API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Streamdata.io

Streamdata is a software vendor making real-time data accessible to all by operating a proxy turning request / response APIs into feeds of real-time events.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

User-guided object identification

A user attempting to obtain information about an object can capture image information including a view of that object, and the image information can be used with a matching or identification process to provide information about that type of object to the user. In order to narrow the search space to a specific category, and thus improve the accuracy of the results and the speed at which results can be obtained, the user can be guided to capture image information with an appropriate orientation. An outline or other graphical guide can be displayed over image information captured by a computing device, in order to guide the user in capturing the object from an appropriate direction and with an appropriate scale for the type of matching and/or information used for the matching. Such an approach enables three-dimensional objects to be analyzed using conventional two-dimensional identification algorithms, among other such processes.

  • Pub Date: 2014/31/12
  • Number: 09332189
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Trusted computing

A trusted computing device (TCD) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an isolated environment processor (IEP), memory (secure and non-secure partition), and an auxiliary processor (AP). Memory and AP are connected for data communication with the IEP, and communicate with a host only through the IEP. The host interface and each secure interface are connected for data communication with the IEP. The instructions provision TCD for cryptographic operations via a secure interface; present a first file system partition comprising a write file and a read file with file creation/deletion privileges allocated only to the IEP at the host interface via the IEP; present a non-secured file system partition with access to the non-secure partition via the host interface via the IEP; receive, via the write file, requests to perform trusted computing; perform requested computing using the IEP, secure memory, and AP; and write results to the read file.

  • Pub Date: 2014/31/12
  • Number: 09569638
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for multi-signal fault analysis

Systems and methods for multi-signal fault analysis are described. The system receives signal message information, over a network, from a collection device comprised of a plurality of mobile devices including a first mobile device and a second mobile device that are associated with a first user. The first signal message information includes a first maintenance message including characterization information that was received by the first mobile device from a component that includes a sensor that operates to sense a first part that is assembled into a vehicle. The second signal message information includes signal information that was received by the second mobile device including an audio signal that a microphone in the second mobile device sensed. The system analyzes the multi-signal information to diagnose a problem and communicate a message to the first user with a diagnosis of the problem.

  • Pub Date: 2014/31/12
  • Number: 09563986
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for automatically applying firewall policies within data center applications

The disclosed method may include (1) identifying a data center application whose functionality is provided by a set of systems, (2) organizing, automatically by the computing device, the set of systems into one or more application model groups by, for each system in the set of systems, identifying an attribute of the system that is indicative of a security context under which the system should operate and assigning the system to an application model group for which the security context will be provided, and (3) for each application model group in the one or more application model groups, protecting the application model group by selecting a firewall configuration that will provide the security context for the application model group and by using the selected firewall configuration to protect the application model group. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2014/31/12
  • Number: 09438560
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System for a distributed file system element collection

Disclosed in some examples is a data distribution mechanism for distributing a collection of file system elements across one or more computing devices. The system can include a plurality of nodes implemented on a machine. The data distribution mechanism may be used in connection with data synchronization, sharing, backup, archiving, and versioning operations for a plurality of connected machines on behalf of one or a plurality of users.

  • Pub Date: 2014/31/12
  • Number: 09053124
  • Owner: Code 42 Software, Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a scalable server-implemented regression query environment for remote testing and analysis of a chip-design model

A system and method for providing a scalable server-implemented regression query environment for remote testing and analysis of a chip-design model receives chip-design information, including the chip-design model to be tested and one or more attributes for testing the chip design model; receives a first regression simulation test request from the client-side integration client; initiates a proxy instance for a first regression simulation test to be executed by an application programming interface (API), based on the first regression simulation test request; selects, by the API, the attributes for testing the chip-design model; executes, by the API, the first regression simulation test on the chip-design model using the selected attributes; monitors, by a server-side database manager, the first regression simulation test during execution of the first regression simulation test; and stores, by the server-side database manager, one or more results of the first regression simulation test in a database.

  • Pub Date: 2014/31/12
  • Number: 09558307
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for biometric protocol standards

A one-time certificate is provided that enables an initial two-way secured communication session between a user computing device and a trusted server. An initial secured communication session is established by the trusted server with the user computing device after receiving the one-time certificate. The trusted server receives identification information associated with the user of the user computing device, wherein the identification information includes a representation of the user's identity that has been confirmed as a function of biometrics and further includes a representation of the user computing device. Moreover, the trusted server generates a replacement certificate that is unique to the combination of the user and the user computing device, and transmits the replacement certificate to the user computing device. Thereafter, a two-way secured communication session is established, by the trusted server, with the user computing device each time the replacement certificate is received by the trusted server.

  • Pub Date: 2014/31/12
  • Number: 09380052
  • Owner: HOYOS LABS IP LTD.
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Source control management system with contingent dependency handling

Systems and methods for managing dependencies in a source control management system or revision control system are provided. A request to commit a first modified component of a software application may be received. The software application may include a plurality of components. In response to the request to commit the first modified component, a blocking condition may be identified. The blocking condition may be a dependency of the first modified component, in that the first modified component depends upon a second component of the software application. The second component may not satisfy the dependency. A request to commit a modified version of the second component may be received. A determination may be made that the modified version of the second component satisfies the dependency of the first modified component upon the second component. The first modified component and second modified component may then be committed.

  • Pub Date: 2014/31/12
  • Number: 09535689
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Smart invitation handling at a smart-home

This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.

  • Pub Date: 2014/31/12
  • Number: 09600645
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Secure host communications

A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A user provides a communication to the trusted device via the secure interface. A processor of the isolated environment encrypts the communication and transmits the encrypted communication to a read file of the host interface. A host device connected to the trusted device via the host interface receives the encrypted communication. The host device transmits the encrypted communication to a second host device that is connected to a second trusted device via a second host interface. The second host device transmits the encrypted communication to a write file of the second host interface. A processor in an isolated environment of the second trusted device decrypts the communication and provides the decrypted communication to a second user via a secure interface of the second trusted device.

  • Pub Date: 2014/31/12
  • Number: 09537833
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Secure handling of unsupervised package drop off at a smart-home

This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.

  • Pub Date: 2014/31/12
  • Number: 09652912
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Secure event log management

A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A write file of the host interface receives an entry from an untrusted host device connected to the trusted device. A processor of the isolated environment retrieves the entry and determines log data associated with the entry, such as the date and time of the entry. Using the log data, the processor records an event log entry in a secure storage of the isolated environment. Once recorded, the entry cannot be deleted or altered. An authorized user, however, can then access the event log entry from the secure storage, such as by providing a request for the event log entry via the secure interface of the trusted device and/or the host interface of the trusted device.

  • Pub Date: 2014/31/12
  • Number: 09547773
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Predicting computer model accuracy

A social networking system receives messages from users that include hashtags. The social networking system may use a natural language model to identify terms in the hashtag corresponding to words or phrases of the hashtag. The words or phrases may be used to modify a string of the hashtag. The social networking system may also generate computer models to determine likely membership of a message with various hashtags. Prior to generating the computer models, the social networking system may filter certain hashtags from eligibility for computer modeling, particularly hashtags that are not frequently used or that more typically appear as normal text in a message instead of as a hashtag. The social networking system may also calibrate the computer model outputs by comparing a test message output with outputs of a calibration group that includes positive and negative examples with respect to the computer model output.

  • Pub Date: 2014/31/12
  • Number: 09569727
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Optimized system for analytics (graphs and sparse matrices) operations

A graph processing system includes a graph API (Application Program Interface), as executed on a processor of a computer and as capable of implementing any of a plurality of graph operators to express computations of input graph analytics applications. A run-time system, executed by the processor, implements graph operators specified by each graph API function and deploys the implemented graph operators to a selected computing system. A library contains multiple implementations for each graph API function, each implementation predetermined as being optimal for a specific set of conditions met by a graph being processed, for functional capabilities of a specific computing system on which the graph is being processed, and for resources available on that specific computing system.

  • Pub Date: 2014/31/12
  • Number: 09304835
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Occupant notification of visitor interaction with a doorbell at a smart-home

This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.

  • Pub Date: 2014/31/12
  • Number: 09626841
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Modifying directions to a parking lot associated with a venue based on traffic conditions proximate to the parking lot

A venue is associated with various parking lots, and a user may purchase a space in one of the parking lots. A venue management system associated with the venue stores an association between the user and the parking lot. Based on a location of a client device associated with the user, the venue management system communicates navigation directions to the client device for presentation to the user. The directions communicated to the client device account for traffic conditions within a threshold distance of the parking lot, and the venue management system may modify stored directions to the parking lot based on the traffic conditions and communicate the modified directions to the client device for presentation to the user. Additionally, the traffic conditions used by the venue management system include information describing on current usage of various parking lots associated with the venue to allow the user to bypass congestion.

  • Pub Date: 2014/31/12
  • Number: 09489846
  • Owner: VenueNext, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Live migration of virtual machines with memory state sharing

Embodiments described herein rapidly migrate child virtual machines (VM) by leveraging shared memory resources between parent and child VMs. In a first, proactive phase, parent VMs are migrated to a plurality of potential target hosts. In a second, reactive phase, after a request is received to migrate a child VM to a selected target host, memory blocks that are unique to the child VM are migrated to the selected target host. In some examples, memory blocks are compressed and decompressed as needed. In other examples, the operation environment is modified. Aspects of the disclosure offer a high performance, resource efficient solution that outperforms traditional approaches in areas of software compatibility, stability, quality of service control, resource utilization, and more.

  • Pub Date: 2014/31/12
  • Number: 09626212
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Interacting with a detected visitor at an entryway to a smart-home

This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.

  • Pub Date: 2014/31/12
  • Number: 09640055
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying expanding hashtags in a message

A social networking system receives messages from users that include hashtags. The social networking system may use a natural language model to identify terms in the hashtag corresponding to words or phrases of the hashtag. The words or phrases may be used to modify a string of the hashtag. The social networking system may also generate computer models to determine likely membership of a message with various hashtags. Prior to generating the computer models, the social networking system may filter certain hashtags from eligibility for computer modeling, particularly hashtags that are not frequently used or that more typically appear as normal text in a message instead of as a hashtag. The social networking system may also calibrate the computer model outputs by comparing a test message output with outputs of a calibration group that includes positive and negative examples with respect to the computer model output.

  • Pub Date: 2014/31/12
  • Number: 09646263
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Heterogeneous media packet bridging

Methods and systems for bridging network packets transmitted over heterogeneous media channels are provided. According to one embodiment, a network switching/routing blade server comprises network interfaces, including a first and second set operable to receive packets encapsulated within a first and second set of media transmissions, respectively, and each having a first and second framing media format, respectively. A single bridging domain is provided by a shared bridging application. A memory stores data structures for translating between the first and second framing media formats via an intermediate format. The netmods pass a received packet, through a switching fabric, to the bridging application, which determines a relay location for the packet and whether the relay location is among the other set of netmods. Responsive to an affirmative determination, the bridging application uses the translation data structures to translate the packet before relaying the packet to the relay location.

  • Pub Date: 2014/31/12
  • Number: 09331961
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Development system and method for providing external functionality

A system of one or more computing devices includes a user interface presented to a developer. A data store stores information identifying multiple functions, each corresponding to external functionality available from third party applications. The developer selects at least one of the functions to supplement functionality of a first application. A code generation module provides a software object for incorporation into the first application. The software object includes instructions for transmitting a query wrapper to a search system. The query wrapper includes a predefined text string corresponding to one of the functions selected by the developer. The software object includes instructions for receiving and displaying a result set including multiple items, each including a name and corresponding access mechanism of an application. The software object includes instructions for, in response to user selection of a first item, actuating the access mechanism to download or open the corresponding application.

  • Pub Date: 2014/31/12
  • Number: 09645797
  • Owner: Quixey, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Data processing system and method thereof

Several systems and methods for data processing are disclosed. In an embodiment, a data processing system includes a host processor, a plurality of slave processors and a plurality of frame buffers. Each slave processor is associated with at least one data co-processor configured to process data sub-frames based on one processing stage. For a first data sub-frame, a first messaging call is provisioned to the host processor by each slave processor subsequent to execution of a processing stage by an associated data co-processor. The host processor is configured to provision a second messaging call to a next slave processor upon receiving the first messaging call. Further, for each subsequent data sub-frame, a third messaging call is provisioned by each slave processor to a next slave processor subsequent to execution of the corresponding processing stage by the associated data co-processor for facilitating execution of the next processing stage.

  • Pub Date: 2014/31/12
  • Number: 09576333
  • Owner: TEXAS INSTRUMENTS INCORPORATED
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Vehicle use and performance restrictions based on detected users

There are provided systems and methods for vehicle use and performance restrictions based on detected users. A user may check-in to a vehicle so that the vehicle identifies the user, such as through providing identification to the vehicle using biometrics, logins, or other information. Using the identification, the vehicle may determine parameters and restrictions on use of the vehicle by the user. Parameters may include information about the user, such as age, health, or other statistic stored with the identification for the user, and may be utilized to determine restrictions on use of the vehicle by the user, such as a speed of the vehicle and passengers allowed in the vehicle. Restrictions may also be set for the user, including speeds of travel, routes of travel, and usage of media players in the vehicle. The usage of the vehicle may be monitored and enforced using the restrictions.

  • Pub Date: 2014/30/12
  • Number: 09586596
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for graph based natural language processing

Techniques for graph based natural language processing are described. In one embodiment an apparatus may comprise a client service component operative on the processor circuit to receive a natural language user request from a device and to execute the natural language user request based on matched one or more objects and a social object relation component operative on the processor circuit to match the natural language user request to the one or more objects in an object graph, the object graph comprising token mappings for objects within the object graph, the token mappings based on data extracted from a plurality of interactions by a plurality of users of the network system, wherein the one or more objects are matched with the natural language user request based on the token mappings. Other embodiments are described and claimed.

  • Pub Date: 2014/30/12
  • Number: 09589305
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for wait time estimation

A system or method is provided to estimate wait time at a line or a queue. In particular, the system may estimate the wait time at a line by detecting the presence of a user at the line via Bluetooth Low Energy (BLE) communication. In an embodiment, the system may detect when the user enters the line and when the user departs from the line via BLE beacons and may estimate the wait time at the line based on how long the user is in line. In an embodiment, a grid of multiple BLE beacons may be installed or provided at the location of the line to track the location and movement of a user. The system may determine the wait time for the line based on the location and the movement of the user.

  • Pub Date: 2014/30/12
  • Number: 09456309
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for monitoring programs

A computer-implemented method for monitoring programs may include (1) placing a program within an enclave that includes a protected address space that code outside of the protected address space is restricted from accessing, (2) hooking an application programming interface call within the program in the enclave to monitor the behavior of the program, (3) inserting an enclave entry instruction into code outside of the protected address space that the program accesses through the hooking of the application programming interface call, and (4) monitoring the behavior of the program by executing the program within the enclave in an attempt to force the program to use the hooked application programming interface call in order to access data outside the enclave. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2014/30/12
  • Number: 09552481
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for image object recognition based on location information and object categories

Systems, methods, and non-transitory computer-readable media can identify a set of regions corresponding to a geographical area. A collection of training images can be acquired. Each training image in the collection can be associated with one or more respective recognized objects and with a respective region in the set of regions. Histogram metrics for a plurality of object categories within each region in the set of regions can be determined based at least in part on the collection of training images. A neural network can be developed based at least in part on the histogram metrics for the plurality of object categories within each region in the set of regions and on the collection of training images.

  • Pub Date: 2014/30/12
  • Number: 09495619
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for smart registration of wireless power receivers in a wireless power network

The embodiments described herein include a transmitter that transmits a power transmission signal (e.g., radio frequency (RF) signal waves) to create a three-dimensional pocket of energy. At least one receiver can be connected to or integrated into electronic devices and receive power from the pocket of energy. A wireless power network may include a plurality of wireless power transmitters each with an embedded wireless power transmitter manager, including a wireless power manager application. The wireless power network may include a plurality of client devices with wireless power receivers. Wireless power receivers may include a power receiver application configured to communicate with the wireless power manager application. The wireless power manager application may include a device database where information about the wireless power network may be stored.

  • Pub Date: 2014/30/12
  • Number: 09538382
  • Owner: Energous Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Secure data exchange between data processing systems

A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.

  • Pub Date: 2014/30/12
  • Number: 09363237
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Refresh interval independent fast reroute facility protection tear down messaging

In one example, techniques of this disclosure may enable a point of local repair (PLR) network device to signal availability of link protection or node protection to a merge point (MP) network device and enable a network device to actively determine whether or not it is a merge point router. Based on whether or not the network device determines it is a MP, the network device may selectively clean up LSP states when there is an upstream link or node failure. The RSVP-TE protocol may be extended to enable a network device to send a tear down message to a downstream router, which may enable the downstream router to conditionally delete locale LSP state information. In some instances, a PLR network device may directly send a tear down message to a MP network device even though the PLR network device may not have a working bypass LSP.

  • Pub Date: 2014/30/12
  • Number: 09590895
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Preemptive operating system without context switching

A device, such as a constrained device that includes a processing device and memory, schedules user-defined independently executable functions to execute from a single stack common to all user-defined independently executable functions according to availability and priority of the user-defined independently executable functions relative to other user-defined independently executable functions and preempts currently running user-defined independently executable function by placing the particular user-defined independently executable function on a single stack that has register values for the currently running user-defined independently executable function.

  • Pub Date: 2014/30/12
  • Number: 09280389
  • Owner: Tyco Fire & Security GmbH
  • Location: Neuhausen am Rheinfall, CH
  • Details: Visit USPTO

Visit USPTO Page


Permission management method, apparatus, and terminal

A permission management method, apparatus, and terminal. The permission management method includes obtaining an installation package of a first application program, where the installation package carries a first certificate and permission request information of the first application program; next, determining, according to the permission request information, a first permission that the first application program requires during running, where the first permission is a system administrator permission of a system; and then, granting the first permission to the first application program according to the first certificate of the first application program. In this way, the first permission that the first application program requires during running is granted to the first application program.

  • Pub Date: 2014/30/12
  • Number: 09614834
  • Owner: Huawei Device Co., Ltd.
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Organizing messages in a messaging system using social network information

A messaging system receives a message that is intended for a recipient, who is a user of a social networking system. An object associated with the message is identified based on the message content and/or metadata associated with the message. The messaging system accesses a social networking system database to obtain social information about a relationship between the recipient and the identified object. The message is then indexed using the social information, wherein an entry for the message is stored in a message index based on the social information. This process may be repeated for each received message, and multiple different message indexes may be generated for received messages to track different types of social information. A user interface for viewing messages uses the message index to organize the messages, such as to filter, categorize, and/or sort the messages in the display.

  • Pub Date: 2014/30/12
  • Number: 09356905
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Off-premises alert system and method for wireless power receivers in a wireless power network

Embodiments in the present disclosure may be directed to an off-premises alert system and method for one or more wireless power receivers in a wireless power network. The system and method may include automated software embedded on a wireless power receiver that may be triggered every time a wireless power receiver is turned on. The system and method may be employed in stores where customers may use wireless power receivers to charge their mobile devices such as smartphones, tablets, and the like, while being inside the store. The method may prevent customers from not returning the wireless power receiver by producing an audible alert in the power receiver. If customer fails to return wireless power receiver, the method may then automatically report details regarding the lost wireless power receiver to an appropriate authority through automatic communication connection through any intervening network cloud-based media.

  • Pub Date: 2014/30/12
  • Number: 09368020
  • Owner: Energous Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Occupant monitoring systems and methods

Various implementations relate to an operator monitoring system (OMS). Certain implementations include an OMS coupled to a rotatable portion of a steering wheel assembly of a vehicle. For example, the OMS may include an imaging unit, such as a camera, that is coupled to a central hub portion of the steering wheel assembly. The imaging unit has a field of view directed toward one or more occupants in the vehicle and is configured to capture an image signal corresponding to an imaging area in the field of view. The imaging area can be configured to encapsulate an expected position of one or more vehicle occupants. The OMS also includes one or more processing units in electrical communication with the imaging unit that receives and processes the image signal from the imaging unit to determine an occupant state and, in some implementations, provide feedback based on the determined occupant state.

  • Pub Date: 2014/30/12
  • Number: 09533687
  • Owner: TK Holdings Inc.
  • Location: Auburn Hills, US
  • Details: Visit USPTO

Visit USPTO Page


Network topology optimization

In some examples, a controller for a multi-layer network comprising a network layer and an underlying transport layer is configured to obtain abstract link data describing a plurality of candidate links; determine, based at least on the abstract link data, a first solution comprising a network topology for the network layer that includes a first selected subset of the candidate links; determine, after generating a modified network topology based at least on the network topology and the abstract link data, a second solution comprising the modified network topology for the network layer that includes a second selected subset of the candidate links; and output, for configuring the multi-layer network, topology data for one of the first solution or the second solution having a lowest total cost, the lowest total cost including a total resource cost to the network for the one of the first solution or the second solution.

  • Pub Date: 2014/30/12
  • Number: 09602387
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Natural language access to application programming interfaces

Users of online services may avoid having to gain knowledge of the intricacies of specific Application Programming Interface (API) syntaxes and elements by using natural language requests which are processed to extract components of the request. The components are then used to find one or more matches of known APIs, and then at least one structured API call is constructed by mapping the request's components to the structured API call's elements. The system can then invoke the online service on behalf of the client, and return the results to the client, or it can return the constructed structured API call to the client. The known API details can be initialized and updated by ingesting the description documents for the structured APIs, and then using natural language processing to extract components from the descriptions, which can then be utilized in the matching process to further enhance the results of the tool.

  • Pub Date: 2014/30/12
  • Number: 09092276
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing an intelligent alarm notification

An approach is provided for providing alarm notification to the intended user while minimizing disturbance to the nearby users. The approach involves determining sensor information associated with at least one first user and at least one second user collected while the at least one first user and the at least one second user are asleep. The approach also involves processing and/or facilitating a processing of the sensor information to determine sleep characteristic information for the at least one first user, the at least one second user, or a combination thereof. The approach further involves determining one or more alarm notification parameters for one or more alarm notifications based, at least in part, on the sleep characteristic information to direct the one or more alarm notifications to the at least one first user while minimizing a disturbance of the at least one second user.

  • Pub Date: 2014/30/12
  • Number: 09588498
  • Owner: NOKIA TECHNOLOGIES OY
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Intra-area LDP node protection

Techniques are described for providing fast reroute intra-area node protection for label switched paths (LSPs) using label distribution protocol (LDP). In one example, a network device may be configured to use network topology information, obtained by an Interior Gateway Protocol (IGP) executing on the network device, to identify a next next hop merge point to which to automatically establish a bypass LSP, and to which to establish a targeted LDP session for obtaining a label advertised by the next next hop merge point.

  • Pub Date: 2014/30/12
  • Number: 09590844
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Inter-area LDP node protection

Techniques are described for providing fast reroute inter-area node protection for label switched paths (LSPs) using label distribution protocol (LDP). In one example, a network device may be configured to determine that a protected node is an area border router, and use network topology information, obtained by an Interior Gateway Protocol (IGP) executing on the network device, to identify a second area border router in the same IGP area as the protected node, to which to automatically establish a bypass LSP and a targeted LDP session.

  • Pub Date: 2014/30/12
  • Number: 09590845
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Fault-tolerant communications in routed networks

A method for providing fault-tolerant network communications between a plurality of nodes for an application, including providing a plurality of initial communications pathways over a plurality of networks coupled between the plurality of nodes, receiving a data packet on a sending node from the application, the sending node being one of the plurality of nodes, the data packet being addressed by the application to an address on one of the plurality of nodes, and selecting a first selected pathway for the data packet from among the plurality of initial communications pathways where the first selected pathway is a preferred pathway.

  • Pub Date: 2014/30/12
  • Number: 09253293
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Establishing label switched paths having refresh interval independent fast reroute facility protection

In one example, techniques of this disclosure may enable a point of local repair (PLR) network device to signal availability of link protection or node protection to a merge point (MP) network device and enable a network device to actively determine whether or not it is a merge point router. Based on whether or not the network device determines it is a MP, the network device may selectively clean up LSP states when there is an upstream link or node failure. The RSVP-TE protocol may be extended to enable a network device to send a tear down message to a downstream router, which may enable the downstream router to conditionally delete locale LSP state information. In some instances, a PLR network device may directly send a tear down message to a MP network device even though the PLR network device may not have a working bypass LSP.

  • Pub Date: 2014/30/12
  • Number: 09590894
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Emergency monitoring of tagged objects

There are provided systems and methods for remote monitoring of tagged physical objects in an emergency. A user may set up a series of beacons at a facility of the user, such as an office or hospital. The beacons may connect to tag devices as the devices enter a coverage area for the wireless beacons or upon request by a service provider server in an emergency situation. The beacons communicate distance information regarding the tag devices and associated physical objects to a service provider server. The service provider server may determine the location of a physical object and provides the location to the user or to emergency personnel. In an emergency, the service provider server may provide a notification to a specific subset of users, in which the notification includes the location of a physical object of interest to the subset of users because of the emergency condition.

  • Pub Date: 2014/30/12
  • Number: 09536407
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic message management with conversation participation status

Electronic message management with conversation participation status is enabled. Accordingly, time may be saved and lost productivity due to overload of messages may be reduced. Electronic conversations may be associated with a set of participants. Each participant may have a varying and/or changing level of interest in the conversation. Each participant may specify a conversation participation status and the conversation participation status and/or user status of each participant may be communicated and/or presented to each of the other participants. Messaging clients may change presentation of conversations and/or electronic messages for a participant based on the participant's specified conversation participation status. Participants sending messages may specify message status specific for each participant to alter treatment of message that would be based on participant status and/or conversation participation status when message is received by each participant.

  • Pub Date: 2014/30/12
  • Number: 09509650
  • Owner: BetterEmailing, LLC
  • Location: Orinda, US
  • Details: Visit USPTO

Visit USPTO Page


Companion application for activity cooperation

The described embodiments augment an activity performed in a first application at a source electronic device using a controller at a companion electronic device. The source electronic device receives controller information describing a controller that the activity performed in the first application accepts controller data from, determines a controller identifier for the controller information, and broadcasts a controller advertisement comprising the controller identifier. Upon receiving the controller advertisement, the companion electronic device determines whether a second application that can provide the controller data is available at the companion electronic device. If the second application is available, the companion electronic device establishes a cooperative-activity communication channel with the source electronic device. The companion electronic device uses the cooperative-activity communication channel to provide controller data to the source electronic device. The source electronic device provides the controller data to the first application to cause a corresponding action to be performed.

  • Pub Date: 2014/30/12
  • Number: 09544714
  • Owner: APPLE INC.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Assignment of wavelengths to optical signals in an optical network

A method may include determining, by a device, a wavelength identifier graph corresponding to an optical network based on a set of lightpath conflicts, for a set of optical signals, associated with a set of links and a set of nodes of the optical network. One or more optical signals may be associated with transmission via a super-channel. The method may further include selectively assigning, by the device, a wavelength identifier to an optical signal, of the set of optical signals, based on the wavelength identifier graph. The wavelength identifier being associated with a set of wavelength identifiers and corresponding to a wavelength of a set of wavelengths. The method may further include causing, by the device, the optical signal to utilize the wavelength, of the set of wavelengths, for transmission via the optical network.

  • Pub Date: 2014/30/12
  • Number: 09445166
  • Owner: Infinera Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for peer-to-peer network sharing

Techniques for peer-to-peer network sharing are described. In one embodiment, an apparatus may comprise a sharing control component and a local proxy component. The sharing control component may be operative to transmit an offer from the first mobile device to a second mobile device for the second mobile device to act as a proxy for the first mobile device for the performance of network services in return for a transfer of sharing credit from a first account to a second account with a sharing authority, the first account associated with the first mobile device, the second account associated with the second mobile device, and receive an offer acceptance from the second mobile device. The local proxy component may be operative to receive configuration information and configure the first mobile device to use the second mobile device as a network proxy using the configuration information. Other embodiments are described and claimed.

  • Pub Date: 2014/29/12
  • Number: 09485772
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for lossy compression of image color profiles

In one embodiment, an image is received by a computing device, the image corresponding to a first color space. A color profile is created for transforming the image from the first color space to a second color space, the creation of the color profile being based on an approximation function for transforming the image. The approximation function is determined by a polyline which comprises a number of line segments. The polyline is separated from an ideal function curve for transforming the image by an error value that is within a pre-determined threshold.

  • Pub Date: 2014/29/12
  • Number: 09264581
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Source code editor

Disclosed herein are technologies for facilitating source code editing. In accordance with one aspect, a request for an editing feature is received in response to an editing operation associated with a library. In response to the request, metadata may be extracted from the source code file of the library and used to present the editing feature.

  • Pub Date: 2014/29/12
  • Number: 09448770
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method for improving an MCU's performance using common properties of the H.264 codec standard

This disclosure describes an apparatus () for improving performance of a multipoint control unit (). The apparatus () provides a video stream manipulator () and a multipoint control unit (). The video stream manipulator () may encode one or more video streams in a predetermined video codec standard separately. Each of the encoded video streams includes at least one encoded video frame made of a plurality of macroblocks, where the macroblocks are segregated into a predetermined number of macroblock lines. The multipoint control unit () may assemble predetermined number of macroblock lines from each of the encoded video streams in a predetermined composition.

  • Pub Date: 2014/29/12
  • Number: 09432624
  • Owner: ClearOne Communications Hong Kong Ltd.
  • Location: Hong Kong, HK
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing service

A mobile device and a method performed by the mobile device for receiving a service from a service providing apparatus are provided. The method includes receiving a signal which is emitted from the beacon apparatus, wherein the mobile device is located within vicinity of the beacon apparatus; determining an intensity of the received signal; requesting the service providing apparatus for a service based on the determined intensity; and receiving the service from the service providing apparatus.

  • Pub Date: 2014/29/12
  • Number: 09338593
  • Owner: Samsung Electronics Co., Ltd
  • Location: , KR
  • Details: Visit USPTO

Visit USPTO Page


Dynamic web content via contextually aware text messaging

A system may provide dynamic web-based content in conjunction with text message content. A user may use text messages to interact with web content (e.g., to select hyperlinks, request information, provide information, etc.). A content server may process the text messages, sent by the user, in order to determine web content to provide to the user. The text messages may be authenticated by a message relay server, thereby eliminating the need for the content server to request authentication or identification information from the user.

  • Pub Date: 2014/29/12
  • Number: 09544746
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling runtime execution from a host to conserve resources

A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms.

  • Pub Date: 2014/29/12
  • Number: 09448840
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Computer instructions for limiting access violation reporting when accessing strings and similar data structures

Embodiments are directed to a method of accessing a data frame. The method includes, based at least in part on a determination that the data frame spans first and second memory blocks, and further based at least in part on a determination that the processor has access to the first and second memory blocks, accessing the data frame. The method includes, based at least in part on a determination that the data frame spans the first and second memory blocks, and based at least in part on a determination that the processor has access to the first memory block but does not have access to the second memory block, accessing a first portion of the data frame that is in the first memory block, and accessing at least one default character as a replacement for accessing a second portion of the data frame that is in the second memory block.

  • Pub Date: 2014/29/12
  • Number: 09569127
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Combining server-side and client-side user interface elements

A method and apparatus are disclosed for combining server-supplied user interface elements with client-supplied user interface elements. The server-supplied user interface elements can be received by a client device and inserted into a client-supplied object model, such as a Document Object Model (DOM). The object model can then be used to render a page, such as a webpage. By injecting server-supplied user interface elements into a client object model, the client can intelligently combine UI elements from a server with UI elements from a client. In the situation where there are conflicting or overlapping UI elements, the client device can modify the object model to eliminate such conflicts or overlaps.

  • Pub Date: 2014/29/12
  • Number: 09582601
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Call holding management

A system or a method may be provided that automatically distinguishes between a hold status and when someone live is talking on the phone. For example, the caller's phone may detect when the call holding has ended and a customer service representative is now actually on the line. The phone may alert the user to pick up the call at that time, such as utilizing a call-back mechanism. In an embodiment, the system may analyze and learn the various call holding music or recordings of call centers. The system may detect when the call holding music or recording ends in a telephone call and may alert the user.

  • Pub Date: 2014/29/12
  • Number: 09571639
  • Owner: EBAY INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Radio resource control (RRC) protocol for integrated WLAN/3GPP radio access technologies

An integrated WLAN/WWAN Radio Access Technology (RAT) architecture is described in which signaling used to control the integration of the WLAN/WWAN architecture is performed over the Radio Resource Control (RRC) plane. The integrated architecture may provide a network-controlled framework for performing traffic steering and radio resource management.

  • Pub Date: 2014/26/12
  • Number: 09609566
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Progress meters in parallel computing

Systems and methods may provide a set of cores capable of parallel execution of threads. Each of the cores may run code that is provided with a progress meter that calculates the amount of work remaining to be performed on threads as they run on their respective cores. The data may be collected continuously, and may be used to alter the frequency, speed or other operating characteristic of the cores as well as groups of cores. The progress meters may be annotated into existing code.

  • Pub Date: 2014/26/12
  • Number: 09477533
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless beacon devices for use in tracking user locations during group travel

There are provided systems and methods for wireless beacon devices for use in tracking user locations during group travel. A user may take a trip on a vehicle, such as a bus, train, cruise ship, or other large travel vehicle. The users may disembark the vehicle in order to visit a location but plan to travel further on the vehicle. Thus, when the vehicle is attempting to leave the location where the users have left the vehicle, the vehicle may be required to again account for each passenger. The vehicle may utilize a wireless beacon located near an entrance and/or onboard the vehicle to account for each passenger. The wireless beacon may connect to a communication device of each user when the communication device is in proximity to the wireless beacon and, thus, inform the vehicle's operator that each user in located on the vehicle.

  • Pub Date: 2014/24/12
  • Number: 09641985
  • Owner: EBAY INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


User interface for controlling use of a business environment on a mobile device

A graphical user interface to provision business environments on mobile devices presents a navigation panel that displays a virtual phone template menu item and a policy setting menu item. Upon selection of the virtual phone template menu item, a template user interface is presented that enables an administrator to customize virtual phone image templates for users to be delivered to mobile devices that are configured to run the virtual phone image templates as virtual machines on the mobile devices in order to provide a business environment. Upon selection of the policy setting menu item, a policy user interface is presented that enables the administrator to set security policies, wherein each of the security policies specifies a time interval within which a mobile device running a virtual machine corresponding to one of the virtual phone image templates should communicate with an enterprise server to comply with the security policy.

  • Pub Date: 2014/24/12
  • Number: 09544274
  • Owner: VMWARE, INC.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for in-device co-existence interference avoidance for dual connectivity

Systems and methods disclosed herein provide in-device co-existence interference avoidance for a wireless communication device in dual connectivity with a master node and a secondary node. Time-division multiplexing (TDM) assistance information sent by the wireless communication device is forwarded from the master node to the secondary node. The master node and/or the secondary node uses the TDM assistance information to determine a TDM solution for the in-device co-existence interference in the wireless communication device.

  • Pub Date: 2014/24/12
  • Number: 09509485
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing global platform compliant trusted execution environment

Method of providing a Global Platform (GP) compliant Trusted Execution Environment (TEE) starts with main processor executing an application stored in memory device. Application includes client application (CA) and trusted application (TA). Executing the application includes running CA in client process and TA in TEE host process. Client process and TEE host process are separate. Using TEE host process, a request including identifier of the TA is received from client process to open session. Using GP Trusted Services enclave included in TEE host process, TA enclave associated with the identifier is determined and loaded in the TEE host process using the GP Trusted Services enclave to establish the session. Using TEE host process, commands to be invoked in TA enclave and set of parameters needed for commands are received from client process. Using GP Internal APIs, commands in TA enclave associated with identifier are executed. Other embodiments are also described.

  • Pub Date: 2014/24/12
  • Number: 09444627
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Register for counting and tracking items in a bag

A register for counting and tracking items in a bag comprises a manifest and an RFID reader. The RFID reader is used to query a plurality of RFID tags attached to items contained in the bag. The register creates reports counting and/or identifying changes to items contained in the bag while the bag is routed and/or items in the bag are processed for a customer.

  • Pub Date: 2014/24/12
  • Number: 09177186
  • Owner: DUFL, Inc.
  • Location: Tempe, US
  • Details: Visit USPTO

Visit USPTO Page


Peripheral device management

A method, system, apparatus, and computer program product are provided for providing peripheral device management. For example, a method is provided that includes receiving, from a user device, a request to access at least one peripheral device, the request comprising information regarding the user device. The method may further include determining, based at least in part on at least one compliance rule and the information regarding the user device, whether to grant the request, and, in an instance in which it is determined to grant the request, causing access to the at least one peripheral device by the user device to be facilitated.

  • Pub Date: 2014/24/12
  • Number: 09514078
  • Owner: AirWatch LLC
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method of SIM control and electronic device thereof

An apparatus and method for controlling a Subscriber Identity Module (SIM) card usage in an electronic device are provided. The method of controlling the SIM card usage in the electronic device may include, if a network usage request is generated, determining whether to change a SIM card in use based on a SIM card usage condition, and if the SIM card in use is changed, performing the network usage request by using the changed SIM card. In addition, the apparatus and method for controlling the SIM card usage in the electronic device can be implemented according to the various exemplary embodiments of the present disclosure.

  • Pub Date: 2014/24/12
  • Number: 09603005
  • Owner: SAMSUNG ELECTRONICS CO., LTD.
  • Location: Suwon-si, Gyeonggi-Do, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for implementing in-app software development kits

The invention refers to technical methods and systems to easily provide existing software applications, for example Android applications built for In-App Billing with Google Play application programming interface (“API”), with compatibility with other alternative payment platforms, preferably direct carrier billing, with no additional development effort.

  • Pub Date: 2014/24/12
  • Number: 09250882
  • Owner: BUONGIORNO S.P.A.
  • Location: Parma, IT
  • Details: Visit USPTO

Visit USPTO Page


Interference reduction using hybrid signaling

Technology for reducing signal interference is disclosed. Semi-static signaling can be received at a user equipment (UE) from a neighboring evolved node (eNB). The semi-static signaling can include potential configurations of signal parameters used at the neighboring eNB. The UE can receive dynamic signaling from the neighboring eNB that includes a subset of the potential configurations of signal parameters used at the neighboring eNB. Signal interference that is caused by the neighboring eNB can be reduced using the semi-static signaling and the dynamic signaling.

  • Pub Date: 2014/24/12
  • Number: 09577778
  • Details: Visit USPTO

Visit USPTO Page


Interactive video conferencing

Technology for operating a video conferencing application at a local user equipment (UE) that supports an interactive zooming feature is disclosed. A local UE can define a region of interest (ROI) within a field of view at a remote UE. The local UE can communicate the ROI to the remote UE via a real-time transport control protocol (RTCP) feedback message, wherein the RTCP feedback message directs the remote UE to capture video within the ROI and encode the video within the ROI. The local UE can receive the encoded video within the ROI from the remote UE, the encoded video including regions within the ROI and excluding regions outside the ROI. The local UE can receive actual transmitted ROI corresponding to the encoded video from the remote UE via an RTP header extension. The encoded video within the ROI can be rendered for display at the local UE.

  • Pub Date: 2014/24/12
  • Number: 09386275
  • Owner: Intel IP Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid on-demand graphics translation table shadowing

In several embodiments, a graphics processor couples to a virtual machine monitor (VMM) to present a virtual graphics processor to one or more virtual machines. A mediator for the virtual graphics processor synchronously shadows modifications to a guest graphics translation table (GTT) of a virtual machine to a shadow GTT of the VMM using trap and emulate virtualization. If the mediator detects a frequency of modifications to the guest GTT that exceeds a threshold the mediator may then asynchronously shadow at least a portion of the guest GTT to the shadow GTT and rebuild the shadow GTT prior to submitting commands for the virtual graphics processor to the graphics processor.

  • Pub Date: 2014/24/12
  • Number: 09619860
  • Owner: Inte Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Extending functionality of web-based applications

A centralized location for discovery and data exchange for web applications. Embodiments of the invention are directed to providing a centralized interface location to send data to and receive data from one or more web applications hosted on application servers different from a server hosting the centralized interface. An application developer for a subscriber having an account with the web application may therefore easily extend the functionality of one or more web applications by communicating with a single interface provided, rather than with separate interfaces for each application. The centralized interface may provide information such as a list of all web applications or functionality to which a particular subscriber has access, and may support any desired extension (e.g., addition of users).

  • Pub Date: 2014/24/12
  • Number: 09497274
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluating geographically grouped data sets

Geographically grouped data sets may be evaluated in order to determine an ROI for different assets. The ROI of an asset may be determined based on one or more accounting items, or on an expense percentage for the asset. The value for each accounting item and the value for the expense percentage may vary depending on the geographic location of the asset. The geographically grouped data sets may be received from a variety of sources, including proprietary databases, user inputs, and third party resources. Results from evaluating the geographically grouped data sets may be used to supplement and/or refine the existing data stored in the proprietary database. A subset of the available data may be used to generate an initial ROI for one or more assets. Initial ROIs may be used to filter and identify assets for more in depth, refined, or resource-intensive analysis.

  • Pub Date: 2014/24/12
  • Number: 09436949
  • Details: Visit USPTO

Visit USPTO Page


Enhancement to the buffer status report for coordinated uplink grant allocation in dual connectivity in an LTE network

Technology for efficiently splitting a bearer at the packet data convergence protocol (PDCP) layer for uplink (UL) data transfers in wireless networks where dual connectivity is available is disclosed. A user equipment (UE) can send buffer status reports (BSRs) to a master evolved node B (MeNB) and a secondary evolved node B (SeNB). The BSRs can be formatted such that the amount of data in a radio link control (RLC) buffer at the UE and the amount of data in a packet data convergence protocol (PDCP) buffer at the UE are contained in different fields. The BSRs can also contain redundancy indicator (RI) values specifying a redundancy level between the PDCP buffer amounts included in the BSRS. The MeNB and the SeNB may then coordinate, via an X2 interface, an amount of uplink (UL) resources to allocate to the UE.

  • Pub Date: 2014/24/12
  • Number: 09635655
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Device to-device (D2D) communications

Technology for performing device-to-device (D2D) communications is disclosed. A user equipment (UE) can identify D2D data to be transmitted from the UE. The D2D data can be identified when the UE is in a radio resource control (RRC) idle. The UE can be limited to using a defined resource allocation mode to transmit the D2D data from the UE. A service request procedure can be initiated at the UE. The service request procedure can trigger the UE to perform an RRC connection establishment procedure with an evolved node B (eNB) to switch the UE from the RRC idle mode to an RRC connected mode. The UE can receive an uplink (UL) grant from the eNB for communicating the D2D data from the UE. The UE can send the D2D data using the UL grant provided by the eNB.

  • Pub Date: 2014/24/12
  • Number: 09661653
  • Owner: Intel IP Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Determining an image capture payload burst structure based on a metering image capture sweep

A first plurality of images of a scene may be captured. Each image of the first plurality of images may be captured with a different total exposure time (TET). Based at least on the first plurality of images, a TET sequence may be determined for capturing images of the scene. A second plurality of images of the scene may be captured. Images in the second plurality of images may be captured using the TET sequence. Based at least on the second plurality of images, an output image of the scene may be constructed.

  • Pub Date: 2014/24/12
  • Number: 09118841
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for reducing soft buffer size in MTC devices

A machine type communication (MTC) device is configured to communicate through a long term evolution (LTE) network. The MTC device include a wireless transceiver to receive a signal through the LTE network, a soft buffer configured to store a plurality of soft channel bits for up to a maximum number of hybrid automatic retransmission request (HARQ) processes, and a signal processing unit. The signal processing unit is configured to determine a total number of soft channel bits based at least on the maximum number of HARQ processes, and to use limited buffer rate matching (LBRM) to store a reduced number of the total number of soft channel bits in the soft buffer.

  • Pub Date: 2014/24/12
  • Number: 09654584
  • Owner: INTEL IP CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for asynchronous tile-based rendering control

An apparatus and method are described for asynchronous tile-based rendering control. In one embodiment of the invention, there is a delay between when the graphics driver queues the GPU commands for rendering and when the GPU begins executing. During this delay, the graphics driver receives additional information or data about whether cache evictions may be inhibited. As such, it allows the graphics driver to defer the cache eviction control of its render cache until it has this extra information. By doing so, it reduces the memory bandwidth required for rendering 3D graphics applications and in turn reduces the power consumption of the GPU.

  • Pub Date: 2014/24/12
  • Number: 09594697
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive silencing mechanism for device-to-device (D2D) discovery

Novel adaptive silencing schemes for device-to-device (D2D) discovery based on loading conditions in a discovery zone are disclosed herein. These adaptive silencing schemes can be used to mitigate interference and data collisions in networks where D2D connections can be formed. In some embodiments, a silencing factor is used to probabilistically determine whether a user equipment (UE) will transmit one or more D2D discovery signals in the discovery zone. Loading conditions in a current discovery zone can be estimated using several different approaches and metrics described herein. The silencing factor can be increased or decreased for a subsequent discovery zone based on the values of one or more of the metrics described herein for the current discovery zone.

  • Pub Date: 2014/24/12
  • Number: 09609502
  • Owner: INTEL IP CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


User profile selection using contextual authentication

In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various embodiments, a first user of a computing device may be authenticated and have an access control state corresponding to a first user profile established, the computing device may select a second user profile based at least in part a changed user characteristic, and the computing device may present a resource based at least in part on the second user profile. In various embodiments, the computing device may include a sensor and a user profile may be selected based at least in part on an output of the sensor and a previously stored template generated by a machine learning classifier.

  • Pub Date: 2014/23/12
  • Number: 09628477
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Transaction protocol for reading database values

Techniques are provided for more efficient multi-row atomic, consistent, isolated and durable (ACID)-compliant transactions with snapshot isolation semantics (or just “multi-row transactions” for short). In some embodiments, the techniques are implemented in a computing system that includes a client application, a lightweight in-memory lease-based lock service, a multi-row transaction orchestrator, and an underlying database system. The transaction orchestrator implements a read protocol and a write protocol that provides support to the client application for carrying out multi-row transactions against the underlying database system irrespective of whether the database system itself supports multi-row transactions. The transaction orchestrator explicitly maintains transaction-level locks obtained from the lease-based lock service as part of the transaction protocol. Further, the transaction orchestrator is tolerant to lock service failure and unavailability without compromising ACID-compliance and snapshot isolation guarantees to the client application.

  • Pub Date: 2014/23/12
  • Number: 09619507
  • Owner: Palantir Technologies, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Thermal ink jet ink composition

A thermal ink jet ink composition include a volatile organic solvent, a binder resin, a dye, a humectant in an amount from 1% to 40% by weight of the ink composition, and an additive for extending the decap time. The additive is present in an amount greater than 0.01% by weight of the thermal ink jet ink composition. The additive is selected from fluorinated surfactants, ionic surfactants, and nonionic surfactants.

  • Pub Date: 2014/23/12
  • Number: 09296911
  • Owner: Videojet Technologies Inc.
  • Location: Wood Dale, US
  • Details: Visit USPTO

Visit USPTO Page


Technologies for network packet cache management

Technologies for identifying a cache line of a network packet for eviction from an on-processor cache of a network device communicatively coupled to a network controller. The network device is configured to determine whether a cache line of the cache corresponding to the network packet is to be evicted from the cache based on a determination that the network packet is not needed subsequent to processing the network packet, and provide an indication that the cache line is to be evicted from the cache based on an eviction policy received from the network controller.

  • Pub Date: 2014/23/12
  • Number: 09565131
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for establishing a communication handoff threshold using user feedback

Examples are disclosed for acquiring user feedback and implementing statistical modeling techniques to enable a handoff profile for a dual-mode hybrid mobile device. In some examples communication link handoff logic may be executed by the processor component to receive user feedback during a voice call mediated by a call server, the voice call between a hybrid mobile device and another communication device, the user feedback pertaining to one or more Voice-over Internet Protocol (VoIP) communication link parameters for the communication link between the hybrid mobile device and the call server. The VoIP communication link parameters are statistically modeled based on the user feedback and a handoff profile is established for the hybrid mobile devices, the handoff profile operative to establish criteria for switching the VoIP communication link to an alternate communication link.

  • Pub Date: 2014/23/12
  • Number: 09014147
  • Owner: Bandwidth.com, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for enforcing control flow integrity using binary translation

Various embodiments are generally directed to an apparatus, method and other techniques to determine a valid target address for a branch instruction from information stored in a relocation table, a linkage table, or both, the relocation table and the linkage table associated with a binary file and store the valid target address in a table in memory, the valid target address to validate a target address for a translated portion of a routine of the binary file.

  • Pub Date: 2014/23/12
  • Number: 09569613
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and devices for cell selection based on prioritized nodes

Systems and methods for cell selection and/or reselection based on prioritize nodes are disclosed herein. User equipment (UE) may be configured to determine whether to select and/or reselect an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Node B (eNB). The eNB may be a dedicated eNB and/or may be communicatively coupled to a dedicated core network (CN). The dedicated eNB and/or the dedicated CN may be configured to optimize performance for UEs sharing particular characteristics. Accordingly, the selection and/or reselection criteria may be biased to encourage the UE to select and/or reselect towards a dedicated eNB and/or an eNB coupled to a dedicated CN. The eNB and/or CN may be dedicated to supporting particular types of UEs, types of nodes, types of traffic, types of subscriptions, UE mobilities, applications/services, other predetermined categories, and/or the like.

  • Pub Date: 2014/23/12
  • Number: 09398500
  • Owner: INTEL IP CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System for providing dynamic portal transaction authentication and authorization

Systems and methods are disclosed herein for managing electronic access from remote devices to a plurality of computer platforms. The system includes a processor, a network interface, and a memory. The network interface is configured to receive a user identity provided by a device remote to the system and an access request from the device to access a selected computer platform from the plurality of computerized platforms. The memory stores computer executable instructions which, when executed by the processor, cause the system to determine a set of access rights for the device based on the user identity and a role associated with the user identity, as related to the selected computerized platform. The computer executable instructions, when executed by the processor, further cause the system to allow the user to access the selected platforms according to the access request only if the access requested is included in the determined set of access rights.

  • Pub Date: 2014/23/12
  • Number: 09219738
  • Owner: HARTFORD FIRE INSURANCE COMPANY
  • Location: Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Secondary communications channel facilitating document security

Disclosed are various embodiments for facilitating the sharing of files or documents on behalf of a sending user to a recipient user. A secured file is transmitted to a recipient user via a primary communication identifier. A security key that can be utilized to decrypt or unlock the file is transmitted to a secondary communication identifier, which can be automatically identified. In this way, security of the file can be maintained in the event that one of the communications channels corresponding to the primary communication identifier or secondary communication identifier is compromised.

  • Pub Date: 2014/23/12
  • Number: 09537842
  • Owner: AirWatch LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Route detection in a trip-oriented message data communications system

In an embodiment, a data processing method provides an improvement in personal tracking and comprises, using a server computer, obtaining a plurality of personal calendar records, wherein each of the calendar records comprises a location value specifying a geographical location of an event, and a start time value specifying a start time of an event at the location; using the server computer, obtaining a plurality of present location updates, wherein each of the present location updates comprises a geo-location value indicating a then-current location of a computing device; using the server computer, creating and storing polygon data that defines a polygon in geographical space that contains a final set of the plurality of location values; using the server computer, determining a street address that is contained in the polygon; creating and storing a database record that associates a particular calendar record with the street address.

  • Pub Date: 2014/23/12
  • Number: 09488487
  • Owner: YAHOO! INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Relational database fingerprinting method and system

Disclosed is a relational database fingerprinting system and method to identify a user of the relational database, the fingerprint provided by an originator of the relational database. According to an exemplary method, a fingerprint bit string is generated including a data user identification code and a secret key unknown to the user, and the fingerprint bit string is embedded in a plurality of pseudorandomly selected values based on a pseudorandom function seeded with primary keys associated with the relational database.

  • Pub Date: 2014/23/12
  • Number: 09646161
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Policy-based storage of portions of an object in a multi-tiered storage system

Some embodiments are directed to an object addressable storage (OAS) system that stores a plurality of objects, a method for use in an OAS system and at least one non-transitory computer readable storage medium encoded with instruction that, when executed by a computer perform a method for use in an OAS system. A tiered storage environment comprising a plurality of storage tiers may be used. In response to a command, metadata associated with the object and a policy may be accessed. A storage tier may be selected for one or more portions of the object based on the policy and the metadata associated with the object.

  • Pub Date: 2014/23/12
  • Number: 09424187
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Object retrieval

Various approaches enable a user to capture image information (e.g., still images or video) about an object of interest such as the sole of a shoe or other piece of footwear (e.g., a sandal) and receive information about items that are determined to match footwear based at least in part on the image information. For example, an image analyze service or other similar service can analyze the images to determine a type of shoe included within the images based at least in part on patterns of other distinguishing features of the sole of the shoe. The image analysis service can aggregate the results and can provide information about the results as a set of matches or results to be displayed to a user in response to a visual search query. The information can include, for example, descriptions, contact information, availability, location data, pricing information, and other such information.

  • Pub Date: 2014/23/12
  • Number: 09652838
  • Owner: A9.com, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Network-assisted fabric pairing

Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device supports network-assisted fabric pairing, a first connection is established between a commissioning device and the assisting device. The assisting device also connects to a joining device. Through the assisting device, the commissioning device and the joining device establish a communication channel over which fabric credentials may be sent.

  • Pub Date: 2014/23/12
  • Number: 09590976
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Network communication rate limiter

A technology is described for limiting the rate at which a number of requests to perform a network action are granted using rate limiters. An example method may include receiving a request for a token granting permission to perform a network action via a computer network. In response, rate limiters may be identified by generating hash values using hash functions and a network address representing a source network where the hash values identify memory locations for the rate limiters. The rate limiters may have a computer memory capacity to store tokens that are distributed in response to the request. Token balances for the rate limiters may be determined, and permission to perform the network action may be granted as a result of at least one of the token balances being greater than zero.

  • Pub Date: 2014/23/12
  • Number: 09654483
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-tiered coarray programming

Techniques are provided for multi-tiered coarray programming. An exemplary coarray programming method comprises obtaining an index address identifying a memory element in a memory array in a multi-tiered storage environment, wherein the index address comprises an identifier of a storage tier within the multi-tiered storage environment where the memory element is stored; and converting the index address to one or more of a path name, an object name and a key value based on the identified storage tier to access the memory element. Exemplary aspects of the invention extend a coarray programming model to employ one or more of a file interface and an object interface for remote storage tiers.

  • Pub Date: 2014/23/12
  • Number: 09501229
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-core storage processor assigning other cores to process requests of core-affined streams

A multi-core processor of a network attached storage system processes requests from host computers for services of a file system service. Each core maintains endpoints of respective connection-layer connections to the hosts to affine respective streams of network traffic with the core, and dynamically and preferentially assigns execution threads of the core to process file system service requests of the streams affined with the core. Each core also co-operates with the other cores to dynamically and non-preferentially (a) assign execution threads of the core to process file system service requests of the streams affined with the other cores, and (b) assign execution threads of the other cores to process file system service requests of the streams affined with the core, promoting efficient use of the cores for the processing workload of the file system service.

  • Pub Date: 2014/23/12
  • Number: 09485310
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Medical device

Novel devices and methods for implanting medical stents are provided. A novel apparatus, which may be in a first compressed position, may be inserted into the artery, such as by being positioned over a catheter. The apparatus may be expanded to a second position. In one embodiment, the apparatus is configured to expand away in two substantially opposing directions along a second axis away from the longitudinal axis. The second axis may be perpendicular to the longitudinal axis. The apparatus may include markers that are detectable to determine the orientation of the catheter or the apparatus and/or assist in the determination of the type or size of stent to utilize.

  • Pub Date: 2014/23/12
  • Number: 09480584
  • Owner: RBKPARK LLC
  • Location: St. Charles, US
  • Details: Visit USPTO

Visit USPTO Page


Graphic processing circuit with binning rendering and pre-depth processing method thereof

A graphic processing circuit with binning rendering and associated pre-depth processing method is provided. Firstly, a first depth data of a first primitive corresponding to a specified tile is received. Then, the pre-depth data corresponding to the specified tile is read from a pre-Z buffer. If the first depth data is not larger than the pre-depth data and the first primitive is an opaque primitive, the pre-depth data is updated with the first depth data. If the first depth data is not larger than the pre-depth data and the first primitive is a translucent primitive, an uncertainty ordering range is defined according to the first depth data and the pre-depth data, and the pre-depth data is updated with the uncertainty ordering range.

  • Pub Date: 2014/23/12
  • Number: 09361697
  • Owner: MEDIATEK INC.
  • Location: Hsinchu, TW
  • Details: Visit USPTO

Visit USPTO Page


Enhanced communication platform and related communication method using the platform

Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at least one of a communication service, a transaction and user account information via a plurality of networks of different types. Prior to processing the request, there is verification of the users authorization to receive the at least one of the communication service, the transaction, and the user account information, and that an account associated with the user has a sufficient amount currently available for payment of the at least one of the communication service and the transaction. After verification, an authorized account associated with the user is charged in real time as the at least one of the communication service and the transaction is provided.

  • Pub Date: 2014/23/12
  • Number: 09432377
  • Owner: Upaid Systems, Ltd.
  • Location: Road Town, VG
  • Details: Visit USPTO

Visit USPTO Page


Dynamic locale based aggregation of full duplex media streams

A cloud-based video/audio conferencing system and method performs locale based aggregation of a full duplex media stream to organize multiple connections to a conference call that originate from the same physical location or a shared locale. The cloud-based video/audio conferencing system performs synchronization of the microphone and speaker audio signals of the same-locale connections. In this manner, a conference call may be held with multiple user devices making connections from the same physical location. User experience is enhanced by allowing each user in the same location to use his/her own individual devices to connect to the same conference call.

  • Pub Date: 2014/23/12
  • Number: 09641576
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Distinguishing between stock keeping units using a physical dimension of a region depicted in an image

The disclosure includes a system and method for distinguishing between stock keeping units of similar appearance that vary in size. An image recognition application receives an image including a shelving unit stocking a plurality of items, identifies each item in the image, generates a region of interest for each identified item in the image, identifies a physical dimension of a portion of region depicted in the image, determines a dimension of the region of interest for each identified item and the portion of region in pixels, determines a pixel-to-physical dimension ratio using the dimension in pixels of the portion of region and the physical dimension of the portion of region depicted in the image, and determines a stock keeping unit identifier of each identified item in the image based on the pixel-to-physical dimension ratio and the dimension of the region of interest for each identified item.

  • Pub Date: 2014/23/12
  • Number: 09330474
  • Owner: RICOH CO., LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Computer readable storage media for legacy integration and methods and systems for utilizing same

Systems and methods for integrative legacy context management are disclosed herein. An example computer hardware system may include at least one processing unit coupled to a memory, and the memory may be encoded with computer executable instructions that when executed cause the at least one processing unit to receive a set of credentials associated with a user from a user device, cross-reference the set of credentials with a first set of credentials of an agent associated with the user to determine whether the set of credentials is valid; and if the set of credentials is valid, provide a second set of credentials of the agent to the user device in response to a request for the second set of credentials from the user device.

  • Pub Date: 2014/23/12
  • Number: 09613204
  • Owner: DOCUMENT STORAGE SYSTEMS, INC.
  • Location: Juno Beach, US
  • Details: Visit USPTO

Visit USPTO Page


Authenticator device facilitating file security

Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order to access a file that is encrypted or otherwise secured. The authenticator device can provide an authenticator code in which a security key used to access a secured file can be embedded. An additional layer of encryption can also be applied in the authenticator code.

  • Pub Date: 2014/23/12
  • Number: 09413754
  • Owner: AirWatch LLC
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Apoptosis-inducing agents for the treatment of cancer and immune and autoimmune diseases

Disclosed are compounds which inhibit the activity of anti-apoptotic Bcl-2 proteins, compositions containing the compounds and methods of treating diseases during which is expressed anti-apoptotic Bcl-2 protein.

  • Pub Date: 2014/23/12
  • Number: 09303025
  • Owner: AbbVie Inc.
  • Location: North Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


User-centric widgets and dashboards

User-centric widgets and dashboards are automatically modified to reflect a user's goals and needs.

  • Pub Date: 2014/22/12
  • Number: 09483164
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and computer-readable media for determining excessive use of a cellular network

Systems, methods, and computer-readable media for analysis of call detail records to determine unauthorized use of a cellular network are provided. The transferred data amounts from call detail records may be compared to categorized data usage associated with a portable user device to determine uncategorized data usage by the portable user device. The uncategorized data usage and the categorized data usage may be analyzed to determine unauthorized use of the cellular network.

  • Pub Date: 2014/22/12
  • Number: 09432521
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for controlling email access

Embodiments of the disclosure relate to controlling access to email content. According to various embodiments as described herein, an email message may be accessed by a computing device to identify a uniform resource locator (URL) within the email message, wherein the URL corresponds to a resource residing in a protected location that is not accessible by a native browser application of the client device. The computing device may determine whether the client device is permitted to access the URL and request access to the resource via the secure browser application of the client device upon a determination that the client device is permitted to access the resource in accordance with the at least one resource rule.

  • Pub Date: 2014/22/12
  • Number: 09450921
  • Owner: AirWatch LLC
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing a scalable data storage service

A system that implements a scalable data storage service may maintain tables in a non-relational data store on behalf of clients. The system may provide a Web services interface through which service requests are received, and an API usable to request that a table be created, deleted, or described; that an item be stored, retrieved, deleted, or its attributes modified; or that a table be queried (or scanned) with filtered items and/or their attributes returned. An asynchronous workflow may be invoked to create or delete a table. Items stored in tables may be partitioned and indexed using a simple or composite primary key. The system may not impose pre-defined limits on table size, and may employ a flexible schema. The service may provide a best-effort or committed throughput model. The system may automatically scale and/or re-partition tables in response to detecting workload changes, node failures, or other conditions or anomalies.

  • Pub Date: 2014/22/12
  • Number: 09432459
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Provisioning tool for a content delivery network (CDN)

A tool that allows a CDN customer, partner, or other authorized entity to create a DNS canonical name (CNAME) on the content delivery network without having to contact the content delivery network service provider directly.

  • Pub Date: 2014/22/12
  • Number: 09647983
  • Owner: Akamai Technologies, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Providing parental control using a playlist

A method includes receiving a playlist at a network device from a client device in communication with the network device over a network. In response to receiving the playlist, the method also includes disabling channel changes not associated with the playlist from executing during times indicated in the playlist. The method further includes transmitting a control message from the network device to the client device that requests the client device to tune to a channel conforming to the playlist when the network device receives a channel change request not associated with the playlist from the client device.

  • Pub Date: 2014/22/12
  • Number: 09232266
  • Owner: Google Technology Holdings LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for an emergency location information service (E-LIS) from unmanned aerial vehicles (UAV)

A method and system for determining and verifying a location of a network device in emergency situations with emergency messages including legacy 911, E911 and text-to-911 messages from an unmanned aerial vehicle (UAV) or drone. The method and system provide a current physical geographic location for mobile devices in urban areas (e.g., spot, chair, desk on in a room on a building floor, campus, enterprise, city, state, region, country, continent, etc.) and rural areas in an emergency situation such as an accident, fire, terrorist attack, military incident, weather, flood event, etc. and forwarding the current physical geographic location to a legacy 911 network, a Emergency Services IP networks (ESInet) or text-to-911 Short Message Services (SMS) networks to alert emergency responders.

  • Pub Date: 2014/22/12
  • Number: 09094816
  • Owner: RedSky Technologies, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Method, a system, and a non-transitory computer-readable medium for supporting application development

An application development support method of the present disclosure is for generating an application by building resources including a library and a manifest file. The method includes extracting, when there are a plurality of versions of a platform being an operation target for the application, the library commonly required by all the versions of the platform from a specified resource storing area. The method includes identifying and extracting the library that is required other than commonly required by all the versions of the platform from the specified resource storing area. The method includes inquiring about a public interface relating to an un-extracted library in the specified resource storing area. The method includes generating a manifest file for a difference detected when inquiring about the public interface. The method includes connecting the generated manifest file with an existing manifest file.

  • Pub Date: 2014/22/12
  • Number: 09335990
  • Owner: Kyocera Document Solutions Inc.
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Enforcement of proximity based policies

Embodiments of the disclosure are related to enforcing a policy on a computing device, or a companion device, based upon its proximity to another computing device, or an anchor device. In one example, the anchor device and companion device can report their location with respect to one another to a policy server. The policy server can determine whether the anchor device and proximity device are in proximity to one another as well as determine whether a policy should be applied to the companion device based upon whether it is in proximity to the anchor device.

  • Pub Date: 2014/22/12
  • Number: 09584964
  • Owner: AirWatch LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Discovery and operation of hybrid wireless wide area and wireless local area networks

Technology for setting up a Device to Device (D2D) communication channel between mobile wireless devices is disclosed. The technology includes identifying a first user equipment and a second user equipment located within a proximity; receiving network assisted proximity discovery information at one of the first UE and the second UE from an evolved packet core (EPC) operating on a third generation partnership practice (3GPP) wireless wide area network (WWAN); and setting up a device to device (D2D) communication between the first UE and the second UE based on the network assisted proximity discovery information received from the EPC.

  • Pub Date: 2014/22/12
  • Number: 09386617
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Devices, systems, and methods for responding to telemarketers

Aspects of the disclosure provide responses from a communication device to a call from an unknown source, such as telemarketers. In certain aspects, information associated with a communication address of the unknown source can be accessed by the communication device, and a response to the call can be specific to some or all of the information. In other aspects, the responses can be automated and/or can be directed, at least in part, by external input supplied to the communication device.

  • Pub Date: 2014/22/12
  • Number: 09350858
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods for treating pruritus

The present invention encompasses methods and compositions for alleviating pruritus. The compositions may comprise an analgesic agent.

  • Pub Date: 2014/22/12
  • Number: 09636379
  • Owner: WASHINGTON UNIVERSITY
  • Location: St. Louis, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic batching of GUI-based tasks

Described herein are techniques for automatically batching GUI-based (Graphical User Interface) tasks. The described techniques include automatically determining whether a user is performing batchable tasks in a GUI-based environment. Once detected, the described techniques include predicting the next tasks of a batch based upon those detected batchable tasks. With the described techniques, the user may be asked to verify and/or correct the predicted next tasks. Furthermore, the described techniques may include performing a batch and doing so without user interaction.

  • Pub Date: 2014/22/12
  • Number: 09424068
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Garment tags for intelligent laundering alerts

Aspects of the present disclosure involve an apparatus, systems, and methods for providing intelligent laundering alerts. Example embodiments involve an intelligent garment tag that may be affixed to garments, and may store and provide information about the garment to which it is affixed. The information stored thereon describes various aspects of the garment including color, fabric, and laundering information. The intelligent garment tags further include an alert component for providing laundering alerts (e.g., a flashing or colored light, a warning noise, or a vibration) based on, for example, garment color compatibility or laundering device (e.g., washing machine or clothes dryer) compatibility.

  • Pub Date: 2014/20/12
  • Number: 09594996
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Withdrawal of a message sent in a social networking system

Some embodiments of a method for withdrawal a message include receiving, by a mobile device, an input to send a first message to a first recipient, the first message containing at least one image or video. The mobile device processes the first message for transmittal to the first recipient. In response to detecting a request to withdraw the first message within a timeout period, the mobile device determines that the first message has not been sent from the mobile device and terminates the processing of the first message for sending.

  • Pub Date: 2014/19/12
  • Number: 09641477
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Waveguide that acts as a spring

A computing device includes a head that can be physically attached to a base. The head is capable of functioning independent of the base. The base includes a base transceiver to receive data from a first component of the base, encode the data into a signal, and transmit the signal. The base includes a base waveguide to guide the signal to a head waveguide of the head. The base waveguide includes a first portion that is attached to the base and a second portion that is unattached to the base. The second portion of the base waveguide behaves as a spring to keep the base waveguide within a predetermined distance from the head waveguide. The head includes a head transceiver to receive the signal from the head waveguide, decode the data from the signal, and send the data to a second component of the head.

  • Pub Date: 2014/19/12
  • Number: 09300365
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Waveguide for near field communication

A computing device comprises a head that can be physically attached to a base. The head may be capable of functioning as a type of computing device independent of the base. The base may include a base transceiver to receive data from a first component of the base, encode the data into a signal, and transmit the signal. The base may include a base waveguide to guide the signal to a head waveguide of the head. The head may include a head transceiver to receive the signal from the head waveguide, decode the data from the signal, and send the data to a second component of the head.

  • Pub Date: 2014/19/12
  • Number: 09444525
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


VLAN tagging in a virtual environment

VLAN tagging in a virtual environment is described, including configuring a set of VLAN tagging parameters for each virtual network device to be used by the virtual network device to correctly perform VLAN tagging of frames in response to configuration changes with respect to the virtual network device. A first example of a configuration change with respect to the virtual network device comprises the virtual network device being transitioned from being attached to a virtual switch tagging (VST) port group to being attached to a virtual guest tagging (VGT) port group. A second example of a configuration change with respect to the virtual network device comprises the virtual network device being migrated from a first host to a second host.

  • Pub Date: 2014/19/12
  • Number: 09628334
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing product recommendations

Apparatuses, methods, and non-transitory computer readable medium that provide recommendations include determining personality traits of a sender and a recipient by applying a five-factor model to a plurality of datasets. Further, the method comprises associating a personality-product score with each of a plurality of products based on the personality traits and performing a need analysis on the user data to determine desired products from amongst the plurality of products. Further, the method comprises determining a multidimensional collaborative matrix by aggregating the personality traits, the personality-product score, the desired products, and product psychographic portfolio. Further, the method comprises determining an affinity score for at least one of the sender and the recipient towards each of the plurality of products based on the multidimensional collaborative matrix and recommending at least one product from amongst the plurality of products to the sender based on the affinity score.

  • Pub Date: 2014/19/12
  • Number: 09454782
  • Owner: Wipro Limited
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for combining drawings and videos prior to buffer storage

Systems, methods, and non-transitory computer-readable media can initiate a video capture mode that provides a camera view. A touch gesture can be detected via a touch display. A drawing can be rendered based on the touch gesture. The drawing can be rendered to appear to overlay the camera view. A first video image frame can be acquired based on the camera view. At least a portion of the first video image frame and the drawing can be combined to produce a first combined frame. The drawing can appear to overlay the first video image frame. The first combined frame can be stored in a video buffer.

  • Pub Date: 2014/19/12
  • Number: 09583143
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for smart throttling mechanisms for virtual backup appliances

A method for managing resources of virtual backup appliances is described. The method includes receiving, by a backup management server (BMS), a request to back up a plurality of virtual machines (VMs), determining, at the BMS, a set of VMs to be backed up from the plurality of VMs that yields a maximum performance for the backup request without causing the set of VM servers to become bottlenecked, wherein the determination is performed based on at least one of a concurrency limit of the virtual backup appliance (VBA) and any VBA proxies corresponding to the set of VMs, and a set of one or more data performance metrics of one or more storage devices in the set of VM storage arrays, and sending one or more backup jobs to the VBA to back up the determined set of VMs to be backed up to a backup storage system.

  • Pub Date: 2014/19/12
  • Number: 09628561
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for marketing attribution in an enterprise

A system and method include a customer engagement platform of an enterprise. The customer engagement platform is configured to connect with an audience computer and provide to the audience computer contact information associated with a marketing attribution. The marketing attribution accompanies an impression served to the audience computer. The impression and marketing attribution associated with the contact information are sent to the customer engagement platform during an interaction with the enterprise.

  • Pub Date: 2014/19/12
  • Number: 09491294
  • Owner: Genesys Telecommunications Laboratories, Inc.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Settings of a digital camera for depth map refinement

Systems and methods are disclosed for identifying depth refinement image capture instructions for capturing images that may be used to refine existing depth maps. The depth refinement image capture instructions are determined by evaluating, at each image patch in an existing image corresponding to the existing depth map, a range of possible depth values over a set of configuration settings. Each range of possible depth values corresponds to an existing depth estimate of the existing depth map. This evaluation enables selection of one or more configuration settings in a manner such that there will be additional depth information derivable from one or more additional images captured with the selected configuration settings. When a refined depth map is generated using the one or more additional images, this additional depth information is used to increase the depth precision for at least one depth estimate from the existing depth map.

  • Pub Date: 2014/19/12
  • Number: 09307221
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Refactoring data flow applications without source code changes or recompilation

Systems and methods may provide refactoring data flow applications without source code changes or recompilation. An apparatus may create a map file that describes how an original graph structure and node properties are mapped to a new structure and set of properties. A runtime system aware of the mapping may transform a graph that is constructed by the data flow application into the new structure at runtime.

  • Pub Date: 2014/19/12
  • Number: 09529587
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Power level control using power assertion requests

A method and an apparatus for a power assertion management are described. A power assertion indicator may be maintained for a device component having a power level. The power assertion indicator can indicate whether the power level of the device component is allowed to be lowered. A power assertion request may be sent from a first process to prevent lowering the power level of the device component before a data processing task is completed. A second process can receive a request from the first process to perform operations for the data processing task. The power level of the device component may not be allowed to be lowered before the second process completes the operations for the data processing task. The power level of the device component may be lowered after the data processing task is completed.

  • Pub Date: 2014/19/12
  • Number: 09619012
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-faceted compute instance identity

A compute instance of a virtual computing service (VCS) is assigned first and second cryptographically verifiable identities (CVIs) within respective namespaces. A cryptographic key pair associated with the first CVI includes a non-transferable private key managed by a secure key store which does not permit the private key to be copied. The VCS enables the instance to use the private key for asserting the CVIs. In response to a first identity query, the instance indicates the first CVI. In response to a second identity query, the instance indicates the second CVI.

  • Pub Date: 2014/19/12
  • Number: 09525672
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile notifications based upon location

Disclosed are various embodiments employed to generate device notifications based upon location data associated with a mobile device. To this end, a request to generate a device notification is obtained from a user application. Notification content is extracted from the request and an escalated or de-escalated notification level is applied that is based at least in part upon the location of the mobile device and properties about the location that can be identified.

  • Pub Date: 2014/19/12
  • Number: 09351110
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile communication station having selectable position latency for position estimation in a wireless network

Mobile communication stations (STA) and a method for position estimation in a wireless network having access points (APs) are disclosed. The STA is configured to perform position estimation operations, with respect to the APs, based on a position latency parameter, a rate parameter, a power parameter, and an accuracy parameter. An upper layer of the STA may send the parameters to a position provider that generates the position estimation measurements and transmits the results back to the upper layer wherein the results include the position of the STA prior to the present time and the length of time from the present time to the time that the STA was at that particular position.

  • Pub Date: 2014/19/12
  • Number: 09374676
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of implementing a dynamic service-event management system

Dynamic service-event management methods to implement a dynamic service-event management system. Generally applicable in fields of utility, telecommunication and financial service providers. Therein, events has affect to status or quality of service projecting to service in two steps and using common-format events. In first step, external source originated events () are converted in network parser module(s) () to a common event-format. In second step, the common format events () are processed and their information projected to a service in a service parser module (). The resulting common format service-event () and network events () are stored by an alert parser module (). The stored events are accessible for other connected systems through a database based application programming interface (). Opening times are effectively handled using opening events (). A bearer-to-beared object assignment can be handled in two ways. In the easiest solution information originated from an event source is used. Another possible solution uses a static database which is maintained by a database parser module (). The static database is accessible for other connected systems through a database based application programming interface ().

  • Pub Date: 2014/19/12
  • Number: 09436541
  • Owner: KNI Muszaki Tanacsado Kft.
  • Location: Budapest, HU
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for inter process priority donation

A method and an apparatus for priority donations among different processes are described. A first process running with a first priority may receive a request from a second process running with a second priority to perform a data processing task for the second process. A dependency relationship may be identified between the first process and a third process running with a third priority performing separate data processing task. The dependency relationship may indicate that the data processing task is to be performed via the first process subsequent to completion of the separate data processing task via the third process. The third process may be updated with the second priority to complete the separate data processing task. The first process may perform the data processing task with the second priority for the second process.

  • Pub Date: 2014/19/12
  • Number: 09348645
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Low affinity blood brain barrier receptor antibodies and uses therefor

The present invention relates to antibodies that bind blood brain barrier receptors (BBB-R) and methods of using the same.

  • Pub Date: 2014/19/12
  • Number: 09611323
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Fast network formation after network power restoration

In one embodiment, a first device in a network detects a power restoration event subsequent to a power outage event. Power is restored to the first device during the power restoration event. The first device synchronizes a channel hopping schedule to the detected power restoration event. The first device communicates with a neighboring device of the first device using the channel hopping schedule synchronized to the detected power restoration event. The neighboring device uses a corresponding channel hopping schedule to communicate with the first device that is also synchronized to the power restoration event.

  • Pub Date: 2014/19/12
  • Number: 09641382
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Exploiting frame-to-frame coherence for optimizing color buffer clear performance in graphics processing units

A mechanism is described for dynamically optimizing color buffer clear performance in graphics processing units. A method of embodiments, as described herein, includes allocating and initializing a first set of control bits associated with a framebuffer in a graphics processing unit (GPU), and rendering a first frame, wherein the first set of control bits are associated with the first frame. The method may further include allocating a second set of control bits associated with a second frame, and rendering the second frame. The method may further include facilitating an expedited resolve operation of the second frame based on a frame-to-frame coherence associated with the first and second frames.

  • Pub Date: 2014/19/12
  • Number: 09589312
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Download and configuration management engine for gaming system

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. A download and configuration system controller and method is provided for managing the download and configuration server-based sub-system.

  • Pub Date: 2014/19/12
  • Number: 09466172
  • Owner: BALLY GAMING, INC.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Cross-domain object models for securely sharing information between network security domains

Techniques are described for controlling transfer of information in a secure manner across multiple network security domains. As described herein, cross-domain sharing may be facilitated by use of a common model that is shared by participants from the different network security domains. An example system is described in which a plurality of network domains comprises a respective set of client computing devices. A cross-domain object model specification specifies object classes for cross-domain objects accessible to the client computing devices. For each of the object classes, the cross-domain object model specification defines a plurality of data fields and specifies which of the data fields of the respective object class can be exposed to each of the respective network domains. A protected object repository positioned within each of the network domains stores an authorized portion of each of the cross-domain objects in accordance with the cross-domain object model specification.

  • Pub Date: 2014/19/12
  • Number: 09191391
  • Owner: Architecture Technology Corporation
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Cooperative security in wireless sensor networks

Systems, apparatuses, and methods for cooperative security in wireless sensor networks are described herein. A wireless node may organize itself into a cluster with other wireless nodes. The wireless node may cooperate with other wireless nodes in the cluster to select a leader node. The wireless node may describe its expected behaviors. The wireless node may detect a compromised wireless node within the cluster. The wireless node may prevent the compromised wireless node from compromising another wireless node.

  • Pub Date: 2014/19/12
  • Number: 09609517
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Configuration settings of a digital camera for depth map generation

Systems and methods are disclosed for identifying image capture instructions for capturing images that may be used to generate quality depth maps. In some examples, the image capture instructions are generated by predictively determining in a scene-independent manner configuration settings to be used by a camera to capture a minimal quantity of images for generating the quality depth map. The image capture instructions may thus indicate a quantity of images to be captured and the aperture and focus settings to be used when capturing the images. The image capture instructions may be determined based in part on a distance estimate, camera calibration information and a predetermined range of optimal blur radii. The range of optimal blur radii ensures that there will be sufficient depth information for generating a depth map of a particular quality from the yet-to-be-captured images.

  • Pub Date: 2014/19/12
  • Number: 09307222
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Composition and method for retention of solvated compounds and ions

Storage stable polyhydroxylated aromatic ether adducts of polyalkylene oxide are described. Reactive compositions are formed by combining an ether adduct with an aldehyde, optionally further adding a phenolic-aldehyde prepolymer. The reactive compositions are cured by removing water, by acidification, or both. The cured compositions sorb solvated compounds from environments containing water. The cured compositions are also useful for pre-loading with compounds that are subsequently released at a controlled rate into environments containing water.

  • Pub Date: 2014/19/12
  • Number: 09346690
  • Owner: ECO VERDE TECHNOLOGIES, INC.
  • Location: Pembroke Pines, US
  • Details: Visit USPTO

Visit USPTO Page


Composing and executing workflows made up of functional pluggable building blocks

A platform that provides a way to automatically compose and execute even complex workflows without writing code is described. A set of pre-built functional building blocks can be provided. The building blocks perform data transformation and machine learning functions. The functional blocks have well known plug types. The building blocks can be composed build complex compositions. Input and output files are converted to a standard data type so that modules are pluggable.

  • Pub Date: 2014/19/12
  • Number: 09436507
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically configuring data center networks with neighbor discovery protocol support

Techniques are disclosed herein for configuring a virtual network. One embodiment provides a computer-implemented method that includes receiving a request to add network interface cards (NICs) of a new virtual machine (VM) host to the virtual network, and determining, using a protocol by which network devices advertise information, ports of at least one physical switch to which the NICs are connected. The method further includes determining, based on a predefined network configuration document, virtual local area networks (VLANs) which are enabled on the ports of the at least one physical switch to which the NICs are connected. In addition, the method includes assigning the NICs to ports of at least one virtual switch in the virtual network based on the VLANs as determined.

  • Pub Date: 2014/19/12
  • Number: 09559898
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


App store update notification and warning system

A system for maintaining and upgrading hardware device functioning provides processes to select and install updates for software (e.g., applications or apps) on the hardware device. A notification system provides information for discretion and control over the selection of software updates to be applied to consumer mobile devices according to the particular characteristics of the device, e.g., the model of device, the specific operating system of the device, and software applications installed on the device. The notification system may be integral with app stores on mobile devices and tablets, and may also be applicable to the Internet of Things. A notification may take the form, for example, of a warning or recommendation associated with an update for an app on the user device and may enable the user to make an informed decision beforehand about whether or not to install a particular update on the user device.

  • Pub Date: 2014/19/12
  • Number: 09569196
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Wavelength and spectrum assignment within packet-optical networks

Techniques are described for wavelength and spectrum assignment within a packet-optical transport system. A controller, for example, dynamically controls wavelength and spectrum assignment to suppress or generally avoid optical effects that can degrade communication performance. For example, the controller provides closed-loop control over dynamic partitioning of the spectral range of an optical transport system into channel groups and assignment of the groups to respective packet-optical transport devices based on current or future bandwidth requirements at each device. Moreover, for each packet-optical transport device, the controller controls assignment of individual wavelengths within each channel group so as to balance channel utilization around a center of the spectral range associated with each channel group and to maintain spectral separation of the channels within the channel group.

  • Pub Date: 2014/18/12
  • Number: 09077478
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


User equipment and method for transmitting a data stream to an evolved node B

In a wireless network, a user equipment (UE) can communicate with an Evolved Node B (eNodeB). During at least some times, the UE transmits a data stream to the eNodeB, over one of several available antenna states on the UE. The antenna states can include one or more tuning states for each antenna port on the UE. At predetermined times, which can be periodic, the UE ceases transmission of the data stream, transmits a test signal sequentially over each of its antenna states, receives a signal back from the eNodeB indicating which of the antenna states provides the strongest signal, and switches to the indicated antenna state. After switching, the UE can resume transmission of the data stream over the indicated antenna state. In some examples, the UE can repeat the antenna tuning/retuning process periodically.

  • Pub Date: 2014/18/12
  • Number: 09572130
  • Owner: Intel IP Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Trace buffer based replay for context switching

A command processor may process a command stream for execution by at least one processor, including storing data associated with a first set of one or more operations in the command stream in a trace buffer, wherein the first set of one or more operations accesses one or more memory locations in memory, and wherein the data include an indication of contents of the one or more memory locations associated with the first set of one or more operations. The command processor may interrupt the processing of the command stream. The command processor may, in response to resuming processing of the command stream subsequent to the interrupting of the processing of the command stream, replay at least a portion of the command stream, including processing a second set of one or more operations of the command stream based at least in part on the data stored in the trace buffer.

  • Pub Date: 2014/18/12
  • Number: 09626313
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Ternary antifouling compositions and methods

Compounds for mitigation of biofouling, and methods of making compounds for biofouling. Terpolymers comprising hyperbranched fluoropolymers possessing unique topology mitigate fouling on susceptible surfaces. In some embodiments, the terpolymers comprise PEG and PDMS.

  • Pub Date: 2014/18/12
  • Number: 09422433
  • Owner: The Texas A&M University System
  • Location: College Station, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for routing communications

A system and method that includes receiving a communication request of an account, the communication request including communication properties; identifying at least two routing options of a route priority list, the routing options capable of completing the communication request and identified according to a priority heuristic; generating a communication cost from the communication properties; and upon receipt of the routing response and the communication cost response, executing a communication with a routing option of the routing priority list and committing a cost of the communication to the account.

  • Pub Date: 2014/18/12
  • Number: 09307094
  • Owner: Twilio, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for general purpose encryption of data

Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and an encryption accelerator communicatively coupled to the processor. The encryption accelerator may be configured to encrypt and decrypt information in accordance with a plurality of cryptographic functions, receive a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation, and in response to receiving the command, encrypt or decrypt the data associated with the input/output operation based on a particular one of the plurality of cryptographic functions.

  • Pub Date: 2014/18/12
  • Number: 09298938
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Saved queries in a social networking system

A user saves a structured query defining connections between two or more objects maintained by a social networking system. The social networking system finds objects matching the structured query, either by periodically performing searches for new objects or by analyzing objects as they are added or modified. The user creating the saved query can subsequently view the matching objects.

  • Pub Date: 2014/18/12
  • Number: 09177016
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Resolving multi-sampled anti-aliasing buffers into single sampled buffers

The resolve operation in multi-sampled anti-aliasing may be avoided on a per pixel basis if all subsamples are determined to have the same color and the same storage is used for the resolved image as for one of the subsample planes.

  • Pub Date: 2014/18/12
  • Number: 09633452
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Registering client computing devices for online communication sessions

Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions.

  • Pub Date: 2014/18/12
  • Number: 09577976
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time system for multi-modal 3D geospatial mapping, object recognition, scene annotation and analytics

A multi-sensor, multi-modal data collection, analysis, recognition, and visualization platform can be embodied in a navigation capable vehicle. The platform provides an automated tool that can integrate multi-modal sensor data including two-dimensional image data, three-dimensional image data, and motion, location, or orientation data, and create a visual representation of the integrated sensor data, in a live operational environment. An illustrative platform architecture incorporates modular domain-specific business analytics “plug ins” to provide real-time annotation of the visual representation with domain-specific markups.

  • Pub Date: 2014/18/12
  • Number: 09488492
  • Owner: SRI INTERNATIONAL
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Network controller having predictable analytics and failure avoidance in packet-optical networks

Techniques for providing closed-loop control and predictive analytics in packet-optical networks are described. For example, an integrated, centralized controller provides tightly-integrated, closed-loop control over switching and routing services and the underling optical transport system of a communication network. In one implementation, the controller includes an analytics engine that applies predictable analytics to real-time status information received from a monitoring subsystem distributed throughout the underlying optical transport system. Responsive to the status information, the analytics engine applies rules to adaptively and proactively identify current or predicted topology-changing events and, responsive to those events, maps reroutes packet flows through a routing/switching network and control and, based on any updated bandwidth requirements due to topology changes, dynamically adjusts allocation and utilization of the optical spectrum and wavelengths within the underlying optical transport system.

  • Pub Date: 2014/18/12
  • Number: 09369200
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Mute detector

A mute detector actively provides an indication to a user when the user is speaking while on mute in an audio conferencing application. The indication may prevent the user from speaking for a period without being heard by other participants. The indication also may prevent a user from believing they were heard by others in an audio conference when they were, in fact, on mute. The techniques may be integrated into the software layer of any audio or video conferencing application, although other implementations will be apparent in light of this disclosure.

  • Pub Date: 2014/18/12
  • Number: 09473643
  • Owner: INTEL Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-user sensor-based interactions

Disclosed in some examples are methods systems and machine readable mediums in which actions or states of a first user (e.g., natural interactions) having a first corresponding computing device are observed by a sensor on a second computing device corresponding to a second user. A notification describing the observed actions or states of a first user may be shared across a network with the first corresponding computing device. In this way, the first computing device may be provided with information concerning the state of the user without having to directly sense the user.

  • Pub Date: 2014/18/12
  • Number: 09633622
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing adaptive and proactive interaction management for multiple types of business interactions occurring in a multimedia communications environment

An object-oriented system for managing multiple media types in a communication center environment has a multimedia queuing system, a processor for processing events in the queue, an interaction server for selecting media type or event types, a resource manager for reporting availability of a resource access point, and a data store for storing client information about media types available to the client and historical information about success of past use of those media types. In a preferred application, the system processes and routes incoming events of known media type to access points defined as systems or agents based in part on media channel availability of the access point, and wherein the system selects a media channel or channels for certain events in queue that are not pre-dedicated as specific media type events but are generated outbound or internal proactive contact events. For proactive contact events, the system automatically selects a media channel for each event based on a combination of set preferences and predictions based on historical channel information relating to success channel connections to that client.

  • Pub Date: 2014/18/12
  • Number: RE046181
  • Owner: Genesys Telecommunications Laboratories, Inc.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Long term encrypted storage and key management

An encryption key not accessible outside a data storage device can be used to encrypt data stored in that device. The received data may have been encrypted under an external key, such as a key associated with a customer of a data storage service. Upon receiving the data encrypted under the external key, the data can be decrypted using a copy of the external key and then re-encrypted, inside the data storage device, using the internal key. If the external key is to be rotated, the stored data does not need to be modified as the data can be decrypted using the internal key and then re-encrypted using the new external key in response to an authorized request for the data after the change to the new external key. Such an approach provides near instant key rotation while not having to re-encrypt data under the new key unless requested.

  • Pub Date: 2014/18/12
  • Number: 09455963
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated controller for routing / switching network and underlying optical transport system

Techniques for providing closed-loop control and predictive analytics in packet-optical networks are described. For example, an integrated centralized controller is described that provides tightly-integrated, closed-loop control over components of a routing/switching network (e.g., IP/MPLS) and also the underling optical transport system, including routing wavelength and spectrum assignment. The controller adaptively and proactively maps packet flows into network resources of a routing/switching network and control, based on the mapping, allocation and utilization of optical spectrum and wavelengths within the optical transport system underlying the routing and switching network.

  • Pub Date: 2014/18/12
  • Number: 09369785
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture and identification system and process

A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object.

  • Pub Date: 2014/18/12
  • Number: 09336453
  • Owner: NANT HOLDINGS IP, LLC
  • Location: Culver City, US
  • Details: Visit USPTO

Visit USPTO Page


Facilitating dynamic real-time volumetric rendering in graphics images on computing devices

A mechanism is described for facilitating dynamic real-time volumetric rendering of graphics images on computing devices. A method of embodiments, as described herein, includes dividing a volume of a first image into a first volume and a second volume, where the first volume is associated with a fuzzy portion of the image, and the second volume is associated with a non-fuzzy portion of the image. The first volume may contain an array of metavoxels, where a metavoxel having an array of voxels. The method may further include applying particles to each metavoxel to detect a first set of voxels found inside one or more particles, and a second set of voxels found outside the particles, and generating, based on the first set of voxels, a second image from the first image. The method may further include to rendering the second image.

  • Pub Date: 2014/18/12
  • Number: 09582924
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions comprising free-standing two-dimensional nanocrystals

The present invention is directed to compositions comprising free standing and stacked assemblies of two dimensional crystalline solids, useful for physical and electrochemical applications.

  • Pub Date: 2014/18/12
  • Number: 09415570
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Centralized and distributed notification handling system for software applications

The present disclosure describes methods, systems, and computer program products for handling notifications. One computer-implemented method includes selecting an object type for a notification object; customizing a common attribute of the notification object, wherein the common attribute is defined in a common notification object; determining whether the notification object includes additional attributes to be customized; in response to a determination that the notification object includes additional attributes to be customized, customizing a type attribute of the notification object, wherein the type attribute is defined in a type notification object that has the selected object type; and storing the notification object.

  • Pub Date: 2014/18/12
  • Number: 09389934
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Assignment template and assignment bundle in a gaming configuration and download system

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with non-gaming devices to enable users to monitor, control, and modify game devices and other related activities. An assignment-creator/modifier is provided for creating and modifying assignment templates for assignments that include at least one job to modify a non-gaming device. A user graphical interface is provided to control and monitor execution of the download and configuration and to present a graphical image at least indicative of the temporal periods for execution of a download executable assignment.

  • Pub Date: 2014/18/12
  • Number: 09171420
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for data routing and management using risk classification and data sampling

Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.

  • Pub Date: 2014/17/12
  • Number: 09661011
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Task execution in a SIMD processing unit

A SIMD processing unit processes a plurality of tasks which each include up to a predetermined maximum number of work items. The work items of a task are arranged for executing a common sequence of instructions on respective data items. The data items are arranged into blocks, with some of the blocks including at least one invalid data item. Work items which relate to invalid data items are invalid work items. The SIMD processing unit comprises a group of processing lanes configured to execute instructions of work items of a particular task over a plurality of processing cycles. A control module assembles work items into the tasks based on the validity of the work items, so that invalid work items of the particular task are temporally aligned across the processing lanes. In this way the number of wasted processing slots due to invalid work items may be reduced.

  • Pub Date: 2014/17/12
  • Number: 09250961
  • Owner: Imagination Technologies Limited
  • Location: Kings Langley, GB
  • Details: Visit USPTO

Visit USPTO Page


Task execution in a SIMD processing unit with parallel groups of processing lanes

A SIMD processing unit processes a plurality of tasks which each include up to a predetermined maximum number of work items. The work items of a task are arranged for executing a common sequence of instructions on respective data items. The data items are arranged into blocks, with some of the blocks including at least one invalid data item. Work items which relate to invalid data items are invalid work items. The SIMD processing unit comprises a group of processing lanes configured to execute instructions of work items of a particular task over a plurality of processing cycles. A control module assembles work items into the tasks based on the validity of the work items, so that invalid work items of the particular task are temporally aligned across the processing lanes. In this way the number of wasted processing slots due to invalid work items may be reduced.

  • Pub Date: 2014/17/12
  • Number: 09513963
  • Owner: Imagination Technologies Limited
  • Location: Kings Langley, GB
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for identifying users in media content based on poselets and neural networks

Systems, methods, and non-transitory computer-readable media can receive a first image including a representation of a first user. A second image including a representation of a second user can be received. A first set of poselets associated with the first user can be detected in the first image. A second set of poselets associated with the second user can be detected in the second image. The first image including the first set of poselets can be inputted into a first instance of a neural network to generate a first multi-dimensional vector. The second image including the second set of poselets can be inputted into a second instance of the neural network to generate a second multi-dimensional vector. A first distance metric between the first multi-dimensional vector and the second multi-dimensional vector can be determined.

  • Pub Date: 2014/17/12
  • Number: 09514390
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for combining multiple frames to produce media content with simulated exposure effects

Systems, methods, and non-transitory computer-readable media can capture media content including an original set of frames. A plurality of subsets of frames can be identified, based on a subset selection input, out of the original set of frames. An orientation-based image stabilization process can be applied to each subset in the plurality of subsets of frames to produce a plurality of stabilized subsets of frames. Multiple frames within each stabilized subset in the plurality of stabilized subsets of frames can be combined to produce a plurality of combined frames. Each stabilized subset of frames can be utilized to produce a respective combined frame in the plurality of combined frames. A time-lapse media content item can be provided based on the plurality of combined frames.

  • Pub Date: 2014/17/12
  • Number: 09524575
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of visualizing historical event correlations in a data center

Systems, methods, architectures and/or apparatus providing a visualization tool wherein an initial or simplified correlation tree includes a path between two hierarchically related objects; namely, a root cause object and an object representing an entity associated with an event of interest caused by the root cause entity, wherein the correlation tree may be incrementally increased in size and complexity in response to user input, such as via a graphical user interface, such that the user attention is focused on the specific entities and their relationships to thereby enable a user to quickly understand the various failure relationships.

  • Pub Date: 2014/17/12
  • Number: 09483343
  • Owner: Alcatel Lucent
  • Location: Boulogne-Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Providing forward secrecy in a terminating TLS connection proxy

An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. To provide the forward secrecy for this particular leg, the edge server selects an ephemeral value, and applies a cryptographic hash the value to compute a server random value, which is then transmitted back to the requesting client. That server random value is later re-generated at the cryptographic server to enable the cryptographic server to compute a master secret. The forward secrecy is enabled by ensuring that the ephemeral value does not travel on the wire.

  • Pub Date: 2014/17/12
  • Number: 09531691
  • Owner: Akamai Technologies, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Parallel metadata entry and physical scanning

A scanning system provides for scanning documents and generating respective electronic copies with associated metadata. A scanner scans one or more documents to produce respective electronic copies. A user interface captures metadata entered by a user regarding the documents. A controller is communicatively coupled to the scanner and the user interface, and enables the user interface to capture the metadata concurrently with the scanner's scanning the documents. The electronic copy and the metadata can be associated with one another or incorporated into a common file. Parallel metadata entry and physical scanning reduces time a user spends to perform the overall process, resulting in increased user satisfaction.

  • Pub Date: 2014/17/12
  • Number: 09473651
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Nitric oxide-releasing particles for nitric oxide therapeutics and biomedical applications

The presently disclosed subject matter relates to nitric oxide-releasing particles for delivering nitric oxide, and their use in biomedical and pharmaceutical applications.

  • Pub Date: 2014/17/12
  • Number: 09403851
  • Owner: The University of North Carolina at Chapel Hill
  • Location: Chapel Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for data usage accounting in a computing device

A method and system for data usage accounting are described herein. As an example, the method can be practiced in a setting that includes both secure applications and unsecure applications. Via one of the secure applications, a request to access data can be received in which the request is intended for a content provider via a system service. The request that is intended for the content provider via the system service can be intercepted and modified, which can cause the system service to direct the request back to the secure application instead of the content provider. In addition, a connection can be established with the content provider for the request through the secure application to enable data usage accounting of data that is returned by the content provider.

  • Pub Date: 2014/17/12
  • Number: 09232012
  • Owner: OpenPeak Inc.
  • Location: Boca Raton, US
  • Details: Visit USPTO

Visit USPTO Page


Interfacing with a virtual database system

User interactions with a database storage system allow creation of virtual databases based on point-in-time copies associated with a source database. Multiple point-in-time copies are obtained for each source database. A point-in-time copy retrieves data changed in the source database since the retrieval of a previous point-in-time copy. A virtual database (VDB) is created by creating a set of files in the data storage system and mounting the files on a database server allowing the database server to access the files. User interactions allow the user to specify the source database, a point in time associated with the source database and a destination server to create the virtual database. User input can specify other attributes associated with the virtual database including the file paths, database parameters etc. The user can specify schedules of various actions, including making and retention of point-in-time copies.

  • Pub Date: 2014/17/12
  • Number: 09389962
  • Owner: Delphix Corporation
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Heterocyclic compounds and uses thereof

Compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein.

  • Pub Date: 2014/17/12
  • Number: 09255108
  • Owner: Infinity Pharmaceuticals, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Frequent data set captures for volume forensics

Techniques, including systems and methods, take frequent captures of data sets for the purpose of forensic analysis. The data set captures are taken at the block level in various embodiments. Data set captures are used to instantiate forensic storage volumes that are attached to computing instances. The computing instances can access data in the forensic storage volumes at a state corresponding to a specified capture time. A user can select different capture times to re-instantiate the forensic storage volume to see how the forensic storage volume changed between captures.

  • Pub Date: 2014/17/12
  • Number: 09189343
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Efficiently providing virtual machine reference points

Embodiments are directed to establishing efficient virtual machine reference points and to specifying a virtual machine reference point to query incremental changes. In one scenario, a computer system accesses a stable virtual machine checkpoint that includes portions of underlying data stored in data storage, where the checkpoint is associated with a specific point in time. The computer system then queries the data storage to determine data storage identifiers that reference the point in time associated with the checkpoint and stores the determined data storage identifiers as a virtual machine reference point, where each subsequent change to the data storage results in an update to the data storage identifier, so that virtual machine reference point is usable to identify incremental changes from specific points in time on.

  • Pub Date: 2014/17/12
  • Number: 09430272
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Data set capture management with forecasting

A set of virtualized computing services may include multiple types of virtualized data store differentiated by characteristics such as latency, throughput, durability and cost. A sequence of captures of a data set from one data store to another may be scheduled to achieve a variety of virtualized computing service user and provider goals such as lowering a probability of data loss, lowering costs, and computing resource load leveling. Data set captures may be scheduled according to policies specifying fixed and flexible schedules and conditions including flexible scheduling windows, target capture frequencies, probability of loss targets and/or cost targets. Capture lifetimes may also be managed with capture retention policies, which may specify fixed and flexible lifetimes and conditions including cost targets. Such data set capture policies may be specified with a Web-based administrative interface to a control plane of the virtualized computing services.

  • Pub Date: 2014/17/12
  • Number: 09298737
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Association of item identifiers

A radio-frequency identification (RFID) reader system and an imaging device are provided. The RFID reader system is configured to read an RFID tag attached to an item at a location relative to a barcode. The barcode is associated with the item. Once the RFID reader system identifies the RFID tag, the imaging device uses the placement of the RFID tag and/or features of the RFID tag to identify and read the barcode. The imaging device may also identify the RFID tag. Once the barcode is identified, the barcode and the RFID tag are associated.

  • Pub Date: 2014/17/12
  • Number: 09305283
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Analyzing components related to a software application in a software development environment

According to one aspect of the present disclosure, a process for analyzing components related to a software application in a software development environment is disclosed. The process includes obtaining metadata information for each of a plurality of components from the software development environment, and generating an entry including extracting attribute information from the obtained metadata information for each component for use by a developer of the software application.

  • Pub Date: 2014/17/12
  • Number: 09342300
  • Owner: Blue Wolf Group, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Access operation with dynamic linking and access of data within plural data sources

A present invention embodiment includes a system with at least one processor for accessing data. The system creates a rule including one or more conditional expressions to link a first data object of a first data source to a second data object of a second data source. Data of the first data object is retrieved from the first data source in accordance with a request for the first data object. The system processes the rule to retrieve data of the second data object from the second data source that satisfies the one or more conditional expressions of the rule. Results for the request are produced by merging the data retrieved from the first and second data objects. Embodiments of the present invention further include a method and computer program product for accessing data in substantially the same manner described above.

  • Pub Date: 2014/17/12
  • Number: 09513876
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Thermal mechanical diffusion system and method

Provided is a thermal mechanical diffusion system and method. In accordance with the present invention, one end of a fiber under tension is vibrated while a portion of the fiber is heated. A push-pull action of one end of the fiber forces increased (or rapid) diffusion of dopants in the portion of the fiber that is in a heat zone, which receives the heat. By controlling the amplitude and frequency of the vibration, a diffusion profile of one or more fibers can be dictated with precision. Heat sources having narrower thermal profiles can enable greater precision in dictating the diffusion profile. As an example, this can be particularly useful for creating a diffusion taper within a fiber to be spliced, where the taper is a result of thermal expansion of the fiber core. Diffusion can occur much more rapidly than is typical.

  • Pub Date: 2014/16/12
  • Number: 09526129
  • Owner: 3SAE Technologies, Inc.
  • Location: Franklin, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for realtime creation and modification of a dynamically responsive media player

Methods and systems for a disabled user compliant video player for an end-to-end streaming web video solution affording accessibility for disabled users, including blind users and those with partial or poor vision, colorblind users, deaf users and those limited to only keyboard/voice input. Another embodiment of the present invention is directed to systems and methods for real-time creation and modification of specialized media players, to be used as stand-alone applications or as embedded data display applications.

  • Pub Date: 2014/16/12
  • Number: 09645796
  • Owner: PIKSEL, INC.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and medium of optimizing load reallocation in an in-memory data management grid

An in-memory data management (IMDM) system is described that includes an IMDM cluster, a load balancer, and a reallocation processor controller. The IMDM cluster includes a plurality of nodes. The controller determines whether there is an actionable load imbalance of existing data elements, stored among the plurality of nodes, based on a predefined criteria or rule. The controller further identifies a source node from which at least one data element is to be deleted and a target node to which the at least one data element that is to be deleted is to be added. The source node and target node contribute to the actionable load imbalance. The controller copies the at least one data element that is to be deleted from the source node into the target node, and deletes the at least one data element that is to be deleted from the source node.

  • Pub Date: 2014/16/12
  • Number: 09652161
  • Owner: Software AG USA Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program for preserving service continuity in a network function virtualization (NFV) based communication network

A system, method, and computer program product are provided for preserving service continuity in a Network Function Virtualization based (NFV-based) communication network. In use, a first virtual network function (VNF) instance associated with a first VNF in a first hardware unit in a Network Function Virtualization based (NFV-based) communication network is identified. Additionally, a second VNF instance on a second hardware unit is instantiated, the second VNF instance being compatible with the first VNF instance. Further, communication directed to the first VNF instance is diverted to the second VNF instance on the second hardware unit, in response to initiating the second VNF instance on a second hardware unit.

  • Pub Date: 2014/16/12
  • Number: 09384028
  • Owner: Amdocs Software Systems Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program for managing security in a network function virtualization (NFV) based communication network

A system, method, and computer program product are provided for providing security in a Network Function Virtualization based (NFV-based) communication network. In operation, a security attack is identified. Additionally, a first hardware unit attacked by the security attack is identified. Further, a hardware unit in which to initiate a security defense software program is identified. Moreover, the security defense software program is initiated in the identified hardware unit.

  • Pub Date: 2014/16/12
  • Number: 09460286
  • Owner: Amdocs Software Systems Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program for managing hierarchy and optimization in a network function virtualization (NFV) based communication network

A system, method, and computer program product are provided for managing hierarchy and optimization in network function virtualization based networks. In use, a first hardware unit of a plurality of hardware units associated with a network function virtualization (NFV) based communication network is identified, the first hardware unit being identified based on a first load characteristic associated with the first hardware unit. Further, a first virtual network function (VNF) instance associated with the first hardware unit is identified, the first VNF instance being associated with usage of at least one service. Additionally, at least one traffic route associated with the first VNF instance is identified, the at least one traffic route being associated with usage of the at least one service. Furthermore, a second hardware unit for handling at least a portion of a workload associated with the at least one service is identified, the second hardware unit being identified based on a second load characteristic associated with the second hardware unit, and the second hardware unit being capable of utilizing the at least one traffic route. Still yet, a second VNF instance is initiated in the second hardware unit. Moreover, at least part of the at least one service is migrated from the first VNF instance to the second VNF instance without disrupting the service.

  • Pub Date: 2014/16/12
  • Number: 09430262
  • Owner: Amdocs Software Systems Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Substituted piperidinyltetrahydroquinolines

The present application relates to novel substituted piperidinyltetrahydroquinolines, to processes for their preparation, to their use for the treatment and/or prevention of diseases and to their use for preparing medicaments for the treatment and/or prevention of diseases, in particular for the treatment and/or prevention of diabetic microangiopathies, diabetic ulcers on the extremities, in particular for promoting wound healing of diabetic foot ulcers, diabetic heart failure, diabetic coronary microvascular heart disorders, peripheral and cardial vascular disorders, thromboembolic disorders and ischaemias, peripheral circulatory disturbances, Raynaud's phenomenon, CREST syndrome, microcirculatory disturbances, intermittent claudication, and peripheral and autonomous neuropathies.

  • Pub Date: 2014/16/12
  • Number: 09624198
  • Owner: Bayer Pharma Aktiengesellschaft
  • Location: Berlin, DE
  • Details: Visit USPTO

Visit USPTO Page


Substituted bipiperidinyl derivatives

The invention relates to novel substituted bipiperidinyl derivatives, to processes for their preparation, to their use for the treatment and/or prevention of diseases and to their use for preparing medicaments for the treatment and/or prevention of diseases, in particular for the treatment and/or prevention of diabetic microangiopathies, diabetic ulcers on the extremities, in particular for promoting wound healing of diabetic foot ulcers, diabetic heart failure, diabetic coronary microvascular heart disorders, peripheral and cardial vascular disorders, thromboembolic disorders and ischaemias, peripheral circulatory disturbances, Raynaud's phenomenon, CREST syndrome, microcirculatory disturbances, intermittent claudication, and peripheral and autonomous neuropathies.

  • Pub Date: 2014/16/12
  • Number: 09624199
  • Owner: Bayer Pharma Aktiengesellschaft
  • Location: Berlin, DE
  • Details: Visit USPTO

Visit USPTO Page


Post backup catalogs

A method, article of manufacture, and apparatus for processing data. In some embodiments, this includes analyzing a first container at a block level, determining a first level of granularity based on the analysis of the first container, based on the first level of granularity, identifying a first set of data objects, storing metadata of the first set of data objects in a recovery catalog, based on the first set of data objects, identifying a second container, analyzing the second container at a block level, determining a second level of granularity based on the analysis of the second container, based on the second level of granularity, identifying a second set of data objects, storing metadata of the second set of data objects in the recovery catalog, wherein the recovery catalog is stored in a storage device.

  • Pub Date: 2014/16/12
  • Number: 09417966
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems of vehicle telematics enabled customer experience

An automobile including a self-diagnostic monitoring server and healing can be implemented. The vehicle monitoring system can include an automobile system comprising a self-powered motor vehicle used for transportation. The vehicle system can include a sensor system arranged on a set of components of the automobile system and coupled to an energy providing system in the automobile system to be provided with energy by said energy providing system, said sensor system obtaining data about at least one property for each component of the set of components of the automobile system and converting the data into signals. The vehicle system can include a communication system in the automobile system. The vehicle system can include an analytics system to receive the data and determine a state of each component of the automobile system based on the at least one property of each component.

  • Pub Date: 2014/16/12
  • Number: 09286736
  • Details: Visit USPTO

Visit USPTO Page


Management of certificate authority (CA) certificates

Systems and methods for automatically installing CA certificates received from a network security appliance by a client security manager to make the CA certificate become a trusted CA certificate to a client machine are provided. In one embodiment, a client security manager establishes a connection with a network security appliance through a network, wherein the client security manager is configured for managing security of a client at the client side and the network security appliance is configured for managing the security of traffic pass through the network. The client security manager downloads from the network security appliance a certificate authority (CA) certificate to be used for signing a server certificate of a secure connection between the network security appliance and the client and automatically installs the CA certificate into a certificate store of the client.

  • Pub Date: 2014/16/12
  • Number: 09455980
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


In-field smart device updates

Methods and systems for causing a device to join a network or fabric. A joining device sends an indication that the electronic device is not connected to a network type and receives a device ID for an assisting device to assist the electronic device in joining a network of the network type. Moreover, the assisting device resides on the network. The joining device then authenticates to the assisting device from the assisting device and receives network credentials for the network. Furthermore, the joining device joins the network using the network credentials.

  • Pub Date: 2014/16/12
  • Number: 09130910
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Facilitating same day payment transactions

The present disclosure relates to systems, methods, and devices for sending and receiving payments using an integrated payment and messaging system. In particular, the integrated payment and messaging system allows users to send and receive electronic payments as well as exchange messages. For example, one or more implementations involve facilitating same day push-to-debit payment transactions between a user and a co-user. To illustrate, one or more implementations involve sending a push-to-debit request to credit funds for the payment amount of the payment transaction to a debit card of a co-user, the push-to-debit request being formatted for same day processing.

  • Pub Date: 2014/16/12
  • Number: 09342831
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Digital rights and integrity management in three-dimensional (3D) printing

Systems, methods and media for managing digital rights and pre-verification of structural integrity in three-dimensional (3D) printing are provided. In one example, a system comprises at least one module, executing on one or more computer processors, to receive a request from a user to print a 3D object by a 3D printer or printing service and receive a conditional authorization from an owner of digital rights in the 3D object to print the 3D object. The conditional authorization can include a printing specification or limitation. The at least one module pre-verifies, for structural integrity once printed by the 3D printer or printing service, a digital model on which the 3D object is based. In response to a received conditional authorization, the at least one module transmits instructions to the 3D printer or printing service to print the 3D object.

  • Pub Date: 2014/16/12
  • Number: 09595037
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Coating systems for cement composite articles

A method for making a coating composition by mixing one or more latex polymers and an aliphatic epoxy resin system having an epoxy equivalent weight less than 1000 and being distinct from the one or more latex polymers to provide an aqueous first component, and providing a second component having reactive groups that can react with the one or more epoxy resins. A mixture of the first and second components provides a film-forming curable coating composition that may be used on substrates including cement, cement fiberboard, wood, metal, plastic, ceramic, glass and composites.

  • Pub Date: 2014/16/12
  • Number: 09593051
  • Owner: Valspar Sourcing, Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Capturing snapshots of offload applications on many-core coprocessors

Methods are provided. A method for swapping-out an offload process from a coprocessor includes issuing a snapify_pause request from a host processor to the coprocessor to initiate a pausing of the offload process executing by the coprocessor and another process executing by the host processor using a plurality of locks. The offload process is previously offloaded from the host processor to the coprocessor. The method further includes issuing a snapify_capture request from the host processor to the coprocessor to initiate a local snapshot capture and saving of the local snapshot capture by the coprocessor. The method also includes issuing a snapify_wait request from the host processor to the coprocessor to wait for the local snapshot capture and the saving of the local snapshot capture to complete by the coprocessor.

  • Pub Date: 2014/16/12
  • Number: 09652247
  • Owner: NEC Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Virtualization of the evolved packet core to create a local EPC

Systems and methods are disclosed for a local evolved packet core (EPC) that interoperates with an eNodeB and a remote EPC. if it is determined that it is possible or likely that the eNodeBs may lose the connection to the remote EPC, or if a connection has been lost, the local EPC may serve as a transparent proxy between the eNodeBs and the remote EPC, identify active sessions and transparently proxy those sessions, destroy or de-allocate unneeded sessions or bearers, and download and synchronize application data and authentication credentials, such as HSS or AAA data, to provide authentication to mobile devices once offline. The use of the local EPC and/or the remote EPC may be toggled, or switched, preemptively or reactively, based on various network conditions. The remote EPC may be disconnected proactively when the local EPC determines that there is no connectivity.

  • Pub Date: 2014/15/12
  • Number: 09479934
  • Owner: Parallel Wireless, Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Threat detection using URL cache hits

Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth. Correlations may be based on historical data for a particular machine, or a group of machines such as similarly configured endpoints. Similar inferences of malicious activity can be based on the nature of a variation, including specific patterns of variation known to be associated with malware and any other unexpected patterns that deviate from normal behavior. Embodiments described herein use variations in, e.g., server software updates or URL cache hits on an endpoint, but the techniques are more generally applicable to any endpoint attribute that varies in a manner correlated with malicious activity.

  • Pub Date: 2014/15/12
  • Number: 09419989
  • Owner: Sophos Limited
  • Location: Abingdon, GB
  • Details: Visit USPTO

Visit USPTO Page


Threat detection using endpoint variance

Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth. Correlations may be based on historical data for a particular machine, or a group of machines such as similarly configured endpoints. Similar inferences of malicious activity can be based on the nature of a variation, including specific patterns of variation known to be associated with malware and any other unexpected patterns that deviate from normal behavior. Embodiments described herein use variations in, e.g., server software updates or URL cache hits on an endpoint, but the techniques are more generally applicable to any endpoint attribute that varies in a manner correlated with malicious activity.

  • Pub Date: 2014/15/12
  • Number: 09571512
  • Owner: Sophos Limited
  • Location: Abingdon, GB
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to synchronize artifact relationships across a plurality of repositories

Systems and methods synchronize artifact relationships across a plurality of repositories. One example method includes mapping a first relationship of a first relationship type between a first source artifact in a first repository and a second source artifact to a second relationship of a second relationship type between a first target artifact in a second repository and a second target artifact according to a relationship mapping provided by a schema mapping guide. One example system includes a repository synchronizer to synchronize artifact relationship across at least first and second repositories. The repository synchronizer can include at least one processor. The example system can further include one or more schema mapping guides that provide one or more relationship mappings between the first and second repositories.

  • Pub Date: 2014/15/12
  • Number: 09459839
  • Owner: TASKTOP TECHNOLOGIES, INCORPORATED
  • Location: Vancouver, CA
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for identifying malware

A computer-implemented method for identifying malware may include (1) determining, for multiple commands within bytecode associated with a malware program, whether each command constitutes an invocation command, (2) filtering, based on the determination, invocation commands from the bytecode, (3) adding, for each invocation command filtered from the bytecode, an opcode, a format code, and a function prototype to a collection of opcodes, format codes, and function prototypes, (4) generating a digital fingerprint of the collection including the opcode, the format code, and the function prototype for each invocation command filtered from the bytecode, and (5) performing, by a computer security system, a remedial action to protect a user in response to detecting the presence of a variant of the malware program by determining that the digital fingerprint matches a candidate instance of bytecode under evaluation. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2014/15/12
  • Number: 09519780
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Obfuscating debugging filenames

An information handling system, method, and computer-readable media for obfuscating debugging filenames during a software build are described. The system comprises one or more processors, a memory, and one or more program modules stored on the memory and executable by the one or more processors. The one or more program modules compile a source code file of a plurality of source code files into a program, generate a debugging file including debugging information for the program, utilize a one-way deterministic function to generate an obfuscated filename for the debugging file, and include a link to the debugging file in the program, the link including the obfuscated filename.

  • Pub Date: 2014/15/12
  • Number: 09483381
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring systems and methods

A monitoring system includes a plurality of modules to sense temperature and vibrations of a motor assembly, a hub computer to collect the sensed temperature and vibrations, and an analyzer computer to analyze the collected temperature and vibrations. The modules contain detectors that measure a temperature and vibrations in three axes of the motor assembly, a transceiver integrated circuit that measures a die temperature of the transceiver integrated circuit, a microcontroller integrated circuit that self-adjusts its clock pulses, and a memory that stores parameters set for the operation of the modules. The microcontroller integrated circuit and the memory are configured to check parameters corruption upon transferring the parameters from the memory to the microcontroller integrated circuit and prior to utilizing by the microcontroller integrated circuit. The microcontroller integrated circuit is also configured to perform power control operations by turning off sections of the microcontroller integrated circuit over periodic durations.

  • Pub Date: 2014/15/12
  • Number: 09435698
  • Owner: TDG AEROSPACE, INC.
  • Location: Escondido, US
  • Details: Visit USPTO

Visit USPTO Page


Location-based discovery of network members by personal attributes for alternate channel communication

User mobile devices are equipped to discover each other through an ad hoc network, based on their location and proximity or based on mobile network reporting to one another. Locations may be reported through global positioning methods and cross-referenced by other users. Following discovery and consent, the mobile devices are connected to one another via various means, other than the ad hoc network, and utilize functions provided by services such as SMS, E-mail, chat/instant messaging, multimedia, or video. The users may be members of a common social network, and can thereby exchange social network attributes.

  • Pub Date: 2014/15/12
  • Number: 09264875
  • Owner: WIRELESS DISCOVERY LLC
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


Inter-processor communication techniques in a multiple-processor computing platform

This disclosure describes communication techniques that may be used within a multiple-processor computing platform. The techniques may, in some examples, provide software interfaces that may be used to support message passing within a multiple-processor computing platform that initiates tasks using command queues. The techniques may, in additional examples, provide software interfaces that may be used for shared memory inter-processor communication within a multiple-processor computing platform. In further examples, the techniques may provide a graphics processing unit (GPU) that includes hardware for supporting message passing and/or shared memory communication between the GPU and a host CPU.

  • Pub Date: 2014/15/12
  • Number: 09626234
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Image segmentation using color and depth information

Image segmentation utilizing 3D image data. A plurality of pixels of an image frame may be segmented based at least on a function of pixel color and a pixel depth over the spatial positions within the image frame. A graph-cut technique may be utilized to optimize a data cost and smoothness cost in which at least the data cost function includes a component that is a dependent on a depth associated with a given pixel in the frame. In further embodiments, both the data cost and smoothness functions are dependent on a color and a depth associated with each pixel. Components of at least the data cost function may be weighted for each pixel to arrive at most likely segments. Segmentation may be further predicated on a pre-segmentation label assigned based at least on a 3D spatial position clusters.

  • Pub Date: 2014/15/12
  • Number: 09547907
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying a portion of an image without content based on a measure of diversity of pixels in the portion

A digital magazine server detects a portion of an image including pixels having similar or matching color values. Values are identified for pixels within the portion based on color values of the pixels and a measure of diversity of color is determined based on the identified values. The measure of color diversity is compared to a threshold value, and if the measure of diversity does not exceed the threshold value, the digital magazine server stores information indicating the portion does not include content. The digital magazine server may also identify an additional portion within a threshold distance of the portion if the portion does not include content and determine whether the additional portion includes pixels having matching or similar color values.

  • Pub Date: 2014/15/12
  • Number: 09342740
  • Owner: Flipboard, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


HTTP header-based adaptable authentication mechanism

The disclosure is generally directed to systems and methods for HTTP header-based authentication. For example, the systems and methods include receiving, at a mobile platform server, a first request message from a client device, the first request message requesting to download an application from the mobile platform server, sending, to the client device, a first response message having a first authentication query within header portions of the first response message, receiving, at the mobile platform server, a second request message having first authentication credentials within header portions of the second request message, sending, to the client device, a second response message having a second authentication query within header portions of the second response message, receiving, at the mobile platform server first device, a third request message having second authentication credentials within header portions of the third request message, and sending, to the client device, the application.

  • Pub Date: 2014/15/12
  • Number: 09641504
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Determining a dominant color of an image based on pixel components

A digital magazine server determines a dominant color present in an image using a clustering algorithm. Color components of each pixel in the image are identified used to generate vectors associated with each pixel. Based on the vectors associated with the pixels, clusters including one or more pixels are generated using a clustering algorithm (e.g., k-means). The digital magazine server generates a characteristic vector for each cluster based on the vectors included in the cluster and selects a set of clusters based on their characteristic vectors. A centroid identifying the dominant color of the image is determined from the characteristic vectors of clusters in the set.

  • Pub Date: 2014/15/12
  • Number: 09576554
  • Owner: Flipboard, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Determined configuration update for edge components

A method, device, system, and computer program product that relate to configuration of an edge component and subcomponents to adapt data from a Device to a readable form and to communicate the adapted data to a Network End Environment. The Network End Environment includes a user interface by which a user requests that the edge component is updated to have a configuration version stored at a source. The system processes the request and updates the edge component configuration. The edge component is updated to a source configuration at a predetermined time interval according to one of a full configuration refresh or a delta configuration. Data received and processed by the edge component can thereafter be pushed to the Network End Environment for storage and/or use in a Network application. The edge component is described as a Connector, and the subcomponents of the edge component are described as Connector components.

  • Pub Date: 2014/15/12
  • Number: 09553766
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Controlling active warning levels based on performance statistics for combinations of different types of characteristic dimensions and values reported by user terminal applications

An application analysis computer obtains reports from user terminals containing application performance metrics and dimensions having values characterizing the applications and the user terminals. Statistics for each different type of the performance metrics across the reports are generated. One of the statistics, for one type of the performance metrics, that has changed at least a threshold amount between two time intervals is identified, and that performance metric is selected for analysis. For each combination of a different type of the characteristic dimensions and a different value among the values occurring for the type of the characteristic dimension, a statistic is generated for the selected type of the performance metrics from the reports. Information is communicated based on an active warning ID that was selected based on being associated with a combination of the type of the characteristic dimension and one of the statistics that changed at least a threshold amount.

  • Pub Date: 2014/15/12
  • Number: 09559893
  • Owner: CA, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Compromised authentication information clearing house

Techniques for maintaining potentially compromised authentication information for a plurality of accounts may be provided. An individual piece of authentication information may be associated with one or more tags that indicate access rights with respect to requestors that also provide and maintain other potentially compromised authentication information. A subset of the potentially compromised authentication information may be determined based on the one or more tags in response to a request from a requestor for the potentially compromised authentication information. In an embodiment, the subset of the potentially compromised authentication information may be provided to the requestor.

  • Pub Date: 2014/15/12
  • Number: 09503451
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Composition of customized presentations associated with a social media application

According to a general aspect, a method can include receiving a request, triggered via a consumer account, to access, using a social media application, a plurality of sharer content. The sharer content can be associated with a sharer account using the social media application. The method can include retrieving, in response to the request, a consumer value and a relationship value. The consumer value can represent an interaction with the social media application via the consumer account and the relationship value can characterize a relationship between a consumer identifier of the consumer account and a sharer identifier of the sharer account. The method can include selecting a subset of sharer content from the plurality of sharer content based on a combination of the consumer value and the relationship value, and can include defining a portion of a presentation customized for the consumer account using the selected subset of sharer content.

  • Pub Date: 2014/15/12
  • Number: 09225756
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method decoupling visibility bins and render tile dimensions for tiled rendering

An apparatus and method are described for decoupling visibility bins and render tile dimensions for tiled rendering. In one embodiment of the invention, a single visibility pass over the scene objects is performed and all the visibility bins are generated in parallel. This allows for high performance when the number of render tiles exceeds the number of visibility bins. The regions upon which visibility testing/recording is done is decoupled from the render tile regions in one embodiment of the invention. This allows a given visibility bin to map to multiple render tiles, thus allowing a fixed number of visibility bins to support any number of render tiles.

  • Pub Date: 2014/15/12
  • Number: 09600926
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


RFID tag authentication with public-key cryptography

An authentication method includes RFID readers authenticating RFID tags using public-key cryptography. A tag manufacturer or other legitimate authority produces a tag private-public key pair and stores the tag private key in externally unreadable tag memory and the tag public key in externally readable tag memory. The authority produces a master private-public key pair and distributes the master public key to readers in the field. The authority generates a tag-specific electronic signature based on at least the tag public key and the master private key and stores this signature in externally readable tag memory. A reader authenticates the tag by retrieving the tag public key and electronic signature from the tag, verifying the authenticity of the tag public key using the master public key and the electronic signature, challenging the tag, receiving a response from the tag to the challenge, and verifying the response using the tag public key.

  • Pub Date: 2014/14/12
  • Number: 09111283
  • Owner: Impinj, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture and identification system and process

A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object.

  • Pub Date: 2014/14/12
  • Number: 09330327
  • Owner: NANT HOLDINGS IP, LLC
  • Location: Culver City, US
  • Details: Visit USPTO

Visit USPTO Page


Technologies for efficient synchronization barriers with work stealing support

Technologies for multithreaded synchronization and work stealing include a computing device executing two or more threads in a thread team. A thread executes all of the tasks in its task queue and then exchanges its associated task stolen flag value with false and stores that value in a temporary flag. Subsequently, the thread enters a basic synchronization barrier. The computing device performs a logical-OR reduction over the temporary flags of the thread team to produce a reduction value. While waiting for other threads of the thread team to enter the barrier, the thread may steal a task from a victim thread and set the task stolen flag of the victim thread to true. After exiting the basic synchronization barrier, if the reduction value is true, the thread repeats exchanging the task stolen flag value and entering the basic synchronization barrier. Other embodiments are described and claimed.

  • Pub Date: 2014/12/12
  • Number: 09348658
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and/or methods for policy-based access to data in memory tiers

Certain example embodiments provide efficient policy-based access to data stored in memory tiers, including volatile local in-process (L1) cache memory of an application and at least one managed (e.g., non-volatile) in-memory (L2) cache. Operations include receiving an access request for access to a data element in L2; detecting whether a copy of the data element is in L1; if so, copying the data element and the access policy from L2 to L1 and providing the user with access to the copy of data element from L1 if the access policy allows access to the user; and if not, determining, by referring to a copy of the access policy stored in L1, whether the user is allowed to access the data element, and, if the user is allowed to access the data element, providing the user with access to the copy of the data element from the L1 cache memory.

  • Pub Date: 2014/12/12
  • Number: 09465752
  • Owner: Software AG USA, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for accelerating malware analyses in automated execution environments

The disclosed computer-implemented method for accelerating malware analyzes in automated execution environments may include (1) monitoring a file that is undergoing a malware analysis in an automated execution environment, (2) while monitoring the file, detecting one or more behaviors exhibited by the file during the malware analysis in the automated execution environment, (3) determining, during the malware analysis, that the file exceeds a threshold level of suspicion based at least in part on the behaviors exhibited by the file, and then in response to determining that the file exceeds the threshold level of suspicion, (4) initiating a security action prior to reaching a scheduled completion of the malware analysis. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2014/12/12
  • Number: 09479531
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for triggering on platform usage

A system and method for triggering on platform usage can include at a platform, receiving and storing a trigger configuration of an account; operating a platform comprising internally executing a process on behalf of an account and publishing at least one event when executing the process; at the platform, incrementing a counter in response to the at least one event and if the stored trigger configuration species a usage key associated with a category of counted events of the at least one event; monitoring counters in a context of an associated trigger; and processing the trigger upon the counter satisfying condition of an associated trigger.

  • Pub Date: 2014/12/12
  • Number: 09319857
  • Owner: Twilio, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Resolving deployment conflicts in heterogeneous environments

Techniques are disclosed for managing deployment conflicts between applications executing in one or more processing environments. A first application is executed in a first processing environment and responsive to a request to execute the first application. During execution of the first application, a determination is made to redeploy the first application for execution partially in time on a second processing environment providing a higher capability than the first processing environment in terms of at least a first resource type. A deployment conflict is resolved between the first application and at least a second application.

  • Pub Date: 2014/12/12
  • Number: 09317332
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing speed and reach of mass notification alert delivery

A system and a method are disclosed for predicting potential reach of an alert to a targeted audience, targeted personal delivery devices and targeted non-personal notification delivery devices in an emergency mass notification system. The method includes receiving recipients and alert delivery devices data which define a targeted audience and devices of an emergency alert. The method further comprises evaluating contact and configuration data targeting quality rating, tracking data targeting quality rating and real-time data targeting quality rating based on the received recipients and devices data and a data sources repository. Responsive to the targeting quality ratings and prediction weighting data (e.g., numeric weights and descriptive thresholds), the method generating one or more predictions of the potential reach of the alert based on the targeting quality ratings.

  • Pub Date: 2014/12/12
  • Number: 09564044
  • Owner: AtHoc, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Online decorating system for edible products

A web-enabled standalone application may, in selected implementations, prevent received license-controlled image data from unauthorized re-use, editing, or distribution, and permits image processing, such as applying the International Color Consortium's color correction process, at the local control device. The web-enabled standalone application may further generate a printer specific byte stream based on post-image processed data, providing a color managed workflow independent of local control device operating system print drivers.

  • Pub Date: 2014/12/12
  • Number: 09345264
  • Owner: DECOPAC, INC.
  • Location: Anoka, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-core programming apparatus and method for restoring data arrays following a power gating event

An apparatus includes a programmer, a stores, and a plurality of cores. The programmer programs a fuse array with compressed configuration data. The stores provides for storage and access of decompressed configuration data sets. Each of a plurality of cores is coupled to the fuse array. One of the cores is accesses the fuse array upon power-up/reset to decompress and store decompressed configuration data sets for one or more cache memories. Each of the cores includes reset logic and sleep logic. The reset logic employs the decompressed configuration data sets to initialize the one or more cache memories upon power-up/reset. The sleep logic determines that power is restored following a power gating event, and subsequently accesses the stores to retrieve and employ the decompressed configuration data sets to initialize the one or more caches following the power gating event.

  • Pub Date: 2014/12/12
  • Number: 09594691
  • Owner: VIA ALLIANCE SEMICONDUCTOR CO., LTD.
  • Location: Shanghai, CN
  • Details: Visit USPTO

Visit USPTO Page


Multi-core microprocessor power gating cache restoral programming mechanism

An apparatus includes a device programmer and a stores. The device programmer programs a semiconductor fuse array with compressed configuration data for a plurality of cores disposed on a die. The stores includes a plurality of sub-stores that each correspond to each of the plurality of cores, where one of the plurality of cores is configured to access the semiconductor fuse array upon power-up/reset to read and decompress the compressed configuration data, and to store a plurality of decompressed configuration data sets for one or more cache memories within the each of the plurality of cores in the plurality of sub-stores, and where, following a power gating event, one of the each of the plurality of cores subsequently accesses a corresponding one of the each of the plurality of sub-stores to retrieve and employ the decompressed configuration data sets to initialize the one or more caches.

  • Pub Date: 2014/12/12
  • Number: 09594690
  • Owner: VIA ALLIANCE SEMICONDUCTOR CO., LTD.
  • Location: Shanghai, CN
  • Details: Visit USPTO

Visit USPTO Page


Multi-core data array power gating cache restoral programming mechanism

An apparatus including a device programmer, a stores, and a plurality of cores. The device programmer programs a semiconductor fuse array with compressed configuration data for a plurality of cores disposed on a die. The stores has a plurality of sub-stores that each correspond to each of the plurality of cores, where one of the plurality of cores is configured to access the semiconductor fuse array upon power-up/reset to read and decompress the configuration data, and to store a plurality of decompressed configuration data sets for one or more cache memories within the each of the plurality of cores in the plurality of sub-stores. The plurality of cores each has sleep logic that is configured to subsequently access a corresponding one of the each of the plurality of sub-stores to retrieve and employ the decompressed configuration data sets to initialize the one or more caches following a power gating event.

  • Pub Date: 2014/12/12
  • Number: 09582429
  • Owner: VIA ALLIANCE SEMICONDUCTOR CO., LTD.
  • Location: Shanghai, CN
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and devices for dynamically modifying routed messages

Methods, servers and systems for communicating signaling information in a telecommunications signaling network implement methods that include receiving a first message encoding signaling information from a source component and processing the message using a fixed pipeline having a plurality of modules, each module having at least one procedure for performing a specific set of tasks. Application level routing operations may be performed to identify a suitable destination component. Information contained in the first message may be used to generate a second message encoding signaling information, which is sent to the identified destination component.

  • Pub Date: 2014/12/12
  • Number: 09306891
  • Owner: OPENET TELECOM LTD.
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for arrhythmia tracking and scoring

A dashboard centered around arrhythmia or atrial fibrillation tracking is provided. The dashboard includes a heart or cardiac health score that can be calculated in response to data from the user such as their ECG and other personal information and cardiac health influencing factors. The dashboard also provides to the user recommendations or goals, such as daily goals, for the user to meet and thereby improve their heart or cardiac health score. These goals and recommendations may be set by the user or a medical professional and routinely updated as his or her heart or cardiac health score improves or otherwise changes. The dashboard is generally displayed from an application provided on a smartphone or tablet computer of the user.

  • Pub Date: 2014/12/12
  • Number: 09420956
  • Owner: ALIVECOR, INC.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method for providing media content using multi-channel navigator and route sequences

An electronic device displays a first row of graphical representations, each corresponding to a context element of a route sequence map of a first user. The route sequence map includes context elements organized in a hierarchical structure, each context element having one or more property values specifying an action to be performed by the server or a link to one or more child context elements in the hierarchical structure. In response to a selection of a first graphical representation from the first row, a first message having at least a first identifier (ID) of the first graphical representation is transmitted to the server. A second message is received from the server in response to the first message, the second message including data identifying a second row of context elements of the route sequence map. The second row is displayed as a child row to the first row.

  • Pub Date: 2014/12/12
  • Number: 09647898
  • Owner: TELETECH HOLDINGS, INC.
  • Location: Englewood, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing data in a communication network

A method for managing a plurality of files in a communication network having a plurality of clients includes a server receiving () metadata associated with a secured file stored in a virtual data drive of a first client. The server also receives () data segments associated with the file from the virtual data drive of the first client. The server stores the metadata and data segments associated with the file at the server. The server generates () a first representation of the file based on the received metadata and data segments associated with the file and sends () the first representation of the file to the plurality of clients. Next, the server receives () a request from a second client for at least one data segment of the file. The server authenticates the request based on a plurality of access rights of a user of the second client and sends () the at least one data segment of the file to the second client when the request is authenticated.

  • Pub Date: 2014/12/12
  • Number: 09277009
  • Owner: Google Technology Holdings LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for sensory stimulation

An apparatus for producing an electrosensory sensation to a body member (). The apparatus comprises one or more conducting electrodes (), each of which is provided with an insulator (). When the body member () is proximate to the conducting electrode, the insulator prevents flow of direct current from the conducting electrode to the body member. A capacitive coupling over the insulator () is formed between the conducting electrode () and the body member (). The conducting electrodes are driven by an electrical input which comprises a low-frequency component () in a frequency range between 10 Hz and 500 Hz. The capacitive coupling and electrical input are dimensioned to produce an electrosensory sensation. The apparatus is capable of producing the electrosensory sensation independently of any mechanical vibration of the one or more conducting electrodes () or insulators ().

  • Pub Date: 2014/12/12
  • Number: 09454880
  • Owner: Senseg OY
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Integrated support for application porting transparency and streamlined system migration in heterogeneous platform environments

Converting data for an application ported from an operating system (OS) platform of a first computer to an OS platform of a second computer. Configuration information associated with ported application including the first computer's OS platform is stored on the second computer. The ported application executing on the second computer receives first data encoded in a first code set. The OS of the second computer receives a request to convert the first data to a second data encoded in a second code set, locates a first-code-set-to-second-code-set mapping based on at least maintained code set mappings of the OS of the first computer, and converts the first data to the second data using the located first-code-set-to-second-code-set mapping. The second data is compatible for processing on the second computer and output from converting the data on the second computer is equivalent to an output from converting the data on the first computer.

  • Pub Date: 2014/12/12
  • Number: 09436528
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Fast serialization for data transfer

The present disclosure describes methods, systems, and computer program products for serializing data for data transfer. One computer-implemented method includes analyzing a column of data stored in the first database to determine at least one serialization parameter, the at least one serialization parameter comprises a repetition counter, a replication counter, or a variable type; determining a data serialization scheme associated with the data based on at least one of the repetition count or the replication counter; determining a variable serialization scheme associated with the data based on the variable type; repeating the analyzing, the determining of the data serialization scheme, and the determining of the variable serialization scheme; serializing the data stored in the first database using the data serialization scheme associated with the data and the variable serialization scheme associated with the data; and transferring the serialized data to the second database.

  • Pub Date: 2014/12/12
  • Number: 09613110
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Exposing proprietary data to a hypervisor as native hypervisor data

Exposing a proprietary disk file to a hypervisor as a native hypervisor disk file. In one example embodiment, a method of exposing a proprietary disk file to a hypervisor as a native hypervisor disk file includes various acts. For example, the method includes identifying a proprietary disk file having a proprietary format. The method further includes creating a plugin file corresponding to the proprietary disk file. The method also includes intercepting read requests directed to the plugin file. The method further includes responding to each of the read requests with data gathered from the plugin file and/or the proprietary disk file, where the data is structured such that the data appears to be gathered from a native hypervisor disk file due to being formatted in a native format of the hypervisor.

  • Pub Date: 2014/12/12
  • Number: 09311003
  • Owner: STORAGECRAFT TECHNOLOGY CORPORATION
  • Location: Draper, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting deployment conflicts in heterogenous environments

Techniques are disclosed for managing deployment conflicts between applications executing in one or more processing environments. A first application is executed in a first processing environment and responsive to a request to execute the first application. During execution of the first application, a determination is made to redeploy the first application for execution partially in time on a second processing environment providing a higher capability than the first processing environment in terms of at least a first resource type. A deployment conflict is detected between the first application and at least a second application.

  • Pub Date: 2014/12/12
  • Number: 09311154
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data abstraction layer for interfacing with reporting systems

A data transformation system receives data from one or more external source systems and stores and transforms the data for providing to reporting systems. The data transformation system maintains multiple versions of data received from an external source system. The data transformation system can combine data from different versions of data and provide to the reporting system. As a result, external source systems that do not maintain data in a format appropriate for reporting systems and/or do not maintain sufficient historical data to generate different types of reports are able to generate these reports. The data transformation system can also enhance older versions of data stored in the system or exclude portions of data from reports. The data transformation system can purge older versions of data so that older data that is less frequently requested is maintained at a lower frequency than recent data.

  • Pub Date: 2014/12/12
  • Number: 09037534
  • Owner: GoodData Corporation
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Automated epithelial nuclei segmentation for computational disease detection algorithms

In aspects, the subject innovation can comprise systems and methods capable of automatically labeling cell nuclei (e.g., epithelial nuclei) in tissue images containing multiple cell types. The enhancements to standard nuclei segmentation algorithms of the subject innovation can enable cell type specific analysis of nuclei, which has recently been shown to reveal novel disease biomarkers and improve diagnostic accuracy of computational disease classification models.

  • Pub Date: 2014/12/12
  • Number: 09626583
  • Owner: University of Pittsburg—Of the Commonwealth System of Higher Education
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for time-lapse selection subsequent to capturing media content

Systems, methods, and non-transitory computer-readable media can capture media content including an original set of frames. A selection of a time-lapse amount can be received. A subset of frames from the original set of frames can be identified based on the time-lapse amount. An orientation-based image stabilization process can be applied to the subset of frames to produce a stabilized subset of frames. A stabilized time-lapse media content item can be provided based on the stabilized subset of frames.

  • Pub Date: 2014/11/12
  • Number: 09392174
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing information regarding future content

Systems, methods, and non-transitory computer-readable media can determine a frequency by which content items published by an entity are to be provided for a user. Examples of content items previously published by the entity are selected. Information is provided to assist the user in a determination about whether to assent to provision of content items published by the entity for the user.

  • Pub Date: 2014/11/12
  • Number: 09560154
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Orientation measurements for drift correction

Technology for measuring orientation is described. Signals can be received from a signal source having a known location via at least two antennas of the interferometer that are separated by a predefined distance. A delay between receiving the signals from the signal source at the at least two antennas of the interferometer can be calculated. A line of bearing (LOB) of the interferometer with respect to the signal source can be determined based on the delay between receiving the signals at the at least two antennas from the signal source. The orientation of the interferometer can be measured in a global coordinate system using the LOB of the interferometer with respect to the signal source.

  • Pub Date: 2014/11/12
  • Number: 09395447
  • Owner: Raytheon Company
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and using temporal metadata partitions

Concepts and technologies are disclosed herein for generating and using temporal metadata partitions. Metadata can be stored in temporal metadata partitions based upon a time range included in the metadata. Furthermore, metadata can be stored in multiple temporal metadata partitions to which the metadata is relevant. As such, metadata can be stored in manner that allows event data to be understood in the context of temporally accurate and/or relevant metadata. Functionality for executing queries of event data and providing results in view of metadata, as well as the merging of multiple temporal metadata partitions also are disclosed.

  • Pub Date: 2014/11/12
  • Number: 09235628
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluating device antenna performance and quality

A method includes receiving over-the-air (OTA) performance test data measured for a first set of pass computing devices and for a second set of fail computing devices, measuring a first set of training data for the first and second set of computing devices during a plurality of KPI tests, measuring a second set of training data for a particular computing device, determining which ones of the plurality of KPIs qualify as clustering features, and determining a first set of KPI centers, a second set of KPI centers, and a third set of KPI centers, determining a first and a second dissimilarity distance separating the first set and the second set of computing devices from the particular device, respectively. The method further includes determining whether the first dissimilarity distance is greater than second dissimilarity distance to qualify the particular computing device to pass the OTA test.

  • Pub Date: 2014/11/12
  • Number: 09590746
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Context aware transactions performed on integrated service platforms

Certain aspects of the present disclosure relate to user access to an application service that references user account information and previous user action information. One example method may include receiving, via a receiver device, user input information to access an application, the user input information including at least one action request and authorizing the user to access the application. The method may also include storing the user input information as part of a contextual history information record in a database memory, generating a response message to the selected at least one action request based on the contextual history information, and forwarding the response message to the user via a transmitter device.

  • Pub Date: 2014/11/12
  • Number: 09282126
  • Owner: West Corporation
  • Location: Omaha, US
  • Details: Visit USPTO

Visit USPTO Page


Configuration data handling in wireless communication devices

Enhanced handling of device configuration data in wireless communication devices is provided herein. In one example, a method is presented that includes receiving data transferred by a device management node for incorporation into a node of a configuration data tree that stores device configuration data for the wireless communication device. The method also includes identifying the data as unable to be incorporated into the configuration data tree, and transferring a rejection notice for delivery to the device management node. The method also includes receiving a node addition instruction and responsively creating a new data tree that is populated with at least one blank node and is linked to a root node shared with the configuration data tree. The method also includes receiving again the data transferred by the device management node and responsively incorporating the data into the blank node of the new data tree.

  • Pub Date: 2014/11/12
  • Number: 09602346
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Analyzing quality of applications linked to an online system

An online system extracts features from an application linked to the online system. The application is used by users of the online system and posts content to the online system. A trained model is applied to the extracted features to generate a quality score for the application. The trained model is trained using features extracted from a set of training applications and quality scores manually assigned to the training applications, wherein the manually assigned quality scores indicate whether each training application satisfies a set of criteria and the generated quality score represents a probability of the application satisfying the set of criteria. Based on the quality score, content provided by the application is ranked for presentation to a user of the online system in relation to other content of the online system. The online system presents the content provided by the application to the user according to the ranking.

  • Pub Date: 2014/11/12
  • Number: 09571594
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Alkylated piperazine compounds

  • Pub Date: 2014/11/12
  • Number: 09115152
  • Owner: GENENTECH, INC.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Synchronization in a computing device

One embodiment provides an apparatus. The apparatus includes a processor, a chipset, a memory to store a process, and logic. The processor includes one or more core(s) and is to execute the process. The logic is to acquire performance monitoring data in response to a platform processor utilization parameter (PUP) greater than a detection utilization threshold (UT), identify a spin loop based, at least in part, on at least one of a detected hot function and/or a detected hot loop, modify the identified spin loop using binary translation to create a modified process portion, and implement redirection from the identified spin loop to the modified process portion.

  • Pub Date: 2014/10/12
  • Number: 09411363
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Substituted pyrrolo[2,3-B]pyrazines for the treatment of disorders and diseases

  • Pub Date: 2014/10/12
  • Number: 09073932
  • Owner: Novartis AG
  • Location: Basel, CH
  • Details: Visit USPTO

Visit USPTO Page


Parking option

A navigation application can be configured to output a navigation map corresponding to directions to a selected point of interest (POI). The navigation application can also be configured to detect that a location of an end-user device is within a predetermined parking proximity of the selected POI. The navigation application can further be configured to provide a request to a navigation server for parking options associated with the selected POI.

  • Pub Date: 2014/10/12
  • Number: 09267812
  • Owner: Telecommunication Systems, Inc.
  • Location: Annapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for determining a position of a vehicle based on driving behavior

An approach is provided for determining a position of a vehicle relative to a travel path based on driving behavior. An estimation platform processes driving information associated with a vehicle, mapping information associated with a segment of the travel path in use by the vehicle, or a combination thereof to determine a behavior trace to associate with the vehicle. The estimation platform also determines an offset between the behavior trace of the vehicle and the behavior trace of one or more other vehicles based on a matching between the behavior trace of the vehicle and the behavior trace of the one or more other vehicles relative to the segment of the travel path.

  • Pub Date: 2014/10/12
  • Number: 09347779
  • Owner: HERE Global B.V.
  • Location: Veldhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Generic file level restore from a block-level secondary copy

Systems and methods are provided which perform a file level restore by utilizing existing operating system components (e.g., file system drivers) that are natively installed on the target computing device. These components can be used to mount and/or interpret a secondary copy of the file system. For instance, the system can instantiate an interface object (e.g., a device node such as a pseudo device, device file or special file) on the target client which includes file system metadata corresponding to the backed up version of the file system. The interface provides a mechanism for the operating system to mount the secondary copy and perform file level access on the secondary copy, e.g., to restore one or more selected files.

  • Pub Date: 2014/10/12
  • Number: 09632882
  • Owner: COMMVAULT SYSTEMS, INC.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Federated services to dynamically switch features in applications

An application binary is received at an intermediate federated service layer before deployment of the application binary at the application store. At the intermediate federated service layer multiple copies of application binaries are generated concurrently. At the intermediate service layer, program code of the copies of application binaries is concurrently parsed and features of copies of application binaries are matched with features of operating system. If the features match, corresponding program codes are flagged to switch off, and re-generated as custom application binary and deployed in application store. The custom application binary and a container along with features corresponding to operating system of a mobile device are downloaded to a mobile device. A request to access a set of features is received from the custom application binary at the container. If the set of features match the features of the operating system request is allowed through the container else it's blocked.

  • Pub Date: 2014/10/12
  • Number: 09268561
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Device location application programming interface

Media, methods and interfaces are provided for interfacing a mobile device and an application virtual machine to provide location information of the mobile device from a secondary source. When location information supplied by a first source to the application virtual machine contains invalid values for device location, a secondary source is utilized to provide the location information. No new processing thread is spawned for collection of back-up source configurations. Thus, interfaces initiate the first and second location determination methods in a single request. The power consumed by the mobile device to retrieve the device location information from a secondary source is reduced by the absence of additional configuration collection threads. Interfaces include a primary location component, a verification component, a backup location component, and a location update component.

  • Pub Date: 2014/10/12
  • Number: 09414190
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Context based dynamically switching device configuration

Various embodiments of systems and methods for dynamically switching device configuration based upon context are described herein. In an aspect, the method includes reading a tag attached to an entry gate of a restricted area through a device. Upon reading the tag, an application is executed to connect the device to a mobile device management (MDM) server. Upon establishing the connection, the restricted area identifier (ID) is sent to the MDM server. The device receives one or more policies applicable for the restricted area from the MDM server. The received one or more policies are executed on the device to change the device configuration. After execution, the device sends a confirmation message to the MDM server to indicate that the device is policy complaint. Upon receiving the confirmation, the MDM server instructs to open the entry gate to allow the device within the restricted area.

  • Pub Date: 2014/10/12
  • Number: 09609022
  • Owner: SYBASE, INC.
  • Location: Dublin, US
  • Details: Visit USPTO

Visit USPTO Page


Benzoxepin PI3K inhibitor compounds and methods of use

  • Pub Date: 2014/10/12
  • Number: 09175009
  • Owner: GENENTECH, INC.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Anti-skimming payment card

A payment card may include a read sensor configured to detect a reading of the payment card by a card reader. In particular, the payment card may include a controller or a processor configured to count a number of times the payment card is read by other card readers. The payment card may implement card security measures based on the number of reads detected by the read sensor. The payment card may further include a magnetic stripe emulator configured to emulate signal patterns of a magnetic stripe when the magnetic stripe is read by a card reader. The controller may disable the magnetic stripe emulator when the number of reads detected by the read sensor exceeds a predetermined number.

  • Pub Date: 2014/10/12
  • Number: 09430730
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for power source management using a wrist-worn device

A method, apparatus, and/or system for patient wellness monitoring using a wrist-worn device is disclosed. The wrist-worn device may include a faceplate device and a wristband monitoring device. In one step, it may be determined that the faceplate device is detached from the wristband monitoring device. In response to the determination, the wristband monitoring device may operate on battery power. A sensor may be activated on the wristband monitoring device to collect vital sign information of a user. The vital sign information of the user may be wirelessly transmitted from the wristband monitoring device and received by the faceplate device. Upon determining that the faceplate device is attached to the wristband monitoring device, a battery on the wristband monitoring device may be charged.

  • Pub Date: 2014/09/12
  • Number: 09197082
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of remotely controlling mobile device settings and functionality

Systems and methods for a customer care system. An example diagnostics back-end system may be associated with a telecommunications provider. The diagnostics back-end system may perform diagnostic analyzes of information and settings associated with a mobile device, identify resolvable issues based on the diagnostic analyzes, determine execution eligibility of each of one or more solution actions associated with each resolvable issue and upon determination that execution of the one or more solution actions are eligible, cause display of a single graphical user interface button at a user interface device of a customer care agent terminal, wherein activation of the single graphical user interface button causes execution of associated solution actions performed on the mobile device.

  • Pub Date: 2014/09/12
  • Number: 09538366
  • Owner: T-Mobile USA, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Scaling egress network traffic

In an embodiment, a method is provided. The method of this embodiment provides generating one or more packets of data, the one or more packets of data being associated with a connection; and associating the one or more packets with one of a plurality of transmit queues based, at least in part, on the connection associated with the one or more packets.

  • Pub Date: 2014/09/12
  • Number: 09276854
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Real time feedback proxy

In accordance with the teaching described herein, systems and methods are provided for a communications proxy and overlay network for a plurality of customer feedback collection instruments that are configured to gather information from customers. A communications server array may be configured to communicate with a user device and one or more contact centers. An application server may be configured to communicate with the communications server array, a contact centers having associated user interfaces. An intelligent text processing and analysis module may be configured to transform an input from the user device to a modified input for use by the first contact center and second contact center to facilitate real time or delayed communications between users and agents.

  • Pub Date: 2014/09/12
  • Number: 09118763
  • Owner: Five9, Inc.
  • Location: San Ramon, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing search engine ranking by recommending content including frequently searched questions

Systems and method of the present invention provide for one or more server computers configured to receive one or more keywords topically relevant to a content of a web page, request from a search engine a first metric comprising a quantity of times the keywords have appeared in a search query with one or more question keywords during a time period and a second metric comprising a probability of receiving a high rank associated with the one or more keywords and the one or more question keywords, receive, from the search engine, the first metric and the second metric, calculate a keyword effectiveness index from the first metric and the second metric, and generate and transmit to a client computer one or more recommendations to include a high ranked suggested content on the web page according to the keyword effectiveness index.

  • Pub Date: 2014/09/12
  • Number: 09223876
  • Owner: Go Daddy Operating Company, LLC
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Operation of mobile device as trusted mobile web client or trusted mobile web server

A method of operating a mobile device comprises executing a trusted service application in a trusted operating system through secure access, executing a trusted web server module in the trusted operating system, wherein the trusted web server module is configured to transfer information using an internet protocol and the information is generated by execution of the trusted service application, and executing a user application in a rich operating system through normal access, wherein the user application is configured to relay communication between a remote web server and the trusted web server module through a security session.

  • Pub Date: 2014/09/12
  • Number: 09356922
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, Gyeonggi-do, KR
  • Details: Visit USPTO

Visit USPTO Page


Enhanced security for accessing virtual memory

A disclosed method includes obtaining a physical address corresponding to a virtual address responsive to detecting a virtual address associated with a memory access instruction and, responsive to identifying a memory page associated with the physical address as a sensitive memory page, evaluating sensitive access information associated with the memory page. If the sensitive access information satisfies a sensitive access criteria, invoking a sensitive access handler to control execution of the memory access instruction.

  • Pub Date: 2014/09/12
  • Number: 09582434
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Deployment feedback for system updates to resources in private networks

Deployment feedback for updates to resources implemented in a private network may be implemented. Feedback codes may be generated and included in deployments sent to a private network for deployment at resources implemented in the private network. One or more of the included feedback codes may be selected based on the performance of the deployment and provided via a feedback communication channel that is disconnected and distinct from the private network. Once received, a current status of the deployment may be determined based on the one or more feedback codes provided via the feedback communication channel.

  • Pub Date: 2014/09/12
  • Number: 09503351
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Allocating cost of disk usage to a linked clone virtual machine based on a parameter of usage

The present disclosure is related to methods, systems, and machine-readable media for allocating cost of disk usage to a linked clone virtual machine (VM) based on a parameter of usage. A determination can be made as to a number of disks used by a linked clone VM among a plurality of disks in a software defined data center over a time period and as to a respective portion of a parameter of usage for each of the number of disks used by the linked clone VM over the time period that is attributable to the linked clone VM. A portion of a cost for usage of each of the number of disks over the time period can be allocated to the linked clone VM in proportion to the respective portion of the parameter of usage attributable to the linked clone VM and/or on a relative latency.

  • Pub Date: 2014/09/12
  • Number: 09582309
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing domain name system security (DNSSEC)

The present invention is directed towards systems and methods for providing multiple modes of a zone for DNSSEC by an intermediary device. The method includes providing, by a device intermediary to a plurality of clients and a plurality of servers, a plurality of modes of a zone for Domain Name Service. The device receives a selection of a first mode of the zone of the plurality of modes of the zone. The device receives information identifying to enable DNS Security for the selected first mode. The device establishes the zone for DNS in accordance with the selected first mode and with DNS Security enabled.

  • Pub Date: 2014/08/12
  • Number: 09363287
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Secure app update server and secure application programming interface (“API”) server

A coupled set of servers in a server system protect an application programming interface (“API”) from unwanted automation facilitated by unauthorized reverse engineering of an endpoint app or communications channel used by the endpoint app. The server system comprises at least one secure app update server that transforms an app code object received from an enterprise app server into a transferred app code object, and at least one secure application programming interface (“API”) server that interacts with an endpoint device that executes the transformed app code object. The secure API is adapted to convert API requests made by the transformed app code object into renormalized API requests formatted for processing by an enterprise API server. The transforming of the app code object results in API requests from the client that would constitute invalid API requests if presented to the enterprise API server without renormalization.

  • Pub Date: 2014/08/12
  • Number: 09460288
  • Owner: SHAPE SECURITY, INC.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Reconfigurable optical-to-optical frequency conversion method and apparatus

A photonic device is provided for impressing a modulation pattern on an optical carrier. The device includes a unit in which a photodetector and an optical microresonator are monolithically integrated. The device further includes an optical waveguide evanescently coupled to the optical microresonator and having at least an upstream portion configured to carry at least one optical carrier toward the microresonator. The optical microresonator is tunable so as to resonate with the optical carrier frequency. The optical microresonator and the photodetector are mutually coupled such that in operation, charge carriers photogenerated in the photodetector are injected into the microresonator, where the photocurrent changes the resonant conditions. In some embodiments the device is operable as an optical-to-optical frequency converter. In other embodiments the device is operable as an oscillator.

  • Pub Date: 2014/08/12
  • Number: 09625785
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Narrative generating scheme

In one example embodiment, A narrative method includes registering an application, from among a plurality of applications installed on a mobile device; identifying at least one action corresponding to the application; receiving recorded usage history of the at least one action corresponding to the application; and generating a narrative based on the received usage history of the at least one action corresponding to the application.

  • Pub Date: 2014/08/12
  • Number: 09639525
  • Owner: KT CORPORATION
  • Location: Seongnam-si, Gyeonggi-Do, KR
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing help via a mobile device

A system, method and computer program product for requesting help and providing feedback, including a user mobile device, a database, and a service provider device coupled over a communications network. The user mobile device includes a user application that contacts the database and transmits a location of the user mobile device, information regarding the mobile device user, and a service provider name the over the communications network. The database receives the transmitted information from the user mobile device over the communications network. The database, based on the information received from the user mobile device, transmits the location of the user mobile device, and the user information to the service provider device over the communications network. The service provider device includes a service provider application that receives the transmitted information from the database, and displays on the service provider device the user mobile device location, and the user information.

  • Pub Date: 2014/08/12
  • Number: 09485616
  • Owner: REUNIFY LLC
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and mobile devices to implement traveler interactions and activity to channelize customized data

Various embodiments relate generally to electrical and electronic hardware, computer software, wired and wireless network communications, and wearable computing devices for identifying activities and/or destinations of relative importance. More specifically, a system, a device and a method are provided to determine interactions at a mobile computing device predict activities based on one or more types of interactions. Examples of activities include preferential activities available at a geographic region association with lodging In one or more embodiments, a method can include receiving data representing an interaction with a user interface, generating data summarizing the interaction to include an interaction type, and determining data representing a prioritized value indicative of a degree of the interaction. The method also may include predicting participation in an activity as a function of the prioritized value, and generating customized advisory data based on prioritized values of one or more interaction types.

  • Pub Date: 2014/08/12
  • Number: 09609472
  • Owner: HomeAway.com, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for managing interruptions from different modes of communication

Methods and apparatus for managing interruptions in a multiple communication mode environment are provided herein. For example, a method may include receiving at least first instance of communication data associated with a first communication mode; obtaining first attribute data related to the first instance of communication data; classifying the first instance of communication data into first category based on the first attribute data using the interruption management device; and determining whether to interrupt a user by delivering the first instance of communication data based on the first category. The first category may be selected from a plurality of predetermined categories using a classification algorithm.

  • Pub Date: 2014/08/12
  • Number: 09654941
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Medication tracking

A system and method is described for printing a label with an RFID tag. The system includes an RFID reader that queries a first RFID tag coupled to a first medicinal container that includes a medication. In response, the system receives a first unique identifier and uses the first unique identifier to determine a status of the medication, associate the first medicinal container with a medical provider and print a second label that includes a second RFID tag for a second medicinal container.

  • Pub Date: 2014/08/12
  • Number: 09171280
  • Owner: Kit Check, Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Machine-based content analysis and user perception tracking of microcontent messages

A system and a method for microcontent natural language processing are presented. The method comprising steps of receiving a microcontent message from a social networking server, tokenizing the microcontent message into one or more text tokens, performing a topic extraction on the microcontent message to extract topic metadata, generating sentiment metadata for the microcontent message, analyzing co-occurrence of all available metadatas in the plurality of microcontent messages, producing a list that ranks the plurality of microcontent messages based on all available topic metadata, and compiling a trend database that reveals how perception of users of the social networking server on a given topic changes by tracking how the list changes over time.

  • Pub Date: 2014/08/12
  • Number: 09304989
  • Owner: Bottlenose, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Location and time based application management

An application manager on a user device determines a current location of the user device and determines that the current location is a recognized location where the user device has previously been used to access one or more applications. The application manager identifies previous state information for the user device corresponding to a previous state of the user device at the recognized location and restores a current state of the user device to the previous state based at least in part on the previous state information.

  • Pub Date: 2014/08/12
  • Number: 09479630
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Execution of end-to-end processes across applications

An orchestrator executes an end-to-end process across applications. An message broker exchanges information among the orchestrator and the processes of the applications. Adapters perform protocol and interface translations for information communicated between the message broker and the respective applications.

  • Pub Date: 2014/08/12
  • Number: 09229795
  • Owner: Hewlett Packard Enterprise Development LP
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically loaded system-level simulation

A system-level simulation includes generating netlist information including component library information, which describes instances of the hardware components, and component instance information, which describes component dynamic libraries that include models of hardware components. The simulation is generated at simulation run-time based on the netlist information. Component dynamic libraries corresponding to the component library information are loaded based on the component library information. A simulation dynamic library referenced by the component dynamic libraries is loaded. One or more interlibrary adapters corresponding to the component dynamic libraries are loaded to provide compatibility between the component dynamic libraries and an application binary interface of the simulation dynamic library. Instances of hardware components are instantiated based on the component instance information, and the instantiated instances of the hardware components are connected to form the simulation. The simulation is performed at simulation run-time responsive to the simulation being generated.

  • Pub Date: 2014/08/12
  • Number: 09582623
  • Owner: Synopsys, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Device, system and method of landmark-based and personal contact-based route guidance

A mapping system is disclosed that provides route guidance in the form of a map and verbal or textual directions which includes reference to both landmarks and personal contacts. Landmarks and contacts can be rated for suitability in providing route guidance. Depending on the rating, guidance using landmarks or personal contacts can be preferentially used in place of or to supplement guidance based on the underlying road network.

  • Pub Date: 2014/08/12
  • Number: 09562781
  • Details: Visit USPTO

Visit USPTO Page


Detachable computer with variable performance computing environment

Computing devices are often designed in view of a particular usage scenario, but may be unsuitable for usage in other computing scenarios. For example, a notebook computer with a large display, an integrated keyboard, and a high-performance processor suitable for many computing tasks may be heavy, large, and power-inefficient; and a tablet lacking a keyboard and incorporating a low-powered processor may improve portability but may present inadequate performance for many tasks. Presented herein is a configuration of a computing device featuring a display unit with a resource-conserving processor that may be used independently (e.g., as a tablet), but that may be connected to a base unit featuring a resource-intensive processor. The operating system of the device may accordingly transition between a resource-intensive computing environment and a resource-conserving computing environment based on the connection with the base unit, thereby satisfying the dual roles of workstation and portable tablet device.

  • Pub Date: 2014/08/12
  • Number: 09501103
  • Owner: Microsoft Technology Licensing, LLC.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Configuration of a profile associated with a stylus

A stylus may comprise a configurable profile to control one or more local and remote operational features. One or more computing devices may be in communication with the stylus. The one or more computing devices may be configured to receive information relating to the reconfiguration of the settings of the operational profile, reconfigure the operational profile based at least in part on the received information, store the reconfigured operational profile, and associate the reconfigured operational profile with the stylus, wherein the at least one operational feature of the stylus is modified based on the reconfigured operational profile.

  • Pub Date: 2014/08/12
  • Number: 09383839
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Comfort-driven optimization of electric grid utilization

A system for electric grid utilization and optimization comprising a communications interface executing on a network-connected server and adapted to receive information from a plurality of iNodes, the plurality of iNodes comprising a source iNode, a sink iNode, a plurality of transmission or distribution iNodes, an event database coupled to the communications interface and adapted to receive events from a plurality of iNodes via the communications interface, a modeling server coupled to the communications interface, and a statistics server coupled to the event database and the modeling server, wherein the modeling server, receives a request to establish an allocation of at least one of transmission losses, distribution losses, and ancillary services to a specific sink iNode, computes at least one virtual path for electricity flow between a source iNode and the specific sink iNode, the computed path being determined based on optimization of perceived comfort of users in affected areas.

  • Pub Date: 2014/08/12
  • Number: 09134353
  • Owner: Distributed Energy Management Inc.
  • Location: Poulsbo, US
  • Details: Visit USPTO

Visit USPTO Page


Autonomic locator/identifier separation protocol for secure hybrid cloud extension

A method is provided in one example embodiment and includes configuring a local network element as an autonomic registrar for a designated network domain; establishing an autonomic control plane (“ACP”) between the local network element and one or more remote network elements identified by local network element as a remote neighbor; designating a locally-defined subnet at the local network element to be extended to each of the one or more remote network elements; and executing an ACP command at the local network element, wherein the executing triggers a message to each of the one or more remote network elements, the message including information regarding the designated local subnet. The information included in the message is used by each of the remote network elements to auto-resolve its Locator/Identifier Separation Protocol (“LISP”) configuration, enabling the designated local subnet to be extended to each of the one or more remote network elements.

  • Pub Date: 2014/08/12
  • Number: 09560018
  • Owner: CISCO TECHNOLOGY, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Application licensing using sync providers

A method, system, and computer-readable storage media for licensing an application using sync providers are provided herein. The method includes receiving a request for a license for an application from a client sync provider at a licensing service and receiving information relating to the license from a commerce partner offering the application via a commerce partner sync provider. The method also includes returning the license for the application to a client computing device, receiving information relating to a state of the license from the client sync provider, and adjusting conditions of the license according to the state of the license.

  • Pub Date: 2014/08/12
  • Number: 09269115
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method employing autonomous vehicles to reduce risk

Apparatus and method for employing autonomous air vehicles to perform high risk observation, interaction, and interrogation with individuals. Invention comprises an autonomously controlled air vehicle with mounting and transporting means being attachable to automobiles and other first responder vehicle types. Mounting and transporting means serves also as a base station for commanding autonomous air vehicle and relaying communications to and from autonomous air vehicle to and from remote data base sources. Autonomously controlled air vehicle is equipped with a variety of sensors which air in observation and detection of suspects, their vehicles and possessions therein, and any documentation produced during the interrogation.

  • Pub Date: 2014/08/12
  • Number: 09481459
  • Owner: The United States of America as represented by the Secretary of the Air Force
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Antibacterial therapy with a whole, leech saliva extract

Methods are provided for isolating and using a whole-saliva leech extract. The methods can include feeding a phagostimulatory agent to a leech; inducing a regurgitation in the leech, the inducing including placing the leech in an environment having a temperature of less than about 0° C.; and, collecting an unrefined, whole saliva in the regurgitation of the cooled leech. The methods can include revitalizing the leech by warming it at a temperature ranging from about 5° C. to about 40° C. Stable, lyophilized, whole-saliva extracts of a leech are also provided, the extract having a stable activity when stored for use at a temperature below about −20° C., the extract maintaining at least 70% of the activity for at least 6 months. The extracts can be used to treat solid tumors, treat liquid tumors, treat diabetes, treat a viral disease, treat a parasitic disease, treat an antibacterial disease, or serve as an anti-oxidant.

  • Pub Date: 2014/08/12
  • Number: 09017732
  • Owner: Biopep Solutions, Inc.
  • Location: Richmond, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


3D pointing devices with orientation compensation and improved usability

Systems and methods according to the present invention describe 3D pointing devices which enhance usability by transforming sensed motion data from a first frame of reference (e.g., the body of the 3D pointing device) into a second frame of reference (e.g., a user's frame of reference). One exemplary embodiment of the present invention removes effects associated with a tilt orientation in which the 3D pointing device is held by a user.

  • Pub Date: 2014/08/12
  • Number: 09298282
  • Owner: HILLCREST LABORATORIES, INC.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Using a PKCS module for opening multiple databases

A processing device is to determine that a module, executed from a memory by the processing device, is initialized from opening a first database. The processing device is to identify a second database to be opened from a request from an application to access data that is stored in the second database. The processing device is to create, a slot, via the initialized module, to open the second database using the initialized module.

  • Pub Date: 2014/05/12
  • Number: 09306937
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for video data encoding

The techniques for encoding video content are disclosed. In an online game environment, the techniques include obtaining information for a first and second successive frames of video content and information for a position of a virtual camera associated with each frame, determining virtual camera translation information based on the positions of the virtual camera, determining a projected movement between the frames of an object included in each frame, determining the portion of the first frame to be excluded from the second frame and a new portion of the second frame, and providing the determined encoded information for a reconstruction of the second frame based on the provided information.

  • Pub Date: 2014/05/12
  • Number: 09497487
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for configuring and remotely controlling a multimedia system

In one embodiment, a technique is provided to configure and remotely control a system. A system configuration is created based, at least in part, on information collected from a user using speech synthesis and speech recognition. The system configuration includes information representing at least one zone that corresponds with at least one room in a physical structure, information identifying at least one physical component which represents at least a part of the system, information about at least one function which the at least one physical component is capable of performing, and information about at least one command which the at least one physical component recognizes. A cell phone is used to discover the system by transmitting a name service discovery request to the system, which responds with a name service registration confirmation. The cell phone is then used to remotely control the system.

  • Pub Date: 2014/05/12
  • Number: 09147342
  • Owner: Savant Systems, LLC
  • Location: Hyannis, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for placing virtual serving gateways for mobility management

Methods and systems for determining placement of a virtual serving gateway. The method includes obtaining a set of input information. The input information includes network information and configuration information providing one or more parameters for placing the virtual serving gateway, and includes at least one mobility insensitivity criterion. Placement of the virtual serving gateway at one or more physical hosts is determined in accordance with the network information and the configuration information. The virtual serving gateway is distributively placeable across physical hosts. A set of output information is generated. The output information includes information identifying placement of the virtual serving gateway at the physical hosts, and a hosting percentage for each physical host.

  • Pub Date: 2014/05/12
  • Number: 09445279
  • Owner: Huawei Technologies Co., Ltd.
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for efficient screen capture

Systems and methods are provided for efficient screen capture and video recording on mobile and other devices. The video is recorded using a graphics rendering pipeline that includes a primary frame buffer, a secondary frame buffer, and a video writer module that encodes and writes data to a video file. The frame buffers include multiple textures to which graphics data can be rendered or copied, with at least the secondary frame buffer textures backed with memory that is quickly accessible by a central processing unit. In operation, a frame is rendered into a texture in the primary frame buffer, and the contents of the rendered frame are copied to a texture of the secondary frame buffer as well as to a default graphics rendering pipeline for output to a display. The contents of the rendered frame are then provided from the secondary frame buffer to the video writer for output to a video file.

  • Pub Date: 2014/05/12
  • Number: 09161006
  • Owner: Kamcord, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for sharing files based on user profile visibility

In accordance with embodiments, there are provided mechanisms and methods for sharing files based on user profile visibility. These mechanisms and methods for sharing files based on user profile visibility can enable community network systems to provide functionality restricting access to files based on the profile to which the file is posted. In particular, a file posted to a profile of one member of a community may be made accessible to other members of the community that are permitted to access that profile.

  • Pub Date: 2014/05/12
  • Number: 09462002
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for storing/caching, searching for, and accessing data

A system for persistently maintaining data using a network for data packets is provided. The system includes a transmission medium associated with the network, a plurality of switches operatively connected to the transmission medium. Each switch has an intelligent network controller adapted for delivering the data packets to a device operatively connected to the intelligent network controller in response to a request for the data packets from the device and further adapted for re-transmitting unexpired data packets over the network.

  • Pub Date: 2014/05/12
  • Number: 09491104
  • Owner: Lightwaves Systems, Inc.
  • Location: Cedar Rapids, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring hypervisor and provisioned instances of hosted virtual machines using monitoring templates

A method for configuring and maintaining external monitoring of one or more instances of a virtual machine within a virtualized computing environment. The method includes a computer processor monitoring a hypervisor. The method further includes a computer processor identifying a first list, wherein the first list is comprised of one or more monitoring templates respectively associated with one or more virtual machine types, and maintaining a second list comprised plurality of provisioned instances of virtual machines, wherein the second list also includes a first information respectively associated with the plurality of provisioned instances of virtual machines. The method further includes a computer processor compiling a third list and transmitting the third list to the monitoring system. The method further includes a computer processor receiving the third list and in response, a computer processor executing one or more monitoring functions based, at least in part, on the third list.

  • Pub Date: 2014/05/12
  • Number: 09495193
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Modified forms of exotoxin A

exotoxin A or “PE” is a 66 kD, highly potent, cytotoxic protein secreted by the bacterium . Various forms of PE have been coupled to other proteins, such as antibodies, to generate therapeutically useful cytotoxin conjugates that selectively target cells of a desired phenotype (such as tumor cells). In the present invention, peptides spanning the sequence of an approximately 38kD form of exotoxin A protein were analyzed for the presence of immunogenic CD4+ T cell epitopes. Six immunogenic T cell epitopes were identified. Residues were identified within each epitope for introduction of targeted amino acid substitutions to reduce or prevent immunogenic T-cell responses in PE molecules which may be administered to a heterologous host.

  • Pub Date: 2014/05/12
  • Number: 09371517
  • Owner: INTREXON CORPORATION
  • Location: Blacksburg, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for synthesizing imaging agents, and intermediates thereof

The present invention generally relates to methods and system for the synthesis of imaging agents, and precursors thereof. The methods may exhibit improved yields and may allow for the large-scale synthesis of imaging agents, including imaging agents comprising a radioisotope (e.g., F). Various embodiments of the invention may be useful as sensors, diagnostic tools, and the like. In some cases, methods for evaluating perfusion, including myocardial perfusion, are provided. Synthetic methods of the invention have also been incorporated into an automated synthesis unit to prepare and purify imaging agents that comprise a radioisotope. In some embodiments, the present invention provides a novel methods and systems comprising imaging agent 1, including methods of imaging in a subject comprising administering a composition comprising imaging agent 1 to a subject by injection, infusion, or any other known method, and imaging the area of the subject wherein the event of interest is located.

  • Pub Date: 2014/05/12
  • Number: 09603951
  • Owner: Lantheus Medical Imaging, Inc.
  • Location: North Billerica, US
  • Details: Visit USPTO

Visit USPTO Page


Licensing for services

A method, system, and computer-readable storage media for providing licensing for services are provided herein. The method includes determining, via a service partner, whether a user exists in a user provisioning cache and whether the user is provisioned to use a service provided by the service partner. The method also includes querying a licensing service to determine updates to the user provisioning cache if the user does not exist in the user provisioning cache or is not provisioned to use the service, or both. Further, the method includes determining whether the user is provisioned to use the service based on the updates to the user provisioning cache and, if the user is provisioned to use the service, allowing the user access to the service.

  • Pub Date: 2014/05/12
  • Number: 09449354
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Directed application control of user device radio

Techniques described herein provide coupling an application to a radio of a user device to, for example, optimize media streaming services. Implementations include receiving, by a user device, first data of a file and second data of the file. The user device may present the first data of the file using an application implemented by the user device. In response to a determination that an amount of data in the second data is greater than a predetermined threshold, the user device may invoke a command associated with a radio of the user device by calling a radio API to place the radio into a dormant state. The radio API may be configured to couple the application to the radio.

  • Pub Date: 2014/05/12
  • Number: 09445452
  • Owner: T-Mobile U.S.A. Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Content delivery network referral

In general, techniques are described for managing content request referrals by keying content requests to a composite key data structure that maps end-user address prefixes and content identifiers to content delivery network servers of downstream CDNs. In one example, a CDN exchange includes a communication module to receive first network prefixes and first content identifiers from a first secondary content delivery network and to receive second network prefixes and second content identifiers from a second secondary content delivery network. A request router of the CDN exchange redirects the content request to the first secondary content delivery network or to the second secondary content delivery network according to a network address of the end user device and a content identifier for the content request.

  • Pub Date: 2014/05/12
  • Number: 09253255
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Connection following during network reconfiguration

An allocated IP address is remapped from a first virtual machine to a second virtual machine while maintaining existing client connections on the first virtual machine. A communication channel is established between the first and second virtual machines, and existing connections associated with the IP address are tracked. Packets addressed to the IP address are forwarded to the second virtual machine instead of the first machine. If the second virtual machine receives a packet that contains a new connection request, the new connection is established with the second virtual machine. However, if the second virtual machine receives a packet that is associated with an existing connection to the first virtual machine, then the packet is forwarded to the first virtual machine via the communication channel.

  • Pub Date: 2014/05/12
  • Number: 09300731
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic management of resource sizing

A system for providing automatic resource resizing is provided. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to receive a request to execute a program code and allocate computing resources for executing the program code on one of the virtual machine instances. The amount of resources allocated for executing the program code may be specified by the request and adjusted as needed.

  • Pub Date: 2014/05/12
  • Number: 09413626
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic determination of resource sizing

A system for providing automatic resource resizing is provided. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to receive a request to execute a program code and allocate computing resources for executing the program code on one of the virtual machine instances. The amount of resources allocated for executing the program code may be specified by the request and adjusted as needed.

  • Pub Date: 2014/05/12
  • Number: 09537788
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Approaches for managing virtual instance data

A resource provider is able to manage instance data associated with virtual compute instances running in the resource provider environment. For example, when provisioning a compute instance, the resource provider can obtain data associated with the compute instance and can store this data, for example, in a data store. The resource provider can act as a centralized repository of such data for some or all instances that are running in the resource provider environment. Entities (e.g., users or other compute instances running in the resource provider environment) can query the resource provider to perform various operations (e.g., read, modify, duplicate) on the data being managed by the resource provider for the various compute instances. Any changes to the data for a compute instance, for example, by a user, the compute instance, or a different compute instance, can be saved by the resource provider and propagated to the compute instance.

  • Pub Date: 2014/05/12
  • Number: 09417897
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


User-configurable cryptographic interface controller

Systems and methods for scalably provisioning cryptographic devices in a distributed computing environment are described. In some embodiments, a cryptographic interface controller capable of generating a plurality of hardware-emulated cryptographic devices in response to requests is implemented. In some embodiments, a cryptographic interface controller may present hardware-emulated cryptographic devices to computing entities, such as standalone computer systems or virtual computing systems, as standard cryptographic devices, such as through a Universal Serial Bus interface.

  • Pub Date: 2014/04/12
  • Number: 09584325
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for fish finding using a sonar device and a remote computing device

The present invention generally relates to a fish finding sonar system. Specifically, this invention relates to a sonar device pairing with a remote computing device to provide information to an angler about what is under the surface of the water. Embodiments of the present invention include a sonar device and a remote computing device configured to allow the sonar device to wirelessly communicate with the remote computing device and the remote computing device to connect to a database to register and receive information about real-time fishing hotspots.

  • Pub Date: 2014/04/12
  • Number: 09360553
  • Details: Visit USPTO

Visit USPTO Page


Secure and lightweight traffic forwarding systems and methods to cloud based network security systems

A method implemented by an agent operating on a mobile device communicating to a cloud-based system includes opening up local listening sockets on the mobile device; redirecting outgoing traffic from all application on the mobile device except the agent to the local listening sockets; and forwarding the outgoing traffic from the local listening sockets to the cloud-based system with additional information included therein for the cloud-based system.

  • Pub Date: 2014/04/12
  • Number: 09350644
  • Owner: Zscaler. Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Phase change memory with mask receiver

Technology for writing data to a phase change memory array is disclosed. In an example, a method may include identifying mask logic for masking cells in the phase change memory array and routing the mask logic to the cells. The method may further include routing input data to the cells. Set and reset pulses for the cells may be selectively prevented or inhibited based on the mask logic.

  • Pub Date: 2014/04/12
  • Number: 09406378
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Opportunistic execution of secondary copy operations

Rather than relying on pre-defined scheduling of secondary copy operations such as backup jobs, the illustrative opportunistic approach initiates secondary copy operations based on changing operational conditions in a storage management system. An adaptive backup readiness score is based on a number of backup-readiness operational factors. An illustrative enhanced data agent which is associated with the target database application (or other executable component) may monitor the operational factors and determine the backup readiness score based on weights assigned to the respective operational factors. The enhanced data agent may evaluate recent backup jobs to determine which of the operational factors that contributed to the backup readiness score may have been most relevant. Based on the most-relevant analysis, the enhanced data agent may adapt the weights assigned to the monitored operational factors, so that the backup readiness score may be more suitable and responsive to ongoing operational conditions in the system.

  • Pub Date: 2014/04/12
  • Number: 09645891
  • Owner: COMMVAULT SYSTEMS, INC.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for securing communication

A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication.

  • Pub Date: 2014/04/12
  • Number: 09172533
  • Owner: PACID TECHNOLOGIES, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing a mixed mode traffic map display

An approach is provided for presenting comprehensible representation of traffic flow information for various travel segments based on class levels. The approach involves causing, at least in part, a classification of one or more travel segments into one or more class levels. The approach also involves causing, at least in part, a designation of one or more representations of traffic flow information for the one or more travel segments based, at least in part, on the one or more class levels, wherein the one or more representations include, at least in part, a link-based traffic flow representation, a heat-map representation, or a combination thereof. The approach further involves causing, at least in part, a presentation of at least one user interface depicting the one or more representations of the traffic flow information for the one or more travel segments based, at least in part, on the designation.

  • Pub Date: 2014/04/12
  • Number: 09361794
  • Owner: HERE GLOBAL B.V.
  • Location: Veldhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Memory management in graphics and compute application programming interfaces

Methods are provided for creating objects in a way that permits an API client to explicitly participate in memory management for an object created using the API. Methods for managing data object memory include requesting memory requirements for an object using an API and expressly allocating a memory location for the object based on the memory requirements. Methods are also provided for cloning objects such that a state of the object remains unchanged from the original object to the cloned object or can be explicitly specified.

  • Pub Date: 2014/04/12
  • Number: 09612884
  • Owner: ATI Technologies ULC
  • Location: Markham, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Implantable medical devices storing graphics processing data

In one example, a device includes a telemetry module configured to retrieve graphics processing data from a device that is not configured to perform a rendering process using the graphics processing data and that is associated with delivering therapy to a therapy target of a patient, and a control unit configured to apply the graphics processing data while performing the rendering process to generate an image of an anatomical feature of the patient, wherein the anatomical feature comprises the therapy target for an implantable medical device, and to cause a display unit of a user interface to display the image, wherein the image of the anatomical feature is specific to the patient. The graphics processing data may include a list of vertices or a transform to be applied to a non-patient-specific anatomical atlas. The data may also include a location of a therapy element of the implantable medical device.

  • Pub Date: 2014/04/12
  • Number: 09055974
  • Owner: Medtronic, Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Image forming system, method of controlling image forming apparatus by using messenger application of mobile device, and the mobile device for performing the method

An image forming system to control an image forming apparatus by using a messenger application, a mobile device, and a method are provided. The image forming system includes a mobile device to activate a chat user interface to interface with an account of the image forming apparatus on the messenger application, and sending user messages to control a printing function of the image forming apparatus, a cloud server to receive the user messages from a messenger server, providing response messages of the account of the image forming apparatus in response to the user messages, and communicating with the mobile device in a conversational manner, thus controlling the printing of the image forming apparatus, and an image forming apparatus whose printing is controlled by the cloud server based on the user messages or providing monitoring information of a current status.

  • Pub Date: 2014/04/12
  • Number: 09432527
  • Owner: SAMSUNG ELECTRONICS CO., LTD.
  • Location: Suwon-Si, KR
  • Details: Visit USPTO

Visit USPTO Page


Heteroaryl pyridone and aza-pyridone compounds with electrophilic functionality

  • Pub Date: 2014/04/12
  • Number: 09260415
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Embedded test management for mobile applications

A system and method for facilitating collecting information pertaining to operation of a software application. An example method includes employing a first user interface display screen of the software application to present a layer indicating one or more steps to be implemented via the software application as part of a test case; and selectively recording context information associated with implementation of the one or more steps. In a more specific embodiment, selectively recording includes automatically recording the context information, which includes information characterizing one or more user interactions with the software application and information characterizing a computing environment in which the software application runs.

  • Pub Date: 2014/04/12
  • Number: 09268671
  • Owner: TESTFIRE, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic function switching

Techniques are described for dynamically enabling or disabling portions of an executing software module based on control data. During compilation of source code for a software module, switching instructions may be generated to enable the conditional bypassing of executable instructions for one or more functions described in the source code. In some cases, the switching instructions may be generated for the public functions of a software module. During execution of the software module, the switching instructions may trap a call to a function and dynamically determine whether to execute the function based on the value of control data corresponding to the function. A user interface may be presented to enable an operator to set the control data to enable or disable the execution of one or more functions.

  • Pub Date: 2014/04/12
  • Number: 09600672
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic flow management

A device and method comprises receiving a network request, and provides a dynamic flow management and a conditional logic provisioning command driver in the form of a computational instruction in response to the network request. The network request is received by a processor accessible in a network from at least one requesting subscriber unit subscribing to a first network service configuration. A conditional logic provisioning command driver is provided in response to the network request by the processor to reconfigure the first network service configuration to a second network service configuration according to the received network request. The conditional logic provisioning command driver may be implemented conditionally according to at least one business rule associated with at least one value defined by the network request.

  • Pub Date: 2014/04/12
  • Number: 09641956
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless network camera systems

Apparatus, systems and techniques associated with battery powered wireless camera systems. One aspect of the subject matter described in this specification can be embodied in a system that includes a battery powered wireless camera including an internal battery to provide energy and a burst transmission unit to transmit information during burst periods. The system includes a base station, separated from the battery powered wireless camera, in wireless communication with the battery powered wireless camera to receive information from the battery powered wireless camera. The base station is configured to process the received information and includes a web server to transmit the processed information to a client. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.

  • Pub Date: 2014/03/12
  • Number: 09589434
  • Owner: AXIS AB
  • Location: Lund, SE
  • Details: Visit USPTO

Visit USPTO Page


Using a local authorization extension to provide access authorization for a module to access a computing system

Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a computing system. A memory stores information on a first validity range comprising position coordinates for a module seeking to access the computing system and a second validity range comprising position coordinates for a location authorization extension for a computing system. A determination is made of a first position signal from a first receiver of the module and of a second position signal from a second receiver of the location authorization module. Determinations are made as to whether the first position signal is within the first validity range and whether the second position signal is within the second validity range. The module is granted access to the computing system in response to determining that the first position signal is within the first validity range and the second position signal is within the second validity range.

  • Pub Date: 2014/03/12
  • Number: 09344435
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Interface for management of data movement in a thin provisioned storage system

A computational device receives a request to copy a source logical block of a thin provisioned source logical unit to a target logical block of a thin provisioned target logical unit, wherein in thin provisioned logical units physical storage space is allocated in response to a write operation being performed but not during creation of the thin provisioned logical units. The computational device generates metadata that stores a correspondence between the source logical block and the target logical block, while avoiding allocating any physical storage space for the target logical block in the thin provisioned target logical unit.

  • Pub Date: 2014/03/12
  • Number: 09256382
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Identification and isolation of incompatible applications during a platform update

An Application (“App”) Checker identifies and isolates incompatible applications on a mobile device during a software platform update. After receiving a target platform version number from an Update Server, the App Checker generates a list of installed applications on the mobile device. Next, the App Checker sends a request to an App Store Server or Update Server for an application catalog of applications compatible with the target platform version. Upon receiving the application catalog indicating compatibility status of applications relative to the target platform version, the App Checker iteratively compares the installed application list with the application catalog to identify whether or not each installed application is compatible with the target platform. The App Checker then populates an application quarantine or removal database to identify each incompatible application to isolate incompatible applications, and quarantines or removes the incompatible applications. Finally, the mobile device is upgraded to the target platform version.

  • Pub Date: 2014/03/12
  • Number: 09417866
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Compartmentalized smart refrigerator with automated item management

A smart refrigerator system includes a plurality of compartments for storing food items and one or more tag readers. The smart refrigerator system may read a tag coupled to a food item using one of one or more tag readers. The smart refrigerator system may determine an identity of the food item, an associated date of the food item, and/or a compartment containing the food item. The smart refrigerator system may track item information that includes the identity of the food item, a state of the food item, and/or a compartment location of the food item. The smart refrigerator system may receive item usage information indicating when a user plans to use the food item and change a temperature of the food item. The smart refrigerator system may also generate a notification regarding freshness and/or a spoilage level of the food item and present it to the user.

  • Pub Date: 2014/03/12
  • Number: 09449208
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Apoptosis-inducing agents for the treatment of cancer and immune and autoimmune diseases

Disclosed are compounds which inhibit the activity of anti-apoptotic Bcl-xL proteins, compositions containing the compounds and methods of treating diseases during which is expressed anti-apoptotic Bcl-xL protein.

  • Pub Date: 2014/03/12
  • Number: 09266877
  • Owner: ABBVIE INC.
  • Location: North Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Wearable transdermal electrical stimulation devices and methods of using them

Apparatuses (e.g., devices, systems), and methods for transdermal electrical stimulation (TES). Apparatuses described herein can be self-contained, lightweight, and wearable. The apparatus may include a primary unit (TES stimulator) and an electrode portion that includes a first transdermal electrode and a second transdermal electrode and mates with the TES stimulator. The first electrode and secondary electrode are placed at two locations on the skin of a user, for example on the head and/or neck of a user. Electrical stimulation driven between the two electrodes may induce a cognitive effect in a user of the device.

  • Pub Date: 2014/02/12
  • Number: 09440070
  • Owner: Thyne Global, Inc.
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


User-friendly transaction interface

Methods and systems for facilitating electronic transactions on a user device are described. User-friendly graphical user interfaces (GUIs) are provided with minimal text and more pictures and images. The GUIs detect or receive various gesture inputs, such as swiping, tapping, and dragging and dropping, and display a corresponding screen or page. The gesture inputs allow a user to select or specify payers/payees, transaction amounts, and funding sources, without having to type numbers or letters.

  • Pub Date: 2014/02/12
  • Number: 09547854
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing a plurality of prescribed data management functions in a manner that reduces redundant access operations to primary storage

Systems and methods are disclosed for performing a plurality of prescribed data management functions in a manner that reduces redundant access operations to primary storage, where the system includes a data management engine for performing data management functions, including at least a snapshot function and a back-up function. An electronic service level agreement (SLA) specifies a schedule for performing data management functions, where point-in-time images of data include a reference to a baseline image and difference data indicating changes at a later, specific point in time. The data management system also creates a point-in-time image of the primary storage data in response to a schedule requiring some data management functions to be performed concurrently, and communicates the difference information to secondary storage to update the back-up copy of the primary data, such that the primary storage is accessed only once for all updates to the secondary storage.

  • Pub Date: 2014/02/12
  • Number: 09372758
  • Owner: ACTIFIO, INC.
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Reading station structures

In some examples, a reader system is provided for managing inventory items in an inventory system. The reader system may be configured to read tags associated with items stowed in an inventory holder. The inventory holder may be detachably coupled to a mobile drive unit. The mobile drive unit may move the inventory holder to a first position near an antenna of the reader system and the tags may begin to be read. While reading or at other times in the reading process, the mobile drive unit may move the inventory holder relative to the antenna. The identified tags may be compared to a manifest list of items expected to be stowed in the inventory holder.

  • Pub Date: 2014/02/12
  • Number: 09400971
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Pluggable architecture for embedding analytics in clustered in-memory databases

Disclosed are pluggable, distributed computing-system architectures allowing for embedding analytics to be added or removed from nodes of a system hosting an in-memory database. The disclosed system includes an API that may be used to create customized, application specific analytics modules. The newly created analytics modules may be easily plugged into the in-memory database. Each user query submitted to the in-memory database may specify different analytics be applied with differing parameters. All analytics modules operate on the in-memory image of the data, inside the in-memory database platform. All the analytics modules, may be capable of performing on-the-fly analytics, which may allow a dynamic and comprehensive processing of search results.

  • Pub Date: 2014/02/12
  • Number: 09659108
  • Owner: QBase, LLC
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring and visualizing traffic surprises

Systems, methods, and apparatuses are described for monitoring and visualizing traffic surprises. Traffic data is received for a region of interest comprising one or more routes. A surprise factor may be calculated for one or more routes in the region of interest based on a ratio of historical traffic data and real-time traffic data. A comparison may be performed of the surprise factor to at least one threshold. A surprise traffic message may be generated based on the comparison.

  • Pub Date: 2014/02/12
  • Number: 09518837
  • Owner: HERE Global B.V.
  • Location: Eindhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Method and system for identifying drawing primitives for selective transmission to a remote display

Remote desktop servers include a display encoder that maintains a secondary framebuffer that contains display data to be encoded and transmitted to a remote client display and a list of display primitives effectuating updated display data in the secondary framebuffer. The display encoder submits requests to receive the list of drawing primitives to a video adapter driver that receives and tracks drawing primitives that, when executed, update a primary framebuffer.

  • Pub Date: 2014/02/12
  • Number: 09448760
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for recommending content based on a travel route

An approach for rendering one or more graphical elements associated with one or more content items recommended for consumption during travel based on travel times associated with one or more travel routes is described. A content item recommendation platform determines travel times associated with travel routes. The content item recommendation platform determines content recommendations, content items, or a combination thereof based, at least in part, on a comparison of the travel times and duration times associated with the content recommendations, the one or more content items, or a combination thereof. The content item recommendation platform further causes, at least in part, a rendering of a user interface depicting one or more icons, one or more markers, one or more graphical elements, or a combination thereof associated with the content recommendations, the content items, or a combination thereof along the travel routes based, at least in part, on the comparison.

  • Pub Date: 2014/02/12
  • Number: 09423263
  • Owner: HERE GLOBAL B.V.
  • Location: Veldhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Merchant/customer POS interaction system

Systems and methods for providing merchant/customer interaction include determining that a tablet computer is in a merchant orientation, retrieving merchant product information according to a received instruction and merchant orientation information, and displaying a merchant screen on the tablet computer that includes the merchant product information according to the merchant orientation information. A change in the orientation of the tablet computer enclosure/stand is then detected from the merchant orientation to a customer orientation. In response, the merchant screen is transitioned on the tablet computer display to a customer screen as the tablet computer enclosure/stand changes orientations by moving the merchant screen and the customer screen linearly while in a stacked orientation. The customer screen includes the merchant product information displayed according to customer orientation information such that the merchant product information is displayed differently on the customer screen relative to the merchant screen.

  • Pub Date: 2014/02/12
  • Number: 09568955
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Management of inventory items

In some examples, a reader system is provided for managing inventory items in an inventory system. The reader system may be configured to read tags associated with items stowed in an inventory holder. The inventory holder may be detachably coupled to a mobile drive unit. The mobile drive unit may move the inventory holder to a first position near an antenna of the reader system and the tags may begin to be read. While reading or at other times in the reading process, the mobile drive unit may move the inventory holder relative to the antenna. The identified tags may be compared to a manifest list of items expected to be stowed in the inventory holder.

  • Pub Date: 2014/02/12
  • Number: 09378484
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Implementation of clustered in-memory database

An in-memory database system and method for administrating a distributed in-memory database, comprising one or more nodes having modules configured to store and distribute database partitions of collections partitioned by a partitioner associated with a search conductor. Database collections are partitioned according to a schema. Partitions, collections, and records, are updated and removed when requested by a system interface, according to the schema. Supervisors determine a node status based on a heartbeat signal received from each node. Users can send queries through a system interface to search managers. Search managers apply a field processing technique, forward the search query to search conductors, and return a set of result records to the analytics agents. Analytics agents perform analytics processing on a candidate results records from a search manager. The search conductors comprising partitioners associated with a collection, search and score the records in a partition, then return a set of candidate result records after receiving a search query from a search manager.

  • Pub Date: 2014/02/12
  • Number: 09430547
  • Owner: QBase, LLC
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture and identification system and process

A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object.

  • Pub Date: 2014/02/12
  • Number: 09613284
  • Owner: Nant Holdings IP, LLC
  • Location: Culver City, US
  • Details: Visit USPTO

Visit USPTO Page


Delivering author specific content

Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream.

  • Pub Date: 2014/02/12
  • Number: 09426160
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Configuring and controlling wagering game compatibility

A wagering game system and its operations are described herein. In some embodiments, the operations can include presenting a primary wagering game and receiving a request to present a secondary game in connection with the primary wagering game. The primary wagering game and the secondary game can be separate applications that require interactivity with each other (e.g., provide required functionality to each other, communicate shared data with each other, etc.). The operations can further include determining that an application programming interface (“API”) provides the required interactivity so that the secondary game can function in conjunction with the primary wagering game without problems (e.g., can successfully plug-in to the primary wagering game). The operations can further determine optional and non-optional requirements and determine compatibilities based on the optional and non-optional requirements. Further, the operations can add functionality to the primary wagering game, the secondary game, or the API, to enable compatibility.

  • Pub Date: 2014/02/12
  • Number: 09373224
  • Owner: BALLY GAMING, INC.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Compacting results vectors between stages of graphics processing

Ray tracing, and more generally, graphics operations taking place in a 3-D scene, involve a plurality of constituent graphics operations. Responsibility for executing these operations can be distributed among different sets of computation units. The sets of computation units each can execute a set of instructions on a parallelized set of input data elements and produce results. These results can be that the data elements can be categorized into different subsets, where each subset requires different processing as a next step. The data elements of these different subsets can be coalesced so that they are contiguous in a results set. The results set can be used to schedule additional computation, and if there are empty locations of a scheduling vector (after accounting for the members of a given subset), then those empty locations can be filled with other data elements that require the same further processing as that subset.

  • Pub Date: 2014/02/12
  • Number: 09633468
  • Owner: Imagination Technologies Limited
  • Location: Kings Langley, GB
  • Details: Visit USPTO

Visit USPTO Page


Apparatuses, methods and systems for a digital conversation management platform

The APPARATUSES, METHODS AND SYSTEMS FOR A DIGITAL CONVERSATION MANAGEMENT PLATFORM (“DCM-Platform”) transforms digital dialog from consumers, client demands and, Internet search inputs via DCM-Platform components into tradable digital assets, and client needs based artificial intelligence campaign plan outputs. In one implementation, The DCM-Platform may capture and examine conversations between individuals and artificial intelligence conversation agents. These agents may be viewed as assets. One can measure the value and performance of these agents by assessing their performance and ability to generate revenue from prolonging conversations and/or ability to effect sales through conversations with individuals.

  • Pub Date: 2014/02/12
  • Number: 09424862
  • Owner: NEWVALUEXCHANGE LTD
  • Location: Reading, GB
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of modeling object networks

According to one embodiment, a system is provided. The system includes a memory, at least one processor coupled to the memory and an object network modeler component executable by the at least one processor. The memory stores an object network including a plurality of objects, the plurality of objects including a first object, a second object, a third object, and a fourth object. The object network modeler component is configured to implicitly associate, within the object network, the first object with the second object and explicitly associate, within the object network, the third object with the fourth object.

  • Pub Date: 2014/01/12
  • Number: 09141676
  • Owner: Rakuten USA, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for determining a status of a component of a device

Methods and systems for determining a status of a component of a device are provided. An example method includes triggering an action of a component of a device, and responsively receiving information associated with the action of the component from a sensor. The method further includes a computing system having a processor and a memory comparing the information with calibration data and determining a status of the component based on the comparison. In some examples, the calibration data may include information derived from data received from a pool of one or more devices utilizing same or similar components as the component. The determined status may include information associated with a performance of the component with respect to performances of same or similar components of the pool of devices. In one example, the device may self-calibrate the component based on the status.

  • Pub Date: 2014/01/12
  • Number: 09327404
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Social static ranking for search

In one embodiment, one or more computing devices receive, from a client device of a first user, a query from the first user. The computer devices search a social graph to identify one or more nodes of the social graph that are relevant to the query. The computer devices obtain a static rank for each identified node. The static rank is based at least in part on a number of edges of a particular edge type that are connected to the node in the graph or attributes of edges connected to the node in the graph. The computer devices send to the client device of the first user for display, a search-results page responsive to the received query. The search-results page includes reference to one or more nodes having a static rank greater than a threshold rank.

  • Pub Date: 2014/01/12
  • Number: 09298835
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Pairable secure-access facilities

Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.

  • Pub Date: 2014/01/12
  • Number: 09542784
  • Owner: EBAY INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Network device configuration deployment pipeline

The following description is directed to configuring network devices. In one example, a deployed configuration for a network device can be collected. The deployed configuration can be representative of a state of the network device at the time of collection. A difference can be detected between the deployed configuration and an authoritative configuration for the network device. In response to detecting the difference, an update of the network device according to the authoritative configuration for the network device can be scheduled.

  • Pub Date: 2014/01/12
  • Number: 09419856
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Live rollback for a computing environment

A first computing device is provided for rolling back a computing environment. The computing device includes processors configured to acquire a stream containing entries including snapshot entries, memory entries, and input/output entries wherein each entry includes information and is associated with a timestamp. The processors are further configured to receive a snapshot entry associated with a first timestamp, revert to a memory state using information provided in at least one memory entry associated with a timestamp after the first timestamp, and re-execute a previously executed process, wherein the re-execution of the process is started using the first timestamp, information from the received snapshot entry, and information for input/output operations corresponding to the input/output entries associated with timestamps after the first timestamp.

  • Pub Date: 2014/01/12
  • Number: 09639432
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Immersive scaling interactive television

A video media viewport/window may be progressively scaled and/or repositioned based on sequential navigational commands received via an input device. A process may include presenting video media within a viewing window that substantially spans an area of the display, and receiving, during playback of the video media, a plurality of sequential user input commands via an input device that indicate a navigational command in a first direction. In response to receiving the sequential user input commands, the system may progressively scale the viewing window to increasingly smaller size viewing windows, position the smaller size viewing windows a distance from a center of the display relative to the direction of the received navigational commands, and present one or more interactive elements outside of the smaller size viewing windows.

  • Pub Date: 2014/01/12
  • Number: 09380345
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic content for online transactions

A method of providing dynamic content includes providing a client device with access to an online marketplace over a network. The method also includes facilitating transmission of a user identifier stored by the client device to a payment service provider. The method further includes receiving dynamic content from the payment service provider in response to the user identifier. In addition, the method includes serving the dynamic content to the client device over the network.

  • Pub Date: 2014/01/12
  • Number: 09569793
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Disk replacement using a predictive statistical model

In a provider network, attributes of one of a plurality of storage devices of the provider network are identified for failure monitoring. Based on a failure prediction model, a predicted probability of failure of the selected storage device is determined. The failure prediction model is based on historical and current data associated with failures of the storage devices of the provider network that have common attributes. The selected storage device is deactivated in response to determining that the predicted probability of failure of the selected storage device meets a criterion.

  • Pub Date: 2014/01/12
  • Number: 09542296
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Content response prediction

Techniques for predicting a user response to content are provided. In example embodiments, one or more feature vectors are assembled into an assembled feature vector. A particular one of the feature vectors not being available is determined. In response to determining that the particular one of the feature vectors is not available, the particular feature vector is ignored based on an importance value associated with the particular feature vector. A substitute value associated with the particular feature vector is inserted into a portion of the assembled feature vector associated with the particular feature vector. A prediction modeling process based on the assembled feature vector and a prediction model is performed to predict a likelihood of a particular member performing a particular user action on a particular content item.

  • Pub Date: 2014/01/12
  • Number: 09262716
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Client-server input method editor architecture

In general, one innovative aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving a key event at an input method editor (IME) server transmitted to the IME server from an IME client that is in communication with the IME server, wherein the IME server is a stateful server that stores both requests and responses of a communication session between the IME server and the IME client, and the IME client is a stateless IME client that issues a request to the IME server based on the key event, identifying, by the IME server, one or more logographic characters based on the key event, generating, by the IME server, rendering information corresponding to the one or more logographic characters, and transmitting the rendering information from the IME server to the IME client to display the one or more logographic characters.

  • Pub Date: 2014/01/12
  • Number: 09635138
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Trust level activation

An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured resources associated with a particular trust level that are outside of the isolation execution environment. A trust activation engine determines the trust level associated with a request for a resource and operates differently based on the trust level. A broker process may be used to execute components providing access to resources having a partial trust level in an execution environment that is separate from the isolation execution environment.

  • Pub Date: 2014/30/11
  • Number: 09465948
  • Owner: MICROSOFT TECHNOLOGY LICENSING LLC.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking ownership of memory in a data processing system through use of a memory monitor

Ownership of a memory unit in a data processing system is tracked by assigning an identifier to each software component in the data processing system that can acquire ownership of the memory unit. An ownership variable is updated with the identifier of the software component that acquires ownership of the memory unit whenever the memory unit is acquired.

  • Pub Date: 2014/30/11
  • Number: 09405472
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for generating a virtual network topology for M2M communications

Methods and systems for generating a virtual network topology for machine-to-machine communications. A set of input information including network information and configuration information is obtained. One or more virtual serving gateways for the virtual network are located at one or more physical hosts, and each machine is associated with a respective virtual serving gateway, in accordance with the network information and the configuration information. A set of output information defining the virtual network topology is generated.

  • Pub Date: 2014/28/11
  • Number: 09622019
  • Owner: Huawei Technologies Co., Ltd.
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for monitoring the insertion of local media content into a program stream

Methods and apparatus for monitoring locally inserted media content are disclosed. A disclosed method includes obtaining identification data and inserting the identification data in the media content after the media content has been received at a media consumption location. Another disclosed method includes receiving media content before the media content is output by a consumer receiving device and monitoring the received media content. Monitoring the received media content may include extracting signatures from the received media content and transmitting the extracted signatures to another location.

  • Pub Date: 2014/28/11
  • Number: 09544622
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


One-touch payment using haptic control via a messaging and calling multimedia system on mobile device and wearable device, currency token interface, point of sale device, and electronic payment card

Provided are computer implemented methods and systems for messaging, calling, and one-touch payments via mobile and wearable devices. An exemplary system comprises a processor and a database in communication with the processor. The processor is configured to provide an integrated interface for selection of an activity mode. The activity mode includes a messaging mode, a calling mode, and a one-touch payment mode. The processor is further configured to receive the selection of the activity mode via the integrated interface from a user. If the messaging mode is selected, a message from the user is received and sent to a recipient via a data network. If the calling mode is selected, a data network call is initiated on a call request of the user. If the one-touch payment mode is selected, a payment request is transmitted to a financial organization.

  • Pub Date: 2014/27/11
  • Number: 08985442
  • Details: Visit USPTO

Visit USPTO Page


Workload selection and cache capacity planning for a virtual storage area network

Exemplary methods, apparatuses, and systems receive a first input/output (I/O) trace from a first workload and run the first I/O trace through a cache simulation to determine a first miss ratio curve (MRC) for the first workload. A second I/O trace from the first workload is received and run through the cache simulation to determine a second MRC for the first workload. First and second cache sizes corresponding to a target miss rate for the first workload are determined using the first and second MRCs. A fingerprint of each of the first and I/O traces is generated. The first cache size, the second cache size, or a combination of the first and second cache sizes is selected as a cache size for the first workload based upon a comparison of the first and second fingerprints. A recommended cache size is generated based upon the selected cache size.

  • Pub Date: 2014/26/11
  • Number: 09558126
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Table application programming interfaces (APIs)

A device receives, in a technical computing environment (TCE), a first variable with a first data type and a particular number of rows, and receives a second variable with a second data type and the particular number of rows. The second data type may be different than the first data type. The device receives a command to create a table based on the first variable and the second variable, and creates, based on the command, a heterogeneous table that includes the first variable and the second variable. The device stores the heterogeneous table, and/or provides the heterogeneous table for display.

  • Pub Date: 2014/26/11
  • Number: 09208208
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Systems for enabling subscriber monitoring of telecommunications network usage and service plans

Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.

  • Pub Date: 2014/26/11
  • Number: 09544751
  • Owner: OPENET TELECOM LTD.
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enabling subscriber monitoring of telecommunications network usage and service plans

Methods, servers and systems for managing subscriber accounts within a telecommunications network. A server may be configured to identify a network access scheme (e.g., subscription plan, service pass, etc.) associated with a subscriber account, and use contextual information received from components in the telecommunication network to intelligently determine whether to notify the user of the availability of different network access schemes based on various factors, such as based on determining whether any available service pass is more cost effective than the currently installed service pass, whether any available service pass will provide a user equipment device with an increased quality of service relative to the currently installed service pass, whether any available subscription plan will provide the user equipment device with an increased quality of service relative to the current subscription plan, or whether any available subscription plan is more cost effective than the current subscription plan.

  • Pub Date: 2014/26/11
  • Number: 09497611
  • Owner: OPENET TELECOM LTD.
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program for fetching data from a physical memory queue utilizing an alias queue name

A system, method, and computer program product are provided for fetching data from a physical memory queue utilizing an alias queue name. In use, a physical queue associated with at least a portion of memory is identified. Additionally, a first alias queue name is mapped to the physical queue. Further, data is fetched utilizing the first alias queue name in response to a request to fetch the data from the physical queue.

  • Pub Date: 2014/26/11
  • Number: 09501228
  • Owner: Amdocs Development Limited
  • Location: Limassol, CY
  • Details: Visit USPTO

Visit USPTO Page


System and method for connecting, configuring and testing wireless devices and applications

A system, apparatus, and method are provided for connecting, configuring and testing wireless devices and applications. For example, one embodiment of wireless device for operation in a wireless network comprises a processor, a wireless module including a radio receiver and transmitter unit coupled to the processor, a graphical user interface (GUI) coupled to the processor, and a Connection Manager Module (CMM) including an Application Programming Interface (API) module, a Rules Engine Module, and a Rules Set Module, wherein the CMM manages a connection to a wireless network.

  • Pub Date: 2014/26/11
  • Number: 09119131
  • Owner: Jasper Technologies, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Sensor and transmission control circuit in adaptive interface package

A programmable interface module includes a linear power regulator to control and provide power to interfaced components on an as needed basis. The interface module is implemented in, for example, a sensor pack and multiplexed to a plurality of sensor modules. In a first mode, the linear voltage regulator provides a relatively small amount of power which allows a sensor module to output a signal responsive to detecting an environmental condition (e.g., gamma or x-ray radiation, extreme temperatures, etc.). The interface module can switch the linear voltage regulator to a second mode in which the linear voltage regulator ramps up the amount of power provided to a detecting sensor module. The sensor module can then provide a level indicative of a concentration or intensity of the environmental condition. If the level surpasses a predetermined threshold, the senor pack can output an alert signal to security server.

  • Pub Date: 2014/26/11
  • Number: 09355540
  • Owner: FTC Sensors, LLC
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Scaling a cloud infrastructure

A method for scaling a cloud infrastructure, comprises receiving at least one of resource-level metrics and application-level metrics, estimating parameters of at least one application based on the received metrics, automatically and dynamically determining directives for scaling application deployment based on the estimated parameters, and providing the directives to a cloud service provider to execute the scaling.

  • Pub Date: 2014/26/11
  • Number: 09300552
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Rapidly initializing and dynamically adjusting media streams

A device may generate a media stream to be shared with other users by building a media graph, comprising a series of interconnected processing units that perform various processing tasks. However, the time involved in generating the media graph may delay the initialization of the media stream, and adjusting properties of the media stream (such as resolution or codec) may result in an interruption of the media stream while a new media graph is built. Instead, a media graph cache may be provided to cache a set of media graphs, which may be interchangeably selected for rapid initialization and adjusting of media stream properties. The media component (e.g., a videocamera) may also be configured to promote rapid adjustments to some media stream properties, while maintaining other properties (e.g., field of view and white balance) for a smooth transition between media stream property sets.

  • Pub Date: 2014/26/11
  • Number: 09497239
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multiplet-based matrix mixing for high-channel count multichannel audio

A multiplet-based spatial matrixing codec and method for reducing channel counts (and thus bitrates) of high-channel count (seven or more channels) multichannel audio, optimizing audio quality by enabling tradeoffs between spatial accuracy and basic audio quality, and converting audio signal formats to playback environment configurations. An initial N channel count is reduced to M channels by spatial matrix mixing to a lower number of channels using multiplet pan laws. The multiplet pan laws include doublet, triplet, and quadruplet pan laws. For example, using a quadruplet pan law one of the N channels can be downmixed to four of the M channels to create a quadruplet channel. Spatial information as well and audio content is contained in the multiplet channels. During upmixing the downmixed channel is extracted from the multiplet channels using the corresponding multiplet pan law. The extracted channel then is rendered at any location within a playback environment.

  • Pub Date: 2014/26/11
  • Number: 09552819
  • Owner: DTS, Inc.
  • Location: Calabassas, US
  • Details: Visit USPTO

Visit USPTO Page


Modular device payment system

A modular device payment module includes a chassis. A modular device connector is located on the chassis. A payment module database in the chassis stores funding source information and security information. A payment module engine in the chassis determines that the modular device connector has been connected to a modular device frame of a modular device, and retrieves modular device identifying information from the modular device. The payment module then determines that the modular device identifying information matches an authorized modular device identified by the security information in the payment module database and, in response, enables the transmission of at least some of the funding source information from the payment module database to conduct a payment transaction.

  • Pub Date: 2014/26/11
  • Number: 09275389
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methane-rich syngas production from hydrocarbon fuels using multi-functional catalyst/capture agent

The disclosure provides a gasification process for the production of a methane-rich syngas at temperatures exceeding 400° C. through the use of an alkali hydroxide MOH, using a gasification mixture comprised of at least 0.25 moles and less than 2 moles of water for each mole of carbon, and at least 0.15 moles and less than 2 moles of alkali hydroxide MOH for each mole of carbon. These relative amounts allow the production of a methane-rich syngas at temperatures exceeding 400° C. by enabling a series of reactions which generate Hand CH, and mitigate the reforming of methane. The process provides a methane-rich syngas comprised of roughly 20% (dry molar percentage) CHat temperatures above 400° C., and may effectively operate within an IGFC cycle at reactor temperatures between 400-900° C. and pressures in excess of 10 atmospheres.

  • Pub Date: 2014/26/11
  • Number: 09562203
  • Owner: U.S. Department of Energy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Input/output trace sampling

Exemplary methods, apparatuses, and systems include a host computer selecting a first workload of a plurality of workloads running on the host computer to be subjected to an input/output (I/O) trace. The host computer determines whether to generate the I/O trace for the first workload for a first length of time or for a second length of time. The first length of time is shorter than the second length of time. The determination is based upon runtime history for the first workload, I/O trace history for the first workload, and/or workload type of the first workload. The host computer generates the I/O trace of the first workload for the selected length of time.

  • Pub Date: 2014/26/11
  • Number: 09471482
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Graphene composition, method of forming a graphene composition and sensor system comprising a graphene composition

A device including a composition formed by oxidation of graphene oxide to form holey graphene oxide having defects therein and reduction of the holey graphene oxide. A composition includes graphene oxide sheets including holes therein formed by oxidation to form a network of interconnected graphene oxide nanoribbons.

  • Pub Date: 2014/26/11
  • Number: 09482638
  • Owner: University of Pittsburgh—Of the Commonwealth System of Higher Education
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Autonomous cargo delivery system

The present invention is directed to a system and methods of providing platform-agnostic systems and methods capable of providing an integrated processor and sensor suite with supervisory control software and interfaces to perform small unit rapid response resupply and CASEVAC into hazardous and unpredictable environments.

  • Pub Date: 2014/26/11
  • Number: 09557742
  • Owner: Aurora Flight Sciences Corporation
  • Location: Manassas, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for controlling transmission power of terminal in wireless environment

Disclosed are an apparatus and method for controlling transmission power of a terminal in a wireless environment. The apparatus for controlling transmission power of a terminal includes an optimal transmission power calculation unit configured to calculate an optimal transmission power value for a terminal of a type, the terminal being accessible to one or more wireless networks; a transmission power setting unit configured to, when an access of the terminal to at least one of the one or more wireless networks is sensed, provide the terminal with optimal transmission power values corresponding to the terminal and the network accessed by the terminal.

  • Pub Date: 2014/26/11
  • Number: 09622195
  • Owner: SAMSUNG SDS CO., LTD.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Altering streaming video encoding based on user attention

Disclosed are various embodiments for adjusting the encoding of a video signal into a video stream based on user attention. A video signal is encoded into a video stream. A temporary lapse of attention by a user of the interactive application is predicted. The encoding of the video signal into the video stream is adjusted from an initial state to a conservation state in response to predicting the temporary lapse of attention by the user. The conservation state is configured to conserve one or more resources used for the video stream relative to the initial state.

  • Pub Date: 2014/26/11
  • Number: 09253494
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Web page performance scoring

A browser-based tool is provided that loads a Webpage, accesses the document object model (DOM) of the page, collects information about the page structure and parses the page, determines through the use of heuristics such factors as how much text is found on the page and the like, produces statistical breakdown of the page, and calculates a score based on performance of the page. Key to the operation of the invention is the ability to observe operation of the Webpage as it actually loads in real time, scoring the page for several of various performance factors, and producing a combined score for the various factors.

  • Pub Date: 2014/25/11
  • Number: 09374284
  • Owner: Mercury Kingdom Assets Limited
  • Location: Road Town, Tortola, VG
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing recommendations to obfuscate an entity context

Systems and methods for providing recommendations to obfuscate an entity context in a sensory environment are described. In one implementation, the method comprises receiving entity data and sensory environment data from a plurality of sources. Further, the method comprises analyzing the entity data to obtain categorized entity data. The categorized entity data comprises a plurality of features indicating characteristics of the entity context. Further, the method comprises analyzing the sensory environment data to obtain categorized sensory environment data. Further, the method comprises determining a correlation score for each of the plurality of features by correlating the categorized entity data and the categorized sensory environment data. Further, the method comprises recommending at least one of the plurality of features, based on the correlation score, to obfuscate the entity context in the sensory environment.

  • Pub Date: 2014/25/11
  • Number: 09490976
  • Owner: WIPRO LIMITED
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


System and method for communication with a mobile device via a positioning system including RF communication devices and modulated beacon light sources

A light source emits a modulated light, and a radio-frequency transceiver disposed therewith emits a radio-frequency signal. A mobile device may receive either or both signals and determine its position based thereon. The light and radio-frequency sources may be disposed in node in a network of said sources, and the nodes may communicate via the radio-frequency transceivers.

  • Pub Date: 2014/25/11
  • Number: 09509402
  • Owner: ABL IP HOLDING LLC
  • Location: Conyers, US
  • Details: Visit USPTO

Visit USPTO Page


Recovery of a transaction after XA end

Embodiments of the present invention disclose a method for recovery of a two-phase commit transaction. A computer transmits a first transaction identifier to a data store, wherein the first transaction identifier defines a two-phase commit transaction. The computer transmits a prepare command for the first transaction identifier to a first resource manager. The computer determines if a failure and restart occurred within a distributed data processing environment, wherein the failure and restart occurs after the first resource manager receives an end command, but prior to completing execution of the prepare command for the first transaction identifier. Responsive to determining the failure and restart did occur within the distributed data processing environment, the computer retrieves the first transaction identifier from the data store. The computer transmits a rollback command for the retrieved first transaction identifier to the first resource manager.

  • Pub Date: 2014/25/11
  • Number: 09400719
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Providing web service for new user account after installation of application on mobile device

Mobile devices often communicate with network services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to automatically create an account associating a mobile device to a network service after a new application is installed on the mobile device. In an embodiment, a new application is remotely installed on a mobile device. After the installation, the device monitors itself for an occurrence of an event. In response to detecting the occurrence, the device launches the new application. After the launch, the new application automatically obtains data from the mobile device, and then sends the data to a server that automatically creates an account for the user. The server also provides a service associated with the account.

  • Pub Date: 2014/25/11
  • Number: 09288608
  • Owner: Lookout, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Online decorating system for edible products

A web-enabled standalone application may, in selected implementations, prevent received license-controlled image data from unauthorized re-use, editing, or distribution, and permits image processing, such as applying the International Color Consortium's color correction process, at the local control device. The web-enabled standalone application may further generate a printer specific byte stream based on post-image processed data, providing a color managed workflow independent of local control device operating system print drivers.

  • Pub Date: 2014/25/11
  • Number: 09282750
  • Owner: DECOPAC, INC.
  • Location: Anoka, US
  • Details: Visit USPTO

Visit USPTO Page


Management of software updates in a virtualized environment of a datacenter using dependency relationships

An approach to managing software components in a datacenter having virtualized components includes maintaining a suitable data construct for representing the virtualized elements. In embodiments, virtualized elements include knowledge relating to instantiations of virtual machines. Management of software components includes traversing a data representation of the datacenter, and assessing the compatibility of the software component with components in the datacenter that relate to the target of the software component.

  • Pub Date: 2014/25/11
  • Number: 09535684
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Battery pack with supplemental memory

Features are disclosed relating to a case for a mobile device that provides supplemental battery power and supplemental storage space to the mobile device. Additional features are disclosed relating to an external storage device that can provide supplemental battery power and/or supplemental storage space for one or more devices. Further features are disclosed relating sharing and searching for files. Files may be shared across multiple (e.g., two or more) devices, operated by or associated with multiple users, providing multiple file storage locations. Files may be searched across the multiple devices using, e.g., search terms, tags, and/or other search options. Searching may also be performed with respect to activities performed in connection with subject files.

  • Pub Date: 2014/25/11
  • Number: 09495375
  • Owner: mophie, inc.
  • Location: Tustin, US
  • Details: Visit USPTO

Visit USPTO Page


Abstract representation and provisioning of network services

A network management device connects to a device on the network, receives a trigger for an operation command, supplies to the device a command line interface command for the operation command, wherein a randomly generated string is included at the end of the command line interface command. The network management device receives the output of the operation command from the device, detects the end of the operation command output and parses the output using an XML-based parser. XML based configuration files are used for configuration of different network devices. XML based report files are used to generate different network reports.

  • Pub Date: 2014/25/11
  • Number: 09264326
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Treating leukemia with a whole, leech saliva extract

Methods are provided for isolating and using a whole-saliva leech extract. The methods can include feeding a phagostimulatory agent to a leech; inducing a regurgitation in the leech, the inducing including placing the leech in an environment having a temperature of less than about 0° C.; and, collecting an unrefined, whole saliva in the regurgitation of the cooled leech. The methods can include revitalizing the leech by warming it at a temperature ranging from about 5° C. to about 40° C. Stable, lyophilized, whole-saliva extracts of a leech are also provided, the extract having a stable activity when stored for use at a temperature below about −20° C., the extract maintaining at least 70% of the activity for at least 6 months. The extracts can be used to treat solid tumors, treat liquid tumors, treat diabetes, treat a viral disease, treat a parasitic disease, treat an antibacterial disease, or serve as an anti-oxidant.

  • Pub Date: 2014/24/11
  • Number: 09005667
  • Owner: Biopep Solutions Inc
  • Location: Richmond, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


System for motion and activity correlation with dose for occupational and environmental dosimetry

Described are a method and apparatus for determining based on motion data when an individual wearing a dosimeter is active. Also described are a method and apparatus for determining based on motion data whether an individual was wearing a dosimeter when the dosimeter was exposed to radiation. Also described are a method and apparatus for determining based on motion data whether a dosimeter was in a particular location when the dosimeter was exposed to radiation. Also described are a method and apparatus for determining based on motion data where on the body of an individual the individual was wearing a dosimeter when the dosimeter was exposed to radiation. Also described are a method and apparatus for determining based on motion data the probability that an individual is wearing a dosimeter that is assigned to the individual.

  • Pub Date: 2014/24/11
  • Number: 09115989
  • Owner: LANDAUER, INC.
  • Location: Glenwood, US
  • Details: Visit USPTO

Visit USPTO Page


Substituted 5-fluoro-1H-pyrazolopyridines and their use

The present application relates to novel substituted 5-fluoro-1H-pyrazolopyridines, to processes for their preparation, to their use alone or in combinations for the treatment and/or prophylaxis of diseases, and to their use for producing medicaments for the treatment and/or prophylaxis of diseases, in particular for the treatment and/or prophylaxis of cardiovascular disorders.

  • Pub Date: 2014/24/11
  • Number: 09266885
  • Owner: ADVERIO PHARMA GMBH
  • Location: Schoenefeld, DE
  • Details: Visit USPTO

Visit USPTO Page


Spiro[2.4]heptanes for treatment of Flaviviridae infections

Compounds, methods, and compositions for the treatment of infections in or exposure to humans and other host animals of Flaviviridae viruses, including HCV, that includes the administration of an effective amount of a spiro[2.4]heptane as described herein or a pharmaceutically acceptable salt or prodrug thereof, optionally in a pharmaceutically acceptable carrier, are provided. The spiro[2.4]heptane compounds either possess antiviral activity, or are metabolized to a compound that exhibits such activity.

  • Pub Date: 2014/24/11
  • Number: 09216960
  • Owner: University of Georgia Research Foundation, Inc.
  • Location: Athens, US
  • Details: Visit USPTO

Visit USPTO Page


Service selection set published to device agent with on-device service selection

Disclosed herein are various embodiments for publishing a service selection set to a device agent on an end-user device and for on-device selection of a service. In some embodiments, a network system publishes a service selection set to an end-user device over a wireless access network, receives a selection set user selection from the end-user device, and provisions one or more network functions based on the selection set user selection.

  • Pub Date: 2014/24/11
  • Number: 09572019
  • Owner: Headwater Partners LLC
  • Location: Tyler, US
  • Details: Visit USPTO

Visit USPTO Page


Piezoelectric microcantilever sensors for biosensing

A piezoelectric microcantilever for sensing compounds or molecules. The piezoelectric microcantilever, may include at least one electrode, an insulation layer, a receptor, an immobilization layer, a non-piezoelectric layer and a piezoelectric layer The sensor is capable of self actuation and detection. The piezoelectric layer may be constructed from a highly piezoelectric thin lead magnesium niobate-lead titanate film, a highly piezoelectric thin zirconate titanate film, a highly piezoelectric lead-free film. Methods of using the sensors and flow cells and arrays including the sensors are also described.

  • Pub Date: 2014/24/11
  • Number: 09274087
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring and reporting resource allocation and usage in a virtualized environment

Various aspects of the disclosure relate to monitoring of resource usage in a virtualized environment, including usage of a physical processor that executes a virtual machine or an application of the virtualized environment. By monitoring physical computing resources (e.g., by number and type) that are used to execute a virtual machine or an application of the virtualized environment, a user may, for example, be informed as to when physical computing resources are used in excess or less than the limits set by the license. In some embodiments, additional actions may be taken to update the license to better satisfy the user's resource requirements or reduce the amount paid annually for ongoing technical services. To inform a user, or form the basis for the additional actions, a report may be generated that includes data describing how a virtual machine or application executed on the physical computing resources.

  • Pub Date: 2014/24/11
  • Number: 09588795
  • Owner: Aspen Timber LLC
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing comprehensive cyber-security protection using an open application programming interface based platform solution

Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user interface that is accessible by customers. The software program includes an application programming interface that is configured to allow a platform operator and third party providers to offer computer implemented cyber-security services to the customers through the user interface. Integration standards for the application programming interface are provided to the third party providers, the integration standards specifying how the computer implemented cyber-security services can be integrated into the platform. First and second computer implemented cyber-security service that are provided by respective first and second of the third party providers are accepted into the platform, each of which is self-certified by the third party provider as being operable through the platform. The first and second computer implemented cyber-security services are then delivered to respective first and second of the customers through the platform.

  • Pub Date: 2014/24/11
  • Number: 09338175
  • Owner: AT&T INTELLECTUAL PROPERTY I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Managing multi-level service level agreements in cloud-based networks

Embodiments relate to managing multi-level service level agreements (SLAs) in cloud-based networks. A resource managing module can manage resources in the cloud-based networks in response to the detection of one or more triggering events. In embodiments, the triggering events can be changeovers in time periods, or meeting or exceeding thresholds associated with end user operation of the resources in the cloud-based networks. The multi-level SLAs can specify how to adjust the resources in the cloud-based networks in response to the detection of the triggering events. The resource managing module can adjust applicable resources in the cloud-based networks as specified by the multi-level SLAs.

  • Pub Date: 2014/24/11
  • Number: 09438484
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Mainframe virtualization

Request data is identified that describes a request of a second program by a first program intercepted by a first exit in the first program. Response data is identified that describes a response by the second program to the request as intercepted by a second exit in the first program. A virtual service configured to model operation of the second program is instantiated based on the request data and response data. In another aspect, a request by the first program to the second program is intercepted by the first exit and the request is redirected to the virtual service. A response is received as generated by the virtual service and the response is returned to the first program using the second exit.

  • Pub Date: 2014/24/11
  • Number: 09229766
  • Owner: CA, INC.
  • Location: Islandia, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware and software methodologies for detecting illegal memory address of a memory access operation

A system for providing bound checking to insure memory accessed, including indirect object access through pointers, is within a range of defined object bounds is disclosed herein. Embodiments of the present disclosure provide hardware and software methodology for bound checking, where bound checking is performed in hardware and in parallel with the execution of the memory accesses using dedicated hardware. There is reduced overhead associated with the enforcement of bound checking, and hardware is modified to include new registers and/or instructions for bound checking support. An exception is raised when an out of bound violation is detected. According to some embodiments, a compiler extracts bound information from the respective programming language (e.g. C/C++, Java) and generates tables with special APIs known to the hardware that enables both execution of the program and bound checking to be performed simultaneously.

  • Pub Date: 2014/24/11
  • Number: 09535613
  • Owner: Futurewei Technologies, Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Distress identifier to cause an action

Embodiments relate to systems and methods for providing digital dye packs and/or distress signals on a device user interface in connection with a transaction. In an embodiment, a system includes a communication module that interacts with a device having an input device that receives, from a user of the device, specific distress identifier information in connection with conducting a transaction via the device. The system also includes a non-transitory memory comprising a database storing specific distress identifier information with corresponding defensive actions that are executed based on the specific distress identifier information. The system further includes at least one hardware processor in communication with the non-transitory memory and the communication module for executing the defensive actions corresponding to the specific distress identifier information based at least in part on the specific distress identifier information received from the user of the device in connection with the transaction.

  • Pub Date: 2014/24/11
  • Number: 09501923
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Congestion sensitive path-balancing

Encapsulated packets may be generated for different packets transmitted between a source instance and destination instance in a computer system. The source instance and destination instance may be implemented by different physical hosts linked by multiple network paths. Congestion of the multiple network paths may be determined and path-balancing polices may be implemented in response to the determined congestion. Each encapsulation packet comprises contents of a corresponding packet, and one or more data values selected in accordance with a path-balancing policy. The data values added to one encapsulation packet may differ from those added to another. Different network paths to the destination may be selected for different encapsulation packets of a given transmission based at least in part on the added data values.

  • Pub Date: 2014/24/11
  • Number: 09509616
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatus for displaying the multimedia information from wireless communication networks

Video signals for a mobile terminal are converted to accommodate reproduction by an alternative display terminal. The video signal is processed to provide a converted video signal appropriate for an alternative display terminal that is separate from the mobile terminal. This converted video signal is then provided for the alternative display terminal to accommodate the corresponding video display on a screen provided by the alternative (e.g., external) display terminal.

  • Pub Date: 2014/23/11
  • Number: 09118794
  • Owner: Virginia Innovation Sciences, Inc.
  • Location: Alexandria, US
  • Details: Visit USPTO

Visit USPTO Page


Using an alias volume name for a volume to allocate space to a data set

Provided are a computer program product, system, and method for using an alias volume name for a volume to allocate space to a data set. An assignment of a plurality of volumes to a data set is maintained, wherein the volumes are configured in a storage system. A request is received to extend the data set. An alias volume name is assigned to the data set for a previously assigned volume to the data to extend the data set in response to one of the previously assigned volumes having available space to extend the data set. A base volume name is assigned to the data set for a volume not assigned to the data set in response to one of the previously assigned volumes to the data set not having available space to extend the data set.

  • Pub Date: 2014/21/11
  • Number: 09268679
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Updating cached web content

Updating cached data is disclosed. An indication that a web content has been updated is received. An updated version of the web content is received. A difference between the updated version of the web content and a previous version of the updated web content is determined. A request for the updated version of the web content is received from a client. The difference in place of the updated version of the web content is provided to the client. The client generates the updated version of the web content using the difference and the previous version of the updated web content cached by the client.

  • Pub Date: 2014/21/11
  • Number: 09509764
  • Owner: Instart Logic, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for driver and vehicle tracking

Systems and methods for driver and vehicle tracking in accordance with embodiments of the invention are disclosed. In one embodiment of the invention, a location tracking system includes a processor and a memory storing a location tracking application, wherein the location tracking application directs the processor to obtain vehicle location data, where the vehicle location data includes a set of vehicle location data points, obtain driver location data, where the driver location data includes a set of driver location data points, correlate the vehicle location data and the driver location data, and generate vehicle driver data based on the correlated vehicle location data and driver location data, where the generated vehicle driver data includes a set of drivers associated with a vehicle.

  • Pub Date: 2014/21/11
  • Number: 09648579
  • Owner: CalAmp Corp.
  • Location: Oxnard, US
  • Details: Visit USPTO

Visit USPTO Page


Security and rights management in a machine-to-machine messaging system

Techniques for providing security and rights management in a machine-to-machine messaging system are provided, such as a computing device, a method, and a computer-program product for detecting unauthorized message attempts. For example, the method may receive a communication sent from a first Internet of Things (IoT) device and destined for a second IoT device. The first IoT device is assigned a first universally unique identifier, and the communication includes a second universally unique identifier assigned to the second IoT device. The method may further include obtaining the second universally unique identifier, determining that the second universally unique identifier is assigned to the second IoT device, and determining, using the second universally unique identifier, that the communication received from the first IoT device is an unauthorized message attempt by the first IoT device to exchange a message with the second IoT device.

  • Pub Date: 2014/21/11
  • Number: 09094407
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Range of motion exerciser

A system includes a device that includes one or more bladders capable of being inflated and deflated. The system also includes an information package capable of processing data representing the inflating and deflating of the one or more bladders.

  • Pub Date: 2014/21/11
  • Number: 09314668
  • Details: Visit USPTO

Visit USPTO Page


Power management for a graphics processing unit or other circuit

In one embodiment, a system includes power management control that controls a duty cycle of a processor to manage power. The duty cycle may be the amount of time that the processor is powered on as a percentage of the total time. By frequently powering up and powering down the processor during a period of time, the power consumption of the processor may be controlled while providing the perception that the processor is continuously available. For example, the processor may be a graphics processing unit (GPU), and the period of time over which the duty cycle is managed may be a frame to be displayed on the display screen viewed by a user of the system.

  • Pub Date: 2014/21/11
  • Number: 09494994
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Modifying web content at a client

Producing a modified document object model structure is disclosed. A desired webpage is requested. An alternative webpage is received in response to the request instead of an original version of the desired webpage to be rendered. The alternative webpage is processed. Program code included in the alternative webpage is utilized to request the original version of the desired webpage. The original version of the desired webpage is received. The modified document object model structure different from an original document object model structure corresponding to the received original version of the desired webpage is produced.

  • Pub Date: 2014/21/11
  • Number: 09178934
  • Owner: Instart Logic, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Microporous polyolefin-based aerogels

Microporous polyolefin and microporous polydicyclopentadiene (polyDCPD) based aerogels and methods for preparing and using the same are provided. The aerogels are produced by forming a polymer gel structure within a solvent from a olefin or dicyclopentadiene monomer via Ring Opening Metathesis Polymerization (ROMP) reactions, followed by supercritical drying to remove the solvent from the aerogel. Other aerogels are prepared by sequentially (1) mixing at least one dicyclopentadiene monomer, at least one solvent at least one catalyst and at least one inorganic and/or organic reinforcing material, (2) gelling the mixture, (3) aging, and (4) supercritical drying. Aerogels provided herein are inexpensive to prepare, possess desirable thermal, mechanical, acoustic, chemical, and physical properties and are hydrophobic. The aerogels provided herein are suitable for use in various applications, including but not limited to thermal and acoustic insulation, radiation shielding, and vibrational damping applications.

  • Pub Date: 2014/21/11
  • Number: 09469739
  • Owner: ASPEN AEROGELS, INC.
  • Location: Northborough, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to dynamically control connectivity within virtual private networks

Methods and apparatus to dynamically control connectivity within VPNs are disclosed. A disclosed example method includes broadcasting, by a route server, a border gateway protocol advertisement as received at the route server; determining a first provider edge router is to be configured for additional connectivity beyond a connectivity defined in a table associated with the first provider edge router, the additional connectivity including an identification of a second provider edge router to which the first provider edge router is to be communicatively coupled; generating a copy of the received border gateway protocol advertisement; modifying the copy of the received border gateway protocol advertisement to facilitate the additional connectivity; and broadcasting the modified copy of the received border gateway protocol advertisement.

  • Pub Date: 2014/21/11
  • Number: 09137109
  • Owner: AT&T INTELLECTUAL PROPERTY I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system to securely migrate and provision virtual machine images and content

A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.

  • Pub Date: 2014/21/11
  • Number: 09252946
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Metadata-based class loading using a content repository

An example method of loading classes from a content repository includes storing a set of files in a content repository. The set of files includes a representation of a set of classes. The method also includes extracting first metadata that describes the set of classes and storing the first metadata in a content repository. The method further includes receiving a request including second metadata corresponding to one or more classes of the set of classes. The request is from a repository-class loader executable in a node. The method also includes selecting, based on the second metadata, a class of the set of classes. The method further includes sending the selected class to the repository-class loader for loading into the node.

  • Pub Date: 2014/21/11
  • Number: 09411618
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical user interfaces including touchpad driving interfaces for telemedicine devices

The present disclosure describes various aspects of remote presence interfaces (RPIs) for use on portable electronic devices (PEDs) to interface with remote telepresence devices. An RPI may allow a user to interact with a telepresence device, view a live video feed, provide navigational instructions, and/or otherwise interact with the telepresence device. The RPI may allow a user to manually, semi-autonomously, or autonomously control the movement of the telepresence device. One or more panels associated with a video feed, patient data, calendars, date, time, telemetry data, PED data, telepresence device data, healthcare facility information, healthcare practitioner information, menu tabs, settings controls, and/or other features may be utilized via the RPI.

  • Pub Date: 2014/21/11
  • Number: 09361021
  • Owner: INTOUCH TECHNOLOGIES, INC.
  • Location: Goleta, US
  • Details: Visit USPTO

Visit USPTO Page


Fantasy sports integration with video content

Fantasy sports information may be integrated with video content of games or sporting events. An example technique includes determining one or more athletes on a roster of a fantasy sports team of a user, receiving video content of a game or sporting event, and identifying at least one athlete of interest that is on the roster of the fantasy sports team of the user depicted in the video content of the game or sporting event. The video content may then be displayed along with a visual indicator associated with the at least one athlete of interest to indicate that the athlete of interest is on the roster of the fantasy sports team of the user. The visual indicator may be selectable to control playback of the video content and/or to display a fantasy roster of the user.

  • Pub Date: 2014/21/11
  • Number: 09138652
  • Details: Visit USPTO

Visit USPTO Page


Delamination and crack prevention layer for structural sandwich panels

A method of manufacturing a delamination and crack prevention layer (DCPL) is provided for use in laminated sandwich panels. The DCPL is formed by using a continuous rolling process and by cutting finger profiles. Each finger forms a beam extending outward at a desired angle from a DCPL plane. The upper and lower DCPL planes are aligned to provide a uniform distribution of fingers along a length of the DCPL. Face sheets are bonded to the outer DCPL planes. Foam infusers add foam between the DCPL planes and among the fingers. The foam is rigidified (cured) during a continuous roll-form process. The DCPL prevents propagation of delamination between adjacent face sheets and core layers as well as arresting cracks in the core layers.

  • Pub Date: 2014/21/11
  • Number: 09517614
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling capacity in a multi-tenant platform-as-a-service environment in a cloud computing system

Implementations of the disclosure provide for controlling capacity in a multi-tenant Platform-as-a-Service (PaaS) environment in a cloud computing system. A method includes obtaining, by a resource control module executed by a processing device, an active capacity metric of each node in a multi-tenant Platform-as-a-Service (PaaS) system, the active capacity metric determined in view of a number of containers that are currently executing in the node and a maximum number of active containers allowed to execute in the node, comparing, by the resource control module, the active capacity metric of the each node to an active capacity threshold associated with the each node, and when the active capacity metric exceeds the active capacity threshold in all of the nodes in a district of the multi-tenant PaaS system and when a maximum actual capacity of containers in the district is not exceeded, adding a new node to the district.

  • Pub Date: 2014/21/11
  • Number: 09501330
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Client web content cache purge

Tracking web content updates is disclosed. An indication that a web content has been updated is received. It is tracked that the web content has been updated. An update to a client that a version of the web content stored in a web browser cache of the client is no longer valid is provided.

  • Pub Date: 2014/21/11
  • Number: 09401949
  • Owner: Instart Logic, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Stimulation of the urinary system

Apparatus and methods are provided, including a bladder stimulator that includes an elongate element adapted to pass through a urethra or adapted to pass through another opening in the bladder, an expandable body coupled to said elongate element, and an array of one or more stimulator contacts coupled to the expandable body, the array including at least one contact adapted to contact a portion of a bladder of a subject when the expandable body is inserted in the bladder and expanded. A controller stimulates the portion of the bladder by driving a pulse into the bladder via the contact, the pulse having a frequency of 5 Hz-1 kHz. Other applications are also described.

  • Pub Date: 2014/20/11
  • Number: 09498624
  • Owner: Nephera Ltd.
  • Location: Caesarea, IL
  • Details: Visit USPTO

Visit USPTO Page


Relevant file identification using automated queries to disparate data storage locations

Relevant files are determined for a user upon detecting a user action such as save, load, open, view, share, or comparable ones associated with a file. The relevancy may be determined through one or more queries based on, a number of criteria, where the queries are executed on local or remote data stores related to the user. For example, files on the local computing device of the user, files in an enterprise network associated with the user, files on a social network subscribed by the user may be evaluated for various relevancy criteria. Files determined to be relevant may be prioritized, ordered, and/or grouped for suggestion to the user and presented through a user interface of an application performing the detected action.

  • Pub Date: 2014/20/11
  • Number: 09141709
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Radio access technology handover optimization in a push-to-talk session

The disclosure relates to handover optimization in a voice communication session or other real-time multimedia session. For example, a wireless device associated with a parent user may detect a condition triggering a handover during a current voice communication session between the parent user and a target user, wherein the handover has a type associated with a switching delay. The wireless device may maintain statistics relating to an average mutual silence duration after talk spurts from the parent user and the target user based on one or more past voice communication sessions in which at least the parent user participated and trigger the handover when a next talk spurt from either the parent user or the target user ends where the average mutual silence duration exceeds the switching delay associated with the handover type.

  • Pub Date: 2014/20/11
  • Number: 09497684
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Point-of-sale customization service

Concepts and technologies are disclosed herein for point-of-sale customization service. A processor executing a point-of-sale customization service can receive a unique identifier associated with a user device detected in a proximity of a computing device. The processor can query preferences stored in a data store using the unique identifier and identify point-of-sale preferences associated with the user device based upon the querying. The processor can transmit the point-of-sale preferences to the computing device to apply to a transaction.

  • Pub Date: 2014/20/11
  • Number: 09569764
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Pluggable domain-specific typing systems and methods of use

Systems and methods for generating pluggable domain-specific data types are provided herein. According to some embodiments, methods for generating pluggable domain-specific data types may include determining a schema for the domain-specific data type, the schema including a data protocol that defines how data units are to be encoded into a domain-specific data unit, the domain-specific data unit including two or more data units received from one or more data sources, generating the domain-specific data type utilizing the determined schema, the domain-specific data type having a pluggable format such that the domain-specific data type may be utilized by a third-party application, and storing the domain-specific data type in a domain-specific data type library.

  • Pub Date: 2014/20/11
  • Number: 09607018
  • Owner: Comprehend Systems, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Peer-assisted seamless mobility for peer-to-peer data traffic

Systems and methods are disclosed for maintaining continuity of a peer-to-peer group session. The method may include exchanging a first P2P group session communication with a member of the P2P group via a direct data traffic connection, requesting session data from an application server, conveying the session data to a proxy UE, wherein the proxy UE is a member of the P2P group, and exchanging a second P2P group session communication with the application server in accordance with the session data.

  • Pub Date: 2014/20/11
  • Number: 09642041
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Identify experts and influencers in a social network

On embodiment accesses a set of information comprising one or more elements of information relating to a subject matter, wherein the one or more elements of information have been shared among one or more users of a social-networking system; for each element of information, determines a rate of sharing of the element of information among the one or more users and identifies one or more first users who cause the rate of sharing of the element of information to increase; and identifies one or more influencers associated with the subject matter from the one or more first users identified for each element of information.

  • Pub Date: 2014/20/11
  • Number: 09252961
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Connection identifier assignment and source network address translation

A controller of a network control system for configuring several middlebox instances is described. The middlebox instances implement a middlebox in a distributed manner in several hosts. The controller assigns a first set of identifiers to a first middlebox instance that associates an identifier in the first set with a first packet. The controller assigns a second set of identifiers to a second middlebox instance that associates an identifier in the second set with a second packet.

  • Pub Date: 2014/20/11
  • Number: 09306909
  • Owner: NICIRA, INC.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Communication between authentication plug-ins of a single-point authentication manager and client systems

Various arrangements for providing authentication information to a user are presented. A single-point authentication manager executed by a computer system may receive a request to access a resource from a remote client computer system. The single-point authentication manager may manage access to a plurality of resources including the resource. The single-point authentication manager may perform authentication using an authentication plug-in. In response to performing authentication of the user, the authentication plug-in may generate a parameter having a value that is a message to be transmitted to the remote client computer system. In response to receiving the parameter and the value from the authentication plug-in, the single-point authentication manager may transmit the value of the parameter to the application if the authentication is successful and to a credential collector if the authentication of the user failed.

  • Pub Date: 2014/20/11
  • Number: 09525682
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Aggregation of network traffic source behavior data across network-based endpoints

Aggregation of network traffic source behavior data across network endpoints may be implemented. Indications of endpoint-specific network traffic directed to different network endpoints may be received. Aggregate traffic source behavior data may be generated across multiple aggregation levels. One or more traffic aggregation nodes may be implemented for each aggregation level to maintain different respective portions of the aggregate traffic source behavior data. Different granularity of the aggregate traffic source behavior data may be maintained at each of the aggregation levels. An indication of traffic source behavior for traffic sources may be provided such that responsive actions, such as traffic control actions, may be performed with regard to the traffic sources.

  • Pub Date: 2014/20/11
  • Number: 09591018
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive torque control circuit and method of operation

A circuit controls a polyphase alternating current electric motor with adaptive adjustments to voltage magnitude and voltage frequency when it receives measurements of wheel slip and wheel skid. The apparatus receives target torque requests as well as sensor data from a wheel and local motion and acceleration detectors. When the target torque is not attainable because of loading or loss of traction, the circuit adaptively determines and provides an attainable torque and transmits the attainable torque value which enables other target torque requests to be amended.

  • Pub Date: 2014/20/11
  • Number: 09421883
  • Owner: Drake Motors, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques to transform network resource requests to zero rated network requests

Techniques to transform network resource requests to zero rated network requests are described. Some embodiments are particularly directed to techniques transform network resource requests on a cellular network to zero rating by replacing the destination of the request with a zero-rated source for the network resource. In one embodiment, for example, an apparatus may comprise a data store and a network access component. The data store may be operative to store a plurality of zero-rating rewrite rules. The network access component may be operative to receive a network request from an application component on the mobile device, the network request for access to a network resource; compare the network resource to the plurality of zero-rating rewrite rules to identify a zero-rating rewrite rule matching the network resource; transform the network request to a zero-rated network request for the network resource using the identified zero-rating rewrite rule; and perform the zero-rated network request. Other embodiments are described and claimed.

  • Pub Date: 2014/19/11
  • Number: 09584671
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules

A computing system is configured to access a plurality of remote databases in order to identify data inconsistencies between the remote databases and provide user interfaces to a user in order to initiate communication via one or more APIs to certain remote databases indicating updates that reconcile said data inconsistencies.

  • Pub Date: 2014/19/11
  • Number: 09477737
  • Owner: CONSUMERINFO.COM, INC.
  • Location: Costa Mesa, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating visual identifiers from user input associated with perceived stimuli

The present invention generally relates to systems for generating visual identifiers. In particular, the systems and methods herein are configured to generate visual identifiers for representing user response to stimuli. In a preferred embodiment, visual identifiers are generated from primary colors or shapes, wherein the primary colors and/or shapes can be blended or modified based on strength/weakness of the stimuli experienced by a user or across a plurality of users. Preferred embodiments of the invention are further configured to receive text or other non-visual identifier from a user in order to describe the response the user has to a stimuli; wherein the associated system is configured to convert the described response into an appropriate visual identifier.

  • Pub Date: 2014/19/11
  • Number: 09503504
  • Details: Visit USPTO

Visit USPTO Page


Stateless fibre channel sequence acceleration for fibre channel traffic over Ethernet

A method for offloading Fiber Channel transmit data in an I/O operation. The transmit data includes Fiber Channel sequences, each Fiber Channel sequence includes multiple frames. The method includes generating a single transmit sequence request descriptor for transmitting all of the plurality of frames; creating an Ethernet header, a FCoE encapsulation header, and a Fiber Channel header for each frame in response to information in the transmit sequence request descriptor; creating start of frame and end of frame delimiters; inserting data into each frame; computing Fiber Channel CRC and Ethernet FCS for each frame; and transmitting the plurality of frames over a network. In each of the plurality of frames, the Ethernet header precedes the FCoE encapsulation header, which precedes the Fiber Channel header, which precedes the data. The data is followed by the Fiber Channel CRC, which is followed by the Ethernet FCS.

  • Pub Date: 2014/19/11
  • Number: 09049218
  • Owner: EMULEX CORPORATION
  • Location: Costa, Mesa, US
  • Details: Visit USPTO

Visit USPTO Page


Printer and printing system

Control of a printer involves reading a cartridge identification number from a memory in a cartridge and storing such number, generating status information including such number and may further include a calculated ink usage amount, and sending the status information to a data processing apparatus, which may be a server. In some embodiments, the ink usage amount is calculated as a number of discharged ink shots. The server saves the status information. This or another upstream server can reliably determine the number of ink shots used by the printer only for printing from this status information. Such control is embodied in a program stored on a non-transitory controller-readable medium, which program is executed by a controller in the printer.

  • Pub Date: 2014/19/11
  • Number: 09156273
  • Owner: Seiko Epson Corporaton
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Mobile-device-based trust computing

In one embodiment, a method includes receiving a request to access a shared device. The request may include data uniquely identifying a first user of the social-networking system. The first user may be represented by a first user node in a social graph associated with the social-networking system, and wherein the social graph comprises a plurality of user nodes and a plurality of edges connecting the user nodes. The method may further include determining that a social-networking account for each of one or more second users of the social-networking system was compromised, wherein each of the second users previously accessed the shared device. Each of the second users may be respectively associated with second user nodes in the social graph. The method may further include sending, to the shared device, a message indicating that the social-networking accounts for the second users were compromised.

  • Pub Date: 2014/19/11
  • Number: 09179313
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for creating a time-sensitive grammar

The disclosure relates to creating a time-sensitive grammar. A device receives a plurality of data points, identifies a plurality of time gaps associated with the plurality of data points, each of the plurality of time gaps representing a dwell time or a frequency of occurrence of a data point of the plurality of data points, generates a generic time factor representing a multiple of the plurality of time gaps, and combines the generic time factor with the plurality of data points to create a time-sensitive sequence of data points. The generic time factor may be inserted into the time-sensitive sequence a number of times representing the dwell time or the frequency of occurrence of a corresponding data point of the plurality of data points.

  • Pub Date: 2014/19/11
  • Number: 09462456
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Voltage tunability of thermal conductivity in ferroelectric materials

A method to control thermal energy transport uses mobile coherent interfaces in nanoscale ferroelectric films to scatter phonons. The thermal conductivity can be actively tuned, simply by applying an electrical potential across the ferroelectric material and thereby altering the density of these coherent boundaries to directly impact thermal transport at room temperature and above. The invention eliminates the necessity of using moving components or poor efficiency methods to control heat transfer, enabling a means of thermal energy control at the micro- and nano-scales.

  • Pub Date: 2014/18/11
  • Number: 09255347
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for initialization and link management of NICS in a multi-core environment

The present application is directed towards systems and methods for coordination and management of a shared resource in a multi-core system. In a multi-core system, multiple cores may be utilizing a shared resource. However, internal resources common to the shared resource may need to be initialized by only one core, and independent and uncoordinated initialization by multiple cores may cause errors. The present invention provides systems and methods for coordinating such initialization and use through a handshaking protocol.

  • Pub Date: 2014/18/11
  • Number: 09037754
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Secure system for allowing the execution of authorized computer program code

Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel mode driver monitors events occurring within a file system or an operating system. Responsive to observation of a trigger event performed by or initiated by an active process, in which the active process corresponds to a first code module within the file system and the event relates to a second code module within the file system, performing or bypassing a real-time authentication process on the second code module with reference to a whitelist containing content authenticators of approved code modules, which are known not to contain viruses or malicious code. The active process is allowed to load the second code module into memory when the real-time authentication process is bypassed or when it is performed and determines a content authenticator of the code module matches one of the content authenticators.

  • Pub Date: 2014/18/11
  • Number: 09305159
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Projection of interactive map data

Methods and systems for robot cloud computing are described. Within examples, cloud-based computing generally refers to networked computer architectures in which application execution and storage may be divided, to some extent, between client and server devices. A robot may be any device that has a computing ability and interacts with its surroundings with an actuation capability (e.g., electromechanical capabilities). A client device may be configured as a robot including various sensors and devices in the forms of modules, and different modules may be added or removed from robot depending on requirements. In some example, a robot may be configured to receive a second device, such as mobile phone, that may be configured to function as an accessory or a “brain” of the robot. A robot may interact with the cloud to perform any number of actions, such as to share information with other cloud computing devices.

  • Pub Date: 2014/18/11
  • Number: 09473594
  • Owner: X Development LLC
  • Location: Mountian View, US
  • Details: Visit USPTO

Visit USPTO Page


Physical device emulation synchronization

In one or more embodiments, a system can configure a physical mobile device via configuring a configuration for an emulator of the physical mobile device. For example, a user (e.g., a customer) can request a physical mobile device, and a system can provide the user with an emulation of the physical mobile device, where the user can configure the emulation of the physical mobile device. In one or more embodiments, the user can be provided with the configuration via at least one of a network and a physical delivery of the physical mobile device, configured with the configuration. In one example, the user can execute an emulation of the physical mobile device configured with the configuration, received via the network. In another example, the physical mobile device can be configured with the configuration, and subsequently, the physical mobile device can be physically delivered to the user.

  • Pub Date: 2014/18/11
  • Number: 09639380
  • Owner: WEBAD CAMPAIGN ANALYTICS, LP
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing messages to users of a social network using a message that includes a user's performance of a desired activity associated with a link included in the message

Techniques to optimize messages sent to a user of a social networking system. In one embodiment, information about the user may be collected by the social networking system. The information may be applied to train a model for determining likelihood of a desired action by the user in response to candidate messages that may be provided for the user. The social networking system may provide to the user a message from the candidate messages with a selected likelihood of causing the desired action.

  • Pub Date: 2014/18/11
  • Number: 09363223
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Network resource deployment for cloud-based services

Techniques are described which simplify and/or automate many of the tasks associated with the configuration, deployment, and management of network resources to support cloud-based services.

  • Pub Date: 2014/18/11
  • Number: 09338067
  • Owner: RingCentral, Inc.
  • Location: Belmont, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-directional and variable speed navigation of collage multi-media

In accordance with one or more embodiments of the present disclosure, methods and apparatus are provided for flexible and user-friendly navigation of loaded media in a multi-media presentation, such that a user may be able to view and/or edit the presentation. In one embodiment, a method for navigating loaded media comprises loading a page of a collage document to a client device, the page having a plurality of layers with each layer being associated with a media object. The method further includes creating a list of layers of the loaded page, each layer indexed by at least a position in the collage document; navigating the collage document in at least one direction and at at least one speed based on user input; and filtering the list of layers based on at least the position in the collage document and a visual window of a user interface to display visible layers of the page within the visual window. A client device for navigating loaded media is also disclosed.

  • Pub Date: 2014/18/11
  • Number: 09658754
  • Owner: EBAY INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for data transfer and campaign management

An online and offline communication processing and tracking using data processing and data/voice networks is described. A phone address from a phone address number pool is automatically assigned to a first entity. A call quality rating is determined and recorded. A call from a caller directed to the phone address is received at a call bridging system coupled to at least one network, wherein the call is associated with call signaling information. Based at least in part on the call quality associated with the caller call, the caller call is assigned to a first location in a call queue. An outbound call is generated from the call bridging system and the inbound and the outbound calls are bridged. One or more parameters of the bridged call are compared to the call quality rating. An indication is recorded regarding the successful bridging of the calls in association with an entity identifier.

  • Pub Date: 2014/18/11
  • Number: 09036808
  • Owner: INVOCA, INC.
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


Method for reducing power consumption and electronic device thereof

A method in an electronic device, includes receiving an instruction to enter a power saving mode, switching a first sensing area of the electronic device into an idle mode and a second sensing area of the electronic into a lock mode, detecting an input on the first sensing area in the idle mode, and unlocking the second sensing area. An electronic device includes a processor configured to determine whether to receive an instruction to enter a power saving mode, switch a first sensing area of the electronic device into an idle mode and a second sensing area of the electronic device into a lock mode, detect an input on the first sensing area in the idle mode, and unlock the second sensing area.

  • Pub Date: 2014/18/11
  • Number: 09625979
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for launching an application

A mobile device comprising at least one controller in communication with one or more transceivers. The one or more transceivers are capable of communication with a vehicle computing system. The at least one controller configured to establish a communication link with the vehicle computing system. The controller further configured to receive a signal having an unique user identification from the vehicle computing system. The controller further configured to search for a mobile application based on the signal and enable the mobile application that matches the unique user identifier. The controller further configured to launch the mobile application.

  • Pub Date: 2014/18/11
  • Number: 09369830
  • Owner: Ford Global Technologies, LLC
  • Location: Dearborn, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for filling images captured by array cameras

Image filling utilizing image data captured by an array of cameras having different camera viewpoints. Image data, such as a pixel value or gradient value associated with a spatial point in a source region of an image is transferred to the same or another image to fill a target region. Visual artifacts may be reduced by filling portions of the target region visible from other viewpoints with expanded source patches to reduce the size of the target region to be inpainted. In embodiments, a shifted mask corresponding to the target region is determined for each supplementary image based on an estimate of foreground disparity. In further embodiments, partially occluded regions are detected based on an estimate of background disparity. Source patches may be expanded based on a baseline between camera viewpoints into large coherent regions that agree well with the target region boundary may be filled without hallucinating image data from similar patches.

  • Pub Date: 2014/18/11
  • Number: 09514523
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Landing hazard avoidance display

Landing hazard avoidance displays can provide rapidly understood visual indications of where it is safe to land a vehicle and where it is unsafe to land a vehicle. Color coded maps can indicate zones in two dimensions relative to the vehicles position where it is safe to land. The map can be simply green (safe) and red (unsafe) areas with an indication of scale or can be a color coding of another map such as a surface map. The color coding can be determined in real time based on topological measurements and safety criteria to thereby adapt to dynamic, unknown, or partially known environments.

  • Pub Date: 2014/18/11
  • Number: 09446851
  • Owner: National Aeronautics and Space Administration
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical user interface for map search

Particular embodiments include a method comprising accessing location data representing a first location of a first user wherein the first location corresponds to geographic coordinates, retrieving image data defining a graphical map from a remote server based on the first location accessing a search query inputted by the first user, retrieving one or more second locations in response to the search query, where the one or more second locations correspond to geographic coordinates, and displaying a first view comprising a list of the one or more second locations overlaying at least a portion of the graphical map, wherein the graphical map includes indicators for the first location and at least one of the one or more second locations in accordance with their respective geographic coordinates.

  • Pub Date: 2014/18/11
  • Number: 09342552
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


External processing accessory for mobile device

Accessories for mobile devices. Embodiments include an external protective case and/or holster for mobile electronic devices, wherein the external protective case/holster incorporates a battery pack, a payment processing device, television signal receiver, and/or a modular multi-input/output device.

  • Pub Date: 2014/18/11
  • Number: 09319501
  • Owner: mophie, inc.
  • Location: Tustin, US
  • Details: Visit USPTO

Visit USPTO Page


Advanced fire-resistant forms of activated carbon and methods of adsorbing and separating gases using same

A method of removing a target gas from a gas stream is disclosed. The method uses advanced, fire-resistant activated carbon compositions having vastly improved fire resistance. Methods for synthesizing the compositions are also provided. The advanced compositions have high gas adsorption capacities and rapid adsorption kinetics (comparable to commercially-available activated carbon), without having any intrinsic fire hazard.

  • Pub Date: 2014/18/11
  • Number: 09315730
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive virtual intelligent agent

Embodiments of an adaptive virtual intelligent agent (“AVIA”) service are disclosed. It may include the functions of a human administrative assistant for an enterprise including customer support, customer relationship management, and fielding incoming caller inquiries. It also has multi-modal applications for the home through interaction with AVIA implemented in the home. It may engage in free-form natural language dialogs. During a dialog, embodiments maintain the context and meaning of the ongoing dialog and provides information and services as needed by the domain of the application. Over time, the service automatically extends its knowledge of the domain (as represented in the Knowledge Tree Graphs) through interaction with external resources. Embodiments can intelligently understand and converse with users using free-form speech without pre-programmed deterministic sequences of questions and answers, can dynamically determine what it needs to know to converse meaningfully with users, and knows how to obtain information it needs.

  • Pub Date: 2014/18/11
  • Number: 09189742
  • Details: Visit USPTO

Visit USPTO Page


Wireless beacon devices for use in managing transportation service terminals

There are provided systems and methods for wireless beacon devices for use in managing transportation service terminals. A user may travel with a device, such as a communication device, that includes a communication module that may utilize specialized hardware features to establish short range wireless communications with nearby wireless beacons. The wireless beacons may be established at or nearby transportation service terminals, such as bus/train stops. The beacon may provide the aforementioned communication services with the communication device and be utilized to determine whether the user will utilize a transportation service for the terminal. If the user wishes to utilize the transportation service, a transportation service may be alerted. The user may also be alerted of an expected time of arrival for the transportation service, other transportation services available at the transportation terminal, and/or of nearby transportation terminals.

  • Pub Date: 2014/17/11
  • Number: 09585079
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


User interface widget unit sharing for application user interface distribution

Embodiments of the invention address deficiencies of the art in respect to application sharing and provide a method, system and computer program product for user interface widget unit based application sharing. In a first embodiment, a data processing system for user interface widget unit based application sharing, can include a dynamic widget server communicatively linked to a dynamic widget browser. The dynamic widget browser can include program code enabled to render a user interface including one or more remote dynamic widgets peered to corresponding dynamic widgets for a dynamic view for an application launched by the dynamic widget server.

  • Pub Date: 2014/17/11
  • Number: 09549007
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Use of dihydroimidazolones for the treatment of dogs

The present invention relates to the use of substituted dihydroimidazolones, particularly [1-(4-Chlorophenyl)-4-(4-morpholinyl)-2,5-dihydro-1H-imidazol-2-one] (AWD 131-138) or a physiologically acceptable salt thereof for the treatment of epilepsy in dogs.

  • Pub Date: 2014/17/11
  • Number: 09469611
  • Owner: Boehringer Ingelheim Vetmedica GmbH
  • Location: Ingelheim, DE
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for recommending actions based upon stored objectives using sored relationship graphs

Relationship management systems in accordance with embodiments of the invention are configured to provide systematic ways for a user to measure, and manage relationships in the user's social network. One embodiment of the invention includes a relationship management server system, and a database. In addition, the relationship management server system is configured to store a user account associated with a user in the database, store information concerning contacts associated with the user in the database, store event information associated with the user and at least one of the stored contacts in the database, store at least one objective in the database, score at least one relationship between the user and a contact based upon stored event information associated with the user and the contact to create a scored relationship graph, and generate a recommendation concerning an action based upon the stored objective and the scored relationship graph.

  • Pub Date: 2014/17/11
  • Number: 09262551
  • Owner: RELATIONSHIP CAPITOL TECHNOLOGIES, INC.
  • Location: Altadena, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for authenticating an avatar

Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who uses the avatar in the virtual environments. Transoms are generated, each with a unique identifier configured to exist in a specific location, and registered with an identity provider. The transom initiates a request. An offer is conveyed that includes the transom identifier, the location and the avatar identifier. The avatar is then authenticated by a shared secret. The identity provider then responds to the offer with avatar identification information, including reputation information. Reputation information is for the avatar and the user, and is compiled from external avatar data sources by using a trust matrix. An avatar gallery is generated by linking each avatar owned by each user to the account and compiling avatar profiles from the account, and the reputation information. The avatar profiles are searchable, and include micro formats.

  • Pub Date: 2014/17/11
  • Number: 09253183
  • Details: Visit USPTO

Visit USPTO Page


System and method for secure control of resources of wireless mobile communication devices

Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.

  • Pub Date: 2014/17/11
  • Number: 09391992
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Relevant communication mode selection

When initiating a communication session, a user may be faced with the challenge of deciding which communication mode to use to contact and/or share content with one or more other users intended for participation in the communication session. A communication application may be configured to provide a relevant communication mode selection, the communication application including selection and communication modules. For example, the selection module of the communication application may determine available communication modes in response to detection of a request to initiate a communication session from within an application or from a user experience provided by the communication application. The selection module may remove one or more unused communication modes, and prioritize the remaining available communication modes to select a communication mode. A communication module of the communication application may then automatically initiate the communication session through the selected communication mode.

  • Pub Date: 2014/17/11
  • Number: 09094363
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method to fabricate functionalized conical nanopores

A pressure-based chemical etch method is used to shape polymer nanopores into cones. By varying the pressure, the pore tip diameter can be controlled, while the pore base diameter is largely unaffected. The method provides an easy, low-cost approach for conically etching high density nanopores.

  • Pub Date: 2014/17/11
  • Number: 09387444
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying recycled telephone numbers

An automated method begins by receiving a list of numbers that have been de-activated by a carrier. Periodically, and for each number, a request is made to identify a current carrier for the number. If the current carrier matches the carrier that provided the de-activation information, the mobile number is considered to be in a first state, i.e., shut off and returned to a pool of numbers that are available to this same carrier. Upon a determination that the number is in the first state, the provider issues a request to any opt-in database to delete any express consent or other similar data associated with the number. If, however, the number does not match the carrier of deactivation, the number is considered to be in a second state, i.e., likely to have been ported by the same user to a new carrier. This state is logged in an audit trail.

  • Pub Date: 2014/17/11
  • Number: 09167083
  • Owner: SOUNDBITE COMMUNICATIONS, INC.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


High performance data streaming

Methods, systems and computer program products for high performance data streaming are provided. A computer-implemented method may include receiving a data mapping describing an association between one or more fields of a data storage location of a data source and one or more fields of a data storage location of a target destination, generating a data transfer execution plan from the data mapping to transfer data from the data source to the target destination where the data transfer execution plan comprises a determined degree of parallelism to use when transferring the data, and transferring the data from the storage location of the data source to the data storage location of the target destination using the generated data transfer execution plan.

  • Pub Date: 2014/17/11
  • Number: 09148461
  • Owner: NYSE Group, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Countermeasures for threats to an uncrewed autonomous vehicle

Uncrewed autonomous vehicles (“UAVs”) may navigate from one location to another location. Described herein are systems, devices, and methods providing countermeasures for threats that may compromise the UAVs. A plurality of UAVs may establish a mesh network to distribute information to one another. A first UAV may receive external data from a second UAV using the mesh network. The external data may be used to confirm or cross-check data such as location, heading, altitude, and so forth. Disagreement between data generated by the first UAV with external data from the second UAV may result in the determination that the first UAV is compromised. Remedial actions may be taken, such as the first UAV may be directed to a safe location to land or park, may receive commands from another UAV, and so forth.

  • Pub Date: 2014/17/11
  • Number: 09524648
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Apoptosis-inducing agents for the treatment of cancer and immune and autoimmune diseases

Disclosed are compounds which inhibit the activity of anti-apoptotic Bcl-xL proteins, compositions containing the compounds and methods of treating diseases during which is expressed anti-apoptotic Bcl-xL protein.

  • Pub Date: 2014/17/11
  • Number: 09227963
  • Owner: ABBVIE INC.
  • Location: North Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for using persistent identifiers in passive optical networking

A method of configuring an optical network terminal (ONT) at a computer terminal is described. The method may include reading in an instruction including a persistent identifier and an ONT command, identifying the ONT within a database using the persistent identifier, packaging an optical communication command to be sent through an optical line terminal (OLT) using the ONT identified by the persistent identifier through the database, and sending the optical communication command to the ONT through the OLT. The instruction may be operable to configure the ONT. Identifying the ONT may include referencing the persistent identifier against a table including standard transient ONT identifiers stored within the database. The OLT may be optically coupled to the ONT using a passive optical networking.

  • Pub Date: 2014/16/11
  • Number: 09503193
  • Details: Visit USPTO

Visit USPTO Page


Unified snapshot storage management

An illustrative approach to managing snapshots streamlines how and when snapshots are generated in a storage management system, such that fewer snapshots may be generated without diminishing the scope of data protection. A novel unified-snapshot storage policy may govern snapshots for any number of subclients. A unified-snapshot job based on the unified-snapshot storage policy enables the illustrative storage management system to automatically discover relevant components and generate at most one snapshot per target logical unit number (“LUN”) in a storage array. Each snapshot may comprise the data of any number of subclients and/or clients in the storage management system. Accordingly, one unified-snapshot job may yield a minimum but sufficient number of snapshots comprising data of all subclients associated with the governing unified-snapshot storage policy. An enhanced storage manager may manage the unified-snapshot jobs. One or more enhanced media agents and/or data agents may participate in the unified-snapshot jobs and in subsequent cataloguing of the snapshots.

  • Pub Date: 2014/14/11
  • Number: 09448731
  • Owner: COMMVAULT SYSTEMS, INC.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Unified snapshot storage management, using an enhanced storage manager and enhanced media agents

An illustrative approach to managing snapshots streamlines how and when snapshots are generated in a storage management system, such that fewer snapshots may be generated without diminishing the scope of data protection. A novel unified-snapshot storage policy may govern snapshots for any number of subclients. A unified-snapshot job based on the unified-snapshot storage policy enables the illustrative storage management system to automatically discover relevant components and generate at most one snapshot per target logical unit number (“LUN”) in a storage array. Each snapshot may comprise the data of any number of subclients and/or clients in the storage management system. Accordingly, one unified-snapshot job may yield a minimum but sufficient number of snapshots comprising data of all subclients associated with the governing unified-snapshot storage policy. An enhanced storage manager may manage the unified-snapshot jobs. One or more enhanced media agents and/or data agents may participate in the unified-snapshot jobs and in subsequent cataloguing of the snapshots.

  • Pub Date: 2014/14/11
  • Number: 09648105
  • Owner: COMMVAULT SYSTEMS, INC.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking and analyzing service outages

Methods, systems, and apparatus, including computer-readable storage devices, for tracking and analyzing service outages. Weather data and outage data are accessed. Based on the weather data and the outage data, weather conditions corresponding to service outages are identified. A machine learning system is trained to estimate training a machine learning system to estimate effects of weather conditions on utility systems. Data for a particular utility system is provided to the trained machine learning system, and in response, output indicating estimated effects of future weather conditions on the particular utility system is received. The information that indicates the estimated effects of future weather conditions on the particular utility system is provided for display.

  • Pub Date: 2014/14/11
  • Number: 09297723
  • Owner: American Public Power Association Inc.
  • Location: Arlington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for secure real-time cloud services

A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a communication framework between sensors, devices, and machinery and the users of that data from any remote location that is connected to the Internet without requiring open inbound firewall ports, while at the same time enabling high data rates, low latency and full bi-directionality. The graphical and networking features of RIA frameworks in combination with the disclosed system and method provide low-latency, real-time data applications in a web browser securely over the Internet.

  • Pub Date: 2014/14/11
  • Number: 09100424
  • Owner: REAL INNOVATIONS INTERNATIONAL LLC
  • Location: Georgetown, CA
  • Details: Visit USPTO

Visit USPTO Page


Secure identity propagation in a cloud-based computing environment

The present disclosure describes methods, systems, and computer program products for providing secure identity propagation in a cloud-based computing environment. One computer-implemented method includes receiving, from a user, a first security response message, transmitting, to the user in response to receiving the first security response message, a second security response message, wherein the second security response message comprises a Token Granting Token (TGT), receiving, from a cloud application, a Service Token (ST) request, wherein the ST request comprises the TGT, verifying the ST request based on the TGT, generating, in response to the verifying, a ST, wherein the ST is used to validate an access request to access a backend system, and transmitting the ST to the cloud application.

  • Pub Date: 2014/14/11
  • Number: 09544311
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Secure communication architecture including video sniffer

Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.

  • Pub Date: 2014/14/11
  • Number: 09454677
  • Owner: Truedata Systems, Inc.
  • Location: Atherton, US
  • Details: Visit USPTO

Visit USPTO Page


Messaging gateway

A notification message gateway is disclosed. Notification data and application identification data is received. The application identification data is used to select an application credential associated with at least one application instance. The notification data and application credential are provided to a distribution node such that the notification data is provided to the application instance.

  • Pub Date: 2014/14/11
  • Number: 09544288
  • Owner: MOBILE IRON, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Instruction set architecture-based inter-sequencer communications with a heterogeneous resource

In one embodiment, the present invention includes a method for directly communicating between an accelerator and an instruction sequencer coupled thereto, where the accelerator is a heterogeneous resource with respect to the instruction sequencer. An interface may be used to provide the communication between these resources. Via such a communication mechanism a user-level application may directly communicate with the accelerator without operating system support. Further, the instruction sequencer and the accelerator may perform operations in parallel. Other embodiments are described and claimed.

  • Pub Date: 2014/14/11
  • Number: 09459874
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Hardening tokenization security and key rotation

A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is disclosed. In various embodiments, the method comprises receiving encrypted data at a processor of a computer system, decrypting the encrypted data to cleartext in the processor, and issuing a unique token associated with the data.

  • Pub Date: 2014/14/11
  • Number: 09628274
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Computer-assisted collaborative tagging of video content for indexing and table of contents generation

Methods and systems for generation of an index and Table-of-Contents (ToC) for videos based on user given labels or a combination of user input and automated indexing techniques are provided. According to one embodiment, an annotation tool and a video player are presented to individual subscribers/users of a video discovery and consumption service. Tags proposed by the subscribers to be associated with various portions of the video content are received, processed and integrated within a global ToC for the video. The service can assist subscribers that intend to tag a certain portion of video by automatically proposing suitable tags and portion boundaries. Subscribers can vote on the suitability of tags constituting the ToC. Responsive to a request to view video content, a customized ToC is presented to a subscriber which include labels selected from the global ToC in accordance with default tag selection/filtering criteria or filtering criteria specified by subscriber.

  • Pub Date: 2014/14/11
  • Number: 09396763
  • Owner: ClipMine, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Selective layer disordering in III-nitrides with a capping layer

Selective layer disordering in a doped III-nitride superlattice can be achieved by depositing a dielectric capping layer on a portion of the surface of the superlattice and annealing the superlattice to induce disorder of the layer interfaces under the uncapped portion and suppress disorder of the interfaces under the capped portion. The method can be used to create devices, such as optical waveguides, light-emitting diodes, photodetectors, solar cells, modulators, laser, and amplifiers.

  • Pub Date: 2014/13/11
  • Number: 09368677
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Quantifying the risks of applications for mobile devices

Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.

  • Pub Date: 2014/13/11
  • Number: 09268946
  • Owner: Appthority, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Processing extensible markup language security messages using delta parsing technology

Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security message is parsed for variable values using the template. A transition sequence is generated that represents the entire markup language security message. Each transition in the transition sequence is associated with a portion of the markup language security message. A lightweight data model of the markup language security message is populated using the transition sequence. The lightweight data model includes nodes for the variable values and a set of selected constant values.

  • Pub Date: 2014/13/11
  • Number: 09530012
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Off-device anti-malware protection for mobile devices

Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices includes receiving a software inventory for a mobile device, in which the software inventory identifies a plurality of applications installed on the mobile device; and determining whether one or more of the plurality of applications identified in the software inventory are associated with malware based on a policy. In some embodiments, the off-device anti-malware protection for mobile devices further includes enforcing the policy on the mobile device. In some embodiments, the off-device anti-malware protection for mobile devices is provided as a cloud service.

  • Pub Date: 2014/13/11
  • Number: 09438631
  • Owner: Appthority, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Network based video analytics through an application program interface (API) with metric triggered notifications

A video surveillance system ingests a video stream from a remotely located video capture device. An application programming interface (API) provides an interface for functions to interface between the video surveillance system and the remotely located video capture device. An analytics engine of the video surveillance system receives video sent through the API. The analytics engine compares an extracted metric from the video stream against at least one previously established value as part of assessing a previously established condition to generate either a TRUE or a FALSE result. When and only when a TRUE result is generated, is a notification action performed that conveys a notification over a network using internet protocol communications to a previously designated user.

  • Pub Date: 2014/13/11
  • Number: 09277250
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Multimedia presentation through an extended connectivity apparatus configured via near-field communication (NFC)

Device-descriptive data of a multimedia device are obtained by a remote control through a near-field communication (NFC) data exchange. The device-descriptive data of the multimedia device are received by an extended connectivity device through its wireless communication interface. A wireless link is established between the extended connectivity device and the multimedia device using connection parameters in the device-descriptive data. Multimedia data are transmitted to or received from the multimedia device over the wireless link established in accordance with the connection parameters received in the device-descriptive data.

  • Pub Date: 2014/13/11
  • Number: 09288527
  • Details: Visit USPTO

Visit USPTO Page


Method and system for building text-to-speech voice from diverse recordings

A method and system is disclosed for building a speech database for a text-to-speech (TTS) synthesis system from multiple speakers recorded under diverse conditions. For a plurality of utterances of a reference speaker, a set of reference-speaker vectors may be extracted, and for each of a plurality of utterances of a colloquial speaker, a respective set of colloquial-speaker vectors may be extracted. A matching procedure, carried out under a transform that compensates for speaker differences, may be used to match each colloquial-speaker vector to a reference-speaker vector. The colloquial-speaker vector may be replaced with the matched reference-speaker vector. The matching-and-replacing can be carried out separately for each set of colloquial-speaker vectors. A conditioned set of speaker vectors can then be constructed by aggregating all the replaced speaker vectors. The condition set of speaker vectors can be used to train the TTS system.

  • Pub Date: 2014/13/11
  • Number: 09542927
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Liquid composition, and resistor film, resistor element and circuit board

There is provided a liquid composition that can form a resistor exhibiting a stable resistance value. One mode of the liquid composition of the invention is a liquid composition comprising (a) an epoxy resin, (b) carbon black particles, (c) carbon nanotubes and (d) a solvent with a vapor pressure of less than 1.34×10Pa at 25° C.

  • Pub Date: 2014/13/11
  • Number: 09650528
  • Owner: HITACHI CHEMICAL COMPANY, LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Extended connectivity multimedia apparatus, multimedia presentation system, and method of transporting credentials obtained via near-field communication (NFC)

Credential data are obtained by a remote control from a credential-bearing device through a near-field communication (NFC) data exchange. The credential data are transmitted by the remote control and are received by an extended connectivity device through its wireless communication interface. A transaction is conducted with a network-connected service through the wireless communication interface of the extended connectivity device using the received credential data.

  • Pub Date: 2014/13/11
  • Number: 09232260
  • Details: Visit USPTO

Visit USPTO Page


Telecommunications addressing system and method

A telecommunications addressing system/method allowing selection of a telephone instrument device (TID) using arbitrary identifiers is disclosed. The system/method allows a source TID (STD) to select a target TID (TTD) by the use of a Target Telephone Identifier (TTI) data string rather than a traditional numeric telephone identification (NTI). This TTI is then indexed within a TTI/NTI mapping server (TMS) that functions as a hierarchical repository of TTI/NTI mappings. STD/TTD communication is established by first performing a lookup of the STD-selected TTI within the TMS to identify the NTI of the TTD. Once the NTI of the STD has been identified by the TMS, communication between the STD and TTD is established using the NTI via the normal public switched telephone network (PSTN). TMS TTI lookup may be performed via STD TID web application and/or via PSTN infrastructure interface.

  • Pub Date: 2014/12/11
  • Number: 09197748
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for fine grain policy driven clientless SSL VPN access

The present disclosure provides solutions that may enable an enterprise providing services to a number of clients to determine whether to establish a client based SSL VPN session or a clientless SSL VPN session with a client based on an information associated with the client. An intermediary establishing SSL VPN sessions between clients and servers may receive a request from a client to access a server. The intermediary may identify a session policy based on the request. The session policy may indicate whether to establish a client based SSL VPN session or clientless SSL VPN session with the server. The intermediary may determine, responsive to the policy, to establish a clientless or client based SSL VPN session between the client and the server.

  • Pub Date: 2014/12/11
  • Number: 09571456
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for client communication in a distributed telephony network

A system and method for regional routing of internet protocol based real-time communication that includes registering a set of client application endpoint routes, comprising registering at least a first client gateway route of a first endpoint in a first region; receiving a communication invitation of the first endpoint; processing a set of communication instructions associated with the communication invitation and identifying a set of communication resources and at least a second endpoint; querying the client application endpoint routes and identifying a client gateway route of the second endpoint; and dynamically directing signaling path and media path of the communication according to the regional availability of the communication resources, the client gateway route of the first endpoint, and client gateway instance route of the second endpoint.

  • Pub Date: 2014/12/11
  • Number: 09553799
  • Owner: Twilio, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Surface acoustic wave device having selectable electrode elements

Described embodiments include a surface acoustic wave device, method, and apparatus. The device includes a piezoelectric substrate and a configurable electrode assembly. The configurable electrode assembly includes a plurality of spaced-apart elongated electrode elements electromechanically coupled with the piezoelectric substrate. The assembly includes a first signal bus crossing each of the plurality of electrode elements and electrically isolated therefrom. The assembly includes a first matrix of addressable switches. Each addressable switch of the first matrix configured to electrically couple a respective electrode element of the plurality of electrode elements with the first signal bus. The assembly includes a second signal bus crossing each of the plurality of electrode elements and electrically isolated therefrom. The assembly includes a second matrix of addressable switches. Each addressable switch of the second matrix configured to electrically couple a respective electrode element of the plurality of electrode elements with the second signal bus.

  • Pub Date: 2014/12/11
  • Number: 09602077
  • Details: Visit USPTO

Visit USPTO Page


Standby instances for auto-scaling groups

A computing resource service provider may provide computing instances organized into logical groups, such as auto-scaling groups. Computing instances assigned to an auto-scaling group may be place into standby. Standby instances may still be managed by the auto-scaling group but may not contribute to the capacity of the auto-scaling group for auto-scaling purposes.

  • Pub Date: 2014/12/11
  • Number: 09647889
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Semantic content accessing in a development system

A development system comprises, in one example, a development module configured to receive user development inputs to develop elements of a computer system. The elements comprise types modeled in the computer system. The development system comprises a user interface module configured to generate a user interface display with user input mechanisms that receive a user search query for searching the elements of the computer system. The development system comprises a search module configured to identify a type-based search parameter for the user search query and to obtain a set of search results by performing an element search based on the user search query and the type-based search parameter.

  • Pub Date: 2014/12/11
  • Number: 09377999
  • Owner: Micosoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction

A registered provider device encrypts provider input related to a transaction between the provider device and one of many registered user devices to create an encrypted one-time-use provider code (the encryption is performed using an encryption key produced, in part, using a uniquely sequenced number generated by a sequencer maintained by the provider device). Similarly, the user device encrypts user input to create an encrypted one-time-use user code using an encryption key produced, in part, using a uniquely sequenced number generated by a user sequencer maintained by the user device. The provider and user devices independently transmit their different encrypted one-time-use codes to an intermediate entity, which decrypts the encrypted codes. This decryption is performed using one-time-use encryption keys produced using sequencers maintained by the intermediate entity, and this decryption generates an authorization request. The intermediate entity obtains an authorization decision regarding the authorization request from the authorization entity.

  • Pub Date: 2014/12/11
  • Number: 09569776
  • Owner: BENEDORTSE LLC
  • Location: Dover, US
  • Details: Visit USPTO

Visit USPTO Page


Peripheral device with haptic diminishment prevention component

A system is provided that modifies a haptic effect experienced at a user input element. The system receives a position of a trigger of a peripheral device, the peripheral device including a housing, a user input element, a haptic output device located within the housing and coupled to the user input element, and a haptic diminishment prevention component. The system further sends a haptic effect definition to the haptic output device in response to the received position of the user input element. The system further causes the haptic output device to output a force to the user input element of the peripheral device in response to the haptic effect definition. The system further causes the haptic diminishment prevention component to create a range that the user input element can move within in response to the output force when the user input element is in a maximum open position outside of the range, or a maximum closed position outside of the range.

  • Pub Date: 2014/12/11
  • Number: 09174134
  • Owner: Immersion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Locker rental system using external codes

A locker rental system includes electronic lockers centrally managed by a locker manager. The locker manager is in communication with a separate external system, which handles admissions and sales for a venue. Users are provided with a unique external identification (ID) code for purposes such as admission to the venue. Determinative sequences of the external ID codes are provided to the locker manager as validation codes. When the external ID code is scanned, the locker manager validates the external ID code using the validation codes. A valid external ID code may be used to rent and access lockers in the locker system. In some implementations, locker rights may be sold through the external system and details of the transaction provided to the locker manager. If the external ID code is valid, the locker manager generates a rental plan.

  • Pub Date: 2014/12/11
  • Number: 09430892
  • Owner: Smarte Carte, Inc.
  • Location: St. Paul, US
  • Details: Visit USPTO

Visit USPTO Page


Head-mounted display apparatus

A head-mounted display apparatus including a face plate having a first surface formed to face a user's face, and a support part configured to be coupled with at least a part of the face plate so as to allow the face plate to be fixed on the user's face. A cavity structure may be formed on second surface of the face plate which is opposite to the first surface so as to mount an external electronic device to the head mounted display apparatus. One or more position adjustment units are configured to adjust a position of the external electronic device and may be formed on at least one side surface of the face plate.

  • Pub Date: 2014/12/11
  • Number: 09529194
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Yeongtong-gu, Suwon-si, Gyeonggi-do, KR
  • Details: Visit USPTO

Visit USPTO Page


Global software deployment/remediation management and associated analytics

Embodiments of the invention relate to systems, methods, and computer program products for an automated infrastructure management and remediation in an enterprise-type computing infrastructure that provides for automated deployment of critical updates/patches to enterprise-wide computing servers to insure that such updates occur and within prescribed time limits. Further, the invention provides for automatic extraction data from the various different data sources that contain data relevant to the update/patch process, consolidation and transformation of the data to accommodate reporting needs and analytical research and relying on the data to automatically determine the current state of the servers for the subsequent purpose of determining which of enterprise-wide servers require a pending update/patch. Additionally, the data is relied upon to automatically determine optimal times for deploying the update/patch to each of the servers, scheduling of an optimal time for deployment and subsequent automated deployment.

  • Pub Date: 2014/12/11
  • Number: 09176728
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic locker right acquisition via an external system

A locker rental system includes electronic lockers centrally managed by a locker manager. The locker manager is in communication with a separate external system, which handles admissions and sales for a venue. Users are provided with a unique external identification (ID) code for purposes such as admission to the venue. Determinative sequences of the external ID codes are provided to the locker manager as validation codes. When the external ID code is scanned, the locker manager validates the external ID code using the validation codes. A valid external ID code may be used to rent and access lockers in the locker system. In some implementations, locker rights may be sold through the external system and details of the transaction provided to the locker manager. If the external ID code is valid, the locker manager generates a rental plan.

  • Pub Date: 2014/12/11
  • Number: 09558608
  • Owner: Smarte Carte, Inc.
  • Location: St. Paul, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud service security broker and proxy

This application relates generally to a system operating on network traffic between a network-based software as a service (SaaS) provider and a client. The system can be configured as a managed communications network proxy and take action on the network traffic based on predefined policies and rules. The system can include a suffix proxy configured for captive page processing by processing SaaS server responses so that subsequent requests are handled by the suffix proxy dependent on file type and response type.

  • Pub Date: 2014/12/11
  • Number: 09438565
  • Owner: Adallom Technologies, Ltd.
  • Location: Tel Aviv, IL
  • Details: Visit USPTO

Visit USPTO Page


Virtualization of file input/output operations

Various embodiments of a system and method for providing input/output virtualization for a file are disclosed. The system may include a filter program that intercepts a write request for a particular file and stores change information specifying the data and the write location indicated by the write request. However, the file itself is not modified. The filter program may also intercept a read request referencing the file and determine whether change information representing a write request to write data at the location specified by the read request has been previously stored. If so then the data specified by the change information is returned in response to the read request.

  • Pub Date: 2014/11/11
  • Number: 09262433
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Token management in a managed directory service

A centralized policy management may allow for one set of credentials to various applications and services offered by a computing resource service provider or other third-party servers. Systems, methods, and computer readable medium can be configured to receive a request to access a first computing system service provided by the computing resource service provider, generate an encrypted data bundle including at least a user identifier and a data type, and transmit the encrypted data bundle to a recipient, wherein the encrypted data bundle is configured to be returned to the one or more computing devices to facilitate access to the first computing system service provided by the computing resource service provider.

  • Pub Date: 2014/11/11
  • Number: 09641522
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


System for managing and scheduling containers

A system and method for a container service that obtains a software image of a software container that has been configured to be executed within a computer system instance registered to a cluster by one or more processors. The container service is configured to receive a request to launch the software image in accordance with a task definition, wherein the task definition specifies an allocation of resources for the software container. The container service may then determine, according to a placement scheme, a subset of a set of container instances registered to the cluster in which to launch the software image in accordance with the task definition. Upon determining the subset of the set of container instances, the container service may launch the software image as one or more running software containers in the set of container instances in accordance with the task definition.

  • Pub Date: 2014/11/11
  • Number: 09256467
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Self-aligned capillarity-assisted microfabrication

A manufacturing process, which we term Self-Aligned Capillarity-Assisted Lithography for manufacturing devices having nano-scale or micro-scale features, such as flexible electronic circuits, is described.

  • Pub Date: 2014/11/11
  • Number: 09401306
  • Owner: REGENTS OF THE UNIVERSITY OF MINNESOTA
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Replicated database startup for common database storage

Read-only nodes of a distributed database system may perform replicated database startup for common database storage. A read-only node may request a view of a database from a master node to initialize the read-only node for servicing queries. An indication of the view may be received and portions of data maintained for the distributed database may be read from a common data store maintaining the data for the database according to the indicated view of the database. In-memory data structures at the read-only node for servicing queries may be initialized based on the portions of data read from the common data store. The read-only node may then be made available for servicing queries.

  • Pub Date: 2014/11/11
  • Number: 09613120
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Redundant storage solution

Method and apparatus for switching between a first server and a second server, each located within a virtual private cloud and the first server being located within a first zone and the second server being located within a second zone that is physically separate from the first zone. The method and apparatus further configured to determine that the first server has experienced a failure to send or receive data. The method and apparatus further configured to enable a second port on the second server. The method and apparatus further configured to create a new route table at the second server and flush the previous route table. The method and apparatus further configured to transmit, via the second port, a request to a virtual private cloud controller to update an elastic internet protocol address with the second port information and receive data from the virtual private cloud controller.

  • Pub Date: 2014/11/11
  • Number: 09584363
  • Owner: SOFTNAS, LLC.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Precise broadband frequency modulated laser

A method and apparatus are described including a laser with a plurality of internal or external actuators for affecting an optical frequency of light output by the laser, wherein the plurality of actuators have a corresponding plurality of different frequency response bands for changing optical properties of the laser and a corresponding plurality of actuation ranges of optical frequencies affected. Also included is an optical detector, and a plurality of optical paths configured to direct light output by the laser onto the detector. A laser controller is configured to provide a plurality of inputs to the plurality of actuators based on a detector signal output from the optical detector and the corresponding frequency response bands and actuation ranges.

  • Pub Date: 2014/11/11
  • Number: 09559486
  • Owner: Bridger Photonics, Inc.
  • Location: Bozeman, US
  • Details: Visit USPTO

Visit USPTO Page


Phase resolved shearography for remote sensing

A shearography system and method provide advances allowing for rapid processing to produce shearograms which provide surface motion information which may be helpful in multiple fields. For instance, amongst virtually endless possibilities, the system and method may allow for detection of underground structures or ordnance and or be used in the medical field to provide non-contact sensing of a person's internal structures or movements.

  • Pub Date: 2014/11/11
  • Number: 09476700
  • Owner: BAE Systems Information and Electronic Systems Integration Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Data protection compliant version control

In a data protection compliant version control system, a change committed by a user in a version is stored. A cryptographic hash value generated based on a set of parameters corresponding to the user and the version is computed. The cryptographic hash value along with the change committed by the user is stored. The cryptographic hash value is associated with the change committed by the user by a redirection pointer. The redirection pointer is deleted to disassociate the change committed by the user from the cryptographic hash value, thereby disassociating the change committed by the user from the user. The change committed by the user is displayed in a user interface associated with the version control system.

  • Pub Date: 2014/11/11
  • Number: 09317526
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and computer program products for automatic mapping between Parlay-X short messaging service message element XML encoding and native SMPP protocol data coding scheme

Systems, methods, and computer program products are for mapping an extensible markup language (XML) encoding declarations to a short message peer-to-peer (SMPP) data coding scheme (DCS) for a mobile-terminated (MT) short messaging service (SMS). An exemplary method includes receiving a message from a short message entity (SME) for delivery to a mobile device. The message includes a payload with at least one character encoded in accordance with a first character encoding scheme. The exemplary method further includes receiving from the SME a second encoding scheme for the message, implementing a mapping table to map the first character encoding scheme to the second character encoding scheme, and performing an encoding transformation of the message from the first character encoding to the second character encoding scheme yielding a modified message comprising the payload of the message encoded in the second character encoding scheme as specified by the SME.

  • Pub Date: 2014/10/11
  • Number: 09210108
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Small-molecule inhibitors of Rac1 in metastatic cancer cells

A novel inhibitor of Rac activity based on the structure of the established Rac/Rac-GEF inhibitor NSC23766 is discloses. The compound EHop-016, with an IC50 of 1.1 μM, is a 100-fold more efficient inhibitor of Rac activity than NSC23766. EHop-016 is specific for Rac1 and Rac3 at concentrations ≦5 mM. At higher concentrations, EHop-016 inhibits the close homolog Cdc42. In MDA-MB-435 cells, EHop-016 (≦5 mM) inhibits the association of the Rac-GEF Vav2 with a nucleotide-free Rac1(G15A), which has a high affinity for activated GEFs. EHop-016 does not affect the association of the Rac-GEF Tiam-1 with Rac1(G15A) at similar concentrations. EHop-016 also inhibits the Rac activity of MDA-MB-231 metastatic breast cancer cells and reduces Rac-directed lamellipodia formation in both cell lines. EHop-016 decreases Rac-downstream effects of p21-activated kinase (PAK)1 activity and directed migration of metastatic cancer cells. At low concentrations (<5 μM), EHop-016 does not affect cell viability.

  • Pub Date: 2014/10/11
  • Number: 09278956
  • Owner: University of Puerto Rico
  • Location: San Juan, US
  • Details: Visit USPTO

Visit USPTO Page


Preventing sharing of sensitive information through code repositories

Methods, systems, and computer program products for preventing sharing of sensitive information through code repositories are provided herein. A method includes detecting one or more items of sensitive information in a check-in associated with a given user in a shared version management system; automatically refactoring the one or more items of sensitive information in the check-in by externalizing the one or more items of sensitive information as an encrypted file; and upon acceptance by the user of one or more changes to the check-in, automatically (i) decrypting the encrypted file using one or more code repository credentials associated with the given user, and (ii) incorporating the one or more items of sensitive information into the check-in.

  • Pub Date: 2014/10/11
  • Number: 09607171
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Out-of band configuration of IP addresses

In some implementations, an IP address can be configured for a computing device using an out-of-band communication channel. For example, a system administrator can configure a system controller (e.g., baseband management controller) with an IP address using an out-of-band communication channel. In some implementations, the system controller can be configured with the IP address when the computing device is powered down. The system controller can store the IP address in memory associated with the system controller. In some implementations, an operating system of the computing device can be configured with an agent (e.g., process, application, utility) that will request the IP address from the system controller and configure the computing device to use the IP address. For example, the operating system agent can use various operating system commands to configure the IP address for the computing device based on the IP address received from the system controller.

  • Pub Date: 2014/10/11
  • Number: 09544267
  • Owner: QUANTA COMPUTER INC.
  • Location: Taoyuan, TW
  • Details: Visit USPTO

Visit USPTO Page


Operating a device to capture high dynamic range images

Some embodiments provide a method of operating a device to capture an image of a high dynamic range (HDR) scene. Upon the device entering an HDR mode, the method captures and stores multiple images at a first image exposure level. Upon receiving a command to capture the HDR scene, the method captures a first image at a second image exposure level. The method selects a second image from the captured plurality of images. The method composites the first and second images to produce a composite image that captures the HDR scene. In some embodiments, the method captures multiple images at multiple different exposure levels.

  • Pub Date: 2014/10/11
  • Number: 09420198
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-sized data types for managed code

Embodiments are directed towards generating applications that include multi-sized types running in managed code. During the compilation of an intermediate language version of an application, if a multi-size type is encountered, a runtime engine may perform actions to process the multi-size types. Accordingly, architecture information associated with the target computer may be determined. Data types corresponding to the architecture of the target computer and the multi-sized types may be determined based on the architecture information. Native code calls associated with an intermediate language code calls may be determined such that the parameters of the native code calls match the architecture dependent data types. And, a machine code version of the intermediate language code call may be generated. The generated machine code version of the intermediate language code may be executed with the data types specific to the target computer.

  • Pub Date: 2014/10/11
  • Number: 09183020
  • Owner: Xamarin Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile phone as a one-way recorded transmitter over a cellular network

Agencies oftentimes desire to monitor personnel in the field during the course of their duties. To provide flexible monitoring capabilities to agencies, a common mobile device such as a mobile phone is converted for use as a radio-based listening system to collect and transmit audio data. Phone features and accessories are leveraged to collect additional data for transmission. Collected data is streamed or otherwise transmitted to monitoring devices at the agency or in the field for operational oversight and recordation.

  • Pub Date: 2014/10/11
  • Number: 09313323
  • Owner: World Emergency Network—Nevada, Ltd.
  • Location: Carson City, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and devices for treating conditions associated with autonomic dysfunction

Methods and devices treating an autonomic nervous system associated disease condition in a subject are provided. Aspects of the invention include inducing one or more physiological response selected from the group consisting of sweating, gastric emptying, enhanced heart rate variability and enhanced quantitative sensory test responsiveness in a manner sufficient to modify the autonomic nervous system so as to treat the subject for the disease condition. The methods and devices find use in a variety of applications, e.g. in the treatment of subjects suffering from conditions arising from disorders of the autonomic nervous system.

  • Pub Date: 2014/10/11
  • Number: 09326887
  • Owner: Palo Alto Investors
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Inspection of data channels and recording of media streams

In one implementation, two or more endpoints or client devices communication uses a peer-to-peer, browser based, real time communication protocol. One example of such a protocol is Web Real-Time Communication (WebRTC). An intermediary device receives from a first endpoint, a request for communication with a second endpoint, using the browser based real time communication. The intermediary device identifies a control protocol based on the request for communication, and receives one or more write keys from the first endpoint. The intermediary device monitors communication between the first endpoint and the second endpoint using the one or more write keys. Examples for the intermediary devices include servers, firewalls, and other network devices.

  • Pub Date: 2014/10/11
  • Number: 09369491
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture and identification system and process

A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object.

  • Pub Date: 2014/10/11
  • Number: 09154695
  • Owner: Nant Holdings IP, LLC
  • Location: Culver City, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying groups for a social networking system user based on group characteristics and likelihood of user interaction

A social networking system selects a set of groups for presentation to a user of the social networking system. To select groups, the social networking system determining scores for various groups representing a likelihood of the user interacting with the groups. When determining a score for a group, the social networking system accounts for a likelihood of the user providing content to the group as well as the user accessing or viewing content associated with the group. Based on the scores, one or more groups are selected and presented to the user. Additionally, the social networking system may apply one or more diversity rules so that the selected groups have a variety of characteristics.

  • Pub Date: 2014/10/11
  • Number: 09538340
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Enabling enforcement of licensing terms in distributing content in containers by including a key in the container containing the pertinent licensing terms

A method, system and computer program product for enforcing licensing terms when distributing content via a container image running in a container. Upon receiving a request for a service from the container by the isolation code, where the isolation code limits, accounts and isolates resource usage of process groups, the commerce code application programming interfaces (APIs) of the isolation code read a key of the container. The key contains licensing terms applied to the component(s) (e.g., applications) of the container. The commerce code APIs will then confirm that the container is in compliance with those licensing terms. If the container is in compliance with the licensing terms, the container will be allowed to execute. Otherwise, the container will be prevented from executing. In this manner, the commerce code APIs can enforce the licensing terms, including restrictions and enforcement of payment to the licensor upon distributing content in the container.

  • Pub Date: 2014/10/11
  • Number: 09449353
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Compression using index bits in MSAA

A palette compressed representation may be stored in the index bits, when that is possible. The savings are considerable in some embodiments. In uncompressed mode, the data uses 2304 (2048+256) bits, and in compressed mode, the data uses 1280 bits. However, with this technique, the data only uses the index bits, (e.g. 256 bits) with a 5:1 compression improvement over the already compressed representation, and with respect to the uncompressed representation it is a 9:1 compression ratio.

  • Pub Date: 2014/10/11
  • Number: 09466124
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Breach detection-based data inflation

A method and apparatus for deterring exfiltration of data from are provided. In the method and apparatus, it is determined that data is to be inflated. A request for access to data is received and data responsive to the request is retrieved. Spurious data is also generated and provided together with the responsive data in response to the request.

  • Pub Date: 2014/10/11
  • Number: 09591023
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Bin enabled data object encryption and storage apparatuses, methods and systems

The BIN ENABLED DATA OBJECT ENCRYPTION AND STORAGE APPARATUSES, METHODS AND SYSTEMS (“MBIN”) transforms bin creation requests, bin templates and unencrypted object storage inputs, using MBIN components, into encrypted object storage bins and encrypted bin objects. A method comprises the creation of encrypted object storage bins, the storage of encrypted bin objects, and an application framework that allows privileged applications to leverage the capabilities of and data stored in the encrypted object storage bins.

  • Pub Date: 2014/10/11
  • Number: 09369445
  • Owner: Mustbin Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Automated deployment of applications

Functionality is disclosed for automated deployment of applications. A network-based deployment service provides functionality for deploying software components to physical or virtual hosts in a service provider network and/or to hosts in other types of networks external to the service provider network. A user of the deployment service creates an application revision that includes deployable content and an application specification defining how the application is to be deployed and one or more lifecycle events. The application revision is then uploaded to a storage service, source code repository, or other location. A deployment configuration is also created that defines the location of the application revision, a deployment group, and a schedule for the deployment. A deployment agent executing on hosts in the deployment group obtains the application revision from the specified location, deploys the deployable content according to the schedule, and performs the lifecycle events.

  • Pub Date: 2014/10/11
  • Number: 09547564
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Authentication method and system

The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system incorporates a variety of features that make unauthorized reproduction difficult. In addition, the present invention provides a system and method for providing a dynamically reconfigurable watermark, and the use of the watermark to encode a stochastically variable property of the carrier medium for self-authentication purposes.

  • Pub Date: 2014/10/11
  • Number: 09064260
  • Owner: Copilot Ventures Fund III LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Attaching multiple phone lines to a single mobile or landline phone

Agencies issue multiple devices to personnel for maintaining distinct identities over the course of assigned investigations. To provide flexible capabilities to agencies, a phone is converted for use with multiple attached telephone numbers. Accordingly, a single phone may be used to manage multiple identities over the course of one or more investigations. Using a multiple attached number, a given device can place and receive calls over the network to and from contacts. In addition to providing multiple attached numbers, calls using the multiple attached numbers may be monitored live and recorded to establish evidence.

  • Pub Date: 2014/10/11
  • Number: 09270814
  • Owner: World Emergency Network—Nevada, Ltd.
  • Location: Carson City, US
  • Details: Visit USPTO

Visit USPTO Page


Accessing business object resources for a machine-to-machine communication environment

Business object resources are accessed by a consumer application via web protocol. A business event occurring in a provider business application, which the consumer application is authorized to subscribe to, is identified. Each identified business event is assigned to a corresponding business object resource. Access to the business object resource is implemented as a RESTful application programming interface call. A uniform resource identifier is generated for accessing the business object resource affected by an occurring defined business event. At least one event message is created for the occurring defined business event, such that the event message includes the uniform resource identifier. The event message is published to all subscribed consumer applications that are identified as being interested in contextual information of the occurred business event, thereby enabling the calling of the RESTful application programming interface and to access the affected business object resource.

  • Pub Date: 2014/10/11
  • Number: 09086935
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Searchable encryption for cloud storage

A method implements searchable encryption of cloud stored data by appending tokenized keywords to an encrypted file destined for a cloud storage service. In some embodiments, the tokenized keywords are appended to the header of the encrypted file. Searching of cloud-stored encrypted files using the native search capability of the cloud storage service is then possible by performing the search using the tokenized keywords. In alternate embodiments of the present invention, a method enables searching of cloud stored encrypted file using a cloud search appliance.

  • Pub Date: 2014/07/11
  • Number: 09454673
  • Owner: Skyhigh Networks, Inc.
  • Location: Campbell, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time learning of hashtag-to-TV program relationships

Disclosed is a system, method, and computer program product for relating a metadata tag to a television program identifier and associating a hashtag with metadata associated with the television program. A mapping server receives a request that includes a metadata tag (e.g., a hashtag) for a social object, such as a comment or a post to a social network. The mapping server generates a graph to determine a set of television program identifiers likely associated with the metadata tag. Furthermore, the mapping server compresses graph data over time to reduce the time needed to perform a query to the graph.

  • Pub Date: 2014/07/11
  • Number: 09420355
  • Owner: Peel Technologies, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Providing power management services in a software provisioning environment

A software provisioning server can communicate with a power management system of the target machines to alter the power state of the target machines during actions requiring a change in the power state, such as power cycling the target machines during a software installation. The software provisioning server can communicate with the power management system of the target machines and instruct the power management systems to alter the power state of the target machines during the actions.

  • Pub Date: 2014/07/11
  • Number: 09223369
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Precision Medicine by targeting VEGF-A variants for treatment of retinopathy

The invention relates to human targets of interest (TOI), anti-TOI ligands, kits compositions and method.

  • Pub Date: 2014/07/11
  • Number: 09062105
  • Owner: Kymab Limited
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Precision medicine by targeting PD-L1 variants for treatment of cancer

The invention relates to human targets of interest (TOI), anti-TOI ligands, kits compositions and method.

  • Pub Date: 2014/07/11
  • Number: 09045545
  • Owner: Kymab Limited
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Method and system for integrating real time communication features in applications

A computer has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to receive a real time communication request from a client device and perform an evaluation of the number of client devices associated with the real time communication request. The evaluation results in the coordination of peer-to-peer communications in the event of two client devices and an attempt to host a real time communication session using a first protocol in the event of three or more client devices. A second protocol for the real time communication session is invoked in the event that the attempt to host the real time communication session using the first protocol is unsuccessful.

  • Pub Date: 2014/07/11
  • Number: 09083770
  • Owner: Snapchat, Inc.
  • Location: Venice, US
  • Details: Visit USPTO

Visit USPTO Page


Inventory system with climate-controlled inventory

An inventory system includes a first inventory holder positioned in a first climate-controlled zone of a workspace that is at a below-freezing temperature. The system also includes a second inventory holder positioned in a second climate-controlled zone that is at an above-freezing refrigerated temperature. The system also includes a third inventory holder positioned in a third climate-controlled zone that is at ambient conditions. The system also includes a management module operable to receive an order for the first inventory item, an order for the second inventory item, and an order for the third inventory item. The management module instructs a first mobile drive unit to transport the first inventory holder to an inventory station, instructs a second mobile drive unit to transport the second inventory holder to the inventory station, and instructs a third mobile drive unit to transport the third inventory holder to the inventory station.

  • Pub Date: 2014/07/11
  • Number: 09533828
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture and identification system and process

A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object.

  • Pub Date: 2014/07/11
  • Number: 09148562
  • Owner: Nant Holdings IP, LLC
  • Location: Culver City, US
  • Details: Visit USPTO

Visit USPTO Page


Geo-fence solver

A computer-implemented method performed by a UE is provided. The computer-implemented method includes generating, with a first chipset, a first set of geo-fence rules; generating, with the first chipset, a second set of geo-fence rules, which are a simplified subset of the first set of geo-fence rules; transmitting the second set of geo-fence rules to a second chipset; powering down the first chipset; detecting if at least one of the second set of geo-fence rules has been broken; and if at least one of the second set of geo-fence rules is broken, powering up the first chipset to determine if the at least one broken second rule is indicative of breaking at least one rule of the first set of geo-fence rules.

  • Pub Date: 2014/07/11
  • Number: 09338598
  • Owner: Samsung Electronics Co., Ltd
  • Location: , KR
  • Details: Visit USPTO

Visit USPTO Page


Electronic backup of applications

Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes receiving, while a current view of an application is displayed in a user interface, a first user input requesting that a history view associated with the current view of the application be displayed, retrieve data associated with the history view, determining a presentation format for the data, and displaying the history view in response to the first user input in accordance with the presentation format, the history view including data associated with at least a first visual representation of an earlier version of the current view of the application.

  • Pub Date: 2014/07/11
  • Number: 09286166
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically controlling the presentation of a graphic feature based on location information

A system and method of operating a mobile device is described. The mobile device can determine its current location and determine whether a location-based service, which can be requested by a user operating the mobile device, is available for use at the current location. In response to determining that the location-based service is unavailable for use at the current location, the mobile device can cause a graphic icon, that would otherwise be displayed one of one or more home pages on a display of the mobile device, to be hidden so that the graphic icon is not displayed with any of the one or more home pages. The graphic icon can correspond to a service application for use with the location-based service.

  • Pub Date: 2014/07/11
  • Number: 09615208
  • Owner: Uber Technologies, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic reconstruction of application state upon application re-launch

A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices or virtual desktop instances of end users. An application delivery agent installed on an end user's computing resource instance may store application state data (e.g., configuration data, runtime settings, or application templates) or scratch data that is generated by an application executing on the computing resource instance to a secure location on service provider storage resources. After a machine failure or change, or a rebuilding of a virtualized computing resource instance or virtual desktop instance, an application delivery agent installed on the new machine or instance may reinstall the application, retrieve the stored application state or scratch data from service provider resources, and restore the application to the last known persisted state. Upon request, the application delivery agent may restore the application to any earlier persisted state.

  • Pub Date: 2014/07/11
  • Number: 09495142
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Domain join and managed directory support for virtual computing environments

A virtual computing environment service may receive a request from a customer to provision a virtual computing environment and join the virtual computing environment to a managed directory. The virtual computing environment service may provision the virtual computing environment and uses a set of administrator credentials from the customer and a set of credentials corresponding to the environment to access the managed directory and request joining of the environment to the managed directory. In response, the managed directory may create a computer account corresponding to the environment and which enables the environment to be used to access the managed directory. The virtual computing environment service may then enable the customer to specify one or more users that may utilize the virtual computing environment to access the managed directory.

  • Pub Date: 2014/07/11
  • Number: 09565190
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Disruption blocking in mobile devices

A do not disturb (DND) mode for telephonic devices, in which the DND mode is automatically deactivated after a time increment has elapsed, the DND mode having been activated based on detecting, upon receiving a telephone call, a selection of the control.

  • Pub Date: 2014/07/11
  • Number: 09357063
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Control of video camera with privacy feedback to capture images of a scene

Techniques and systems are provided for controlling a network video camera with physical privacy feedback to capture one or more images of a scene. For example, computing device, a method, and a computer-program product may be provided. The computing device may include one or more lenses and one or more blocking mechanisms, wherein the one or more blocking mechanisms are configured to selectively block the one or more lenses from capturing video images, and wherein the one or more blocking mechanisms include a physical body that provides visible feedback that the one or more lenses are blocked. The computing device, method, and computer-program product may include detecting movement of a blocking mechanism from a first position in which a lens is exposed to a second position in which the lens is blocked, and capturing one or more images of a scene, wherein the one or more images of the scene are captured when the movement of the blocking mechanism is detected.

  • Pub Date: 2014/07/11
  • Number: 09179058
  • Owner: BELKIN INTERNATIONAL, INC.
  • Location: Playa Vista, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions containing borane or carborane cage compounds and related applications

Compositions comprising a polymer-containing matrix and a filler comprising a cage compound selected from borane cage compounds, carborane cage compounds, metal complexes thereof, residues thereof, mixtures thereof, and/or agglomerations thereof, where the cage compound is not covalently bound to the matrix polymer. Methods of making and applications for using such compositions are also disclosed.

  • Pub Date: 2014/07/11
  • Number: 09133324
  • Owner: Honeywell Federal Manufacturing & Technologies, LLC
  • Location: Kansas City, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud-based device twinning

A network-based service is utilized to facilitate twinning of two or more communication devices associated with a subscriber account. Incoming communication is intercepted by a communication device and forwarded to a network server, which in turn transmits the incoming communication to the multiple twinned devices. In addition, identifier data associated with outgoing communication is replaced with a primary identifier (e.g., customer telephone number (CTN)) of a user's primary device or a common identifier (e.g., a mobile one number (MON)) assigned to devices associated with the user's subscriber account. Communication devices can be temporarily twinned for a defined time period, during which a common bill can be generated for the twinned devices.

  • Pub Date: 2014/07/11
  • Number: 09602989
  • Owner: AT&T MOBILITY II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices

A system for exchanging GPS or other position data between wireless devices for purposes of group activities, child location monitoring, work group coordination, dispatching of employees etc. Cell phones and other wireless devices with GPS receivers have loaded therein a Buddy Watch application and a TalkControl application. The Buddy Watch application communicates with the GPS receiver and other wireless devices operated by buddies registered in the users phone as part of buddy groups or individually. GPS position data and historical GPS position data can be exchanged between cell phones of buddies and instant buddies such as tow truck drivers via a buddy watch server. Emergency monitoring services can be set up with notifications to programmable individuals in case an individual does not respond. Positions and tracks can be displayed. TalkControl simplifies and automates the process of joining talk groups for walkie talkie services such as that provided by Nextel.

  • Pub Date: 2014/07/11
  • Number: 09185522
  • Owner: X One, Inc.
  • Location: Union City, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices

A system for exchanging GPS or other position data between wireless devices for purposes of group activities, child location monitoring, work group coordination, dispatching of employees etc. Cell phones and other wireless devices with GPS receivers have loaded therein a Buddy Watch application and a TalkControl application. The Buddy Watch application communicates with the GPS receiver and other wireless devices operated by buddies registered in the users phone as part of buddy groups or individually. GPS position data and historical GPS position data can be exchanged between cell phones of buddies and instant buddies such as tow truck drivers via a buddy watch server. Emergency monitoring services can be set up with notifications to programmable individuals in case an individual does not respond. Positions and tracks can be displayed. TalkControl simplifies and automates the process of joining talk groups for walkie talkie services such as that provided by Nextel.

  • Pub Date: 2014/07/11
  • Number: 09031581
  • Owner: X One, Inc.
  • Location: Union City, US
  • Details: Visit USPTO

Visit USPTO Page


Stateless microkernel web server architecture

A method for serving enterprise commerce between a stateless microkernel architecture HTTP server program executed on a server device and an HTTP client program executed on a client computing device is disclosed. The method includes receiving an HTTP request including a plurality of client attributes and a plurality of resource operations from an HTTP client program, reading the plurality of client attributes from the HTTP request, and splitting the HTTP request into a plurality of individual resource operations at a splitter/combiner agent. For each individual resource operation, the method includes determining a destination URL and content type from a content type header of the HTTP request, comparing the client attributes to stored client attribute profiles, retrieving matching existing resource representations, sending the retrieved existing resource representation to the splitter/combiner agent, combining retrieved resource representations into a combined resource representation, and sending the combine resource representation to the HTTP client program.

  • Pub Date: 2014/06/11
  • Number: 09398069
  • Owner: Elastic Path Software, Inc.
  • Location: Vancouver, CA
  • Details: Visit USPTO

Visit USPTO Page


Snapshots in a hybrid storage device comprising a magnetic disk and a solid state disk

One or more snapshots of data stored over a period of time are maintained in a hybrid storage device comprising a magnetic disk and a solid state disk, wherein a selected snapshot stores information that allows recovery of data that is stored in the hybrid storage device at a selected point in time of the period of time. The hybrid storage device receives an input/output (I/O) command from a computational device. A category of a plurality of categories to which the I/O command belongs is determined, wherein the plurality of categories comprise writing to an unused block, writing to a used block, reading from an unused block, and reading from a used block. In response to determining the category to which the I/O command belongs, the I/O command is handled by one of the magnetic disk and the solid state disk based on the determined category.

  • Pub Date: 2014/06/11
  • Number: 09317373
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method for domain shading, and devices operating the same

A method for domain shading may include analyzing graphics state data, and generating all first primitives through a single-pass domain shading or generating only second primitives which are visible among the first primitives through a two-pass domain shadin