more data portions from the encrypted data stream, thereby leaving a remaining portion and an extracted portion; communicating the remaining portion to a destination by way of a first communications channel; encrypting the extracted portion utilizing a second algorithm; communicating the encrypted extracted portion to the destination by way of a second communications channel; and providing for recombining the remaining portion and the encrypted extracted portion to facilitate recovery of the encrypted data stream. |
US08953786B2 |
User input based data encryption
Systems and methods for securing data by a user input based data encryption are described. In one aspect of the invention, the method may include receiving an authentication string from a user to authenticate access to the application. On successful authentication of the user, the data to be secured is obtained from the user. The obtained data is then secured by encryption, which results in generation of a private key. The private key is then associated with the authentication string to form a first secure key. The first secure key is stored with the encrypted data in a data file. The data file is then transferred to a server associated with the application. The data file in the server is further encrypted to generate a second secure key. |
US08953782B2 |
Crypto arrangement with mixed endian
A method of sending or marshaling data from a device through a cryptographic unit in a software communications architecture (SCA), includes identifying an endian mode of the cryptographic unit, and determining if the data to be sent from the device has an endian mode that matches the endian mode of the cryptographic unit. If the endian modes match, the data is enabled to be sent through the cryptographic unit. If the endian modes do not match, the endian mode of the data is flipped and then the data is then enabled to be sent through the cryptographic unit. |
US08953781B2 |
Apparatus and method for ciphering of uplink data in mobile communication system
An apparatus and method for ciphering uplink data in a mobile communication system are provided. The apparatus includes a Radio Network Controller (RNC) for, when receiving a Radio Bearer Setup Complete after a ciphering activation time, determining a Hyper Frame Number (HFN) value of a User Equipment (UE) and changing an HFN value of the RNC to the same HFN value determined of the UE. |
US08953780B2 |
Portable electronic device
A portable electronic device including a first section, a second section and a connecting section. The first section has a user input section and a first tubular housing member. The first tubular housing member forms e majority of opposite exterior lateral sides of the first section. The second section has a display and a second tubular housing member. The second tubular housing member forms a majority of opposite exterior lateral sides of the second section. The connecting section movably connects the second section with the first section. The first tubular housing member at least partially houses the user input section. The second tubular housing member at least partially houses the display. |
US08953772B2 |
Agent conferenced IVR
A system engages a live agent in a multi-party call type arrangement with the user and an Interactive Voice Response (IVR) unit when the user has difficulty with the IVR. The agent is provided with information about the IVR process being executed and the user's input. When the agent is introduced into the call, the agent does not take over the IVR session, but the agent helps direct the user to provide the correct input(s) to the IVR session. Once the issue is corrected, the agent can remove themself from the customer/IVR dialog. As a consequence: the user continues their self-service transactions in the IVR, and the user is better educated on how to navigate the IVR in the future. Further, agent resources are spared from further interaction with the user, and the user is less likely to have a negative opinion of the IVR. |
US08953769B2 |
Calling party controlled ringback tones
A computer readable medium stores a program for a calling party controlled ringback tone service. The service enables a calling party to control ringback tones, even overriding called party selected ringback tones. The service can operate in a wireless or wireline network, such as a voice over IP (VoIP) network or time division multiplexed (TDM) network. The calling party can be periodically billed for the ringback tone control service, as well as the ringback tones. The subscriber can configure the service via the web. |
US08953760B2 |
Method in a communication system
A method and arrangement are disclosed in a Vector Control Entity for enabling a fair bit rate distribution among lines of similar priority in a vectoring group, when applying partial vectoring in a DSL communication system. The method comprises calculating a rate balancing metric, RBM, for each line i within a priority group A, indicative of the ratio between the bit rate of a line i with a current vectoring resource allocation, and the estimated bit rate of line i assuming approximately no crosstalk within the vectoring group. The method further comprises allocating partial-vectoring resources to the line/s within the group A, based on the calculated RBMs, such as to reduce the difference in RBM between the lines. The method further comprises calculating an updated RBM for any line within the group A subjected to changes in vectoring resource allocation. The method may be iterated until certain criteria are fulfilled. The arrangement is adapted to enable the performance of the above described method. |
US08953755B2 |
Voice over IP method for developing interactive voice response system
A personal interactive voice response service node includes a memory that stores executable instructions, and a processor that executes the executable instructions. The personal interactive voice response service node accepts personalized instructions to define interactive voice response service node prompts on behalf of an individual assigned a communications address serviced by the personal interactive voice response service node. The personal interactive voice response service node accepts personalized instructions to define actions to take in response to selections of corresponding interactive voice response service node prompts. When executed by the processor, the executable instructions cause the personal interactive voice response service node to identify a selection of an interactive voice response service node prompt and execute an action associated with the selection identified. |
US08953752B2 |
Systems and methods for playing recorded announcements
The invention features a computer-implemented method for playing back an announcement message to a user device. The method includes initiating, by a computing device, an announcement session in response to a user device establishing communication with the computing device and determining, by the computing device, the announcement message to be played back to the user device. The method includes loading, by the computing device, into a queue associated with the announcement session, a descriptor referencing a memory buffer on the computing device. The memory buffer includes a plurality of memory partitions, each memory partition storing at least one portion of the announcement message encoded at a different rate. The method includes the computing device scheduling play back of the announcement message, playing the announcement message to the user device at a first rate and receiving a request from the user device for playback at a second rate. |
US08953751B2 |
Methods and systems for storage and retrieval of originating caller location information in an emergency services system
Methods and systems for the storage and retrieval of originating caller location information in an emergency services system are disclosed. Subscriber information from a telephone service provider is received by a NG-911 service provider, the subscriber information including a subscriber telephone number and an associated subscriber address. The service provider generates geo-spatial coordinates corresponding to said subscriber address and stores the subscriber information and the corresponding geo-spatial data in a geographic information system (GIS) database, indexed at least according to said subscriber telephone number. In response to a query from a PSAP relating to an emergency service call originating from the subscriber telephone number, the NG-911 service provider queries the GIS database for the originating telephone number and returns the geo-spatial coordinates and the associated subscriber address. |
US08953749B2 |
Lifestyle multimedia security system
A method is disclosed for remote monitoring of a premises, comprising the steps of operatively coupling a geographically remote client to a security system server which is capable of authenticating a user of the remote client, operatively coupling the remote client to a security gateway which is capable of managing the monitoring of the premises, activating a signal at the premises for notifying an occupant at the premises that remote monitoring is occurring, and transferring information between the security gateway and the remote client. The transfer of information between the security gateway and the remote client is controlled by the user of the remote client. The security gateway may be operably coupled to at least one camera at the premises and to at least one audio station at the premises. |
US08953748B2 |
Method and apparatus for monitoring power consumption value of DSL subscriber board
A method and an apparatus for monitoring a power consumption value of a DSL subscriber board in real time are provided. The method includes: monitoring a working state of each subscriber port on the DSL subscriber board, the number of subscriber ports in each working state, and an output power of each LD subunit in an LD unit on the DSL subscriber board; and calculating a power consumption value of the DSL subscriber board in real time according to a monitoring result and preset electrical parameters of each functional unit. |
US08953745B2 |
Solid-state image pickup apparatus and X-ray inspection system
A solid-state image pickup apparatus 1A includes a photodetecting section 10A and a signal readout section 20 etc. In the photodetecting section 10A, M×N pixel units P1,1 to PM,N are arrayed in M rows and N columns. When in a first imaging mode, a voltage value according to an amount of charges generated in a photodiode of each of the M×N pixel units in the photodetecting section 10A is output from the signal readout section 20. When in a second imaging mode, a voltage value according to an amount of charges generated in the photodiode of each pixel unit included in consecutive M1 rows in the photodetecting section 10A is output from the signal readout section 20. When in the second imaging mode than when in the first imaging mode, the readout pixel pitch in frame data is smaller, the frame rate is higher, and the gain being a ratio of an output voltage value to an input charge amount in the signal readout section 20 is greater. |
US08953743B2 |
X-ray stress measurement method and apparatus
A sample (1) is irradiated with X-rays at different incident angles from plural X-ray sources (21, 22). Attention is focused on a Debye-ring of each X-ray diffraction emitted conically from the sample in association with incident X-ray from each of the X-ray sources (21, 22), and stress in the sample (1) is determined on the basis of information of X-ray diffraction appearing at an intersection point between the Debye-ring of the X-ray diffraction recorded on an image plate (30) and an equatorial plane (H) and information of X-ray diffraction appearing in the neighborhood of the intersection point between the Debye-ring and the equatorial plane (H). |
US08953732B2 |
Nuclear reactor internal hydraulic control rod drive mechanism assembly
A control rod drive system for a nuclear reactor that employs hydraulic cylinders to operate a conventional plunger/gripper drive system to incrementally move control rods into and out of the core of a reactor. The pressure differential for driving hydraulic pistons within the cylinders is obtained from the difference in pressure between the outside and inside of the core barrel of the reactor and control of the pistons is obtained from external solenoids attached to the reactor control system. The external solenoids regulate a charging pump feed to Poppet valves that control the hydraulic feed to the cylinders. A hydraulic piston/cylinder drive is also provided for the shutdown rods which operate in either an all in or out of the core condition. |
US08953730B2 |
Auto frequency calibration for a phase locked loop and method of use
A phase locked loop includes a phase difference detector configured to receive a reference frequency and a divider frequency and output a phase difference signal. The phase locked loop includes a code generator configured to receive the reference frequency and the phase difference signal, and output a coarse tuning signal and a reset signal. The phase locked loop includes a digital loop filter configured to receive the phase difference signal and output a fine tuning signal. The phase locked loop includes a voltage control oscillator configured to receive the coarse and fine tuning signals, and output an output frequency. The phase locked loop includes a divider configured to receive the reset signal, a divider number control signal and the output frequency, and output the divider frequency. The phase locked loop includes a delta-sigma modulator configured to receive a divisor ratio and the reset signal, and output divider number control signal. |
US08953729B1 |
Method for symbol sampling in a high time delay spread interference environment
Symbol sampling in a high time delay spread interference environment includes acquiring (602) a time varying baseband waveform. The waveform has a signal amplitude that varies between one of a plurality of symbol states. The waveform is sampled (603) at a rate of m times the symbol rate. During an evaluation time, an error value is calculated (604, 606) for each of m data sample positions. Each of the error values comprises an average distance between the measured value of the waveform as indicated by the data sample and a closest known symbol value. The error values are used to create an error surface. Thereafter, the error surface is modeled as a quadratic and an optimal sample time is determined (608, 610, 612) based on finding the time location where the quadratic surface is minimum. A sinc interpolator is then used to resample the data. |
US08953725B1 |
MIMO repeater system and method for canceling feedback interference using the same
Provided is a MIMO repeater system including a plurality of repeaters. Each of the repeaters includes: an Rx antenna; a receiver configured to convert a signal received through the Rx antenna into a digital signal; an interference cancellation unit configured to cancel interference from an output signal of the receiver; a transmitter configured to convert an output signal of the interference cancellation unit into an analog signal; and a Tx antenna configured to transmit an output signal of the transmitter, and the interference cancellation to unit provided in each of the repeaters receives the output signal of the receiver as an input signal, receives reference signals provided from the plurality of repeaters as a reference signal vector, outputs a prediction signal according to a current filter coefficient vector generated in response to the input signal and the reference signal vector, and cancels the prediction signal from the input signal. |
US08953724B2 |
Canceling narrowband interfering signals in a distributed antenna system
Canceling narrowband interfering signals in a distributed antenna system is provided. In one aspect, a cancellation sub-system includes a decimator module, a filter, an interpolator module, and a combiner module coupled to the uplink path and a reference path in parallel with the uplink path. The reference path includes the decimator module, the filter, and the interpolator module. The decimator module decimates a reference signal sampled from an uplink signal traversing an uplink path of the remote antenna unit. Each of the uplink signal and the reference signal includes a narrowband interfering signal component. The filter generates a cancellation signal from the reference signal by attenuating the reference signal outside a frequency band that includes the interfering signal component. The interpolator module interpolates the cancellation signal to a sampling rate of the uplink signal. The combiner module can subtract the cancellation signal from the uplink signal. |
US08953723B2 |
Iterative interference suppression using mixed feedback weights and stabilizing step sizes
A receiver is configured for canceling intra-cell and inter-cell interference in coded, multiple-access, spread-spectrum transmissions that propagate through frequency-selective communication channels. The receiver employs iterative symbol-estimate weighting, subtractive cancellation with a stabilizing step-size, and mixed-decision symbol estimate. Receiver embodiments may be implemented explicitly in software of programmed hardware, or implicitly in standard Rake-based hardware either within the Rake (i.e., at the finger level) or outside the Rake (i.e., at the user of subchannel symbol level). |
US08953721B2 |
Cross correlation determination method and cross correlation determination device
A cross correlation determination method includes: executing a first decoding of decoding a navigation message included in a received satellite signal using a first replica code and a second decoding of decoding the navigation message using a second replica code; and determining the occurrence of a cross correlation using the result of the first decoding and the result of the second decoding. |
US08953716B1 |
DC offset estimation and compensaton for wideband systems
Systems, methods, and other embodiments associated with a DC notch gear filter are described. According to one embodiment, an apparatus includes a digital high pass filter having a cutoff frequency and a gear mechanism configured to successively change the cutoff frequency of the high pass filter based on a sequence of cutoff frequencies. The apparatus also includes a direct current (DC) estimator configured to estimate a DC offset of a digital input signal to the high pass filter based, at least in part, on an output signal of the high pass filter as a cutoff frequency is successively changed. A direct current (DC) compensator is configured to subtract the estimated DC offset from the input signal to the high pass filter. |
US08953713B2 |
System and method for uplink multiple input multiple output transmission
Methods and apparatuses are provided for uplink MIMO transmissions in a wireless communication system. In particular, a primary stream (610) may be utilized to carry a primary data channel E-DPDCH (624), and a secondary stream (612) may be utilized to carry a secondary data channel S-E-DPDCH (620). Further, the primary stream (610) may be precoded utilizing a primary precoding vector, and the secondary stream (612) may be precoded utilizing a secondary precoding vector, with coefficients orthogonal to those of the primary precoding vector. The primary stream may include an enhanced control channel E-DPCCH (614) adapted to carry control information associated with both the primary data channel E-DPDCH (624) and the secondary data channel S-E-DPDCH (620). |
US08953711B2 |
Configurable pre-emphasis component for transmission circuitry
A configurable pre-emphasis filter component may be configured based upon measured frequency response (e.g., filter effect) associated with at least one analog filter positioned between a digital predistortion component and a power amplification component of a transmission circuitry. The frequency response may be measured using a calibration signal sent via the transmission circuitry, a loopback circuit, and a reception circuitry. Calibration circuitry may be used with one or more loopback circuits to measure the frequency response of various analog components of the transmission circuitry. The calibration circuitry may also include logic to determine a configuration for the PEF component based upon the measured frequency response. |
US08953705B2 |
User equipment apparatus and method for feeding back channel state information in a wireless communication system
A method for transmitting a Channel State Information (CSI) reporting at a user equipment (UE) in a wireless communication system is disclosed. The method includes transmitting a rank indicator (RI) and a first type precoding matrix indicator (PMI) to a base station (BS) according to a first CSI feedback type; transmitting a second type PMI to the BS according to a second CSI feedback type, wherein the RI and the first type PMI are jointly coded, and transmitted through a physical uplink control channel (PUCCH), wherein the RI and the second type PMI are not jointly coded, and transmitted through the PUCCH, wherein a transmission period of the first type PMI is different than a transmission period of the second type PMI, and wherein the transmission period of the first type PMI is longer than the transmission period of the second type PMI. |
US08953701B2 |
Precoding method and precoder for cross-polarized antenna array
The present invention provides a precoding method for a cross-polarized antenna array, the cross-polarized antenna array comprising a first group of coplanar polarized antennas and a second group of coplanar polarized antennas, the method comprising the following steps: generating, for at least one layer of data stream, a feedback codebook comprising a plurality of codewords; receiving a selection of the codeword in the feedback codebook; determining a corresponding codeword from the feedback codebook according to the received selection; generating a precoding matrix based on the determined codeword to precode the at least one layer of data stream; wherein each codeword in the feedback codebook comprises a first coefficient portion corresponding to a first group of coplanar polarized antennas and a second coefficient portion corresponding to the second group of coplanar polarized antennas, and there is a complex scaling relation between the coefficients in the first coefficient portion and the second coefficient portion corresponding to the same layer of data stream. Correspondingly, the present invention further provides a precoder for a cross-polarized antenna array. |
US08953700B2 |
Method for transmitting signal in multiple node system
Provided is a signal transmission method of a multi-node system employing a plurality of nodes and a base station that can control each of the plurality of nodes. The method includes: transmitting per-node transmission information to a user equipment; transmitting at least one stream to the user equipment by applying a precoding matrix determined for each node in at least one node among the plurality of nodes; and receiving per-node feedback information from the user equipment, wherein the per-node feedback information includes information on a precoding matrix applicable to a node which transmits the at least one stream. |
US08953699B2 |
Method and apparatus for CSI feedback for joint processing schemes in an orthogonal frequency division multiplexing communication system with coordinated multi-point transmission
Methods in a wireless terminal are described for supporting co-ordinated multipoint transmissions including joint transmissions from two or more transmission points, specifically the method of receiving indication of two or more CSI reference signal configurations, each CSI reference signal configuration representing one or more antenna ports comprising a set of antenna ports; determining a first set of transmission parameters corresponding to a first set of antenna ports corresponding to a first CSI reference signal configuration and a second set of transmission parameters corresponding to a second set of antenna ports corresponding to a second CSI reference signal configuration; the first set and second set of transmission parameters determined to maximize the sum data rate for simultaneous transmission from the first set and the second set of antenna ports; conveying, to the base station, information pertaining to the first set of transmission parameters and the second set of transmission parameters. |
US08953698B2 |
Detecting a transmitted OFDM signal in a receiver having at least two receiver branches
A transmitted OFDM signal is detected in a receiver of a wireless communication system. The receiver has at least two receiver branches, each comprising an antenna, a front end receiver, a Discrete Fourier Transform unit, and a channel estimator. The receiver further comprises a detector for detecting received data symbols. The method comprises the steps of determining a system bandwidth associated with the transmitted signal; comparing the determined system bandwidth with a predetermined value; determining, if the system bandwidth is lower than the predetermined value, channel estimates separately for each branch, and detecting received data symbols from the received signals and corresponding channel estimates; and calculating, if the system bandwidth is higher than the predetermined value, a weighted sum of signals from each branch, determining a combined channel estimate, and detecting received data symbols from the weighted sum and the combined channel estimate. |
US08953696B2 |
Signal decoding systems
We describe an ultra wideband (UWB) orthogonal frequency division multiplexed (OFDM) modified dual carrier modulation (MDCM) decoder comprising: first and second inputs to input first and second signals for first and second OFDM carriers; third and fourth inputs for respective third and fourth signals comprising channel quality estimates for the OFDM carriers; a set of integer arithmetic units coupled to said first, second, third and fourth inputs to form a set of intermediate terms; a first set of adders to form first and second sets of combinations of said intermediate terms, one for each MDCM coded bit value; a compare-select stage to select a first and second minimum valued said combination of said intermediate terms from said first and second set; and a subtracter to determine a log likelihood ratio (LLR) value for said bit from said first and second minimum valued combinations. |
US08953692B2 |
Image coding method and image decoding method
An image coding method for improving coding efficiency by using more appropriate probability information is provided. The image coding method includes: a first coding step of coding a first set of blocks included in a first region sequentially based on first probability information; and a second coding step of coding a second set of blocks included in a second region sequentially based on second probability information. In the first coding step, the first probability information is updated depending on data of a target block to be coded, after coding the target block and before coding a next target block. In the second coding step, the second probability information is updated depending on the first probability information updated in the first coding step, before coding the first target block. |
US08953688B2 |
In loop contrast enhancement for improved motion estimation
A motion estimation method is provided, including providing first image data, providing second image data, block-matching a source block of the first image data with target blocks of the second image data to determine a motion vector corresponding to the position of the target block that most accords with the source block, and applying a contrast enhancement on source blocks and/or target blocks to improve block-matching. A motion estimation device and video device are also provided. |
US08953686B2 |
Image encoding/decoding apparatus and method
Provided is an image encoding/decoding apparatus and method. The image encoding apparatus may include a motion vector prediction unit to perform a prediction with respect to an arbitrary motion vector of a current block within an image, using at least one of vector information of a motion vector corresponding to an adjacent block and vector information of a previous motion vector of the current block, and a differential determination unit to determine differential information of a motion vector of the current block based on the motion vector predicted in the motion vector prediction unit and an actual motion vector of the current block. |
US08953684B2 |
Multiview coding with geometry-based disparity prediction
Described herein is technology for, among other things, multiview coding with geometry-based disparity prediction. The geometry-based disparity prediction involves determining corresponding block pairs in a number of reconstructed images for an image being coded. The reconstructed images and the image represent different views of a scene at a point in time. Each corresponding block pair is projected on the image. This enables determination of disparity vector candidates. For each coding block of the image, a predicted disparity vector is determined based on the disparity vector candidates. Then, the predicted disparity vector may be utilized to obtain the bits to be encoded. The geometry-based disparity prediction reduces the number of encoded bits. |
US08953679B2 |
Methods and apparatus for implicit block segmentation in video encoding and decoding
Methods and apparatus are provided for implicit block segmentation in video encoding and decoding. An apparatus includes an encoder for encoding at least a portion of a picture using a block segmentation process performed on a pixel difference of at least two predictors for the portion. The encoder implicitly signals block segmentation information for use by a decoder to decode the portion. |
US08953675B2 |
Tile-based system and method for compressing video
A system and method are described below for encoding interactive low-latency video using interframe coding. For example, one embodiment of a computer-implemented method for performing video compression comprises: logically subdividing each of a sequence of images into a plurality of tiles, each of the tiles having a defined position within each of the sequence of images, the defined position remaining the same between successive images; encoding one of the tiles at a first defined position in a first image of the sequence of images using a first compression format and encoding the reminder of the tiles in the first image using the second compression format; and encoding one of the tiles at a second defined position in a second image of the sequence of images using the first compression format and encoding the reminder of the tiles in the first image using the second compression format; wherein the second compression format is dependent on previously-encoded tiles encoded according to the first compression format and/or the second compression format. |
US08953674B2 |
Recording a sequence of images using two recording procedures
A sequence of images received from a camera is recorded according to a first procedure. The images are analyzed to identify events of interest, and upon identifying an event of interest, an area of interest of a plurality of said images is identified. The identified area is recorded according to a second procedure. |
US08953673B2 |
Scalable video coding and decoding with sample bit depth and chroma high-pass residual layers
Techniques and tools are described for scalable video encoding and decoding. In some embodiments, an input frame is downsampled in terms of sample depth and chroma sampling rate, encoded, and output from the encoder as a base layer bitstream. The base layer bitstream is also reconstructed and upsampled to produce a reconstructed bitstream which is subtracted from the original input frame to produce a residual layer. The residual layer is split and encoded as a sample depth residual layer bitstream and a chroma high-pass residual layer bitstream. To recover the encoded input frame, a decoder receives one or more of these bitstreams, decodes them, and combines them to form a reconstructed image. The use of separate codecs is allowed for the base layer and the enhancement layers, without inter-layer dependencies. |
US08953669B2 |
Decision feedback equalizer
A decision feedback equalizer that can operate at higher speed is provided. The decision feedback equalizer includes a weighting addition circuit (adder 21, coefficient units Tap1a, Tap2 to Tapn) that sums an input signal to weighted versions of feedback signals FB1 to FBn, n being an integer not less than 2. The decision feedback equalizer also includes a decision circuit 11 that decides whether or not the result of addition by the weighting addition circuit is not less than a defined threshold value and that outputs the result of the decision to outside and to a shift register (latch circuits L2 to Ln). The decision circuit operates in synchronism with a clock signal. The shift register sequentially holds the result of decision of the decision circuit 11 in synchronism with the clock signal, and outputs the contents held by its component registers as feedback signals FB2 to FBn. The decision feedback equalizer includes a decision circuit 12 that decides whether or not the result of addition by the weighting addition circuit is not less than a defined threshold value and that outputs the result of decision as feedback signal FB1. The second decision circuit operates in synchronism with the clock signal. |
US08953668B2 |
Method and circuit of clock and data recovery with built in jitter tolerance test
A clock and data recovery circuit with built in jitter tolerance test is disclosed. Imposing jitter on a filter inside a CDR loop to cause phase disturbances to the clock and data recovery circuit, thereby to test the jitter tolerance of the clock and data recovery circuit. Accordingly, IC test cost is significantly reduced by increasing few circuit sizes. |
US08953666B2 |
Relaying apparatus, and communication system
A control device according to an embodiment of the present disclosure controls communications between a plurality of information terminals at a first site and an information device at a second site. The control device includes: an interface that obtains class information indicating what class is allocated to each of those information terminals and also obtains rate information indicating a rate of communication with the information device over a network; and a control section that puts an upper limit on the communication rate of each of the information terminals by reference to the class information and the rate information and notifies the information terminal of the upper limit. |
US08953665B2 |
Pattern-based loss of signal detector
In described embodiments, data pattern-based detection of loss of signal (LOS) is employed for a receive path of serializer/deserializer (SerDes) devices. Pattern-based LOS detection allows for detection of data loss over variety of types of connection media, and is generally insensitive to signal attenuation. More specifically, some described embodiments disclose reliable pattern-based detection of LOS across different connection media for incoming receive data when discreet time decision feedback equalization (DFE) is employed. |
US08953663B2 |
Calibration of quadrature imbalance via loopback phase shifts
Apparatuses, systems, and methods for calibration of quadrature imbalance in direct conversion transceivers are contemplated. A transceiver controller may perform a self-calibration to address quadrature imbalance. The controller may isolate the transmitter and receiver from any antennas, couple the radio frequency (RF) section of the transmitter to the RF section of the receiver via a loopback path, and inject a calibration signal into the transmitter. In the loopback path, the controller may phase-shift the signal that propagates through the transmitter using two different phase angles to produce two different signals that propagate into the receiver. By measuring the two different signals that exit the receiver, the controller may be able to calculate correction coefficients, or parameters, which may be used to adjust elements that address or correct the quadrature imbalance for both the transmitter and receiver. |
US08953662B1 |
Method and apparatus for baud rate tracking
Aspects of the disclosure provide a method. The method includes capturing values of a timer in response to a first transition edge and a second transition edge of a received signal transmitted from an external device to determine a counted number by the timer corresponding to a pre-known number of symbols between the first and second transition edges in the received signal, and determining a baud rate configuration based on a ratio of the counted number and the pre-known number of symbols. |
US08953650B2 |
Method to control emission wavelength of tunable laser diode
A method to control the emission wavelength of a tunable laser diode (LD) is disclosed. The method measures the first derivative of the wavelength against the first stimulus, typically a current injected in the SG-DFB region, and the second derivative of the wavelength against the power supplied to the heater in the CSG-DBR region. The method adjusts the current so as to coincide the emission wavelength with the target wavelength, then, corrects the target power for the heater based on the derivative of the current multiplied by a ratio of two derivatives measured in advance to the control of the heater current. |
US08953642B2 |
Method and apparatus for transmitting a downlink reference signal in a wireless communication system supporting multiple antennas
The present invention relates to a wireless communication system, and more particularly, to a method and apparatus for transmitting a downlink reference signal in a wireless communication system that supports multiple antennas. A method for transmitting channel state information-reference signals (CSI-RS) for two or more antenna ports according to one embodiment of the present invention comprises the steps of: mapping the CSI-RSs for the two or more antenna ports in predetermined patterns on a data region of a downlink subframe: an transmitting the downlink subframe mapped with the CSI-RSs for the two or more antenna ports, wherein the predetermined patterns are defined as patterns differing by a cell, and the different patterns may be defined as the predetermined patterns being shifted in a temporal range, frequency range, or a temporal range and a frequency range. |
US08953640B2 |
Transmitting system and method of processing digital broadcast signal in transmitting system
A transmitting system and a method of transmitting digital broadcast signal are disclosed. The method of transmitting digital broadcast signal includes FEC encoding mobile data to build data frames, dividing the data frames into a plurality of data portions, converting one of the data portions into a plurality of SCCC blocks, performing convolutional coding on mobile data, mapping the SCCC blocks to data blocks and extended data blocks, forming a data group, forming a fixed number of mobile data packets and a first scalable number of mobile data packets, multiplexing the fixed number of mobile data packets, the first scalable number of mobile data packets and a second scalable number of main data packets. |
US08953636B2 |
End-to-end feature support signaling
Techniques and mechanisms to communicate end-to-end feature compliance information. Network access requests may be accompanied by compliance/certification/compatibility information for the requesting device as well as intervening devices. A network authentication device may evaluate the request and associated compliance/certification/compatibility information to select one or more network features to allow the requesting device to utilize. |
US08953634B2 |
Device, system and method of communicating data during an allocated time period
Some demonstrative embodiments include devices, systems and/or methods of communicating during an allocated time period. For example, an apparatus may include a wireless communication unit to perform the functionality of a first station to communicate data with a second station during an allocated time period, wherein, when both the first and second stations do not have data ready for transmission, the wireless communication unit is to communicate frames between the first station and the second station to occupy the allocated time period until at least one of the first and second stations has data ready for transmission or until an end of the allocated time period. |
US08953631B2 |
Interruption, at least in part, of frame transmission
An embodiment may include circuitry to permit interruption, at least in part, of a first frame from a sender to an intended recipient in favor of transmitting, at least in part, a payload of a second frame from the sender to the intended recipient, and/or processing, at least in part, one or more incoming flow control notifications. The payload may be transmitted, at least in part, to the intended recipient in one or more frame fragments. Many modifications, variations, and alternatives are possible without departing from this embodiment. |
US08953630B2 |
Circuit arrangement, systems for transmitting a serial data stream, pixel matrix display and method for transmitting a serial data stream
A circuit arrangement comprises an input circuit for reading in a serial data stream, which comprises a plurality of useful data bits, and for reading in a piece of information which indicates the start of the serial data stream. The circuit arrangement also comprises a data processing circuit for removing at least one useful data bit from the read-in, serial data stream. The data processing circuit is designed such that it removes the at least one useful data bit at a prescribed position after the start of the serial data stream. The circuit arrangement also comprises a first output circuit for outputting the read-in, serial data stream for the omission of the at least one removed useful data bit. |
US08953628B2 |
Processor with packet ordering device
A processor includes a plurality of processor cores, a networking output, and a packet ordering device. The packet ordering device determines an ordering for packets that are processed by the processor cores. The packets are released to the networking output in a determined order. |
US08953626B2 |
Network routing using indirect next hop data
A router maintains routing information including (i) route data representing destinations within a computer network, (ii) next hop data representing interfaces to neighboring network devices, and (iii) indirect next hop data that maps a subset of the routes represented by the route data to a common one of the next hop data elements. In this manner, routing information is structured such that routes having the same next hop use indirect next hop data structures to reference common next hop data. In particular, in response to a change in network topology, the router need not change all of the affected routes, but only the common next hop data referenced by the intermediate data structures. This provides for increased efficiency in updating routing information after a change in network topology, such as link failure. |
US08953623B1 |
Predictive network services load balancing within a network device
In general, techniques are described for performing load balancing across resources of a network device. In one example, upon receiving an initial packet, a load balancer module of the network device is configured to perform a lookup in a routing table based on a subscriber identifier associated with the initial packet, and determine whether a line card is pre-assigned to process the initial packet based at least in part on the lookup result. A packet forwarding engine is configured to when one of the line cards is pre-assigned, direct the initial packet to the pre-assigned line card, and, when one of the line cards is not pre-assigned, dynamically identify one of the line cards to process the initial packet based at least in part on header information of the initial packet, and direct the initial packet to the dynamically identified line card. |
US08953621B2 |
Specifying priority on a virtual station interface discovery and configuration protocol response
An apparatus comprising an Edge Virtual Bridging (EVB) bridge coupled with an EVB station wherein the EVB bridge is configured to communicate to the EVB station a Filter Information (Info) field of a virtual station interface (VSI) discovery and configuration protocol (VDP) Associate Response message, and wherein the Filter Info field specifies a default Priority Code Point (PCP) value associated with at least one or all of a plurality of VID values carried by that VDP TLV Response. |
US08953619B2 |
Dynamic optimization of a multicast tree hierarchy for a distributed switch
A distributed switch may include a hierarchy with one or more levels of surrogate sub-switches (and surrogate bridge elements) that enable the distributed switch to scale bandwidth based on the size of the membership of a multicast group. Moreover, each surrogate may optimize the hierarchy according to one or more optimization criteria. For example, each surrogate in the hierarchy may have the necessary information to ensure that if the next surrogate in the hierarchy is unavailable, the data may be routed to a backup surrogate. The selected hierarchy may be further optimized by skipping surrogates (or a surrogate level) such that the data intended for a skipped surrogate is sent to a surrogate in a lower-level of the hierarchy. This may better utilize the connection interfaces in the transmitting sub-switches and eliminate any unnecessary surrogate-to-surrogate transfers. |
US08953614B2 |
Data communication system and address setting method for setting an IP address
To set an IP address to an apparatus existing beyond a router, a first apparatus requests a second apparatus via the router to set an IP address to a third apparatus. Upon reception of the request, the second apparatus sets to the third apparatus the IP address instructed by the first apparatus. |
US08953609B1 |
Packet-data-network-specific addressing solutions for clients relying on proxy-based mobility
A wireless client terminal includes an application module, a service mapping module, and an address determination module. The application module determines first and second services requested by applications. The service mapping module stores a table that maps services to access point names. Each access point name identifies a respective packet data network. The address determination module transmits an address request message, including access point names corresponding to the services, to a media access gateway and receives an address response message. The address determination module determines first and second addresses based on address information in the address response message. The application module transmits a first packet to the media access gateway. The source address of the first packet is set to the first address when the first packet is related to the first service and to the second address when the first packet is related to the second service. |
US08953605B1 |
Methods and apparatus for a handshake protocol in a LAG-based multipath switch fabric for multipath OAM
In some embodiments, an apparatus comprises a first switch configured to define an initialization packet that has a header value associated with a port from a set of ports associated with a link aggregation group. The first switch is configured to send the initialization packet to a second switch via the port based on the header value. The first switch is configured to receive an acknowledgement packet including the header value from the second switch in response to the second switch receiving the initialization packet. The first switch is configured to retrieve the header value from the acknowledgement packet such that the first switch defines, in response to the first switch receiving the acknowledgement packet, a response packet having the header value. The first switch is configured to send the response packet to the second switch via the port based on the header value. |
US08953603B2 |
Methods and apparatus related to a distributed switch fabric
A method of sending data to a switch fabric includes assigning a destination port of an output module to a data packet based on at least one field in a first header of the data packet. A module associated with a first stage of the switch fabric is selected based on at least one field in the first header. A second header is appended to the data packet. The second header includes an identifier associated with the destination port of the output module. The data packet is sent to the module associated with the first stage. The module associated with the first stage is configured to send the data packet to a module associated with a second stage of the switch fabric based on the second header. |
US08953602B2 |
Network data storing system and data accessing method
The present disclosure provides a network data storage system and a network data access method. The disclosed network data storage system includes: a data node, used for storing a data unit; a metadata node, used for storing and managing routing information and providing the routing information according to a data processing request of a client; and a data management node, used for processing the requested data unit in the data node according to a data access request of the client. The disclosed system and method may improve access performance of network data, enhance expansibility of a system, and lower expansion cost. |